WO2024093923A1 - 通信方法和通信装置 - Google Patents
通信方法和通信装置 Download PDFInfo
- Publication number
- WO2024093923A1 WO2024093923A1 PCT/CN2023/127793 CN2023127793W WO2024093923A1 WO 2024093923 A1 WO2024093923 A1 WO 2024093923A1 CN 2023127793 W CN2023127793 W CN 2023127793W WO 2024093923 A1 WO2024093923 A1 WO 2024093923A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- certificate
- information
- management
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
Definitions
- the present application relates to the field of communications, and more specifically, to a communication method and a communication device.
- the certificate management related topics in the 3rd Generation Partnership Project (3GPP) define a certificate application management framework (CEMAF), which includes a certificate management function (CeMF), a certificate issuance function (CeEF), and a network function (NF) that needs to request a service certificate.
- CEMAF certificate application management framework
- the communication interface between NF and CeEF is used to register programs related to certificate deployment and update; the communication interface between NF and CeMF is used for certificate status check.
- the present application provides a communication method, and proposes an initial trust establishment process for a certificate management framework composed of CeEF and CeMF to achieve security protection for certificate issuance.
- a communication method including: a certificate application network element sends a first request message to a certificate issuing network element, the first request message is used to request authentication of the certificate application network element, the first request message includes an identifier and first information of the certificate application network element, and the first information is used to authenticate the certificate application network element; the certificate issuing network element sends a second request message to a management network element, the second request message is used to request verification of the first information, the second request message includes the first information; the management network element verifies the first information according to second information locally recorded by the management network element, the second information is information related to the certificate application network element; the management network element sends first indication information to the certificate issuing network element, the first indication information is used to indicate whether the first information has passed verification; the certificate issuing network element determines whether the certificate application network element is a trusted network element according to the first indication information.
- the certificate issuing network element verifies the certificate applying network element through the management network element to determine whether the certificate applying network element is a trusted network element. Therefore, the certificate issuing network element can approve the certificate application application of the certificate applying network element if the certificate applying network element passes the verification (for example, it is a trusted network element) and issue a certificate to the network element that needs to issue a certificate. That is to say, before issuing a certificate, trust is established between the certificate issuing network element and the certificate applying network element, so that security protection for certificate issuance can be achieved.
- the certificate issuing network element requests the management network element to assist in completing the verification of the certificate application network element, and the management network element can complete the verification through locally recorded information related to the certificate application network element (such as the initialization information of the certificate application network element, the configuration information of the certificate application network element, or the management information of the certificate application network element, etc.), thereby completing the verification without the need for additional information configuration.
- the management network element can complete the verification through locally recorded information related to the certificate application network element (such as the initialization information of the certificate application network element, the configuration information of the certificate application network element, or the management information of the certificate application network element, etc.), thereby completing the verification without the need for additional information configuration.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured for at least one network element managed by the certificate application network element.
- the certificate application network element may carry multiple information for assisting verification in the message requesting verification, thereby improving the flexibility of the solution.
- the certificate issuing network element determines whether the certificate application network element is a trusted network element based on the first indication information, including: when the first indication information indicates that the first information has passed verification, the certificate issuing network element determines that the certificate application network element is a trusted network element; or, when the first indication information indicates that the first information has not passed verification, the certificate issuing network element determines that the certificate application network element is an untrusted network element.
- the first indication information further includes a signature of the management network element, The signature of the management network element is used to verify whether the first indication information is credible.
- the first indication information sent by the management network element to the certificate issuing network element may carry the signature of the management network element, so that the certificate issuing network element can verify whether the first indication information is credible based on the signature of the management network element, thereby improving the security of information transmission.
- the method further includes: the certificate issuing network element sends a first response message to the certificate application network element, and the first response message is used to indicate whether the certificate application network element is a trusted network element of the certificate issuing network element.
- the certificate issuing network element can notify the certificate applying network element of the verification result through the first response message to avoid the certificate applying network element being unable to obtain the verification result in time, resulting in repeated application for verification and causing waste of resources.
- the method also includes: the first network element sends a service certificate request message to the certificate application network element, and the service certificate request message is used to request the certificate application network element to apply for a service certificate on behalf of the first network element; the certificate application network element determines whether to respond to the request of the first network element for applying for a service certificate according to the rules.
- the certificate application network element can determine whether it needs to apply for a certificate from the certificate issuing network element on behalf of the first network element according to local pre-configured rules, so as to avoid the situation where the certificate application network element still applies for a certificate from the certificate issuing network element on behalf of the first network element when the application of the first network element is unreasonable (for example, the type of certificate applied for is unreasonable), resulting in a waste of resources.
- the service certificate request message includes an identifier of the first network element and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, or service type indication information.
- the method also includes: the certificate application network element sends a failure indication to the first network element, and the failure indication is used to indicate that the request for the business certificate by the first network element is invalid; or, the certificate application network element sends a business certificate application message to the certificate issuing network element, and the business certificate application message is used to request the certificate issuing network element to issue a business certificate.
- the certificate application network element judging according to a rule whether to respond to the request of the first network element to apply for a service certificate includes: the certificate application network element verifies, according to the rule, whether the first network element can apply for a first type of service certificate; when the verification fails, the certificate application network element sends the failure indication to the first network element. The certificate application network element sends the failure indication to the first network element.
- the service certificate application message includes an identifier of the certificate application network element and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, an identifier of the first network element, or a signature of the certificate application network element.
- the management network element determines that the first information passes the verification; or, when the first information is the initialization certificate list, and the initialization certificates corresponding to one or more network elements managed by the certificate application network element locally recorded by the management network element constitute the initialization certificate list, and the initialization certificates in the initialization certificate list are all valid, the management network element determines that the first information passes the verification; or, when the first information is the domain identification, and the identification of the domain to which the certificate application network element belongs locally recorded by the management network element is the domain identification, the management network element determines that the first information passes the verification.
- the management network element can verify the information of the certificate application network element in different ways to improve the flexibility of the solution.
- a communication method is provided, which can be executed by a certificate issuing network element, or can also be executed by a chip or circuit configured in the certificate issuing network element, which is not limited in this application.
- a certificate issuing network element or can also be executed by a chip or circuit configured in the certificate issuing network element, which is not limited in this application.
- the following description is taken as an example of execution by a certificate issuing network element.
- the communication method includes: a certificate issuing network element receives a first request message from a certificate application network element, the first request message is used to request authentication of the certificate application network element, the first request message includes an identifier and first information of the certificate application network element, and the first information is used to authenticate the certificate application network element; the certificate issuing network element sends a second request message to a management network element, the second request message is used to request verification of the first information, and the second request message includes the first information; the certificate issuing network element receives first indication information from the management network element, the first indication information is used to indicate whether the first information has passed verification; the certificate issuing network element determines whether the certificate application network element is a trusted network element based on the first indication information.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured for at least one network element managed by the certificate application network element.
- the certificate issuing network element determines whether the certificate application network element is a trusted network element based on the first indication information, including: when the first indication information indicates that the first information has passed verification, the certificate issuing network element determines that the certificate application network element is a trusted network element; or, when the first indication information indicates that the first information has not passed verification, the certificate issuing network element determines that the certificate application network element is an untrusted network element.
- the first indication information also includes a signature of a management network element, and the signature of the management network element is used to verify whether the first indication information is credible.
- the method also includes: the certificate issuing network element sends a first response message to the certificate application network element, and the first response message is used to indicate whether the certificate application network element is a trusted network element of the certificate issuing network element.
- a communication method which can be executed by a certificate application network element, or can also be executed by a chip or circuit configured in the certificate application network element, which is not limited in this application.
- a certificate application network element can also be executed by a chip or circuit configured in the certificate application network element, which is not limited in this application.
- the following description is taken as an example of execution by a certificate application network element.
- the communication method includes: a certificate application network element sends a first request message to a certificate issuing network element, the first request message is used to request authentication of the certificate application network element, the first request message includes an identifier and first information of the certificate application network element, the first information is used to authenticate the certificate application network element; the certificate application network element receives a first response message from the certificate issuing network element, the first response message is used to indicate whether the certificate application network element is a trusted network element, wherein the certificate issuing network element determines whether the certificate application network element is a trusted network element based on the first indication information, and the first indication information is feedback information of the certificate issuing network element requesting the management network element to verify the first information.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured for at least one network element managed by the certificate application network element.
- the method also includes: the certificate application network element receives a service certificate request message from a first network element, and the service certificate request message is used to request the certificate application network element to apply for a service certificate on behalf of the first network element; the certificate application network element determines whether to respond to the request of the first network element to apply for a service certificate according to the rules.
- the service certificate request message includes an identifier of the first network element and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, or service type indication information.
- the method also includes: the certificate application network element sends a failure indication to the first network element, and the failure indication is used to indicate that the request of the first network element for applying for a business certificate is invalid; or, the certificate application network element sends a business certificate application message to the certificate issuing network element, and the business certificate application message is used to request the certificate issuing network element to issue a business certificate.
- the service certificate application message includes an identifier of the certificate application network element and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, an identifier of the first network element, or a signature of the certificate application network element.
- a communication method is provided, which can be executed by a management network element, or can also be executed by a chip or circuit configured in the management network element, which is not limited in this application.
- a communication method is provided, which can be executed by a management network element, or can also be executed by a chip or circuit configured in the management network element, which is not limited in this application.
- the following description is taken as an example of execution by the management network element.
- the communication method includes: a management network element receives a second request message from a certificate issuing network element, the second request message is used to request verification of the first information, and the second request message includes the first information; the management network element verifies the first information based on second information locally recorded by the management network element, and the second information is information related to the certificate application network element; the management network element sends first indication information to the certificate issuing network element, and the first indication information is used to indicate whether the first information has passed the verification.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured for at least one network element managed by the certificate application network element.
- the management network element determines that the first information has passed the verification; or, when the first information is the initialization certificate list, and the initialization certificates corresponding to one or more network elements managed by the certificate application network element recorded locally by the management network element constitute the initialization certificate list, and the initialization certificates in the initialization certificate list are all valid, the management network element determines that the first information has passed the verification; or, when the first information is the domain identifier, and the identifier of the domain to which the certificate application network element belongs recorded locally by the management network element is the domain identifier, the management network element determines that the first information has passed the verification.
- the first indication information also includes a signature of a management network element, and the signature of the management network element is used to verify whether the first indication information is credible.
- the technical effects of the method shown in the fourth aspect and its possible design can refer to the technical effects in the first aspect and its possible design.
- a communication method including: a certificate application network element receives a service certificate request message from a first network element, the service certificate request message is used to request the certificate application network element to apply for a service certificate on behalf of the first network element; the certificate application network element sends a third request message to a management network element, the third request message is used to request the management network element to verify whether the certificate application network element can apply for a service certificate on behalf of the first network element; the management network element verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element based on second information locally recorded by the management network element, the second information is information related to the certificate application network element; the management network element sends second indication information to the certificate application network element, the second indication information is used to indicate whether the certificate application network element can apply for a service certificate on behalf of the first network element, the second indication information includes a signature and an event identifier of the management network element, wherein the signature of the management network element is a signature based on the event
- the certificate application network element can verify through the management network element whether it can apply for a business certificate from the certificate issuing network element on behalf of the first network element. That is to say, in this technical scheme, before the certificate application network element requests the certificate issuing network element to issue a certificate, it determines through the management network element whether it can apply for certificate issuance, thereby avoiding initiating an application for business certificate issuance when the first network element does not have the authority to apply for a certain type of network element certificate, thereby achieving security protection for certificate issuance.
- the method also includes: the certificate application network element sends a business certificate application message to the certificate issuing network element, the business certificate application message is used to request the certificate issuing network element to issue a business certificate for the first network element, and the business certificate application message includes the identifier of the certificate application network element and the signature of the management network element.
- the method also includes: the certificate issuing network element sends a query message to the management network element, the query message is used to query whether the certificate application network element can apply for a service certificate on behalf of the first network element, and the query message includes an identifier of the certificate application network element and the event identifier; the certificate issuing network element receives a query response message sent from the management network element, and the query response message is used to indicate whether the certificate application network element can apply for a service certificate on behalf of the first network element.
- the certificate issuing network element can query the management network element through a query message whether the certificate applying network element can apply for a service certificate on behalf of the first network element, thereby avoiding issuing a certificate when the first network element does not have the authority to apply for a certain type of network element certificate.
- the method also includes: when the third request message includes the identifier of the first network element, the management network element verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the identifiers of one or more network elements managed by the certificate application network element locally recorded by the management network element include the identifier of the first network element, the management network element determines that the certificate application network element can apply for a service certificate on behalf of the first network element; or, when the second request message includes the initialization certificate corresponding to the first network element, the management network element verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the initialization certificates corresponding to one or more network elements managed by the certificate application network element locally recorded by the management network element include the corresponding initialization certificate of the first network element, the management network element determines that the certificate application network element can apply for a service certificate on behalf of the first network element.
- the management network element can verify whether the certificate application network element can apply for the service certificate on behalf of the first network element through different verification methods, thereby improving the flexibility of the solution.
- a communication method is provided, which can be executed by a certificate issuing network element, or can also be executed by a chip or circuit configured in the certificate issuing network element, which is not limited in this application.
- a certificate issuing network element or can also be executed by a chip or circuit configured in the certificate issuing network element, which is not limited in this application.
- the following description is taken as an example of execution by a certificate issuing network element.
- the communication method includes: a certificate issuing network element receives a service certificate application message from a certificate application network element, wherein the service certificate application message is used to request the certificate issuing network element to issue a service certificate, and the service certificate application message includes an identifier of the certificate application network element and a signature of a management network element; the certificate issuing network element issues a service certificate to a first network element; wherein the signature of the management network element is a signature based on an event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a service certificate for the first network element.
- the method further includes: the certificate issuing network element sends a query message to the management network element, the query message is used to query whether the certificate application network element can apply for a service certificate on behalf of the first network element, and the query message includes an identifier of the certificate application network element and the event identifier; the certificate issuing network element receives the query message sent from the management network element The query response message is used to indicate whether the certificate application network element can apply for a service certificate on behalf of the first network element.
- a communication method which can be executed by a certificate application network element, or can also be executed by a chip or circuit configured in the certificate application network element, and this application does not limit this.
- this application does not limit this.
- the following description is taken as an example of execution by a certificate application network element.
- the communication method includes: a certificate application network element receives a service certificate request message from a first network element, the service certificate request message is used to request the certificate application network element to apply for a service certificate on behalf of the first network element; the certificate application network element sends a third request message to a management network element, the third request message is used to request the management network element to verify whether the certificate application network element can apply for a service certificate on behalf of the first network element; the certificate application network element receives second indication information from the management network element, the second indication information is used to indicate whether the certificate application network element can apply for a service certificate on behalf of the first network element, the second indication information includes a signature and an event identifier of the management network element, wherein the signature of the management network element is a signature based on the event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a service certificate on behalf of the first network element.
- the method also includes: the certificate application network element sends a business certificate application message to the certificate issuing network element, the business certificate application message is used to request the certificate issuing network element to issue a business certificate for the first network element, and the business certificate application message includes the identifier of the certificate application network element and the signature of the management network element.
- a communication method which can be executed by a management network element, or can also be executed by a chip or circuit configured in the management network element, and this application does not limit this.
- a management network element can be executed by a management network element, or can also be executed by a chip or circuit configured in the management network element, and this application does not limit this.
- the following description is taken as an example of execution by a management network element.
- the communication method includes: a management network element receives a third request message from a certificate application network element, the third request message is used to request the management network element to verify whether the certificate application network element can apply for a business certificate on behalf of the first network element; the management network element verifies whether the certificate application network element can apply for a business certificate on behalf of the first network element based on second information locally recorded by the management network element, the second information is information related to the certificate application network element; the management network element sends second indication information to the certificate issuing network element, the second indication information is used to indicate whether the certificate application network element can apply for a business certificate on behalf of the first network element, the second indication information includes a signature and an event identifier of the management network element, wherein the signature of the management network element is a signature based on the event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a business certificate on behalf of the first network element.
- the management network element verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the identifiers of one or more network elements managed by the certificate application network element locally recorded by the management network element include the identifier of the first network element, the management network element determines that the certificate application network element can apply for a service certificate on behalf of the first network element; or, when the second request message includes the initialization certificate corresponding to the first network element, the management network element verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the initialization certificates corresponding to one or more network elements managed by the certificate application network element locally recorded by the management network element include the corresponding initialization certificate of the first network element, the management network element determines that the certificate application network element can apply for a service certificate on behalf of the first network element.
- the method also includes: the management network element receives a query message from the certificate issuing network element, the query message is used to query whether the certificate application network element can apply for the issuance of a business certificate on behalf of the first network element, and the query message includes the identifier of the certificate application network element and the event identifier; the management network element sends a query response message to the certificate issuing network element, and the query response message is used to indicate whether the certificate application network element can apply for the issuance of a business certificate on behalf of the first network element.
- a communication method which can be executed by a certificate issuing network element, or can also be executed by a chip or circuit configured in the certificate issuing network element, and this application does not limit this.
- a certificate issuing network element or can also be executed by a chip or circuit configured in the certificate issuing network element, and this application does not limit this.
- the following description is taken as an example of execution by a certificate issuing network element.
- the communication method includes: a certificate issuing network element receives a first message from a management network element, the first message including information related to at least one certificate application network element locally recorded by the management network element; the certificate issuing network element receives a service certificate application message from the certificate application network element, the service certificate application message is used to request the certificate issuing network element to issue a service certificate; the certificate issuing network element determines whether to issue a service certificate based on the first message.
- the certificate issuing network element receives information related to at least one certificate application network element from the management network element. Therefore, after receiving a business certificate application message from a certificate issuing network element, it can determine whether to agree to the certificate issuing network element's request for certificate issuance based on the locally stored initialization information of the certificate issuing network element and the information provided by the certificate issuing network element through the business certificate application message, thereby achieving security protection for certificate issuance.
- the certificate issuing network element can locally refer to the information sent by the management network element to verify the certificate applying network element when issuing the certificate, without the need for additional signaling, thereby reducing signaling overhead.
- the first message includes a correspondence between an identifier of the certificate application network element and at least one of the following information: a network element identifier, a domain identifier, an initialization certificate identifier, or a network element type.
- a communication device for implementing the method shown in the second aspect above.
- the device includes: a transceiver module, which is used to receive a first request message from a certificate application network element, the first request message is used to request authentication of the certificate application network element, the first request message includes an identifier and first information of the certificate application network element, and the first information is used to authenticate the certificate application network element; the transceiver module is also used to send a second request message to a management network element, the second request message is used to request verification of the first information, and the second request message includes the first information; the transceiver module is also used to receive first indication information from the management network element, the first indication information is used to indicate whether the first information has passed verification; a processing module is used to determine whether the certificate application network element is a trusted network element according to the first indication information.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured for at least one network element managed by the certificate application network element.
- the processing module determines whether the certificate application network element is a trusted network element based on the first indication information, including: when the first indication information indicates that the first information has passed verification, the processing module determines that the certificate application network element is a trusted network element; or, when the first indication information indicates that the first information has not passed verification, the processing module determines that the certificate application network element is an untrusted network element.
- the first indication information also includes a signature of a management network element, and the signature of the management network element is used to verify whether the first indication information is credible.
- the transceiver module is also used to send a first response message to the certificate application network element, and the first response message is used to indicate whether the certificate application network element is a trusted network element of the certificate issuing network element.
- a communication device for implementing the method shown in the third aspect.
- the device includes:
- a transceiver module is used to send a first request message to a certificate issuing network element, wherein the first request message is used to request authentication of the communication device, and the first request message includes an identifier and first information of the communication device, and the first information is used to authenticate the communication device; the transceiver module is also used to receive a first response message from the certificate issuing network element, wherein the first response message is used to indicate whether the communication device is a trusted network element, wherein the certificate issuing network element determines whether the communication device is a trusted network element based on the first indication information, and the first indication information is feedback information of the certificate issuing network element requesting the management network element to verify the first information.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the communication device, the domain identification is used to indicate the domain in which the communication device is located, and the initialization certificate list is used to indicate at least one initialization certificate configured with at least one network element managed by the communication device.
- the transceiver module is also used to receive a service certificate request message from a first network element, and the service certificate request message is used to request the communication device to apply for a service certificate on behalf of the first network element; the processing module is used to determine whether to respond to the request for the service certificate from the first network element according to the rules.
- the service certificate request message includes an identifier of the first network element and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, or service type indication information.
- the transceiver module is further used to send a failure indication to the first network element, and the failure indication is used to indicate that the request for the business certificate by the first network element is invalid; or, the transceiver module is further used to send a business certificate application message to the certificate issuing network element, and the business certificate application message is used to request the certificate issuing network element to issue a business certificate.
- the service certificate application message includes an identifier of the communication device and at least one of the following information: a public key corresponding to the first network element, a private key corresponding to the first network element, an initialization certificate configured with the first network element, an identifier of the first network element, or a signature of the communication device.
- a communication device for implementing the method shown in the fourth aspect.
- the device includes: a transceiver module, configured to receive a second request message from a certificate issuing network element, wherein the second request message is used to request verification of the first information, and the second The request message includes the first information; a processing module is used to verify the first information based on second information locally recorded by the communication device, and the second information is information related to the certificate application network element; the transceiver module is also used to send first indication information to the certificate issuing network element, and the first indication information is used to indicate whether the first information has passed the verification.
- the first information includes at least one of the following information: a network element identification list, a domain identification, or an initialization certificate list, the network element identification list is used to indicate at least one network element managed by the certificate application network element, the domain identification is used to indicate the domain in which the certificate application network element is located, and the initialization certificate list is used to indicate at least one initialization certificate configured with at least one network element managed by the certificate application network element.
- the processing module determines that the first information passes the verification; or, when the first information is the initialization certificate list, and the initialization certificates corresponding to one or more network elements managed by the certificate application network element locally recorded by the communication device constitute the initialization certificate list, the processing module determines that the first information passes the verification; or, when the first information is the domain identification, and the identification of the domain to which the certificate application network element locally recorded by the communication device belongs is the domain identification, the processing module determines that the first information passes the verification.
- the first indication information also includes a signature of the communication device, and the signature of the communication device is used to verify whether the first indication information is authentic.
- a communication device which is used to implement the method shown in the sixth aspect.
- the device includes: a transceiver module, which is used to receive a service certificate application message from a certificate application network element, wherein the service certificate application message is used to request the communication device to issue a service certificate, and the service certificate application message includes an identifier of the certificate application network element and a signature of a management network element; the transceiver module is also used to issue a service certificate to a first network element; wherein the signature of the management network element is a signature based on an event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a service certificate for the first network element.
- the transceiver module is also used to send a query message to the management network element, the query message is used to query whether the certificate application network element can apply for a service certificate on behalf of the first network element, and the query message includes the identifier of the certificate application network element and the event identifier; the transceiver module is also used to receive a query response message sent from the management network element, and the query response message is used to indicate whether the certificate application network element can apply for a service certificate on behalf of the first network element.
- a communication device which is used to implement the method shown in the seventh aspect.
- the device includes: a transceiver module, which is used to receive a service certificate request message from a first network element, and the service certificate request message is used to request the communication device to apply for a service certificate on behalf of the first network element; the transceiver module is also used to send a third request message to a management network element, and the third request message is used to request the management network element to verify whether the communication device can apply for a service certificate on behalf of the first network element; the transceiver module is also used to receive second indication information from the management network element, and the second indication information is used to indicate whether the communication device can apply for a service certificate on behalf of the first network element, and the second indication information includes a signature and an event identifier of the management network element, wherein the signature of the management network element is a signature based on the event identifier, and the event identifier is used to identify that the communication device requests to apply for a service certificate on
- the transceiver module is also used to send a business certificate application message to the certificate issuing network element, and the business certificate application message is used to request the certificate issuing network element to issue a business certificate for the first network element, and the business certificate application message includes the identifier of the communication device and the signature of the management network element.
- a communication device for implementing the method shown in the eighth aspect.
- the device includes: a transceiver module, which is used to receive a third request message from a certificate application network element, and the third request message is used to request the communication device to verify whether the certificate application network element can apply for a service certificate on behalf of the first network element; a processing module, which is used to verify whether the certificate application network element can apply for a service certificate on behalf of the first network element according to the second information locally recorded by the management network element, and the second information is information related to the certificate application network element; the transceiver module is also used to send a second indication information to the certificate issuing network element, and the second indication information is used to indicate whether the certificate application network element can wait for the first network element to apply for a service certificate, and the second indication information includes a signature and an event identifier of the communication device, wherein the signature of the communication device is a signature based on the event identifier, and the event identifier is used to identify that the certificate application network
- the processing module verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the identifiers of one or more network elements managed by the certificate application network element locally recorded by the communication device include the identifier of the first network element, the processing module The block determines that the certificate application network element can apply for a service certificate on behalf of the first network element; or, when the second request message includes the initialization certificate corresponding to the first network element, the processing module verifies whether the certificate application network element can apply for a service certificate on behalf of the first network element, including: when the initialization certificates corresponding to one or more network elements managed by the certificate application network element locally recorded by the communication device include the initialization certificate corresponding to the first network element, the processing module determines that the certificate application network element can apply for a service certificate on behalf of the first network element.
- the transceiver module is further used to receive a query message from a certificate issuing network element, the query message being used to query whether the certificate application network element can apply for the issuance of a service certificate on behalf of the first network element, the query message including the identifier of the certificate application network element and the event identifier; the transceiver module is further used to send a query response message to the certificate issuing network element, the query response message being used to indicate whether the certificate application network element can apply for the issuance of a service certificate on behalf of the first network element.
- a communication device which is used to implement the method shown in the ninth aspect.
- the device includes: a transceiver module, which is used to receive a first message from a management network element, wherein the first message includes information related to at least one certificate application network element locally recorded by the management network element; the transceiver module is also used to receive a service certificate application message from the certificate application network element, wherein the service certificate application message is used to request the communication device to issue a service certificate; the processing module is used to determine whether to issue a service certificate according to the first message.
- the first message includes a correspondence between an identifier of the certificate application network element and at least one of the following information: a network element identifier, a domain identifier, an initialization certificate identifier, or a network element type.
- a communication system including a certificate application network element, a certificate issuing network element and a management network element, wherein the certificate issuing network element is used to execute the method shown in the second aspect above, the certificate application network element executes the method shown in the third aspect above, and the management network element is used to execute the method shown in the tenth aspect above.
- a communication system including a certificate application network element, a certificate issuing network element and a management network element, wherein the certificate issuing network element is used to execute the method shown in the sixth aspect above, the certificate application network element executes the method shown in the seventh aspect above, and the management network element is used to execute the method shown in the eighth aspect above.
- a communication device which includes: a memory for storing programs; a processor for executing the programs stored in the memory, and when the programs stored in the memory are executed, the processor is used to execute the methods provided in the above aspects.
- the present application provides a processor for executing the methods provided in the above aspects.
- the process of sending the above information and obtaining/receiving the above information in the above methods can be understood as the process of the processor outputting the above information and the process of the processor receiving the input above information.
- the processor When outputting the above information, the processor outputs the above information to the transceiver so that it can be transmitted by the transceiver. After being output by the processor, the above information may also need to be processed otherwise before reaching the transceiver.
- the transceiver obtains/receives the above information and inputs it into the processor. Furthermore, after the transceiver receives the above information, the above information may need to be processed otherwise before being input into the processor.
- the receiving request message mentioned in the above method can be understood as the processor receiving input information.
- the processor may be a processor specifically used to execute these methods, or a processor that executes computer instructions in a memory to execute these methods, such as a general-purpose processor.
- the memory may be a non-transitory memory, such as a read-only memory (ROM), which may be integrated with the processor on the same chip or may be separately arranged on different chips.
- ROM read-only memory
- a computer-readable storage medium which stores a program code for execution by a device, and the program code includes a method for executing the methods provided in the above aspects.
- a computer program product comprising instructions is provided.
- the computer program product is run on a computer, the computer is used to execute the methods provided in the above aspects.
- a chip which includes a processor and a communication interface, and the processor reads instructions stored in a memory through the communication interface to execute the methods provided in the above aspects.
- the chip may further include a memory, in which instructions are stored, and the processor is used to execute the instructions stored in the memory.
- the processor is used to execute the methods provided by the above aspects.
- FIG1 is a schematic diagram of a network architecture 100 provided in the present application.
- FIG. 2 is a schematic diagram of a CEMAF.
- FIG3 is a schematic flow chart of a communication method provided in the present application.
- FIG4 is a schematic flow chart of another communication method provided by the present application.
- FIG5 is a schematic flow chart of yet another communication method provided by the present application.
- FIG. 6 is a schematic block diagram of a communication device 10 provided in an embodiment of the present application.
- FIG. 7 is a schematic diagram of another communication device 20 provided in an embodiment of the present application.
- FIG8 is a schematic diagram of a chip system 30 provided in an embodiment of the present application.
- the technical solution provided in this application can be applied to various communication systems, such as: new radio (NR) system, long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD) system, etc.
- NR new radio
- LTE long term evolution
- FDD frequency division duplex
- TDD time division duplex
- D2D device to device
- V2X vehicle to everything
- M2M machine to machine
- MTC machine type communication
- IoT Internet of things
- PLMN public land mobile network
- MNO mobile network operators
- 3GPP networks generally include but are not limited to 5G networks, fourth-generation mobile communication (4th-generation, 4G) networks, and other future communication systems, such as (6th-generation, 6G) networks, etc.
- FIG1 is a schematic diagram of a network architecture 100 provided by the present application, taking the 5G network architecture based on the service-based architecture SBA in the non-roaming scenario defined in the 3GPP standardization process as an example.
- the network architecture may include three parts, namely, the terminal device part, the DN and the operator network PLMN part. The functions of the network elements of each part are briefly described below.
- the terminal equipment part may include a terminal device 110, which may also be referred to as a user equipment (UE).
- the terminal device 110 in the present application is a device with wireless transceiver functions, which may communicate with one or more core network (CN) devices via an access network device (or may also be referred to as an access device) in a radio access network (RAN) 140.
- CN core network
- the terminal device 110 may also be referred to as an access terminal, terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, user agent or user device, etc.
- the terminal device 110 may be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; it may also be deployed on the water (such as a ship, etc.); it may also be deployed in the air (such as an airplane, balloon, and satellite, etc.).
- the terminal device 110 may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a smart phone, a mobile phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), etc.
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistant
- the terminal device 110 may also be a handheld device with wireless communication function, a computing device or other device connected to a wireless modem, a vehicle-mounted device, a wearable device, a drone device, or a terminal in the Internet of Things or the Internet of Vehicles, a terminal of any form in a 5G network and future networks, a relay user device, or a terminal in a future evolving 6G network, etc.
- the relay user device may be, for example, a 5G residential gateway (RG).
- the terminal device 110 may be a virtual reality (VR) terminal, an augmented reality (AR) terminal, a wireless terminal in industrial control, a wireless terminal in self-driving, a wireless terminal in remote medical, a wireless terminal in smart grid, a wireless terminal in transportation safety, a wireless terminal in smart city, a wireless terminal in smart home, etc.
- the terminal device here refers to a 3GPP terminal.
- the embodiments of the present application do not limit the type or category of the terminal device. For ease of explanation, the present application will be described later using UE as an example to refer to the terminal device.
- the operator network PLMN part may include but is not limited to a (radio) access network ((R)AN) 120 and a core network (CN) part.
- (R)AN radio access network
- CN core network
- (R)AN 120 can be regarded as a sub-network of the operator network, and is an implementation system between the service nodes in the operator network and the terminal device 110.
- the terminal device 110 To access the operator network, the terminal device 110 first passes through (R)AN 120, and then can be connected to the service node of the operator network through (R)AN 120.
- the access network device (RAN device) in the embodiment of the present application is a device that provides wireless communication functions for the terminal device 110, and can also be called a network device.
- the RAN device includes but is not limited to: the next generation node base station (gNB) in the 5G system, the evolved node B (eNB) in the long term evolution (LTE), the radio network controller (RNC), the node B (NB), the base station controller (BSC), the base transceiver station (BTS), the home base station (e.g., home evolved node B, or home node B, HNB), the base band unit (BBU), the transmission point (TRP), the transmitting point (TP), the small base station device (pico), the mobile switching center, or the network device in the future network.
- the name of the device with the access network device function may be different.
- the above-mentioned device providing wireless communication function for the terminal device 110 is collectively referred to as access network equipment or RAN or AN for short. It should be understood that the specific type of access network equipment is not limited herein.
- the CN part may include but is not limited to the following NFs: user plane function (UPF) 130, network exposure function (NEF) 131, network function repository function (NRF) 132, policy control function (PCF) 133, unified data management function (UDM) 134, unified data repository function (UDR) 135, network data analysis function (NWDAF) 136, authentication server function (AUSF) 137, access and mobility management function (AMF) 138, session management function (SMF) 139.
- UPF user plane function
- NEF network exposure function
- NRF network function repository function
- PCF policy control function
- UDM unified data management function
- UDR unified data repository function
- NWDAF authentication server function
- AMF access and mobility management function
- SMSF session management function
- the data network DN 140 which may also be referred to as a packet data network (PDN), is usually a network located outside the operator network, such as a third-party network.
- the DN may also be deployed by the operator, that is, the DN is part of the PLMN. This application does not restrict whether the DN belongs to the PLMN.
- the operator network PLMN may access multiple data networks DN 140, and multiple services may be deployed on the data network DN 140, which may provide data and/or voice services to the terminal device 110.
- the data network DN 140 may be a private network of a smart factory, and the sensors installed in the workshop of the smart factory may be the terminal devices 110.
- the control server of the sensors is deployed in the data network DN 140, and the control server may provide services for the sensors.
- the sensors may communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
- the data network DN 140 may be an internal office network of a company, and the mobile phones or computers of the employees of the company may be the terminal devices 110, and the mobile phones or computers of the employees may access information, data resources, etc. on the internal office network of the company.
- the terminal device 110 can establish a connection with the operator network through an interface (such as N1, etc.) provided by the operator network and use data and/or voice services provided by the operator network.
- the terminal device 110 can also access the data network DN 140 through the operator network and use the operator services deployed on the data network DN 140 and/or services provided by a third party.
- UPF 130 is a gateway provided by the operator and is the gateway for the operator network to communicate with the data network DN 140.
- UPF network function 130 includes user-plane related functions such as packet routing and transmission, packet detection, service usage reporting, quality of service (QoS) processing, legal monitoring, uplink packet detection, downlink packet storage, etc.
- QoS quality of service
- NEF 131 is a control plane function provided by the operator. It mainly enables third parties to use the services provided by the network, supports the network to open its capabilities, event and data analysis, provides PLMN security configuration information from external applications, and converts the interactive information inside and outside the PLMN. It provides an API interface for the operator network to be open to the outside world, and provides it for the interaction between external servers and internal operator networks.
- NRF 132 is a control plane function provided by the operator, which can be used to maintain real-time information of network functions and services in the network. For example, it supports network service discovery, maintains the services supported by the NF configuration data (NF profile) of the NF instance, supports service discovery of the communication proxy (SCP), maintains the SCP configuration data (SCP profile) of the SCP instance, sends notifications about newly registered, deregistered, and updated NFs and SCPs, and maintains the health status of NF and SCP operations.
- NF profile the services supported by the NF configuration data
- SCP communication proxy
- SCP profile SCP configuration data
- PCF 133 is a control plane function provided by the operator. It supports a unified policy framework to govern network behavior, provide policy rules to other control functions, contract information related to policy decisions, etc.
- UDM 134 is a control plane function provided by the operator, responsible for storing the subscriber permanent identifier (SUPI), the generic public subscription identifier (GPSI), credentials and other information of the subscribers in the operator network.
- the SUPI will be encrypted during transmission, and the encrypted SUPI is called a hidden subscriber subscription identifier (SUCI).
- the information stored by the UDM network function 134 can be used for authentication and authorization of the terminal device 110 to access the operator network.
- the subscribers of the above-mentioned operator network can be specifically Users who use the services provided by the operator network, such as users who use China Telecom's subscriber identity module (SIM) card, or users who use China Mobile's SIM card, etc.
- SIM subscriber identity module
- the credentials of the above-mentioned contracted users can be a small file storing long-term keys stored in the mobile phone SIM card or information related to the encryption of the mobile phone SIM card, which is used for authentication and/or authorization. It should be noted that permanent identifiers, credentials, security contexts, authentication data (cookies), and tokens are equivalent to verification/authentication and authorization-related information. In the embodiments of the present application, no distinction or restriction is made for the convenience of description.
- UDR 135 is a control plane function provided by the operator. It provides the functions of storing and retrieving contract data for UDM, storing and retrieving policy data for PCF, and storing and retrieving user's NF group ID (group ID) information.
- NWDAF 136 is a control plane function provided by the operator. Its main function is to collect data from NF, external application function AF and operation, administration and maintenance (OAM) system, and provide NWDAF service registration, data opening and analysis data to NF and AF.
- OAM administration and maintenance
- AUSF 137 is a control plane function provided by the operator, which is usually used for primary authentication, i.e., authentication between the terminal device 110 (subscriber) and the operator network. After receiving the authentication request initiated by the subscriber, the AUSF network function 137 can authenticate and/or authorize the subscriber through the authentication information and/or authorization information stored in the UDM network function 134, or generate the authentication and/or authorization information of the subscriber through the UDM network function 134. The AUSF network function 137 can feed back the authentication information and/or authorization information to the subscriber.
- AMF 138 is a control plane network function provided by the operator network, responsible for access control and mobility management of the terminal device 110 accessing the operator network, including, for example, mobility status management, allocation of temporary user identities, authentication and authorization of users, etc.
- AMF 138 is used to establish NAS connection with UE and has the same 5G NAS security context as UE.
- the 5G NAS security context includes KAMF, key identification information with the same NAS layer key, UE security capability, and uplink and downlink NAS COUNT values.
- NAS layer keys include NAS encryption keys and NAS integrity protection keys, which are used for confidentiality protection and integrity protection of NAS messages respectively.
- SMF 139 is a control plane network function provided by the operator network, responsible for managing the PDU session of the terminal device 110.
- the PDU session is a channel for transmitting PDUs.
- the terminal device needs to transmit PDUs to and from the data network DN 140 through the PDU session.
- the PDU session is established, maintained, and deleted by the SMF network function 139.
- the SMF network function 139 includes session management (such as session establishment, modification, and release, including tunnel maintenance between the user plane function UPF 130 and (R)AN 120), selection and control of the UPF network function 130, service and session continuity (SSC) mode selection, roaming, and other session-related functions.
- session management such as session establishment, modification, and release, including tunnel maintenance between the user plane function UPF 130 and (R)AN 120
- SSC service and session continuity
- AF 141 is a control plane network function provided by the operator network, which is used to provide application layer information. It can interact with the policy framework through the network open function network element or directly interact with the policy framework to make policy decision requests, etc. It can be located inside or outside the operator network.
- a NF can be implemented by hardware or software.
- Nnef, Nnrf, Npcf, Nudm, Nudr, Nnwdaf, Nausf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
- the meaning of the above interface serial numbers can be found in the meaning defined in the 3GPP standard protocol, and this application does not limit the meaning of the above interface serial numbers.
- the interface name between the various network functions in the figure is only an example.
- the interface name of the system architecture may also be other names, which is not limited in this application.
- the name of the message (or signaling) transmitted between the above network elements is only an example and does not constitute any limitation on the function of the message itself.
- network functions (such as NEF 131 ... SMF139) are collectively referred to as NFs, that is, the NFs described later in the embodiments of the present application can be replaced by any network functions.
- FIG. 1 only schematically describes some network functions, and the NFs described later are not limited to the network functions shown in FIG. 1.
- the above-mentioned network architecture applied to the embodiment of the present application is only a network architecture described from the perspective of a service-oriented architecture, and the network architecture applicable to the embodiment of the present application is not limited to this. Any network architecture that can realize the functions of the above-mentioned network elements is applicable to the embodiment of the present application.
- AMF, SMF, UPF, NEF, AUSF, NRF, PCF, and UDM shown in the figure can be understood as network elements used to implement different functions in the core network, for example, they can be combined into network slices as needed.
- These core network network elements can be independent devices or integrated into the same device to implement different functions. This application does not limit the specific form of the above network elements.
- CA Certification Authority
- CA responsible for managing the entire life cycle of the public key, including issuing certificates, defining certificate validity periods, and revoking certificates.
- CA may also include a registration authority (RA), which is used to obtain and authenticate the user's identity and then submit a certificate issuance request to the CA.
- RA can be a function integrated in CA or deployed separately. This application assumes that CA integrates the RA function.
- the certificate enrolment function (CeEF) involved below may be part of the interactive function module in CA or RA.
- Certificate management protocol for public key infrastructure: It is an Internet protocol used to obtain digital certificates that comply with the X.509 standard in a public key infrastructure (PKI) system. Specifically, CMP provides online interactions between PKI components, including interactions between CA and client systems, and protocol message definitions are used for certificate creation and management.
- the term "certificate” in CMP refers to the X.509v3 certificate defined in X509. It is described in detail in existing technical documents (e.g., IETF RFC4210), and will not be described in detail in this application.
- X.509 certificate The X.509 standard specifies what information a certificate can contain and describes the method (data format) of recording information.
- the relevant certificate profile is defined in existing technical documents (e.g., RFC5280).
- the X.509 certificate includes the following information listed in Table 1:
- Figure 2 is a schematic diagram of CEMAF.
- CEMAF includes a certificate management network element (Certificate management Function, CeMF) and CeEF, wherein CeEF is the network element of the operator, used to issue certificates.
- CeEF is the network element of the operator, used to issue certificates.
- the function of CeEF in this application can refer to the function of CA shown in the previous text; CeMF is a network element in the trust domain, used to manage and apply for certificates.
- CeMF is a network element in the trust domain, used to manage and apply for certificates.
- CeMFs can be located in different trust domains or in the same trust domain.
- the communication interface between NF and CeEF (such as the ce1 interface shown in FIG. 2 ) is used to register programs related to certificate deployment and update; the communication interface between NF and CeMF (such as the ce2 interface shown in FIG. 2 ) is used for certificate status checking.
- CEMAF the corresponding functions in CEMAF have been divided into two network elements (eg, CeEF and CeMF).
- the registration function network element (CeEF) of CEMAF is used to issue certificates.
- the management network element (CeMF) of CEMAF is used to manage and apply for certificates.
- CeEF and CeMF can be deployed in the certificate network management entity. Examples are not given here one by one.
- Business certificate refers to the certificate required by NF for user plane or signaling plane user transmission, which can also be called formal certificate or actual certificate, etc.
- TLS Transport Layer Security
- IPSEC Internet Protocol Security
- Initial trust In order to achieve automated certificate management of NF in service-based architecture (SBA), initial trust needs to be established between NF and operator CA, which is a prerequisite for the business certificate registration procedure.
- SBA service-based architecture
- used for indication may include being used for direct indication and being used for indirect indication.
- indication information When describing that a certain indication information is used for indicating A, it may include that the indication information directly indicates A or indirectly indicates A, but it does not mean that A must be included in the indication information.
- the information indicated by the indication information is called the information to be indicated.
- the information to be indicated can be sent as a whole, or divided into multiple sub-information and sent separately, and the sending period and/or sending time of these sub-information can be the same or different.
- the specific sending method is not limited in this application. Among them, the sending period and/or sending time of these sub-information can be pre-defined, for example, pre-defined according to the protocol, or can be configured by the transmitting device by sending configuration information to the receiving device.
- the "storage” involved in the embodiments of the present application may refer to storage in one or more memories.
- the one or more memories may be separately set or integrated in an encoder or decoder, a processor, or a communication device.
- the one or more memories may also be partially separately set and partially integrated in a decoder, a processor, or a communication device.
- the type of memory may be any form of storage medium, which is not limited by the present application.
- the “protocol” involved in the embodiments of the present application may refer to a standard protocol in the communication field, for example, it may include an LTE protocol, an NR protocol, and related protocols used in future communication systems, and the present application does not limit this.
- RRC radio resource control
- the term "and/or" in this article is only a description of the association relationship of the associated objects, indicating that there can be three relationships.
- a and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone.
- the character "/" in this article generally indicates that the associated objects before and after are in an "or" relationship.
- a solution for NF and operator CA to establish initial trust is: through the initial certificate issued by the private CA to the NF, the security protection of the process of NF registering the business certificate with the operator CA is realized.
- the solution uses the initial certificate issued by the Private CA in the same security domain (or trust domain) as the NF.
- This Private CA acts as the initial trust anchor of the NF in the initial registration.
- the root certificate of the Private CA should be configured as the trust anchor point in the CA in the operator PKI.
- the prerequisite for establishing the initial trust between the NF and the operator CA in this solution is to create a private CA and deploy it in the same network security (trust) domain of the NF in the 5GC SBA, and the root certificate of the Private CA needs to be pre-configured in the CA in the operator PKI.
- initial trust In the above-mentioned NF initial certificate scheme required to establish initial trust between NF and operator CA, initial trust must be established through Private CA, so this method cannot be used in scenarios without Private CA.
- the scheme of establishing initial trust through Private CA requires that the root certificate of Private CA needs to be pre-configured in the CA in the operator PKI, which requires a pre-configuration process.
- the present application provides a communication method, which can be applied in the certificate management framework composed of CeEF and CeMF as shown in FIG2 , wherein CeMF Apply for a certificate for NF, and when verifying that CeMF is authorized, CeEF will return a valid NF certificate to NF through CeMF. There is no need to establish initial trust through Private CA.
- the communication method provided in the embodiments of the present application can be applied to a 5G system, for example, the communication system shown in FIG. 1 .
- the embodiments shown below do not particularly limit the specific structure of the execution subject of the method provided in the embodiments of the present application, as long as it is possible to communicate according to the method provided in the embodiments of the present application by running a program that records the code of the method provided in the embodiments of the present application.
- the execution subject of the method provided in the embodiments of the present application may be a network element, or a functional module in the network element that can call and execute the program.
- FIG3 is a schematic flow chart of a communication method provided by the present application. The method comprises the following steps:
- the certificate application network element sends a first request message to the certificate issuing network element, or in other words, the certificate issuing network element receives the first request message from the certificate application network element.
- the first request message is used to request authentication of whether the certificate application network element is a trusted network element.
- the certificate application network element sending the first request message to the certificate issuing network element can be understood as: the certificate application network element requests to establish initial trust, that is, the certificate application network element requests the certificate issuing network element to verify the certificate application network element through the first request message. If the certificate issuing network element verifies that the certificate application network element is a trusted network element, it means that the certificate issuing network element trusts the certificate application network element and can agree to the certificate application sent by the certificate application network element.
- the first request message in this embodiment can also be called an initial trust establishment request message.
- the certificate application network element may be the CeMF shown in FIG. 2 above, and the certificate issuance network element may be the CeEF shown in FIG. 2 above.
- the name of the certificate application network element is not limited in this embodiment, and any network element that can be used to apply for a service certificate for a functional network element (such as NF) can be considered as the certificate application network element involved in this embodiment; similarly, the name of the certificate issuance network element is not limited in this embodiment, and any network element that can be used to issue a service certificate for a functional network element (such as NF) can be considered as the certificate issuance network element involved in this embodiment.
- the following description is made by taking the certificate application network element as CeMF and the certificate issuance network element as CeEF as an example.
- the first request message includes an identifier (identify, ID) of the CeMF.
- the CeMF ID can be the IP address of CeMF.
- the CeMF ID can be the instance ID of CeMF.
- CeMF ID can also be other information that can be used to identify CeMF, for example, it can be the type information of CeMF; for example, it can be the location information of CeMF, etc., which will not be explained one by one here.
- the above-mentioned first request message may also include first information, and the first information is used to authenticate CeMF.
- the first information includes at least one of the following information: a network element identification list (NF ID list), a domain identification (Domain ID), and an initialization certificate list.
- NF ID list is a list of one or more NFs managed by CeMF
- NF ID is the identification information of NF, including but not limited to the IP address of NF, instance ID of NF, and other information used to identify NF.
- CeMF and one or more NFs indicated by the NF ID list are provided by the same manufacturer, and CeMF can provide proxy services for the NFs indicated by the NF ID list (e.g., requesting service certificates on behalf of them).
- CeMF and NF#1, NF#2, and NF#3 are provided by the same manufacturer, and the identifiers of NF#1, NF#2, and NF#3 are "#1", "#2", and "#3", respectively.
- CeMF can provide proxy services for NF#1, NF#2, and NF#3, and the NF ID list information is information indicating "#1", "#2", and "#3".
- Domain ID is used to indicate the domain where CeMF is located. For example, if CeMF is located in a trust domain, Domain ID is the trust domain identifier. Domain ID can be the ID of a certain area, including but not limited to: Virtual Local Area Network (VLAN) ID; Domain ID can be the ID of a specific equipment vendor, including but not limited to: Vendor ID; Domain ID can be the identifier of a certain area of the operator, including but not limited to: Public Land Mobile Network (PLMN) ID.
- VLAN Virtual Local Area Network
- PLMN Public Land Mobile Network
- the initialization certificate list is the initialization certificate corresponding to the NF managed by CeMF.
- the initialization certificate list may be pre-configured in CeMF, or may be sent to CeMF by the NF managed by CeMF (e.g., NF sends a request message #1 to CeMF, and the request message #1 is used to request a service certificate, and the request message #1 carries the initialization certificate of NF).
- the above-mentioned initialization certificate list information may be the identification information of the initialization certificate included in the initialization certificate list.
- the NF managed by CeMF includes NF#1, NF#2, and NF#3, and the initialization certificates corresponding to NF#1, NF#2, and NF#3 are initialization certificate #1, initialization certificate #2, and initialization certificate #3, respectively.
- the initialization certificate list information is information for identifying initialization certificate #1, initialization certificate #2, and initialization certificate #3.
- CeEF after CeEF receives the first request message sent by CeMF, it may send a second request message to the management network element, and the second request message is used to request the management network element to verify the first information sent by CeMF. It should be noted that in this embodiment, after CeEF receives the first request message sent by CeMF, it may not send the second request message, but other network elements may send the second request message to the management network element to request the management network element to verify the first information. For example, CeEF sends the second request message through other network elements; for example, The other devices learn the first information and request the management network element to verify the first information.
- the embodiment focuses on the management network element verifying the first information, and there is no limitation on how to trigger the management network element to verify the first information. It can be triggered by CeEF or other network elements. For the convenience of description, the following takes CeEF triggering the management network element to verify the first information as an example.
- the method flow shown in FIG3 also includes:
- the CeEF sends a second request message to the management network element, or the management network element receives the second request message from the CeEF.
- the management network element is a general term for the network management system.
- the management network element can be an EMS, a network management station (Network Management System, NMS), a MANO, or a part of an OSS/BSS, or one or more.
- NMS Network Management System
- MANO Network Management System
- OSS/BSS Backbone Service Set
- MnF Management Network Function
- OAM OAM
- management network element involved in this application includes but is not limited to the following functions: network device (network element) initialization management, network configuration management, network performance management, network fault management, network optimization management, or network routing management.
- network device network element
- the management network element can record network element initialization information.
- CeEF sending the second request message to the management network element can be understood as CeEF requesting the management network element to verify the information sent by CeMF, that is, CeEF requests the management network element to verify the first information sent by CeMF through the second request message.
- the second request message can also be called a verification request message.
- the second request message includes CeMF ID and CeEF ID, wherein CeMF ID is used to identify CeMF.
- CeMF ID has been explained in the above step S410 regarding the CeMF ID carried in the first request message, which will not be repeated here.
- CeEF ID is used to identify CeEF.
- CeEF ID includes but is not limited to the IP address of CeEF, the instance ID of CeEF and other information used to identify CeEF.
- the second request message also includes the first information, such as at least one of the following information: NF ID list, Domain ID, and initialization certificate list.
- NF ID list the NF ID list, Domain ID, initialization certificate list, etc. have been explained in the above step S410 regarding the information carried in the first request message, and will not be repeated here.
- the second request message also carries the first information
- the first information may be at least one of NF ID list information, Domain ID information, and initialization certificate list information. That is to say, in this embodiment, CeEF may transparently transmit the first information sent by CeMF to MnF, and MnF verifies the first information sent by CeMF.
- MnF After receiving the second request message from CeEF, MnF may perform verification.
- the method flow shown in FIG3 further includes:
- MnF will record and allocate the relationship between CeMF and NF during the NF initialization process. Specifically, MnF locally records the NF ID. Optionally, if the NF is pre-configured with an initialization certificate, MnF locally records the NF's initialization certificate.
- the initialization certificate of NF is pre-configured for MnF and recorded in MnF.
- MANO in the device domain configures the initialization certificate to the implementation layer of NF (e.g., Virtualized Network Function (VNF) instance) and records it in MnF.
- VNF Virtualized Network Function
- the NF initialization certificate is issued by the Private CA dedicated to the equipment manufacturer/operator through a private interface.
- the MnF may verify the information sent by the CeMF through different verification methods, for example, including but not limited to:
- MnF can determine the Domain ID#1 of the Domain configured during the CeMF initialization configuration process based on the CeMF ID carried in the second request message, and obtain the verification result by comparing the Domain ID carried in the second request message with the determined Domain ID#1.
- the network management MnF will identify the device initialization trust domain to which CeMF is initialized, that is, the association relationship between the Domain ID and the CeMF ID. MnF can determine the Domain ID#1 configured during the initialization configuration of the CeMF according to the CeMF ID carried in the second request message. If the Domain ID carried in the second request message is Domain ID#1, MnF determines that the information sent by CeMF has passed the verification, otherwise it determines that the information sent by CeMF has not passed the verification.
- the MnF can determine the initialization certificate list #1 corresponding to the managed NF configured during the CeMF initialization configuration process according to the CeMF ID carried in the second request message, and obtain the verification result by comparing the initialization certificate list carried in the second request message with the determined initialization certificate list #1.
- the MnF when the device layer or virtualization layer of the NF is initialized, the MnF will record the initialization certificate configured by the NF.
- the initialization certificate can be configured by the equipment manufacturer or the operator.
- the association between the relevant certificate information and the NF ID is preconfigured in the MnF.
- the MnF can determine the initialization certificate list #1 corresponding to the NF managed during the initialization configuration of the CeMF according to the CeMF ID carried in the second request message. If the initialization certificate list carried in the second request message is the initialization certificate list #1, the MnF determines that the information sent by the CeMF has passed the verification, otherwise it determines that the information sent by the CeMF has not passed the verification.
- MnF when the second request message carries the information of the initialization certificate list, MnF first determines the manufacturer (Vendor1) corresponding to the CeMF ID through the local configuration document, and then MnF verifies the signature of each certificate to see if it is signed by Vendor1. And verify the validity of the signature. If MnF determines that 90% of the certificates are successfully verified, it determines that the information sent by CeMF has passed the verification based on the pre-configured value rule (verification success rate>85%).
- MnF can determine the NF ID list#1 corresponding to the NF managed during the initialization configuration of the CeMF according to the CeMF ID carried in the second request message, and obtain the verification result by comparing the NF ID list carried in the second request message with the determined NF ID list#1.
- MnF when the NF layer device layer or virtualization layer is initialized, MnF will record the NF ID. MnF can determine the NF corresponding to NF ID list#1 configured and managed during the CeMF initialization configuration process according to the CeMF ID carried in the second request message. If the NF ID list carried in the second request message is NF ID list#1, MnF determines that the information sent by CeMF has passed the verification.
- MnF determines that the verification result is the number of different NF IDs in NF ID list#1 and NF ID list#2.
- MnF queries the Online Certificate Status Protocol (OCSP) server of the Private CA to inquire whether the initialization certificate included in the initialization certificate list is a revoked initialization certificate. If it is a revoked initialization certificate, it is determined that the information sent by CeMF has failed the verification.
- OCSP Online Certificate Status Protocol
- the information recorded locally by MnF (such as the initialization information of the certificate application network element, the configuration information of the certificate application network element, or the management information of the certificate application network element, etc.) is used to assist in the process of verifying CeMF.
- the process of pre-configuration information such as the root certificate of Private CA is pre-configured in the CA in the operator's PKI
- the information recorded by MnF can be directly used.
- the MnF may notify the CeEF through the first indication information.
- the method flow shown in FIG3 further includes:
- S440 The MnF sends first indication information to the CeEF, or the CeEF receives the first indication information from the MnF.
- the first indication information is used to indicate whether the first information carried in the second request message passes verification.
- the first indication information directly indicates whether the first information passes the verification.
- the first indication information is 1 bit, and a value of "1" indicates that the first information passes the verification; a value of "0" indicates that the first information fails the verification.
- the first indication information indirectly indicates whether the first information has passed the verification.
- the first indication information indicates whether the first information has passed the verification by indicating whether the first information carried in the second request message is the same as the second information recorded locally by the MnF. If the first indication information indicates that the first information and the second information are different, it is understood that the first information has not passed the verification; or, if the first indication information indicates that the first information and the second information are the same, it is understood that the first information has passed the verification; or, if the first indication information indicates that the first information and the second information are different but the degree of difference meets the threshold requirement, it is understood that the first information has passed the verification.
- the first indication information may further carry indication information #1, where indication information #1 is used to indicate the degree of difference between the first information and the second information.
- the first information carried in the second request message is Domain ID#1
- the ID of the Domain to which CeMF belongs recorded locally by MnF is Domain ID#1
- MnF indicates through the first indication information that the first information has passed the verification.
- the first information carried in the second request message is NF ID list#1, and the IDs of one or more NFs managed by CeMF recorded locally by MnF are NF ID list#2, then MnF indicates through the first indication information that the first information has not passed the verification.
- the MnF may also indicate the difference between NF ID list#1 and NF ID list#2 by carrying indication information #1 in the first indication information.
- indication information #1 may indicate that the difference between NF ID list#1 and NF ID list#2 is that there is a different NF ID.
- the first information carried in the second request message is an initialization certificate list
- the MnF checks the initialization certificates in the initialization certificate list. The book is verified, and if the verification result is that the verification is passed, the MnF indicates through the first indication information that the first information has passed the verification.
- the first indication information may also carry the signature of the MnF.
- the signature of the MnF may be carried to assist the CeEF in verifying whether the first indication information is credible.
- CeEF may determine whether CeMF is credible according to the received first indication information, and the method flow shown in FIG3 further includes:
- CeEF determines whether CeMF is credible.
- the CeEF determines that the CeMF is not trustworthy.
- the CeEF determines that the CeMF is credible.
- the CeEF determines that the CeMF is trustworthy.
- the CeEF may also determine whether the first indication information sent by the management network element is credible in the following manner:
- the first indication information is transmitted via a secure connection (such as SSL), and CeEF ensures that the first indication information is credible.
- CeEF can determine whether the first indication information is credible according to the type of the first indication information (such as the first indication information is Success_response).
- CeEF As another possible way, there is no direct secure channel between CeEF and MnF, and the signature of MnF can be carried in the first indication information. If CeEF is pre-configured with the public key or certificate of MnF, then CeEF can verify whether the first indication information is credible through the signature of MnF carried in the first indication information.
- CeEF determines that the received first indication information is a credible message, and does not constitute any limitation on the protection scope of the present application.
- CeEF can also determine whether the received first indication information is a credible message in other ways, for example, CeEF locally maintains a list of trusted devices and determines that MnF is a trusted device. Examples are not given here one by one.
- CeEF determines whether CeMF is trustworthy, it may notify CeMF through a first response message.
- the method flow shown in FIG3 further includes:
- CeEF sends a first response message to CeMF, or CeMF receives the first response message from CeEF.
- the first response message carries the CeEF ID, and the first response message is used to indicate whether CeEF trusts CeMF.
- the first response message is used to indicate that initial trust is successfully established between CeMF and CeEF, or in other words, the first response message indicates that CeEF trusts CeMF.
- the first response message is used to indicate that the initial trust establishment between CeMF and CeEF fails, or in other words, the first response message indicates that CeEF does not trust CeMF.
- the method flow shown in FIG3 may also include a process of requesting issuance of a service certificate.
- the method flow shown in FIG3 may also include:
- the first NF sends a service certificate request message to CeMF, or CeMF receives the service certificate request message from the first NF.
- the service certificate request message is used to request to obtain a service certificate.
- the first NF and CeMF are network elements in the same trust domain, which can be understood as: the first NF applies for a service certificate on behalf of the first NF through CeMF.
- the business certificate request message carries the first NF ID.
- the first NF ID refers to the ID used by the first NF to apply for a business certificate. It can be the instance ID of the first NF, the sender identity field (sender KID) in the business certificate request message, or any information used to identify the first NF.
- the service certificate request message may also carry at least one of the following information: a public key, a private key, an initialization certificate, or a service type, etc.
- the public key and the private key are generated by the first NF when requesting a business certificate, and are carried by the first NF in the business certificate request message.
- the first NF when requesting a business certificate, the first NF generates a public key and a private key (or a public-private key pair pk/sk), then the first NF can carry the public key and private key corresponding to the first NF in the business certificate request message requesting the business certificate; or, for another example, when requesting a business certificate, the first NF generates a public key, then the first NF can carry the public key corresponding to the first NF in the business certificate request message requesting the business certificate.
- the initialization certificate is a certificate pre-configured in the first NF. If the first NF is configured with an initialization certificate during the initialization process, the first NF can carry the initialization certificate in the service certificate request message.
- the initialization certificate of the first NF is a certificate pre-configured by the MnF during the initialization process. Configured in the first NF; for example, the initialization certificate of the first NF is issued by a Private CA dedicated to the equipment manufacturer/operator through a private interface.
- the service type explicitly or implicitly indicates the type of the requested service certificate, and CeMF or CeEF can determine the type of the applied service certificate according to the service type. It should be understood that when the service certificate request message does not carry the service type, CeMF or CeEF can determine the type of the service certificate according to other information (such as historical request information, etc.), which will not be repeated here.
- step S411 may be performed before step S410, which may be understood as CeMF initiating the initial trust establishment request after receiving the service certificate request of the first NF.
- step S411 may be performed after step S410, such as after step S460. It can be understood that the first NF initiates the service certificate request only after the initial trust establishment between CeMF and CeEF is completed.
- the above two implementation methods are only examples of the timing when the first NF initiates a business certificate request, and do not constitute any limitation on the scope of protection of this application.
- the first NF can initiate a business certificate request at any time, and examples will not be given one by one here.
- CeMF may determine whether to respond to the request of the first network element to apply for a service certificate according to the rule.
- the method flow shown in FIG3 may also include:
- CeMF determines whether to respond to the request of the first NF to apply for a service certificate.
- the CeMF may judge the request of the first NF to apply for a service certificate according to a preconfigured rule, and determine whether to respond to the request of the first NF to apply for a service certificate.
- the type of the service certificate applied for by the first NF is the first type
- the CeMF verifies whether the first NF can apply for the first type of service certificate according to a preconfigured rule.
- the first NF cannot apply for a first type of service certificate. If the service certificate request message requests an application for a first type of service certificate, the CeMF determines to reject the service certificate application of the first NF.
- the type of the first NF is the second type, and the CeMF verifies whether the first NF can apply for a service certificate according to a preconfigured rule.
- the first NF when the first NF is an SMF, it may have an IPSec certificate. If the first NF ID or the initialization certificate indicates that the first NF is not an SMF, the CeMF determines to reject the business certificate application of the first NF.
- the CeMF determines to apply for a service certificate on behalf of the first NF.
- the CeMF makes a judgment on the request of the first NF to apply for a service certificate according to the preconfigured rules, including but not limited to:
- the CeMF directly judges the request of the first NF to apply for a service certificate according to the pre-configured rules, and determines whether to respond to the request of the first NF to apply for a service certificate; or,
- CeMF can also verify whether the certificate application request of the first NF is valid through other network elements or network management according to the pre-configured rules. For example, CeMF can request CeEF to assist in verifying whether the certificate application request of the first NF is valid.
- the specific process can refer to steps S410-S440 (e.g., the function of the first request message is defined as verifying whether the certificate application request of the first NF is valid), which will not be repeated here.
- CeMF determines to reject the service certificate application of the first NF (such as when CeMF determines that the certificate request of the first NF is invalid or unreasonable), and CeMF sends a failure indication to the first NF, where the failure indication is used to indicate that the request of the first NF for the service certificate is invalid.
- the failure indication may also indicate the reason for the failure in requesting the service certificate, such as the failure indication carries a reason value, which indicates that the service certificate applied for by the first NF is not usable or the reason value indicates that the service certificate type does not match the first NF type.
- CeMF may determine a CeEF to issue a service certificate to the first NF according to the requested service certificate type, because CeMF may establish an association with multiple CeEFs, and each CeEF may only issue a specific certificate.
- the method flow shown in FIG3 may also include:
- CeMF sends a service certificate application message to CeEF, or CeEF receives the service certificate application message from CeMF.
- the certificate application request carries the CeMF ID.
- the certificate application request also includes at least one of the following information:
- Public key private key
- first NF ID initialization certificate
- CeMF signature CeMF signature
- the first NF ID or initialization certificate is used to prevent repeated application for service certificates, or to prevent repeated application for service certificates using multiple CeMFs.
- the CeMF signature is used to prevent a third party from tampering with the service certificate application. It should be understood that when the CeEF presets the public key or certificate of the CeMF, the CeMF signature may not be carried, or when there is a secure connection between the CeMF and the CeEF, the CeMF signature may not be carried.
- the public key and private key pair are parameters for applying for a service certificate, which can be carried by the first NF in the service certificate request message, or generated by CeMF on behalf of the first NF.
- CeMF can also generate a public key and/or private key corresponding to the first NF on behalf of the first NF for certificate application, which is not limited in this application.
- CeEF can respond to the request of CeMF, and the method process shown in FIG3 further includes:
- CeEF issues a service certificate to the first NF.
- CeEF issues a service certificate to the first NF in response to the service certificate application request of CeMF.
- the CeEF may directly send the service certificate to the first NF.
- the CeEF may send the service certificate to the first NF indirectly, for example, by forwarding the service certificate to the first NF through other devices.
- the message carrying the business certificate may also carry the CeMF ID.
- CeEF and CeMF establish initial trust before issuing the certificate, and MnF performs auxiliary verification, so that business certificate issuance can be completed in the scenario without Private CA.
- the present application also provides a communication method.
- CeEF can verify MnF or pre-set MnF certificate
- offline verification of CeMF can be implemented.
- the communication method is described in detail below in conjunction with FIG. 4 .
- FIG4 is a schematic flow chart of another communication method provided by the present application, comprising the following steps:
- the first NF sends a service certificate request message to the CeMF, or the CeMF receives the service certificate request message from the first NF.
- step S411 in FIG. 3 Please refer to the description of step S411 in FIG. 3 , which will not be repeated here.
- the CeMF may request the MnF to verify the service certificate request.
- the method flow shown in FIG4 also includes:
- CeMF sends a third request message to MnF, or in other words, MnF receives the third request message from CeMF.
- the third request message is used to request the MnF to verify the service certificate request initiated by the first NF.
- the third request message can be understood as a verification request message.
- the third request message includes the CeMF ID and the first NF ID.
- the third request message also includes the Domain ID and/or the initialization certificate corresponding to the first NF.
- the information carried in the third request message sent by CeMF to MnF in the embodiment shown in FIG. 4 is different from the information carried in the first request message sent by CeMF to CeEF in the embodiment shown in FIG. 3 in that: the information carried is the NF ID of the NF requesting the service certificate, rather than the NF ID list; similarly, the third request message carries the initialization certificate corresponding to the first NF requesting the service certificate, rather than the initialization certificate list.
- CeMF triggers the request to MnF for auxiliary verification based on the service certificate request of the NF. That is to say, in the embodiment shown in FIG.
- the request of CeMF to MnF for verification is initiated by a certain NF, rather than verification for CeMF. If verification is performed for CeMF, the CeMF may manage one or more NFs, so it carries the NF ID list or the initialization certificate list.
- the MnF involved in the embodiment shown in FIG4 is the same as the MnF involved in the embodiment shown in FIG3, and can record the relevant configuration information during the NF initialization process.
- CeEF and CeMF may perform interaction.
- CeMF After CeMF receives the service certificate request message sent by NF, it directly sends a service certificate application message to CeEF. After CeEF receives the service certificate application message sent by CeMF, CeEF will request CeMF to assist in verification through request message #1, and request message #1 includes MnF ID. Optionally, the request message #1 may also include a fresh value, which is used to ensure the real-time nature of the information conveyed.
- the MnF After receiving the third request message, the MnF performs verification, and the method flow shown in FIG4 further includes:
- the process of MnF performing verification can refer to the description of MnF performing verification in step S430 in Figure 3. The difference is that the process of MnF performing verification in this embodiment is based on the initialization certificate or the first NF ID carried in the third request message, rather than the initialization certificate list or NF ID list.
- the initialization certificate carried in the third request message is initialization certificate #1.
- MnF can determine the initialization certificate #2 configured during the initialization process of the first NF based on the first NF ID of the first NF carried in the third request message. If initialization certificate #1 and initialization certificate #2 are the same initialization certificate, MnF determines that CeMF can apply for a business certificate on behalf of the first NF.
- the first NF ID carried in the third request message is NF ID#1.
- MnF can determine the IDs corresponding to one or more NFs managed by the CeMF based on the CeMF ID carried in the third request message. If NF ID#1 belongs to the IDs corresponding to the one or more NFs, MnF determines that the information sent by CeMF can apply for a service certificate on behalf of the first NF.
- the initialization certificate carried in the third request message is initialization certificate #1.
- MnF queries the OCSP server of Private CA to check whether initialization certificate #1 is a revoked initialization certificate. If it is a revoked initialization certificate, it is determined that CeMF cannot apply for a business certificate on behalf of the first NF.
- the CeMF may be notified of the verification result through the second indication information.
- the method flow shown in FIG4 further includes:
- S540 The MnF sends second indication information to the CeMF, or the CeMF receives the second indication information from the MnF.
- the MnF determines that the information sent by the CeMF cannot apply for a service certificate on behalf of the first NF, and the second indication information is used to notify the verification failure.
- MnF determines that CeMF can apply for a service certificate on behalf of the first NF, which can be understood as successful verification. MnF returns the signature of MnF to verify the trusted credential through the second indication information to CeMF, and indicates successful verification.
- the second indication information includes CeMF ID, MnF signature and event ID.
- the MnF may cache the verification event locally in the MnF, which is beneficial for the CeEF to perform subsequent verification.
- the CeMF may send a service certificate application message to the CeEF.
- the method flow shown in FIG4 further includes:
- CeMF sends a service certificate application message to CeEF, or CeEF receives the service certificate application message from CeMF.
- the service certificate application message carries an indication to verify the trusted credentials. If CeMF has completed the interaction with CeEF after sending the third request line message to MnF, CeMF will send the verification trusted credentials to CeEF after receiving the second indication information of MnF.
- the business certificate application message carries CeMF ID, pk/sk, and MnF signature (event ID).
- CeEF may respond and issue a service certificate.
- the method flow shown in FIG4 further includes:
- CeEF issues a service certificate to the first NF.
- step S414 in FIG. 3 Please refer to the description of step S414 in FIG. 3 , which will not be repeated here.
- the CeEF may request the MnF to verify whether a service certificate can be issued to the first NF.
- the method flow shown in FIG4 may further include:
- the CeEF sends a query message to the MnF, or the MnF receives the query message from the CeEF.
- the query message is used to request the MnF to verify whether the CeMF can apply for a service certificate on behalf of the first NF.
- the MnF sends a query response message to the CeEF, or the CeEF receives the query response message from the MnF.
- the query response message is used to indicate whether the authentication passed or failed.
- CeEF after receiving the service certificate request message, CeEF sends a query message to MnF, which carries the event ID and CeMF ID, to query whether the CeMF indicated by the CeMF ID can execute the event indicated by the event ID. For example, if the CeMF indicated by the CeMF ID applies for a service certificate on behalf of the first NF, and the verification event cached locally by MnF indicates that CeMF can apply for a service certificate on behalf of the first NF, then the query response notifies CeEF that the event is executable, and CeEF can issue a service certificate to the first NF.
- the CeEF can request the MnF to verify whether service certificates can be issued to multiple NFs respectively for multiple events.
- CeEF sends a query message to MnF, which carries event ID#1, CeMF ID#1, event ID#2, and CeMF ID#2, wherein event ID#1 and CeMF ID#1 indicate that CeMF#1 indicated by CeMF ID#1 requests the issuance of a business certificate to NF#1, and event ID#2 and CeMF ID#2 indicate that CeMF#2 indicated by CeMF ID#2 requests the issuance of a business certificate to NF#2.
- CeEF is notified through a query response message that event #1 indicated by event ID#1 is executable, and CeEF can issue a service certificate to NF#1; if MnF indicates that CeMF#2 cannot apply for a service certificate for NF#2 based on the verification event indication in the local cache, then CeEF is notified through a query response message that event #2 indicated by event ID#2 is not executable, and CeEF may not issue a service certificate to NF#2.
- the present application also provides a communication method, which can verify CeMF by pre-configuring relevant information in CeMF.
- the communication method is described in detail below in conjunction with FIG. 5 .
- FIG5 is a schematic flow chart of another communication method provided by the present application, comprising the following steps:
- the first message includes the CeMF ID and information corresponding to the CeMF ID.
- the information corresponding to the CeMF ID includes at least one of the following information:
- NF ID list initialization certificate list
- domain ID or NF type initialization certificate list
- CeEF receives and stores the first message sent by MnF. That is to say, CeEF preconfigures the trust domain mapping information where CeMF and NF are located.
- CeEF locally maintains the trust domain mapping information of CeMF and NF as shown in Table 2 below:
- the first NF sends a service certificate request message to the CeMF, or the CeMF receives the service certificate request message from the first NF.
- step S411 in FIG. 3 Please refer to the description of step S411 in FIG. 3 , which will not be repeated here.
- CeMF sends a service certificate application message to CeEF, or CeEF receives the service certificate application message from CeMF.
- CeEF After receiving the service certificate application message from CeMF, CeEF matches the information in the table to see if it is consistent with the information carried in the service certificate application message sent by CeMF. If they are consistent, CeEF issues a service certificate.
- the CeMF ID carried in the service certificate application message indicates that the CeMF requesting the issuance of the service certificate is CeMF1, and the NF ID carried in the service certificate application message is 1000001.
- CeEF determines that the NF with NF ID 1000001 is managed by CeMF1 based on the mapping relationship cached locally (as shown in Table 2), and then issues a service certificate to the first NF.
- the information locally configured by CeEF can configure the NF Type, indicating that CeEF can determine whether the first NF has the conditions to apply for the certificate based on the type.
- the service certificate application message sent by CeMF in step S630 carries the NF ID and requests an IPSec certificate.
- CeEF determines, based on the local table, that the Type corresponding to the NF ID is AMF, and according to the pre-configured rules, this Type does not require an IPSec certificate. In this case, a failure response can be sent to indicate that the first NF certificate application request has applied for the wrong certificate.
- the method flow shown in FIG5 further includes:
- CeEF issues a service certificate to the first NF.
- step S414 in FIG. 3 Please refer to the description of step S414 in FIG. 3 , which will not be repeated here.
- the devices in the existing network architecture are mainly used as examples for exemplary description (such as NF, MnF, etc.), and it should be understood that the specific form of the device is not limited in the embodiments of the present application. For example, devices that can achieve the same function in the future are applicable to the embodiments of the present application.
- the methods and operations implemented by the device can also be implemented by the device components (such as chips or circuits).
- the communication method provided by the embodiment of the present application is described in detail above in conjunction with Figures 3 to 5.
- the above communication method is mainly introduced from the perspective of interaction between various protocol layers of the terminal device. It is understandable that in order to implement the above functions, the terminal device includes a hardware structure and/or software module corresponding to each function.
- the embodiment of the present application can divide the functional modules of the transmitting end device or the receiving end device according to the above method example.
- each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
- the above integrated module can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical functional division. There may be other division methods in actual implementation. The following is an example of dividing each functional module corresponding to each function.
- FIG6 is a schematic block diagram of a communication device 10 provided in an embodiment of the present application.
- the device 10 includes a transceiver module 11 and a processing module 12.
- the transceiver module 11 can implement corresponding communication functions, and the processing module 12 is used to perform data processing, or in other words, the transceiver module 11 is used to perform operations related to receiving and sending, and the processing module 12 is used to perform other operations besides receiving and sending.
- the transceiver module 11 can also be called a communication interface or a communication unit.
- the device 10 may further include a storage module 13, which may be used to store instructions and/or data.
- the processing module 12 may read the instructions and/or data in the storage module so that the device implements the actions of the devices in the aforementioned method embodiments.
- the device 10 may correspond to the CeEF in the above method embodiment, or be a component (such as a chip) of the CeEF.
- the device 10 can implement the steps or processes corresponding to the CeEF execution in the above method embodiment, wherein the transceiver module 11 can be used to perform operations related to the transmission and reception of CeEF in the above method embodiment, and the processing module 12 can be used to perform operations related to the processing of CeEF in the above method embodiment.
- the transceiver module 11 is used to receive a first request message from a certificate application network element, wherein the first request message is used to request authentication of the certificate application network element, and the first request message includes an identifier and first information of the certificate application network element, and the first information is used to authenticate the certificate application network element; the transceiver module 11 is also used to send a second request message to a management network element, wherein the second request message is used to request verification of the first information, and the second request message includes the first information; the transceiver module 11 is also used to receive first indication information from the management network element, and the first indication information is used to indicate whether the first information has passed verification; the processing module 12 is used to determine whether the certificate application network element is a trusted network element based on the first indication information.
- the transceiver module 11 is used to receive a business certificate application message from a certificate application network element, wherein the business certificate application message is used to request the communication device to issue a business certificate, and the business certificate application message includes an identifier of the certificate application network element and a signature of a management network element; the transceiver module 11 is also used to issue a business certificate to a first network element; wherein the signature of the management network element is a signature based on an event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a business certificate for the first network element.
- the transceiver module 11 is used to receive a first message from a management network element, wherein the first message includes information related to at least one certificate application network element locally recorded by the management network element; the transceiver module 11 is also used to receive a business certificate application message from the certificate application network element, wherein the business certificate application message is used to request the communication device to issue a business certificate; and the processing module 12 is used to determine whether to issue a business certificate based on the first message.
- the transceiver module 11 can be used to execute the steps of sending and receiving information in the method, such as steps S410, S420, S460, S413 and S414; the processing module 12 can be used to execute the processing steps in the method, such as step S450.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as steps S550 , S560 , S570 , and S580 ; the processing module 12 may be used to execute the processing steps in the method.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as steps S610 and S630 ; the processing module 12 may be used to execute the processing steps in the method, such as step S640 .
- the device 10 may correspond to the CeMF in the above method embodiment, or be a component (such as a chip) of the CeMF.
- the device 10 can implement the steps or processes executed by the CeMF in the above method embodiment, wherein the transceiver module 11 can be used to perform the operations related to the transceiver of the CeMF in the above method embodiment, and the processing module 12 can be used to perform the operations related to the processing of the CeMF in the above method embodiment.
- the transceiver module 11 is used to send a first request message to a certificate issuing network element, wherein the first request message is used to request authentication of the communication device, and the first request message includes an identifier and first information of the communication device, and the first information is used to authenticate the communication device; the transceiver module 11 is also used to receive a first response message from the certificate issuing network element, wherein the first response message is used to indicate whether the communication device is a trusted network element, wherein the certificate issuing network element determines whether the communication device is a trusted network element based on the first indication information, and the first indication information is feedback information of the certificate issuing network element requesting the management network element to verify the first information.
- the transceiver module 11 is used to receive a service certificate request message from a first network element, wherein the service certificate request message is used to request a communication device to apply for a service certificate on behalf of the first network element; the transceiver module 11 is also used to send a third request message to a management network element, wherein the third request message is used to request the management network element to verify whether the communication device can apply for a service certificate on behalf of the first network element; the transceiver module 11 is also used to receive second indication information from the management network element, wherein the second indication information is used to indicate whether the communication device can apply for a service certificate on behalf of the first network element, wherein the second indication information includes a signature and an event identifier of the management network element, wherein the signature of the management network element is a signature based on an event identifier, and the event identifier is used to identify that the communication device requests to apply for a service certificate on behalf of the first network element.
- the transceiver module 11 can be used to execute the steps of sending and receiving information in the method, such as steps S410, S460, S411, S413 and S414; the processing module 12 can be used to execute the processing steps in the method, such as step S412.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as steps S510 , S520 , S540 , and S550 ; the processing module 12 may be used to execute the processing steps in the method.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as steps S620 and S630 ; and the processing module 12 may be used to execute the processing steps in the method.
- the device 10 may correspond to the MnF in the above method embodiment, or may be a component (such as a chip) of the MnF.
- the device 10 can implement the steps or processes executed by the MnF in the above method embodiment, wherein the transceiver module 11 can be used to perform the operations related to the transceiver of the MnF in the above method embodiment, and the processing module 12 can be used to perform the operations related to the processing of the MnF in the above method embodiment.
- the transceiver module 11 is used to receive a second request message from a certificate issuing network element, where the second request message is used to request verification of the first information, and the second request message includes the first information; the processing module 12 is used to verify the first information based on second information locally recorded by the communication device, where the second information is information related to the certificate application network element; the transceiver module 11 is also used to send first indication information to the certificate issuing network element, where the first indication information is used to indicate whether the first information has passed the verification.
- the transceiver module 11 is used to receive a third request message from a certificate application network element, wherein the third request message is used to request the communication device to verify whether the certificate application network element can apply for a business certificate on behalf of the first network element; the processing module 12 is used to verify whether the certificate application network element can apply for a business certificate on behalf of the first network element based on second information locally recorded by the management network element, wherein the second information is information related to the certificate application network element; the transceiver module 11 is also used to send a second indication message to the certificate issuing network element, wherein the second indication message is used to indicate whether the certificate application network element can apply for a business certificate on behalf of the first network element, and the second indication message includes a signature and an event identifier of the communication device, wherein the signature of the communication device is a signature based on the event identifier, and the event identifier is used to identify that the certificate application network element requests to apply for a business certificate on behalf of the first network element.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as steps S420 and S440 ; the processing module 12 may be used to execute the processing steps in the method, such as step S430 .
- the transceiver module 11 can be used to execute the steps of sending and receiving information in the method, such as steps S520, S540, S570 and S580; the processing module 12 can be used to execute the processing steps in the method, such as step S530.
- the transceiver module 11 may be used to execute the steps of sending and receiving information in the method, such as step S610:
- the processing module 12 may be used to execute the processing steps in the method.
- module here may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a dedicated processor or a group processor, etc.) and a memory for executing one or more software or firmware programs, a merged logic circuit and/or other suitable components that support the described functions.
- ASIC application specific integrated circuit
- processor such as a shared processor, a dedicated processor or a group processor, etc.
- memory for executing one or more software or firmware programs, a merged logic circuit and/or other suitable components that support the described functions.
- the device 10 can be specifically the mobile management network element in the above-mentioned embodiment, and can be used to execute the various processes and/or steps corresponding to the mobile management network element in the above-mentioned method embodiments; or, the device 10 can be specifically the terminal device in the above-mentioned embodiment, and can be used to execute the various processes and/or steps corresponding to the terminal device in the above-mentioned method embodiments. To avoid repetition, it will not be repeated here.
- the device 10 of each of the above schemes has the function of implementing the corresponding steps performed by the device (such as terminal device, network device) in the above method.
- This function can be implemented by hardware, or by hardware executing the corresponding software implementation.
- the hardware or software includes one or more modules corresponding to the above functions; for example, the transceiver module can be replaced by a transceiver (for example, the sending unit in the transceiver module can be replaced by a transmitter, and the receiving unit in the transceiver module can be replaced by a receiver), and other units, such as processing modules, can be replaced by processors to respectively perform the transceiver operations and related processing operations in each method embodiment.
- the transceiver module 11 may also be a transceiver circuit (for example, may include a receiving circuit and a sending circuit), and the processing module may be a processing circuit.
- FIG7 is a schematic diagram of another communication device 20 provided in an embodiment of the present application.
- the device 20 includes a processor 21, and the processor 21 is used to execute a computer program or instruction stored in a memory 22, or read data/signaling stored in the memory 22 to execute the method in each method embodiment above.
- the processor 21 is used to execute a computer program or instruction stored in a memory 22, or read data/signaling stored in the memory 22 to execute the method in each method embodiment above.
- the device 20 further includes a memory 22, and the memory 22 is used to store computer programs or instructions and/or data.
- the memory 22 can be integrated with the processor 21, or can also be separately arranged.
- the memory 22 is one or more.
- the device 20 further includes a transceiver 23, and the transceiver 23 is used for receiving and/or sending signals.
- the processor 21 is used to control the transceiver 23 to receive and/or send signals.
- the device 20 is used to implement the operations performed by CeEF in the above method embodiments.
- the device 20 is used to implement the operations performed by the CeMF in the above various method embodiments.
- the device 20 is used to implement the operations performed by MnF in the above method embodiments.
- processors mentioned in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- DSP digital signal processors
- ASIC application-specific integrated circuits
- FPGA field programmable gate arrays
- a general-purpose processor may be a microprocessor or the processor may also be any conventional processor, etc.
- the memory mentioned in the embodiments of the present application may be a volatile memory and/or a non-volatile memory.
- the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
- the volatile memory may be a random access memory (RAM).
- a RAM may be used as an external cache.
- RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous link DRAM (SLDRAM), and direct rambus RAM (DR RAM).
- SRAM static RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM synchronous link DRAM
- DR RAM direct rambus RAM
- the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.
- memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.
- FIG8 is a schematic diagram of a chip system 30 provided in an embodiment of the present application.
- the chip system 30 (or also referred to as a processing system) includes a logic circuit 31 and an input/output interface 32.
- the logic circuit 31 may be a processing circuit in the chip system 30.
- the logic circuit 31 may be coupled to the storage unit to call the storage unit.
- the instructions in the storage unit enable the chip system 30 to implement the methods and functions of each embodiment of the present application.
- the input/output interface 32 can be an input/output circuit in the chip system 30, outputting information processed by the chip system 30, or inputting data or signaling information to be processed into the chip system 30 for processing.
- the chip system 30 is used to implement the operations performed by CeEF, CeMF, or MnF in the above method embodiments.
- the logic circuit 31 is used to implement the processing-related operations performed by CeEF, CeMF, or MnF in the above method embodiments;
- the input/output interface 32 is used to implement the sending and/or receiving-related operations performed by CeEF, CeMF, or MnF in the above method embodiments.
- the embodiment of the present application further provides a computer-readable storage medium on which are stored computer instructions for implementing the methods executed by CeEF, CeMF, or MnF in the above method embodiments.
- the computer when the computer program is executed by a computer, the computer can implement the method performed by CeEF, CeMF, or MnF in each embodiment of the above method.
- the embodiments of the present application further provide a computer program product, comprising instructions, which, when executed by a computer, implement the methods performed by CeEF, CeMF, or MnF in the above-mentioned method embodiments.
- the embodiment of the present application further provides a communication system, including the aforementioned CeEF, CeMF and MnF.
- the disclosed devices and methods can be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer can be a personal computer, a server, or a network device, etc.
- the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that contains one or more available media integrations.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state disk (SSD)).
- the aforementioned available medium includes, but is not limited to, various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (46)
- 一种通信方法,其特征在于,包括:证书申请网元向证书颁发网元发送第一请求消息,所述第一请求消息用于请求认证所述证书申请网元,所述第一请求消息中包括所述证书申请网元的标识和第一信息,所述第一信息用于对所述证书申请网元进行认证;所述证书颁发网元向管理网元发送第二请求消息,所述第二请求消息用于请求验证所述第一信息,所述第二请求消息中包括所述第一信息;所述管理网元根据所述管理网元本地记录的第二信息对所述第一信息进行验证,所述第二信息为所述证书申请网元相关的信息;所述管理网元向所述证书颁发网元发送第一指示信息,所述第一指示信息用于指示所述第一信息是否通过验证;所述证书颁发网元根据所述第一指示信息确定所述证书申请网元是否为可信的网元。
- 根据权利要求1所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:网元标识列表、域标识、或初始化证书列表,所述网元标识列表用于指示所述证书申请网元管理的至少一个网元,所述域标识用于指示所述证书申请网元所位于的域,所述初始化证书列表用于指示所述证书申请网元管理的至少一个网元被配置的至少一个初始化证书。
- 根据权利要求1或2所述的方法,其特征在于,所述证书颁发网元根据所述第一指示信息确定所述证书申请网元是否为可信的网元,包括:在所述第一指示信息指示所述第一信息通过验证的情况下,所述证书颁发网元确定所述证书申请网元为可信的网元;或者,在所述第一指示信息指示所述第一信息未通过验证的情况下,所述证书颁发网元确定所述证书申请网元为不可信的网元。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一指示信息中还包括管理网元的签名,所述管理网元的签名用于验证所述第一指示信息是否可信。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:所述证书颁发网元向所述证书申请网元发送第一响应消息,所述第一响应消息用于指示所述证书申请网元是否为可信的网元。
- 根据权利要求1至5中任一项所述的方法,其特征在于,所述方法还包括:第一网元向所述证书申请网元发送业务证书请求消息,所述业务证书请求消息用于请求所述证书申请网元代所述第一网元申请业务证书;所述证书申请网元根据规则判断是否响应所述第一网元申请业务证书的请求。
- 根据权利要求6所述的方法,其特征在于,所述业务证书请求消息中包括所述第一网元的标识和以下信息中的至少一项:所述第一网元对应的公钥、所述第一网元对应的私钥、所述第一网元被配置的初始化证书、或业务类型指示信息。
- 根据权利要求6或7所述的方法,其特征在于,在所述业务证书请求消息请求的业务证书的类型为第一类型的情况下,所述证书申请网元根据规则判断是否响应所述第一网元申请业务证书的请求包括:所述证书申请网元根据规则验证所述第一网元是否可以申请第一类型的业务证书;在验证失败时,所述方法还包括:所述证书申请网元向所述第一网元发送失败指示,所述失败指示用于指示所述第一网元申请业务证书的请求无效。
- 根据权利要求1至8中任一项所述的方法,其特征在于,在所述第一信息为所述网元标识列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元的标识构成所述网元标识列表时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述初始化证书列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元对应的初始化证书构成所述初始化证书列表,所述初始化证书列表中的初始化证书均有效时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述域标识,且所述管理网元本地记录的所述证书申请网元所属的域的标识为所述域标识时,所述管理网元确定所述第一信息通过验证。
- 根据权利要求1至9中任一项所述的方法,其特征在于,所述第二信息包括以下信息中的至少一种:所述证书申请网元的初始化信息、所述证书申请网元的配置信息、或所述证书申请网元的管理信息。
- 一种通信方法,其特征在于,包括:证书颁发网元接收来自证书申请网元的第一请求消息,所述第一请求消息用于请求认证所述证书申请网元,所述第一请求消息中包括所述证书申请网元的标识和第一信息,所述第一信息用于对所述证书申请网元进行认证;所述证书颁发网元向管理网元发送第二请求消息,所述第二请求消息用于请求验证所述第一信息,所述第二请求消息中包括所述第一信息;所述证书颁发网元接收来自所述管理网元的第一指示信息,所述第一指示信息用于指示所述第一信息是否通过验证;所述证书颁发网元根据所述第一指示信息确定所述证书申请网元是否为可信的网元。
- 根据权利要求11所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:网元标识列表、域标识、或初始化证书列表,所述网元标识列表用于指示所述证书申请网元管理的至少一个网元,所述域标识用于指示所述证书申请网元所位于的域,所述初始化证书列表用于指示所述证书申请网元管理的至少一个网元被配置的至少一个初始化证书。
- 根据权利要求11或12所述的方法,其特征在于,所述证书颁发网元根据所述第一指示信息确定所述证书申请网元是否为可信的网元,包括:在所述第一指示信息指示所述第一信息通过验证的情况下,所述证书颁发网元确定所述证书申请网元为可信的网元;或者,在所述第一指示信息指示所述第一信息未通过验证的情况下,所述证书颁发网元确定所述证书申请网元为不可信的网元。
- 根据权利要求11至13中任一项所述的方法,其特征在于,所述第一指示信息中还包括管理网元的签名,所述管理网元的签名用于验证所述第一指示信息是否可信。
- 根据权利要求11至14中任一项所述的方法,其特征在于,所述方法还包括:所述证书颁发网元向所述证书申请网元发送第一响应消息,所述第一响应消息用于指示所述证书申请网元是否为所述证书颁发网元可信的网元。
- 一种通信系统,包括证书申请网元、证书颁发网元和管理网元,其特征在于:所述证书申请网元用于向证书颁发网元发送第一请求消息,所述第一请求消息用于请求认证所述证书申请网元,所述第一请求消息中包括所述证书申请网元的标识和第一信息,所述第一信息用于对所述证书申请网元进行认证;所述证书颁发网元用于向管理网元发送第二请求消息,所述第二请求消息用于请求验证所述第一信息,所述第二请求消息中包括所述第一信息;所述管理网元用于根据所述管理网元本地记录的第二信息对所述第一信息进行验证,所述第二信息为所述证书申请网元相关的信息;所述管理网元还用于向所述证书颁发网元发送第一指示信息,所述第一指示信息用于指示所述第一信息是否通过验证;所述证书颁发网元还用于根据所述第一指示信息确定所述证书申请网元是否为可信的网元。
- 根据权利要求16所述的通信系统,其特征在于,所述证书颁发网元用于根据所述第一指示信息确定所述证书申请网元是否为可信的网元,包括:在所述第一指示信息指示所述第一信息通过验证的情况下,所述证书颁发网元确定所述证书申请网元为可信的网元;或者,在所述第一指示信息指示所述第一信息未通过验证的情况下,所述证书颁发网元确定所述证书申请网元为不可信的网元。
- 根据权利要求16或17所述的通信系统,其特征在于,所述证书颁发网元还用于向所述证书申请网元发送第一响应消息,所述第一响应消息用于指示所述证书申请网元是否为所述证书颁发网元可信 的网元。
- 根据权利要求16至18中任一项所述的通信系统,其特征在于,所述通信系统还包括第一网元:所述第一网元用于向所述证书申请网元发送业务证书请求消息,所述业务证书请求消息用于请求所述证书申请网元代所述第一网元申请业务证书;所述证书申请网元还用于根据规则判断是否响应所述第一网元申请业务证书的请求。
- 根据权利要求19所述的通信系统,其特征在于,在所述业务证书请求消息请求的业务证书的类型为第一类型的情况下,所述证书申请网元用于根据规则判断是否响应所述第一网元申请业务证书的请求包括:所述证书申请网元用于根据规则验证所述第一网元是否可以申请第一类型的业务证书;在验证失败时,所述证书申请网元还用于向所述第一网元发送失败指示,所述失败指示用于指示所述第一网元申请业务证书的请求无效。
- 根据权利要求16至20中任一项所述的通信系统,其特征在于,在所述第一信息为所述网元标识列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元的标识构成所述网元标识列表时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述初始化证书列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元对应的初始化证书构成所述初始化证书列表,所述初始化证书列表中的初始化证书均有效时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述域标识,且所述管理网元本地记录的所述证书申请网元所属的域的标识为所述域标识时,所述管理网元确定所述第一信息通过验证。
- 一种通信装置,其特征在于,所述装置包括:用于执行如权利要求1至10中任一项所述的方法的模块,或者用于执行如权利要求11至15中任一项所述的方法的模块。
- 一种通信装置,其特征在于,包括:处理器,用于执行存储器中存储的计算机程序,以使得所述装置执行如权利要求1至10中任一项所述的方法,或者以使得所述装置执行如权利要求11至15中任一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括用于执行如权利要求1至10中任一项所述的方法的指令,或者,所述计算机程序产品包括用于执行如权利要求11至15中任一项所述的方法的指令。
- 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质存储有计算机程序;所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至10中任一项所述的方法,或者使得所述计算机执行如权利要求11至15中任一项所述的方法。
- 一种通信方法,其特征在于,包括:管理网元接收来自证书颁发网元的第二请求消息,所述第二请求消息用于请求验证所述第一信息,所述第二请求消息中包括所述第一信息;所述管理网元根据所述管理网元本地记录的第二信息对所述第一信息进行验证,所述第二信息为所述证书申请网元相关的信息;所述管理网元向所述证书颁发网元发送第一指示信息,所述第一指示信息用于指示所述第一信息是否通过验证。
- 根据权利要求26所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:网元标识列表、域标识、或初始化证书列表,所述网元标识列表用于指示所述证书申请网元管理的至少一个网元,所述域标识用于指示所述证书申请网元所位于的域,所述初始化证书列表用于指示所述证书申请网元管理的至少一个网元被配置的至少一个初始化证书。
- 根据权利要求26或27所述的方法,其特征在于,在所述第一信息为所述网元标识列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元的标识构成所述网元标识列表时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述初始化证书列表,且所述管理网元本地记录的所述证书申请网元管理的一个或多个网元对应的初始化证书构成所述初始化证书列表,所述初始化证书列表中的初始化证书均有效时,所述管理网元确定所述第一信息通过验证;或者,在所述第一信息为所述域标识,且所述管理网元本地记录的所述证书申请网元所属的域的标识为所述域标识时,所述管理网元确定所述第一信息通过验证。
- 根据权利要求26至28中任一项所述的方法,其特征在于,所述第一指示信息中还包括管理网元的签名,所述管理网元的签名用于验证所述第一指示信息是否可信。
- 一种通信方法,其特征在于,包括:证书申请网元接收来自第一网元的业务证书请求消息,所述业务证书请求消息用于请求证书申请网元代所述第一网元申请业务证书;所述证书申请网元向管理网元发送第三请求消息,所述第三请求消息用于请求所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书;所述管理网元根据所述管理网元本地记录的第二信息,验证所述证书申请网元能否代所述第一网元申请业务证书,所述第二信息为所述证书申请网元相关的信息;所述管理网元向所述证书申请网元发送第二指示信息,所述第二指示信息用于指示所述证书申请网元能否代所述第一网元申请业务证书,所述第二指示信息中包括所述管理网元的签名和事件标识,其中,所述管理网元的签名为基于事件标识的签名,所述事件标识用于标识所述证书申请网元代所述第一网元申请业务证书。
- 根据权利要求30所述的方法,其特征在于,所述方法还包括:所述证书申请网元向证书颁发网元发送业务证书申请消息,所述业务证书申请消息用于请求所述证书颁发网元为所述第一网元颁发业务证书,所述业务证书申请消息中包括所述证书申请网元的标识和所述管理网元的签名。
- 根据权利要求30或31所述的方法,其特征在于,所述方法还包括:所述证书颁发网元向所述管理网元发送查询消息,所述查询消息用于查询所述证书申请网元能否代第一网元申请业务证书,所述查询消息中包括所述证书申请网元的标识和所述事件标识;所述证书颁发网元接收来自所述管理网元发送查询响应消息,所述查询响应消息用于指示所述证书申请网元能否代第一网元申请业务证书。
- 根据权利要求30至32中任一项所述的方法,其特征在于,在所述第三请求消息包括所述第一网元的标识的情况下,所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书,包括:所述管理网元本地记录的所述证书申请网元管理的一个或多个网元的标识包括所述第一网元的标识时,所述管理网元确定所述证书申请网元能代所述第一网元申请业务证书;或者,在所述第二请求消息包括所述第一网元对应的初始化证书的情况下,所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书,包括:所述管理网元本地记录的所述证书申请网元管理的一个或多个网元对应的初始化证书包括所述第一网元的对应的初始化证书时,所述管理网元确定所述证书申请网元能代所述第一网元申请业务证书。
- 一种通信方法,其特征在于,包括:证书颁发网元接收来自证书申请网元的业务证书申请消息,所述业务证书申请消息用于请求所述证书颁发网元颁发业务证书,所述业务证书申请消息中包括所述证书申请网元的标识和管理网元的签名;所述证书颁发网元向第一网元颁发业务证书;其中,所述管理网元的签名为基于事件标识的签名,所述事件标识用于标识所述证书申请网元请求为所述第一网元申请业务证书。
- 根据权利要求34所述的方法,其特征在于,所述方法还包括:所述证书颁发网元向所述管理网元发送查询消息,所述查询消息用于查询所述证书申请网元能否代第一网元申请业务证书,所述查询消息中包括所述证书申请网元的标识和所述事件标识;所述证书颁发网元接收来自所述管理网元发送查询响应消息,所述查询响应消息用于指示所述证书申请网元能否代第一网元申请业务证书。
- 一种通信方法,其特征在于,包括:证书申请网元接收来自第一网元的业务证书请求消息,所述业务证书请求消息用于请求证书申请网元代所述第一网元申请业务证书;所述证书申请网元向管理网元发送第三请求消息,所述第三请求消息用于请求所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书;所述证书申请网元接收来自所述管理网元的第二指示信息,所述第二指示信息用于指示所述证书申请网元能否待所述第一网元申请业务证书,所述第二指示信息中包括所述管理网元的签名和事件标识,其中,所述管理网元的签名为基于事件标识的签名,所述事件标识用于标识所述证书申请网元请求代所述第一网元申请业务证书。
- 根据权利要求36所述的方法,其特征在于,所述方法还包括:所述证书申请网元向证书颁发网元发送业务证书申请消息,所述业务证书申请消息用于请求所述证 书颁发网元为所述第一网元颁发业务证书,所述业务证书申请消息中包括所述证书申请网元的标识和所述管理网元的签名。
- 一种通信方法,其特征在于,包括:管理网元接收来自证书申请网元的第三请求消息,所述第三请求消息用于请求所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书;所述管理网元根据所述管理网元本地记录的第二信息,验证所述证书申请网元能否代所述第一网元申请业务证书,所述第二信息为所述证书申请网元相关的信息;所述管理网元向所述证书颁发网元发送第二指示信息,所述第二指示信息用于指示所述证书申请网元能否待所述第一网元申请业务证书,所述第二指示信息中包括所述管理网元的签名和事件标识,其中,所述管理网元的签名为基于事件标识的签名,所述事件标识用于标识所述证书申请网元请求代所述第一网元申请业务证书。
- 根据权利要求38所述的方法,其特征在于,在所述第三请求消息包括所述第一网元的标识的情况下,所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书,包括:所述管理网元本地记录的所述证书申请网元管理的一个或多个网元的标识包括所述第一网元的标识时,所述管理网元确定所述证书申请网元能代所述第一网元申请业务证书;或者,在所述第二请求消息包括所述第一网元对应的初始化证书的情况下,所述管理网元验证所述证书申请网元能否代所述第一网元申请业务证书,包括:所述管理网元本地记录的所述证书申请网元管理的一个或多个网元对应的初始化证书包括所述第一网元的对应的初始化证书时,所述管理网元确定所述证书申请网元能代所述第一网元申请业务证书。
- 根据权利要求38或39所述的方法,其特征在于,所述方法还包括:所述管理网元接收来自证书颁发网元的查询消息,所述查询消息用于查询所述证书申请网元能否代第一网元申请颁发业务证书,所述查询消息中包括所述证书申请网元的标识和所述事件标识;所述管理网元向所述证书颁发网元发送查询响应消息,所述查询响应消息用于指示所述证书申请网元能否代第一网元申请颁发业务证书。
- 一种通信方法,其特征在于,包括:证书颁发网元接收来自管理网元的第一消息,所述第一消息中包括所述管理网元本地记录的至少一个证书申请网元相关的信息;所述证书颁发网元接收来自证书申请网元的业务证书申请消息,所述业务证书申请消息用于请求所述证书颁发网元颁发业务证书;所述证书颁发网元根据所述第一消息确定是否颁发业务证书。
- 根据权利要求41所述的方法,其特征在于,所述第一消息中包括证书申请网元的标识和以下至少一种信息的对应关系:网元的标识、域标识、初始化证书标识、或网元类型。
- 一种通信装置,其特征在于,所述装置包括:用于执行如权利要求26至29中任一项所述的方法的模块,或者用于执行如权利要求34或35所述的方法的模块,或者用于执行如权利要求36或37所述的方法的模块,或者用于执行如权利要求38至40中任一项所述的方法的模块,或者用于执行如权利要求41或42所述的方法的模块。
- 一种通信装置,其特征在于,包括:处理器,用于执行存储器中存储的计算机程序,以使得所述装置执行如权利要求26至29中任一项所述的方法,或者以使得所述装置执行如权利要求34或35所述的方法,或者以使得所述装置执行如权利要求36或37所述的方法,或者以使得所述装置执行如权利要求38至40中任一项所述的方法,或者以使得所述装置执行如权利要求41或42所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括用于执行如权利要求26至29中任一项所述的方法的指令,或者,所述计算机程序产品包括用于执行如权利要求34或35所述的方法的指令,或者,所述计算机程序产品包括用于执行如权利要求36或37所述的方法的指令,或者,所述计算机程序产品包括用于执行如权利要求38至40中任一项所述的方法的指令,或者,所述计算机程序产品包括用于执行如权利要求41或42所述的方法的指令。
- 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质存储有计算机程序;所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求26至29中任一项所述的方法,或者使得所述计算机执行如权利要求34或35所述的方法,或者使得所述计算机执行如权利要求36或37所述的方法,或者使得所述计算机执行如权利要求38至40中任一项所述的方法,或者使得所述计算机执 行如权利要求41或42所述的方法。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP23884853.5A EP4614874A4 (en) | 2022-11-04 | 2023-10-30 | METHOD AND APPARATUS OF COMMUNICATION |
| US19/195,066 US20250279901A1 (en) | 2022-11-04 | 2025-04-30 | Communication method and communication apparatus |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211378354.0A CN117997541A (zh) | 2022-11-04 | 2022-11-04 | 通信方法和通信装置 |
| CN202211378354.0 | 2022-11-04 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US19/195,066 Continuation US20250279901A1 (en) | 2022-11-04 | 2025-04-30 | Communication method and communication apparatus |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024093923A1 true WO2024093923A1 (zh) | 2024-05-10 |
Family
ID=90901710
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2023/127793 Ceased WO2024093923A1 (zh) | 2022-11-04 | 2023-10-30 | 通信方法和通信装置 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20250279901A1 (zh) |
| EP (1) | EP4614874A4 (zh) |
| CN (1) | CN117997541A (zh) |
| WO (1) | WO2024093923A1 (zh) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119182564A (zh) * | 2024-08-27 | 2024-12-24 | 中国联合网络通信集团有限公司 | 下载小程序的方法、装置及存储介质 |
| WO2026045922A1 (zh) * | 2024-08-29 | 2026-03-05 | 华为技术有限公司 | 通信方法及相关装置 |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119603683A (zh) * | 2023-09-08 | 2025-03-11 | 华为技术有限公司 | 一种身份校验方法及装置 |
| CN121543067A (zh) * | 2026-01-15 | 2026-02-17 | 杭州高新区(滨江)区块链与数据安全研究院 | 基于双重校验的分级许可证管控方法、系统和平台设备 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020208294A1 (en) * | 2019-04-11 | 2020-10-15 | Nokia Technologies Oy | Establishing secure communication paths to multipath connection server with initial connection over public network |
| CN114449521A (zh) * | 2021-12-29 | 2022-05-06 | 华为技术有限公司 | 通信方法及通信装置 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10797888B1 (en) * | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
| US10298581B2 (en) * | 2017-04-28 | 2019-05-21 | Cisco Technology, Inc. | Zero-touch IoT device provisioning |
| US11475134B2 (en) * | 2019-04-10 | 2022-10-18 | Arm Limited | Bootstrapping a device |
-
2022
- 2022-11-04 CN CN202211378354.0A patent/CN117997541A/zh active Pending
-
2023
- 2023-10-30 EP EP23884853.5A patent/EP4614874A4/en active Pending
- 2023-10-30 WO PCT/CN2023/127793 patent/WO2024093923A1/zh not_active Ceased
-
2025
- 2025-04-30 US US19/195,066 patent/US20250279901A1/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020208294A1 (en) * | 2019-04-11 | 2020-10-15 | Nokia Technologies Oy | Establishing secure communication paths to multipath connection server with initial connection over public network |
| CN114449521A (zh) * | 2021-12-29 | 2022-05-06 | 华为技术有限公司 | 通信方法及通信装置 |
Non-Patent Citations (3)
| Title |
|---|
| "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Automated Certificate Management in SBA; (Release 18)", 3GPP DRAFT; S3-221619, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 6 July 2022 (2022-07-06), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052257877 * |
| "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Automated Certificate Management in SBA; (Release 18)", 3GPP DRAFT; S3-223033, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 20 October 2022 (2022-10-20), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052271943 * |
| See also references of EP4614874A4 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119182564A (zh) * | 2024-08-27 | 2024-12-24 | 中国联合网络通信集团有限公司 | 下载小程序的方法、装置及存储介质 |
| WO2026045922A1 (zh) * | 2024-08-29 | 2026-03-05 | 华为技术有限公司 | 通信方法及相关装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4614874A1 (en) | 2025-09-10 |
| CN117997541A (zh) | 2024-05-07 |
| EP4614874A4 (en) | 2026-03-18 |
| US20250279901A1 (en) | 2025-09-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250350946A1 (en) | Communication method, communication apparatus, and communication system | |
| CN112449315B (zh) | 一种网络切片的管理方法及相关装置 | |
| CN113676904B (zh) | 切片认证方法及装置 | |
| WO2024093923A1 (zh) | 通信方法和通信装置 | |
| WO2019017837A1 (zh) | 网络安全管理的方法及装置 | |
| CN111818516A (zh) | 认证方法、装置及设备 | |
| US20250184731A1 (en) | Communication method and communication apparatus | |
| US20250063364A1 (en) | Communication method and network element device | |
| US11496894B2 (en) | Method and apparatus for extensible authentication protocol | |
| EP4135380A1 (en) | Secure communication method, and related apparatus and system | |
| CN115989689A (zh) | 用于边缘数据网络的用户装备认证和授权规程 | |
| WO2024169565A1 (zh) | 通信方法和通信装置 | |
| WO2024094047A1 (zh) | 通信方法和通信装置 | |
| CN115843447A (zh) | 用户装备对边缘数据网络的接入的网络认证 | |
| WO2024067619A1 (zh) | 通信方法和通信装置 | |
| WO2024094319A1 (en) | First node, second node, third node, fourth node and methods performed thereby for handling registration of the second node | |
| WO2023011158A1 (zh) | 一种证书管理方法和装置 | |
| CN115412911A (zh) | 一种鉴权方法、通信装置和系统 | |
| WO2021185347A1 (zh) | 接入控制方法及通信设备 | |
| CN120614685A (zh) | 一种通信方法和通信装置 | |
| WO2024179262A1 (zh) | 通信方法和通信装置 | |
| WO2020215272A1 (zh) | 通信方法、通信装置和通信系统 | |
| GB2625993A (en) | Authentication in a personal area network | |
| WO2025026183A1 (zh) | 通信方法和通信装置 | |
| US20260075111A1 (en) | Communication method and communication apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23884853 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023884853 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2023884853 Country of ref document: EP Effective date: 20250604 |
|
| REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112025008626 Country of ref document: BR |
|
| WWP | Wipo information: published in national office |
Ref document number: 2023884853 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 112025008626 Country of ref document: BR Kind code of ref document: A2 Effective date: 20250430 |