WO2025256452A1 - Communication method and apparatus - Google Patents
Communication method and apparatusInfo
- Publication number
- WO2025256452A1 WO2025256452A1 PCT/CN2025/099289 CN2025099289W WO2025256452A1 WO 2025256452 A1 WO2025256452 A1 WO 2025256452A1 CN 2025099289 W CN2025099289 W CN 2025099289W WO 2025256452 A1 WO2025256452 A1 WO 2025256452A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- request
- network element
- measurands
- information
- measurer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- This application relates to the field of communication technology, and more specifically, to a communication method and apparatus.
- Remote attestation (RA) technology can be used to verify the security of these systems or devices, thereby determining whether they have been compromised.
- the entities performing RA can include an attester and a verifier.
- the verifier can request the attester to measure the system or device to obtain evidence. Based on this evidence, the verifier can then verify the security of the system or device.
- This application provides a communication method and apparatus that can improve the security of remote proof by using signatures obtained from multiple measurers.
- the entity executing the method provided in the first aspect can be a first verifier.
- the first verifier in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions.
- the following description uses the first verifier as an example.
- the method includes: receiving first information from a first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, and M being an integer greater than 1; and verifying the first signature and the first evidence according to the keys of the M measurers.
- the security of remote proof will be reduced in the event of a failure or malicious intent on the part of that measurand.
- the signature received by the verifier is based on M measurands.
- the verifier can verify the signature and the evidence using the keys of these M measurands, avoiding errors caused by the failure or malicious intent of a single measurand, thereby improving the security of remote proof.
- the M measurands can measure the same network element; that is, the M measurands participating in the signing can measure the same network element.
- the verifier only needs to perform one reception and verification to achieve remote proof. Therefore, the above scheme improves the efficiency of remote proof.
- the method further includes sending a first request to the first metric, the first request being used to request measurement of the first network element.
- the first request can be sent to the first measurement subject.
- the above scheme can reduce signaling overhead.
- the method further includes: sending a first request to N measurands, the first request being used to request measurement of the first network element, the N measurands belonging to a first group, the first group including P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, N being an integer greater than or equal to 2 and less than or equal to P, and P being an integer greater than or equal to M.
- the first verifier can send a first request to multiple measurands.
- a single point of failure i.e., when one measurand cannot respond
- other measurands besides the one that has the single point of failure can respond based on the first request, thereby ensuring the smooth progress of remote proof.
- the method further includes: sending a second request to at least one second metric, the second request being used to request measurement of the first network element.
- Sending the first request to the first metric may include: sending the first request to the first metric if a first condition is met.
- sending the first request to N metrics may include: sending the first request to all N metrics if the first condition is met.
- the first condition includes: the first verifier receiving rejection information from each of the at least one second metric, and/or, the first verifier not receiving a response from the at least one second metric within a predetermined time period.
- the request can be sent to other measurement users (e.g., the first measurement user or N measurement users) to avoid the failure of some measurement users affecting the remote proof process, thereby increasing the resilience of the remote proof.
- the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
- the first request can be used to indicate a threshold value, so that the measurand that receives the first request can determine the minimum number of measurands on which the signature is based, thus avoiding the failure to pass verification due to the number of measurands on which the first signature is based not meeting the threshold value, thereby improving the quality of the signature, that is, increasing the probability of the signature being successfully verified.
- the method further includes: determining the first measurand based on the identifier of the first network element and the first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
- the method may further include: determining the N measurands based on the identifier of the first network element and the first association relationship.
- the first verifier can quickly determine the measurer to send the first request based on the first association, thereby reducing the processing latency of finding the measurer.
- the method further includes receiving second information from a key management network element or an orchestration management network element, the second information being used to indicate the first association.
- the method further includes: sending a third request to the key management network element, the third request being used to request the keys of the M measurands; and receiving third information from the key management network element, the third information being used to indicate the keys of the M measurands.
- the first verifier can request the key required for this verification from the key management network element.
- the key is stored by a dedicated network element, which improves the security of the key; on the other hand, the first verifier does not need to save the key in advance, saving the first verifier's storage costs.
- the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
- the third request may include the identifier of the sender of the first information, and/or the identifier of the group to which the sender of the first information belongs.
- the key management network element can determine the keys for the M measurers to be fed back to the first verifier based on the identifiers carried in the third request.
- verifying the first signature and the first evidence based on the keys of the M measurands includes: verifying whether the number of measurands on which the first signature is based is greater than or equal to a threshold value, the threshold value indicating the minimum number of measurands on which the first signature is based; verifying whether the first signature is valid if the number of measurands on which the first signature is based is greater than or equal to the threshold value; and verifying whether the first evidence is valid if the first signature is valid.
- the first verifier can verify whether the measurer on which the first signature is based meets the threshold requirement. If the threshold requirement is not met, no further verification is performed on the first signature or the first evidence, thereby reducing verification overhead.
- the threshold is set low, the first signature does not need to be based on all measurers in the first group, thus saving the overhead of measurer signing.
- the threshold is set high, the first signature needs to be based on a larger number of measurers in the first group, thereby improving the security of remote verification.
- the first network element includes or is applied to a virtualized network function (VNF).
- VNF virtualized network function
- the first validator can evaluate the registration status of the VNF to improve the security of the VNF.
- a communication method is provided.
- the subject executing the method provided in this application can be a first measuring agent.
- the first measuring agent in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions.
- the following description uses the first measuring agent as an example.
- the method includes: determining first evidence based on a first network element; determining a first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; and sending first information to a first verifier, wherein the first information includes the first signature and the first evidence.
- the M measurands may also include a third measurand
- the method may further include receiving fourth information from the third measurand, the fourth information being used to indicate the key of the third measurand.
- the third measurer can send its key to the first measurer, thereby assisting the first measurer in signing using the keys of M measurers.
- the method further includes sending a fourth request to the third measurer, the fourth request being used to request the third measurer's key.
- the first measurand can send a request to the third measurand, thereby triggering the third measurand to send its key to the first measurand.
- the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
- the third evaluator can verify the information carried in the fourth request to determine whether to send the third evaluator's key to the first evaluator.
- This scheme avoids the third evaluator providing its key to the first evaluator when the first evaluator's security is low, thereby further improving the security of remote proof.
- the method further includes receiving fifth information from a key management network element, the fifth information being used to indicate the keys of the M measurands.
- the keys used to determine the M measurands for the first signature can be indicated by the key management network element, thus eliminating the need to obtain the keys of other measurands through interaction. Therefore, the above scheme can reduce the latency of determining the first signature, thereby reducing the latency of remote proof.
- the method further includes receiving a first request from the first verifier, the first request being used to request measurement of the first network element.
- the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
- the implementing entity of the method provided in this application can be a key management network element.
- the key management network element in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions.
- the following description uses a key management network element as an example.
- the method includes: receiving a third request from a first verifier, the third request being used to request the keys of M measurators, the keys of the M measurators being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurators being used to measure the first network element, M being an integer greater than 1; and sending third information to the first verifier, the third information being used to indicate the keys of the M measurators.
- the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, the P measurands include the M measurands, where P is an integer greater than or equal to M, and the M measurands include the first measurand.
- the method further includes sending a fifth message to a first measurand, the fifth message indicating the keys of the M measurands, including the first measurand.
- the method further includes: sending second information to the first verifier, the second information being used to indicate a first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group including the P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, where P is an integer greater than or equal to M.
- the method further includes receiving sixth information from the orchestration management network element, the sixth information being used to indicate the first association.
- the method further includes sending a fifth request to the orchestration management network element, the fifth request being used to request the first association.
- the method further includes: determining the keys of the M measurands based on the third request and the second association, wherein the second association includes the identifier of the first group and/or the association between the identifiers of the P measurands and the identifier of the first key group, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
- the key management network element can determine the keys of M measurands according to the second association relationship, thereby reducing the latency of finding the keys of M measurands.
- the implementing entity of the method provided in this application can be a third-party measurement agent.
- the third-party measurement agent in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the functions of the network device.
- the following description uses a third-party measurement agent as an example.
- the method includes: generating fourth information, which indicates the key of the third measurer; and sending the fourth information to the first measurer.
- the method further includes receiving a fourth request from the first metronome, the fourth request being used to request the key of the third metronome.
- the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
- a communication device including processing circuitry (or a processor) and an input/output interface (also referred to as an interface circuit), the input/output interface being used for inputting and/or outputting signals, the processing circuitry being used to perform the first aspect and any possible method of the first aspect, or the processing circuitry being used to perform the second aspect and any possible method of the second aspect, or the processing circuitry being used to perform the third aspect and any possible method of the third aspect, or the processing circuitry being used to perform the fourth aspect and any possible method of the fourth aspect.
- processing circuitry or a processor
- an input/output interface also referred to as an interface circuit
- the processing circuit is used to communicate with other devices through the interface circuit and to perform the first aspect and any possible method of the first aspect, or to perform the second aspect and any possible method of the second aspect, or to perform the third aspect and any possible method of the third aspect, or to perform the fourth aspect and any possible method of the fourth aspect.
- This communication device may include units or modules for performing the functions of the communication device.
- the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the first aspect and any possible implementation of the first aspect.
- These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
- the communication device includes a processing unit and a transceiver unit.
- the transceiver unit can be used to receive first information from a first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, and M being an integer greater than 1; the processing unit can be used to verify the first signature and the first evidence according to the keys of the M measurers.
- the transceiver unit is also used to: send a first request to the first metric, the first request being used to request measurement of the first network element.
- the transceiver unit is further configured to: send a first request to N measurands, the first request being used to request measurement of the first network element, the N measurands belonging to a first group, the first group including P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, N being an integer greater than or equal to 2 and less than or equal to P, and P being an integer greater than or equal to M.
- the transceiver unit is also used to: send a second request to at least one second metric, the second request being used to request measurement of the first network element.
- the transceiver unit is used to send the first request to the first measurand when the first condition is met.
- the transceiver unit is specifically used to: send the first request to the N measurands when the first condition is met.
- the first condition includes: the first verifier receiving rejection information from each of the at least one second measurer, and/or the first verifier not receiving a response from the at least one second measurer within a predetermined time period.
- the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
- the processing unit is further configured to: determine the first measurand based on the identifier of the first network element and the first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
- the processing unit may also be configured to: determine the N measurands based on the identifier of the first network element and the first association relationship.
- the transceiver unit is also used to: receive second information from a key management network element or an orchestration management network element, the second information being used to indicate the first association relationship.
- the transceiver unit is also configured to: send a third request to the key management network element, the third request being used to request the keys of the M measurands; and receive third information from the key management network element, the third information being used to indicate the keys of the M measurands.
- the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
- the processing unit is specifically used to: verify whether the number of measurands on which the first signature is based is greater than or equal to a threshold value, the threshold value being used to indicate the minimum number of measurands on which the first signature is based; if the number of measurands on which the first signature is based is greater than or equal to the threshold value, verify whether the first signature is valid; if the first signature is valid, verify whether the first evidence is valid.
- the first network element includes or is applied to the VNF.
- the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the second aspect and any possible implementation of the second aspect.
- These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
- the communication device includes a processing unit and a transceiver unit.
- the processing unit can be used to determine a first piece of evidence based on a first network element; determine a first signature based on the keys of M measurers and the first piece of evidence, wherein the M measurers are used to measure the first network element, and the M measurers include the first measurer, where M is an integer greater than 1, and the first signature is used to verify the validity of the first piece of evidence;
- the transceiver unit can be used to send first information to a first verifier, wherein the first information includes the first signature and the first piece of evidence.
- the M measurands also include a third measurand
- the transceiver unit is further configured to: receive fourth information from the third measurand, the fourth information being used to indicate the key of the third measurand.
- the transceiver unit is also used to send a fourth request to the third measurand, the fourth request being used to request the key of the third measurand.
- the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
- the transceiver unit is also used to: receive fifth information from the key management network element, which is used to indicate the keys of the M measurands.
- the transceiver unit is also used to: receive a first request from the first verifier, the first request being used to request measurement of the first network element.
- the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
- the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the third aspect and any possible implementation of the third aspect.
- These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
- the communication device includes a processing unit and a transceiver unit.
- the transceiver unit can be used to receive a third request from a first verifier, the third request being for the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurers being used to measure the first network element, where M is an integer greater than 1; the transceiver unit can also be used to send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
- the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, the P measurands include the M measurands, where P is an integer greater than or equal to M, and the M measurands include the first measurand.
- the transceiver unit is also used to: send fifth information to the first measurand, the fifth information being used to indicate the keys of the M measurands, the M measurands including the first measurand.
- the transceiver unit is further configured to: send second information to the first verifier, the second information being used to indicate a first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group including the P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, where P is an integer greater than or equal to M.
- the transceiver unit is also used to: receive sixth information from the orchestration management network element, the sixth information being used to indicate the first association relationship.
- the transceiver unit is also used to: send a fifth request to the orchestration management network element, the fifth request being used to request the first association relationship.
- the processing unit is further configured to: determine the keys of the M measurands based on the third request and the second association, wherein the second association includes the identifier of the first group and/or the association between the identifiers of the P measurands and the identifier of the first key group, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
- the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the fourth aspect and any possible implementation of the fourth aspect, which may be hardware circuits, software, or a combination of hardware circuits and software.
- the communication device includes a processing unit and a transceiver unit.
- the processing unit can be used to generate fourth information, which indicates the key of the third measurer; the transceiver unit can be used to send the fourth information to the first measurer.
- the transceiver unit is also configured to: receive a fourth request from the first metronome, the fourth request being used to request the key of the third metronome.
- the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
- a computer-readable storage medium on which a computer program or instructions are stored, which, when executed, cause the first aspect and any possible method of the first aspect to be performed (or implemented), or cause the second aspect and any possible method of the second aspect to be performed (or implemented), or cause the third aspect and any possible method of the third aspect to be performed (or implemented), or cause the fourth aspect and any possible method of the fourth aspect to be performed (or implemented).
- a computer program product comprising a computer program or instructions that, when executed, cause the first aspect and any possible method of the first aspect to be performed (or implemented), or cause the second aspect and any possible method of the second aspect to be performed (or implemented), or cause the third aspect and any possible method of the third aspect to be performed (or implemented), or cause the fourth aspect and any possible method of the fourth aspect to be performed (or implemented).
- a ninth aspect provides a communication device, including a processor configured to execute (or implement) any of the possible methods of the first aspect, or any of the possible methods of the second aspect, or any of the possible methods of the third aspect, or any of the possible methods of the fourth aspect, by executing a computer program (or computer-executable instructions) stored in a memory, and/or by logic circuitry.
- the device also includes a memory.
- the processor and memory are integrated together.
- the memory is located outside the communication device.
- the processor may include one or more processors.
- the communication device further includes a communication interface for communicating with other devices, such as transmitting or receiving data and/or signals.
- the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface.
- the communication device described in the fifth, sixth, or ninth aspects can be a chip or a chip system.
- a chip including a processor for calling a computer program or computer instructions in a memory to cause any of the implementations of the first aspect to be executed (or implemented), or to cause any of the implementations of the second aspect to be executed (or implemented), or to cause any of the implementations of the third aspect to be executed (or implemented), or to cause any of the implementations of the fourth aspect to be executed (or implemented).
- the processor is coupled to the memory via an interface.
- a communication system including a first verifier and a key management network element, wherein the first verifier is used to perform the first aspect and any possible implementation thereof, and the key management network element is used to perform the third aspect and any possible implementation thereof.
- the communication system also includes a first measurand, which performs the second aspect described above and any possible implementation thereof.
- the communication system also includes a third measurer, which performs the fourth aspect described above and any possible implementation thereof.
- Figure 1 is a schematic diagram of the network architecture of a communication system.
- Figure 2 is a schematic flowchart of a remote proof method.
- FIG. 3 shows a schematic diagram of the architecture of network functions virtualization (NFV).
- NFV network functions virtualization
- Figure 4 is a schematic diagram of the architecture of NFV based on remote proof.
- Figure 5 is a schematic flowchart of a communication method provided in an embodiment of this application.
- FIG. 6 is a schematic flowchart of another communication method provided in an embodiment of this application.
- FIG. 7 is a schematic flowchart of another communication method provided in an embodiment of this application.
- FIG. 8 is a schematic flowchart of another communication method provided in an embodiment of this application.
- Figure 9 is a schematic block diagram of a communication device according to an embodiment of this application.
- Figure 10 is a schematic block diagram of another communication device according to an embodiment of this application.
- At least one means one or more, and “more than one” means two or more.
- “And/or” describes the relationship between related objects, indicating that three relationships can exist. For example, A and/or B can mean: A alone, A and B simultaneously, or B alone, where A and B can be singular or plural. In the textual description of this application, the character “/” generally indicates that the preceding and following related objects are in an “or” relationship. “At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items.
- At least one of a, b, and c can mean: a, or, b, or, c, or, a and b, or, a and c, or, b and c, or, a, b, and c.
- a, b, and c can be single or multiple.
- instruction or “for instruction” can include both direct and indirect instruction.
- instruction information when describing instruction information as being used to instruct A, it may include whether the instruction information directly or indirectly instructs A, but does not necessarily mean that the instruction information carries A.
- the indication methods involved in the embodiments of this application should be understood to cover various methods that enable the party to be indicated to obtain the information to be indicated.
- the information to be indicated can be sent as a whole or divided into multiple sub-information and sent separately.
- the sending period and/or sending time of these sub-information can be the same or different. This application does not limit the sending method, for example.
- the "instruction information" in the embodiments of this application can be an explicit instruction, that is, a direct instruction through signaling, or an instruction obtained by combining other rules or parameters with the parameters indicated by the signaling, or by deduction. It can also be an implicit instruction, that is, an instruction obtained based on rules or relationships, or based on other parameters, or by deduction. This application does not specifically limit it in this regard.
- protocol can refer to standard protocols in the field of communications, such as 5G protocols, NR protocols, and related protocols applied in future communication systems; this application does not limit this term.
- Predefined can include predefined terms, such as protocol definitions.
- Preconfiguration can be implemented by pre-storing corresponding codes, tables, or other means that can be used to indicate relevant information in the device; this application does not limit the implementation method.
- transmission can be uplink transmission, such as a terminal device sending a signal to a network device; transmission can also be downlink transmission, such as a network device sending a signal to a terminal device; transmission can also be sidelink transmission, such as a terminal device sending a signal to another terminal device.
- transmission can be air interface level transmission, or it can be signal transmission from a chip input (I)/output (O) port, rather than air interface level transmission.
- Sending information to XX (device) can be understood as the destination of the information being that device. This can include sending information directly or indirectly to that device.
- "Receiving information from XX (device), or receiving information from XX (device)” can be understood as the source of the information being that device. This can include receiving information directly or indirectly from that device. Information may undergo necessary processing between the source and destination, such as format changes, but the destination can understand the valid information from the source. Similar expressions in this application can be understood in a similar way, and will not be repeated here.
- sending can also be understood as the "output” of the chip interface
- “receiving” can also be understood as the "input” of the chip interface.
- sending can occur between devices, for example, between network devices and terminal devices via an air interface.
- sending or “receiving” can also occur within a device, for example, between components, modules, chips, software modules, or hardware modules within the device via a bus, wiring, or interface.
- configuration can be signaling configuration or can be described as configuring signaling.
- signaling configuration includes configuration using signaling sent by network devices, which can be radio resource control (RRC) messages, downlink control information (DCI) messages, or system information blocks (SIBs).
- RRC radio resource control
- DCI downlink control information
- SIBs system information blocks
- Another example is signaling configuration between network devices. These network devices can include access network devices, core network devices, or management plane devices, etc.
- signaling configuration can also be configured to terminal devices or network devices using pre-configured signaling, or configured to terminal devices or network devices through pre-configuration.
- pre-configuration means defining or configuring the values of corresponding parameters in advance using a protocol, and storing them in the terminal device or network device during communication.
- the pre-configured messages can be modified or updated when the terminal device or network device is connected to the network.
- sequence number of each process does not imply the order of execution.
- the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of this application.
- the terms “comprising,” “including,” “having,” and their variations all mean “including but not limited to,” unless otherwise specifically emphasized.
- NFV Network functions virtualization
- NFV can be formed by decoupling the network functions of a traditional type of communication device from the physical device and then running them as software on a commercial off-the-shelf (COTS).
- COTS commercial off-the-shelf
- NFV can deploy the communication technology (CT) services of a traditional communication device onto a virtual entity by borrowing virtualization technologies from internet technology (IT) to implement virtual instances (VIs).
- a virtual entity can be a virtual machine (VM), a container, or any other possible virtualized functional entity; this application does not specifically limit this.
- a Virtualized Network Function also known as a Virtualized Network Element, can be a software application that provides network functions.
- a network function can be file sharing, directory services, or Internet Protocol (IP) configuration.
- IP Internet Protocol
- a VNF can be software providing network services, utilizing the infrastructure provided by Network Function Virtualization Infrastructure (NFVI) deployed on virtual machines, containers, or physical machines.
- NFVI Network Function Virtualization Infrastructure
- traditional hardware-based network elements can be called Physical Network Functions (PNFs).
- PNFs Physical Network Functions
- VNFs and PNFs can be networked individually or in combination to form a service chain. For example, a VNF can be deployed on one or more VIs.
- a VI can be a generalized concept; for example, a VI can refer to any virtualization scheme such as a virtual machine (VM) or a container, and this application is not limited in this regard.
- a VNF can consist of multiple lower-level components.
- a VNF can be deployed on multiple VMs.
- Each VM can host a virtualized network function component (VNFC).
- VNFC virtualized network function component
- a VNF can also be deployed on a VM.
- the VNF in this application embodiment can be or be applied to access and mobility management function (AMF) network elements, session management function (SMF) network elements, policy control function (PCF) network elements, unified data management (UDM) network elements, user plane function (UPF) network elements, and can also be network exposure function (NEF) network elements, application function (AF) network elements, network slice selection function (NSSF) network elements, authentication server function (AUSF) network elements, network repository function (NRF) network elements, unified data repository (UDR) network elements, etc., and this application embodiment is not limited to these.
- AMF access and mobility management function
- SMF session management function
- PCF policy control function
- UDM user plane function
- NEF network exposure function
- AF application function
- NSSF network slice selection function
- AUSF authentication server function
- NRF network repository function
- UDR unified data repository
- An element manager system can be used to perform traditional fault, configuration, accounting, performance, security, and FCAPS (Fault, Configuration, Accounting, Performance, Security, and FCAPS) management functions for VNFs.
- An EMS can exist independently or as a VNF with EMS functionality. In some examples, there can be a one-to-one correspondence between an EMS and a VNF.
- Network Functions Virtualization Infrastructure can be a set of resources used to host and connect virtual functions.
- NFVI can include infrastructure components on a platform.
- NFVI can virtualize physical resources into virtual resources for use by VNFs.
- NFVI can include a virtualization layer, hypervisor, container management system, physical device switches, compute, or storage, etc.
- NFVI can be a cloud data center that includes servers, a hypervisor, an operating system (OS), VMs, containers, virtual switches, and network resources.
- OS operating system
- An attester can be used in conjunction with a verifier to perform trust measurements on network elements.
- the attester performs integrity measurements on the target system to be proven and generates a set of statements called evidence.
- the attester can measure resources (e.g., VMs), applications (APPs), or hardware within the network element to obtain evidence.
- the attester can then verify the obtained evidence.
- Evidence may include configuration information of the network element and virtual machines, such as software version, software name, or vendor information.
- the attester can be a root of trust, such as a virtual root of trust, or a security chip, such as a trusted platform module (TPM) or a hardware security module (HSM).
- TPM trusted platform module
- HSM hardware security module
- the specific form of the attester is not limited in this application; it can also take other forms, such as direct memory access (DMA).
- a verifier is an entity that performs verification on evidence from a network element.
- a verifier can complete the verification and return a result, or sign and send a credential.
- This application does not limit the specific method of verification.
- the verifier can perform verification locally based on pre-configuration, or it can perform verification on a remote server.
- the verifier can be an independently configured network element, or it can be a function of the management plane, such as the verification function of cloud management (or "cloud management") in NFVI, or a network element used by an operator to provide verification services in a roaming domain.
- cloud management can be management, automation, and orchestration (MANO).
- a network function (NF) consumer can be a network element located in a trusted domain.
- An NF consumer may request to establish a service connection with another network element due to service requirements.
- an NF consumer can be a network element that requires remote authentication credentials.
- an NF consumer can be a visited public land mobile network (VPLMN) AMF or a VPLMN UPF, or a VNF in the NFV domain, etc. This application does not limit the specific form of the NF consumer.
- VPN visited public land mobile network
- a relying party can be called a network element relying party.
- a relying party can be a network element that needs to verify the configuration information of other network elements.
- a network element relying party could be an NRF (Network Request Framework).
- the profile and attestation check function can be used to configure network elements for checking and attestation.
- the PACF can be an interface network element used to interact or communicate with the validator.
- One possible scenario is that other network elements may be unable to send information to the validator.
- One possible reason for this scenario is the cross-domain deployment of the validator.
- MANO Management, automation, and network orchestration
- VNFM virtualized network function manager
- NFVO network function virtualization orchestrator
- VIM Virtual Infrastructure Management
- VIM can be used to manage NFVI.
- VIM can be used to provide management of infrastructure-layer virtualized resources (such as virtual computing resources, storage resources, or network resources) (e.g., resource reservation or allocation), monitor the status of virtual resources, report virtual resource faults, or provide virtualized resource pools for upper-layer applications.
- VIM can be used for cloud platform management, responsible for hardware management, VM deployment, VM coordination, and scheduling.
- the Virtual Network Function Manager can be used to manage the lifecycle of VNFs, such as bringing them online, taking them offline, monitoring their status, initializing VNF instances, scaling up VNF instances, scaling down VNF instances, or terminating VNF instances.
- the VNFM can manage VNFs based on VNF descriptors (VNFDs).
- VNFDs VNF descriptors
- the VNFM can be responsible for network element lifecycle management.
- Basic capabilities of the VNFM can include adding, deleting, querying, or modifying network elements or VMs, etc.
- a Network Function Virtualization Orchestrator provides a global view of network service (NS) lifecycles and resources.
- VNF lifecycle management includes a series of management operations from VNF instance creation to termination, such as VNF instantiation, VNF instance scaling (e.g., expansion or reduction), VNF instance healing, VNF instance updates, and VNF instance termination.
- NFVO can coordinate NS lifecycle management, VNF lifecycle management (potentially requiring VNFM support), NFVI resource management (potentially requiring VIM support), network service descriptor (NSD) management, VNFD management, and virtualized network function forwarding graph (VNFFG) management, ensuring optimized configuration of required resources and connections.
- NFVO can also be used to deploy new network services, VNF forwarding tables, VNF packages, and more.
- NFVO can operate based on a network service descriptor (NSD).
- the NSD can contain service chains, NFVs, or performance goals.
- NFVO can be used to manage the deployment of network services.
- NFVO NFVO
- VNFM NFV
- VIM can belong to the MANO architecture of an NFV system.
- 5G 5th generation
- LTE Long Term Evolution
- NR New Radio
- NB-IoT Narrow Band Internet of Things
- eMTC Enhanced Machine-Type Communication
- eMBB Enhanced Mobile Broadband
- URLLC Ultra Reliable Low Latency Communications
- satellite communication systems LTE-machine-to-machine (LTE-M) systems, or systems that evolve after 5G, such as Future Mobile Communication systems.
- FIG 1 is a schematic diagram of a network architecture for a communication system.
- this network architecture may include access network equipment and a core network.
- the access network can be used to implement functions related to radio access.
- the access network may include access network equipment.
- the core network may include one or more core network equipment. These one or more core network equipment may include at least one network function (NF).
- NF network function
- At least one NF may include at least one of the following: Network Capability Openness (NEF) element, Network Storage Function (NRF) element, Application Function (AF) element, Policy Control Function (PCF) element, Unified Data Management (UDM) element, Access and Mobility Management Function (AMF) element, Session Management Function (SMF) element, User Plane Function (UPF) element, Authentication Service Function (AUSF) element, Network Slice Selection Function (NSSF) element, Network Slice Authentication and Authorization Function (NSSAAF) element, or a data network (DN) connecting to an operator's network.
- NEF Network Capability Openness
- NRF Network Storage Function
- AF Application Function
- PCF Policy Control Function
- UDM Unified Data Management
- AMF Access and Mobility Management Function
- UPF User Plane Function
- AUSF Authentication Service Function
- NSSF Network Slice Selection Function
- NSSAAF Network Slice Authentication and Authorization Function
- Terminal devices can be any device with wireless transceiver capabilities. They can be deployed on land, including indoors or outdoors, handheld, wearable, or vehicle-mounted; on water (such as ships); and in the air (e.g., on airplanes, balloons, and satellites). Terminal devices can communicate with the core network via a radio access network (RAN), exchanging voice and/or data with the RAN.
- RAN radio access network
- Terminal devices can be mobile phones, tablets, computers with wireless transceiver capabilities, mobile internet devices (MIDs), point-of-sale (POS) machines, customer-premises equipment (CPEs), light user equipment (UEs), reduced-capability UEs (REDCAP UEs), wearable devices, multimedia devices, streaming media devices, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, and industrial control devices.
- Wireless terminals in various fields include autonomous driving, remote medical care, smart grids, transportation safety, smart cities, smart homes, and flying equipment (e.g., intelligent robots, hot air balloons, drones, drone controllers, etc.). The embodiments of this application do not limit the application scenarios.
- Terminal devices may also be called user equipment (UE), mobile stations, and remote stations.
- Terminal devices can also be vehicle devices, such as vehicle-mounted devices, vehicle-mounted modules, vehicle-mounted chips, on-board units (OBU), or telematics boxes (T-BOX).
- vehicle devices such as vehicle-mounted devices, vehicle-mounted modules, vehicle-mounted chips, on-board units (OBU), or telematics boxes (T-BOX).
- OBU on-board units
- T-BOX telematics boxes
- the embodiments of this application do not limit the specific technologies, device forms, or names used in the terminal devices.
- Terminal devices can be mobile devices that support satellite-to-ground air interfaces. Terminal devices can access satellite networks through air interfaces and initiate services such as making calls and accessing the internet.
- Access network equipment can be any device in a network used to connect terminal devices to a wireless network.
- Access network equipment can be a node in a radio access network, also known as a base station, or a radio access network (RAN) device node (or device).
- RAN radio access network
- Access network equipment can include evolved base stations (NodeBs or eNBs or e-NodeBs) in long-term evolution (LTE) systems or evolved LTE-Advanced (LTE-A) systems, such as traditional macro base stations (eNBs) and micro base stations (eNBs) in heterogeneous network scenarios.
- NodeBs or eNBs or e-NodeBs in long-term evolution (LTE) systems or evolved LTE-Advanced (LTE-A) systems, such as traditional macro base stations (eNBs) and micro base stations (eNBs) in heterogeneous network scenarios.
- LTE long-term evolution
- LTE-A evolved LTE-Advanced
- Access network devices include, but are not limited to, points (TRPs), home base stations (e.g., home-evolved NodeBs, or home Node Bs, HNBs), baseband units (BBUs), baseband pools (BBU pools), or wireless fidelity (WiFi) access points (APs), or centralized units (CUs) and distributed units (DUs) in cloud radio access networks (Cloud RAN) systems.
- TRPs points
- home base stations e.g., home-evolved NodeBs, or home Node Bs, HNBs
- BBUs baseband units
- BBU pools baseband pools
- WiFi wireless fidelity
- APs wireless fidelity access points
- CUs centralized units
- DUs distributed units
- the CU supports protocols such as radio resource control (RRC), packet data convergence protocol (PDCP), and service data adaptation protocol (SDAP); the DU primarily supports radio link control (RLC), media access control (MAC), and physical layer protocols.
- RRC radio resource control
- PDCP packet data convergence protocol
- SDAP service data adaptation protocol
- the DU primarily supports radio link control (RLC), media access control (MAC), and physical layer protocols.
- RLC radio link control
- MAC media access control
- Physical layer protocols Physical layer protocols.
- Access network equipment can provide wireless access services. For example, access network equipment can schedule wireless resources for terminal devices that need to access the network. It can also provide reliable wireless transmission protocols and/or data encryption protocols.
- CU or CU-CP and CU-UP
- DU radio unit
- RU radio unit
- O-RAN open-radio access network
- CU can also be called O-CU (open CU)
- DU can also be called O-DU
- CU-CP can also be called O-CU-CP
- CU-UP can also be called O-CU-UP
- RU can also be called O-RU.
- this application uses CU, CU-CP, CU-UP, DU, and RU as examples.
- Any of the units among CU (or CU-CP, CU-UP), DU, and RU in this application can be implemented through software modules, hardware modules, or a combination of software modules and hardware modules.
- the terminal device may include the aforementioned access network device.
- the terminal device may include the aforementioned access network device.
- Network capability open elements can expose some network functions to applications in a controlled manner.
- network capability open elements can be Network Capability Open Functions (NEF).
- NEF Network Capability Open Functions
- future communication systems network capability open elements may still be NEF elements, or they may have other names; this application is not limited to these.
- NRF network elements are primarily used for registration, discovery, and status detection of network elements, the services they provide, and their functions. NRF network elements enable automated management, selection, and scalability of network function services, and allow each network function to discover services provided by other network functions. In 5G communication systems, NRF network elements may be network storage functions (NRFs). In future communication systems, NRF network elements may remain NRF network elements or have other names; this application does not limit this.
- Application function network elements can be used to convey application-side requests to the network side. For example, requests may include Quality of Service (QoS) requirements or user state event subscriptions.
- Application function network elements can provide various application service data to the control plane network elements of the operator's communication network, or obtain network data and control information from the control plane network elements of the communication network.
- application function network elements can be application functions (AFs).
- AFs application functions
- application function network elements may still be AF network elements, or they may have other names; this application is not limited to any particular name.
- application function network elements can also be called application servers or service servers.
- application function network elements can be deployed on the operator's network or deployed by a third party.
- Network slice authentication and authorization network elements can be used for network slice authentication and authorization.
- network slice authentication and authorization network elements can interact with authentication, authorization, and accounting servers (AAA-S) through authentication, authorization, and accounting proxies (AAA-P).
- AAA-S authentication, authorization, and accounting servers
- AAA-P authentication, authorization, and accounting proxies
- application function network elements can be network slice specific authentication and authorization functions (NSSAAF).
- NSSAAF network slice specific authentication and authorization functions
- network slice authentication and authorization network elements can still be NSSAAF network elements, or they can have other names; this application is not limited to these.
- Policy control function network elements also known as policy control network elements, are used to formulate and manage policies for the entire network (e.g., 5G networks).
- Policy control network elements can include policy control functions, charging policy control functions, etc. They can generate and maintain QoS flow control policies, network slicing policies, mobility management policies, charging policies, UE access policies, etc.
- Policy control network elements can dynamically generate and adjust policies based on the operator's service needs and network status, and distribute these policies to relevant network elements such as access and mobility management network elements, session management network elements, and user plane function network elements to guide their behavior.
- policy control network elements can receive QoS requirements from application function network elements and translate them into corresponding policies.
- policy control network elements can be policy control functions (PCF).
- PCF policy control functions
- policy control network elements may remain PCF network elements or have other names; this application is not limited to these.
- a unified data management network element is primarily used to manage and store user data (or subscription information) from terminal devices. This includes, for example, user identity information, authentication information, subscription information, and policy information.
- the unified data management network element can provide user data query and update services to other network elements. It supports user authentication, authorization, and key management functions. Furthermore, the unified data management network element can update and synchronize user data according to the policies of policy control network elements.
- the unified data management network element can be a unified data management (UDM) element.
- UDM unified data management
- the unified data management network element may still be a UDM element, or it may have other names; this application is not limiting.
- Access and mobility management (AMF) network elements also known as access and mobility management function (AMF) network elements, are primarily used for terminal attachment and tracking area update procedures in mobile networks.
- AMF network elements can provide non-access stratum (NAS) messages, complete registration management, connection management, reachability management, allocate tracking area lists (TA lists), grant access authorization, authenticate, and manage mobility, and transparently route session management (SM) messages to session management network elements.
- NAS non-access stratum
- TA lists tracking area lists
- SM mobility management
- AMF network elements can be access and mobility management functions (AMF).
- AMF network elements may remain AMF network elements or have other names; this application is not limited to these names.
- Session management network elements can be used for session and bearer management in mobile networks, such as session establishment, modification, and release. Specific functions include allocating and managing Internet Protocol (IP) addresses for the UE, and selecting user plane function network elements that provide packet forwarding capabilities. For example, a session management network element can select a suitable user plane function network element for the UE based on the UE's request and the policy control information of the policy control network element, establish a session with that user plane function network element, and generate QoS rules and charging rules. Session management network elements can control the data forwarding and processing behavior of user plane function network elements. In 5G communication systems, the session management network element can be a Session Management Function (SMF). In future communication systems, the session management network element may still be an SMF network element, or it may have other names; this application is not limited to these.
- SMF Session Management Function
- the authentication service function network element is mainly used to perform security authentication of the terminal.
- the authentication service function network element can be an Authentication Service Function (AUSF).
- AUSF Authentication Service Function
- the authentication service function network element can still be an AUSF network element, or it can have other names. This application does not limit this.
- the network slice selection function network element is mainly used to select network slices for terminals.
- the network slice selection function network element can be the Network Slice Selection Function (NSSF).
- the network slice selection function network element can still be the NSSF network element, or it can have other names. This application does not limit this.
- MPFs User plane function network elements
- MPFs can be used to process user packets, such as forwarding and billing.
- MPFs can handle user plane data packet routing, forwarding, QoS flow processing, threshold control, traffic monitoring, authentication, data packet detection, and reporting.
- MPFs can also manage UE IP addresses and core network (CN) tunnel information.
- CN core network
- MPFs Located in the 5G core network user plane, MPFs provide high-speed, efficient, and flexible data transmission services to the UE.
- MPFs can perform data packet filtering, traffic shaping, and billing according to control plane instructions, enabling fine-grained management and control of user data flows.
- MPFs can connect to access network equipment via the N3 interface and to the data network via the N6 interface, thus enabling data transmission between the UE and the external data network.
- MPFs can also be referred to as Protocol Data Unit (PDU) session anchors (PSAs).
- PDU Protocol Data Unit
- PSAs Protocol Data Unit
- user plane function network elements can be user plane functions (UPF).
- UPF user plane function network elements
- future communication systems user plane function network elements can still be UPF network elements, or they can have other names. This application does not limit this.
- Data networks are primarily used to provide data transmission services for terminal devices.
- Data networks can be private networks, such as local area networks (LANs), public data networks (PDNs), such as the Internet, or dedicated networks jointly deployed by operators, such as configured IP multimedia core network subsystems (IMS) services.
- LANs local area networks
- PDNs public data networks
- IMS IP multimedia core network subsystems
- Data networks can also originate from third parties.
- N1 The interface between AMF and UE, which can be used to transmit QoS control rules to UE, etc.
- N2 The interface between AMF and (R)AN, which can be used to transmit radio bearer control information from the core network side to the RAN.
- N3 The interface between RAN and UPF, used to transmit uplink or downlink user plane data between RAN and UPF.
- N4 The interface between SMF and UPF, which can be used to transmit information between the control plane and the user plane, including the distribution of forwarding rules, QoS control rules, traffic statistics rules, etc. from the control plane to the user plane, as well as the reporting of information from the user plane.
- N6 The interface between UPF and DN, used to transmit uplink or downlink user data streams between UPF and DN.
- the service-oriented interfaces Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nnssaaf, Nausf, Namf, and Nsmf can be service-oriented interfaces provided by the above-mentioned NSSF, NEF, NRF, PCF, UDM, AF, NSSAAF, AUSF, AMF, and SMF network elements, respectively, and are used to call the corresponding service-oriented operations.
- the aforementioned network element or function can be a network component in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform).
- a platform e.g., a cloud platform
- the aforementioned network element or function can be implemented by one device, multiple devices working together, or a functional module within a single device; this application embodiment does not specifically limit this.
- network element can also be referred to as an entity, device, apparatus, or module, etc., and this application does not specifically limit it. Furthermore, in this application, for ease of understanding and explanation, the description of "network element” is omitted in some descriptions.
- PCF PCF network element
- PCF should be understood as PCF network element or PCF entity. The following omits descriptions of the same or similar cases.
- Figure 2 is a schematic flowchart of a remote proof method 200.
- Method 200 achieves RA through the interaction between the verifier and the measurer. Method 200 is described below with reference to Figure 2.
- the verifier sends a challenge message to the measurand.
- the measurand receives the challenge message from the verifier.
- the measurer and the verifier can be separated.
- the measurer can be deployed on one side of the system or device mentioned above, while the verifier can be deployed remotely.
- the challenge message may carry a request message.
- This request message is used to request the measurement provider to perform the measurement.
- the request message may be used to request the measurement provider to perform the measurement on the aforementioned system or device.
- the challenge message may also carry a unique nonce corresponding to this measurement. This nonce can be used by the measurement provider for measurement purposes.
- the measurer performs the measurement.
- the measurer can obtain the evidence required for measurement from the aforementioned system or device based on the challenge message. For instance, the measurer can obtain programs or files within these systems or devices and calculate hash values corresponding to these programs or files based on random numbers.
- the measurer sends a response message to the verifier.
- the verifier receives the response message from the measurer.
- the response message can be used to indicate that the measurement is complete.
- the response message can carry the hash value described above.
- the response message can carry the random number described above.
- the verifier can determine whether the random number carried in the response message matches the random number uniquely corresponding to this metric carried in the challenge message. If the two random numbers do not match, the verifier can determine that the verification has failed. If the two random numbers match, the verifier can proceed with further verification.
- further verification by the verifier may include comparing the hash value in the response message with a preset hash value for the aforementioned system or device. If the hash value in the response message matches the preset hash value, it indicates that the program or software of these systems or devices has not been tampered with, and thus the verifier can determine that these systems or devices are trusted devices, i.e., the verification passes. If the hash value in the response message differs from the preset hash value, it indicates that the program or software of these systems or devices may have been tampered with, and thus the verifier can determine that these systems or devices are untrusted devices, i.e., the verification fails. In some possible implementations, in the event of verification failure, these systems or devices can be reset or erased.
- FIG 3 illustrates the architecture of NFV.
- the NFV system 300 can run on a server, which may include a processor, hard disk, memory, system bus, etc., similar to a general computer architecture.
- the server's functionality can be implemented by a single physical device or by a cluster of multiple physical devices. This application does not limit this.
- the NFV system 300 can be implemented through various networks, such as data center networks, service provider networks, or local area networks (LANs).
- LANs local area networks
- the NFV system 300 may include: NFV-MANO 128, NFVI 130, one or more VNFs 108 (e.g., VNF 1, VNF 2, VNF 3), one or more element management (EM) systems 122 (e.g., EM 1, EM 2, EM 3), service, VNF and infrastructure description 126, and one or more operation support systems (OSS) and/or business support systems (BSS) 124.
- VNFs 108 e.g., VNF 1, VNF 2, VNF 3
- EM element management
- EM 1, EM 2, EM 3 service
- VNF and infrastructure description 126 e.g., VNF and infrastructure description 126
- OSS operation support systems
- BSS business support systems
- MANO 128 may include NFVO 102, one or more VNFM 104, and one or more VIM 106.
- the hardware resource layer may include computing hardware 112, storage hardware 114, or network hardware 116.
- the virtual resource layer may include virtual computing 110 (e.g., a virtual machine), virtual storage 118, or a virtual network 120.
- the computing hardware 112 may be a dedicated processor or a general-purpose processor used to provide processing and computing functions.
- the storage hardware 114 provides storage capacity, which may be provided by the storage hardware 114 itself (e.g., the local memory of a server) or provided via a network (e.g., a server connecting to a network storage device via a network).
- the network hardware 116 may be a switch, router, and/or other network devices, and may be used to enable communication between multiple devices, which may be connected wirelessly or via wired connections.
- the virtualization layer in NFVI 130 can be used to abstract hardware resources from the hardware resource layer, decoupling the VNF 108 from the physical layer to which the hardware resources belong, and providing virtual resources to the VNF.
- the virtualization layer can also be called a hypervisor or a container management system.
- the virtual resource layer may include virtual computing 110, virtual storage 118, or virtual network 120.
- Virtual computing 110 and virtual storage 118 can provide virtual resources to VNF 108 in the form of virtual machines or other virtual containers; for example, one or more VNFs 108 can be deployed on one or more virtual machines.
- the virtualization layer forms virtual network 120 through abstract network hardware 116.
- Virtual network 120 such as a virtual switch, can be used to enable communication between multiple virtual machines or between multiple other types of virtual containers hosting VNFs.
- OSS/BSS124 can be provided to telecommunications operators with comprehensive network management and service operation functions, including network management (such as fault monitoring, network information collection, etc.), billing management, and customer service management.
- network management such as fault monitoring, network information collection, etc.
- billing management such as billing management
- customer service management such as customer service management
- NFVI 130 comprises hardware and software that together establish a virtualization environment for deploying, managing, and executing VNF 108.
- the hardware resource layer and the virtual resource layer are used to provide virtual resources, such as virtual machines and/or other forms of virtual containers, to VNF 108.
- VNFM 104 can communicate with VNF 108 and EM 122 to perform VNF lifecycle management and exchange configuration/state information.
- VNF 108 can be a virtualization of at least one network function that was previously provided by a physical network device.
- One or more VNF 108s can be deployed on a virtual machine (or other form of virtual container).
- EM 122 can be used to manage one or more VNFs.
- a Cloud RAN system may include the above architecture.
- a Cloud RAN system may include one or more VNFs.
- a Cloud RAN system can refer to implementing RAN functions through a general-purpose computing platform (rather than a dedicated hardware platform) and managing the virtualization of RAN functions based on cloud-native principles.
- RAN cloudification can begin with running certain 5G RAN network functions in containers through a general-purpose hardware platform.
- This general-purpose hardware platform can include a commercial off-the-shelf (COTS) platform.
- COTS commercial off-the-shelf
- the control plane and user plane of the central unit are first cloudified, followed by the latency-sensitive radio processing functions in the distributed units.
- the Cloud RAN system can employ leading technologies to become the foundation for 5G openness and enable 5G innovation.
- the RAN cloudification process may include COTS hardware, cloud-native architecture, management, orchestration and automation, or RAN programmability.
- COTS hardware including accelerators
- suitable hardware platforms and environments can be selected.
- cloud-native architectures cloud-native technologies such as Kubernetes can be used, along with development operations (DevOps) principles, to deploy RAN functions as microservices on bare-metal servers using container technology.
- DevOps development operations
- end-to-end service lifecycle management can be achieved across the Cloud RAN system, transport, 5G core network, and underlying cloud infrastructure.
- non-RAN functions can be deployed in virtualized systems to add new functionality and value.
- Cloud RAN can also be called Virtualized RAN (vRAN), Cloud RAN, Cloud RAN, or other names.
- vRAN Virtualized RAN
- Cloud RAN Cloud RAN
- Cloud RAN or other names.
- the dependent VNF determines to measure the untrusted VNF.
- the dependent VNF can send a challenge message to the PACF.
- PACF can convert the challenge message from the 3rd generation partnership project (3GPP) protocol to the European Telecommunications Standards Institute (ETSI) protocol, thereby sending the challenge message to the verifier.
- 3GPP 3rd generation partnership project
- ETSI European Telecommunications Standards Institute
- the verifier sends a challenge message to the measurand, which can be used to request the measurand to initiate a measurement of the VNF.
- evidence could be a set of statements about the target environment. These statements could be used to reveal the operational status, health, configuration, or structure that are security-related. In one possible implementation, evidence could be a measurer's hash of the current VNF file.
- the verifier obtains the proof result based on the evidence.
- the verifier sends information to PACF indicating the proof result.
- PACF can send information indicating the proof result to the dependent party.
- Figure 4 illustrates the security shortcomings of remote proof schemes.
- the measurer may experience a single point of failure or may act maliciously, reducing the security of remote proof.
- FIG. 5 is a schematic flowchart of a communication method 500 provided in an embodiment of this application.
- a communication method 500 provided in an embodiment of this application.
- the security of remote proof will be reduced in the event of a malfunction or malicious intent on the part of that measurer.
- the signature received by the verifier is based on multiple measurers, thereby improving the security of remote proof.
- Optional operations in method 500 are shown in dashed lines in Figure 5. Method 500 will be described below with reference to Figure 5.
- the first verifier may include one or more verifiers.
- the first verifier may be a functional module or chip in NFV-MANO, as shown in Figure 4.
- Another example is a cloud network function.
- this application is not limited to this.
- the first verifier may not be limited to the NFV system, but may also be a verifier in other systems; on the other hand, the first verifier may not be limited to functional modules or chips, but may also be a chip system or a complete device.
- the first attester may include one or more attesters.
- the first attester may be a functional module or chip in an NFVI, as shown in Figure 4.
- this application is not limited to this.
- the first attester may not be limited to an NFV system, but may also be an attester in other systems; on the other hand, the first attester may not be limited to a functional module or chip, but may also be a chip system or a complete device.
- the first attester may or may not have received a request from the first verifier beforehand, but the first attester is the attester that sends information to the first verifier, that is, it responds to the first verifier. Therefore, the first attester can also be called a responding attester.
- the first information may also include a measurement log and/or a random number.
- the measurement log can be used to indicate the measurement process.
- the first evidence may be determined based on multiple pieces of evidence, and the measurement log can record the process of determining the first evidence.
- the random number may be provided by the first verifier and used to uniquely identify this measurement.
- the first information may also include attestation identity key (AIK) certificate information.
- AIK certificate information can be used to indicate the AIK certificate of the first verifier.
- at least one of the AIK certificate information, the first evidence, the random number, or the first evidence may belong to measurement quotation information.
- the first verifier can verify the validity of the AIK certificate, and if the AIK certificate is valid, verify whether the first evidence is valid.
- the first information may be carried in a response message, but this application is not limited to this; the first information may also be carried in other messages.
- This application does not limit the specific name of the first information; the first information may also be called response information, remote authentication response, or other names.
- the first network element can be a VNF, such as the unverified VNF in Figure 4.
- VNF such as the unverified VNF in Figure 4.
- this application is not limited to this, and the first network element can be applied to other network elements.
- a PNF is a network element in a communication system, such as access network equipment or terminal equipment.
- this application does not limit the specific name of the first network element; for example, the first network element can also be called an unverified network element, an untrusted network element, or other names.
- the first evidence may include the platform configuration register (PCR).
- the first evidence is obtained by measuring the first network element.
- the first evidence may be obtained by a first measurer measuring the first network element, but this application is not limited to this.
- the first evidence may also be obtained by other measurers measuring the first network element.
- the first evidence may be obtained by multiple measurers measuring the first network element.
- the first evidence can also be used to verify the trustworthiness, trust status, or security of the first network element, etc.
- the measurer on which the first signature is based can be understood as the measurer who participated in the first signature, the key on which the first signature is based, the key of the measurer on which the first signature is based, the key of the measurer applied to the first signature, or the key applied to the first signature, etc.
- the M measurement operators are used to measure the first network element. This can be understood as meaning that each of the M measurement operators has the capability to measure the first network element, but it is not equivalent to all of the M measurement operators having already measured the first network element. In some examples, all M measurement operators measure the first network element. For example, the first evidence is obtained by the M measurement operators measuring the first network element. In other examples, some of the M measurement operators (e.g., the first measurement operator) measure the first network element. For example, the first evidence may be obtained by the first measurement operator measuring the first network element. Furthermore, this application does not limit the M measurement operators to only measuring the first network element and not other network elements. For example, the first measurement operator can measure the first network element and also measure other network elements.
- the first measurer when the first measurer measures the first network element, its identifier is a first identifier, and/or the first measurer belongs to a first group; when the first measurer measures another network element (e.g., the second network element), its identifier is a second identifier, and/or the first measurer belongs to a second group.
- the first identifier and the second identifier can be different or the same.
- the first group and the second group can also be different or the same. If the first identifier and the second identifier are different, the above scheme can also be understood as the first measurer using different identifiers when measuring different network elements.
- the M measurators belong to a first group, which corresponds to the first network element.
- Each measurator in the first group has the ability to measure the first network element.
- each measurator in the first group is used to measure the first network element.
- the number of measurators in the first group is P, where P is an integer greater than or equal to M.
- the P measurators include the M measurators.
- the M measurants can be M trusted roots.
- Such a scenario can also be called a distributed trusted root collaboration scenario, in which different trusted roots can be used to verify the security, trustworthiness, or trusted state of the same network element.
- the first verifier verifies the first signature and the first evidence based on the keys of the M measurators.
- the first verifier can verify the validity of the first signature based on the keys of the M measurers. Furthermore, if the first signature is valid, the first verifier can verify the validity of the first evidence.
- the keys of the M measurers can be the public keys of the M measurers.
- this application does not limit the specific method of verifying the first signature or first evidence based on the keys of the M measurers.
- the first verifier can verify the validity of the first signature based on the generation method of the first signature and the keys of the M measurers.
- the generation method of the first signature can be found in the description below.
- This application does not specify the exact name of the first signature, which may also be referred to as the group signature, group signature information, or other names.
- the security of remote proof will be reduced in the event of a failure or malicious intent on the part of that measurand.
- the signature received by the verifier is based on M measurands.
- the verifier can verify the signature and the evidence using the keys of these M measurands, avoiding errors caused by the failure or malicious intent of a single measurand, thereby improving the security of remote proof.
- the M measurands can measure the same network element; that is, the M measurands participating in the signing can measure the same network element.
- the verifier only needs to perform one reception and verification to achieve remote proof. Therefore, the above scheme improves the efficiency of remote proof.
- the first device in this application may refer to the network device itself (e.g., access network device, core network device, or management plane device), a component in the network device (e.g., processor, chip, or chip system), or a logic module or software that can implement all or part of the functions of the network device.
- the network device itself (e.g., access network device, core network device, or management plane device), a component in the network device (e.g., processor, chip, or chip system), or a logic module or software that can implement all or part of the functions of the network device.
- the first device will be used as an example below.
- management plane equipment may include VNFM, VIM, or operations, administration, and management (OAM), etc.
- method 500 further includes: S530, the first verifier sends eighth information to the first device.
- the first device receives the eighth information from the first verifier.
- the first device may include or be applied to: PACF, dependent party, security edge protection proxy (SEPP), or other devices.
- SEPP security edge protection proxy
- the first device may also be any module or component of an NF or RAN that uses verification results (or measurement results).
- the eighth piece of information can be used to indicate the verification result. For example, if the first evidence is valid, the verification result can indicate that the first network element is valid. Conversely, if the first evidence is invalid, the verification result can indicate that the first network element is invalid.
- This application does not limit the specific name of the eighth piece of information; it can also be called a measurement response message or other names.
- method 500 also includes S540 and/or S550.
- the first authenticator sends a third request to the key management network element.
- the key management network element receives the third request from the first authenticator.
- a key management network element may include or be applied to: a certificate authority (CA) and/or a key generation center (KGC), etc.
- CA certificate authority
- KGC key generation center
- This application does not limit the specific name of the key management network element; for example, it may also be called a network element, a key network element, or have other names.
- a key management network element may be a cloud network function.
- this application is not limited in this respect; a key management network element may also be a chip or a complete device.
- the third request is used to request the keys of the M measurands.
- the keys of the M measurands may include the public keys of the M measurands.
- This application does not limit the specific name of the third request; it may also be called a key request, public key request, group public key request, or other names.
- method 500 may not include S540.
- the key management network element may send indication information of the keys of the M measurands to the first verifier periodically, rather than based on a request.
- the keys of the M measurands may be pre-configured, predefined, or generated according to predefined (or pre-configured) rules.
- the third request includes the identifier (identity, identification, or identifier, ID) of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
- the identifier of the first measurer may include an identifier (e.g., #01), the IP address, MAC address, or other information of the first measurer.
- the third request may include the identifier of the sender of the first information, and/or the identifier of the group to which the sender of the first information belongs.
- the key management network element can determine the keys for the M measurers to be fed back to the first verifier based on the identifiers carried in the third request.
- the third request includes the identifiers of one or more of the P measurands.
- the third request may include the identifiers of all the P measurands.
- the third request may include the identifiers of some of the P measurands.
- the third request may or may not carry the identifier of the first measurand. In other words, the third request may or may not carry the identifier of the sender of the first information.
- S540 is triggered by the first message.
- S540 includes: in response to the first message, the first verifier sends a third request to the key management network element.
- the first verifier can request the key required for this verification from the key management network element.
- the key is stored by a dedicated network element, which improves the security of the key; on the other hand, the first verifier does not need to save the key in advance, saving the first verifier's storage costs.
- the first authenticator receives the third information from the key management network element.
- the key management network element sends the third information to the first authenticator.
- the third information is used to indicate the keys of the M measurers.
- the third information can be direct information, for example, it can include information about the keys of the M measurers.
- the third information can also be indirect information, for example, the first verifier can determine the keys of the M measurers based on the third information.
- the third piece of information can indicate only the keys of the M measurands, or it can indicate the keys of the P measurands, or in other words, it can indicate the keys of all measurands in the first group. It is understood that the keys of the P measurands include the keys of the M measurands.
- the keys of the M measurands can include the public keys of the M measurands.
- the keys of the P measurands can include the public keys of the P measurands.
- the key management network element can determine the keys for M measurands based on pre-configured or pre-defined rules.
- the key management network element pre-configures or predefines the association between the keys of the first validator and M measurands. Upon receiving a request from the first validator, the key management network element can determine the keys of the M measurands.
- the key management network element pre-configures or predefines the association between the identifier of the first measurand and the keys of the M measurands. If the third request includes the identifier of the first measurand, the key management network element can determine the keys of the M measurands; or, if the third request includes the identifier of the first group, the key management network element can determine that the first measurand exists in the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the M measurands.
- the key management network element pre-configures or predefines the association between the identifier of the first group and the keys of the M measurands. If the third request includes the identifier of the first group, the key management network element can determine the keys of the M measurands; or, if the third request includes the identifier of the first measurand, the key management network element can determine that the first measurand belongs to the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the M measurands.
- the association between the identifier of the first group and the identifier of the first measurer can also be classified as a third association.
- the third association can further include the association between the identifier of the first group and other measurers.
- the third association could include the association between the identifier of the first group and the identifiers of the P measurers within the first group.
- method 500 further includes: S560, the key management network element determines the keys of the M measurands based on the third request and the second association.
- the second association relationship may include the association relationship between the identifier of the first group and the identifier of the first key group (hereinafter referred to as association relationship 1), or the association relationship between the identifiers of the P measurers and the identifier of the first key group (hereinafter referred to as association relationship 2), or the second association relationship may include the association relationship between the identifier of the first group, the identifiers of the P measurers and the identifier of the first key group (hereinafter referred to as association relationship 3).
- the first key set may include the keys of P measurers in the first group.
- the first key set may include the public keys of P measurers.
- the first key set corresponds to a first network element.
- each key in the first key set may be used only to sign evidence obtained by measuring the first network element.
- the first measurer obtains evidence by measuring other network elements (e.g., the second network element)
- the first measurer does not use the keys in the first key set to sign the evidence, but instead uses the keys in other key sets (e.g., the second key set) to sign the evidence.
- each key in the first key set may be used to sign evidence obtained by the measurer from any network element.
- the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the M measurands in the first key group according to predefined or preconfigured rules. For instance, if the second association includes association 1 or association 3, the key management network element can directly determine the identifier of the first key group based on the third request and the second association. As another example, if the second association includes association 2, the key management network element can determine the identifier of the first key group based on the third request, the third association, and the second association.
- the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the M measurands in the first key group according to predefined or preconfigured rules. For instance, if the second association includes association 2 or association 3, the key management network element can directly determine the identifier of the first key group based on the third request and the second association. As another example, if the second association includes association 1, the key management network element can determine the identifier of the first key group based on the third request, the third association, and the second association.
- the third information can also indicate the keys of the P measurands, or in other words, the keys of all measurands in the first group.
- the scheme for indicating the keys of the P measurands using the third information is described below.
- the key management network element can determine the keys for P measurands based on pre-configured or pre-defined rules.
- the key management network element pre-configures or predefines the association between the keys of the first validator and P measurands. Upon receiving a request from the first validator, the key management network element can determine the keys of the P measurands.
- the key management network element pre-configures or predefines the association between the identifier of the first measurand and the keys of P measurands. If the third request includes the identifier of the first measurand, the key management network element can determine the keys of the P measurands; or, if the third request includes the identifier of the first group, the key management network element can determine that the first measurand exists in the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the P measurands.
- the key management network element pre-configures or pre-defines the association between the identifier of the first group and the keys of P measurands. If the third request includes the identifier of the first group, the key management network element can determine the keys of the P measurands; or, if the third request includes the identifier of the first measurand, the key management network element can determine that the first measurand belongs to the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the P measurands.
- the association between the identifier of the first group and the identifier of the first measurer can also be classified as a third association.
- the third association can further include the association between the identifier of the first group and other measurers.
- the third association could include the association between the identifier of the first group and the identifiers of the P measurers within the first group.
- the key management network element can determine the keys of M measurands according to the second association relationship, thereby reducing the latency of finding the keys of M measurands.
- method 500 further includes: S570, the key management network element determines the keys of the P measurands based on the third request and the second association.
- the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the P measurands in the first key group according to predefined or preconfigured rules. See the previous examples for further details.
- the aforementioned third association can be pre-configured or pre-defined by the key management network element, or it can be received by the key management network element from other network elements (e.g., orchestration management network elements).
- the orchestration management network element can be MANO, VNFM, VIM, or other network elements.
- This application does not limit the orchestration management network element to network elements in NFV systems; it can also be network elements in other communication systems, such as core network elements.
- This application does not limit the specific name of the orchestration management network element; for example, the orchestration management network element can also be called a network element or other names.
- the orchestration management network element may include or be applied to VNFM. For instance, after instantiation, VNFM may send information indicating a third association to the key management network element. Alternatively, the key management network element may send information requesting a third association to VNFM. Based on this request, VNFM may send information indicating the third association to the key management network element.
- VNFM may orchestrate VM1-VM7 into the same VNF instance, where VM1-VM3 are located in the same physical device as measurer 1 (denoted as Att1), VM2-VM5 are located in the same physical device as measurer 2 (Att2), and VM6-VM7 are located in the same physical device as measurer 3 (denoted as Att3).
- VNFM may determine that the third association is that Att1, Att2, and Att3 correspond to group 1.
- VNFM may determine that Att1, Att2, and Att3 belong to the same group.
- Att1 can be in group 1 or group 2.
- Att1 When Att1 is in group 1, its identifier is identifier 1.
- Att1 When Att1 is in group 2, its identifier is identifier 2.
- Group 1 corresponds to VNF1
- group 2 corresponds to VNF2.
- Att1 measures VNF1 the identifier of the group to which Att1 belongs is the identifier of group 1, and Att1's identifier is identifier 1.
- Att1 measures VNF2 the identifier of the group to which Att1 belongs is the identifier of group 2, and Att1's identifier is identifier 2.
- the aforementioned second association can be pre-configured or pre-defined by the key management network element, or it can be determined by the key management network element when generating the keys of each measurand in the first group, or it can be determined by the key management network element at any time after generating the keys of each measurand in the first group.
- S520 includes: a first verifier verifying whether the number of measurands on which the first signature is based is greater than or equal to a threshold value; if the number of measurands on which the first signature is based is greater than or equal to the threshold value, the first verifier verifying whether the first signature is valid; if the first signature is valid, the first verifier verifying whether the first evidence is valid.
- the threshold value is used to indicate the minimum number of measurands on which the first signature is based.
- the threshold value indicates the minimum number of measurers on which the signature corresponding to the first network element is based. That is, the threshold value can be applied to the first network element.
- the signature corresponding to the first network element can include a first signature.
- the signature corresponding to the first network element can be understood as a signature of the evidence obtained by measuring the first network element.
- this application is not limited to this, and the threshold value can also be applied to more network elements, including the first network element.
- the threshold value indicates the minimum number of measurands on which the signature of the first measurand is based. That is, the threshold value can be specific to the first measurand.
- the signature of the first measurand may include a first signature.
- the signature of the first measurand can be understood as a signature in which the first measurand participates.
- this application is not limited to this, and the threshold value can also be specific to more measurands, including the first measurand.
- the threshold value indicates the minimum number of measurands on which the signature verified by the first validator is based. That is, the threshold value can be specific to the first validator.
- the signature verified by the first validator may include the first signature.
- this application is not limited to this, and the threshold value may also be specific to more validators, including the first validator.
- the threshold value can be a positive integer, a percentage, a fraction, a decimal, or other forms.
- the threshold value can be a positive integer, such as 1, 2, or 3; the threshold value can be a percentage, such as 33%, 66%, or 100%; the threshold value can be a fraction, such as 1/3, 2/3, or 1; the threshold value can be a decimal, such as 0.33, 0.66, or 1.
- the threshold value can be pre-configured or predefined.
- the threshold value can be determined by the first verifier.
- the first verifier can determine the threshold value based on the security level of the first network element or the first metric. For example, a higher threshold value indicates a lower security level, while a lower threshold value indicates a higher security level.
- the first verifier can determine the threshold value based on threshold value indication information.
- This threshold value indication information can come from the first device. That is, the first device can send threshold value indication information to the first verifier.
- the first device can include or be applied to: PACF, dependent party, SEPP, or other devices.
- the first device can also be any module or component of an NF or RAN that uses the verification result (or measurement result).
- the threshold value indication information sent by the first device may only indicate a threshold value in percentage, fraction, or decimal form, and the first verifier can determine a threshold value in positive integer form based on this threshold value indication information.
- the first device may not know the specific number of measurers in the first group, and thus only indicate a threshold value in percentage, fraction, or decimal form; while the first verifier may know the specific number of measurers in the first group, and thus determine a threshold value in positive integer form based on the indication from the first device.
- the first verifier may send a threshold value indication to the first measurer, enabling the first measurer to determine the minimum number of measurers on which the first signature is based, thereby improving the quality of the first signature, i.e., increasing the probability that the first signature will be successfully verified.
- the threshold value is denoted as Q.
- Q is a positive integer.
- Those skilled in the art will understand that the following example is not intended to limit the threshold value to only positive integers.
- the threshold value in the embodiments of this application can also be in other forms, which are just examples and will not be repeated here.
- Q is a positive integer less than or equal to P.
- the first verifier can determine that the number of measurands on which the first signature is based is greater than or equal to a threshold value, and thus continue verifying whether the first signature and the first evidence are valid.
- M ⁇ Q the first verifier can determine that the number of measurands on which the first signature is based does not meet the threshold value, and thus determine that the first signature verification has failed.
- the first verifier determines that the number of measurands on which the first signature is based does not meet the threshold value, it can stop verification, determine that the first network element verification has failed, and thus reduce verification overhead.
- This application does not specify the exact name of the first signature, which may also be referred to as the threshold signature, threshold signature information, or other names.
- the public keys of the M measurers can also be called threshold signature public keys.
- the private key of the first measurer can also be called threshold signature private keys.
- the first verifier can verify whether the measurer on which the first signature is based meets the threshold requirement. If the threshold requirement is not met, no further verification is performed on the first signature or the first evidence, thereby reducing verification overhead.
- the threshold is set low, the first signature does not need to be based on all measurers in the first group, thus saving the overhead of measurer signing.
- the threshold is set high, the first signature needs to be based on a larger number of measurers in the first group, thereby improving the security of remote verification.
- Method 500 has been introduced above with reference to Figure 5.
- Method 500 can be understood as the verification phase in remote proof.
- remote proof also includes a measurement phase.
- Some schemes for the measurement phase are introduced below with reference to Figure 6.
- Figure 6 is a schematic flowchart of another communication method 600 provided in an embodiment of this application. Method 600 can be combined with method 500. Optional operations in method 600 are shown in dashed lines in Figure 6. Method 600 will be described below with reference to Figure 6.
- the first measurer determines the first evidence based on the first network element.
- S610 includes: a first measurer measuring a first network element to obtain first evidence. That is, the first evidence can be obtained by the first measurer measuring the first network element.
- S610 includes: a first measurer determining first evidence based on evidence from at least one measurer.
- at least one measurer belongs to a first group.
- at least one measurer may be one of the M measurers who participated in the signing.
- the evidence from at least one measurer may include evidence obtained by at least one measurer measuring the first network element respectively.
- at least one measurer may include the first measurer, or may not include the first measurer. That is, the first evidence determined by the first measurer may be based on at least one measurer including itself, or may be based on at least one measurer other than itself. This application does not limit this.
- the first metric may receive evidence from at least one of the aforementioned metric providers.
- the at least one metric may include metric provider A, and the first metric may receive evidence from metric provider A, which may be obtained by metric provider A measuring the first network element.
- the first measurement agent may send a request message to at least one of the aforementioned measurement agents, which can be used to request evidence.
- the at least one measurement agent may include measurement agent A, and the first measurement agent may send a request message to measurement agent A, which can be used to request evidence from measurement agent A.
- Measurement agent A may measure the first network element based on the request message, obtain evidence, and send the evidence back to the first measurement agent.
- the first measurer determines the first signature based on the keys of the M measurers and the first evidence.
- the first measurer can determine the first signature based on at least one of the public keys of the M measurers, the private key of the first measurer, or a random number.
- the random number can be provided by the first verifier.
- the public key of the first measurer can be denoted as public key (pk)1, and the private key of the first measurer can be denoted as private key (sk)1.
- the public keys of the measurers other than the first measurer among the M measurers are denoted as pk2, ..., pkM .
- the first measurer can determine the first signature based on sk1, pk1, pk2, ..., pkM and a random number (nonce) using the threshold elliptic curve digital signature algorithm.
- method 600 after S620, method 600 also includes S510. That is, the first measurer can send first information to the first verifier.
- the first measurand receives the fourth information from the third measurand.
- the third measurand sends the fourth information to the first measurand.
- the third measurer can be one of the M measurers.
- the third measurer can belong to the first group and be one of the P measurers in the first group.
- the fourth information is used to indicate the key of the third measurer.
- the fourth information is used to indicate the public key of the third measurer.
- the fourth information can be direct indication information; for example, it may include information about the third measurer's key.
- the fourth information can also be indirect indication information; for example, the first verifier can determine the third measurer's key based on the fourth information.
- the third measurer can send its key to the first measurer, thereby assisting the first measurer in signing using the keys of M measurers.
- the above-mentioned S630 can be executed proactively by the third measurement agent, or it can be executed by the third measurement agent based on a request.
- the request on which the third measurement agent is based can come from the first measurement agent (see S635 for example), or it can come from other network elements (e.g., the first verifier).
- the first validator can send measurement requests to multiple measurers, including a third measurer.
- the third measurer can determine the first measurer based on a consensus algorithm, or it can determine the first measurer according to pre-configured or predefined rules.
- the third measurer can send the aforementioned fourth information to the first measurer. That is, even if the third measurer does not receive a request from the first measurer, it can still send the fourth information indicating its key to the first measurer.
- the method further includes: S635, the first measurand sends a fourth request to the third measurand.
- the third measurand receives the fourth request from the first measurand.
- the fourth request is used to request the key of the third measurand.
- S630 includes: in response to the fourth request, the third measurand sends a fourth message to the first measurand.
- the first measurand can send a request to the third measurand, thereby triggering the third measurand to send its key to the first measurand.
- the fourth request includes at least one of the first evidence, measurement information, or the first signature.
- method 600 further includes: the third measurer determining, based on the fourth request, whether to provide its own key.
- Measurement information can be used to indicate how the measurement was performed.
- measurement information can allow a third-party measurer to know how the evidence was generated, thereby determining whether to provide the third-party measurer's key.
- this measurement information is used to indicate the content of the measurement and/or the measurement strategy.
- the measurement content can indicate the object being measured.
- a first network element e.g., the measurement content can include the identifier of the first network element (e.g., VNF ID).
- the third measurement agent can examine the measurement content to determine whether to provide its key. For example, if the first network element is a measurement object permitted by the third measurement agent, the third measurement agent can determine to provide the key, i.e., execute S630. Alternatively, the third measurement agent can check other conditions used to determine whether to execute S630 (e.g., measurement policy). For example, if the first network element is not a measurement object permitted by the third measurement agent, the third measurement agent can determine not to provide the key (or refuse to provide the key), i.e., not execute S630.
- the third measurement agent can check other conditions used to determine whether to execute S630 (e.g., measurement policy). For example, if the first network element is not a measurement object permitted by the third measurement agent, the third measurement agent can determine not to provide the key (or refuse to provide the key), i.e., not execute S630.
- the measurement strategy can indicate the measurement strategy.
- the measurement strategy may include at least one of: collecting data from the startup state of the first network element, collecting data from the running state of the first network element, having low security requirements, or having high security requirements.
- the third measurement agent can check the measurement policy to determine whether to provide its key. For example, if collecting data from the startup state of the first network element is a measurement policy allowed by the third measurement agent, then the third measurement agent can determine to provide the key, i.e., execute S630. Alternatively, the third measurement agent can check other conditions used to determine whether to execute S630 (e.g., measurement content). As another example, if collecting data from the running state of the first network element is a measurement policy not allowed by the third measurement agent, then the third measurement agent can determine not to provide the key (or refuse to provide the key), i.e., not execute S630.
- the third measurement agent can determine whether to verify the first measurement agent. For example, if the security requirements are high, the third measurement agent can verify the first measurement agent; for example, the third measurement agent can request the first measurement agent to provide evidence and verify the evidence provided by the first measurement agent. As another example, if the security requirements are low, the third measurement agent may not verify the first measurement agent. For example, in cases where security requirements are low, the third measurer may trust the first measurer to determine whether to execute S630, or the third measurer may examine other conditions used to determine whether to execute S630 (e.g., first evidence).
- the third measurer may trust the first measurer to determine whether to execute S630, or the third measurer may examine other conditions used to determine whether to execute S630 (e.g., first evidence).
- the third measurer can examine the first evidence to determine whether to provide its key. For example, the third measurer can measure the first network element to obtain the second evidence. The third measurer can compare the first and second evidence, and if the first and second evidence are highly consistent, determine to execute S630. Alternatively, the third measurer can examine other conditions used to determine whether to execute S630 (e.g., measurement information).
- the first signature can be used to protect the integrity of the message (i.e., the fourth request) and to allow other measurers (e.g., a third measurer) to verify the source of the message.
- the third measurer can check the first signature to determine whether its key should be provided. For example, if the third measurer verifies that the first signature is valid, it can determine to execute S630. Alternatively, the third measurer can check other conditions used to determine whether to execute S630 (e.g., measurement information). As another example, if the third measurer verifies that the first signature is invalid, it can determine not to execute S630.
- the fourth request may include at least one of the first evidence, measurement information, or the first signature.
- the third measurer may verify the information carried in the fourth request, or may request information not carried in the fourth request from the first measurer.
- the fourth request may include measurement information but not the first evidence.
- the measurement information indicates a measurement strategy with high security requirements.
- the third measurer may request the first measurer to provide the first evidence, or the third measurer may directly refuse to provide its own key.
- the third evaluator may verify all the information carried in the fourth request, some of the information carried in the fourth request, or none of the information carried in the fourth request. For example, if the fourth request includes the first evidence and the measurement information, the third evaluator may verify both the first evidence and the measurement information, or only one of the first evidence or the measurement information, or may not verify either the first evidence or the measurement information.
- the fourth request may also be called a signature request or other names.
- the fourth request may include at least one of the first evidence, measurement information, or the first signature.
- the third measurer can verify the information carried in the fourth request to determine whether to send the third measurer's key to the first measurer. This scheme avoids the third measurer providing its key to the first measurer when the first measurer's security is low, thereby further improving the security of remote proof.
- the first measurand receives the fifth information from the key management network element.
- the key management network element transmits the fifth information to the first measurand.
- the fifth information is used to indicate the keys of the M measurers.
- the fifth information can be direct information, for example, it may include information about the keys of the M measurers.
- the fifth information can also be indirect information, for example, the first verifier can determine the keys of the M measurers based on the fifth information.
- the fifth information may include the encrypted keys of the M measurers.
- the fifth piece of information, used to indicate the keys of the M measurands can include: the fifth piece of information indicating only the keys of the M measurands, and not the keys of other measurands besides the M measurands; or it can include: the fifth piece of information indicating both the keys of the M measurands and the keys of other measurands besides the M measurands.
- the fifth piece of information can be used to indicate the keys of P measurands. In this way, the first measurand can filter out the keys of the M measurands from the keys of the P measurands, thereby executing S620.
- the keys of the M measurands may include the public keys of the M measurands and the private key of the first measurand.
- the keys of the P measurands may include the public keys of the P measurands and the private key of the first measurand.
- the fifth message may be carried in the AIK issuance response, but this application is not limited to this, and the fifth message may also be carried in other messages.
- the key management network element can generate or look up the keys of M measurands based on the second association and/or the third association, thereby performing S640.
- the keys used to determine the M measurands for the first signature can be indicated by the key management network element, thus eliminating the need to obtain the keys of other measurands through interaction. Therefore, the above scheme can reduce the latency of determining the first signature, thereby reducing the latency of remote proof.
- the first verifier receives the seventh message from the first device.
- the first device sends the seventh message to the first verifier.
- the seventh piece of information can be used to request measurement.
- the seventh piece of information can be used to request measurement of the first network element.
- the seventh piece of information includes the identifier of the first network element, such as the VNF ID. This application does not limit the specific name of the seventh piece of information; it can also be called a measurement request message or other names.
- the first verifier sends a first request to measure the first network element. Specifically, this may include one of steps S660, S662, or S664.
- the first verifier sends a first request to the first measurer.
- the first measurer receives the first request from the first verifier.
- the first request is used to request measurement of the first network element.
- S660 includes: in response to the seventh information, the first verifier sends the first request to the first metric.
- This application does not specify the exact name of the first request, which may also be referred to as a measurement request, a remote proof request, or other names.
- the first request can be sent to the first measurement subject.
- the above scheme can reduce signaling overhead.
- the first verifier sends a first request to the fourth measurer.
- the fourth measurer receives the first request from the first verifier.
- S662 includes: in response to the seventh message, the first verifier sends a first request to the fourth measurer.
- the fourth measurer can be any one of the P measurers in the first group.
- the first measurer and the fourth measurer can be different or the same.
- the measurer requested by the first validator and the measurer responding to the request can be different.
- the fourth measurer can select the measurer responding to the request (e.g., the first measurer) based on the first request and through a consensus algorithm.
- the first verifier sends a first request to any one of the measurers in the first group. As long as one measurer responds, it can be considered a response from the first group. In this way, the verification (or measurement) requester (e.g., the first device) does not know the identity of the specific measurer that responded, thereby protecting the privacy of the measurers.
- the first verifier sends a first request to N measurers.
- the N measurers receive the first request from the first verifier.
- S664 includes: in response to the seventh message, the first verifier sends a first request to the N measurators.
- the N measurers belong to the first group, where N is an integer greater than or equal to 2 and less than or equal to P.
- N metrics may include M metrics. In other examples, N metrics may partially overlap with M metrics. For example, the fifth metric in the N metrics may not belong to the M metrics, and the sixth metric in the M metrics may not belong to the N metrics.
- the N measurers may include the first measurer. In other examples, the N measurers do not include the first measurer.
- N measurands can use a consensus algorithm to elect a responding measurand (e.g., the first measurand).
- the elected measurand may be one of the N measurands or may not belong to any of the N measurands.
- each of the N measurands independently performs the following operations: measures the first network element to obtain evidence; obtains a signature based on the evidence and a key; and sends information indicating the evidence and/or the signature to the first verifier.
- the signature of the evidence can be based on the key of only one measurand or on the keys of multiple measurands. That is, some or all of the N measurands can execute the above-described scheme performed by the first measurand. For example, some or all of the N measurands can interact with other measurands to collect the keys of multiple measurands, thereby determining the signature based on the keys of multiple measurands and the evidence.
- some or all of the N measurands can receive instruction information on the keys of multiple measurands from the key management network element, thereby determining the signature based on the keys of multiple measurands and the evidence.
- the fifth measurand among the aforementioned N measurands can execute the scheme performed by the first measurand, except that the fifth measurand does not sign based on the keys of M measurands, but rather based on the keys of multiple measurands, including the fifth measurand itself.
- the first verifier can send a first request to multiple measurands.
- a single point of failure i.e., when one measurand cannot respond
- other measurands besides the one that has the single point of failure can respond based on the first request, thereby ensuring the smooth progress of remote proof.
- the first request includes a nonce.
- This nonce can be used to ensure the freshness of the measurement results.
- the first request is used to indicate a threshold value.
- the first request may carry indication information of the threshold value.
- the first request can be used to indicate a threshold value, so that the measurand that receives the first request can determine the minimum number of measurands on which the signature is based, thereby improving the quality of the signature, that is, increasing the probability that the signature will be successfully verified.
- the method before step S660, the method further includes: S670, whereby the first verifier determines the first metric based on the identifier of the first network element and the first association relationship.
- the identifier of the first network element may come from the seventh information.
- the first association relationship may include at least one of the following: the association relationship between the identifier of the first group and the identifier of the first network element (denoted as association relationship 4), the association relationship between the identifiers of P measurands and the identifier of the first network element (denoted as association relationship 5), or the association relationship between the identifier of the first group, the identifiers of P measurands and the identifier of the first network element (denoted as association relationship 6).
- the key management network element can determine the first measurer based on association 4 and the third association.
- the key management network element can determine the first measurer based on association 5.
- the key management network element can determine the first measurer based on association 6.
- Determining the first measurer can include selecting a first measurer. For example, selecting a first measurer from P measurers in a first group. “Determining the first measurer” can also include determining the address of the first measurer, and then sending a first request to the first measurer based on that address.
- the method before step S660, the method further includes: S672, whereby the first verifier determines the fourth measurer based on the identifier of the first network element and the first association relationship.
- the key management network element can determine the fourth measurer based on association 4 and the third association.
- the key management network element can determine the fourth measurer based on association 5.
- the key management network element can determine the fourth measurer based on association 6.
- determining the fourth measurer may include selecting a fourth measurer. For example, selecting a fourth measurer from P measurers in a first group. “Determining the fourth measurer” may also include determining the address of the fourth measurer, and then sending a first request to the fourth measurer based on that address.
- the method before step S664, the method further includes: S674, where the first verifier determines N measurants based on the identifier of the first network element and the first association relationship.
- the key management network element can determine N measurement users based on association 4 and the third association.
- the key management network element can determine N measurement users based on association 5.
- the key management network element can determine N measurement users based on association 6.
- Determining N measurants can include selecting N measurants. For example, selecting N measurants from P measurants in a first group. “Determining N measurants” can also include determining the addresses of the N measurants, and then sending a first request to the N measurants based on those addresses.
- the first verifier can quickly determine the measurer to send the first request based on the first association, thereby reducing the processing latency of finding the measurer.
- the aforementioned first association relationship may be pre-configured or pre-defined in the first authenticator, or it may be received by the first authenticator from other network elements (e.g., orchestration management network element or key management network element).
- network elements e.g., orchestration management network element or key management network element.
- method 600 further includes S680, whereby the first validator receives second information from a key management network element or an orchestration management network element.
- the key management network element or the orchestration management network element sends the second information to the first validator.
- the second information is used to indicate the first association.
- the second information can be direct indication information, for example, the second information may include information about the first association.
- the second information can also be indirect indication information, for example, the first verifier can determine the first association based on the second information.
- the first validator can obtain the first association from the key management network element.
- the first validator can obtain the first association from the orchestration management network element.
- the aforementioned first association relationship can be pre-configured or pre-defined in the key management network element, or it can be received by the key management network element from other network elements (e.g., orchestration management network element).
- method 600 further includes: the first verifier sending a sixth request to the key management network element or the orchestration management network element, the sixth request being used to request the first association relationship.
- method 600 further includes: S690, the key management network element receives sixth information from the orchestration management network element.
- the orchestration management network element sends the sixth information to the key management network element.
- the sixth information is used to indicate the first association.
- the sixth information can be direct information, for example, it can include information about the first association.
- the sixth information can also be indirect information, for example, the first verifier can determine the first association based on the sixth information.
- the first validator can receive the aforementioned second information from the key management network element.
- the first validator can also send the aforementioned sixth request to the key management network element.
- the first validator may not need to obtain the first association from the key management network element.
- the first validator may receive the aforementioned second information from the orchestration management network element.
- the first validator may also send the aforementioned sixth request to the orchestration management network element.
- method 600 further includes: S692, whereby the key management network element sends a fifth request to the orchestration management network element.
- the orchestration management network element receives the fifth request from the key management network element.
- the fifth request is used to request the first association.
- the orchestration management network element may include or be applied to the VNFM.
- the VNFM may send the aforementioned sixth information to the key management network element, and/or send the aforementioned second information to the first validator.
- the VNFM may send the aforementioned sixth information to the key management network element based on the aforementioned fifth request, and/or the VNFM may send the aforementioned second information to the first validator based on the aforementioned sixth request.
- method 600 may sequentially include: S650, S670, S660, S610, S635, S630, and S620. In other possible implementations, method 600 may sequentially include: S650, S672, S662, S610, S635, S630, and S620. In still other possible implementations, method 600 may sequentially include: S650, S674, S664, S610, S635, S630, and S620.
- method 600 may include: S650, S670, S660, S610, and S620.
- method 600 may also include S640.
- method 600 may include: S650, S672, S662, S610, and S620.
- method 600 may also include S640.
- method 600 may include: S650, S674, S664, S610, and S620.
- method 600 may also include S640.
- Method 600 can be understood as the measurement phase in remote proof.
- remote proof also includes a key configuration phase.
- Several schemes for the key configuration phase are described below with reference to Figure 7. It is understood that the key configuration phase, measurement phase, and verification phase mentioned in this application are merely for ease of understanding; these three phases can be executed separately (the execution order is not limited) or simultaneously.
- the key configuration phase may have already been completed, may not have started, or may be in progress.
- the first verifier sends a first request to the first measurement device.
- the first measurement device may be unable to complete the signature due to the lack of key configuration.
- the first measurement device can initiate the key configuration phase scheme.
- the first measurement device can also initiate the key configuration phase scheme if the key configuration phase is incomplete.
- Figure 7 is a schematic flowchart of another communication method 700 provided in an embodiment of this application. Method 700 can be combined with method 500 or method 600. Optional operations in method 700 are shown in dashed lines in Figure 7. Method 700 will be described below with reference to Figure 7.
- method 700 may include S710 or S712.
- S710 establishes a secure connection between the key management network element and the first measurer.
- the key management network element establishes a secure connection with some or all of the P measurands in the first group.
- some or all of the P measurands include the first measurand.
- the following description uses the establishment of a secure connection between the key management network element and the first measurand as an example. The process of establishing secure connections between other measurands and the key management network element can be found in the following description.
- the EK certificate can be pre-configured in the first measurement unit (TMU).
- TMU first measurement unit
- the EK certificate can be pre-configured in the first TMU through hardware flashing or software pre-installation.
- the specific pre-configuration method depends on the security capabilities of the first TMU.
- the EK certificate can be understood as a long-term certificate or root certificate and can be verified by key management network elements.
- the EK certificate can also be referred to as the TPM's EK certificate.
- An AIK certificate is a session certificate used for measurement, which may be applied for by the first measurement provider for a single measurement (e.g., a measurement triggered by the first request mentioned above).
- an AIK certificate may be used for multiple measurements.
- an expiration policy for the AIK certificate may be pre-configured in the first measurement provider, which can be used to indicate the number of times the AIK certificate is used for measurement. For example, the number of times the AIK certificate is used for measurement is X, where X is a positive integer. When the number of times the AIK certificate is used for measurement reaches X, the AIK certificate becomes invalid.
- the first measurer can generate an AIK signing request.
- the first measurer can encrypt the AIK signing request using the public key provided by the key management network element.
- the first measurer can send an AIK signing request to the key management network element.
- the key management network element receives the AIK signing request from the first measurer.
- the AIK signing request may include request information and an EK certificate.
- the request information can be used to request the key management network element to issue an AIK certificate.
- the key management network element can verify AIK signing requests.
- the key management network element can check the validity (or legitimacy) of the EK certificate. If the EK certificate is valid, it determines that an AIK certificate will be issued. If the EK certificate is invalid, it determines that an AIK certificate will not be issued.
- the key management network element issues an AIK certificate to the first measurer, and the AIK certificate can be encrypted using the EK's public key.
- the key management network element can send the encrypted AIK certificate to the first measurement user.
- the first measurement user receives the encrypted AIK certificate from the key management network element.
- the first measurer decrypts and saves the AIK certificate.
- the key management network element determines the first association relationship.
- the key management network element can determine the first association by executing S690 (or S690 and S692).
- the key management network element receives a key generation request from the first measurer.
- the key management network element receives key generation requests from some or all of the P measurands in the first group.
- method 700 when performing S710, method 700 may include S730; when performing S712, method 700 may include S732.
- the key generation request may also be called an AIK generation request, a metric key generation request, or other names. This application does not limit the specific name of the key generation request.
- the key management network element generates keys.
- a key management network element can generate keys for some or all of the P measurands in the first group.
- the keys can include public and private keys.
- the key management network element may determine the identifier of the first signature group simultaneously with or after S740.
- the first signature group may include the keys of some or all of the P measurands in the first group.
- the key management network element can determine the second association.
- the key management network element can generate a key for the measurer based on the measurer's AIK certificate. For instance, it can generate a key for the first measurer based on the first measurer's AIK certificate.
- the key management network element can generate a key by signing a key provided by the measurer. For instance, the first measurer can send a first public key and a first private key, which it generated, to the key management network element. The key management network element can then sign the first public key to generate a second public key and sign the first private key to generate a second private key. Furthermore, the key management network element can send the encrypted second public key and second private key to the first measurer.
- the key management network element sends key indication information to the first measurement subject.
- the first measurement subject receives the key indication information from the key management network element.
- Key indication information can be used to indicate the key.
- key indication information may include the encrypted key.
- the first measurer decrypts the key based on the aforementioned indication information to obtain the key.
- the key management network element sends key instruction information to some or all of the P measurands in the first group.
- some or all of the P measurands in the first group receive the key instruction information from the key management network element.
- method 700 when performing S730, method 700 may include S750; when performing S732, method 700 may include S752.
- the key indication information sent to Att1 indicates sk1 and pk1, where sk1 represents Att1's private key and pk1 represents Att1's public key.
- the key indication information sent to Att2 indicates sk2 and pk2, where sk2 represents Att2's private key and pk2 represents Att2's public key.
- the key indication information sent to Att3 indicates sk3 and pk3, where sk3 represents Att3's private key and pk3 represents Att3's public key.
- the key indication information sent to the first measurand can be third information.
- the key management network element can generate or look up the private key of the first measurand and the public keys of the M measurands based on the third association.
- the key management network element can send third information to the first measurand. This third information is used to indicate the keys of the M measurands.
- the keys of the M measurands include the private key of the first measurand and the public keys of the M measurands.
- the measurer's key does not need to be requested for every measurement; an expiration policy can be pre-configured, and a single measurement key request can be used to perform multiple measurements.
- Figure 8 is a schematic flowchart of another communication method 800 provided in an embodiment of this application. Method 800 can be combined with method 500, method 600, or method 700. Optional operations in method 800 are shown in Figure 8 with dashed lines. Method 800 will be described below with reference to Figure 8.
- the first verifier sends a second request to at least one second measurer.
- at least one second measurer receives the second request from the first verifier.
- the second request is used to request measurement of the first network element. Further details regarding the second request can be found in the description of the first request above, and will not be repeated here.
- the second measurer belongs to the first group.
- each of the at least one second measurer mentioned above belongs to the first group.
- the second measurer may not belong to the aforementioned N measurers.
- the second measurer is different from the first measurer.
- this application does not limit whether the second measurer belongs to the M measurers.
- the second measurer may or may not belong to the M measurers. In other words, the second measurer may or may not participate in the generation process of the first signature.
- the first verifier sets the timer.
- the first verifier can set a timer according to a pre-configured duration.
- the start time of the timer can be the execution time of S810, or a certain time after S810 is executed.
- the first verifier receives rejection information from each of the at least one second measurer.
- each of the at least one second measurer sends rejection information to the first verifier.
- the rejection information can be used to indicate a rejection response, a rejection metric, a rejection signature, or other forms of information.
- the first verifier can determine, based on the rejection information, that at least one second metric provider will not assist in completing the remote proof.
- the first condition can be used to trigger the first verifier to send a first request to all other measurators except for at least one second measurator.
- the first condition includes: the first verifier receiving rejection information from each of the at least one second measurer, and/or the first verifier not receiving a response from the at least one second measurer within a predetermined time period.
- the predetermined time period can be indicated by the start and end times of the timer. In other examples, the predetermined time period can be indicated by the start time and preset duration of the timer.
- the first condition includes the first verifier receiving rejection information from each of the at least one second measurer
- S820 may or may not be executed.
- the first condition includes the first verifier not receiving a response from the at least one second measurer within a predetermined time period
- S822 may or may not be executed.
- the first verifier may choose not to receive rejection information from each of the at least one second measurer, or, after receiving rejection information from at least one second measurer, may ignore the rejection information.
- the first condition may also be referred to as the local policy or other names.
- the first validator may have pre-configured or obtained a first association relationship from the key management network element (or orchestration management network element) to determine at least one second measurand, and then execute S810.
- the first validator may cache the aforementioned first association relationship. In this way, the first validator can send a first request to one of the P measurands (e.g., the first measurand, the fourth measurand, or N measurands) based on the first association relationship.
- the first validator does not cache the aforementioned first association relationship to save storage space.
- the first validator does not configure or obtain the first association relationship from the key management network element (or orchestration management network element).
- the first validator can obtain the list of measurants for the first group from the key management network element (or orchestration management network element). The following description is based on S830-S850.
- the first validator sends a query request to the key management network element or the orchestration management network element.
- the key management network element or the orchestration management network element receives the query request from the first validator.
- the query request may include the identifier of at least one second measurand.
- the key management network element or orchestration management network element determines the list of measurands.
- the list of measurands can be the list of measurands in the first group.
- the list of measurands for the first group may include the identifiers of P measurands. That is, the list of measurands for the first group includes the identifiers of all measurands in the first group.
- the list of measurands for the first group may include the identifiers of the measurands other than at least one of the P measurands. That is, the list of measurands for the first group does not include the identifiers of the measurands carried in the query request, i.e., the identifiers of the second measurands.
- the list of measurants for the first group may include the identifiers of the first measurant, the fourth measurant, or N measurants. That is, the list of measurants for the first group includes the identifiers of the measurants for the recommendation request.
- the key management network element or the orchestration management network element can determine the list of measurands for the first group based on the query request and the first association relationship (or the third association relationship). For instance, the key management network element or the orchestration management network element can determine that the identifier of at least one second measurand corresponds to the identifier of the first group in the first association relationship, and the identifier of the first group corresponds to the identifiers of P measurands in the first group, thereby determining the list of measurands for the first group.
- the list of measurers can be a list of measurers from multiple groups. These multiple groups may include a first group.
- the key management network element or the orchestration management network element sends an instruction message for the measurand list to the first validator.
- the first validator receives the instruction message for the measurand list from the key management network element or the orchestration management network element.
- the first verifier can determine the identifiers of the P measurers corresponding to the identifier of the first network element through the first association (or the first association and the third association), thereby filtering out the measurers from the P measurers in the measurer list. For example, the first verifier can filter out the first measurer, the fourth measurer, or N measurers.
- the first verifier can execute S660, S662, or S664. That is, if the first condition is met, S660, S662, or S664 will be executed.
- a request can be sent to other measurement users (e.g., the first measurement user, the fourth measurement user, or N measurement users) to avoid the failure of some measurement users affecting the remote proof process, thereby increasing the resilience of the remote proof.
- the communication device may include hardware structures and/or software modules, implementing the aforementioned functions in the form of hardware structures, software modules, or a combination of hardware structures and software modules. Whether a particular function is implemented in the form of hardware structures, software modules, or a combination of hardware structures and software modules depends on the specific application and design constraints of the technical solution.
- FIG. 9 is a schematic block diagram of a communication device 1000 according to an embodiment of this application.
- the communication device 1000 includes a processor 1010 and a communication interface 1020.
- the processor 1010 and the communication interface 1020 can be interconnected via a bus.
- the communication device 1000 can be a first authenticator, a first measurer, a key management network element, or a third measurer.
- the communication device 1000 may further include a memory 1040.
- the memory 1040 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), cache, erasable programmable read-only memory (EPROM), synchronous dynamic random access memory (SDRAM), hard disk drive (HDD), solid-state drive (SSD), or compact disc read-only memory (CD-ROM).
- RAM random access memory
- ROM read-only memory
- EPROM erasable programmable read-only memory
- SDRAM synchronous dynamic random access memory
- HDD hard disk drive
- SSD solid-state drive
- CD-ROM compact disc read-only memory
- the memory 1040 is used to store related instructions and/or data.
- the memory 1040 may be integrated with the processor 1010 or disposed separately.
- Processor 1010 may include one or more of the following: a central processing unit (CPU), an application-specific integrated circuit (ASIC), a digital signal processor (DSP), a microprocessor unit (MPU), a microcontroller unit (MCU), a graphics processing unit (GPU), a field-programmable gate array (FPGA), an artificial intelligence processor (AI processor), or a neural processing unit (NPU).
- processor 1010 is a CPU, it may be a single-core CPU or a multi-core CPU. However, this application is not limited in this respect; processor 1010 may also be one or more GPUs, or one or more tensor processing units (TPUs).
- the communication device 1000 is the first verifier, and the processor 1010 is configured to perform the following operations: receive first information from the first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, M being an integer greater than 1; verify the first signature and the first evidence according to the keys of the M measurers.
- the communication device 1000 is the first measurer
- the processor 1010 is configured to perform the following operations: determine the first evidence based on the first network element; determine the first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; and send the first information to the first verifier, wherein the first information includes the first signature and the first evidence.
- the communication device 1000 is a key management network element
- the processor 1010 is configured to perform the following operations: receive a third request from a first verifier, the third request being for requesting the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring the first network element, the M measurers being used to measure the first network element, and M being an integer greater than 1; send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
- the communication device 1000 is a third measurer
- the processor 1010 is configured to perform the following operations: generate fourth information, which is used to indicate the key of the third measurer; and send the fourth information to the first measurer.
- the communication device 1000 is responsible for executing the methods or steps related to the first verifier, first measurer, key management network element, or third measurer in the aforementioned method embodiments.
- the communication interface 1020 can be a transceiver.
- the transceiver may include a transmitter and a receiver, with the transmitter performing a transmission operation and the receiver performing a reception operation.
- the processor 1010 is used to control the transceiver to receive and/or transmit signals.
- the communication interface 1020 can also be a communication circuit, pins, input/output interfaces, bus, etc.
- the communication device 1000 may include a transmitter but not a receiver.
- the communication device 1000 may include a receiver but not a transmitter. Specifically, it depends on whether the above-described scheme performed by the communication device 1000 includes both transmitting and receiving actions.
- the communication device 1000 can be used to execute the scheme shown in Figures 5 to 8.
- the communication device 1000 is the first verifier, and the communication interface 1020 can be used to receive first information, etc.
- the communication device 1000 is the first measuring entity, and the communication interface 1020 can be used to send first information, etc.
- the transceiver unit 1110 may include a sending unit and a receiving unit.
- the sending unit is used to perform the sending action of the communication device, and the receiving unit is used to perform the receiving action of the communication device.
- the sending unit and the receiving unit are combined into one transceiver unit in this embodiment. This will be explained uniformly here and will not be repeated later.
- the transceiver unit 1110 can implement the corresponding communication functions.
- the transceiver unit 1110 may also be referred to as a communication interface or a communication module.
- the communication device 1100 may further include a processing unit 1120, which is used to perform the processing, coordination and other steps involved in the communication device 1100.
- a processing unit 1120 which is used to perform the processing, coordination and other steps involved in the communication device 1100.
- the transceiver unit 1110 is used to receive third requests, etc.
- the processing unit 1120 can be used to determine the first evidence based on the first network element; determine the first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; the transceiver unit 1110 can be used to send the first information to the first verifier, the first information including the first signature and the first evidence.
- the transceiver unit 1110 can be used to receive a third request from a first verifier, the third request being used to request the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurers being used to measure the first network element, and M being an integer greater than 1; the transceiver unit 1110 can also be used to send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
- the processing unit 1120 can be used to generate fourth information, which is used to indicate the key of the third measurer; the transceiver unit 1110 can be used to send the fourth information to the first measurer.
- the communication interface 1120 can be a transceiver, input/output circuit, or communication interface of the chip.
- the processor 1110 can be a processor integrated on the chip, a microprocessor, or an integrated circuit.
- the sending operations of the first verifier, the first measurer, the key management network element, or the third measurer can be understood as the chip's output
- the receiving operations of the first verifier, the first measurer, the key management network element, or the third measurer in the above method embodiments can be understood as the chip's input.
- the transceiver unit 1110 can be the transceiver, input/output circuit, or communication interface of that chip.
- the processing unit 1120 can be a processor, microprocessor, or integrated circuit integrated on the chip.
- the sending operations of the first verifier, the first measurer, the key management network element, or the third measurer can be understood as the chip's output
- the receiving operations of the first verifier, the first measurer, the key management network element, or the third measurer in the above method embodiments can be understood as the chip's input.
- This application also provides another chip, including: an input interface, an output interface, and a processor, wherein the input interface, the output interface, and the processor are connected via an internal connection path, and the processor is used to execute code in a memory.
- the processor is used to perform the methods in the examples described above.
- the chip further includes a memory for storing computer programs or code.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本申请要求于2024年6月13日提交中国国家知识产权局、申请号为202410765502.7、申请名称为“通信方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 202410765502.7, filed on June 13, 2024, entitled "Communication Method and Apparatus", the entire contents of which are incorporated herein by reference.
本申请涉及通信技术领域,并且更具体地,涉及一种通信方法和装置。This application relates to the field of communication technology, and more specifically, to a communication method and apparatus.
随着嵌入式系统、网络物理系统和物联网设备等系统或设备的数量大幅增加,也扩大了攻击者的攻击面。The number of systems or devices, such as embedded systems, cyber-physical systems, and Internet of Things devices, has increased dramatically, expanding the attack surface for attackers.
通过远程证明(remote attestation,RA)技术可以验证这些系统或设备的安全性,从而确定这些系统或设备是否受到攻击。RA的执行主体可以包括度量者(attester)和验证者(verifier)。验证者可以请求度量者对上述系统或设备进行度量,以获得证据(evidence)。验证者可以根据这些证据,从而验证这些系统或设备的安全性。Remote attestation (RA) technology can be used to verify the security of these systems or devices, thereby determining whether they have been compromised. The entities performing RA can include an attester and a verifier. The verifier can request the attester to measure the system or device to obtain evidence. Based on this evidence, the verifier can then verify the security of the system or device.
然而,如何提高远程证明的安全性,是亟待解决的问题。However, how to improve the security of remote authentication is an urgent problem to be solved.
本申请提供一种通信方法和装置,通过基于多个度量者得到的签名,能够提高远程证明的安全性。This application provides a communication method and apparatus that can improve the security of remote proof by using signatures obtained from multiple measurers.
第一方面,提供了一种通信方法。第一方面提供的方法的执行主体可以为第一验证者,在不做特殊说明的情况下,本申请的中的第一验证者既可以指网络设备本身(例如,接入网设备、核心网设备或管理面设备),也可以是指网络设备中的组件(例如,处理器、芯片,或芯片系统等),或者,也可以是能实现全部或者部分网络设备功能的逻辑模块或软件等。为便于描述,下文以第一验证者为例进行描述。Firstly, a communication method is provided. The entity executing the method provided in the first aspect can be a first verifier. Unless otherwise specified, the first verifier in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions. For ease of description, the following description uses the first verifier as an example.
该方法包括:接收来自第一度量者的第一信息,该第一信息包括第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该第一签名所基于的度量者包括M个度量者,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数;根据该M个度量者的密钥,验证该第一签名和该第一证据。The method includes: receiving first information from a first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, and M being an integer greater than 1; and verifying the first signature and the first evidence according to the keys of the M measurers.
本领域技术人员可以理解,若不对证据进行签名,或签名仅基于一个度量者,在该度量者出现故障或恶意的情况下,远程证明的安全性将被降低。基于上述方案,验证者接收到的签名是基于M个度量者得到的,验证者可以根据上述M个度量者的密钥验证该签名和该证据,避免了单个度量者故障或恶意导致的错误,从而能够提高远程证明的安全性。并且,上述M个度量者能够度量第一网元,也就是说,参与签名的M个度量者能够度量同一个网元。相比于依次接收和验证各个度量者的签名的方案,上述方案中,验证者仅需进行一次接收和验证,即可实现远程证明,因此,上述方案能够提高远程证明的效率。Those skilled in the art will understand that if evidence is not signed, or if the signature is based on only one measurand, the security of remote proof will be reduced in the event of a failure or malicious intent on the part of that measurand. Based on the above scheme, the signature received by the verifier is based on M measurands. The verifier can verify the signature and the evidence using the keys of these M measurands, avoiding errors caused by the failure or malicious intent of a single measurand, thereby improving the security of remote proof. Furthermore, the M measurands can measure the same network element; that is, the M measurands participating in the signing can measure the same network element. Compared to schemes that sequentially receive and verify the signatures of each measurand, in the above scheme, the verifier only needs to perform one reception and verification to achieve remote proof. Therefore, the above scheme improves the efficiency of remote proof.
在一些实现方式中,该方法还包括:向该第一度量者发送第一请求,该第一请求用于请求度量该第一网元。In some implementations, the method further includes sending a first request to the first metric, the first request being used to request measurement of the first network element.
基于上述方案,第一请求可以向第一度量者发送。相比于向多个度量者发送度量请求的方案,上述方案可以减少信令开销。Based on the above scheme, the first request can be sent to the first measurement subject. Compared to the scheme of sending measurement requests to multiple measurement subjects, the above scheme can reduce signaling overhead.
在一些实现方式中,该方法还包括:向N个度量者发送第一请求,该第一请求用于请求度量该第一网元,该N个度量者属于第一群组,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,N为整数,N为大于或等于2且小于或等于P的整数,P大于或等于M的整数。In some implementations, the method further includes: sending a first request to N measurands, the first request being used to request measurement of the first network element, the N measurands belonging to a first group, the first group including P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, N being an integer greater than or equal to 2 and less than or equal to P, and P being an integer greater than or equal to M.
基于上述方案,第一验证者可以向多个度量者发送第一请求,在单点故障,即一个度量者无法响应的情况下,出现单点故障的度量者之外的其他度量者可以基于第一请求进行响应,从而保障远程证明的顺利进行。Based on the above scheme, the first verifier can send a first request to multiple measurands. In the event of a single point of failure, i.e., when one measurand cannot respond, other measurands besides the one that has the single point of failure can respond based on the first request, thereby ensuring the smooth progress of remote proof.
在一些实现方式中,该方法还包括:向至少一个第二度量者发送第二请求,该第二请求用于请求度量该第一网元。其中,向该第一度量者发送第一请求,可以包括:在满足第一条件的情况下,向该第一度量者发送该第一请求。或者,其中,向N个度量者发送第一请求,可以包括:在满足该第一条件的情况下,向该N个度量者发送该第一请求。其中,该第一条件包括:该第一验证者接收到来自该至少一个第二度量者中每个第二度量者的拒绝信息,和/或,该第一验证者在预定时间段内未接收到来自该至少一个第二度量者的响应。In some implementations, the method further includes: sending a second request to at least one second metric, the second request being used to request measurement of the first network element. Sending the first request to the first metric may include: sending the first request to the first metric if a first condition is met. Alternatively, sending the first request to N metrics may include: sending the first request to all N metrics if the first condition is met. The first condition includes: the first verifier receiving rejection information from each of the at least one second metric, and/or, the first verifier not receiving a response from the at least one second metric within a predetermined time period.
基于上述方案,本申请实施例在向一个或多个度量者发送度量请求之后,若上述度量者在预定时间段内未响应,和/或,上述度量者拒绝,则可以向其他度量者(例如,第一度量者或N个度量者)发送请求,避免部分度量者的故障影响远程证明的进行,从而增加了远程证明的韧性。Based on the above scheme, in this embodiment of the application, after sending a measurement request to one or more measurement users, if the measurement user does not respond within a predetermined time period and/or refuses, the request can be sent to other measurement users (e.g., the first measurement user or N measurement users) to avoid the failure of some measurement users affecting the remote proof process, thereby increasing the resilience of the remote proof.
在一些实现方式中,该第一请求用于指示门限值,该门限值用于指示该第一签名所基于的度量者的最小数量。In some implementations, the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
基于上述方案,第一请求可以用于指示门限值,使得接收到第一请求的度量者可以确定签名所基于的度量者的最小数量,避免由于第一签名所基于的度量者数量不满足门限值而无法通过验证,从而提高签名的质量,即,提高签名被验证成功的几率。Based on the above scheme, the first request can be used to indicate a threshold value, so that the measurand that receives the first request can determine the minimum number of measurands on which the signature is based, thus avoiding the failure to pass verification due to the number of measurands on which the first signature is based not meeting the threshold value, thereby improving the quality of the signature, that is, increasing the probability of the signature being successfully verified.
在一些实现方式中,该方法还包括:根据该第一网元的标识和第一关联关系,确定该第一度量者,其中,该第一关联关系包括第一群组的标识和/或P个度量者的标识与该第一网元的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the method further includes: determining the first measurand based on the identifier of the first network element and the first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
或者,该方法还包括:根据该第一网元的标识和该第一关联关系,确定该N个度量者。Alternatively, the method may further include: determining the N measurands based on the identifier of the first network element and the first association relationship.
基于上述方案,第一验证者可以根据第一关联关系,快速确定要发送第一请求的度量者,从而减少查找度量者的处理时延。Based on the above scheme, the first verifier can quickly determine the measurer to send the first request based on the first association, thereby reducing the processing latency of finding the measurer.
在一些实现方式中,该方法还包括:接收来自密钥管理网元或编排管理网元的第二信息,该第二信息用于指示该第一关联关系。In some implementations, the method further includes receiving second information from a key management network element or an orchestration management network element, the second information being used to indicate the first association.
在一些实现方式中,该方法还包括:向密钥管理网元发送第三请求,该第三请求用于请求该M个度量者的密钥;接收来自该密钥管理网元的第三信息,该第三信息用于指示该M个度量者的密钥。In some implementations, the method further includes: sending a third request to the key management network element, the third request being used to request the keys of the M measurands; and receiving third information from the key management network element, the third information being used to indicate the keys of the M measurands.
基于上述方案,第一验证者可以向密钥管理网元请求本次验证所需的密钥。一方面,密钥由专门的网元存储,提高了密钥的安全性,另一方面,第一验证者无需预先保存密钥,节约了第一验证者的存储开销。Based on the above scheme, the first verifier can request the key required for this verification from the key management network element. On the one hand, the key is stored by a dedicated network element, which improves the security of the key; on the other hand, the first verifier does not need to save the key in advance, saving the first verifier's storage costs.
在一些实现方式中,该第三请求包括该第一度量者的标识和/或第一群组的标识,其中,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
基于上述方案,第三请求可以包括第一信息的发送端的标识,和/或,第一信息的发送端所在群组标识。这样,密钥管理网元可以根据第三请求中携带的标识,确定向第一验证者反馈M个度量者的密钥。Based on the above scheme, the third request may include the identifier of the sender of the first information, and/or the identifier of the group to which the sender of the first information belongs. In this way, the key management network element can determine the keys for the M measurers to be fed back to the first verifier based on the identifiers carried in the third request.
在一些实现方式中,根据该M个度量者的密钥,验证该第一签名和该第一证据,包括:验证该第一签名所基于的度量者的数量是否大于或等于门限值,该门限值用于指示该第一签名所基于的度量者的最小数量;在该第一签名所基于的度量者的数量大于或等于门限值的情况下,验证该第一签名是否有效;在该第一签名有效的情况下,验证该第一证据是否有效。In some implementations, verifying the first signature and the first evidence based on the keys of the M measurands includes: verifying whether the number of measurands on which the first signature is based is greater than or equal to a threshold value, the threshold value indicating the minimum number of measurands on which the first signature is based; verifying whether the first signature is valid if the number of measurands on which the first signature is based is greater than or equal to the threshold value; and verifying whether the first evidence is valid if the first signature is valid.
基于上述方案,第一验证者可以验证第一签名所基于的度量者是否满足门限值的要求。在门限值不满足要求的情况下,不对第一签名或第一证据进行进一步验证,从而减少验证的开销。在门限值设置较低的情况下,第一签名可以不必基于第一群组中的全部度量者,从而节约了度量者签名的开销。宰门限值设置较高的情况下,第一签名需要基于第一群组中较多数量的度量者,从而提升了远程验证的安全性。Based on the above scheme, the first verifier can verify whether the measurer on which the first signature is based meets the threshold requirement. If the threshold requirement is not met, no further verification is performed on the first signature or the first evidence, thereby reducing verification overhead. When the threshold is set low, the first signature does not need to be based on all measurers in the first group, thus saving the overhead of measurer signing. When the threshold is set high, the first signature needs to be based on a larger number of measurers in the first group, thereby improving the security of remote verification.
在一些实现方式中,该第一网元包括或应用于虚拟化网络功能(virtualized network function,VNF)。In some implementations, the first network element includes or is applied to a virtualized network function (VNF).
基于上述方案,第一验证者可以对VNF的注册状态进行评估,以提高VNF的安全性。Based on the above scheme, the first validator can evaluate the registration status of the VNF to improve the security of the VNF.
第二方面,提供了一种通信方法。第二方面提供的方法的执行主体可以为第一度量者,在不做特殊说明的情况下,本申请的中的第一度量者既可以指网络设备本身(例如,接入网设备、核心网设备或管理面设备),也可以是指网络设备中的组件(例如,处理器、芯片,或芯片系统等),或者,也可以是能实现全部或者部分网络设备功能的逻辑模块或软件等。为便于描述,下文以第一度量者为例进行描述。Secondly, a communication method is provided. The subject executing the method provided in this application can be a first measuring agent. Unless otherwise specified, the first measuring agent in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions. For ease of description, the following description uses the first measuring agent as an example.
该方法包括:根据第一网元,确定第一证据;根据M个度量者的密钥和该第一证据,确定第一签名,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数,该第一签名用于验证该第一证据的有效性;向第一验证者发送第一信息,该第一信息包括该第一签名和该第一证据。The method includes: determining first evidence based on a first network element; determining a first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; and sending first information to a first verifier, wherein the first information includes the first signature and the first evidence.
在一些实现方式中,该M个度量者还包括第三度量者,该方法还包括:接收来自该第三度量者的第四信息,该第四信息用于指示该第三度量者的密钥。In some implementations, the M measurands may also include a third measurand, and the method may further include receiving fourth information from the third measurand, the fourth information being used to indicate the key of the third measurand.
基于上述方案,第三度量者可以向第一度量者发送第三度量者的密钥,从而协助第一度量者用M个度量者的密钥进行签名。Based on the above scheme, the third measurer can send its key to the first measurer, thereby assisting the first measurer in signing using the keys of M measurers.
在一些实现方式中,该方法还包括:向该第三度量者发送第四请求,该第四请求用于请求该第三度量者的密钥。In some implementations, the method further includes sending a fourth request to the third measurer, the fourth request being used to request the third measurer's key.
基于上述方案,第一度量者可以向第三度量者发送请求,从而触发第三度量者向第一度量者发送该第三度量者的密钥。Based on the above scheme, the first measurand can send a request to the third measurand, thereby triggering the third measurand to send its key to the first measurand.
在一些实现方式中,该第四请求包括该第一证据、度量信息、或该第一签名中的至少一项;其中,该度量信息用于指示度量内容和/或度量策略。In some implementations, the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
基于上述方案,第三度量者可以根据第四请求携带的信息进行验证,从而确定是否向第一度量者发送第三度量者的密钥的指示信息。上述方案能够避免第三度量者在第一度量者安全性较低的情况下,向该第一度量者提供第三度量者的密钥,从而进一步提高远程证明的安全性。Based on the above scheme, the third evaluator can verify the information carried in the fourth request to determine whether to send the third evaluator's key to the first evaluator. This scheme avoids the third evaluator providing its key to the first evaluator when the first evaluator's security is low, thereby further improving the security of remote proof.
在一些实现方式中,该方法还包括:接收来自密钥管理网元的第五信息,该第五信息用于指示该M个度量者的密钥。In some implementations, the method further includes receiving fifth information from a key management network element, the fifth information being used to indicate the keys of the M measurands.
基于上述方案,用于确定第一签名的M个度量者的密钥可以是密钥管理网元指示的,从而无需通过与其他度量者交互来获取其他度量者的密钥。因此,上述方案能够减少确定第一签名的时延,从而减少远程证明的时延。Based on the above scheme, the keys used to determine the M measurands for the first signature can be indicated by the key management network element, thus eliminating the need to obtain the keys of other measurands through interaction. Therefore, the above scheme can reduce the latency of determining the first signature, thereby reducing the latency of remote proof.
在一些实现方式中,该方法还包括:接收来自该第一验证者的第一请求,该第一请求用于请求度量该第一网元。In some implementations, the method further includes receiving a first request from the first verifier, the first request being used to request measurement of the first network element.
在一些实现方式中,该第一请求用于指示门限值,该门限值用于指示该第一签名所基于的度量者的最小数量。In some implementations, the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
第三方面,提供了一种通信方法。第三方面提供的方法的执行主体可以为密钥管理网元,在不做特殊说明的情况下,本申请的中的密钥管理网元既可以指网络设备本身(例如,接入网设备、核心网设备或管理面设备),也可以是指网络设备中的组件(例如,处理器、芯片,或芯片系统等),或者,也可以是能实现全部或者部分网络设备功能的逻辑模块或软件等。为便于描述,下文以密钥管理网元为例进行描述。Thirdly, a communication method is provided. The implementing entity of the method provided in this application can be a key management network element. Unless otherwise specified, the key management network element in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the network device's functions. For ease of description, the following description uses a key management network element as an example.
该方法包括:接收来自第一验证者的第三请求,该第三请求用于请求M个度量者的密钥,该M个度量者的密钥用于验证第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该M个度量者用于度量该第一网元,M为大于1的整数;向该第一验证者发送第三信息,该第三信息用于指示该M个度量者的密钥。The method includes: receiving a third request from a first verifier, the third request being used to request the keys of M measurators, the keys of the M measurators being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurators being used to measure the first network element, M being an integer greater than 1; and sending third information to the first verifier, the third information being used to indicate the keys of the M measurators.
在一些实现方式中,该第三请求包括第一度量者的标识和/或第一群组的标识,其中,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数,该M个度量者包括该第一度量者。In some implementations, the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, the P measurands include the M measurands, where P is an integer greater than or equal to M, and the M measurands include the first measurand.
在一些实现方式中,该方法还包括:向第一度量者发送第五信息,该第五信息用于指示该M个度量者的密钥,该M个度量者包括该第一度量者。In some implementations, the method further includes sending a fifth message to a first measurand, the fifth message indicating the keys of the M measurands, including the first measurand.
在一些实现方式中,该方法还包括:向该第一验证者发送第二信息,该第二信息用于指示第一关联关系,其中,该第一关联关系包括第一群组的标识和/或P个度量者的标识与该第一网元的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the method further includes: sending second information to the first verifier, the second information being used to indicate a first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group including the P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, where P is an integer greater than or equal to M.
在一些实现方式中,该方法还包括:接收来自编排管理网元的第六信息,该第六信息用于指示该第一关联关系。In some implementations, the method further includes receiving sixth information from the orchestration management network element, the sixth information being used to indicate the first association.
在一些实现方式中,该方法还包括:向该编排管理网元发送第五请求,该第五请求用于请求该第一关联关系。In some implementations, the method further includes sending a fifth request to the orchestration management network element, the fifth request being used to request the first association.
在一些实现方式中,该方法还包括:根据该第三请求和第二关联关系,确定该M个度量者的密钥,其中,该第二关联关系包括第一群组的标识和/或P个度量者的标识与第一密钥组的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the method further includes: determining the keys of the M measurands based on the third request and the second association, wherein the second association includes the identifier of the first group and/or the association between the identifiers of the P measurands and the identifier of the first key group, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
基于上述方案,密钥管理网元可根据第二关联关系,确定M个度量者的密钥,从而减少了查找M个度量者的密钥的时延。Based on the above scheme, the key management network element can determine the keys of M measurands according to the second association relationship, thereby reducing the latency of finding the keys of M measurands.
第四方面,提供了一种通信方法。第四方面提供的方法的执行主体可以为第三度量者,在不做特殊说明的情况下,本申请的中的第三度量者既可以指网络设备本身(例如,接入网设备、核心网设备或管理面设备),也可以是指网络设备中的组件(例如,处理器、芯片,或芯片系统等),或者,也可以是能实现全部或者部分网络设备功能的逻辑模块或软件等。为便于描述,下文以第三度量者为例进行描述。Fourthly, a communication method is provided. The implementing entity of the method provided in this application can be a third-party measurement agent. Unless otherwise specified, the third-party measurement agent in this application can refer to the network device itself (e.g., access network device, core network device, or management plane device), a component within the network device (e.g., processor, chip, or chip system), or a logical module or software capable of implementing all or part of the functions of the network device. For ease of description, the following description uses a third-party measurement agent as an example.
该方法包括:生成第四信息,该第四信息用于指示该第三度量者的密钥;向第一度量者发送第四信息。The method includes: generating fourth information, which indicates the key of the third measurer; and sending the fourth information to the first measurer.
在一些实现方式中,该方法还包括:接收来自第一度量者的第四请求,该第四请求用于请求该第三度量者的密钥。In some implementations, the method further includes receiving a fourth request from the first metronome, the fourth request being used to request the key of the third metronome.
在一些实现方式中,该第四请求包括该第一证据、度量信息、或该第一签名中的至少一项;其中,该度量信息用于指示度量内容和/或度量策略。In some implementations, the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
第五方面,提供了一种通信装置,包括处理电路(或者处理器)和输入输出接口(也可以称为接口电路),该输入输出接口用于输入和/或输出信号,该处理电路用于执行第一方面以及第一方面的任一种可能的方法,或者,该处理电路用于执行第二方面以及第二方面的任一种可能的方法,或者,该处理电路用于执行第三方面以及第三方面的任一种可能的方法,或者,该处理电路用于执行第四方面以及第四方面的任一种可能的方法。Fifthly, a communication device is provided, including processing circuitry (or a processor) and an input/output interface (also referred to as an interface circuit), the input/output interface being used for inputting and/or outputting signals, the processing circuitry being used to perform the first aspect and any possible method of the first aspect, or the processing circuitry being used to perform the second aspect and any possible method of the second aspect, or the processing circuitry being used to perform the third aspect and any possible method of the third aspect, or the processing circuitry being used to perform the fourth aspect and any possible method of the fourth aspect.
在一些实现方式中,处理电路用于通过接口电路与其它装置通信,并执行上述第一方面以及第一方面的任一种可能的方法,或者执行第二方面以及第二方面的任一种可能的方法,或者执行第三方面以及第三方面的任一种可能的方法,或者执行第四方面以及第四方面的任一种可能的方法。In some implementations, the processing circuit is used to communicate with other devices through the interface circuit and to perform the first aspect and any possible method of the first aspect, or to perform the second aspect and any possible method of the second aspect, or to perform the third aspect and any possible method of the third aspect, or to perform the fourth aspect and any possible method of the fourth aspect.
第六方面,提供了一种通信装置。该通信装置可以包括用于执行通信装置功能的单元或者模块等。Sixthly, a communication device is provided. This communication device may include units or modules for performing the functions of the communication device.
在一些实现方式中,该通信装置可以包括用于执行第一方面以及第一方面的任一种可能的实现方式所描述的方法/操作/步骤/动作所一一对应的模块或单元或手段(means),该模块或单元或手段可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。In some implementations, the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the first aspect and any possible implementation of the first aspect. These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
可选地,通信装置包括处理单元和收发单元。收发单元可以用于接收来自第一度量者的第一信息,该第一信息包括第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该第一签名所基于的度量者包括M个度量者,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数;处理单元可以用于根据该M个度量者的密钥,验证该第一签名和该第一证据。Optionally, the communication device includes a processing unit and a transceiver unit. The transceiver unit can be used to receive first information from a first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, and M being an integer greater than 1; the processing unit can be used to verify the first signature and the first evidence according to the keys of the M measurers.
在一些实现方式中,收发单元还用于:向该第一度量者发送第一请求,该第一请求用于请求度量该第一网元。In some implementations, the transceiver unit is also used to: send a first request to the first metric, the first request being used to request measurement of the first network element.
在一些实现方式中,收发单元还用于:向N个度量者发送第一请求,该第一请求用于请求度量该第一网元,该N个度量者属于第一群组,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,N为整数,N为大于或等于2且小于或等于P的整数,P大于或等于M的整数。In some implementations, the transceiver unit is further configured to: send a first request to N measurands, the first request being used to request measurement of the first network element, the N measurands belonging to a first group, the first group including P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, N being an integer greater than or equal to 2 and less than or equal to P, and P being an integer greater than or equal to M.
在一些实现方式中,收发单元还用于:向至少一个第二度量者发送第二请求,该第二请求用于请求度量该第一网元。In some implementations, the transceiver unit is also used to: send a second request to at least one second metric, the second request being used to request measurement of the first network element.
其中,收发单元具体用于:在满足第一条件的情况下,向该第一度量者发送该第一请求。Specifically, the transceiver unit is used to send the first request to the first measurand when the first condition is met.
或者,其中,收发单元具体用于:在满足该第一条件的情况下,向该N个度量者发送该第一请求。Alternatively, the transceiver unit is specifically used to: send the first request to the N measurands when the first condition is met.
其中,该第一条件包括:该第一验证者接收到来自该至少一个第二度量者中每个第二度量者的拒绝信息,和/或,该第一验证者在预定时间段内未接收到来自该至少一个第二度量者的响应。The first condition includes: the first verifier receiving rejection information from each of the at least one second measurer, and/or the first verifier not receiving a response from the at least one second measurer within a predetermined time period.
在一些实现方式中,该第一请求用于指示门限值,该门限值用于指示该第一签名所基于的度量者的最小数量。In some implementations, the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
在一些实现方式中,处理单元还用于:根据该第一网元的标识和第一关联关系,确定该第一度量者,其中,该第一关联关系包括第一群组的标识和/或P个度量者的标识与该第一网元的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the processing unit is further configured to: determine the first measurand based on the identifier of the first network element and the first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
或者,处理单元还用于:根据该第一网元的标识和该第一关联关系,确定该N个度量者。Alternatively, the processing unit may also be configured to: determine the N measurands based on the identifier of the first network element and the first association relationship.
在一些实现方式中,收发单元还用于:接收来自密钥管理网元或编排管理网元的第二信息,该第二信息用于指示该第一关联关系。In some implementations, the transceiver unit is also used to: receive second information from a key management network element or an orchestration management network element, the second information being used to indicate the first association relationship.
在一些实现方式中,收发单元还用于:向密钥管理网元发送第三请求,该第三请求用于请求该M个度量者的密钥;接收来自该密钥管理网元的第三信息,该第三信息用于指示该M个度量者的密钥。In some implementations, the transceiver unit is also configured to: send a third request to the key management network element, the third request being used to request the keys of the M measurands; and receive third information from the key management network element, the third information being used to indicate the keys of the M measurands.
在一些实现方式中,该第三请求包括该第一度量者的标识和/或第一群组的标识,其中,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
在一些实现方式中,处理单元具体用于:验证该第一签名所基于的度量者的数量是否大于或等于门限值,该门限值用于指示该第一签名所基于的度量者的最小数量;在该第一签名所基于的度量者的数量大于或等于门限值的情况下,验证该第一签名是否有效;在该第一签名有效的情况下,验证该第一证据是否有效。In some implementations, the processing unit is specifically used to: verify whether the number of measurands on which the first signature is based is greater than or equal to a threshold value, the threshold value being used to indicate the minimum number of measurands on which the first signature is based; if the number of measurands on which the first signature is based is greater than or equal to the threshold value, verify whether the first signature is valid; if the first signature is valid, verify whether the first evidence is valid.
在一些实现方式中,该第一网元包括或应用于VNF。In some implementations, the first network element includes or is applied to the VNF.
在一些实现方式中,该通信装置可以包括用于执行第二方面以及第二方面的任一种可能的实现方式所描述的方法/操作/步骤/动作所一一对应的模块或单元或手段,该模块或单元或手段可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。In some implementations, the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the second aspect and any possible implementation of the second aspect. These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
可选地,通信装置包括处理单元和收发单元。处理单元可以用于根据第一网元,确定第一证据;根据M个度量者的密钥和该第一证据,确定第一签名,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数,该第一签名用于验证该第一证据的有效性;收发单元可以用于向第一验证者发送第一信息,该第一信息包括该第一签名和该第一证据。Optionally, the communication device includes a processing unit and a transceiver unit. The processing unit can be used to determine a first piece of evidence based on a first network element; determine a first signature based on the keys of M measurers and the first piece of evidence, wherein the M measurers are used to measure the first network element, and the M measurers include the first measurer, where M is an integer greater than 1, and the first signature is used to verify the validity of the first piece of evidence; the transceiver unit can be used to send first information to a first verifier, wherein the first information includes the first signature and the first piece of evidence.
在一些实现方式中,该M个度量者还包括第三度量者,收发单元还用于:接收来自该第三度量者的第四信息,该第四信息用于指示该第三度量者的密钥。In some implementations, the M measurands also include a third measurand, and the transceiver unit is further configured to: receive fourth information from the third measurand, the fourth information being used to indicate the key of the third measurand.
在一些实现方式中,收发单元还用于:向该第三度量者发送第四请求,该第四请求用于请求该第三度量者的密钥。In some implementations, the transceiver unit is also used to send a fourth request to the third measurand, the fourth request being used to request the key of the third measurand.
在一些实现方式中,该第四请求包括该第一证据、度量信息、或该第一签名中的至少一项;其中,该度量信息用于指示度量内容和/或度量策略。In some implementations, the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
在一些实现方式中,收发单元还用于:接收来自密钥管理网元的第五信息,该第五信息用于指示该M个度量者的密钥。In some implementations, the transceiver unit is also used to: receive fifth information from the key management network element, which is used to indicate the keys of the M measurands.
在一些实现方式中,收发单元还用于:接收来自该第一验证者的第一请求,该第一请求用于请求度量该第一网元。In some implementations, the transceiver unit is also used to: receive a first request from the first verifier, the first request being used to request measurement of the first network element.
在一些实现方式中,该第一请求用于指示门限值,该门限值用于指示该第一签名所基于的度量者的最小数量。In some implementations, the first request is used to indicate a threshold value that indicates the minimum number of measurands on which the first signature is based.
在一些实现方式中,该通信装置可以包括用于执行第三方面以及第三方面的任一种可能的实现方式所描述的方法/操作/步骤/动作所一一对应的模块或单元或手段,该模块或单元或手段可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。In some implementations, the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the third aspect and any possible implementation of the third aspect. These modules, units, or means may be hardware circuits, software, or a combination of hardware circuits and software.
可选地,通信装置包括处理单元和收发单元。收发单元可以用于接收来自第一验证者的第三请求,该第三请求用于请求M个度量者的密钥,该M个度量者的密钥用于验证第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该M个度量者用于度量该第一网元,M为大于1的整数;收发单元还可以用于向该第一验证者发送第三信息,该第三信息用于指示该M个度量者的密钥。Optionally, the communication device includes a processing unit and a transceiver unit. The transceiver unit can be used to receive a third request from a first verifier, the third request being for the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurers being used to measure the first network element, where M is an integer greater than 1; the transceiver unit can also be used to send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
在一些实现方式中,该第三请求包括第一度量者的标识和/或第一群组的标识,其中,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数,该M个度量者包括该第一度量者。In some implementations, the third request includes the identifier of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, the P measurands include the M measurands, where P is an integer greater than or equal to M, and the M measurands include the first measurand.
在一些实现方式中,收发单元还用于:向第一度量者发送第五信息,该第五信息用于指示该M个度量者的密钥,该M个度量者包括该第一度量者。In some implementations, the transceiver unit is also used to: send fifth information to the first measurand, the fifth information being used to indicate the keys of the M measurands, the M measurands including the first measurand.
在一些实现方式中,收发单元还用于:向该第一验证者发送第二信息,该第二信息用于指示第一关联关系,其中,该第一关联关系包括第一群组的标识和/或P个度量者的标识与该第一网元的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the transceiver unit is further configured to: send second information to the first verifier, the second information being used to indicate a first association relationship, wherein the first association relationship includes the association relationship between the identifier of the first group and/or the identifiers of P measurands and the identifier of the first network element, the first group including the P measurands, the P measurands being used to measure the first network element, the P measurands including the M measurands, where P is an integer greater than or equal to M.
在一些实现方式中,收发单元还用于:接收来自编排管理网元的第六信息,该第六信息用于指示该第一关联关系。In some implementations, the transceiver unit is also used to: receive sixth information from the orchestration management network element, the sixth information being used to indicate the first association relationship.
在一些实现方式中,收发单元还用于:向该编排管理网元发送第五请求,该第五请求用于请求该第一关联关系。In some implementations, the transceiver unit is also used to: send a fifth request to the orchestration management network element, the fifth request being used to request the first association relationship.
在一些实现方式中,处理单元还用于:根据该第三请求和第二关联关系,确定该M个度量者的密钥,其中,该第二关联关系包括第一群组的标识和/或P个度量者的标识与第一密钥组的标识之间的关联关系,该第一群组包括该P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。In some implementations, the processing unit is further configured to: determine the keys of the M measurands based on the third request and the second association, wherein the second association includes the identifier of the first group and/or the association between the identifiers of the P measurands and the identifier of the first key group, the first group includes the P measurands, the P measurands are used to measure the first network element, the P measurands include the M measurands, and P is an integer greater than or equal to M.
在一些实现方式中,该通信装置可以包括用于执行第四方面以及第四方面的任一种可能的实现方式所描述的方法/操作/步骤/动作所一一对应的模块或单元或手段,该模块或单元或手段可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。In some implementations, the communication device may include modules, units, or means for performing the methods/operations/steps/actions described in the fourth aspect and any possible implementation of the fourth aspect, which may be hardware circuits, software, or a combination of hardware circuits and software.
可选地,通信装置包括处理单元和收发单元。该处理单元可以用于生成第四信息,该第四信息用于指示该第三度量者的密钥;收发单元可以用于向第一度量者发送第四信息。Optionally, the communication device includes a processing unit and a transceiver unit. The processing unit can be used to generate fourth information, which indicates the key of the third measurer; the transceiver unit can be used to send the fourth information to the first measurer.
在一些实现方式中,收发单元还用于:接收来自第一度量者的第四请求,该第四请求用于请求该第三度量者的密钥。In some implementations, the transceiver unit is also configured to: receive a fourth request from the first metronome, the fourth request being used to request the key of the third metronome.
在一些实现方式中,该第四请求包括该第一证据、度量信息、或该第一签名中的至少一项;其中,该度量信息用于指示度量内容和/或度量策略。In some implementations, the fourth request includes at least one of the first evidence, measurement information, or the first signature; wherein the measurement information is used to indicate measurement content and/or measurement strategy.
第七方面,提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序或指令,当该计算机程序或该指令被运行时,使得第一方面以及第一方面的任一种可能的方法被执行(或被实现),或者,使得第二方面以及第二方面的任一种可能的方法被执行(或被实现),或者,使得第三方面以及第三方面的任一种可能的方法被执行(或被实现),或者,使得第四方面以及第四方面的任一种可能的方法被执行(或被实现)。In a seventh aspect, a computer-readable storage medium is provided, on which a computer program or instructions are stored, which, when executed, cause the first aspect and any possible method of the first aspect to be performed (or implemented), or cause the second aspect and any possible method of the second aspect to be performed (or implemented), or cause the third aspect and any possible method of the third aspect to be performed (or implemented), or cause the fourth aspect and any possible method of the fourth aspect to be performed (or implemented).
第八方面,提供了一种计算机程序产品,包含计算机程序或指令,当该计算机程序或指令被运行时,使得第一方面以及第一方面的任一种可能的方法被执行(或被实现),或者,使得第二方面以及第二方面的任一种可能的方法被执行(或被实现),或者,使得第三方面以及第三方面的任一种可能的方法被执行(或被实现),或者,使得第四方面以及第四方面的任一种可能的方法被执行(或被实现)。Eighthly, a computer program product is provided, comprising a computer program or instructions that, when executed, cause the first aspect and any possible method of the first aspect to be performed (or implemented), or cause the second aspect and any possible method of the second aspect to be performed (or implemented), or cause the third aspect and any possible method of the third aspect to be performed (or implemented), or cause the fourth aspect and any possible method of the fourth aspect to be performed (or implemented).
第九方面,提供一种通信装置,包括处理器,用于通过执行存储器中存储的计算机程序(或计算机可执行指令),和/或,通过逻辑电路,使得上述第一方面的任一种可能的方法被执行(或被实现),或者,使得上述第二方面的任一种可能的方法被执行(或被实现),或者,使得上述第三方面的任一种可能的方法被执行(或被实现),或者,使得上述第四方面的任一种可能的方法被执行(或被实现)。A ninth aspect provides a communication device, including a processor configured to execute (or implement) any of the possible methods of the first aspect, or any of the possible methods of the second aspect, or any of the possible methods of the third aspect, or any of the possible methods of the fourth aspect, by executing a computer program (or computer-executable instructions) stored in a memory, and/or by logic circuitry.
在一种可能的实现中,该装置还包括存储器。在一种可能的实现中,处理器和存储器集成在一起。在另一种可能的实现中,该存储器位于该通信装置之外。该处理器可以包括一个或多个。In one possible implementation, the device also includes a memory. In another possible implementation, the processor and memory are integrated together. In yet another possible implementation, the memory is located outside the communication device. The processor may include one or more processors.
在一种可能的实现中,该通信装置还包括通信接口,该通信接口用于该通信装置与其他设备进行通信,例如数据和/或信号的发送或接收。示例性的,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。In one possible implementation, the communication device further includes a communication interface for communicating with other devices, such as transmitting or receiving data and/or signals. Exemplarily, the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface.
在一种实现方式中,上述第五方面、第六方面或第九方面的通信装置,可以是芯片或芯片系统。In one implementation, the communication device described in the fifth, sixth, or ninth aspects can be a chip or a chip system.
第十方面,提供一种芯片,包括处理器,用于调用存储器中的计算机程序或计算机指令,以使得上述第一方面中的任一种实现方式被执行(或被实现),或者,以使得上述第二方面中的任一种实现方式被执行(或被实现),或者,以使得上述第三方面中的任一种实现方式被执行(或被实现),或者,以使得上述第四方面中的任一种实现方式被执行(或被实现)。In a tenth aspect, a chip is provided, including a processor for calling a computer program or computer instructions in a memory to cause any of the implementations of the first aspect to be executed (or implemented), or to cause any of the implementations of the second aspect to be executed (or implemented), or to cause any of the implementations of the third aspect to be executed (or implemented), or to cause any of the implementations of the fourth aspect to be executed (or implemented).
在一些实现方式中,该处理器通过接口与该存储器耦合。In some implementations, the processor is coupled to the memory via an interface.
第十一方面,提供一种通信系统,包括第一验证者和密钥管理网元,第一验证者用于执行上述第一方面以及第一方面的任一种可能的实现方式,密钥管理网元用于执行上述第三方面以及第三方面的任一种可能的实现方式。Eleventhly, a communication system is provided, including a first verifier and a key management network element, wherein the first verifier is used to perform the first aspect and any possible implementation thereof, and the key management network element is used to perform the third aspect and any possible implementation thereof.
在一些实现方式中,该通信系统还包括第一度量者,第一度量者用于执行上述第二方面以及第二方面的任一种可能的实现方式。In some implementations, the communication system also includes a first measurand, which performs the second aspect described above and any possible implementation thereof.
在一些实现方式中,该通信系统还包括第三度量者,第三度量者用于执行上述第四方面以及第四方面的任一种可能的实现方式。In some implementations, the communication system also includes a third measurer, which performs the fourth aspect described above and any possible implementation thereof.
关于第二方面至第十一方面等中任一方面的有益效果的描述可以参照第一方面的有益效果的描述。The description of the beneficial effects of any of the second to eleventh aspects can be referred to the description of the beneficial effects of the first aspect.
图1是一种通信系统的网络架构示意图。Figure 1 is a schematic diagram of the network architecture of a communication system.
图2是一种远程证明方法的示意性流程图。Figure 2 is a schematic flowchart of a remote proof method.
图3示出了网络功能虚拟化(network functions virtualization,NFV)的架构示意图。Figure 3 shows a schematic diagram of the architecture of network functions virtualization (NFV).
图4为基于远程证明的NFV的架构示意图。Figure 4 is a schematic diagram of the architecture of NFV based on remote proof.
图5是本申请实施例提供的一种通信方法的示意性流程图。Figure 5 is a schematic flowchart of a communication method provided in an embodiment of this application.
图6是本申请实施例提供的另一种通信方法的示意性流程图。Figure 6 is a schematic flowchart of another communication method provided in an embodiment of this application.
图7是本申请实施例提供的又一种通信方法的示意性流程图。Figure 7 is a schematic flowchart of another communication method provided in an embodiment of this application.
图8是本申请实施例提供的再一种通信方法的示意性流程图。Figure 8 is a schematic flowchart of another communication method provided in an embodiment of this application.
图9是本申请实施例的一种通信装置的示意框图。Figure 9 is a schematic block diagram of a communication device according to an embodiment of this application.
图10是本申请实施例的另一种通信装置的示意框图。Figure 10 is a schematic block diagram of another communication device according to an embodiment of this application.
下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in this application will now be described with reference to the accompanying drawings.
在本申请中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In this application, unless otherwise specified or in case of logical conflict, the terminology and/or descriptions of different embodiments are consistent and can be referenced by each other. Technical features in different embodiments can be combined to form new embodiments based on their inherent logical relationships.
在本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。在本申请的文字描述中,字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b和c中的至少一项(个),可以表示:a,或,b,或,c,或,a和b,或,a和c,或,b和c,或,a、b和c。其中a、b和c分别可以是单个,也可以是多个。In this application, "at least one" means one or more, and "more than one" means two or more. "And/or" describes the relationship between related objects, indicating that three relationships can exist. For example, A and/or B can mean: A alone, A and B simultaneously, or B alone, where A and B can be singular or plural. In the textual description of this application, the character "/" generally indicates that the preceding and following related objects are in an "or" relationship. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one of a, b, and c can mean: a, or, b, or, c, or, a and b, or, a and c, or, b and c, or, a, b, and c. Here, a, b, and c can be single or multiple.
在本申请中,“第一”、“第二”以及各种数字编号(例如,#1、#2等)指示为了描述方便进行的区分,并不用来限制本申请实施例的范围。例如,区分不同的消息等,而不是用于描述特定的顺序或先后次序。应理解,这样描述的对象在适当情况下可以互换,以便能够描述本申请的实施例以外的方案。In this application, the terms "first," "second," and various numerical designations (e.g., #1, #2, etc.) indicate distinctions made for ease of description and are not intended to limit the scope of the embodiments of this application. For example, they may distinguish different messages, rather than describing a specific order or sequence. It should be understood that such descriptions can be interchanged where appropriate to describe solutions other than those in the embodiments of this application.
在本申请中,“当……时”、“在……的情况下”以及“如果”等描述均指在某种客观情况下设备会做出相应的处理,并非是限定时间,且也不要求设备在实现时一定要有判断的动作,也不意味着存在其它限定。In this application, descriptions such as "when," "under the circumstances," and "if" all refer to the fact that the device will take corresponding actions under certain objective circumstances. They are not time-limited, nor do they require the device to perform a judgment action during implementation, nor do they imply any other limitations.
在本申请中,“指示”或“用于指示”可以包括用于直接指示和用于间接指示。当描述某一指示信息用于指示A时,可以包括该指示信息直接指示A或间接指示A,而并不代表该指示信息中一定携带有A。In this application, "instruction" or "for instruction" can include both direct and indirect instruction. When describing instruction information as being used to instruct A, it may include whether the instruction information directly or indirectly instructs A, but does not necessarily mean that the instruction information carries A.
本申请实施例涉及的指示方式应理解为涵盖可以使得待指示方获知待指示信息的各种方法。待指示信息可以作为整体一起发送,也可以分成多个子信息分开发送,而且这些子信息的发送周期和/或发送时机可以相同,也可以不同,本申请对例如发送方法不作限定。The indication methods involved in the embodiments of this application should be understood to cover various methods that enable the party to be indicated to obtain the information to be indicated. The information to be indicated can be sent as a whole or divided into multiple sub-information and sent separately. Moreover, the sending period and/or sending time of these sub-information can be the same or different. This application does not limit the sending method, for example.
本申请实施例中的“指示信息”可以是显式指示,即通过信令直接指示,或者根据信令指示的参数,结合其他规则或结合其他参数或通过推导获得。也可以是隐式指示,即根据规则或关系,或根据其他参数,或推导获得。本申请对此不作具体限定。The "instruction information" in the embodiments of this application can be an explicit instruction, that is, a direct instruction through signaling, or an instruction obtained by combining other rules or parameters with the parameters indicated by the signaling, or by deduction. It can also be an implicit instruction, that is, an instruction obtained based on rules or relationships, or based on other parameters, or by deduction. This application does not specifically limit it in this regard.
在本申请中,“协议”可以是指通信领域的标准协议,例如可以包括5G协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不作限定。“预定义”可以包括预先定义。例如,协议定义。“预配置”可以通过在设备中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其实现方式不作限定。In this application, "protocol" can refer to standard protocols in the field of communications, such as 5G protocols, NR protocols, and related protocols applied in future communication systems; this application does not limit this term. "Predefined" can include predefined terms, such as protocol definitions. "Preconfiguration" can be implemented by pre-storing corresponding codes, tables, or other means that can be used to indicate relevant information in the device; this application does not limit the implementation method.
在本申请中,“通信”还可以描述为“数据传输”、“信息传输”、“数据处理”等。“传输”包括“发送”和“接收”。示例性地,传输可以是上行传输,例如可以是终端设备向网络设备发送信号;传输也可以是下行传输,例如可以是网络设备向终端设备发送信号;传输也可以是侧行传输,例如可以是终端设备向另一终端设备发送信号。示例性地,“传输”可以是空口级的传输,也可以是芯片输入(input,I)/输出(output,O)口的信号发送,而非空口级的传输。In this application, "communication" can also be described as "data transmission," "information transmission," "data processing," etc. "Transmission" includes "sending" and "receiving." For example, transmission can be uplink transmission, such as a terminal device sending a signal to a network device; transmission can also be downlink transmission, such as a network device sending a signal to a terminal device; transmission can also be sidelink transmission, such as a terminal device sending a signal to another terminal device. For example, "transmission" can be air interface level transmission, or it can be signal transmission from a chip input (I)/output (O) port, rather than air interface level transmission.
在本申请中,“消息”、“信息”、“信号”或“信息元素(information element,IE)”等可以替换使用,对于消息或信息的名称不做任何限定,能够实现相应功能即可。In this application, terms such as "message," "information," "signal," or "information element (IE)" can be used interchangeably. There are no restrictions on the name of the message or information, as long as it can achieve the corresponding function.
“向XX(设备)发送信息”可以理解为该信息的目的端是该设备。可以包括直接或间接地向该设备发送信息。“从XX(设备)接收信息,或者接收来自XX(设备)的信息”可以理解为该信息的源端是该设备,可以包括直接或间接地从该设备接收信息。信息在信息发送的源端和目的端之间可能会被进行必要的处理,例如格式变化等,但目的端可以理解来自源端的有效信息。本申请中类似的表述可以做类似的理解,在此不再赘述。”另外,“发送”也可以理解为芯片接口的“输出”,“接收”也可以理解为芯片接口的“输入”。换言之,“发送”或“接收”可以是在设备之间进行的,例如,网络设备和终端设备之间通过空口分别进行发送或接收,“发送”或“接收”也可以是在设备内进行的,例如,通过总线、走线或接口在设备内的部件之间、模组之间、芯片之间、软件模块或者硬件模块之间发送或接收。"Sending information to XX (device)" can be understood as the destination of the information being that device. This can include sending information directly or indirectly to that device. "Receiving information from XX (device), or receiving information from XX (device)" can be understood as the source of the information being that device. This can include receiving information directly or indirectly from that device. Information may undergo necessary processing between the source and destination, such as format changes, but the destination can understand the valid information from the source. Similar expressions in this application can be understood in a similar way, and will not be repeated here. Furthermore, "sending" can also be understood as the "output" of the chip interface, and "receiving" can also be understood as the "input" of the chip interface. In other words, "sending" or "receiving" can occur between devices, for example, between network devices and terminal devices via an air interface. "Sending" or "receiving" can also occur within a device, for example, between components, modules, chips, software modules, or hardware modules within the device via a bus, wiring, or interface.
在本申请中,“示例性地”、“比如”等词语用于表示例子、例证或说明,以具体方式呈现概念。本申请中被描述为“示例”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。本申请实施例中,“的(of)”,“相应的(corresponding,relevant)”、“对应的(corresponding)”和“关联的(associate)”有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。In this application, terms such as "exemplarily" and "for example" are used to indicate examples, illustrations, or descriptions to present concepts in a specific manner. Any embodiment or design described as an "example" in this application should not be construed as being more preferred or advantageous than other embodiments or designs. In the embodiments of this application, the terms "of," "corresponding (relevant)," "corresponding," and "associate" may sometimes be used interchangeably, and it should be noted that their intended meanings are consistent unless their distinctions are emphasized.
在本申请中,配置可以是信令配置,也可以描述为配置信令。例如,信令配置包括由网络设备发送的信令进行配置,这些信令可以是无线资源控制(radio resource control,RRC)消息,下行控制信息(downlink control information,DCI),或系统信息块(system information block,SIB)。又例如,信令配置包括网络设备之间的配置。其中,网络设备可以包括接入网设备、核心网设备、或管理面设备,等等。可选的,信令配置还可以是由预配置的信令配置给终端设备或网络设备,或者,通过预配置的方式配置给终端设备或网络设备。这里的预配置,是以协议的方式提前定义或配置相应参数的取值,在与终端设备或网络设备通信之时存入终端设备或网络设备中。预配置的消息,在终端设备或网络设备连网的条件下可以修改或更新。In this application, configuration can be signaling configuration or can be described as configuring signaling. For example, signaling configuration includes configuration using signaling sent by network devices, which can be radio resource control (RRC) messages, downlink control information (DCI) messages, or system information blocks (SIBs). Another example is signaling configuration between network devices. These network devices can include access network devices, core network devices, or management plane devices, etc. Optionally, signaling configuration can also be configured to terminal devices or network devices using pre-configured signaling, or configured to terminal devices or network devices through pre-configuration. Here, pre-configuration means defining or configuring the values of corresponding parameters in advance using a protocol, and storing them in the terminal device or network device during communication. The pre-configured messages can be modified or updated when the terminal device or network device is connected to the network.
本申请将围绕可包括多个设备、组件、模块等的系统来呈现各个方面、实施例或特征。各个系统可以包括除图示设备、组件、模块外的设备、组件、模块等,并且/或者可以并不包括结合附图讨论的所有和全部设备、组件、模块等。This application will present various aspects, embodiments, or features relating to systems that may include multiple devices, components, modules, etc. Each system may include devices, components, modules, etc., other than those illustrated, and/or may not include all and all of the devices, components, modules, etc. discussed in conjunction with the accompanying drawings.
本申请实施例描述的业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The business scenarios described in the embodiments of this application are for the purpose of more clearly illustrating the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. As those skilled in the art will know, with the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
在本申请的各种实施例中,各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。术语“包括”“包含”“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。In the various embodiments of this application, the sequence number of each process does not imply the order of execution. The execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of this application. The terms "comprising," "including," "having," and their variations all mean "including but not limited to," unless otherwise specifically emphasized.
为了便于理解本申请实施例,首先,对实施例可能涉及的概念及技术作简单介绍。To facilitate understanding of the embodiments of this application, the concepts and technologies that may be involved in the embodiments will be briefly introduced first.
网络功能虚拟化(network functions virtualization,NFV)。作为一个示例,将传统类型的通信设备中的网络功能与该通信设备的物理设备剥离,然后以软件的形式运行在商业现成主机(commercial off-the-shelf,COTS)上,可以形成NFV。作为另一个示例,NFV可以通过借用互联网技术(internet technology,IT)中虚拟化技术实现的虚拟实例(virtual instance,VI),将传统的通信设备的通信技术(communication technology,CT)业务部署到虚拟实体上。示例性地,虚拟实体可以是虚拟机(virtual machine,VM)或容器(container),或者其他任何可能的虚拟化功能实体,本申请对此不做具体限定。Network functions virtualization (NFV). As an example, NFV can be formed by decoupling the network functions of a traditional type of communication device from the physical device and then running them as software on a commercial off-the-shelf (COTS). As another example, NFV can deploy the communication technology (CT) services of a traditional communication device onto a virtual entity by borrowing virtualization technologies from internet technology (IT) to implement virtual instances (VIs). Exemplarily, a virtual entity can be a virtual machine (VM), a container, or any other possible virtualized functional entity; this application does not specifically limit this.
虚拟化网络功能(VNF),也可称为虚拟化网元。VNF可以是提供网络功能的软件应用。例如,网络功能可以是文件共享、目录服务或网际互联协议(Internet protocol,IP)配置等等。VNF可以是一个提供网络服务的软件,利用网络功能虚拟化基础设施(network function virtualization infrastructure,NFVI)提供的基础设施部署在虚拟机、容器或者物理机中。相对于VNF,传统的基于硬件的网元可以称为物理网络功能(physical network function,PNF)。VNF和PNF能够单独或者混合组网,形成服务链(service chain)。示例性地,一个VNF可以部署于一个或者多个VI中。VI可以是一种泛化概念,例如,VI可以指的是虚拟机(VM)、容器(container)等任意一种虚拟化的方案,本申请对此不限定。VNF可以由多个更低级别的组件组成。可选地,一个VNF可以部署在多个VM上。其中,每个VM可以承载一个虚拟网络功能组件(virtualized network function component,VNFC)。A Virtualized Network Function (VNF), also known as a Virtualized Network Element, can be a software application that provides network functions. For example, a network function can be file sharing, directory services, or Internet Protocol (IP) configuration. A VNF can be software providing network services, utilizing the infrastructure provided by Network Function Virtualization Infrastructure (NFVI) deployed on virtual machines, containers, or physical machines. In contrast to VNFs, traditional hardware-based network elements can be called Physical Network Functions (PNFs). VNFs and PNFs can be networked individually or in combination to form a service chain. For example, a VNF can be deployed on one or more VIs. A VI can be a generalized concept; for example, a VI can refer to any virtualization scheme such as a virtual machine (VM) or a container, and this application is not limited in this regard. A VNF can consist of multiple lower-level components. Optionally, a VNF can be deployed on multiple VMs. Each VM can host a virtualized network function component (VNFC).
可选地,一个VNF也可以部署在一个VM上。Alternatively, a VNF can also be deployed on a VM.
本申请实施例中的VNF,可以是或应用于接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、策略控制(policy control function,PCF)网元、统一数据管理(unified data management,UDM)网元、用户面功能(user plane function,UPF)网元,还可以是网络能力开放功能(network exposure function,NEF)网元、应用功能(application function,AF)网元、网络切片选择功能(network slice selection function,NSSF)网元、鉴权服务功能(authentication server function,AUSF)网元、网络存储功能(network repository function,NRF)网元、统一数据存储功能(unified data repository,UDR)网元等,本申请实施例并不限定。The VNF in this application embodiment can be or be applied to access and mobility management function (AMF) network elements, session management function (SMF) network elements, policy control function (PCF) network elements, unified data management (UDM) network elements, user plane function (UPF) network elements, and can also be network exposure function (NEF) network elements, application function (AF) network elements, network slice selection function (NSSF) network elements, authentication server function (AUSF) network elements, network repository function (NRF) network elements, unified data repository (UDR) network elements, etc., and this application embodiment is not limited to these.
单元管理系统(element manager system,EMS)可以用于针对VNF执行传统的故障、配置、计费、性能和安全(fault,configuration,accounting,performance,security,FCAPS)管理功能。EMS可以单独存在,也可以是具有EMS功能的VNF。在一些示例中,EMS和VNF可以是一一对应的。An element manager system (EMS) can be used to perform traditional fault, configuration, accounting, performance, security, and FCAPS (Fault, Configuration, Accounting, Performance, Security, and FCAPS) management functions for VNFs. An EMS can exist independently or as a VNF with EMS functionality. In some examples, there can be a one-to-one correspondence between an EMS and a VNF.
网络功能虚拟化基础架构(NFVI)可以是用来托管和连接虚拟功能的一组资源。NFVI可以包括平台上的基础架构组件。NFVI可以将物理资源虚拟化为虚拟资源,供VNF使用。例如,NFVI可以包括虚拟化层、虚拟机管理程序、容器管理系统、物理设备交换机、计算、或者存储,等等。又例如,NFVI可以是一种包含服务器、虚拟化管理程序(hypervisor)、操作系统(operating system,OS)、VM、容器、虚拟交换机和网络资源的云数据中心。Network Functions Virtualization Infrastructure (NFVI) can be a set of resources used to host and connect virtual functions. NFVI can include infrastructure components on a platform. NFVI can virtualize physical resources into virtual resources for use by VNFs. For example, NFVI can include a virtualization layer, hypervisor, container management system, physical device switches, compute, or storage, etc. As another example, NFVI can be a cloud data center that includes servers, a hypervisor, an operating system (OS), VMs, containers, virtual switches, and network resources.
度量者(attester),可以用于配合验证者(verifier)对网元进行可信度量。度量者可以对要证明的目标系统执行完整性测量,并生成一组称为证据(evidence)的声明。例如,度量者可以对网元中的资源(例如,VM),应用程序(application,APP),或硬件(hardware)等进行度量,获得证据。度量者可以对获得的证据进行验证。其中,证据可以包括网元和虚拟机的一些配置信息,例如软件版本,软件名称,或供应商信息等。示例性地,度量者可以是可信根,例如,虚拟可信根,也可以是安全芯片,例如,可信平台模块(trusted platform modules,TPM),硬件加密设备(hardware security module,HSM)等。本申请度量者的具体形式不做限定,度量者还可以有其他形式,例如,度量者可以是直接存储器访问(direct memory access,DMA)等。An attester can be used in conjunction with a verifier to perform trust measurements on network elements. The attester performs integrity measurements on the target system to be proven and generates a set of statements called evidence. For example, the attester can measure resources (e.g., VMs), applications (APPs), or hardware within the network element to obtain evidence. The attester can then verify the obtained evidence. Evidence may include configuration information of the network element and virtual machines, such as software version, software name, or vendor information. Exemplarily, the attester can be a root of trust, such as a virtual root of trust, or a security chip, such as a trusted platform module (TPM) or a hardware security module (HSM). The specific form of the attester is not limited in this application; it can also take other forms, such as direct memory access (DMA).
验证者(verifier),可以是对网元的证据进行验证的执行方。例如,验证者可以完成验证并返回验证结果,或者签名并发送一个凭据。实现验证的具体方式,本申请不做限制。例如,验证者可以在本地根据预配置进行验证,也可以在远端服务器进行验证。验证者可以是独立设置的网元,也可以是管理面的一个功能,例如NFVI中云服务管理(cloud management)(或者称为“云管”)的验证功能,或者是漫游域中运营商用来提供验证服务的网元。示例性地,云管可以是管理、自动化和网络编排(management and orchestration,MANO)。A verifier is an entity that performs verification on evidence from a network element. For example, a verifier can complete the verification and return a result, or sign and send a credential. This application does not limit the specific method of verification. For example, the verifier can perform verification locally based on pre-configuration, or it can perform verification on a remote server. The verifier can be an independently configured network element, or it can be a function of the management plane, such as the verification function of cloud management (or "cloud management") in NFVI, or a network element used by an operator to provide verification services in a roaming domain. For example, cloud management can be management, automation, and orchestration (MANO).
网络功能(network function,NF)消费者(consumer),可以是位于某个信任域中的网元。NF consumer可能由于业务需要,与另一个网元请求建立业务连接。示例性地,NF consumer可以是需要提供远程证明凭据的网元。例如,NF consumer可以是访问公共陆地移动网络(visited public land mobile network,VPLMN)-AMF或者是VPLMN UPF,或者是NFV域中的VNF等网元,本申请不限定NF consumer的具体形式。A network function (NF) consumer can be a network element located in a trusted domain. An NF consumer may request to establish a service connection with another network element due to service requirements. For example, an NF consumer can be a network element that requires remote authentication credentials. For instance, an NF consumer can be a visited public land mobile network (VPLMN) AMF or a VPLMN UPF, or a VNF in the NFV domain, etc. This application does not limit the specific form of the NF consumer.
依赖方(relying party)可以称为网元依赖方。示例性地,依赖方可以是需要核查其他网元的配置信息的网元。例如,网元依赖方可以是NRF。A relying party can be called a network element relying party. For example, a relying party can be a network element that needs to verify the configuration information of other network elements. For instance, a network element relying party could be an NRF (Network Request Framework).
配置文件和证明检查功能(profile and attestation check function,PACF)可以用于配置检查和证明的网元。例如,PACF可以是接口网元,用于与验证者进行交互或通信。一种可能的场景为,其他网元可能不能给验证者发送信息。这种场景的一种可能的原因在于,验证者的跨域部署。The profile and attestation check function (PACF) can be used to configure network elements for checking and attestation. For example, the PACF can be an interface network element used to interact or communicate with the validator. One possible scenario is that other network elements may be unable to send information to the validator. One possible reason for this scenario is the cross-domain deployment of the validator.
管理、自动化和网络编排(management and orchestration,MANO)可以提供用于管理NFV基础架构和置备新VNF的框架。MANO可以是综合管理和调度网络业务的集成。示例性地,MANO可以包括虚拟化基础架构管理器(virtualized infrastructure manager,VIM)、虚拟化网络功能管理器(virtualized network function manager,VNFM)、或网络功能虚拟化编排器(network function virtualization orchestrator,NFVO),等等。Management, automation, and network orchestration (MANO) can provide a framework for managing NFV infrastructure and provisioning new VNFs. MANO can be an integration of comprehensive management and scheduling of network services. For example, MANO may include a virtualized infrastructure manager (VIM), a virtualized network function manager (VNFM), or a network function virtualization orchestrator (NFVO), etc.
虚拟化基础架构管理(VIM)可以用于管理NFVI。例如,VIM可以用于提供基础设施层虚拟化资源(例如虚拟计算资源、存储资源或网络资源等)的管理(例如资源预留、或资源分配等),虚拟资源状态的监控、虚拟资源的故障上报,或,为上层应用提供虚拟化资源池等。示例性地,VIM可以是云平台的管理,负责硬件管理、VM部署、VM协调和调度等。Virtual Infrastructure Management (VIM) can be used to manage NFVI. For example, VIM can be used to provide management of infrastructure-layer virtualized resources (such as virtual computing resources, storage resources, or network resources) (e.g., resource reservation or allocation), monitor the status of virtual resources, report virtual resource faults, or provide virtualized resource pools for upper-layer applications. For instance, VIM can be used for cloud platform management, responsible for hardware management, VM deployment, VM coordination, and scheduling.
虚拟化网络功能管理器(VNFM)可以用于管理VNF的生命周期,如上线、下线、进行状态监控、VNF实例的初始化、VNF实例的扩容、VNF实例的缩容、或VNF实例的终止等。示例性地,VNFM可以基于VNF描述(VNF descriptor,VNFD)来管理VNF。VNFM可以负责网元生命周期管理。VNFM的基本能力可以包括网元或VM的增、删、查、或改,等等。The Virtual Network Function Manager (VNFM) can be used to manage the lifecycle of VNFs, such as bringing them online, taking them offline, monitoring their status, initializing VNF instances, scaling up VNF instances, scaling down VNF instances, or terminating VNF instances. For example, the VNFM can manage VNFs based on VNF descriptors (VNFDs). The VNFM can be responsible for network element lifecycle management. Basic capabilities of the VNFM can include adding, deleting, querying, or modifying network elements or VMs, etc.
网络功能虚拟化编排器(NFVO)可以用于管理网络业务(network service,NS)的生命周期和资源的全局视图功能。其中,VNF的生命周期的管理可以包括从VNF实例创建到VNF实例终结的整个生命周期内的一系列管理操作,例如,VNF的实例化、VNF实例的弹性伸缩(例如扩容或缩容等)、VNF实例的治愈(healing)、VNF实例的更新、或者VNF实例的终结等。NFVO可以用于协调NS生命周期的管理、协调VNF生命周期的管理(可能需要得到VNFM的支持)、协调NFVI各类资源的管理(可能需要得到VIM的支持)、实现网络服务描述(network service descriptor,NSD)的管理、实现VNFD的管理、或者实现虚拟网络功能转发图(virtualized network function forwarding graph,VNFFG)的管理,等等,从而保障所需各类资源与连接的优化配置。NFVO还可以用于上线新的网络业务,VNF转发表,VNF包(package),等等。NFVO可以基于网络服务描述(network service descriptor,NSD)运行。其中,NSD可以包含服务链,NFV,或者性能目标(performance goal)等。例如,NFVO可以用于负责网络业务的部署。A Network Function Virtualization Orchestrator (NFVO) provides a global view of network service (NS) lifecycles and resources. VNF lifecycle management includes a series of management operations from VNF instance creation to termination, such as VNF instantiation, VNF instance scaling (e.g., expansion or reduction), VNF instance healing, VNF instance updates, and VNF instance termination. NFVO can coordinate NS lifecycle management, VNF lifecycle management (potentially requiring VNFM support), NFVI resource management (potentially requiring VIM support), network service descriptor (NSD) management, VNFD management, and virtualized network function forwarding graph (VNFFG) management, ensuring optimized configuration of required resources and connections. NFVO can also be used to deploy new network services, VNF forwarding tables, VNF packages, and more. NFVO can operate based on a network service descriptor (NSD). The NSD can contain service chains, NFVs, or performance goals. For example, NFVO can be used to manage the deployment of network services.
示例性地,NFVO、VNFM和VIM可以属于NFV系统的MANO架构。For example, NFVO, VNFM, and VIM can belong to the MANO architecture of an NFV system.
本申请实施例的技术方案可以应用于各种通信系统,包括但不限于:长期演进(long term evolution,LTE)系统、新无线(new radio,NR)系统等第五代(5th generation,5G)移动通信系统、窄带物联网(narrow band internet of things,NB-IoT)系统、增强型机器类型通信(enhanced machine-type communication,eMTC)系统、增强移动宽带(enhanced mobile broadband,eMBB)系统、超高可靠性和低时延通信(ultra reliable low latency communications,URLLC)系统、卫星通信系统、LTE-机器到机器(LTE-machine-to-machine,LTE-M)系统、或者如未来移动通信系统等5G之后演进的系统等。The technical solutions of this application can be applied to various communication systems, including but not limited to: 5th generation (5G) mobile communication systems such as Long Term Evolution (LTE) systems and New Radio (NR) systems, Narrow Band Internet of Things (NB-IoT) systems, Enhanced Machine-Type Communication (eMTC) systems, Enhanced Mobile Broadband (eMBB) systems, Ultra Reliable Low Latency Communications (URLLC) systems, satellite communication systems, LTE-machine-to-machine (LTE-M) systems, or systems that evolve after 5G, such as Future Mobile Communication systems.
下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in this application will now be described with reference to the accompanying drawings.
图1是一种通信系统的网络架构示意图。示例性地,该网络架构可以包括接入网设备和核心网。其中,接入网可以用于实现无线接入有关的功能。例如,接入网可以包括接入网设备。核心网可以包括一个或多个核心网设备。上述一个或多个核心网设备可以包括至少一个网络功能(network function,NF)。示例性地,至少一个NF可以包括:网络能力开放(NEF)网元、网络存储功能(NRF)网元、应用功能(AF)网元、策略控制功能(PCF)网元、统一数据管理(UDM)网元、接入与移动性管理功能(AMF)网元、会话管理网元(SMF)、用户面功能(UPF)网元、鉴权服务功能(AUSF)网元、网络切片选择功能(NSSF)网元、网络切片认证和授权(network slice specific authentication and authorization function,NSSAAF)网元或连接运营商网络的数据网络(data network,DN)中的至少一项。Figure 1 is a schematic diagram of a network architecture for a communication system. Exemplarily, this network architecture may include access network equipment and a core network. The access network can be used to implement functions related to radio access. For example, the access network may include access network equipment. The core network may include one or more core network equipment. These one or more core network equipment may include at least one network function (NF). Exemplarily, at least one NF may include at least one of the following: Network Capability Openness (NEF) element, Network Storage Function (NRF) element, Application Function (AF) element, Policy Control Function (PCF) element, Unified Data Management (UDM) element, Access and Mobility Management Function (AMF) element, Session Management Function (SMF) element, User Plane Function (UPF) element, Authentication Service Function (AUSF) element, Network Slice Selection Function (NSSF) element, Network Slice Authentication and Authorization Function (NSSAAF) element, or a data network (DN) connecting to an operator's network.
终端设备可以是一种具有无线收发功能的设备。终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等。终端设备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音和/或数据。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、移动互联网设备(mobile internet device,MID)、智能销售点(point of sale,POS)机、客户终端设备(customer-premises equipment,CPE)、轻型用户设备(light UE)、能力降低的用户设备(reduced capability UE,REDCAP UE)、可穿戴设备、多媒体设备、流媒体设备、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、飞行设备(例如,智能机器人、热气球、无人机、无人机控制器飞机)等等等。本申请的实施例对应用场景不做限定。终端设备有时也可以称为用户设备(user equipment,UE)、移动台和远方站等,终端设备还可以是车辆装置,例如整车装置、车载模组、车载芯片、车载单元(on board unit,OBU)或车联网终端盒子(telematics box,T-BOX)等。本申请的实施例对终端设备所采用的具体技术、设备形态以及名称不做限定。终端设备可以是支持星地空口的移动设备。终端设备可以通过空口接入卫星网络并发起呼叫、上网等业务。Terminal devices can be any device with wireless transceiver capabilities. They can be deployed on land, including indoors or outdoors, handheld, wearable, or vehicle-mounted; on water (such as ships); and in the air (e.g., on airplanes, balloons, and satellites). Terminal devices can communicate with the core network via a radio access network (RAN), exchanging voice and/or data with the RAN. Terminal devices can be mobile phones, tablets, computers with wireless transceiver capabilities, mobile internet devices (MIDs), point-of-sale (POS) machines, customer-premises equipment (CPEs), light user equipment (UEs), reduced-capability UEs (REDCAP UEs), wearable devices, multimedia devices, streaming media devices, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, and industrial control devices. Wireless terminals in various fields include autonomous driving, remote medical care, smart grids, transportation safety, smart cities, smart homes, and flying equipment (e.g., intelligent robots, hot air balloons, drones, drone controllers, etc.). The embodiments of this application do not limit the application scenarios. Terminal devices may also be called user equipment (UE), mobile stations, and remote stations. Terminal devices can also be vehicle devices, such as vehicle-mounted devices, vehicle-mounted modules, vehicle-mounted chips, on-board units (OBU), or telematics boxes (T-BOX). The embodiments of this application do not limit the specific technologies, device forms, or names used in the terminal devices. Terminal devices can be mobile devices that support satellite-to-ground air interfaces. Terminal devices can access satellite networks through air interfaces and initiate services such as making calls and accessing the internet.
接入网设备可以是网络中用于将终端设备接入到无线网络的设备。接入网设备可以为无线接入网中的节点,又可以称为基站,还可以称(无线)接入网((radio)access network,(R)AN)设备节点(或设备)。为便于描述,下面有时会用RAN来指代(无线)接入网设备。接入网设备可以包括长期演进(long term evolution,LTE)系统或演进的LTE系统(LTE-Advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),如传统的宏基站eNB和异构网络场景下的微基站eNB,或者也可以包括5G或NR系统中的下代节点B(next generation node B,gNB),或者还可以包括无线网络控制器(radio network controller,RNC)、传输接收点(transmission reception point,TRP)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU)、基带池BBU pool,或无线保真(wireless fidelity,WiFi)接入点(access point,AP)等,再或者还可以包括云接入网(cloud radio access network,Cloud RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。在接入网设备包括CU和DU的分离部署场景中,CU支持无线资源控制(radio resource control,RRC)、分组数据汇聚协议(packet data convergence protocol,PDCP)、业务数据适配协议(service data adaptation protocol,SDAP)等协议;DU主要支持无线链路控制层(radio link control,RLC)、媒体接入控制层(media access control,MAC)和物理层协议。接入网设备可以提供无线接入服务。例如,接入网设备可以为要接入的终端设备调度无线资源。又例如,接入网设备可以提供可靠的无线传输协议和/或数据加密协议等。Access network equipment can be any device in a network used to connect terminal devices to a wireless network. Access network equipment can be a node in a radio access network, also known as a base station, or a radio access network (RAN) device node (or device). For ease of description, RAN is sometimes used below to refer to radio access network equipment. Access network equipment can include evolved base stations (NodeBs or eNBs or e-NodeBs) in long-term evolution (LTE) systems or evolved LTE-Advanced (LTE-A) systems, such as traditional macro base stations (eNBs) and micro base stations (eNBs) in heterogeneous network scenarios. It can also include next-generation node Bs (gNBs) in 5G or NR systems, or radio network controllers (RNCs) and transmission reception points. Access network devices include, but are not limited to, points (TRPs), home base stations (e.g., home-evolved NodeBs, or home Node Bs, HNBs), baseband units (BBUs), baseband pools (BBU pools), or wireless fidelity (WiFi) access points (APs), or centralized units (CUs) and distributed units (DUs) in cloud radio access networks (Cloud RAN) systems. In scenarios where access network devices include separate deployments of CUs and DUs, the CU supports protocols such as radio resource control (RRC), packet data convergence protocol (PDCP), and service data adaptation protocol (SDAP); the DU primarily supports radio link control (RLC), media access control (MAC), and physical layer protocols. Access network equipment can provide wireless access services. For example, access network equipment can schedule wireless resources for terminal devices that need to access the network. It can also provide reliable wireless transmission protocols and/or data encryption protocols.
在不同系统中,CU(或CU-CP和CU-UP)、DU或无线单元(radio unit,RU)也可以有不同的名称,但是本领域的技术人员可以理解其含义。例如,在开放式无线接入网(open-radio access network,O-RAN)系统中,CU也可以称为O-CU(开放式CU),DU也可以称为O-DU,CU-CP也可以称为O-CU-CP,CU-UP也可以称为O-CU-UP,RU也可以称为O-RU。为描述方便,本申请中以CU,CU-CP,CU-UP、DU和RU为例进行描述。本申请中的CU(或CU-CP、CU-UP)、DU和RU中的任一单元,可以是通过软件模块、硬件模块、或者软件模块与硬件模块结合来实现。In different systems, CU (or CU-CP and CU-UP), DU, or radio unit (RU) may have different names, but those skilled in the art will understand their meaning. For example, in an open-radio access network (O-RAN) system, CU can also be called O-CU (open CU), DU can also be called O-DU, CU-CP can also be called O-CU-CP, CU-UP can also be called O-CU-UP, and RU can also be called O-RU. For ease of description, this application uses CU, CU-CP, CU-UP, DU, and RU as examples. Any of the units among CU (or CU-CP, CU-UP), DU, and RU in this application can be implemented through software modules, hardware modules, or a combination of software modules and hardware modules.
本申请实施例中,终端设备可以包括上述接入网设备。例如,在涉及到控制面和用户面解耦的安全保护开启流程中,终端设备可以包括上述接入网设备。In this embodiment, the terminal device may include the aforementioned access network device. For example, in a security protection activation process involving the decoupling of the control plane and the user plane, the terminal device may include the aforementioned access network device.
网络能力开放网元,可以将网络的部分功能有控制地暴露给应用。在5G通信系统中,网络能力开放网元可以是网络能力开放功能(NEF),在未来通信系统中,网络能力开放网元可以仍是NEF网元,或者也可以具有其它名称,本申请并不限定。Network capability open elements can expose some network functions to applications in a controlled manner. In 5G communication systems, network capability open elements can be Network Capability Open Functions (NEF). In future communication systems, network capability open elements may still be NEF elements, or they may have other names; this application is not limited to these.
网络存储功能网元,主要用于对网元、网元所提供服务或网元功能进行注册登记、发现、状态检测等。网络存储功能网元可以实现网络功能服务自动化管理、选择和可扩展,并允许每个网络功能发现其它网络功能提供的服务。在5G通信系统中,网络存储功能网元可以是网络存储功能(NRF),在未来通信系统中,网络存储功能网元可以仍是NRF网元,或者也可以具有其它名称,本申请并不限定。Network storage function (NRF) network elements are primarily used for registration, discovery, and status detection of network elements, the services they provide, and their functions. NRF network elements enable automated management, selection, and scalability of network function services, and allow each network function to discover services provided by other network functions. In 5G communication systems, NRF network elements may be network storage functions (NRFs). In future communication systems, NRF network elements may remain NRF network elements or have other names; this application does not limit this.
应用功能网元,可以用于传递应用侧对网络侧的需求。例如,需求可以包括服务质量(quality of service,QoS)需求或用户状态事件订阅等。应用功能网元可以向运营商的通信网络的控制面网元提供各类应用的服务数据,或者从通信网络的控制面网元获得网络的数据信息和控制信息。在5G通信系统中,应用功能网元可以是应用功能(AF),在未来的通信系统中,应用功能网元可以仍是AF网元,或者也可以具有其它名称,本申请并不限定。例如,应用功能网元也可以称为应用服务器或业务服务器。另外,应用功能网元可以是运营商网络部署的,也可以是第三方部署的。Application function network elements can be used to convey application-side requests to the network side. For example, requests may include Quality of Service (QoS) requirements or user state event subscriptions. Application function network elements can provide various application service data to the control plane network elements of the operator's communication network, or obtain network data and control information from the control plane network elements of the communication network. In 5G communication systems, application function network elements can be application functions (AFs). In future communication systems, application function network elements may still be AF network elements, or they may have other names; this application is not limited to any particular name. For example, application function network elements can also be called application servers or service servers. Furthermore, application function network elements can be deployed on the operator's network or deployed by a third party.
网络切片认证和授权网元,可以用于网络切片的认证和授权。例如,网络切片认证和授权网元可以通过认证、授权和计费代理(authentication,authorization,and accounting proxy,AAA-P)与认证、授权和计费服务器(authentication,authorization,and accounting server,AAA-S)交互。在5G通信系统中,应用功能网元可以是网络切片认证和授权网元(network slice specific authentication and authorization function,NSSAAF),在未来的通信系统中,网络切片认证和授权网元可以仍是NSSAAF网元,或者也可以具有其它名称,本申请并不限定。Network slice authentication and authorization network elements can be used for network slice authentication and authorization. For example, network slice authentication and authorization network elements can interact with authentication, authorization, and accounting servers (AAA-S) through authentication, authorization, and accounting proxies (AAA-P). In 5G communication systems, application function network elements can be network slice specific authentication and authorization functions (NSSAAF). In future communication systems, network slice authentication and authorization network elements can still be NSSAAF network elements, or they can have other names; this application is not limited to these.
策略控制功能网元也可以称为策略控制网元,可以用于制定和管理整个网络(例如5G网络)的策略。策略控制网元可以包括策略控制功能、计费策略控制功能等。策略控制网元可以进行QoS流控制策略、网络切片策略、移动性管理策略、计费策略、UE接入策略等的生成与维护。策略控制网元可以根据运营商的业务需求和网络状态,动态生成和调整策略,并将策略下发给接入与移动性管理网元、会话管理网元、用户面功能网元等相关网元,以指导这些相关网元的行为。此外,策略控制网元还可以接收应用功能网元的服务质量需求,并将其转化为相应的策略。在5G通信系统中,策略控制网元可以是策略控制功能(PCF),在未来通信系统中,策略控制网元可以仍是PCF网元,或者也可以具有其它名称,本申请并不限定。Policy control function network elements, also known as policy control network elements, are used to formulate and manage policies for the entire network (e.g., 5G networks). Policy control network elements can include policy control functions, charging policy control functions, etc. They can generate and maintain QoS flow control policies, network slicing policies, mobility management policies, charging policies, UE access policies, etc. Policy control network elements can dynamically generate and adjust policies based on the operator's service needs and network status, and distribute these policies to relevant network elements such as access and mobility management network elements, session management network elements, and user plane function network elements to guide their behavior. Furthermore, policy control network elements can receive QoS requirements from application function network elements and translate them into corresponding policies. In 5G communication systems, policy control network elements can be policy control functions (PCF). In future communication systems, policy control network elements may remain PCF network elements or have other names; this application is not limited to these.
统一数据管理网元,主要用于管理和存储终端设备的用户数据(或签约信息)。例如,用户身份信息、认证信息、订阅信息、策略信息等。统一数据管理网元可以为其他网元提供用户数据的查询和更新服务。统一数据管理网元可以支持用户的认证、鉴权和密钥管理等功能。此外,统一数据管理网元可以根据策略控制网元的策略,对用户数据进行更新和同步。在5G通信系统中,统一数据管理网元可以是统一数据管理(UDM),在未来通信系统中,统一数据管理网元可以仍是UDM网元,或者也可以具有其它名称,本申请并不限定。A unified data management network element is primarily used to manage and store user data (or subscription information) from terminal devices. This includes, for example, user identity information, authentication information, subscription information, and policy information. The unified data management network element can provide user data query and update services to other network elements. It supports user authentication, authorization, and key management functions. Furthermore, the unified data management network element can update and synchronize user data according to the policies of policy control network elements. In 5G communication systems, the unified data management network element can be a unified data management (UDM) element. In future communication systems, the unified data management network element may still be a UDM element, or it may have other names; this application is not limiting.
接入与移动性管理网元也可以称为接入与移动性管理功能网元,主要用于移动网络中的终端的附着、跟踪区更新流程,接入与移动性管理网元可以提供非接入层(non access stratum,NAS)消息、完成注册管理、连接管理、可达性管理、分配跟踪区域列表(track area list,TA list)、接入授权、鉴权以及移动性管理等,并且透明路由会话管理(session management,SM)消息到会话管理网元。在第五代(5th generation,5G)通信系统中,接入与移动性管理网元可以是接入与移动性管理功能(AMF),在未来通信系统中,移动性管理网元可以仍是AMF网元,或者也可以具有其它名称,本申请并不限定。Access and mobility management (AMF) network elements, also known as access and mobility management function (AMF) network elements, are primarily used for terminal attachment and tracking area update procedures in mobile networks. AMF network elements can provide non-access stratum (NAS) messages, complete registration management, connection management, reachability management, allocate tracking area lists (TA lists), grant access authorization, authenticate, and manage mobility, and transparently route session management (SM) messages to session management network elements. In 5G communication systems, AMF network elements can be access and mobility management functions (AMF). In future communication systems, AMF network elements may remain AMF network elements or have other names; this application is not limited to these names.
会话管理网元也可以称为会话管理功能网元,可以用于移动网络中的会话和承载管理,如会话建立、修改、释放。具体功能如为UE分配和管理互联网协议(internet protocol,IP)地址、选择提供报文转发功能的用户面功能网元等。例如,会话管理网元可以根据UE的请求和策略控制网元的策略控制信息,为该UE选择合适的用户面功能网元,并与该用户面功能网元建立会话,生成QoS规则和计费规则等。会话管理网元可以控制用户面功能网元的数据转发和处理行为。在5G通信系统中,会话管理网元可以是会话管理功能(SMF),在未来通信系统中,会话管理网元可以仍是SMF网元,或者也可以具有其它名称,本申请并不限定。Session management network elements, also known as session management function network elements, can be used for session and bearer management in mobile networks, such as session establishment, modification, and release. Specific functions include allocating and managing Internet Protocol (IP) addresses for the UE, and selecting user plane function network elements that provide packet forwarding capabilities. For example, a session management network element can select a suitable user plane function network element for the UE based on the UE's request and the policy control information of the policy control network element, establish a session with that user plane function network element, and generate QoS rules and charging rules. Session management network elements can control the data forwarding and processing behavior of user plane function network elements. In 5G communication systems, the session management network element can be a Session Management Function (SMF). In future communication systems, the session management network element may still be an SMF network element, or it may have other names; this application is not limited to these.
鉴权服务功能网元,主要用于执行终端的安全认证。在5G通信系统中,鉴权服务功能网元可以是鉴权服务功能(AUSF),在未来通信系统中,鉴权服务功能网元可以仍是AUSF网元,或者也可以具有其它名称,本申请并不限定。The authentication service function network element is mainly used to perform security authentication of the terminal. In 5G communication systems, the authentication service function network element can be an Authentication Service Function (AUSF). In future communication systems, the authentication service function network element can still be an AUSF network element, or it can have other names. This application does not limit this.
网络切片选择功能网元,主要用于为终端选择网络切片。在5G通信系统中,网络切片选择功能网元可以是网络切片选择功能(NSSF),在未来通信系统中,网络切片选择功能网元可以仍是NSSF网元,或者也可以具有其它名称,本申请并不限定。The network slice selection function network element is mainly used to select network slices for terminals. In 5G communication systems, the network slice selection function network element can be the Network Slice Selection Function (NSSF). In future communication systems, the network slice selection function network element can still be the NSSF network element, or it can have other names. This application does not limit this.
用户面功能网元,可以用于对用户报文进行处理,如转发、计费等。并且,用户面功能网元可以用于用户面数据包的路由、转发、QoS流的处理、门限控制、流量监测、验证、数据包的检测和上报等功能。用户面功能网元还可以用于UE IP地址的管理、核心网(core network,CN)隧道信息的管理等。用户面功能网元可以位于5G核心网用户面,为UE提供高速、高效、灵活的数据传输服务。此外,用户面功能网元还可以根据控制面的指示,对数据包进行过滤、流量整形、计费等处理,实现对用户数据流的精细化管理和控制。用户面功能网元可以通过N3接口与接入网设备连接,通过N6接口与数据网络连接,从而实现UE与外部数据网络之间的数据传输。用户面功能网元也可以称为协议数据单元(protocol data unit,PDU)会话锚点(PDU session anchor,PSA)。在5G通信系统中,用户面功能网元可以是用户面功能(UPF),在未来通信系统中,用户面功能网元可以仍是UPF网元,或者也可以具有其它名称,本申请并不限定。User plane function network elements (MPFs) can be used to process user packets, such as forwarding and billing. Furthermore, MPFs can handle user plane data packet routing, forwarding, QoS flow processing, threshold control, traffic monitoring, authentication, data packet detection, and reporting. MPFs can also manage UE IP addresses and core network (CN) tunnel information. Located in the 5G core network user plane, MPFs provide high-speed, efficient, and flexible data transmission services to the UE. In addition, MPFs can perform data packet filtering, traffic shaping, and billing according to control plane instructions, enabling fine-grained management and control of user data flows. MPFs can connect to access network equipment via the N3 interface and to the data network via the N6 interface, thus enabling data transmission between the UE and the external data network. MPFs can also be referred to as Protocol Data Unit (PDU) session anchors (PSAs). In 5G communication systems, user plane function network elements can be user plane functions (UPF). In future communication systems, user plane function network elements can still be UPF network elements, or they can have other names. This application does not limit this.
数据网络,主要用于为终端设备提供数据传输服务。数据网络可以是私有网络,如局域网,也可以是公用数据网(public data network,PDN)网络,如因特网(Internet),还可以是运营商共同部署的专有网络,如配置的IP多媒体网络子系统(IP multimedia core network subsystem,IMS)服务。数据网络还可以来自第三方。Data networks are primarily used to provide data transmission services for terminal devices. Data networks can be private networks, such as local area networks (LANs), public data networks (PDNs), such as the Internet, or dedicated networks jointly deployed by operators, such as configured IP multimedia core network subsystems (IMS) services. Data networks can also originate from third parties.
在图1所示的架构中,各个网元之间的接口名称及功能如下:In the architecture shown in Figure 1, the interface names and functions between the various network elements are as follows:
1、N1:AMF与UE之间的接口,可以用于向UE传递QoS控制规则等。1. N1: The interface between AMF and UE, which can be used to transmit QoS control rules to UE, etc.
2、N2:AMF与(R)AN之间的接口,可以用于传递核心网侧至RAN的无线承载控制信息等。2. N2: The interface between AMF and (R)AN, which can be used to transmit radio bearer control information from the core network side to the RAN.
3、N3:RAN与UPF之间的接口,用于传递RAN与UPF间的上行或下行用户面数据。3. N3: The interface between RAN and UPF, used to transmit uplink or downlink user plane data between RAN and UPF.
4、N4:SMF与UPF之间的接口,可以用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。4. N4: The interface between SMF and UPF, which can be used to transmit information between the control plane and the user plane, including the distribution of forwarding rules, QoS control rules, traffic statistics rules, etc. from the control plane to the user plane, as well as the reporting of information from the user plane.
5、N6:UPF与DN之间的接口,用于传递UPF与DN之间的上行或下行用户数据流。5. N6: The interface between UPF and DN, used to transmit uplink or downlink user data streams between UPF and DN.
6、服务化的接口Nnssf、Nnef、Nnrf、Npcf、Nudm、Naf、Nnssaaf、Nausf、Namf、Nsmf可以分别为上述NSSF网元、NEF网元、NRF网元、PCF网元、UDM网元、AF网元、NSSAAF网元、AUSF网元、AMF网元、和SMF网元提供的服务化接口,用于调用相应的服务化操作。6. The service-oriented interfaces Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nnssaaf, Nausf, Namf, and Nsmf can be service-oriented interfaces provided by the above-mentioned NSSF, NEF, NRF, PCF, UDM, AF, NSSAAF, AUSF, AMF, and SMF network elements, respectively, and are used to call the corresponding service-oriented operations.
上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选地,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。The aforementioned network element or function can be a network component in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform). Optionally, the aforementioned network element or function can be implemented by one device, multiple devices working together, or a functional module within a single device; this application embodiment does not specifically limit this.
上述命名仅为便于区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除在5G网络以及未来其他的网络中采用其他命名的可能。例如,在未来通信系统中,上述各个网络中的部分或全部可以沿用5G中的术语,也可能采用其他名称等。图1中的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请对此不作具体限定。此外,上述各个网元之间所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。The naming conventions described above are defined solely for the purpose of distinguishing different functions and should not be construed as limiting the scope of this application. This application does not preclude the possibility of using other naming conventions in 5G networks and other future networks. For example, in future communication systems, some or all of the aforementioned network terminology may be retained from 5G, or other names may be used. The interface names between the various network elements in Figure 1 are merely examples; in specific implementations, the interface names may be different, and this application does not impose any specific limitations on them. Furthermore, the names of the messages (or signaling) transmitted between the aforementioned network elements are also merely examples and do not constitute any limitation on the function of the messages themselves.
上述“网元”也可以称为实体、设备、装置或模块等,本申请并未特别限定。并且,在本申请中,为了便于理解和说明,在对部分描述中省略“网元”这一描述,例如,将PCF网元简称PCF,此情况下,该“PCF”应理解为PCF网元或PCF实体,以下省略对相同或相似情况的说明。The term "network element" can also be referred to as an entity, device, apparatus, or module, etc., and this application does not specifically limit it. Furthermore, in this application, for ease of understanding and explanation, the description of "network element" is omitted in some descriptions. For example, the PCF network element is abbreviated as PCF. In this case, "PCF" should be understood as PCF network element or PCF entity. The following omits descriptions of the same or similar cases.
图2是一种远程证明方法200的示意性流程图。方法200通过验证者和度量者之间的交互,可以实现RA。下面结合图2介绍方法200。Figure 2 is a schematic flowchart of a remote proof method 200. Method 200 achieves RA through the interaction between the verifier and the measurer. Method 200 is described below with reference to Figure 2.
S210,验证者向度量者发送挑战消息。相应地,度量者接收来自验证者的挑战消息。S210, the verifier sends a challenge message to the measurand. Correspondingly, the measurand receives the challenge message from the verifier.
其中,度量者和验证者可以分离,例如,度量者可以部署在上述系统或设备的一侧,而验证者部署在远程。In this system, the measurer and the verifier can be separated. For example, the measurer can be deployed on one side of the system or device mentioned above, while the verifier can be deployed remotely.
示例性地,挑战消息可以携带有请求信息。该请求信息用于请求度量者进行度量。例如,请求信息可以用于请求度量者对上述系统或设备进行度量。挑战消息还可以携带本次度量唯一对应的随机数(nonce)。该随机数可以用于度量者度量使用。For example, the challenge message may carry a request message. This request message is used to request the measurement provider to perform the measurement. For instance, the request message may be used to request the measurement provider to perform the measurement on the aforementioned system or device. The challenge message may also carry a unique nonce corresponding to this measurement. This nonce can be used by the measurement provider for measurement purposes.
S220,度量者执行度量。S220, the measurer performs the measurement.
示例性地,度量者可以根据挑战消息,从上述系统或设备进行度量获取度量所需的证据。例如,度量者可以获取这些系统或设备内部的程序或文件等,并根据随机数计算这些程序或文件对应的散列值。For example, the measurer can obtain the evidence required for measurement from the aforementioned system or device based on the challenge message. For instance, the measurer can obtain programs or files within these systems or devices and calculate hash values corresponding to these programs or files based on random numbers.
S230,度量者向验证者发送响应消息。相应的,验证者接收来自度量者的响应消息。S230, the measurer sends a response message to the verifier. Correspondingly, the verifier receives the response message from the measurer.
示例性地,响应消息可以用于指示度量完成。例如,响应消息可以携带上述散列值。又例如,响应消息可以携带上述随机数。For example, the response message can be used to indicate that the measurement is complete. For instance, the response message can carry the hash value described above. Or, for another example, the response message can carry the random number described above.
S240,验证者执行验证。S240, the verifier performs the verification.
示例性地,验证者可以确定响应消息中携带的随机数与挑战消息中携带的本次度量唯一对应的随机数是否一致。在两个随机数不一致的情况下,验证者可以判断验证失败。在两个随机数一致的情况下,验证者可以进行进一步验证。For example, the verifier can determine whether the random number carried in the response message matches the random number uniquely corresponding to this metric carried in the challenge message. If the two random numbers do not match, the verifier can determine that the verification has failed. If the two random numbers match, the verifier can proceed with further verification.
示例性地,验证者进行进一步验证可以包括:验证者可以将响应消息中的散列值与上述系统或设备的预设散列值比较。如果响应消息中的散列值与上述预设散列值相同,那么可以表示这些系统或设备的程序或软件未被篡改,从而,验证者可以确定这些系统或设备是可信设备,也即确定验证通过。如果响应消息中的散列值与上述预设散列值不同,那么可以表示这些系统或设备的程序或软件可能被篡改,从而,验证者可以确定这些系统或设备是不可信设备,也即确定验证失败。在一些可能的实现方式中,在验证失败的情况下,这些系统或设备可以被重置或擦除。For example, further verification by the verifier may include comparing the hash value in the response message with a preset hash value for the aforementioned system or device. If the hash value in the response message matches the preset hash value, it indicates that the program or software of these systems or devices has not been tampered with, and thus the verifier can determine that these systems or devices are trusted devices, i.e., the verification passes. If the hash value in the response message differs from the preset hash value, it indicates that the program or software of these systems or devices may have been tampered with, and thus the verifier can determine that these systems or devices are untrusted devices, i.e., the verification fails. In some possible implementations, in the event of verification failure, these systems or devices can be reset or erased.
图3示出了NFV的架构示意图。该NFV系统300可以运行在服务器上,该服务器的构成可以包括处理器、硬盘、内存、系统总线等,和通用的计算机架构类似。该服务器的功能可以由一个物理设备实现,也可以由多个物理设备构成的集群实现。本申请对此不做限定。并且,该NFV系统300可以通过多种网络实现,例如数据中心网络、服务提供者网络、或者局域网(local area network,LAN)。如图3所示,该NFV系统300可以包括:NFV-MANO 128,NFVI 130,一个或多个VNF 108(例如,VNF 1,VNF 2,VNF 3),一个或多个单元管理(element management,EM)122(例如,EM 1,EM 2,EM 3),服务、VNF和基础设施描述(service,VNF and infrastructure description)126,一个或多个运营支撑系统(operation support system,OSS)和/或业务支撑系统(business support system,BSS)124。其中,一个EM 122可以对应一个EMS,或者,多个EM 122可以对应一个EMS,本申请对此不限定。Figure 3 illustrates the architecture of NFV. The NFV system 300 can run on a server, which may include a processor, hard disk, memory, system bus, etc., similar to a general computer architecture. The server's functionality can be implemented by a single physical device or by a cluster of multiple physical devices. This application does not limit this. Furthermore, the NFV system 300 can be implemented through various networks, such as data center networks, service provider networks, or local area networks (LANs). As shown in Figure 3, the NFV system 300 may include: NFV-MANO 128, NFVI 130, one or more VNFs 108 (e.g., VNF 1, VNF 2, VNF 3), one or more element management (EM) systems 122 (e.g., EM 1, EM 2, EM 3), service, VNF and infrastructure description 126, and one or more operation support systems (OSS) and/or business support systems (BSS) 124. One EM 122 may correspond to one EMS, or multiple EMs 122 may correspond to one EMS; this application does not limit this.
示例性地,MANO 128可以包括NFVO 102、一个或多个VNFM 104,以及一个或多个VIM 106。For example, MANO 128 may include NFVO 102, one or more VNFM 104, and one or more VIM 106.
示例性地,NFVI 130可以包括硬件资源层、虚拟化层或虚拟资源层。For example, NFVI 130 may include a hardware resource layer, a virtualization layer, or a virtual resource layer.
其中,硬件资源层可以包括计算硬件112、存储硬件114、或网络硬件116。其中,虚拟资源层可以包括虚拟计算110(例如,虚拟机)、虚拟存储118或虚拟网络120。其中,计算硬件112可以为专用的处理器或通用的用于提供处理和计算功能的处理器。存储硬件114用于提供存储能力,该存储能力可以是存储硬件114本身提供的(例如一台服务器的本地内存),也可以通过网络提供(例如服务器通过网络连接一个网络存储设备)。网络硬件116可以是交换机、路由器和/或其他网络设备,网络硬件116可以用于实现多个设备之间的通信,多个设备之间通过无线或有线连接。The hardware resource layer may include computing hardware 112, storage hardware 114, or network hardware 116. The virtual resource layer may include virtual computing 110 (e.g., a virtual machine), virtual storage 118, or a virtual network 120. The computing hardware 112 may be a dedicated processor or a general-purpose processor used to provide processing and computing functions. The storage hardware 114 provides storage capacity, which may be provided by the storage hardware 114 itself (e.g., the local memory of a server) or provided via a network (e.g., a server connecting to a network storage device via a network). The network hardware 116 may be a switch, router, and/or other network devices, and may be used to enable communication between multiple devices, which may be connected wirelessly or via wired connections.
其中,NFVI 130中的虚拟化层可以用于抽象硬件资源层的硬件资源,将VNF 108和硬件资源所属的物理层解耦,向VNF提供虚拟资源。虚拟化层也可以称为虚拟机管理程序(hypervisor)或容器管理系统。The virtualization layer in NFVI 130 can be used to abstract hardware resources from the hardware resource layer, decoupling the VNF 108 from the physical layer to which the hardware resources belong, and providing virtual resources to the VNF. The virtualization layer can also be called a hypervisor or a container management system.
其中,虚拟资源层可以包括虚拟计算110、虚拟存储118或虚拟网络120。其中,虚拟计算110、虚拟存储118可以以虚拟机或其他虚拟容器的形式向VNF 108提供虚拟资源,例如,一个或多个VNF 108可以部署在一台或多台虚拟机上。虚拟化层通过抽象网络硬件116形成虚拟网络120。虚拟网络120,例如虚拟交换机,可以用于实现多个虚拟机之间,或多个承载VNF的其他类型的虚拟容器之间的通信。The virtual resource layer may include virtual computing 110, virtual storage 118, or virtual network 120. Virtual computing 110 and virtual storage 118 can provide virtual resources to VNF 108 in the form of virtual machines or other virtual containers; for example, one or more VNFs 108 can be deployed on one or more virtual machines. The virtualization layer forms virtual network 120 through abstract network hardware 116. Virtual network 120, such as a virtual switch, can be used to enable communication between multiple virtual machines or between multiple other types of virtual containers hosting VNFs.
示例性地,OSS/BSS124可以面向电信运营商,提供综合的网络管理和业务运营功能,包括网络管理(例如故障监控、网络信息收集等)、计费管理以及客户服务管理等。For example, OSS/BSS124 can be provided to telecommunications operators with comprehensive network management and service operation functions, including network management (such as fault monitoring, network information collection, etc.), billing management, and customer service management.
示例性地,MANO 128可以用于实现VNF 108和NFVI 130的监控和管理。NFVO 102可以与一个或多个VNFM 104通信以实现与资源相关的请求、发送配置信息给VNFM 104、以及收集VNF108的状态信息。另外,NFVO 102还可以与VIM 106进行通信以实现资源分配,和/或实现虚拟化硬件资源的配置信息和状态信息的预留和交换。VNFM 104可以用于管理一个或多个VNF 108,执行各种管理功能,例如初始化、更新、查询、和/或终止VNF 108。VIM 106可以用于控制和管理VNF 108、计算硬件112、存储硬件114、网络硬件116、虚拟计算110、虚拟存储118、或虚拟网络120的交互。例如,VIM 106可以用于执行资源向VNF 108的分配操作。VNFM 104和VIM 106可以互相通信以交换虚拟化硬件资源配置和状态信息。For example, MANO 128 can be used to monitor and manage VNF 108 and NFVI 130. NFVO 102 can communicate with one or more VNFM 104 to make resource-related requests, send configuration information to VNFM 104, and collect status information of VNF 108. Additionally, NFVO 102 can communicate with VIM 106 to allocate resources and/or reserve and exchange configuration and status information for virtualized hardware resources. VNFM 104 can be used to manage one or more VNFs 108, performing various management functions such as initializing, updating, querying, and/or terminating VNFs 108. VIM 106 can be used to control and manage the interaction between VNF 108, computing hardware 112, storage hardware 114, network hardware 116, virtual computing 110, virtual storage 118, or virtual network 120. For example, VIM 106 can be used to perform resource allocation operations to VNF 108. VNFM 104 and VIM 106 can communicate with each other to exchange virtualization hardware resource configuration and status information.
NFVI 130包含硬件和软件,二者共同建立虚拟化环境以部署、管理和执行VNF 108。换句话说,硬件资源层和虚拟资源层用于向VNF 108提供虚拟资源,例如虚拟机和/或其他形式的虚拟容器。NFVI 130 comprises hardware and software that together establish a virtualization environment for deploying, managing, and executing VNF 108. In other words, the hardware resource layer and the virtual resource layer are used to provide virtual resources, such as virtual machines and/or other forms of virtual containers, to VNF 108.
如图3所示,VNFM 104可以与VNF 108和EM 122通信以执行VNF生命周期管理和实现配置/状态信息的交换。VNF 108可以是至少一个网络功能的虚拟化,该网络功能之前是由物理网络设备提供的。一个虚拟机(或其他形式的虚拟容器)上可以部署有一个或多个VNF 108。EM 122可以用于管理一个或多个VNF。As shown in Figure 3, VNFM 104 can communicate with VNF 108 and EM 122 to perform VNF lifecycle management and exchange configuration/state information. VNF 108 can be a virtualization of at least one network function that was previously provided by a physical network device. One or more VNF 108s can be deployed on a virtual machine (or other form of virtual container). EM 122 can be used to manage one or more VNFs.
以上对各模块的功能的介绍是为了帮助本领域技术人员更好地理解本申请实施例,而非要限制本申请实施例的范围。本申请并不排除上述列举的各模块具有执行其他功能或者,在上述NFV系统中增加或删减模块的可能。The above description of the functions of each module is intended to help those skilled in the art better understand the embodiments of this application, and is not intended to limit the scope of the embodiments of this application. This application does not exclude the possibility that the modules listed above may perform other functions, or that modules may be added or removed in the above NFV system.
示例性地,上述架构可以应用于Cloud RAN系统。例如,Could RAN系统可以包括上述架构。又例如,Cloud RAN系统可以包括一个或多个VNF。Cloud RAN系统可以指通过通用计算平台(而不是专用硬件平台)实现RAN的功能,并基于云原生原则,管理RAN功能的虚拟化。示例性地,RAN的云化可以从通过通用硬件平台在容器中运行某些5G RAN网络功能开始。其中,通用硬件平台可以包括商用现货(commercial off-the-shelf,COTS)平台。例如,首先对中央单元的控制平面和用户平面进行云化,然后对分布式单元中对延迟敏感的无线处理功能进行云化。在RAN的云化过程中,Cloud RAN系统可以采用领先的技术,成为5G开放的基础,并且使能5G创新。示例性地,RAN的云化过程可以包括COTS硬件,云原生架构,管理、编排和自动化,或者RAN的可编程性。示例性地,对于COTS硬件(包括加速器),可以选择合适的硬件平台和环境。示例性地,对于云原生架构,可以使用舵手(Kubernetes)等云原生技术并应用开发和运营维护(development operations,DevOps)原则,将RAN功能作为一种微服务,通过容器技术部署在裸机服务器上。示例性地,对于管理、编排和自动化,可以实现跨Cloud RAN系统、传输、5G核心网和底层云基础设施实现端到端的服务生命周期管理。示例性地,对于RAN可编程性,可以在虚拟化系统中部署非RAN功能,以添加新的功能和附加价值。For example, the above architecture can be applied to a Cloud RAN system. For instance, a Cloud RAN system may include the above architecture. As another example, a Cloud RAN system may include one or more VNFs. A Cloud RAN system can refer to implementing RAN functions through a general-purpose computing platform (rather than a dedicated hardware platform) and managing the virtualization of RAN functions based on cloud-native principles. For example, RAN cloudification can begin with running certain 5G RAN network functions in containers through a general-purpose hardware platform. This general-purpose hardware platform can include a commercial off-the-shelf (COTS) platform. For example, the control plane and user plane of the central unit are first cloudified, followed by the latency-sensitive radio processing functions in the distributed units. During RAN cloudification, the Cloud RAN system can employ leading technologies to become the foundation for 5G openness and enable 5G innovation. For example, the RAN cloudification process may include COTS hardware, cloud-native architecture, management, orchestration and automation, or RAN programmability. For example, for COTS hardware (including accelerators), suitable hardware platforms and environments can be selected. For example, for cloud-native architectures, cloud-native technologies such as Kubernetes can be used, along with development operations (DevOps) principles, to deploy RAN functions as microservices on bare-metal servers using container technology. For example, for management, orchestration, and automation, end-to-end service lifecycle management can be achieved across the Cloud RAN system, transport, 5G core network, and underlying cloud infrastructure. For example, for RAN programmability, non-RAN functions can be deployed in virtualized systems to add new functionality and value.
本申请对Cloud RAN的具体名称不做限定,例如,Could RAN也可以称为虚拟化RAN(virtualized RAN,vRAN)、云化RAN、CouldRAN或其他名称。This application does not specify the exact name of Cloud RAN. For example, Cloud RAN can also be called Virtualized RAN (vRAN), Cloud RAN, Cloud RAN, or other names.
图4为基于远程证明的NFV的架构示意图。下面结合图4介绍NFV中实现远程证明的一种可能的方法。Figure 4 is a schematic diagram of the architecture of NFV based on remote proof. The following section, in conjunction with Figure 4, introduces a possible method for implementing remote proof in NFV.
S1,依赖方VNF确定对未验证的(untrusted)VNF进行度量。S1, the dependent VNF determines to measure the untrusted VNF.
示例性地,该未验证的(untrusted)VNF即将被实例化。在实例化前,该VNF可以向依赖方VNF发起请求。例如AMF可以是未验证的VNF,AMF可以向依赖方VNF(例如,NRF)发送请求信息,该请求信息可以用于请求NF的配置文件。示例性地,该请求信息可以是或承载于NF管理注册请求消息中。例如,该NF管理注册请求消息可以为Nnrf_NF管理(Management)_NF注册(Register)请求消息。For example, the untrusted VNF is about to be instantiated. Before instantiation, the VNF can make requests to dependent VNFs. For example, the AMF can be an untrusted VNF, and the AMF can send request information to dependent VNFs (e.g., NRFs). This request information can be used to request the NF's configuration file. For example, this request information can be or be carried in an NF management registration request message. For example, the NF management registration request message can be an Nnrf_NF Management_NF Register request message.
S2,依赖方VNF可以向PACF发送挑战消息。S2, the dependent VNF can send a challenge message to the PACF.
S3,PACF可以将该挑战消息从第三代合作伙伴计划(3rd generation partnership project,3GPP)协议转化为欧洲电信标准化协会(European telecommunications standards institute,ETSI)协议,从而向验证者发送挑战消息。S3, PACF can convert the challenge message from the 3rd generation partnership project (3GPP) protocol to the European Telecommunications Standards Institute (ETSI) protocol, thereby sending the challenge message to the verifier.
S4,验证者向度量者发送挑战消息,该挑战消息可以用于请求度量者发起对VNF的度量。S4, the verifier sends a challenge message to the measurand, which can be used to request the measurand to initiate a measurement of the VNF.
S5,度量者测量VNF的运行状态,获得证据。S5, the measurer measures the operational status of the VNF to obtain evidence.
例如,证据可以是一组关于目标环境的声明。这些声明可以用于揭示具有安全相关性的操作状态、运行状况、配置或结构。在一种可能的实现方式中,证据可以是度量者对当前VNF文件的哈希值。For example, evidence could be a set of statements about the target environment. These statements could be used to reveal the operational status, health, configuration, or structure that are security-related. In one possible implementation, evidence could be a measurer's hash of the current VNF file.
S6,度量者向验证者发送证据。S6, the measurer sends evidence to the verifier.
S7,验证者根据证据获得证明结果。S7, the verifier obtains the proof result based on the evidence.
示例性地,证明结果可以用于依赖方VNF决定信任特定度量者的程度,并允许该度量者所度量的VNF访问某些数据或执行某些操作的输入。可选地,验证者可以预配置参考值,该参考值可以用于对证据进行比较。例如,参考值可以是预配置的VNF文件的哈希值。验证者对比证据与参考值是否一致,判断VNF是否处于正常的运行状态,即VNF的运行逻辑因为VNF文件未被篡改而正常运行。For example, the proof result can be used by the dependent VNF to determine the degree to which it trusts a particular metric and allows the VNF measured by that metric to access certain data or perform certain operations. Optionally, the verifier can pre-configure a reference value that can be used to compare the evidence. For example, the reference value could be the hash value of a pre-configured VNF file. The verifier compares the evidence with the reference value to determine whether the VNF is in a normal operating state, i.e., whether the VNF's operating logic is functioning correctly because the VNF file has not been tampered with.
S8,验证者向PACF发送指示证明结果的信息。S8, the verifier sends information to PACF indicating the proof result.
S9,PACF可以将指示证明结果的信息进行ETSI协议与3GPP协议的转化。S9, PACF can convert information indicating the proof results between the ETSI and 3GPP protocols.
S10,PACF可以将指示证明结果的信息发送到依赖方。S10, PACF can send information indicating the proof result to the dependent party.
S11,依赖方可以根据证明结果,决定是否接受该未验证的VNF发起的请求。S11, the dependent party can decide whether to accept the request initiated by the unverified VNF based on the proof results.
图4示出的远程证明方案的安全性不足。例如,度量者可能出现单点故障或可能恶意,降低了远程证明的安全性。Figure 4 illustrates the security shortcomings of remote proof schemes. For example, the measurer may experience a single point of failure or may act maliciously, reducing the security of remote proof.
因此,如何提高远程证明的安全性,是亟待解决的问题。Therefore, how to improve the security of remote authentication is an urgent problem to be solved.
图5是本申请实施例提供的一种通信方法500的示意性流程图。本领域技术人员可以理解,若不进行签名,或签名仅基于一个度量者,在该度量者出现故障或恶意的情况下,远程证明的安全性将被降低。在方法500中,验证者接收到的签名是基于多个度量者得到的,从而能够提高远程证明的安全性。方法500中可选的操作在图5中以虚线示出。下面结合图5介绍方法500。Figure 5 is a schematic flowchart of a communication method 500 provided in an embodiment of this application. Those skilled in the art will understand that without signing, or if the signing is based solely on a single measurer, the security of remote proof will be reduced in the event of a malfunction or malicious intent on the part of that measurer. In method 500, the signature received by the verifier is based on multiple measurers, thereby improving the security of remote proof. Optional operations in method 500 are shown in dashed lines in Figure 5. Method 500 will be described below with reference to Figure 5.
S510,第一验证者接收来自第一度量者的第一信息。对应地,第一度量者向第一验证者发送第一信息。S510, the first verifier receives the first information from the first measurer. Correspondingly, the first measurer sends the first information to the first verifier.
第一验证者可以包括一个或多个验证者(verifier)。例如,第一验证者可以是NFV-MANO中的功能模块或芯片,如图4所示。又例如,第一验证者可以是云上网络功能。但是本申请对此不限定,一方面,第一验证者可以不限于NFV系统,还可以是其他系统中的验证者;另一方面,第一验证者可以不限于功能模块或芯片,例如还可以为芯片系统或整机设备。The first verifier may include one or more verifiers. For example, the first verifier may be a functional module or chip in NFV-MANO, as shown in Figure 4. Another example is a cloud network function. However, this application is not limited to this. On the one hand, the first verifier may not be limited to the NFV system, but may also be a verifier in other systems; on the other hand, the first verifier may not be limited to functional modules or chips, but may also be a chip system or a complete device.
第一度量者可以包括一个或多个度量者(attester)。示例性地,第一度量者可以是NFVI中的功能模块或芯片,如图4所示。但是本申请对此不限定,一方面,第一度量者可以不限于NFV系统,还可以是其他系统中的度量者;另一方面,第一度量者可以不限于功能模块或芯片,例如还可以为芯片系统或整机设备。第一度量者可能事先接收了第一验证者的请求,也可能没有接收到第一验证者的请求,但是,第一度量者是向第一验证者发送信息的度量者,即,响应了第一验证者。因此,第一度量者也可以称为响应度量者。The first attester may include one or more attesters. Exemplarily, the first attester may be a functional module or chip in an NFVI, as shown in Figure 4. However, this application is not limited to this. On the one hand, the first attester may not be limited to an NFV system, but may also be an attester in other systems; on the other hand, the first attester may not be limited to a functional module or chip, but may also be a chip system or a complete device. The first attester may or may not have received a request from the first verifier beforehand, but the first attester is the attester that sends information to the first verifier, that is, it responds to the first verifier. Therefore, the first attester can also be called a responding attester.
在一些可能的实现方式中,第一信息包括第一签名和/或第一证据。可选地,该第一签名用于验证该第一证据的有效性。可选地,该第一签名所基于的度量者包括M个度量者。M可以为大于1的整数,该M个度量者可以包括该第一度量者。例如,第一签名可以是基于M个度量者的密钥得到的。又例如,第一签名可以是根据M个度量者的密钥对第一证据进行签名得到的。其中,M个度量者可以用于度量该第一网元。In some possible implementations, the first information includes a first signature and/or first evidence. Optionally, the first signature is used to verify the validity of the first evidence. Optionally, the measurands on which the first signature is based include M measurands. M can be an integer greater than 1, and the M measurands may include the first measurand. For example, the first signature may be obtained based on the keys of the M measurands. Another example is that the first signature may be obtained by signing the first evidence according to the keys of the M measurands. Here, the M measurands can be used to measure the first network element.
可选地,第一信息还包括度量日志(log)和/或随机数。其中,该度量日志可以用于指示度量的过程。例如,第一证据可能是根据多个证据确定的,该度量日志可以记载确定第一证据的过程。其中,随机数可以是第一验证者提供的,用于唯一标识本次度量。可选地,第一信息还包括认证身份密钥(attestation identity key,AIK)证书信息。该AIK证书信息可以用于指示第一度量者的AIK证书。示例性地,AIK证书信息、第一证据、随机数、或第一证据中的至少一项可以属于度量引用(quote)信息。示例性地,第一验证者可以验证AIK证书的有效性,在AIK证书有效的情况下,验证第一证据是否有效。Optionally, the first information may also include a measurement log and/or a random number. The measurement log can be used to indicate the measurement process. For example, the first evidence may be determined based on multiple pieces of evidence, and the measurement log can record the process of determining the first evidence. The random number may be provided by the first verifier and used to uniquely identify this measurement. Optionally, the first information may also include attestation identity key (AIK) certificate information. This AIK certificate information can be used to indicate the AIK certificate of the first verifier. Exemplarily, at least one of the AIK certificate information, the first evidence, the random number, or the first evidence may belong to measurement quotation information. Exemplarily, the first verifier can verify the validity of the AIK certificate, and if the AIK certificate is valid, verify whether the first evidence is valid.
示例性地,第一信息可以承载于响应消息中,但是本申请对此不限定,第一信息也可以承载于其他消息中。本申请对第一信息的具体名称不做限定,第一信息还可以称为响应信息、远程证明响应或者其他名称。For example, the first information may be carried in a response message, but this application is not limited to this; the first information may also be carried in other messages. This application does not limit the specific name of the first information; the first information may also be called response information, remote authentication response, or other names.
示例性地,第一网元可以是VNF,例如,图4中的未验证的VNF。但是本申请对此不限定,第一网元可以应用于其他网元。例如,PNF。又例如,通信系统中的网元,如接入网设备或终端设备等。再例如,本申请不限定第一网元的具体名称,例如,第一网元还可以称为待验证网元、不受信任的网元或其他名称。For example, the first network element can be a VNF, such as the unverified VNF in Figure 4. However, this application is not limited to this, and the first network element can be applied to other network elements. For example, a PNF. Another example is a network element in a communication system, such as access network equipment or terminal equipment. Furthermore, this application does not limit the specific name of the first network element; for example, the first network element can also be called an unverified network element, an untrusted network element, or other names.
本领域技术人员可以理解,虽然本申请基于的技术问题是在NFV系统的场景下引出的,但是本申请实施例并不限于仅在NFV系统中实现,本申请实施例能够解决的技术问题也不限于NFV系统中的问题。例如,本申请实施例还可以应用于其他系统,提高其他系统的远程证明的安全性。Those skilled in the art will understand that although the technical problem addressed in this application arises within the context of an NFV system, the embodiments of this application are not limited to implementation within NFV systems, nor are the technical problems they can solve limited to those within NFV systems. For example, the embodiments of this application can also be applied to other systems to improve the security of remote authentication in other systems.
示例性地,第一证据可以包括平台配置注册值(platform configuration register,PCR)。可选地,该第一证据是对第一网元进行度量得到的。例如,第一证据可以是第一度量者对第一网元进行度量得到的,但是本申请对此不限定。例如,第一证据也可以是其他度量者对第一网元进行度量得到的。又例如,第一证据还可以是多个度量者对第一网元进行度量得到的。第一证据也可以用于验证第一网元的可信度、可信状态、或安全性,等等。For example, the first evidence may include the platform configuration register (PCR). Optionally, the first evidence is obtained by measuring the first network element. For example, the first evidence may be obtained by a first measurer measuring the first network element, but this application is not limited to this. For example, the first evidence may also be obtained by other measurers measuring the first network element. Furthermore, the first evidence may be obtained by multiple measurers measuring the first network element. The first evidence can also be used to verify the trustworthiness, trust status, or security of the first network element, etc.
第一签名所基于的度量者,可以理解为参与第一签名的度量者、第一签名所基于的密钥、第一签名所基于的度量者的密钥、应用于第一签名的度量者的密钥、或应用于第一签名的密钥等。The measurer on which the first signature is based can be understood as the measurer who participated in the first signature, the key on which the first signature is based, the key of the measurer on which the first signature is based, the key of the measurer applied to the first signature, or the key applied to the first signature, etc.
其中,M个度量者用于度量者该第一网元,可以理解为,M个度量者具备度量第一网元的能力,而不等同于M个度量者均已经对第一网元进行度量。在一些示例中,M个度量者均对第一网元进行度量。例如,第一证据是M个度量者对第一网元进行度量得到的。在另一些示例中,M个度量者中的部分度量者(例如,第一度量者)对第一网元进行度量。例如,第一证据可以是第一度量者对第一网元进行度量得到的。此外,本申请不限定M个度量者仅可以度量第一网元,而不能度量其他网元。例如,第一度量者可以度量第一网元,也可以度量其他网元。In this context, the M measurement operators are used to measure the first network element. This can be understood as meaning that each of the M measurement operators has the capability to measure the first network element, but it is not equivalent to all of the M measurement operators having already measured the first network element. In some examples, all M measurement operators measure the first network element. For example, the first evidence is obtained by the M measurement operators measuring the first network element. In other examples, some of the M measurement operators (e.g., the first measurement operator) measure the first network element. For example, the first evidence may be obtained by the first measurement operator measuring the first network element. Furthermore, this application does not limit the M measurement operators to only measuring the first network element and not other network elements. For example, the first measurement operator can measure the first network element and also measure other network elements.
在一些可能的实现方式中,第一度量者在度量第一网元时,第一度量者的标识为第一标识,和/或,第一度量者属于第一群组;在第一度量者度量另一个网元(例如,第二网元)时,第一度量者的标识为第二标识,和/或,第一度量者属于第二群组。其中,第一标识和第二标识可以不同,也可以相同。第一群组和第二群组可以不同,也可以相同。在第一标识和第二标识不同的情况下,上述方案也可以理解为,第一度量者在度量不同的网元时,该第一度量者的标识不同。In some possible implementations, when the first measurer measures the first network element, its identifier is a first identifier, and/or the first measurer belongs to a first group; when the first measurer measures another network element (e.g., the second network element), its identifier is a second identifier, and/or the first measurer belongs to a second group. The first identifier and the second identifier can be different or the same. The first group and the second group can also be different or the same. If the first identifier and the second identifier are different, the above scheme can also be understood as the first measurer using different identifiers when measuring different network elements.
可选地,M个度量者属于第一群组,该第一群组对应于第一网元。该第一群组中的各个度量者均具备度量第一网元的能力。换言之,第一群组中的各个度量者用于度量第一网元。为便于描述,不妨假设第一群组中的度量者的数量为P,其中,P为大于或等于M的整数。P个度量者包括M个度量者。Optionally, the M measurators belong to a first group, which corresponds to the first network element. Each measurator in the first group has the ability to measure the first network element. In other words, each measurator in the first group is used to measure the first network element. For ease of description, let's assume that the number of measurators in the first group is P, where P is an integer greater than or equal to M. The P measurators include the M measurators.
示例性地,M个度量者可以是M个可信根。这样的场景也可以称为分布式可信根协同的场景,该场景中,不同的可信根可以用于验证同一个网元的安全性、可信度或可信状态。For example, the M measurants can be M trusted roots. Such a scenario can also be called a distributed trusted root collaboration scenario, in which different trusted roots can be used to verify the security, trustworthiness, or trusted state of the same network element.
S520,第一验证者根据该M个度量者的密钥,验证该第一签名和该第一证据。S520, the first verifier verifies the first signature and the first evidence based on the keys of the M measurators.
可选地,第一验证者可以根据M个度量者的密钥,验证第一签名是否有效。进而,在第一签名有效的情况下,第一验证者可以验证第一证据是否有效。Optionally, the first verifier can verify the validity of the first signature based on the keys of the M measurers. Furthermore, if the first signature is valid, the first verifier can verify the validity of the first evidence.
示例性地,M个度量者的密钥可以是M个度量者的公钥。此外,本申请对根据M个度量者的密钥验证第一签名或第一证据的具体方式不做限定。例如,第一验证者可以根据第一签名的生成方式和M个度量者的密钥,验证第一签名是否有效。其中,第一签名的生成方式可以参见后文的描述。For example, the keys of the M measurers can be the public keys of the M measurers. Furthermore, this application does not limit the specific method of verifying the first signature or first evidence based on the keys of the M measurers. For example, the first verifier can verify the validity of the first signature based on the generation method of the first signature and the keys of the M measurers. The generation method of the first signature can be found in the description below.
本申请不限定第一签名的具体名称,第一签名也可以称为群签名、群签名信息或其他名称。This application does not specify the exact name of the first signature, which may also be referred to as the group signature, group signature information, or other names.
本领域技术人员可以理解,若不对证据进行签名,或签名仅基于一个度量者,在该度量者出现故障或恶意的情况下,远程证明的安全性将被降低。基于上述方案,验证者接收到的签名是基于M个度量者得到的,验证者可以根据上述M个度量者的密钥验证该签名和该证据,避免了单个度量者故障或恶意导致的错误,从而能够提高远程证明的安全性。并且,上述M个度量者能够度量第一网元,也就是说,参与签名的M个度量者能够度量同一个网元。相比于依次接收和验证各个度量者的签名的方案,上述方案中,验证者仅需进行一次接收和验证,即可实现远程证明,因此,上述方案能够提高远程证明的效率。Those skilled in the art will understand that if evidence is not signed, or if the signature is based on only one measurand, the security of remote proof will be reduced in the event of a failure or malicious intent on the part of that measurand. Based on the above scheme, the signature received by the verifier is based on M measurands. The verifier can verify the signature and the evidence using the keys of these M measurands, avoiding errors caused by the failure or malicious intent of a single measurand, thereby improving the security of remote proof. Furthermore, the M measurands can measure the same network element; that is, the M measurands participating in the signing can measure the same network element. Compared to schemes that sequentially receive and verify the signatures of each measurand, in the above scheme, the verifier only needs to perform one reception and verification to achieve remote proof. Therefore, the above scheme improves the efficiency of remote proof.
在不做特殊说明的情况下,本申请的中的第一装置既可以指网络设备本身(例如,接入网设备、核心网设备或管理面设备),也可以是指网络设备中的组件(例如,处理器、芯片,或芯片系统等),或者,也可以是能实现全部或者部分网络设备功能的逻辑模块或软件等。为便于描述,下文以第一装置为例进行描述。Unless otherwise specified, the first device in this application may refer to the network device itself (e.g., access network device, core network device, or management plane device), a component in the network device (e.g., processor, chip, or chip system), or a logic module or software that can implement all or part of the functions of the network device. For ease of description, the first device will be used as an example below.
示例性地,管理面设备可以包括VNFM、VIM或运营、监管和管理(operations,administration,and management,OAM),等等。For example, management plane equipment may include VNFM, VIM, or operations, administration, and management (OAM), etc.
在一种可能的实现方式中,方法500还包括:S530,第一验证者向第一装置发送第八信息。对应地,第一装置接收来自第一验证者的第八信息。In one possible implementation, method 500 further includes: S530, the first verifier sends eighth information to the first device. Correspondingly, the first device receives the eighth information from the first verifier.
示例性地,第一装置可以包括或应用于:PACF、依赖方、安全边缘保护代理(security edge protection proxy,SEPP)、或其他装置。例如,第一装置还可以是任何使用验证结果(或度量结果)的NF或RAN的模块或组件。For example, the first device may include or be applied to: PACF, dependent party, security edge protection proxy (SEPP), or other devices. For instance, the first device may also be any module or component of an NF or RAN that uses verification results (or measurement results).
其中,第八信息可以用于指示验证结果。例如,在第一证据有效的情况下,验证结果可以指示第一网元有效。又例如,在第一证据无效的情况下,验证结果可以指示第一网元无效。本申请对第八信息的具体名称不做限定,第八信息也可以称为度量响应消息或其他名称。The eighth piece of information can be used to indicate the verification result. For example, if the first evidence is valid, the verification result can indicate that the first network element is valid. Conversely, if the first evidence is invalid, the verification result can indicate that the first network element is invalid. This application does not limit the specific name of the eighth piece of information; it can also be called a measurement response message or other names.
在一些可能的实现方式中,方法500还包括S540和/或S550。In some possible implementations, method 500 also includes S540 and/or S550.
S540,第一验证者向密钥管理网元发送第三请求。对应地,密钥管理网元接收来自第一验证者的第三请求。S540, the first authenticator sends a third request to the key management network element. Correspondingly, the key management network element receives the third request from the first authenticator.
示例性地,密钥管理网元可以包括或应用于:证书颁发者(certificate authority,CA)和/或密钥生成中心(key generation center,KGC),等等。本申请对密钥管理网元的具体名称不做限定,例如,密钥管理网元也可以称为网元、密钥网元或具有其他名称。示例性地,密钥管理网元可以是云上网络功能。但是本申请对此不限定,密钥管理网元也可以是芯片或整机设备。For example, a key management network element may include or be applied to: a certificate authority (CA) and/or a key generation center (KGC), etc. This application does not limit the specific name of the key management network element; for example, it may also be called a network element, a key network element, or have other names. For example, a key management network element may be a cloud network function. However, this application is not limited in this respect; a key management network element may also be a chip or a complete device.
可选地,该第三请求用于请求该M个度量者的密钥。示例性地,M个度量者的密钥可以包括M个度量者的公钥。本申请对第三请求的具体名称不做限定,第三请求也可以称为密钥请求、公钥请求、群组公钥请求或其他名称。Optionally, the third request is used to request the keys of the M measurands. For example, the keys of the M measurands may include the public keys of the M measurands. This application does not limit the specific name of the third request; it may also be called a key request, public key request, group public key request, or other names.
在另一些可能的实现方式中,方法500可以不包括S540。例如,密钥管理网元可以不基于请求,而是周期性地向第一验证者发送M个度量者的密钥的指示信息。又例如,M个度量者的密钥可以是预配置的、预定义的或者根据预定义的(或预配置的)规则生成的。In some other possible implementations, method 500 may not include S540. For example, the key management network element may send indication information of the keys of the M measurands to the first verifier periodically, rather than based on a request. As another example, the keys of the M measurands may be pre-configured, predefined, or generated according to predefined (or pre-configured) rules.
可选地,该第三请求包括该第一度量者的标识(identity、identification、或identifier,ID)和/或第一群组的标识,其中,该第一群组包括P个度量者,该P个度量者用于度量该第一网元,该P个度量者包括该M个度量者,P为大于或等于M的整数。Optionally, the third request includes the identifier (identity, identification, or identifier, ID) of the first measurand and/or the identifier of the first group, wherein the first group includes P measurands used to measure the first network element, and the P measurands include the M measurands, where P is an integer greater than or equal to M.
第一度量者的标识可以包括标识(例如,#01)、第一度量者的IP地址、MAC地址或其他信息。The identifier of the first measurer may include an identifier (e.g., #01), the IP address, MAC address, or other information of the first measurer.
基于上述方案,第三请求可以包括第一信息的发送端的标识,和/或,第一信息的发送端所在群组标识。这样,密钥管理网元可以根据第三请求中携带的标识,确定向第一验证者反馈M个度量者的密钥。Based on the above scheme, the third request may include the identifier of the sender of the first information, and/or the identifier of the group to which the sender of the first information belongs. In this way, the key management network element can determine the keys for the M measurers to be fed back to the first verifier based on the identifiers carried in the third request.
可选地,第三请求包括P个度量者中一个或多个度量者的标识。例如,第三请求可以包括P个度量者中全部度量者的标识。又例如,第三请求可以包括P个度量者中部分度量者的标识。其中,第三请求可以携带第一度量者的标识,也可以不携带第一度量者的标识。换言之,第三请求可以携带第一信息的发送端的标识,也可以不携带第一信息的发送端的标识。Optionally, the third request includes the identifiers of one or more of the P measurands. For example, the third request may include the identifiers of all the P measurands. Alternatively, the third request may include the identifiers of some of the P measurands. The third request may or may not carry the identifier of the first measurand. In other words, the third request may or may not carry the identifier of the sender of the first information.
在一些可能的实现方式中,S540是由第一信息触发的。例如,S540包括:响应于第一信息,第一验证者向密钥管理网元发送第三请求。In some possible implementations, S540 is triggered by the first message. For example, S540 includes: in response to the first message, the first verifier sends a third request to the key management network element.
基于上述方案,第一验证者可以向密钥管理网元请求本次验证所需的密钥。一方面,密钥由专门的网元存储,提高了密钥的安全性,另一方面,第一验证者无需预先保存密钥,节约了第一验证者的存储开销。Based on the above scheme, the first verifier can request the key required for this verification from the key management network element. On the one hand, the key is stored by a dedicated network element, which improves the security of the key; on the other hand, the first verifier does not need to save the key in advance, saving the first verifier's storage costs.
S550,第一验证者接收来自该密钥管理网元的第三信息。对应地,密钥管理网元向第一验证者发送第三信息。S550, the first authenticator receives the third information from the key management network element. Correspondingly, the key management network element sends the third information to the first authenticator.
可选地,该第三信息用于指示该M个度量者的密钥。第三信息可以是直接指示信息,例如,第三信息可以包括M个度量者的密钥的信息。第三信息可以是间接指示信息,例如,第一验证者可以根据第三信息,确定M个度量者的密钥。Optionally, the third information is used to indicate the keys of the M measurers. The third information can be direct information, for example, it can include information about the keys of the M measurers. The third information can also be indirect information, for example, the first verifier can determine the keys of the M measurers based on the third information.
第三信息可以仅指示M个度量者的密钥,也可以指示P个度量者的密钥,或者说,指示第一群组中所有度量者的密钥。可以理解,P个度量者的密钥包括M个度量者的密钥。示例性地,M个度量者的密钥可以包括M个度量者的公钥。P个度量者的密钥可以包括P个度量者的公钥。The third piece of information can indicate only the keys of the M measurands, or it can indicate the keys of the P measurands, or in other words, it can indicate the keys of all measurands in the first group. It is understood that the keys of the P measurands include the keys of the M measurands. For example, the keys of the M measurands can include the public keys of the M measurands. The keys of the P measurands can include the public keys of the P measurands.
下面,先介绍第三信息仅指示M个度量者的密钥的情况。Next, we will introduce the case where the third information only indicates the keys of M measurers.
在一些示例中,密钥管理网元可以根据预配置或预定义的规则,确定M个度量者的密钥。In some examples, the key management network element can determine the keys for M measurands based on pre-configured or pre-defined rules.
例如,密钥管理网元预配置或预定义了第一验证者与M个度量者的密钥的关联关系,在接收到来自第一验证者的请求的情况下,密钥管理网元即可确定M个度量者的密钥。For example, the key management network element pre-configures or predefines the association between the keys of the first validator and M measurands. Upon receiving a request from the first validator, the key management network element can determine the keys of the M measurands.
又例如,密钥管理网元预配置或预定义了第一度量者的标识与M个度量者的密钥的关联关系,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以确定M个度量者的密钥;或者,在第三请求包括第一群组的标识的情况下,密钥管理网元可以确定该第一群组中存在第一度量者,或者确定第一群组的标识与第一度量者的标识对应,从而可以确定M个度量者的密钥。For example, the key management network element pre-configures or predefines the association between the identifier of the first measurand and the keys of the M measurands. If the third request includes the identifier of the first measurand, the key management network element can determine the keys of the M measurands; or, if the third request includes the identifier of the first group, the key management network element can determine that the first measurand exists in the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the M measurands.
再例如,密钥管理网元预配置或预定义了第一群组的标识与M个度量者的密钥的关联关系,在第三请求包括第一群组的标识的情况下,密钥管理网元可以确定M个度量者的密钥;或者,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以确定该第一度量者属于第一群组,或者确定第一群组的标识与第一度量者的标识对应,从而可以确定M个度量者的密钥。For example, the key management network element pre-configures or predefines the association between the identifier of the first group and the keys of the M measurands. If the third request includes the identifier of the first group, the key management network element can determine the keys of the M measurands; or, if the third request includes the identifier of the first measurand, the key management network element can determine that the first measurand belongs to the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the M measurands.
其中,第一群组的标识与第一度量者的标识之间的关联关系也可以属于第三关联关系。示例性地,第三关联关系还可以包括第一群组的标识与其他度量者之间的关联关系。例如,第三关联关系可以包括第一群组的标识与第一群组中P个度量者的标识之间的关联关系。The association between the identifier of the first group and the identifier of the first measurer can also be classified as a third association. For example, the third association can further include the association between the identifier of the first group and other measurers. For instance, the third association could include the association between the identifier of the first group and the identifiers of the P measurers within the first group.
在一些可能的实现方式中,方法500还包括:S560,密钥管理网元根据该第三请求和第二关联关系,确定该M个度量者的密钥。In some possible implementations, method 500 further includes: S560, the key management network element determines the keys of the M measurands based on the third request and the second association.
其中,该第二关联关系可以包括第一群组的标识与第一密钥组的标识之间的关联关系(下面简称关联关系1),或者,P个度量者的标识与第一密钥组的标识之间的关联关系(下面简称关联关系2),或者,该第二关联关系包括第一群组的标识、P个度量者的标识与第一密钥组的标识之间的关联关系(下面简称关联关系3)。The second association relationship may include the association relationship between the identifier of the first group and the identifier of the first key group (hereinafter referred to as association relationship 1), or the association relationship between the identifiers of the P measurers and the identifier of the first key group (hereinafter referred to as association relationship 2), or the second association relationship may include the association relationship between the identifier of the first group, the identifiers of the P measurers and the identifier of the first key group (hereinafter referred to as association relationship 3).
第一密钥组可以包括第一群组中的P个度量者的密钥。例如,第一密钥组可以包括P个度量者的公钥。在一些可能的实现方式中,第一密钥组与第一网元对应。例如,第一密钥组中的各个密钥可以仅用于对度量第一网元得到的证据进行签名。例如,第一度量者度量其他网元(例如,第二网元)得到证据,第一度量者不使用第一密钥组中的密钥对该证据进行签名,而是使用其他密钥组(例如,第二密钥组)中的密钥对该证据进行签名。在另一些可能的实现方式中,第一密钥组中各个密钥可以用于对度量者任何网元得到的证据进行签名。The first key set may include the keys of P measurers in the first group. For example, the first key set may include the public keys of P measurers. In some possible implementations, the first key set corresponds to a first network element. For example, each key in the first key set may be used only to sign evidence obtained by measuring the first network element. For example, if the first measurer obtains evidence by measuring other network elements (e.g., the second network element), the first measurer does not use the keys in the first key set to sign the evidence, but instead uses the keys in other key sets (e.g., the second key set) to sign the evidence. In other possible implementations, each key in the first key set may be used to sign evidence obtained by the measurer from any network element.
示例性地,在第三请求包括第一群组的标识的情况下,密钥管理网元可以根据第三请求和第三关联关系确定第一密钥组的标识,继而根据预定义或预配置的规则确定第一密钥组中的M个度量者的密钥。例如,在第二关联关系包括关联关系1或关联关系3的情况下,密钥管理网元可以直接根据第三请求和第二关联关系确定第一密钥组的标识。又例如,在第二关联关系包括关联关系2的情况下,密钥管理网元可以根据第三请求、第三关联关系和第二关联关系确定第一密钥组的标识。For example, if the third request includes the identifier of the first group, the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the M measurands in the first key group according to predefined or preconfigured rules. For instance, if the second association includes association 1 or association 3, the key management network element can directly determine the identifier of the first key group based on the third request and the second association. As another example, if the second association includes association 2, the key management network element can determine the identifier of the first key group based on the third request, the third association, and the second association.
示例性地,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以根据第三请求和第三关联关系确定第一密钥组的标识,继而根据预定义或预配置的规则确定第一密钥组中的M个度量者的密钥。例如,在第二关联关系包括关联关系2或关联关系3的情况下,密钥管理网元可以直接根据第三请求和第二关联关系确定第一密钥组的标识。又例如,在第二关联关系包括关联关系1的情况下,密钥管理网元可以根据第三请求、第三关联关系和第二关联关系确定第一密钥组的标识。For example, if the third request includes the identifier of the first measurand, the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the M measurands in the first key group according to predefined or preconfigured rules. For instance, if the second association includes association 2 or association 3, the key management network element can directly determine the identifier of the first key group based on the third request and the second association. As another example, if the second association includes association 1, the key management network element can determine the identifier of the first key group based on the third request, the third association, and the second association.
如前所述,第三信息也可以指示P个度量者的密钥,或者说,指示第一群组中所有度量者的密钥。第三信息指示。下面,对第三信息指示P个度量者的密钥的方案进行介绍。As mentioned earlier, the third information can also indicate the keys of the P measurands, or in other words, the keys of all measurands in the first group. The scheme for indicating the keys of the P measurands using the third information is described below.
在一些示例中,密钥管理网元可以根据预配置或预定义的规则,确定P个度量者的密钥。In some examples, the key management network element can determine the keys for P measurands based on pre-configured or pre-defined rules.
例如,密钥管理网元预配置或预定义了第一验证者与P个度量者的密钥的关联关系,在接收到来自第一验证者的请求的情况下,密钥管理网元即可确定P个度量者的密钥。For example, the key management network element pre-configures or predefines the association between the keys of the first validator and P measurands. Upon receiving a request from the first validator, the key management network element can determine the keys of the P measurands.
又例如,密钥管理网元预配置或预定义了第一度量者的标识与P个度量者的密钥的关联关系,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以确定P个度量者的密钥;或者,在第三请求包括第一群组的标识的情况下,密钥管理网元可以确定该第一群组中存在第一度量者,或者确定第一群组的标识与第一度量者的标识对应,从而可以确定P个度量者的密钥。For example, the key management network element pre-configures or predefines the association between the identifier of the first measurand and the keys of P measurands. If the third request includes the identifier of the first measurand, the key management network element can determine the keys of the P measurands; or, if the third request includes the identifier of the first group, the key management network element can determine that the first measurand exists in the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the P measurands.
再例如,密钥管理网元预配置或预定义了第一群组的标识与P个度量者的密钥的关联关系,在第三请求包括第一群组的标识的情况下,密钥管理网元可以确定P个度量者的密钥;或者,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以确定该第一度量者属于第一群组,或者确定第一群组的标识与第一度量者的标识对应,从而可以确定P个度量者的密钥。For example, the key management network element pre-configures or pre-defines the association between the identifier of the first group and the keys of P measurands. If the third request includes the identifier of the first group, the key management network element can determine the keys of the P measurands; or, if the third request includes the identifier of the first measurand, the key management network element can determine that the first measurand belongs to the first group, or determine that the identifier of the first group corresponds to the identifier of the first measurand, thereby determining the keys of the P measurands.
其中,第一群组的标识与第一度量者的标识之间的关联关系也可以属于第三关联关系。示例性地,第三关联关系还可以包括第一群组的标识与其他度量者之间的关联关系。例如,第三关联关系可以包括第一群组的标识与第一群组中P个度量者的标识之间的关联关系。The association between the identifier of the first group and the identifier of the first measurer can also be classified as a third association. For example, the third association can further include the association between the identifier of the first group and other measurers. For instance, the third association could include the association between the identifier of the first group and the identifiers of the P measurers within the first group.
基于上述方案,密钥管理网元可根据第二关联关系,确定M个度量者的密钥,从而减少了查找M个度量者的密钥的时延。Based on the above scheme, the key management network element can determine the keys of M measurands according to the second association relationship, thereby reducing the latency of finding the keys of M measurands.
在一些可能的实现方式中,方法500还包括:S570,密钥管理网元根据该第三请求和第二关联关系,确定该P个度量者的密钥。In some possible implementations, method 500 further includes: S570, the key management network element determines the keys of the P measurands based on the third request and the second association.
示例性地,在第三请求包括第一群组的标识的情况下,密钥管理网元可以根据第三请求和第三关联关系确定第一密钥组的标识,继而确定第一密钥组中的P个度量者的密钥。举例参见前文,不再赘述。For example, if the third request includes the identifier of the first group, the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the P measurands in the first key group. See the previous examples for further details.
示例性地,在第三请求包括第一度量者的标识的情况下,密钥管理网元可以根据第三请求和第三关联关系确定第一密钥组的标识,继而根据预定义或预配置的规则确定第一密钥组中的P个度量者的密钥。举例参见前文,不再赘述。For example, if the third request includes the identifier of the first measurand, the key management network element can determine the identifier of the first key group based on the third request and the third association, and then determine the keys of the P measurands in the first key group according to predefined or preconfigured rules. See the previous examples for further details.
上述第三关联关系可以是密钥管理网元预配置或预定义的,也可以是密钥管理网元从其他网元(例如,编排管理网元)接收的。示例性地,编排管理网元可以是MANO、VNFM、VIM或其他网元。本申请不限定编排管理网元仅为NFV系统中的网元,编排管理网元还可以是其他通信系统中的网元,例如,核心网网元。本申请不限定编排管理网元的具体名称,例如,编排管理网元还可以称为网元或其他名称。The aforementioned third association can be pre-configured or pre-defined by the key management network element, or it can be received by the key management network element from other network elements (e.g., orchestration management network elements). For example, the orchestration management network element can be MANO, VNFM, VIM, or other network elements. This application does not limit the orchestration management network element to network elements in NFV systems; it can also be network elements in other communication systems, such as core network elements. This application does not limit the specific name of the orchestration management network element; for example, the orchestration management network element can also be called a network element or other names.
示例性地,编排管理网元可以包括或应用于VNFM。例如,VNFM可以在实例化之后,向密钥管理网元发送指示第三关联关系的信息。又例如,密钥管理网元可以向VNFM发送请求第三关联关系的信息。VNFM可以基于上述请求,向密钥管理网元发送指示第三关联关系的信息。例如,VNFM可以通过实例化的步骤,将VM1-VM7编到同一个VNF实例中,其中,VM1-VM3与度量者1(记为Att1)位于同一个实体设备,VM2-VM5与度量者2(Att2)位于同一个实体设备,VM6-VM7与度量者3(记为Att3)位于同一个实体设备。示例性地,VNFM可以确定第三关联关系为Att1、Att2和Att3对应群组1。或者,VNFM可以确定Att1、Att2和Att3属于同一个群组。For example, the orchestration management network element may include or be applied to VNFM. For instance, after instantiation, VNFM may send information indicating a third association to the key management network element. Alternatively, the key management network element may send information requesting a third association to VNFM. Based on this request, VNFM may send information indicating the third association to the key management network element. For example, through the instantiation step, VNFM may orchestrate VM1-VM7 into the same VNF instance, where VM1-VM3 are located in the same physical device as measurer 1 (denoted as Att1), VM2-VM5 are located in the same physical device as measurer 2 (Att2), and VM6-VM7 are located in the same physical device as measurer 3 (denoted as Att3). For example, VNFM may determine that the third association is that Att1, Att2, and Att3 correspond to group 1. Alternatively, VNFM may determine that Att1, Att2, and Att3 belong to the same group.
其中,一个度量者可以被编到多个群组中。例如,Att1可以在群组1,也可以在群组2。其中,Att1在群组1中时,该Att1的标识为标识1。Att1在群组2中时,该Att1的标识为标识2。其中,群组1对应VNF1,群组2对应VNF2。这样,Att1在度量VNF1时,该Att1所在群组的标识为群组1的标识,Att1的标识为标识1。Att1在度量VNF2时,该Att1所在群组的标识为群组2的标识,Att1的标识为标识2。A single measurer can be assigned to multiple groups. For example, Att1 can be in group 1 or group 2. When Att1 is in group 1, its identifier is identifier 1. When Att1 is in group 2, its identifier is identifier 2. Group 1 corresponds to VNF1, and group 2 corresponds to VNF2. Thus, when Att1 measures VNF1, the identifier of the group to which Att1 belongs is the identifier of group 1, and Att1's identifier is identifier 1. When Att1 measures VNF2, the identifier of the group to which Att1 belongs is the identifier of group 2, and Att1's identifier is identifier 2.
上述第二关联关系可以是密钥管理网元预配置或预定义的,也可以是密钥管理网元在生成第一群组中各个度量者密钥的时候确定的,还可以是密钥管理网元在生成第一群组中各个度量者密钥之后的任意时刻确定的。The aforementioned second association can be pre-configured or pre-defined by the key management network element, or it can be determined by the key management network element when generating the keys of each measurand in the first group, or it can be determined by the key management network element at any time after generating the keys of each measurand in the first group.
在一些可能的实现方式中,S520包括:第一验证者验证该第一签名所基于的度量者的数量是否大于或等于门限值;在该第一签名所基于的度量者的数量大于或等于门限值的情况下,第一验证者验证该第一签名是否有效;在该第一签名有效的情况下,第一验证者验证该第一证据是否有效。In some possible implementations, S520 includes: a first verifier verifying whether the number of measurands on which the first signature is based is greater than or equal to a threshold value; if the number of measurands on which the first signature is based is greater than or equal to the threshold value, the first verifier verifying whether the first signature is valid; if the first signature is valid, the first verifier verifying whether the first evidence is valid.
可选地,该门限值用于指示该第一签名所基于的度量者的最小数量。Optionally, the threshold value is used to indicate the minimum number of measurands on which the first signature is based.
可选地,门限值指示第一网元对应的签名所基于的度量者的最小数量。即,门限值可以针对第一网元。其中,第一网元对应的签名可以包括第一签名。第一网元对应的签名可以理解为,对度量第一网元所得到的证据的签名。但是本申请对此不限定,门限值也可以针对包括第一网元在内的更多的网元。Optionally, the threshold value indicates the minimum number of measurers on which the signature corresponding to the first network element is based. That is, the threshold value can be applied to the first network element. The signature corresponding to the first network element can include a first signature. The signature corresponding to the first network element can be understood as a signature of the evidence obtained by measuring the first network element. However, this application is not limited to this, and the threshold value can also be applied to more network elements, including the first network element.
可选地,门限值指示第一度量者的签名所基于的度量者的最小数量。即,门限值可以针对第一度量者。其中,第一度量者的签名可以包括第一签名。第一度量者的签名可以理解为,第一度量者参与的签名。但是本申请对此不限定,门限值也可以针对包括第一度量者在内的更多的度量者。Optionally, the threshold value indicates the minimum number of measurands on which the signature of the first measurand is based. That is, the threshold value can be specific to the first measurand. The signature of the first measurand may include a first signature. The signature of the first measurand can be understood as a signature in which the first measurand participates. However, this application is not limited to this, and the threshold value can also be specific to more measurands, including the first measurand.
可选地,门限值指示第一验证者所验证的签名所基于的度量者的最小数量。即,门限值可以针对第一验证者。其中,第一验证者所验证的签名可以包括第一签名。但是本申请对此不限定,门限值也可以针对包括第一验证者在内的更多的验证者。Optionally, the threshold value indicates the minimum number of measurands on which the signature verified by the first validator is based. That is, the threshold value can be specific to the first validator. The signature verified by the first validator may include the first signature. However, this application is not limited to this, and the threshold value may also be specific to more validators, including the first validator.
本申请对门限值的表现形式不做限定。门限值可以是正整数、百分比、分数、小数或其他形式。示例性地,假设第一群组共3个度量者,门限值可以是正整数,例如,1、2、或3;门限值可以是百分比,例如,33%、66%、或100%;门限值可以是分数,例如,1/3、2/3、1;门限值可以是小数,例如,0.33、0.66、1。This application does not limit the form in which the threshold value is represented. The threshold value can be a positive integer, a percentage, a fraction, a decimal, or other forms. For example, assuming that the first group has 3 measurers, the threshold value can be a positive integer, such as 1, 2, or 3; the threshold value can be a percentage, such as 33%, 66%, or 100%; the threshold value can be a fraction, such as 1/3, 2/3, or 1; the threshold value can be a decimal, such as 0.33, 0.66, or 1.
本申请对门限值的确定方式不做限定。作为一个示例,门限值可以是预配置的或预定义的。作为另一个示例,门限值可以是第一验证者确定的。例如,第一验证者可以根据第一网元或第一度量者的安全度,确定门限值。例如,安全度较差时,门限值较高;安全度较强时,门限值较低。又例如,第一验证者可以根据门限值的指示信息,确定门限值。其中,门限值的指示信息可以来自于第一装置。即,第一装置可以向第一验证者发送门限值的指示信息。示例性地,第一装置可以包括或应用于:PACF、依赖方、SEPP、或其他装置。例如,第一装置还可以是任何使用验证结果(或度量结果)的NF或RAN的模块或组件。This application does not limit the method for determining the threshold value. As an example, the threshold value can be pre-configured or predefined. As another example, the threshold value can be determined by the first verifier. For example, the first verifier can determine the threshold value based on the security level of the first network element or the first metric. For example, a higher threshold value indicates a lower security level, while a lower threshold value indicates a higher security level. As another example, the first verifier can determine the threshold value based on threshold value indication information. This threshold value indication information can come from the first device. That is, the first device can send threshold value indication information to the first verifier. Exemplarily, the first device can include or be applied to: PACF, dependent party, SEPP, or other devices. For example, the first device can also be any module or component of an NF or RAN that uses the verification result (or measurement result).
示例性地,第一装置发送的门限值的指示信息可以仅指示百分比、分数或小数形式的门限值,第一验证者可以根据该门限值的指示信息,确定正整数形式的门限值。例如,在某些场景下,第一装置可能无法获知第一群组中具体有多少度量者,从而仅指示百分比、分数或小数形式的门限值;而第一验证者可能获知第一群组中具体有多少度量者,从而根据第一装置的指示,确定正整数形式的门限值。For example, the threshold value indication information sent by the first device may only indicate a threshold value in percentage, fraction, or decimal form, and the first verifier can determine a threshold value in positive integer form based on this threshold value indication information. For instance, in some scenarios, the first device may not know the specific number of measurers in the first group, and thus only indicate a threshold value in percentage, fraction, or decimal form; while the first verifier may know the specific number of measurers in the first group, and thus determine a threshold value in positive integer form based on the indication from the first device.
示例性地,第一验证者可以向第一度量者发送门限值的指示信息,使得第一度量者能够根据该指示信息,确定第一签名所基于的度量者的最小数量,从而提高第一签名的质量,即,提高第一签名被验证成功的几率。For example, the first verifier may send a threshold value indication to the first measurer, enabling the first measurer to determine the minimum number of measurers on which the first signature is based, thereby improving the quality of the first signature, i.e., increasing the probability that the first signature will be successfully verified.
示例性地,门限值记作Q。下面以Q是正整数的形式为例,本领域技术人员可以理解,下面的例子并不作为门限值仅能以正整数形式的限定,本申请实施例中的门限值还可以是其他形式,只是举例不再赘述。For example, the threshold value is denoted as Q. The following example uses Q as a positive integer. Those skilled in the art will understand that the following example is not intended to limit the threshold value to only positive integers. The threshold value in the embodiments of this application can also be in other forms, which are just examples and will not be repeated here.
可选地,Q为小于或等于P的正整数。例如,M≥Q,则第一验证者可以确定该第一签名所基于的度量者的数量大于或等于门限值,从而继续验证第一签名是否有效,以及第一证据是否有效。又例如,M<Q,则第一验证者可以确定该第一签名所基于的度量者的数量不满足门限值,从而确定第一签名验证失败。在一些可能的实现方式中,第一验证者在确定第一签名所基于的度量者的数量不满足门限值的情况下,可以停止验证,确定第一网元验证失败,从而减少验证的开销。Optionally, Q is a positive integer less than or equal to P. For example, if M ≥ Q, the first verifier can determine that the number of measurands on which the first signature is based is greater than or equal to a threshold value, and thus continue verifying whether the first signature and the first evidence are valid. Alternatively, if M < Q, the first verifier can determine that the number of measurands on which the first signature is based does not meet the threshold value, and thus determine that the first signature verification has failed. In some possible implementations, if the first verifier determines that the number of measurands on which the first signature is based does not meet the threshold value, it can stop verification, determine that the first network element verification has failed, and thus reduce verification overhead.
本申请不限定第一签名的具体名称,第一签名也可以称为门限签名、门限签名信息或其他名称。This application does not specify the exact name of the first signature, which may also be referred to as the threshold signature, threshold signature information, or other names.
M个度量者的公钥也可以称为门限签名公钥。第一度量者的私钥也可以称为门限签名私钥。The public keys of the M measurers can also be called threshold signature public keys. The private key of the first measurer can also be called threshold signature private keys.
基于上述方案,第一验证者可以验证第一签名所基于的度量者是否满足门限值的要求。在门限值不满足要求的情况下,不对第一签名或第一证据进行进一步验证,从而减少验证的开销。在门限值设置较低的情况下,第一签名可以不必基于第一群组中的全部度量者,从而节约了度量者签名的开销。在门限值设置较高的情况下,第一签名需要基于第一群组中较多数量的度量者,从而提升了远程验证的安全性。Based on the above scheme, the first verifier can verify whether the measurer on which the first signature is based meets the threshold requirement. If the threshold requirement is not met, no further verification is performed on the first signature or the first evidence, thereby reducing verification overhead. When the threshold is set low, the first signature does not need to be based on all measurers in the first group, thus saving the overhead of measurer signing. When the threshold is set high, the first signature needs to be based on a larger number of measurers in the first group, thereby improving the security of remote verification.
上面结合图5介绍了方法500,方法500可以理解为远程证明中的验证阶段。可选地,远程证明还包括度量阶段。下面结合图6介绍度量阶段的一些方案。Method 500 has been introduced above with reference to Figure 5. Method 500 can be understood as the verification phase in remote proof. Optionally, remote proof also includes a measurement phase. Some schemes for the measurement phase are introduced below with reference to Figure 6.
图6是本申请实施例提供的另一种通信方法600的示意性流程图。方法600可以与方法500结合。方法600中可选的操作在图6中以虚线示出。下面结合图6介绍方法600。Figure 6 is a schematic flowchart of another communication method 600 provided in an embodiment of this application. Method 600 can be combined with method 500. Optional operations in method 600 are shown in dashed lines in Figure 6. Method 600 will be described below with reference to Figure 6.
S610,第一度量者根据第一网元,确定第一证据。S610, the first measurer determines the first evidence based on the first network element.
在一些可能的实现方式中,S610包括:第一度量者度量第一网元,得到第一证据。也就是说,第一证据可以是由第一度量者对第一网元进行度量得到的。In some possible implementations, S610 includes: a first measurer measuring a first network element to obtain first evidence. That is, the first evidence can be obtained by the first measurer measuring the first network element.
在另一些可能的实现方式中,S610包括:第一度量者根据至少一个度量者的证据,确定第一证据。其中,至少一个度量者属于第一群组。示例性地,至少一个度量者可以是前述参与签名的M个度量者。其中,至少一个度量者的证据可以包括至少一个度量者分别度量第一网元所得到的证据。其中,至少一个度量者可以包括第一度量者,也可以不包括第一度量者。也就是说,第一度量者所确定的第一证据可以基于包括自己在内的至少一个度量者,也可以基于除自己之外的至少一个度量者。本申请对此不限定。In some other possible implementations, S610 includes: a first measurer determining first evidence based on evidence from at least one measurer. Wherein, at least one measurer belongs to a first group. Exemplarily, at least one measurer may be one of the M measurers who participated in the signing. Wherein, the evidence from at least one measurer may include evidence obtained by at least one measurer measuring the first network element respectively. Wherein, at least one measurer may include the first measurer, or may not include the first measurer. That is, the first evidence determined by the first measurer may be based on at least one measurer including itself, or may be based on at least one measurer other than itself. This application does not limit this.
在一些可能的实现方式中,第一度量者可以接收来自上述至少一个度量者的证据。例如,上述至少一个度量者可以包括度量者A,第一度量者可以接收来自度量者A的证据,该证据可以是该度量者A对第一网元进行度量得到的。In some possible implementations, the first metric may receive evidence from at least one of the aforementioned metric providers. For example, the at least one metric may include metric provider A, and the first metric may receive evidence from metric provider A, which may be obtained by metric provider A measuring the first network element.
在一些可能的实现方式中,第一度量者可以向上述至少一个度量者发送请求信息,该请求信息可以用于请求证据。例如,上述至少一个度量者可以包括度量者A,第一度量者可以向度量者A发送请求信息,该请求信息可以用于请求度量者A的证据。度量者A可以基于该请求信息,度量第一网元,得到证据,并将该证据向第一度量者发送。In some possible implementations, the first measurement agent may send a request message to at least one of the aforementioned measurement agents, which can be used to request evidence. For example, the at least one measurement agent may include measurement agent A, and the first measurement agent may send a request message to measurement agent A, which can be used to request evidence from measurement agent A. Measurement agent A may measure the first network element based on the request message, obtain evidence, and send the evidence back to the first measurement agent.
S620,第一度量者根据M个度量者的密钥和该第一证据,确定第一签名。S620, the first measurer determines the first signature based on the keys of the M measurers and the first evidence.
在一些可能的实现方式中,第一度量者可以根据M个度量者的公钥、第一度量者的私钥、或随机数的至少一项,确定第一签名。其中,随机数可以是第一验证者提供的。In some possible implementations, the first measurer can determine the first signature based on at least one of the public keys of the M measurers, the private key of the first measurer, or a random number. The random number can be provided by the first verifier.
示例性地,第一度量者的公钥可以记为公钥(public key,pk)1,第一度量者的私钥可以记为私钥(secret key,sk)1,M个度量者中除第一度量者之外的度量者的公钥记为pk2,…,pkM。例如,第一度量者可以根据sk1,pk1,pk2,…,pkM和随机数(nonce),基于门限椭圆曲线数字签名算法(threshold elliptic curve digital signature algorithm),确定第一签名。For example, the public key of the first measurer can be denoted as public key (pk)1, and the private key of the first measurer can be denoted as private key (sk)1. The public keys of the measurers other than the first measurer among the M measurers are denoted as pk2, ..., pkM . For example, the first measurer can determine the first signature based on sk1, pk1, pk2, ..., pkM and a random number (nonce) using the threshold elliptic curve digital signature algorithm.
在一些可能的实现方式中,在S620之后,方法600还包括S510。即,第一度量者可以向第一验证者发送第一信息。In some possible implementations, after S620, method 600 also includes S510. That is, the first measurer can send first information to the first verifier.
下面,结合S630、S635和S640介绍第一度量者获取M个度量者的密钥的一些示例性方式。Below, in conjunction with S630, S635, and S640, we will introduce some exemplary ways for the first metronome to obtain the keys of the M metronomes.
S630,第一度量者接收来自该第三度量者的第四信息。对应地,第三度量者向第一度量者发送第四信息。S630, the first measurand receives the fourth information from the third measurand. Correspondingly, the third measurand sends the fourth information to the first measurand.
其中,第三度量者可以是M个度量者中的度量者。例如,第三度量者可以属于第一群组,是第一群组中的P个度量者中的度量者。The third measurer can be one of the M measurers. For example, the third measurer can belong to the first group and be one of the P measurers in the first group.
可选地,该第四信息用于指示该第三度量者的密钥。例如,第四信息用于指示该第三度量者的公钥。Optionally, the fourth information is used to indicate the key of the third measurer. For example, the fourth information is used to indicate the public key of the third measurer.
第四信息可以是直接指示信息,例如,第四信息可以包括第三度量者的密钥的信息。第四信息可以是间接指示信息,例如,第一验证者可以根据第四信息,确定第三度量者的密钥。The fourth information can be direct indication information; for example, it may include information about the third measurer's key. The fourth information can also be indirect indication information; for example, the first verifier can determine the third measurer's key based on the fourth information.
在一些可能的实现方式中,第三度量者是M个度量者中除第一度量者之外的其他度量者。即,第三度量者与第一度量者组成M个度量者。例如,M≥3,第一度量者可以接收分别来自多个第三度量者的第四信息。在另一些可能的实现方式中,第三度量者是M个度量者中除第一度量者之外的一个度量者。例如,第一度量者可以接收来自第三度量者的第四信息,还可以接收来自M个度量者中除第一度量者和第三度量者之外的其他度量者(记为,剩余度量者)的密钥信息,该密钥信息用于指示上述剩余度量者的密钥。M=3,剩余度量者的数量为一个,该密钥信息可以来自该剩余度量者。M≥3,剩余度量者的数量为多个,该密钥信息可以分别来自不同的剩余度量者,分别指示发送该密钥信息的剩余度量者的密钥。In some possible implementations, the third measurer is any of the M measurers other than the first measurer. That is, the third measurer and the first measurer together form the M measurers. For example, if M ≥ 3, the first measurer can receive fourth information from multiple third measurers. In other possible implementations, the third measurer is any of the M measurers other than the first measurer. For example, the first measurer can receive fourth information from the third measurer, and can also receive key information from other measurers (denoted as the remaining measurers) among the M measurers other than the first and third measurers. This key information is used to indicate the key of the remaining measurers. If M = 3, there is only one remaining measurer, and the key information can come from that remaining measurer. If M ≥ 3, there are multiple remaining measurers, and the key information can come from different remaining measurers, each indicating the key of the remaining measurer that sent the key information.
基于上述方案,第三度量者可以向第一度量者发送第三度量者的密钥,从而协助第一度量者用M个度量者的密钥进行签名。Based on the above scheme, the third measurer can send its key to the first measurer, thereby assisting the first measurer in signing using the keys of M measurers.
上述S630可以是第三度量者主动执行的,也可以是第三度量者基于请求执行的。其中,第三度量者所基于的请求可以来自第一度量者(例如参见S635),也可以来自其他网元(例如,第一验证者)。The above-mentioned S630 can be executed proactively by the third measurement agent, or it can be executed by the third measurement agent based on a request. The request on which the third measurement agent is based can come from the first measurement agent (see S635 for example), or it can come from other network elements (e.g., the first verifier).
例如,第一验证者可以向多个度量者发送度量请求,上述多个度量者包括第三度量者。第三度量者可以基于共识算法确定第一度量者,或者第三度量者可以根据预配置或预定义的规则确定第一度量者。第三度量者可以向第一度量者发送上述第四信息。也就是说,即便第三度量者没有接收到第一度量者的请求,第三度量者也可以向第一度量者发送指示第三度量者密钥的第四信息。For example, the first validator can send measurement requests to multiple measurers, including a third measurer. The third measurer can determine the first measurer based on a consensus algorithm, or it can determine the first measurer according to pre-configured or predefined rules. The third measurer can send the aforementioned fourth information to the first measurer. That is, even if the third measurer does not receive a request from the first measurer, it can still send the fourth information indicating its key to the first measurer.
在S630是基于请求执行的情况下,该方法还包括:S635,第一度量者向该第三度量者发送第四请求。对应地,第三度量者接收来自第一度量者的第四请求。In the case of request-based execution in S630, the method further includes: S635, the first measurand sends a fourth request to the third measurand. Correspondingly, the third measurand receives the fourth request from the first measurand.
该第四请求用于请求该第三度量者的密钥。在一些可能的实现方式中,S630包括:响应于第四请求,第三度量者向第一度量者发送第四信息。The fourth request is used to request the key of the third measurand. In some possible implementations, S630 includes: in response to the fourth request, the third measurand sends a fourth message to the first measurand.
基于上述方案,第一度量者可以向第三度量者发送请求,从而触发第三度量者向第一度量者发送该第三度量者的密钥。Based on the above scheme, the first measurand can send a request to the third measurand, thereby triggering the third measurand to send its key to the first measurand.
在一些可能的实现方式中,该第四请求包括该第一证据、度量信息、或该第一签名中的至少一项。在一些可能的实现方式中,方法600还包括:第三度量者根据第四请求,确定是否提供第三度量者的密钥。In some possible implementations, the fourth request includes at least one of the first evidence, measurement information, or the first signature. In some possible implementations, method 600 further includes: the third measurer determining, based on the fourth request, whether to provide its own key.
度量信息可以用于指示度量的方式。例如,度量信息可以使得第三度量者获知证据是如何生成的,从而确定是否提供第三度量者的密钥。示例性地,该度量信息用于指示度量内容和/或度量策略。Measurement information can be used to indicate how the measurement was performed. For example, measurement information can allow a third-party measurer to know how the evidence was generated, thereby determining whether to provide the third-party measurer's key. Exemplarily, this measurement information is used to indicate the content of the measurement and/or the measurement strategy.
示例性地,度量内容可以指示度量的对象。例如,第一网元。例如,度量内容可以包括第一网元的标识(例如,VNF ID)。For example, the measurement content can indicate the object being measured. For example, a first network element. For example, the measurement content can include the identifier of the first network element (e.g., VNF ID).
在第四请求包括度量信息,且度量信息指示度量内容的情况下,第三度量者可以检查度量内容,从而确定是否提供第三度量者的密钥。例如,第一网元是第三度量者允许的度量对象,则第三度量者可以确定提供密钥,即执行S630,或者,第三度量者可以检查用于判断是否执行S630的其他条件(例如,度量策略)。例如,第一网元不是第三度量者允许的度量对象,则第三度量者可以确定不提供密钥(或拒绝提供密钥),即不执行S630。If the fourth request includes measurement information, and the measurement information indicates the measurement content, the third measurement agent can examine the measurement content to determine whether to provide its key. For example, if the first network element is a measurement object permitted by the third measurement agent, the third measurement agent can determine to provide the key, i.e., execute S630. Alternatively, the third measurement agent can check other conditions used to determine whether to execute S630 (e.g., measurement policy). For example, if the first network element is not a measurement object permitted by the third measurement agent, the third measurement agent can determine not to provide the key (or refuse to provide the key), i.e., not execute S630.
示例性地,度量策略可以指示度量的策略。例如,度量策略可以包括:采集第一网元启动态的数据、采集第一网元运行态的数据、安全性要求较低、或安全性要求较高中至少一项。For example, the measurement strategy can indicate the measurement strategy. For instance, the measurement strategy may include at least one of: collecting data from the startup state of the first network element, collecting data from the running state of the first network element, having low security requirements, or having high security requirements.
在第四请求包括度量信息,且度量信息指示度量策略的情况下,第三度量者可以检查度量策略,从而确定是否提供第三度量者的密钥。例如,采集第一网元启动态的数据是第三度量者允许的度量策略,则第三度量者可以确定提供密钥,即执行S630,或者,第三度量者可以检查用于判断是否执行S630的其他条件(例如,度量内容)。又例如,采集第一网元运行态的数据是第三度量者不允许的度量策略,则第三度量者可以确定不提供密钥(或拒绝提供密钥),即不执行S630。示例性地,基于安全性要求,第三度量者可以确定是否对第一度量者进行验证。例如,安全性要求高的情况下,第三度量者可以对第一度量者进行验证,例如,第三度量者可以要求第一度量者提供证据,并验证第一度量者提供的证据。又例如,安全性要求低的情况下,第三度量者可以不对第一度量者进行验证。再例如,安全性要求低的情况下,第三度量者可以相信第一度量者,确定执行S630,或者,第三度量者可以检查用于判断是否执行S630的其他条件(例如,第一证据)。If the fourth request includes measurement information, and the measurement information indicates a measurement policy, the third measurement agent can check the measurement policy to determine whether to provide its key. For example, if collecting data from the startup state of the first network element is a measurement policy allowed by the third measurement agent, then the third measurement agent can determine to provide the key, i.e., execute S630. Alternatively, the third measurement agent can check other conditions used to determine whether to execute S630 (e.g., measurement content). As another example, if collecting data from the running state of the first network element is a measurement policy not allowed by the third measurement agent, then the third measurement agent can determine not to provide the key (or refuse to provide the key), i.e., not execute S630. Exemplarily, based on security requirements, the third measurement agent can determine whether to verify the first measurement agent. For example, if the security requirements are high, the third measurement agent can verify the first measurement agent; for example, the third measurement agent can request the first measurement agent to provide evidence and verify the evidence provided by the first measurement agent. As another example, if the security requirements are low, the third measurement agent may not verify the first measurement agent. For example, in cases where security requirements are low, the third measurer may trust the first measurer to determine whether to execute S630, or the third measurer may examine other conditions used to determine whether to execute S630 (e.g., first evidence).
在第四请求包括第一证据的情况下,第三度量者可以检查第一证据,从而确定是否提供第三度量者的密钥。例如,第三度量者可以度量第一网元,得到第二证据。第三度量者可以将第一证据和第二证据进行比对,在第一证据和第二证据一致性较高的情况下,确定执行S630,或者,第三度量者可以检查用于判断是否执行S630的其他条件(例如,度量信息)。If the fourth request includes the first evidence, the third measurer can examine the first evidence to determine whether to provide its key. For example, the third measurer can measure the first network element to obtain the second evidence. The third measurer can compare the first and second evidence, and if the first and second evidence are highly consistent, determine to execute S630. Alternatively, the third measurer can examine other conditions used to determine whether to execute S630 (e.g., measurement information).
示例性地,第一签名可以用于保护消息(即,第四请求)的完整性以及让其他度量者(例如,第三度量者)验证消息来源。For example, the first signature can be used to protect the integrity of the message (i.e., the fourth request) and to allow other measurers (e.g., a third measurer) to verify the source of the message.
在第四请求包括第一签名的情况下,第三度量者可以检查第一签名,从而确定是否提供第三度量者的密钥。例如,第三度量者验证第一签名有效,则可以确定执行S630,或者,第三度量者可以检查用于判断是否执行S630的其他条件(例如,度量信息)。又例如,第三度量者验证第一签名无效,则可以确定不执行S630。If the fourth request includes the first signature, the third measurer can check the first signature to determine whether its key should be provided. For example, if the third measurer verifies that the first signature is valid, it can determine to execute S630. Alternatively, the third measurer can check other conditions used to determine whether to execute S630 (e.g., measurement information). As another example, if the third measurer verifies that the first signature is invalid, it can determine not to execute S630.
如前所述,第四请求可以包括第一证据、度量信息、或该第一签名中的至少一项。第三度量者可以验证第四请求中携带的上述信息,也可以向第一度量者请求该第四请求未携带的信息。例如,第四请求包括度量信息,而未包括第一证据。但是,该度量信息指示度量策略为安全性要求较高。这种情况下,第三度量者可以请求第一度量者提供第一证据,或者,第三度量者可以直接拒绝提供该第三度量者的密钥。As previously stated, the fourth request may include at least one of the first evidence, measurement information, or the first signature. The third measurer may verify the information carried in the fourth request, or may request information not carried in the fourth request from the first measurer. For example, the fourth request may include measurement information but not the first evidence. However, the measurement information indicates a measurement strategy with high security requirements. In this case, the third measurer may request the first measurer to provide the first evidence, or the third measurer may directly refuse to provide its own key.
第三度量者可以验证第四请求携带的全部信息,也可以验证第四请求携带的部分信息,也可以不验证第四请求携带的信息。例如,第四请求包括第一证据和度量信息,第三度量者可以验证第一证据和度量信息这两项,也可以仅验证第一证据或度量信息中的一项,也可以不对第一证据和度量信息进行验证。The third evaluator may verify all the information carried in the fourth request, some of the information carried in the fourth request, or none of the information carried in the fourth request. For example, if the fourth request includes the first evidence and the measurement information, the third evaluator may verify both the first evidence and the measurement information, or only one of the first evidence or the measurement information, or may not verify either the first evidence or the measurement information.
本申请不限定第四请求的具体名称,例如,第四请求还可以称为签名请求或其他名称。This application does not limit the specific name of the fourth request; for example, the fourth request may also be called a signature request or other names.
基于上述方案,第四请求可以包括第一证据、度量信息、或该第一签名中的至少一项。第三度量者可以根据第四请求携带的信息进行验证,从而确定是否向第一度量者发送第三度量者的密钥的指示信息。上述方案能够避免第三度量者在第一度量者安全性较低的情况下,向该第一度量者提供第三度量者的密钥,从而进一步提高远程证明的安全性。Based on the above scheme, the fourth request may include at least one of the first evidence, measurement information, or the first signature. The third measurer can verify the information carried in the fourth request to determine whether to send the third measurer's key to the first measurer. This scheme avoids the third measurer providing its key to the first measurer when the first measurer's security is low, thereby further improving the security of remote proof.
上面结合S630和S635,介绍了第一度量者获取M个度量者的密钥的一种示例性地方式,下面结合S640介绍另一种示例性方式。The above, in conjunction with S630 and S635, describes an exemplary method for the first measurer to obtain the keys of M measurers. The following, in conjunction with S640, describes another exemplary method.
S640,第一度量者接收来自密钥管理网元的第五信息。对应地,密钥管理网元向第一度量者方式第五信息。S640, the first measurand receives the fifth information from the key management network element. Correspondingly, the key management network element transmits the fifth information to the first measurand.
可选地,该第五信息用于指示该M个度量者的密钥。第五信息可以是直接指示信息,例如,第五信息可以包括M个度量者的密钥的信息。第五信息可以是间接指示信息,例如,第一验证者可以根据第五信息,确定M个度量者的密钥。第五信息可以包括加密后的M个度量者的密钥。Optionally, the fifth information is used to indicate the keys of the M measurers. The fifth information can be direct information, for example, it may include information about the keys of the M measurers. The fifth information can also be indirect information, for example, the first verifier can determine the keys of the M measurers based on the fifth information. The fifth information may include the encrypted keys of the M measurers.
第五信息用于指示该M个度量者的密钥,可以包括:第五信息仅指示M个度量者的密钥,而不指示除M个度量者之外的其他度量者的密钥;也可以包括:第五信息既指示M个度量者的密钥,还指示除M个度量者之外的其他度量者的密钥。例如,第五信息可以用于指示P个度量者的密钥。这样,第一度量者可以从P个度量者的密钥中,筛选出M个度量者的密钥,从而执行S620。The fifth piece of information, used to indicate the keys of the M measurands, can include: the fifth piece of information indicating only the keys of the M measurands, and not the keys of other measurands besides the M measurands; or it can include: the fifth piece of information indicating both the keys of the M measurands and the keys of other measurands besides the M measurands. For example, the fifth piece of information can be used to indicate the keys of P measurands. In this way, the first measurand can filter out the keys of the M measurands from the keys of the P measurands, thereby executing S620.
示例性地,M个度量者的密钥可以包括M个度量者的公钥和第一度量者的私钥。P个度量者的密钥可以包括P个度量者的公钥和第一度量者的私钥。For example, the keys of the M measurands may include the public keys of the M measurands and the private key of the first measurand. The keys of the P measurands may include the public keys of the P measurands and the private key of the first measurand.
示例性地,第五信息可以承载于AIK颁发响应中,但是本申请对此不限定,第五信息还可以承载于其他消息中。For example, the fifth message may be carried in the AIK issuance response, but this application is not limited to this, and the fifth message may also be carried in other messages.
在一些可能的实现方式中,密钥管理网元可以根据第二关联关系和/或第三关联关系,生成或查找M个度量者的密钥,从而执行S640。In some possible implementations, the key management network element can generate or look up the keys of M measurands based on the second association and/or the third association, thereby performing S640.
基于上述方案,用于确定第一签名的M个度量者的密钥可以是密钥管理网元指示的,从而无需通过与其他度量者交互来获取其他度量者的密钥。因此,上述方案能够减少确定第一签名的时延,从而减少远程证明的时延。Based on the above scheme, the keys used to determine the M measurands for the first signature can be indicated by the key management network element, thus eliminating the need to obtain the keys of other measurands through interaction. Therefore, the above scheme can reduce the latency of determining the first signature, thereby reducing the latency of remote proof.
下面,介绍第一验证者触发度量者执行度量流程的一些示例性方案。Below, we introduce some exemplary schemes for the first verifier to trigger the measurer to execute the measurement process.
S650,第一验证者接收来自第一装置的第七信息。对应地,第一装置向第一验证者发送第七信息。S650, the first verifier receives the seventh message from the first device. Correspondingly, the first device sends the seventh message to the first verifier.
其中,第七信息可以用于请求度量。例如,第七信息可以用于请求对第一网元进行度量。可选地,第七信息包括第一网元的标识。例如,VNF ID。本申请对第七信息的具体名称不做限定,第七信息也可以称为度量请求消息或其他名称。The seventh piece of information can be used to request measurement. For example, the seventh piece of information can be used to request measurement of the first network element. Optionally, the seventh piece of information includes the identifier of the first network element, such as the VNF ID. This application does not limit the specific name of the seventh piece of information; it can also be called a measurement request message or other names.
响应于第七信息,第一验证者发送第一请求,该第一请求用于度量该第一网元。具体地,可以包括步骤S660,S662,或者S664中的一项。In response to the seventh message, the first verifier sends a first request to measure the first network element. Specifically, this may include one of steps S660, S662, or S664.
S660,第一验证者向第一度量者发送第一请求。对应地,第一度量者接收来自第一验证者的第一请求。S660, the first verifier sends a first request to the first measurer. Correspondingly, the first measurer receives the first request from the first verifier.
可选地,该第一请求用于请求度量该第一网元。可选地,S660包括:响应于第七信息,第一验证者向第一度量者发送第一请求。Optionally, the first request is used to request measurement of the first network element. Optionally, S660 includes: in response to the seventh information, the first verifier sends the first request to the first metric.
本申请对第一请求的具体名称不做限定,第一请求也可以称为度量请求、远程证明请求或其他名称。This application does not specify the exact name of the first request, which may also be referred to as a measurement request, a remote proof request, or other names.
基于上述方案,第一请求可以向第一度量者发送。相比于向多个度量者发送度量请求的方案,上述方案可以减少信令开销。Based on the above scheme, the first request can be sent to the first measurement subject. Compared to the scheme of sending measurement requests to multiple measurement subjects, the above scheme can reduce signaling overhead.
S662,第一验证者向第四度量者发送第一请求。对应地,第四度量者接收来自第一验证者的第一请求。S662, the first verifier sends a first request to the fourth measurer. Correspondingly, the fourth measurer receives the first request from the first verifier.
可选地,S662包括:响应于第七信息,第一验证者向第四度量者发送第一请求。Optionally, S662 includes: in response to the seventh message, the first verifier sends a first request to the fourth measurer.
其中,第四度量者可以是第一群组中P个度量者中的任意一个度量者,第一度量者与第四度量者可以不同,可以相同。The fourth measurer can be any one of the P measurers in the first group. The first measurer and the fourth measurer can be different or the same.
第一验证者请求的度量者与响应请求的度量者可以不同。示例性地,第四度量者可以基于第一请求,通过共识算法,选择响应请求的度量者(例如,第一度量者)。The measurer requested by the first validator and the measurer responding to the request can be different. For example, the fourth measurer can select the measurer responding to the request (e.g., the first measurer) based on the first request and through a consensus algorithm.
基于上述方案,第一验证者向第一群组中的任意一个度量者发送第一请求,只要有一个度量者响应,即可视为第一群组的响应。这样,验证(或者度量)请求方(例如,第一装置)不获知具体响应的度量者的身份,从而保护了度量者的隐私。Based on the above scheme, the first verifier sends a first request to any one of the measurers in the first group. As long as one measurer responds, it can be considered a response from the first group. In this way, the verification (or measurement) requester (e.g., the first device) does not know the identity of the specific measurer that responded, thereby protecting the privacy of the measurers.
S664,第一验证者向N个度量者发送第一请求。对应地,N个度量者接收来自第一验证者的第一请求。S664, the first verifier sends a first request to N measurers. Correspondingly, the N measurers receive the first request from the first verifier.
可选地,S664包括:响应于第七信息,第一验证者向N个度量者发送第一请求。Optionally, S664 includes: in response to the seventh message, the first verifier sends a first request to the N measurators.
其中,该N个度量者属于第一群组,N为整数,N为大于或等于2且小于或等于P的整数。Among them, the N measurers belong to the first group, where N is an integer greater than or equal to 2 and less than or equal to P.
在一些示例中,N个度量者可以包括M个度量者。在另一些示例中,N个度量者可以与M个度量者部分重叠。例如,N个度量者中的第五度量者不属于M个度量者,M个度量者中的第六度量者不属于N个度量者。In some examples, N metrics may include M metrics. In other examples, N metrics may partially overlap with M metrics. For example, the fifth metric in the N metrics may not belong to the M metrics, and the sixth metric in the M metrics may not belong to the N metrics.
在一些示例中,N个度量者可以包括第一度量者。在另一些示例中,N个度量者不包括第一度量者。In some examples, the N measurers may include the first measurer. In other examples, the N measurers do not include the first measurer.
在一些可能的实现方式中,N个度量者可以通过共识算法,选出一个响应的度量者(例如,第一度量者)。被选出的度量者可以是N个度量者之一,也可以不属于N个度量者。In some possible implementations, N measurands can use a consensus algorithm to elect a responding measurand (e.g., the first measurand). The elected measurand may be one of the N measurands or may not belong to any of the N measurands.
在另一些可能的实现方式中,N个度量者各自独立地执行以下操作:度量第一网元,得到证据;根据证据和密钥,得到签名;向第一验证者发送指示该证据和/或该签名的信息。其中,对证据进行签名可以仅根据一个度量者的密钥,也可以根据多个度量者的密钥。也就是说,N个度量者中的部分或全部度量者可以执行第一度量者所执行的上述方案。例如,N个度量者中的部分或全部度量者可以通过与其他度量者交互,各自收集多个度量者的密钥,从而根据多个度量者的密钥和证据确定签名。又例如,N个度量者中的部分或全部度量者可以分别接收来自密钥管理网元的多个度量者的密钥的指示信息,从而根据多个度量者的密钥和证据确定签名。示例性地,前述N个度量者中的第五度量者可以执行前述第一度量者所执行的方案,不同之处在于,第五度量者不是根据M个度量者的密钥进行签名,而是根据包括第五度量者在内的多个度量者的密钥进行签名。In other possible implementations, each of the N measurands independently performs the following operations: measures the first network element to obtain evidence; obtains a signature based on the evidence and a key; and sends information indicating the evidence and/or the signature to the first verifier. The signature of the evidence can be based on the key of only one measurand or on the keys of multiple measurands. That is, some or all of the N measurands can execute the above-described scheme performed by the first measurand. For example, some or all of the N measurands can interact with other measurands to collect the keys of multiple measurands, thereby determining the signature based on the keys of multiple measurands and the evidence. As another example, some or all of the N measurands can receive instruction information on the keys of multiple measurands from the key management network element, thereby determining the signature based on the keys of multiple measurands and the evidence. Exemplarily, the fifth measurand among the aforementioned N measurands can execute the scheme performed by the first measurand, except that the fifth measurand does not sign based on the keys of M measurands, but rather based on the keys of multiple measurands, including the fifth measurand itself.
基于上述方案,第一验证者可以向多个度量者发送第一请求,在单点故障,即一个度量者无法响应的情况下,出现单点故障的度量者之外的其他度量者可以基于第一请求进行响应,从而保障远程证明的顺利进行。Based on the above scheme, the first verifier can send a first request to multiple measurands. In the event of a single point of failure, i.e., when one measurand cannot respond, other measurands besides the one that has the single point of failure can respond based on the first request, thereby ensuring the smooth progress of remote proof.
可选地,第一请求包括随机数(nonce)。该随机数可以用于保证度量结果的新鲜性。Optionally, the first request includes a nonce. This nonce can be used to ensure the freshness of the measurement results.
在一些可能的实现方式中,该第一请求用于指示门限值。例如,第一请求可以携带门限值的指示信息。In some possible implementations, the first request is used to indicate a threshold value. For example, the first request may carry indication information of the threshold value.
基于上述方案,第一请求可以用于指示门限值,使得接收到第一请求的度量者可以确定签名所基于的度量者的最小数量,从而提高签名的质量,即,提高签名被验证成功的几率。Based on the above scheme, the first request can be used to indicate a threshold value, so that the measurand that receives the first request can determine the minimum number of measurands on which the signature is based, thereby improving the quality of the signature, that is, increasing the probability that the signature will be successfully verified.
在一些可能的实现中,步骤S660之前,还包括:S670,第一验证者根据第一网元的标识和第一关联关系,确定第一度量者。In some possible implementations, before step S660, the method further includes: S670, whereby the first verifier determines the first metric based on the identifier of the first network element and the first association relationship.
示例性地,第一网元的标识可以来自第七信息。For example, the identifier of the first network element may come from the seventh information.
第一关联关系可以包括第一群组的标识与该第一网元的标识之间的关联关系(记为关联关系4)、P个度量者的标识与该第一网元的标识之间的关联关系(记为关联关系5)、或者第一群组的标识、P个度量者的标识与该第一网元的标识之间的关联关系(记为关联关系6)中的至少一项。The first association relationship may include at least one of the following: the association relationship between the identifier of the first group and the identifier of the first network element (denoted as association relationship 4), the association relationship between the identifiers of P measurands and the identifier of the first network element (denoted as association relationship 5), or the association relationship between the identifier of the first group, the identifiers of P measurands and the identifier of the first network element (denoted as association relationship 6).
示例性地,在第一关联关系包括关联关系4的情况下,密钥管理网元可以根据关联关系4和第三关联关系,确定第一度量者。在第一关联关系包括关联关系5的情况下,密钥管理网元可以根据关联关系5,确定第一度量者。在第一关联关系包括关联关系6的情况下,密钥管理网元可以根据关联关系6,确定第一度量者。For example, when the first association includes association 4, the key management network element can determine the first measurer based on association 4 and the third association. When the first association includes association 5, the key management network element can determine the first measurer based on association 5. When the first association includes association 6, the key management network element can determine the first measurer based on association 6.
其中,“确定第一度量者”可以包括选择第一度量者。例如,从第一群组中P个度量者中,选择第一度量者。“确定第一度量者”可以包括确定第一度量者的地址,从而根据该地址向第一度量者发送第一请求。"Determining the first measurer" can include selecting a first measurer. For example, selecting a first measurer from P measurers in a first group. "Determining the first measurer" can also include determining the address of the first measurer, and then sending a first request to the first measurer based on that address.
在一些可能的实现中,步骤S660之前,还包括:S672,第一验证者根据第一网元的标识和第一关联关系,确定第四度量者。In some possible implementations, before step S660, the method further includes: S672, whereby the first verifier determines the fourth measurer based on the identifier of the first network element and the first association relationship.
示例性地,在第一关联关系包括关联关系4的情况下,密钥管理网元可以根据关联关系4和第三关联关系,确定第四度量者。在第一关联关系包括关联关系5的情况下,密钥管理网元可以根据关联关系5,确定第四度量者。在第一关联关系包括关联关系6的情况下,密钥管理网元可以根据关联关系6,确定第四度量者。For example, when the first association includes association 4, the key management network element can determine the fourth measurer based on association 4 and the third association. When the first association includes association 5, the key management network element can determine the fourth measurer based on association 5. When the first association includes association 6, the key management network element can determine the fourth measurer based on association 6.
其中,“确定第四度量者”可以包括选择第四度量者。例如,从第一群组中P个度量者中,选择第四度量者。“确定第四度量者”可以包括确定第四度量者的地址,从而根据该地址向第四度量者发送第一请求。Specifically, "determining the fourth measurer" may include selecting a fourth measurer. For example, selecting a fourth measurer from P measurers in a first group. "Determining the fourth measurer" may also include determining the address of the fourth measurer, and then sending a first request to the fourth measurer based on that address.
在一些可能的实现中,步骤S664之前,还包括:S674,第一验证者根据第一网元的标识和第一关联关系,确定N个度量者。In some possible implementations, before step S664, the method further includes: S674, where the first verifier determines N measurants based on the identifier of the first network element and the first association relationship.
示例性地,在第一关联关系包括关联关系4的情况下,密钥管理网元可以根据关联关系4和第三关联关系,确定N个度量者。在第一关联关系包括关联关系5的情况下,密钥管理网元可以根据关联关系5,确定N个度量者。在第一关联关系包括关联关系6的情况下,密钥管理网元可以根据关联关系6,确定N个度量者。For example, when the first association includes association 4, the key management network element can determine N measurement users based on association 4 and the third association. When the first association includes association 5, the key management network element can determine N measurement users based on association 5. When the first association includes association 6, the key management network element can determine N measurement users based on association 6.
其中,“确定N个度量者”可以包括选择N个度量者。例如,从第一群组中P个度量者中,选择N个度量者。“确定N个度量者”可以包括确定N个度量者的地址,从而根据该地址向N个度量者发送第一请求。"Determining N measurants" can include selecting N measurants. For example, selecting N measurants from P measurants in a first group. "Determining N measurants" can also include determining the addresses of the N measurants, and then sending a first request to the N measurants based on those addresses.
基于上述方案,第一验证者可以根据第一关联关系,快速确定要发送第一请求的度量者,从而减少查找度量者的处理时延。Based on the above scheme, the first verifier can quickly determine the measurer to send the first request based on the first association, thereby reducing the processing latency of finding the measurer.
上述第一关联关系可以是预配置或预定义在第一验证者中的,也可以是第一验证者从其他网元(例如,编排管理网元或密钥管理网元)接收的。The aforementioned first association relationship may be pre-configured or pre-defined in the first authenticator, or it may be received by the first authenticator from other network elements (e.g., orchestration management network element or key management network element).
一种可能的实现中,方法600还包括S680,第一验证者接收来自密钥管理网元或编排管理网元的第二信息。对应地,密钥管理网元或编排管理网元向第一验证者发送第二信息。In one possible implementation, method 600 further includes S680, whereby the first validator receives second information from a key management network element or an orchestration management network element. Correspondingly, the key management network element or the orchestration management network element sends the second information to the first validator.
可选地,该第二信息用于指示该第一关联关系。第二信息可以是直接指示信息,例如,第二信息可以包括第一关联关系的信息。第二信息可以是间接指示信息,例如,第一验证者可以根据第二信息,确定第一关联关系。Optionally, the second information is used to indicate the first association. The second information can be direct indication information, for example, the second information may include information about the first association. The second information can also be indirect indication information, for example, the first verifier can determine the first association based on the second information.
也就是说,第一验证者可以从密钥管理网元获取第一关联关系。或者,第一验证者可以从编排管理网元获取第一关联关系。In other words, the first validator can obtain the first association from the key management network element. Alternatively, the first validator can obtain the first association from the orchestration management network element.
其中,上述第一关联关系可以是预配置或预定义在密钥管理网元中的,也可以是密钥管理网元从其他网元(例如,编排管理网元)接收的。The aforementioned first association relationship can be pre-configured or pre-defined in the key management network element, or it can be received by the key management network element from other network elements (e.g., orchestration management network element).
可选地,S680之前,方法600还包括:第一验证者向密钥管理网元或编排管理网元发送第六请求,第六请求用于请求第一关联关系。Optionally, prior to S680, method 600 further includes: the first verifier sending a sixth request to the key management network element or the orchestration management network element, the sixth request being used to request the first association relationship.
在一些可能的实现方式中,方法600还包括:S690,密钥管理网元接收来自编排管理网元的第六信息。对应地,编排管理网元向密钥管理网元发送第六信息。In some possible implementations, method 600 further includes: S690, the key management network element receives sixth information from the orchestration management network element. Correspondingly, the orchestration management network element sends the sixth information to the key management network element.
可选地,该第六信息用于指示该第一关联关系。第六信息可以是直接指示信息,例如,第六信息可以包括第一关联关系的信息。第六信息可以是间接指示信息,例如,第一验证者可以根据第六信息,确定第一关联关系。Optionally, the sixth information is used to indicate the first association. The sixth information can be direct information, for example, it can include information about the first association. The sixth information can also be indirect information, for example, the first verifier can determine the first association based on the sixth information.
作为一个示例,在S690之后,第一验证者可以接收来自密钥管理网元的上述第二信息。可选地,在第一验证者接收来自密钥管理网元的第二信息之前,第一验证者还可以向密钥管理网元发送上述第六请求。As an example, after S690, the first validator can receive the aforementioned second information from the key management network element. Optionally, before receiving the second information from the key management network element, the first validator can also send the aforementioned sixth request to the key management network element.
作为另一个示例,尽管密钥管理网元可以获取第一关联关系,但是第一验证者可以不从密钥管理网元获取第一关联关系。例如,第一验证者可以接收编排管理网元的上述第二信息。可选地,在第一验证者接收来自编排管理网元的第二信息之前,第一验证者还可以向编排管理网元发送上述第六请求。As another example, although the key management network element can obtain the first association, the first validator may not need to obtain the first association from the key management network element. For example, the first validator may receive the aforementioned second information from the orchestration management network element. Optionally, before receiving the second information from the orchestration management network element, the first validator may also send the aforementioned sixth request to the orchestration management network element.
一种可能的实现中,在S690之前,方法600还包括:S692,密钥管理网元向该编排管理网元发送第五请求。对应地,该编排管理网元接收来自密钥管理网元的第五请求。In one possible implementation, prior to S690, method 600 further includes: S692, whereby the key management network element sends a fifth request to the orchestration management network element. Correspondingly, the orchestration management network element receives the fifth request from the key management network element.
可选地,该第五请求用于请求该第一关联关系。Optionally, the fifth request is used to request the first association.
示例性地,编排管理网元可以包括或应用于VNFM。例如,VNFM可以在实例化之后,向密钥管理网元发送上述第六信息,和/或,向第一验证者发送上述第二信息。又例如,VNFM可以基于上述第五请求,向密钥管理网元发送上述第六信息,和/或,VNFM可以基于上述第六请求,向第一验证者发送上述第二信息。For example, the orchestration management network element may include or be applied to the VNFM. For instance, after instantiation, the VNFM may send the aforementioned sixth information to the key management network element, and/or send the aforementioned second information to the first validator. As another example, the VNFM may send the aforementioned sixth information to the key management network element based on the aforementioned fifth request, and/or the VNFM may send the aforementioned second information to the first validator based on the aforementioned sixth request.
在一些可能的实现方式中,方法600可以依次包括:S650、S670、S660、S610、S635、S630和S620。在另一些可能的实现方式中,方法600可以依次包括:S650、S672、S662、S610、S635、S630和S620。在再一些可能的实现方式中,方法600可以依次包括:S650、S674、S664、S610、S635、S630和S620。In some possible implementations, method 600 may sequentially include: S650, S670, S660, S610, S635, S630, and S620. In other possible implementations, method 600 may sequentially include: S650, S672, S662, S610, S635, S630, and S620. In still other possible implementations, method 600 may sequentially include: S650, S674, S664, S610, S635, S630, and S620.
在一些可能的实现方式中,方法600可以包括:S650、S670、S660、S610和S620。可选地,方法600还包括S640。在另一些可能的实现方式中,方法600可以包括:S650、S672、S662、S610和S620。可选地,方法600还包括S640。在再一些可能的实现方式中,方法600可以包括:S650、S674、S664、S610和S620。可选地,方法600还包括S640。In some possible implementations, method 600 may include: S650, S670, S660, S610, and S620. Optionally, method 600 may also include S640. In other possible implementations, method 600 may include: S650, S672, S662, S610, and S620. Optionally, method 600 may also include S640. In still other possible implementations, method 600 may include: S650, S674, S664, S610, and S620. Optionally, method 600 may also include S640.
上面结合图6介绍了方法600,方法600可以理解为远程证明中的度量阶段。可选地,远程证明还包括密钥配置阶段。下面结合图7介绍密钥配置阶段的一些方案。可以理解的是,本申请所说的密钥配置阶段、度量阶段和验证阶段仅是便于理解而进行的划分,这三个阶段可以分别执行(执行顺序也不限定),也可以同时执行。例如,第一装置向第一验证者发送第七信息的时候,密钥配置阶段可能已经执行完毕,也可能没有开始执行,还可能正在执行。在密钥配置阶段未完成的情况下,第一验证者向第一度量者发送第一请求,第一度量者可能因为未配置密钥而无法完成签名,这时,第一度量者可以启动密钥配置阶段的方案。在密钥配置阶段未完成的情况下,第一度量者也可以启动密钥配置阶段的方案。Method 600, as described above with reference to Figure 6, can be understood as the measurement phase in remote proof. Optionally, remote proof also includes a key configuration phase. Several schemes for the key configuration phase are described below with reference to Figure 7. It is understood that the key configuration phase, measurement phase, and verification phase mentioned in this application are merely for ease of understanding; these three phases can be executed separately (the execution order is not limited) or simultaneously. For example, when the first device sends the seventh information to the first verifier, the key configuration phase may have already been completed, may not have started, or may be in progress. If the key configuration phase is incomplete, the first verifier sends a first request to the first measurement device. The first measurement device may be unable to complete the signature due to the lack of key configuration. In this case, the first measurement device can initiate the key configuration phase scheme. The first measurement device can also initiate the key configuration phase scheme if the key configuration phase is incomplete.
图7是本申请实施例提供的又一种通信方法700的示意性流程图。方法700可以与方法500、或方法600结合。方法700中可选的操作在图7中以虚线示出。下面结合图7介绍方法700。Figure 7 is a schematic flowchart of another communication method 700 provided in an embodiment of this application. Method 700 can be combined with method 500 or method 600. Optional operations in method 700 are shown in dashed lines in Figure 7. Method 700 will be described below with reference to Figure 7.
在一些可能的实现方式中,方法700可以包括S710或S712。In some possible implementations, method 700 may include S710 or S712.
S710,密钥管理网元与第一度量者之间建立安全连接。S710 establishes a secure connection between the key management network element and the first measurer.
S712,密钥管理网元与第一群组中P个度量者中的部分或全部度量者之间建立安全连接。S712, the key management network element establishes a secure connection with some or all of the P measurands in the first group.
上述S712中P个度量者中的部分或全部度量者包括第一度量者。下面以密钥管理网元与第一度量者之间建立安全连接为例进行介绍,其他度量者与密钥管理网元之间建立安全连接的过程可以参见下面的描述。In the above S712, some or all of the P measurands include the first measurand. The following description uses the establishment of a secure connection between the key management network element and the first measurand as an example. The process of establishing secure connections between other measurands and the key management network element can be found in the following description.
建立安全连接可以涉及背书密钥(endorsement key,EK)证书和AIK证书。其中,EK证书可以是预配置在第一度量者中的。例如,EK证书可以通过硬件烧录或软件预置的方式预配置在第一度量者中。具体的预配置方式可以取决于第一度量者的安全能力。EK证书可以理解为长期证书或根证书,可以被密钥管理网元校验。EK证书也可以称为TPM的EK证书。Establishing a secure connection may involve endorsement key (EK) certificates and AIK certificates. The EK certificate can be pre-configured in the first measurement unit (TMU). For example, the EK certificate can be pre-configured in the first TMU through hardware flashing or software pre-installation. The specific pre-configuration method depends on the security capabilities of the first TMU. The EK certificate can be understood as a long-term certificate or root certificate and can be verified by key management network elements. The EK certificate can also be referred to as the TPM's EK certificate.
AIK证书是度量使用的会话证书,可以是第一度量者为一次度量(例如,由上述第一请求触发的度量)申请的。可选地,AIK证书可以用于多次度量。可选地,第一度量者中可以预配置AIK证书的过期策略,该过期策略可以用于指示AIK证书用于度量的次数。例如,AIK证书用于度量的次数为X,X为正整数。在AIK证书用于度量的次数达到X的情况下,该AIK证书失效。An AIK certificate is a session certificate used for measurement, which may be applied for by the first measurement provider for a single measurement (e.g., a measurement triggered by the first request mentioned above). Optionally, an AIK certificate may be used for multiple measurements. Optionally, an expiration policy for the AIK certificate may be pre-configured in the first measurement provider, which can be used to indicate the number of times the AIK certificate is used for measurement. For example, the number of times the AIK certificate is used for measurement is X, where X is a positive integer. When the number of times the AIK certificate is used for measurement reaches X, the AIK certificate becomes invalid.
下面结合S1-S7,介绍密钥管理网元与第一度量者之间建立安全连接的过程。The following section, in conjunction with S1-S7, describes the process of establishing a secure connection between the key management network element and the first measurand.
S1,第一度量者可以生成AIK签署请求。S1, the first measurer can generate an AIK signing request.
S2,第一度量者可以用密钥管理网元提供的公钥加密该AIK签署请求。S2, the first measurer can encrypt the AIK signing request using the public key provided by the key management network element.
S3,第一度量者可以向密钥管理网元发送AIK签署请求。对应地,密钥管理网元接收来自第一度量者的AIK签署请求。S3, the first measurer can send an AIK signing request to the key management network element. Correspondingly, the key management network element receives the AIK signing request from the first measurer.
其中,该AIK签署请求可以包括请求信息和EK证书。其中,请求信息可以用于请求密钥管理网元颁发AIK证书。The AIK signing request may include request information and an EK certificate. The request information can be used to request the key management network element to issue an AIK certificate.
S4,密钥管理网元可以验证AIK签署请求。S4, the key management network element, can verify AIK signing requests.
例如,密钥管理网元可以检查EK证书的有效性(或合法性)。在EK证书有效的情况下,确定颁发AIK证书。在EK证书无效的情况下,确定不颁发AIK证书。For example, the key management network element can check the validity (or legitimacy) of the EK certificate. If the EK certificate is valid, it determines that an AIK certificate will be issued. If the EK certificate is invalid, it determines that an AIK certificate will not be issued.
S5,密钥管理网元向第一度量者颁发AIK证书,并且AIK证书可以使用EK的公钥进行加密。S5, the key management network element issues an AIK certificate to the first measurer, and the AIK certificate can be encrypted using the EK's public key.
S6,密钥管理网元可以向第一度量者发送加密后的AIK证书。对应地,第一度量者接收来自密钥管理网元加密后的AIK证书。S6, the key management network element can send the encrypted AIK certificate to the first measurement user. Correspondingly, the first measurement user receives the encrypted AIK certificate from the key management network element.
S7,第一度量者解密并保存AIK证书。S7, the first measurer decrypts and saves the AIK certificate.
S720,密钥管理网元确定第一关联关系。S720, the key management network element determines the first association relationship.
例如,密钥管理网元可以通过执行S690(或者,S690和S692),确定第一关联关系。For example, the key management network element can determine the first association by executing S690 (or S690 and S692).
S730,密钥管理网元接收来自第一度量者的密钥生成请求。S730, the key management network element receives a key generation request from the first measurer.
S732,密钥管理网元接收来自第一群组中P个度量者中的部分或全部度量者的密钥生成请求。S732, the key management network element receives key generation requests from some or all of the P measurands in the first group.
示例性地,在执行S710的情况下,方法700可以包括S730;在执行S712的情况下,方法700可以包括S732。For example, when performing S710, method 700 may include S730; when performing S712, method 700 may include S732.
其中,密钥生成请求也可以称为AIK生成请求、度量密钥生成请求或其他名称。本申请对密钥生成请求的具体名称不限定。The key generation request may also be called an AIK generation request, a metric key generation request, or other names. This application does not limit the specific name of the key generation request.
S740,密钥管理网元生成密钥。S740, the key management network element generates keys.
例如,密钥管理网元可以生成第一群组中P个度量者中的部分或全部度量者的密钥。密钥可以包括公钥和私钥。For example, a key management network element can generate keys for some or all of the P measurands in the first group. The keys can include public and private keys.
示例性地,在S740的同时或S740之后,密钥管理网元可以确定第一签名组的标识。该第一签名组可以包括第一群组中P个度量者中的部分或全部度量者的密钥。For example, the key management network element may determine the identifier of the first signature group simultaneously with or after S740. The first signature group may include the keys of some or all of the P measurands in the first group.
示例性地,密钥管理网元可以确定第二关联关系。For example, the key management network element can determine the second association.
作为一个示例,密钥管理网元可以根据度量者的AIK证书生成度量者的密钥。例如,根据第一度量者的AIK证书生成第一度量者的密钥。作为另一个示例,密钥管理网元可以根据度量者提供的密钥进行签名,从而生成密钥。例如,第一度量者可以向密钥管理网元发送第一公钥和第一私钥,该第一公钥和第一私钥是第一度量者生成的。密钥管理网元可以对第一公钥进行签名,生成第二公钥;对第一私钥进行签名,生成第二私钥。进一步地,密钥管理网元可以向第一度量者发送加密后的第二公钥和第二私钥。As an example, the key management network element can generate a key for the measurer based on the measurer's AIK certificate. For instance, it can generate a key for the first measurer based on the first measurer's AIK certificate. As another example, the key management network element can generate a key by signing a key provided by the measurer. For instance, the first measurer can send a first public key and a first private key, which it generated, to the key management network element. The key management network element can then sign the first public key to generate a second public key and sign the first private key to generate a second private key. Furthermore, the key management network element can send the encrypted second public key and second private key to the first measurer.
S750,密钥管理网元向第一度量者发送密钥的指示信息。对应地,第一度量者接收来自密钥管理网元的密钥的指示信息。S750, the key management network element sends key indication information to the first measurement subject. Correspondingly, the first measurement subject receives the key indication information from the key management network element.
密钥的指示信息可以用于指示密钥。例如,密钥的指示信息可以包括加密后的密钥。第一度量者根据上述指示信息解密,得到密钥。Key indication information can be used to indicate the key. For example, key indication information may include the encrypted key. The first measurer decrypts the key based on the aforementioned indication information to obtain the key.
S752,密钥管理网元分别向第一群组中P个度量者中的部分或全部度量者发送密钥的指示信息。对应地,第一群组中P个度量者中的部分或全部度量者接收来自密钥管理网元的密钥的指示信息。S752, the key management network element sends key instruction information to some or all of the P measurands in the first group. Correspondingly, some or all of the P measurands in the first group receive the key instruction information from the key management network element.
示例性地,在执行S730的情况下,方法700可以包括S750;在执行S732的情况下,方法700可以包括S752。For example, when performing S730, method 700 may include S750; when performing S732, method 700 may include S752.
例如,假设向Att1、Att2和Att3发送了密钥的指示信息。其中,发送给Att1的密钥指示信息用于指示sk1和pk1,其中sk1表示Att1的私钥,pk1表示Att1的公钥。发送给Att2的密钥指示信息用于指示sk2和pk2,其中sk2表示Att2的私钥,pk2表示Att2的公钥。发送给Att3的密钥指示信息用于指示sk3和pk3,其中sk3表示Att3的私钥,pk3表示Att3的公钥。For example, suppose key indication information is sent to Att1, Att2, and Att3. The key indication information sent to Att1 indicates sk1 and pk1, where sk1 represents Att1's private key and pk1 represents Att1's public key. The key indication information sent to Att2 indicates sk2 and pk2, where sk2 represents Att2's private key and pk2 represents Att2's public key. The key indication information sent to Att3 indicates sk3 and pk3, where sk3 represents Att3's private key and pk3 represents Att3's public key.
可选地,在S750或S752中,发送给第一度量者的密钥的指示信息可以是第三信息。例如,密钥管理网元可以根据第三关联关系,生成或查找第一度量者的私钥和M个度量者的公钥。进一步地,密钥管理网元可以向第一度量者发送第三信息。该第三信息用于指示M个度量者的密钥。例如,M个度量者的密钥包括第一度量者的私钥和M个度量者的公钥。Optionally, in S750 or S752, the key indication information sent to the first measurand can be third information. For example, the key management network element can generate or look up the private key of the first measurand and the public keys of the M measurands based on the third association. Further, the key management network element can send third information to the first measurand. This third information is used to indicate the keys of the M measurands. For example, the keys of the M measurands include the private key of the first measurand and the public keys of the M measurands.
在一些可能的实现方式中,方法700和方法600、方法500之间可以间隔较长时间。例如,度量者的密钥不是每次度量都要申请,可以预配置过期的策略,一次度量密钥申请可以执行多次度量。In some possible implementations, there can be a relatively long interval between method 700 and methods 600 and 500. For example, the measurer's key does not need to be requested for every measurement; an expiration policy can be pre-configured, and a single measurement key request can be used to perform multiple measurements.
图8是本申请实施例提供的再一种通信方法800的示意性流程图。方法800可以与方法500、方法600、或方法700结合。方法800中可选的操作在图8中以虚线示出。下面结合图8介绍方法800。Figure 8 is a schematic flowchart of another communication method 800 provided in an embodiment of this application. Method 800 can be combined with method 500, method 600, or method 700. Optional operations in method 800 are shown in Figure 8 with dashed lines. Method 800 will be described below with reference to Figure 8.
S810,第一验证者向至少一个第二度量者发送第二请求。对应地,至少一个第二度量者接收来自第一验证者的第二请求。S810, the first verifier sends a second request to at least one second measurer. Correspondingly, at least one second measurer receives the second request from the first verifier.
该第二请求用于请求度量该第一网元。第二请求的其他描述可以参见上面对第一请求的描述,此处不再赘述。The second request is used to request measurement of the first network element. Further details regarding the second request can be found in the description of the first request above, and will not be repeated here.
可选地,第二度量者属于第一群组。换言之,上述至少一个第二度量者中的每个第二度量者属于第一群组。Optionally, the second measurer belongs to the first group. In other words, each of the at least one second measurer mentioned above belongs to the first group.
示例性地,第二度量者可以不属于上述N个度量者。第二度量者与第一度量者不同。但是,第二度量者是否属于M个度量者,本申请不做限定。第二度量者可以属于M个度量者,也可以不属于M个度量者。换言之,第二度量者可以参与第一签名的生成过程,也可以不参与第一签名的生成过程。For example, the second measurer may not belong to the aforementioned N measurers. The second measurer is different from the first measurer. However, this application does not limit whether the second measurer belongs to the M measurers. The second measurer may or may not belong to the M measurers. In other words, the second measurer may or may not participate in the generation process of the first signature.
S820,第一验证者设置定时器。S820, the first verifier sets the timer.
例如,第一验证者可以根据预配置的时长设置定时器,该定时器的起始时刻可以是S810的执行时刻,或者S810执行后的某个时刻。For example, the first verifier can set a timer according to a pre-configured duration. The start time of the timer can be the execution time of S810, or a certain time after S810 is executed.
S822,第一验证者接收来自至少一个第二度量者中每个第二度量者的拒绝信息。对应地,至少一个第二度量者中每个第二度量者向第一验证者发送拒绝信息。S822, the first verifier receives rejection information from each of the at least one second measurer. Correspondingly, each of the at least one second measurer sends rejection information to the first verifier.
可选地,拒绝信息可以用于指示拒绝响应、拒绝度量、拒绝签名或其他形式的信息。这样,第一验证者可以根据拒绝信息,确定至少一个第二度量者不会协助完成远程证明。Optionally, the rejection information can be used to indicate a rejection response, a rejection metric, a rejection signature, or other forms of information. In this way, the first verifier can determine, based on the rejection information, that at least one second metric provider will not assist in completing the remote proof.
第一条件可以用于触发第一验证者向除至少一个第二度量者之外的其他度量者发送第一请求。The first condition can be used to trigger the first verifier to send a first request to all other measurators except for at least one second measurator.
可选地,第一条件包括:该第一验证者接收到来自该至少一个第二度量者中每个第二度量者的拒绝信息,和/或,该第一验证者在预定时间段内未接收到来自该至少一个第二度量者的响应。Optionally, the first condition includes: the first verifier receiving rejection information from each of the at least one second measurer, and/or the first verifier not receiving a response from the at least one second measurer within a predetermined time period.
在一些示例中,预定时间段可以通过定时器的起始时刻和终止时刻指示。在另一些示例中,预定时间段可以通过定时器的起始时刻和预设时长指示。In some examples, the predetermined time period can be indicated by the start and end times of the timer. In other examples, the predetermined time period can be indicated by the start time and preset duration of the timer.
在第一条件包括第一验证者接收到来自该至少一个第二度量者中每个第二度量者的拒绝信息的情况下,S820可以执行,也可以不执行。在第一条件包括第一验证者在预定时间段内未接收到来自该至少一个第二度量者的响应,S822可以执行,也可以不执行。例如,第一验证者可以不接收至少一个第二度量者中每个第二度量者的拒绝信息,或者,接收了至少一个第二度量者的拒绝信息后,忽略该拒绝信息。If the first condition includes the first verifier receiving rejection information from each of the at least one second measurer, S820 may or may not be executed. If the first condition includes the first verifier not receiving a response from the at least one second measurer within a predetermined time period, S822 may or may not be executed. For example, the first verifier may choose not to receive rejection information from each of the at least one second measurer, or, after receiving rejection information from at least one second measurer, may ignore the rejection information.
本申请对第一条件的具体名称不做限定,第一条件也可以称为本地策略或其他名称。This application does not specify the exact name of the first condition; the first condition may also be referred to as the local policy or other names.
在S810之前,第一验证者可能预配置或从密钥管理网元(或编排管理网元)获取了第一关联关系,从而确定至少一个第二度量者,进而执行S810。可选地,第一验证者可以缓存上述第一关联关系。这样,第一验证者可以根据第一关联关系,向P个度量者中除至少一个第二度量者之外的度量者(例如,第一度量者、第四度量者或者N个度量者)发送第一请求。Prior to S810, the first validator may have pre-configured or obtained a first association relationship from the key management network element (or orchestration management network element) to determine at least one second measurand, and then execute S810. Optionally, the first validator may cache the aforementioned first association relationship. In this way, the first validator can send a first request to one of the P measurands (e.g., the first measurand, the fourth measurand, or N measurands) based on the first association relationship.
可选地,第一验证者不缓存上述第一关联关系,以节省存储空间。或者,第一验证者未配置或未从密钥管理网元(或编排管理网元)获取第一关联关系。第一验证者可以从密钥管理网元(或编排管理网元)获取第一群组的度量者列表。下面结合S830-S850进行介绍。Optionally, the first validator does not cache the aforementioned first association relationship to save storage space. Alternatively, the first validator does not configure or obtain the first association relationship from the key management network element (or orchestration management network element). The first validator can obtain the list of measurants for the first group from the key management network element (or orchestration management network element). The following description is based on S830-S850.
S830,第一验证者向密钥管理网元或编排管理网元发送查询请求。对应地,密钥管理网元或编排管理网元接收来自第一验证者的查询请求。S830, the first validator sends a query request to the key management network element or the orchestration management network element. Correspondingly, the key management network element or the orchestration management network element receives the query request from the first validator.
可选地,查询请求包括至少一个第二度量者的标识。Optionally, the query request may include the identifier of at least one second measurand.
S840,密钥管理网元或编排管理网元确定度量者列表。S840, the key management network element or orchestration management network element determines the list of measurands.
可选地,度量者列表可以是第一群组的度量者列表。Optionally, the list of measurands can be the list of measurands in the first group.
在一些示例中,上述第一群组的度量者列表可以包括P个度量者的标识。即,第一群组的度量者列表包括第一群组中全部度量者的标识。In some examples, the list of measurands for the first group may include the identifiers of P measurands. That is, the list of measurands for the first group includes the identifiers of all measurands in the first group.
在另一些示例中,上述第一群组的度量者列表可以包括P个度量者中除至少一个度量者之外的度量者的标识。即,第一群组的度量者列表不包括查询请求中携带的度量者的标识,即,第二度量者的标识。In other examples, the list of measurands for the first group may include the identifiers of the measurands other than at least one of the P measurands. That is, the list of measurands for the first group does not include the identifiers of the measurands carried in the query request, i.e., the identifiers of the second measurands.
在再一些示例中,上述第一群组的度量者列表可以包括第一度量者、第四度量者或N个度量者的标识。即,第一群组的度量者列表包括推荐请求的度量者的标识。In some further examples, the list of measurants for the first group may include the identifiers of the first measurant, the fourth measurant, or N measurants. That is, the list of measurants for the first group includes the identifiers of the measurants for the recommendation request.
示例性地,密钥管理网元或编排管理网元可以根据查询请求和第一关联关系(或第三关联关系),确定第一群组的度量者列表。例如,密钥管理网元或编排管理网元可以确定,至少一个第二度量者的标识在第一关联关系中对应于第一群组的标识,第一群组的标识对应于第一群组中P个度量者的标识,从而确定第一群组的度量者列表。For example, the key management network element or the orchestration management network element can determine the list of measurands for the first group based on the query request and the first association relationship (or the third association relationship). For instance, the key management network element or the orchestration management network element can determine that the identifier of at least one second measurand corresponds to the identifier of the first group in the first association relationship, and the identifier of the first group corresponds to the identifiers of P measurands in the first group, thereby determining the list of measurands for the first group.
可选地,度量者列表可以是多个群组的度量者列表。其中,上述多个群组可以包括第一群组。Optionally, the list of measurers can be a list of measurers from multiple groups. These multiple groups may include a first group.
S850,密钥管理网元或编排管理网元向第一验证者发送度量者列表的指示信息。对应地,第一验证者接收来自密钥管理网元或编排管理网元的度量者列表的指示信息。S850, the key management network element or the orchestration management network element sends an instruction message for the measurand list to the first validator. Correspondingly, the first validator receives the instruction message for the measurand list from the key management network element or the orchestration management network element.
在度量者列表是多个群组的度量者列表的情况下,第一验证者可以通过第一关联关系(或者,第一关联关系和第三关联关系)确定第一网元的标识所对应的P个度量者的标识,从而在度量者列表中筛选出P个度量者中的度量者。例如,第一验证者可以筛选出第一度量者、第四度量者或N个度量者。When the measurer list consists of multiple groups, the first verifier can determine the identifiers of the P measurers corresponding to the identifier of the first network element through the first association (or the first association and the third association), thereby filtering out the measurers from the P measurers in the measurer list. For example, the first verifier can filter out the first measurer, the fourth measurer, or N measurers.
进一步地,第一验证者可以执行S660、S662或S664。也就是说,在满足第一条件的情况下,执行S660、S662或S664。Furthermore, the first verifier can execute S660, S662, or S664. That is, if the first condition is met, S660, S662, or S664 will be executed.
基于上述方案,本申请实施例在向一个或多个度量者发送度量请求之后,若上述度量者在预定时间段内未响应,和/或,上述度量者拒绝,则可以向其他度量者(例如,第一度量者、第四度量者或N个度量者)发送请求,避免部分度量者的故障影响远程证明的进行,从而增加了远程证明的韧性。Based on the above scheme, in this embodiment of the application, after sending a measurement request to one or more measurement users, if the measurement user does not respond within a predetermined time period, and/or the measurement user refuses, a request can be sent to other measurement users (e.g., the first measurement user, the fourth measurement user, or N measurement users) to avoid the failure of some measurement users affecting the remote proof process, thereby increasing the resilience of the remote proof.
下文对本申请方法实施例对应的装置实施例进行介绍。下文仅对装置做简要介绍,方案具体实现步骤和细节可参考前文方法实施例。The following describes the apparatus embodiments corresponding to the method embodiments of this application. Only a brief description of the apparatus is provided below; for specific implementation steps and details, please refer to the preceding method embodiments.
为了实现本申请提供的方法中的各功能,通信装置可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。To achieve the functions of the methods provided in this application, the communication device may include hardware structures and/or software modules, implementing the aforementioned functions in the form of hardware structures, software modules, or a combination of hardware structures and software modules. Whether a particular function is implemented in the form of hardware structures, software modules, or a combination of hardware structures and software modules depends on the specific application and design constraints of the technical solution.
图9是本申请实施例的一种通信装置1000的示意框图。通信装置1000包括处理器1010和通信接口1020。可选地,处理器1010和通信接口1020可以通过总线相互连接。通信装置1000可以是第一验证者、第一度量者、密钥管理网元或第三度量者。Figure 9 is a schematic block diagram of a communication device 1000 according to an embodiment of this application. The communication device 1000 includes a processor 1010 and a communication interface 1020. Optionally, the processor 1010 and the communication interface 1020 can be interconnected via a bus. The communication device 1000 can be a first authenticator, a first measurer, a key management network element, or a third measurer.
可选地,通信装置1000还可以包括存储器1040。存储器1040包括但不限于是随机存储记忆体(random access memory,RAM)、只读存储器(read-only memory,ROM)、高速缓存(cache)、可擦除可编程只读存储器(erasable programmable read only memory,EPROM)、同步动态随机存取存储器(synchronous dynamic random access memory,SDRAM)、硬盘(hard disk drive,HDD)、固态硬盘(solid-state drive,SSD)或便携式只读存储器(compact disc read-only memory,CD-ROM),该存储器1040用于存储相关指令和/或数据。存储器1040可以与处理器1010集成在一起,或者分离设置。Optionally, the communication device 1000 may further include a memory 1040. The memory 1040 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), cache, erasable programmable read-only memory (EPROM), synchronous dynamic random access memory (SDRAM), hard disk drive (HDD), solid-state drive (SSD), or compact disc read-only memory (CD-ROM). The memory 1040 is used to store related instructions and/or data. The memory 1040 may be integrated with the processor 1010 or disposed separately.
处理器1010可以包括中央处理器(central processing unit,CPU)、特定应用集成电路(application-specific integrated circuit,ASIC)、数字信号处理器(digital signal processor,DSP)、微处理器(microprocessor unit,MPU)、微控制器(microcontroller unit,MCU)、图形处理器(graphics processing unit,GPU)、现场可编程门阵列(Field Programmable Gate Array,FPGA)、人工智能处理器(artificial intelligence processor,AI processor)或神经网络处理器(neural processing unit,NPU)中的一个或者多个组合。在处理器1010是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。但是本申请对此不限定,处理器1010也可以是一个或多个GPU,还可以是一个或多个张量处理单元(tensor processing unit,TPU)。其中,处理器1010可以是信号处理器、芯片,或其他可以实现本申请方法的集成电路,或者前述处理器、芯片或集成电路中的用于处理功能的部分电路。另外,通信接口1020也可以为输入输出接口,输入输出接口用于信号或数据的输入或输出,也可以是输入输出电路。Processor 1010 may include one or more of the following: a central processing unit (CPU), an application-specific integrated circuit (ASIC), a digital signal processor (DSP), a microprocessor unit (MPU), a microcontroller unit (MCU), a graphics processing unit (GPU), a field-programmable gate array (FPGA), an artificial intelligence processor (AI processor), or a neural processing unit (NPU). If processor 1010 is a CPU, it may be a single-core CPU or a multi-core CPU. However, this application is not limited in this respect; processor 1010 may also be one or more GPUs, or one or more tensor processing units (TPUs). Processor 1010 may be a signal processor, a chip, or other integrated circuit capable of implementing the methods of this application, or a portion of the circuitry within the aforementioned processor, chip, or integrated circuit used for processing functions. In addition, the communication interface 1020 can also be an input/output interface. Input/output interfaces are used for inputting or outputting signals or data, and can also be input/output circuits.
示例性地,通信装置1000为第一验证者,处理器1010用于执行以下操作:接收来自第一度量者的第一信息,该第一信息包括第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该第一签名所基于的度量者包括M个度量者,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数;根据该M个度量者的密钥,验证该第一签名和该第一证据。For example, the communication device 1000 is the first verifier, and the processor 1010 is configured to perform the following operations: receive first information from the first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, M being an integer greater than 1; verify the first signature and the first evidence according to the keys of the M measurers.
示例性地,通信装置1000为第一度量者,处理器1010用于执行以下操作:根据第一网元,确定第一证据;根据M个度量者的密钥和该第一证据,确定第一签名,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数,该第一签名用于验证该第一证据的有效性;向第一验证者发送第一信息,该第一信息包括该第一签名和该第一证据。For example, the communication device 1000 is the first measurer, and the processor 1010 is configured to perform the following operations: determine the first evidence based on the first network element; determine the first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; and send the first information to the first verifier, wherein the first information includes the first signature and the first evidence.
示例性地,通信装置1000为密钥管理网元,处理器1010用于执行以下操作:接收来自第一验证者的第三请求,该第三请求用于请求M个度量者的密钥,该M个度量者的密钥用于验证第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该M个度量者用于度量该第一网元,M为大于1的整数;向该第一验证者发送第三信息,该第三信息用于指示该M个度量者的密钥。For example, the communication device 1000 is a key management network element, and the processor 1010 is configured to perform the following operations: receive a third request from a first verifier, the third request being for requesting the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring the first network element, the M measurers being used to measure the first network element, and M being an integer greater than 1; send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
示例性地,通信装置1000为第三度量者,处理器1010用于执行以下操作:生成第四信息,该第四信息用于指示该第三度量者的密钥;向第一度量者发送第四信息。For example, the communication device 1000 is a third measurer, and the processor 1010 is configured to perform the following operations: generate fourth information, which is used to indicate the key of the third measurer; and send the fourth information to the first measurer.
上述内容仅作为示例性描述。通信装置1000是将负责执行前述方法实施例中第一验证者、第一度量者、密钥管理网元或第三度量者相关的方法或者步骤。The above description is for illustrative purposes only. The communication device 1000 is responsible for executing the methods or steps related to the first verifier, first measurer, key management network element, or third measurer in the aforementioned method embodiments.
一种可能的实现中,通信接口1020可以为收发器。收发器可以包括发送器和接收器,发送器用于执行发送操作,接收器用于执行接收操作。例如,处理器1010用于控制收发器进行信号的接收和/或发送。In one possible implementation, the communication interface 1020 can be a transceiver. The transceiver may include a transmitter and a receiver, with the transmitter performing a transmission operation and the receiver performing a reception operation. For example, the processor 1010 is used to control the transceiver to receive and/or transmit signals.
一种可能的实现中,通信接口1020还可以为通信电路、管脚、输入输出接口、总线等。In one possible implementation, the communication interface 1020 can also be a communication circuit, pins, input/output interfaces, bus, etc.
需要说明的是,通信装置1000可以包括发送器,而不包括接收器。或者,通信装置1000可以包括接收器,而不包括发送器。具体可以视通信装置1000执行的上述方案中是否包括发送动作和接收动作。It should be noted that the communication device 1000 may include a transmitter but not a receiver. Alternatively, the communication device 1000 may include a receiver but not a transmitter. Specifically, it depends on whether the above-described scheme performed by the communication device 1000 includes both transmitting and receiving actions.
上述描述仅是示例性描述。具体内容可以参见上述方法实施例所示的内容。图9中的各个操作的实现还可以对应参照图5至图8所示的方法实施例的相应描述。The above description is merely exemplary. For details, please refer to the methods illustrated in the above embodiments. The implementation of each operation in Figure 9 can also be found in the corresponding descriptions of the methods illustrated in Figures 5 to 8.
例如,通信装置1000可以用于执行图5至图8示出的方案。For example, the communication device 1000 can be used to execute the scheme shown in Figures 5 to 8.
示例性地,通信装置1000为第一验证者,通信接口1020可以用于接收第一信息等。For example, the communication device 1000 is the first verifier, and the communication interface 1020 can be used to receive first information, etc.
示例性地,通信装置1000为第一度量者,通信接口1020可以用于发送第一信息等。For example, the communication device 1000 is the first measuring entity, and the communication interface 1020 can be used to send first information, etc.
示例性地,通信装置1000为密钥管理网元,通信接口1020可以用于接收第三请求等。For example, the communication device 1000 is a key management network element, and the communication interface 1020 can be used to receive third requests, etc.
示例性地,通信装置1000为第三度量者,通信接口1020可以用于发送第四信息等。For example, the communication device 1000 is a third measuring agent, and the communication interface 1020 can be used to send fourth information, etc.
对于其他实现方式具体可以参阅前述图5至图8所示的实施例的详细介绍,这里不再赘述。应理解,各部件执行上述相应过程的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。For details on other implementation methods, please refer to the detailed descriptions of the embodiments shown in Figures 5 to 8 above, which will not be repeated here. It should be understood that the specific processes by which each component performs the corresponding processes described above have been described in detail in the above method embodiments, and will not be repeated here for the sake of brevity.
图10是本申请实施例的另一种通信装置1100的示意框图。通信装置1100可以为第一验证者、第一度量者、密钥管理网元或第三度量者,也可以为第一验证者、第一度量者、密钥管理网元或第三度量者中的芯片或模块,用于实现图5至图8所示的实施例涉及的方法,具体请参考上述方法实施例中的相关介绍。Figure 10 is a schematic block diagram of another communication device 1100 according to an embodiment of this application. The communication device 1100 can be a first verifier, a first measurer, a key management network element, or a third measurer, or it can be a chip or module in the first verifier, the first measurer, the key management network element, or the third measurer, used to implement the methods involved in the embodiments shown in Figures 5 to 8. For details, please refer to the relevant descriptions in the above method embodiments.
通信装置1100包括收发单元1110。下面对该收发单元1110进行示例性地介绍。The communication device 1100 includes a transceiver unit 1110. The transceiver unit 1110 will be described exemplarily below.
收发单元1110可以包括发送单元和接收单元。发送单元用于执行通信装置的发送动作,接收单元用于执行通信装置的接收动作。为便于描述,本申请实施例将发送单元与接收单元合为一个收发单元。在此做统一说明,后文不再赘述。收发单元1110可以实现相应的通信功能。收发单元1110还可以称为通信接口或通信模块。The transceiver unit 1110 may include a sending unit and a receiving unit. The sending unit is used to perform the sending action of the communication device, and the receiving unit is used to perform the receiving action of the communication device. For ease of description, the sending unit and the receiving unit are combined into one transceiver unit in this embodiment. This will be explained uniformly here and will not be repeated later. The transceiver unit 1110 can implement the corresponding communication functions. The transceiver unit 1110 may also be referred to as a communication interface or a communication module.
需要说明的是,通信装置1100可以包括发送单元,而不包括接收单元。或者,通信装置1100可以包括接收单元,而不包括发送单元。具体可以视通信装置1100执行的上述方案中是否包括发送动作和接收动作。It should be noted that the communication device 1100 may include a transmitting unit but not a receiving unit. Alternatively, the communication device 1100 may include a receiving unit but not a transmitting unit. Specifically, it depends on whether the above-described scheme executed by the communication device 1100 includes both transmitting and receiving actions.
示例性地,收发单元1110用于接收第一信息等。For example, the transceiver unit 1110 is used to receive first information, etc.
可选地,通信装置1100还可以包括处理单元1120,其用于执行通信装置1100涉及处理、协调等步骤的内容。Optionally, the communication device 1100 may further include a processing unit 1120, which is used to perform the processing, coordination and other steps involved in the communication device 1100.
示例性地,收发单元1110用于发送第一信息等。For example, the transceiver unit 1110 is used to send first information, etc.
可选地,通信装置1100还可以包括处理单元1120,其用于执行通信装置1100涉及处理、协调等步骤的内容。Optionally, the communication device 1100 may further include a processing unit 1120, which is used to perform the processing, coordination and other steps involved in the communication device 1100.
示例性地,收发单元1110用于接收第三请求等。For example, the transceiver unit 1110 is used to receive third requests, etc.
可选地,通信装置1100还可以包括处理单元1120,其用于执行通信装置1100涉及处理、协调等步骤的内容。Optionally, the communication device 1100 may further include a processing unit 1120, which is used to perform the processing, coordination and other steps involved in the communication device 1100.
示例性地,收发单元1110用于发送第四信息等。For example, the transceiver unit 1110 is used to send fourth information, etc.
可选地,通信装置1100还可以包括处理单元1120,其用于执行通信装置1100涉及处理、协调等步骤的内容。Optionally, the communication device 1100 may further include a processing unit 1120, which is used to perform the processing, coordination and other steps involved in the communication device 1100.
上述所述内容仅作为示例性描述。通信装置1100将负责执行前述方法实施例中相关的方法或者步骤。The above description is for illustrative purposes only. The communication device 1100 will be responsible for executing the relevant methods or steps in the foregoing method embodiments.
可选地,通信装置1100还包括存储单元1130,该存储单元1130用于存储用于执行前述方法的程序或者代码。或者说,存储单元1130可以用于存储指令和/或数据,处理单元1120可以读取存储单元1130中的指令和/或数据,以使得通信装置1100实现前述方法实施例。例如,通信装置1100可以用于执行图5至图8示出的方案。Optionally, the communication device 1100 further includes a storage unit 1130 for storing programs or code for executing the aforementioned methods. Alternatively, the storage unit 1130 can store instructions and/or data, and the processing unit 1120 can read the instructions and/or data from the storage unit 1130 to enable the communication device 1100 to implement the aforementioned method embodiments. For example, the communication device 1100 can be used to execute the schemes shown in Figures 5 to 8.
示例性地,收发单元1110可以用于接收来自第一度量者的第一信息,该第一信息包括第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该第一签名所基于的度量者包括M个度量者,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数;处理单元1120可以用于根据该M个度量者的密钥,验证该第一签名和该第一证据。For example, the transceiver unit 1110 can be used to receive first information from a first measurer, the first information including a first signature and a first evidence, the first signature being used to verify the validity of the first evidence, the first evidence being obtained by measuring a first network element, the measurer on which the first signature is based including M measurers, the M measurers being used to measure the first network element, the M measurers including the first measurer, M being an integer greater than 1; the processing unit 1120 can be used to verify the first signature and the first evidence according to the keys of the M measurers.
示例性地,处理单元1120可以用于根据第一网元,确定第一证据;根据M个度量者的密钥和该第一证据,确定第一签名,该M个度量者用于度量该第一网元,该M个度量者包括该第一度量者,M为大于1的整数,该第一签名用于验证该第一证据的有效性;收发单元1110可以用于向第一验证者发送第一信息,该第一信息包括该第一签名和该第一证据。For example, the processing unit 1120 can be used to determine the first evidence based on the first network element; determine the first signature based on the keys of M measurers and the first evidence, wherein the M measurers are used to measure the first network element, the M measurers include the first measurer, M is an integer greater than 1, and the first signature is used to verify the validity of the first evidence; the transceiver unit 1110 can be used to send the first information to the first verifier, the first information including the first signature and the first evidence.
示例性地,收发单元1110可以用于接收来自第一验证者的第三请求,该第三请求用于请求M个度量者的密钥,该M个度量者的密钥用于验证第一签名和第一证据,该第一签名用于验证该第一证据的有效性,该第一证据是对第一网元进行度量得到的,该M个度量者用于度量该第一网元,M为大于1的整数;收发单元1110可以还用于向该第一验证者发送第三信息,该第三信息用于指示该M个度量者的密钥。For example, the transceiver unit 1110 can be used to receive a third request from a first verifier, the third request being used to request the keys of M measurers, the keys of the M measurers being used to verify a first signature and a first piece of evidence, the first signature being used to verify the validity of the first piece of evidence, the first piece of evidence being obtained by measuring a first network element, the M measurers being used to measure the first network element, and M being an integer greater than 1; the transceiver unit 1110 can also be used to send third information to the first verifier, the third information being used to indicate the keys of the M measurers.
示例性地,处理单元1120可以用于生成第四信息,该第四信息用于指示该第三度量者的密钥;收发单元1110可以用于向第一度量者发送第四信息。For example, the processing unit 1120 can be used to generate fourth information, which is used to indicate the key of the third measurer; the transceiver unit 1110 can be used to send the fourth information to the first measurer.
对于其他实现方式具体可以参阅前述图5至图8所示的实施例的详细介绍,这里不再赘述。应理解,各部件执行上述相应过程的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。For details on other implementation methods, please refer to the detailed descriptions of the embodiments shown in Figures 5 to 8 above, which will not be repeated here. It should be understood that the specific processes by which each component performs the corresponding processes described above have been described in detail in the above method embodiments, and will not be repeated here for the sake of brevity.
当图9中的通信装置1100为芯片时,通信接口1120可以是该芯片的收发器、输入输出电路或通信接口。处理器1110可以是该芯片上集成的处理器、或者微处理器、或者集成电路。上述方法实施例中第一验证者、第一度量者、密钥管理网元或第三度量者的发送操作可以理解为芯片的输出,上述方法实施例中第一验证者、第一度量者、密钥管理网元或第三度量者的接收操作可以理解为芯片的输入。When the communication device 1100 in Figure 9 is a chip, the communication interface 1120 can be a transceiver, input/output circuit, or communication interface of the chip. The processor 1110 can be a processor integrated on the chip, a microprocessor, or an integrated circuit. In the above method embodiments, the sending operations of the first verifier, the first measurer, the key management network element, or the third measurer can be understood as the chip's output, and the receiving operations of the first verifier, the first measurer, the key management network element, or the third measurer in the above method embodiments can be understood as the chip's input.
当图9中的通信装置1100为芯片时,收发单元1110可以是该芯片的收发器、输入输出电路或通信接口。处理单元1120可以是该芯片上集成的处理器、或者微处理器、或者集成电路。上述方法实施例中第一验证者、第一度量者、密钥管理网元或第三度量者的发送操作可以理解为芯片的输出,上述方法实施例中第一验证者、第一度量者、密钥管理网元或第三度量者的接收操作可以理解为芯片的输入。When the communication device 1100 in Figure 9 is a chip, the transceiver unit 1110 can be the transceiver, input/output circuit, or communication interface of that chip. The processing unit 1120 can be a processor, microprocessor, or integrated circuit integrated on the chip. In the above method embodiments, the sending operations of the first verifier, the first measurer, the key management network element, or the third measurer can be understood as the chip's output, and the receiving operations of the first verifier, the first measurer, the key management network element, or the third measurer in the above method embodiments can be understood as the chip's input.
本申请还提供了一种芯片,包括处理器,用于从存储器中调用并运行所述存储器中存储的指令,使得安装有所述芯片的通信装置执行上述各示例中的方法。This application also provides a chip, including a processor, for calling and executing instructions stored in a memory, causing a communication device on which the chip is mounted to perform the methods described in the examples above.
本申请还提供另一种芯片,包括:输入接口、输出接口、处理器,所述输入接口、输出接口以及所述处理器之间通过内部连接通路相连,所述处理器用于执行存储器中的代码,当所述代码被执行时,所述处理器用于执行上述各示例中的方法。可选地,该芯片还包括存储器,该存储器用于存储计算机程序或者代码。This application also provides another chip, including: an input interface, an output interface, and a processor, wherein the input interface, the output interface, and the processor are connected via an internal connection path, and the processor is used to execute code in a memory. When the code is executed, the processor is used to perform the methods in the examples described above. Optionally, the chip further includes a memory for storing computer programs or code.
本申请还提供了一种处理器,用于与存储器耦合,用于执行上述各实施例中任一实施例中涉及通信装置或编码装置的方法和功能。This application also provides a processor for coupling with a memory for performing the methods and functions related to communication devices or encoding devices in any of the above embodiments.
在本申请的另一实施例中提供一种包含计算机程序或指令的计算机程序产品,当该计算机程序产品在计算机上运行时,前述实施例的方法得以实现。In another embodiment of this application, a computer program product comprising a computer program or instructions is provided, wherein the method of the foregoing embodiments is implemented when the computer program product is run on a computer.
本申请还提供一种计算机程序,当该计算机程序在计算机中被运行时,前述实施例的方法得以实现。This application also provides a computer program that, when run on a computer, enables the implementation of the methods described in the foregoing embodiments.
在本申请的另一实施例中提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被计算机执行时实现前述实施例所述的方法。In another embodiment of this application, a computer-readable storage medium is provided, which stores a computer program that, when executed by a computer, implements the methods described in the foregoing embodiments.
本申请还提供一种通信系统,该通信系统包括第一验证者和密钥管理单元。第一验证者和密钥管理单元分别用于执行前述实施例中第一验证者和密钥管理单元所执行的方法。This application also provides a communication system including a first verifier and a key management unit. The first verifier and the key management unit are respectively used to execute the methods executed by the first verifier and the key management unit in the foregoing embodiments.
在一些可能的实现方式中,通信系统还包括第一度量者。第一度量者用于执行前述实施例中第一度量者所执行的方法。In some possible implementations, the communication system further includes a first measurand. The first measurand is used to execute the methods performed by the first measurand in the foregoing embodiments.
在一些可能的实现方式中,通信系统还包括第三度量者。第三度量者用于执行前述实施例中第三度量者所执行的方法。In some possible implementations, the communication system also includes a third measurand. The third measurand is used to execute the methods performed by the third measurand in the foregoing embodiments.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art will recognize that the units and algorithm steps of the various examples described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are implemented in hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art will understand that, for the sake of convenience and brevity, the specific working processes of the systems, devices, and units described above can be referred to the corresponding processes in the foregoing method embodiments, and will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods can be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative; for instance, the division of units is only a logical functional division, and in actual implementation, there may be other division methods. For example, multiple units or components may be combined or integrated into another system, or some features may be ignored or not executed. Furthermore, the coupling or direct coupling or communication connection shown or discussed may be through some interfaces; the indirect coupling or communication connection between apparatuses or units may be electrical, mechanical, or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate. The components shown as units may or may not be physical units; that is, they may be located in one place or distributed across multiple network units. Some or all of the units can be selected to achieve the purpose of this embodiment according to actual needs.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of this application can be integrated into one processing unit, or each unit can exist physically separately, or two or more units can be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the aforementioned functions are implemented as software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of this application, in essence, or the part that contributes to the prior art, or a portion of the technical solution, can be embodied in the form of a software product. This computer software product is stored in a storage medium and includes several instructions to cause a computer device (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of this application. The aforementioned storage medium includes various media capable of storing program code, such as USB flash drives, portable hard drives, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above description is merely a specific embodiment of this application, but the scope of protection of this application is not limited thereto. Any variations or substitutions that can be easily conceived by those skilled in the art within the scope of the technology disclosed in this application should be included within the scope of protection of this application. Therefore, the scope of protection of this application should be determined by the scope of the claims.
Claims (32)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410765502.7 | 2024-06-13 | ||
| CN202410765502.7A CN121193433A (en) | 2024-06-13 | 2024-06-13 | Communication methods and devices |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025256452A1 true WO2025256452A1 (en) | 2025-12-18 |
Family
ID=98050148
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2025/099289 Pending WO2025256452A1 (en) | 2024-06-13 | 2025-06-05 | Communication method and apparatus |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN121193433A (en) |
| WO (1) | WO2025256452A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1867877A (en) * | 2003-10-17 | 2006-11-22 | 国际商业机器公司 | Method and system for user attestation-signatures with attributes |
| CN106992855A (en) * | 2017-03-15 | 2017-07-28 | 西安电子科技大学 | Key exchange method based on discrete loci |
| CN117081928A (en) * | 2022-05-08 | 2023-11-17 | 华为技术有限公司 | Communication methods and devices |
| CN117082507A (en) * | 2022-05-09 | 2023-11-17 | 华为技术有限公司 | Communication methods and network element equipment |
-
2024
- 2024-06-13 CN CN202410765502.7A patent/CN121193433A/en active Pending
-
2025
- 2025-06-05 WO PCT/CN2025/099289 patent/WO2025256452A1/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1867877A (en) * | 2003-10-17 | 2006-11-22 | 国际商业机器公司 | Method and system for user attestation-signatures with attributes |
| CN106992855A (en) * | 2017-03-15 | 2017-07-28 | 西安电子科技大学 | Key exchange method based on discrete loci |
| CN117081928A (en) * | 2022-05-08 | 2023-11-17 | 华为技术有限公司 | Communication methods and devices |
| CN117082507A (en) * | 2022-05-09 | 2023-11-17 | 华为技术有限公司 | Communication methods and network element equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN121193433A (en) | 2025-12-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12500778B2 (en) | Systems and methods for managing public key infrastructure certificates for components of a network | |
| US11855977B2 (en) | Systems and methods for configuring a network function proxy for secure communication | |
| CN112312466B (en) | A method, device and system for sending event report | |
| US11812496B2 (en) | User group session management method and apparatus | |
| CN112449315B (en) | Network slice management method and related device | |
| JP7178507B2 (en) | Certification decisions for fixed network residential gateways | |
| EP3771242A1 (en) | Key generation method and relevant apparatus | |
| US20250063364A1 (en) | Communication method and network element device | |
| JP2014233078A (en) | Methods for policy management | |
| CN113767654B (en) | Method and system for enabling user equipment belonging to a home network to access data communication services in a visited network | |
| WO2022088106A1 (en) | Message transmission method and apparatus | |
| US20250184743A1 (en) | Communication method and apparatus | |
| WO2023216913A1 (en) | Communication method and apparatus | |
| US12143813B2 (en) | Systems and methods for UE-initiated NSSAA procedures | |
| EP4352986B1 (en) | Proxy certificate management for nfv environment (pcs) | |
| US20250365272A1 (en) | Attestation Method and Related Device Thereof | |
| WO2025256452A1 (en) | Communication method and apparatus | |
| WO2025256424A1 (en) | Communication method and apparatus | |
| US11956375B2 (en) | Digital letter of approval (DLOA) for device compliance | |
| WO2024040512A1 (en) | Blockchain creation method and related apparatus | |
| CN116782224A (en) | Communication methods and devices | |
| US20240430089A1 (en) | Communication method, terminal device, and communication apparatus | |
| WO2026001734A1 (en) | Communication method and apparatus | |
| WO2025036173A1 (en) | Information interaction method and apparatus, and readable storage medium | |
| CN119817123A (en) | Method, apparatus and system for user-centric and decentralized roaming |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25821164 Country of ref document: EP Kind code of ref document: A1 |