Slice routing rule tamper-proofing method, terminal, network element and medium

A tamper-proof and rule-based technology, applied in the field of communication, can solve the problems of unauthorized application theft and weak security, and achieve the effect of improving security and preventing illegal use of slicing services

Active Publication Date: 2021-06-25
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the current URSP rules is not strong. Once the URSP rules are tampered with, unauthorized applications can illegally use slice services. For example, during the registration process of 5G slices, the terminal side will report slice policy information to the network, including The application ID of the slicing service and its corresponding traffic routing policy. Unauthorized applications may steal the ID of the authorized application and use the slicing service.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Slice routing rule tamper-proofing method, terminal, network element and medium
  • Slice routing rule tamper-proofing method, terminal, network element and medium
  • Slice routing rule tamper-proofing method, terminal, network element and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the specific implementation manners of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0035] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above-mentioned drawings are used to distinguish similar objects, and not necessarily used to describe a specific order or sequence; Moreover, the embodiments and the features in the embodiments in the present disclosure can be combined with each other arbitrarily if there is no conflict.

[0036] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a slice routing rule tamper-proofing method, a terminal, a network element and a medium. The method comprises the following steps: defining a description identifier used for describing an application identifier in a slice routing rule; establishing a relation mapping table between the description identifier of each application program and the respective application identifier of each application program; receiving a routing rule and a slice identification rule returned by the core network; judging whether the first application identifier and a description identifier mapped by the first application identifier exist in the relation mapping table or not; if the first application identifier and the description identifier mapped by the first application identifier exist, matching the corresponding first application program with the routing rule and the slice identifier rule based on the first application identifier and the description identifier mapped by the first application identifier. According to the embodiment of the invention, at least the security of the URSP rule can be effectively improved, and an unauthorized application program is prevented from illegally using the slicing service.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular, to an anti-tampering method for slice routing rules, a terminal, a network slice management functional network element, a user plane functional network element, and a computer-readable storage medium. Background technique [0002] Network slicing technology is one of the key technologies of 5G (5th generation mobile networks, fifth-generation mobile communication technology). It can configure the network to enable users to obtain the most suitable network services on demand and increase the flexibility of network resources. [0003] In the R15 stage of the 3rd generation partnership project (3GPP), the 5G core network already has some policy configuration solutions for users and services, and defines the user equipment routing selection policy (URSP) The rules focus on defining service-level configuration and management strategies, and provide flexible configu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/126
Inventor 王鑫陈蛟赵友军
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products