WO2021164125A1 - 会话创建方法及相关设备 - Google Patents
会话创建方法及相关设备 Download PDFInfo
- Publication number
- WO2021164125A1 WO2021164125A1 PCT/CN2020/087044 CN2020087044W WO2021164125A1 WO 2021164125 A1 WO2021164125 A1 WO 2021164125A1 CN 2020087044 W CN2020087044 W CN 2020087044W WO 2021164125 A1 WO2021164125 A1 WO 2021164125A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- signature certificate
- descriptors
- signature
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/164—Adaptation or special uses of UDP protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/79—Radio fingerprint
Definitions
- This application relates to the field of communication technology, and in particular to a session creation method and related equipment.
- the uplink data is created in the way of session creation in the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) protocol user equipment routing strategy (English: UE route selection policy, abbreviated as: URSP) rules
- 3rd Generation Partnership Project 3rd Generation Partnership Project
- URSP UE route selection policy
- the application identifier (English: Application descriptor) option is defined in the traffic descriptor (English: Trafficdescriptor).
- the Application descriptors can match the 5GC network configuration, but the existing Application descriptors may be tampered with or forged, causing confusion in session creation and affecting network reliability.
- the embodiment of the application discloses a session creation method, which can realize effective management of Application descriptors, realize session creation, and improve network reliability.
- the first aspect of the embodiments of the present application discloses a session creation method, including:
- the UE matches the signature certificate of the first application or the digital fingerprint of the signature certificate with the application descriptors in the URSP rule of the user equipment routing policy issued by the network side, and the UE creates a session of the first application.
- the second aspect of the embodiments of the present application discloses a session communication method, and the method includes the following steps:
- the network device sends a user equipment routing policy URSP policy message containing application descriptors corresponding to the first application to the user equipment UE,
- the network device receives the session request sent by the UE, and creates a session of the first application program through the session request.
- the third aspect of the embodiments of the present application discloses a terminal, including a processor, a memory, a communication interface, and one or more programs.
- the one or more programs are stored in the memory and configured by the Executed by the processor, the program includes instructions for executing the steps in the method described in the first aspect or the method described in the second aspect.
- the fourth aspect of the embodiments of the present application discloses a computer-readable storage medium, which is characterized by storing a computer program for electronic data exchange, wherein the computer program causes a computer to execute the method described in the first aspect or the second aspect. The method described in the method.
- the fifth aspect of the embodiments of the present application discloses a computer program product, wherein the above-mentioned computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the above-mentioned computer program is operable to cause a computer to execute operations as in the embodiments of the present application. Part or all of the steps described in the method described in the first aspect or the second aspect.
- the computer program product may be a software installation package.
- the technical solution provided by this application reads the signature certificate of the first application program or the digital fingerprint of the signature certificate during session creation, and the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate with
- the application descriptors in the URSP rules of the user equipment routing policy issued by the network side the UE creates the session of the first application, and the application descriptors are managed by the operator, which prevents other applications or programs from interacting with each other.
- Application descriptors are tampered to ensure the security of Application descriptors and the stability of the network.
- the technical solution of this application has no hardware dependency.
- Application developers register with the operator, and the operator’s management and control application signature certificate is used as Application descriptors, which can realize the operator’s authorization management of the application and provide users with differentiated value-added services to provide technical guarantee; the terminal system implementation complexity is very low, and the current
- the certificate signing mechanism of the smart device can be used directly.
- the application program distribution and installation phase eliminates the risk of application descriptors being tampered with or forged; before the application program uses data services, it does not need to access the network to complete the application descriptors guaranteed by authentication.
- FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
- Figure 2 is a session creation and sending method provided by an embodiment of the present application
- Figure 3 is a session communication sending method provided by an embodiment of the present application.
- FIG. 4 is a method for creating and sending a session provided by an embodiment of the present application.
- FIG. 5 is a user equipment sending method provided by an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a network device provided by an embodiment of the present application.
- Fig. 7 is a schematic structural diagram of a device provided by an embodiment of the present application.
- the "plurality” appearing in the embodiments of the present application refers to two or more than two.
- the descriptions of the first, second, etc. appearing in the embodiments of this application are only used for illustration and distinguishing the description objects, and there is no order, and it does not mean that the number of devices in the embodiments of this application is particularly limited, and does not constitute a reference to this application. Any limitations of the embodiment.
- the "connection” appearing in the embodiments of this application refers to various connection modes such as direct connection or indirect connection to realize communication between devices, which is not limited in the embodiments of this application.
- FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
- the communication system includes a base station 10 and a UE 20.
- the base station and the UE are connected through wireless communication.
- the wireless communication includes but is not limited to: LTE Connection, new radio (English: new radio, abbreviated: NR) connection; of course, in actual applications, other connection methods may also be used, and this application does not limit the specific connection methods described above.
- the above-mentioned base station may be an eNodeB, or may be an NR base station or an access point (English: access point, AP for short).
- the terminal in the embodiments of this application may refer to various forms of UE, access terminal, user unit, user station, mobile station, MS (English: mobile station, Chinese: mobile station), remote station, remote terminal, mobile device, User terminal, terminal equipment (English: terminal equipment), wireless communication equipment, user agent, or user device.
- Terminal devices can also be cellular phones, cordless phones, SIP (English: session initiation protocol, Chinese: Session Initiation Protocol) phones, WLL (English: wireless local loop, Chinese: wireless local loop) stations, PDA (English: personal digital) assistant, Chinese: personal digital processing), handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network or future evolution of PLMN (English : Public land mobile network, Chinese: public land mobile communication network), which is not limited in this embodiment of the application.
- the 5GC network requires the terminal to match and select the uplink transmission data route through the URSP rules issued by the network.
- the established PDU session can be reused, or a new PDU Session can be established.
- the Application descriptors option is defined in Traffic descriptors, and the terminal matches the uplink data route through the application identifier according to the URSP rules issued by the network.
- the application identifier in the URSP rule can be used by the network operator to provide differentiated QoS service quality for unwanted applications, thereby generating differentiated traffic control strategies or payment services.
- the 3GPP protocol defines URSP rules and the optional Application descriptors application identifier option, but does not specify how application identifiers are allocated and obtained. How does the operator control the app ID of the assigned application to match the 5GC network configuration, how the terminal obtains the app ID of the app when evaluating and selecting URSP routing rules, and how to prevent the app ID of the app from being used in app distribution, app installation, and terminal operating systems Has been tampered with or forged.
- PDU session creation will be based on the terminal's application descriptors (such as APP ID) when evaluating and selecting URSP routing rules. If the application descriptors of the application are forged or tampered with, it will cause confusion in session establishment and affect the reliability of the network. .
- FIG. 2 is a session creation method provided by an embodiment of the present application. The method is executed in the communication system as shown in FIG. 1. The method includes but is not limited to the following steps:
- Step S200 When the UE performs network connection, obtain the signature certificate of the first application program or the digital fingerprint of the signature certificate.
- the above-mentioned session is a protocol data unit session (English: PDU session).
- the Application descriptors provided in this application may specifically be Application descriptors defined by Traffic descriptors in the 3GPP protocol.
- the aforementioned Application descriptors include: an operating system identifier OSId and an operating system application identifier OSAppId.
- OSId operating system identifier
- OSAppId operating system application identifier
- Step S201 The UE matches the signature certificate of the first application or the digital fingerprint of the signature certificate with the application descriptors in the URSP rule of the user equipment routing policy issued by the network side, and the UE conducts the session of the first application create.
- the UE matches Application descriptors 1 as the Application descriptors in the user equipment routing policy URSP rule, and then creates or multiplexes the user routing protocol data unit PDU session.
- the above method may further include:
- the UE obtains a first application, where the first application includes: a signature certificate of the first application.
- the UE may obtain the first application program locally, for example, receive the first application program from other devices (including but not limited to: personal computers, other UEs, etc.) in a wired or wireless manner. program.
- the above-mentioned UE acquiring the first application program may also be acquired through a network method.
- the UE sends a request message for acquiring the first application program to the network device, and receives the information of the first application program returned by the network device. Installation file or installation package.
- the above method may further include:
- the UE receives the Application descriptors in the UPSP rules issued by the operator server.
- the digital fingerprint of the first application signature certificate is a character string encrypted by a one-way encryption algorithm.
- the aforementioned one-way encryption algorithms include, but are not limited to: hash algorithms, SHA-1 or SHA-256 algorithms, and so on.
- the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate and the application descriptor Application descriptors Otherwise, it is determined that the UE does not match the signature certificate of the first application or the digital fingerprint of the signature certificate and Application descriptors.
- the technical solution provided by this application reads the signature certificate of the first application program or the digital fingerprint of the signature certificate during session creation, and the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate with the user equipment issued by the network side Application descriptors in the URSP rule of the routing strategy, the UE creates the session of the first application, and the Application descriptors are managed by the operator, which prevents other applications or programs from tampering with the Application descriptors and ensures The security of Application descriptors ensures the stability of the network.
- the technical solution of this application has no hardware dependency.
- Application developers register with the operator, and the operator’s management and control application signature certificate is used as Application descriptors, which can realize the operator’s authorization management of the application and provide users with differentiated value-added services to provide technical guarantee; the terminal system implementation complexity is very low, and the current
- the certificate signing mechanism of the smart device can be used directly.
- the application program distribution and installation stage eliminates the risk of application descriptors being tampered with or forged; before the application program uses the data service, it does not need to access the network to complete the application descriptors guaranteed by authentication.
- Figure 3 provides a session communication method, which is implemented in the network system shown in Figure 1.
- the UE described in Figure 1 may be the UE of an application developer; the method is shown in Figure 3 Show, including the following steps:
- Step S300 The network device sends a user equipment routing policy URSP policy message containing application descriptors corresponding to the first application to the user equipment UE.
- Step S301 The network device receives the session request sent by the UE, and creates a session of the first application program through the session request.
- the network device receives the signature certificate of the first application program or the digital fingerprint of the signature certificate sent by the application development user; the network device sends the signature certificate of the first application program or the digital fingerprint of the signature certificate Digital fingerprints are used as Application descriptors in URSP rules.
- the network device receives a first application program sent by an application development user, where the first application program includes a signature certificate of the developer;
- the network device performs a second signature on the first application to obtain the network signature of the first application, the network signature includes the first application network signature certificate or the digital fingerprint of the network signature certificate, and the network signature
- the digital fingerprint of the signature certificate or network signature certificate is used as Application descriptors in the UPSP rules.
- the network device receives the signature certificate of the application developer sent by the application developer, and the network device performs a secondary signature on the signature certificate to obtain a secondary signature certificate, and sends the secondary signature certificate to the application developer , And instruct the application developer to carry the secondary signature certificate as the signature certificate of the application developer in the first application as Application descriptors in the UPSP rules.
- the network device receives a registration request sent by an application development user, where the registration request includes: the first application signing certificate or the digital fingerprint of the signing certificate;
- the network device completes the registration of the first application signature certificate or the digital fingerprint of the signature certificate according to the registration request.
- the technical solution provided by this application supports the realization of the session creation method as shown in FIG. 2 and improves the stability of the network.
- Figure 4 is a session creation method provided by an embodiment of the present application.
- the method is implemented under the network architecture shown in Figure 1.
- the UE in the method has two UEs.
- UE1 is used here. Different from UE2, where UE1 can be a user UE, and UE2 can be a UE of an application developer.
- the method provided in Figure 4 specifically includes the following steps:
- Step S400 UE2 sends the signature certificate of the first application program or the digital fingerprint of the signature certificate.
- Step S401 The network device receives the first application signature certificate or the digital fingerprint of the signature certificate, and uses the first application signature certificate or the digital fingerprint of the signature certificate as Application descriptors in the URSP rule.
- Step S402 UE2 publishes a first application program, and the first application program includes: a signature certificate of the first application program or a digital fingerprint of the signature certificate.
- Step S403 UE1 obtains the first application, and installs the first application.
- Step S404 UE1 receives Application descriptors in the URSP rule issued by the network device.
- Step S405 The UE1 obtains the signature certificate of the first application program or the digital fingerprint of the signature certificate from the first application program.
- Step S406 Match the signature certificate of the first application or the digital fingerprint of the signature certificate with the application descriptors in the URSP rule of the user equipment routing policy issued by the network side. After the matching is successful, the UE performs the first application Session creation of the program.
- the technical solution provided by this application reads the signature certificate of the first application program or the digital fingerprint of the signature certificate during session creation, and the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate with the user equipment issued by the network side Application descriptors in the URSP rule of the routing strategy, the UE creates the session of the first application, and the Application descriptors are managed by the operator, which prevents other applications or programs from tampering with the Application descriptors and ensures The security of Application descriptors ensures the stability of the network.
- the technical solution of this application has no hardware dependency.
- Application developers register with the operator, and the operator’s management and control application signature certificate is used as Application descriptors, which can realize the operator’s authorization management of the application and provide users with differentiated value-added services to provide technical guarantee; the terminal system implementation complexity is very low, and the current
- the certificate signing mechanism of the smart device can be used directly.
- the application program distribution and installation stage eliminates the risk of application descriptors being tampered with or forged; before the application program uses the data service, it does not need to access the network to complete the application descriptors guaranteed by authentication.
- step S401 in the embodiment shown in FIG. 4 can be replaced by the following steps.
- Step S401-1 The network device performs a second signature on the first application to obtain the network signature of the first application, and the network signature includes the first application network signature certificate or the digital fingerprint of the network signature certificate , Use the network signature certificate or the digital fingerprint of the network signature certificate as Application descriptors in the UPSP rule.
- step S400 and step S401 in the embodiment shown in FIG. 4 can be replaced by the following steps.
- Step S400-2 The network device receives the signature certificate of the application developer sent by the application developer user;
- step S401-2 the network device performs a secondary signature on the signature certificate to obtain a secondary signature certificate, sends the secondary signature certificate to the application development user, and instructs the application development user to
- the signature certificate is carried in the first application as the signature certificate of the application developer and serves as Application descriptors in the UPSP rules.
- FIG. 5 provides a user equipment UE50, and the foregoing UE may include:
- the obtaining unit 501 is configured to obtain the signature certificate of the first application program or the digital fingerprint of the signature certificate when the network connection is performed;
- the processing unit 502 is configured to match the signature certificate of the first application or the digital fingerprint of the signature certificate with the application descriptors in the URSP rule of the user equipment routing policy issued by the network side, and the UE performs the first application The session was created.
- the session is a protocol data unit session PDU session.
- the Application descriptors are Application descriptors defined by Traffic descriptors in the 3GPP protocol.
- the application descriptors include: operating system identifier OSId and operating system application identifier OSAppId.
- the UE further includes:
- the communication unit 503 is configured to receive the issued first application program, where the first application program includes: a signature certificate of the first application program.
- the digital fingerprint of the signature certificate of the first application program is a character string encrypted by a one-way encryption algorithm.
- the communication unit 503 may also be used to receive application descriptors in the UPSP rules issued by the operator server.
- the processing unit 502 is specifically configured to determine that the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate if the signature certificate of the first application program or the digital fingerprint of the signature certificate is consistent with the application program descriptor Application descriptors And Application descriptors, otherwise, it is determined that the UE does not match the signature certificate of the first application or the digital fingerprint of the signature certificate and Application descriptors.
- the technical solution provided by this application reads the signature certificate of the first application program or the digital fingerprint of the signature certificate during session creation, and the UE matches the signature certificate of the first application program or the digital fingerprint of the signature certificate with the user equipment issued by the network side Application descriptors in the URSP rule of the routing strategy, the UE creates the session of the first application, and the Application descriptors are managed by the operator, which prevents other applications or programs from tampering with the Application descriptors and ensures The security of Application descriptors ensures the stability of the network.
- the technical solution of this application has no hardware dependency.
- Application developers register with the operator, and the operator’s management and control application signature certificate is used as Application descriptors, which can realize the operator’s authorization management of the application and provide users with differentiated value-added services to provide technical support; the terminal system implementation complexity is very low, and the current The certificate signing mechanism of the smart device can be used directly.
- the application program distribution and installation phase eliminates the risk of application descriptors being tampered with or forged; before the application program uses data services, it does not need to access the network to complete the application descriptors guaranteed by authentication.
- FIG. 6 provides a network device 60.
- the foregoing network device may include:
- the communication unit 601 is configured to send a user equipment routing policy URSP policy message containing application descriptors corresponding to the first application to the user equipment UE; receive a session request sent by the UE;
- the processing unit 602 is configured to create a session of the first application program through a session request.
- the communication unit 601 is also configured to receive the signature certificate of the first application program or the digital fingerprint of the signature certificate sent by the application development user;
- the processing unit 602 is further configured for the network device to use the first application signature certificate or the digital fingerprint of the signature certificate as Application descriptors in the URSP rule.
- the communication unit 601 is further configured to receive a first application program sent by an application program development user, where the first application program includes a signature certificate of the developer;
- the processing unit 602 is further configured to perform a second signature on the first application to obtain a network signature of the first application, where the network signature includes the first application network signature certificate or the digital fingerprint of the network signature certificate , Use the network signature certificate or the digital fingerprint of the network signature certificate as Application descriptors in the UPSP rule.
- the communication unit 601 is further configured to receive the application developer's signature certificate sent by the application developer;
- the processing unit 602 is further configured to perform a secondary signature on the signature certificate to obtain a secondary signature certificate, send the secondary signature certificate to the application development user, and instruct the application development user to
- the signature certificate is carried in the first application as the signature certificate of the application developer and serves as Application descriptors in the UPSP rules.
- the communication unit 601 is further configured to receive a registration request sent by an application development user, where the registration request includes: the first application signing certificate or the digital fingerprint of the signing certificate;
- the processing unit 602 is further configured to complete the registration of the first application signature certificate or the digital fingerprint of the signature certificate according to the registration request.
- FIG. 7 is a device 70 provided by an embodiment of the present application.
- the device 70 includes a processor 701, a memory 702, and a communication interface 703.
- the processor 701, the memory 702, and the communication interface 703 communicate with each other through a bus 704. connect.
- the memory 702 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or Portable read-only memory (compact disc read-only memory, CD-ROM), the memory 702 is used for related computer programs and data.
- the communication interface 703 is used to receive and send data.
- the processor 701 may be one or more central processing units (CPUs). When the processor 701 is a CPU, the CPU may be a single-core CPU or a multi-core CPU.
- CPUs central processing units
- the processor 701 in the device 70 is configured to read the computer program code stored in the memory 702, and perform the following operations:
- the UE creates a session of the first application.
- each operation may also correspond to the corresponding description of the method embodiments shown in FIG. 2, FIG. 3, and FIG. 4.
- An embodiment of the present application also provides a chip system.
- the chip system includes at least one processor, a memory, and an interface circuit.
- the memory, the transceiver, and the at least one processor are interconnected by wires, and the at least one memory
- a computer program is stored therein; when the computer program is executed by the processor, the method flow shown in FIG. 2, FIG. 3, and FIG. 4 is realized.
- the embodiment of the present application also provides a computer-readable storage medium in which a computer program is stored. When it is run on a network device, the method flow shown in FIG. 2, FIG. 3, and FIG. 4 can be accomplish.
- the embodiment of the present application also provides a computer program product.
- the computer program product runs on a terminal, the method flow shown in FIG. 2, FIG. 3, and FIG. 4 can be realized.
- An embodiment of the present application also provides a terminal, including a processor, a memory, a communication interface, and one or more programs, the one or more programs are stored in the memory and configured to be executed by the processor
- the program includes instructions for executing the steps in the method of the embodiments shown in FIG. 2, FIG. 3, and FIG. 4.
- an electronic device includes hardware structures and/or software modules corresponding to each function.
- this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
- the embodiment of the present application may divide the electronic device into functional units according to the foregoing method examples.
- each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- An embodiment of the present application also provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any method as recorded in the above method embodiment ,
- the above-mentioned computer includes electronic equipment.
- the embodiments of the present application also provide a computer program product.
- the above-mentioned computer program product includes a non-transitory computer-readable storage medium storing a computer program. Part or all of the steps of the method.
- the computer program product may be a software installation package, and the above-mentioned computer includes electronic equipment.
- the disclosed device may be implemented in other ways.
- the device embodiments described above are only illustrative, for example, the division of the above-mentioned units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored, or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
- the units described above as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the above integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable memory.
- the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a memory.
- a number of instructions are included to enable a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the foregoing methods of the various embodiments of the present application.
- the aforementioned memory includes: U disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes.
- the program can be stored in a computer-readable memory, and the memory can include: a flash disk , Read-only memory (English: Read-Only Memory, abbreviated as: ROM), random access device (English: Random Access Memory, abbreviated as: RAM), magnetic disk or optical disc, etc.
- ROM Read-Only Memory
- RAM Random Access Memory
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (18)
- 一种会话创建方法,其特征在于,包括:用户设备UE执行网路连接时,获取第一应用程序的签名证书或签名证书的数字指纹;UE匹配第一应用程序的签名证书或签名证书的数字指纹与网络侧下发的用户设备路由选择策略URSP规则中的应用程序描述符Application descriptors,UE进行所述第一应用程序的会话创建。
- 根据权利要求1所述的方法,其特征在于,所述会话为协议数据单元会话PDU session。
- 根据权利要求1所述的方法,其特征在于,所述应用程序描述符Application descriptors为3GPP协议中Traffic descriptor定义的Application descriptors。
- 根据权利要求1所述的方法,其特征在于,所述应用程序描述符Application descriptors包括:操作系统标识符OSId和操作系统应用标识符OSAppId。
- 根据权利要求1-2任意一项所述的方法,其特征在于,所述方法UE执行网路连接之前还包括:UE接收下发的第一应用程序,所述第一应用程序包括:第一应用程序的签名证书。
- 根据权利要求5所述的方法,其特征在于,所述第一应用程序的签名证书的数字指纹为单向加密算法加密后的字符串。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:UE接收运营商服务器下发的UPSP规则中的应用程序描述符Application descriptors。
- 根据权利要求7所述的方法,其特征在于,所述UE匹配第一应用程序的签名证书或者签名证书的数字指纹与网络侧下发的用户设备路由选择策略URSP规则中的应用程序描述符Application descriptors,具体包括:如果所述第一应用程序的签名证书或者签名证书的数字指纹与所述应用程序描述符Application descriptors一致,确定UE匹配第一应用程序的签名证书或者签名证书的数字指纹与应用程序描述符Application descriptors,否则,确定UE不匹配第一应用程序的签名证书或者签名证书的数字指纹与应用程序描述符Application descriptors。
- 一种会话通信方法,其特征在于,所述方法包括如下步骤:网络设备向用户设备UE发送包含第一应用程序对应的应用程序描述符application descriptors的用户设备路由选择策略URSP策略消息,网路设备接收所述UE发送的会话请求,通过会话请求创建所述第一应用程序的会话。
- 根据权利要求9所述的方法,其特征在于,网络设备接收应用程序开发用户发送的第一应用程序的签名证书或者签名证书的数字 指纹;网络设备将所述第一应用程序签名证书或者签名证书的数字指纹作为URSP规则中的Application descriptors。
- 根据权利要求9所述的方法,其特征在于,网络设备接收应用程序开发用户发送的第一应用程序,所述第一应用程序包括开发者的签名证书;网络设备对所述第一应用程序进行二次签名得到所述第一应用程序的网络签名,所述网络签名包括所述第一应用程序网络签名证书或者网络签名证书的数字指纹,将所述网络签名证书或者网络签名证书的数字指纹作为UPSP规则中Application descriptors。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:网络设备接收应用程序开发用户发送的所述应用程序开发者的签名证书,网络设备对所述签名证书进行二次签名后得到二次签名证书,将所述二次签名证书发送给应用程序开发用户,并指示所述应用程序开发用户将所述二次签名证书作为所述应用程序开发者的签名证书携带在第一应用程序内,作为UPSP规则中Application descriptors。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:网络设备接收应用程序开发用户发送注册请求,所述注册请求包括:第一应用程序签名证书或签名证书的数字指纹;网络设备依据所述注册请求完成对所述第一应用程序签名证书或签名证书的数字指纹的注册。
- 一种用户设备UE,其特征在于,所述UE包括:获取单元,用于执行网路连接时,获取第一应用程序的签名证书或签名证书的数字指纹;处理单元,用于匹配第一应用程序的签名证书或签名证书的数字指纹与网络侧下发的用户设备路由选择策略URSP规则中的应用程序描述符Application descriptors,UE进行所述第一应用程序的会话创建。
- 一种网络设备,其特征在于,所述网络设备包括:通信单元,用于向用户设备UE发送包含第一应用程序对应的应用程序描述符application descriptors的用户设备路由选择策略URSP策略消息;接收所述UE发送的会话请求;处理单元,用于通过会话请求创建所述第一应用程序的会话。
- 一种终端,其特征在于,包括处理器、存储器、通信接口,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行如权利要求1-8任一项或如权利要求9-13任意一项所述的方法中的步骤的指令。
- 一种计算机可读存储介质,其特征在于,存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求1-8任一项或如权利要求9-13任意一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如权利要求1-8任一项或如权利要求9-13任意一项所述的方法。
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020227032299A KR102908112B1 (ko) | 2020-02-21 | 2020-04-26 | 세션 생성 방법 및 관련 장치 |
| EP20920074.0A EP4109839A4 (en) | 2020-02-21 | 2020-04-26 | SESSION CREATION METHOD AND RELATED DEVICE |
| JP2022550863A JP7457144B2 (ja) | 2020-02-21 | 2020-04-26 | セッション確立方法及び関連装置 |
| US17/801,026 US12192382B2 (en) | 2020-02-21 | 2020-04-26 | Method for session creation and related equipment |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010110499.7 | 2020-02-21 | ||
| CN202010110499.7A CN111314475B (zh) | 2020-02-21 | 2020-02-21 | 会话创建方法及相关设备 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021164125A1 true WO2021164125A1 (zh) | 2021-08-26 |
Family
ID=71147668
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2020/087044 Ceased WO2021164125A1 (zh) | 2020-02-21 | 2020-04-26 | 会话创建方法及相关设备 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US12192382B2 (zh) |
| EP (1) | EP4109839A4 (zh) |
| JP (1) | JP7457144B2 (zh) |
| KR (1) | KR102908112B1 (zh) |
| CN (1) | CN111314475B (zh) |
| WO (1) | WO2021164125A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2023147888A1 (en) * | 2022-02-04 | 2023-08-10 | Lenovo (Singapore) Pte. Ltd | Updating route selection policy rules having digital certificate information therein |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111314474B (zh) * | 2020-02-21 | 2021-02-26 | 北京紫光展锐通信技术有限公司 | 会话创建方法及相关设备 |
| CN114080054B (zh) * | 2020-08-13 | 2024-09-24 | 华为技术有限公司 | 一种pdu会话建立方法、终端设备和芯片系统 |
| CN114630316B (zh) * | 2020-12-10 | 2024-12-20 | 中国电信股份有限公司 | 终端外发业务数据的路由选择方法、系统和终端 |
| WO2022148533A1 (en) * | 2021-01-05 | 2022-07-14 | Lenovo (Singapore) Pte. Ltd. | Selecting a data connection based on digital certificate information |
| KR20220125503A (ko) | 2021-03-05 | 2022-09-14 | 삼성전자주식회사 | 네트워크 슬라이스와 데이터 세션을 수립하는 전자 장치 및 그 동작 방법 |
| CN116033429B (zh) * | 2021-03-09 | 2025-08-19 | 中国联合网络通信集团有限公司 | 切片路由规则防篡改方法、网元及介质 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2019028837A1 (zh) * | 2017-08-11 | 2019-02-14 | 华为技术有限公司 | Pdu类型的设置方法、ue策略的设置方法及相关实体 |
| CN110149670A (zh) * | 2018-02-13 | 2019-08-20 | 华为技术有限公司 | 一种数据路由选择的方法及装置 |
| CN110474840A (zh) * | 2018-05-09 | 2019-11-19 | 华为技术有限公司 | 数据传输方法、装置和可读存储介质 |
| US20190394279A1 (en) * | 2018-06-22 | 2019-12-26 | Huawei Technologies Co., Ltd. | Optimizing user equipment operation by conditioning multiple policies on information elements |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101980232A (zh) * | 2010-10-13 | 2011-02-23 | 中兴通讯股份有限公司 | Java应用程序的试用方法、系统和装置 |
| KR102046323B1 (ko) * | 2012-03-08 | 2019-11-19 | 삼성전자주식회사 | 무선 통신 시스템에서 무선 억세스 네트워크의 트래픽 제어 방법 및 장치 |
| US9270674B2 (en) * | 2013-03-29 | 2016-02-23 | Citrix Systems, Inc. | Validating the identity of a mobile application for mobile application management |
| US9717004B2 (en) * | 2015-03-17 | 2017-07-25 | Qualcomm Incorporated | Apparatus and method for sponsored connectivity to wireless networks using application-specific network access credentials |
| US9755837B2 (en) * | 2015-03-17 | 2017-09-05 | Qualcomm Incorporated | Apparatus and method for sponsored connectivity to wireless networks using application-specific network access credentials |
| CN104778393A (zh) * | 2015-04-16 | 2015-07-15 | 电子科技大学 | 一种智能终端的安全指纹识别方法 |
| US11039369B2 (en) * | 2018-08-10 | 2021-06-15 | Mediatek Inc. | Handling 5G QoS rules on QoS operation errors |
| KR20200031900A (ko) * | 2018-09-17 | 2020-03-25 | 삼성전자주식회사 | Pdu 세션 제어 방법 및 장치 |
| CN109286587B (zh) | 2018-11-01 | 2021-12-10 | 陕西齐腾电子科技有限公司 | 一种多有源广义空间调制检测方法 |
| CN109286567B (zh) * | 2018-11-23 | 2020-07-28 | 腾讯科技(深圳)有限公司 | 路由选择策略的获取方法、装置及设备 |
| CN110166577B (zh) * | 2019-07-01 | 2022-02-08 | 中国工商银行股份有限公司 | 分布式应用群组会话处理系统及方法 |
| KR20210099406A (ko) * | 2020-02-04 | 2021-08-12 | 삼성전자주식회사 | 무선 통신 시스템에서 서비스 수요 정보 분석을 통한 자원 관리 방법 및 장치 |
-
2020
- 2020-02-21 CN CN202010110499.7A patent/CN111314475B/zh active Active
- 2020-04-26 WO PCT/CN2020/087044 patent/WO2021164125A1/zh not_active Ceased
- 2020-04-26 KR KR1020227032299A patent/KR102908112B1/ko active Active
- 2020-04-26 US US17/801,026 patent/US12192382B2/en active Active
- 2020-04-26 EP EP20920074.0A patent/EP4109839A4/en active Pending
- 2020-04-26 JP JP2022550863A patent/JP7457144B2/ja active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2019028837A1 (zh) * | 2017-08-11 | 2019-02-14 | 华为技术有限公司 | Pdu类型的设置方法、ue策略的设置方法及相关实体 |
| CN110149670A (zh) * | 2018-02-13 | 2019-08-20 | 华为技术有限公司 | 一种数据路由选择的方法及装置 |
| CN110474840A (zh) * | 2018-05-09 | 2019-11-19 | 华为技术有限公司 | 数据传输方法、装置和可读存储介质 |
| US20190394279A1 (en) * | 2018-06-22 | 2019-12-26 | Huawei Technologies Co., Ltd. | Optimizing user equipment operation by conditioning multiple policies on information elements |
Non-Patent Citations (2)
| Title |
|---|
| See also references of EP4109839A4 * |
| ZTE: "Clarification on Policy Control Request Triggers", 3GPP DRAFT; S2-1911398, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Reno, USA; 20191118 - 20191122, 8 November 2019 (2019-11-08), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051821490 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2023147888A1 (en) * | 2022-02-04 | 2023-08-10 | Lenovo (Singapore) Pte. Ltd | Updating route selection policy rules having digital certificate information therein |
Also Published As
| Publication number | Publication date |
|---|---|
| KR102908112B1 (ko) | 2026-01-05 |
| US12192382B2 (en) | 2025-01-07 |
| KR20230026982A (ko) | 2023-02-27 |
| EP4109839A4 (en) | 2023-08-02 |
| CN111314475A (zh) | 2020-06-19 |
| JP7457144B2 (ja) | 2024-03-27 |
| JP2023515139A (ja) | 2023-04-12 |
| EP4109839A1 (en) | 2022-12-28 |
| CN111314475B (zh) | 2021-05-04 |
| US20230099322A1 (en) | 2023-03-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2021164125A1 (zh) | 会话创建方法及相关设备 | |
| US12022571B2 (en) | Profile between devices in wireless communication system | |
| US11678176B1 (en) | Electronic subscriber identity module (eSIM) transfer via activation code | |
| US20170161721A1 (en) | Method and system for opening account based on euicc | |
| CN111954208B (zh) | 一种安全通信方法和装置 | |
| WO2019011203A1 (zh) | 设备接入方法、设备及系统 | |
| EP4199475A1 (en) | Data offloading method and device | |
| CN111919458A (zh) | 用于协商euicc版本的方法和装置 | |
| CN109246769A (zh) | 一种pdu会话建立方法及装置 | |
| CN110944319A (zh) | 5g通信身份验证方法、设备及存储介质 | |
| CN113938880B (zh) | 一种应用的验证方法及装置 | |
| CN105357771A (zh) | 连接建立方法和用户终端 | |
| JP7403676B2 (ja) | セッション確立方法及び関連装置 | |
| CN106940776A (zh) | 一种敏感数据操作方法和移动终端 | |
| CN118354312A (zh) | 核心网接入方法、系统及电子设备 | |
| WO2025007511A1 (zh) | 分配网络切片的方法、数据处理方法、系统及电子设备 | |
| CN116389323A (zh) | 吞吐量测试方法、设备及存储介质 | |
| CN118614095A (zh) | 边缘计算中用于认证过程的协商机制 | |
| CN116600289B (zh) | 应用密钥获取方法、装置、通信设备、存储介质 | |
| US20250338109A1 (en) | System and method to restore esim profile on sm-dp+ platform | |
| CN108848493A (zh) | 更换电子sim卡的方法和设备 | |
| WO2024140038A1 (zh) | 一种通信方法及装置 | |
| CN115643582A (zh) | 一种用于云sim通信的终端设备和方法 | |
| CN108684034A (zh) | 数据传输方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20920074 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2022550863 Country of ref document: JP Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 20227032299 Country of ref document: KR Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2020920074 Country of ref document: EP Effective date: 20220921 |