WO2022027161A1 - 业务的切片激活方法、业务的切片激活装置及存储介质 - Google Patents

业务的切片激活方法、业务的切片激活装置及存储介质 Download PDF

Info

Publication number
WO2022027161A1
WO2022027161A1 PCT/CN2020/106509 CN2020106509W WO2022027161A1 WO 2022027161 A1 WO2022027161 A1 WO 2022027161A1 CN 2020106509 W CN2020106509 W CN 2020106509W WO 2022027161 A1 WO2022027161 A1 WO 2022027161A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
application
slice
activating
encrypted
Prior art date
Application number
PCT/CN2020/106509
Other languages
English (en)
French (fr)
Other versions
WO2022027161A9 (zh
Inventor
刘洋
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to US18/003,191 priority Critical patent/US20230247541A1/en
Priority to CN202080001852.6A priority patent/CN112055977B/zh
Priority to PCT/CN2020/106509 priority patent/WO2022027161A1/zh
Publication of WO2022027161A1 publication Critical patent/WO2022027161A1/zh
Publication of WO2022027161A9 publication Critical patent/WO2022027161A9/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to a method for activating a slice of a service, a device for activating a slice of a service, and a storage medium.
  • the fifth generation mobile communication system introduced the network slicing (NS) technology.
  • the network slicing technology allows the network (core network and radio access network) to be divided into multiple slices, and different services are transmitted in different slices without interfering with each other.
  • the establishment of slices may be for services such as a data network name (Data Network Name, DNN), an IP triplet, and an application identifier (APP ID).
  • DNN Data Network Name
  • IP triplet IP triplet
  • APP ID application identifier
  • the slice at the application identification level can provide targeted services for the application (APP) to attract users to create value.
  • the application identifier is in plain text in the standard, so there will be security problems in use, that is, it is easy to be fraudulently used (non-paid applications use paid application identifiers, that is, hijacking). Therefore, the slice activation of services based on application identification needs to be further optimized.
  • the present disclosure provides a service slice activation method, a service slice activation device and a storage medium.
  • a method for activating a slice of a service includes: acquiring first information, where the first information includes an encrypted identifier corresponding to an application identifier; the first information, and activate the slice configuration for the application associated with the application identifier.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identification corresponding to the application identification is determined by encrypting the application identification and/or the terminal identification, and the terminal identification is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the method for activating slices of the service further includes:
  • the second information includes update information associated with the application identifier and the encryption identifier.
  • the method for activating slices of the service further includes:
  • the application identifier corresponding to the encryption identifier is determined; and the application identifier corresponding to the encryption identifier is sent.
  • the acquiring the first information includes: acquiring the first information through a slice registration request, wherein the first information is carried in the slice registration request.
  • a method for activating a slice of a service includes:
  • First information is reported, where the first information is used to activate a slice configuration for an application associated with an application identifier, and includes an encryption identifier corresponding to the application identifier.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identification corresponding to the application identification is determined by encrypting the application identification and/or the terminal identification, and the terminal identification is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the method for activating slices of the service further includes:
  • Second information is reported, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the method for activating slices of the service further includes:
  • the reporting of the first information includes:
  • the first information is reported through a slice registration request, where the first information is carried in the slice registration request.
  • an apparatus for activating slices of services where the apparatus for activating slices of services includes:
  • an acquiring unit configured to acquire first information, where the first information includes an encrypted identifier corresponding to an application identifier; a processing unit, configured to activate a slice for an application associated with the application identifier based on the first information configuration.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identification corresponding to the application identification is determined by encrypting the application identification and/or the terminal identification, and the terminal identification is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the obtaining unit is further configured to obtain second information, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the processing unit is further configured to: determine the application identifier corresponding to the encrypted identifier based on the encrypted identifier, the preset encryption rule and/or the correspondence between the encrypted identifier and the application identifier;
  • the apparatus for activating slices of the service further includes a sending unit, where the sending unit is configured to send an application identifier corresponding to the encrypted identifier.
  • the obtaining unit is configured to obtain the first information through a slice registration request, wherein the first information is carried in the slice registration request.
  • an apparatus for activating slices of services includes: a sending unit, configured to report first information, where the first information is used to activate a target service related to an application identifier
  • the slice configuration of the connected application includes an encryption identifier corresponding to the application identifier.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identification corresponding to the application identification is determined by encrypting the application identification and/or the terminal identification, and the terminal identification is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the sending unit is further used for:
  • Second information is reported, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the apparatus further includes an obtaining unit, where the obtaining unit is configured to: obtain an application identifier corresponding to the encrypted identifier.
  • the sending unit is configured to: report the first information through a slice registration request, where the first information is carried in the slice registration request.
  • a device for activating slices of services including:
  • processor ; memory for storing processor-executable instructions;
  • the processor is configured to: execute the first aspect or the method for activating slices of services described in any implementation manner of the first aspect.
  • a device for activating slices of services including:
  • processor ; memory for storing processor-executable instructions;
  • the processor is configured to: execute the second aspect or the service slice activation method described in any implementation manner of the second aspect.
  • a non-transitory computer-readable storage medium when instructions in the storage medium are executed by a processor of a network device, the network device can execute the first aspect or the first aspect The method for activating slices of services described in any one of the embodiments.
  • a non-transitory computer-readable storage medium which enables the mobile terminal to execute the second aspect or the second aspect when instructions in the storage medium are executed by a processor of a mobile terminal.
  • the technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects: by acquiring an encrypted identifier corresponding to an application identifier, the encryption of the application identifier is realized, and then the slice configuration activation of the application associated with the application identifier can be performed, which can improve the security of the application identifier. The security of the slice activation of the business.
  • FIG. 1 is a schematic diagram showing the architecture of a wireless communication system according to an exemplary embodiment.
  • Fig. 2 is a schematic diagram of slicing processing for an application identification service according to an exemplary embodiment.
  • Fig. 3 is a flowchart of a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 4 is a flowchart of a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 5 is a flowchart of a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 6 is a flowchart of a method for activating slices of a service according to an exemplary embodiment.
  • Figure 7 is a flow chart of a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 8 is a flowchart showing a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 9 is a flowchart showing a method for activating slices of a service according to an exemplary embodiment.
  • Fig. 10 is a block diagram of an apparatus for activating slices of a service according to an exemplary embodiment.
  • Fig. 11 is a block diagram of an apparatus for activating slices of a service according to an exemplary embodiment.
  • Fig. 12 is a block diagram of an apparatus for activating slices of services according to an exemplary embodiment.
  • Fig. 13 is a block diagram of an apparatus for activating slices of services according to an exemplary embodiment.
  • the present disclosure provides a service slice activation method, which can be applied to the wireless communication system shown in FIG. 1 .
  • a mobile station accesses a wireless access network through a wireless access network network device such as a base station.
  • a wireless access network network device such as a base station.
  • the wireless access network network equipment and the core network network equipment complete the backhaul and forward transfer of data to perform various communication services.
  • a wireless communication system is a network that provides wireless communication functions.
  • Wireless communication systems can use different communication technologies, such as code division multiple access (CDMA), wideband code division multiple access (WCDMA), time division multiple access (TDMA) , frequency division multiple access (frequency division multiple access, FDMA), orthogonal frequency division multiple access (orthogonal frequency-division multiple access, OFDMA), single carrier frequency division multiple access (single Carrier FDMA, SC-FDMA), carrier sense Carrier Sense Multiple Access with Collision Avoidance.
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency division multiple access
  • single carrier frequency division multiple access single Carrier FDMA, SC-FDMA
  • carrier sense Carrier Sense Multiple Access with Collision Avoidance carrier sense Carrier Sense Multiple Access with Collision Avoidance.
  • the network can be divided into 2G (English: generation) network, 3G network, 4G network or future evolution network, such as 5G network, 5G network can also be called a new wireless network ( New Radio, NR).
  • the network in the present disclosure may include a radio access network (Radio Access Network, RAN) and a core network (Core Network, CN).
  • the network includes network equipment, and the network equipment may be, for example, a radio access network node, a core network equipment, or the like.
  • the radio access network node may also be referred to as a base station.
  • the network can provide network services for the terminal through network equipment, and different operators can provide different network services for the terminal. It can also be understood that different operators correspond to different operator networks.
  • MS Mobile Station
  • UE User Equipment
  • Terminal Terminal
  • Mobile Terminal Mobile Terminal
  • MT Mobile Terminal
  • the terminal may be a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • terminals are: Smartphone (Mobile Phone), Pocket Personal Computer (PPC), PDA, Personal Digital Assistant (PDA), notebook computer, tablet computer, wearable device, or Vehicle equipment, etc.
  • the slicing activation of services provided by the embodiments of the present disclosure is applied to a communication network into which the network slicing technology is introduced.
  • the application of network slicing technology can transmit different services in different slices without interfering with each other.
  • Embodiments of the present disclosure provide slice activation for services corresponding to application identifiers. Create different slices for different apps.
  • FIG. 2 shows a schematic diagram of slice processing for an application identification service. Referring to FIG. 2 , different slices are established for APP1 and APP2 uploaded on the terminal, a default slice is established for APP1, and a dedicated slice is established for APP2.
  • APP1 and APP2 perform slice transmission of services based on different service identification rules (URSP) and quality of service (QoS), and can provide targeted services for different APPs.
  • URSP service identification rules
  • QoS quality of service
  • the application ID will have security problems in use, that is to say, it is easy to be used fraudulently (non-paid apps fraudulently use the paid ID, that is, hijacking), because this ID is currently in plaintext in the standard.
  • non-paid apps fraudulently use the paid ID, that is, hijacking
  • this ID is currently in plaintext in the standard.
  • the mobile phone terminal only exists as a communication network pipe (one end of the pipe), and many terminal equipment manufacturers are also involved in the Internet of Things business, so there is also a need for application identification for management.
  • an embodiment of the present disclosure provides a method for activating a slice of a service.
  • a terminal sends an encrypted identifier corresponding to an application identifier to the network side.
  • the network device obtains the encrypted identifier corresponding to the application identifier, and performs slice activation of the service identified by the application based on the encrypted identifier, which can improve the security of the slice activation of the service identified by the application.
  • Fig. 3 is a flowchart of a method for activating a slice of a service according to an exemplary embodiment. As shown in Fig. 3 , the method for activating a slice of a service is used in a network device, and includes the following steps.
  • step S11 first information is acquired, where the first information includes an encrypted identifier corresponding to the application identifier.
  • step S12 based on the first information, a slice configuration for the application associated with the application identifier is activated.
  • the encrypted identifier corresponding to the application identifier may be an encrypted identifier corresponding to the application identifier generated by the communication terminal organization for the application carried on its own device.
  • a communication terminal organization can sign a cooperation agreement with an application operator that has a contract with itself, so that when the application of the application operator is uploaded to the terminal, it can use the network slicing service provided by the network operator dedicated to the application, so as to improve the application network fluency.
  • the network slicing service may be different for different communication terminal organizations.
  • the communication terminal organization can encrypt the application identifiers of the applications of these application operators to obtain encrypted identifiers.
  • the communication terminal organization can be a single communication terminal manufacturer, a communication terminal manufacturer alliance composed of multiple communication terminal manufacturers, or a third-party communication terminal alliance composed of multiple terminals (for example, a group composed of end customers themselves, a company's employees, etc.).
  • the encrypted identifiers corresponding to the application identifiers may be multiple encrypted identifiers corresponding to multiple APPs loaded on the device.
  • the network device may acquire multiple encrypted identifiers corresponding to multiple application identifiers. Therefore, the network device can obtain multiple application identities corresponding thereto based on the multiple encrypted identities, and can activate the corresponding slice configuration for the multiple application identities at the same time. In the above manner, signaling overhead is saved.
  • the encrypted identifier corresponding to the application identifier may be determined by a preset correspondence between the application identifier and the encrypted identifier.
  • the corresponding relationship may be represented by a relationship correspondence table including a mapping relationship between application identifiers and encrypted identifiers.
  • the network device may receive the relation correspondence table, and map the received encrypted identifier to the application identifier based on the relation correspondence table, so as to know the application identifier of the application that initiates the slice registration request.
  • the communication terminal organization can send the relationship correspondence table to the network device of the network operator, so that the network device can determine the application identifier based on the relationship correspondence table when receiving the encrypted identifier.
  • the correspondence between the application identifier and the encrypted identifier may be one-to-one, that is, one application identifier may be uniquely mapped to one encrypted identifier.
  • network operators can configure a dedicated network slice for each application. As long as the network operator determines the corresponding application identifier according to the encrypted identifier received from the terminal, the network operator activates the corresponding slice configuration for the application identifier.
  • the correspondence between application identifiers and encrypted identifiers may be one-to-many, that is, one application identifier may be mapped to multiple encrypted identifiers.
  • the encryption identifier corresponding to the application identifier may be determined by encrypting the application identifier using a preset encryption rule.
  • a preset encryption rule For example, both the network operator and the communication terminal organization pre-determine preset encryption rules, such as MD5 encryption algorithm, symmetric encryption algorithm, asymmetric encryption algorithm, and so on.
  • the encryption rules may include encryption keys, sequence generation rules, encryption functions, and the like.
  • the application identifier is encrypted by using a preset encryption rule, and an encrypted application identifier, that is, an encrypted identifier, can be obtained.
  • an encrypted application identifier that is, an encrypted identifier
  • Using the encrypted identifier to notify the operator's network device to activate the slice configuration for the application identifier can improve the security of slice resource allocation.
  • the encrypted identifier corresponding to the application identifier is determined by encrypting the application identifier and/or the terminal identifier, and the terminal identifier is associated with the terminal that hosts the application.
  • the encrypted identifier may be obtained by encrypting the application identifier or the terminal identifier alone by using a preset encryption rule; or obtained by encrypting both the application identifier and the terminal identifier using a preset encryption rule.
  • the terminal identity can be used to identify the communication terminal organization to which the terminal belongs, so as to obtain the slice service corresponding to the communication terminal organization.
  • the terminal identity may include a device identity associated with the terminal that carries the application and/or a system identity associated with the system that carries the application.
  • the terminal identification may be predefined.
  • the device identification may be the device identification code of the terminal that hosts the application pre-defined by the communication terminal organization, or the unified device identification code of a certain type of equipment produced or held by the communication terminal organization.
  • the system identification may be the system identification code of the operating system that carries the application, such as the system identification code of MIUI or IOS.
  • the slice registration request carrying the encrypted identification is for the terminal, terminal type, operating system indicated by the terminal identification.
  • the slice configuration activation request That is, the slice configuration is configured by the network operator for a certain type of terminal or a certain type of terminal system.
  • the terminal identifier and the application identifier when both the application identifier and the terminal identifier are encrypted by using a preset encryption rule, for example, the terminal identifier and the application identifier can be simply concatenated to form a new identifier sequence.
  • the new identification sequence is encrypted according to a preset encryption rule to obtain an encrypted identification.
  • the combination manner of the terminal identity identifier and the application identifier is not limited to series connection, and those skilled in the art can recognize that there are other combination manners of the identifier sequence, which will not be repeated here.
  • this combination method is also known in advance by the network operator and the communication terminal organization, so that the security of the encrypted identification can be further ensured.
  • different communication terminal organizations may configure different encryption identifiers for the same application identifier according to their own different business and configuration requirements.
  • the network device may acquire the correspondence between the application identifier and the encryption identifier, and/or the encryption rule for the application identifier, and store it.
  • the operator's network device involved in the embodiments of the present disclosure may be, on the one hand, a network element of the operator's core network, for example, a network element device identified by a current management application: a policy control function (Policy Control Function, PCF); It may be a management server set up by the operator's core network and dedicated to storing the correspondence between the application identifier and the encryption identifier and/or the encryption rule of the application identifier.
  • Policy Control Function Policy Control Function
  • the network element of the operator's core network When the network element of the operator's core network needs to determine the application identifier according to the received encrypted identifier, it may send an ID query request to the management server, and the ID query request may include the encrypted identifier.
  • the query flow will be introduced in detail.
  • the communication terminal organization may update the application identifier, encryption identifier, the correspondence between the application identifier and the encryption identifier, and/or the encryption rule configured by itself periodically or irregularly.
  • the communication terminal organization can send update information to the network operator through its own network server or terminal device, so as to update the information associated with the application identification and the encrypted identification held by the network operator.
  • FIG. 4 is a flowchart of a method for activating slices of services according to an exemplary embodiment. As shown in FIG. 4 , the method for activating slices of services is used in a network device, and includes the following steps:
  • step S21 first information is acquired, where the first information includes an encrypted identifier corresponding to the application identifier.
  • step S22 second information is acquired, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the update information associated with the application identifier and the encrypted identifier may be an application identifier, an encrypted identifier, a corresponding relationship between an application identifier and an encrypted identifier, and/or a protocol or a separate configuration for the communication terminal organization and the network operator.
  • Update information for the encryption rules that encrypt the application ID may indicate the initial configuration of the application identifier, the encryption identifier, the correspondence between the application identifier and the encryption identifier, and/or the encryption rule for encrypting the application identifier.
  • the network operator does not hold any configuration information for the application identifier, the encryption identifier, the correspondence between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier.
  • the above-mentioned update information establishes the connection between the application identifier and the encrypted identifier, and can obtain the application identifier according to the received encrypted identifier.
  • the update information may refer to the update of the application identifier, the encrypted identifier, the correspondence between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier.
  • the update involved in the embodiment of the present disclosure may include changing the application identifier used by the application, changing the encrypted identifier corresponding to the application identifier, adding or reducing the application identifier, and adding or reducing the encrypted identifier, Changes to the corresponding relationship between the two, and/or changes to the encryption rules, etc.
  • the update information itself can also be encrypted, so as to organize encrypted transmission between the communication terminal and the network operator, so as to ensure that the update information is not stolen by a malicious third party, causing serious losses.
  • the network device may acquire the first information and/or the second information through a slice registration process. For example, in an example, when the terminal initiates the slice corresponding process, the first information and/or the second information are carried in the slice registration request. The network device obtains the first information and/or the second information through the slice registration request. In another implementation manner, the second information may be sent to the network operator through periodic or aperiodic independent system messages or dedicated signaling.
  • the core network device may store the application identifier, the encrypted identifier, the corresponding relationship between the application identifier and the encrypted identifier, and/or the pair of An encryption rule for encrypting an application identifier, or it may be that the core network device retrieves the application identifier, the encrypted identifier, the corresponding relationship between the application identifier and the encrypted identifier, and/or the pair of application identifiers from the encrypted identifier management server. Identifies the encryption rule for encryption.
  • the network device may determine the application identifier corresponding to the encrypted identifier based on the acquired encrypted identifier, the corresponding relationship between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier. .
  • the core network device determines the application identifier corresponding to the encrypted identifier through the correspondence between the application identifier and the encrypted identifier stored by itself, or the core network device retrieves the relationship between the application identifier and the encrypted identifier from the encrypted identifier management server. and determine the application ID corresponding to the encrypted ID.
  • the core network device can decrypt the encrypted identifier through the encryption rule stored by itself, so as to obtain the corresponding application identifier, or the core network device can retrieve the encryption rule from the encrypted identifier management server, and encrypt the encrypted identifier.
  • the identifier is decrypted to obtain the corresponding application identifier.
  • the above two steps may be performed at the encrypted identification management server, and the core network device only sends the encrypted identification to the encrypted identification management server, and receives the returned application identification from the encrypted identification management server.
  • the network device after acquiring the encrypted identifier, the network device sends the application identifier corresponding to the acquired encrypted identifier and/or the slice configuration parameter associated therewith, so that the device executing the application corresponding to the application identifier can Identify the corresponding slice to perform business processing associated with the application.
  • the network device sends the application identifier corresponding to the acquired encrypted identifier, which may be sent through an existing information bearer, or may be sent through a dedicated signaling.
  • the network device may send the application identifier corresponding to the encrypted identifier to the device carrying the application through a slice registration request response message (eg, a slice registration success message).
  • Fig. 5 is a flowchart showing a method for activating slices of services according to an exemplary embodiment. As shown in Fig. 5 , the method for activating slices of services is used in a network device, and includes the following steps:
  • step S31 first information is acquired, where the first information includes an encrypted identifier corresponding to the application identifier.
  • step S32 an application identifier corresponding to the encrypted identifier is determined based on the acquired encrypted identifier, the preset encryption rule, and/or the correspondence between the encrypted identifier and the application identifier.
  • step S33 the application identifier corresponding to the encrypted identifier is sent.
  • the application identifier corresponding to the encrypted identifier may be an original non-encrypted general application identifier.
  • the network device can obtain the encrypted identifier corresponding to the application identifier, can confirm the original application identifier based on the encrypted identifier, and activate the corresponding slice configuration for the original application identifier. In this way, the security of slice activation can be improved, so that the communication terminal organization can safely use correspondingly matched network slices for different applications.
  • the embodiments of the present disclosure relate to the application identifier, the encrypted identifier, the correspondence between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier may be determined by the communication terminal organization and reported to the operation business network.
  • the application identification corresponding to the encrypted identification may be sent through a slice registration request response message (eg, a slice registration success message).
  • Fig. 6 is a flow chart of a method for activating a slice of a service according to an exemplary embodiment. As shown in Fig. 6, the method for activating a slice of a service is used in a device carrying an APP, for example, the device may be a terminal, including The following steps:
  • step S41 first information is reported, where the first information is used to activate a slice configuration for an application associated with the application identifier, and includes an encrypted identifier corresponding to the application identifier.
  • the encrypted identifier corresponding to the application identifier may be an encrypted identifier corresponding to the application identifier generated by the communication terminal organization for the application carried on the device produced by itself.
  • a communication terminal organization can sign a cooperation agreement with an application operator that has a contract with itself, so that when the application of the application operator is uploaded to the terminal, it can use the network slicing service provided by the network operator dedicated to the application, so as to improve the application network fluency.
  • the communication terminal organization can encrypt the application identifiers of the applications of these application operators to obtain encrypted identifiers.
  • the terminal when it sends a slice registration request to the network operator, it can send the encrypted identifier to the network operator, and the network operator can obtain the corresponding application identifier through decryption or mapping relationship based on the encrypted identifier, thereby activating the Slice configuration for the requested application of the terminal, and notify the terminal that the slice configuration has been activated for the application.
  • the encrypted identifiers corresponding to the application identifiers may be multiple encrypted identifiers corresponding to multiple APPs loaded on the device.
  • the network device may acquire multiple encrypted identifiers corresponding to multiple application identifiers. Therefore, the network device can obtain multiple application identities corresponding thereto based on the multiple encrypted identities, and can activate the corresponding slice configuration for the multiple application identities at the same time. In the above manner, signaling overhead is saved.
  • the encrypted identifier corresponding to the application identifier may be determined by a preset correspondence between the application identifier and the encrypted identifier.
  • the corresponding relationship may be represented by a relationship correspondence table including a mapping relationship between application identifiers and encrypted identifiers.
  • the network device may receive the relation correspondence table, and map the received encrypted identifier to the application identifier based on the relation correspondence table, so as to know the application identifier of the application that initiates the slice registration request.
  • the communication terminal organization can send the relationship correspondence table to the network device of the network operator, so that the network device can determine the application identifier based on the relationship correspondence table when receiving the encrypted identifier.
  • the correspondence between the application identifier and the encrypted identifier may be one-to-one, that is, one application identifier may be uniquely mapped to one encrypted identifier.
  • network operators can configure a dedicated network slice for each application. As long as the network operator determines the corresponding application identifier according to the encrypted identifier received from the terminal, the network operator activates the corresponding slice configuration for the application identifier.
  • the correspondence between application identifiers and encrypted identifiers may be one-to-many, that is, one application identifier may be mapped to multiple encrypted identifiers.
  • the encryption identifier corresponding to the application identifier may be determined by encrypting the application identifier using a preset encryption rule.
  • a preset encryption rule For example, both the network operator and the communication terminal organization pre-determine preset encryption rules, such as MD5 encryption algorithm, symmetric encryption algorithm, asymmetric encryption algorithm, and so on.
  • the encryption rules may include encryption keys, sequence generation rules, encryption functions, and the like.
  • the application identifier is encrypted by using a preset encryption rule, and an encrypted application identifier, that is, an encrypted identifier, can be obtained.
  • an encrypted application identifier that is, an encrypted identifier
  • Using the encrypted identifier to notify the operator's network device to activate the slice configuration for the application identifier can improve the security of slice resource allocation.
  • the encrypted identifier corresponding to the application identifier is determined by encrypting the application identifier and/or the terminal identifier, and the terminal identifier is associated with the terminal that hosts the application.
  • the encrypted identifier may be obtained by encrypting the application identifier or the terminal identifier alone by using a preset encryption rule; or obtained by encrypting both the application identifier and the terminal identifier using a preset encryption rule.
  • the terminal identification may include a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the terminal identification may be predefined.
  • the device identification may be the device identification code of the terminal that hosts the application, such as IMEI or MEID, or the unified device identification code of a certain type of equipment produced by a communication terminal organization.
  • the system identification may be the system identification code of the operating system that carries the application, such as the system identification code of MIUI or IOS.
  • the slice registration request carrying the encrypted identification is for the terminal, terminal type, operating system indicated by the terminal identification.
  • the slice configuration activation request That is, the slice configuration is configured by the network operator for a certain type of terminal or a certain type of terminal system.
  • the terminal identifier and the application identifier when both the application identifier and the terminal identifier are encrypted by using a preset encryption rule, for example, the terminal identifier and the application identifier can be simply concatenated to form a new identifier sequence.
  • the new identification sequence is encrypted according to a preset encryption rule to obtain an encrypted identification.
  • the combination manner of the terminal identity identifier and the application identifier is not limited to series connection, and those skilled in the art can recognize that there are other combination manners of the identifier sequence, which will not be repeated here.
  • this combination method is also known in advance by the network operator and the communication terminal organization, so that the security of the encrypted identification can be further ensured.
  • different communication terminal organizations may configure different encryption identifiers for the same application identifier according to their own different business and configuration requirements.
  • the terminal may report the correspondence between the application identifier and the encryption identifier, and/or the encryption rule for the application identifier to the network device.
  • the communication terminal organization may update the application identifier, encryption identifier, the correspondence between the application identifier and the encryption identifier, and/or the encryption rule configured by itself periodically or irregularly.
  • the communication terminal organization can send update information to the network operator through its own network server or terminal device, so as to update the information associated with the application identification and the encrypted identification held by the network operator.
  • FIG. 7 is a flowchart of a method for activating slices of services according to an exemplary embodiment. As shown in FIG. 7 , the method for activating slices of services is used in a terminal, and includes the following steps:
  • step S51 first information is reported, where the first information is used to activate the slice configuration for the application associated with the application identifier, and includes an encrypted identifier corresponding to the application identifier.
  • step S52 second information is reported, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the update information associated with the application identifier and the encrypted identifier may be an application identifier, an encrypted identifier, a corresponding relationship between an application identifier and an encrypted identifier, and/or a protocol or a separate configuration for the communication terminal organization and the network operator.
  • Update information for the encryption rules that encrypt the application ID may indicate the initial configuration of the application identifier, the encryption identifier, the correspondence between the application identifier and the encryption identifier, and/or the encryption rule for encrypting the application identifier.
  • the network operator does not hold any configuration information for the application identifier, the encryption identifier, the correspondence between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier.
  • the above-mentioned update information establishes the connection between the application identifier and the encrypted identifier, and can obtain the application identifier according to the received encrypted identifier.
  • the update information may refer to the update of the application identifier, the encrypted identifier, the correspondence between the application identifier and the encrypted identifier, and/or the encryption rule for encrypting the application identifier.
  • the updates involved in the embodiments of the present disclosure may include addition or reduction of application identifiers, addition or reduction of encryption identifiers, changes to the corresponding relationship between the two, and/or changes to the encryption rules.
  • the update information itself can also be encrypted, so as to organize encrypted transmission between the communication terminal and the network operator, so as to ensure that the update information is not stolen by a malicious third party, causing serious losses.
  • the device carrying the APP reports the first information and/or the second information, which may be reported through a slice registration process. For example, in an example, when the terminal initiates the slice corresponding process, the first information and/or the second information are carried in the slice registration request. The device carrying the APP reports the first information and/or the second information through a slice registration request. In another implementation manner, the second information may be sent to the network operator through periodic or aperiodic independent system messages or dedicated signaling.
  • Fig. 8 is a flowchart of a method for activating a slice of a service according to an exemplary embodiment. As shown in Fig. 8 , the method for activating a slice of a service is used in a device carrying an APP, such as a terminal, and includes the following steps:
  • step S61 first information is reported, where the first information is used to activate a slice configuration for an application associated with the application identifier, and includes an encrypted identifier corresponding to the application identifier.
  • an application identifier corresponding to the encrypted identifier is obtained.
  • the application identifier corresponding to the encryption identifier may be determined by the network device based on the acquired encryption identifier, the preset encryption rule, and/or the correspondence between the encryption identifier and the application identifier.
  • the application identifier corresponding to the encrypted identifier may be understood as an original non-encrypted general application identifier.
  • the terminal can report the encrypted identifier corresponding to the application identifier, so that the subsequent slice activation process can realize the confirmation of the original application identifier based on the encrypted identifier and activate the corresponding application identifier for the original application identifier. slice configuration. In this way, the security of slice activation can be improved, so that the communication terminal organization can safely use correspondingly matched network slices for different applications.
  • the method for activating slices of services involved in the foregoing embodiments will be described below with reference to practical applications.
  • the description is given by taking the device carrying the APP as the terminal, the network device as the operator's core network and the newly added encrypted identification management server as an example.
  • each specific technical feature listed in this embodiment is only for the purpose of example, and does not have any limitation on the scope disclosed in this application, for example, the following correspondence table of the relationship between encryption identification and application identification
  • the encryption rule can include encryption keys, sequence generation rules, encryption functions, and the like.
  • FIG. 9 is a flowchart of a method for activating slices of a service according to an exemplary embodiment, and as shown in FIG. 9 , the method includes the following steps:
  • step S71 the terminal periodically updates the relationship correspondence table between the encrypted identifier and the application identifier to the operator's core network (or the encrypted identifier management server).
  • regularly updating the relation correspondence table can also be understood as sending the relation correspondence table between the initial encrypted identifier and the application identifier.
  • the relationship correspondence table between the encrypted identifier and the application identifier can be encrypted, so as to organize encrypted transmission between the communication terminal and the network operator, so as to ensure that the update information is not stolen by a malicious third party, causing serious losses.
  • step S72 the terminal generates an encrypted identifier corresponding to the application identifier based on the relationship correspondence table between the encrypted identifier and the application identifier.
  • a slice application process will be initiated.
  • the terminal carries the corresponding encrypted application identifier to initiate registration.
  • the terminal initiates registration with a default value or even a null value.
  • the operator network may configure an encrypted application identifier to the terminal.
  • step S73 the operator's core network sends an application identification query request to the encrypted identification management server, so as to query and obtain the general application identification based on the encrypted identification.
  • the encrypted identification management server determines the application identification (non-encrypted general application identification) corresponding to the encrypted identification based on the obtained encrypted identification and the corresponding relationship between the encrypted identification and the application identification.
  • the operator's core network sets up a dedicated encrypted identification management server to store the correspondence between the encrypted identification and the application identification.
  • the correspondence between the encryption identifier and the application identifier may also be stored in the network element device (eg PCF) that currently manages the application identifier. Therefore, steps S73-S75 are optional.
  • the terminal synchronizes the updated encrypted content to the operator's network, and the operator's network synchronizes the relevant content to the operator's core network.
  • equipment manufacturers cannot directly synchronize to the operator's core network, and usually synchronize content through a service interface.
  • the encrypted identification list is stored in the core network element (PCF) that manages the application identification slice, and the registered encrypted identification of the terminal is directly authenticated.
  • PCF core network element
  • step S75 the encrypted identification management server sends the unencrypted general application identification to the terminal.
  • the operator's core network and/or the encrypted identifier management server carry the non-encrypted general application identifier when returning the message to the terminal.
  • the terminal may periodically update the encrypted relationship correspondence table to the operator's core network (encrypted identification management server) in the subsequent period.
  • the service slice activation method provided by the embodiment of the present disclosure can realize slice activation based on the application identifier of the encrypted identifier.
  • an embodiment of the present disclosure also provides an apparatus for activating slices of services.
  • the apparatus for activating service slices provided by the embodiments of the present disclosure includes corresponding hardware structures and/or software modules for executing each function.
  • the embodiments of the present disclosure can be implemented in hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of the technical solutions of the embodiments of the present disclosure.
  • Fig. 10 is a block diagram of an apparatus for activating slices of a service according to an exemplary embodiment.
  • the apparatus 100 for activating slices of services includes an acquiring unit 101 and a processing unit 102 .
  • the acquiring unit 101 is configured to acquire first information, where the first information includes an encrypted identifier corresponding to an application identifier.
  • the processing unit 102 is configured to activate, based on the first information, a slice configuration for an application associated with the application identifier.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier by using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identifier corresponding to the application identifier is determined by encrypting the application identifier and/or the terminal identifier, and the terminal identifier is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the obtaining unit 101 is further configured to obtain second information, where the second information includes update information associated with the application identifier and the encryption identifier.
  • the processing unit 102 is further configured to: determine the application identifier corresponding to the encrypted identifier based on the encrypted identifier, the preset encryption rule, and/or the correspondence between the encrypted identifier and the application identifier.
  • the apparatus 100 for activating slices of services further includes a sending unit 103, and the sending unit 103 is configured to send an application identifier corresponding to the encrypted identifier.
  • the obtaining unit 101 is configured to obtain the first information through a slice registration request, where the first information is carried in the slice registration request.
  • Fig. 11 is a block diagram of an apparatus for activating slices of a service according to an exemplary embodiment.
  • the apparatus 200 for activating slices of a service includes a sending unit 201 .
  • the sending unit 201 is configured to report first information, where the first information is used to activate a slice configuration for an application associated with the application identifier, and includes an encryption identifier corresponding to the application identifier.
  • the encryption identifier corresponding to the application identifier is determined by encrypting the application identifier by using a preset encryption rule.
  • the encrypted identifier corresponding to the application identifier is determined based on the correspondence between the encrypted identifier and the application identifier.
  • the encrypted identifier corresponding to the application identifier is determined by encrypting the application identifier and/or the terminal identifier, and the terminal identifier is associated with the terminal carrying the application.
  • the terminal identification includes a device identification associated with the terminal that carries the application and/or a system identification associated with the system that carries the application.
  • the sending unit 201 is further configured to: report second information, where the second information includes update information associated with the pair application identifier and the encryption identifier.
  • the apparatus 200 for activating slices of a service further includes an acquiring unit 202, where the acquiring unit 202 is configured to: acquire an application identifier corresponding to the encrypted identifier.
  • the sending unit 201 is configured to: report the first information through a slice registration request, where the first information is carried in the slice registration request.
  • Fig. 12 is a block diagram of an apparatus for activating slices of services according to an exemplary embodiment.
  • apparatus 300 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.
  • the apparatus 300 may include one or more of the following components: a processing component 302, a memory 304, a power component 306, a multimedia component 308, an audio component 310, an input/output (I/O) interface 312, a sensor component 314, and communication component 316 .
  • the processing component 302 generally controls the overall operation of the device 300, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 302 may include one or more processors 320 to execute instructions to perform all or some of the steps of the methods described above. Additionally, processing component 302 may include one or more modules that facilitate interaction between processing component 302 and other components. For example, processing component 302 may include a multimedia module to facilitate interaction between multimedia component 308 and processing component 302 .
  • Memory 304 is configured to store various types of data to support operations at device 300 . Examples of such data include instructions for any application or method operating on device 300, contact data, phonebook data, messages, pictures, videos, and the like. Memory 304 may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • Power component 306 provides power to various components of device 300 .
  • Power components 306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power to device 300 .
  • Multimedia component 308 includes screens that provide an output interface between the device 300 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action.
  • the multimedia component 308 includes a front-facing camera and/or a rear-facing camera. When the apparatus 300 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.
  • Audio component 310 is configured to output and/or input audio signals.
  • audio component 310 includes a microphone (MIC) that is configured to receive external audio signals when device 300 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 304 or transmitted via communication component 316 .
  • audio component 310 also includes a speaker for outputting audio signals.
  • the I/O interface 312 provides an interface between the processing component 302 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.
  • Sensor assembly 314 includes one or more sensors for providing status assessment of various aspects of device 300 .
  • the sensor assembly 314 can detect the open/closed state of the device 300, the relative positioning of components, such as the display and keypad of the device 300, and the sensor assembly 314 can also detect a change in the position of the device 300 or a component of the device 300 , the presence or absence of user contact with the device 300 , the orientation or acceleration/deceleration of the device 300 and the temperature change of the device 300 .
  • Sensor assembly 314 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 316 is configured to facilitate wired or wireless communication between apparatus 300 and other devices.
  • Device 300 may access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 316 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • apparatus 300 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • non-transitory computer-readable storage medium including instructions, such as a memory 304 including instructions, executable by the processor 320 of the apparatus 300 to perform the method described above.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • FIG. 13 is a block diagram of an apparatus 400 for activating slices of services according to an exemplary embodiment.
  • the apparatus 400 may be provided as a server.
  • apparatus 400 includes a processing component 422, which further includes one or more processors, and a memory resource, represented by memory 432, for storing instructions executable by processing component 422, such as an application program.
  • An application program stored in memory 432 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 422 is configured to execute instructions to perform the above-described methods.
  • Device 400 may also include a power supply assembly 426 configured to perform power management of device 400 , a wired or wireless network interface 450 configured to connect device 400 to a network, and an input output (I/O) interface 458 .
  • Device 400 may operate based on an operating system stored in memory 432, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.
  • a non-transitory computer-readable storage medium including instructions such as a memory 432 including instructions, executable by the processing component 422 of the apparatus 400 to perform the method described above is also provided.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • first, second, etc. are used to describe various information, but the information should not be limited to these terms. These terms are only used to distinguish the same type of information from one another, and do not imply a particular order or level of importance. In fact, the expressions “first”, “second” etc. are used completely interchangeably.
  • the first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information, without departing from the scope of the present disclosure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开是关于一种业务的切片激活方法、业务的切片激活装置及存储介质。业务的切片激活方法,所述业务的切片激活方法包括:获取第一信息,所述第一信息包括有与应用标识对应的加密标识;基于所述第一信息,激活针对与所述应用标识相关联的应用的切片配置。通过本公开能够提高应用标识的业务的切片激活的安全性。

Description

业务的切片激活方法、业务的切片激活装置及存储介质 技术领域
本公开涉及通信技术领域,尤其涉及一种业务的切片激活方法、业务的切片激活装置及存储介质。
背景技术
第五代移动通信***(5G)中引入了网络切片(network slicing,NS)技术。网络切片技术允许将网络(核心网和无线接入网)划分为多个切片(slice),不同的业务在不同的slice中传输,互相不干扰。
相关技术中,切片的建立可以是针对数据网络名称(Data Network Name,DNN)、IP三元组以及应用标识(APP ID)等业务的。其中,应用标识层面的切片,可以是针对应用(APP)提供针对性的服务,吸引用户创造价值。
然而,相关技术中,应用标识在标准中是明文的,故在使用中会有安全问题,也就是说容易被冒用(非付费的应用使用付费的应用标识,即劫持)。故,基于应用标识的业务的切片激活有待进一步优化。
发明内容
为克服相关技术中存在的问题,本公开提供一种业务的切片激活方法、业务的切片激活装置及存储介质。
根据本公开实施例的第一方面,提供一种业务的切片激活方法,所述业务的切片激活方法包括:获取第一信息,所述第一信息包括有与应用标识对应的加密标识;基于所述第一信息,激活针对与所述应用标识相关联的应用的切片配置。
一种实施方式中,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
一种实施方式中,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
一种实施方式中,所述业务的切片激活方法还包括:
获取第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
一种实施方式中,所述业务的切片激活方法还包括:
基于所述加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与所述加密标识对应的应用标识;发送与所述加密标识对应的应用标识。
一种实施方式中,所述获取第一信息,包括:通过切片注册请求获取所述第一信息,其中,所述第一信息承载在切片注册请求中。
根据本公开实施例第二方面,提供一种业务的切片激活方法,所述业务的切片激活方法包括:
上报第一信息,所述第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与所述应用标识对应的加密标识。
一种实施方式中,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
一种实施方式中,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
一种实施方式中,所述业务的切片激活方法还包括:
上报第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
一种实施方式中,所述业务的切片激活方法还包括:
获取与所述加密标识对应的应用标识。
一种实施方式中,所述上报第一信息,包括:
通过切片注册请求上报所述第一信息,其中,所述第一信息承载在切片注册请求中。
根据本公开实施例第三方面,提供一种业务的切片激活装置,所述业务的切片激活装置包括:
获取单元,用于获取第一信息,所述第一信息包括有与应用标识对应的加密标识;处理单元,用于基于所述第一信息,激活针对与所述应用标识相关联的应用的切片配置。
一种实施方式中,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
一种实施方式中,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
一种实施方式中,所述获取单元还用于:获取第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
一种实施方式中,所述处理单元还用于:基于所述加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与所述加密标识对应的应用标识;所述业务的切片激活装置还包括发送单元,所述发送单元用于发送与所述加密标识对应的应用标识。
一种实施方式中,所述获取单元用于:通过切片注册请求获取所述第一信息,其中,所述第一信息承载在切片注册请求中。
根据本公开实施例第四方面,提供一种业务的切片激活装置,所述业务的切片激活装置包括:发送单元,用于上报第一信息,所述第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与所述应用标识对应的加密标识。
一种实施方式中,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
一种实施方式中,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
一种实施方式中,所述发送单元还用于:
上报第二信息,所述第二信息中包括与对应用标识和加密标识相关联的更新信息。
一种实施方式中,所述装置还包括获取单元,所述获取单元用于:获取与所述加密标识对应的应用标识。
一种实施方式中,所述发送单元用于:通过切片注册请求上报所述第一信息,其中,所述第一信息承载在切片注册请求中。
根据本公开实施例第五方面,提供一种业务的切片激活装置,包括:
处理器;用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:执行第一方面或者第一方面任意一种实施方式中所述的 业务的切片激活方法。
根据本公开实施例第六方面,提供一种业务的切片激活装置,包括:
处理器;用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:执行第二方面或者第二方面任意一种实施方式中所述的业务的切片激活方法。
根据本公开实施例第七方面,提供一种非临时性计算机可读存储介质,当所述存储介质中的指令由网络设备的处理器执行时,使得网络设备能够执行第一方面或者第一方面任意一种实施方式中所述的业务的切片激活方法。
根据本公开实施例第八方面,提供一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行第二方面或者第二方面任意一种实施方式中所述的业务的切片激活方法。
本公开的实施例提供的技术方案可以包括以下有益效果:通过获取包括与应用标识对应的加密标识,实现对应用标识的加密,进而进行应用标识相关联应用的切片配置激活,能够提高应用标识的业务的切片激活的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种无线通信***架构示意图。
图2是根据一示例性实施例示出的一种针对应用标识业务的切片处理示意图。
图3是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图4是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图5是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图6是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图7是根据一示例性实施例示出的一种业务的切片激活方法的流程图.
图8是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图9是根据一示例性实施例示出的一种业务的切片激活方法的流程图。
图10是根据一示例性实施例示出的一种业务的切片激活装置框图。
图11是根据一示例性实施例示出的一种业务的切片激活装置框图。
图12是根据一示例性实施例示出的一种用于业务的切片激活的装置的框图。
图13是根据一示例性实施例示出的一种用于业务的切片激活的装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
本公开提供一种业务的切片激活方法,该方法可以应用于图1所示的无线通信***中,如图1所示,移动台通过诸如基站等无线接入网网络设备接入到无线接入网中,无线接入网网络设备与核心网网络设备完成数据的回传和前向传递,以进行各种通信服务。
可以理解的是,无线通信***,是一种提供无线通信功能的网络。无线通信***可以采用不同的通信技术,例如码分多址(code division multiple access,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA)、时分多址(time division multiple access,TDMA)、频分多址(frequency division multiple access,FDMA)、正交频分多址(orthogonal frequency-division multiple access,OFDMA)、单载波频分多址(single Carrier FDMA,SC-FDMA)、载波侦听多路访问/冲突避免(Carrier Sense Multiple Access with Collision Avoidance)。根据不同网络的容量、速率、时延等因素可以将网络分为2G(英文:generation)网络、3G网络、4G网络或者未来演进网络,如5G网络,5G网络也可称为是新无线网络(New Radio,NR)。为了方便描述,本公开有时会将无线通信网络简称为网络或***。本公开中网络可包括无线接入网(Radio Access Network,RAN)以及核心网(Core Network,CN)。网络中包括有网络设备,该网络设备例如可以是无线接入网节点、核心网设备等。其中,无线接入网节点也可以称为基站。网络可以通过网络设备为终端提供网络服务,不同的运营商可以为终端提供不同的网络服务,也可以理解为不同的运营商对应有不同的运营商网络。
移动台(Mobile Station,MS),也可以称为用户设备(User Equipment,UE)、终端(Terminal)、移动终端(Mobile Terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备,例如,终端可以是具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:智能手机(Mobile Phone)、口袋计算机(Pocket Personal Computer,PPC)、掌上电脑、个人数字助理(Personal Digital Assistant,PDA)、笔记本电脑、平板电脑、可穿戴设备、或者车载设备等。
本公开实施例提供的业务的切片激活应用于引入了网络切片技术的通信网络中。其中,应用网络切片技术可以将不同的业务在不同的切片里传输,互相不干扰。本公开实施 例提供针对应用标识对应业务的切片激活。针对不同的APP建立不同的切片。图2示出了一种针对应用标识业务的切片处理示意图。参阅图2所示,针对终端上载有的APP1和APP2建立不同的切片,针对APP1建立默认切片,针对APP2建立专用切片。APP1和APP2基于不同的业务标识规则(URSP)以及服务质量(Qos)进行业务的切片传输,能够针对不同的APP提供针对性的业务。
然而,应用标识在使用中会有安全问题,也就是说容易被冒用(非付费的app冒用付费的ID,即劫持),因为这个ID目前在标准中是明文。而且最关键的是,在后移动互联网时代,手机终端是否只是作为通信网络管道(管道一端)存在,且很多终端设备商也涉足物联网业务,因此也有应用标识进行管理的需求。
有鉴于此,本公开实施例提供一种业务的切片激活方法,在该业务的切片激活方法中,终端向网络侧发送对应应用标识的加密标识。网络设备获取到对应应用标识的加密标识,基于该加密标识进行应用标识的业务的切片激活,能够提高应用标识的业务的切片激活安全性。
图3是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图3所示,业务的切片激活方法用于网络设备中,包括以下步骤。
在步骤S11中,获取第一信息,第一信息包括有与应用标识对应的加密标识。
在步骤S12中,基于第一信息,激活针对与该应用标识相关联的应用的切片配置。
本公开实施例中,与应用标识对应的加密标识可以是通信终端组织对在自己的设备上载有的应用所生成的与应用标识对应的加密标识。例如,通信终端组织可以根据与自己有合约的应用运营商签署合作协议,使得应用运营商的应用在终端上载有时,能够使用网络运营商提供的专用于该应用的网络切片服务,从而提高该应用的网络流畅度。而该网络切片服务针对不同的通信终端组织,可以是不同的。而为了保证这些网络切片服务不被恶意第三方所冒用,通信终端组织可以对这些应用运营商的应用的应用标识进行加密,得到加密标识。从而,当终端在向网络运营商发送切片注册请求时,可以发送该加密标识给网络运营商,网络运营商基于该加密标识,通过解密或映射关系等,得到与之对应的应用标识,从而激活针对该终端的所请求的应用的切片配置,并通知终端已针对该应用激活了该切片配置。通信终端组织可以是单个通信终端厂商、多个通信终端厂商组成的通信终端厂商联盟、或由多个终端组成的第三方通信终端联盟(例如,终端客户自己组成的团体、某公司的全体员工所持有的多个终端组成的终端组、某团体的成员所持有的多个终端组成的终端组等)等。
在一种实施方式中,所述与应用标识对应的加密标识可以是设备上载有的多个APP对 应的多个加密标识。其中,网络设备可以获取多个应用标识对应的多个加密标识。因此,网络设备可以基于该多个加密标识,得到与之对应的多个应用标识,并且可以同时针对该多个应用标识激活相应的切片配置。通过以上方式,节省了信令开销。
在一个实施方式中,与应用标识对应的加密标识可以是通过预设的应用标识与加密标识之间的对应关系来确定的。例如,该对应关系可以由包括应用标识与加密标识之间的映射关系的关系对应表来表征。网络设备可以接收该关系对应表,并基于该关系对应表来将所接收到的加密标识映射到应用标识,从而得知发起切片注册请求的应用的应用标识。而通信终端组织可以将该关系对应表发送给网络运营商的网络设备,以便网络设备可以在接收到加密标识时,可以基于该关系对应表来确定应用标识。
在可选的实现方式中,应用标识与加密标识之间的对应关系可以是一对一的,即,一个应用标识可以唯一地被映射到一个加密标识。这样,针对每个应用,网络运营商都可以配置一个专用的网络切片。只要网络运营商根据接收的到来自终端的加密标识确定与之对应的应用标识,那么网络运营商就针对该应用标识激活相应的切片配置。在另一种可选的实现方式中,应用标识与加密标识之间的对应关系可以是一对多的,即,一个应用标识可以被映射到多个加密标识。这样,同一通信终端组织的不同类型的设备或不同类型的***或者是不同通信终端组织的设备或***所产生的不同的加密标识可以被映射到同一应用标识。从而可以在网络运营商侧的网络设备上激活针对该应用的公用切片配置。
在另一种实施方式中,与应用标识对应的加密标识可以是通过采用预设加密规则对应用标识进行加密来确定的。例如,网络运营商和通信终端组织双方预先确定预设的加密规则,例如,MD5加密算法、对称加密算法、非对称加密算法等。该加密规则可以包括加密密钥、序列生成规则、加密函数等。
本公开实施例中,采用预设加密规则对应用标识进行加密,可以得到加密后的应用标识,即加密标识。通过该加密标识来通知运营商网络设备激活针对该应用标识的切片配置,可以提高切片资源分配的安全性。
同时,本领域技术人员能够理解的是,通过特定的预设加密规则,也可以实现如上面所述的应用标识与加密标识之间的一对一或一对多的映射关系。在此,不再赘述。
一种实施方式中,所述与应用标识对应的加密标识是通过对应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有(host)所述应用的终端相关联。例如,加密标识可以是利用预设的加密规则单独对应用标识或终端身份标识进行加密而得到的;也可以是利用预设的加密规则对应用标识和终端身份标识二者进行加密而得到的。
在一个实施例中,终端身份标识可以用于标识终端所属的通信终端组织,以获得与所 述通信终端组织所对应的切片服务。终端身份标识可以包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。该终端身份标识可以是预先定义的。例如,设备标识可以是通信终端组织预先定义的载有(host)所述应用的终端的设备标识码,或者是通信终端组织所生产或持有的某一类设备的统一设备标识码。再例如,***标识可以是载有所述应用的操作***的***标识码,诸如,MIUI或者IOS等的***标识码。
在一个可选的实施方式中,当加密标识是仅仅针对终端身份标识进行加密而得到的,那么携带有该加密标识的切片注册请求是针对该终端身份标识所指示的终端、终端类型、操作***的切片配置激活请求。即该切片配置是网络运营商针对某一类型的终端或某一类型的终端***所配置的。
在另一个实施方式中,在利用预设的加密规则对应用标识和终端身份标识二者进行加密的情况中,例如,可以将终端身份标识与应用标识做简单的串联,组成新的标识序列。按预设的加密规则来对新的标识序列进行加密,得到加密标识。这里,终端身份标识与应用标识的结合方式并不限于串联,本领域技术人员能够认识到还有其他的标识序列结合方式,再此不做赘述。同样,这种结合方式也是预先为网络运营商和通信终端组织所知晓的,从而可以进一步保证加密标识的安全性。
在一个实施方式中,不同的通信终端组织根据自身的不同的业务和配置需求,可以针对相同的应用标识配置不同的加密标识。
本公开实施例中,网络设备可以获取应用标识与加密标识之间的对应关系、和/或对应用标识的加密规则,并存储。本公开实施例中涉及的运营商网络设备一方面可以是运营商核心网的网元,例如,当前管理应用标识的网元设备:策略控制功能实体(Policy Control Function,PCF),另一方面也可以是运营商核心网设置的专用于存储应用标识与加密标识之间的对应关系和/或应用标识的加密规则的管理服务器。当运营商核心网网元需要依据接收到的加密标识来确定应用标识时,可以向该管理服务器发送ID查询请求,该ID查询请求可以包括该加密标识。在以下的对图4-图9的描述中,将对该查询流程做具体的介绍。
在一个实施方式中,通信终端组织可以定期或不定期地更新自己配置的应用标识、加密标识、应用标识和加密标识的对应关系和/或加密规则。通信终端组织可以通过自己的网络服务器或终端设备向网络运营商发送更新信息,以更新网络运营商处持有的与应用标识和加密标识相关联的信息。
图4是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图4所示,业务的切片激活方法用于网络设备中,包括以下步骤:
在步骤S21中,获取第一信息,第一信息包括有与应用标识对应的加密标识。
在步骤S22中,获取第二信息,第二信息中包括与应用标识和加密标识相关联的更新信息。
本公开实施例中,与应用标识和加密标识相关联的更新信息可以是针对通信终端组织和网络运营商协议或单独配置的应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的更新信息。一方面,该更新信息可以指示针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的初始配置。换句话说,网络运营商处在初始状态下没有持有任何针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的配置信息,因此通过接收上述更新信息,其建立了应用标识与加密标识之间的联系,并能够根据接收到的加密标识获得应用标识。另一方面,该更新信息可以指针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的更新。其中,本公开实施例中涉及的更新可以包括对应用所使用的应用标识的改变、对与应用标识对应的加密标识的改变、应用标识的新增或减少、对加密标识的新增或减少,对二者对应关系的改变、和/或对所述加密规则的改变等。
在一个实施例中,该更新信息本身也可以被加密,从而在通信终端组织与网络运营商之间加密的传输,以确保该更新信息不被恶意第三方窃取,造成严重的损失。
本公开实施例中,网络设备获取第一信息和/或第二信息,可以是通过切片注册流程获取。例如,一示例中,在终端发起切片对应流程时,将第一信息和/或第二信息承载在切片注册请求中。网络设备通过切片注册请求获取第一信息和/或第二信息。在另一种实现方式中,第二信息可以通过周期性或非周期性的独立***消息或专用信令来发送给网络运营商。
本公开实施例中,网络设备为运营商核心网设备时,可以是核心网设备自身存储所述应用标识、所述加密标识、所述应用标识和加密标识的对应关系、和/或所述对应用标识进行加密的加密规则,也可以是核心网设备从加密标识管理服务器中调取所述应用标识、所述加密标识、所述应用标识和加密标识的对应关系、和/或所述对应用标识进行加密的加密规则。
本公开实施例中,网络设备基于获取到的加密标识,以及所述应用标识和加密标识的对应关系、和/或所述对应用标识进行加密的加密规则,可以确定与加密标识对应的应用标识。例如,一方面,核心网设备通过自身存储的应用标识与加密标识之间的对应关系确定与加密标识对应的应用标识,或者核心网设备从加密标识管理服务器处调取应用标识与加 密标识之间的对应关系并确定与加密标识对应的应用标识。另一方面,例如,核心网设备可以通过自身存储的加密规则来对加密标识进行解密,从而得到对应的应用标识,或者核心网设备从加密标识管理服务器处调取所述加密规则,并对加密标识进行解密,从而得到对应的应用标识。在一个可选的实施方式中,以上两个步骤可以都在加密标识管理服务器处执行,核心网设备仅将加密标识发送到加密标识管理服务器,并从加密标识管理服务器接收返回的应用标识。
本公开实施例中,网络设备在获取到加密标识后,发送与所获取的加密标识对应的应用标识和/或与之相关联的切片配置参数,使得执行应用标识对应应用的设备可以基于该应用标识对应的切片进行与该应用相关联的业务处理。
其中,网络设备发送与所获取的加密标识对应的应用标识,可以是通过已有信息承载发送,也可以是通过专用信令发送。一示例中,网络设备可以通过切片注册请求响应消息(例如切片注册成功消息)向载有应用的设备发送与该加密标识对应的应用标识。
图5是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图5所示,业务的切片激活方法用于网络设备中,包括以下步骤:
在步骤S31中,获取第一信息,第一信息包括有与应用标识对应的加密标识。
在步骤S32中,基于获取到的加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与加密标识对应的应用标识。
在步骤S33中,发送与加密标识对应的应用标识。
本公开实施例中,与加密标识对应的应用标识可以是原始非加密的通用应用标识。
结合以上实施例提供的业务的切片激活方法,网络设备可以获取到与应用标识对应的加密标识,可以基于该加密标识实现对原始应用标识的确认并针对该原始应用标识激活相应的切片配置。这样,可以提高切片激活的安全性,进而可以使得通信终端组织能够安全地针对不同的应用使用相应匹配的网络切片。
本公开实施例涉及所述应用标识、所述加密标识、所述应用标识和加密标识的对应关系、和/或所述对应用标识进行加密的加密规则可以是由通信终端组织确定并上报给运营商网络。在一个实施例中,与加密标识对应的应用标识可以通过通过切片注册请求响应消息(例如切片注册成功消息)来进行发送。
图6是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图6所示,业务的切片激活方法用于载有APP的设备中,该设备例如可以是终端,包括以下步骤:
在步骤S41中,上报第一信息,第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与应用标识对应的加密标识。
本公开实施例中,与应用标识对应的加密标识可以是通信终端组织对在自己生产的设备上载有的应用所生成的与应用标识对应的加密标识。例如,通信终端组织可以根据与自己有合约的应用运营商签署合作协议,使得应用运营商的应用在终端上载有时,能够使用网络运营商提供的专用于该应用的网络切片服务,从而提高该应用的网络流畅度。而为了保证这些网络切片服务不被恶意第三方所冒用,通信终端组织可以对这些应用运营商的应用的应用标识进行加密,得到加密标识。从而,当终端在向网络运营商发送切片注册请求时,可以发送该加密标识给网络运营商,网络运营商基于该加密标识,通过解密或映射关系等,得到与之对应的应用标识,从而激活针对该终端的所请求的应用的切片配置,并通知终端已针对该应用激活了该切片配置。
在一种实施方式中,所述与应用标识对应的加密标识可以是设备上载有的多个APP对应的多个加密标识。其中,网络设备可以获取多个应用标识对应的多个加密标识。因此,网络设备可以基于该多个加密标识,得到与之对应的多个应用标识,并且可以同时针对该多个应用标识激活相应的切片配置。通过以上方式,节省了信令开销。
在一个实施方式中,与应用标识对应的加密标识可以是通过预设的应用标识与加密标识之间的对应关系来确定的。例如,该对应关系可以由包括应用标识与加密标识之间的映射关系的关系对应表来表征。网络设备可以接收该关系对应表,并基于该关系对应表来将所接收到的加密标识映射到应用标识,从而得知发起切片注册请求的应用的应用标识。而通信终端组织可以将该关系对应表发送给网络运营商的网络设备,以便网络设备可以在接收到加密标识时,可以基于该关系对应表来确定应用标识。
在可选的实现方式中,应用标识与加密标识之间的对应关系可以是一对一的,即,一个应用标识可以唯一地被映射到一个加密标识。这样,针对每个应用,网络运营商都可以配置一个专用的网络切片。只要网络运营商根据接收的到来自终端的加密标识确定与之对应的应用标识,那么网络运营商就针对该应用标识激活相应的切片配置。在另一种可选的实现方式中,应用标识与加密标识之间的对应关系可以是一对多的,即,一个应用标识可以被映射到多个加密标识。这样,同一通信终端组织的不同类型的设备或不同类型的***或者是不同通信终端组织的设备或***所产生的不同的加密标识可以被映射到同一应用标识。从而可以在网络运营商侧的网络设备上激活针对该应用的公用切片配置。
在另一种实施方式中,与应用标识对应的加密标识可以是通过采用预设加密规则对应用标识进行加密来确定的。例如,网络运营商和通信终端组织双方预先确定预设的加密规则,例如,MD5加密算法、对称加密算法、非对称加密算法等。该加密规则可以包括加密密钥、序列生成规则、加密函数等。
本公开实施例中,采用预设加密规则对应用标识进行加密,可以得到加密后的应用标识,即加密标识。通过该加密标识来通知运营商网络设备激活针对该应用标识的切片配置,可以提高切片资源分配的安全性。
同时,本领域技术人员能够理解的是,通过特定的预设加密规则,也可以实现如上面所述的应用标识与加密标识之间的一对一或一对多的映射关系。在此,不再赘述。
一种实施方式中,所述与应用标识对应的加密标识是通过对应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有(host)所述应用的终端相关联。例如,加密标识可以是利用预设的加密规则单独对应用标识或终端身份标识进行加密而得到的;也可以是利用预设的加密规则对应用标识和终端身份标识二者进行加密而得到的。
在一个实施例中,终端身份标识可以包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。该终端身份标识可以是预先定义的。例如,设备标识可以是载有(host)所述应用的终端的设备标识码,例如,IMEI或MEID等,或者是通信终端组织所生产的某一类设备的统一设备标识码。再例如,***标识可以是载有所述应用的操作***的***标识码,诸如,MIUI或者IOS等的***标识码。
在一个可选的实施方式中,当加密标识是仅仅针对终端身份标识进行加密而得到的,那么携带有该加密标识的切片注册请求是针对该终端身份标识所指示的终端、终端类型、操作***的切片配置激活请求。即该切片配置是网络运营商针对某一类型的终端或某一类型的终端***所配置的。
在另一个实施方式中,在利用预设的加密规则对应用标识和终端身份标识二者进行加密的情况中,例如,可以将终端身份标识与应用标识做简单的串联,组成新的标识序列。按预设的加密规则来对新的标识序列进行加密,得到加密标识。这里,终端身份标识与应用标识的结合方式并不限于串联,本领域技术人员能够认识到还有其他的标识序列结合方式,再此不做赘述。同样,这种结合方式也是预先为网络运营商和通信终端组织所知晓的,从而可以进一步保证加密标识的安全性。
在一个实施方式中,不同的通信终端组织根据自身的不同的业务和配置需求,可以针对相同的应用标识配置不同的加密标识。
本公开实施例中,终端可以向网络设备上报应用标识与加密标识之间的对应关系、和/或对应用标识的加密规则。在一个实施方式中,通信终端组织可以定期或不定期地更新自己配置的应用标识、加密标识、应用标识和加密标识的对应关系和/或加密规则。通信终端组织可以通过自己的网络服务器或终端设备向网络运营商发送更新信息,以更新网络运营商处持有的与应用标识和加密标识相关联的信息。
图7是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图7所示,业务的切片激活方法用于终端中,包括以下步骤:
在步骤S51中,上报第一信息,第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与应用标识对应的加密标识。
在步骤S52中,上报第二信息,第二信息中包括与应用标识和加密标识相关联的更新信息。
本公开实施例中,与应用标识和加密标识相关联的更新信息可以是针对通信终端组织和网络运营商协议或单独配置的应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的更新信息。一方面,该更新信息可以指示针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的初始配置。换句话说,网络运营商处在初始状态下没有持有任何针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的配置信息,因此通过接收上述更新信息,其建立了应用标识与加密标识之间的联系,并能够根据接收到的加密标识获得应用标识。另一方面,该更新信息可以指针对应用标识、加密标识、应用标识和加密标识的对应关系、和/或对应用标识进行加密的加密规则的更新。其中,本公开实施例中涉及的更新可以包括对应用标识的新增或减少、对加密标识的新增或减少,对二者对应关系的改变、和/或对所述加密规则的改变。
在一个实施例中,该更新信息本身也可以被加密,从而在通信终端组织与网络运营商之间加密的传输,以确保该更新信息不被恶意第三方窃取,造成严重的损失。
本公开实施例中,载有APP的设备上报第一信息和/或第二信息,可以是通过切片注册流程上报。例如,一示例中,在终端发起切片对应流程时,将第一信息和/或第二信息承载在切片注册请求中。载有APP的设备通过切片注册请求上报第一信息和/或第二信息。在另一种实现方式中,第二信息可以通过周期性或非周期性的独立***消息或专用信令来发送给网络运营商。
图8是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图8所示,业务的切片激活方法用于载有APP的设备中,例如终端中,包括以下步骤:
在步骤S61中,上报第一信息,第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与应用标识对应的加密标识。
在步骤S62中,获取与加密标识对应的应用标识。其中,与加密标识对应的应用标识可以是由网络设备基于获取到的加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系确定的。
本公开实施例中,与加密标识对应的应用标识可以理解为是原始非加密的通用应用标识。
结合以上实施例提供的业务的切片激活方法,终端可以上报与应用标识对应的加密标识,可以使后续切片激活的过程能够基于该加密标识实现对原始应用标识的确认并针对该原始应用标识激活相应的切片配置。这样,可以提高切片激活的安全性,进而可以使得通信终端组织能够安全地针对不同的应用使用相应匹配的网络切片。
本公开实施例以下结合实际应用对上述实施例涉及的业务的切片激活方法进行说明。其中,以载有APP的设备为终端,网络设备为运营商核心网以及新增的加密标识管理服务器为例进行说明。应理解在该实施例中所列举的各个具体的技术特征仅仅是为了示例的作用,而并非对本申请所公开的范围有任何的限制,例如,以下的加密标识与应用标识之间的关系对应表也可以被替换为加密规则,例如,该加密规则可以包括加密密钥、序列生成规则、加密函数等。
图9是根据一示例性实施例示出的一种业务的切片激活方法的流程图,如图9所示包括以下步骤:
在步骤S71中,终端向运营商核心网(或加密标识管理服务器)定期更新加密标识与应用标识之间的关系对应表。
其中,定期更新该该关系对应表也可以理解为是发送初始的加密标识与应用标识之间的关系对应表。
该加密标识与应用标识之间的关系对应表可以被加密,从而在通信终端组织与网络运营商之间加密的传输,以确保该更新信息不被恶意第三方窃取,造成严重的损失。
在步骤S72中,终端基于加密标识与应用标识之间的关系对应表来生成应用标识对应的加密标识,当终端在开机或者启动与应用标识对应的应用时,会发起切片申请流程。这时,如果有应用标识和加密标识之间的相关设置,则终端携带对应的加密的应用标识发起注册。
其中,可以理解的是,若终端侧无应用标识和加密标识之间的相关设置,则终端携带默认值甚至空值发起注册。
如果终端携带默认值或者空值发起注册,则运营商网络可配置加密的应用标识给终端。
在可选步骤S73中,运营商核心网向加密标识管理服务器发送应用标识查询请求,以基于加密标识查询并获取到通用应用标识。
在可选步骤S74中,加密标识管理服务器基于获取到的加密标识,以及加密标识与应 用标识之间的对应关系,确定与加密标识对应的应用标识(非加密的通用应用标识)。
本公开实施例中,运营商核心网设置专门的加密标识管理服务器进行加密标识与应用标识之间对应关系的存储。当然可以理解的是,加密标识与应用标识之间的对应关系也可以存储在当前管理应用标识的网元设备(例如PCF)。因此,步骤S73-S75是可选的。
终端将更新的加密内容同步给运营商网络,由运营商网络将相关内容同步到运营商的核心网,一般设备厂商无法直接同步到运营商核心网,通常会通过一个服务接口进行内容同步。
本公开实施例中,在一个更新周期,加密标识列表存储于管理应用标识切片的核心网网元(PCF),并直接对终端的注册加密标识进行认证。
在可选步骤S75中,加密标识管理服务器发送非加密的通用应用标识至终端。
本公开实施例中,运营商核心网和/或加密标识管理服务器在返回给终端消息的时候携带非加密的通用应用标识。
本公开实施例中,在后续终端可以定期向运营商核心网(加密标识管理服务器)更新加密的所述关系对应表。
本公开实施例提供的业务的切片激活方法,可以实现基于加密标识的应用标识的切片激活。
基于相同的构思,本公开实施例还提供一种业务的切片激活装置。
可以理解的是,本公开实施例提供的业务的切片激活装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。结合本公开实施例中所公开的各示例的单元及算法步骤,本公开实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以对每个特定的应用来使用不同的方法来实现所描述的功能,但是这种实现不应认为超出本公开实施例的技术方案的范围。
图10是根据一示例性实施例示出的一种业务的切片激活装置框图。参照图10,业务的切片激活装置100包括获取单元101和处理单元102。
获取单元101,用于获取第一信息,第一信息包括有与应用标识对应的加密标识。处理单元102,用于基于第一信息,激活针对与应用标识相关联的应用的切片配置。
一种实施方式中,与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,与应用标识对应的加密标识是通过对应用标识和/或终端身份标识进行加密来确定的,终端身份标识与载有应用的终端相关联。
一种实施方式中,终端身份标识包括与载有应用的终端相关联的设备标识和/或与载有应用的***相关联的***标识。
一种实施方式中,获取单元101还用于:获取第二信息,第二信息中包括与应用标识和加密标识相关联的更新信息。
一种实施方式中,处理单元102还用于:基于加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与加密标识对应的应用标识。业务的切片激活装置100还包括发送单元103,发送单元103用于发送与加密标识对应的应用标识。
一种实施方式中,获取单元101用于:通过切片注册请求获取第一信息,其中,第一信息承载在切片注册请求中。
图11是根据一示例性实施例示出的一种业务的切片激活装置框图。参照图11,业务的切片激活装置200包括发送单元201。发送单元201用于上报第一信息,第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与应用标识对应的加密标识。
一种实施方式中,与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
一种实施方式中,与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
一种实施方式中,与应用标识对应的加密标识是通过对应用标识和/或终端身份标识进行加密来确定的,终端身份标识与载有应用的终端相关联。
一种实施方式中,终端身份标识包括与载有应用的终端相关联的设备标识和/或与载有应用的***相关联的***标识。
一种实施方式中,发送单元201还用于:上报第二信息,第二信息中包括与对应用标识和加密标识相关联的更新信息。
一种实施方式中,业务的切片激活装置200还包括获取单元202,获取单元202用于:获取与加密标识对应的应用标识。
一种实施方式中,发送单元201用于:通过切片注册请求上报第一信息,其中,第一信息承载在切片注册请求中。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图12是根据一示例性实施例示出的一种用于业务的切片激活的装置的框图。例如, 装置300可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图12,装置300可以包括以下一个或多个组件:处理组件302,存储器304,电力组件306,多媒体组件308,音频组件310,输入/输出(I/O)的接口312,传感器组件314,以及通信组件316。
处理组件302通常控制装置300的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件302可以包括一个或多个处理器320来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件302可以包括一个或多个模块,便于处理组件302和其他组件之间的交互。例如,处理组件302可以包括多媒体模块,以方便多媒体组件308和处理组件302之间的交互。
存储器304被配置为存储各种类型的数据以支持在装置300的操作。这些数据的示例包括用于在装置300上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器304可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电力组件306为装置300的各种组件提供电力。电力组件306可以包括电源管理***,一个或多个电源,及其他与为装置300生成、管理和分配电力相关联的组件。
多媒体组件308包括在所述装置300和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件308包括一个前置摄像头和/或后置摄像头。当装置300处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜***或具有焦距和光学变焦能力。
音频组件310被配置为输出和/或输入音频信号。例如,音频组件310包括一个麦克风(MIC),当装置300处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器304或经由通信组件316发送。在一些实施例中,音频组件310还包括一个扬声器,用于输出音频信号。
I/O接口312为处理组件302和***接口模块之间提供接口,上述***接口模块可以 是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件314包括一个或多个传感器,用于为装置300提供各个方面的状态评估。例如,传感器组件314可以检测到装置300的打开/关闭状态,组件的相对定位,例如所述组件为装置300的显示器和小键盘,传感器组件314还可以检测装置300或装置300一个组件的位置改变,用户与装置300接触的存在或不存在,装置300方位或加速/减速和装置300的温度变化。传感器组件314可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件314还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件314还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件316被配置为便于装置300和其他设备之间有线或无线方式的通信。装置300可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件316经由广播信道接收来自外部广播管理***的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件316还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置300可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器304,上述指令可由装置300的处理器320执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
图13是根据一示例性实施例示出的一种用于业务的切片激活的装置400的框图。例如,装置400可以被提供为一服务器。参照图13,装置400包括处理组件422,其进一步包括一个或多个处理器,以及由存储器432所代表的存储器资源,用于存储可由处理组件422的执行的指令,例如应用程序。存储器432中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件422被配置为执行指令,以执行上述方法。
装置400还可以包括一个电源组件426被配置为执行装置400的电源管理,一个有线或无线网络接口450被配置为将装置400连接到网络,和一个输入输出(I/O)接口458。 装置400可以操作基于存储在存储器432的操作***,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器432,上述指令可由装置400的处理组件422执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
进一步可以理解的是,本公开中“多个”是指两个或两个以上,其它量词与之类似。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
进一步可以理解的是,术语“第一”、“第二”等用于描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开,并不表示特定的顺序或者重要程度。实际上,“第一”、“第二”等表述完全可以互换使用。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。
进一步可以理解的是,本公开实施例中尽管在附图中以特定的顺序描述操作,但是不应将其理解为要求按照所示的特定顺序或是串行顺序来执行这些操作,或是要求执行全部所示的操作以得到期望的结果。在特定环境中,多任务和并行处理可能是有利的。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (36)

  1. 一种业务的切片激活方法,其特征在于,所述业务的切片激活方法包括:
    获取第一信息,所述第一信息包括有与应用标识对应的加密标识;
    基于所述第一信息,激活针对与所述应用标识相关联的应用的切片配置。
  2. 根据权利要求1所述的业务的切片激活方法,其特征在于,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
  3. 根据权利要求1所述的业务的切片激活方法,其特征在于,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
  4. 根据权利要求2所述的业务的切片激活方法,其特征在于,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
  5. 根据权利要求4所述的业务的切片激活方法,其特征在于,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
  6. 根据权利要求1所述的业务的切片激活方法,其特征在于,所述方法还包括:
    获取第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
  7. 根据权利要求1-6中任意一项所述的业务的切片激活方法,其特征在于,所述方法还包括:
    基于所述加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与所述加密标识对应的应用标识;
    发送与所述加密标识对应的应用标识。
  8. 根据权利要求1-6所述的业务的切片激活方法,其特征在于,所述获取第一信息,包括:
    通过切片注册请求获取所述第一信息,其中,所述第一信息承载在切片注册请求中。
  9. 一种业务的切片激活方法,其特征在于,所述业务的切片激活方法包括:
    上报第一信息,所述第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与所述应用标识对应的加密标识。
  10. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
  11. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述与应用标识对应 的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
  12. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
  13. 根据权利要求12所述的业务的切片激活方法,其特征在于,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
  14. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述方法还包括:
    上报第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
  15. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述方法还包括:
    获取与所述加密标识对应的应用标识。
  16. 根据权利要求9所述的业务的切片激活方法,其特征在于,所述上报第一信息,包括:
    通过切片注册请求上报所述第一信息,其中,所述第一信息承载在切片注册请求中。
  17. 一种业务的切片激活装置,其特征在于,所述业务的切片激活装置包括:
    获取单元,用于获取第一信息,所述第一信息包括有与应用标识对应的加密标识;
    处理单元,用于基于所述第一信息,激活针对与所述应用标识相关联的应用的切片配置。
  18. 根据权利要求17所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
  19. 根据权利要求17所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
  20. 根据权利要求17所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
  21. 根据权利要求20所述的业务的切片激活装置,其特征在于,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
  22. 根据权利要求17所述的业务的切片激活装置,其特征在于,所述获取单元还用于:
    获取第二信息,所述第二信息中包括与应用标识和加密标识相关联的更新信息。
  23. 根据权利要求17-22中任意一项所述的业务的切片激活装置,其特征在于,所述处理单元还用于:基于所述加密标识、预设加密规则和/或加密标识与应用标识之间的对应关系,确定与所述加密标识对应的应用标识;
    所述业务的切片激活装置还包括发送单元,所述发送单元用于发送与所述加密标识对应的应用标识。
  24. 根据权利要求17所述的业务的切片激活装置,其特征在于,所述获取单元用于:
    通过切片注册请求获取所述第一信息,其中,所述第一信息承载在切片注册请求中。
  25. 一种业务的切片激活装置,其特征在于,所述业务的切片激活装置包括:
    发送单元,用于上报第一信息,所述第一信息用于激活针对与应用标识相关联的应用的切片配置,并包括有与所述应用标识对应的加密标识。
  26. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是通过采用预设加密规则对应用标识进行加密来确定的。
  27. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是基于加密标识与应用标识之间的对应关系来确定的。
  28. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述与应用标识对应的加密标识是通过对所述应用标识和/或终端身份标识进行加密来确定的,所述终端身份标识与载有所述应用的终端相关联。
  29. 根据权利要求28所述的业务的切片激活装置,其特征在于,所述终端身份标识包括与载有所述应用的终端相关联的设备标识和/或与载有所述应用的***相关联的***标识。
  30. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述发送单元还用于:
    上报第二信息,所述第二信息中包括与对应用标识和加密标识相关联的更新信息。
  31. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述装置还包括获取单元,所述获取单元用于:
    获取与所述加密标识对应的应用标识。
  32. 根据权利要求25所述的业务的切片激活装置,其特征在于,所述发送单元用于:通过切片注册请求上报所述第一信息,其中,所述第一信息承载在切片注册请求中。
  33. 一种业务的切片激活装置,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:执行权利要求1至8中任意一项所述的业务的切片激活方法。
  34. 一种业务的切片激活装置,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:执行权利要求9至16中任意一项所述的业务的切片激活方法。
  35. 一种非临时性计算机可读存储介质,当所述存储介质中的指令由网络设备的处理器执行时,使得网络设备能够执行权利要求1至8中任意一项所述的业务的切片激活方法。
  36. 一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行权利要求9至16中任意一项所述的业务的切片激活方法。
PCT/CN2020/106509 2020-08-03 2020-08-03 业务的切片激活方法、业务的切片激活装置及存储介质 WO2022027161A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US18/003,191 US20230247541A1 (en) 2020-08-03 2020-08-03 Service slice activation method and service slice activation apparatus, and storage medium
CN202080001852.6A CN112055977B (zh) 2020-08-03 2020-08-03 业务的切片激活方法、业务的切片激活装置及存储介质
PCT/CN2020/106509 WO2022027161A1 (zh) 2020-08-03 2020-08-03 业务的切片激活方法、业务的切片激活装置及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/106509 WO2022027161A1 (zh) 2020-08-03 2020-08-03 业务的切片激活方法、业务的切片激活装置及存储介质

Publications (2)

Publication Number Publication Date
WO2022027161A1 true WO2022027161A1 (zh) 2022-02-10
WO2022027161A9 WO2022027161A9 (zh) 2022-12-22

Family

ID=73605262

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/106509 WO2022027161A1 (zh) 2020-08-03 2020-08-03 业务的切片激活方法、业务的切片激活装置及存储介质

Country Status (3)

Country Link
US (1) US20230247541A1 (zh)
CN (1) CN112055977B (zh)
WO (1) WO2022027161A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266545A (zh) * 2019-06-28 2019-09-20 北京小米移动软件有限公司 一种动态分配网络资源的方法、装置及介质
US20190327670A1 (en) * 2017-10-20 2019-10-24 Verizon Patent And Licensing Inc. Ran-core pairing service
CN110768836A (zh) * 2019-10-28 2020-02-07 中国联合网络通信集团有限公司 一种网络切片管理方法及装置

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017173259A1 (en) * 2016-04-01 2017-10-05 Idac Holdings, Inc. Methods and next generation exposure function for service exposure with network slicing
PL3437306T3 (pl) * 2016-04-15 2024-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Kontenery wyposażeń użytkownika i wycinki sieciowe
JP6879471B2 (ja) * 2016-04-29 2021-06-02 日本電気株式会社 スライスセキュリティの分離を可能にする方法
KR102358918B1 (ko) * 2016-07-04 2022-02-07 삼성전자 주식회사 무선 통신 시스템에서 서비스에 따른 보안 관리 방법 및 장치
US11924642B2 (en) * 2017-06-23 2024-03-05 Nec Corporation Privacy considerations for network slice selection
CN110800332A (zh) * 2017-06-29 2020-02-14 华为国际有限公司 网络切片分配方法、设备及***
CN109429277A (zh) * 2017-07-05 2019-03-05 中兴通讯股份有限公司 网络切片的选择方法、装置及***
WO2019075848A1 (zh) * 2017-10-16 2019-04-25 华为技术有限公司 协同终端切片功能和网络切片功能

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190327670A1 (en) * 2017-10-20 2019-10-24 Verizon Patent And Licensing Inc. Ran-core pairing service
CN110266545A (zh) * 2019-06-28 2019-09-20 北京小米移动软件有限公司 一种动态分配网络资源的方法、装置及介质
CN110768836A (zh) * 2019-10-28 2020-02-07 中国联合网络通信集团有限公司 一种网络切片管理方法及装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AT&T ORANGE CHARTER COMMUNICATIONS VERIZON TELECOM ITALIA TELSTRA VODAFONE CHINA MOBILE NTT DOCOMO DEUTSCH TELECOM ERICSSON SA: "Use of AppID and OSID in URSP", 3GPP SA WG2 MEETING #S2-137 ; S2-2001834, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 14 February 2020 (2020-02-14), e-meeting; 20200224 - 20200228, XP051855198 *
QUALCOMM INCORPORATED: "Clarifications and initial evaluation for Solution 7", 3GPP TSG-WG2 MEETING #127; S2-185091, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 22 May 2018 (2018-05-22), Newport Beach, USA; 20180528 - 20180601, XP051535630 *

Also Published As

Publication number Publication date
US20230247541A1 (en) 2023-08-03
WO2022027161A9 (zh) 2022-12-22
CN112055977A (zh) 2020-12-08
CN112055977B (zh) 2023-12-19

Similar Documents

Publication Publication Date Title
CN104869612B (zh) 接入网络的方法及装置
CN107637123B (zh) 信息传递方法、装置及计算机可读存储介质
CN110912880B (zh) 配网方法及装置、电子设备及存储介质
WO2016141690A1 (zh) 智能设备管理账户的设置方法及装置
CN106211159B (zh) 基于蓝牙的身份识别方法及装置
WO2016041329A1 (zh) 接入无线网络的方法及装置
CN106888206B (zh) 密钥交换方法、装置及***
CN104684106B (zh) 网络连接的方法及装置
WO2017071074A1 (zh) 建立连接的方法及装置
WO2018196102A1 (zh) 信息传递方法、装置及计算机可读存储介质
US10673611B2 (en) Data transmission method, device, and system
WO2018141165A1 (zh) 数据传输方法及装置
WO2018209657A1 (zh) 降低用户设备温度的方法、装置、基站和用户设备
WO2022205906A1 (zh) 数据加密方法、装置、电子设备及存储介质
CN106792966B (zh) 通信方法及装置
WO2022178789A1 (zh) 测距方法、装置、终端设备及存储介质
CN112383532A (zh) 设备联网方法及装置、电子设备、存储介质
WO2022027161A1 (zh) 业务的切片激活方法、业务的切片激活装置及存储介质
EP4319424A1 (en) Service flow processing method, service flow processing apparatus, and storage medium
WO2022027323A1 (zh) 用于寻呼信息处理的方法、装置及存储介质
WO2018184170A1 (zh) 实现物联网设备引导的方法、装置、设备及基站
WO2018086066A1 (zh) 一种配置工作载波的方法及装置
WO2023240575A1 (zh) 一种中继通信方法、通信装置及通信设备
WO2021208025A1 (zh) 管理消息帧传输方法、装置及存储介质
WO2019006728A1 (zh) 物联网设备之间建立快速连接的方法、装置及设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20948877

Country of ref document: EP

Kind code of ref document: A1