The present disclosure relates to the field of communication, and more particularly to an authentication method, an authentication apparatus, a medium and a chip.
In the wireless communication system, 3GPP (3rd Generation Partnership Project) defines the session security protection function between the User Equipment (UE) and the application function, and proposes an application-based key management method, i.e., authentication and key management for applications based on 3GPP credentials (AKMA).
In the related art, the user equipment can exchange messages with an application function (AF) entity based on AKMA, and determine the access authority of the user equipment to the application function AF entity, so as to establish a secure session with the application function AF entity, which will increase the load of the application function AF entity and reduce the efficiency of the AF entity.
According to a first aspect of embodiments of the present disclosure, an authentication method is provided, which is applied to a user equipment, and includes: determining, from one or more first entities, a target entity with which communication is requested; and deriving an application key KAF based on a fully qualified domain name (FQDN) of the target entity, wherein a first proxy entity provides an authentication proxy function for the target entity.
According to a second aspect of embodiments of the present disclosure, an authentication method is provided, which is applied to a first proxy entity, and includes: sending a fully qualified domain name (FQDN) of a target entity to a third entity or a second entity, wherein a first proxy entity provides an authentication proxy function for the target entity.
According to a third aspect of embodiments of the present disclosure, an authentication method is provided, which is applied to a third entity, and includes: receiving a fully qualified domain name (FQDN) of a target entity sent by a first proxy entity or a second entity; deriving an application key KAF based on the FQDN of the target entity, wherein the first proxy entity provides an authentication proxy function for the target entity; and sending the application key KAF to the first proxy entity or the second entity.
According to a fourth aspect of embodiments of the present disclosure, an authentication method is provided, which is applied to a target entity in one or more first entities, and includes: receiving an identity of a subscriber of a user equipment sent by a first proxy entity.
According to a fifth aspect of embodiments of the present disclosure, an authentication apparatus is provided, which includes: a processor; and a memory for storing instructions executable by the processor. The processor is configured to perform the method as described in the first aspect.
According to a sixth aspect of embodiments of the present disclosure, an authentication apparatus is provided, which includes: a processor; and a memory for storing instructions executable by the processor. The processor is configured to perform the method as described in the first aspect.
According to a seventh aspect of embodiments of the present disclosure, an authentication apparatus is provided, which includes: a processor; and a memory for storing instructions executable by the processor. The processor is configured to perform the method as described in the first aspect.
According to an eighth aspect of embodiments of the present disclosure, an authentication apparatus is provided, which includes: a processor; and a memory for storing instructions executable by the processor. The processor is configured to perform the method as described in the first aspect.
It is to be understood that both the foregoing general description and the following detailed description are illustrative and explanatory only, and are not restrictive of the present disclosure.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the present disclosure.
Reference will now be made in detail to illustrative embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementations described in the following illustrative embodiments do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.
It should be noted that all the actions of acquiring signals, information or data in the present disclosure are carried out under the premise of complying with the corresponding data protection laws and policies of the country where the present disclosure is and obtaining authorization from the owner of the corresponding device.
In the present disclosure, terms such as “first” and “second” are used to distinguish similar objects without necessarily being understood as a specific order or precedence. In addition, in the description with reference to the drawings, the same reference numerals in different drawings indicate the same elements unless otherwise specified.
In the description of the present disclosure, unless otherwise specified, “a plurality of” means two or more, and other quantifiers are similar to this. The expression “at least one of the following items” or other similar expressions refer to any combination of these items, including any combination of singular items or plural items. For example, at least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be singular or plural; “and/or” is an association relationship that describes the associated objects, which means that there can be three kinds of relationships, for example, A and/or B can mean that A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural.
Although the operations are described in a specific order in the drawings in the embodiments of the present disclosure, it should not be construed as requiring that these operations be performed in the specific order or serial order shown, or that all the operations shown be performed, to acquire the desired results. In certain circumstances, multitasking and parallel processing may be beneficial.
In the related art, the user equipment can exchange messages with an application function (AF) entity based on AKMA, and determine the access authority of the user equipment to the application function AF entity, so as to establish a secure session with the application function AF entity. However, the message interaction caused by a plurality of user equipment will increase the load of the application function AF entity and reduce the efficiency of the application function AF entity. Moreover, when there exist a plurality of application function AF entities in the network, direct message interaction of the UE with the AF to determine the access authority will also reduce the efficiency for the UE.
In order to solve the above problems, the present disclosure provides an authentication method, an authentication apparatus, a medium and a chip.
First, the implementation environment of embodiments of the present disclosure will be introduced.
Embodiments of the present disclosure may be applied to a 4G (the 4th Generation) network system, such as a Long Term Evolution (LTE) system, or it may also be applied to a 5G (the 5th Generation) network system, such as an access network adopting a New Radio Access Technology (New RAT); a Cloud Radio Access Network (CRAN) or other communication systems.
As shown in
In some embodiments, the first entity 101 may include a trusted entity providing an application function inside a 3GPP operator domain, the first proxy entity 110 may include a trusted entity providing an authentication proxy function inside the 3GPP operator domain, and the third entity 103 may include an entity providing AKMA authorization and application key derivation functions, for example, the third entity 103 may be a functional entity that provides an AKMA anchor function and authenticates a communication authority between the user equipment and the first entity.
For example, the first entity may include: an application function (AF) entity or a service capability server SCS/application server AS; the first proxy entity may include an authentication proxy AP (authentication proxy) entity; and the third entity may include: an AKMA anchor function AAnF entity.
In some embodiments, the first entity may include a trusted entity providing an application function inside the 3GPP operator domain, the first proxy entity may include a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provide an authentication proxy function for the first entity, and the first entity may include one or more entities.
In
Embodiments of the present disclosure provide an authentication method, applied to a user equipment, including: determining, from one or more first entities, a target entity with which communication is requested; determining a first authority request parameter according to the target entity; sending an application session establishment request message to a first proxy entity according to the first authority request parameter; where the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with the target entity according to the first authority request parameter; the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; determining whether the user equipment has the first communication authority with the target entity in response to receiving an application session establishment response message sent by the first proxy entity; and in a case that the user equipment has the first communication authority with the target entity, performing authentication through the first proxy entity.
In some embodiments, determining the first authority request parameter according to the target entity includes: taking a first target entity identifier of the target entity and a key identifier A-KID corresponding to the user equipment as the first authority request parameter.
In some embodiments, the first communication authority includes one or more of the user equipment having an access authority to the target entity; the user equipment having an access authority to the first proxy entity; the first proxy entity having a proxy authority to the target entity; or the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, after the authentication through the first proxy entity is successful, the method further includes: establishing a secure session with the first proxy entity; acquiring a proxy domain name of the first proxy entity and a first domain name of the target entity; determining whether the user equipment has a second communication authority with the target entity through the secure session in a case that the proxy domain name is the same as the first domain name; and communicating with the target entity in a case that it is determined that the user equipment has the second communication authority with the target entity.
In some embodiments, determining whether the user equipment has the second communication authority with the target entity through the secure session includes: sending a target entity service request message to the first proxy entity through the secure session; where the target entity service request message includes a second target entity identifier, the second target entity identifier is a protected entity identifier acquired by the user equipment according to the first target entity identifier, and the target entity service request message is configured to instruct the first proxy entity to determine whether the user equipment has the second communication authority with the target entity according to the second target entity identifier; and determining whether the user equipment has the second communication authority with the target entity in response to receiving a target entity service response message sent by the first proxy entity.
In some embodiments, the second communication authority includes one or more of the user equipment having an access authority to the target entity; the first proxy entity having a proxy authority to the target entity; or the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, determining whether the user equipment has the first communication authority with the target entity in response to receiving the application session establishment response message sent by the first proxy entity includes: determining that the user equipment has the first communication authority with the target entity in a case that the application session establishment response message is received; or determining that the user equipment has the first communication authority with the target entity, in a case that the application session establishment response message is received and the session establishment response message includes success indication information.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes a trusted entity providing an application function inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, or a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain.
In some embodiments, the first entity includes an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity communicates with the first entity through a second entity; and the second entity includes an entity providing a network exposure function.
In some embodiments, the first entity includes: an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS outside the 3GPP operator domain.
In some embodiments, the second entity includes: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, an authentication method is provided, which is applied to a first proxy entity, and includes: receiving an application session establishment request message sent by a user equipment; where the application session establishment request message includes a first authority request parameter, the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with a target entity according to the first authority request parameter, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; determining whether the user equipment has the first communication authority with the target entity according to the first authority request parameter; and in a case that the user equipment has the first communication authority with the target entity, sending an application session establishment response message to the user equipment, and performing authentication of the user equipment.
In some embodiments, the first authority request parameter includes a first target entity identifier of the target entity and a key identifier A-KID corresponding to the user equipment.
In some embodiments, the first communication authority includes one or more of the user equipment having an access authority to the target entity; the user equipment having an access authority to the first proxy entity; the first proxy entity having a proxy authority to the target entity; or the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, determining whether the user equipment has the first communication authority with the target entity according to the first authority request parameter includes: determining a second authority request parameter according to the first authority request parameter; sending the second authority request parameter to a third entity; where the third entity includes an entity that provides AKMA authorization and application key derivation functions; and the second authority request parameter is configured to instruct the third entity to determine whether the user equipment has the first communication authority with the target entity; acquiring first pending key information sent by the third entity, where the first pending key information is key information acquired by the third entity according to the second authority request parameter; and determining whether the user equipment has the first communication authority with the target entity according to the first pending key information.
In some embodiments, determining the second authority request parameter according to the first authority request parameter includes: taking the first authority request parameter and a proxy entity identifier corresponding to the first proxy entity as the second authority request parameter.
In some embodiments, sending the second authority request parameter to the third entity includes: sending the second authority request parameter to the third entity via a first key request message; where the first key request message is configured to instruct the third entity to acquire the first pending key information and an identity of the subscriber of the user equipment. Acquiring the first pending key information sent by the third entity includes: receiving a first key response message sent by the third entity; and acquiring the first pending key information included in the first key response message.
In some embodiments, the first key response message further includes a second identity of the subscriber corresponding to the user equipment, and the method further includes: acquiring the second identity of the subscriber according to the first key response message received.
In some embodiments, the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, sending the second authority request parameter to the third entity includes: sending the second authority request parameter to the third entity via a second key request message; where the second key request message is configured to indicate that the first proxy entity requests to acquire the first pending key information. Acquiring the first pending key information sent by the third entity includes: receiving a second key response message sent by the third entity; and acquiring the first pending key information included in the second key response message.
In some embodiments, determining whether the user equipment has the first communication authority with the target entity according to the first pending key information includes: determining that the user equipment has the first communication authority with the target entity in a case that the first pending key information includes entity key information corresponding to the target entity.
In some embodiments, in a case that the authentication of the user equipment is successful, the method further includes: notifying the target entity of a first authentication result of the authentication.
In some embodiments, notifying the target entity of the first authentication result includes: acquiring a proxy domain name of the first proxy entity and a first domain name of the target entity; and notifying the target entity of the first authentication result in a case that the proxy domain name is different from the first domain name.
In some embodiments, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, notifying the target entity of the first authentication result includes: sending a first notification message to the target entity, where the first notification message includes the first authentication result.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the first notification message further includes the second identity of the subscriber.
In some embodiments, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, notifying the target entity of the first authentication result includes: sending a second notification message to a second entity according to the first authentication result to instruct the second entity to send the first authentication result to the target entity.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the second notification message further includes the second identity of the subscriber.
In some embodiments, after the authentication of the user equipment is successful, the method further includes: establishing a secure session with the user equipment; receiving, through the secure session, a target entity service request message sent by the user equipment; where the target entity service request message includes a second target entity identifier, the second target entity identifier is a protected entity identifier acquired by the user equipment according to a first target entity identifier of the target entity, and the target entity service request message is a message sent by the user equipment in a case that it is determined that a proxy domain name of the first proxy entity is the same as a first domain name of the target entity; determining whether the user equipment has a second communication authority with the target entity according to the second target entity identifier; and sending a target entity service response message to the user equipment; where the target entity service response message is configured to indicate whether the user equipment has the second communication authority with the target entity.
In some embodiments, the second communication authority includes one or more of the user equipment having an access authority to the target entity; the first proxy entity having a proxy authority to the target entity; or the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, determining whether the user equipment has the second communication authority with the target entity according to the second target entity identifier includes: determining that the user equipment has the second communication authority with the target entity in a case that the second target entity identifier is the same as the first target entity identifier.
In some embodiments, determining whether the user equipment has the second communication authority with the target entity according to the second target entity identifier includes: determining a third authority request parameter according to the second target entity identifier in a case that the second target entity identifier is different from the first target entity identifier; sending the third authority request parameter to a third entity; where the third authority request parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity; acquiring an authorization result parameter sent by the third entity; where the authorization result parameter is configured to indicate whether the user equipment has the second communication authority with the target entity; and determining whether the user equipment has the second communication authority with the target entity according to the authorization result parameter.
In some embodiments, determining the third authority request parameter according to the second target entity identifier includes: taking the second target entity identifier, a key identifier A-KID corresponding to the user equipment, and a proxy entity identifier corresponding to the first proxy entity as the third authority request parameter.
In some embodiments, sending the third authority request parameter to the third entity includes: sending the third authority request parameter to the third entity via a third key request message; where the third key request message is configured to instruct the third entity to acquire the authorization result parameter and an identity of the subscriber of the user equipment. Acquiring the authorization result parameter sent by the third entity includes: receiving a third key response message sent by the third entity; and acquiring the authorization result parameter included in the third key response message.
In some embodiments, the third key response message further includes a second identity of the subscriber corresponding to the user equipment, and the method further includes: acquiring the second identity of the subscriber according to the third key response message received.
In some embodiments, the third key request message further includes an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message.
In some embodiments, sending the third authority request parameter to the third entity includes: sending the third authority request parameter to the third entity via a fourth key request message; where the fourth key request message is configured to indicate that the first proxy entity requests to acquire the authorization result parameter. Acquiring the authorization result parameter sent by the third entity includes: receiving a fourth key response message sent by the third entity; and acquiring the authorization result parameter included in the fourth key response message.
In some embodiments, the fourth key request message further includes an authorization indication parameter, the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the fourth key request message.
In some embodiments, in a case that it is determined according to an authorization result parameter that the user equipment has the second communication authority with the target entity, the method further includes: notifying the target entity of a second authentication result; where the second authentication result is configured to indicate that the target entity has a communication authority with the target entity.
In some embodiments, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, notifying the target entity of the second authentication result includes: sending a third notification message to the target entity, where the third notification message includes the second authentication result.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the third notification message further includes the second identity of the subscriber.
In some embodiments, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, notifying the target entity of the second authentication result includes: sending a fourth notification message to a second entity according to a first authentication result to instruct the second entity to send the first authentication result to the target entity.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the fourth notification message further includes the second identity of the subscriber.
In some embodiments, the first pending key information includes an application key KAF and a key expiration time.
In some embodiments, a second entity includes a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, an authentication method is provided, which is applied to a third entity, and includes: receiving a second authority request parameter sent by a first proxy entity; where the second authority request parameter is configured to instruct the third entity to determine whether a user equipment has a first communication authority with a target entity, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, the first proxy entity provides an authentication proxy function for the first entity, and the third entity includes an entity that provides AKMA authorization and application key derivation functions; determining whether the user equipment has the first communication authority with the target entity according to the second authority request parameter; acquiring first pending key information in a case that the user equipment has the first communication authority with the target entity; and sending the first pending key information to the first proxy entity.
In some embodiments, the second authority request parameter includes a key identifier A-KID corresponding to the user equipment, a first target entity identifier of the target entity and a proxy entity identifier corresponding to the first proxy entity; where determining whether the user equipment has the first communication authority with the target entity according to the second authority request parameter includes one or more of determining whether the user equipment has an access authority to the target entity according to the key identifier A-KID and the first target entity identifier; determining whether the user equipment has an access authority to the first proxy entity according to the key identifier A-KID and the proxy entity identifier; determining whether the first proxy entity has a proxy authority to the target entity according to the proxy entity identity and the first target entity identity; or determining whether the target entity has an acquisition authority to an identity of the subscriber of the user equipment according to the key identifier A-KID and the first target entity identifier.
In some embodiments, acquiring the first pending key information includes: acquiring the first pending key information according to entity key information corresponding to the target entity.
In some embodiments, receiving the second authority request parameter sent by the first proxy entity includes: receiving the second authority request parameter sent by the first proxy entity via a first key request message; where the first key request message is configured to instruct the third entity to acquire the first pending key information and an identity of the subscriber of the user equipment. Sending the first pending key information to the first proxy entity includes: sending the first pending key information to the first proxy entity via a first key response message.
In some embodiments, sending the first pending key information to the first proxy entity via the first key response message includes: sending the first pending key information and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the first key response message in a case that it is determined that the target entity has an acquisition authority to the identity of the subscriber.
In some embodiments, the second identity of the subscriber is a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, receiving the second authority request parameter sent by the first proxy entity includes: receiving the second authority request parameter sent by the first proxy entity via a second key request message; where the second key request message is configured to instruct the third entity to acquire the first pending key information. Sending the first pending key information to the first proxy entity includes: sending the first pending key information to the first proxy entity via a second key response message.
In some embodiments, after sending the first pending key information to the first proxy entity, the method further includes: receiving a third authority request parameter sent by the first proxy entity; determining whether the user equipment has a second communication authority with the target entity according to the third authority request parameter; and sending an authorization result parameter to the first proxy entity; where the authorization result parameter is configured to notify the first proxy entity whether the user equipment has the second communication authority with the target entity.
In some embodiments, the third authority request parameter includes a key identifier A-KID, a second target entity identifier, and a proxy entity identifier corresponding to the first proxy entity, where the second target entity identifier is a protected entity identifier acquired by the user equipment according to a first target entity identifier of the target entity. Determining whether the user equipment has the second communication authority with the target entity according to the third authority request parameter includes one or more of determining whether the user equipment has an access authority to the target entity according to the key identifier A-KID and the second target entity identifier; determining whether the first proxy entity has a proxy authority to the target entity according to the proxy entity identifier and the second target entity identifier; or determining whether the target entity has an acquisition authority to an identity of the subscriber of the user equipment according to the key identifier A-KID and the second target entity identifier.
In some embodiments, receiving the third authority request parameter sent by the first proxy entity includes: receiving the third authority request parameter sent by the first proxy entity via a third key request message; where the third key request message is configured to instruct the third entity to acquire an authorization result parameter and an identity of the subscriber of the user equipment. Sending the authorization result parameter to the first proxy entity includes: sending the authorization result parameter to the first proxy entity via a third key response message.
In some embodiments, the third key request message further includes an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message.
In some embodiments, sending the authorization result parameter to the first proxy entity via the third key response message includes: sending the authorization result parameter and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the third key response message in a case that it is determined that the target entity has an acquisition authority to the identity of the subscriber.
In some embodiments, the second identity of the subscriber is a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, receiving the third authority request parameter sent by the first proxy entity includes: receiving the third authority request parameter sent by the first proxy entity via a fourth key request message; where the fourth key request message is configured to instruct the third entity to acquire the authorization result parameter. Sending the authorization result parameter to the first proxy entity includes: sending the authorization result parameter to the first proxy entity via a fourth key response message.
In some embodiments, before determining whether the user equipment has the second communication authority with the target entity according to the third authority request parameter, the method further includes: determining whether the third entity has an authority to serve the first proxy entity according to a first preset policy. Determining whether the user equipment has the second communication authority with the target entity according to the third authority request parameter includes: determining whether the user equipment has the second communication authority with the target entity according to the third authority request parameter in a case that the third entity has the authority to serve the first proxy entity.
In some embodiments, before determining whether the user equipment has the first communication authority with the target entity according to the second authority request parameter, the method further includes: determining whether the third entity has an authority to serve the first proxy entity according to a first preset policy. Determining whether the user equipment has the first communication authority with the target entity according to the second authority request parameter includes: determining whether the user equipment has the first communication authority with the target entity according to the second authority request parameter in a case that the third entity has the authority to serve the first proxy entity.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain; and the third entity includes: an AKMA anchor function AAnF entity.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, an authentication method is provided, which is applied to a target entity in one or more first entities, and includes: acquiring an authentication result of a first proxy entity to a user equipment, where the authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with the target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the first entity includes an entity providing an application function, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; and communicating with the user equipment according to the authentication result.
In some embodiments, in a case that the target entity is a trusted entity providing the application function inside the 3GPP operator domain, acquiring the authentication result of the first proxy entity to the user equipment includes: receiving a first notification message sent by the first proxy entity, where the first notification message includes the first authentication result; or receiving a third notification message sent by the first proxy entity, where the third notification message includes the second authentication result.
In some embodiments, the first notification message or the third notification message further includes a second identity of the subscriber corresponding to the user equipment.
In some embodiments, the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, in a case that the target entity is an untrusted entity providing the application function outside the 3GPP operator domain, acquiring the authentication result of the first proxy entity to the user equipment includes: receiving a fifth notification message sent by a second entity; where the fifth notification message includes the first authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a second notification message; or receiving a sixth notification message sent by the second entity; where the sixth notification message includes the second authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a fourth notification message.
In some embodiments, the fifth notification message or the sixth notification message further includes a first identity of the subscriber of the user equipment.
In some embodiments, the first identity of the subscriber is a generic public subscription identifier GPSI corresponding to the user equipment.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, an authentication method is provided, which is applied to a second entity, and includes: acquiring an authentication result of a first proxy entity to a user equipment; where the authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with a target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an untrusted entity providing an application function outside a 3GPP operator domain, the first proxy entity includes a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; and sending the authentication result to the target entity to make the target entity communicate with the user equipment according to the authentication result.
In some embodiments, acquiring the authentication result of the first proxy entity to the user equipment includes: receiving a second notification message sent by the first proxy entity; where the second notification message is a message sent by the first proxy entity to the second entity according to the first authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain; and acquiring the first authentication result according to the second notification message. Sending the authentication result to the target entity includes: sending a fifth notification message to the target entity according to the first authentication result.
In some embodiments, in a case that the second notification message includes a second identity of the subscriber corresponding to the user equipment, sending the fifth notification message to the target entity according to the first authentication result includes: acquiring a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and sending the fifth notification message to the target entity according to the first authentication result and the first identity of the subscriber.
In some embodiments, the first identity of the subscriber is a generic public subscription identifier GPSI corresponding to the user equipment; and the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, acquiring the authentication result of the first proxy entity to the user equipment includes: receiving a fourth notification message sent by the first proxy entity; where the fourth notification message is a message sent by the first proxy entity to the second entity according to the second authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain; and acquiring the second authentication result according to the second notification message. Sending the authentication result to the target entity includes: sending a sixth notification message to the target entity according to the second authentication result.
In some embodiments, in a case that the fourth notification message includes a second identity of the subscriber corresponding to the user equipment, sending the sixth notification message to the target entity according to the second authentication result includes: acquiring a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and sending the sixth notification message to the target entity according to the second authentication result and the first identity of the subscriber.
In some embodiments, the second entity includes: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, an authentication apparatus is provided, which is applied to a user equipment, and includes: a target entity determining module configured to determine, from one or more first entities, a target entity with which communication is requested; a parameter determining module configured to determine a first authority request parameter according to the target entity; a first message sending module configured to send an application session establishment request message to a first proxy entity according to the first authority request parameter; where the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with the target entity according to the first authority request parameter; the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; a first message receiving module configured to determine whether the user equipment has the first communication authority with the target entity in response to receiving an application session establishment response message sent by the first proxy entity; and an authentication module configured to perform authentication through the first proxy entity in a case that the user equipment has the first communication authority with the target entity.
In some embodiments, an authentication apparatus is provided, which is applied to a first proxy entity, and includes: a first proxy receiving module configured to receive an application session establishment request message sent by a user equipment; where the application session establishment request message includes a first authority request parameter, the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with a target entity according to the first authority request parameter, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; a first proxy determining module configured to determine whether the user equipment has the first communication authority with the target entity according to the first authority request parameter; and a first proxy sending module configured to send an application session establishment response message to the user equipment, and perform authentication of the user equipment in a case that the user equipment has the first communication authority with the target entity.
In some embodiments, an authentication apparatus is provided, which is applied to a third entity, and includes: a third receiving module configured to receive a second authority request parameter sent by a first proxy entity; where the second authority request parameter is configured to instruct the third entity to determine whether a user equipment has a first communication authority with a target entity, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, the first proxy entity provides an authentication proxy function for the first entity, and the third entity includes an entity that provides AKMA authorization and application key derivation functions; a third determining module configured to determine whether the user equipment has the first communication authority with the target entity according to the second authority request parameter; a third key module configured to acquire first pending key information in a case that the user equipment has the first communication authority with the target entity; and a third sending module configured to send the first pending key information to the first proxy entity.
In some embodiments, an authentication apparatus is provided, which is applied to a target entity in one or more first entities, and includes: a first communication module configured to: acquire an authentication result of a first proxy entity to a user equipment, where the authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with the target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the first entity includes an entity providing an application function, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; and communicate with the user equipment according to the authentication result.
In some embodiments, an authentication apparatus is provided, which is applied to a second entity, and includes: a second receiving module configured to acquire an authentication result of a first proxy entity to a user equipment; where the authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with a target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an untrusted entity providing an application function outside a 3GPP operator domain, the first proxy entity includes a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; and a second sending module configured to send the authentication result to the target entity to make the target entity communicate with the user equipment according to the authentication result.
In some embodiments, an authentication apparatus is provided, which includes: a processor; and a memory for storing instructions executable by the processor. The processor is configured to perform the method as described in any embodiments above.
In some embodiments, a computer-readable storage medium is provided, which has stored therein computer program instructions that, when executed by a processor, cause the method as described in any embodiments above to be implemented.
In some embodiments, a chip is provided, which a processor and an interface. The processor is configured to read instructions to perform the method as described in any embodiments above to be implemented.
In S301, the user equipment determines, from one or more first entities, a target entity with which communication is requested.
For example, the first entity may include an entity providing an application function, such as an application function AF entity. The user equipment can determine, according to the user's functional requirements, an AF entity with which communication is requested.
In S302, the user equipment determines a first authority request parameter according to the target entity.
In some embodiments, a first target entity identifier of the target entity may be acquired first, and the first authority parameter may be determined according to the first target entity identifier.
For example, the first target entity identifier may include one or more of a Fully Qualified Domain Name (FQDN), an Internet Protocol (IP) address and a Port Number of the target entity.
In some embodiments, the first authority request parameter may be acquired according to the first target entity identifier and a user equipment identifier representing the identity of the user equipment.
The user equipment identifier may include a key identifier A-KID corresponding to the user equipment, the key identifier A-KID may be derived according to hardware information of the user equipment and registration information sent by the communication system when the user equipment registers to access the communication system, and the key identifier A-KID may uniquely identify one user equipment in the communication system.
For example, the first target entity identifier and the key identifier A-KID corresponding to the user equipment may be used as the first authority request parameter.
In S303, the user equipment sends an application session establishment request message to a first proxy entity according to the first authority request parameter.
The application session establishment request message may be configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with the target entity according to the first authority request parameter.
In some embodiments, the first proxy entity is connected with one or more first entities. For example, a unified first proxy entity may be set in a trust domain or an edge node, and the first proxy entity can be connected with each first entity in the trust domain or the edge node. In a case that the user equipment requests to communicate with the target entity in the trust domain or the edge node, an application session establishment request message may be sent to the first proxy entity.
In some embodiments, the first entity may include an entity providing an application function (such as a trusted entity providing an application function inside a 3GPP operator domain, or an untrusted entity providing an application function outside the 3GPP operator domain), the first proxy entity may include a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity, and one or more first entities may be provided.
In some embodiments, the user equipment may be pre-configured with a proxy domain name (e.g., FQDN) of the first proxy entity, and the user equipment is able to perform message interaction or data transmission with the first proxy entity through the FQDN.
In S304, the user equipment determines whether the user equipment has the first communication authority with the target entity in response to receiving an application session establishment response message sent by the first proxy entity.
In some embodiments, the user equipment may determine that the user equipment has the first communication authority with the target entity in a case that the application session establishment response message is received.
On the contrary, if the user equipment does not receive the application session establishment response message within a preset time, it can be determined that the user equipment does not have the first communication authority with the target entity.
In some other embodiments, the user equipment may determine that the user equipment has the first communication authority with the target entity in a case that the user equipment receives the application session establishment response message, and the application session establishment response message includes success indication information.
On the contrary, if the application session establishment response message received by the user equipment does not include the success indication information or includes failure indication information, it can be determined that the user equipment does not have the first communication authority with the target entity. The success indication information may be any indication information set in advance.
In some other embodiments, the user equipment may determine that the user equipment has the first communication authority with the target entity in a case that the user equipment receives the application session establishment response message, and the application session establishment response message does not include the failure indication information.
On the contrary, if the application session establishment response message received by the user equipment includes the failure indication information, it can be determined that the user equipment does not have the first communication authority with the target entity. The failure indication information may be any error code set in advance.
In S305, in a case that the user equipment has the first communication authority with the target entity, the user equipment performs authentication through the first proxy entity.
For example, the user equipment is able to derive an application function key (also called application key) KAF corresponding to the target entity based on the FQDN of the target entity, and perform the authentication with the first proxy entity based on the application key KAF.
It should be noted that the way for the user equipment to perform the authentication can refer to the implementation in the related art, for example, the authentication may be performed based on the application key information corresponding to the target entity, or the authentication may be performed based on user key information corresponding to the user equipment and the application key information corresponding to the target entity, which is not limited in the present disclosure.
By adopting the above method, the target entity with which communication is requested is determined from one or more first entities; the first authority request parameter is determined according to the target entity; the application session establishment request message is sent to the first proxy entity according to the first authority request parameter; it is determined whether the user equipment has the first communication authority with the target entity in response to receiving the application session establishment response message sent by the first proxy entity; and in a case that the user equipment has the first communication authority with the target entity, the authentication is performed through the first proxy entity. The application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has the first communication authority with the target entity according to the first authority request parameter; the first entity may include the entity providing the application function, the first proxy entity may include the trusted entity providing the authentication function inside the 3GPP operator domain, and the first proxy entity provides the authentication proxy function for the first entity. In this way, the trusted first proxy entity inside the 3GPP operator domain may determine whether the user equipment has the first communication authority with the first entity, and perform the authentication of the user equipment in a case that the user equipment has the first communication authority, so that part of functions of the first entity can be realized through the first proxy entity, thereby reducing the load of the first entity and improving the efficiency of the first entity. Moreover, the user equipment realizes the authorization and authentication with one or more first entities through the unified first proxy entity, which also reduces the complexity of authentication of the user equipment and improves the efficiency of the user equipment.
In some embodiments, the first communication authority may include one or more of the following authorities.
Authority 1: the user equipment has an access authority to the target entity.
Authority 2: the user equipment has an access authority to the first proxy entity.
Authority 3: the first proxy entity has a proxy authority to the target entity.
Authority 4: the target entity has an acquisition authority to an identity of the subscriber of the user equipment.
For example, it may be determined that the user equipment has the first communication authority with the target entity in a case that it is determined that the user equipment has the access authority to the target entity; it may also be determined that the user equipment has the first communication authority with the target entity in a case that it is determined that the user equipment has the access authority to the first proxy entity and the first proxy entity has the proxy authority to the target entity; or it may also be determined that the user equipment has the first communication authority with the target entity in a case that it is determined that the user equipment has the access authority to the target entity, the user equipment has the access authority to the first proxy entity, and the first proxy entity has the proxy authority to the target entity.
In some embodiments, the user equipment having the first communication authority with the target entity may include that the user equipment has the access authority to the first proxy entity, and the first proxy entity has the proxy authority to the target entity. For example, in a case that the FQDN of the first proxy entity is the same as that of the target entity, the first communication authority can be used.
In some other embodiments, the user equipment having the first communication authority with the target entity may include that the user equipment has the access authority to the target entity, the user equipment has the access authority to the first proxy entity, and the first proxy entity has the proxy authority to the target entity. For example, in a case that the FQDN of the first proxy entity is different from that of the target entity, the first communication authority can be used.
In some embodiments, the first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity may include a trusted entity providing an application function inside the 3GPP operator domain. For example, the first entity may include: a trusted application function AF entity inside the 3GPP operator domain or a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain.
In some other embodiments, the above first entity may include an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity may communicate with the first entity through a second entity; the second entity may include an entity providing a network exposure function. For example, the first entity may include: an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain; and the second entity may include: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In this way, the user equipment can communicate with the AF entity outside the operator domain through the AP.
In some embodiments, after the authentication through the first proxy entity is successful, the user equipment can communicate with the target entity.
For example, the user equipment can communicate with the target entity directly or through the first proxy entity, for example, a communication message between the user equipment and the target entity is forwarded through the first proxy entity.
In some other embodiments, after the authentication through the first proxy entity is successful, the user equipment can also determine whether a proxy domain name of the first proxy entity is the same as a first domain name of the target entity, and can communicate with the target entity in a case that the proxy domain name is different from the first domain name.
On the contrary, in a case that the proxy domain name is the same as the first domain name, whether the user equipment has a second communication authority with the target entity may be further determined through a secure session between the user equipment and the proxy entity; and in a case that the user equipment has the second communication authority, the user equipment can communicate with the target entity.
It should be noted that the proxy domain name may be a fully qualified domain name FQDN corresponding to the first proxy entity, and the first domain name may be a fully qualified domain name FQDN corresponding to the target entity. In some scenarios, the first proxy entity and the target entity can use the same FQDN, but different IP addresses or port numbers. In this scenario, the first communication authority can indicate that the user equipment has the access authority to the FQDN, but not necessarily indicate that the user equipment has the access authority to the target entity corresponding to the IP address or port number. At this time, it may be further determined whether the user equipment has the second communication authority with the target entity through the secure session between the user equipment and the proxy entity.
In S401, in a case that the user equipment has the first communication authority with the target entity, the user equipment performs authentication through the first proxy entity.
In S402, after the authentication through the first proxy entity is successful, the user equipment establishes a secure session with the first proxy entity.
For example, the secure session may be a transport layer security (TLS) session, through which confidentiality and data integrity can be achieved for the communication between the user equipment and the first proxy entity.
In S403, the user equipment acquires a proxy domain name of the first proxy entity and a first domain name of the target entity.
In some embodiments, the proxy domain name may be the fully qualified domain name FQDN corresponding to the first proxy entity, and the first domain name may be the fully qualified domain name FQDN corresponding to the target entity.
In S404, in a case that the proxy domain name is the same as the first domain name, the user equipment determines whether the user equipment has the second communication authority with the target entity through the secure session.
In S405, in a case that it is determined that the user equipment has the second communication authority with the target entity, the user equipment communicates with the target entity.
Similarly, the user equipment can communicate with the target entity directly or through the first proxy entity, for example, the communication message between the user equipment and the target entity is forwarded through the first proxy entity.
In this way, by authenticating the first communication authority and the second communication authority, it can also be determined that the user equipment has the access authority to the target entity in a case that the FQDN of the first proxy entity is the same as that of the target entity, thereby further enhancing security.
In some embodiments, determining whether the user equipment has the second communication authority with the target entity through the secure session in step S404 may include the following operations.
Firstly, the user equipment sends a target entity service request message to the first proxy entity through the secure session.
For example, the target entity service request message may include a second target entity identifier, which is a protected entity identifier acquired by the user equipment according to the first target entity identifier. The target entity service request message is used to instruct the first proxy entity to determine whether the user equipment has the second communication authority with the target entity according to the second target entity identifier.
In some embodiments, the second target entity identifier is an identifier determined after protecting the first target entity identifier corresponding to the target entity according to the requirements of the secure session (such as the TLS session).
In some other embodiments, the first target entity identifier can also be directly used as the second target entity identifier, and the second target entity identifier can be transmitted through the secure session, so as to protect the first target entity identifier and prevent the entity identifier from being tampered with during transmission.
Then, in response to receiving a target entity service response message sent by the first proxy entity, the user equipment determines whether the user equipment has the second communication authority with the target entity.
In some embodiments, the user equipment may determine that the user equipment has the second communication authority with the target entity in a case that the user equipment receives the target entity service response message.
On the contrary, in a case that the user equipment does not receive the target entity service response message within a preset time, it can be determined that the user equipment does not have the second communication authority with the target entity.
In some other embodiments, the user equipment may determine that the user equipment has the second communication authority with the target entity in a case that the user equipment receives the target entity service response message, and the target entity service response message contains success indication information.
On the contrary, in a case that the target entity service response message received by the user equipment does not contain the success indication information or contains failure indication information, it can be determined that the user equipment does not have the second communication authority with the target entity. The success indication information can be any indication information set in advance.
In some other embodiments, the user equipment may determine that the user equipment has the second communication authority with the target entity in a case that the user equipment receives the target entity service response message, and the target entity service response message does not contain the failure indication information.
On the contrary, in a case that the target entity service response message received by the user equipment contains the failure indication information, it can be determined that the user equipment does not have the second communication authority with the target entity. The failure indication information can be any error code set in advance.
In this way, the user equipment can determine whether the user equipment has the second communication authority with the target entity through the secure session.
In some embodiments, the second communication authority may include one or more of the following authorities.
Authority 6: the user equipment has an access authority to the target entity.
Authority 7: the first proxy entity has a proxy authority to the target entity.
Authority 8: the target entity has an acquisition authority to the identity of the subscriber of the user equipment.
In this way, it can be determined whether the user equipment has the second communication authority with the target entity through the secure session between the user equipment and the first proxy entity, thus further improving the reliability of authentication.
In S501, the first proxy entity receives an application session establishment request message sent by the user equipment.
The application session establishment request message includes a first authority request parameter, and the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with a target entity according to the first authority request parameter, the target entity is an entity which is determined from one or more first entities by the user equipment and with which communication is requested, and the first entity may include an entity providing an application function, the first proxy entity may include a trusted entity providing an authentication function inside the 3GPP operator domain, the first proxy entity provides an authentication proxy function for the first entity, and one or more first entities may be provided.
In S502, the first proxy entity determines whether the user equipment has the first communication authority with the target entity according to the first authority request parameter.
In this way, the trusted first proxy entity inside the 3GPP operator domain may determine whether the user equipment has the first communication authority with the first entity, and perform the authentication of the user equipment in a case that the user equipment has the first communication authority, so that part of functions of the first entity can be realized through the first proxy entity, thereby reducing the load of the first entity and improving the efficiency of the first entity. Moreover, the user equipment realizes the authorization and authentication with one or more first entities through the unified first proxy entity, which also reduces the complexity of authentication of the user equipment and improves the efficiency of the user equipment.
In some embodiments, the first proxy entity can determine whether the user equipment has the first communication authority with the target entity through message interaction with a third entity, which for example may include the following operations.
First, the first proxy entity determines a second authority request parameter according to the first authority request parameter.
In some embodiments, the first authority request parameter and a proxy entity identifier corresponding to the first proxy entity may be used as the second authority request parameter. For example, if the first authority request parameter includes a first target entity identifier of the target entity and a key identifier A-KID corresponding to the user equipment, the second authority request parameter may include the first target entity identifier, the key identifier A-KID, and the proxy entity identifier corresponding to the first proxy entity.
In some other embodiments, the first authority request parameter may be used as the second authority request parameter.
Secondly, the first proxy entity sends the second authority request parameter to the third entity.
For example, the third entity may include an entity providing AKMA authorization and application key derivation functions. The second authority request parameter may be configured to instruct the third entity to determine whether the user equipment has the first communication authority with the target entity.
Thirdly, the first proxy entity acquires first pending key information sent by the third entity.
The first pending key information is key information acquired by the third entity according to the second authority request parameter
In some embodiments, the first pending key information may include an application key KAF corresponding to the target entity.
In some other embodiments, the first pending key information may include the application key KAF and a key expiration time (KAF expiration time) corresponding to the target entity.
In some embodiments, the first proxy entity may send the second authority request parameter to the third entity via a first key request message; the first key request message is configured to instruct the third entity to acquire the first pending key information and an identity of the subscriber of the user equipment; the first proxy entity may also receive a first key response message sent by the third entity; and acquire the first pending key information included in the first key response message.
Further, the first key response message may also include a second identity of the subscriber corresponding to the user equipment, and the first proxy entity may acquire the second identity of the subscriber according to the first key response message received. The second identity of the subscriber may include a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the first proxy entity may send the second authority request parameter to the third entity via a second key request message; the second key request message is configured to indicate that the first proxy entity requests to acquire the first pending key information; the first proxy entity may also receive a second key response message sent by the third entity; and acquire the first pending key information included in the second key response message. Finally, the first proxy entity determines whether the user equipment has the first communication authority with the target entity according to the first pending key information.
For example, in a case that the first pending key information includes the application key KAF corresponding to the target entity, it can be determined that the user equipment has the first communication authority with the target entity. On the contrary, in a case that the first pending key information does not include the application key KAF corresponding to the target entity, or in a case that the first pending key information does not include the valid application key KAF, or in a case that the first pending key information is not received within a preset time, it can be determined that the user equipment does not have the first communication authority with the target entity.
In this way, the first proxy entity can determine whether the user equipment has the first communication authority with the target entity through interaction with the third entity.
In some other embodiments, in a case that the first proxy entity stores a communication authority policy of the user equipment, it can be directly determined whether the user equipment has the first communication authority with the target entity according to the first authority request parameter.
In S503, in a case that the user equipment has the first communication authority with the target entity, the first proxy entity sends an application session establishment response message to the user equipment, and performs authentication of the user equipment.
In some embodiments, the first proxy entity may indicate that the user equipment has the first communication authority with the target entity by sending the application session establishment response message. On the contrary, by not sending the application session establishment response message, the first proxy entity may indicate that the user equipment does not have the first communication authority with the target entity.
In some other embodiments, the first proxy entity may include success indication information in the application session establishment response message, and it is indicated through the success indication information that the user equipment has the first communication authority with the target entity. On the contrary, by not including the success indication information in the application session establishment response message, it is indicated that the user equipment does not have the first communication authority with the target entity. The success indication information may be any indication information set in advance.
In some other embodiments, in a case that the user equipment does not have the first communication authority with the target entity, the first proxy entity may include failure indication information in the application session establishment response message to indicate that the user equipment does not have the first communication authority with the target entity. On the contrary, in a case that the user equipment has the first communication authority with the target entity, the first proxy entity may indicate that the user equipment has the first communication authority with the target entity by not including the failure indication information in the application session establishment response message.
By adopting the above method, the authentication between the user equipment and the first entity can be realized through the first proxy entity, so that the problem of excessive load of the first entity caused by the authentication can be overcome.
In some embodiments, the first communication authority may include one or more of the following authorities.
Authority 1: the user equipment has an access authority to the target entity.
Authority 2: the user equipment has an access authority to the first proxy entity.
Authority 3: the first proxy entity has a proxy authority to the target entity.
Authority 4: the target entity has an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, the above first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the above first entity may include: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the above second entity may include: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, the above third entity may include: an AKMA anchor function AAnF entity.
In some embodiments, in a case that the authentication of the user equipment through the first proxy entity is successful, the first proxy entity may notify the target entity of a first authentication result of the authentication. The first authentication result is configured to indicate that the user equipment has a communication authority with the target entity.
For example, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the first proxy entity may send a first notification message to the target entity, and the first notification message may include the first authentication result. Further, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired through the first key response message), the first notification message may also include the second identity of the subscriber.
For another example, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity may send a second notification message to the second entity according to the first authentication result to instruct the second entity to send the first authentication result to the target entity. Similarly, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired through the first key response message), the second notification message may also include the second identity of the subscriber.
Further, the authentication result notification message may also include the first identity of the subscriber corresponding to the user equipment. For example, in a case that the first key response message includes the first identity of the subscriber corresponding to the user equipment, the first proxy entity may send the first identity of the subscriber to the target entity via the authentication result notification message.
It should be noted that the first identity of the subscriber may be any identifier for representing the user equipment, for example, it may be a generic public subscription identifier GPSI corresponding to the user equipment.
In this way, the first proxy entity can verify the communication authority between the user equipment and the first entity, and instruct the user equipment to communicate with the first entity in a case that the user equipment has the communication authority with the first entity.
In some other embodiments, in a case that the authentication of the user equipment through the first proxy entity is successful, the first proxy entity can acquire the proxy domain name of the first proxy entity and the first domain name of the target entity; in a case that the proxy domain name is different from the first domain name, the first authentication result is notified to the target entity, so as to indicate that the target entity has the communication authority with the user equipment or the target entity communicates with the user equipment.
On the contrary, in a case that the proxy domain name is the same as the first domain name, the first proxy entity temporarily does not notify the target entity of the first authentication result, but waits for whether the user equipment has a second communication authority with the target entity, and notifies the target entity of the second authentication result after determining that the user equipment has the second communication authority with the target entity.
For example, the first proxy entity may further determine whether the user equipment has the second communication authority with the target entity according to a target entity service request message sent by the user equipment.
It should also be noted that the proxy domain name may be a fully qualified domain name FQDN corresponding to the first proxy entity, and the first domain name may be a fully qualified domain name FQDN corresponding to the target entity. In some scenarios, the first proxy entity and the target entity can use the same FQDN, but different IP addresses or port numbers. In this scenario, the first communication authority can indicate that the user equipment has the access authority to the FQDN, but not necessarily indicate that the user equipment has the access authority to the target entity corresponding to the IP address or port number. At this time, it may be further determined whether the user equipment has the second communication authority with the target entity through a secure session between the user equipment and the proxy entity.
In S601, after the authentication of the user equipment is successful, the first proxy entity establishes a secure session with the user equipment.
For example, the secure session may be a transport layer security (TLS) session, through which confidentiality and data integrity can be achieved for the communication between the first proxy entity and the user equipment.
In S602, the first proxy entity receives a target entity service request message sent by the user equipment through the secure session.
The target entity service request message includes a second target entity identifier, which is a protected entity identifier acquired by the user equipment according to the first target entity identifier of the target entity, and the target entity service request message is a message sent by the user equipment when determining that a proxy domain name of the first proxy entity is the same as a first domain name of the target entity.
In S603, the first proxy entity determines whether the user equipment has a second communication authority with the target entity according to the second target entity identifier.
In some embodiments, it may be determined that the user equipment has the second communication authority with the target entity in a case that the second target entity identifier is the same as the first target entity identifier.
In some other embodiments, in a case that the second target entity identifier is different from the first target entity identifier, the first proxy entity may determine whether the user equipment has the second communication authority with the target entity through message interaction with the third entity.
In S604, the first proxy entity sends a target entity service response message to the user equipment.
The target entity service response message is configured to indicate whether the user equipment has the second communication authority with the target entity.
In some embodiments, the first proxy entity may indicate that the user equipment has the second communication authority with the target entity by sending the target entity service response message. On the contrary, by not sending the target entity service response message, the first proxy entity indicates that the user equipment does not have the second communication authority with the target entity.
In some other embodiments, the first proxy entity may include success indication information in the target entity service response message, and indicate that the user equipment has the second communication authority with the target entity through the success indication information. On the contrary, by not including the success indication information in the target entity service response message, it indicates that the user equipment does not have the second communication authority with the target entity. The success indication information may be any indication information set in advance.
In some other embodiments, in a case that the user equipment does not have the second communication authority with the target entity, the first proxy entity may include failure indication information in the target entity service response message to indicate that the user equipment does not have the second communication authority with the target entity. On the contrary, in a case that the user equipment has the second communication authority with the target entity, the first proxy entity may indicate that the user equipment has the second communication authority with the target entity by not including the failure indication information in the target entity service response message. The failure indication information may be any error code set in advance.
In this way, the first proxy entity can determine whether the user equipment has the second communication authority with the target entity through the secure session, and send the authorization result to the target device.
In some other embodiments, the first proxy entity may determine whether the user equipment has the second communication authority with the target entity through message interaction with the third entity.
In S701, the first proxy entity determines a third authority request parameter according to the second target entity identifier.
In S702, the first proxy entity sends the third authority request parameter to a third entity.
In S703, the first proxy entity acquires an authorization result parameter sent by the third entity.
In S704, the first proxy entity determines whether the user equipment has the second communication authority with the target entity according to the authorization result parameter.
With this method, when the second target entity identifier is different from the first target entity identifier, the first proxy entity may determine whether the user equipment has the second communication authority with the target entity through message interaction with the third entity.
The third authority request parameter may be configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity; the authorization result parameter may be configured to indicate whether the user equipment has the second communication authority with the target entity. For example, the third authority request parameter may include a key identifier A-KID, a second target entity identifier, and a proxy entity identifier corresponding to the first proxy entity; and the third authority request parameter may be configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity.
In some embodiments, the first proxy entity may send the third authority request parameter to the third entity via a third key request message; and the third key request message is configured to instruct the third entity to acquire an authorization result parameter and an identity of the subscriber of the user equipment. The first proxy entity may also receive a third key response message sent by the third entity; and acquire the authorization result parameter included in the third key response message.
Further, the third key response message also includes a second identity of the subscriber corresponding to the user equipment, and the first proxy entity may also acquire the second identity of the subscriber according to the third key response message received. The second identity of the subscriber may include a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the third key request message may include an authorization indication parameter. The authorization indication parameter may be configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message. Similarly, the third key response message may also include an authorization indication parameter to indicate that the third key response message is a response to the third key request message.
In some other embodiments, the first proxy entity may send the third authority request parameter to the third entity via a fourth key request message; and the fourth key request message is configured to indicate that the first proxy entity requests to acquire the authorization result parameter. The first proxy entity may also receive a fourth key response message sent by the third entity; and acquire the authorization result parameter included in the fourth key response message.
In some embodiments, the fourth key request message further includes an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the fourth key request message. Similarly, the fourth key response message may also include an authorization indication parameter, which is configured to indicate that the fourth key response message is a response to the fourth key request message.
In some embodiments, the authorization result parameter may be configured to indicate authorization success or authorization failure. The first proxy entity determines whether the user equipment has the second communication authority with the target entity according to the authorization result parameter. For example, when the authorization result parameter is the authorization success, it may be determined that the user equipment has the second communication authority with the target entity. On the contrary, when the authorization result parameter is the authorization failure, or the above key response message (for example, the third key response message or the fourth key response message) does not include the authorization result parameter, it may be determined that the user equipment does not have the second communication authority with the target entity.
In some embodiments, the second communication authority may include one or more of the following authorities.
Authority 6: the user equipment has an access authority to the target entity.
Authority 7: the first proxy entity has a proxy authority to the target entity.
Authority 8: the target entity has an acquisition authority to the identity of the subscriber of the user equipment.
In this way, whether the user equipment has the second communication authority with the target entity can be determined through the secure session between the user equipment and the first proxy entity, which further improves the reliability of the authentication.
In some embodiments, when it is determined that the user equipment has the second communication authority with the target entity according to the authorization result parameter, the first proxy entity may notify the target entity of the second authentication result.
The second authentication result is configured to indicate that the user equipment has the communication authority with the target entity.
For example, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the first proxy entity may send a third notification message to the target entity, and the third notification message includes the second authentication result. Further, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the third key response message), the third notification message may also include the second identity of the subscriber.
For another example, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity may send a fourth notification message to the second entity according to a first authentication result to instruct the second entity to send the first authentication result to the target entity. Further, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the third key response message), the fourth notification message may also include the second identity of the subscriber.
In this way, the first proxy entity can verify the second communication authority between the user equipment and the first entity through the secure session, further improving the reliability of the authentication, and instruct the user equipment to communicate with the first entity in a case that the user equipment has the second communication authority with the first entity.
In S801, the third entity receives a second authority request parameter sent by a first proxy entity.
The second authority request parameter is configured to instruct the third entity to determine whether a user equipment has a first communication authority with a target entity, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, the first proxy entity provides an authentication proxy function for the first entity, and the third entity includes an entity that provides AKMA authorization and application key derivation functions.
In S802, the third entity determines whether the user equipment has the first communication authority with the target entity according to the second authority request parameter.
In some embodiments, the second authority request parameter may include a proxy entity identifier corresponding to the first proxy entity. After receiving the second authority request parameter, the third entity may determine whether the third entity has an authority to serve the first proxy entity according to a first preset policy. The first preset policy may include a preconfigured parameter.
In a case that it is determined that the third entity has the authority to serve the first proxy entity, it is determined according to the second authority request parameter whether the user equipment has a first communication authority with the target entity.
On the contrary, in a case that it is determined that the third entity does not have the authority to serve the first proxy entity, the flow may be terminated without checking whether the user equipment has the first communication authority with the target entity. At this time, the third entity can send a failure indication to the first proxy entity, so that the first proxy entity can perform a failure processing accordingly; or the third entity also directly stops processing and does not send any message.
In some embodiments, the second authority request parameter includes a key identifier A-KID corresponding to the user equipment, a first target entity identifier of the target entity and a proxy entity identifier corresponding to the first proxy entity. In this step, the way to determine whether the user equipment has the first communication authority with the target entity includes one or more of the following.
Way 1: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the user equipment has an access authority to the target entity.
Way 2: it is determined, according to the key identifier A-KID and the proxy entity identifier, whether the user equipment has an access authority to the first proxy entity.
Way 3: it is determined, according to the proxy entity identifier and the first target entity identifier, whether the first proxy entity has a proxy authority to the target entity.
Way 4: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the target entity has an acquisition authority to the identity of the subscriber of the user equipment.
Way 5: it is determined, according to the key identifier A-KID, whether the user equipment is authorized to use the AKMA.
In some embodiments, the third entity may determine that the user equipment has the first communication authority with the target entity, in a case that it is determined that the user equipment has the access authority to both the first proxy entity and the target entity, and the first proxy entity has the proxy authority to the target entity.
In some other embodiments, the third entity may determine that the user equipment has the first communication authority with the target entity, in a case that it is determined that the user equipment has the access authority to the target entity and the first proxy entity has the proxy authority to the target entity.
In S803, the third entity acquires first pending key information in a case that the user equipment has the first communication authority with the target entity.
For example, the first pending key information may be acquired according to entity key information corresponding to the target entity.
In some embodiments, the entity key information corresponding to the target entity may include an application key KAF corresponding to the target entity.
In some other embodiments, the entity key information corresponding to the target entity may include the application key KAF and a key expiration time (KAF expiration time) corresponding to the target entity.
In S804, the third entity sends the first pending key information to the first proxy entity.
In this way, the first proxy entity determines whether the user equipment has the first communication authority with the target entity according to the first pending key information.
In some embodiments, the third entity may receive the second authority request parameter sent by the first proxy entity via a first key request message; and the first key request message is configured to instruct the third entity to acquire the first pending key information and the identity of the subscriber of the user equipment. The third entity may also send the first pending key information to the first proxy entity via a first key response message.
Further, the third entity may send the first pending key information and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the first key response message in a case that it is determined that the target entity has the authority to acquire the identity of the subscriber.
For example, the third entity sends the first pending key information and the second identity of the subscriber corresponding to the user equipment to the first proxy entity via a third key response message in a case that it is determined that the target entity has the authority to acquire the identity of the subscriber. For example, the second identity of the subscriber corresponding to the user equipment is acquired, and the second identity of the subscriber and an authorization result parameter are sent to the first proxy entity via the third key response message.
In some embodiments, the second identity of the subscriber may be an identifier representing the user equipment in the 3GPP operator domain; for example, the second identity of the subscriber may be a subscription permanent identifier SUPI corresponding to the user equipment.
In some other embodiments, the third entity may receive the second authority request parameter sent by the first proxy entity via a second key request message; and the second key request message is configured to instruct the third entity to acquire the first pending key information. The third entity may also send the first pending key information to the first proxy entity via a second key response message.
In this way, the third entity can determine whether the user equipment has the first communication authority with the target entity, and notify the first proxy entity via the first pending key information.
In some embodiments, the above first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the above first entity may include: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the above third entity may include: an AKMA anchor function AAnF entity.
In S901, the third entity receives a third authority request parameter sent by a first proxy entity.
In S902, the third entity determines whether the user equipment has a second communication authority with the target entity according to the third authority request parameter.
In S903, the third entity sends an authorization result parameter to the first proxy entity.
The authorization result parameter may be configured to notify the first proxy entity whether the user equipment has the second communication authority with the target entity.
In some embodiments, the third authority request parameter may include a proxy entity identifier corresponding to the first proxy entity. After receiving a fourth key request message, the third entity may determine whether the third entity has the authority to serve the first proxy entity according to a first preset policy. The first preset policy may include a preconfigured parameter.
In a case that it is determined that the third entity has the authority to serve the first proxy entity, it is determined according to the fourth key request message whether the user equipment has the second communication authority with the target entity.
On the contrary, in a case that it is determined that the third entity does not have the authority to serve the first proxy entity, the process may be terminated, without checking whether the user equipment has the first communication authority with the target entity. At this time, the third entity may send a failure indication to the second entity, so that the second entity performs a failure processing accordingly; or the third entity also directly stops processing and does not send any message.
In some embodiments, the third authority request parameter may include a key identifier A-KID, a second target entity identifier and a proxy entity identifier corresponding to the first proxy entity. The second target entity identifier is a protected entity identifier acquired by the user equipment according to a first proxy entity identifier of the target entity. The way for determining whether the target entity has the second communication authority with the target entity in step S902 may include one or more of the followings.
Way 6: it is determined, according to the key identifier A-KID and the second target entity identifier, whether the user equipment has an access authority to the target entity.
Way 7: it is determined, according to the proxy entity identifier and the second target entity identifier, whether the first proxy entity has a proxy authority to the target entity
Way 8: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the target entity has an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, the third entity may determine that the user equipment has the second communication authority with the target entity in a case that it is determined that the user equipment has the access authority to the target entity and the first proxy entity has the proxy authority to the target entity.
In some embodiments, the third entity may receive the third authority request parameter sent by the first proxy entity via a third key request message; and the third key request message is configured to instruct the third entity to acquire an authorization result parameter and an identity of the subscriber of the user equipment. The third entity also can send the authorization result parameter to the first proxy entity via a third key response message.
Further, the third key request message may include an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message. Similarly, the third key response message may also include an authorization indication parameter.
Further, in a case that it is determined that the target entity has the acquisition authority to the identity of the subscriber, the third entity may send the authorization result parameter and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the third key response message.
For example, in a case that it is determined that the target entity has the acquisition authority to the identity of the subscriber, the third entity may send the authorization result parameter and the second identity of the subscriber corresponding to the user equipment to the first proxy entity via the third key response message. For example, the second identity of the subscriber corresponding to the user equipment is acquired, and the second identity of the subscriber and the authorization result parameter are sent to the first proxy entity via the third key response message.
For example, the second identity of the subscriber may include a subscription permanent identifier SUPI corresponding to the user equipment.
In some other embodiments, the third entity may receive the third authority request parameter sent by the first proxy entity via a fourth key request message; and the fourth key request message is configured to instruct the third entity to acquire the authorization result parameter. The third entity may also send the authorization result parameter to the first proxy entity via a fourth key response message.
Further, the fourth key request message may further include an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message. Similarly, the fourth key response message may also include an authorization indication parameter to indicate that the fourth key response message is a response to the fourth key request message.
In some embodiments, the authorization result parameter may be configured to indicate authorization success or authorization failure. For example, the third entity may determine a value of the authorization result parameter based on whether the user equipment has the second communication authority with the target entity. For example, in a case that it is determined that the user equipment has the second communication authority with the target entity, the third entity may set the authorization result parameter as authorization success (for example, with the value of 1); in a case that it is determined that the user equipment does not have the second communication authority with the target entity, the third entity may set the value of the authorization result parameter as authorization failure (for example, with the value of 0).
In some other embodiments, the third entity may indicate that the user equipment does not have the second communication authority with the target entity by not including the authorization result information in the above key response message (such as the third key response message or the fourth key response message). For example, in a case that the third entity determines that the user equipment does not have the second communication authority with the target entity, the authorization result information may not be included in the above key response message. On the contrary, in a case that it is determined that the user equipment has the second communication authority with the target entity, the authorization result information may be included in the above key response message.
In S1001, the first entity acquires an authentication result of a first proxy entity to a user equipment.
In S1002, the first entity communicates with the user equipment according to the authentication result.
The authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with the target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity.
It should be noted that the first entity may wait for the user equipment to initiate communication; or the first entity may actively initiate communication with the user equipment, which is not limited in the present disclosure.
In some embodiments, an authentication result notification message includes a first identity of the subscriber of the user equipment. The first identity of the subscriber may be an identifier representing the user equipment outside the 3GPP operator domain. For example, the first identity of the subscriber is a generic public subscription identifier GPSI corresponding to the user equipment.
In a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the target entity may receive a first notification message sent by the first proxy entity, and the first notification message includes the first authentication result; or the target entity may receive a third notification message, and the third notification message includes the second authentication result.
Further, the first notification message or the third notification message further includes a second identity of the subscriber corresponding to the user equipment. The second identity of the subscriber may include a subscription permanent identifier SUPI correspond to the user equipment.
In a case that the target entity is an untrusted entity providing the application function outside the 3GPP operator domain, the target entity may receive a fifth notification message sent by a second entity, the fifth notification message includes the first authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a second notification message; or the target entity may receive a sixth notification message sent by the second entity, the sixth notification message includes the second authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a fourth notification message.
Further, the fifth notification message or the sixth notification message further includes a first identity of the subscriber of the user equipment. The first identity of the subscriber may be a generic public subscription identifier GPSI corresponding to the user equipment.
In some embodiments, the first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity may include: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the second entity may include: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In this way, the first entity can determine whether the user equipment has the first communication authority with the first entity according to the authentication result notification message of the first proxy entity, thereby reducing the load of the first entity and improving the efficiency of the first entity.
In S1101, the second entity acquires an authentication result of a first proxy entity to a user equipment.
The authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with a target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an untrusted entity providing an application function outside a 3GPP operator domain, the first proxy entity includes a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity.
In S1102, the second entity sends the authentication result to the target entity.
As a result, the target entity can communicate with the user equipment according to the authentication result.
By adopting the above method, communication between the first proxy entity inside the 3GPP operator domain and the first entity outside the 3GPP operator domain can be realized through the second entity.
In some embodiments, the above second entity may include: a network exposure function NEF entity or a service capability exposure function SCEF entity; the above first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain; the above first entity may include: an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the second entity may receive a second notification message sent by the first proxy entity; acquire the first authentication result according to the second notification message; and send a fifth notification message to the first entity according to the first authentication result. The second notification message is a message sent by the first proxy entity to the second entity according to the first authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain.
Further, in a case that the second notification message includes a second identity of the subscriber corresponding to the user equipment, the second entity may acquire a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and send the fifth notification message to the first entity according to the first authentication result and the first identity of the subscriber.
In some other embodiments, the second entity may receive a fourth notification message sent by the first proxy entity; acquire the second authentication result according to the second notification message; and send a sixth notification message to the first entity according to the second authentication result. The fourth notification message is a message sent by the first proxy entity to the second entity according to the second authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain.
Further, in a case that the fourth notification message includes a second identity of the subscriber corresponding to the user equipment, the second entity may acquire a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and send the sixth notification message to the first entity according to the second authentication result and the first identity of the subscriber.
In some embodiments, the second identity of the subscriber may be an identifier representing the user equipment inside the 3GPP operator domain; and the first identity of the subscriber may be an identifier representing the user equipment outside the 3GPP operator domain. For example, the second identity of the subscriber may be a subscription permanent identifier SUPI corresponding to the user equipment; and the first identity of the subscriber may be a generic public subscription identifier GPSI corresponding to the user equipment.
The second entity may determine the first identity of the subscriber corresponding to the second identity of the subscriber according to a preset identifier correspondence relationship; and the preset identifier correspondence relationship includes a correspondence relationship between the second identity of the subscriber and the first identity of the subscriber.
In S1201, the user equipment sends an application session establishment request message to the first proxy entity.
For example, the application session establishment request message may include a first authority request parameter, and the first authority request parameter may include a key identifier A-KID of the user equipment, and a first target entity identifier, Target AF ID, of the target entity. The target entity may be an entity which is determined by the user equipment from one or more first entities and with which communication is requested.
In some embodiments, the user equipment may acquire the key identifier A-KID through a preset function entity in the communication system, and the preset function entity may include an authentication service function AUSF entity.
In S1202, the first proxy entity sends a second authority request parameter to the third entity in response to receiving the application session establishment request message.
In some embodiments, the first proxy entity may receive the application session establishment request message sent by the user equipment, and determine the second authority request parameter according to the first authority request parameter in the application session establishment request message.
For example, in a case that the first authority request parameter includes the key identifier A-KID of the user equipment, and the first target entity identifier, Target AF ID, of the target entity, it may be determined that the second authority request parameter includes the key identifier A-KID, the first target entity identifier (Target AF ID), and a proxy entity identifier of the first proxy entity.
In some embodiments, the first proxy entity may send the second authority request parameter to the third entity via a first key request message; and the first key request message is configured to instruct the third entity to acquire first pending key information and an identity of the subscriber of the user equipment. For example, the first key request message may be Naanf_AKMA_ApplicationKey_Get Request message.
In some other embodiments, the first proxy entity may send the second authority request parameter to the third entity via a second key request message; and the second key request message is configured to indicate that the first proxy entity requests to acquire the first pending key information. For example, the second key request message may be Naanf_AKMA_ApplicationKey_AnonUser_Get Request message.
In step S1203, the third entity acquires the first pending key information in a case that it is determined that the user equipment has the first communication authority with the target entity according to the second authority request parameter.
The third entity may authenticate the communication authority between the user equipment and the target entity based on a preset authority policy to determine whether the user equipment has the first communication authority with the target entity. The examples are as follows.
In some embodiments, the way for the third entity to determine whether the user equipment has the first communication authority with the target entity may include one or more of the followings.
Way 1: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the user equipment has the access authority to the target entity.
Way 2: it is determined, according to the key identifier A-KID and the proxy entity identifier, whether the user equipment has the access authority to the first proxy entity.
Way 3: it is determined, according to the proxy entity identifier and the first target entity identifier, whether the first proxy entity has the proxy authority to the target entity.
Way 4: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the target entity has the acquisition authority to the identity of the subscriber of the user equipment.
Way 5: it is determined, according to the key identifier A-KID, whether the user equipment is authorized to use the AKMA.
In some other embodiments, the third entity may determine that the user equipment has the first communication authority with the target entity, in a case that it is determined that the user equipment has the access authority to the target entity, and the first proxy entity has the proxy authority to the target entity. For example, the third entity may determine whether the user equipment has the first communication authority with the target entity through the following steps.
In S11, according to the proxy entity identifier and the first target entity identifier, it is determined whether the first proxy entity has the proxy authority to the target entity.
If it is determined that the first proxy entity does not have the proxy authority to the target entity, it is directly determined that the user equipment does not have the first communication authority with the target entity, and step S12 is not performed. On the contrary, if it is determined that the first proxy entity has the proxy authority to the target entity, step S12 continues to be performed.
In S12, according to the key identifier A-KID and the first target entity identifier, it is determined whether the user equipment has the access authority to the target entity.
If it is determined that the user equipment does not have the access authority to the target entity, it is directly determined that the user equipment does not have the first communication authority with the target entity, and step S13 is not performed. On the contrary, if it is determined that the user equipment has the access authority to the target entity, step S13 continues to be performed.
In S13, according to the key identifier A-KID, it is determined whether the user equipment is authorized to use the AKMA.
In a case that it is determined that the user equipment is authorized to use the AKMA, it may be determined that the user equipment has the first communication authority with the target entity. On the contrary, in a case that it is determined that the user equipment is not authorized to use the AKMA, it may be determined that the user equipment does not have the first communication authority with the target entity.
It should be noted that the first pending key information may include entity key information corresponding to the target entity.
In some embodiments, the entity key information corresponding to the target entity may include the application key KAF corresponding to the target entity.
In some other embodiments, the entity key information corresponding to the target entity may include the application key KAF and the key expiration time (KAF expiration time) corresponding to the target entity.
In S1204, the third entity sends the first pending key information to the first proxy entity.
In some embodiments, the third entity may send the first pending key information to the first proxy entity via a first key response message. For example, the first key response message may be Naanf_AKMA_ApplicationKey_Get Responsemessage.
In some other embodiments, the third entity may send the first pending key information to the first proxy entity via a second key response message. For example, the second key response message may be Naanf_AKMA_ApplicationKey_AnonUser_Get Responsemessage
In some embodiments, the first key response message may also include a second identity of the subscriber of the user equipment, and the second identity of the subscriber may be an identifier representing the user equipment inside the 3GPP operator domain. For example, the second identity of the subscriber may be a subscription permanent identifier SUPI corresponding to the user equipment.
In S1205, the first proxy entity sends an application session establishment response message to the user equipment.
In a case that the first proxy entity acquires the application key KAF in the first key response message, it may be determined that the user equipment has the first communication authority with the target entity. At this time, the first proxy entity may send the application session establishment response message to the user equipment.
In S1206, the user equipment performs authentication through the first proxy entity.
The user equipment may perform the authentication through the first proxy entity in a case that it is determined that the user equipment has the first communication authority with the target entity. For example, the user equipment can derive the application key KAF corresponding to the target entity based on the FQDN of the target entity, and perform the authentication with the first proxy entity based on the application key KAF.
In S1207a, the first proxy entity notifies the target entity of the first authentication result.
The first authentication result may be configured to indicate that the user equipment has the communication authority with the target entity.
In some embodiments, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the first proxy entity may send a first notification message to the target entity, and the first notification message may include the first authentication result. Further, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the first key response message), the first notification message may also include the second identity of the subscriber.
In some other embodiments, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity may send a second notification message to the second entity according to the first authentication result to instruct the second entity to send the first authentication result to the target entity. Similarly, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the first key response message), the second notification message may also include the second identity of the subscriber.
In some embodiments, in a case that the authentication of the user equipment through the first proxy entity is successful, the first proxy entity may notify the target entity of the first authentication result (step S1207a is performed, while step S1207b and subsequent steps do not continue to be performed).
In some other embodiments, in a case that the authentication of the user equipment through the first proxy entity is successful, the first proxy entity may acquire the proxy domain name of the first proxy entity and the first domain name of the target entity. In a case that the proxy domain name is different from the first domain name, the first authentication result is notified to the target entity (step S1207a step is performed, while step S1209b and subsequent steps do not continue to be performed), so as to indicate that the target entity has the communication authority or communicates with the user equipment.
In some other embodiments, in a case that the proxy domain name is the same as the first domain name, the first proxy entity may temporarily not send the authentication result notification message to the target entity, but waits for whether the user equipment has the second communication authority with the target entity, and notifies the target entity of the first authentication result after determining that the user equipment has the second communication authority with the target entity. That is, step S1207a is not performed, while step S1207b and subsequent steps continue to be performed.
In S1207b, the user equipment establishes a secure session with the first proxy entity.
The secure session may include a TLS session.
In S1208, the user equipment sends a target entity service request message to the first proxy entity.
The target entity service request message includes a second target entity identifier, which is a protected entity identifier acquired by the user equipment according to the first target entity identifier of the target entity.
In some embodiments, the target entity service request message may include the key identifier A-KID and the second target entity identifier.
In some embodiments, in a case that the second target entity identifier is the same as the first target entity identifier, it may be determined that the user equipment has the second communication authority with the target entity, then the authentication result notification message may be sent to the target entity, and a target entity service response message may be sent to the user equipment. That is, steps S1209a and S1213 are performed, without need to perform steps S1209b to S1212.
In some other embodiments, in a case that the second target entity identifier is different from the first target entity identifier, the first proxy entity may determine whether the user equipment has the second communication authority with the target entity through key request message interaction with the second entity. That is, step S1209a is not performed, and step S1209b and subsequent steps continue to be performed.
In S1209a, the first proxy entity notifies the target entity of the first authentication result.
In S1209b, the first proxy entity sends the third authority request parameter to the third entity.
In some embodiments, the third authority request parameter may include the key identifier A-KID, the second target entity identifier, and the proxy entity identifier corresponding to the first proxy entity; and the third authority request parameter may be configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity.
In some embodiments, the first proxy entity may send the third authority request parameter to the third entity via a third key request message; and the third key request message is configured to instruct the third entity to acquire an authorization result parameter and the identity of the subscriber of the user equipment. For example, the third key request message may be a Naanf_AKMA_ApplicationKey_Get Request message.
In some other embodiments, the first proxy entity may send the third authority request parameters to the third entity via a fourth key request message; and the fourth key request message is configured to indicate that the first proxy entity requests to acquire the authorization result parameter. For example, the fourth key request message may be Naanf_AKMA_ApplicationKey_AnonUser_Get Request message.
In S1210, the third entity determines whether the user equipment has the second communication authority with the target entity according to the third authority request parameter.
For example, the way for the third entity to determine whether the user equipment has the second communication authority with the target entity may include one or more of the followings.
Way 6: it is determined, according to the key identifier A-KID and the second target entity identifier, whether the user equipment has the access authority to the target entity.
Way 7: it is determined, according to the proxy entity identifier and the second target entity identifier, whether the first proxy entity has the proxy authority to the target entity.
Way 8: it is determined, according to the key identifier A-KID and the first target entity identifier, whether the target entity has the acquisition authority to the identity of the subscriber of the user equipment.
In some embodiments, the third entity may determine that the user equipment has the second communication authority with the target entity, in a case that it is determined that the user equipment has the access authority to the target entity and the first proxy entity has the proxy authority to the target entity.
In S1211, the third entity sends the authorization result parameter to the first proxy entity.
The authorization result parameter may be configured to notify the first proxy entity whether the user equipment has the second communication authority with the target entity.
In some embodiments, the third entity may send the authorization result parameter to the first proxy entity via a third key response message. For example, the third key response message may be Naanf_AKMA_ApplicationKey_Get Response message.
In some other embodiments, the third entity may send the authorization result parameter to the first proxy entity via a fourth key response message. For example, the fourth key response message may be Naanf_AKMA_ApplicationKey_AnonUser_Get Response message.
In some embodiments, in a case that the third entity determines that the target entity has the authority to acquire the identity of the subscriber, the third key response message may also include the second identity of the subscriber of the user equipment. Similarly, the fourth key response message may also include the second identity of the subscriber of the user equipment. The second identity of the subscriber may be a subscription permanent identifier SUPI corresponding to the user equipment.
In S1212, the first proxy entity notifies the target entity of the second authentication result.
The second authentication result may be configured to indicate that the target entity has communication authority with the user equipment.
For example, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the first proxy entity may send a third notification message to the target entity, and the third notification message includes the second authentication result. Further, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the third key response message), the third notification message may also include the second identity of the subscriber.
For another example, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity may send a fourth notification message to the second entity according to the first authentication result to instruct the second entity to send the first authentication result to the target entity. Further, in a case that the first proxy entity acquires the second identity of the subscriber of the user equipment (for example, the second identity of the subscriber is acquired via the third key response message), the fourth notification message may also include the second identity of the subscriber.
In some embodiments, the second identity of the subscriber may be a subscription permanent identifier SUPI corresponding to the user equipment.
In step S1213, the first proxy entity sends a target entity service response message to the user equipment.
The target entity service response message is configured to indicate whether the user equipment has the second communication authority with the target entity.
In some embodiments, the first proxy entity may include a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity may include: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the second entity may include: a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, the third entity may include: an AKMA anchor function AAnF entity.
In this way, for the first entity, whether the user equipment has the communication authority with the first entity is determined by the trusted first proxy entity inside the 3GPP operator domain, and the authentication of the user equipment is performed in a case that the user equipment has the first communication authority, so that part of functions of the first entity can be realized through the first proxy entity, thereby reducing the load of the first entity and improving the efficiency of the first entity. Moreover, the user equipment realizes the authorization and authentication with one or more first entities through the unified first proxy entity, which also reduces the complexity of authentication of the user equipment and improves the efficiency of the user equipment.
a target entity determining module 1301 configured to determine, from one or more first entities, a target entity with which communication is requested;
a parameter determining module 1302 configured to determine a first authority request parameter according to the target entity;
a first message sending module 1303 configured to send an application session establishment request message to a first proxy entity according to the first authority request parameter; where the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with the target entity according to the first authority request parameter; the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity;
a first message receiving module 1304 configured to determine whether the user equipment has the first communication authority with the target entity in response to receiving an application session establishment response message sent by the first proxy entity; and
an authentication module configured to perform authentication through the first proxy entity in a case that the user equipment has the first communication authority with the target entity.
In some embodiments, the parameter determining module 1302 is configured to take a first target entity identifier of the target entity and a key identifier A-KID corresponding to the user equipment as the first authority request parameter.
In some embodiments, the first communication authority includes one or more of:
In some embodiments, the user communication module 1305 is configured to: send a target entity service request message to the first proxy entity through the secure session; and determine whether the user equipment has the second communication authority with the target entity in response to receiving a target entity service response message sent by the first proxy entity. The target entity service request message includes a second target entity identifier, the second target entity identifier is a protected entity identifier acquired by the user equipment according to the first target entity identifier, and the target entity service request message is configured to instruct the first proxy entity to determine whether the user equipment has the second communication authority with the target entity according to the second target entity identifier.
In some embodiments, the second communication authority includes one or more of: the user equipment having an access authority to the target entity; the first proxy entity having a proxy authority to the target entity; or the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, the first message receiving module 1304 is configured to: determine that the user equipment has the first communication authority with the target entity in a case that the application session establishment response message is received; or determine that the user equipment has the first communication authority with the target entity, in a case that the application session establishment response message is received and the session establishment response message includes success indication information.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes a trusted entity providing an application function inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, or a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain.
In some embodiments, the first entity includes an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy entity communicates with the first entity through a second entity; and the second entity includes an entity providing a network exposure function.
In some embodiments, the first entity includes: an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS outside the 3GPP operator domain.
In some embodiments, the second entity includes: a network exposure function NEF entity or a service capability exposure function SCEF entity.
a first proxy receiving module 1501 configured to receive an application session establishment request message sent by a user equipment; where the application session establishment request message includes a first authority request parameter, the application session establishment request message is configured to instruct the first proxy entity to determine whether the user equipment has a first communication authority with a target entity according to the first authority request parameter, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity;
a first proxy determining module 1502 configured to determine whether the user equipment has the first communication authority with the target entity according to the first authority request parameter; and
a first proxy sending module 1503 configured to send an application session establishment response message to the user equipment, and perform authentication of the user equipment, in a case that the user equipment has the first communication authority with the target entity
In some embodiments, the first authority request parameter includes a first target entity identifier of the target entity and a key identifier A-KID corresponding to the user equipment.
In some embodiments, the first communication authority includes one or more of:
the user equipment having an access authority to the target entity;
the user equipment having an access authority to the first proxy entity;
the first proxy entity having a proxy authority to the target entity; or
the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, the first proxy determining module 1502 is configured to: determine a second authority request parameter according to the first authority request parameter; send the second authority request parameter to a third entity, where the third entity includes an entity that provides AKMA authorization and application key derivation functions, and the second authority request parameter is configured to instruct the third entity to determine whether the user equipment has the first communication authority with the target entity; acquire first pending key information sent by the third entity, where the first pending key information is key information acquired by the third entity according to the second authority request parameter; and determine whether the user equipment has the first communication authority with the target entity according to the first pending key information.
In some embodiments, the first proxy determining module 1502 is configured to: take the first authority request parameter and a proxy entity identifier corresponding to the first proxy entity as the second authority request parameter.
In some embodiments, the first proxy determining module 1502 is configured to: send the second authority request parameter to the third entity via a first key request message, where the first key request message is configured to instruct the third entity to acquire the first pending key information and an identity of the subscriber of the user equipment; receive a first key response message sent by the third entity; and acquire the first pending key information included in the first key response message.
In some embodiments, the first key response message further includes a second identity of the subscriber corresponding to the user equipment, and the first proxy determining module 1502 is configured to acquire the second identity of the subscriber according to the first key response message received.
In some embodiments, the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the first proxy determining module 1502 is configured to: send the second authority request parameter to the third entity via a second key request message, where the second key request message is configured to indicate that the first proxy entity requests to acquire the first pending key information; receive a second key response message sent by the third entity; and acquire the first pending key information included in the second key response message.
In some embodiments, the first proxy determining module 1502 is configured to: determine that the user equipment has the first communication authority with the target entity in a case that the first pending key information includes entity key information corresponding to the target entity.
In some embodiments, in a case that the authentication of the user equipment is successful, the first proxy sending module 1503 is configured to: notify the target entity of a first authentication result of the authentication.
In some embodiments, the first proxy sending module 1503 is configured to: acquire a proxy domain name of the first proxy entity and a first domain name of the target entity; and notify the target entity of the first authentication result in a case that the proxy domain name is different from the first domain name.
In some embodiments, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain, the first proxy sending module 1503 is configured to: send a first notification message to the target entity. The first notification message includes the first authentication result.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the first notification message further includes the second identity of the subscriber.
In some embodiments, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain, the first proxy sending module 1503 is configured to: send a second notification message to a second entity according to the first authentication result to instruct the second entity to send the first authentication result to the target entity.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the second notification message further includes the second identity of the subscriber.
In some embodiments, after the authentication of the user equipment is successful, the apparatus further includes:
In some embodiments, the second communication authority includes one or more of the user equipment having an access authority to the target entity;
the first proxy entity having a proxy authority to the target entity; or
the target entity having an acquisition authority to an identity of the subscriber of the user equipment.
In some embodiments, the first proxy communication module 1504 is configured to: determine that the user equipment has the second communication authority with the target entity in a case that the second target entity identifier is the same as the first target entity identifier.
In some embodiments, the first proxy communication module 1504 is configured to: determine a third authority request parameter according to the second target entity identifier in a case that the second target entity identifier is different from the first target entity identifier; send the third authority request parameter to a third entity, where the third authority request parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity; acquire an authorization result parameter sent by the third entity, where the authorization result parameter is configured to indicate whether the user equipment has the second communication authority with the target entity; and determine whether the user equipment has the second communication authority with the target entity according to the authorization result parameter.
In some embodiments, the first proxy communication module 1504 is configured to: take the second target entity identifier, a key identifier A-KID corresponding to the user equipment, and a proxy entity identifier corresponding to the first proxy entity as the third authority request parameter.
In some embodiments, the first proxy communication module 1504 is configured to: send the third authority request parameter to the third entity via a third key request message, where the third key request message is configured to instruct the third entity to acquire the authorization result parameter and an identity of the subscriber of the user equipment; receive a third key response message sent by the third entity; and acquire the authorization result parameter included in the third key response message.
In some embodiments, the third key response message further includes a second identity of the subscriber corresponding to the user equipment, and the first proxy communication module 1504 is configured to: acquire the second identity of the subscriber according to the third key response message received.
In some embodiments, the third key request message further includes an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message.
In some embodiments, the first proxy communication module 1504 is configured to: send the third authority request parameter to the third entity via a fourth key request message, where the fourth key request message is configured to indicate that the first proxy entity requests to acquire the authorization result parameter; receive a fourth key response message sent by the third entity; and acquire the authorization result parameter included in the fourth key response message.
In some embodiments, the fourth key request message further includes an authorization indication parameter, the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the fourth key request message.
In some embodiments, the first proxy communication module 1504 is configured to: notify the target entity of a second authentication result in a case that it is determined according to an authorization result parameter that the user equipment has the second communication authority with the target entity. The second authentication result is configured to indicate that the target entity has a communication authority with the target entity.
In some embodiments, the first proxy communication module 1504 is configured to: send a third notification message to the target entity, in a case that the target entity is a trusted entity providing an application function inside the 3GPP operator domain. The third notification message includes the second authentication result.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the third notification message further includes the second identity of the subscriber.
In some embodiments, the first proxy communication module 1504 is configured to: send a fourth notification message to a second entity according to a first authentication result to instruct the second entity to send the first authentication result to the target entity, in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain.
In some embodiments, in a case that the first proxy entity acquires a second identity of the subscriber of the user equipment, the fourth notification message further includes the second identity of the subscriber.
In some embodiments, the first pending key information includes an application key KAF and a key expiration time.
In some embodiments, the second entity includes a network exposure function NEF entity or a service capability exposure function SCEF entity.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
a second receiving module 1701, configured to acquire an authentication result of a first proxy entity to a user equipment, where the authentication result includes a first authentication result or a second authentication result, the first authentication result is configured to indicate that the user equipment has a first communication authority with a target entity; the second authentication result is configured to indicate that the user equipment has a second communication authority with the target entity; the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an untrusted entity providing an application function outside a 3GPP operator domain, the first proxy entity includes a trusted entity providing an authentication function inside the 3GPP operator domain, and the first proxy entity provides an authentication proxy function for the first entity; and
a second sending module 1702, configured to send the authentication result to the target entity to make the target entity communicate with the user equipment according to the authentication result.
In some embodiments, the second receiving module 1701 is configured to: receive a second notification message sent by the first proxy entity, where the second notification message is a message sent by the first proxy entity to the second entity according to the first authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain; and acquire the first authentication result according to the second notification message. The second sending module 1702 is configured to: send a fifth notification message to the target entity according to the first authentication result.
In some embodiments, in a case that the second notification message includes a second identity of the subscriber corresponding to the user equipment, the second sending module 1702 is configured to: acquire a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and send the fifth notification message to the target entity according to the first authentication result and the first identity of the subscriber.
In some embodiments, the first identity of the subscriber is a generic public subscription identifier GPSI corresponding to the user equipment; and the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the second receiving module 1701 is configured to: receive a fourth notification message sent by the first proxy entity, where the fourth notification message is a message sent by the first proxy entity to the second entity according to the second authentication result in a case that the target entity is an untrusted entity providing an application function outside the 3GPP operator domain; and acquire the second authentication result according to the second notification message. The second sending module 1702 is configured to: send a sixth notification message to the target entity according to the second authentication result.
In some embodiments, in a case that the fourth notification message includes a second identity of the subscriber corresponding to the user equipment, the second sending module 1702 is configured to: acquire a first identity of the subscriber corresponding to the user equipment according to the second identity of the subscriber; and send the sixth notification message to the target entity according to the second authentication result and the first identity of the subscriber.
In some embodiments, the second entity includes: a network exposure function NEF entity or a service capability exposure function SCEF entity.
a third receiving module 1801 configured to receive a second authority request parameter sent by a first proxy entity, where the second authority request parameter is configured to instruct the third entity to determine whether a user equipment has a first communication authority with a target entity, the target entity is an entity which is determined by the user equipment from one or more first entities and with which communication is requested, the first entity includes an entity providing an application function, the first proxy entity includes a trusted entity providing an authentication function inside a 3GPP operator domain, the first proxy entity provides an authentication proxy function for the first entity, and the third entity includes an entity that provides AKMA authorization and application key derivation functions;
a third determining module 1802 configured to determine whether the user equipment has the first communication authority with the target entity according to the second authority request parameter;
a third key module 1803 configured to acquire first pending key information in a case that the user equipment has the first communication authority with the target entity; and
a third sending module 1804 configured to send the first pending key information to the first proxy entity.
In some embodiments, the second authority request parameter includes a key identifier A-KID corresponding to the user equipment, a first target entity identifier of the target entity and a proxy entity identifier corresponding to the first proxy entity; and the third determining module 1802 is configured to determine whether the user equipment has the first communication authority with the target entity by one or more of: determining whether the user equipment has an access authority to the target entity according to the key identifier A-KID and the first target entity identifier; determining whether the user equipment has an access authority to the first proxy entity according to the key identifier A-KID and the proxy entity identifier; or determining whether the first proxy entity has a proxy authority to the target entity according to the proxy entity identity and the first target entity identity.
In some embodiments, the third key module 1803 is configured to acquire the first pending key information according to entity key information corresponding to the target entity.
In some embodiments, the third receiving module 1801 is configured to: receive the second authority request parameter sent by the first proxy entity via a first key request message; and the first key request message is configured to instruct the third entity to acquire the first pending key information and an identity of the subscriber of the user equipment. The third sending module 1804 is configured to send the first pending key information to the first proxy entity via a first key response message.
In some embodiments, the third sending module 1804 is configured to send the first pending key information and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the first key response message in a case that it is determined that the target entity has an acquisition authority to the identity of the subscriber.
In some embodiments, the second identity of the subscriber is a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the third receiving module 1801 is configured to: receive the second authority request parameter sent by the first proxy entity via a second key request message; and the second key request message is configured to instruct the third entity to acquire the first pending key information. The third sending module 1804 is configured to: send the first pending key information to the first proxy entity via a second key response message.
In some embodiments, the third determining module 1802 is configured, after sending the first pending key information to the first proxy entity, to: receive a third authority request parameter sent by the first proxy entity; determine whether the user equipment has a second communication authority with the target entity according to the third authority request parameter; and send an authorization result parameter to the first proxy entity. The authorization result parameter is configured to notify the first proxy entity whether the user equipment has the second communication authority with the target entity.
In some embodiments, the third authority request parameter includes a key identifier A-KID, a second target entity identifier, and a proxy entity identifier corresponding to the first proxy entity, and the second target entity identifier is a protected entity identifier acquired by the user equipment according to a first target entity identifier of the target entity. The third determining module 1802 is configured to determine whether the user equipment has the second communication authority with the target entity by one or more of: determining whether the user equipment has an access authority to the target entity according to the key identifier A-KID and the second target entity identifier; or determining whether the first proxy entity has a proxy authority to the target entity according to the proxy entity identifier and the second target entity identifier.
In some embodiments, the third determining module 1802 is configured to: receive the third authority request parameter sent by the first proxy entity via a third key request message, where the third key request message is configured to instruct the third entity to acquire an authorization result parameter and an identity of the subscriber of the user equipment; and send the authorization result parameter to the first proxy entity via a third key response message.
In some embodiments, the third key request message further includes an authorization indication parameter, and the authorization indication parameter is configured to instruct the third entity to determine whether the user equipment has the second communication authority with the target entity according to the third key request message.
In some embodiments, the third determining module 1802 is configured to: send the authorization result parameter and a second identity of the subscriber corresponding to the user equipment to the first proxy entity via the third key response message in a case that it is determined that the target entity has an acquisition authority to the identity of the subscriber.
In some embodiments, the second identity of the subscriber is a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the third determining module 1802 is configured to: receive the third authority request parameter sent by the first proxy entity via a fourth key request message, where the fourth key request message is configured to instruct the third entity to acquire the authorization result parameter; and send the authorization result parameter to the first proxy entity via a fourth key response message.
In some embodiments, the third determining module 1802 is configured to: determine whether the third entity has an authority to serve the first proxy entity according to a first preset policy; and determine whether the user equipment has the second communication authority with the target entity according to the third authority request parameter in a case that the third entity has the authority to serve the first proxy entity.
In some embodiments, the third determining module 1802 is configured to: determine whether the third entity has an authority to serve the first proxy entity according to a first preset policy; and determine whether the user equipment has the first communication authority with the target entity according to the second authority request parameter in a case that the third entity has the authority to serve the first proxy entity.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain; and the third entity includes: an AKMA anchor function AAnF entity.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
In some embodiments, the first communication module 1901 is configured to: receive a first notification message sent by the first proxy entity, where the first notification message includes the first authentication result; or receive a third notification message sent by the first proxy entity, where the third notification message includes the second authentication result, in a case that the target entity is a trusted entity providing the application function inside the 3GPP operator domain.
In some embodiments, the first notification message or the third notification message further includes a second identity of the subscriber corresponding to the user equipment.
In some embodiments, the second identity of the subscriber includes a subscription permanent identifier SUPI corresponding to the user equipment.
In some embodiments, the first communication module 1901 is configured to: receive a fifth notification message sent by a second entity, where the fifth notification message includes the first authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a second notification message; or receive a sixth notification message sent by the second entity, where the sixth notification message includes the second authentication result, and the fifth notification message is a message sent by the second entity in response to receiving a fourth notification message, in a case that the target entity is an untrusted entity providing the application function outside the 3GPP operator domain.
In some embodiments, the fifth notification message or the sixth notification message further includes a first identity of the subscriber of the user equipment.
In some embodiments, the first identity of the subscriber is a generic public subscription identifier GPSI corresponding to the user equipment.
In some embodiments, the first proxy entity includes a trusted authentication proxy AP entity inside the 3GPP operator domain.
In some embodiments, the first entity includes: a trusted application function AF entity inside the 3GPP operator domain, a trusted service capability server SCS/application server AS entity inside the 3GPP operator domain, an untrusted application function AF entity outside the 3GPP operator domain, or an untrusted service capability server SCS/application server AS entity outside the 3GPP operator domain.
With regard to the apparatuses in the above embodiments, the specific way in which each module performs operations has been described in detail in the embodiments of the methods, and will not be described in detail here.
Referring to
The processing component 2002 generally controls the overall operation of the apparatus 2000, such as operations associated with display, telephone call, data communication, camera operation and recording operation. The processing component 2002 may include one or more processors 2020 to execute instructions so as to complete all or part of the steps of the authentication methods described above. In addition, the processing component 2002 may include one or more modules to facilitate the interaction between the processing component 2002 and other components. For example, the processing component 2002 may include a multimedia module to facilitate the interaction between the multimedia component and the processing component 2002.
The memory 2004 is configured to store various types of data to support operations in the apparatus 2000. Examples of these data include instructions for any application or method operating on the apparatus 2000, contact data, phone book data, messages, pictures, videos, and the like. The memory 2004 may be realized by any type of volatile or nonvolatile memory device or their combination, such as a static random access memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory, a flash memory, a magnetic disk or an optical disk.
The communication component 2006 is configured to facilitate wired or wireless communication between the apparatus 2000 and other devices. The apparatus 2000 can access a wireless network based on communication standards, such as WiFi, 2G or 3G, or a combination thereof. In an illustrative embodiment, the communication component 2006 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an illustrative embodiment, the communication component 2006 further includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module can be implemented based on the radio frequency identification (RFID) technology, the infrared data association (IrDA) technology, the ultra-wideband (UWB) technology, the Bluetooth (BT) technology and other technologies.
In an illustrative embodiment, the apparatus 2000 may be implemented by one or more application-specific integrated circuits (ASIC), digital signal processors (DSP), digital signal processing devices (DSPD), programmable logic devices (PLD), field programmable gate arrays (FPGA), controllers, microcontrollers, microprocessors or other electronic components, for performing the above authentication methods.
Besides as an independent electronic device, the apparatus 2000 may also be a part of an independent electronic device. For example, in an embodiment, the electronic device may be an Integrated Circuit (IC) or a chip, where the integrated circuit may be one IC or a collection of a plurality of ICs. The chip may include, but is not limited to, the following types: a Graphics Processing Unit (GPU), Central Processing Unit (CPU), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a System on Chip (SOC), etc. The integrated circuit or chip may be used to execute executable instructions (or codes) to realize the authentication methods. The executable instructions may be stored in the integrated circuit or chip, and may also be acquired from other devices or apparatuses. For example, the integrated circuit or chip includes a processor, a memory, and an interface for communicating with other devices. The executable instruction may be stored in the processor, and when the executable instructions are executed by the processor, the above authentication methods are realized. Alternatively, the integrated circuit or chip can receive the executable instructions through the interface and transmit them to the processor for execution, so as to realize the above authentication methods.
In an illustrative embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as the memory 2004 including instructions, and the instructions may be executed by the processor 2020 of the apparatus 2000 to complete the above authentication methods. For example, the non-transitory computer-readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc.
In another illustrative embodiment, there is also provided a computer program product including a computer program executable by a programmable device, and the computer program has code portions for executing the above authentication methods when executed by the programmable device.
Other embodiments of the present disclosure will easily occur to those skilled in the art after considering the specification and practicing the present disclosure. The present disclosure is intended to cover any variations, uses or adaptations of the present disclosure, which follow the general principles of the present disclosure and include common sense or common technical means in the related art that are not disclosed in the present disclosure. The specification and embodiments are to be regarded as illustrative only, with the true scope and spirit of the present disclosure being indicated by the following claims.
It should be understood that the present disclosure is not limited to the precise structure described above and shown in the drawings, and various modifications and changes can be made without departing from the scope of the present disclosure. The scope of the present disclosure is limited only by the appended claims.
This application is a continuation application of International Patent Application No. PCT/CN2022/091816, filed May 9, 2022, the entire contents of which are incorporated herein by reference.
| Number | Date | Country | |
|---|---|---|---|
| Parent | PCT/CN2022/091816 | May 2022 | WO |
| Child | 18942988 | US |