WO2025010561A1 - Communication method and apparatus, communication device, storage medium, and communication system - Google Patents
Communication method and apparatus, communication device, storage medium, and communication system Download PDFInfo
- Publication number
- WO2025010561A1 WO2025010561A1 PCT/CN2023/106430 CN2023106430W WO2025010561A1 WO 2025010561 A1 WO2025010561 A1 WO 2025010561A1 CN 2023106430 W CN2023106430 W CN 2023106430W WO 2025010561 A1 WO2025010561 A1 WO 2025010561A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- network element
- updated
- parameter set
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- the present disclosure relates to the field of communication technology, and in particular to a communication method, apparatus, communication equipment, storage medium and communication system.
- the Authentication and Key Management method for Applications (AKMA) service has been used to protect the communication between the terminal and the application function (AF), and the terminal and the AF can be authenticated by the application function key (K AF ).
- K AF application function key
- the technology of enabling the relevant network elements to obtain the updated K AF is provided.
- the present disclosure provides a communication method, an apparatus, a communication device, a storage medium and a communication system.
- a communication method is provided. The method is performed by a first network element and includes:
- a first parameter set is sent to a second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information, so that the second network element obtains an updated routing identifier (Router Indic, RID) of the UE.
- RID routing identifier
- a communication method is provided. The method is performed by a second network element and includes:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- a communication method is proposed.
- the method is performed by a third network element, including:
- a first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- a communication device comprising a transceiver module, configured to:
- a first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- a communication device comprising a transceiver module, configured to:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- a communication device comprising a transceiver module, configured to:
- a first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- a communication device comprising: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer executable instructions on the memory, and can implement any one of the methods described in the first to third aspects above.
- a computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in any one of the first to third aspects above can be implemented.
- a communication system including: a first network element, a second network element, and a third network element, wherein the first network element is used to execute the method described in the first aspect, the second network element is used to execute the method described in the second aspect, and the third network element is used to execute the method described in the third aspect.
- FIG1 is a schematic diagram of the architecture of a communication system provided in an embodiment of the present disclosure.
- FIGS. 2a-2b are interactive schematic diagrams of some communication methods provided by embodiments of the present disclosure.
- 3a-3c are flowchart diagrams of some communication methods provided by embodiments of the present disclosure.
- FIG5 is a flowchart of some further communication methods provided by embodiments of the present disclosure.
- 6a-6b are interactive schematic diagrams of some communication methods provided in embodiments of the present disclosure.
- FIGS. 7a-7c are diagrams showing examples of interactions of some communication methods provided in embodiments of the present disclosure.
- FIG8a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG8b is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG8c is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG9a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG. 9 b is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
- the method disclosed in the present invention can be used to solve the technical problem of "implementing an AKMA service when the RID on the terminal side is updated, so that the AF can identify the AAnF and obtain the K AF ".
- the embodiments of the present disclosure provide a communication method, an apparatus, a communication device, a storage medium, and a communication system.
- an embodiment of the present disclosure provides a communication method, which is performed by a first network element and includes:
- a first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the first network element may send the first parameter set to the second network element to implement an AKMA service.
- sending the first parameter set to the second network element includes:
- a first parameter set is sent to a second network element, and the first condition is that the terminal receives updated first information configured by the first network element.
- the first network element sends the first parameter set to the second network element under the first condition to implement information update in the AKAM service.
- the method also includes: determining whether the first condition is met, wherein determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
- the first network element determines whether the second information sent by the terminal is consistent with the third information stored in the first network element, thereby determining whether the first condition is met, and a determination method for meeting the first condition is proposed to determine whether the first network element sends the first data set, thereby avoiding waste of resources.
- the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
- sending the first parameter set to the second network element includes: discovering the second network element based on the updated first information; and sending the first parameter set to the second network element.
- the first network element discovers the second network element based on the updated first information; sends the first parameter set to the second network element to generate the fifth information, thereby updating the fifth information.
- an embodiment of the present disclosure provides a communication method, which is performed by a second network element, and the method includes:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- the second network element receives the first parameter set sent by the first network element to obtain the first information and/or the fourth information, determines the update information and subscriber-related information in the AKMA service, and reduces the signaling resources used for sending parameters.
- the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
- the method further includes: generating fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
- the second network element can generate fifth information based on the updated first information and fourth information to use the fifth information to identify the second key; the second network element can also use the updated first information to replace the unupdated first information in the unupdated fifth information when the unupdated fifth information is stored locally to generate updated fifth information, thereby improving the generation efficiency of the fifth information.
- the method further includes: generating a second key based on the fourth information and the first key stored in the second network element.
- the second network element may: generate a second key based on the fourth information and the first key stored in the second network element, so as to realize the generation of keys in the AKMA service.
- the method further includes: discovering a third network element based on the updated first information.
- the third unit is discovered through the updated first information, so that the relevant information is sent to the third unit to implement the update of the third unit database.
- the method further includes: sending at least one of the following to a third network element: fifth information, a second key, and fourth information.
- the third network element database is updated, and the signaling resources used for sending parameters are reduced.
- the method further comprises: discovering a fourth network element based on the updated first information, and sending at least one of the following to the fourth network element: fifth information, the second key, and the fourth information.
- the fourth network element is used to discover the third network element based on the updated first information.
- the application scope of the proposed AKMA service is expanded.
- the fourth network element is further used to send at least one of the following to the third network element: fifth information, second key, fourth information.
- At least one of the following is sent to the third network element by the fourth network element: the fifth information, the second key, and the fourth information, so as to update the information in the third network element and reduce the signaling resources used for sending parameters.
- the generation efficiency of the fifth information is improved by replacing the first information in the unupdated fifth information with the updated first information to generate the fifth information.
- the method further includes: sending at least one of the following to the third network element or the fourth network element: fifth information, second key, fourth information.
- At least one of the following may be sent to the third network element or the fourth network element: the fifth information, the second key, the fourth information.
- the application scope of the proposed AKMA service is expanded.
- an embodiment of the present disclosure proposes a communication method, which is executed by a third network element, and the method includes: receiving at least one of fourth information, fifth information, and second key sent by the second network element or the fourth network element, wherein the fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
- the third network element receives at least one of the fourth information, the fifth information, and the second key sent by the second network element or the fourth network element to update the third network element's own database, so that the AF can discover the third network element when the terminal updates the first information, and obtain the updated information and key K AF in the third network element, thereby expanding the application scope of the proposed AKMA service.
- the first parameter set further includes a fourth information
- the fifth information is used to identify the second key.
- the third network element is discovered based on the updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: send a first parameter set to a second network element, the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module for: receiving a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes: one or more processors; one or more memories for storing instructions; wherein the processor is used to call the instructions so that the communication device executes the method described in the optional implementation modes of the first, second and third aspects.
- an embodiment of the present disclosure proposes a computer program, which, when executed on a computer, enables the computer to execute optional implementations of the first, second and third aspects.
- the communication system also includes a fourth network element.
- elements expressed in the singular form such as “a”, “an”, “the”, “above”, “said”, “aforementioned”, “this”, etc., may mean “one and only one", or “one or more”, “at least one”, etc.
- the noun after the article may be understood as a singular expression or a plural expression.
- the terms “at least one of”, “at least one of”, “at least one of”, “one or more”, “a plurality of”, “multiple”, etc. can be used interchangeably.
- descriptions such as “at least one of A, B, C...”, “A and/or B and/or C...”, etc. include the situation where any one of A, B, C... exists alone, and also include the situation where any multiple of A, B, C... exist in any combination, and each situation can exist alone; for example, “at least one of A, B, C” includes the situation where A exists alone, B exists alone, C exists alone, the combination of A and B, the combination of A and C, the combination of B and C, and the combination of A, B and C; for example, A and/or B includes the situation where A exists alone, B exists alone, and the combination of A and B.
- the description methods such as “in one case A, in another case B", “in response to one case A, in response to another case B”, etc. may include the following technical solutions according to the situation: A is executed independently of B, that is, in some embodiments A; B is executed independently of A, that is, in some embodiments B; A and B are selectively executed, that is, selected from A and B for execution in some embodiments; A and B are both executed. Execution, that is, in some embodiments, A and B. When there are more branches such as A, B, C, etc., it is similar to the above.
- prefixes such as “first” and “second” in the embodiments of the present disclosure are only used to distinguish different description objects, and do not constitute restrictions on the position, order, priority, quantity or content of the description objects.
- the statement of the description object refers to the description in the context of the claims or embodiments, and should not constitute unnecessary restrictions due to the use of prefixes.
- the description object is a "field”
- the ordinal number before the "field” in the "first field” and the "second field” does not limit the position or order between the "fields”
- the "first” and “second” do not limit whether the "fields” they modify are in the same message, nor do they limit the order of the "first field” and the "second field”.
- the description object is a "level”
- the ordinal number before the "level” in the “first level” and the “second level” does not limit the priority between the "levels”.
- the number of description objects is not limited by the ordinal number, and can be one or more. Taking the "first device” as an example, the number of "devices” can be one or more.
- the objects modified by different prefixes may be the same or different. For example, if the description object is "device”, then the “first device” and the “second device” may be the same device or different devices, and their types may be the same or different. For another example, if the description object is "information”, then the "first information” and the “second information” may be the same information or different information, and their contents may be the same or different.
- terms such as “greater than”, “greater than or equal to”, “not less than”, “more than”, “more than or equal to”, “not less than”, “higher than”, “higher than or equal to”, “not lower than”, and “above” can be replaced with each other, and terms such as “less than”, “less than or equal to”, “not greater than”, “less than”, “less than or equal to”, “no more than”, “lower than”, “lower than or equal to”, “not higher than”, and “below” can be replaced with each other.
- devices, etc. can be interpreted as physical or virtual, and their names are not limited to the names recorded in the embodiments.
- Terms such as “device”, “equipment”, “device”, “circuit”, “network element”, “node”, “function”, “unit”, “section”, “system”, “network”, “chip”, “chip system”, “entity”, and “subject” can be used interchangeably.
- terminal In some embodiments, the terms "terminal”, “terminal device”, “user equipment (UE)”, “user terminal” “mobile station (MS)”, “mobile terminal (MT)", subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client and the like can be used interchangeably.
- the access network device, the core network device, or the network device can be replaced by a terminal.
- the various embodiments of the present disclosure can also be applied to a structure in which the access network device, the core network device, or the network device and the communication between the terminals is replaced by the communication between multiple terminals (for example, it can also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), etc.).
- D2D device-to-device
- V2X vehicle-to-everything
- the language such as "uplink” and "downlink” can also be replaced by the language corresponding to the communication between the terminals (for example, "side”).
- the uplink channel, the downlink channel, etc. can be replaced by the side channel
- the uplink, the downlink, etc. can be replaced by the side link.
- the terminal may be replaced by an access network device, a core network device, or a network device.
- the access network device, the core network device, or the network device may also be configured to have a structure that has all or part of the functions of the terminal.
- network may be interpreted as devices included in the network (eg, access network equipment, core network equipment, etc.).
- acquisition of data, information, etc. may comply with the laws and regulations of the country where the data is obtained.
- data, information, etc. may be obtained with the user's consent.
- the terminal 101 includes, for example, a mobile phone, a wearable device, an Internet of Things device, a car with a communication function, a smart car, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a smart phone, etc.
- a mobile phone a wearable device, an Internet of Things device, a car with a communication function, a smart car, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a smart phone, etc.
- VR virtual reality
- AR augmented reality
- wireless terminal device in industrial control a wireless terminal device in self-driving
- the core network device 102 may be a device including one or more network elements, or may be a plurality of devices or a group of devices, each including all or part of one or more network elements.
- the network element may be virtual or physical.
- the core network may include, for example, at least one of an Evolved Packet Core (EPC), a 5G Core Network (5GCN), and a Next Generation Core (NGC).
- EPC Evolved Packet Core
- 5GCN 5G Core Network
- NGC Next Generation Core
- the above-mentioned one or more network elements may include, for example: application function (AF), application layer authentication and key management anchor function (AAnF), access and mobility management function (AMF), user plane function (UPF), session management function (SMF), mobility management entity (MME), unified data management function (UDM), etc.
- AF application function
- AMF access and mobility management function
- UPF user plane function
- SMF session management function
- MME mobility management entity
- UDM unified data management function
- PCF PCF
- AF NAF
- AAnF BSF
- AMF AMF
- UPF SMF
- MME MME
- UDM UDM
- the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be independent of the core network equipment.
- the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be part of the core network device 102.
- the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution proposed in the embodiment of the present disclosure.
- a person of ordinary skill in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution proposed in the embodiment of the present disclosure is also applicable to similar technical problems.
- the following embodiments of the present disclosure may be applied to the communication system 100 shown in FIG1 , or part of the subject, but are not limited thereto.
- the subjects shown in FIG1 are examples, and the communication system may include all or part of the subjects in FIG1 , or may include other subjects other than FIG1 , and the number and form of the subjects are arbitrary, and the connection relationship between the subjects is an example, and the subjects may be connected or disconnected, and the connection may be in any manner, which may be a direct connection or an indirect connection, and may be a wired connection or a wireless connection.
- FIG2a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2a, the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
- Step 2101 The first network element 101 determines whether a first condition is met.
- the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
- the first condition is that the terminal receives updated first information of the first network element configuration.
- determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the first network element may be a UDM
- the second network element may be an AUSF
- the third network element may be an AAnF.
- the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
- the first information includes at least a routing indicator (RID).
- the updated first information includes at least an updated RID.
- the RID can be a random character consisting of 1 to 4 decimal digits pre-configured in the Universal Subscriber Identity Module (USIM).
- USIM Universal Subscriber Identity Module
- the first information can be used together with a home network identifier (Home Network Identifier) to route network signaling containing a subscription concealed identifier (SUCI) to a first network element, a second network element, or a third network element that can provide services to the terminal.
- Home Network Identifier Home Network Identifier
- SUCI subscription concealed identifier
- the first network element may update the first information for the terminal so that the terminal uses the updated first information to perform the application authentication and key management AKMA service.
- the second information is used by the first network element to determine whether the terminal has received the updated first information.
- the first network element may receive the second information sent by the UE, but is not limited thereto.
- the present disclosure does not limit the manner in which the first network element obtains the second information.
- the name of the second information is not limited, and it can be, for example, “terminal receiving information”, “terminal updating information”, etc.
- the second information includes at least UPU-MAC-I UE , where UPU-MAC-I UE can be a hash value calculated by the terminal through an authentication server function key (Authentication Server Function Key, K AUSF ), used to indicate that the terminal has received the information.
- K AUSF Authentication Server Function Key
- the third information is used by the first network element to determine whether the terminal has received the updated first information.
- the third information stored in the first network element may be sent by the second network element, but is not limited thereto.
- the present disclosure does not limit the method for obtaining the third information stored in the first network element.
- the name of the third information is not limited, and it may be, for example, "expected terminal reception information", “expected terminal update information”, etc.
- the third information includes at least UPU-XMAC-I UE , where UPU-XMAC-I UE may be a hash value calculated by the second network element through K AUSF , which is used to estimate whether the terminal has received the information.
- the first network element receives second information sent by the terminal, and compares the received second information with third information stored in the first network element. If the second information is consistent with the third information, the first network element determines that the first condition is met.
- Step 2102 The first network element 101 discovers the second network element based on the updated first information.
- the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
- the first information is used to identify the first network element and the second network element so that the first network element can discover the second network element.
- the second network element corresponding to the updated first information can be determined.
- the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
- the first information includes at least the RID.
- the updated first information includes at least: the updated RID.
- the RID is a string of random numbers without actual meaning, that is, the RID is unique. Therefore, from the uniqueness of the RID, it can be known that the second network element uniquely corresponding to the updated first information can be found based on the updated first information.
- the first network element is a UDM and the second network element is an AUSF.
- Step 2103 The first network element 101 sends a first parameter set to the second network element 102 under a first condition.
- the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
- the first parameter set is used for Application Authentication and Key Management AKMA services.
- the name of the first parameter set is not limited, and it may be, for example, a "key set”, "authentication parameter set”, etc.
- the first parameter set includes at least one of the updated first information and the fourth information.
- the name of the fourth information is not limited, and it may be, for example, “terminal identification information”, “identification information”, etc.
- the fourth information includes at least a Subscription Permanent Identifier (SUPI), where the SUPI can identify the terminal.
- SUPI Subscription Permanent Identifier
- the first network element when the terminal receives updated first information configured by the first network element, the first network element may send the first parameter set. In other words, when the second information sent by the terminal received by the first network element is consistent with the third information stored by the first network element, the first network element may send the first parameter set.
- the first network element is a UDM and the second network element is an AUSF. If the UPU-MAC-I UE is the same as the stored UPU-XMAC-I UE , the UDM confirms that the UE has received the updated RID. At this time, the UDM may send a first parameter set to the AUSF, which includes at least the updated RID and SUPI.
- Step 2104 The second network element 102 determines that the second network element stores the first information which has not been updated.
- the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
- the second network element can determine that the second network element stores unupdated fifth information generated using unupdated first information to generate fifth information based on the updated first information, i.e., replace the unupdated first information with the updated first information to generate the fifth information.
- the second network element stores the non-updated first information, that is, the second network element also stores the non-updated fifth information generated using the non-updated first information.
- the second network element when the terminal updates the first information, the second network element will retain the original first information, that is, the first information that has not been updated. In other words, in some embodiments, when the terminal updates the first information, the second network element will delete the first information that has not been updated.
- the second network element is AUSF.
- the terminal updates the RID in the first information from 1000 to 1001
- the AUSF does not update the RID1000 in the stored unupdated fifth information to 1001, then it can be determined that the AUSF stores the unupdated first information.
- Step 2105 The second network element 102 replaces the non-updated first information with the updated first information.
- the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
- the second network element is AUSF.
- the terminal updates the RID in the first information from 1000 to 1001, and AUSF does not delete RID1000 in the stored fifth information that is not updated
- AUSF can replace the first information that is not updated with the updated first information, that is, replace RID1000 with the updated RID1001, and then generate the fifth information.
- Step 2106 The second network element 102 generates fifth information based on the updated first information and/or fourth information.
- the fifth information may be generated based on the updated first information and/or fourth information.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the third network element 103 .
- the fifth information is used to identify the second key, ie, the AKMA key (K AKMA ).
- the name of the fifth information is not limited, and it may be, for example, "AKAM key identification information", “key representation information”, etc.
- the fifth information includes at least an AKMA key identification (A-KID).
- A-KID AKMA key identification
- the second network element stores unupdated first information and unupdated fifth information generated using the unupdated first information.
- the second network element may use the updated first information to replace the unupdated first information to generate the fifth information.
- the second network element may generate the fifth information based on the received updated first information and/or fourth information.
- the updated first information when the second network element locally stores the unupdated fifth information generated from the unupdated first information, the updated first information may be used to replace the unupdated first information in the unupdated fifth information, thereby generating updated fifth information.
- the second network element when the second network element does not store the fifth information locally, it is necessary to generate updated fifth information based on the first key, the fourth information and the updated first information.
- the second network element is an AUSF.
- the AUSF stores an unupdated A-KID, and the AUSF can generate a new A-KID by replacing the unupdated RID in the unupdated A-KID with the updated RID.
- the second network element is an AUSF. If the unupdated A-KID stored in the AUSF is deleted, the AUSF may derive a new A-KID based on the received SUPI and the updated RID.
- Step 2107 The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
- the second key may be generated based on the fourth information and the first key stored in the second network element.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the first key is used to determine the second key.
- the first key includes at least an AUSF key (K AUSF ), where K AUSF is an AUSF network element key.
- K AUSF can be used as an intermediate key to derive and determine the AKMA key.
- the second key is used to determine an application function key (Application Function Key, K AF ), so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
- K AF Application Function Key
- the second key includes at least an AKMA key (K AKMA ), wherein AKMA can be used to derive and determine K AF .
- K AKMA AKMA key
- the second network element locally stores the second key, and step 2107 can be omitted.
- the second network element does not store the second key locally, and in this case, it is necessary to generate the second key based on the fourth information and the first key stored in the second network element.
- the second network element is an AUSF for example.
- the AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
- Step 2108 The second network element 102 discovers the third network element 103 based on the updated first information.
- the second network element 102 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the second network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the second network element discovers the third network element.
- the second network element is AUSF and the third network element is AAnF. Then AUSF can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF can discover the AAnF.
- Step 2109 the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103, so that the third network element 103 obtains the above information and the key.
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- the third network element is discovered by the updated first information, that is, the third network element is the third network element indicated by the RID in the updated first information.
- the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can directly discover the third network element, or the AF can send the fifth information to the NEF so that the NEF can discover the third network element based on the fifth information.
- the AF can obtain K AF from the third network element or from the third network element through the NEF.
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the second network element is AUSF and the third network element is AAnF.
- the AUSF may send at least one of A-KID, SUPI and K AKMA to the AAnF.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 2101 to step 2109.
- step 2101 may be implemented as an independent embodiment
- step 2103 may be implemented as an independent embodiment
- step 2109 may be implemented as an independent embodiment
- steps 2101+2102+2103 may be implemented as an independent embodiment
- steps 2104+2105 may be implemented as an independent embodiment, but are not limited thereto.
- step 2104 and step 2105 are replaceable steps, that is, step 2104 and step 2105 may not be executed.
- step 2104 and step 2105 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- step 2101 and step 2102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- FIG2b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure.
- the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
- Step 2201 The first network element 101 determines whether a first condition is met.
- the first condition is that the terminal receives updated first information of the first network element configuration.
- the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
- step 2202 reference may be made to step 2102 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
- Step 2203 The first network element 101 may send a first parameter set under a first condition.
- step 2203 reference may be made to step 2103 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the first network element 101 may send a first parameter set to the second network element 102 under a first condition.
- the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
- Step 2204 The second network element 102 determines that the second network element stores the first information which has not been updated.
- step 2204 reference may be made to step 2104 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
- Step 2205 The second network element 102 replaces the non-updated first information with the updated first information.
- step 2205 reference may be made to step 2105 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
- Step 2206 The second network element 102 generates fifth information based on the updated first information and/or fourth information.
- step 2206 reference may be made to step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the fourth network element 103 .
- Step 2207 The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
- step 2207 reference may be made to step 2107 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the second key is used to determine K AF , so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
- Step 2208 The second network element 102 discovers the fourth network element 104 based on the updated first information.
- the second network element 102 may discover the fourth network element 104 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, the third network element, and the fourth network element.
- the second network element may determine the corresponding fourth network element based on the updated RID in the updated first information, so that the second network element discovers the fourth network element.
- Step 2209 the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the fourth network element 104, so that the fourth network element 104 obtains the above information and the key.
- the fourth network element 104 may receive the fifth information, the second key and the fourth information sent by the second network element 102. At least one of the following.
- the fourth network element is discovered by the updated first information, that is, the fourth network element is the fourth network element indicated by the RID in the updated first information.
- AUSF 1 may send at least one of A-KID, SUPI and K AKMA to AUSF 2 .
- the fourth network element 104 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the fourth network element 104 .
- the fourth network element 104 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the fourth network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the fourth network element discovers the third network element.
- the fourth network element is AUSF 2 and the third network element is AAnF.
- AUSF 2 can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF 2 finds the AAnF and sends at least one of A-KID, SUPI and K AKMA to the AAnF.
- the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can discover the third network element, and based on the received fifth information, the AF can obtain K AF from the third network element.
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the AF may send the fifth information received from the terminal to a network exposure function (NEF), so that the NEF discovers the third network element through the received fifth information, and the NEF may obtain K AF from the third network element based on the received fifth information.
- NEF network exposure function
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the communication method involved in the embodiments of the present disclosure may include at least one of step 2201 to step 2210.
- step 2201 may be implemented as an independent embodiment
- step 2203 may be implemented as an independent embodiment
- step 2210 may be implemented as an independent embodiment
- steps 2201+2202+2203 may be implemented as an independent embodiment
- steps 2204+2205 may be implemented as an independent embodiment, but are not limited thereto.
- step 2204 and step 2205 are replaceable steps, that is, step 2204 and step 2205 may not be executed.
- step 2204 and step 2205 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- step 2201 and step 2202 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG3a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3a, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- Step 3101 determine whether the first condition is met.
- step 3101 reference may be made to step 2101 in FIG. 2a, step 2201 in FIG. 2b, and other related parts in the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
- the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
- step 3101 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- Step 3102 discover the second network element.
- step 3102 reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
- the first network element 101 may directly discover the second network element 102 .
- step 3102 is omitted and the above functions are default or by default.
- the second network element may be discovered by the updated first information.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 3103 under the first condition, send an updated first parameter set to the second network element.
- step 3103 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- step 3103 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- step 3101 and step 3102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG3b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3b, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- step 3201 reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, step 3102 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
- the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
- the first network element 101 may directly discover the second network element 102 .
- step 3201 is omitted and the above functions are default or by default.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 3202 Send an updated first parameter set to the second network element.
- step 3202 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
- the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information.
- the first network element 101 may send the updated first parameter set to the second network element 102 under the first condition; or directly send the updated first parameter set to the second network element 102 under the first condition. Send the updated first parameter set.
- the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
- step 3202 is omitted and the above functions are default or by default.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- steps 3201 - 3202 please refer to the embodiments shown in FIG. 2 a and FIG. 2 b .
- the communication method involved in the embodiment of the present disclosure may include at least one of step 3201 and step 3202.
- step 3201 may be implemented as an independent embodiment
- step 3202 may be implemented as an independent embodiment, but is not limited thereto.
- each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
- FIG3c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3c, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- Step 3301 Send an updated first parameter set to a second network element.
- step 3301 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, step 3202 of FIG. 3b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 3a and FIG. 3b, which will not be described in detail here.
- the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information.
- the first network element 101 may send the updated first parameter set to the second network element 102 under the first condition, or may directly send the updated first parameter set to the second network element 102.
- the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
- the first parameter set is used for application authentication and key management AKMA services, and the first parameter set includes at least updated first information.
- the first network element 101 determines whether the first condition is satisfied. Specifically, the first network element 101 determines whether the second information sent by the terminal is consistent with the third information stored in the first network element 101. If the second information is consistent with the third information, it is determined that the first condition is satisfied.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the second network element is, for example, an AUSF, but is not limited thereto.
- step 3301 please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
- Step 4101 receiving a first parameter set.
- step 4101 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- step 4101 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4102 Determine whether the second network element stores unupdated first information.
- step 4102 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information.
- step 4102 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4103 replacing the non-updated first information with the updated first information.
- step 4103 reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information.
- step 4103 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4104 generate the fifth information.
- step 4104 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4104 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4105 generate a second key.
- step 4105 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4105 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4106 discover the third network element.
- step 4106 reference may be made to step 2108 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may discover the third network element.
- the third network element may be discovered based on the updated first information.
- step 4106 is omitted and the above functions are default or acquiescent.
- the third network element is, for example, AAnF, but is not limited thereto.
- Step 4107 sending at least one of the fifth information, the second key and the fourth information.
- step 4107 reference may be made to step 2109 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4106 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4101 to step 3107.
- step 4101 may be implemented as an independent embodiment
- step 4104 may be implemented as an independent embodiment
- steps 4102+4103 may be implemented as independent embodiments but are not limited thereto.
- step 4102 and step 4103 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4b, the present disclosure embodiment relates to a communication method, which is used for a second network element 102, and the method includes:
- Step 4201 receiving a first parameter set.
- step 4201 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4201 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4202 determining that the second network element stores unupdated first information.
- step 4202 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4102 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information.
- step 4202 is omitted and the above functions are default or by default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4203 replacing the non-updated first information with the updated first information.
- step 4203 reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, step 4103 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information.
- step 4303 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4204 generate the fifth information.
- step 4204 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4204 is omitted and the above functions are default or by default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4205 generate a second key.
- step 4205 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4205 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4206 discover the fourth network element.
- step 4206 reference may be made to step 2208 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
- the second network element 102 may discover the fourth network element.
- the fourth network element may be discovered based on the updated first information.
- step 4206 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- Step 4207 sending at least one of the fifth information, the second key and the fourth information.
- step 4207 reference may be made to step 2209 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
- the fourth network element 104 may receive at least one of the fifth information, the second key and the fourth information sent by the second network element 102 .
- step 4207 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4201 to step 4207.
- step 4201 may be implemented as an independent embodiment
- step 4204 may be implemented as an independent embodiment
- steps 4202+4203 may be implemented as independent embodiments but are not limited thereto.
- step 4202 and step 4203 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4c, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4301 receiving a first parameter set.
- step 4301 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4301 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4302 generate the fifth information.
- step 4302 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4302 is omitted and the above functions are default or default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4303 generate a second key.
- step 4303 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4106 of FIG. 4a, step 4206 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4303 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4304 discover the third network element.
- step 4304 reference may be made to step 2108 of FIG. 2a, step 4107 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
- the second network element 102 may discover the third network element.
- the third network element may be discovered based on the updated first information.
- step 4304 is omitted and the above functions are default or by default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- Step 4305 sending at least one of the fifth information, the second key and the fourth information.
- step 4305 reference may be made to step 2109 of FIG. 2a, step 4108 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4305 is omitted and the above functions are default or default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4301 to step 4305.
- step 4301 may be implemented as an independent embodiment
- step 4305 may be implemented as an independent embodiment
- step 4301+4302 may be implemented as an independent embodiment but is not limited thereto.
- steps 4302-4305 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4d is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4d, the embodiment of the present disclosure relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4401 receiving a first parameter set.
- step 4401 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4401 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4402 generate the fifth information.
- step 4402 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, step 4302 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4402 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4403 generate a second key.
- step 4403 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, step 4205 of FIG. 4b, step 4303 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4403 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4404 discover the fourth network element.
- Step 4404 can refer to step 2208 of FIG. 2b, step 4206 of FIG. 4b, and other related embodiments of FIG. 2b and FIG. 4b. part, which will not be described here.
- the second network element 102 may discover the fourth network element.
- the fourth network element may be discovered based on the updated first information.
- step 4404 is omitted and the above functions are default or by default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- Step 4405 sending at least one of the fifth information, the second key and the fourth information.
- step 4405 reference may be made to step 2209 of FIG. 2b, step 4207 of FIG. 4b, and other related parts of the embodiments involved in FIG. 2b and FIG. 4b, which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
- the fourth network element 104 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4405 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4401 to step 4405.
- step 4401 may be implemented as an independent embodiment
- step 4405 may be implemented as an independent embodiment
- step 4401+4402 may be implemented as an independent embodiment but is not limited thereto.
- steps 4402 to 4405 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4e is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4e, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4501 receiving a first parameter set.
- step 4501 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, step 4401 of FIG. 4d, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b, FIG. 4c and FIG. 4d, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the second network element 102 may discover the third network element 103 based on the updated first information.
- the second network element 102 may send at least one of the following to the third network element: fifth information, second key, fourth information.
- the second network element 102 may discover the fourth network element 104 based on the updated first information, and send at least one of the following to the fourth network element 104: the fifth information, the second key, and the fourth information.
- the fourth network element 104 is configured to discover the third network element 103 based on the updated first information.
- the fourth network element 104 is further configured to send at least one of the following to the third network element 103: fifth information, second key, fourth information.
- the second network element 102 may determine that the second network element 102 stores unupdated first information; and replace the unupdated first information with the updated first information.
- the second network element 102 may determine that the second network element 102 stores non-updated fifth information generated using non-updated first information; and generate the fifth information using the updated first information.
- the second network element 102 may send at least one of the following to the third network element 103 or the fourth network element 104: fifth information, second key, fourth information.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- step 4501 please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
- FIG5 is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5, the present disclosure embodiment relates to a communication method, which is used for a third network element 103, and the method includes:
- Step 5101 receiving at least one of the fourth information, the fifth information, and the second key.
- step 5101 reference may be made to step 2109 in FIG. 2a, step 2210 in FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the third network element 103 can receive at least one of the fourth information, the fifth information, and the second key sent by the second network element 102 or the fourth network element 104.
- the fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the fifth information is used to identify the second key.
- the third network element 103 is discovered based on the updated first information.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
- FIG6a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6a, the present disclosure embodiment designs a communication method, and the method includes:
- step 6101 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b and 3c, which will not be repeated here.
- Step 6102 the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the third network element 103.
- the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
- FIG6b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6b, the present disclosure embodiment designs a communication method, and the method includes:
- step 6201 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c, step 6101 of Figure 6a and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b, 3c and 6a, which will not be repeated here.
- Step 6202 the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the fourth network element 104.
- step 6202 may refer to step 2209 of FIG. 2b , step 4207 of FIG. 4b , step 4205 of FIG. 4d and other related parts in the embodiments involved in FIG. 2a , FIG. 4b , and FIG. 4d , which will not be described in detail here.
- step 6202 may refer to step 2210 of FIG. 2b , step 5101 of FIG. 5 , and other related parts of the embodiments involved in FIG. 2b and FIG. 5 , which will not be described in detail here.
- FIG7a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7a, the communication method of the embodiment of the present disclosure includes:
- Step 7101 sending SUPI and updated RID.
- the UDM may send the SUPI and the updated RID to the AUSF.
- the UDM before executing step 7101, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7102 Send updated A-KID, SUPI and K AKMA to AAnF.
- the AUSF may send the SUPI and the updated RID to the AAnF.
- the AUSF receives the SUPI and the updated RID, and the AUSF may determine to generate an updated A-KID based on the updated RID and the SUPI. At the same time, the AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
- the AUSF may discover the AANF based on the updated RID.
- AUSF may delete or have deleted the unsaved and unupdated A-KID and K AKMA , that is, AUSF does not store the unupdated A-KID and K AKMA locally, then AUSF needs to generate A-KID and K AKMA in real time based on the updated RID, SUPI and stored K AUSF .
- Step 7103 send confirmation message.
- the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7104 Get K AF based on the updated A-KID.
- the AF may obtain K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 7101 to step 7104.
- step 7101 may be implemented as an independent embodiment
- step 7104 may be implemented as an independent embodiment
- step 7101+7102 may be implemented as an independent embodiment but is not limited thereto.
- steps 7102 to 7104 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG7b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7b, the communication method of the embodiment of the present disclosure includes:
- Step 7201 send SUPI and updated RID.
- the UDM may send the SUPI and the updated RID to the AUSF.
- the UDM before executing step 7201, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7202 obtain A-KID and K AKMA .
- AUSF 1 receives the SUPI and the updated RID, and AUSF 1 may determine the A-KID based on the updated RID and SUPI.
- AUSF 1 determines K AKMA based on the received SUPI and the stored K AUSF .
- AUSF 1 may discover AUSF 2 based on the updated RID.
- Step 7203 sending A-KID, SUPI and K AKMA .
- AUSF 1 may send SUPI, A-KID, K AKMA to AUSF 2 .
- Step 7204 send A-KID, SUPI and K AKMA .
- AUSF 2 may send SUPI, A-KID, K AKMA to AAnF.
- AUSF 2 may discover the AAnF based on the updated RID.
- Step 7205 send confirmation message.
- the AAnF may send a confirmation message to the AUSF 2 , indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7206 obtain K AF based on the updated A-KID.
- the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 7201 to step 7206.
- step 7201 may be implemented as an independent embodiment
- step 7204 may be implemented as an independent embodiment
- step 7201+7202 may be implemented as an independent embodiment but is not limited thereto.
- steps 7202-7206 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG7c is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7c, the communication method of the embodiment of the present disclosure includes:
- the UDM may send the SUPI and updated RID to the AUSF.
- the UDM before executing step 7301, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7302 determine A-KID and K AKMA .
- the AUSF receives the SUPI and the new RID and may check whether the A-KID should be updated.
- the SUPI received by the AUSF has been locally stored, and the AUSF may update the locally stored A-KID identified by the SUPI.
- the AUSF may generate an updated A-KID by replacing the RID in the original A-KID with the updated RID.
- the AUSF may send the SUPI and the updated RID to the AAnF.
- the AUSF may determine a locally stored K AKMA based on the received SUPI.
- the AUSF may discover the AAnF based on the updated RID.
- the AUSF locally stores the unupdated A-Kid and Kakma.
- the AUSF may determine the unupdated A-KID and the locally stored Kakma based on the received SUPI, and update the unupdated A-KID based on the received updated RID.
- Step 7303 sending updated A-KID, SUPI and K AKMA .
- the AUSF may send the updated A-KID, SUPI and locally stored K AKMA to the AAnF.
- Step 7304 send confirmation message.
- the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7305 Get K AF based on the updated A-KID.
- the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF based on an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- step 7301 may be implemented as an independent embodiment
- step 7304 may be implemented as an independent embodiment
- step 7301+7302 may be implemented as an independent embodiment but is not limited thereto.
- steps 7302-7304 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- the embodiments of the present disclosure also propose a device for implementing any of the above methods, for example, a device is proposed, the above device includes a unit or module for implementing each step performed by the terminal in any of the above methods.
- a device is also proposed, including a unit or module for implementing each step performed by a network device (such as an access network device, a core network function node, a core network device, etc.) in any of the above methods.
- a network device such as an access network device, a core network function node, a core network device, etc.
- the division of the units or modules in the above device is only a division of logical functions, which can be fully or partially integrated into one physical entity or physically separated in actual implementation.
- the units or modules in the device can be implemented in the form of a processor calling software: for example, the device includes a processor, the processor is connected to a memory, and instructions are stored in the memory.
- the processor calls the instructions stored in the memory to implement any of the above methods or implement the functions of the units or modules of the above device, wherein the processor is, for example, a general-purpose processor, such as a central processing unit (CPU) or a microprocessor, and the memory is a memory inside the device or a memory outside the device.
- CPU central processing unit
- microprocessor a microprocessor
- the units or modules in the device may be implemented in the form of hardware circuits, and the functions of some or all of the units or modules may be implemented by designing the hardware circuits.
- the hardware circuits may be understood as one or more processors; for example, in one implementation, the hardware circuits are application-specific integrated circuits (ASICs), and the functions of some or all of the above units or modules may be implemented by designing the logical relationship of the components in the circuits; for another example, in another implementation, the hardware circuits may be implemented by programmable logic devices (PLDs), and Field Programmable Gate Arrays (FPGAs) may be used as an example, which may include a large number of logic gate circuits, and the connection relationship between the logic gate circuits may be configured by configuring the configuration files, thereby implementing the functions of some or all of the above units or modules. All units or modules of the above devices may be implemented in the form of software called by the processor, or in the form of hardware circuits, or in the form of software called by the processor, and the remaining part may be implemented in
- the processor is a circuit with signal processing capability.
- the processor may be a circuit with instruction reading and execution capability, such as a central processing unit (CPU), a microprocessor, a graphics processing unit (GPU) (which may be understood as a microprocessor), or a digital signal processor (DSP).
- the processor may implement certain functions through the logical relationship of the hardware circuit, and the logical relationship of the above hardware circuit is fixed.
- reconfigurable for example, a processor is a hardware circuit implemented by an application-specific integrated circuit (ASIC) or a programmable logic device (PLD), such as an FPGA.
- ASIC application-specific integrated circuit
- PLD programmable logic device
- the processor loads a configuration document to implement the process of hardware circuit configuration, which can be understood as the process of the processor loading instructions to implement the functions of some or all of the above units or modules.
- a hardware circuit designed for artificial intelligence which can be understood as an ASIC, such as a neural network processing unit (NPU), a tensor processing unit (TPU), a deep learning processing unit (DPU), etc.
- NPU neural network processing unit
- TPU tensor processing unit
- DPU deep learning processing unit
- FIG8a is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure.
- the communication device includes: a transceiver module 8101.
- the transceiver module is used to send a first parameter set to a second network element, the first parameter set is used to apply authentication and key management AKMA services, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2203, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- the communication device further includes a processing module 8102, and the processing module is used to execute at least one of the other steps (for example, step 2101, step 2102, step 2201, step 2202, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- the processing module is used to execute at least one of the other steps (for example, step 2101, step 2102, step 2201, step 2202, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- FIG8b is a schematic diagram of the structure of the communication device proposed in the embodiment of the present disclosure.
- the communication device includes: a transceiver module 8201.
- the transceiver module is used to receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2109, step 2203, step 2209, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here.
- the communication device also includes a processing module 8202, which is used to execute at least one of the other steps performed by the first network element 101 in any of the above methods (for example, step 2104, step 2105, step 2106, step 2107, step 2108, step 2204, step 2205, step 2206, step 2207, step 2208, but not limited to these), which are not repeated here.
- a processing module 8202 which is used to execute at least one of the other steps performed by the first network element 101 in any of the above methods (for example, step 2104, step 2105, step 2106, step 2107, step 2108, step 2204, step 2205, step 2206, step 2207, step 2208, but not limited to these), which are not repeated here.
- FIG8c is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure.
- the communication device includes: a transceiver module 8301.
- the transceiver module is used to receive a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2109, step 2210, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here.
- the communication device 9100 includes one or more processors 9101.
- the processor 9101 may be a general-purpose processor or a dedicated processor, for example, a baseband processor or a central processing unit.
- the baseband processor may be used to process the communication protocol and the communication data
- the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a program, and process the data of the program.
- the processor 9101 is used to call instructions so that the communication device 9100 executes any of the above methods.
- the communication device 9100 further includes one or more memories 9102 for storing instructions.
- the memory 9102 may also be outside the communication device 9100.
- the communication device 9100 further includes one or more transceivers 9103.
- the communication steps such as sending and receiving in the above method are performed by the transceiver 9103, and the other steps are performed by the processor 9101.
- the transceiver may include a receiver and a transmitter, and the receiver and the transmitter may be separate or integrated.
- the terms such as transceiver, transceiver unit, transceiver, transceiver circuit, etc. may be replaced with each other, the terms such as transmitter, transmission unit, transmitter, transmission circuit, etc. may be replaced with each other, and the terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
- the communication device 9100 further includes one or more interface circuits 9104, which are connected to the memory 9102.
- the interface circuit 9104 can be used to receive signals from the memory 9102 or other devices, and can be used to send signals to the memory 9102 or other devices.
- the interface circuit 9104 can read instructions stored in the memory 9102 and send the instructions to the processor 9101.
- the communication device 9100 described in the above embodiments may be a network device or a terminal, but the scope of the communication device 9100 described in the present disclosure is The scope is not limited to this, and the structure of the communication device 9100 may not be limited by Figure 9a.
- the communication device may be an independent device or may be part of a larger device.
- the communication device may be: 1) an independent integrated circuit IC, or a chip, or a chip system or subsystem; (2) a collection of one or more ICs, optionally, the above IC collection may also include a storage component for storing data and programs; (3) an ASIC, such as a modem; (4) a module that can be embedded in other devices; (5) a receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handheld device, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligence device, etc.; (6) others, etc.
- Fig. 9b is a schematic diagram of the structure of a chip 9200 provided in an embodiment of the present disclosure.
- the communication device 9100 may be a chip or a chip system
- the chip 9200 includes one or more processors 9201, and the processor 9201 is used to call instructions so that the chip 9200 executes any of the above methods.
- the chip 9200 further includes one or more interface circuits 9202, which are connected to the memory 9203.
- the interface circuit 9202 can be used to receive signals from the memory 9203 or other devices, and the interface circuit 9202 can be used to send signals to the memory 9203 or other devices.
- the interface circuit 9202 can read instructions stored in the memory 9203 and send the instructions to the processor 9201.
- the terms such as interface circuit, interface, transceiver pin, and transceiver can be replaced with each other.
- the chip 9200 further includes one or more memories 9203 for storing instructions.
- the memory 9203 may be outside the chip 9200.
- the present disclosure also proposes a storage medium, on which instructions are stored, and when the instructions are executed on the communication device 9100, the communication device 9100 executes any of the above methods.
- the storage medium is an electronic storage medium.
- the storage medium is a computer-readable storage medium, but is not limited to this, and it can also be a storage medium readable by other devices.
- the storage medium can be a non-transitory storage medium, but is not limited to this, and it can also be a temporary storage medium.
- the present disclosure also proposes a program product, which, when executed by the communication device 9100, enables the communication device 9100 to execute any of the above methods.
- the program product is a computer program product.
- the computer program product includes one or more computer programs.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a high-density digital video disc (DVD)
- DVD high-density digital video disc
- SSD solid state disk
- the corresponding relationships shown in the tables in the present disclosure can be configured or predefined.
- the values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure.
- the corresponding relationships shown in some rows may not be configured.
- appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
- the names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device.
- other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
- the predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本公开涉及通信技术领域,尤其涉及通信方法、装置、通信设备、存储介质及通信系统。The present disclosure relates to the field of communication technology, and in particular to a communication method, apparatus, communication equipment, storage medium and communication system.
在通信系统中,应用程序认证和密钥管理方法(Authentication and Key Management method for Applications,AKMA)服务已被用作保护终端和应用功能(Application Function,AF)之间的通信,终端和AF可以通过应用功能密钥(KAF)实现认证。当前AKMA服务中尚未没有终端更新时,使相关网元获取更新KAF的技术。In the communication system, the Authentication and Key Management method for Applications (AKMA) service has been used to protect the communication between the terminal and the application function (AF), and the terminal and the AF can be authenticated by the application function key (K AF ). When there is no terminal update in the current AKMA service, the technology of enabling the relevant network elements to obtain the updated K AF is provided.
发明内容Summary of the invention
本公开提出通信方法、装置、通信设备、存储介质及通信系统。The present disclosure provides a communication method, an apparatus, a communication device, a storage medium and a communication system.
根据本公开实施例的第一方面,提出了一种通信方法,该方法由第一网元执行,包括:According to a first aspect of an embodiment of the present disclosure, a communication method is provided. The method is performed by a first network element and includes:
向第二网元发送第一参数集,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息,从而使第二网元获取UE更新后的路由标识(Router Indic,RID)。A first parameter set is sent to a second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information, so that the second network element obtains an updated routing identifier (Router Indic, RID) of the UE.
根据本公开实施例的第二方面,提出了一种通信方法,该方法由第二网元执行,包括:According to a second aspect of an embodiment of the present disclosure, a communication method is provided. The method is performed by a second network element and includes:
接收第一网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
根据本公开实施例的第三方面,提出了一种通信方法,该方法由第三网元执行,包括:According to a third aspect of an embodiment of the present disclosure, a communication method is proposed. The method is performed by a third network element, including:
接收第二网元或第四网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
根据本公开实施例的第四方面,提出了一种通信装置,该装置包括收发模块,用于:According to a fourth aspect of an embodiment of the present disclosure, a communication device is provided, the device comprising a transceiver module, configured to:
向第二网元发送第一参数集,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
根据本公开实施例的第五方面,提出了一种通信装置,该装置包括收发模块,用于:According to a fifth aspect of an embodiment of the present disclosure, a communication device is provided, the device comprising a transceiver module, configured to:
接收第一网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
根据本公开实施例的第六方面,提出了一种通信装置,该装置包括收发模块,用于:According to a sixth aspect of an embodiment of the present disclosure, a communication device is provided, the device comprising a transceiver module, configured to:
接收第二网元或第四网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
根据本公开实施例的第七方面,提出了一种通信设备,包括:收发器;存储器;处理器,分别与收发器及存储器连接,配置为通过执行所述存储器上的计算机可执行指令,控制收发器的无线信号收发,并能够实现上述第一至第三方面中任一项所述的方法。According to the seventh aspect of an embodiment of the present disclosure, a communication device is proposed, comprising: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer executable instructions on the memory, and can implement any one of the methods described in the first to third aspects above.
根据本公开实施例的第八方面,提出了一种计算机存储介质,其中,计算机存储介质存储有计算机可执行指令;计算机可执行指令被处理器执行后,能够实现上述第一至第三方面中任一项所述的方法。According to an eighth aspect of an embodiment of the present disclosure, a computer storage medium is proposed, wherein the computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in any one of the first to third aspects above can be implemented.
根据本公开实施例的第九方面,提出了一种通信系统,包括:第一网元、第二网元、第三网元,其中,所述第一网元用于执第一方面所述的方法,第二网元用于执行第二方面所述的方法,第三网元用于执行第三方面所述的方法。 According to the ninth aspect of an embodiment of the present disclosure, a communication system is proposed, including: a first network element, a second network element, and a third network element, wherein the first network element is used to execute the method described in the first aspect, the second network element is used to execute the method described in the second aspect, and the third network element is used to execute the method described in the third aspect.
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present disclosure will become apparent and easily understood from the following description of the embodiments in conjunction with the accompanying drawings, in which:
图1为本公开实施例提供的一中通信系统的架构示意图;FIG1 is a schematic diagram of the architecture of a communication system provided in an embodiment of the present disclosure;
图2a-2b为本公开实施例所提供的一些通信方法的交互示意图;2a-2b are interactive schematic diagrams of some communication methods provided by embodiments of the present disclosure;
图3a-3c为本公开实施例所提供的一些的通信方法的流程示意图;3a-3c are flowchart diagrams of some communication methods provided by embodiments of the present disclosure;
图4a-4e为本公开实施例所提供的另一些通信方法的流程示意图;4a-4e are flowchart diagrams of other communication methods provided by embodiments of the present disclosure;
图5为本公开实施例所提供的再一些通信方法的流程示意图;FIG5 is a flowchart of some further communication methods provided by embodiments of the present disclosure;
图6a-6b为本公开实施例所提供的一些通信方法的交互示意图;6a-6b are interactive schematic diagrams of some communication methods provided in embodiments of the present disclosure;
图7a-7c为本公开实施例所提供的一些通信方法的交互示例图;7a-7c are diagrams showing examples of interactions of some communication methods provided in embodiments of the present disclosure;
图8a为本公开实施例所提供的一种通信装置的结构示意图;FIG8a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure;
图8b为本公开实施例所提供的一种通信装置的结构示意图;FIG8b is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure;
图8c为本公开实施例所提供的一种通信装置的结构示意图;FIG8c is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure;
图9a是本公开实施例所提供的一种通信设备的结构示意图;FIG9a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure;
图9b为本公开实施例所提供的一种芯片的结构示意图。FIG. 9 b is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
本公开的方法可以用于解决“终端侧RID更新时,实现一种AKMA服务,使AF能够识别AAnF并获得K AF”这一技术问题。The method disclosed in the present invention can be used to solve the technical problem of "implementing an AKMA service when the RID on the terminal side is updated, so that the AF can identify the AAnF and obtain the K AF ".
本公开实施例提出了通信方法、装置、通信设备、存储介质及通信系统。The embodiments of the present disclosure provide a communication method, an apparatus, a communication device, a storage medium, and a communication system.
第一方面,本公开实施例提出了一种通信方法,该方法由第一网元执行,方法包括:In a first aspect, an embodiment of the present disclosure provides a communication method, which is performed by a first network element and includes:
向第二网元发送第一参数集,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
在上述实施例中,第一网元可以向第二网元发送第一参数集,以实现一种AKMA服务。In the above embodiment, the first network element may send the first parameter set to the second network element to implement an AKMA service.
结合第一方面的一些实施例,在一些实施例中,向第二网元发送第一参数集包括:In conjunction with some embodiments of the first aspect, in some embodiments, sending the first parameter set to the second network element includes:
在第一条件下,向第二网元发送第一参数集,第一条件为终端收到第一网元配置的更新的第一信息。Under a first condition, a first parameter set is sent to a second network element, and the first condition is that the terminal receives updated first information configured by the first network element.
在上述实施例中,第一网元在第一条件下,向第二网元发送第一参数集,以实现AKAM服务中的信息更新。In the above embodiment, the first network element sends the first parameter set to the second network element under the first condition to implement information update in the AKAM service.
结合第一方面的一些实施例,在一些实施例中,方法还包括:确定是否满足第一条件,其中,确定是否满足第一条件包括:确定终端发送的第二信息与第一网元存储的第三信息是否一致;第二信息与第三信息一致,确定满足第一条件。In combination with some embodiments of the first aspect, in some embodiments, the method also includes: determining whether the first condition is met, wherein determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
在上述实施例中,第一网元确定终端发送的第二信息与第一网元存储的第三信息是否一致,从而确定是否满足第一条件,提出一种满足第一条件的判定方法,以确定第一网元是否发送第一数据集,避免了资源浪费。In the above embodiment, the first network element determines whether the second information sent by the terminal is consistent with the third information stored in the first network element, thereby determining whether the first condition is met, and a determination method for meeting the first condition is proposed to determine whether the first network element sends the first data set, thereby avoiding waste of resources.
结合第一方面的一些实施例,在一些实施例中,第一参数集还包括第四信息,第四信息用于标识与订阅者相关的信息,订阅者相关的信息包括第五信息、第一密钥、第二密钥中的至少一者。In combination with some embodiments of the first aspect, in some embodiments, the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
结合第一方面的一些实施例,在一些实施例中,向第二网元发送第一参数集包括:基于更新的第一信息,发现第二网元;向第二网元发送第一参数集。In combination with some embodiments of the first aspect, in some embodiments, sending the first parameter set to the second network element includes: discovering the second network element based on the updated first information; and sending the first parameter set to the second network element.
在上述实施例中,第一网元基于更新的第一信息,发现第二网元;向第二网元发送第一参数集,以生成第五信息,实现第五信息的更新。In the above embodiment, the first network element discovers the second network element based on the updated first information; sends the first parameter set to the second network element to generate the fifth information, thereby updating the fifth information.
第二方面,本公开实施例提出了一种通信方法,该方法由第二网元执行,方法包括:In a second aspect, an embodiment of the present disclosure provides a communication method, which is performed by a second network element, and the method includes:
接收第一网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。A first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
在上述实施例中,第二网元接收第一网元发送的第一参数集,以获取第一信息和\或第四信息,确定了AKMA服务中的更新信息与订阅者相关信息,同时降低了发送参数使用的信令资源。 In the above embodiment, the second network element receives the first parameter set sent by the first network element to obtain the first information and/or the fourth information, determines the update information and subscriber-related information in the AKMA service, and reduces the signaling resources used for sending parameters.
结合第二方面的一些实施例,在一些实施例中,第一参数集还包括第四信息,第四信息用于标识与订阅者相关的信息,订阅者相关的信息包括第五信息、第一密钥、第二密钥中的至少一者。In combination with some embodiments of the second aspect, in some embodiments, the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
结合第二方面的一些实施例,在一些实施例中,方法还包括:基于更新的第一信息和\或第四信息,生成第五信息,其中,第五信息用于标识第二密钥。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: generating fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
在上述实施例中,第二网元可以基于更新的第一信息和第四信息生成第五信息,以利用第五信息标识第二密钥;第二网元也可以在本地存储有未更新的第五信息的情况下,利用更新的第一信息替换未更新的第五信息中未更新的第一信息,以生成更新的第五信息,提高了第五信息的生成效率。In the above embodiment, the second network element can generate fifth information based on the updated first information and fourth information to use the fifth information to identify the second key; the second network element can also use the updated first information to replace the unupdated first information in the unupdated fifth information when the unupdated fifth information is stored locally to generate updated fifth information, thereby improving the generation efficiency of the fifth information.
结合第二方面的一些实施例,在一些实施例中,方法还包括:基于第四信息和第二网元存储的第一密钥,生成第二密钥。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: generating a second key based on the fourth information and the first key stored in the second network element.
在上述实施例中,第二网元可以:基于第四信息和第二网元存储的第一密钥,生成第二密钥,以实现种AKMA服务中密钥的生成。In the above embodiment, the second network element may: generate a second key based on the fourth information and the first key stored in the second network element, so as to realize the generation of keys in the AKMA service.
结合第二方面的一些实施例,在一些实施例中,方法还包括:基于更新的第一信息,发现第三网元。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: discovering a third network element based on the updated first information.
在上述实施例中,通过更新的第一信息,发现第三单元,以将相关信息发送至第三单元,实现对第三单元数据库的更新。In the above embodiment, the third unit is discovered through the updated first information, so that the relevant information is sent to the third unit to implement the update of the third unit database.
结合第二方面的一些实施例,在一些实施例中,方法还包括:向第三网元发送以下至少之一:第五信息,第二密钥,第四信息。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: sending at least one of the following to a third network element: fifth information, a second key, and fourth information.
在上述实施例中,通过向第三网元发送以下至少之一:第五信息,第二密钥,第四信息。实现第三网元数据库的更新,,同时降低了发送参数使用的信令资源。In the above embodiment, by sending at least one of the following to the third network element: the fifth information, the second key, and the fourth information, the third network element database is updated, and the signaling resources used for sending parameters are reduced.
结合第二方面的一些实施例,在一些实施例中,其特征在于,方法还包括:基于更新的第一信息,发现第四网元,向第四网元发送以下至少之一:第五信息,第二密钥,第四信息。其中,第四网元用于基于更新的第一信息发现第三网元。In combination with some embodiments of the second aspect, in some embodiments, the method further comprises: discovering a fourth network element based on the updated first information, and sending at least one of the following to the fourth network element: fifth information, the second key, and the fourth information. The fourth network element is used to discover the third network element based on the updated first information.
在上述实施例中,通过基于更新的第一信息,发现第四网元,以发现可以支持生成的第五信息的网元,并发送相关信息,扩大了提出的AKMA服务的应用范围。In the above embodiment, by discovering the fourth network element based on the updated first information, to discover the network element that can support the generated fifth information, and sending the relevant information, the application scope of the proposed AKMA service is expanded.
结合第二方面的一些实施例,在一些实施例中,第四网元还用于向第三网元发送以下至少之一:第五信息,第二密钥,第四信息。In combination with some embodiments of the second aspect, in some embodiments, the fourth network element is further used to send at least one of the following to the third network element: fifth information, second key, fourth information.
在上述实施例中,通过第四网元向第三网元发送以下至少之一:第五信息,第二密钥,第四信息。以实现第三网元中的信息更新,同时降低了发送参数使用的信令资源。In the above embodiment, at least one of the following is sent to the third network element by the fourth network element: the fifth information, the second key, and the fourth information, so as to update the information in the third network element and reduce the signaling resources used for sending parameters.
结合第二方面的一些实施例,在一些实施例中,方法还包括:确定第二网元存储有未更新的第一信息;以更新的第一信息替换未更新的第一信息。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: determining that the second network element stores unupdated first information; and replacing the unupdated first information with the updated first information.
结合第二方面的一些实施例,在一些实施例中,方法还包括:确定第二网元存储有使用未更新的第一信息生成的未更新的第五信息;以更新的第一信息生成第五信息。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: determining that the second network element stores unupdated fifth information generated using unupdated first information; and generating the fifth information using the updated first information.
在上述事实例中,通过利用更新的第一信息替换未更新的第五信息中的第一信息,以生成第五信息,提高了第五信息的生成效率。In the above example, the generation efficiency of the fifth information is improved by replacing the first information in the unupdated fifth information with the updated first information to generate the fifth information.
结合第二方面的一些实施例,在一些实施例中,方法还包括:向第三网元或第四网元发送以下至少之一:第五信息,第二密钥,第四信息。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: sending at least one of the following to the third network element or the fourth network element: fifth information, second key, fourth information.
在上述实施例中,在不同情况下,可以向第三网元或第四网元发送以下至少之一:第五信息,第二密钥,第四信息。扩大了提出的AKMA服务的应用范围。In the above embodiments, in different situations, at least one of the following may be sent to the third network element or the fourth network element: the fifth information, the second key, the fourth information. The application scope of the proposed AKMA service is expanded.
第三方面,本公开实施例提出了一种通信方法,该方法由第三网元执行,方法包括:接收第二网元或第四网元发送的第四信息、第五信息、第二密钥中的至少一项,其中,第五信息是由第一参数集中包括的更新的第一信息生成的,第一参数集用于应用认证与密钥管理AKMA服务。In the third aspect, an embodiment of the present disclosure proposes a communication method, which is executed by a third network element, and the method includes: receiving at least one of fourth information, fifth information, and second key sent by the second network element or the fourth network element, wherein the fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
在上述实施例中,第三网元接收第二网元或第四网元发送的第四信息、第五信息、第二密钥中的至少一项,以实现第三网元自身数据库的更新,从而使AF在终端更新第一信息时可以发现第三网元,并获取第三网元中的更新信息及密钥KAF,扩大了提出的AKMA服务的应用范围。In the above embodiment, the third network element receives at least one of the fourth information, the fifth information, and the second key sent by the second network element or the fourth network element to update the third network element's own database, so that the AF can discover the third network element when the terminal updates the first information, and obtain the updated information and key K AF in the third network element, thereby expanding the application scope of the proposed AKMA service.
结合第三方面的一些实施例,在一些实施例中,第一参数集还包括第四信息In conjunction with some embodiments of the third aspect, in some embodiments, the first parameter set further includes a fourth information
结合第三方面的一些实施例,在一些实施例中,第五信息用于标识第二密钥。In combination with some embodiments of the third aspect, in some embodiments, the fifth information is used to identify the second key.
结合第三方面的一些实施例,在一些实施例中,第三网元是基于更新的第一信息发现的。 In combination with some embodiments of the third aspect, in some embodiments, the third network element is discovered based on the updated first information.
第四方面,本公开实施例提出了一种通信装置,该装置包括收发模块,用于:向第二网元发送第一参数集,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。In a fourth aspect, an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: send a first parameter set to a second network element, the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
第五方面,本公开实施例提出了一种通信装置,该装置包括收发模块,用于:接收第一网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。In a fifth aspect, an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
第六方面,本公开实施例提出了一种通信装置,该装置包括收发模块,用于:接收第二网元或第四网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。In a sixth aspect, an embodiment of the present disclosure proposes a communication device, which includes a transceiver module for: receiving a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
第七方面,本公开实施例提出了通信设备,上述通信设备包括:一个或多个处理器;用于存储指令的一个或多个存储器;其中,上述处理器用于调用上述指令以使得上述通信设备执行如第一方面、第二方面和第三方面的可选实施方式所描述的方法。In the seventh aspect, an embodiment of the present disclosure proposes a communication device, which includes: one or more processors; one or more memories for storing instructions; wherein the processor is used to call the instructions so that the communication device executes the method described in the optional implementation modes of the first, second and third aspects.
第八方面,本公开实施例提出了计算机程序,当其在计算机上运行时,使得计算机执行如第一方面、第二方面和第三方面的可选实施方式。In an eighth aspect, an embodiment of the present disclosure proposes a computer program, which, when executed on a computer, enables the computer to execute optional implementations of the first, second and third aspects.
第九方面,本公开实施例提出了通信系统,上述通信系统包括:包括:第一网元、第二网元、第三网元,其中,第一网元用于执行第一方面所述的方法,所述第二网元用于执行第二方面所述的方法,所述第三网元用于执行第三方面所述的方法。In the ninth aspect, an embodiment of the present disclosure proposes a communication system, and the above-mentioned communication system includes: a first network element, a second network element, and a third network element, wherein the first network element is used to execute the method described in the first aspect, the second network element is used to execute the method described in the second aspect, and the third network element is used to execute the method described in the third aspect.
结合第九方面的一些实施例,在一些实施例中,通信系统还包括第四网元。In combination with some embodiments of the ninth aspect, in some embodiments, the communication system also includes a fourth network element.
可以理解地,上述通信方法、通信装置、通信设备、通信系统、存储介质、程序产品、计算机程序均用于执行本公开实施例所提出的方法。因此,其所能达到的有益效果可以参考对应方法中的有益效果,此处不再赘述。It is understandable that the above communication method, communication device, communication equipment, communication system, storage medium, program product, and computer program are all used to execute the method proposed in the embodiment of the present disclosure. Therefore, the beneficial effects that can be achieved can refer to the beneficial effects in the corresponding method, which will not be repeated here.
本公开实施例提出了通信方法、装置、通信设备、存储介质及通信系统。在一些实施例中,通信方法与信息处理方法、通信方法等术语可以相互替换,信息传输装置与信息处理装置、通信装置等术语可以相互替换,信息处理系统、通信系统等术语可以相互替换。The embodiments of the present disclosure provide communication methods, devices, communication equipment, storage media and communication systems. In some embodiments, the terms communication method, information processing method, communication method, etc. can be replaced with each other, the terms information transmission device, information processing device, communication device, etc. can be replaced with each other, and the terms information processing system, communication system, etc. can be replaced with each other.
本公开实施例并非穷举,仅为部分实施例的示意,不作为对本公开保护范围的具体限制。在不矛盾的情况下,某一实施例中的每个步骤均可以作为独立实施例来实施,且各步骤之间可以任意组合,例如,在某一实施例中去除部分步骤后的方案也可以作为独立实施例来实施,且在某一实施例中各步骤的顺序可以任意交换,另外,某一实施例中可以任意组合;此外,各实施例之间可以任意组合,例如,不同实施例的部分或全部步骤可以任意组合,某一实施例可以与其他实施例任意组合。The embodiments of the present disclosure are not exhaustive, but are merely illustrative of some embodiments, and are not intended to be a specific limitation on the scope of protection of the present disclosure. In the absence of contradiction, each step in an embodiment can be implemented as an independent embodiment, and the steps can be arbitrarily combined. For example, a solution after removing some steps in an embodiment can also be implemented as an independent embodiment, and the order of the steps in an embodiment can be arbitrarily exchanged, and in addition, they can be arbitrarily combined in an embodiment; in addition, the embodiments can be arbitrarily combined, for example, some or all steps of different embodiments can be arbitrarily combined, and an embodiment can be arbitrarily combined with other embodiments.
在各本公开实施例中,如果没有特殊说明以及逻辑冲突,各实施例之间的术语和/或描述具有一致性,且可以互相引用,不同实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In each embodiment of the present disclosure, unless otherwise specified or there is a logical conflict, the terms and/or descriptions between the embodiments are consistent and can be referenced to each other, and the technical features in different embodiments can be combined to form a new embodiment based on their internal logical relationships.
本公开实施例中所使用的术语只是为了描述特定实施例的目的,而并非作为对本公开的限制。The terms used in the embodiments of the present disclosure are only for the purpose of describing specific embodiments and are not intended to limit the present disclosure.
在本公开实施例中,除非另有说明,以单数形式表示的元素,如“一个”、“一种”、“该”、“上述”、“所述”、“前述”、“这一”等,可以表示“一个且只有一个”,也可以表示“一个或多个”、“至少一个”等。例如,在翻译中使用如英语中的“a”、“an”、“the”等冠词(article)的情况下,冠词之后的名词可以理解为单数表达形式,也可以理解为复数表达形式。In the embodiments of the present disclosure, unless otherwise specified, elements expressed in the singular form, such as "a", "an", "the", "above", "said", "aforementioned", "this", etc., may mean "one and only one", or "one or more", "at least one", etc. For example, when using articles such as "a", "an", "the" in English in translation, the noun after the article may be understood as a singular expression or a plural expression.
在本公开实施例中,“多个”是指两个或两个以上。In the embodiments of the present disclosure, “plurality” refers to two or more.
在一些实施例中,“至少一者(at least one of)”、“至少一项(at least one of)”、“至少一个(at least one of)”、“一个或多个(one or more)”、“多个(a plurality of)”、“多个(multiple)等术语可以相互替换。In some embodiments, the terms "at least one of", "at least one of", "at least one of", "one or more", "a plurality of", "multiple", etc. can be used interchangeably.
本公开实施例中的如“A、B、C……中的至少一者”、“A和/或B和/或C……”等描述方式,包括了A、B、C……中任意一个单独存在的情况,也包括了A、B、C……中任意多个的任意组合情况,每种情况可以单独存在;例如,“A、B、C中的至少一者”包括单独A、单独B、单独C、A和B组合、A和C组合、B和C组合、A和B和C组合的情况;例如,A和/或B包括单独A、单独B、A和B的组合的情况。In the embodiments of the present disclosure, descriptions such as “at least one of A, B, C…”, “A and/or B and/or C…”, etc. include the situation where any one of A, B, C… exists alone, and also include the situation where any multiple of A, B, C… exist in any combination, and each situation can exist alone; for example, “at least one of A, B, C” includes the situation where A exists alone, B exists alone, C exists alone, the combination of A and B, the combination of A and C, the combination of B and C, and the combination of A, B and C; for example, A and/or B includes the situation where A exists alone, B exists alone, and the combination of A and B.
在一些实施例中,“在一情况下A,在另一情况下B”、“响应于一情况A,响应于另一情况B”等记载方式,根据情况可以包括以下技术方案:与B无关地执行A,即,在一些实施例中A;与A无关地执行B,即,在一些实施例中B;A和B被选择性执行,即,在一些实施例中从A与B中选择执行;A和B都被 执行,即,在一些实施例中A和B。当有A、B、C等更多分支时也类似上述。In some embodiments, the description methods such as "in one case A, in another case B", "in response to one case A, in response to another case B", etc. may include the following technical solutions according to the situation: A is executed independently of B, that is, in some embodiments A; B is executed independently of A, that is, in some embodiments B; A and B are selectively executed, that is, selected from A and B for execution in some embodiments; A and B are both executed. Execution, that is, in some embodiments, A and B. When there are more branches such as A, B, C, etc., it is similar to the above.
本公开实施例中的“第一”、“第二”等前缀词,仅仅为了区分不同的描述对象,不对描述对象的位置、顺序、优先级、数量或内容等构成限制,对描述对象的陈述参见权利要求或实施例中上下文的描述,不应因为使用前缀词而构成多余的限制。例如,描述对象为“字段”,则“第一字段”和“第二字段”中“字段”之前的序数词并不限制“字段”之间的位置或顺序,“第一”和“第二”并不限制其修饰的“字段”是否在同一个消息中,也不限制“第一字段”和“第二字段”的先后顺序。再如,描述对象为“等级”,则“第一等级”和“第二等级”中“等级”之前的序数词并不限制“等级”之间的优先级。再如,描述对象的数量并不受序数词的限制,可以是一个或者多个,以“第一装置”为例,其中“装置”的数量可以是一个或者多个。此外,不同前缀词修饰的对象可以相同或不同,例如,描述对象为“装置”,则“第一装置”和“第二装置”可以是相同的装置或者不同的装置,其类型可以相同或不同;再如,描述对象为“信息”,则“第一信息”和“第二信息”可以是相同的信息或者不同的信息,其内容可以相同或不同。The prefixes such as "first" and "second" in the embodiments of the present disclosure are only used to distinguish different description objects, and do not constitute restrictions on the position, order, priority, quantity or content of the description objects. The statement of the description object refers to the description in the context of the claims or embodiments, and should not constitute unnecessary restrictions due to the use of prefixes. For example, if the description object is a "field", the ordinal number before the "field" in the "first field" and the "second field" does not limit the position or order between the "fields", and the "first" and "second" do not limit whether the "fields" they modify are in the same message, nor do they limit the order of the "first field" and the "second field". For another example, if the description object is a "level", the ordinal number before the "level" in the "first level" and the "second level" does not limit the priority between the "levels". For another example, the number of description objects is not limited by the ordinal number, and can be one or more. Taking the "first device" as an example, the number of "devices" can be one or more. In addition, the objects modified by different prefixes may be the same or different. For example, if the description object is "device", then the "first device" and the "second device" may be the same device or different devices, and their types may be the same or different. For another example, if the description object is "information", then the "first information" and the "second information" may be the same information or different information, and their contents may be the same or different.
在一些实施例中,“包括A”、“包含A”、“用于指示A”、“携带A”,可以解释为直接携带A,也可以解释为间接指示A。In some embodiments, “including A”, “comprising A”, “used to indicate A”, and “carrying A” can be interpreted as directly carrying A or indirectly indicating A.
在一些实施例中,“响应于……”、“响应于确定……”、“在……的情况下”、“在……时”、“当……时”、“若……”、“如果……”等术语可以相互替换。In some embodiments, terms such as "in response to ...", "in response to determining ...", "in the case of ...", "at the time of ...", "when ...", "if ...", "if ...", etc. can be used interchangeably.
在一些实施例中,“大于”、“大于或等于”、“不小于”、“多于”、“多于或等于”、“不少于”、“高于”、“高于或等于”、“不低于”、“以上”等术语可以相互替换,“小于”、“小于或等于”、“不大于”、“少于”、“少于或等于”、“不多于”、“低于”、“低于或等于”、“不高于”、“以下”等术语可以相互替换。In some embodiments, terms such as "greater than", "greater than or equal to", "not less than", "more than", "more than or equal to", "not less than", "higher than", "higher than or equal to", "not lower than", and "above" can be replaced with each other, and terms such as "less than", "less than or equal to", "not greater than", "less than", "less than or equal to", "no more than", "lower than", "lower than or equal to", "not higher than", and "below" can be replaced with each other.
在一些实施例中,装置等可以解释为实体的、也可以解释为虚拟的,其名称不限定于实施例中所记载的名称,“装置”、“设备(equipment)”、“设备(device)”、“电路”、“网元”、“节点”、“功能”、“单元”、“部件(section)”、“系统”、“网络”、“芯片”、“芯片系统”、“实体”、“主体”等术语可以相互替换。In some embodiments, devices, etc. can be interpreted as physical or virtual, and their names are not limited to the names recorded in the embodiments. Terms such as "device", "equipment", "device", "circuit", "network element", "node", "function", "unit", "section", "system", "network", "chip", "chip system", "entity", and "subject" can be used interchangeably.
在一些实施例中,“终端(terminal)”、“终端设备(terminal device)”、“用户设备(user equipment,UE)”、“用户终端(user terminal)”、“移动台(mobile station,MS)”、“移动终端(mobile terminal,MT)”、订户站(subscriber station)、移动单元(mobile unit)、订户单元(subscriber unit)、无线单元(wireless unit)、远程单元(remote unit)、移动设备(mobile device)、无线设备(wireless device)、无线通信设备(wireless communication device)、远程设备(remote device)、移动订户站(mobile subscriber station)、接入终端(access terminal)、移动终端(mobile terminal)、无线终端(wireless terminal)、远程终端(remote terminal)、手持设备(handset)、用户代理(user agent)、移动客户端(mobile client)、客户端(client)等术语可以相互替换。In some embodiments, the terms "terminal", "terminal device", "user equipment (UE)", "user terminal" "mobile station (MS)", "mobile terminal (MT)", subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client and the like can be used interchangeably.
在一些实施例中,接入网设备、核心网设备、或网络设备可以被替换为终端。例如,针对将接入网设备、核心网设备、或网络设备以及终端间的通信置换为多个终端间的通信(例如,也可以被称为设备对设备(device-to-device,D2D)、车联网(vehicle-to-everything,V2X)等)的结构,也可以应用本公开的各实施例。在该情况下,也可以设为终端具有接入网设备所具有的全部或部分功能的结构。此外,“上行”、“下行”等语言也可以被替换为与终端间通信对应的语言(例如,“侧行(side)”)。例如,上行信道、下行信道等可以被替换为侧行信道,上行链路、下行链路等可以被替换为侧行链路。In some embodiments, the access network device, the core network device, or the network device can be replaced by a terminal. For example, the various embodiments of the present disclosure can also be applied to a structure in which the access network device, the core network device, or the network device and the communication between the terminals is replaced by the communication between multiple terminals (for example, it can also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), etc.). In this case, it can also be set as a structure in which the terminal has all or part of the functions of the access network device. In addition, the language such as "uplink" and "downlink" can also be replaced by the language corresponding to the communication between the terminals (for example, "side"). For example, the uplink channel, the downlink channel, etc. can be replaced by the side channel, and the uplink, the downlink, etc. can be replaced by the side link.
在一些实施例中,终端可以被替换为接入网设备、核心网设备、或网络设备。在该情况下,也可以设为接入网设备、核心网设备、或网络设备具有终端所具有的全部或部分功能的结构。In some embodiments, the terminal may be replaced by an access network device, a core network device, or a network device. In this case, the access network device, the core network device, or the network device may also be configured to have a structure that has all or part of the functions of the terminal.
在一些实施例中,“网络”可以解释为网络中包含的装置(例如,接入网设备、核心网设备等)。In some embodiments, "network" may be interpreted as devices included in the network (eg, access network equipment, core network equipment, etc.).
在一些实施例中,获取数据、信息等可以遵照所在地国家的法律法规。In some embodiments, acquisition of data, information, etc. may comply with the laws and regulations of the country where the data is obtained.
在一些实施例中,可以在得到用户同意后获取数据、信息等。In some embodiments, data, information, etc. may be obtained with the user's consent.
图1是根据本公开实施例示出的通信系统的架构示意图。如图1所示,通信系统100可以包括终端(terminal)101、核心网设备(core network device)102的至少一者。FIG1 is a schematic diagram of the architecture of a communication system according to an embodiment of the present disclosure. As shown in FIG1 , a communication system 100 may include at least one of a terminal 101 and a core network device 102.
在一些实施例中,终端101例如包括手机(mobile phone)、可穿戴设备、物联网设备、具备通信功能的汽车、智能汽车、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电 网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备中的至少一者,但不限于此。In some embodiments, the terminal 101 includes, for example, a mobile phone, a wearable device, an Internet of Things device, a car with a communication function, a smart car, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a smart phone, etc. At least one of wireless terminal devices in a smart grid, wireless terminal devices in transportation safety, wireless terminal devices in a smart city, and wireless terminal devices in a smart home, but not limited to these.
在一些实施例中,核心网设备102可以是一个设备,包括一个或多个网元,也可以是多个设备或设备群,分别包括一个或多个网元中的全部或部分。网元可以是虚拟的,也可以是实体的。核心网例如包括演进分组核心(Evolved Packet Core,EPC)、5G核心网络(5G Core Network,5GCN)、下一代核心(Next Generation Core,NGC)中的至少一者。In some embodiments, the core network device 102 may be a device including one or more network elements, or may be a plurality of devices or a group of devices, each including all or part of one or more network elements. The network element may be virtual or physical. The core network may include, for example, at least one of an Evolved Packet Core (EPC), a 5G Core Network (5GCN), and a Next Generation Core (NGC).
在一些实施例中,上述一个或多个网元例如可以包括:应用功能(Application Function,AF)、应用层认证与密钥管理锚点功能(Authentication and Key management for Applications Anchor Function,AAnF)、、接入和移动性管理功能(Access and Mobility Management Function,AMF)、用户平面功能(User Plane Function,UPF)、会话管理功能(Session Management Function,SMF)、移动管理实体(Mobility Management Entity,MME)、统一数据管理功能(Unified Data Management,UDM)等。In some embodiments, the above-mentioned one or more network elements may include, for example: application function (AF), application layer authentication and key management anchor function (AAnF), access and mobility management function (AMF), user plane function (UPF), session management function (SMF), mobility management entity (MME), unified data management function (UDM), etc.
在一些实施例中,上述的PCF、AF、NAF、AAnF、BSF、AMF、UPF、SMF、MME、UDM用于“功能限定”,名称不限于此。In some embodiments, the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM are used for "function limitation", and the names are not limited thereto.
在一些实施例中,上述的PCF、AF、NAF、AAnF、BSF、AMF、UPF、SMF、MME、UDM可以与核心网设备独立。In some embodiments, the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be independent of the core network equipment.
在一些实施例中,上述的PCF、AF、NAF、AAnF、BSF、AMF、UPF、SMF、MME、UDM可以是核心网设备102的一部分。In some embodiments, the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be part of the core network device 102.
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提出的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提出的技术方案对于类似的技术问题同样适用。It can be understood that the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution proposed in the embodiment of the present disclosure. A person of ordinary skill in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution proposed in the embodiment of the present disclosure is also applicable to similar technical problems.
下述本公开实施例可以应用于图1所示的通信系统100、或部分主体,但不限于此。图1所示的各主体是例示,通信系统可以包括图1中的全部或部分主体,也可以包括图1以外的其他主体,各主体数量和形态为任意,各主体之间的连接关系是例示,各主体之间可以不连接也可以连接,其连接可以是任意方式,可以是直接连接也可以是间接连接,可以是有线连接也可以是无线连接。The following embodiments of the present disclosure may be applied to the communication system 100 shown in FIG1 , or part of the subject, but are not limited thereto. The subjects shown in FIG1 are examples, and the communication system may include all or part of the subjects in FIG1 , or may include other subjects other than FIG1 , and the number and form of the subjects are arbitrary, and the connection relationship between the subjects is an example, and the subjects may be connected or disconnected, and the connection may be in any manner, which may be a direct connection or an indirect connection, and may be a wired connection or a wireless connection.
图2a是根据本公开实施例示出的通信方法的交互示意图。如图2a所示,本公开实施例涉及通信方法,用于通信系统100,上述方法包括:FIG2a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2a, the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
步骤2101、第一网元101确定是否满足第一条件。Step 2101: The first network element 101 determines whether a first condition is met.
在一些实施例中,第一网元101确定是否满足第一条件,以确定终端是否收到更新的第一信息。In some embodiments, the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
在一些实施例中,第一条件为终端收到第一网元配置的更新的第一信息。In some embodiments, the first condition is that the terminal receives updated first information of the first network element configuration.
在一些实施例中,确定是否满足第一条件包括:确定终端发送的第二信息与第一网元存储的第三信息是否一致;第二信息与第三信息一致,确定满足第一条件。In some embodiments, determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
在一些实施例中,第一信息可以是第一网元为终端配置的指示信息,用于标识第一网元、第二网元与第三网元。In some embodiments, the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
在一些实施例中,第一网元可以是UDM,第二网元可以是AUSF,第三网元可以是AAnF。In some embodiments, the first network element may be a UDM, the second network element may be an AUSF, and the third network element may be an AAnF.
在一些实施例中,第一信息的名称不做限定,其例如是“路由指示信息”、“指示信息”等。In some embodiments, the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
在一些实施例中,第一信息至少包括:路由指示符(Routing Indicator,RID)。换言之,更新的第一信息至少包括:更新的RID。In some embodiments, the first information includes at least a routing indicator (RID). In other words, the updated first information includes at least an updated RID.
在一些实施例中,RID可以是通用用户身份识别模块(Universal Subscriber Identity Module,USIM)预配置的1到4位十进制数字组成的随机字符。In some embodiments, the RID can be a random character consisting of 1 to 4 decimal digits pre-configured in the Universal Subscriber Identity Module (USIM).
在一些实施例中,第一信息可以与家庭网络标识符(Home Network Identifier)共同将包含用户隐藏标识符(Subscription Concealed Identifier,SUCI)的网络信令路由到能够为终端提供服务的第一网元或第二网元或第三网元中。In some embodiments, the first information can be used together with a home network identifier (Home Network Identifier) to route network signaling containing a subscription concealed identifier (SUCI) to a first network element, a second network element, or a third network element that can provide services to the terminal.
在一些实施例中,第一网元可以对终端更新第一信息,以使终端使用更新的第一信息进行应用认证与密钥管理AKMA服务。In some embodiments, the first network element may update the first information for the terminal so that the terminal uses the updated first information to perform the application authentication and key management AKMA service.
在一些实施例中,第二信息用于第一网元确定终端是否收到更新的第一信息。 In some embodiments, the second information is used by the first network element to determine whether the terminal has received the updated first information.
在一些实施例中,第一网元可以接收UE发送的第二信息,但不限于此,本公开对第一网元获取第二信息的方式不做限定。In some embodiments, the first network element may receive the second information sent by the UE, but is not limited thereto. The present disclosure does not limit the manner in which the first network element obtains the second information.
在一些实施例中,第二信息的名称不做限定,其例如是“终端接收信息”、“终端更新信息”等In some embodiments, the name of the second information is not limited, and it can be, for example, "terminal receiving information", "terminal updating information", etc.
在一些实施例中,第二信息至少包括UPU-MAC-IUE,其中UPU-MAC-IUE可以由终端通过鉴权服务功能密钥(Authentication Server Function Key,KAUSF)计算得到的哈希(Hash)值,用于表示终端已接收到信息。In some embodiments, the second information includes at least UPU-MAC-I UE , where UPU-MAC-I UE can be a hash value calculated by the terminal through an authentication server function key (Authentication Server Function Key, K AUSF ), used to indicate that the terminal has received the information.
在一些实施例中,第三信息用于第一网元确定终端是否收到更新的第一信息。In some embodiments, the third information is used by the first network element to determine whether the terminal has received the updated first information.
在一些实施例中,第一网元存储的第三信息可以是由第二网元发送的,但不限于此,本公开对第一网元存储的第三信息的获取方式不做限定。In some embodiments, the third information stored in the first network element may be sent by the second network element, but is not limited thereto. The present disclosure does not limit the method for obtaining the third information stored in the first network element.
在一些实施例中,第三信息的名称不做限定,其例如是“期望终端接收信息”、“期望终端更新信息”等。In some embodiments, the name of the third information is not limited, and it may be, for example, "expected terminal reception information", "expected terminal update information", etc.
在一些实施例中,第三信息至少包括UPU-XMAC-IUE,其中UPU-XMAC-IUE可以是第二网元通过KAUSF计算得到的哈希值,用于预估终端是否收到信息。In some embodiments, the third information includes at least UPU-XMAC-I UE , where UPU-XMAC-I UE may be a hash value calculated by the second network element through K AUSF , which is used to estimate whether the terminal has received the information.
可选地,在一些实施例中,第一网元接收终端发送的第二信息,将接收的第二信息与第一网元存储的第三信息对比,若第二信息与第三信息一致,第一网元确定满足第一条件。Optionally, in some embodiments, the first network element receives second information sent by the terminal, and compares the received second information with third information stored in the first network element. If the second information is consistent with the third information, the first network element determines that the first condition is met.
示例地,在一些实施例中,以第一网元是UDM为例进行说明。则UDM可以将收到的UPU-MAC-IUE与UDM临时存储的UPU-XMAC-IUE进行比较。如果接收到的UPU-MAC-IUE与存储的UPU-XMAC-IUE相同,UDM可以确认UE已经收到更新的RID。For example, in some embodiments, the first network element is the UDM. The UDM may compare the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM. If the received UPU-MAC-I UE is the same as the stored UPU-XMAC-I UE , the UDM may confirm that the UE has received the updated RID.
步骤2102、第一网元101基于更新的第一信息,发现第二网元。Step 2102: The first network element 101 discovers the second network element based on the updated first information.
在一些实施例中,第一网元101基于更新的第一信息,发现第二网元,以向第二网元发送第一参数集。In some embodiments, the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
在一些实施例中,第一信息用于标识第一网元与第二网元,以使第一网元发现第二网元,换言之,基于更新的第一信息,可以确定更新的第一信息对应的第二网元。In some embodiments, the first information is used to identify the first network element and the second network element so that the first network element can discover the second network element. In other words, based on the updated first information, the second network element corresponding to the updated first information can be determined.
在一些实施例中,第一信息的名称不做限定,其例如是“路由指示信息”、“指示信息”等。In some embodiments, the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
在一些实施例中,第一信息至少包括RID。换言之,更新的第一信息至少包括:更新的RID。In some embodiments, the first information includes at least the RID. In other words, the updated first information includes at least: the updated RID.
具体地,RID为一串无实际意义的随机数列,即RID具有唯一性。因此由RID的唯一性可知,可以基于更新的第一信息,发现更新的第一信息唯一对应的第二网元。Specifically, the RID is a string of random numbers without actual meaning, that is, the RID is unique. Therefore, from the uniqueness of the RID, it can be known that the second network element uniquely corresponding to the updated first information can be found based on the updated first information.
可选地,在一些实施例中,第一网元基于更新的第一信息,确定更新的第一信息对应地第二网元,以使第一网元发现第二网元。Optionally, in some embodiments, the first network element determines, based on the updated first information, that the updated first information corresponds to the second network element, so that the first network element discovers the second network element.
示例地,在一些实施例中,以第一网元是UDM,第二网元是AUSF为例进行说明。则UDM可以基于更新的第一信息中更新的RID,发现AUSF。例如该更新的RID为1000,则UDM可以基于RID=1000确定其对应的AUSF,从而使UDM可以发现对应的AUSF。For example, in some embodiments, the first network element is a UDM and the second network element is an AUSF. The UDM can find the AUSF based on the updated RID in the updated first information. For example, if the updated RID is 1000, the UDM can determine its corresponding AUSF based on RID=1000, so that the UDM can find the corresponding AUSF.
步骤2103,第一网元101在第一条件下,向第二网元102发送第一参数集。Step 2103: The first network element 101 sends a first parameter set to the second network element 102 under a first condition.
在一些实施例中,第二网元102可以在第一条件下,接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
在一些实施例中,第一参数集用于应用认证与密钥管理AKMA服务。In some embodiments, the first parameter set is used for Application Authentication and Key Management AKMA services.
在一些实施例中,第一参数集的名称不做限定,其例如是“密钥集”、“认证参数集”等。In some embodiments, the name of the first parameter set is not limited, and it may be, for example, a "key set", "authentication parameter set", etc.
在一些实施例中,第一参数集包括更新的第一信息与第四信息中的至少之一。In some embodiments, the first parameter set includes at least one of the updated first information and the fourth information.
在一些实施例中,对第四信息的名称不做限定,其例如是“终端标识信息”、“标识信息”等。In some embodiments, the name of the fourth information is not limited, and it may be, for example, "terminal identification information", "identification information", etc.
在一些实施例中,第四信息至少包括永久订阅标识符(Subscription Permanent Identifier,SUPI),其中SUPI可以标识终端。In some embodiments, the fourth information includes at least a Subscription Permanent Identifier (SUPI), where the SUPI can identify the terminal.
在一些实施例中,第四信息用于标识与订阅者相关的信息,订阅者相关的信息包括第五信息、第一密钥、第二密钥中的至少一者。其中,订阅者例如是终端所属用户,但不限于此,本公开对此不予限制。当订阅者所拥有的终端更换时,更换后终端的第四信息与更换前终端的第四信息一致,即第四信息与订阅者对应,不随终端的更换进行变换。In some embodiments, the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key. The subscriber is, for example, a user to whom the terminal belongs, but is not limited thereto, and the present disclosure is not limited thereto. When the terminal owned by the subscriber is replaced, the fourth information of the terminal after the replacement is consistent with the fourth information of the terminal before the replacement, that is, the fourth information corresponds to the subscriber and does not change with the replacement of the terminal.
具体地,在一些实施例中,终端收到第一网元配置的更新的第一信息,第一网元可以发送第一参数集。换言之,第一网元接收终端发送的第二信息与第一网元存储的第三信息一致,则第一网元可以发送第一参数集。Specifically, in some embodiments, when the terminal receives updated first information configured by the first network element, the first network element may send the first parameter set. In other words, when the second information sent by the terminal received by the first network element is consistent with the third information stored by the first network element, the first network element may send the first parameter set.
示例地,在一些实施例中,以第一网元是UDM,第二网元是AUSF为例进行说明。UDM接收到的 UPU-MAC-IUE与存储的UPU-XMAC-IUE相同,则UDM确认UE已经收到更新的RID。此时UDM可以像AUSF发送第一参数集,该第一参数集至少包括更新的RID与SUPI。For example, in some embodiments, the first network element is a UDM and the second network element is an AUSF. If the UPU-MAC-I UE is the same as the stored UPU-XMAC-I UE , the UDM confirms that the UE has received the updated RID. At this time, the UDM may send a first parameter set to the AUSF, which includes at least the updated RID and SUPI.
步骤2104,第二网元102确定第二网元存储有未更新的第一信息。Step 2104: The second network element 102 determines that the second network element stores the first information which has not been updated.
在一些实施例中,第二网元102可以确定第二网元存储有未更新的第一信息,以将更新的第一信息替换未更新的第一信息。In some embodiments, the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
换言之,一些实施例中,第二网元可以确定第二网元存储有使用未更新的第一信息生成的未更新的第五信息,以基于更新的第一信息生成第五信息,即利用更新的第一信息替换未更新的第一信息进而生成第五信息。In other words, in some embodiments, the second network element can determine that the second network element stores unupdated fifth information generated using unupdated first information to generate fifth information based on the updated first information, i.e., replace the unupdated first information with the updated first information to generate the fifth information.
可选地,在一些实施例中,第二网元存储有未更新的第一信息,即第二网元也存储有使用未更新的第一信息生成的未更新的第五信息。Optionally, in some embodiments, the second network element stores the non-updated first information, that is, the second network element also stores the non-updated fifth information generated using the non-updated first information.
在一些实施例中,第五信息为AKMA Key Identifier(A-KID),所述第五信息用于标识第二密钥,即AKMA服务密钥。In some embodiments, the fifth information is an AKMA Key Identifier (A-KID), and the fifth information is used to identify the second key, namely, the AKMA service key.
在一些实施例中,在终端更新第一信息时,第二网元会保留原第一信息,即未更新的第一信息。换言之,在一些实施例中,在终端更新第一信息时,第二网元会将未更新的第一信息删除。In some embodiments, when the terminal updates the first information, the second network element will retain the original first information, that is, the first information that has not been updated. In other words, in some embodiments, when the terminal updates the first information, the second network element will delete the first information that has not been updated.
示例地,在一些实施例中,以第二网元是AUSF为例进行说明。在终端将第一信息中的RID由1000更新至1001时,AUSF未将存储的未更新的第五信息中的RID1000更新为1001,则可以确定AUSF存储有未更新的第一信息。For example, in some embodiments, the second network element is AUSF. When the terminal updates the RID in the first information from 1000 to 1001, the AUSF does not update the RID1000 in the stored unupdated fifth information to 1001, then it can be determined that the AUSF stores the unupdated first information.
步骤2105,第二网元102以更新的第一信息替换未更新的第一信息。Step 2105: The second network element 102 replaces the non-updated first information with the updated first information.
在本公开的一些实施例中,第二网元102可以以更新的第一信息替换未更新的第一信息,以生成第五信息。In some embodiments of the present disclosure, the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
示例地,在一些实施例中,以第二网元是AUSF为例进行说明。在终端将第一信息中的RID由1000更新至1001时,AUSF未将存储的未更新的第五信息中的RID1000删除,则AUSF可以以更新的第一信息替换未更新的第一信息,即以更新的RID1001替换RID1000,进而生成第五信息。For example, in some embodiments, the second network element is AUSF. When the terminal updates the RID in the first information from 1000 to 1001, and AUSF does not delete RID1000 in the stored fifth information that is not updated, AUSF can replace the first information that is not updated with the updated first information, that is, replace RID1000 with the updated RID1001, and then generate the fifth information.
步骤2106,第二网元102基于更新的第一信息和\或第四信息,生成第五信息。Step 2106: The second network element 102 generates fifth information based on the updated first information and/or fourth information.
在一些实施例中,可以基于更新的第一信息和\或第四信息,生成第五信息。In some embodiments, the fifth information may be generated based on the updated first information and/or fourth information.
在一些实施例中,第二网元102可以基于更新的第一信息和\或第四信息,生成第五信息,以向第三网元103发送第五信息。In some embodiments, the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the third network element 103 .
在一些实施例中,第五信息用于标识第二密钥,即AKMA密钥(KAKMA)。In some embodiments, the fifth information is used to identify the second key, ie, the AKMA key (K AKMA ).
在一些实施例中,对第五信息的名称不做限定,其例如是“AKAM密钥标识信息”、“密钥表示信息”等。In some embodiments, the name of the fifth information is not limited, and it may be, for example, "AKAM key identification information", "key representation information", etc.
在一些实施例中,第五信息至少包括AKMA密钥标识(A-KID)。In some embodiments, the fifth information includes at least an AKMA key identification (A-KID).
在一些实施例中,第二网元存储有未更新的第一信息以及使用未更新的第一信息生成的未更新的第五信息,则第二网元可以使用更新的第一信息替换未更新的第一信息,生成第五信息。In some embodiments, the second network element stores unupdated first information and unupdated fifth information generated using the unupdated first information. The second network element may use the updated first information to replace the unupdated first information to generate the fifth information.
在一些实施例中,第二网元未存储有未更新的第一信息,则第二网元可以基于接收的更新的第一信息和\或第四信息,生成第五信息。In some embodiments, if the second network element does not store the unupdated first information, the second network element may generate the fifth information based on the received updated first information and/or fourth information.
换言之,在一些实施例中,当第二网元本地存储了未更新的第一信息生成的未更新的第五信息,则可以使用更新的第一信息替换未更新的第五信息中的未更新的第一信息,进而生成更新的第五信息。In other words, in some embodiments, when the second network element locally stores the unupdated fifth information generated from the unupdated first information, the updated first information may be used to replace the unupdated first information in the unupdated fifth information, thereby generating updated fifth information.
换言之,在一些实施例中,当第二网元本地未存储有第五信息,则需要基于第一密钥、第四信息以及更新的第一信息生成更新的第五信息。In other words, in some embodiments, when the second network element does not store the fifth information locally, it is necessary to generate updated fifth information based on the first key, the fourth information and the updated first information.
示例地,在一些实施例中,以第二网元是AUSF为例进行说明。该AUSF存储有未更新的A-KID,则AUSF可以通过更新的RID替换未更新的A-KID中未更新的RID来生成新的A-KID。For example, in some embodiments, the second network element is an AUSF. The AUSF stores an unupdated A-KID, and the AUSF can generate a new A-KID by replacing the unupdated RID in the unupdated A-KID with the updated RID.
示例地,在一些实施例中,以第二网元是AUSF为例进行说明。该AUSF中存储的未更新的A-KID被删除,则AUSF可以基于收到SUPI和更新的RID得出新的A-KID。For example, in some embodiments, the second network element is an AUSF. If the unupdated A-KID stored in the AUSF is deleted, the AUSF may derive a new A-KID based on the received SUPI and the updated RID.
步骤2107,第二网元102基于第四信息和第二网元存储的第一密钥生成第二密钥。Step 2107: The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
在一些实施例中,可以基于第四信息和第二网元存储的第一密钥,生成第二密钥。In some embodiments, the second key may be generated based on the fourth information and the first key stored in the second network element.
在一些实施例中,第二网元102可以基于第四信息和第二网元存储的第一密钥,生成第二密钥。In some embodiments, the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
在一些实施例中,第一密钥用于确定第二密钥。 In some embodiments, the first key is used to determine the second key.
在一些实施例中,第一密钥至少包括AUSF密钥(KAUSF),其中KAUSF为AUSF网元密钥,在AKMA服务中KAUSF作为中间态密钥可以用于推导确定AKMA密钥。In some embodiments, the first key includes at least an AUSF key (K AUSF ), where K AUSF is an AUSF network element key. In the AKMA service, K AUSF can be used as an intermediate key to derive and determine the AKMA key.
在一些实施例中,第二密钥用于确定应用功能密钥(Application Function Key,KAF),从而使AF在终端的第一信息更新后获取相应的KAF,实现一种完整的AKMA服务。In some embodiments, the second key is used to determine an application function key (Application Function Key, K AF ), so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
在一些实施例中,第二密钥至少包括AKMA密钥(KAKMA),其中AKMA可以推导确定KAF。In some embodiments, the second key includes at least an AKMA key (K AKMA ), wherein AKMA can be used to derive and determine K AF .
换言之,在一些实施例中,第二网元本地存储有第二密钥,此时可以省略步骤2107。In other words, in some embodiments, the second network element locally stores the second key, and step 2107 can be omitted.
换言之,在一些实施例中,第二网元本地未存储有第二密钥,此时需要基于第四信息和第二网元存储的第一密钥生成第二密钥。In other words, in some embodiments, the second network element does not store the second key locally, and in this case, it is necessary to generate the second key based on the fourth information and the first key stored in the second network element.
示例地,在一些实施例中,以第二网元是AUSF为例进行说明。则AUSF可以基于接收的SUPI和存储的KAUSF生成KAKMA。For example, in some embodiments, the second network element is an AUSF for example. The AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
步骤2108,第二网元102基于更新的第一信息,发现第三网元103。Step 2108: The second network element 102 discovers the third network element 103 based on the updated first information.
在一些实施例中,第二网元102可以基于更新的第一信息,发现第三网元103,以向第三网元103发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在一些实施例中,在一些实施例中,第一信息可以是第一网元为终端配置的指示信息,用于标识第一网元、第二网元与第三网元。In some embodiments, in some embodiments, the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
具体的,第二网元可以基于更新的第一信息中的更新的RID确定对应的第三网元,以使第二网元发现(discovery)第三网元。Specifically, the second network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the second network element discovers the third network element.
示例的,以第二网元是AUSF,第三网元是AAnF为例进行说明。则AUSF可以基于更新的RID,确定该更新的RID对应的AAnF,以使AUSF发现AAnF。For example, the second network element is AUSF and the third network element is AAnF. Then AUSF can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF can discover the AAnF.
步骤2109,第二网元102向第三网元103发送第五信息、第二密钥及第四信息中至少一者。Step 2109 , the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在本公开的一些实施例中,第二网元102可以向第三网元103发送第五信息、第二密钥及第四信息中至少一者,以使第三网元103获取上述信息及密钥。In some embodiments of the present disclosure, the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103, so that the third network element 103 obtains the above information and the key.
在本公开的一些实施例中,第三网元103可以接收第二网元102发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments of the present disclosure, the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
在一些实施例中,第三网元是由更新的第一信息发现的,即第三网元是更新的第一信息中RID指示的第三网元。In some embodiments, the third network element is discovered by the updated first information, that is, the third network element is the third network element indicated by the RID in the updated first information.
可选地,在一些实施例中,AF接收终端发送地第五信息,基于该第五信息中RID,AF可以直接发现第三网元,或AF可以将第五信息发送至NEF以使得NEF可以基于第五信息发现第三网元。同时基于第五信息,AF可以从第三网元或通过NEF从第三网元中获取KAF。从而实现一种AKMA服务,使AF在终端更新第一信息时可以发现第三网元,并获取KAF。Optionally, in some embodiments, the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can directly discover the third network element, or the AF can send the fifth information to the NEF so that the NEF can discover the third network element based on the fifth information. At the same time, based on the fifth information, the AF can obtain K AF from the third network element or from the third network element through the NEF. Thus, an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
在一些实施例中,第二密钥可以是第二网元本地存储的第二密钥,也可以是基于第四信息和第二网元存储的第一密钥生成第二密钥,本公开对此不予限制。In some embodiments, the second key may be a second key stored locally in the second network element, or may be generated based on the fourth information and a first key stored in the second network element, which is not limited in the present disclosure.
示例地,以第二网元是AUSF,第三网元是AAnF为例进行说明。则AUSF可以向AAnF发送A-KID、SUPI以及KAKMA中的至少一者。For example, the second network element is AUSF and the third network element is AAnF. Then the AUSF may send at least one of A-KID, SUPI and K AKMA to the AAnF.
本公开实施例所涉及的通信方法可以包括步骤2101-步骤2109中的至少一者。例如,步骤2101可以作为独立实施例来实施,步骤2103可以作为独立实施例来实施,步骤2109可以作为独立实施例来实施,步骤2101+2102+2103可以作为独立实施例来实施,步骤2104+2105可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 2101 to step 2109. For example, step 2101 may be implemented as an independent embodiment, step 2103 may be implemented as an independent embodiment, step 2109 may be implemented as an independent embodiment, steps 2101+2102+2103 may be implemented as an independent embodiment, and steps 2104+2105 may be implemented as an independent embodiment, but are not limited thereto.
在一些实施例中,步骤2104和步骤2105为可替换步骤,即步骤2104和步骤2105可不被执行。In some embodiments, step 2104 and step 2105 are replaceable steps, that is, step 2104 and step 2105 may not be executed.
在一些实施例中,步骤2104、步骤2105是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 2104 and step 2105 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在一些实施例中,步骤2101、步骤2102是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 2101 and step 2102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。 In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图2b是根据本公开实施例示出的通信方法的交互示意图。如图2b所示,本公开实施例涉及通信方法,用于通信系统100,上述方法包括:FIG2b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2b, the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
步骤2201,第一网元101确定是否满足第一条件。Step 2201: The first network element 101 determines whether a first condition is met.
步骤2201可以参见图2a的步骤2101、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2201, reference may be made to step 2101 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,在一些实施例中,第一条件为终端收到第一网元配置的更新的第一信息。In some embodiments, in some embodiments, the first condition is that the terminal receives updated first information of the first network element configuration.
在一些实施例中,第一网元101可以基于终端发送的第二信息与第一网元存储的第三信息确定是否满足第一条件。In some embodiments, the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
步骤2202,第一网元101基于更新的第一信息,发现第二网元。Step 2202: The first network element 101 discovers the second network element based on the updated first information.
步骤2202可以参见图2a的步骤2102、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2202, reference may be made to step 2102 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第一网元101基于更新的第一信息,发现第二网元,以向第二网元发送第一参数集。In some embodiments, the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
步骤2203,第一网元101可以在第一条件下,发送第一参数集。Step 2203: The first network element 101 may send a first parameter set under a first condition.
步骤2203可以参见图2a的步骤2103、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2203, reference may be made to step 2103 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第一网元101可以在第一条件下,向第二网元102发送第一参数集。In some embodiments, the first network element 101 may send a first parameter set to the second network element 102 under a first condition.
在一些实施例中,第二网元102可以在第一条件下,接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
步骤2204,第二网元102确定第二网元存储有未更新的第一信息。Step 2204: The second network element 102 determines that the second network element stores the first information which has not been updated.
步骤2204可以参见图2a的步骤2104、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2204, reference may be made to step 2104 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二网元102可以确定第二网元存储有未更新的第一信息,以将更新的第一信息替换未更新的第一信息。In some embodiments, the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
步骤2205,第二网元102以更新的第一信息替换未更新的第一信息。Step 2205: The second network element 102 replaces the non-updated first information with the updated first information.
步骤2205可以参见图2a的步骤2105、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2205, reference may be made to step 2105 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在本公开的一些实施例中,第二网元102可以以更新的第一信息替换未更新的第一信息,以生成第五信息。In some embodiments of the present disclosure, the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
步骤2206,第二网元102基于更新的第一信息和\或第四信息,生成第五信息。Step 2206: The second network element 102 generates fifth information based on the updated first information and/or fourth information.
步骤2206可以参见图2a的步骤2106、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2206, reference may be made to step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二网元102可以基于更新的第一信息和\或第四信息,生成第五信息,以向第四网元103发送第五信息。In some embodiments, the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the fourth network element 103 .
步骤2207,第二网元102基于第四信息和第二网元存储的第一密钥,生成第二密钥。Step 2207: The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
步骤2207可以参见图2a的步骤2107、及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 2207, reference may be made to step 2107 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二网元102可以基于第四信息和第二网元存储的第一密钥,生成第二密钥。In some embodiments, the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
在一些实施例中,第二密钥用于确定KAF,从而使AF在终端的第一信息更新后获取相应的KAF,实现一种完整的AKMA服务。In some embodiments, the second key is used to determine K AF , so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
步骤2208,第二网元102基于更新的第一信息,发现第四网元104。Step 2208: The second network element 102 discovers the fourth network element 104 based on the updated first information.
在一些实施例中,第二网元102可以基于更新的第一信息,发现第四网元104,以向第四网元104发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may discover the fourth network element 104 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
在一些实施例中,在一些实施例中,第一信息可以是第一网元为终端配置的指示信息,用于标识第一网元、第二网元、第三网元与第四网元。In some embodiments, in some embodiments, the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, the third network element, and the fourth network element.
可选地,在一些实施例中,第二网元不支持更新的第一信息,则可以通过更新的第一信息来发现第四网元,以通过第四网元进行AKMA服务。其中,第四网元支持更新的第一信息。Optionally, in some embodiments, if the second network element does not support the updated first information, the fourth network element may be discovered through the updated first information to perform the AKMA service through the fourth network element, wherein the fourth network element supports the updated first information.
具体的,第二网元可以基于更新的第一信息中的更新的RID确定对应的第四网元,以使第二网元发现第四网元。Specifically, the second network element may determine the corresponding fourth network element based on the updated RID in the updated first information, so that the second network element discovers the fourth network element.
示例的,以第二网元是AUSF1,第四网元是AUSF2为例进行说明。则AUSF1可以基于更新的RID,确定该更新的RID对应的AUSF2,以使AUSF1发现AUSF2。For example, the second network element is AUSF 1 and the fourth network element is AUSF 2. AUSF 1 can determine AUSF 2 corresponding to the updated RID based on the updated RID, so that AUSF 1 can discover AUSF 2 .
步骤2209,第二网元102向第四网元104发送第五信息、第二密钥及第四信息中至少一者。Step 2209 , the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
在一些实施例中,第二网元102可以向第四网元104发送第五信息、第二密钥及第四信息中至少一者,以使第四网元104获取上述信息及密钥。In some embodiments, the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the fourth network element 104, so that the fourth network element 104 obtains the above information and the key.
在本公开的一些实施例中,第四网元104可以接收第二网元102发送的第五信息、第二密钥及第四信 息中至少一者。In some embodiments of the present disclosure, the fourth network element 104 may receive the fifth information, the second key and the fourth information sent by the second network element 102. At least one of the following.
在一些实施例中,第四网元是由更新的第一信息发现的,即第四网元是更新的第一信息中RID指示的第四网元。In some embodiments, the fourth network element is discovered by the updated first information, that is, the fourth network element is the fourth network element indicated by the RID in the updated first information.
示例地,以第二网元是AUSF1,第四网元是AUSF2为例进行说明。则AUSF1可以向AUSF2发送A-KID、SUPI以及KAKMA中的至少一者。For example, it is described as follows that the second network element is AUSF 1 and the fourth network element is AUSF 2. Then AUSF 1 may send at least one of A-KID, SUPI and K AKMA to AUSF 2 .
步骤2210,第四网元104可以向第三网元103发送第五信息、第二密钥及第四信息中至少一者。In step 2210 , the fourth network element 104 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在一些实施例中,第四网元104可以向第三网元103发送第五信息、第二密钥及第四信息中至少一者,以使第三网元103获取上述信息及密钥。In some embodiments, the fourth network element 104 may send at least one of the fifth information, the second key and the fourth information to the third network element 103, so that the third network element 103 obtains the above information and the key.
在本公开的一些实施例中,第三网元103可以接收第四网元104发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments of the present disclosure, the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the fourth network element 104 .
在一些实施例中,第四网元104可以基于更新的第一信息,发现第三网元103,以向第三网元103发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the fourth network element 104 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在一些实施例中,在一些实施例中,第一信息可以是第一网元为终端配置的指示信息,用于标识第一网元、第二网元与第三网元。In some embodiments, in some embodiments, the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
具体的,第四网元可以基于更新的第一信息中的更新的RID确定对应的第三网元,以使第四网元发现第三网元。Specifically, the fourth network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the fourth network element discovers the third network element.
示例的,以第四网元是AUSF2,第三网元是AAnF为例进行说明。则AUSF2可以基于更新的RID,确定该更新的RID对应的AAnF,以使AUSF2发现AAnF,并向AAnF发送A-KID、SUPI以及KAKMA中的至少一者。For example, the fourth network element is AUSF 2 and the third network element is AAnF. AUSF 2 can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF 2 finds the AAnF and sends at least one of A-KID, SUPI and K AKMA to the AAnF.
可选地,在一些实施例中,AF接收终端发送地第五信息,基于该第五信息中RID,AF可以发现第三网元,同时基于接收到的第五信息,AF可以从第三网元中获取KAF。从而实现一种AKMA服务,使AF在终端更新第一信息时可以发现第三网元,并获取KAF。Optionally, in some embodiments, the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can discover the third network element, and based on the received fifth information, the AF can obtain K AF from the third network element. Thus, an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
可选地,在一些实施例中,则AF可以将接收到的终端发送的第五信息发送至网络开放功能(Network Exposure Function,NEF),使NEF通过接收到的第五信息发现第三网元,同时该NEF可以基于接收到的第五信息从第三网元中获取KAF。从而实现一种AKMA服务,使AF在终端更新第一信息时可以发现第三网元,并获取KAF。Optionally, in some embodiments, the AF may send the fifth information received from the terminal to a network exposure function (NEF), so that the NEF discovers the third network element through the received fifth information, and the NEF may obtain K AF from the third network element based on the received fifth information. Thus, an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
本公开实施例所涉及的通信方法可以包括步骤2201-步骤2210中的至少一者。例如,步骤2201可以作为独立实施例来实施,步骤2203可以作为独立实施例来实施,步骤2210可以作为独立实施例来实施,步骤2201+2202+2203可以作为独立实施例来实施,步骤2204+2205可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiments of the present disclosure may include at least one of step 2201 to step 2210. For example, step 2201 may be implemented as an independent embodiment, step 2203 may be implemented as an independent embodiment, step 2210 may be implemented as an independent embodiment, steps 2201+2202+2203 may be implemented as an independent embodiment, and steps 2204+2205 may be implemented as an independent embodiment, but are not limited thereto.
在一些实施例中,步骤2204和步骤2205为可替换步骤,即步骤2204和步骤2205可不被执行。In some embodiments, step 2204 and step 2205 are replaceable steps, that is, step 2204 and step 2205 may not be executed.
在一些实施例中,步骤2204、步骤2205是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 2204 and step 2205 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在一些实施例中,步骤2201、步骤2202是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 2201 and step 2202 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图3a是根据本公开实施例示出的通信方法的流程示意图。如图3a所示,本公开实施例涉及通信方法,用于第一网元101,上述方法包括:FIG3a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3a, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
步骤3101,确定是否满足第一条件。Step 3101, determine whether the first condition is met.
步骤3101可以参见图2a的步骤2101、图2b的步骤2201、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 3101, reference may be made to step 2101 in FIG. 2a, step 2201 in FIG. 2b, and other related parts in the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第一网元101确定是否满足第一条件,以确定终端是否收到更新的第一信息。In some embodiments, the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
在一些实施例中,第一网元101可以基于终端发送的第二信息与第一网元存储的第三信息确定是否满足第一条件。 In some embodiments, the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
在一些实施例中,步骤3101被省略,上述功能为缺省或默认。In some embodiments, step 3101 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
步骤3102,发现第二网元。Step 3102, discover the second network element.
步骤3102可以参见图2a的步骤2102、图2b的步骤2202、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 3102, reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第一网元101基于更新的第一信息,发现第二网元102,以向第二网元发送第一参数集。In some embodiments, the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
在一些实施例中,第一网元101可以直接发现第二网元102。In some embodiments, the first network element 101 may directly discover the second network element 102 .
在一些实施例中,步骤3102被省略,上述功能为缺省或默认。In some embodiments, step 3102 is omitted and the above functions are default or by default.
在一些实施例中,第二网元可以是由更新的第一信息发现的。In some embodiments, the second network element may be discovered by the updated first information.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤3103,在第一条件下,向第二网元发送更新的第一参数集。Step 3103: under the first condition, send an updated first parameter set to the second network element.
步骤3103可以参见图2a的步骤2103、图2b的步骤2203、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 3103, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第一网元101在第一条件下,向第二网元102发送更新的第一参数集,以使第二网元获取上述信息。In some embodiments, the first network element 101 sends an updated first parameter set to the second network element 102 under a first condition, so that the second network element obtains the above information.
在一些实施例中,第二网元102在第一条件下,可以接收第一网元101发送更新的第一参数集。In some embodiments, the second network element 102 may receive an updated first parameter set sent by the first network element 101 under a first condition.
在一些实施例中,步骤3103被省略,上述功能为缺省或默认。In some embodiments, step 3103 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
本公开实施例所涉及的通信方法可以包括步骤3101-步骤3103中的至少一者。例如,步骤3101可以作为独立实施例来实施,步骤3103可以作为独立实施例来实施,步骤3102+3103可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 3101 to step 3103. For example, step 3101 may be implemented as an independent embodiment, step 3103 may be implemented as an independent embodiment, and steps 3102+3103 may be implemented as independent embodiments but are not limited thereto.
在一些实施例中,步骤3101与步骤3102是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 3101 and step 3102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图3b是根据本公开实施例示出的通信方法的流程示意图。如图3b所示,本公开实施例涉及通信方法,用于第一网元101,上述方法包括:FIG3b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3b, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
步骤3201,发现第二网元。Step 3201, discover the second network element.
步骤3201可以参见图2a的步骤2102、图2b的步骤2202、图3a的步骤3102、图2a、图2b及图3a所涉及的实施例中其他关联部分,此处不再赘述。For step 3201, reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, step 3102 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
在一些实施例中,第一网元101基于更新的第一信息,发现第二网元102,以向第二网元发送第一参数集。In some embodiments, the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
在一些实施例中,第一网元101可以直接发现第二网元102。In some embodiments, the first network element 101 may directly discover the second network element 102 .
在一些实施例中,步骤3201被省略,上述功能为缺省或默认。In some embodiments, step 3201 is omitted and the above functions are default or by default.
在一些实施例中,第二网元可以是由更新的第一信息发现的。In some embodiments, the second network element may be discovered by the updated first information.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤3202,向第二网元发送更新的第一参数集。Step 3202: Send an updated first parameter set to the second network element.
步骤3202可以参见图2a的步骤2103、图2b的步骤2203、图3a的步骤3103、图2a、图2b及图3a所涉及的实施例中其他关联部分,此处不再赘述。For step 3202, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
在一些实施例中,第一网元101向第二网元102发送更新的第一参数集,以使第二网元获取上述信息。其中,第一网元101可以在第一条件下向第二网元102发送更新的第一参数集;也可以直接向第二网元102 发送更新的第一参数集。In some embodiments, the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information. The first network element 101 may send the updated first parameter set to the second network element 102 under the first condition; or directly send the updated first parameter set to the second network element 102 under the first condition. Send the updated first parameter set.
在一些实施例中,第二网元102可以接收第一网元101发送更新的第一参数集。In some embodiments, the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
在一些实施例中,步骤3202被省略,上述功能为缺省或默认。In some embodiments, step 3202 is omitted and the above functions are default or by default.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
关于步骤3201-3202的详细介绍可以参考上述图2a与图2b所示的实施例。For a detailed description of steps 3201 - 3202 , please refer to the embodiments shown in FIG. 2 a and FIG. 2 b .
本公开实施例所涉及的通信方法可以包括步骤3201与步骤3202中的至少一者。例如,步骤3201可以作为独立实施例来实施,步骤3202可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 3201 and step 3202. For example, step 3201 may be implemented as an independent embodiment, and step 3202 may be implemented as an independent embodiment, but is not limited thereto.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或实施例任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
图3c是根据本公开实施例示出的通信方法的流程示意图。如图3c所示,本公开实施例涉及通信方法,用于第一网元101,上述方法包括:FIG3c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3c, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
步骤3301、向第二网元发送更新的第一参数集。Step 3301: Send an updated first parameter set to a second network element.
步骤3301可以参见图2a的步骤2103、图2b的步骤2203、图3a的步骤3103、图3b的步骤3202、图2a、图2b、图3a及图3b所涉及的实施例中其他关联部分,此处不再赘述。For step 3301, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, step 3202 of FIG. 3b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 3a and FIG. 3b, which will not be described in detail here.
在一些实施例中,第一网元101向第二网元102发送更新的第一参数集,以使第二网元获取上述信息。其中,第一网元101可以在第一条件下向第二网元102发送更新的第一参数集;也可以直接向第二网元102发送更新的第一参数集。In some embodiments, the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information. The first network element 101 may send the updated first parameter set to the second network element 102 under the first condition, or may directly send the updated first parameter set to the second network element 102.
在一些实施例中,第二网元102可以接收第一网元101发送更新的第一参数集。In some embodiments, the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
在一些实施例中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。In some embodiments, the first parameter set is used for application authentication and key management AKMA services, and the first parameter set includes at least updated first information.
在一些实施例中,第一网元101在第一条件下,向第二网元发送第一参数集,第一条件为终端收到所述第一网元101配置的更新的第一信息。In some embodiments, the first network element 101 sends a first parameter set to the second network element under a first condition, where the first condition is that the terminal receives updated first information configured by the first network element 101 .
在一些实施例中,第一网元101确定是否满足所述第一条件。具体地第一网元101确定终端发送的第二信息与第一网元101存储的第三信息是否一致,第二信息与第三信息一致,则确定满足第一条件。In some embodiments, the first network element 101 determines whether the first condition is satisfied. Specifically, the first network element 101 determines whether the second information sent by the terminal is consistent with the third information stored in the first network element 101. If the second information is consistent with the third information, it is determined that the first condition is satisfied.
在一些实施例中,第一参数集还包括第四信息,第四信息用于标识所述终端。In some embodiments, the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
在一些实施例中,第一网元101基于更新的第一信息,发现第二网元102,并向第二网元发102送第一参数集。In some embodiments, the first network element 101 discovers the second network element 102 based on the updated first information, and sends 102 the first parameter set to the second network element.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
关于步骤3301的详细介绍可以参考上述图2a与图2b所示的实施例。For a detailed description of step 3301, please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
图4a是根据本公开实施例示出的通信方法的流程示意图。如图4a所示,本公开实施例涉及通信方法,用于第二网元102,上述方法包括:FIG4a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4a, the present disclosure embodiment relates to a communication method, which is used for a second network element 102, and the method includes:
步骤4101,接收第一参数集。Step 4101, receiving a first parameter set.
步骤4101可以参见图2a的步骤2103、图2b的步骤2203、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4101, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第二网元102可以接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive a first parameter set sent by the first network element 101 .
在一些实施例中,第一网元101可以向第二网元102发送第一参数集。In some embodiments, the first network element 101 may send a first parameter set to the second network element 102 .
在一些实施例中,步骤4101被省略,上述功能为缺省或默认。In some embodiments, step 4101 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4102,确定第二网元存储有未更新的第一信息。Step 4102: Determine whether the second network element stores unupdated first information.
步骤4102可以参见图2a的步骤2104、图2b的步骤2204、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。 For step 4102, reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第二网元102可以确定第二网元存储有未更新的第一信息。In some embodiments, the second network element 102 may determine that the second network element stores unupdated first information.
在一些实施例中,步骤4102被省略,上述功能为缺省或默认。In some embodiments, step 4102 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4103,以更新的第一信息替换未更新的第一信息。Step 4103, replacing the non-updated first information with the updated first information.
步骤4103可以参见图2a的步骤2105、图2b的步骤2205、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4103, reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第二网元102可以以更新的第一信息替换未更新的第一信息。In some embodiments, the second network element 102 may replace the non-updated first information with the updated first information.
在一些实施例中,步骤4103被省略,上述功能为缺省或默认。In some embodiments, step 4103 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4104,生成第五信息。Step 4104, generate the fifth information.
步骤4104可以参见图2a的步骤2106、图2b的步骤2206、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4104, reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第二网元102可以生成第五信息。In some embodiments, the second network element 102 may generate the fifth information.
在一些实施例中,可以基于更新的第一信息和\或所述第四信息,生成第五信息。In some embodiments, the fifth information may be generated based on the updated first information and/or the fourth information.
在一些实施例中,第五信息用于标识第二密钥。In some embodiments, the fifth information is used to identify the second key.
在一些实施例中,步骤4104被省略,上述功能为缺省或默认。In some embodiments, step 4104 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4105,生成第二密钥。Step 4105, generate a second key.
步骤4105可以参见图2a的步骤2107、图2b的步骤2207、图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4105, reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第二网元102可以生成第二密钥。In some embodiments, the second network element 102 may generate a second key.
在一些实施例中,可以基于第四信息和第二网元102存储的第一密钥,生成第二密钥。In some embodiments, the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
在一些实施例中,步骤4105被省略,上述功能为缺省或默认。In some embodiments, step 4105 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4106,发现第三网元。Step 4106, discover the third network element.
步骤4106可以参见图2a的步骤2108及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 4106, reference may be made to step 2108 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二网元102可以发现第三网元。In some embodiments, the second network element 102 may discover the third network element.
在一些实施例中,可以基于更新的第一信息,发现第三网元。In some embodiments, the third network element may be discovered based on the updated first information.
在一些实施例中,步骤4106被省略,上述功能为缺省或默认。In some embodiments, step 4106 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
步骤4107,发送第五信息、第二密钥及第四信息中至少一者。Step 4107, sending at least one of the fifth information, the second key and the fourth information.
步骤4107可以参见图2a的步骤2109及图2a所涉及的实施例中其他关联部分,此处不再赘述。For step 4107, reference may be made to step 2109 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二网元102可以向第三网元103发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在一些实施例中,第三网元103可以接收第二网元102发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments, the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
在一些实施例中,步骤4106被省略,上述功能为缺省或默认。In some embodiments, step 4106 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
本公开实施例所涉及的通信方法可以包括步骤4101-步骤3107中的至少一者。例如,步骤4101可以作为独立实施例来实施,步骤4104可以作为独立实施例来实施,步骤4102+4103可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 4101 to step 3107. For example, step 4101 may be implemented as an independent embodiment, step 4104 may be implemented as an independent embodiment, and steps 4102+4103 may be implemented as independent embodiments but are not limited thereto.
在一些实施例中,步骤4102与步骤4103是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 4102 and step 4103 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。 In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图4b是根据本公开实施例示出的通信方法的流程示意图。如图4b所示,本公开实施例涉及通信方法,用于第二网元102,上述方法包括:FIG4b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4b, the present disclosure embodiment relates to a communication method, which is used for a second network element 102, and the method includes:
步骤4201,接收第一参数集。Step 4201, receiving a first parameter set.
步骤4201可以参见图2a的步骤2103、图2b的步骤2203、图4a的步骤4101、图2a、图2b及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4201, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive a first parameter set sent by the first network element 101 .
在一些实施例中,第一网元101可以向第二网元102发送第一参数集。In some embodiments, the first network element 101 may send a first parameter set to the second network element 102 .
在一些实施例中,步骤4201被省略,上述功能为缺省或默认。In some embodiments, step 4201 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4202,确定第二网元存储有未更新的第一信息。Step 4202, determining that the second network element stores unupdated first information.
步骤4202可以参见图2a的步骤2104、图2b的步骤2204、图4a的步骤4102、图2a、图2b及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4202, reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4102 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以确定第二网元存储有未更新的第一信息。In some embodiments, the second network element 102 may determine that the second network element stores unupdated first information.
在一些实施例中,步骤4202被省略,上述功能为缺省或默认。In some embodiments, step 4202 is omitted and the above functions are default or by default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4203,以更新的第一信息替换未更新的第一信息。Step 4203, replacing the non-updated first information with the updated first information.
步骤4203可以参见图2a的步骤2105、图2b的步骤2205、图4a的步骤4103、图2a、图2b及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4203, reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, step 4103 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以以更新的第一信息替换未更新的第一信息。In some embodiments, the second network element 102 may replace the non-updated first information with the updated first information.
在一些实施例中,步骤4303被省略,上述功能为缺省或默认。In some embodiments, step 4303 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4204,生成第五信息。Step 4204, generate the fifth information.
步骤4204可以参见图2a的步骤2106、图2b的步骤2206、图4a的步骤4104、图2a、图2b及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4204, reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以生成第五信息。In some embodiments, the second network element 102 may generate the fifth information.
在一些实施例中,可以基于更新的第一信息和\或所述第四信息,生成第五信息。In some embodiments, the fifth information may be generated based on the updated first information and/or the fourth information.
在一些实施例中,第五信息用于标识第二密钥。In some embodiments, the fifth information is used to identify the second key.
在一些实施例中,步骤4204被省略,上述功能为缺省或默认。In some embodiments, step 4204 is omitted and the above functions are default or by default.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4205,生成第二密钥。Step 4205, generate a second key.
步骤4205可以参见图2a的步骤2107、图2b的步骤2207、图4a的步骤4105、图2a、图2b及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4205, reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以生成第二密钥。In some embodiments, the second network element 102 may generate a second key.
在一些实施例中,可以基于第四信息和第二网元102存储的第一密钥,生成第二密钥。In some embodiments, the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
在一些实施例中,步骤4205被省略,上述功能为缺省或默认。In some embodiments, step 4205 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4206,发现第四网元。Step 4206, discover the fourth network element.
步骤4206可以参见图2b的步骤2208及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4206, reference may be made to step 2208 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
在一些实施例中,第二网元102可以发现第四网元。In some embodiments, the second network element 102 may discover the fourth network element.
在一些实施例中,可以基于更新的第一信息,发现第四网元。In some embodiments, the fourth network element may be discovered based on the updated first information.
在一些实施例中,步骤4206被省略,上述功能为缺省或默认。In some embodiments, step 4206 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
步骤4207,发送第五信息、第二密钥及第四信息中至少一者。 Step 4207, sending at least one of the fifth information, the second key and the fourth information.
步骤4207可以参见图2b的步骤2209及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 4207, reference may be made to step 2209 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
在一些实施例中,第二网元102可以向第四网元104发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
在一些实施例中,第四网元104可以接收第二网元102发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments, the fourth network element 104 may receive at least one of the fifth information, the second key and the fourth information sent by the second network element 102 .
在一些实施例中,步骤4207被省略,上述功能为缺省或默认。In some embodiments, step 4207 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
本公开实施例所涉及的通信方法可以包括步骤4201-步骤4207的至少一者。例如,步骤4201可以作为独立实施例来实施,步骤4204可以作为独立实施例来实施,步骤4202+4203可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 4201 to step 4207. For example, step 4201 may be implemented as an independent embodiment, step 4204 may be implemented as an independent embodiment, and steps 4202+4203 may be implemented as independent embodiments but are not limited thereto.
在一些实施例中,步骤4202与步骤4203是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 4202 and step 4203 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图4c是根据本公开实施例示出的通信方法的流程示意图。如图4c所示,本公开实施例涉及通信方法,用于第二网元102,上述方法包括:FIG4c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4c, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
步骤4301,接收第一参数集。Step 4301, receiving a first parameter set.
步骤4301可以参见图2a的步骤2103、图2b的步骤2203、图4a的步骤4101、图4b的步骤4201、图2a、图2b、图4a及图4b所涉及的实施例中其他关联部分,此处不再赘述。For step 4301, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
在一些实施例中,第二网元102可以接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive a first parameter set sent by the first network element 101 .
在一些实施例中,第一网元101可以向第二网元102发送第一参数集。In some embodiments, the first network element 101 may send a first parameter set to the second network element 102 .
在一些实施例中,步骤4301被省略,上述功能为缺省或默认。In some embodiments, step 4301 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4302,生成第五信息。Step 4302, generate the fifth information.
步骤4302可以参见图2a的步骤2106、图2b的步骤2206、图4a的步骤4104、图4b的步骤4204、图2a、图2b、图4a及图4b所涉及的实施例中其他关联部分,此处不再赘述。For step 4302, reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
在一些实施例中,第二网元102可以生成第五信息。In some embodiments, the second network element 102 may generate the fifth information.
在一些实施例中,可以基于更新的第一信息和\或所述第四信息,生成第五信息。In some embodiments, the fifth information may be generated based on the updated first information and/or the fourth information.
在一些实施例中,第五信息用于标识第二密钥。In some embodiments, the fifth information is used to identify the second key.
在一些实施例中,步骤4302被省略,上述功能为缺省或默认。In some embodiments, step 4302 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4303,生成第二密钥。Step 4303, generate a second key.
步骤4303可以参见图2a的步骤2107、图2b的步骤2207、图4a的步骤4106、图4b的步骤4206、图2a、图2b、图4a及图4b所涉及的实施例中其他关联部分,此处不再赘述。For step 4303, reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4106 of FIG. 4a, step 4206 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
在一些实施例中,第二网元102可以生成第二密钥。In some embodiments, the second network element 102 may generate a second key.
在一些实施例中,可以基于第四信息和第二网元102存储的第一密钥,生成第二密钥。In some embodiments, the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
在一些实施例中,步骤4303被省略,上述功能为缺省或默认。In some embodiments, step 4303 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4304,发现第三网元。Step 4304, discover the third network element.
步骤4304可以参见图2a的步骤2108、图4a的步骤4107、图2a及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4304, reference may be made to step 2108 of FIG. 2a, step 4107 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以发现第三网元。In some embodiments, the second network element 102 may discover the third network element.
在一些实施例中,可以基于更新的第一信息,发现第三网元。In some embodiments, the third network element may be discovered based on the updated first information.
在一些实施例中,步骤4304被省略,上述功能为缺省或默认。 In some embodiments, step 4304 is omitted and the above functions are default or by default.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
步骤4305,发送第五信息、第二密钥及第四信息中至少一者。Step 4305, sending at least one of the fifth information, the second key and the fourth information.
步骤4305可以参见图2a的步骤2109、图4a的步骤4108、图2a及图4a所涉及的实施例中其他关联部分,此处不再赘述。For step 4305, reference may be made to step 2109 of FIG. 2a, step 4108 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
在一些实施例中,第二网元102可以向第三网元103发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
在一些实施例中,第三网元103可以接收第二网元102发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments, the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
在一些实施例中,步骤4305被省略,上述功能为缺省或默认。In some embodiments, step 4305 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
本公开实施例所涉及的通信方法可以包括步骤4301-步骤4305中的至少一者。例如,步骤4301可以作为独立实施例来实施,步骤4305可以作为独立实施例来实施,步骤4301+4302可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 4301 to step 4305. For example, step 4301 may be implemented as an independent embodiment, step 4305 may be implemented as an independent embodiment, and step 4301+4302 may be implemented as an independent embodiment but is not limited thereto.
在一些实施例中,步骤4302-步骤4305是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, steps 4302-4305 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图4d是根据本公开实施例示出的通信方法的流程示意图。如图4d所示,本公开实施例涉及通信方法,用于第二网元102,上述方法包括:FIG4d is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4d, the embodiment of the present disclosure relates to a communication method, which is used for the second network element 102, and the method includes:
步骤4401,接收第一参数集。Step 4401, receiving a first parameter set.
步骤4401可以参见图2a的步骤2104、图2b的步骤2204、图4a的步骤4101、图4b的步骤4201、图4c的步骤4301、图2a、图2b、图4a、图4b及图4c所涉及的实施例中其他关联部分,此处不再赘述。For step 4401, reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
在一些实施例中,第二网元102可以接收第一网元101发送的第一参数集。In some embodiments, the second network element 102 may receive a first parameter set sent by the first network element 101 .
在一些实施例中,第一网元101可以向第二网元102发送第一参数集。In some embodiments, the first network element 101 may send a first parameter set to the second network element 102 .
在一些实施例中,步骤4401被省略,上述功能为缺省或默认。In some embodiments, step 4401 is omitted and the above functions are default or acquiescent.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4402,生成第五信息。Step 4402, generate the fifth information.
步骤4402可以参见图2a的步骤2106、图2b的步骤2206、图4a的步骤4104、图4b的步骤4204、图4c的步骤4302、图2a、图2b、图4a、图4b及图4c所涉及的实施例中其他关联部分,此处不再赘述。For step 4402, reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, step 4302 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
在一些实施例中,第二网元102可以生成第五信息。In some embodiments, the second network element 102 may generate the fifth information.
在一些实施例中,可以基于更新的第一信息和\或所述第四信息,生成第五信息。In some embodiments, the fifth information may be generated based on the updated first information and/or the fourth information.
在一些实施例中,第五信息用于标识第二密钥。In some embodiments, the fifth information is used to identify the second key.
在一些实施例中,步骤4402被省略,上述功能为缺省或默认。In some embodiments, step 4402 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF,但不限于此。In some embodiments, the second network element is, for example, an AUSF, but is not limited thereto.
步骤4403,生成第二密钥。Step 4403, generate a second key.
步骤4403可以参见图2a的步骤2107、图2b的步骤2207、图4a的步骤4105、图4b的步骤4205、图4c的步骤4303、图2a、图2b、图4a、图4b及图4c所涉及的实施例中其他关联部分,此处不再赘述。For step 4403, reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, step 4205 of FIG. 4b, step 4303 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
在一些实施例中,第二网元102可以生成第二密钥。In some embodiments, the second network element 102 may generate a second key.
在一些实施例中,可以基于第四信息和第二网元102存储的第一密钥,生成第二密钥。In some embodiments, the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
在一些实施例中,步骤4403被省略,上述功能为缺省或默认。In some embodiments, step 4403 is omitted and the above functions are default or default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
步骤4404,发现第四网元。Step 4404, discover the fourth network element.
步骤4404可以参见图2b的步骤2208、图4b的步骤4206、图2b及图4b所涉及的实施例中其他关联 部分,此处不再赘述。Step 4404 can refer to step 2208 of FIG. 2b, step 4206 of FIG. 4b, and other related embodiments of FIG. 2b and FIG. 4b. part, which will not be described here.
在一些实施例中,第二网元102可以发现第四网元。In some embodiments, the second network element 102 may discover the fourth network element.
在一些实施例中,可以基于更新的第一信息,发现第四网元。In some embodiments, the fourth network element may be discovered based on the updated first information.
在一些实施例中,步骤4404被省略,上述功能为缺省或默认。In some embodiments, step 4404 is omitted and the above functions are default or by default.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
步骤4405,发送第五信息、第二密钥及第四信息中至少一者。Step 4405, sending at least one of the fifth information, the second key and the fourth information.
步骤4405可以参见图2b的步骤2209、图4b的步骤4207、图2b及图4b所涉及的实施例中其他关联部分,此处不再赘述。For step 4405, reference may be made to step 2209 of FIG. 2b, step 4207 of FIG. 4b, and other related parts of the embodiments involved in FIG. 2b and FIG. 4b, which will not be described in detail here.
在一些实施例中,第二网元102可以向第四网元104发送第五信息、第二密钥及第四信息中至少一者。In some embodiments, the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
在一些实施例中,第四网元104可以接收第二网元102发送的第五信息、第二密钥及第四信息中至少一者。In some embodiments, the fourth network element 104 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
在一些实施例中,步骤4405被省略,上述功能为缺省或默认。In some embodiments, step 4405 is omitted and the above functions are default or acquiescent.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
本公开实施例所涉及的通信方法可以包括步骤4401-步骤4405中的至少一者。例如,步骤4401可以作为独立实施例来实施,步骤4405可以作为独立实施例来实施,步骤4401+4402可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 4401 to step 4405. For example, step 4401 may be implemented as an independent embodiment, step 4405 may be implemented as an independent embodiment, and step 4401+4402 may be implemented as an independent embodiment but is not limited thereto.
在一些实施例中,步骤4402-步骤4405是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, steps 4402 to 4405 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图4e是根据本公开实施例示出的通信方法的流程示意图。如图4e所示,本公开实施例涉及通信方法,用于第二网元102,上述方法包括:FIG4e is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4e, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
步骤4501,接收第一参数集。Step 4501, receiving a first parameter set.
步骤4501可以参见图2a的步骤2103、图2b的步骤2203、图4a的步骤4101、图4b的步骤4201、图4c的步骤4301、4d的步骤4401、图2a、图2b、图4a、图4b、图4c及图4d所涉及的实施例中其他关联部分,此处不再赘述。For step 4501, reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, step 4401 of FIG. 4d, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b, FIG. 4c and FIG. 4d, which will not be repeated here.
在一些实施例中,第二网元102可以接收第一网元101发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。In some embodiments, the second network element 102 may receive a first parameter set sent by the first network element 101, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
在一些实施例中,第一参数集还包括第四信息,第四信息用于标识所述终端。In some embodiments, the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
在一些实施例中,第二网元102可以基于更新的第一信息和\或第四信息,生成第五信息,其中,第五信息用于标识第二密钥。In some embodiments, the second network element 102 may generate fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
在一些实施例中,第二网元102可以基于第四信息和第二网元存储的第一密钥,生成第二密钥。In some embodiments, the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
在一些实施例中,第二网元102可以基于更新的第一信息,发现第三网元103。In some embodiments, the second network element 102 may discover the third network element 103 based on the updated first information.
在一些实施例中,第二网元102可以向第三网元发送以下至少之一:第五信息,第二密钥,第四信息。In some embodiments, the second network element 102 may send at least one of the following to the third network element: fifth information, second key, fourth information.
在一些实施例中,第二网元102可以基于更新的第一信息,发现第四网元104,向第四网元104发送以下至少之一:第五信息,第二密钥,第四信息。其中,第四网元104用于基于更新的第一信息发现第三网元103。In some embodiments, the second network element 102 may discover the fourth network element 104 based on the updated first information, and send at least one of the following to the fourth network element 104: the fifth information, the second key, and the fourth information. The fourth network element 104 is configured to discover the third network element 103 based on the updated first information.
在一些实施例中,第四网元104还用于向第三网元103发送以下至少之一:第五信息,第二密钥,第四信息。103。In some embodiments, the fourth network element 104 is further configured to send at least one of the following to the third network element 103: fifth information, second key, fourth information.
在一些实施例中,第二网元102可以确定第二网元102存储有未更新的第一信息;以更新的第一信息替换未更新的第一信息。In some embodiments, the second network element 102 may determine that the second network element 102 stores unupdated first information; and replace the unupdated first information with the updated first information.
在一些实施例中,第二网元102可以确定第二网元102存储有使用未更新的第一信息生成的未更新的第五信息;以更新的第一信息生成第五信息。 In some embodiments, the second network element 102 may determine that the second network element 102 stores non-updated fifth information generated using non-updated first information; and generate the fifth information using the updated first information.
在一些实施例中,第二网元102可以向第三网元103或第四网元104发送以下至少之一:第五信息,第二密钥,第四信息。In some embodiments, the second network element 102 may send at least one of the following to the third network element 103 or the fourth network element 104: fifth information, second key, fourth information.
在一些实施例中,第一网元例如是UDM,但不限于此。In some embodiments, the first network element is, for example, a UDM, but is not limited thereto.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
关于步骤4501的详细介绍可以参考上述图2a与图2b所示的实施例。For a detailed description of step 4501, please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
图5是根据本公开实施例示出的通信方法的流程示意图。如图5所示,本公开实施例涉及通信方法,用于第三网元103,上述方法包括:FIG5 is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5, the present disclosure embodiment relates to a communication method, which is used for a third network element 103, and the method includes:
步骤5101,接收第四信息、第五信息、第二密钥中的至少一者。Step 5101, receiving at least one of the fourth information, the fifth information, and the second key.
步骤5101可以参见图2a的步骤2109、图2b的步骤2210图2a及图2b所涉及的实施例中其他关联部分,此处不再赘述。For step 5101, reference may be made to step 2109 in FIG. 2a, step 2210 in FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
在一些实施例中,第三网元103可以接收第二网元102或第四网元104发送的第四信息、第五信息、第二密钥中的至少一项.其中,第五信息是由第一参数集中包括的更新的第一信息生成的,第一参数集用于应用认证与密钥管理AKMA服务。In some embodiments, the third network element 103 can receive at least one of the fourth information, the fifth information, and the second key sent by the second network element 102 or the fourth network element 104. The fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
在一些实施例中,第一参数集还包括第四信息,第四信息用于标识所述终端。In some embodiments, the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
在一些实施例中,第五信息用于标识第二密钥。In some embodiments, the fifth information is used to identify the second key.
在一些实施例中,第三网元103是基于所述更新的第一信息发现的。In some embodiments, the third network element 103 is discovered based on the updated first information.
在一些实施例中,第二网元例如是AUSF1,但不限于此。In some embodiments, the second network element is, for example, AUSF 1 , but is not limited thereto.
在一些实施例中,第三网元例如是AAnF,但不限于此。In some embodiments, the third network element is, for example, AAnF, but is not limited thereto.
在一些实施例中,第四网元例如是AUSF2,但不限于此。In some embodiments, the fourth network element is, for example, AUSF 2 , but is not limited thereto.
关于步骤5501的详细介绍可以参考上述图2a与图2b所示的实施例。For a detailed description of step 5501, please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
在一些实施例中,上述方法可以包括上述第一网元侧、第二网元侧、第三网元侧等的实施例所述的方法,此处不再赘述。In some embodiments, the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
图6a是根据本公开实施例示出的通信方法的交互示意图。如图6a所示,本公开实施例设计通信方法,上述方法包括:FIG6a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6a, the present disclosure embodiment designs a communication method, and the method includes:
步骤6101,第一网元101向第二网元102发送第一参数。Step 6101: The first network element 101 sends a first parameter to the second network element 102.
步骤6101的可选实施方式可以参见图2a的步骤2101、图2b的步骤2201、图3a的步骤3101、图3b的步骤3201、图3c的步骤3301及图2a、图2b、图3a、图3b、图3c所涉及的实施例中其他关联部分,此处不再赘述。Optional implementations of step 6101 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b and 3c, which will not be repeated here.
步骤6102,第二网元102向第三网元103发送第四信息、第五信息、第二密钥中的至少一者。Step 6102, the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the third network element 103.
步骤6102的可选实施方式可以参见图2a的步骤2109、图4a的步骤4107、图4c的步骤4305、图5的步骤5101及图2a、图4a、图4c、图5所涉及的实施例中其他关联部分,此处不再赘述。Optional implementations of step 6102 can refer to step 2109 of Figure 2a, step 4107 of Figure 4a, step 4305 of Figure 4c, step 5101 of Figure 5 and other related parts in the embodiments involved in Figures 2a, 4a, 4c and 5, which will not be repeated here.
在一些实施例中,上述方法可以包括上述第一网元侧、第二网元侧、第三网元侧等的实施例所述的方法,此处不再赘述。In some embodiments, the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
图6b是根据本公开实施例示出的通信方法的交互示意图。如图6b所示,本公开实施例设计通信方法,上述方法包括:FIG6b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6b, the present disclosure embodiment designs a communication method, and the method includes:
步骤6201,第一网元101向第二网元102发送第一参数。Step 6201: The first network element 101 sends a first parameter to the second network element 102.
步骤6201的可选实施方式可以参见图2a的步骤2101、图2b的步骤2201、图3a的步骤3101、图3b的步骤3201、图3c的步骤3301、图6a的步骤6101及图2a、图2b、图3a、图3b、图3c、图6a所涉及的实施例中其他关联部分,此处不再赘述。Optional implementations of step 6201 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c, step 6101 of Figure 6a and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b, 3c and 6a, which will not be repeated here.
步骤6202,第二网元102向第四网元104发送第四信息、第五信息、第二密钥中的至少一者。 Step 6202, the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the fourth network element 104.
步骤6202的可选实施方式可以参见图2b的步骤2209、图4b的步骤4207、图4d的步骤4205及图2a、图4b、图4d所涉及的实施例中其他关联部分,此处不再赘述。Optional implementations of step 6202 may refer to step 2209 of FIG. 2b , step 4207 of FIG. 4b , step 4205 of FIG. 4d and other related parts in the embodiments involved in FIG. 2a , FIG. 4b , and FIG. 4d , which will not be described in detail here.
步骤6203,第四网元104向第三网元103发送第四信息、第五信息、第二密钥中的至少一者。Step 6203 , the fourth network element 104 sends at least one of the fourth information, the fifth information, and the second key to the third network element 103 .
步骤6202的可选实施方式可以参见图2b的步骤2210、图5的步骤5101及图2b、图5所涉及的实施例中其他关联部分,此处不再赘述。Optional implementations of step 6202 may refer to step 2210 of FIG. 2b , step 5101 of FIG. 5 , and other related parts of the embodiments involved in FIG. 2b and FIG. 5 , which will not be described in detail here.
在一些实施例中,上述方法可以包括上述第一网元侧、第二网元侧、第三网元侧等的实施例所述的方法,此处不再赘述。In some embodiments, the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
图7a是根据本公开实施例示出的通信方法的交互示意图。如图7a所示,本公开实施例通信方法,上述方法包括:FIG7a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7a, the communication method of the embodiment of the present disclosure includes:
步骤7101,发送SUPI和更新的RID。Step 7101, sending SUPI and updated RID.
可选的,在一些实施例中,UDM可以向AUSF发送SUPI和更新的RID。Optionally, in some embodiments, the UDM may send the SUPI and the updated RID to the AUSF.
可选地,在一些实施例中,在执行步骤7101前,还包括UDM确定UE成功收到更新的RID,即UDM将收到的UPU-MAC-IUE与UDM临时存储的UPU-XMAC-IUE进行比较,若收到的UPU-MAC-IUE与UPU-XMAC-IUE,相同,UDM可以确认UE成功收到更新的RID。则UDM可以向AUSF发送SUPI和更新的RID。Optionally, in some embodiments, before executing step 7101, the UDM further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
步骤7102,向AAnF发送更新的A-KID、SUPI和KAKMA。Step 7102: Send updated A-KID, SUPI and K AKMA to AAnF.
可选的,在一些实施例中,AUSF可以向AAnF发送SUPI和更新的RID。Optionally, in some embodiments, the AUSF may send the SUPI and the updated RID to the AAnF.
可选的,在一些实施例中,AUSF收到SUPI和更新的RID,AUSF可以基于更新的RID和SUPI确定生成更新的A-KID。同时AUSF可以基于接收的SUPI和存储的KAUSF生成KAKMA。Optionally, in some embodiments, the AUSF receives the SUPI and the updated RID, and the AUSF may determine to generate an updated A-KID based on the updated RID and the SUPI. At the same time, the AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
可选的,在一些实施例中,AUSF可以基于更新的RID发现AANF。Optionally, in some embodiments, the AUSF may discover the AANF based on the updated RID.
在本实施例中,AUSF可能将未保存未更新的A-KID和KAKMA删除或已将其删除,即AUSF本地未存储有未更新的A-KID和KAKMA,则AUSF需要基于更新的RID、SUPI和存储的KAUSF来实时生成A-KID和KAKMA。In this embodiment, AUSF may delete or have deleted the unsaved and unupdated A-KID and K AKMA , that is, AUSF does not store the unupdated A-KID and K AKMA locally, then AUSF needs to generate A-KID and K AKMA in real time based on the updated RID, SUPI and stored K AUSF .
步骤7103,发送确认信息。Step 7103, send confirmation message.
可选的,在一些实施例中,AAnF可以向AUSF发送确认信息,表示已接收到更新的A-KID、SUPI和KAKMA。Optionally, in some embodiments, the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
步骤7104,基于更新的A-KID获取KAF。Step 7104: Get K AF based on the updated A-KID.
可选的,在一些实施例中,AF可以利用UE发送的更新的A-KID,从AAnF中获取KAF。Optionally, in some embodiments, the AF may obtain K AF from the AAnF using the updated A-KID sent by the UE.
可选的,在一些实施例中,AF可以使用更新的RID发现AAnF。其中,更新的RID包含在由UE发送的A-KID中。Optionally, in some embodiments, the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID发现AAnF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID从AAnF中获取KAF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
本公开实施例所涉及的通信方法可以包括步骤7101-步骤7104中的至少一者。例如,步骤7101可以作为独立实施例来实施,步骤7104可以作为独立实施例来实施,步骤7101+7102可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 7101 to step 7104. For example, step 7101 may be implemented as an independent embodiment, step 7104 may be implemented as an independent embodiment, and step 7101+7102 may be implemented as an independent embodiment but is not limited thereto.
在一些实施例中,步骤7102-步骤7104是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, steps 7102 to 7104 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图7b是根据本公开实施例示出的通信方法的交互示意图。如图7b所示,本公开实施例通信方法,上述方法包括:FIG7b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7b, the communication method of the embodiment of the present disclosure includes:
步骤7201,发送SUPI和更新的RID。 Step 7201, send SUPI and updated RID.
可选的,在一些实施例中,UDM可以向AUSF发送SUPI和更新的RID。Optionally, in some embodiments, the UDM may send the SUPI and the updated RID to the AUSF.
可选地,在一些实施例中,在执行步骤7201前,还包括UDM确定UE成功收到更新的RID,即UDM将收到的UPU-MAC-IUE与UDM临时存储的UPU-XMAC-IUE进行比较,若收到的UPU-MAC-IUE与UPU-XMAC-IUE,相同,UDM可以确认UE成功收到更新的RID。则UDM可以向AUSF发送SUPI和更新的RID。Optionally, in some embodiments, before executing step 7201, the UDM further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
步骤7202,获取A-KID和KAKMA。Step 7202, obtain A-KID and K AKMA .
可选地,在一些实施例中,AUSF1收到SUPI和更新的RID,AUSF1可以基于更新的RID和SUPI确定A-KID。Optionally, in some embodiments, AUSF 1 receives the SUPI and the updated RID, and AUSF 1 may determine the A-KID based on the updated RID and SUPI.
可选地,在一些实施例中,AUSF1基于接收的SUPI和存储的KAUSF确定KAKMA。Optionally, in some embodiments, AUSF 1 determines K AKMA based on the received SUPI and the stored K AUSF .
可选地,在一些实施例中,AUSF1可以基于更新的RID发现AUSF2。Optionally, in some embodiments, AUSF 1 may discover AUSF 2 based on the updated RID.
步骤7203,发送A-KID、SUPI和KAKMA。Step 7203, sending A-KID, SUPI and K AKMA .
可选地,在一些实施例中,AUSF1可以向AUSF2发送SUPI、A-KID、KAKMA。Optionally, in some embodiments, AUSF 1 may send SUPI, A-KID, K AKMA to AUSF 2 .
步骤7204,发送A-KID、SUPI和KAKMA。Step 7204, send A-KID, SUPI and K AKMA .
可选地,在一些实施例中,AUSF2可以向AAnF发送SUPI、A-KID、KAKMA。Optionally, in some embodiments, AUSF 2 may send SUPI, A-KID, K AKMA to AAnF.
可选地,在一些实施例中,AUSF2可以基于更新的RID发现AAnF。Optionally, in some embodiments, AUSF 2 may discover the AAnF based on the updated RID.
步骤7205,发送确认信息。Step 7205, send confirmation message.
可选的,在一些实施例中,AAnF可以向AUSF2发送确认信息,表示已接收到更新的A-KID、SUPI和KAKMA。Optionally, in some embodiments, the AAnF may send a confirmation message to the AUSF 2 , indicating that the updated A-KID, SUPI and K AKMA have been received.
步骤7206,基于更新的A-KID获取KAF。Step 7206, obtain K AF based on the updated A-KID.
可选的,在一些实施例中,AF可以利用UE发送的更新的A-KID,从AAnF中检索获取KAF。Optionally, in some embodiments, the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
可选的,在一些实施例中,AF可以使用更新的RID发现AAnF。其中,更新的RID包含在由UE发送的A-KID中。Optionally, in some embodiments, the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID发现AAnF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID从AAnF中获取KAF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
本公开实施例所涉及的通信方法可以包括步骤7201-步骤7206中的至少一者。例如,步骤7201可以作为独立实施例来实施,步骤7204可以作为独立实施例来实施,步骤7201+7202可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 7201 to step 7206. For example, step 7201 may be implemented as an independent embodiment, step 7204 may be implemented as an independent embodiment, and step 7201+7202 may be implemented as an independent embodiment but is not limited thereto.
在一些实施例中,步骤7202-步骤7206是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, steps 7202-7206 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图7c是根据本公开实施例示出的通信方法的交互示意图。如图7c所示,本公开实施例通信方法,上述方法包括:FIG7c is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7c, the communication method of the embodiment of the present disclosure includes:
步骤7301,可选的,在一些实施例中,UDM可以向AUSF发送SUPI和更新的RID。Step 7301, optionally, in some embodiments, the UDM may send the SUPI and updated RID to the AUSF.
可选地,在一些实施例中,在执行步骤7301前,还包括UDM确定UE成功收到更新的RID,即UDM将收到的UPU-MAC-IUE与UDM临时存储的UPU-XMAC-IUE进行比较,若收到的UPU-MAC-IUE与UPU-XMAC-IUE,相同,UDM可以确认UE成功收到更新的RID。则UDM可以向AUSF发送SUPI和更新的RID。Optionally, in some embodiments, before executing step 7301, the UDM further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
步骤7302,确定A-KID和KAKMA。Step 7302, determine A-KID and K AKMA .
可选的,在一些实施例中,AUSF接收到SUPI和新的RID,可以检查是否应更新A-KID。Optionally, in some embodiments, the AUSF receives the SUPI and the new RID and may check whether the A-KID should be updated.
可选的,在一些实施例中,AUSF接收的SUPI已被本地存储,AUSF可以更新由SUPI识别的本地存储的A-KID。Optionally, in some embodiments, the SUPI received by the AUSF has been locally stored, and the AUSF may update the locally stored A-KID identified by the SUPI.
具体地,AUSF可以通过更新的RID替换原A-KID中的RID来生成更新的A-KID。 Specifically, the AUSF may generate an updated A-KID by replacing the RID in the original A-KID with the updated RID.
可选的,在一些实施例中,AUSF可以向AAnF发送SUPI和更新的RID。Optionally, in some embodiments, the AUSF may send the SUPI and the updated RID to the AAnF.
可选的,AUSF可以基于接收的SUPI确定本地存储的KAKMA。Optionally, the AUSF may determine a locally stored K AKMA based on the received SUPI.
可选的,在一些实施例中,AUSF可以基于更新的RID发现AAnF。Optionally, in some embodiments, the AUSF may discover the AAnF based on the updated RID.
在本实施例中,AUSF本地存储有未更新的A-Kid和Kakma,AUSF可以基于接收到的SUPI确定未更新的A-KID和本地存储的Kakma,并基于接收到的更新的RID对未更新的A-KID进行更新。In this embodiment, the AUSF locally stores the unupdated A-Kid and Kakma. The AUSF may determine the unupdated A-KID and the locally stored Kakma based on the received SUPI, and update the unupdated A-KID based on the received updated RID.
步骤7303,发送更新的A-KID、SUPI和KAKMA。Step 7303, sending updated A-KID, SUPI and K AKMA .
可选的,在一些实施例中,AUSF可以向AAnF发送更新的A-KID、SUPI和本地存储的KAKMA。Optionally, in some embodiments, the AUSF may send the updated A-KID, SUPI and locally stored K AKMA to the AAnF.
步骤7304,发送确认信息。Step 7304, send confirmation message.
可选的,在一些实施例中,AAnF可以向AUSF发送确认信息,表示已接收到更新的A-KID、SUPI和KAKMA。Optionally, in some embodiments, the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
步骤7305,基于更新的A-KID获取KAF。Step 7305: Get K AF based on the updated A-KID.
可选的,在一些实施例中,AF可以利用UE发送的更新的A-KID,从AAnF中检索获取KAF。Optionally, in some embodiments, the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
可选的,在一些实施例中,AF可以基于更新的RID发现AAnF。其中,更新的RID包含在由UE发送的A-KID中。Optionally, in some embodiments, the AF may discover the AAnF based on an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID发现AAnF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
可选地,在一些实施例中,AF可以向NEF发送更新的A-KID,以使NEF通过该更新的A-KID从AAnF中获取KAF。Optionally, in some embodiments, the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
本公开实施例所涉及的通信方法可以包括步骤7301-步骤7304中的至少一者。例如,步骤7301可以作为独立实施例来实施,步骤7304可以作为独立实施例来实施,步骤7301+7302可以作为独立实施例来实施但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 7301 to step 7304. For example, step 7301 may be implemented as an independent embodiment, step 7304 may be implemented as an independent embodiment, and step 7301+7302 may be implemented as an independent embodiment but is not limited thereto.
在一些实施例中,步骤7302-步骤7304是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, steps 7302-7304 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
本公开实施例还提出用于实现以上任一方法的装置,例如,提出一装置,上述装置包括用以实现以上任一方法中终端所执行的各步骤的单元或模块。再如,还提出另一装置,包括用以实现以上任一方法中网络设备(例如接入网设备、核心网功能节点、核心网设备等)所执行的各步骤的单元或模块。The embodiments of the present disclosure also propose a device for implementing any of the above methods, for example, a device is proposed, the above device includes a unit or module for implementing each step performed by the terminal in any of the above methods. For another example, another device is also proposed, including a unit or module for implementing each step performed by a network device (such as an access network device, a core network function node, a core network device, etc.) in any of the above methods.
应理解以上装置中各单元或模块的划分仅是一种逻辑功能的划分,在实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。此外,装置中的单元或模块可以以处理器调用软件的形式实现:例如装置包括处理器,处理器与存储器连接,存储器中存储有指令,处理器调用存储器中存储的指令,以实现以上任一方法或实现上述装置各单元或模块的功能,其中处理器例如为通用处理器,例如中央处理单元(Central Processing Unit,CPU)或微处理器,存储器为装置内的存储器或装置外的存储器。或者,装置中的单元或模块可以以硬件电路的形式实现,可以通过对硬件电路的设计实现部分或全部单元或模块的功能,上述硬件电路可以理解为一个或多个处理器;例如,在一种实现中,上述硬件电路为专用集成电路(application-specific integrated circuit,ASIC),通过对电路内元件逻辑关系的设计,实现以上部分或全部单元或模块的功能;再如,在另一种实现中,上述硬件电路为可以通过可编程逻辑器件(programmable logic device,PLD)实现,以现场可编程门阵列(Field Programmable Gate Array,FPGA)为例,其可以包括大量逻辑门电路,通过配置文件来配置逻辑门电路之间的连接关系,从而实现以上部分或全部单元或模块的功能。以上装置的所有单元或模块可以全部通过处理器调用软件的形式实现,或全部通过硬件电路的形式实现,或部分通过处理器调用软件的形式实现,剩余部分通过硬件电路的形式实现。It should be understood that the division of the units or modules in the above device is only a division of logical functions, which can be fully or partially integrated into one physical entity or physically separated in actual implementation. In addition, the units or modules in the device can be implemented in the form of a processor calling software: for example, the device includes a processor, the processor is connected to a memory, and instructions are stored in the memory. The processor calls the instructions stored in the memory to implement any of the above methods or implement the functions of the units or modules of the above device, wherein the processor is, for example, a general-purpose processor, such as a central processing unit (CPU) or a microprocessor, and the memory is a memory inside the device or a memory outside the device. Alternatively, the units or modules in the device may be implemented in the form of hardware circuits, and the functions of some or all of the units or modules may be implemented by designing the hardware circuits. The hardware circuits may be understood as one or more processors; for example, in one implementation, the hardware circuits are application-specific integrated circuits (ASICs), and the functions of some or all of the above units or modules may be implemented by designing the logical relationship of the components in the circuits; for another example, in another implementation, the hardware circuits may be implemented by programmable logic devices (PLDs), and Field Programmable Gate Arrays (FPGAs) may be used as an example, which may include a large number of logic gate circuits, and the connection relationship between the logic gate circuits may be configured by configuring the configuration files, thereby implementing the functions of some or all of the above units or modules. All units or modules of the above devices may be implemented in the form of software called by the processor, or in the form of hardware circuits, or in the form of software called by the processor, and the remaining part may be implemented in the form of hardware circuits.
在本公开实施例中,处理器是具有信号处理能力的电路,在一种实现中,处理器可以是具有指令读取与运行能力的电路,例如中央处理单元(Central Processing Unit,CPU)、微处理器、图形处理器(graphics processing unit,GPU)(可以理解为微处理器)、或数字信号处理器(digital signal processor,DSP)等;在另一种实现中,处理器可以通过硬件电路的逻辑关系实现一定功能,上述硬件电路的逻辑关系是固定的 或可以重构的,例如处理器为专用集成电路(application-specific integrated circuit,ASIC)或可编程逻辑器件(programmable logic device,PLD)实现的硬件电路,例如FPGA。在可重构的硬件电路中,处理器加载配置文档,实现硬件电路配置的过程,可以理解为处理器加载指令,以实现以上部分或全部单元或模块的功能的过程。此外,还可以是针对人工智能设计的硬件电路,其可以理解为ASIC,例如神经网络处理单元(Neural Network Processing Unit,NPU)、张量处理单元(Tensor Processing Unit,TPU)、深度学习处理单元(Deep learning Processing Unit,DPU)等。In the embodiments of the present disclosure, the processor is a circuit with signal processing capability. In one implementation, the processor may be a circuit with instruction reading and execution capability, such as a central processing unit (CPU), a microprocessor, a graphics processing unit (GPU) (which may be understood as a microprocessor), or a digital signal processor (DSP). In another implementation, the processor may implement certain functions through the logical relationship of the hardware circuit, and the logical relationship of the above hardware circuit is fixed. Or reconfigurable, for example, a processor is a hardware circuit implemented by an application-specific integrated circuit (ASIC) or a programmable logic device (PLD), such as an FPGA. In a reconfigurable hardware circuit, the processor loads a configuration document to implement the process of hardware circuit configuration, which can be understood as the process of the processor loading instructions to implement the functions of some or all of the above units or modules. In addition, it can also be a hardware circuit designed for artificial intelligence, which can be understood as an ASIC, such as a neural network processing unit (NPU), a tensor processing unit (TPU), a deep learning processing unit (DPU), etc.
图8a是本公开实施例提出的通信装置的结构示意图。如图8a所示,通信装置包括:收发模块8101。在一些实施例中,上述收发模块用于向第二网元发送第一参数集,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。可选地,上述收发模块用于执行以上任一方法中第一网元101执行的发送和/或接收等通信步骤(例如步骤2103、步骤2203,但不限于此)中的至少一者,此处不再赘述。可选地,在一些实施例中,该通信装置还包括处理模块8102,上述处理模块用于执行以上任一方法中第一网元101执行的其他步骤(例如步骤2101、步骤2102、步骤2201、步骤2202,但不限于此)中的至少一者,此处不再赘述。FIG8a is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure. As shown in FIG8a, the communication device includes: a transceiver module 8101. In some embodiments, the transceiver module is used to send a first parameter set to a second network element, the first parameter set is used to apply authentication and key management AKMA services, and the first parameter set includes at least updated first information. Optionally, the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2203, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here. Optionally, in some embodiments, the communication device further includes a processing module 8102, and the processing module is used to execute at least one of the other steps (for example, step 2101, step 2102, step 2201, step 2202, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
图8b是本公开实施例提出的通信装置的结构示意图。如图8b所示,通信装置包括:收发模块8201。在一些实施例中,上述收发模块用于接收第一网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。可选地,上述收发模块用于执行以上任一方法中第二网元102执行的发送和/或接收等通信步骤(例如步骤2103、步骤2109、步骤2203、步骤2209,但不限于此)中的至少一者,此处不再赘述。可选地,在一些实施例中,该通信装置还包括处理模块8202,上述处理模块用于执行以上任一方法中第一网元101执行的其他步骤(例如步骤2104、步骤2105、步骤2106、步骤2107、步骤2108、步骤2204、步骤2205、步骤2206、步骤2207、步骤2208,但不限于此)中的至少一者,此处不再赘述。FIG8b is a schematic diagram of the structure of the communication device proposed in the embodiment of the present disclosure. As shown in FIG8b, the communication device includes: a transceiver module 8201. In some embodiments, the transceiver module is used to receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information. Optionally, the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2109, step 2203, step 2209, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here. Optionally, in some embodiments, the communication device also includes a processing module 8202, which is used to execute at least one of the other steps performed by the first network element 101 in any of the above methods (for example, step 2104, step 2105, step 2106, step 2107, step 2108, step 2204, step 2205, step 2206, step 2207, step 2208, but not limited to these), which are not repeated here.
图8c是本公开实施例提出的通信装置的结构示意图。如图8c所示,通信装置包括:收发模块8301。在一些实施例中,上述收发模块用于接收第二网元或第四网元发送的第一参数集,其中,第一参数集用于应用认证与密钥管理AKMA服务,第一参数集至少包括更新的第一信息。可选地,上述收发模块用于执行以上任一方法中第二网元102执行的发送和/或接收等通信步骤(例如步骤2109、步骤2210,但不限于此)中的至少一者,此处不再赘述。FIG8c is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure. As shown in FIG8c, the communication device includes: a transceiver module 8301. In some embodiments, the transceiver module is used to receive a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information. Optionally, the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2109, step 2210, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here.
如图9a所示,通信设备9100包括一个或多个处理器9101。处理器9101可以是通用处理器或者专用处理器等,例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行程序,处理程序的数据。处理器9101用于调用指令以使得通信设备9100执行以上任一方法。As shown in FIG9a, the communication device 9100 includes one or more processors 9101. The processor 9101 may be a general-purpose processor or a dedicated processor, for example, a baseband processor or a central processing unit. The baseband processor may be used to process the communication protocol and the communication data, and the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a program, and process the data of the program. The processor 9101 is used to call instructions so that the communication device 9100 executes any of the above methods.
在一些实施例中,通信设备9100还包括用于存储指令的一个或多个存储器9102。可选地,全部或部分存储器9102也可以处于通信设备9100之外。In some embodiments, the communication device 9100 further includes one or more memories 9102 for storing instructions. Optionally, all or part of the memory 9102 may also be outside the communication device 9100.
在一些实施例中,通信设备9100还包括一个或多个收发器9103。在通信设备9100包括一个或多个收发器9103时,上述方法中的发送接收等通信步骤由收发器9103执行,其他步骤由处理器9101执行。In some embodiments, the communication device 9100 further includes one or more transceivers 9103. When the communication device 9100 includes one or more transceivers 9103, the communication steps such as sending and receiving in the above method are performed by the transceiver 9103, and the other steps are performed by the processor 9101.
在一些实施例中,收发器可以包括接收器和发送器,接收器和发送器可以是分离的,也可以集成在一起。可选地,收发器、收发单元、收发机、收发电路等术语可以相互替换,发送器、发送单元、发送机、发送电路等术语可以相互替换,接收器、接收单元、接收机、接收电路等术语可以相互替换。In some embodiments, the transceiver may include a receiver and a transmitter, and the receiver and the transmitter may be separate or integrated. Optionally, the terms such as transceiver, transceiver unit, transceiver, transceiver circuit, etc. may be replaced with each other, the terms such as transmitter, transmission unit, transmitter, transmission circuit, etc. may be replaced with each other, and the terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
可选地,通信设备9100还包括一个或多个接口电路9104,接口电路9104与存储器9102连接,接口电路9104可用于从存储器9102或其他装置接收信号,可用于向存储器9102或其他装置发送信号。例如,接口电路9104可读取存储器9102中存储的指令,并将该指令发送给处理器9101。Optionally, the communication device 9100 further includes one or more interface circuits 9104, which are connected to the memory 9102. The interface circuit 9104 can be used to receive signals from the memory 9102 or other devices, and can be used to send signals to the memory 9102 or other devices. For example, the interface circuit 9104 can read instructions stored in the memory 9102 and send the instructions to the processor 9101.
以上实施例描述中的通信设备9100可以是网络设备或者终端,但本公开中描述的通信设备9100的范 围并不限于此,通信设备9100的结构可以不受图9a的限制。通信设备可以是独立的设备或者可以是较大设备的一部分。例如所述通信设备可以是:1)独立的集成电路IC,或芯片,或,芯片系统或子系统;(2)具有一个或多个IC的集合,可选地,上述IC集合也可以包括用于存储数据,程序的存储部件;(3)ASIC,例如调制解调器(Modem);(4)可嵌入在其他设备内的模块;(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;(6)其他等等。The communication device 9100 described in the above embodiments may be a network device or a terminal, but the scope of the communication device 9100 described in the present disclosure is The scope is not limited to this, and the structure of the communication device 9100 may not be limited by Figure 9a. The communication device may be an independent device or may be part of a larger device. For example, the communication device may be: 1) an independent integrated circuit IC, or a chip, or a chip system or subsystem; (2) a collection of one or more ICs, optionally, the above IC collection may also include a storage component for storing data and programs; (3) an ASIC, such as a modem; (4) a module that can be embedded in other devices; (5) a receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handheld device, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligence device, etc.; (6) others, etc.
图9b是本公开实施例提出的芯片9200的结构示意图。对于通信设备9100可以是芯片或芯片系统的情况,可以参见图9b所示的芯片9200的结构示意图,但不限于此。Fig. 9b is a schematic diagram of the structure of a chip 9200 provided in an embodiment of the present disclosure. In the case where the communication device 9100 may be a chip or a chip system, reference may be made to the schematic diagram of the structure of the chip 9200 shown in Fig. 9b, but the present invention is not limited thereto.
芯片9200包括一个或多个处理器9201,处理器9201用于调用指令以使得芯片9200执行以上任一方法。The chip 9200 includes one or more processors 9201, and the processor 9201 is used to call instructions so that the chip 9200 executes any of the above methods.
在一些实施例中,芯片9200还包括一个或多个接口电路9202,接口电路9202与存储器9203连接,接口电路9202可以用于从存储器9203或其他装置接收信号,接口电路9202可用于向存储器9203或其他装置发送信号。例如,接口电路9202可读取存储器9203中存储的指令,并将该指令发送给处理器9201。可选地,接口电路、接口、收发管脚、收发器等术语可以相互替换。In some embodiments, the chip 9200 further includes one or more interface circuits 9202, which are connected to the memory 9203. The interface circuit 9202 can be used to receive signals from the memory 9203 or other devices, and the interface circuit 9202 can be used to send signals to the memory 9203 or other devices. For example, the interface circuit 9202 can read instructions stored in the memory 9203 and send the instructions to the processor 9201. Optionally, the terms such as interface circuit, interface, transceiver pin, and transceiver can be replaced with each other.
在一些实施例中,芯片9200还包括用于存储指令的一个或多个存储器9203。可选地,全部或部分存储器9203可以处于芯片9200之外。In some embodiments, the chip 9200 further includes one or more memories 9203 for storing instructions. Optionally, all or part of the memory 9203 may be outside the chip 9200.
本公开还提出存储介质,上述存储介质上存储有指令,当上述指令在通信设备9100上运行时,使得通信设备9100执行以上任一方法。可选地,上述存储介质是电子存储介质。可选地,上述存储介质是计算机可读存储介质,但不限于此,其也可以是其他装置可读的存储介质。可选地,上述存储介质可以是非暂时性(non-transitory)存储介质,但不限于此,其也可以是暂时性存储介质。The present disclosure also proposes a storage medium, on which instructions are stored, and when the instructions are executed on the communication device 9100, the communication device 9100 executes any of the above methods. Optionally, the storage medium is an electronic storage medium. Optionally, the storage medium is a computer-readable storage medium, but is not limited to this, and it can also be a storage medium readable by other devices. Optionally, the storage medium can be a non-transitory storage medium, but is not limited to this, and it can also be a temporary storage medium.
本公开还提出程序产品,上述程序产品被通信设备9100执行时,使得通信设备9100执行以上任一方法。可选地,上述程序产品是计算机程序产品。The present disclosure also proposes a program product, which, when executed by the communication device 9100, enables the communication device 9100 to execute any of the above methods. Optionally, the program product is a computer program product.
本公开还提出计算机程序,当其在计算机上运行时,使得计算机执行以上任一方法。The present disclosure also proposes a computer program, which, when executed on a computer, causes the computer to execute any one of the above methods.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。In the above embodiments, it can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented by software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs. When the computer program is loaded and executed on a computer, the process or function described in the embodiment of the present disclosure is generated in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated. The available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
本公开中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本公开并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本公开中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。The corresponding relationships shown in the tables in the present disclosure can be configured or predefined. The values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure. When configuring the corresponding relationship between the information and each parameter, it is not necessarily required to configure all the corresponding relationships illustrated in each table. For example, in the table in the present disclosure, the corresponding relationships shown in some rows may not be configured. For another example, appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc. The names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device. When implementing the above tables, other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
本公开中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。The predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。 Those of ordinary skill in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this disclosure.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。 The above is only a specific embodiment of the present disclosure, but the protection scope of the present disclosure is not limited thereto. Any person skilled in the art who is familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present disclosure, which should be included in the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure should be based on the protection scope of the claims.
Claims (27)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/106430 WO2025010561A1 (en) | 2023-07-07 | 2023-07-07 | Communication method and apparatus, communication device, storage medium, and communication system |
| CN202380010059.6A CN117099343A (en) | 2023-07-07 | 2023-07-07 | Communication method, device, communication equipment, storage medium and communication system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/106430 WO2025010561A1 (en) | 2023-07-07 | 2023-07-07 | Communication method and apparatus, communication device, storage medium, and communication system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025010561A1 true WO2025010561A1 (en) | 2025-01-16 |
Family
ID=88777709
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/106430 Pending WO2025010561A1 (en) | 2023-07-07 | 2023-07-07 | Communication method and apparatus, communication device, storage medium, and communication system |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN117099343A (en) |
| WO (1) | WO2025010561A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113541925A (en) * | 2020-03-30 | 2021-10-22 | 华为技术有限公司 | Communication system, method and apparatus |
| WO2022160658A1 (en) * | 2021-01-28 | 2022-08-04 | 中兴通讯股份有限公司 | Registration method and apparatus, authentication method and apparatus, routing indicator determining method and apparatus, entity, and terminal |
| WO2023008929A1 (en) * | 2021-07-28 | 2023-02-02 | Samsung Electronics Co., Ltd. | Apparatus and method for communication establishment in authentication and key management for applications (akma) |
| WO2023016160A1 (en) * | 2021-08-08 | 2023-02-16 | 华为技术有限公司 | Session establishment method and related apparatus |
-
2023
- 2023-07-07 WO PCT/CN2023/106430 patent/WO2025010561A1/en active Pending
- 2023-07-07 CN CN202380010059.6A patent/CN117099343A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113541925A (en) * | 2020-03-30 | 2021-10-22 | 华为技术有限公司 | Communication system, method and apparatus |
| WO2022160658A1 (en) * | 2021-01-28 | 2022-08-04 | 中兴通讯股份有限公司 | Registration method and apparatus, authentication method and apparatus, routing indicator determining method and apparatus, entity, and terminal |
| WO2023008929A1 (en) * | 2021-07-28 | 2023-02-02 | Samsung Electronics Co., Ltd. | Apparatus and method for communication establishment in authentication and key management for applications (akma) |
| WO2023016160A1 (en) * | 2021-08-08 | 2023-02-16 | 华为技术有限公司 | Session establishment method and related apparatus |
Non-Patent Citations (1)
| Title |
|---|
| ZTE: "Update clause 6.1 about Routing identifier", 3GPP DRAFT; S3-212532, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), vol. SA WG3, 9 August 2021 (2021-08-09), FR, XP052063189 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN117099343A (en) | 2023-11-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110049070B (en) | Event notification method and related equipment | |
| EP3656108B1 (en) | Unstructured data storage function (udsf) services | |
| CN110351111B (en) | Subscription processing method, network node and user database | |
| CN114071649B (en) | Method and device for accessing local network | |
| WO2022022322A1 (en) | Method and device for accessing local network | |
| US20220312309A1 (en) | Method and Apparatus for Reporting User Plane Function Information, Storage Medium, and Electronic Apparatus | |
| WO2025024985A1 (en) | Communication management method, apparatus, storage medium, and system | |
| WO2025020050A1 (en) | Relay discovery method, apparatus, communication device, storage medium, and communication system | |
| US20250142455A1 (en) | Information processing method and apparatus, communication device, and readable storage medium | |
| WO2025010561A1 (en) | Communication method and apparatus, communication device, storage medium, and communication system | |
| WO2025010570A1 (en) | Communication method and apparatus, and communication device, storage medium and communication system | |
| US12294618B2 (en) | Method and apparatus for registering user information | |
| CN115209522B (en) | Network function registration method, discovery method, device, equipment and medium | |
| WO2024234274A1 (en) | Information sending method and apparatus, information acquiring method and apparatus, device, and storage medium | |
| WO2024050778A1 (en) | Artificial intelligence service policy updating method and apparatus | |
| CN116828546A (en) | Session channel establishment method, device and equipment for non-3GPP equipment | |
| CN116744346A (en) | Network fault handling methods, terminals, access network equipment and core network equipment | |
| US20250211974A1 (en) | Target information obtaining method and apparatus, information obtaining method and apparatus, and device | |
| EP4664788A1 (en) | Satellite coverage information acquisition method and apparatus, device and storage medium | |
| WO2025217768A1 (en) | Communication method and apparatus, communication device, communication system, and storage medium | |
| WO2025030552A1 (en) | Communication management method and apparatus, and communication device, storage medium and communication system | |
| WO2025156298A1 (en) | Communication method, apparatus, and storage medium | |
| CN117835208A (en) | Slice usage method, device, network side equipment and terminal | |
| WO2025054983A1 (en) | Communication method, apparatus and storage medium | |
| WO2025179465A1 (en) | Communication methods, devices, system and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23944584 Country of ref document: EP Kind code of ref document: A1 |