WO2025010561A1 - Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication - Google Patents
Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication Download PDFInfo
- Publication number
- WO2025010561A1 WO2025010561A1 PCT/CN2023/106430 CN2023106430W WO2025010561A1 WO 2025010561 A1 WO2025010561 A1 WO 2025010561A1 CN 2023106430 W CN2023106430 W CN 2023106430W WO 2025010561 A1 WO2025010561 A1 WO 2025010561A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- network element
- updated
- parameter set
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- the present disclosure relates to the field of communication technology, and in particular to a communication method, apparatus, communication equipment, storage medium and communication system.
- the Authentication and Key Management method for Applications (AKMA) service has been used to protect the communication between the terminal and the application function (AF), and the terminal and the AF can be authenticated by the application function key (K AF ).
- K AF application function key
- the technology of enabling the relevant network elements to obtain the updated K AF is provided.
- the present disclosure provides a communication method, an apparatus, a communication device, a storage medium and a communication system.
- a communication method is provided. The method is performed by a first network element and includes:
- a first parameter set is sent to a second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information, so that the second network element obtains an updated routing identifier (Router Indic, RID) of the UE.
- RID routing identifier
- a communication method is provided. The method is performed by a second network element and includes:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- a communication method is proposed.
- the method is performed by a third network element, including:
- a first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- a communication device comprising a transceiver module, configured to:
- a first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- a communication device comprising a transceiver module, configured to:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- a communication device comprising a transceiver module, configured to:
- a first parameter set sent by a second network element or a fourth network element is received, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- a communication device comprising: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer executable instructions on the memory, and can implement any one of the methods described in the first to third aspects above.
- a computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in any one of the first to third aspects above can be implemented.
- a communication system including: a first network element, a second network element, and a third network element, wherein the first network element is used to execute the method described in the first aspect, the second network element is used to execute the method described in the second aspect, and the third network element is used to execute the method described in the third aspect.
- FIG1 is a schematic diagram of the architecture of a communication system provided in an embodiment of the present disclosure.
- FIGS. 2a-2b are interactive schematic diagrams of some communication methods provided by embodiments of the present disclosure.
- 3a-3c are flowchart diagrams of some communication methods provided by embodiments of the present disclosure.
- FIG5 is a flowchart of some further communication methods provided by embodiments of the present disclosure.
- 6a-6b are interactive schematic diagrams of some communication methods provided in embodiments of the present disclosure.
- FIGS. 7a-7c are diagrams showing examples of interactions of some communication methods provided in embodiments of the present disclosure.
- FIG8a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG8b is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG8c is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG9a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG. 9 b is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
- the method disclosed in the present invention can be used to solve the technical problem of "implementing an AKMA service when the RID on the terminal side is updated, so that the AF can identify the AAnF and obtain the K AF ".
- the embodiments of the present disclosure provide a communication method, an apparatus, a communication device, a storage medium, and a communication system.
- an embodiment of the present disclosure provides a communication method, which is performed by a first network element and includes:
- a first parameter set is sent to the second network element, where the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the first network element may send the first parameter set to the second network element to implement an AKMA service.
- sending the first parameter set to the second network element includes:
- a first parameter set is sent to a second network element, and the first condition is that the terminal receives updated first information configured by the first network element.
- the first network element sends the first parameter set to the second network element under the first condition to implement information update in the AKAM service.
- the method also includes: determining whether the first condition is met, wherein determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
- the first network element determines whether the second information sent by the terminal is consistent with the third information stored in the first network element, thereby determining whether the first condition is met, and a determination method for meeting the first condition is proposed to determine whether the first network element sends the first data set, thereby avoiding waste of resources.
- the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
- sending the first parameter set to the second network element includes: discovering the second network element based on the updated first information; and sending the first parameter set to the second network element.
- the first network element discovers the second network element based on the updated first information; sends the first parameter set to the second network element to generate the fifth information, thereby updating the fifth information.
- an embodiment of the present disclosure provides a communication method, which is performed by a second network element, and the method includes:
- a first parameter set sent by a first network element is received, wherein the first parameter set is used for application authentication and key management (AKMA) services and the first parameter set includes at least updated first information.
- AKMA application authentication and key management
- the second network element receives the first parameter set sent by the first network element to obtain the first information and/or the fourth information, determines the update information and subscriber-related information in the AKMA service, and reduces the signaling resources used for sending parameters.
- the first parameter set also includes fourth information, and the fourth information is used to identify information related to the subscriber, and the information related to the subscriber includes at least one of the fifth information, the first key, and the second key.
- the method further includes: generating fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
- the second network element can generate fifth information based on the updated first information and fourth information to use the fifth information to identify the second key; the second network element can also use the updated first information to replace the unupdated first information in the unupdated fifth information when the unupdated fifth information is stored locally to generate updated fifth information, thereby improving the generation efficiency of the fifth information.
- the method further includes: generating a second key based on the fourth information and the first key stored in the second network element.
- the second network element may: generate a second key based on the fourth information and the first key stored in the second network element, so as to realize the generation of keys in the AKMA service.
- the method further includes: discovering a third network element based on the updated first information.
- the third unit is discovered through the updated first information, so that the relevant information is sent to the third unit to implement the update of the third unit database.
- the method further includes: sending at least one of the following to a third network element: fifth information, a second key, and fourth information.
- the third network element database is updated, and the signaling resources used for sending parameters are reduced.
- the method further comprises: discovering a fourth network element based on the updated first information, and sending at least one of the following to the fourth network element: fifth information, the second key, and the fourth information.
- the fourth network element is used to discover the third network element based on the updated first information.
- the application scope of the proposed AKMA service is expanded.
- the fourth network element is further used to send at least one of the following to the third network element: fifth information, second key, fourth information.
- At least one of the following is sent to the third network element by the fourth network element: the fifth information, the second key, and the fourth information, so as to update the information in the third network element and reduce the signaling resources used for sending parameters.
- the generation efficiency of the fifth information is improved by replacing the first information in the unupdated fifth information with the updated first information to generate the fifth information.
- the method further includes: sending at least one of the following to the third network element or the fourth network element: fifth information, second key, fourth information.
- At least one of the following may be sent to the third network element or the fourth network element: the fifth information, the second key, the fourth information.
- the application scope of the proposed AKMA service is expanded.
- an embodiment of the present disclosure proposes a communication method, which is executed by a third network element, and the method includes: receiving at least one of fourth information, fifth information, and second key sent by the second network element or the fourth network element, wherein the fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
- the third network element receives at least one of the fourth information, the fifth information, and the second key sent by the second network element or the fourth network element to update the third network element's own database, so that the AF can discover the third network element when the terminal updates the first information, and obtain the updated information and key K AF in the third network element, thereby expanding the application scope of the proposed AKMA service.
- the first parameter set further includes a fourth information
- the fifth information is used to identify the second key.
- the third network element is discovered based on the updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: send a first parameter set to a second network element, the first parameter set is used for application authentication and key management AKMA service, and the first parameter set at least includes updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module, and is used to: receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes a transceiver module for: receiving a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- an embodiment of the present disclosure proposes a communication device, which includes: one or more processors; one or more memories for storing instructions; wherein the processor is used to call the instructions so that the communication device executes the method described in the optional implementation modes of the first, second and third aspects.
- an embodiment of the present disclosure proposes a computer program, which, when executed on a computer, enables the computer to execute optional implementations of the first, second and third aspects.
- the communication system also includes a fourth network element.
- elements expressed in the singular form such as “a”, “an”, “the”, “above”, “said”, “aforementioned”, “this”, etc., may mean “one and only one", or “one or more”, “at least one”, etc.
- the noun after the article may be understood as a singular expression or a plural expression.
- the terms “at least one of”, “at least one of”, “at least one of”, “one or more”, “a plurality of”, “multiple”, etc. can be used interchangeably.
- descriptions such as “at least one of A, B, C...”, “A and/or B and/or C...”, etc. include the situation where any one of A, B, C... exists alone, and also include the situation where any multiple of A, B, C... exist in any combination, and each situation can exist alone; for example, “at least one of A, B, C” includes the situation where A exists alone, B exists alone, C exists alone, the combination of A and B, the combination of A and C, the combination of B and C, and the combination of A, B and C; for example, A and/or B includes the situation where A exists alone, B exists alone, and the combination of A and B.
- the description methods such as “in one case A, in another case B", “in response to one case A, in response to another case B”, etc. may include the following technical solutions according to the situation: A is executed independently of B, that is, in some embodiments A; B is executed independently of A, that is, in some embodiments B; A and B are selectively executed, that is, selected from A and B for execution in some embodiments; A and B are both executed. Execution, that is, in some embodiments, A and B. When there are more branches such as A, B, C, etc., it is similar to the above.
- prefixes such as “first” and “second” in the embodiments of the present disclosure are only used to distinguish different description objects, and do not constitute restrictions on the position, order, priority, quantity or content of the description objects.
- the statement of the description object refers to the description in the context of the claims or embodiments, and should not constitute unnecessary restrictions due to the use of prefixes.
- the description object is a "field”
- the ordinal number before the "field” in the "first field” and the "second field” does not limit the position or order between the "fields”
- the "first” and “second” do not limit whether the "fields” they modify are in the same message, nor do they limit the order of the "first field” and the "second field”.
- the description object is a "level”
- the ordinal number before the "level” in the “first level” and the “second level” does not limit the priority between the "levels”.
- the number of description objects is not limited by the ordinal number, and can be one or more. Taking the "first device” as an example, the number of "devices” can be one or more.
- the objects modified by different prefixes may be the same or different. For example, if the description object is "device”, then the “first device” and the “second device” may be the same device or different devices, and their types may be the same or different. For another example, if the description object is "information”, then the "first information” and the “second information” may be the same information or different information, and their contents may be the same or different.
- terms such as “greater than”, “greater than or equal to”, “not less than”, “more than”, “more than or equal to”, “not less than”, “higher than”, “higher than or equal to”, “not lower than”, and “above” can be replaced with each other, and terms such as “less than”, “less than or equal to”, “not greater than”, “less than”, “less than or equal to”, “no more than”, “lower than”, “lower than or equal to”, “not higher than”, and “below” can be replaced with each other.
- devices, etc. can be interpreted as physical or virtual, and their names are not limited to the names recorded in the embodiments.
- Terms such as “device”, “equipment”, “device”, “circuit”, “network element”, “node”, “function”, “unit”, “section”, “system”, “network”, “chip”, “chip system”, “entity”, and “subject” can be used interchangeably.
- terminal In some embodiments, the terms "terminal”, “terminal device”, “user equipment (UE)”, “user terminal” “mobile station (MS)”, “mobile terminal (MT)", subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client and the like can be used interchangeably.
- the access network device, the core network device, or the network device can be replaced by a terminal.
- the various embodiments of the present disclosure can also be applied to a structure in which the access network device, the core network device, or the network device and the communication between the terminals is replaced by the communication between multiple terminals (for example, it can also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), etc.).
- D2D device-to-device
- V2X vehicle-to-everything
- the language such as "uplink” and "downlink” can also be replaced by the language corresponding to the communication between the terminals (for example, "side”).
- the uplink channel, the downlink channel, etc. can be replaced by the side channel
- the uplink, the downlink, etc. can be replaced by the side link.
- the terminal may be replaced by an access network device, a core network device, or a network device.
- the access network device, the core network device, or the network device may also be configured to have a structure that has all or part of the functions of the terminal.
- network may be interpreted as devices included in the network (eg, access network equipment, core network equipment, etc.).
- acquisition of data, information, etc. may comply with the laws and regulations of the country where the data is obtained.
- data, information, etc. may be obtained with the user's consent.
- the terminal 101 includes, for example, a mobile phone, a wearable device, an Internet of Things device, a car with a communication function, a smart car, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a smart phone, etc.
- a mobile phone a wearable device, an Internet of Things device, a car with a communication function, a smart car, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a smart phone, etc.
- VR virtual reality
- AR augmented reality
- wireless terminal device in industrial control a wireless terminal device in self-driving
- the core network device 102 may be a device including one or more network elements, or may be a plurality of devices or a group of devices, each including all or part of one or more network elements.
- the network element may be virtual or physical.
- the core network may include, for example, at least one of an Evolved Packet Core (EPC), a 5G Core Network (5GCN), and a Next Generation Core (NGC).
- EPC Evolved Packet Core
- 5GCN 5G Core Network
- NGC Next Generation Core
- the above-mentioned one or more network elements may include, for example: application function (AF), application layer authentication and key management anchor function (AAnF), access and mobility management function (AMF), user plane function (UPF), session management function (SMF), mobility management entity (MME), unified data management function (UDM), etc.
- AF application function
- AMF access and mobility management function
- UPF user plane function
- SMF session management function
- MME mobility management entity
- UDM unified data management function
- PCF PCF
- AF NAF
- AAnF BSF
- AMF AMF
- UPF SMF
- MME MME
- UDM UDM
- the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be independent of the core network equipment.
- the above-mentioned PCF, AF, NAF, AAnF, BSF, AMF, UPF, SMF, MME, and UDM may be part of the core network device 102.
- the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution proposed in the embodiment of the present disclosure.
- a person of ordinary skill in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution proposed in the embodiment of the present disclosure is also applicable to similar technical problems.
- the following embodiments of the present disclosure may be applied to the communication system 100 shown in FIG1 , or part of the subject, but are not limited thereto.
- the subjects shown in FIG1 are examples, and the communication system may include all or part of the subjects in FIG1 , or may include other subjects other than FIG1 , and the number and form of the subjects are arbitrary, and the connection relationship between the subjects is an example, and the subjects may be connected or disconnected, and the connection may be in any manner, which may be a direct connection or an indirect connection, and may be a wired connection or a wireless connection.
- FIG2a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2a, the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
- Step 2101 The first network element 101 determines whether a first condition is met.
- the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
- the first condition is that the terminal receives updated first information of the first network element configuration.
- determining whether the first condition is met includes: determining whether the second information sent by the terminal is consistent with the third information stored in the first network element; if the second information is consistent with the third information, it is determined that the first condition is met.
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the first network element may be a UDM
- the second network element may be an AUSF
- the third network element may be an AAnF.
- the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
- the first information includes at least a routing indicator (RID).
- the updated first information includes at least an updated RID.
- the RID can be a random character consisting of 1 to 4 decimal digits pre-configured in the Universal Subscriber Identity Module (USIM).
- USIM Universal Subscriber Identity Module
- the first information can be used together with a home network identifier (Home Network Identifier) to route network signaling containing a subscription concealed identifier (SUCI) to a first network element, a second network element, or a third network element that can provide services to the terminal.
- Home Network Identifier Home Network Identifier
- SUCI subscription concealed identifier
- the first network element may update the first information for the terminal so that the terminal uses the updated first information to perform the application authentication and key management AKMA service.
- the second information is used by the first network element to determine whether the terminal has received the updated first information.
- the first network element may receive the second information sent by the UE, but is not limited thereto.
- the present disclosure does not limit the manner in which the first network element obtains the second information.
- the name of the second information is not limited, and it can be, for example, “terminal receiving information”, “terminal updating information”, etc.
- the second information includes at least UPU-MAC-I UE , where UPU-MAC-I UE can be a hash value calculated by the terminal through an authentication server function key (Authentication Server Function Key, K AUSF ), used to indicate that the terminal has received the information.
- K AUSF Authentication Server Function Key
- the third information is used by the first network element to determine whether the terminal has received the updated first information.
- the third information stored in the first network element may be sent by the second network element, but is not limited thereto.
- the present disclosure does not limit the method for obtaining the third information stored in the first network element.
- the name of the third information is not limited, and it may be, for example, "expected terminal reception information", “expected terminal update information”, etc.
- the third information includes at least UPU-XMAC-I UE , where UPU-XMAC-I UE may be a hash value calculated by the second network element through K AUSF , which is used to estimate whether the terminal has received the information.
- the first network element receives second information sent by the terminal, and compares the received second information with third information stored in the first network element. If the second information is consistent with the third information, the first network element determines that the first condition is met.
- Step 2102 The first network element 101 discovers the second network element based on the updated first information.
- the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
- the first information is used to identify the first network element and the second network element so that the first network element can discover the second network element.
- the second network element corresponding to the updated first information can be determined.
- the name of the first information is not limited, and it may be, for example, “routing indication information”, “indication information”, etc.
- the first information includes at least the RID.
- the updated first information includes at least: the updated RID.
- the RID is a string of random numbers without actual meaning, that is, the RID is unique. Therefore, from the uniqueness of the RID, it can be known that the second network element uniquely corresponding to the updated first information can be found based on the updated first information.
- the first network element is a UDM and the second network element is an AUSF.
- Step 2103 The first network element 101 sends a first parameter set to the second network element 102 under a first condition.
- the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
- the first parameter set is used for Application Authentication and Key Management AKMA services.
- the name of the first parameter set is not limited, and it may be, for example, a "key set”, "authentication parameter set”, etc.
- the first parameter set includes at least one of the updated first information and the fourth information.
- the name of the fourth information is not limited, and it may be, for example, “terminal identification information”, “identification information”, etc.
- the fourth information includes at least a Subscription Permanent Identifier (SUPI), where the SUPI can identify the terminal.
- SUPI Subscription Permanent Identifier
- the first network element when the terminal receives updated first information configured by the first network element, the first network element may send the first parameter set. In other words, when the second information sent by the terminal received by the first network element is consistent with the third information stored by the first network element, the first network element may send the first parameter set.
- the first network element is a UDM and the second network element is an AUSF. If the UPU-MAC-I UE is the same as the stored UPU-XMAC-I UE , the UDM confirms that the UE has received the updated RID. At this time, the UDM may send a first parameter set to the AUSF, which includes at least the updated RID and SUPI.
- Step 2104 The second network element 102 determines that the second network element stores the first information which has not been updated.
- the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
- the second network element can determine that the second network element stores unupdated fifth information generated using unupdated first information to generate fifth information based on the updated first information, i.e., replace the unupdated first information with the updated first information to generate the fifth information.
- the second network element stores the non-updated first information, that is, the second network element also stores the non-updated fifth information generated using the non-updated first information.
- the second network element when the terminal updates the first information, the second network element will retain the original first information, that is, the first information that has not been updated. In other words, in some embodiments, when the terminal updates the first information, the second network element will delete the first information that has not been updated.
- the second network element is AUSF.
- the terminal updates the RID in the first information from 1000 to 1001
- the AUSF does not update the RID1000 in the stored unupdated fifth information to 1001, then it can be determined that the AUSF stores the unupdated first information.
- Step 2105 The second network element 102 replaces the non-updated first information with the updated first information.
- the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
- the second network element is AUSF.
- the terminal updates the RID in the first information from 1000 to 1001, and AUSF does not delete RID1000 in the stored fifth information that is not updated
- AUSF can replace the first information that is not updated with the updated first information, that is, replace RID1000 with the updated RID1001, and then generate the fifth information.
- Step 2106 The second network element 102 generates fifth information based on the updated first information and/or fourth information.
- the fifth information may be generated based on the updated first information and/or fourth information.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the third network element 103 .
- the fifth information is used to identify the second key, ie, the AKMA key (K AKMA ).
- the name of the fifth information is not limited, and it may be, for example, "AKAM key identification information", “key representation information”, etc.
- the fifth information includes at least an AKMA key identification (A-KID).
- A-KID AKMA key identification
- the second network element stores unupdated first information and unupdated fifth information generated using the unupdated first information.
- the second network element may use the updated first information to replace the unupdated first information to generate the fifth information.
- the second network element may generate the fifth information based on the received updated first information and/or fourth information.
- the updated first information when the second network element locally stores the unupdated fifth information generated from the unupdated first information, the updated first information may be used to replace the unupdated first information in the unupdated fifth information, thereby generating updated fifth information.
- the second network element when the second network element does not store the fifth information locally, it is necessary to generate updated fifth information based on the first key, the fourth information and the updated first information.
- the second network element is an AUSF.
- the AUSF stores an unupdated A-KID, and the AUSF can generate a new A-KID by replacing the unupdated RID in the unupdated A-KID with the updated RID.
- the second network element is an AUSF. If the unupdated A-KID stored in the AUSF is deleted, the AUSF may derive a new A-KID based on the received SUPI and the updated RID.
- Step 2107 The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
- the second key may be generated based on the fourth information and the first key stored in the second network element.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the first key is used to determine the second key.
- the first key includes at least an AUSF key (K AUSF ), where K AUSF is an AUSF network element key.
- K AUSF can be used as an intermediate key to derive and determine the AKMA key.
- the second key is used to determine an application function key (Application Function Key, K AF ), so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
- K AF Application Function Key
- the second key includes at least an AKMA key (K AKMA ), wherein AKMA can be used to derive and determine K AF .
- K AKMA AKMA key
- the second network element locally stores the second key, and step 2107 can be omitted.
- the second network element does not store the second key locally, and in this case, it is necessary to generate the second key based on the fourth information and the first key stored in the second network element.
- the second network element is an AUSF for example.
- the AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
- Step 2108 The second network element 102 discovers the third network element 103 based on the updated first information.
- the second network element 102 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the second network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the second network element discovers the third network element.
- the second network element is AUSF and the third network element is AAnF. Then AUSF can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF can discover the AAnF.
- Step 2109 the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103, so that the third network element 103 obtains the above information and the key.
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- the third network element is discovered by the updated first information, that is, the third network element is the third network element indicated by the RID in the updated first information.
- the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can directly discover the third network element, or the AF can send the fifth information to the NEF so that the NEF can discover the third network element based on the fifth information.
- the AF can obtain K AF from the third network element or from the third network element through the NEF.
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the second network element is AUSF and the third network element is AAnF.
- the AUSF may send at least one of A-KID, SUPI and K AKMA to the AAnF.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 2101 to step 2109.
- step 2101 may be implemented as an independent embodiment
- step 2103 may be implemented as an independent embodiment
- step 2109 may be implemented as an independent embodiment
- steps 2101+2102+2103 may be implemented as an independent embodiment
- steps 2104+2105 may be implemented as an independent embodiment, but are not limited thereto.
- step 2104 and step 2105 are replaceable steps, that is, step 2104 and step 2105 may not be executed.
- step 2104 and step 2105 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- step 2101 and step 2102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- FIG2b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure.
- the embodiment of the present disclosure relates to a communication method, which is used in a communication system 100, and the method includes:
- Step 2201 The first network element 101 determines whether a first condition is met.
- the first condition is that the terminal receives updated first information of the first network element configuration.
- the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
- step 2202 reference may be made to step 2102 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the first network element 101 discovers the second network element based on the updated first information to send the first parameter set to the second network element.
- Step 2203 The first network element 101 may send a first parameter set under a first condition.
- step 2203 reference may be made to step 2103 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the first network element 101 may send a first parameter set to the second network element 102 under a first condition.
- the second network element 102 may receive the first parameter set sent by the first network element 101 under the first condition.
- Step 2204 The second network element 102 determines that the second network element stores the first information which has not been updated.
- step 2204 reference may be made to step 2104 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information, so as to replace the unupdated first information with the updated first information.
- Step 2205 The second network element 102 replaces the non-updated first information with the updated first information.
- step 2205 reference may be made to step 2105 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information to generate the fifth information.
- Step 2206 The second network element 102 generates fifth information based on the updated first information and/or fourth information.
- step 2206 reference may be made to step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, so as to send the fifth information to the fourth network element 103 .
- Step 2207 The second network element 102 generates a second key based on the fourth information and the first key stored in the second network element.
- step 2207 reference may be made to step 2107 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the second key is used to determine K AF , so that the AF obtains the corresponding K AF after the first information of the terminal is updated, thereby realizing a complete AKMA service.
- Step 2208 The second network element 102 discovers the fourth network element 104 based on the updated first information.
- the second network element 102 may discover the fourth network element 104 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, the third network element, and the fourth network element.
- the second network element may determine the corresponding fourth network element based on the updated RID in the updated first information, so that the second network element discovers the fourth network element.
- Step 2209 the second network element 102 sends at least one of the fifth information, the second key and the fourth information to the fourth network element 104 .
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the fourth network element 104, so that the fourth network element 104 obtains the above information and the key.
- the fourth network element 104 may receive the fifth information, the second key and the fourth information sent by the second network element 102. At least one of the following.
- the fourth network element is discovered by the updated first information, that is, the fourth network element is the fourth network element indicated by the RID in the updated first information.
- AUSF 1 may send at least one of A-KID, SUPI and K AKMA to AUSF 2 .
- the fourth network element 104 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the fourth network element 104 .
- the fourth network element 104 may discover the third network element 103 based on the updated first information to send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the first information may be indication information configured by the first network element for the terminal, and is used to identify the first network element, the second network element, and the third network element.
- the fourth network element may determine the corresponding third network element based on the updated RID in the updated first information, so that the fourth network element discovers the third network element.
- the fourth network element is AUSF 2 and the third network element is AAnF.
- AUSF 2 can determine the AAnF corresponding to the updated RID based on the updated RID, so that AUSF 2 finds the AAnF and sends at least one of A-KID, SUPI and K AKMA to the AAnF.
- the AF receives the fifth information sent by the terminal, and based on the RID in the fifth information, the AF can discover the third network element, and based on the received fifth information, the AF can obtain K AF from the third network element.
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the AF may send the fifth information received from the terminal to a network exposure function (NEF), so that the NEF discovers the third network element through the received fifth information, and the NEF may obtain K AF from the third network element based on the received fifth information.
- NEF network exposure function
- an AKMA service is implemented, so that the AF can discover the third network element and obtain K AF when the terminal updates the first information.
- the communication method involved in the embodiments of the present disclosure may include at least one of step 2201 to step 2210.
- step 2201 may be implemented as an independent embodiment
- step 2203 may be implemented as an independent embodiment
- step 2210 may be implemented as an independent embodiment
- steps 2201+2202+2203 may be implemented as an independent embodiment
- steps 2204+2205 may be implemented as an independent embodiment, but are not limited thereto.
- step 2204 and step 2205 are replaceable steps, that is, step 2204 and step 2205 may not be executed.
- step 2204 and step 2205 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- step 2201 and step 2202 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG3a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3a, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- Step 3101 determine whether the first condition is met.
- step 3101 reference may be made to step 2101 in FIG. 2a, step 2201 in FIG. 2b, and other related parts in the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the first network element 101 determines whether a first condition is satisfied to determine whether the terminal receives updated first information.
- the first network element 101 may determine whether the first condition is met based on the second information sent by the terminal and the third information stored in the first network element.
- step 3101 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- Step 3102 discover the second network element.
- step 3102 reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
- the first network element 101 may directly discover the second network element 102 .
- step 3102 is omitted and the above functions are default or by default.
- the second network element may be discovered by the updated first information.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 3103 under the first condition, send an updated first parameter set to the second network element.
- step 3103 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- step 3103 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- step 3101 and step 3102 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG3b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3b, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- step 3201 reference may be made to step 2102 of FIG. 2a, step 2202 of FIG. 2b, step 3102 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
- the first network element 101 discovers the second network element 102 based on the updated first information to send the first parameter set to the second network element.
- the first network element 101 may directly discover the second network element 102 .
- step 3201 is omitted and the above functions are default or by default.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 3202 Send an updated first parameter set to the second network element.
- step 3202 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 3a, which will not be described in detail here.
- the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information.
- the first network element 101 may send the updated first parameter set to the second network element 102 under the first condition; or directly send the updated first parameter set to the second network element 102 under the first condition. Send the updated first parameter set.
- the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
- step 3202 is omitted and the above functions are default or by default.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- steps 3201 - 3202 please refer to the embodiments shown in FIG. 2 a and FIG. 2 b .
- the communication method involved in the embodiment of the present disclosure may include at least one of step 3201 and step 3202.
- step 3201 may be implemented as an independent embodiment
- step 3202 may be implemented as an independent embodiment, but is not limited thereto.
- each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
- FIG3c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3c, the present disclosure embodiment relates to a communication method, which is used for a first network element 101, and the method includes:
- Step 3301 Send an updated first parameter set to a second network element.
- step 3301 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 3103 of FIG. 3a, step 3202 of FIG. 3b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 3a and FIG. 3b, which will not be described in detail here.
- the first network element 101 sends the updated first parameter set to the second network element 102 so that the second network element obtains the above information.
- the first network element 101 may send the updated first parameter set to the second network element 102 under the first condition, or may directly send the updated first parameter set to the second network element 102.
- the second network element 102 may receive the updated first parameter set sent by the first network element 101 .
- the first parameter set is used for application authentication and key management AKMA services, and the first parameter set includes at least updated first information.
- the first network element 101 determines whether the first condition is satisfied. Specifically, the first network element 101 determines whether the second information sent by the terminal is consistent with the third information stored in the first network element 101. If the second information is consistent with the third information, it is determined that the first condition is satisfied.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the second network element is, for example, an AUSF, but is not limited thereto.
- step 3301 please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
- Step 4101 receiving a first parameter set.
- step 4101 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- step 4101 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4102 Determine whether the second network element stores unupdated first information.
- step 4102 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information.
- step 4102 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4103 replacing the non-updated first information with the updated first information.
- step 4103 reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information.
- step 4103 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4104 generate the fifth information.
- step 4104 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4104 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4105 generate a second key.
- step 4105 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4105 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4106 discover the third network element.
- step 4106 reference may be made to step 2108 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may discover the third network element.
- the third network element may be discovered based on the updated first information.
- step 4106 is omitted and the above functions are default or acquiescent.
- the third network element is, for example, AAnF, but is not limited thereto.
- Step 4107 sending at least one of the fifth information, the second key and the fourth information.
- step 4107 reference may be made to step 2109 in FIG. 2a and other related parts of the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key and the fourth information to the third network element 103 .
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4106 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4101 to step 3107.
- step 4101 may be implemented as an independent embodiment
- step 4104 may be implemented as an independent embodiment
- steps 4102+4103 may be implemented as independent embodiments but are not limited thereto.
- step 4102 and step 4103 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4b, the present disclosure embodiment relates to a communication method, which is used for a second network element 102, and the method includes:
- Step 4201 receiving a first parameter set.
- step 4201 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4201 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4202 determining that the second network element stores unupdated first information.
- step 4202 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4102 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may determine that the second network element stores unupdated first information.
- step 4202 is omitted and the above functions are default or by default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4203 replacing the non-updated first information with the updated first information.
- step 4203 reference may be made to step 2105 of FIG. 2a, step 2205 of FIG. 2b, step 4103 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may replace the non-updated first information with the updated first information.
- step 4303 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4204 generate the fifth information.
- step 4204 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4204 is omitted and the above functions are default or by default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4205 generate a second key.
- step 4205 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b and FIG. 4a, which will not be described in detail here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4205 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4206 discover the fourth network element.
- step 4206 reference may be made to step 2208 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
- the second network element 102 may discover the fourth network element.
- the fourth network element may be discovered based on the updated first information.
- step 4206 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- Step 4207 sending at least one of the fifth information, the second key and the fourth information.
- step 4207 reference may be made to step 2209 in FIG. 2b and other related parts of the embodiment involved in FIG. 2b , which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
- the fourth network element 104 may receive at least one of the fifth information, the second key and the fourth information sent by the second network element 102 .
- step 4207 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4201 to step 4207.
- step 4201 may be implemented as an independent embodiment
- step 4204 may be implemented as an independent embodiment
- steps 4202+4203 may be implemented as independent embodiments but are not limited thereto.
- step 4202 and step 4203 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4c, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4301 receiving a first parameter set.
- step 4301 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4301 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4302 generate the fifth information.
- step 4302 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4302 is omitted and the above functions are default or default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4303 generate a second key.
- step 4303 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4106 of FIG. 4a, step 4206 of FIG. 4b, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a and FIG. 4b, which will not be repeated here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4303 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4304 discover the third network element.
- step 4304 reference may be made to step 2108 of FIG. 2a, step 4107 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
- the second network element 102 may discover the third network element.
- the third network element may be discovered based on the updated first information.
- step 4304 is omitted and the above functions are default or by default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- Step 4305 sending at least one of the fifth information, the second key and the fourth information.
- step 4305 reference may be made to step 2109 of FIG. 2a, step 4108 of FIG. 4a, and other related parts of the embodiments involved in FIG. 2a and FIG. 4a, which will not be described in detail here.
- the third network element 103 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4305 is omitted and the above functions are default or default.
- the second network element is, for example, an AUSF, but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4301 to step 4305.
- step 4301 may be implemented as an independent embodiment
- step 4305 may be implemented as an independent embodiment
- step 4301+4302 may be implemented as an independent embodiment but is not limited thereto.
- steps 4302-4305 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4d is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4d, the embodiment of the present disclosure relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4401 receiving a first parameter set.
- step 4401 reference may be made to step 2104 of FIG. 2a, step 2204 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101 .
- the first network element 101 may send a first parameter set to the second network element 102 .
- step 4401 is omitted and the above functions are default or acquiescent.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4402 generate the fifth information.
- step 4402 reference may be made to step 2106 of FIG. 2a, step 2206 of FIG. 2b, step 4104 of FIG. 4a, step 4204 of FIG. 4b, step 4302 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may generate the fifth information.
- the fifth information may be generated based on the updated first information and/or the fourth information.
- the fifth information is used to identify the second key.
- step 4402 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, an AUSF, but is not limited thereto.
- Step 4403 generate a second key.
- step 4403 reference may be made to step 2107 of FIG. 2a, step 2207 of FIG. 2b, step 4105 of FIG. 4a, step 4205 of FIG. 4b, step 4303 of FIG. 4c, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b and FIG. 4c, which will not be repeated here.
- the second network element 102 may generate a second key.
- the second key may be generated based on the fourth information and the first key stored in the second network element 102 .
- step 4403 is omitted and the above functions are default or default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- Step 4404 discover the fourth network element.
- Step 4404 can refer to step 2208 of FIG. 2b, step 4206 of FIG. 4b, and other related embodiments of FIG. 2b and FIG. 4b. part, which will not be described here.
- the second network element 102 may discover the fourth network element.
- the fourth network element may be discovered based on the updated first information.
- step 4404 is omitted and the above functions are default or by default.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- Step 4405 sending at least one of the fifth information, the second key and the fourth information.
- step 4405 reference may be made to step 2209 of FIG. 2b, step 4207 of FIG. 4b, and other related parts of the embodiments involved in FIG. 2b and FIG. 4b, which will not be described in detail here.
- the second network element 102 may send at least one of the fifth information, the second key, and the fourth information to the fourth network element 104 .
- the fourth network element 104 may receive at least one of the fifth information, the second key, and the fourth information sent by the second network element 102 .
- step 4405 is omitted and the above functions are default or acquiescent.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4401 to step 4405.
- step 4401 may be implemented as an independent embodiment
- step 4405 may be implemented as an independent embodiment
- step 4401+4402 may be implemented as an independent embodiment but is not limited thereto.
- steps 4402 to 4405 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG4e is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4e, the present disclosure embodiment relates to a communication method, which is used for the second network element 102, and the method includes:
- Step 4501 receiving a first parameter set.
- step 4501 reference may be made to step 2103 of FIG. 2a, step 2203 of FIG. 2b, step 4101 of FIG. 4a, step 4201 of FIG. 4b, step 4301 of FIG. 4c, step 4401 of FIG. 4d, and other related parts in the embodiments involved in FIG. 2a, FIG. 2b, FIG. 4a, FIG. 4b, FIG. 4c and FIG. 4d, which will not be repeated here.
- the second network element 102 may receive a first parameter set sent by the first network element 101, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the second network element 102 may generate fifth information based on the updated first information and/or fourth information, wherein the fifth information is used to identify the second key.
- the second network element 102 may generate a second key based on the fourth information and the first key stored in the second network element.
- the second network element 102 may discover the third network element 103 based on the updated first information.
- the second network element 102 may send at least one of the following to the third network element: fifth information, second key, fourth information.
- the second network element 102 may discover the fourth network element 104 based on the updated first information, and send at least one of the following to the fourth network element 104: the fifth information, the second key, and the fourth information.
- the fourth network element 104 is configured to discover the third network element 103 based on the updated first information.
- the fourth network element 104 is further configured to send at least one of the following to the third network element 103: fifth information, second key, fourth information.
- the second network element 102 may determine that the second network element 102 stores unupdated first information; and replace the unupdated first information with the updated first information.
- the second network element 102 may determine that the second network element 102 stores non-updated fifth information generated using non-updated first information; and generate the fifth information using the updated first information.
- the second network element 102 may send at least one of the following to the third network element 103 or the fourth network element 104: fifth information, second key, fourth information.
- the first network element is, for example, a UDM, but is not limited thereto.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the fourth network element is, for example, AUSF 2 , but is not limited thereto.
- step 4501 please refer to the embodiments shown in FIG. 2a and FIG. 2b above.
- FIG5 is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5, the present disclosure embodiment relates to a communication method, which is used for a third network element 103, and the method includes:
- Step 5101 receiving at least one of the fourth information, the fifth information, and the second key.
- step 5101 reference may be made to step 2109 in FIG. 2a, step 2210 in FIG. 2b, and other related parts of the embodiments involved in FIG. 2a and FIG. 2b, which will not be described in detail here.
- the third network element 103 can receive at least one of the fourth information, the fifth information, and the second key sent by the second network element 102 or the fourth network element 104.
- the fifth information is generated by the updated first information included in the first parameter set, and the first parameter set is used for application authentication and key management AKMA service.
- the first parameter set also includes fourth information, and the fourth information is used to identify the terminal.
- the fifth information is used to identify the second key.
- the third network element 103 is discovered based on the updated first information.
- the second network element is, for example, AUSF 1 , but is not limited thereto.
- the third network element is, for example, AAnF, but is not limited thereto.
- the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
- FIG6a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6a, the present disclosure embodiment designs a communication method, and the method includes:
- step 6101 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b and 3c, which will not be repeated here.
- Step 6102 the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the third network element 103.
- the above method may include the method described in the above embodiments of the first network element side, the second network element side, the third network element side, etc., which will not be repeated here.
- FIG6b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG6b, the present disclosure embodiment designs a communication method, and the method includes:
- step 6201 can be found in step 2101 of Figure 2a, step 2201 of Figure 2b, step 3101 of Figure 3a, step 3201 of Figure 3b, step 3301 of Figure 3c, step 6101 of Figure 6a and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b, 3c and 6a, which will not be repeated here.
- Step 6202 the second network element 102 sends at least one of the fourth information, the fifth information, and the second key to the fourth network element 104.
- step 6202 may refer to step 2209 of FIG. 2b , step 4207 of FIG. 4b , step 4205 of FIG. 4d and other related parts in the embodiments involved in FIG. 2a , FIG. 4b , and FIG. 4d , which will not be described in detail here.
- step 6202 may refer to step 2210 of FIG. 2b , step 5101 of FIG. 5 , and other related parts of the embodiments involved in FIG. 2b and FIG. 5 , which will not be described in detail here.
- FIG7a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7a, the communication method of the embodiment of the present disclosure includes:
- Step 7101 sending SUPI and updated RID.
- the UDM may send the SUPI and the updated RID to the AUSF.
- the UDM before executing step 7101, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7102 Send updated A-KID, SUPI and K AKMA to AAnF.
- the AUSF may send the SUPI and the updated RID to the AAnF.
- the AUSF receives the SUPI and the updated RID, and the AUSF may determine to generate an updated A-KID based on the updated RID and the SUPI. At the same time, the AUSF may generate K AKMA based on the received SUPI and the stored K AUSF .
- the AUSF may discover the AANF based on the updated RID.
- AUSF may delete or have deleted the unsaved and unupdated A-KID and K AKMA , that is, AUSF does not store the unupdated A-KID and K AKMA locally, then AUSF needs to generate A-KID and K AKMA in real time based on the updated RID, SUPI and stored K AUSF .
- Step 7103 send confirmation message.
- the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7104 Get K AF based on the updated A-KID.
- the AF may obtain K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 7101 to step 7104.
- step 7101 may be implemented as an independent embodiment
- step 7104 may be implemented as an independent embodiment
- step 7101+7102 may be implemented as an independent embodiment but is not limited thereto.
- steps 7102 to 7104 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG7b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7b, the communication method of the embodiment of the present disclosure includes:
- Step 7201 send SUPI and updated RID.
- the UDM may send the SUPI and the updated RID to the AUSF.
- the UDM before executing step 7201, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7202 obtain A-KID and K AKMA .
- AUSF 1 receives the SUPI and the updated RID, and AUSF 1 may determine the A-KID based on the updated RID and SUPI.
- AUSF 1 determines K AKMA based on the received SUPI and the stored K AUSF .
- AUSF 1 may discover AUSF 2 based on the updated RID.
- Step 7203 sending A-KID, SUPI and K AKMA .
- AUSF 1 may send SUPI, A-KID, K AKMA to AUSF 2 .
- Step 7204 send A-KID, SUPI and K AKMA .
- AUSF 2 may send SUPI, A-KID, K AKMA to AAnF.
- AUSF 2 may discover the AAnF based on the updated RID.
- Step 7205 send confirmation message.
- the AAnF may send a confirmation message to the AUSF 2 , indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7206 obtain K AF based on the updated A-KID.
- the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF using an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 7201 to step 7206.
- step 7201 may be implemented as an independent embodiment
- step 7204 may be implemented as an independent embodiment
- step 7201+7202 may be implemented as an independent embodiment but is not limited thereto.
- steps 7202-7206 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG7c is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG7c, the communication method of the embodiment of the present disclosure includes:
- the UDM may send the SUPI and updated RID to the AUSF.
- the UDM before executing step 7301, further includes determining that the UE successfully receives the updated RID, that is, the UDM compares the received UPU-MAC-I UE with the UPU-XMAC-I UE temporarily stored by the UDM, and if the received UPU-MAC-I UE is the same as the UPU-XMAC-I UE, the UDM can confirm that the UE successfully receives the updated RID. Then the UDM can send the SUPI and the updated RID to the AUSF.
- Step 7302 determine A-KID and K AKMA .
- the AUSF receives the SUPI and the new RID and may check whether the A-KID should be updated.
- the SUPI received by the AUSF has been locally stored, and the AUSF may update the locally stored A-KID identified by the SUPI.
- the AUSF may generate an updated A-KID by replacing the RID in the original A-KID with the updated RID.
- the AUSF may send the SUPI and the updated RID to the AAnF.
- the AUSF may determine a locally stored K AKMA based on the received SUPI.
- the AUSF may discover the AAnF based on the updated RID.
- the AUSF locally stores the unupdated A-Kid and Kakma.
- the AUSF may determine the unupdated A-KID and the locally stored Kakma based on the received SUPI, and update the unupdated A-KID based on the received updated RID.
- Step 7303 sending updated A-KID, SUPI and K AKMA .
- the AUSF may send the updated A-KID, SUPI and locally stored K AKMA to the AAnF.
- Step 7304 send confirmation message.
- the AAnF may send a confirmation message to the AUSF, indicating that the updated A-KID, SUPI and K AKMA have been received.
- Step 7305 Get K AF based on the updated A-KID.
- the AF may retrieve K AF from the AAnF using the updated A-KID sent by the UE.
- the AF may discover the AAnF based on an updated RID, wherein the updated RID is included in the A-KID sent by the UE.
- the AF may send an updated A-KID to the NEF, so that the NEF discovers the AAnF through the updated A-KID.
- the AF may send an updated A-KID to the NEF, so that the NEF obtains K AF from the AAnF through the updated A-KID.
- step 7301 may be implemented as an independent embodiment
- step 7304 may be implemented as an independent embodiment
- step 7301+7302 may be implemented as an independent embodiment but is not limited thereto.
- steps 7302-7304 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- the embodiments of the present disclosure also propose a device for implementing any of the above methods, for example, a device is proposed, the above device includes a unit or module for implementing each step performed by the terminal in any of the above methods.
- a device is also proposed, including a unit or module for implementing each step performed by a network device (such as an access network device, a core network function node, a core network device, etc.) in any of the above methods.
- a network device such as an access network device, a core network function node, a core network device, etc.
- the division of the units or modules in the above device is only a division of logical functions, which can be fully or partially integrated into one physical entity or physically separated in actual implementation.
- the units or modules in the device can be implemented in the form of a processor calling software: for example, the device includes a processor, the processor is connected to a memory, and instructions are stored in the memory.
- the processor calls the instructions stored in the memory to implement any of the above methods or implement the functions of the units or modules of the above device, wherein the processor is, for example, a general-purpose processor, such as a central processing unit (CPU) or a microprocessor, and the memory is a memory inside the device or a memory outside the device.
- CPU central processing unit
- microprocessor a microprocessor
- the units or modules in the device may be implemented in the form of hardware circuits, and the functions of some or all of the units or modules may be implemented by designing the hardware circuits.
- the hardware circuits may be understood as one or more processors; for example, in one implementation, the hardware circuits are application-specific integrated circuits (ASICs), and the functions of some or all of the above units or modules may be implemented by designing the logical relationship of the components in the circuits; for another example, in another implementation, the hardware circuits may be implemented by programmable logic devices (PLDs), and Field Programmable Gate Arrays (FPGAs) may be used as an example, which may include a large number of logic gate circuits, and the connection relationship between the logic gate circuits may be configured by configuring the configuration files, thereby implementing the functions of some or all of the above units or modules. All units or modules of the above devices may be implemented in the form of software called by the processor, or in the form of hardware circuits, or in the form of software called by the processor, and the remaining part may be implemented in
- the processor is a circuit with signal processing capability.
- the processor may be a circuit with instruction reading and execution capability, such as a central processing unit (CPU), a microprocessor, a graphics processing unit (GPU) (which may be understood as a microprocessor), or a digital signal processor (DSP).
- the processor may implement certain functions through the logical relationship of the hardware circuit, and the logical relationship of the above hardware circuit is fixed.
- reconfigurable for example, a processor is a hardware circuit implemented by an application-specific integrated circuit (ASIC) or a programmable logic device (PLD), such as an FPGA.
- ASIC application-specific integrated circuit
- PLD programmable logic device
- the processor loads a configuration document to implement the process of hardware circuit configuration, which can be understood as the process of the processor loading instructions to implement the functions of some or all of the above units or modules.
- a hardware circuit designed for artificial intelligence which can be understood as an ASIC, such as a neural network processing unit (NPU), a tensor processing unit (TPU), a deep learning processing unit (DPU), etc.
- NPU neural network processing unit
- TPU tensor processing unit
- DPU deep learning processing unit
- FIG8a is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure.
- the communication device includes: a transceiver module 8101.
- the transceiver module is used to send a first parameter set to a second network element, the first parameter set is used to apply authentication and key management AKMA services, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2203, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- the communication device further includes a processing module 8102, and the processing module is used to execute at least one of the other steps (for example, step 2101, step 2102, step 2201, step 2202, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- the processing module is used to execute at least one of the other steps (for example, step 2101, step 2102, step 2201, step 2202, but not limited to this) executed by the first network element 101 in any of the above methods, which will not be repeated here.
- FIG8b is a schematic diagram of the structure of the communication device proposed in the embodiment of the present disclosure.
- the communication device includes: a transceiver module 8201.
- the transceiver module is used to receive a first parameter set sent by a first network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2103, step 2109, step 2203, step 2209, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here.
- the communication device also includes a processing module 8202, which is used to execute at least one of the other steps performed by the first network element 101 in any of the above methods (for example, step 2104, step 2105, step 2106, step 2107, step 2108, step 2204, step 2205, step 2206, step 2207, step 2208, but not limited to these), which are not repeated here.
- a processing module 8202 which is used to execute at least one of the other steps performed by the first network element 101 in any of the above methods (for example, step 2104, step 2105, step 2106, step 2107, step 2108, step 2204, step 2205, step 2206, step 2207, step 2208, but not limited to these), which are not repeated here.
- FIG8c is a schematic diagram of the structure of a communication device proposed in an embodiment of the present disclosure.
- the communication device includes: a transceiver module 8301.
- the transceiver module is used to receive a first parameter set sent by a second network element or a fourth network element, wherein the first parameter set is used for application authentication and key management AKMA service, and the first parameter set includes at least updated first information.
- the transceiver module is used to execute at least one of the communication steps such as sending and/or receiving (for example, step 2109, step 2210, but not limited thereto) performed by the second network element 102 in any of the above methods, which will not be repeated here.
- the communication device 9100 includes one or more processors 9101.
- the processor 9101 may be a general-purpose processor or a dedicated processor, for example, a baseband processor or a central processing unit.
- the baseband processor may be used to process the communication protocol and the communication data
- the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a program, and process the data of the program.
- the processor 9101 is used to call instructions so that the communication device 9100 executes any of the above methods.
- the communication device 9100 further includes one or more memories 9102 for storing instructions.
- the memory 9102 may also be outside the communication device 9100.
- the communication device 9100 further includes one or more transceivers 9103.
- the communication steps such as sending and receiving in the above method are performed by the transceiver 9103, and the other steps are performed by the processor 9101.
- the transceiver may include a receiver and a transmitter, and the receiver and the transmitter may be separate or integrated.
- the terms such as transceiver, transceiver unit, transceiver, transceiver circuit, etc. may be replaced with each other, the terms such as transmitter, transmission unit, transmitter, transmission circuit, etc. may be replaced with each other, and the terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
- the communication device 9100 further includes one or more interface circuits 9104, which are connected to the memory 9102.
- the interface circuit 9104 can be used to receive signals from the memory 9102 or other devices, and can be used to send signals to the memory 9102 or other devices.
- the interface circuit 9104 can read instructions stored in the memory 9102 and send the instructions to the processor 9101.
- the communication device 9100 described in the above embodiments may be a network device or a terminal, but the scope of the communication device 9100 described in the present disclosure is The scope is not limited to this, and the structure of the communication device 9100 may not be limited by Figure 9a.
- the communication device may be an independent device or may be part of a larger device.
- the communication device may be: 1) an independent integrated circuit IC, or a chip, or a chip system or subsystem; (2) a collection of one or more ICs, optionally, the above IC collection may also include a storage component for storing data and programs; (3) an ASIC, such as a modem; (4) a module that can be embedded in other devices; (5) a receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handheld device, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligence device, etc.; (6) others, etc.
- Fig. 9b is a schematic diagram of the structure of a chip 9200 provided in an embodiment of the present disclosure.
- the communication device 9100 may be a chip or a chip system
- the chip 9200 includes one or more processors 9201, and the processor 9201 is used to call instructions so that the chip 9200 executes any of the above methods.
- the chip 9200 further includes one or more interface circuits 9202, which are connected to the memory 9203.
- the interface circuit 9202 can be used to receive signals from the memory 9203 or other devices, and the interface circuit 9202 can be used to send signals to the memory 9203 or other devices.
- the interface circuit 9202 can read instructions stored in the memory 9203 and send the instructions to the processor 9201.
- the terms such as interface circuit, interface, transceiver pin, and transceiver can be replaced with each other.
- the chip 9200 further includes one or more memories 9203 for storing instructions.
- the memory 9203 may be outside the chip 9200.
- the present disclosure also proposes a storage medium, on which instructions are stored, and when the instructions are executed on the communication device 9100, the communication device 9100 executes any of the above methods.
- the storage medium is an electronic storage medium.
- the storage medium is a computer-readable storage medium, but is not limited to this, and it can also be a storage medium readable by other devices.
- the storage medium can be a non-transitory storage medium, but is not limited to this, and it can also be a temporary storage medium.
- the present disclosure also proposes a program product, which, when executed by the communication device 9100, enables the communication device 9100 to execute any of the above methods.
- the program product is a computer program product.
- the computer program product includes one or more computer programs.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a high-density digital video disc (DVD)
- DVD high-density digital video disc
- SSD solid state disk
- the corresponding relationships shown in the tables in the present disclosure can be configured or predefined.
- the values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure.
- the corresponding relationships shown in some rows may not be configured.
- appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
- the names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device.
- other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
- the predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente divulgation concerne un procédé et un appareil de communication, un dispositif de communication, un support de stockage et un système de communication. Le procédé comprend les étapes suivantes : un premier élément de réseau envoie un premier ensemble de paramètres à un second élément de réseau, le premier ensemble de paramètres étant utilisé pour un service d'authentification et de gestion de clé pour des applications (AKMA), et le premier ensemble de paramètres comprenant au moins des premières informations mises à jour. Selon le procédé de la présente divulgation, le premier ensemble de paramètres est envoyé au second élément de réseau de telle sorte que le second élément de réseau obtienne le premier ensemble de paramètres mis à jour par un terminal, ce qui permet d'obtenir le service AKMA.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/106430 WO2025010561A1 (fr) | 2023-07-07 | 2023-07-07 | Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication |
| CN202380010059.6A CN117099343A (zh) | 2023-07-07 | 2023-07-07 | 通信方法、装置、通信设备、存储介质及通信系统 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2023/106430 WO2025010561A1 (fr) | 2023-07-07 | 2023-07-07 | Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025010561A1 true WO2025010561A1 (fr) | 2025-01-16 |
Family
ID=88777709
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/106430 Pending WO2025010561A1 (fr) | 2023-07-07 | 2023-07-07 | Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN117099343A (fr) |
| WO (1) | WO2025010561A1 (fr) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113541925A (zh) * | 2020-03-30 | 2021-10-22 | 华为技术有限公司 | 通信系统、方法及装置 |
| WO2022160658A1 (fr) * | 2021-01-28 | 2022-08-04 | 中兴通讯股份有限公司 | Procédé et appareil d'enregistrement, procédé et appareil d'authentification, procédé et appareil de détermination d'indicateur de routage, entité et terminal |
| WO2023008929A1 (fr) * | 2021-07-28 | 2023-02-02 | Samsung Electronics Co., Ltd. | Appareil et procédé d'établissement de communication dans l'authentification et la gestion de clés pour des applications (akma) |
| WO2023016160A1 (fr) * | 2021-08-08 | 2023-02-16 | 华为技术有限公司 | Procédé d'établissement de session et appareil associé |
-
2023
- 2023-07-07 WO PCT/CN2023/106430 patent/WO2025010561A1/fr active Pending
- 2023-07-07 CN CN202380010059.6A patent/CN117099343A/zh active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113541925A (zh) * | 2020-03-30 | 2021-10-22 | 华为技术有限公司 | 通信系统、方法及装置 |
| WO2022160658A1 (fr) * | 2021-01-28 | 2022-08-04 | 中兴通讯股份有限公司 | Procédé et appareil d'enregistrement, procédé et appareil d'authentification, procédé et appareil de détermination d'indicateur de routage, entité et terminal |
| WO2023008929A1 (fr) * | 2021-07-28 | 2023-02-02 | Samsung Electronics Co., Ltd. | Appareil et procédé d'établissement de communication dans l'authentification et la gestion de clés pour des applications (akma) |
| WO2023016160A1 (fr) * | 2021-08-08 | 2023-02-16 | 华为技术有限公司 | Procédé d'établissement de session et appareil associé |
Non-Patent Citations (1)
| Title |
|---|
| ZTE: "Update clause 6.1 about Routing identifier", 3GPP DRAFT; S3-212532, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), vol. SA WG3, 9 August 2021 (2021-08-09), FR, XP052063189 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN117099343A (zh) | 2023-11-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110049070B (zh) | 事件通知方法及相关设备 | |
| EP3656108B1 (fr) | Services de fonction de stockage de données non structurées (udsf) | |
| CN110351111B (zh) | 一种订阅处理方法、网络节点及用户数据库 | |
| CN114071649B (zh) | 访问本地网络的方法和装置 | |
| WO2022022322A1 (fr) | Procédé et dispositif pour accéder à un réseau local | |
| US20220312309A1 (en) | Method and Apparatus for Reporting User Plane Function Information, Storage Medium, and Electronic Apparatus | |
| WO2025024985A1 (fr) | Procédé de gestion de communication, appareil, support de stockage et système | |
| WO2025020050A1 (fr) | Procédé de découverte de relais, appareil, dispositif de communication, support de stockage et système de communication | |
| US20250142455A1 (en) | Information processing method and apparatus, communication device, and readable storage medium | |
| WO2025010561A1 (fr) | Procédé et appareil de communication, dispositif de communication, support de stockage et système de communication | |
| WO2025010570A1 (fr) | Procédé et appareil de communication, et dispositif de communication, support de stockage, et système de communication | |
| US12294618B2 (en) | Method and apparatus for registering user information | |
| CN115209522B (zh) | 网络功能注册方法、发现方法、装置、设备及介质 | |
| WO2024234274A1 (fr) | Procédé et appareil d'envoi d'informations, procédé et appareil d'acquisition d'informations, dispositif, et support de stockage | |
| WO2024050778A1 (fr) | Procédé et appareil de mise à jour de politique de service d'intelligence artificielle | |
| CN116828546A (zh) | 非3gpp设备的会话通道建立方法、装置及设备 | |
| CN116744346A (zh) | 网络故障的处理方法、终端、接入网设备及核心网设备 | |
| US20250211974A1 (en) | Target information obtaining method and apparatus, information obtaining method and apparatus, and device | |
| EP4664788A1 (fr) | Procédé et appareil d'acquisition d'informations de couverture de satellite, dispositif et support de stockage | |
| WO2025217768A1 (fr) | Procédé et appareil de communication, dispositif de communication, système de communication et support de stockage | |
| WO2025030552A1 (fr) | Procédé et appareil de gestion de communication, et dispositif de communication, support de stockage, et système de communication | |
| WO2025156298A1 (fr) | Procédé de communication, appareil et support de stockage | |
| CN117835208A (zh) | 切片使用方法、装置、网络侧设备及终端 | |
| WO2025054983A1 (fr) | Procédé de communication, appareil et support de stockage | |
| WO2025179465A1 (fr) | Procédés de communication, dispositifs, système et support de stockage |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23944584 Country of ref document: EP Kind code of ref document: A1 |