5G SUCI, SUPI, 5G-GUTI usage scenarios and relationships

5G SUCI, SUPI, 5G-GUTI usage scenarios and relationships

Insert picture description here
1. When the UE initially registers, it encrypts SUPI into SUCI according to the HN Public Key, and sends an initial registration request

2. AMF forwards SUCI to AUSF and UDM for authentication, and obtains the decrypted SUPI

3. AMF generates a 5G-GUTI according to SUPI and saves the mapping relationship for the next registration or PDU session request, and informs the UE that the registration is complete

4. For the next registration request, the UE uses 5G-GUTI to send a registration request:

  • AMF found SUPI according to 5G-GUTI, and used SUPI to complete the certification
  • AMF cannot find the corresponding SUPI according to 5G-GUTI, AMF then requests SUCI from the UE, and re-authenticates according to SUCI

Refer to self-knowledge: Zhihu link If there is any infringement, please contact to delete

Guess you like

Origin blog.csdn.net/weixin_45022086/article/details/108980419