[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109151816B - A kind of network authentication method and system - Google Patents

A kind of network authentication method and system Download PDF

Info

Publication number
CN109151816B
CN109151816B CN201710510229.3A CN201710510229A CN109151816B CN 109151816 B CN109151816 B CN 109151816B CN 201710510229 A CN201710510229 A CN 201710510229A CN 109151816 B CN109151816 B CN 109151816B
Authority
CN
China
Prior art keywords
network
mme
random number
lte
autn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710510229.3A
Other languages
Chinese (zh)
Other versions
CN109151816A (en
Inventor
李�赫
诸华林
靳维生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710510229.3A priority Critical patent/CN109151816B/en
Priority to PCT/CN2018/093319 priority patent/WO2019001509A1/en
Publication of CN109151816A publication Critical patent/CN109151816A/en
Application granted granted Critical
Publication of CN109151816B publication Critical patent/CN109151816B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种网络鉴权方法及系统,属于通信技术领域。该方法包括:当LTE‑U网络的MME接收到第一附着请求时,在第一附着请求中添加LTE‑U网络的网络标识,以生成第二附着请求,并发送至LTE网络的MME;LTE网络的MME基于第二附着请求,向HSS发送携带LTE‑U网络的网络标识和LTE网络的网络标识的鉴权数据请求;HSS基于鉴权数据请求,生成鉴权向量,并发送至LTE网络的MME;LTE网络的MME基于鉴权向量与UE以及LTE‑U网络的MME进行交互,以实现网络鉴权。也即是,通过本申请提供的方法,UE可以在接入运营商网络和LTE‑U网络时,一次性完成与运营商网络和LTE‑U网络之间的鉴权。

Figure 201710510229

The present application discloses a network authentication method and system, which belong to the technical field of communication. The method includes: when the MME of the LTE-U network receives the first attach request, adding the network identifier of the LTE-U network to the first attach request to generate a second attach request and send it to the MME of the LTE network; LTE Based on the second attachment request, the MME of the network sends an authentication data request carrying the network identity of the LTE-U network and the network identity of the LTE network to the HSS; the HSS generates an authentication vector based on the authentication data request, and sends it to the LTE network. MME: The MME of the LTE network interacts with the UE and the MME of the LTE‑U network based on the authentication vector to implement network authentication. That is, with the method provided in this application, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at one time.

Figure 201710510229

Description

一种网络鉴权方法及系统A kind of network authentication method and system

技术领域technical field

本申请涉及通信技术领域,特别涉及一种网络鉴权方法及系统。The present application relates to the field of communication technologies, and in particular, to a network authentication method and system.

背景技术Background technique

基于长期演进的无牌照(Long Term Evolution-Unlicensed,LTE-U)网络是指除了运营商、用户部署的网络设备之外,由第三方部署的网络设备组成的网络。例如,某医院在该医院范围内,部署了LTE-U基站(Evolved Node B,eNB)、LTE-U移动管理实体(MobilityManagement Entity,MME),LTE-U网关(Gateway,GW)等网络设备,这些网络设备即组成了LTE-U 网络,处于该医院范围内的用户设备(User Equipment,UE)可以通过接入该LTE-U网络进行通信。为了保证UE在接入LTE-U网络的同时还能使用运营商网络如长期演进(LongTerm Evolution,LTE)网络提供的网络服务,LTE-U网络的网络设备可以与运营商网络的网络设备进行连接,这样,当当前未接入运营商网络的UE接入LTE-U网络时,UE需要与该LTE-U网络和运营商网络进行鉴权。A Long Term Evolution-Unlicensed (Long Term Evolution-Unlicensed, LTE-U) network refers to a network composed of network devices deployed by a third party in addition to network devices deployed by operators and users. For example, a hospital has deployed network equipment such as LTE-U base station (Evolved Node B, eNB), LTE-U Mobility Management Entity (MME), and LTE-U gateway (Gateway, GW) within the scope of the hospital. These network devices constitute an LTE-U network, and user equipment (User Equipment, UE) within the scope of the hospital can communicate by accessing the LTE-U network. In order to ensure that the UE can use the network services provided by the operator network such as the Long Term Evolution (Long Term Evolution, LTE) network while accessing the LTE-U network, the network equipment of the LTE-U network can be connected with the network equipment of the operator network. , in this way, when a UE that does not currently access the operator's network accesses the LTE-U network, the UE needs to perform authentication with the LTE-U network and the operator's network.

相关技术中,当UE初次接入LTE网络时,UE首先与LTE网络的MME之间进行双向认证,如果UE确定LTE网络是真实的,而MME也确定UE是真实的,那么,双向认证成功。当双向认证成功后,MME会生成非接入层(Non-Access Stratum,NAS)密钥,并根据该NAS密钥,与UE进行算法协商。当MME与UE之间的算法协商成功之后,LTE网络的基站(Evolved Node B,eNodeB)会生成接入层(Access Stratum,AS)密钥,并根据该AS 密钥与UE之间进行算法协商,如果eNodeB与UE之间的算法协商成功,则UE与LTE网络之间的鉴权完成,UE可以成功接入该LTE网络。In the related art, when the UE accesses the LTE network for the first time, the UE first performs two-way authentication with the MME of the LTE network. If the UE determines that the LTE network is authentic and the MME also determines that the UE is authentic, then the two-way authentication is successful. After the two-way authentication is successful, the MME will generate a non-access stratum (Non-Access Stratum, NAS) key, and perform algorithm negotiation with the UE according to the NAS key. After the algorithm negotiation between the MME and the UE is successful, the base station (Evolved Node B, eNodeB) of the LTE network will generate an access stratum (Access Stratum, AS) key, and perform algorithm negotiation with the UE according to the AS key , if the algorithm negotiation between the eNodeB and the UE is successful, the authentication between the UE and the LTE network is completed, and the UE can successfully access the LTE network.

由上述描述可知,相关技术中仅提供了UE接入运营商网络时与运营商网络中的网络设备直接鉴权的方法,并没有提供当存在LTE-U网络时,UE接入运营商网络和LTE-U网络时进行网络鉴权的方法。It can be seen from the above description that the related art only provides a method for directly authenticating with a network device in the operator's network when the UE accesses the operator's network, and does not provide the method for the UE to access the operator's network and the network device when the LTE-U network exists. A method for network authentication in LTE-U network.

发明内容SUMMARY OF THE INVENTION

为了解决相关技术中未提供UE接入LTE网络和LTE-U网络进行网络鉴权的方法的问题,本申请提供了一种网络鉴权方法,所述技术方案如下:In order to solve the problem that a method for UE to access LTE network and LTE-U network for network authentication is not provided in the related art, the present application provides a network authentication method, and the technical solution is as follows:

第一方面,提供了一种网络鉴权方法,所述方法包括:In a first aspect, a network authentication method is provided, the method comprising:

当基于长期演进的无牌照LTE-U网络的移动管理实体MME接收到来自用户设备UE的第一附着请求时,在所述第一附着请求中添加所述LTE-U网络的网络标识,以生成第二附着请求,并将所述第二附着请求发送至长期演进LTE网络的MME;When the mobility management entity MME based on the long-term evolution unlicensed LTE-U network receives the first attach request from the user equipment UE, the network identifier of the LTE-U network is added to the first attach request to generate a second attach request, and sending the second attach request to the MME of the Long Term Evolution LTE network;

当所述LTE网络的MME接收到所述第二附着请求时,基于所述第二附着请求,向归属签约用户服务器HSS发送鉴权数据请求,所述鉴权数据请求中携带所述LTE-U网络的网络标识和所述LTE网络的网络标识;When the MME of the LTE network receives the second attach request, based on the second attach request, it sends an authentication data request to the home subscriber server HSS, where the authentication data request carries the LTE-U The network identifier of the network and the network identifier of the LTE network;

当所述HSS接收到所述鉴权数据请求时,基于所述LTE-U网络的网络标识和所述LTE 网络的网络标识,生成鉴权向量,并向所述LTE网络的MME发送所述鉴权向量,所述鉴权向量包括用于对所述UE、所述LTE-U网络和所述LTE网络进行鉴权的参数;When the HSS receives the authentication data request, it generates an authentication vector based on the network identifier of the LTE-U network and the network identifier of the LTE network, and sends the authentication vector to the MME of the LTE network. a weight vector, the authentication vector including parameters for authenticating the UE, the LTE-U network and the LTE network;

当所述LTE网络的MME接收到所述鉴权向量时,基于所述鉴权向量与所述UE以及所述LTE-U网络的MME进行交互,以实现网络鉴权。When the MME of the LTE network receives the authentication vector, it interacts with the UE and the MME of the LTE-U network based on the authentication vector to implement network authentication.

可选地,所述鉴权向量包括第一基础密钥、期望回复信息、第一随机数和鉴权标记AUTN,所述第一基础密钥为所述LTE-U网络对应的密钥;Optionally, the authentication vector includes a first basic key, expected reply information, a first random number and an authentication flag AUTN, and the first basic key is a key corresponding to the LTE-U network;

所述基于所述鉴权向量与所述UE以及所述LTE-U网络的MME进行交互,以实现网络鉴权,包括:The interaction with the UE and the MME of the LTE-U network based on the authentication vector to implement network authentication includes:

所述LTE网络的MME存储所述期望回复信息,并通过所述LTE-U网络的MME向所述UE发送所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和第一加密结果,所述第一加密结果由所述LTE-U网络的MME基于所述第一基础密钥生成;The MME of the LTE network stores the expected reply information, and sends the first random number, the AUTN, the network identifier of the LTE-U network and the first random number to the UE through the MME of the LTE-U network. an encryption result, the first encryption result is generated by the MME of the LTE-U network based on the first basic key;

当所述UE接收到所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果时,基于所述第一随机数和所述AUTN对所述LTE网络进行验证,并基于所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果对所述LTE-U网络进行验证;When the UE receives the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result, the LTE-U based on the first random number and the AUTN the network verifies, and verifies the LTE-U network based on the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result;

当所述UE确定对所述LTE网络和所述LTE-U网络均验证通过时,生成回复信息,并基于所述第一随机数、所述AUTN和所述LTE-U网络的网络标识生成第二加密结果;When the UE determines that both the LTE network and the LTE-U network have passed the verification, a reply message is generated, and a first random number is generated based on the first random number, the AUTN and the network identifier of the LTE-U network. 2. Encryption result;

所述UE将所述第二加密结果发送至所述LTE-U网络的MME,并将所述回复信息发送至LTE网络的MME;The UE sends the second encryption result to the MME of the LTE-U network, and sends the reply information to the MME of the LTE network;

当所述LTE-U网络的MME接收到所述第二加密结果时,基于所述第二加密结果对所述 UE进行验证,当所述LTE网络的MME接收到所述回复信息时,基于所述期望回复信息和所述回复信息对所述UE进行验证。When the MME of the LTE-U network receives the second encryption result, it verifies the UE based on the second encryption result; when the MME of the LTE network receives the reply information, it verifies the UE based on the second encryption result. The expected reply information and the reply information are used to verify the UE.

可选地,所述LTE网络的MME通过所述LTE-U网络的MME向所述UE发送所述第一随机数、所述AUTN和第一加密结果,包括:Optionally, the MME of the LTE network sends the first random number, the AUTN and the first encryption result to the UE through the MME of the LTE-U network, including:

所述LTE网络的MME将所述期望回复信息进行存储,并将所述第一基础密钥、所述第一随机数和所述AUTN发送至所述LTE-U网络的MME;The MME of the LTE network stores the expected reply information, and sends the first basic key, the first random number and the AUTN to the MME of the LTE-U network;

当所述LTE-U网络的MME接收到所述第一基础密钥、所述第一随机数和所述AUTN时,将所述第一基础密钥进行存储,基于所述第一基础密钥生成第一加密结果,并将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果发送至所述UE。When the MME of the LTE-U network receives the first basic key, the first random number and the AUTN, the first basic key is stored, based on the first basic key A first encryption result is generated, and the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result are sent to the UE.

可选地,所述基于所述第一基础密钥生成第一加密结果,包括:Optionally, the generating the first encryption result based on the first basic key includes:

所述LTE-U网络的MME生成第二随机数,并通过所述第一基础密钥对所述第二随机数进行加密,得到所述第一加密结果;The MME of the LTE-U network generates a second random number, and encrypts the second random number by using the first basic key to obtain the first encryption result;

相应地,所述将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果发送至所述UE,包括:Correspondingly, the sending the first random number, the AUTN, the network identifier of the LTE-U network and the first encryption result to the UE includes:

所述LTE-U网络的MME将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识、所述第一加密结果和所述第二随机数发送至所述UE。The MME of the LTE-U network sends the first random number, the AUTN, the network identifier of the LTE-U network, the first encryption result and the second random number to the UE.

可选地,所述AUTN包括消息鉴权码MAC;Optionally, the AUTN includes a message authentication code MAC;

所述UE基于所述第一随机数和所述AUTN对所述LTE网络进行验证,包括:The UE verifies the LTE network based on the first random number and the AUTN, including:

所述UE基于所述第一随机数和所述AUTN中除所述MAC之外的其他参数生成期望消息鉴权码XMAC;generating, by the UE, an expected message authentication code XMAC based on the first random number and parameters other than the MAC in the AUTN;

如果所述XMAC和所述MAC相同,则所述UE确定对所述LTE网络的验证通过。If the XMAC and the MAC are the same, the UE determines that the verification of the LTE network is passed.

可选地,所述UE基于所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果对所述LTE-U网络进行验证,包括:Optionally, the UE verifies the LTE-U network based on the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result, including:

所述UE根据所述LTE-U网络的网络标识、所述第一随机数和所述AUTN生成第二基础密钥;generating, by the UE, a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN;

所述UE通过所述第二基础密钥对所述第二随机数进行加密,得到第三加密结果;The UE encrypts the second random number by using the second basic key to obtain a third encryption result;

如果所述第一加密结果等于所述第三加密结果,则所述UE确定对所述LTE-U网络的验证通过。If the first encryption result is equal to the third encryption result, the UE determines that the verification of the LTE-U network is passed.

可选地,所述基于所述第一随机数、所述AUTN和所述LTE-U网络的网络标识生成第二加密结果,包括:Optionally, generating the second encryption result based on the first random number, the AUTN and the network identifier of the LTE-U network includes:

所述UE生成第三随机数,并通过所述第二基础密钥对所述第二随机数和所述第三随机数进行整体加密,得到第二加密结果;generating, by the UE, a third random number, and performing integral encryption on the second random number and the third random number by using the second basic key to obtain a second encryption result;

相应地,所述UE将所述第二加密结果发送至所述LTE-U网络的MME,包括:Correspondingly, the UE sends the second encryption result to the MME of the LTE-U network, including:

所述UE将所述第二加密结果和所述第三随机数发送至所述LTE-U网络的MME;sending, by the UE, the second encryption result and the third random number to the MME of the LTE-U network;

相应地,所述LTE-U网络的MME基于所述第二加密结果对所述UE进行验证,包括:Correspondingly, the MME of the LTE-U network verifies the UE based on the second encryption result, including:

所述LTE-U网络的MME通过存储的所述第一基础密钥对所述第二随机数和所述第三随机数进行整体加密,得到第四加密结果;The MME of the LTE-U network performs overall encryption on the second random number and the third random number by using the stored first basic key to obtain a fourth encryption result;

如果所述第二加密结果和所述第四加密结果相等,则所述LTE-U网络的MME确定对所述UE的验证通过。If the second encryption result and the fourth encryption result are equal, the MME of the LTE-U network determines that the verification of the UE is passed.

可选地,所述LTE网络的MME通过所述LTE-U网络的MME向所述UE发送所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和第一加密结果,包括:Optionally, the MME of the LTE network sends the first random number, the AUTN, the network identifier of the LTE-U network and the first encryption result to the UE through the MME of the LTE-U network, include:

所述LTE网络的MME将所述期望回复信息进行存储,并将所述第一基础密钥、所述期望回复信息、所述第一随机数和所述AUTN发送至所述LTE-U网络的MME;The MME of the LTE network stores the expected reply information, and sends the first basic key, the expected reply information, the first random number and the AUTN to the LTE-U network. MME;

当所述LTE-U网络的MME接收到所述第一基础密钥、所述期望回复信息、所述第一随机数和所述AUTN时,将所述第一基础密钥和所述期望回复信息进行存储,基于所述第一基础密钥生成第一加密结果,并将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果发送至所述UE。When the MME of the LTE-U network receives the first basic key, the expected reply information, the first random number and the AUTN, the MME converts the first basic key and the expected reply information is stored, a first encryption result is generated based on the first basic key, and the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result are sent to the described UE.

可选地,所述AUTN包括MAC;Optionally, the AUTN includes a MAC;

所述基于所述第一基础密钥生成第一加密结果,包括:The generating a first encryption result based on the first basic key includes:

所述LTE-U网络的MME通过所述第一基础密钥对所述MAC进行加密,得到所述第一加密结果。The MME of the LTE-U network encrypts the MAC by using the first basic key to obtain the first encryption result.

可选地,所述UE基于所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果对所述LTE-U网络进行验证,包括:Optionally, the UE verifies the LTE-U network based on the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result, including:

所述UE根据所述LTE-U网络的网络标识、所述第一随机数和所述AUTN生成第二基础密钥;generating, by the UE, a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN;

所述UE通过所述第二基础密钥对所述MAC进行加密,得到第五加密结果;The UE encrypts the MAC by using the second basic key to obtain a fifth encryption result;

如果所述第一加密结果等于所述第五加密结果,则所述UE确定对所述LTE-U网络的验证通过。If the first encryption result is equal to the fifth encryption result, the UE determines that the verification of the LTE-U network is passed.

可选地,所述基于所述第一随机数、所述AUTN和所述LTE-U网络的网络标识生成第二加密结果,包括:Optionally, generating the second encryption result based on the first random number, the AUTN and the network identifier of the LTE-U network includes:

所述UE通过所述第二基础密钥对所述回复信息进行加密,得到第二加密结果;The UE encrypts the reply information by using the second basic key to obtain a second encryption result;

相应地,所述LTE-U网络的MME基于所述第二加密结果对所述UE进行验证,包括:Correspondingly, the MME of the LTE-U network verifies the UE based on the second encryption result, including:

所述LTE-U网络的MME通过存储的所述第一基础密钥对所述回复信息加密,得到第六加密结果;The MME of the LTE-U network encrypts the reply information by using the stored first basic key to obtain a sixth encryption result;

如果所述LTE-U网络的MME存储的所述期望回复信息与所述回复信息相同,且所述第六加密结果与所述第二加密结果相等,则所述LTE-U网络的MME确定对所述UE的验证通过。If the expected reply information stored by the MME of the LTE-U network is the same as the reply information, and the sixth encryption result is equal to the second encryption result, the MME of the LTE-U network determines The verification of the UE is passed.

可选地,所述第二附着请求中携带所述UE的安全算法,所述鉴权向量包括第三基础密钥、期望回复信息、第一随机数、鉴权标记AUTN,所述第三基础密钥为所述LTE网络对应的密钥;Optionally, the second attach request carries the security algorithm of the UE, the authentication vector includes a third basic key, expected reply information, a first random number, and an authentication flag AUTN, and the third basic key The key is the key corresponding to the LTE network;

所述基于所述鉴权向量与所述UE以及所述LTE-U的MME进行交互,以实现网络鉴权,包括:The interaction with the UE and the MME of the LTE-U based on the authentication vector to implement network authentication includes:

所述LTE网络的MME基于所述第三基础密钥、所述期望回复信息、所述第一随机数和所述AUTN与所述UE进行交互,以实现所述UE对所述LTE网络的验证,以及所述LTE网络的MME对所述UE的验证;The MME of the LTE network interacts with the UE based on the third basic key, the expected reply information, the first random number and the AUTN, so as to realize the authentication of the LTE network by the UE , and the verification of the UE by the MME of the LTE network;

当所述LTE网络的MME确定对所述UE的验证通过时,生成第二随机数,并基于所述LTE-U网络的网络标识和所述第三基础密钥,生成第一基础密钥;When the MME of the LTE network determines that the verification of the UE is passed, a second random number is generated, and a first basic key is generated based on the network identifier of the LTE-U network and the third basic key;

所述LTE网络的MME基于所述UE的安全算法生成非接入层NAS密钥,并通过所述NAS密钥对所述第二随机数进行加密,得到第七加密结果;The MME of the LTE network generates a non-access stratum NAS key based on the security algorithm of the UE, and encrypts the second random number by using the NAS key to obtain a seventh encryption result;

所述LTE网络的MME将所述第一基础密钥、所述第三基础密钥、所述NAS密钥、所述LTE-U网络的网络标识、所述第二随机数和所述第七加密结果发送至所述LTE-U网络的MME;The MME of the LTE network combines the first basic key, the third basic key, the NAS key, the network identifier of the LTE-U network, the second random number, and the seventh sending the encryption result to the MME of the LTE-U network;

所述LTE-U网络的MME通过所述第一基础密钥对所述第二随机数进行加密,得到第八加密结果,并将所述第三基础密钥、所述NAS密钥、所述LTE-U网络的网络标识、所述第七加密结果和所述第八加密结果发送至所述UE;The MME of the LTE-U network encrypts the second random number by using the first basic key to obtain an eighth encryption result, and encrypts the third basic key, the NAS key, the sending the network identifier of the LTE-U network, the seventh encryption result and the eighth encryption result to the UE;

所述UE基于所述第三基础密钥和所述LTE-U网络的网络标识生成第二基础密钥,并通过所述第二基础密钥对所述第八加密结果进行解密,得到第一解密结果,通过所述NAS密钥对第七加密结果进行解密,得到第二解密结果;The UE generates a second basic key based on the third basic key and the network identifier of the LTE-U network, and decrypts the eighth encryption result by using the second basic key to obtain the first Decryption result, decrypt the seventh encryption result by the NAS key to obtain the second decryption result;

如果所述第一解密结果和所述第二解密结果相同,则所述UE确定对所述LTE-U网络的验证通过。If the first decryption result and the second decryption result are the same, the UE determines that the verification of the LTE-U network is passed.

第二方面,提供了一种网络鉴权系统,所述网络鉴权系统具有实现上述第一方面中网络鉴权方法行为的功能。所述网络鉴权系统包括UE、LTE-U网络的MME、LTE网络的MME、HSS,该UE、LTE-U网络的MME、LTE网络的MME、HSS用于实现上述第一方面所提供的网络鉴权方法。In a second aspect, a network authentication system is provided, and the network authentication system has a function of implementing the behavior of the network authentication method in the first aspect. The network authentication system includes the UE, the MME of the LTE-U network, the MME of the LTE network, and the HSS. The UE, the MME of the LTE-U network, and the MME and the HSS of the LTE network are used to implement the network provided in the first aspect. Authentication method.

第三方面,提供了一种网络设备,所述网络设备的结构中包括处理器和存储器,所述存储器用于存储支持网络设备执行上述第一方面所提供的网络鉴权方法的程序,以及存储用于实现上述第一方面所提供的网络鉴权方法所涉及的数据。所述处理器被配置为用于执行所述存储器中存储的程序。所述存储设备的操作装置还可以包括通信总线,该通信总线用于该处理器与存储器之间建立连接。In a third aspect, a network device is provided, the structure of the network device includes a processor and a memory, and the memory is used to store a program that supports the network device to perform the network authentication method provided in the first aspect, and stores Data involved in implementing the network authentication method provided by the first aspect. The processor is configured to execute programs stored in the memory. The operating means of the storage device may further include a communication bus for establishing a connection between the processor and the memory.

第四方面,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第一方面所述的网络鉴权方法。In a fourth aspect, a computer-readable storage medium is provided, where instructions are stored in the computer-readable storage medium, and when the computer-readable storage medium runs on a computer, the computer executes the network authentication method described in the first aspect.

第五方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面所述的网络鉴权方法。In a fifth aspect, there is provided a computer program product containing instructions, which, when run on a computer, cause the computer to execute the network authentication method described in the first aspect above.

上述第二方面、第三方面、第四方面和第五方面所获得的技术效果与第一方面中对应的技术手段获得的技术效果近似,在这里不再赘述。The technical effects obtained by the second aspect, the third aspect, the fourth aspect and the fifth aspect are similar to the technical effects obtained by the corresponding technical means in the first aspect, and will not be repeated here.

本申请提供的技术方案带来的有益效果是:在本发明实施例中,对于未接入运营商网络的UE,当该UE接入LTE-U网络时,可以将第一附着请求发送至LTE-U网络的MME,当LTE-U网络的MME接收到该第一附着请求时,可以在第一附着请求中加入该LTE-U网络的网络标识,从而生成第二附着请求,并将该第二附着请求发送至LTE网络的MME,LTE网络的MME基于该第二附着请求生成鉴权数据请求,以向HSS请求鉴权向量,当HSS接收到该鉴权数据请求时,基于该鉴权数据请求生成鉴权向量,并将该鉴权向量发送至LTE网络的 MME,之后,LTE网络的MME即可以根据接收到的鉴权向量与UE以及LTE-U网络的MME 进行交互,以实现网络鉴权。也即是,通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U网络时,一次性完成与运营商网络和LTE-U网络之间的鉴权,从而使 UE可以同时顺利的接入运营商网络和LTE-U网络,为用户的使用带来了方便。The beneficial effects brought by the technical solutions provided in the present application are: in the embodiment of the present invention, for a UE that does not access the operator's network, when the UE accesses the LTE-U network, the first attach request can be sent to the LTE The MME of the -U network, when the MME of the LTE-U network receives the first attach request, may add the network identifier of the LTE-U network to the first attach request, thereby generating a second attach request, and attaching the first attach request to the MME of the LTE-U network. The second attach request is sent to the MME of the LTE network, and the MME of the LTE network generates an authentication data request based on the second attach request to request an authentication vector from the HSS. When the HSS receives the authentication data request, based on the authentication data Request to generate an authentication vector, and send the authentication vector to the MME of the LTE network. After that, the MME of the LTE network can interact with the UE and the MME of the LTE-U network according to the received authentication vector to realize network authentication. right. That is, with the network authentication method provided by the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at one time, thereby The UE can access the operator network and the LTE-U network smoothly at the same time, which brings convenience to the user.

附图说明Description of drawings

图1是本发明实施例提供的一种网络鉴权方法的系统架构图;1 is a system architecture diagram of a network authentication method provided by an embodiment of the present invention;

图2是本发明实施例提供的一种网络设备的结构示意图;FIG. 2 is a schematic structural diagram of a network device provided by an embodiment of the present invention;

图3是本发明实施例提供的一种网络鉴权方法的流程图;3 is a flowchart of a network authentication method provided by an embodiment of the present invention;

图4是本发明实施例提供的一种LTE网络的MME、LTE-U网络的MME和UE之间交互进行网络鉴权方法的流程图;4 is a flowchart of a method for performing network authentication through interaction between an MME of an LTE network, an MME of an LTE-U network, and a UE according to an embodiment of the present invention;

图5是本发明实施例提供的又一种LTE网络的MME、LTE-U网络的MME和UE之间交互进行网络鉴权方法的流程图;5 is a flowchart of another method for performing network authentication through interaction between an MME of an LTE network, an MME of an LTE-U network, and a UE provided by an embodiment of the present invention;

图6是本发明实施例提供的另一种LTE网络的MME、LTE-U网络的MME和UE之间交互进行网络鉴权方法的流程图。FIG. 6 is a flowchart of another method for performing network authentication between an MME of an LTE network, an MME of an LTE-U network, and a UE according to an embodiment of the present invention.

具体实施方式Detailed ways

为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.

在对本发明实施例进行详细的解释说明之前,先对本发明实施例的应用场景予以介绍。当前,诸如企业、医院、政府单位等组织为了便于内部员工交流通信,或者为了向服务的用户推送特定的信息和业务,可以在一定的区域内部署属于自己的网络设备,并采用未授权的频谱,通过部署的网络设备进行通信,其中未授权的频谱可以为与无线保真(WIreless-Fidelity, WIFI)频谱相同的频谱。这些由第三方部署的网络设备组成且采用未授权频谱进行通信的网络即为LTE-U网络。部署该LTE-U网络的第三方可以通过对部署的网络设备的控制,向接入该LTE-U网络的用户提供特定的业务。例如,某医院在该医院所在的范围内,部署了LTE-U eNB、LTE-U MME,LTE-U GW等网络设备,从而组成了一个LTE-U网络,医院可以通过该 LTE-U网络向用户提供医疗服务,接入该LTE-U网络的用户则可以通过该LTE-U网络方便快捷的查找该医院的医生信息、排队人数和科室位置等信息。Before explaining the embodiments of the present invention in detail, an application scenario of the embodiments of the present invention is introduced. Currently, organizations such as enterprises, hospitals, government units and other organizations can deploy their own network equipment in a certain area and use unlicensed spectrum in order to facilitate the communication among internal employees, or to push specific information and services to service users. , communicate through deployed network devices, wherein the unlicensed spectrum may be the same spectrum as the wireless fidelity (WIreless-Fidelity, WIFI) spectrum. These networks, which consist of network devices deployed by third parties and communicate using unlicensed spectrum, are LTE-U networks. A third party deploying the LTE-U network can provide specific services to users accessing the LTE-U network by controlling the deployed network equipment. For example, a hospital deploys LTE-U eNB, LTE-U MME, LTE-U GW and other network equipment within the scope of the hospital to form an LTE-U network. Users provide medical services, and users who access the LTE-U network can conveniently and quickly search for information such as doctor information, number of people in line, and department locations in the hospital through the LTE-U network.

需要说明的是,第三方不仅可以通过部署的LTE-U网络向用户提供特定的业务,而且,还可以将该LTE-U网络中的网络设备与运营商网络中的网路设备进行连接,以使接入该LTE-U网络的用户可以同时使用运营商网络提供的网络服务。在此前提下,当当前未接入运营商网络的UE接入LTE-U网络时,UE需要与该LTE-U网络和运营商网络进行鉴权。而本申请提供的网络鉴权方法及系统即可以用于当前未接入运营商网络的UE在接入LTE-U网络时,与运营商网络和LTE-U网络进行鉴权的场景中。It should be noted that a third party can not only provide specific services to users through the deployed LTE-U network, but also can connect the network equipment in the LTE-U network with the network equipment in the operator's network to Users who access the LTE-U network can use the network services provided by the operator's network at the same time. Under this premise, when a UE that does not currently access the operator's network accesses the LTE-U network, the UE needs to perform authentication with the LTE-U network and the operator's network. The network authentication method and system provided in this application can be used in a scenario where a UE not currently accessing an operator network performs authentication with the operator network and the LTE-U network when accessing the LTE-U network.

在对本发明实施例的应用场景进行介绍之后,接下来对本发明实施例涉及的系统架构进行说明。After the application scenarios of the embodiments of the present invention are introduced, the system architecture involved in the embodiments of the present invention is described next.

图1是本发明实施例提供的一种网络鉴权方法的系统架构图。如图1所示,该系统中包括UE 101,LTE-U网络的eNB 102,LTE-U网络的MME 103,LTE网络的MME 104和HSS 105。其中UE 101与LTE-U网络的eNB 102连接,LTE-U网络的MME 103与LTE网络的 MME 104连接,LTE网络的MME 104和HSS 105连接。FIG. 1 is a system architecture diagram of a network authentication method provided by an embodiment of the present invention. As shown in FIG. 1 , the system includes UE 101 , eNB 102 of LTE-U network, MME 103 of LTE-U network, MME 104 and HSS 105 of LTE network. The UE 101 is connected to the eNB 102 of the LTE-U network, the MME 103 of the LTE-U network is connected to the MME 104 of the LTE network, and the MME 104 of the LTE network is connected to the HSS 105 .

其中,UE 101可以为诸如智能手机、平板电脑等用户设备。当进行网络鉴权时,UE101 向LTE-U网络的eNB 102发起附着请求,LTE-U网络的eNB 102将UE 101发送的附着请求转发给LTE-U网络的MME 103,LTE-U网络的MME 103和LTE网络的MME 104根据UE 发送的该附着请求与UE进行交互,以实现UE 101、LTE-U网络的MME 103以及LTE网络的MME 104之间的鉴权。在这个过程中,LTE网络的MME 104可以根据UE 101发送的附着请求、LTE-U网络的网络标识和LTE网络的网络标识,向HSS请求鉴权向量,HSS 105根据接收到的信息生成鉴权向量,并将该鉴权向量返回至LTE网络的MME 104,以使LTE-U 网络的MME 103和LTE网络的MME 104根据该鉴权向量与UE 101进行鉴权。The UE 101 may be a user equipment such as a smart phone, a tablet computer, or the like. When performing network authentication, the UE 101 initiates an attach request to the eNB 102 of the LTE-U network, and the eNB 102 of the LTE-U network forwards the attach request sent by the UE 101 to the MME 103 of the LTE-U network, and the MME 103 of the LTE-U network It interacts with the UE 101, the MME 103 of the LTE-U network, and the MME 104 of the LTE network, and interacts with the UE according to the attach request sent by the UE. In this process, the MME 104 of the LTE network can request an authentication vector from the HSS according to the attach request sent by the UE 101, the network identity of the LTE-U network and the network identity of the LTE network, and the HSS 105 generates an authentication vector according to the received information vector, and return the authentication vector to the MME 104 of the LTE network, so that the MME 103 of the LTE-U network and the MME 104 of the LTE network authenticate the UE 101 according to the authentication vector.

图2是本发明实施例提供的一种网络设备结构示意图。该网络设备可以为图1中的UE、 eNB、MME或HSS。参见图2,该网络设备包括至少一个处理器201,通信总线202,存储器203以及至少一个通信接口204。FIG. 2 is a schematic structural diagram of a network device according to an embodiment of the present invention. The network device may be the UE, eNB, MME or HSS in FIG. 1 . Referring to FIG. 2 , the network device includes at least one processor 201 , a communication bus 202 , a memory 203 and at least one communication interface 204 .

处理器201可以是一个通用中央处理器(Central Processing Unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。The processor 201 may be a general-purpose central processing unit (Central Processing Unit, CPU), a microprocessor, an application-specific integrated circuit (application-specific integrated circuit, ASIC), or one or more processors for controlling the execution of the programs of the present application. integrated circuit.

通信总线202可包括一通路,在上述组件之间传送信息。Communication bus 202 may include a path to communicate information between the components described above.

存储器203可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,随机存取存储器(random access memory,RAM))或者可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(CompactDisc Read-Only Memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。存储器203可以是独立存在,通过通信总线202与处理器201相连接。存储器203也可以和处理器201集成在一起。Memory 203 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, random access memory (RAM)) or other type of static storage device that can store information and instructions type of dynamic storage device, it can also be Electrically Erasable Programmable Read-Only Memory (EEPROM), CompactDisc Read-Only Memory (CD-ROM) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being executed by a computer Access any other medium without limitation. The memory 203 can exist independently and is connected to the processor 201 through the communication bus 202 . The memory 203 may also be integrated with the processor 201 .

通信接口204,使用任何收发器一类的装置,用于与其它设备或通信网络通信,如以太网,无线接入网(RAN),无线局域网(Wireless Local Area Networks,WLAN)等。The communication interface 204, using any device such as a transceiver, is used to communicate with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN) and the like.

在具体实现中,作为一种实施例,处理器201可以包括一个或多个CPU,例如图2中所示的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 201 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 2 .

在具体实现中,作为一种实施例,网络设备可以包括多个处理器,例如图2中所示的处理器201和处理器205。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the network device may include multiple processors, such as the processor 201 and the processor 205 shown in FIG. 2 . Each of these processors can be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).

在具体实现中,作为一种实施例,网络设备还可以包括输出设备206和输入设备207。输出设备206和处理器201通信,可以以多种方式来显示信息。例如,输出设备206可以是液晶显示器(liquid crystal display,LCD),发光二极管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备 207和处理器201通信,可以以多种方式接收用户的输入。例如,输入设备207可以是鼠标、键盘、触摸屏设备或传感设备等。In a specific implementation, as an embodiment, the network device may further include an output device 206 and an input device 207 . The output device 206 is in communication with the processor 201 and can display information in a variety of ways. For example, the output device 206 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, a projector, or the like. Input device 207 is in communication with processor 201 and can receive user input in a variety of ways. For example, the input device 207 may be a mouse, a keyboard, a touch screen device, a sensor device, or the like.

上述的网络设备可以是一个通用计算机设备或者是一个专用计算机设备。在具体实现中,该网络设备可以是台式机、便携式电脑、网络服务器、掌上电脑(Personal DigitalAssistant, PDA)、移动手机、平板电脑、无线终端设备、通信设备或者嵌入式设备。本发明实施例不限定网络设备的类型。The above-mentioned network device may be a general-purpose computer device or a special-purpose computer device. In a specific implementation, the network device may be a desktop computer, a portable computer, a network server, a PDA (Personal Digital Assistant, PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device or an embedded device. The embodiment of the present invention does not limit the type of the network device.

其中,存储器203用于存储执行本申请方案的程序代码,并由处理器201来控制执行。处理器201用于执行存储器203中存储的程序代码208。程序代码208中可以包括一个或多个软件模块。图1中所示的网络设备可以通过处理器201以及存储器203中的程序代码208中的一个或多个软件模块,来实现网络鉴权。Wherein, the memory 203 is used for storing the program code for executing the solution of the present application, and the execution is controlled by the processor 201 . The processor 201 is used to execute the program code 208 stored in the memory 203 . One or more software modules may be included in the program code 208 . The network device shown in FIG. 1 may implement network authentication through the processor 201 and one or more software modules in the program code 208 in the memory 203 .

通过上述描述,对本发明实施例涉及的应用场景和系统架构进行解释说明之后,接下来对本发明实施例的具体实现过程进行详细说明。Through the above description, after explaining the application scenarios and system architecture involved in the embodiments of the present invention, the specific implementation process of the embodiments of the present invention is described in detail next.

图3是本发明实施例提供的一种网络鉴权方法的流程图,如图3所示,该方法包括以下步骤:FIG. 3 is a flowchart of a network authentication method provided by an embodiment of the present invention. As shown in FIG. 3 , the method includes the following steps:

步骤301:UE将第一附着请求发送至LTE-U网络的MME。Step 301: The UE sends the first attach request to the MME of the LTE-U network.

其中,对于未接入运营商网络的UE,当该UE接入LTE-U网络时,UE可以发送第一附着请求(Attach Request)至LTE-U网络的eNB,当LTE-U网络的eNB接收到该第一附着请求时,LTE-U网络的eNB将该第一附着请求转发给LTE-U网络的MME。Wherein, for a UE that does not access the operator's network, when the UE accesses the LTE-U network, the UE may send a first attach request (Attach Request) to the eNB of the LTE-U network, and when the eNB of the LTE-U network receives When the first attach request is reached, the eNB of the LTE-U network forwards the first attach request to the MME of the LTE-U network.

需要说明的是,该第一附着请求为NAS消息,LTE-U网络的eNB无法解析该第一附着请求。并且,该第一附着请求中可以携带该UE的国际移动用户识别码(InternationalMobile Subscriber Identification Number,IMSI)以及该UE的安全算法。其中,该UE的IMSI可以用于唯一标识该UE,并且,通过该UE的IMSI可以确定该UE当前所属的移动网络。另外,该UE的安全算法是指该UE所支持的加密算法和完整性保护算法。It should be noted that the first attach request is a NAS message, and the eNB of the LTE-U network cannot parse the first attach request. Moreover, the first attach request may carry the UE's International Mobile Subscriber Identification Number (IMSI) and the UE's security algorithm. The IMSI of the UE can be used to uniquely identify the UE, and the mobile network to which the UE currently belongs can be determined through the IMSI of the UE. In addition, the security algorithm of the UE refers to an encryption algorithm and an integrity protection algorithm supported by the UE.

步骤302:当LTE-U网络的MME接收到来自UE的第一附着请求时,在第一附着请求中添加LTE-U网络的网络标识,以生成第二附着请求。Step 302: When the MME of the LTE-U network receives the first attach request from the UE, the network identifier of the LTE-U network is added to the first attach request to generate a second attach request.

当LTE-U网络的MME接收到第一附着请求时,可以将自身的网络标识添加到该第一附着请求中,从而生成第二附着请求。当生成第二附着请求之后,LTE-U网络的MME可以根据该第一附着请求中携带的该UE的IMSI,确定该UE对应的LTE网络的MME。When the MME of the LTE-U network receives the first attach request, it can add its own network identifier to the first attach request, thereby generating the second attach request. After the second attach request is generated, the MME of the LTE-U network may determine the MME of the LTE network corresponding to the UE according to the IMSI of the UE carried in the first attach request.

步骤303:LTE-U网络的MME将第二附着请求发送至LTE网络的MME。Step 303: The MME of the LTE-U network sends the second attach request to the MME of the LTE network.

当确定该UE对应的LTE网络的MME之后,LTE-U网络的MME可以将生成的第二附着请求发送至确定的LTE网络的MME。After the MME of the LTE network corresponding to the UE is determined, the MME of the LTE-U network may send the generated second attach request to the determined MME of the LTE network.

步骤304:当LTE网络的MME接收到第二附着请求时,基于第二附着请求,向HSS发送鉴权数据请求。Step 304: When the MME of the LTE network receives the second attach request, it sends an authentication data request to the HSS based on the second attach request.

当LTE网络的MME接收到第二附着请求时,由前述描述可知,该第二附着请求中携带有UE的IMSI、安全能力和LTE-U网络的网络标识,此时,LTE网络的MME可以将该第二附着请求中添加LTE网络的网络标识,从而生成鉴权数据请求,并将该鉴权数据请求发送至HSS。When the MME of the LTE network receives the second attach request, it can be seen from the foregoing description that the second attach request carries the IMSI, security capabilities and network identifier of the LTE-U network of the UE. At this time, the MME of the LTE network can The network identifier of the LTE network is added to the second attach request, thereby generating an authentication data request, and sending the authentication data request to the HSS.

步骤305:当HSS接收到该鉴权数据请求时,基于LTE-U网络的网络标识和LTE网络的网络标识,生成鉴权向量。Step 305: When the HSS receives the authentication data request, an authentication vector is generated based on the network identifier of the LTE-U network and the network identifier of the LTE network.

当接收到该鉴权数据请求时,HSS可以根据该鉴权数据请求中携带的IMSI,从存储的多个长期密钥中确定该UE的IMSI对应的长期密钥,该长期密钥也可以称为手机鉴权码(Key identifier,Ki)。之后,HSS可以根据确定的长期密钥和LTE网络的网络标识,生成LTE网络对应的第三基础密钥,并利用该长期密钥和LTE-U网络的网络标识生成LTE-U网络对应的第一基础密钥。除此之外,当Ki之后,HSS还可以生成第一随机数和序列号,并根据该第一随机数和序列号生成鉴权标记(Authentication Token,AUTN)和期望回复信息。其中,AUTN包括序列号、消息鉴权码(Message authentication code,MAC)、鉴权管理域(Authentication Management Field,AMF)等。When receiving the authentication data request, the HSS can determine the long-term key corresponding to the UE's IMSI from a plurality of stored long-term keys according to the IMSI carried in the authentication data request, and the long-term key can also be called It is the mobile phone authentication code (Key identifier, Ki). Afterwards, the HSS can generate the third basic key corresponding to the LTE network according to the determined long-term key and the network identifier of the LTE network, and use the long-term key and the network identifier of the LTE-U network to generate the third basic key corresponding to the LTE-U network. a base key. In addition, after Ki, the HSS can also generate a first random number and a serial number, and generate an authentication token (Authentication Token, AUTN) and expected reply information according to the first random number and the serial number. The AUTN includes a serial number, a message authentication code (Message authentication code, MAC), an authentication management field (Authentication Management Field, AMF), and the like.

需要说明的是,该鉴权向量可以包括第一基础密钥、第三基础密钥、第一随机数、期望回复信息和AUTN,也可以不包括第一基础密钥,只包括第三基础密钥、第一随机数、期望回复信息和AUTN。或者,该鉴权向量还可以不包括第三基础密钥,而包括第一基础密钥、第一随机数、期望回复信息和AUTN。当该鉴权向量不包括第一基础密钥或第三基础密钥时时,在上述过程中HSS可以不必生成该第一基础密钥或第三基础密钥。It should be noted that the authentication vector may include the first basic key, the third basic key, the first random number, the expected reply information and the AUTN, or may not include the first basic key, but only the third basic key. key, first random number, expected reply information and AUTN. Alternatively, the authentication vector may also include the first basic key, the first random number, the expected reply information and the AUTN instead of the third basic key. When the authentication vector does not include the first base key or the third base key, the HSS may not need to generate the first base key or the third base key in the above process.

步骤306:HSS向LTE网络的MME发送鉴权向量。Step 306: The HSS sends the authentication vector to the MME of the LTE network.

步骤307:当LTE网络的MME接收到该鉴权向量时,基于该鉴权向量与UE以及LTE-U网络的MME进行交互,以实现网络鉴权。Step 307: When the MME of the LTE network receives the authentication vector, it interacts with the UE and the MME of the LTE-U network based on the authentication vector to implement network authentication.

当LTE网络的MME接收到该鉴权向量时,可以根据该鉴权向量与UE以及LTE-U网络的MME进行交互,从而完成LTE网络对UE的验证、LTE-U网络对UE的验证以及UE对 LTE网络、LTE-U网络的验证。When the MME of the LTE network receives the authentication vector, it can interact with the UE and the MME of the LTE-U network according to the authentication vector, so as to complete the authentication of the UE by the LTE network, the authentication of the UE by the LTE-U network, and the authentication of the UE by the LTE-U network. Verification of LTE network and LTE-U network.

需要说明的是,在本发明实施例中,UE可以同时对LTE-U网络和LTE网络进行验证,也可以先与LTE网络互相验证成功之后,再与LTE-U网络进行相互验证。另外,当UE同时对LTE-U网络和LTE网络进行验证时,UE也可以采用鉴权向量中不同的参数对LTE-U网络进行验证。具体的基于该鉴权向量与UE以及LTE-U网络的MME进行交互来进行网络鉴权的实现过程将通过后续实施例进行详细的介绍。It should be noted that, in this embodiment of the present invention, the UE may perform verification on the LTE-U network and the LTE network at the same time, or may perform mutual verification with the LTE-U network after successful mutual verification with the LTE network. In addition, when the UE authenticates the LTE-U network and the LTE network at the same time, the UE may also use different parameters in the authentication vector to authenticate the LTE-U network. The specific implementation process of performing network authentication based on the interaction with the UE and the MME of the LTE-U network based on the authentication vector will be described in detail through subsequent embodiments.

在本发明实施例中,对于未接入运营商网络的UE,当该UE接入LTE-U网络时,可以将第一附着请求发送至LTE-U网络的MME,当LTE-U网络的MME接收到该第一附着请求时,可以在第一附着请求中加入该LTE-U网络的网络标识,从而生成第二附着请求,并将该第二附着请求发送至LTE网络的MME,LTE网络的MME基于该第二附着请求生成鉴权数据请求,以向HSS请求鉴权向量,当HSS接收到该鉴权数据请求时,基于该鉴权数据请求生成鉴权向量,并将该鉴权向量发送至LTE网络的MME,之后,LTE网络的MME即可以根据接收到的鉴权向量与UE以及LTE-U网络的MME进行交互,以实现网络鉴权。也即是,通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U网络时,一次性完成与运营商网络和LTE-U网络之间的鉴权,从而使UE可以同时顺利的接入运营商网络和LTE-U网络,为用户的使用带来了方便。In this embodiment of the present invention, for a UE that does not access the operator's network, when the UE accesses the LTE-U network, the first attach request may be sent to the MME of the LTE-U network. When the MME of the LTE-U network When the first attach request is received, the network identifier of the LTE-U network can be added to the first attach request, thereby generating a second attach request, and sending the second attach request to the MME of the LTE network, and the LTE network's MME. The MME generates an authentication data request based on the second attach request to request an authentication vector from the HSS, when the HSS receives the authentication data request, generates an authentication vector based on the authentication data request, and sends the authentication vector to the MME of the LTE network, and then the MME of the LTE network can interact with the UE and the MME of the LTE-U network according to the received authentication vector, so as to implement network authentication. That is, with the network authentication method provided in the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at one time, thereby The UE can smoothly access the operator network and the LTE-U network at the same time, which brings convenience to the user.

基于前述描述,UE可以同时对LTE-U网络和LTE网络进行验证,也可以先与LTE网络互相验证成功之后,再与LTE-U网络进行相互验证。另外,当UE同时对LTE-U网络和LTE 网络进行验证时,UE也可以采用鉴权向量中不同的参数对LTE-U网络进行验证。下面将结合附图,对LTE网络的MME基于该鉴权向量与UE以及LTE-U网络的MME进行交互,以实现网络鉴权的三种实现方式分别进行解释说明。Based on the foregoing description, the UE may perform verification on the LTE-U network and the LTE network at the same time, or may perform mutual verification with the LTE-U network after the mutual verification with the LTE network is successful. In addition, when the UE authenticates the LTE-U network and the LTE network at the same time, the UE may also use different parameters in the authentication vector to authenticate the LTE-U network. In the following, three implementation manners in which the MME of the LTE network interacts with the UE and the MME of the LTE-U network based on the authentication vector to realize network authentication will be explained and described with reference to the accompanying drawings.

图4是本发明实施例提供的第一种基于鉴权向量进行网络鉴权的方法的流程图,如图4 所示,该方法包括以下步骤:FIG. 4 is a flowchart of a first method for performing network authentication based on an authentication vector provided by an embodiment of the present invention. As shown in FIG. 4 , the method includes the following steps:

步骤401:LTE网络的MME将鉴权向量中的期望回复信息进行存储。Step 401: The MME of the LTE network stores the expected reply information in the authentication vector.

基于前述实施例中的描述,鉴权向量可以包括第一基础密钥、第一随机数、期望回复信息和AUTN,当LTE网络的MME接收到该鉴权向量时,可以将该鉴权向量中的期望回复信息进行存储,留待之后对UE进行验证。而该鉴权向量中的第一基础密钥、第一随机数和AUTN则可以被转发给LTE-U网络的MME。Based on the descriptions in the foregoing embodiments, the authentication vector may include the first basic key, the first random number, the expected reply information, and the AUTN. When the MME of the LTE network receives the authentication vector, it may include the authentication vector in the authentication vector. The expected reply information is stored, and the UE is verified later. And the first basic key, the first random number and the AUTN in the authentication vector can be forwarded to the MME of the LTE-U network.

步骤402:LTE网络的MME将第一基础密钥、第一随机数和AUTN发送至LTE-U网络的MME。Step 402: The MME of the LTE network sends the first basic key, the first random number and the AUTN to the MME of the LTE-U network.

步骤403:当LTE-U网络的MME接收到第一基础密钥、第一随机数和AUTN时,将第一基础密钥进行存储,生成第二随机数,并基于第一基础密钥和第二随机数生成第一加密结果。Step 403: When the MME of the LTE-U network receives the first basic key, the first random number and the AUTN, it stores the first basic key, generates a second random number, and generates a second random number based on the first basic key and the first random number. Two random numbers generate the first encrypted result.

当接收到LTE网络发送的第一基础密钥、第一随机数和AUTN时,LTE-U网络的MME可以将第一基础密钥进行存储,留待后续对UE进行验证。与此同时,LTE-U网络的MME 还可以基于第一基础密钥生成第一加密结果,该第一加密结果用于UE对LTE-U网络进行验证。When receiving the first basic key, the first random number and the AUTN sent by the LTE network, the MME of the LTE-U network may store the first basic key for subsequent verification of the UE. At the same time, the MME of the LTE-U network may also generate a first encryption result based on the first basic key, where the first encryption result is used for the UE to verify the LTE-U network.

其中,当接收到第一基础密钥、第一随机数和AUTN时,LTE-U网络的MME可以利用随机数发生器生成第二随机数,并通过第一基础密钥对该第二随机数进行加密,从而得到第一加密结果。Wherein, when receiving the first basic key, the first random number and the AUTN, the MME of the LTE-U network can use the random number generator to generate a second random number, and use the first basic key to generate the second random number. Encryption is performed to obtain the first encryption result.

步骤404:LTE-U网络的MME将第一随机数、AUTN、LTE-U网络的网络标识、第一加密结果和第二随机数发送至UE。Step 404: The MME of the LTE-U network sends the first random number, the AUTN, the network identifier of the LTE-U network, the first encryption result and the second random number to the UE.

当LTE-U网络的MME生成第一加密结果之后,可以将第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果以及用于生成第一加密结果的第二随机数发送至LTE-U网络的eNB,再由LTE-U网络的eNB将该第一随机数、AUTN、LTE-U网络的网络标识、第一加密结果和第二随机数转发给UE。After the MME of the LTE-U network generates the first encryption result, it may send the first random number, the AUTN, the network identifier of the LTE-U network, the first encryption result, and the second random number used to generate the first encryption result to The eNB of the LTE-U network, and then the eNB of the LTE-U network forwards the first random number, the AUTN, the network identifier of the LTE-U network, the first encryption result and the second random number to the UE.

步骤405:当UE接收到第一随机数、AUTN、LTE-U网络的网络标识、第一加密结果和第二随机数时,基于第一随机数、AUTN、LTE-U网络的网络标识、第一加密结果和第二随机数对LTE网络和LTE-U网络进行验证。Step 405: When the UE receives the first random number, the network identifier of the AUTN, the LTE-U network, the first encryption result and the second random number, based on the first random number, the network identifier of the AUTN, the LTE-U network, the An encryption result and a second random number are used to authenticate the LTE network and the LTE-U network.

当UE接收到第一随机数、AUTN和第一加密结果时,UE可以根据第一随机数和AUTN对LTE网络进行验证,根据第一随机数、AUTN和第一加密结果对LTE-U网络进行验证。When the UE receives the first random number, the AUTN and the first encryption result, the UE can verify the LTE network according to the first random number and the AUTN, and verifies the LTE-U network according to the first random number, the AUTN and the first encryption result. verify.

当UE对LTE网络进行验证时,UE可以基于第一随机数和AUTN中除MAC之外的其他参数生成期望消息鉴权码XMAC;如果XMAC和MAC相同,则UE确定对LTE网络的验证通过。When the UE verifies the LTE network, the UE can generate an expected message authentication code XMAC based on the first random number and other parameters except the MAC in the AUTN; if the XMAC and the MAC are the same, the UE determines that the verification of the LTE network is passed.

其中,UE可以根据自身存储的Ki、第一随机数、AUTN中的序列号和AMF计算得到期望消息鉴权码(Expected Message Authentication Code,XMAC)。基于前述实施例中步骤305 的描述可知,该AUTN中包括有MAC,而该MAC是HSS根据确定的Ki、第一随机数、AUTN 中的序列号和AMF计算得到的,当UE生成XMAC之后,如果该XMAC和MAC相同,则说明HSS确定的Ki和该UE中存储的Ki是一致的。而HSS确定的Ki是根据UE的IMSI确定的,也即是,HSS确定的Ki实际上是该UE在LTE网络侧存储的Ki,因此,当XMAC和 MAC相同时,UE就可以确定当前的LTE网络是真实的,也即是,UE对LTE网络的验证通过。Wherein, the UE can obtain the expected message authentication code (Expected Message Authentication Code, XMAC) according to the stored Ki, the first random number, the sequence number in the AUTN, and the AMF. Based on the description of step 305 in the foregoing embodiment, it can be known that the AUTN includes a MAC, and the MAC is calculated by the HSS according to the determined Ki, the first random number, the sequence number in the AUTN, and the AMF. After the UE generates the XMAC, If the XMAC and the MAC are the same, it means that the Ki determined by the HSS is consistent with the Ki stored in the UE. The Ki determined by the HSS is determined according to the IMSI of the UE, that is, the Ki determined by the HSS is actually the Ki stored by the UE on the LTE network side. Therefore, when the XMAC and MAC are the same, the UE can determine the current LTE The network is real, that is, the authentication of the LTE network by the UE is passed.

当UE对LTE-U网络进行验证时,UE可以根据LTE-U网络的网络标识、第一随机数和AUTN生成第二基础密钥;UE通过第二基础密钥对第二随机数进行加密,得到第三加密结果;如果第一加密结果等于第三加密结果,则UE确定对LTE-U网络的验证通过。When the UE verifies the LTE-U network, the UE may generate a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN; the UE encrypts the second random number by using the second basic key, A third encryption result is obtained; if the first encryption result is equal to the third encryption result, the UE determines that the verification of the LTE-U network is passed.

其中,当UE对LTE-U网络进行验证时,UE可以根据自身存储的Ki、LTE-U网络的网络标识、第一随机数和AUTN生成第二基础密钥。之后,通过第二基础密钥对该第二随机数进行加密,从而得到第三加密结果。由于第一基础密钥是LTE-U网络对应的密钥,第一加密结果是通过第一基础密钥对第二随机数进行加密得到的,因此,如果该第三加密结果和第一加密结果相同,则说明该第二基础密钥和第一基础密钥是相同的,也即是,UE可以确定对LTE-U网络的验证通过。反之,如果第三加密结果和第一加密结果不同,则说明第二基础密钥和第一基础密钥不同,此时,UE对LTE-U网络的验证将失败。Wherein, when the UE verifies the LTE-U network, the UE may generate the second basic key according to the stored Ki, the network identifier of the LTE-U network, the first random number and the AUTN. After that, the second random number is encrypted with the second basic key, so as to obtain a third encryption result. Since the first basic key is the key corresponding to the LTE-U network, the first encryption result is obtained by encrypting the second random number with the first basic key. Therefore, if the third encryption result and the first encryption result If they are the same, it means that the second basic key and the first basic key are the same, that is, the UE can determine that the verification of the LTE-U network is passed. Conversely, if the third encryption result is different from the first encryption result, it means that the second basic key and the first basic key are different, and at this time, the authentication of the UE to the LTE-U network will fail.

步骤406:当UE确定对LTE网络和LTE-U网络均验证通过时,生成回复信息和第三随机数,并基于LTE-U网络的网络标识、第一随机数、AUTN和第三随机数生成第二加密结果。Step 406: When the UE determines that both the LTE network and the LTE-U network have passed the verification, a reply message and a third random number are generated, and based on the network identifier of the LTE-U network, the first random number, the AUTN and the third random number are generated. The second encryption result.

当UE确定对LTE网络的验证通过之后,可以通过自身存储的Ki和接收到的第一随机数生成回复信息,该回复信息用于后续LTE网络对UE进行验证。After the UE determines that the verification of the LTE network is passed, the reply information can be generated by using the stored Ki and the received first random number, and the reply information is used for subsequent verification of the UE by the LTE network.

当UE确定对LTE-U网络的验证通过之后,可以生成第三随机数,之后,UE可以根据通过LTE-U网络的网络标识、第一随机数和AUTN生成的第二基础密钥,对接收到的第二随机数和生成的第三随机数进行整体加密,从而得到第二加密结果。After the UE determines that the verification of the LTE-U network is passed, a third random number may be generated, and then the UE may, according to the network identifier of the LTE-U network, the first random number and the second basic key generated by the AUTN, verify the receiving The obtained second random number and the generated third random number are encrypted as a whole, so as to obtain a second encryption result.

步骤407:UE将第二加密结果、第三随机数和回复信息发送至LTE-U网络的MME。Step 407: The UE sends the second encryption result, the third random number and the reply information to the MME of the LTE-U network.

当UE生成回复信息和第二加密结果之后,可以将第二加密结果、第三随机数和回复信息发送至LTE-U网络的eNB,并由LTE-U网络的eNB将该第二加密结果、第三随机数和回复信息转发至LTE-U网络的MME。After the UE generates the reply information and the second encryption result, it can send the second encryption result, the third random number and the reply information to the eNB of the LTE-U network, and the eNB of the LTE-U network can send the second encryption result, the third random number and the reply information to the eNB of the LTE-U network. The third random number and the reply information are forwarded to the MME of the LTE-U network.

步骤408:当LTE-U网络的MME接收到第二加密结果和第三随机数时,基于第二加密结果对UE进行验证。Step 408: When the MME of the LTE-U network receives the second encryption result and the third random number, it verifies the UE based on the second encryption result.

基于前述步骤403中的描述可知,LTE-U网络的MME中存储有第一基础密钥,并且,第二随机数是由LTE-U网络的MME生成,并存储在该LTE-U网络的MME中的,因此,当LTE-U网络的MME接收到第二加密结果和第三随机数之后,可以通过存储的第一基础密钥对存储的第二随机数和接收到的第三随机数进行整体加密,从而得到第四加密结果。如果该第四加密结果和第二加密结果相同,则说明UE生成的第二基础密钥和LTE-U网络的MME 中存储的第一基础密钥是相同的,也即是,LTE-U网络的MME可以确定对UE的验证通过。反之,如果第四加密结果和第二加密结果不同,则说明第一基础密钥和第二基础密钥是不同的,此时,LTE-U网络对UE的验证失败。Based on the description in the foregoing step 403, it can be known that the MME of the LTE-U network stores the first basic key, and the second random number is generated by the MME of the LTE-U network and stored in the MME of the LTE-U network Therefore, after the MME of the LTE-U network receives the second encryption result and the third random number, it can perform the stored second random number and the received third random number by using the stored first basic key. Entire encryption, thereby obtaining the fourth encryption result. If the fourth encryption result is the same as the second encryption result, it means that the second basic key generated by the UE and the first basic key stored in the MME of the LTE-U network are the same, that is, the LTE-U network The MME can determine that the verification of the UE is passed. On the contrary, if the fourth encryption result and the second encryption result are different, it means that the first basic key and the second basic key are different, and at this time, the verification of the UE by the LTE-U network fails.

步骤409:当LTE-U网络的MME接收到回复信息时,将回复信息发送至LTE网络的MME。Step 409: When the MME of the LTE-U network receives the reply information, it sends the reply information to the MME of the LTE network.

基于步骤407中的描述,UE将第二加密结果、第三随机数和回复信息发送至LTE-U网络的MME,其中,LTE-U网络的MME可以利用第二加密结果和第三随机数,通过步骤408 中的方式对UE进行验证,而对于接收到的回复信息,由于该回复信息是用于LTE网络对UE 进行验证的,因此,LTE-U网络的MME可以直接将该回复信息转发给LTE网络的MME。Based on the description in step 407, the UE sends the second encryption result, the third random number and the reply information to the MME of the LTE-U network, wherein the MME of the LTE-U network can use the second encryption result and the third random number, The UE is verified by the method in step 408, and for the received reply information, since the reply information is used for the LTE network to verify the UE, the MME of the LTE-U network can directly forward the reply information to the UE. MME for LTE networks.

步骤410:当LTE网络的MME接收到回复信息时,基于回复信息对UE进行验证。Step 410: When the MME of the LTE network receives the reply information, it verifies the UE based on the reply information.

基于步骤401中的描述可知,LTE网络的MME中存储有期望回复信息,而该期望回复信息是由HSS根据确定的Ki和第一随机数生成的。因此,当LTE网络的MME接收到该回复信息时,如果该回复信息和期望回复信息相同,那么,LTE网络的MME则可以确定用于生成期望回复信息的Ki和用于生成回复信息的Ki是相同的,也即是,LTE网络侧存储的Ki 和该UE自身存储的Ki是一致的,此时,该LTE网络的MME即可以确定当前的UE是真实有效地,也即是,该LTE网络的MME可以确定对UE的验证通过。Based on the description in step 401, it can be known that the expected reply information is stored in the MME of the LTE network, and the expected reply information is generated by the HSS according to the determined Ki and the first random number. Therefore, when the MME of the LTE network receives the reply information, if the reply information is the same as the expected reply information, then the MME of the LTE network can determine that the Ki used to generate the expected reply information and the Ki used to generate the reply information are The same, that is, the Ki stored on the LTE network side is consistent with the Ki stored by the UE itself. At this time, the MME of the LTE network can determine that the current UE is real and effective, that is, the LTE network The MME can determine that the verification of the UE is passed.

在本发明实施例中,当LTE网络的MME接收到鉴权向量之后,LTE网络的MME和 LTE-U网络的MME可以向UE发送第一随机数、AUTN和第一加密结果,当UE接收到该第一随机数、AUTN和第一加密结果之后,可以同时根据第一随机数、AUTN和第一加密结果对LTE-U网络和LTE网络进行验证,之后,LTE-U网络的MME和LTE网络的MME再根据来自UE的回复信息和第二加密结果对UE进行验证。也即是,通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U网络时,同时完成与运营商网络和LTE-U 网络之间的鉴权,从而使UE可以同时接入运营商网络和LTE-U网络,为用户的使用带来了方便。In this embodiment of the present invention, after the MME of the LTE network receives the authentication vector, the MME of the LTE network and the MME of the LTE-U network may send the first random number, AUTN and the first encryption result to the UE. After the first random number, AUTN, and the first encryption result, the LTE-U network and the LTE network may be verified according to the first random number, AUTN, and the first encryption result. After that, the MME of the LTE-U network and the LTE network The MME of the UE then verifies the UE according to the reply information from the UE and the second encryption result. That is, through the network authentication method provided by the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at the same time, so that the The UE can access the operator network and the LTE-U network at the same time, which brings convenience to the user.

通过上述实施例介绍了UE根据LTE-U网络生成的第二随机数以及其他参数同时对LTE-U网络和LTE网络进行验证的方法,接下来将介绍另一种UE同时对LTE-U网络和LTE 网络进行验证的方法。The above embodiment introduces a method for the UE to simultaneously verify the LTE-U network and the LTE network according to the second random number and other parameters generated by the LTE-U network. A method for verifying an LTE network.

图5是本发明实施例提供的第二种基于鉴权向量进行网络鉴权的方法的流程图,如图5 所示,该方法包括以下步骤:FIG. 5 is a flowchart of a second method for performing network authentication based on an authentication vector provided by an embodiment of the present invention. As shown in FIG. 5 , the method includes the following steps:

步骤501:LTE网络的MME将鉴权向量中的期望回复信息进行存储。Step 501: The MME of the LTE network stores the expected reply information in the authentication vector.

基于前述实施例中步骤305的描述可知,鉴权向量包括第一基础密钥、第一随机数、期望回复信息和AUTN,当LTE网络的MME接收到鉴权向量时,可以将期望回复信息进行存储,以便后续对UE进行验证。Based on the description of step 305 in the foregoing embodiment, it can be known that the authentication vector includes the first basic key, the first random number, the expected reply information and the AUTN. When the MME of the LTE network receives the authentication vector, the expected reply information can be stored for subsequent verification of the UE.

步骤502:LTE网络的MME将第一基础密钥、期望回复信息、第一随机数和AUTN发送至LTE-U网络的MME。Step 502: The MME of the LTE network sends the first basic key, the expected reply information, the first random number and the AUTN to the MME of the LTE-U network.

LTE网络的MME将期望回复信息进行存储之后,除了向LTE-U网络的MME发送鉴权向量中剩余的第一基础密钥、第一随机数和AUTN之外,还需要将期望回复信息也发送LTE-U网络的MME。After the MME of the LTE network stores the expected reply information, in addition to sending the remaining first basic key, the first random number and the AUTN in the authentication vector to the MME of the LTE-U network, the expected reply information also needs to be sent. MME for LTE-U networks.

步骤503:当LTE-U网络的MME接收到第一基础密钥、期望回复信息、第一随机数和AUTN时,将第一基础密钥和期望回复信息进行存储,基于第一基础密钥生成第一加密结果。Step 503: When the MME of the LTE-U network receives the first basic key, the expected reply information, the first random number and the AUTN, it stores the first basic key and the expected reply information, and generates a The first encryption result.

当LTE-U网络的MME接收到第一基础密钥、期望回复信息、第一随机数和AUTN时,可以将第一基础密钥和期望回复信息进行存储,以便后续对UE进行验证。与此同时,LTE-U 网络的MME可以基于第一基础密钥生成第一加密结果。When the MME of the LTE-U network receives the first basic key, the expected reply information, the first random number and the AUTN, the first basic key and the expected reply information may be stored for subsequent verification of the UE. At the same time, the MME of the LTE-U network may generate the first encryption result based on the first basic key.

需要说明的是,由前述实施例中步骤305的描述中可知,AUTN中包括MAC,当LTE-U网络的MME接收到第一基础密钥、期望回复信息、第一随机数和AUTN时,可以通过第一基础密钥对AUTN中的MAC加密,从而得到第一加密结果。It should be noted that, as can be seen from the description of step 305 in the foregoing embodiment, the AUTN includes the MAC. When the MME of the LTE-U network receives the first basic key, the expected reply information, the first random number and the AUTN, it can The MAC in the AUTN is encrypted by the first basic key, thereby obtaining the first encryption result.

步骤504:LTE-U网络的MME将第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果发送至UE。Step 504: The MME of the LTE-U network sends the first random number, the AUTN, the network identifier of the LTE-U network and the first encryption result to the UE.

当生成第一加密结果之后,LTE-U网络的MME可以将第一随机数、AUTN、LTE-U网络的网络标识和该第一加密结果发送至LTE-U网络的eNB,并由该LTE-U网络的eNB将第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果转发给UE。After generating the first encryption result, the MME of the LTE-U network may send the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result to the eNB of the LTE-U network, and the LTE-U network will send the The eNB of the U network forwards the first random number, the AUTN, the network identifier of the LTE-U network and the first encryption result to the UE.

步骤505:当UE接收到第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果时,基于第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果对LTE网络和LTE-U网络进行验证。Step 505: When the UE receives the first random number, the network identifier of the AUTN, and the LTE-U network and the first encryption result, based on the first random number, the network identifier of the AUTN, and the LTE-U network and the first encryption result, the LTE network and LTE-U network for verification.

当UE接收到第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果时,UE可以根据第一随机数和AUTN对LTE网络进行验证,根据第一随机数、AUTN、LTE-U网络的网络标识和第一加密结果对LTE-U网络进行验证。When the UE receives the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result, the UE can verify the LTE network according to the first random number and AUTN, and according to the first random number, AUTN, LTE-U The LTE-U network is verified by the network identifier of the U network and the first encryption result.

其中,UE对LTE网络进行验证的具体实现方式可以参考步骤405中UE对LTE网络的验证方式,本发明实施例不再赘述。For a specific implementation manner of the UE verifying the LTE network, reference may be made to the verification method of the UE on the LTE network in step 405, which is not repeated in this embodiment of the present invention.

当UE对LTE-U网络进行验证时,UE可以根据LTE-U网络的网络标识、第一随机数和AUTN生成第二基础密钥;通过第二基础密钥对MAC进行加密,得到第五加密结果;如果第一加密结果等于第五加密结果,则UE确定对LTE-U网络的验证通过。When the UE verifies the LTE-U network, the UE can generate a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN; encrypt the MAC with the second basic key to obtain a fifth encryption key Result: if the first encryption result is equal to the fifth encryption result, the UE determines that the verification of the LTE-U network is passed.

其中,当UE对LTE-U网络进行验证时,UE可以根据自身存储的Ki、LTE-U网络的网络标识、第一随机数和AUTN生成第二基础密钥,之后,通过该第二基础密钥对AUTN中包括的MAC进行加密,从而得到第五加密结果。由于第一基础密钥是LTE-U网络对应的密钥,第一加密结果是通过第一基础密钥对MAC加密得到的,而第五加密结果是通过第二基础密钥对MAC加密得到的。因此,如果第一加密结果和第五加密结果相同,则说明第一基础密钥和第二基础密钥是相同的,也即是,UE可以确定对LTE-U网络的验证通过。反之,如果第五加密结果和第一加密结果不同,则说明第二基础密钥和第一基础密钥不同,此时,UE对 LTE-U网络的验证将失败。Wherein, when the UE verifies the LTE-U network, the UE can generate a second basic key according to the stored Ki, the network identifier of the LTE-U network, the first random number and the AUTN, and then use the second basic key The key encrypts the MAC included in the AUTN, thereby obtaining a fifth encryption result. Since the first basic key is the key corresponding to the LTE-U network, the first encryption result is obtained by encrypting the MAC with the first basic key, and the fifth encryption result is obtained by encrypting the MAC with the second basic key . Therefore, if the first encryption result and the fifth encryption result are the same, it means that the first basic key and the second basic key are the same, that is, the UE can determine that the verification of the LTE-U network is passed. On the contrary, if the fifth encryption result is different from the first encryption result, it means that the second basic key is different from the first basic key, and at this time, the verification of the LTE-U network by the UE will fail.

步骤506:当UE确定对LTE网络和LTE-U网络均验证通过时,生成回复信息,并基于LTE-U网络的网络标识、第一随机数和AUTN生成第二加密结果。Step 506: When the UE determines that both the LTE network and the LTE-U network have passed the verification, a reply message is generated, and a second encryption result is generated based on the network identifier of the LTE-U network, the first random number and the AUTN.

当UE确定对LTE网络的验证通过时,可以通过自身存储的Ki和接收到的第一随机数生成回复信息。When the UE determines that the verification of the LTE network is passed, the reply information can be generated by using the stored Ki and the received first random number.

当UE确定对LTE-U网络的验证通过,且生成回复信息之后,UE可以通过步骤505中根据LTE-U网络的网络标识、第一随机数和AUTN生成的第二基础密钥,对该回复信息进行加密,从而得到第二加密结果。When the UE determines that the verification of the LTE-U network is passed and the reply information is generated, the UE can reply to the reply information according to the network identifier of the LTE-U network, the first random number and the second basic key generated by the AUTN in step 505. The information is encrypted to obtain a second encrypted result.

步骤507:UE将第二加密结果和回复信息发送至LTE-U网络的MME。Step 507: The UE sends the second encryption result and the reply information to the MME of the LTE-U network.

当UE生成回复信息和第二加密结果之后,可以将该回复信息和第二加密结果发送至 LTE-U网络的eNB,并由LTE-U网络的eNB将该回复信息和第二加密结果转发给LTE-U网络的MME。After the UE generates the reply information and the second encryption result, the reply information and the second encryption result may be sent to the eNB of the LTE-U network, and the eNB of the LTE-U network forwards the reply information and the second encryption result to the eNB of the LTE-U network. MME for LTE-U networks.

步骤508:当LTE-U网络的MME接收到回复信息和第二加密结果时,基于该回复信息和第二加密结果对UE进行验证。Step 508: When the MME of the LTE-U network receives the reply information and the second encryption result, it verifies the UE based on the reply information and the second encryption result.

基于步骤503中的描述可知,LTE-U网络的MME中存储有第一基础密钥和期望回复信息,其中,该期望回复信息是由HSS根据存储的Ki和第一随机数生成。当LTE-U网络的 MME接收到回复信息和第二解密结果之后,首先可以将该回复信息与期望回复信息进行比较,之后,LTE-U网络的MME可以通过自身存储的第一基础密钥对该回复信息进行加密,得到第六加密结果。由于该回复信息是由UE根据自身存储的Ki和第一随机数生成的,因此,如果该回复信息和期望回复信息相同,且该第六加密结果与第二加密结果也相同,则说明UE 生成的第二基础密钥和LTE-U网络的MME存储的第一基础密钥是一致的,此时,LTE-U网络的MME就可以确认当前的UE是真实有效的,也即是,LTE-U网络的MME可以确定对 UE的验证通过。反之,如果该第六加密结果和第二加密结果不同,则说明第一基础密钥和第二基础密钥是不同的,此时,LTE-U网络对UE的验证失败。Based on the description in step 503, it can be known that the MME of the LTE-U network stores the first basic key and expected reply information, wherein the expected reply information is generated by the HSS according to the stored Ki and the first random number. When the MME of the LTE-U network receives the reply information and the second decryption result, it can first compare the reply information with the expected reply information, and then the MME of the LTE-U network can use the first basic key stored by itself to pair the The reply information is encrypted to obtain a sixth encryption result. Since the reply information is generated by the UE according to the stored Ki and the first random number, if the reply information is the same as the expected reply information, and the sixth encryption result is also the same as the second encryption result, it means that the UE has generated The second basic key of the LTE-U network is consistent with the first basic key stored by the MME of the LTE-U network. At this time, the MME of the LTE-U network can confirm that the current UE is real and valid, that is, the LTE-U network The MME of the U network may determine that the authentication of the UE is passed. On the contrary, if the sixth encryption result and the second encryption result are different, it means that the first basic key and the second basic key are different, and at this time, the verification of the UE by the LTE-U network fails.

步骤509:LTE-U网络的MME将回复信息发送至LTE网络的MME。Step 509: The MME of the LTE-U network sends the reply information to the MME of the LTE network.

LTE-U网络的MME可以在接收到回复信息时,即将该回复信息发送至LTE网络的MME,当然,也可以在完成对UE的验证之后,将该回复信息发送至LTE网络的MME.The MME of the LTE-U network can send the reply information to the MME of the LTE network when receiving the reply information. Of course, it can also send the reply information to the MME of the LTE network after completing the verification of the UE.

步骤510:当LTE网络的MME接收到回复信息时,基于回复信息对UE进行验证。Step 510: When the MME of the LTE network receives the reply information, it verifies the UE based on the reply information.

当LTE网络的MME接收到回复信息时,基于该回复信息对UE进行验证的具体实现方式可以参考步骤410中的实现方式,本发明实施例不再赘述。When the MME of the LTE network receives the reply information, for a specific implementation manner of verifying the UE based on the reply information, reference may be made to the implementation manner in step 410, which is not repeated in this embodiment of the present invention.

在本发明实施例中,当LTE网络的MME接收到鉴权向量之后,LTE网络的MME和 LTE-U网络的MME可以向UE发送第一随机数、AUTN和第一加密结果,其中,该第一加密结果是LTE-U网络的MME对AUTN中的MAC进行加密后得到的,当UE接收到该第一随机数、AUTN和第一加密结果之后,可以同时根据第一随机数、AUTN和第一加密结果对 LTE-U网络和LTE网络进行验证,之后,LTE-U网络的MME和LTE网络的MME再根据来自UE的回复信息和第二加密结果对UE进行验证,其中,该第二加密结果是UE对回复信息进行加密得到的。也即是,在本发明实施例提供的网络鉴权方法中,LTE-U网络和UE都不必再生成随机数,只需对鉴权向量中的参数进行加密即可完成互相验证,简化了操作。通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U网络时,同时完成与运营商网络和LTE-U网络之间的鉴权,从而使UE可以同时接入运营商网络和LTE-U网络,为用户的使用带来了方便。In this embodiment of the present invention, after the MME of the LTE network receives the authentication vector, the MME of the LTE network and the MME of the LTE-U network may send the first random number, the AUTN and the first encryption result to the UE, where the first random number, AUTN and the first encryption result are sent to the UE. An encryption result is obtained after the MME of the LTE-U network encrypts the MAC in the AUTN. After receiving the first random number, AUTN and the first encryption result, the UE can An encryption result verifies the LTE-U network and the LTE network, and then the MME of the LTE-U network and the MME of the LTE network verifies the UE according to the reply information from the UE and the second encryption result, wherein the second encryption The result is obtained by the UE encrypting the reply information. That is, in the network authentication method provided by the embodiment of the present invention, neither the LTE-U network nor the UE need to generate random numbers, and only need to encrypt the parameters in the authentication vector to complete mutual authentication, which simplifies the operation. . With the network authentication method provided by the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at the same time, so that the UE can connect to the operator network and the LTE-U network at the same time. It is connected to the operator network and LTE-U network, which brings convenience to users.

前述结合附图4和5介绍了UE同时对LTE-U网络和LTE网络进行验证,之后,LTE-U网络的MME和LTE网络的MME对UE进行验证的两种验证方法,接下来,将结合附图6 介绍UE先与LTE网络互相验证,再对LTE-U网络进行验证的网络鉴权方法。The foregoing introduces two verification methods for the UE to verify the LTE-U network and the LTE network at the same time in conjunction with Figures 4 and 5. After that, the MME of the LTE-U network and the MME of the LTE network verify the UE. FIG. 6 introduces a network authentication method in which the UE first authenticates with the LTE network and then authenticates the LTE-U network.

图6是本发明实施例提供的第三种基于鉴权向量进行网络鉴权的方法的流程图,在该方法中,LTE网络的MME首先基于第三基础密钥、期望回复信息,第一随机数和AUTN通过步骤601-步骤60中的方法与UE交互,从而完成与UE之间的互相验证,之后,进行如图6 所示,该方法包括以下步骤:FIG. 6 is a flowchart of a third method for performing network authentication based on an authentication vector provided by an embodiment of the present invention. In this method, the MME of the LTE network first based on the third basic key and expected reply information, the first random The data and AUTN interact with the UE through the methods in steps 601 to 60, so as to complete the mutual authentication with the UE, and then proceed as shown in Figure 6. The method includes the following steps:

步骤601:LTE网络的MME将鉴权向量中的第三基础密钥和期望回复信息进行存储。Step 601: The MME of the LTE network stores the third basic key in the authentication vector and the expected reply information.

基于前述实施例中步骤305的描述,鉴权向量可以包括第三基础密钥、期望回复信息、第一随机数和AUTN。当鉴权向量中包括第三基础密钥、期望回复信息、第一随机数和AUTN 时,LTE网络的MME可以在接收到该鉴权向量时,将该鉴权向量中的第三基础密钥和期望回复信息进行存储,以便后续对UE进行验证。Based on the description of step 305 in the foregoing embodiment, the authentication vector may include the third base key, the expected reply information, the first random number and the AUTN. When the authentication vector includes the third basic key, the expected reply information, the first random number and the AUTN, the MME of the LTE network may, when receiving the authentication vector, use the third basic key in the authentication vector and the expected reply information for subsequent verification of the UE.

步骤602:LTE网络的MME将第一随机数和AUTN发送至UE。Step 602: The MME of the LTE network sends the first random number and the AUTN to the UE.

当LTE网络的MME将第三基础密钥和期望回复信息进行存储之后,LTE网络的MME可以将该鉴权向量中的第一随机数和AUTN发送至LTE-U网络的MME,LTE-U网络的MME 在接收到该第一随机数和AUTN之后,可以将该第一随机数和AUTN发送至LTE-U网络的 eNB,LTE-U网络的eNB在接收到第一随机数和AUTN之后,再将该第一随机数和AUTN 转发给UE。After the MME of the LTE network stores the third basic key and the expected reply information, the MME of the LTE network can send the first random number and AUTN in the authentication vector to the MME of the LTE-U network, and the LTE-U network After receiving the first random number and AUTN, the MME can send the first random number and AUTN to the eNB of the LTE-U network, and the eNB of the LTE-U network, after receiving the first random number and AUTN, The first random number and AUTN are forwarded to the UE.

步骤603:当UE接收到第一随机数和AUTN时,基于第一随机数和AUTN,对LTE网络进行验证。Step 603: When the UE receives the first random number and the AUTN, it verifies the LTE network based on the first random number and the AUTN.

本步骤的具体实现方式可以参考步骤405中UE基于第一随机数和AUTN对LTE网络进行验证的实现方式,本发明实施例不再赘述。For a specific implementation manner of this step, reference may be made to the implementation manner in which the UE verifies the LTE network based on the first random number and the AUTN in step 405, which is not repeated in this embodiment of the present invention.

步骤604:当UE确定对LTE网络的验证通过时,生成回复信息。Step 604: When the UE determines that the verification of the LTE network is passed, a reply message is generated.

本步骤的具体实现方式可以参考步骤406中当UE确定对LTE网络的验证通过时,生成回复信息的相关说明,本发明实施例不再赘述。For the specific implementation of this step, reference may be made to the relevant description of generating reply information when the UE determines that the verification of the LTE network is passed in step 406, which is not repeated in this embodiment of the present invention.

步骤605:UE将回复信息发送至LTE网络的MME。Step 605: The UE sends the reply information to the MME of the LTE network.

当UE生成回复信息之后,可以将该回复信息经由LTE-U网络的eNB和MME,发送至LTE网络的MME。After the UE generates the reply information, the reply information may be sent to the MME of the LTE network via the eNB and the MME of the LTE-U network.

步骤606:当LTE网络的MME接收到回复信息时,基于该回复信息对UE进行验证。Step 606: When the MME of the LTE network receives the reply information, it verifies the UE based on the reply information.

本步骤的具体实现方式可以参考步骤410中LTE网络的MME基于回复信息对UE进行验证的相关说明,本发明实施例不再赘述。For the specific implementation of this step, reference may be made to the relevant description of the MME of the LTE network verifying the UE based on the reply information in step 410, which is not repeated in this embodiment of the present invention.

步骤607:当LTE网络的MME确定对UE的验证通过时,生成第二随机数,并基于LTE-U网络的网络标识和第三基础密钥,生成第一基础密钥,基于UE的安全算法生成NAS密钥,并通过NAS密钥对第二随机数进行加密,得到第七加密结果。Step 607: When the MME of the LTE network determines that the verification of the UE is passed, a second random number is generated, and a first basic key is generated based on the network identifier of the LTE-U network and the third basic key, based on the UE's security algorithm A NAS key is generated, and the second random number is encrypted by the NAS key to obtain a seventh encryption result.

基于步骤302中的描述可知,LTE-U网络的MME在第一附着请求中添加了LTE-U网络的网络标识,从而生成了第二附着请求,并将该第二附着请求发送给了LTE网络的MME,因此,当LTE网络的MME确定对UE的验证通过时,可以基于LTE-U网络的网络标识和第三基础密钥,生成第一基础密钥。与此同时,LTE网络的MME可以利用随机数发生器生成第二随机数。Based on the description in step 302, it can be known that the MME of the LTE-U network adds the network identifier of the LTE-U network to the first attach request, thereby generating a second attach request, and sending the second attach request to the LTE network Therefore, when the MME of the LTE network determines that the verification of the UE is passed, the first basic key can be generated based on the network identifier of the LTE-U network and the third basic key. At the same time, the MME of the LTE network may generate a second random number using the random number generator.

需要说明的是,由于第二附着请求中还包括该UE的安全算法,因此,当LTE网络的MME生成第二随机数和第一基础密钥之后,可以根据该UE的安全算法生成NAS密钥。之后,LTE网络的MME可以通过该NAS密钥对第二随机数进行加密,得到第七加密结果。It should be noted that since the second attach request also includes the security algorithm of the UE, after the MME of the LTE network generates the second random number and the first basic key, the NAS key can be generated according to the security algorithm of the UE . Afterwards, the MME of the LTE network may encrypt the second random number by using the NAS key to obtain a seventh encryption result.

步骤608:LTE网络的MME将第一基础密钥、第三基础密钥、NAS密钥、LTE-U网络的网络标识、第二随机数和第七加密结果发送至LTE-U网络的MME。Step 608: The MME of the LTE network sends the first basic key, the third basic key, the NAS key, the network identifier of the LTE-U network, the second random number and the seventh encryption result to the MME of the LTE-U network.

步骤609:当LTE-U网络的MME接收到第一基础密钥、第三基础密钥、NAS密钥、LTE-U网络的网络标识、第二随机数和第七加密结果时,通过第一基础密钥对第二随机数进行加密,得到第八加密结果。Step 609: When the MME of the LTE-U network receives the first basic key, the third basic key, the NAS key, the network identifier of the LTE-U network, the second random number and the seventh encryption result, the The basic key encrypts the second random number to obtain an eighth encryption result.

步骤610:LTE-U网络的MME将第三基础密钥、NAS密钥、LTE-U网络的网络标识、第七加密结果和第八加密结果发送至UE。Step 610: The MME of the LTE-U network sends the third basic key, the NAS key, the network identifier of the LTE-U network, the seventh encryption result and the eighth encryption result to the UE.

LTE-U网络的MME将第三基础密钥、NAS密钥、LTE-U网络的网络标识、第七加密结果和第八加密结果发送至LTE-U网络的eNB,再由LTE-U网络的eNB转发给UE。The MME of the LTE-U network sends the third basic key, the NAS key, the network identifier of the LTE-U network, the seventh encryption result and the eighth encryption result to the eNB of the LTE-U network, and the LTE-U network The eNB forwards to the UE.

步骤611:当UE接收到第三基础密钥、NAS密钥、LTE-U网络的网络标识、第七加密结果和第八加密结果时,基于第三基础密钥和LTE-U网络的网络标识生成第二基础密钥,并通过第二基础密钥对第八加密结果进行解密,得到第一解密结果,通过NAS密钥对第七加密结果进行解密,得到第二解密结果。Step 611: When the UE receives the third basic key, the NAS key, the network identifier of the LTE-U network, the seventh encryption result and the eighth encryption result, based on the third basic key and the network identifier of the LTE-U network The second basic key is generated, and the eighth encryption result is decrypted by the second basic key to obtain the first decryption result, and the seventh encryption result is decrypted by the NAS key to obtain the second decryption result.

由于第一基础密钥是LTE网络的MME根据第三基础密钥和LTE-U网络的网络标识生成的,因此,为了验证LTE-U网络的真实性,当UE接收到第三基础密钥和LTE-U网络的网络标识时,可以根据该第三基础密钥和LTE-U网络的网络标识生成第二基础密钥,从而验证第二基础密钥和第一基础密钥是否相同,以此来实现对LTE-U网络的验证。Since the first basic key is generated by the MME of the LTE network according to the third basic key and the network identifier of the LTE-U network, in order to verify the authenticity of the LTE-U network, when the UE receives the third basic key and the When the network identifier of the LTE-U network is used, the second basic key can be generated according to the third basic key and the network identifier of the LTE-U network, so as to verify whether the second basic key and the first basic key are the same, so that To realize the verification of the LTE-U network.

需要说明的是,为了防止LTE-U网络的MME向UE传递信息的过程中信息被篡改,LTE-U 网络的MME并没有将第一基础密钥直接发送至UE,而是通过步骤609中的方法利用第一基础密钥对第二随机数进行加密得到第八加密结果,并将该第八加密结果发送至UE。当UE接收到第八加密结果之后,UE可以通过该第二基础密钥对第八加密结果进行解密,得到第一解密结果,并通过NAS密钥对第七加密结果解密,得到第二解密结果。It should be noted that, in order to prevent the information from being tampered in the process of transmitting the information to the UE by the MME of the LTE-U network, the MME of the LTE-U network does not directly send the first basic key to the UE, but passes the key in step 609. The method encrypts the second random number with the first basic key to obtain an eighth encryption result, and sends the eighth encryption result to the UE. After the UE receives the eighth encryption result, the UE can decrypt the eighth encryption result through the second basic key to obtain the first decryption result, and decrypt the seventh encryption result through the NAS key to obtain the second decryption result .

步骤612:UE基于第一解密结果和第二解密结果,对LTE-U网络进行验证。Step 612: The UE verifies the LTE-U network based on the first decryption result and the second decryption result.

由于第八加密结果是LTE-U网络的MME通过第一基础密钥对第二随机数进行加密得到的,而第七加密结果是LTE网络的MME通过NAS密钥对第二随机数进行加密得到的,因此,当UE通过第二基础密钥对第八加密结果解密,通过NAS密钥对第七加密结果解密之后,如果第一加密结果和第二加密结果相等,则说明UE生成的第二基础密钥和第一基础密钥是相同的,也即是,UE可以确定该LTE-U网络是真实可信的,此时,UE即可以确定对LTE-U 网络的验证通过。Because the eighth encryption result is obtained by the MME of the LTE-U network encrypting the second random number with the first basic key, and the seventh encryption result is obtained by the MME of the LTE network encrypting the second random number with the NAS key Therefore, when the UE decrypts the eighth encryption result with the second basic key and decrypts the seventh encryption result with the NAS key, if the first encryption result and the second encryption result are equal, it means that the second encryption result generated by the UE is equal to The basic key and the first basic key are the same, that is, the UE can determine that the LTE-U network is authentic, and at this time, the UE can determine that the verification of the LTE-U network is passed.

在本发明实施例中,当LTE网络的MME接收到鉴权向量之后,LTE网络的MME可以先基于鉴权向量中的第三基础密钥、第一随机数、期望回复信息和AUTN与UE进行交互,以完成与UE的互相认证,之后,LTE网络的MME可以生成第一基础密钥、第二随机数获得NAS密钥,并将该第一基础密钥、第二随机数和NAS密钥发送至LTE-U网络的MME,之后,LTE-U网络的MME和UE可以通过该第一基础密钥、第二随机数和NAS密钥进行网络鉴权。也即是,通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U 网络时,同时完成与运营商网络和LTE-U网络之间的鉴权,从而使UE可以同时接入运营商网络和LTE-U网络,为用户的使用带来了方便。In this embodiment of the present invention, after the MME of the LTE network receives the authentication vector, the MME of the LTE network may first perform a communication with the UE based on the third basic key, the first random number, the expected reply information and the AUTN in the authentication vector. interaction to complete the mutual authentication with the UE, after that, the MME of the LTE network can generate the first basic key and the second random number to obtain the NAS key, and combine the first basic key, the second random number and the NAS key with the It is sent to the MME of the LTE-U network, and then the MME and the UE of the LTE-U network can perform network authentication through the first basic key, the second random number and the NAS key. That is, with the network authentication method provided by the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at the same time, so that the The UE can access the operator network and the LTE-U network at the same time, which brings convenience to the user.

在对本发明实施例提供的网络鉴权方法进行介绍之后,接下来对本发明实施例提供的网络鉴权系统进行介绍。After the network authentication method provided by the embodiment of the present invention is introduced, the network authentication system provided by the embodiment of the present invention is introduced next.

本发明实施例提供了一种网络鉴权系统,该网络鉴权系统包括UE、LTE-U网络的MME、 LTE网络的MME和HSS。An embodiment of the present invention provides a network authentication system, where the network authentication system includes a UE, an MME of an LTE-U network, an MME of an LTE network, and an HSS.

所述LTE-U网络的MME用于执行上述实施例中的步骤302和303;The MME of the LTE-U network is used to perform steps 302 and 303 in the foregoing embodiment;

所述LTE网络的MME用于执行上述实施例中的步骤304;The MME of the LTE network is configured to perform step 304 in the foregoing embodiment;

所述HSS用于执行上述实施例中的步骤305和306;The HSS is used to perform steps 305 and 306 in the above embodiment;

所述LTE网络的MME用于执行上述实施例中的步骤307。The MME of the LTE network is used to perform step 307 in the above embodiment.

可选地,所述鉴权向量包括第一基础密钥、期望回复信息、第一随机数和鉴权标记AUTN,所述第一基础密钥为所述LTE-U网络对应的密钥;Optionally, the authentication vector includes a first basic key, expected reply information, a first random number and an authentication flag AUTN, and the first basic key is a key corresponding to the LTE-U network;

所述LTE网络的MME具体用于存储所述期望回复信息,并通过所述LTE-U网络的MME向所述UE发送所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和第一加密结果,所述第一加密结果由所述LTE-U网络的MME基于所述第一基础密钥生成;The MME of the LTE network is specifically configured to store the expected reply information, and send the first random number, the AUTN, and the network of the LTE-U network to the UE through the MME of the LTE-U network an identifier and a first encryption result, the first encryption result is generated by the MME of the LTE-U network based on the first basic key;

所述UE用于当接收到所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果时,基于所述第一随机数和所述AUTN对所述LTE网络进行验证,并基于所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果对所述LTE-U 网络进行验证;The UE is configured to, when receiving the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result, perform a pairing of all the data based on the first random number and the AUTN. verifying the LTE network, and verifying the LTE-U network based on the first random number, the AUTN, the network identifier of the LTE-U network and the first encryption result;

所述UE还用于当确定对所述LTE网络和所述LTE-U网络均验证通过时,生成回复信息,并基于所述第一随机数、所述AUTN和所述LTE-U网络的网络标识生成第二加密结果;The UE is further configured to generate reply information when it is determined that both the LTE network and the LTE-U network have passed the verification, and based on the first random number, the AUTN and the network of the LTE-U network identifying the generation of the second encryption result;

所述UE还用于将所述第二加密结果发送至所述LTE-U网络的MME,并将所述回复信息发送至LTE网络的MME;The UE is further configured to send the second encryption result to the MME of the LTE-U network, and send the reply information to the MME of the LTE network;

所述LTE-U网络的MME用于当接收到所述第二加密结果时,基于所述第二加密结果对所述UE进行验证,当所述LTE网络的MME接收到所述回复信息时,基于所述期望回复信息和所述回复信息对所述UE进行验证。The MME of the LTE-U network is configured to authenticate the UE based on the second encryption result when receiving the second encryption result, and when the MME of the LTE network receives the reply information, The UE is authenticated based on the expected reply information and the reply information.

可选地,所述LTE网络的MME具体用于:Optionally, the MME of the LTE network is specifically used for:

将所述期望回复信息进行存储,并将所述第一基础密钥、所述第一随机数和所述AUTN 发送至所述LTE-U网络的MME;storing the expected reply information, and sending the first basic key, the first random number and the AUTN to the MME of the LTE-U network;

所述LTE-U网络的MME还用于当接收到所述第一基础密钥、所述第一随机数和所述AUTN时,将所述第一基础密钥进行存储,基于所述第一基础密钥生成第一加密结果,并将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果发送至所述 UE。The MME of the LTE-U network is further configured to store the first basic key when receiving the first basic key, the first random number and the AUTN, based on the first basic key The base key generates a first encryption result, and sends the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result to the UE.

可选地,所述所述LTE-U网络的MME具体用于:Optionally, the MME of the LTE-U network is specifically used for:

生成第二随机数,并通过所述第一基础密钥对所述第二随机数进行加密,得到所述第一加密结果;generating a second random number, and encrypting the second random number by using the first basic key to obtain the first encryption result;

将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识、所述第一加密结果和所述第二随机数发送至所述UE。Send the first random number, the AUTN, the network identifier of the LTE-U network, the first encryption result and the second random number to the UE.

可选地,所述AUTN包括消息鉴权码MAC;Optionally, the AUTN includes a message authentication code MAC;

所述UE具体用于:The UE is specifically used for:

基于所述第一随机数和所述AUTN中除所述MAC之外的其他参数生成期望消息鉴权码 XMAC;generating a desired message authentication code XMAC based on the first random number and other parameters in the AUTN except the MAC;

如果所述XMAC和所述MAC相同,则确定对所述LTE网络的验证通过。If the XMAC and the MAC are the same, it is determined that the verification of the LTE network is passed.

可选地,所述UE具体用于:Optionally, the UE is specifically used for:

根据所述LTE-U网络的网络标识、所述第一随机数和所述AUTN生成第二基础密钥;generating a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN;

通过所述第二基础密钥对所述第二随机数进行加密,得到第三加密结果;Encrypting the second random number with the second basic key to obtain a third encryption result;

如果所述第一加密结果等于所述第三加密结果,则确定对所述LTE-U网络的验证通过。If the first encryption result is equal to the third encryption result, it is determined that the verification of the LTE-U network is passed.

可选地,所述UE具体用于:Optionally, the UE is specifically used for:

生成第三随机数,并通过所述第二基础密钥对所述第二随机数和所述第三随机数进行整体加密,得到第二加密结果;generating a third random number, and performing integral encryption on the second random number and the third random number by using the second basic key to obtain a second encryption result;

将所述第二加密结果和所述第三随机数发送至所述LTE-U网络的MME;sending the second encryption result and the third random number to the MME of the LTE-U network;

相应地,所述LTE-U网络的MME具体用于:Correspondingly, the MME of the LTE-U network is specifically used for:

通过存储的所述第一基础密钥对所述第二随机数和所述第三随机数进行整体加密,得到第四加密结果;Encrypt the second random number and the third random number as a whole by using the stored first basic key to obtain a fourth encryption result;

如果所述第二加密结果和所述第四加密结果相等,则确定对所述UE的验证通过。If the second encryption result and the fourth encryption result are equal, it is determined that the verification of the UE is passed.

可选地,所述LTE网络的MME具体用于:Optionally, the MME of the LTE network is specifically used for:

将所述期望回复信息进行存储,并将所述第一基础密钥、所述期望回复信息、所述第一随机数和所述AUTN发送至所述LTE-U网络的MME;storing the expected reply information, and sending the first basic key, the expected reply information, the first random number and the AUTN to the MME of the LTE-U network;

所述LTE-U网络的MME用于当接收到所述第一基础密钥、所述期望回复信息、所述第一随机数和所述AUTN时,将所述第一基础密钥和所述期望回复信息进行存储,基于所述第一基础密钥生成第一加密结果,并将所述第一随机数、所述AUTN、所述LTE-U网络的网络标识和所述第一加密结果发送至所述UE。The MME of the LTE-U network is configured to, when receiving the first basic key, the expected reply information, the first random number and the AUTN, combine the first basic key with the Store the expected reply information, generate a first encryption result based on the first basic key, and send the first random number, the AUTN, the network identifier of the LTE-U network, and the first encryption result to the UE.

可选地,所述AUTN包括MAC;Optionally, the AUTN includes a MAC;

所述LTE-U网络的MME具体用于:The MME of the LTE-U network is specifically used for:

通过所述第一基础密钥对所述MAC进行加密,得到所述第一加密结果。The MAC is encrypted by using the first basic key to obtain the first encryption result.

可选地,所述UE具体用于:Optionally, the UE is specifically used for:

根据所述LTE-U网络的网络标识、所述第一随机数和所述AUTN生成第二基础密钥;generating a second basic key according to the network identifier of the LTE-U network, the first random number and the AUTN;

通过所述第二基础密钥对所述MAC进行加密,得到第五加密结果;The MAC is encrypted by the second basic key to obtain a fifth encryption result;

如果所述第一加密结果等于所述第五加密结果,则确定对所述LTE-U网络的验证通过。If the first encryption result is equal to the fifth encryption result, it is determined that the verification of the LTE-U network is passed.

可选地,所述UE具体用于:Optionally, the UE is specifically used for:

通过所述第二基础密钥对所述回复信息进行加密,得到第二加密结果;Encrypting the reply information by using the second basic key to obtain a second encryption result;

相应地,所述LTE-U网络的MME具体用于:Correspondingly, the MME of the LTE-U network is specifically used for:

通过存储的所述第一基础密钥对所述回复信息加密,得到第六加密结果;Encrypt the reply information by using the stored first basic key to obtain a sixth encryption result;

如果所述LTE-U网络的MME存储的所述期望回复信息与所述回复信息相同,且所述第六加密结果与所述第二加密结果相等,则确定对所述UE的验证通过。If the expected reply information stored by the MME of the LTE-U network is the same as the reply information, and the sixth encryption result is equal to the second encryption result, it is determined that the verification of the UE is passed.

可选地,所述第二附着请求中携带所述UE的安全算法,所述鉴权向量包括第三基础密钥、期望回复信息、第一随机数、鉴权标记AUTN,所述第三基础密钥为所述LTE网络对应的密钥;Optionally, the second attach request carries the security algorithm of the UE, the authentication vector includes a third basic key, expected reply information, a first random number, and an authentication flag AUTN, and the third basic key The key is the key corresponding to the LTE network;

所述LTE网络的MME具体用于,基于所述第三基础密钥、所述期望回复信息、所述第一随机数和所述AUTN与所述UE进行交互,以实现所述UE对所述LTE网络的验证,以及所述LTE网络的MME对所述UE的验证;The MME of the LTE network is specifically configured to interact with the UE based on the third basic key, the expected reply information, the first random number, and the AUTN, so as to implement the UE's response to the UE. Verification of the LTE network, and verification of the UE by the MME of the LTE network;

所述LTE网络的MME还用于当确定对所述UE的验证通过时,生成第二随机数,并基于所述LTE-U网络的网络标识和所述第三基础密钥,生成第一基础密钥;The MME of the LTE network is further configured to generate a second random number when it is determined that the verification of the UE is passed, and generate a first basic number based on the network identifier of the LTE-U network and the third basic key key;

所述LTE网络的MME还用于基于所述UE的安全算法生成非接入层NAS密钥,并通过所述NAS密钥对所述第二随机数进行加密,得到第七加密结果;The MME of the LTE network is further configured to generate a non-access stratum NAS key based on the security algorithm of the UE, and encrypt the second random number by using the NAS key to obtain a seventh encryption result;

所述LTE网络的MME还用于将所述第一基础密钥、所述第三基础密钥、所述NAS密钥、所述LTE-U网络的网络标识、所述第二随机数和所述第七加密结果发送至所述LTE-U网络的 MME;The MME of the LTE network is further configured to convert the first basic key, the third basic key, the NAS key, the network identifier of the LTE-U network, the second random number and the all The seventh encryption result is sent to the MME of the LTE-U network;

所述LTE-U网络的MME具体用于通过所述第一基础密钥对所述第二随机数进行加密,得到第八加密结果,并将所述第三基础密钥、所述NAS密钥、所述LTE-U网络的网络标识、所述第七加密结果和所述第八加密结果发送至所述UE;The MME of the LTE-U network is specifically configured to encrypt the second random number by using the first basic key to obtain an eighth encryption result, and use the third basic key and the NAS key to encrypt the second random number. , the network identifier of the LTE-U network, the seventh encryption result and the eighth encryption result are sent to the UE;

所述UE具体用于基于所述第三基础密钥和所述LTE-U网络的网络标识生成第二基础密钥,并通过所述第二基础密钥对所述第八加密结果进行解密,得到第一解密结果,通过所述 NAS密钥对第七加密结果进行解密,得到第二解密结果;The UE is specifically configured to generate a second basic key based on the third basic key and the network identifier of the LTE-U network, and decrypt the eighth encryption result by using the second basic key, Obtain the first decryption result, decrypt the seventh encryption result by the NAS key, and obtain the second decryption result;

所述UE还用于如果所述第一解密结果和所述第二解密结果相同,则确定对所述LTE-U 网络的验证通过。The UE is further configured to determine that the verification of the LTE-U network is passed if the first decryption result and the second decryption result are the same.

综上所述,在本发明实施例中,对于未接入运营商网络的UE,当该UE接入LTE-U网络时,可以将第一附着请求发送至LTE-U网络的MME,当LTE-U网络的MME接收到该第一附着请求时,可以在第一附着请求中加入该LTE-U网络的网络标识,从而生成第二附着请求,并将该第二附着请求发送至LTE网络的MME,LTE网络的MME基于该第二附着请求生成鉴权数据请求,以向HSS请求鉴权向量,当HSS接收到该鉴权数据请求时,基于该鉴权数据请求生成鉴权向量,并将该鉴权向量发送至LTE网络的MME,之后,LTE网络的MME 即可以根据接收到的鉴权向量与UE以及LTE-U网络的MME进行交互,以实现网络鉴权。也即是,通过本发明实施例提供的网络鉴权方法,UE可以在接入运营商网络和LTE-U网络时,一次性完成与运营商网络和LTE-U网络之间的鉴权,从而使UE可以同时顺利的接入运营商网络和LTE-U网络,为用户的使用带来了方便。To sum up, in this embodiment of the present invention, for a UE that does not access the operator's network, when the UE accesses the LTE-U network, the first attach request may be sent to the MME of the LTE-U network. When the MME of the -U network receives the first attach request, it can add the network identifier of the LTE-U network to the first attach request, thereby generating a second attach request, and sending the second attach request to the LTE network. MME, the MME of the LTE network generates an authentication data request based on the second attach request to request an authentication vector from the HSS, when the HSS receives the authentication data request, generates an authentication vector based on the authentication data request, and sends The authentication vector is sent to the MME of the LTE network, and then the MME of the LTE network can interact with the UE and the MME of the LTE-U network according to the received authentication vector to implement network authentication. That is, with the network authentication method provided by the embodiment of the present invention, when the UE accesses the operator network and the LTE-U network, the authentication with the operator network and the LTE-U network can be completed at one time, thereby The UE can smoothly access the operator network and the LTE-U network at the same time, which brings convenience to the user.

需要说明的是:上述实施例提供的网络鉴权系统在进行网络鉴权时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的网络鉴权系统与网络鉴权方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that: when the network authentication system provided by the above embodiment performs network authentication, only the division of the above functional modules is used as an example for illustration. In practical applications, the above functions can be allocated to different functional modules as required. , that is, dividing the internal structure of the device into different functional modules to complete all or part of the functions described above. In addition, the network authentication system and the network authentication method embodiments provided by the above embodiments belong to the same concept, and the specific implementation process is detailed in the method embodiments, which will not be repeated here.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意结合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如:同轴电缆、光纤、数据用户线(Digital Subscriber Line,DSL))或无线(例如:红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如:软盘、硬盘、磁带)、光介质(例如:数字通用光盘(Digital Versatile Disc,DVD))、或者半导体介质(例如:固态硬盘(Solid State Disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission is performed to another website site, computer, server or data center by wire (eg coaxial cable, optical fiber, Digital Subscriber Line, DSL) or wireless (eg infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media. The usable media may be magnetic media (eg: floppy disk, hard disk, magnetic tape), optical media (eg: Digital Versatile Disc (DVD)), or semiconductor media (eg: Solid State Disk (SSD)) )Wait.

本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。Those of ordinary skill in the art can understand that all or part of the steps of implementing the above embodiments can be completed by hardware, or can be completed by instructing relevant hardware through a program, and the program can be stored in a computer-readable storage medium. The storage medium mentioned may be a read-only memory, a magnetic disk or an optical disk, etc.

以上所述为本申请提供的实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above-mentioned examples provided for this application are not intended to limit this application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included in the protection scope of this application. Inside.

Claims (24)

1. A method of network authentication, the method comprising:
when a Mobile Management Entity (MME) of an unlicensed L TE-U network based on long term evolution receives a first attachment request from User Equipment (UE), adding a network identifier of the L TE-U network in the first attachment request to generate a second attachment request, and sending the second attachment request to an MME of a L TE network;
when the MME of the L TE network receives the second attach request, sending an authentication data request to a home subscriber server HSS based on the second attach request, where the authentication data request carries a network identifier of the L TE-U network and a network identifier of the L TE network;
when the HSS receives the authentication data request, generating an authentication vector based on a network identification of the L TE-U network and a network identification of the L TE network, and sending the authentication vector to an MME of the L TE network, the authentication vector including parameters for authenticating the UE, the L TE-U network, and the L TE network;
when the authentication vector is received by the MME of the L TE network, interacting with the UE and the MME of the L TE-U network based on the authentication vector to enable network authentication between the UE and the L TE network and between the UE and the L TE-U network.
2. The method of claim 1, wherein the authentication vector comprises a first basic key, expected reply information, a first random number and an authentication flag AUTN, and the first basic key is a key corresponding to the L TE-U network;
the interacting with the UE and the MME of the L TE-U network based on the authentication vector to realize network authentication comprises:
the MME of the L TE network storing the expected reply information and sending the first random number, the AUTN, the network identification of the L TE-U network, and a first ciphering result to the UE by the MME of the L TE-U network, the first ciphering result being generated by the MME of the L TE-U network based on the first base key;
when the UE receives the first random number, the AUTN, the L TE-U network identification, and the first ciphering result, authenticating the L TE network based on the first random number and the AUTN, and authenticating the L TE-U network based on the first random number, the AUTN, the L TE-U network identification, and the first ciphering result;
generating reply information and generating a second encryption result based on the first random number, the AUTN, and a network identification of the L TE-U network when the UE determines that both the L TE network and the L TE-U network are verified;
the UE sends the second encryption result to the MME of the L TE-U network and sends the reply information to the MME of the L TE network;
authenticating the UE based on the second ciphering result when the second ciphering result is received by the MME of the L TE-U network, and authenticating the UE based on the expected reply information and the reply information when the reply information is received by the MME of the L TE network.
3. The method of claim 2, wherein the L MME of the TE network sending the first random number, the AUTN, and a first ciphering result to the UE through the MME of the L TE-U network comprises:
the MME of the L TE network stores the expected reply information and sends the first basic key, the first random number and the AUTN to the MME of the L TE-U network;
when the MME of the L TE-U network receives the first basic key, the first random number and the AUTN, the MME stores the first basic key, generates a first encryption result based on the first basic key, and sends the first random number, the AUTN, the network identifier of the L TE-U network and the first encryption result to the UE.
4. The method of claim 3, wherein the generating a first encryption result based on the first base key comprises:
the MME of the L TE-U network generates a second random number, and encrypts the second random number through the first basic key to obtain the first encryption result;
accordingly, the sending the first random number, the AUTN, the network identification of the L TE-U network, and the first encryption result to the UE includes:
the MME of the L TE-U network sends the first random number, the AUTN, the network identification of the L TE-U network, the first encryption result and the second random number to the UE.
5. The method of claim 3 or 4, wherein the AUTN comprises a message authentication code MAC;
the UE authenticating the L TE network based on the first nonce and the AUTN, including:
the UE generates an expected message authentication code (XMAC) based on the first random number and other parameters except the MAC in the AUTN;
if the XMAC and the MAC are the same, the UE determines that the L TE network is authenticated.
6. The method of claim 4, wherein the UE authenticating the L TE-U network based on the first nonce, the AUTN, the L TE-U network's network identification, and the first ciphering result, comprising:
the UE generates a second basic key according to the network identifier of the L TE-U network, the first random number and the AUTN;
the UE encrypts the second random number through the second basic key to obtain a third encryption result;
if the first encryption result is equal to the third encryption result, the UE determines that the L TE-U network is authenticated.
7. The method of claim 6, wherein the generating a second encryption result based on the first random number, the AUTN, and a network identification of the L TE-U network comprises:
the UE generates a third random number, and integrally encrypts the second random number and the third random number through the second basic key to obtain a second encryption result;
accordingly, the UE sending the second ciphering result to the MME of the L TE-U network, including:
the UE sends the second encryption result and the third random number to an MME of the L TE-U network;
accordingly, the L MME of the TE-U network authenticating the UE based on the second ciphering result includes:
the MME of the L TE-U network integrally encrypts the second random number and the third random number through the stored first basic key to obtain a fourth encryption result;
the MME of the L TE-U network determines that the UE is authenticated if the second ciphering result and the fourth ciphering result are equal.
8. The method of claim 1, wherein the authentication vector comprises a first basic key, expected reply information, a first random number and an authentication flag AUTN, and the first basic key is a key corresponding to the L TE-U network;
the interacting with the UE and the MME of the L TE-U network based on the authentication vector to enable network authentication between the UE and the L TE network and between the UE and the L TE-U network comprises:
the MME of the L TE network stores the expected reply information and sends the first basic key, the expected reply information, the first random number and the AUTN to the MME of the L TE-U network;
when the MME of the L TE-U network receives the first basic key, the expected reply information, the first random number and the AUTN, storing the first basic key and the expected reply information, generating a first encryption result based on the first basic key, and sending the first random number, the AUTN, the network identifier of the L TE-U network and the first encryption result to the UE;
when the UE receives the first random number, the AUTN, the L TE-U network identification, and the first ciphering result, authenticating the L TE network based on the first random number and the AUTN, and authenticating the L TE-U network based on the first random number, the AUTN, the L TE-U network identification, and the first ciphering result;
generating reply information and generating a second encryption result based on the first random number, the AUTN, and a network identification of the L TE-U network when the UE determines that both the L TE network and the L TE-U network are verified;
the UE sends the second encryption result and the reply information to an MME of the L TE-U network and sends the reply information to an MME of the L TE network;
authenticating the UE based on the reply information and the second ciphering result when the MME of the L TE-U network receives the second ciphering result and the reply information, and authenticating the UE based on the expected reply information and the reply information when the MME of the L TE network receives the reply information.
9. The method of claim 2 or 8, wherein the AUTN comprises a MAC;
the generating a first encryption result based on the first base key comprises:
and the MME of the L TE-U network encrypts the MAC through the first basic key to obtain the first encryption result.
10. The method of claim 9, wherein the UE authenticating the L TE-U network based on the first nonce, the AUTN, the L TE-U network's network identification, and the first ciphering result, comprising:
the UE generates a second basic key according to the network identifier of the L TE-U network, the first random number and the AUTN;
the UE encrypts the MAC through the second basic key to obtain a fifth encryption result;
if the first encryption result is equal to the fifth encryption result, the UE determines that the L TE-U network is authenticated.
11. The method of claim 10, wherein the generating a second encryption result based on the first random number, the AUTN, and a network identification of the L TE-U network comprises:
the UE encrypts the reply information through the second basic key to obtain a second encryption result;
accordingly, the L MME of the TE-U network authenticating the UE based on the second ciphering result includes:
the MME of the L TE-U network encrypts the reply information through the stored first basic key to obtain a sixth encryption result;
if the expected reply information stored by the MME of the L TE-U network is the same as the reply information and the sixth encryption result is equal to the second encryption result, the MME of the L TE-U network determines that the UE is authenticated.
12. The method of claim 1, wherein the second attach request carries a security algorithm of the UE, the authentication vector includes a third basic key, expected reply information, a first random number, and an authentication flag AUTN, and the third basic key is a key corresponding to the L TE network;
the interacting with the UE and the MME of the L TE-U network based on the authentication vector to realize network authentication comprises:
the MME of the L TE network interacting with the UE based on the third base key, the expected reply information, the first random number, and the AUTN to enable authentication of the UE to the L TE network and authentication of the UE to the MME of the L TE network;
generating a second random number when the MME of the L TE network determines that the authentication of the UE passes, and generating a first basic key based on the network identification of the L TE-U network and the third basic key;
the MME of the L TE network generates a non-access stratum (NAS) key based on the security algorithm of the UE, and encrypts the second random number through the NAS key to obtain a seventh encryption result;
the MME of the L TE network sending the first base key, the third base key, the NAS key, the network identification of the L TE-U network, the second random number, and the seventh ciphering result to the MME of the L TE-U network;
the MME of the L TE-U network encrypts the second random number through the first basic key to obtain an eighth encryption result, and sends the third basic key, the NAS key, the network identifier of the L TE-U network, the seventh encryption result and the eighth encryption result to the UE;
the UE generates a second basic key based on the third basic key and the network identifier of the L TE-U network, decrypts the eighth encryption result through the second basic key to obtain a first decryption result, and decrypts a seventh encryption result through the NAS key to obtain a second decryption result;
if the first decryption result and the second decryption result are the same, the UE determines that the L TE-U network is authenticated.
13. A network authentication system, the system comprising:
the mobile management entity MME of the unlicensed L TE-U network based on the long term evolution is used for adding a network identifier of the L TE-U network in a first attachment request to generate a second attachment request when the first attachment request is received from user equipment UE, and sending the second attachment request to the MME of the L TE network;
the MME of the L TE network is configured to send, when the second attach request is received, an authentication data request to a home subscriber server HSS based on the second attach request, where the authentication data request carries a network identifier of the L TE-U network and a network identifier of the L TE network;
the HSS to, upon receiving the authentication data request, generate an authentication vector based on a network identification of the L TE-U network and a network identification of the L TE network and send the authentication vector to an MME of the L TE network, the authentication vector including parameters for authenticating the UE, the L TE-U network, and the L TE network;
the MME of the L TE network, configured to interact with the UE and the MME of the L TE-U network based on the authentication vector when receiving the authentication vector, to implement network authentication between the UE and the L TE network and network authentication between the UE and the L TE-U network.
14. The system of claim 13, wherein the authentication vector comprises a first basic key, expected reply information, a first random number and an authentication flag AUTN, the first basic key being a key corresponding to the L TE-U network;
the MME of the L TE network is specifically configured to store the expected reply information, and send the first random number, the AUTN, the network identifier of the L TE-U network, and a first encryption result to the UE through the MME of the L TE-U network, where the first encryption result is generated by the MME of the L TE-U network based on the first basic key;
the UE is configured to authenticate the L TE network based on the first random number and the AUTN and authenticate the L TE-U network based on the first random number, the AUTN, a network identification of the L TE-U network, and the first ciphering result when the first random number, the AUTN, the network identification of the L TE-U network, and the first ciphering result are received;
the UE is further configured to generate reply information and generate a second encryption result based on the first random number, the AUTN, and the network identification of the L TE-U network when it is determined that both the L TE network and the L TE-U network are verified;
the UE is further configured to send the second encryption result to the MME of the L TE-U network and send the reply information to the MME of the L TE network;
the MME of the L TE-U network is configured to authenticate the UE based on the second ciphering result when the second ciphering result is received, and to authenticate the UE based on the expected reply information and the reply information when the MME of the L TE network receives the reply information.
15. The system of claim 14, wherein the MME of the L TE network is specifically configured to:
storing the expected reply information, and sending the first basic key, the first random number and the AUTN to an MME of the L TE-U network;
the MME of the L TE-U network is further configured to, when receiving the first basic key, the first random number, and the AUTN, store the first basic key, generate a first encryption result based on the first basic key, and send the first random number, the AUTN, the network identifier of the L TE-U network, and the first encryption result to the UE.
16. The system of claim 15, wherein the MME of the L TE-U network is specifically configured to:
generating a second random number, and encrypting the second random number through the first basic key to obtain the first encryption result;
and sending the first random number, the AUTN, the network identifier of the L TE-U network, the first encryption result and the second random number to the UE.
17. The system of claim 15 or 16, wherein the AUTN comprises a message authentication code MAC;
the UE is specifically configured to:
generating an expected message authentication code (XMAC) based on the first random number and other parameters except the MAC in the AUTN;
if the XMAC and the MAC are the same, the authentication to the L TE network passes.
18. The system of claim 16, wherein the UE is specifically configured to:
generating a second basic key according to the network identifier of the L TE-U network, the first random number and the AUTN;
encrypting the second random number through the second basic key to obtain a third encryption result;
determining that the L TE-U network is authenticated if the first encryption result is equal to the third encryption result.
19. The system of claim 18, wherein the UE is specifically configured to:
generating a third random number, and integrally encrypting the second random number and the third random number through the second basic key to obtain a second encryption result;
sending the second encryption result and the third random number to an MME of the L TE-U network;
correspondingly, the MME of the L TE-U network is specifically configured to:
integrally encrypting the second random number and the third random number through the stored first basic key to obtain a fourth encryption result;
and if the second encryption result and the fourth encryption result are equal, determining that the UE is verified.
20. The system of claim 14, wherein the authentication vector comprises a first basic key, expected reply information, a first random number and an authentication flag AUTN, and the first basic key is a key corresponding to the L TE-U network;
the MME of the L TE network is used for storing the expected reply information and sending the first basic key, the expected reply information, the first random number and the AUTN to the MME of the L TE-U network;
the MME of the L TE-U network is configured to, when receiving the first basic key, the expected reply information, the first random number, and the AUTN, store the first basic key and the expected reply information, generate a first encryption result based on the first basic key, and send the first random number, the AUTN, the network identifier of the L TE-U network, and the first encryption result to the UE;
the UE is configured to authenticate the L TE network based on the first random number and the AUTN and authenticate the L TE-U network based on the first random number, the AUTN, a network identification of the L TE-U network, and the first ciphering result when the first random number, the AUTN, the network identification of the L TE-U network, and the first ciphering result are received;
the UE is further configured to generate reply information and generate a second encryption result based on the first random number, the AUTN, and the network identification of the L TE-U network when it is determined that both the L TE network and the L TE-U network are verified;
the UE is further configured to send the second encryption result and the reply information to an MME of the L TE-U network and send the reply information to an MME of the L TE network;
the MME of the L TE-U network is further to authenticate the UE based on the reply information and the second ciphering result when the second ciphering result and the reply information are received;
the MME of the L TE network is further to authenticate the UE based on the expected reply information and the reply information when the reply information is received.
21. The system of claim 14 or 20, wherein the AUTN comprises a MAC;
the MME of the L TE-U network is specifically configured to:
and encrypting the MAC through the first basic key to obtain the first encryption result.
22. The system of claim 21, wherein the UE is specifically configured to:
generating a second basic key according to the network identifier of the L TE-U network, the first random number and the AUTN;
encrypting the MAC through the second basic key to obtain a fifth encryption result;
determining that the L TE-U network is authenticated if the first encryption result is equal to the fifth encryption result.
23. The system of claim 22, wherein the UE is specifically configured to:
encrypting the reply information through the second basic key to obtain a second encryption result;
correspondingly, the MME of the L TE-U network is specifically configured to:
encrypting the reply information through the stored first basic key to obtain a sixth encryption result;
determining that authentication of the UE is passed if the expected reply information stored by the MME of the L TE-U network is the same as the reply information and the sixth encryption result is equal to the second encryption result.
24. The system according to claim 13, wherein the second attach request carries a security algorithm of the UE, the authentication vector includes a third basic key, expected reply information, a first random number, and an authentication token AUTN, and the third basic key is a key corresponding to the L TE network;
the MME of the L TE network is specifically configured to interact with the UE based on the third basic key, the expected reply information, the first random number, and the AUTN to implement authentication of the UE to the L TE network and authentication of the UE to the MME of the L TE network;
the MME of the L TE network is further to generate a second random number when authentication of the UE is determined to be passed, and generate a first base key based on the network identification of the L TE-U network and the third base key;
the MME of the L TE network is further configured to generate a non-access stratum NAS key based on the security algorithm of the UE, and encrypt the second random number by using the NAS key to obtain a seventh encryption result;
the MME of the L TE network is further to send the first base key, the third base key, the NAS key, the network identification of the L TE-U network, the second random number, and the seventh ciphering result to the MME of the L TE-U network;
the MME of the L TE-U network is specifically configured to encrypt the second random number by using the first basic key to obtain an eighth encryption result, and send the third basic key, the NAS key, the network identifier of the L TE-U network, the seventh encryption result, and the eighth encryption result to the UE;
the UE is specifically configured to generate a second basic key based on the third basic key and the network identifier of the L TE-U network, decrypt the eighth encryption result by using the second basic key to obtain a first decryption result, and decrypt the seventh encryption result by using the NAS key to obtain a second decryption result;
the UE is further configured to determine that the L TE-U network is authenticated if the first decryption result and the second decryption result are the same.
CN201710510229.3A 2017-06-28 2017-06-28 A kind of network authentication method and system Expired - Fee Related CN109151816B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710510229.3A CN109151816B (en) 2017-06-28 2017-06-28 A kind of network authentication method and system
PCT/CN2018/093319 WO2019001509A1 (en) 2017-06-28 2018-06-28 Network authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710510229.3A CN109151816B (en) 2017-06-28 2017-06-28 A kind of network authentication method and system

Publications (2)

Publication Number Publication Date
CN109151816A CN109151816A (en) 2019-01-04
CN109151816B true CN109151816B (en) 2020-08-07

Family

ID=64741115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710510229.3A Expired - Fee Related CN109151816B (en) 2017-06-28 2017-06-28 A kind of network authentication method and system

Country Status (2)

Country Link
CN (1) CN109151816B (en)
WO (1) WO2019001509A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016074707A1 (en) * 2014-11-12 2016-05-19 Nokia Solutions And Networks Oy Method, apparatus and system
WO2016136647A1 (en) * 2015-02-25 2016-09-01 京セラ株式会社 Network device and user terminal
CN106465242A (en) * 2014-05-06 2017-02-22 高通股份有限公司 Techniques for network selection in unlicensed frequency bands
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9942762B2 (en) * 2014-03-28 2018-04-10 Qualcomm Incorporated Provisioning credentials in wireless communications
CN106455065A (en) * 2015-08-06 2017-02-22 阿尔卡特朗讯 Method and device to control the use of unauthorized frequency band
CN106888482B (en) * 2015-12-15 2020-04-07 展讯通信(上海)有限公司 Terminal, LTE-U base station and communication method thereof
CN106851662B (en) * 2017-01-18 2019-11-19 京信通信系统(中国)有限公司 A kind of unlicensed spectrum resource allocation methods and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106465242A (en) * 2014-05-06 2017-02-22 高通股份有限公司 Techniques for network selection in unlicensed frequency bands
WO2016074707A1 (en) * 2014-11-12 2016-05-19 Nokia Solutions And Networks Oy Method, apparatus and system
WO2016136647A1 (en) * 2015-02-25 2016-09-01 京セラ株式会社 Network device and user terminal
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal

Also Published As

Publication number Publication date
CN109151816A (en) 2019-01-04
WO2019001509A1 (en) 2019-01-03

Similar Documents

Publication Publication Date Title
US10601594B2 (en) End-to-end service layer authentication
US20230007475A1 (en) Method for Performing Verification by Using Shared Key, Method for Performing Verification by Using Public Key and Private Key, and Apparatus
US10638321B2 (en) Wireless network connection method and apparatus, and storage medium
US11212676B2 (en) User identity privacy protection in public wireless local access network, WLAN, access
KR102024653B1 (en) Access Methods, Devices, and Systems for User Equipment (UE)
US10003966B2 (en) Key configuration method and apparatus
EP3605942B1 (en) Key agreement for wireless communication
CN105723648B (en) A kind of cipher key configuration mthods, systems and devices
US10305684B2 (en) Secure connection method for network device, related apparatus, and system
WO2018201946A1 (en) Anchor key generation method, device and system
WO2018076740A1 (en) Data transmission method and related device
CN114363890B (en) Extended universal boot architecture authentication method, device and storage medium
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
CN103188229A (en) Method and equipment for secure content access
WO2020188988A1 (en) Control device, wireless communication system, control method, and recording medium in which program is recorded
CN107820242A (en) A kind of machinery of consultation of authentication mechanism and device
CN107950003A (en) Dual user certification
WO2018076298A1 (en) Security capability negotiation method and related device
CN109151816B (en) A kind of network authentication method and system
WO2019024937A1 (en) Key negotiation method, apparatus and system
CN105721403B (en) For providing the method, equipment and system of wireless network resource
CN118160338A (en) Secure information push for service applications in communication networks
CN116137711A (en) A user privacy protection method, device and system
CN117135634A (en) Wireless network access method, device, system, storage medium and electronic equipment
CN117098111A (en) Registration method and device of user equipment, computer readable medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200807

Termination date: 20210628