[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20200228327A1 - Apparatus, system and method for secure direct communication in proximity based services - Google Patents

Apparatus, system and method for secure direct communication in proximity based services Download PDF

Info

Publication number
US20200228327A1
US20200228327A1 US16/818,905 US202016818905A US2020228327A1 US 20200228327 A1 US20200228327 A1 US 20200228327A1 US 202016818905 A US202016818905 A US 202016818905A US 2020228327 A1 US2020228327 A1 US 2020228327A1
Authority
US
United States
Prior art keywords
ues
key
direct communication
keys
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/818,905
Inventor
Xiaowei Zhang
Anand Raghawa Prasad
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to US16/818,905 priority Critical patent/US20200228327A1/en
Publication of US20200228327A1 publication Critical patent/US20200228327A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/04031
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present invention relates to an apparatus, a system and a method for ProSe (Proximity based Services).
  • this invention relates to security for direct communication in ProSe, and considers network authorized direct communication.
  • this invention relates to proximity direct communication using PM (Public-Key Infrastructure), and considers not only one-to-one direct communication, but also one-to-many direct communication.
  • PM Public-Key Infrastructure
  • the interface PC5 is a reference point between UEs (more than one article of User Equipment) such that the UEs can have direct communication thereover.
  • the interface PC5 is used for control and user plane for ProSe discovery, direct communication and UE relay.
  • the UE direct communication can be carried either directly or via LTE-Uu.
  • an exemplary object of the present invention is to provide a solution for effectively ensuring security for direct communication in ProSe.
  • a UE includes: acquisition means for acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are in proximity to the UE and allowed to communicate with the UE; and derivation means for deriving, by use of one of the root keys, a pair of session keys for securely conducting direct communication with one of the different UEs.
  • a node supports direct communication between UEs being in proximity to each other and allowed to communicate with each other.
  • This node includes: acquisition means for acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and distribution means for distributing the root keys to said one of the UEs.
  • a server includes: storage means for storing root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and response means for responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
  • a communication system includes: a plurality of UEs that are in proximity to each other and allowed to conduct direct communication with each other; a node that supports the direct communication; and a server that manages root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs.
  • the node acquires the root keys from the server upon successfully registering each of the UEs with the node, and distributes the acquired root keys to each of the UEs.
  • Each of the UEs derives the session keys by using one of the distributed root keys.
  • a method provides a method of controlling operations in a UE.
  • This method includes: acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are in proximity to the UE and allowed to communicate with the UE; and deriving, by use of one of the root keys, a pair of session keys for securely conducting direct communication with one of the different UEs.
  • a method provides a method of controlling operations in a node that supports direct communication between UEs being in proximity to each other and allowed to communicate with each other.
  • This method includes: acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and distributing the root keys to said one of the UEs.
  • a method according to seventh exemplary aspect of the present invention provides a method of controlling operations in a server. This method includes: storing root keys for each of UEs to derive a pair of session key for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
  • a UE includes: first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and second means for verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
  • a UE includes: first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and second means for verifying, by using a public key of a first UE among the different UEs, a response to a protected first request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
  • a node supports direct communication between UEs in proximity to each other and allowed to communicate with each other.
  • This node includes: reception means for receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and transmission means for transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration.
  • the public keys are used for each of the UEs to verify at least a request for the direct communication.
  • a server includes: storage means for storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and response means for responding to a request from the node with sending the stored public keys to the node.
  • the public keys are used for each of the UEs to verify at least a request for the direct communication.
  • a communication system includes: a plurality of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other; and a node that supports the direct communication.
  • Each of the UEs shares public keys of the UEs through the node upon successfully registering each of the UEs with the node, and verifies at least a request for the direct communication by using one of the public keys.
  • the node receives each of the public keys from each of the UEs upon registering each of the UEs with the node, and transmits, to each of the UEs, the public keys of different UEs as a response to the successful registration.
  • a method provides a method of controlling operations in a UE.
  • This method includes: registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
  • a method according to fourteenth exemplary aspect of the present invention provides a method of controlling operations in a UE.
  • This method includes: registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and verifying, by using a public key of a first UE among the different UEs, a response to a protected request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
  • a method provides a method of controlling a node that supports direct communication between UEs in proximity to each other and allowed to communicate with each other. This method including: receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration.
  • the public keys are used for each of the UEs to verify at least a request for the direct communication.
  • a method according to sixteenth exemplary aspect of the present invention provides a method of controlling operations in a server.
  • This method includes: storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and responding to a request from the node with sending the stored public keys to the node.
  • the public keys are used for each of the UEs to verify at least a request for the direct communication.
  • FIG. 1 is a block diagram showing a configuration example of a communication system according to a first exemplary embodiment of the present invention.
  • FIG. 2 is a sequence diagram showing an example of operations for allocating root keys in the communication system according to the first exemplary embodiment.
  • FIG. 3 is a sequence diagram showing another example of operations for allocating root keys in the communication system according to the first exemplary embodiment.
  • FIG. 4 is a sequence diagram showing an example of operations for deriving a session key in the communication system according to the e first exemplary embodiment.
  • FIG. 5 is a sequence diagram showing another example of operations for deriving a session key in the communication system according to the first exemplary embodiment.
  • FIG. 6 is a block diagram showing a configuration example of a UE according to the first exemplary embodiment.
  • FIG. 7 is a block diagram showing a configuration example of a node according to the first exemplary embodiment.
  • FIG. 8 is a block diagram showing a configuration example of a server according to the first exemplary embodiment.
  • FIG. 9 is a block diagram showing a configuration example of a communication system according to a second exemplary embodiment of the present invention.
  • FIG. 10 is a sequence diagram showing an example of operations for registering UEs in the communication system according to the second exemplary embodiment.
  • FIG. 11 is a sequence diagram showing an example of operations for deriving a session key for one-to-one direct communication in the communication system according to the second exemplary embodiment.
  • FIG. 12 is a sequence diagram showing an example of operations for deriving a session key for one-to-many direct communication in the communication system according to the second exemplary embodiment.
  • FIG. 13 is a block diagram showing a configuration example of a UE according to the second exemplary embodiment.
  • FIG. 14 is a block diagram showing a configuration example of a node according to the second exemplary embodiment.
  • FIG. 15 is a block diagram showing a configuration example of a server according to the second exemplary embodiment.
  • FIG. 1 shows a configuration example of a communication system for proximity service.
  • Proximity service provides operator network controlled discovery and communications between UEs that are in proximity, for both commercial/social use and public safety use. It is required that the ProSe service should be provided to UEs with or without network coverage.
  • the communication system includes a plurality of UEs 10 _ 1 to 10 _ m (hereinafter may be collectively referred to by a code 10 ), one or more ProSe Functions 20 _ 1 to 20 _ n (hereinafter may be collectively referred to by a code 20 ), an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) 30 , an EPC (Evolved Packet Core) 40 , and a ProSe APP (Application) Server 50 .
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • EPC Evolved Packet Core
  • ProSe APP Application
  • the UE 10 attaches to the EPC 40 thorough the E-UTRAN 30 (i.e., through interfaces LTE-Uu and S1), thereby functioning as a typical UE. Moreover, the UE 10 uses the above-mentioned interface PC5, thereby conducting ProSe communication. Prior to the ProSe communication, the UE 10 is registered with the ProSe Function 20 . Note that the UEs 10 _ 1 to 10 _ m may be registered with the same ProSe Function or mutually different ProSe Functions. Moreover, some of the UEs 10 _ 1 to 10 _ m may be registered with the same ProSe Function.
  • the ProSe Function 20 is a node which supports the ProSe communication between the UEs 10 _ 1 to 10 _ m .
  • the ProSe Function 20 can either be deployed in a certain network node or be an independent node, and may reside in or out of the EPC 40 .
  • the ProSe Function 20 communicates with the UE 10 through an interface PC3. Further, the ProSe Function 20 communicates with the EPC 40 through an interface PC4. Furthermore, the ProSe Functions 20 _ 1 to 20 _ n can communicate with each other through an interface PC6.
  • the interface PC3 is a reference point between the UE 10 and the ProSe Function 20 .
  • the interface PC3 is used to define the interaction between the UE 10 and the ProSe Function 20 .
  • An example may be to use for configuration for Prose discovery and communication.
  • the interface PC4 is a reference point between the EPC 40 and the ProSe Function 20 .
  • the interface PC4 is used to define the interaction between the EPC 40 and the ProSe Function 20 . Possible use cases may be when setting up a one-to-one communication path between the UEs 10 _ 1 to 10 _ m , or when validating ProSe services (authorization) for session management or mobility management in real time.
  • the interface PC6 is a reference point between the ProSe Functions 20 _ 1 to 20 _ n .
  • the interface PC6 may be used for functions such as ProSe discovery between users subscribed to different PLMNs (Public Land Mobile Networks).
  • PLMNs Public Land Mobile Networks
  • the E-UTRAN 30 is formed by one or more eNBs (evolved Node Bs) (not shown).
  • the EPC 40 includes, as its network nodes, an MME (Mobility Management Entity) which manages mobility of the UEs 10 _ 1 to 10 _ m , and the like.
  • the ProSe APP Server 50 can communicate with the EPC 40 through an interface SGi.
  • the ProSe APP Server 50 can communicate with the UE 10 through an interface PC1, and can communicate with the ProSe Function 20 through an interface PC2.
  • the interface PC1 is a reference point between ProSe APPs in the UEs 10 _ 1 to 10 _ m and the ProSe APP Server 50 .
  • the interface PC1 is used to define application level signaling requirements.
  • the interface PC2 is a reference point between the ProSe Function 20 and the ProSe APP Server 50 .
  • the interface PC2 is used to define the interaction between the ProSe APP Server 50 and ProSe functionality provided by the 3GPP EPS (Evolved Packet System) via the ProSe Function 20 .
  • 3GPP EPS Evolved Packet System
  • One example may be for application data updates for a ProSe database in the ProSe Function 20 .
  • Another example may be data for use by the ProSe App Server 50 in interworking between 3GPP functionality and application data, e.g. name translation.
  • the ProSe APP Server 50 may reside in or out of the EPC 40 .
  • the communication system also includes a server operated by a trust third party.
  • this server will be sometimes simply referred to as “third (3rd) party” and referred to by a code 60 .
  • the 3rd party 60 manages root keys which will be described later.
  • This exemplary embodiment proposes to use the third party 60 to derive, update and allocate root keys.
  • the ProSe Function 20 supports direct communication and allocates all the root keys to the UE 10 at its registration.
  • Session key are derived at the UE 10 side by using the root key.
  • the session key is a pair of confidentiality and integrity keys for protecting messages directly transferred between the UEs 10 _ 1 to 10 _ m.
  • Root key is derived/allocated at registration. Assume that the ProSe Function 20 has a list of UEs with which the UE 10 _ 1 is allowed to communicate, and that the ProSe Function 20 can ask for all the root keys for the UE 10 _ 1 from the trust 3rd party 60 . The 3rd party 60 is responsible for key derivation and allocation. The ProSe Functions 20 _ 1 to 20 _ n can retrieve root keys from the 3rd party 60 for the UEs 10 _ 1 to 10 _ m registered to them such that no synchronization is needed between the ProSe Functions 20 _ 1 to 20 _ n . Each root key is identified by a unique KSI (Key Set Identifier). When direct communication happens, the ProSe Function 20 can indicate to the UEs 10 _ 1 to 10 _ m which KSI to use, or the UEs 10 _ 1 to 10 _ m can negotiate about it.
  • KSI Key Set Identifier
  • the UE 10 _ 1 registers at the ProSe Function 20 _ 1 (step S 11 ).
  • the ProSe Function 20 _ 1 sends Request root keys for the UE 10 _ 1 to the third party 60 which manages the root key (step S 12 ).
  • the third party 60 responds the ProSe Function 20 _ 1 with the root keys for the UE 10 _ 1 .
  • Each root key is related to a unique KSI and a UE with which the UE 10 _ 1 is allowed to have ProSe service (step S 13 ).
  • the ProSe Function 20 _ 1 distributes the root keys to the UE 10 _ 1 , including the UE ID and KSI (step S 14 ).
  • steps S 11 to S 14 The same procedure as steps S 11 to S 14 is performed between the UE 10 _ 2 and the ProSe Function 20 _ 2 (steps S 15 to S 18 ).
  • UEs can obtain a key pool, in which each key has a unique KSI to identify it.
  • network Prose Function
  • the difference compared to the Option 1 is that here the root keys are not related to any UE.
  • the ProSe Function 20 needs to ensure that the same root key will not be re-used for different UEs.
  • the UE 10 _ 1 registers at the ProSe Function 20 _ 1 (step S 21 ).
  • the ProSe Function 20 _ 1 sends Request root keys for the UE 10 _ 1 to the third party 60 which manages the root key (step S 22 ).
  • the third party 60 responds the ProSe Function 20 _ 1 with a root key pool contain a bunch of root keys. Each key is related to a unique KSI (step S 23 ).
  • the ProSe Function 20 _ 1 distributes the root keys to the UE 10 _ 1 with the KSIs (step S 24 ).
  • steps S 21 to S 24 The same procedure as steps S 21 to S 24 is performed between the UE 10 _ 2 and the ProSe Function 20 _ 2 (steps S 25 to S 28 ).
  • this Option 2 it is possible to reduce the amount of signaling to the UE compared with the Option 1. This is because the root keys are not related to any UE, and thus the number of root keys transmitted to the UE can be smaller than that in the Option 1. Moreover, it is also possible to reduce resources in the UE for storing the root keys.
  • the Option 1 it is possible to reduce load on the ProSe Function compared with the Option 2. This is because the root keys are allocated to the UEs in a one-to-one manner, and thus the ProSe Function does not need to ensure that the same root key will not be re-used for different UEs.
  • Option 1 UE Autonomously Derives Session Key
  • the UE 10 _ 1 one which initiates direct communication, simply derives a session key, sends it to the ProSe Function, and the ProSe Function will send it to the other UEs.
  • the UE 10 _ 1 send Direct Communication request to the UE 10 _ 2 (step S 31 ).
  • the UEs 10 _ 1 and 10 _ 2 can identify the same root key to be used for deriving a session key, without receiving any instruction from network. Therefore, the UEs 10 _ 1 and 10 _ 2 derive the session key from the identified root key, separately (step S 32 ).
  • the UE 10 _ 1 and UE 10 _ 2 start direct communication with security protection by using the session key (step S 33 ).
  • Option 2 UE Derives Session Key in Accordance with KSI Indicated by ProSe Function
  • This option is suitable for the case where the root key pool is allocated as shown in FIG. 3 .
  • the UE 10 _ 1 sends Direct Communication request with an ID of the UE 10 _ 2 (UE with which the UE 10 _ 1 wants to have direct communication service) to the ProSe Function 20 _ 1 (step S 41 ).
  • the ProSe Function 20 _ 1 performs authorization for whether the UE 10 _ 1 is allowed to have direct communication with the UE 10 _ 2 (step S 42 ).
  • the ProSe Function 20 _ 1 Upon a successful authorization, the ProSe Function 20 _ 1 indicates to the UE 10 _ 1 a root key KSI (step S 43 ).
  • the ProSe Function 20 _ 1 indicates to the UE 10 _ 2 the root key KSI via the ProSe Function 20 _ 2 (step S 44 ).
  • the UE 10 _ 1 and the UE 10 _ 2 derives a session key from the root key indicated by the KSI, separately (step S 45 ).
  • the UE 10 _ 1 and the UE 10 _ 2 start direct communication with security protection by using the session key (step S 46 ).
  • the UE 10 includes an acquisition unit 11 and a derivation unit 12 .
  • the acquisition unit 11 acquires the root keys from the ProSe Function 20 , upon successfully registering the UE 10 with the ProSe Function 20 .
  • the derivation unit 12 drives the session keys by using the acquired root key.
  • each root key is related to a given UE as shown in FIG. 2
  • the derivation unit 12 uses a root key corresponding to a UE with which the UE 10 desires to conduct direct communication, upon deriving the session keys.
  • the derivation unit 12 uses a root key which is indicated by the KSI received from the ProSe Function 20 .
  • these units 11 and 12 are mutually connected with each other through a bus or the like.
  • These units 11 and 12 can be configured by, for example, a transceiver which conducts direct communication with different UEs through the interface PC5, a transceiver which conducts communication with the ProSe Function 20 through the interface PC3, and a controller such as a CPU (Central Processing Unit) which controls these transceivers.
  • a transceiver which conducts direct communication with different UEs through the interface PC5
  • a transceiver which conducts communication with the ProSe Function 20 through the interface PC3
  • a controller such as a CPU (Central Processing Unit) which controls these transceivers.
  • CPU Central Processing Unit
  • the ProSe Function 20 includes an acquisition unit 21 and a distribution unit 22 .
  • the acquisition unit 21 acquires the root keys from the 3rd party 60 , upon successfully registering the UE 10 with the ProSe Function 20 .
  • the distribution unit 22 distributes the acquired root keys to the UE 10 .
  • the ProSe Function 20 further includes an indication unit 23 .
  • the indication unit 23 indicates to the UE 10 the KSI of the root key to be used by the UE 10 .
  • these units 21 to 23 are mutually connected with each other through a bus or the like.
  • These units 21 to 23 can be configured by, for example, a transceiver which conducts communication with the UE 10 through the interface PC3, and a controller such as a CPU which controls this transceiver.
  • the 3rd party 60 includes a storage unit 61 and a response unit 62 .
  • the storage unit 61 stores the root keys.
  • the response unit 62 responds to the request from the ProSe Function 20 with sending the root keys to the ProSe Function 20 .
  • these units 61 and 62 are mutually connected with each other through a bus or the like.
  • These units 61 and 62 can be configured by, for example, a transceiver which conducts communication with the ProSe Function 20 , and a controller such as a CPU which controls this transceiver.
  • FIG. 9 shows a configuration example of a communication system for proximity service.
  • Proximity service provides operator network controlled discovery and communications between UEs that are in proximity, for both commercial/social use and public safety use. It is required that the ProSe service should be provided to UEs with or without network coverage.
  • the communication system includes a plurality of UEs 110 _ 1 to 110 _ m (hereinafter may be collectively referred to by a code 110 ), one or more ProSe Functions 120 _ 1 to 120 _ n (hereinafter may be collectively referred to by a code 120 ), an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) 130 , an EPC (Evolved Packet Core) 140 , and a ProSe APP (Application) Server 150 .
  • a code 110 includes a plurality of UEs 110 _ 1 to 110 _ m (hereinafter may be collectively referred to by a code 110 ), one or more ProSe Functions 120 _ 1 to 120 _ n (hereinafter may be collectively referred to by a code 120 ), an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) 130 , an EPC (Evolved Packet Core) 140 , and a ProSe APP
  • the UE 110 attaches to the EPC 140 thorough the E-UTRAN 130 (i.e., through interfaces LTE-Uu and S1), thereby functioning as a typical UE. Moreover, the UE 110 uses the above-mentioned interface PC5, thereby conducting ProSe communication. Prior to the ProSe communication, the UE 110 is registered with the ProSe Function 120 . Note that the UEs 110 _ 1 to 110 _ m may be registered with the same ProSe Function or mutually different ProSe Functions. Moreover, some of the UEs 110 _ 1 to 110 _ m may be registered with the same ProSe Function.
  • the ProSe Function 120 is a node which supports the ProSe communication between the UEs 110 _ 1 to 110 _ m .
  • the ProSe Function 120 can be either deployed in a certain network node or be an independent node, and may reside in or out of the EPC 140 .
  • the ProSe Function 120 communicates with the UE 110 through an interface PC3. Further, the ProSe Function 120 communicates with the EPC 140 through an interface PC4. Furthermore, the ProSe Functions 120 _ 1 to 120 _ n can communicate with each other through an interface PC6.
  • the interface PC3 is a reference point between the UE 110 and the ProSe Function 120 .
  • the interface PC3 is used to define the interaction between the UE 110 and the ProSe Function 120 .
  • An example may be to use for configuration for Prose discovery and communication.
  • the interface PC4 is a reference point between the EPC 140 and the ProSe Function 120 .
  • the interface PC4 is used to define the interaction between the EPC 140 and the ProSe Function 120 . Possible use cases may be when setting up a one-to-one communication path between the UEs 110 _ 1 to 110 _ m , or when validating ProSe services (authorization) for session management or mobility management in real time.
  • the interface PC6 is a reference point between the ProSe Functions 120 _ 1 to 120 _ n .
  • the interface PC6 may be used for functions such as ProSe discovery between users subscribed to different PLMNs (Public Land Mobile Networks).
  • PLMNs Public Land Mobile Networks
  • the E-UTRAN 130 is formed by one or more eNBs (not shown).
  • the EPC 140 includes, as its network nodes, an MME (Mobility Management Entity) which manages mobility of the UEs 110 _ 1 to 110 _ m , and the like.
  • the ProSe APP Server 150 can communicate with the EPC 140 through an interface SGi.
  • the ProSe APP Server 150 can communicate with the UE 110 through an interface PC1, and can communicate with the ProSe Function 120 through an interface PC2.
  • the interface PC1 is a reference point between ProSe APPs in the UEs 110 _ 1 to 110 _ m and the ProSe APP Server 150 .
  • the interface PC1 is used to define application level signaling requirements.
  • the interface PC2 is a reference point between the ProSe Function 120 and the ProSe APP Server 150 .
  • the interface PC2 is used to define the interaction between the ProSe APP Server 150 and ProSe functionality provided by the 3GPP EPS (Evolved Packet System) via the ProSe Function 120 .
  • 3GPP EPS Evolved Packet System
  • One example may be for application data updates for a ProSe database in the ProSe Function 120 .
  • Another example may be data for use by the ProSe App Server 150 in interworking between 3GPP functionality and application data, e.g. name translation.
  • the ProSe APP Server 150 may reside in or out of the EPC 140 .
  • the communication system also includes a server operated by a trust third party.
  • this server will be sometimes simply referred to as “third (3rd) party” and referred to by a code 160 .
  • the 3rd party 160 manages public keys which will be described later.
  • the UEs 110 _ 1 to 110 _ m can register their public keys at registration procedure and meanwhile obtain other UEs public keys.
  • the ProSe Function 120 ensures that the UE 110 is only provided with the public keys of UEs with which the request UE 110 is allowed to have direct communication.
  • the UEs 110 _ 1 to 110 _ m use the public key to verify the other end such that they can derive session key to start direct communication.
  • the session key is a pair of confidentiality and integrity keys for protecting messages directly transferred between the UEs 110 _ 1 to 110 _ m.
  • the UEs 110 _ 1 to 110 _ m provide their public key at registration and receive other UEs public keys at a successful registration.
  • the UE 110 _ 1 protects Direct Communication Request with its private key.
  • the UE 110 _ 2 which has received the Direct Communication Request, can verify it with UE1's public key.
  • the UE 110 _ 2 can send material for session key derivation to the UE 110 _ 1 and they can derive the same key for protection their direct communication.
  • the UE 110 _ 1 can verify the message sent from the UE 110 _ 2 with UE2's public key, thus they can be mutually authenticated.
  • the session key derivation can:
  • the UE 110 _ 1 registers its public key during registration to the ProSe Function 120 _ 1 (step S 111 ).
  • the Prose Function 120 _ 1 registers the public key of the UE 110 _ 1 in the third party 160 (step S 112 ).
  • the third party 160 sends to the Prose Function 120 _ 1 an allowed list.
  • the allowed list contains IDs of UEs with which the UE 110 _ 1 is allowed to have direct communication, and the related public keys of those UEs (step S 113 ).
  • the Prose Function 120 _ 1 forwards the allowed list to the UE 110 _ 1 (step S 114 ).
  • steps S 111 to S 114 are performed for the UE 110 _ 2 (steps S 115 to S 118 ).
  • the UE 110 _ 1 sends Direct Communication Request to the Prose Function 120 _ 1 , with the ID of the UE 110 _ 2 , a public key KSI of the UE 110 _ 1 .
  • the message can be protected with a private key of the UE 110 _ 1 .
  • the message is forwarded to the Prose Function 120 _ 2 by the Prose Function 120 _ 1 (step S 121 ).
  • KSI is suitable for a case where a plurality of public keys are allocated to the UE 110 _ 1 .
  • the UE 110 _ 2 can refer to the KSI to identify one of the public keys corresponding to the private key used by the UE 110 _ 1 .
  • the Prose Function 120 _ 1 performs authorization on whether the UE 110 _ 1 can have direct communication service with the UE 110 _ 2 , with Prose Function 120 _ 2 support (step S 122 ).
  • the Prose Function 120 _ 2 Upon successful authorization, the Prose Function 120 _ 2 forwards the Direct Communication Request to the UE 110 _ 2 (step S 123 ).
  • the Direct Communication Request goes directly from the UE 110 _ 1 to the UE 110 _ 2 , and the above step S 122 is omitted.
  • the UE 110 _ 2 can perform integrity check on the message with the public key of the UE 110 _ 1 (step S 124 ).
  • the UE 110 _ 2 Upon succeeding in the integrity check, the UE 110 _ 2 derives session key, as described above (step S 125 ).
  • the UE 110 _ 2 sends Direct Communication Response to the UE 110 _ 1 with materials for session key derivation.
  • the UE 110 _ 2 includes the derived session key in the Direct Communication Response.
  • the message is protected with a private key of the UE 110 _ 2 (step S 126 ).
  • the UE 110 _ 1 performs integrity check of the message with the public key of the UE 110 _ 2 (step S 127 ).
  • the UE 110 _ 1 Upon succeeding in the integrity check, the UE 110 _ 1 derives session key from the material (step S 128 ). This step S 128 is skipped if the UE 110 _ 1 has received the session key from the UE 110 _ 2 at step S 126 . Alternatively, the UE 110 _ 1 extracts the session key from the Direct Communication Response by using the public key of the UE 110 _ 2 .
  • Direct communication starts with security protection by the session key that the UE 110 _ 1 and the UE 110 _ 2 share (step S 129 ).
  • the registration procedure is the same with that shown in FIG. 10 .
  • the UE 110 _ 1 protects Direct Communication Request with its private key.
  • Other UEs e.g. UE 110 _ 2 , UE 110 _ 3 ) can verify it with UE1's public key.
  • the UE 110 _ 1 derives the session key for one-to-many direct communication, and sends the session key to the ProSe Function 120 along with the Direct Communication Request over secured interface PC3.
  • the ProSe Function 120 sends the session key to the UE 110 _ 2 and the UE 110 _ 3 . If the UE 110 _ 2 or the UE 110 _ 3 has registered with different ProSe Function, UE 110 _ 1 's ProSe Function will forward the session key to UE 110 _ 2 / 110 _ 3 's serving ProSe Function.
  • the session key derivation can use UE 110 _ 1 's private key or any LTE (Long Term Evolution) key as input.
  • the UE 110 _ 1 derives a session key for direct communication (step S 131 ).
  • the UE 110 _ 1 sends Direct Communication Request to the Prose Function 120 _ 1 , which can be forward to ProSe Functions which serves target UEs (e.g. ProSe Function 20 _ 2 , and UEs 110 _ 2 and 110 _ 3 ).
  • the message contains target UE IDs and UE 110 _ 1 's public key KSI, which are protected with UE 110 _ 1 's private key.
  • the UE 110 _ 1 also includes the session key in the message (step S 132 ).
  • the ProSe Functions 120 _ 1 and 120 _ 2 perform authorization on whether the UE 110 _ 1 can have one-to-many direct communication with the target UEs 110 _ 2 and 110 _ 3 (step S 133 ).
  • the ProSe Function 120 _ 2 forwards the Direct communication Request to the UEs 110 _ 2 and 110 _ 3 (step S 134 ).
  • Each of the UEs 110 _ 2 and 110 _ 3 performs integrity check on the message with UE 110 _ 1 's public key (step S 135 ).
  • Each of the UEs 110 _ 2 and 110 _ 3 sends the Direct Communication Response to the UE 110 _ 1 , protected with the session key it received (step S 136 ). After that, direct communication starts with security protection by the session key that the UEs 110 _ 1 to 110 _ 3 share.
  • the UE 110 _ 1 simply protects the Direct Communication with its private key to other UEs.
  • the other UEs who are authorized to receive the message from the UE 110 _ 1 can get the UE 110 _ 1 ′ public key and therefore verify that the message is sent from the UE 110 _ 1 and read it.
  • the network e.g. ProSe Function
  • the UEs 110 _ 1 to 110 _ m derive session key, and input for key derivation is: 1) UE 110 _ 1 ′ public key; 2) a key derivation material received from the ProSe Function 120 . Requires the UE 110 _ 1 ′ public key and key derivation material are only provided to the authorized UEs.
  • the UE 110 includes a registration/retrieval unit 111 and a verification unit 112 .
  • the registration/retrieval unit 111 performs the processes shown in FIG. 10 or processes equivalent thereto.
  • the verification unit 112 performs the processes shown in FIGS. 11 and 12 , or processes equivalent thereto.
  • these units 111 and 112 are mutually connected with each other through a bus or the like.
  • These units 111 and 112 can be configured by, for example, a transceiver which conducts direct communication with different UEs through the interface PC5, a transceiver which conducts communication with the ProSe Function 120 through the interface PC3, and a controller such as a CPU (Central Processing Unit) which controls these transceivers.
  • a transceiver which conducts direct communication with different UEs through the interface PC5
  • a transceiver which conducts communication with the ProSe Function 120 through the interface PC3
  • a controller such as a CPU (Central Processing Unit) which controls these transceivers
  • the ProSe Function 120 includes at least a reception unit 121 and a transmission unit 122 .
  • the reception unit 121 performs the processes shown at steps S 111 and S 115 in FIG. 10 , or processes equivalent thereto.
  • the transmission unit 122 performs the processes shown at steps S 114 and S 118 in FIG. 10 , or processes equivalent thereto.
  • the ProSe Function 120 can also include a registration unit 123 and an acquisition unit 124 .
  • the registration unit 123 performs the processes shown at steps S 112 and S 116 in FIG. 10 , or processes equivalent thereto.
  • the acquisition unit 124 performs the processes shown at steps S 113 and S 117 in FIG. 10 , or equivalent thereto.
  • these units 121 to 124 are mutually connected with each other through a bus or the like.
  • These units 121 to 124 can be configured by, for example, a transceiver which conducts communication with the UE 110 through the interface PC3, a transceiver which conducts communication with the 3rd party 160 , and a controller such as a CPU which controls these transceivers.
  • the 3rd party 160 includes a storage unit 161 and a response unit 162 .
  • the storage unit 161 stores the root keys registered by the ProSe Function 120 .
  • the response unit 162 responds to the request from the ProSe Function 120 with sending the stored public keys to the ProSe Function 120 .
  • these units 161 and 162 are mutually connected with each other through a bus or the like.
  • These units 161 and 162 can be configured by, for example, a transceiver which conducts communication with the ProSe Function 120 , and a controller such as a CPU which controls this transceiver.
  • a UE User Equipment comprising:
  • the UE according to any one of Supplementary notes 1 to 3, wherein the direct communication comprises ProSe (Proximity based Services) communication.
  • ProSe Proximity based Services
  • the node according to any one of Supplementary notes 4 to 7, wherein the direct communication comprises ProSe communication.
  • a server comprising:
  • a communication system comprising:
  • a method of controlling operations in a UE comprising:
  • a method of controlling operations in a server comprising:
  • a UE User Equipment comprising:
  • a UE User Equipment comprising:
  • a server comprising:
  • a communication system comprising:
  • a method of controlling operations in a UE comprising:
  • a method of controlling operations in a UE comprising:
  • a method of controlling a node that supports direct communication between UEs in proximity to each other and allowed to communicate with each other comprising:
  • a method of controlling operations in a server comprising:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A mobile communication system includes a central processing unit coupled to a memory storing instructions for executing a User Equipment (UE) implemented by a transceiver and a controller that supports Proximity Services (ProSe), and a ProSe Function that supports the ProSe and communicates with the UE via a PC3 interface. The UE sends a message for a discovery to the ProSe Function via the PC3. The ProSe Function directly sends security information to the UE via the PC3. The UE directly sends a protected message to another UE on a PC5 interface using a key based on the security information.

Description

  • The present application is a Continuation Application of U.S. patent application Ser. No. 16/204,274, filed Nov. 29, 2018, which a Continuation Application of U.S. patent application Ser. No. 15/033,278, filed on Apr. 29, 2016 (now U.S. Pat. No. 10,212,597), which is a National Stage Application under 35 U.S.C. § 371, of International Application No. PCT/JP2014/004393, filed on Aug. 27, 2014, which claims priority from Japanese Patent Application No. 2013-225200, filed on Oct. 30, 2013, and Japanese Patent Application No. 2013-226681, filed on Oct. 31, 2013, the entire contents of which are incorporated herein by reference in their entireties.
  • TECHNICAL FIELD
  • The present invention relates to an apparatus, a system and a method for ProSe (Proximity based Services). In particular, this invention relates to security for direct communication in ProSe, and considers network authorized direct communication. Moreover, this invention relates to proximity direct communication using PM (Public-Key Infrastructure), and considers not only one-to-one direct communication, but also one-to-many direct communication.
  • BACKGROUND ART
  • Direct Communication has been studied by 3GPP (3rd Generation Partnership Project) (see NPLs 1 and 2).
  • Key issue for direct communication is to secure an interface PC5. How to secure the interface PC5 and how to establish security context (including for example, key derivation, allocation, update) from trust source, with minimal signalling, are important matters.
  • Note that the interface PC5 is a reference point between UEs (more than one article of User Equipment) such that the UEs can have direct communication thereover. The interface PC5 is used for control and user plane for ProSe discovery, direct communication and UE relay. The UE direct communication can be carried either directly or via LTE-Uu.
  • CITATION LIST Non Patent Literature
    • NPL 1: 3GPP TR 33.cde, “Study on security issues to support Proximity Services (Release 12)”, V0.2.0, 2013-07, Clauses 5.4, 5.5 and 6.3, pp. 11, 12 and 13-20
    • NPL 2: 3GPP TR 23.703, “Study on architecture enhancements to support Proximity Services (ProSe) (Release 12)”, V0.4.1, 2013-06, Clauses 5.4, 5.12 and 6.2, pp. 13, 17, 18 and 62-82
    SUMMARY OF INVENTION Technical Problem
  • However, the inventors of this application have found that the current solution in 3GPP SA3 (Security working group) has the following drawbacks.
  • 1) Impact to MME (Mobility Management Entity): it needs MME being involved in the direct communication procedure including key material allocation.
  • 2) The key allocation procedure happens each time when the UE wants to have direct communication with another UE, which not only creates signaling but also when concurrent one-to-one communication happens. Therefore, the solution is not efficient.
  • Accordingly, an exemplary object of the present invention is to provide a solution for effectively ensuring security for direct communication in ProSe.
  • Solution to Problem
  • In order to achieve the above-mentioned object, a UE according to first exemplary aspect of the present invention includes: acquisition means for acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are in proximity to the UE and allowed to communicate with the UE; and derivation means for deriving, by use of one of the root keys, a pair of session keys for securely conducting direct communication with one of the different UEs.
  • Further, a node according to second exemplary aspect of the present invention supports direct communication between UEs being in proximity to each other and allowed to communicate with each other. This node includes: acquisition means for acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and distribution means for distributing the root keys to said one of the UEs.
  • Further, a server according to third exemplary aspect of the present invention includes: storage means for storing root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and response means for responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
  • Further, a communication system according to fourth exemplary aspect of the present invention includes: a plurality of UEs that are in proximity to each other and allowed to conduct direct communication with each other; a node that supports the direct communication; and a server that manages root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs. The node acquires the root keys from the server upon successfully registering each of the UEs with the node, and distributes the acquired root keys to each of the UEs. Each of the UEs derives the session keys by using one of the distributed root keys.
  • Further, a method according to fifth exemplary aspect of the present invention provides a method of controlling operations in a UE. This method includes: acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are in proximity to the UE and allowed to communicate with the UE; and deriving, by use of one of the root keys, a pair of session keys for securely conducting direct communication with one of the different UEs.
  • Further, a method according to sixth exemplary aspect of the present invention provides a method of controlling operations in a node that supports direct communication between UEs being in proximity to each other and allowed to communicate with each other. This method includes: acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and distributing the root keys to said one of the UEs.
  • Further, a method according to seventh exemplary aspect of the present invention provides a method of controlling operations in a server. This method includes: storing root keys for each of UEs to derive a pair of session key for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
  • Further, a UE according to eighth exemplary aspect of the present invention includes: first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and second means for verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
  • Further, a UE according to ninth exemplary aspect of the present invention includes: first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and second means for verifying, by using a public key of a first UE among the different UEs, a response to a protected first request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
  • Further, a node according to tenth exemplary aspect of the present invention supports direct communication between UEs in proximity to each other and allowed to communicate with each other. This node includes: reception means for receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and transmission means for transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration. The public keys are used for each of the UEs to verify at least a request for the direct communication.
  • Further, a server according to eleventh exemplary aspect of the present invention includes: storage means for storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and response means for responding to a request from the node with sending the stored public keys to the node. The public keys are used for each of the UEs to verify at least a request for the direct communication.
  • Further, a communication system according to twelfth exemplary aspect of the present invention includes: a plurality of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other; and a node that supports the direct communication. Each of the UEs shares public keys of the UEs through the node upon successfully registering each of the UEs with the node, and verifies at least a request for the direct communication by using one of the public keys. The node receives each of the public keys from each of the UEs upon registering each of the UEs with the node, and transmits, to each of the UEs, the public keys of different UEs as a response to the successful registration.
  • Further, a method according to thirteenth exemplary aspect of the present invention provides a method of controlling operations in a UE. This method includes: registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
  • Further, a method according to fourteenth exemplary aspect of the present invention provides a method of controlling operations in a UE. This method includes: registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and verifying, by using a public key of a first UE among the different UEs, a response to a protected request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
  • Further, a method according to fifteenth exemplary aspect of the present invention provides a method of controlling a node that supports direct communication between UEs in proximity to each other and allowed to communicate with each other. This method including: receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration. The public keys are used for each of the UEs to verify at least a request for the direct communication.
  • Furthermore, a method according to sixteenth exemplary aspect of the present invention provides a method of controlling operations in a server. This method includes: storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and responding to a request from the node with sending the stored public keys to the node. The public keys are used for each of the UEs to verify at least a request for the direct communication.
  • Advantageous Effects of Invention
  • According to the present invention, it is possible to solve the above-mentioned problems, and thus to provide a solution for effectively ensuring security for direct communication in ProSe.
  • For example, according to any one of first to seventh exemplary aspects, it is possible to achieve the following advantageous effects.
      • 1) Central root key management, prevent synchronization problem.
      • 2) Reduce root allocation when each time UE needs direct communication service.
    BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing a configuration example of a communication system according to a first exemplary embodiment of the present invention.
  • FIG. 2 is a sequence diagram showing an example of operations for allocating root keys in the communication system according to the first exemplary embodiment.
  • FIG. 3 is a sequence diagram showing another example of operations for allocating root keys in the communication system according to the first exemplary embodiment.
  • FIG. 4 is a sequence diagram showing an example of operations for deriving a session key in the communication system according to the e first exemplary embodiment.
  • FIG. 5 is a sequence diagram showing another example of operations for deriving a session key in the communication system according to the first exemplary embodiment.
  • FIG. 6 is a block diagram showing a configuration example of a UE according to the first exemplary embodiment.
  • FIG. 7 is a block diagram showing a configuration example of a node according to the first exemplary embodiment.
  • FIG. 8 is a block diagram showing a configuration example of a server according to the first exemplary embodiment.
  • FIG. 9 is a block diagram showing a configuration example of a communication system according to a second exemplary embodiment of the present invention.
  • FIG. 10 is a sequence diagram showing an example of operations for registering UEs in the communication system according to the second exemplary embodiment.
  • FIG. 11 is a sequence diagram showing an example of operations for deriving a session key for one-to-one direct communication in the communication system according to the second exemplary embodiment.
  • FIG. 12 is a sequence diagram showing an example of operations for deriving a session key for one-to-many direct communication in the communication system according to the second exemplary embodiment.
  • FIG. 13 is a block diagram showing a configuration example of a UE according to the second exemplary embodiment.
  • FIG. 14 is a block diagram showing a configuration example of a node according to the second exemplary embodiment.
  • FIG. 15 is a block diagram showing a configuration example of a server according to the second exemplary embodiment.
  • DESCRIPTION OF EMBODIMENTS
  • Hereinafter, first and second exemplary embodiments of a UE, a node and a server according to the present invention, and a communication system to which these UE, node and server are applied, will be described with the accompany drawings.
  • First Exemplary Embodiment
  • FIG. 1 shows a configuration example of a communication system for proximity service. Proximity service provides operator network controlled discovery and communications between UEs that are in proximity, for both commercial/social use and public safety use. It is required that the ProSe service should be provided to UEs with or without network coverage.
  • As shown in FIG. 1, the communication system according to this exemplary embodiment includes a plurality of UEs 10_1 to 10_m (hereinafter may be collectively referred to by a code 10), one or more ProSe Functions 20_1 to 20_n (hereinafter may be collectively referred to by a code 20), an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) 30, an EPC (Evolved Packet Core) 40, and a ProSe APP (Application) Server 50.
  • The UE 10 attaches to the EPC 40 thorough the E-UTRAN 30 (i.e., through interfaces LTE-Uu and S1), thereby functioning as a typical UE. Moreover, the UE 10 uses the above-mentioned interface PC5, thereby conducting ProSe communication. Prior to the ProSe communication, the UE 10 is registered with the ProSe Function 20. Note that the UEs 10_1 to 10_m may be registered with the same ProSe Function or mutually different ProSe Functions. Moreover, some of the UEs 10_1 to 10_m may be registered with the same ProSe Function.
  • The ProSe Function 20 is a node which supports the ProSe communication between the UEs 10_1 to 10_m. The ProSe Function 20 can either be deployed in a certain network node or be an independent node, and may reside in or out of the EPC 40. The ProSe Function 20 communicates with the UE 10 through an interface PC3. Further, the ProSe Function 20 communicates with the EPC 40 through an interface PC4. Furthermore, the ProSe Functions 20_1 to 20_n can communicate with each other through an interface PC6.
  • Note that the interface PC3 is a reference point between the UE 10 and the ProSe Function 20. The interface PC3 is used to define the interaction between the UE 10 and the ProSe Function 20. An example may be to use for configuration for Prose discovery and communication. Further, the interface PC4 is a reference point between the EPC 40 and the ProSe Function 20. The interface PC4 is used to define the interaction between the EPC 40 and the ProSe Function 20. Possible use cases may be when setting up a one-to-one communication path between the UEs 10_1 to 10_m, or when validating ProSe services (authorization) for session management or mobility management in real time. Furthermore, the interface PC6 is a reference point between the ProSe Functions 20_1 to 20_n. The interface PC6 may be used for functions such as ProSe discovery between users subscribed to different PLMNs (Public Land Mobile Networks).
  • The E-UTRAN 30 is formed by one or more eNBs (evolved Node Bs) (not shown). The EPC 40 includes, as its network nodes, an MME (Mobility Management Entity) which manages mobility of the UEs 10_1 to 10_m, and the like. The ProSe APP Server 50 can communicate with the EPC 40 through an interface SGi. Moreover, the ProSe APP Server 50 can communicate with the UE 10 through an interface PC1, and can communicate with the ProSe Function 20 through an interface PC2. Note that the interface PC1 is a reference point between ProSe APPs in the UEs 10_1 to 10_m and the ProSe APP Server 50. The interface PC1 is used to define application level signaling requirements. On the other hand, the interface PC2 is a reference point between the ProSe Function 20 and the ProSe APP Server 50. The interface PC2 is used to define the interaction between the ProSe APP Server 50 and ProSe functionality provided by the 3GPP EPS (Evolved Packet System) via the ProSe Function 20. One example may be for application data updates for a ProSe database in the ProSe Function 20. Another example may be data for use by the ProSe App Server 50 in interworking between 3GPP functionality and application data, e.g. name translation. The ProSe APP Server 50 may reside in or out of the EPC 40.
  • Although the illustration is omitted, the communication system also includes a server operated by a trust third party. In the following description, this server will be sometimes simply referred to as “third (3rd) party” and referred to by a code 60. Typically, the 3rd party 60 manages root keys which will be described later.
  • Next, operation examples of this exemplary embodiment will be described in detail with reference to FIGS. 2 to 5. Note that configuration examples of the UE 10, the ProSe Function 20 and the 3rd party 60 will be described later with reference to FIGS. 6 and 8.
  • This exemplary embodiment proposes to use the third party 60 to derive, update and allocate root keys. The ProSe Function 20 supports direct communication and allocates all the root keys to the UE 10 at its registration. Session key are derived at the UE 10 side by using the root key. For example, the session key is a pair of confidentiality and integrity keys for protecting messages directly transferred between the UEs 10_1 to 10_m.
  • <Operations for Allocating Root Key>
  • There are proposed two options for root key allocation.
  • Option 1: Root Key is Related to a Given UE
  • Root key is derived/allocated at registration. Assume that the ProSe Function 20 has a list of UEs with which the UE 10_1 is allowed to communicate, and that the ProSe Function 20 can ask for all the root keys for the UE 10_1 from the trust 3rd party 60. The 3rd party 60 is responsible for key derivation and allocation. The ProSe Functions 20_1 to 20_n can retrieve root keys from the 3rd party 60 for the UEs 10_1 to 10_m registered to them such that no synchronization is needed between the ProSe Functions 20_1 to 20_n. Each root key is identified by a unique KSI (Key Set Identifier). When direct communication happens, the ProSe Function 20 can indicate to the UEs 10_1 to 10_m which KSI to use, or the UEs 10_1 to 10_m can negotiate about it.
  • Specifically, as shown in FIG. 2, the UE 10_1 registers at the ProSe Function 20_1 (step S11).
  • The ProSe Function 20_1 sends Request root keys for the UE 10_1 to the third party 60 which manages the root key (step S12).
  • The third party 60 responds the ProSe Function 20_1 with the root keys for the UE 10_1. Each root key is related to a unique KSI and a UE with which the UE 10_1 is allowed to have ProSe service (step S13).
  • The ProSe Function 20_1 distributes the root keys to the UE 10_1, including the UE ID and KSI (step S14).
  • The same procedure as steps S11 to S14 is performed between the UE 10_2 and the ProSe Function 20_2 (steps S15 to S18).
  • Option 2: Root Key Pool
  • Similar to the Option 1, UEs can obtain a key pool, in which each key has a unique KSI to identify it. When the UE 10_1 needs session key for direct communication, network (Prose Function) can indicate which key to use, and also give a same parameter to the UE 10_1 and the UE 10_2 such that they can derive same session keys.
  • The difference compared to the Option 1 is that here the root keys are not related to any UE. Thus, the ProSe Function 20 needs to ensure that the same root key will not be re-used for different UEs.
  • Specifically, as shown in FIG. 3, the UE 10_1 registers at the ProSe Function 20_1 (step S21).
  • The ProSe Function 20_1 sends Request root keys for the UE 10_1 to the third party 60 which manages the root key (step S22).
  • The third party 60 responds the ProSe Function 20_1 with a root key pool contain a bunch of root keys. Each key is related to a unique KSI (step S23).
  • The ProSe Function 20_1 distributes the root keys to the UE 10_1 with the KSIs (step S24).
  • The same procedure as steps S21 to S24 is performed between the UE 10_2 and the ProSe Function 20_2 (steps S25 to S28).
  • According to this Option 2, it is possible to reduce the amount of signaling to the UE compared with the Option 1. This is because the root keys are not related to any UE, and thus the number of root keys transmitted to the UE can be smaller than that in the Option 1. Moreover, it is also possible to reduce resources in the UE for storing the root keys.
  • In contrast, according to the Option 1, it is possible to reduce load on the ProSe Function compared with the Option 2. This is because the root keys are allocated to the UEs in a one-to-one manner, and thus the ProSe Function does not need to ensure that the same root key will not be re-used for different UEs.
  • <Operations for Deriving Session Key>
  • There are proposed two options for session key derivation and allocation.
  • Option 1: UE Autonomously Derives Session Key
  • The UE 10_1 one which initiates direct communication, simply derives a session key, sends it to the ProSe Function, and the ProSe Function will send it to the other UEs.
  • Alternatively, as shown in FIG. 4, the UE 10_1 send Direct Communication request to the UE 10_2 (step S31).
  • In the case where the each root key is related to a given UE as shown in FIG. 2, the UEs 10_1 and 10_2 can identify the same root key to be used for deriving a session key, without receiving any instruction from network. Therefore, the UEs 10_1 and 10_2 derive the session key from the identified root key, separately (step S32).
  • Then, the UE 10_1 and UE 10_2 start direct communication with security protection by using the session key (step S33).
  • Option 2: UE Derives Session Key in Accordance with KSI Indicated by ProSe Function
  • This option is suitable for the case where the root key pool is allocated as shown in FIG. 3.
  • As shown in FIG. 5, the UE 10_1 sends Direct Communication request with an ID of the UE 10_2 (UE with which the UE 10_1 wants to have direct communication service) to the ProSe Function 20_1 (step S41).
  • The ProSe Function 20_1 performs authorization for whether the UE 10_1 is allowed to have direct communication with the UE 10_2 (step S42).
  • Upon a successful authorization, the ProSe Function 20_1 indicates to the UE 10_1 a root key KSI (step S43).
  • Further, the ProSe Function 20_1 indicates to the UE 10_2 the root key KSI via the ProSe Function 20_2 (step S44).
  • The UE 10_1 and the UE 10_2 derives a session key from the root key indicated by the KSI, separately (step S45).
  • Then, the UE 10_1 and the UE 10_2 start direct communication with security protection by using the session key (step S46).
  • Next, configuration examples of the UE 10, the ProSe Function (node) 20 and the 3rd party (server) 60 according to this exemplary embodiment will be described with reference to FIGS. 6 to 8.
  • As show in FIG. 6, the UE 10 includes an acquisition unit 11 and a derivation unit 12. The acquisition unit 11 acquires the root keys from the ProSe Function 20, upon successfully registering the UE 10 with the ProSe Function 20. The derivation unit 12 drives the session keys by using the acquired root key. In the case where each root key is related to a given UE as shown in FIG. 2, the derivation unit 12 uses a root key corresponding to a UE with which the UE 10 desires to conduct direct communication, upon deriving the session keys. On the other hand, in the case where the root key pool is allocated as shown in FIG. 3, the derivation unit 12 uses a root key which is indicated by the KSI received from the ProSe Function 20. Note that these units 11 and 12 are mutually connected with each other through a bus or the like. These units 11 and 12 can be configured by, for example, a transceiver which conducts direct communication with different UEs through the interface PC5, a transceiver which conducts communication with the ProSe Function 20 through the interface PC3, and a controller such as a CPU (Central Processing Unit) which controls these transceivers.
  • As show in FIG. 7, the ProSe Function 20 includes an acquisition unit 21 and a distribution unit 22. The acquisition unit 21 acquires the root keys from the 3rd party 60, upon successfully registering the UE 10 with the ProSe Function 20. The distribution unit 22 distributes the acquired root keys to the UE 10. In the case where the root key pool is allocated as shown in FIG. 3, the ProSe Function 20 further includes an indication unit 23. The indication unit 23 indicates to the UE 10 the KSI of the root key to be used by the UE 10. Note that these units 21 to 23 are mutually connected with each other through a bus or the like. These units 21 to 23 can be configured by, for example, a transceiver which conducts communication with the UE 10 through the interface PC3, and a controller such as a CPU which controls this transceiver.
  • As shown in FIG. 8, the 3rd party 60 includes a storage unit 61 and a response unit 62. The storage unit 61 stores the root keys. The response unit 62 responds to the request from the ProSe Function 20 with sending the root keys to the ProSe Function 20. Note that these units 61 and 62 are mutually connected with each other through a bus or the like. These units 61 and 62 can be configured by, for example, a transceiver which conducts communication with the ProSe Function 20, and a controller such as a CPU which controls this transceiver.
  • Second Exemplary Embodiment
  • FIG. 9 shows a configuration example of a communication system for proximity service. Proximity service provides operator network controlled discovery and communications between UEs that are in proximity, for both commercial/social use and public safety use. It is required that the ProSe service should be provided to UEs with or without network coverage.
  • As shown in FIG. 9, the communication system according to this exemplary embodiment includes a plurality of UEs 110_1 to 110_m (hereinafter may be collectively referred to by a code 110), one or more ProSe Functions 120_1 to 120_n (hereinafter may be collectively referred to by a code 120), an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) 130, an EPC (Evolved Packet Core) 140, and a ProSe APP (Application) Server 150.
  • The UE 110 attaches to the EPC 140 thorough the E-UTRAN 130 (i.e., through interfaces LTE-Uu and S1), thereby functioning as a typical UE. Moreover, the UE 110 uses the above-mentioned interface PC5, thereby conducting ProSe communication. Prior to the ProSe communication, the UE 110 is registered with the ProSe Function 120. Note that the UEs 110_1 to 110_m may be registered with the same ProSe Function or mutually different ProSe Functions. Moreover, some of the UEs 110_1 to 110_m may be registered with the same ProSe Function.
  • The ProSe Function 120 is a node which supports the ProSe communication between the UEs 110_1 to 110_m. The ProSe Function 120 can be either deployed in a certain network node or be an independent node, and may reside in or out of the EPC 140. The ProSe Function 120 communicates with the UE 110 through an interface PC3. Further, the ProSe Function 120 communicates with the EPC 140 through an interface PC4. Furthermore, the ProSe Functions 120_1 to 120_n can communicate with each other through an interface PC6.
  • Note that the interface PC3 is a reference point between the UE 110 and the ProSe Function 120. The interface PC3 is used to define the interaction between the UE 110 and the ProSe Function 120. An example may be to use for configuration for Prose discovery and communication. Further, the interface PC4 is a reference point between the EPC 140 and the ProSe Function 120. The interface PC4 is used to define the interaction between the EPC 140 and the ProSe Function 120. Possible use cases may be when setting up a one-to-one communication path between the UEs 110_1 to 110_m, or when validating ProSe services (authorization) for session management or mobility management in real time. Furthermore, the interface PC6 is a reference point between the ProSe Functions 120_1 to 120_n. The interface PC6 may be used for functions such as ProSe discovery between users subscribed to different PLMNs (Public Land Mobile Networks).
  • The E-UTRAN 130 is formed by one or more eNBs (not shown). The EPC 140 includes, as its network nodes, an MME (Mobility Management Entity) which manages mobility of the UEs 110_1 to 110_m, and the like. The ProSe APP Server 150 can communicate with the EPC 140 through an interface SGi. Moreover, the ProSe APP Server 150 can communicate with the UE 110 through an interface PC1, and can communicate with the ProSe Function 120 through an interface PC2. Note that the interface PC1 is a reference point between ProSe APPs in the UEs 110_1 to 110_m and the ProSe APP Server 150. The interface PC1 is used to define application level signaling requirements. On the other hand, the interface PC2 is a reference point between the ProSe Function 120 and the ProSe APP Server 150. The interface PC2 is used to define the interaction between the ProSe APP Server 150 and ProSe functionality provided by the 3GPP EPS (Evolved Packet System) via the ProSe Function 120. One example may be for application data updates for a ProSe database in the ProSe Function 120. Another example may be data for use by the ProSe App Server 150 in interworking between 3GPP functionality and application data, e.g. name translation. The ProSe APP Server 150 may reside in or out of the EPC 140.
  • Although the illustration is omitted, the communication system also includes a server operated by a trust third party. In the following description, this server will be sometimes simply referred to as “third (3rd) party” and referred to by a code 160. Typically, the 3rd party 160 manages public keys which will be described later.
  • Next, operation examples of this exemplary embodiment will be described in detail with reference to FIGS. 10 to 12. Note that configuration examples of the UE 110, the ProSe Function 120 and the 3rd party 160 will be described later with reference to FIGS. 13 to 15.
  • This exemplary embodiment proposes to use PM for direct communication. The UEs 110_1 to 110_m can register their public keys at registration procedure and meanwhile obtain other UEs public keys. The ProSe Function 120 ensures that the UE 110 is only provided with the public keys of UEs with which the request UE 110 is allowed to have direct communication. The UEs 110_1 to 110_m use the public key to verify the other end such that they can derive session key to start direct communication. For example, the session key is a pair of confidentiality and integrity keys for protecting messages directly transferred between the UEs 110_1 to 110_m.
  • The following gives options for key derivation.
  • 1. Use PM for One-to-One Direct Communication:
  • The UEs 110_1 to 110_m provide their public key at registration and receive other UEs public keys at a successful registration. For example, the UE 110_1 protects Direct Communication Request with its private key. The UE 110_2, which has received the Direct Communication Request, can verify it with UE1's public key. The UE 110_2 can send material for session key derivation to the UE 110_1 and they can derive the same key for protection their direct communication. The UE 110_1 can verify the message sent from the UE 110_2 with UE2's public key, thus they can be mutually authenticated.
  • The session key derivation can:
      • 1) use a root key which is preliminarily acquired from Prose Function as an input with a key material provided by one of the UE to keep freshness; and
      • 2) also use key exchange scheme (e.g. Diffie-Hellman key exchange scheme) to compute and share a secret key.
  • Specifically, as shown in FIG. 10, the UE 110_1 registers its public key during registration to the ProSe Function 120_1 (step S111).
  • The Prose Function 120_1 registers the public key of the UE 110_1 in the third party 160 (step S112).
  • The third party 160 sends to the Prose Function 120_1 an allowed list. The allowed list contains IDs of UEs with which the UE 110_1 is allowed to have direct communication, and the related public keys of those UEs (step S113).
  • The Prose Function 120_1 forwards the allowed list to the UE 110_1 (step S114).
  • The same procedure as steps S111 to S114 is performed for the UE 110_2 (steps S115 to S118).
  • When the Direction communication starts, as shown in FIG. 11, the UE 110_1 sends Direct Communication Request to the Prose Function 120_1, with the ID of the UE 110_2, a public key KSI of the UE 110_1. The message can be protected with a private key of the UE 110_1. The message is forwarded to the Prose Function 120_2 by the Prose Function 120_1 (step S121).
  • Note that the use of KSI is suitable for a case where a plurality of public keys are allocated to the UE 110_1. The UE 110_2 can refer to the KSI to identify one of the public keys corresponding to the private key used by the UE 110_1.
  • The Prose Function 120_1 performs authorization on whether the UE 110_1 can have direct communication service with the UE 110_2, with Prose Function 120_2 support (step S122).
  • Upon successful authorization, the Prose Function 120_2 forwards the Direct Communication Request to the UE 110_2 (step S123).
  • Note that if direct communication happens when UE are out of coverage, the Direct Communication Request goes directly from the UE 110_1 to the UE 110_2, and the above step S122 is omitted.
  • The UE 110_2 can perform integrity check on the message with the public key of the UE 110_1 (step S124).
  • Upon succeeding in the integrity check, the UE 110_2 derives session key, as described above (step S125).
  • The UE 110_2 sends Direct Communication Response to the UE 110_1 with materials for session key derivation. Alternatively, the UE 110_2 includes the derived session key in the Direct Communication Response. The message is protected with a private key of the UE 110_2 (step S126).
  • The UE 110_1 performs integrity check of the message with the public key of the UE 110_2 (step S127).
  • Upon succeeding in the integrity check, the UE 110_1 derives session key from the material (step S128). This step S128 is skipped if the UE 110_1 has received the session key from the UE 110_2 at step S126. Alternatively, the UE 110_1 extracts the session key from the Direct Communication Response by using the public key of the UE 110_2.
  • After that, Direct communication starts with security protection by the session key that the UE 110_1 and the UE 110_2 share (step S129).
  • 2. Use PM for One-to-Many Direct Communication:
  • The registration procedure is the same with that shown in FIG. 10.
  • The UE 110_1 protects Direct Communication Request with its private key. Other UEs (e.g. UE 110_2, UE 110_3) can verify it with UE1's public key.
  • Meanwhile, in this option, the UE 110_1 derives the session key for one-to-many direct communication, and sends the session key to the ProSe Function 120 along with the Direct Communication Request over secured interface PC3. The ProSe Function 120 sends the session key to the UE 110_2 and the UE 110_3. If the UE 110_2 or the UE 110_3 has registered with different ProSe Function, UE 110_1's ProSe Function will forward the session key to UE 110_2/110_3's serving ProSe Function. The session key derivation can use UE 110_1's private key or any LTE (Long Term Evolution) key as input.
  • Specifically, as shown in FIG. 12, the UE 110_1 derives a session key for direct communication (step S131).
  • The UE 110_1 sends Direct Communication Request to the Prose Function 120_1, which can be forward to ProSe Functions which serves target UEs (e.g. ProSe Function 20_2, and UEs 110_2 and 110_3). The message contains target UE IDs and UE 110_1's public key KSI, which are protected with UE 110_1's private key. The UE 110_1 also includes the session key in the message (step S132).
  • The ProSe Functions 120_1 and 120_2 perform authorization on whether the UE 110_1 can have one-to-many direct communication with the target UEs 110_2 and 110_3 (step S133).
  • The ProSe Function 120_2 forwards the Direct communication Request to the UEs 110_2 and 110_3 (step S134).
  • Each of the UEs 110_2 and 110_3 performs integrity check on the message with UE 110_1's public key (step S135).
  • Each of the UEs 110_2 and 110_3 sends the Direct Communication Response to the UE 110_1, protected with the session key it received (step S136). After that, direct communication starts with security protection by the session key that the UEs 110_1 to 110_3 share.
  • 3. Use PM One-to-Many Direction Communication without Using Session Key:
  • Considering a case where the one-to-many communication is one way only from the UE1 to others, the UE 110_1 simply protects the Direct Communication with its private key to other UEs. The other UEs who are authorized to receive the message from the UE 110_1 can get the UE 110_1′ public key and therefore verify that the message is sent from the UE 110_1 and read it. The network (e.g. ProSe Function) should make sure that unauthorized UEs will not get UE 110_1′ public key, and the public key should not be sent to other UEs.
  • Thus, it can prevent non-members from listening to ProSe Group Communication transmissions (as requested in NPL 2, Clause 5.12).
  • 4. Use PM for One-to-Many-Public Key as Input:
  • The UEs 110_1 to 110_m derive session key, and input for key derivation is: 1) UE 110_1′ public key; 2) a key derivation material received from the ProSe Function 120. Requires the UE 110_1′ public key and key derivation material are only provided to the authorized UEs.
  • How can the UE 110_1 have the same session key:
      • a) the UE 110_1 keeps the public key and receives key derivation material from the ProSe Function 120, such that it can derive the session in the same session key;
      • b) the ProSe Function 120 can derive the key since it knows both UE 110_1′ public key and key derivation material;
      • c) the ProSe Function 120 provides a key derivation material which UE 110_1 can use it with its private key to derive the same session key.
  • This requires that key derivation materials to the UE 110_1 and other UEs have some relation.
  • Next, configuration examples of the UE 110, the ProSe Function (node) 120 and the 3rd party (server) 160 according to this exemplary embodiment will be described with reference to FIGS. 13 to 15.
  • As show in FIG. 13, the UE 110 includes a registration/retrieval unit 111 and a verification unit 112. The registration/retrieval unit 111 performs the processes shown in FIG. 10 or processes equivalent thereto. The verification unit 112 performs the processes shown in FIGS. 11 and 12, or processes equivalent thereto. Note that these units 111 and 112 are mutually connected with each other through a bus or the like. These units 111 and 112 can be configured by, for example, a transceiver which conducts direct communication with different UEs through the interface PC5, a transceiver which conducts communication with the ProSe Function 120 through the interface PC3, and a controller such as a CPU (Central Processing Unit) which controls these transceivers.
  • As show in FIG. 14, the ProSe Function 120 includes at least a reception unit 121 and a transmission unit 122. The reception unit 121 performs the processes shown at steps S111 and S115 in FIG. 10, or processes equivalent thereto. The transmission unit 122 performs the processes shown at steps S114 and S118 in FIG. 10, or processes equivalent thereto. Moreover, the ProSe Function 120 can also include a registration unit 123 and an acquisition unit 124. The registration unit 123 performs the processes shown at steps S112 and S116 in FIG. 10, or processes equivalent thereto. The acquisition unit 124 performs the processes shown at steps S113 and S117 in FIG. 10, or equivalent thereto. Note that these units 121 to 124 are mutually connected with each other through a bus or the like. These units 121 to 124 can be configured by, for example, a transceiver which conducts communication with the UE 110 through the interface PC3, a transceiver which conducts communication with the 3rd party 160, and a controller such as a CPU which controls these transceivers.
  • As shown in FIG. 15, the 3rd party 160 includes a storage unit 161 and a response unit 162. The storage unit 161 stores the root keys registered by the ProSe Function 120. The response unit 162 responds to the request from the ProSe Function 120 with sending the stored public keys to the ProSe Function 120. Note that these units 161 and 162 are mutually connected with each other through a bus or the like. These units 161 and 162 can be configured by, for example, a transceiver which conducts communication with the ProSe Function 120, and a controller such as a CPU which controls this transceiver.
  • Note that the present invention is not limited to the above-mentioned exemplary embodiments, and it is obvious that various modifications can be made by those of ordinary skill in the art based on the recitation of the claims.
  • The whole or part of the exemplary embodiments disclosed above can be described as, but not limited to, the following supplementary notes.
  • Supplementary Note 1
  • A UE (User Equipment) comprising:
      • acquisition means for acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are in proximity to the UE and allowed to communicate with the UE; and
      • derivation means for deriving, by use of one of the root keys, a pair of session keys for securely conducting direct communication with one of the different UEs.
    Supplementary Note 2
  • The UE according to Supplementary note 1,
      • wherein the root keys are correlated with the different UEs in a one-to-one manner,
      • wherein the derivation means is configured to use, when deriving the session keys, a root key corresponding to said one of the different UEs.
    Supplementary Note 3
  • The UE according to Supplementary note 1,
      • wherein the root keys are a bunch of keys that are not correlated with given UEs,
      • wherein the derivation means is configured to use, when deriving the session keys, a root key indicated by the node.
    Supplementary Note 4
  • The UE according to any one of Supplementary notes 1 to 3, wherein the direct communication comprises ProSe (Proximity based Services) communication.
  • Supplementary Note 5
  • A node that supports direct communication between UEs being in proximity to each other and allowed to communicate with each other, the node comprising:
      • acquisition means for acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and
      • distribution means for distributing the root keys to said one of the UEs.
    Supplementary Note 6
  • The node according to Supplementary note 5, wherein the root keys are correlated with mutually different UEs in a one-to-one manner.
  • Supplementary Note 7
  • The node according to Supplementary note 5, further comprising:
      • indication means for indicating to said one of the UE which root key is to be used for deriving the session keys, when the root keys are a bunch of keys that are not correlated with given UEs.
    Supplementary Note 8
  • The node according to any one of Supplementary notes 4 to 7, wherein the direct communication comprises ProSe communication.
  • Supplementary Note 9
  • A server comprising:
      • storage means for storing root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and
      • response means for responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
    Supplementary Note 10
  • The server according to Supplementary note 9, wherein the root keys are correlated with mutually different UEs in a one-to-one manner.
  • Supplementary Note 11
  • The server according to Supplementary note 9, wherein the root keys are a bunch of keys that are not correlated with given UEs.
  • Supplementary Note 12
  • The server according to any one of Supplementary notes 9 to 11, wherein the direct communication comprises ProSe communication.
  • Supplementary Note 13
  • A communication system comprising:
      • a plurality of UEs that are in proximity to each other and allowed to conduct direct communication with each other;
      • a node that supports the direct communication; and
      • a server that manages root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs,
      • wherein the node acquires the root keys from the server upon successfully registering each of the UEs with the node, and distributes the acquired root keys to each of the UEs,
      • wherein each of the UEs derives the session keys by using one of the distributed root keys.
    Supplementary Note 14
  • A method of controlling operations in a UE, the method comprising:
      • acquiring root keys from a node upon successfully registering the UE with the node, the node supporting direct communication between the UE and one or more different UEs that are allowed to communicate with the UE; and
      • deriving, by use of one of the root keys, a session key for securely conducting direct communication with one of the different UEs.
    Supplementary Note 15
  • A method of controlling operations in a node that supports direct communication between UEs being in proximity to each other and allowed to communicate with each other, the method comprising:
      • acquiring root keys from a server upon successfully registering one of the UEs with the node, the root keys being used for said one of the UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the server managing the root keys; and
      • distributing the root keys to said one of the UEs.
    Supplementary Note 16
  • A method of controlling operations in a server, the method comprising:
      • storing root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with at least another one of the UEs, the UEs being in proximity to each other and allowed to communicate with each other; and
      • responding to a request from a node with sending the root keys to the node, the node supporting direct communication between the UEs.
    Supplementary Note 17
  • A UE (User Equipment) comprising:
      • first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and
      • second means for verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
    Supplementary Note 18
  • The UE according to Supplementary note 17,
      • wherein the request is for requesting the UE to conduct one-to-one direct communication with the first UE,
      • wherein the second means is configured to:
      • derive a pair of session keys for securely conducting the one-to-one direct communication, upon succeeding in the verification;
      • protect a response to the request with a private key of the UE, the response including the session keys or a material for deriving the session keys; and
      • transmit the response to the first UE.
    Supplementary Note 19
  • The UE according to Supplementary note 17,
      • wherein the request is for requesting the UE to conduct one-to-many direct communication together with another one or more of the different UEs, and includes a pair of session keys for securely conducting the one-to-many direct communication,
      • wherein the second means is configured to extract the session keys from the request.
    Supplementary Note 20
  • The UE according to any one of Supplementary notes 17 to 19,
      • wherein a plurality of public keys are allocated to the UEs,
      • wherein the second means is configured to identify one of the public keys to be used for the verification, based on an indicator included in the request.
    Supplementary Note 21
  • A UE (User Equipment) comprising:
      • first means for registering a public key of the UE upon successfully registering the UE with a node, and for retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and
      • second means for verifying, by using a public key of a first UE among the different UEs, a response to a protected first request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
    Supplementary Note 22
  • The UE according to Supplementary note 21,
      • wherein the response includes a pair of first session keys for securely conducting the one-to-one direct communication or a material for deriving the first session keys,
      • wherein the second means is configured to:
      • extract the first session keys or the material from the response, upon succeeding in the verification; and
      • derive, when the material is extracted, the first session keys from the material.
    Supplementary Note 23
  • The UE according to Supplementary note 21 or 22, wherein the second means is configured to:
      • derive, prior to one-to-many direct communication with two or more of the different UEs, a pair of second session keys for securely conducting the one-to-many direct communication;
      • include the second session keys in a second request for requesting said two or more of the different UEs to conduct the one-to-many direct communication;
      • protect the second request with a private key of the UE; and
      • transmit the second request to said two or more of the different UEs through the node.
    Supplementary Note 24
  • The UE according to any one of Supplementary notes 21 to 23,
      • wherein a plurality of public keys are allocated to the UE,
      • wherein the second means is configured to include, in the request, an indicator of a
      • public key that corresponds to a private key of the UE used for protecting the request.
    Supplementary Note 25
  • A node that supports direct communication between UEs in proximity to each other and allowed to communicate with each other, the node comprising:
      • reception means for receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and
      • transmission means for transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration,
      • wherein the public keys are used for each of the UEs to verify at least a request for the direct communication.
    Supplementary Note 26
  • The node according to Supplementary note 25, further comprising:
      • registration means for registering the public key of said one of the UE with the server; and
      • acquisition means for acquiring the public keys of said other UEs from the server.
    Supplementary Note 27
  • A server comprising:
      • storage means for storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and
      • response means for responding to a request from the node with sending the stored public keys to the node,
      • wherein the public keys are used for each of the UEs to verify at least a request for the direct communication.
    Supplementary Note 28
  • A communication system comprising:
      • a plurality of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other; and
      • a node that supports the direct communication,
      • wherein each of the UEs shares public keys of the UEs through the node upon successfully registering each of the UEs with the node, and verifies at least a request for the direct communication by using one of the public keys,
      • wherein the node receives each of the public keys from each of the UEs upon registering each of the UEs with the node, and transmits, to each of the UEs, the public keys of different UEs as a response to the successful registration.
    Supplementary Note 29
  • The communication system according to Supplementary note 28, further comprising a server that manages the public keys,
      • wherein the node registers each of the public keys of each of the UEs with the server, and acquires the public keys of the different UEs from the server,
      • wherein the server stores the public keys registered by the node, and responds to a request from the node with sending the stored public keys to the node.
    Supplementary Note 30
  • A method of controlling operations in a UE, the method comprising:
      • registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and
      • verifying, by using a public key of a first UE among the different UEs, a request from the first UE to conduct direct communication with the UE, the request being protected with a private key of the first UE.
    Supplementary Note 31
  • A method of controlling operations in a UE, the method comprising:
      • registering a public key of the UE upon successfully registering the UE with a node, and retrieving public keys of one or more different UEs, the different UEs being allowed to conduct direct communication with the UE when the different UEs are in proximity to the UE, the node supporting the direct communication; and
      • verifying, by using a public key of a first UE among the different UEs, a response to a protected request for requesting the first UE to conduct one-to-one direct communication with the UE, the response being protected with a private key of the first UE.
    Supplementary Note 32
  • A method of controlling a node that supports direct communication between UEs in proximity to each other and allowed to communicate with each other, the method comprising:
      • receiving, upon successfully registering one of the UEs with the node, a public key from said one of the UEs; and
      • transmitting, to said one of the UE, public keys of the other UEs as a response to the successful registration,
      • wherein the public keys are used for each of the UEs to verify at least a request for the direct communication.
    Supplementary Note 33
  • A method of controlling operations in a server, the method comprising:
      • storing public keys of UEs that are allowed to conduct direct communication with each other when the UEs are in proximity to each other, the public keys being registered by a node that supports the direct communication; and
      • responding to a request from the node with sending the stored public keys to the node,
      • wherein the public keys are used for each of the UEs to verify at least a request for the direct communication.
  • This application is based upon and claims the benefit of priority from Japanese patent application No. 2013-225200, filed on Oct. 30, 2013, and Japanese patent application No. 2013-226681, filed on Oct. 31, 2013, the disclosures of which are incorporated herein in their entireties by reference.
  • REFERENCE SIGNS LIST
    • 10, 10_1-10_m, 110, 110_1-110_m UE
    • 11, 21,124 ACQUISITION UNIT
    • 12 DERIVATION UNIT
    • 20, 20_1-20_n, 120, 120_1-120_n ProSe Function
    • 22 DISTRIBUTION UNIT
    • 23 INDICATION UNIT
    • 30, 130 E-UTRAN
    • 40, 140 EPC
    • 50, 150 ProSe APP Server
    • 60, 160 3rd party (Server)
    • 61, 161 STORAGE UNIT
    • 62, 162 RESPONSE UNIT
    • 111 REGISTRATION/RETRIEVAL UNIT
    • 112 VERIFICATION UNIT
    • 121 RECEPTION UNIT
    • 122 TRANSMISSION UNIT
    • 123 REGISTRATION UNIT

Claims (8)

What is claimed is:
1. A mobile communication system comprising:
a first User Equipment (UE);
a second UE;
a first network node;
a second network node; and
a third network node for managing key information, wherein:
the first network node is configured to register the first UE, and send the key information obtained from the third network node to the first UE,
the second network node is configured to register the second UE, and send the key information obtained from the third network node to the second UE,
the first UE is configured to generate a security key from the key information,
the second UE is configured to generate the security key from the key information, and
the first UE is configured to perform secure direct communication with the second UE using the security key.
2. The mobile communication system of claim 1, wherein the first UE and the second UE use a public key.
3. A communication method of a mobile communication system, the communication method comprising:
registering, by a first network node, a first UE, and sending key information obtained from a third network node to the first UE;
registering, by a second network node, a second UE, and sending the key information obtained from the third network node to the second UE;
generating, by the first UE, a security key from the key information;
generating, by the second UE, the security key from the key information; and
performing, by the first UE, secure direct communication with the second UE using the security key.
4. The communication method of claim 3, wherein the first UE and the second UE use a public key.
5. A User Equipment (UE) in a mobile communication system, the UE comprising:
at least one processor; and
at least one memory coupled to the at least one processor, the memory storing instructions that when executed by the at least processor cause the at least one processor to:
receive registration from a first network node,
receive key information from the first network node, the first network node receiving the key information from a third network node,
generate a security key from the key information, and
perform secure direct communication with another UE using the security key, the another UE receiving the registration from a second network node, receiving the key information from the first network node, and generating the security key from the key information.
6. The UE of claim 5, wherein the first UE and the second UE use a public key.
7. A communication method of a User Equipment (UE) in a mobile communication system, the communication method comprising:
receiving registration from a first network node;
receiving key information from the first network node, the first network node receiving the key information from a third network node;
generating a security key from the key information; and
performing secure direct communication with another UE using the security key, the another UE receiving the registration from a second network node, receiving the key information from the first network node, and generating the security key from the key information.
8. The communication method of claim 7, wherein the first UE and the second UE use a public key.
US16/818,905 2013-10-30 2020-03-13 Apparatus, system and method for secure direct communication in proximity based services Abandoned US20200228327A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/818,905 US20200228327A1 (en) 2013-10-30 2020-03-13 Apparatus, system and method for secure direct communication in proximity based services

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
JP2013225200 2013-10-30
JP2013-225200 2013-10-30
JP2013226681 2013-10-31
JP2013-226681 2013-10-31
PCT/JP2014/004393 WO2015063991A1 (en) 2013-10-30 2014-08-27 Apparatus, system and method for secure direct communcation in proximity based services
US201615033278A 2016-04-29 2016-04-29
US16/204,274 US20190165934A1 (en) 2013-10-30 2018-11-29 Apparatus, system and method for secure direct communication in proximity based services
US16/818,905 US20200228327A1 (en) 2013-10-30 2020-03-13 Apparatus, system and method for secure direct communication in proximity based services

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/204,274 Continuation US20190165934A1 (en) 2013-10-30 2018-11-29 Apparatus, system and method for secure direct communication in proximity based services

Publications (1)

Publication Number Publication Date
US20200228327A1 true US20200228327A1 (en) 2020-07-16

Family

ID=51619231

Family Applications (4)

Application Number Title Priority Date Filing Date
US15/033,278 Active 2034-11-27 US10212597B2 (en) 2013-10-30 2014-08-27 Apparatus, system and method for secure direct communication in proximity based services
US16/204,274 Abandoned US20190165934A1 (en) 2013-10-30 2018-11-29 Apparatus, system and method for secure direct communication in proximity based services
US16/818,905 Abandoned US20200228327A1 (en) 2013-10-30 2020-03-13 Apparatus, system and method for secure direct communication in proximity based services
US16/929,919 Pending US20200351613A1 (en) 2013-10-30 2020-07-15 Appratus, system and method for secure direct communication in proximity based services

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/033,278 Active 2034-11-27 US10212597B2 (en) 2013-10-30 2014-08-27 Apparatus, system and method for secure direct communication in proximity based services
US16/204,274 Abandoned US20190165934A1 (en) 2013-10-30 2018-11-29 Apparatus, system and method for secure direct communication in proximity based services

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/929,919 Pending US20200351613A1 (en) 2013-10-30 2020-07-15 Appratus, system and method for secure direct communication in proximity based services

Country Status (6)

Country Link
US (4) US10212597B2 (en)
EP (2) EP3063970B1 (en)
JP (1) JP6555258B2 (en)
CN (2) CN111030813B (en)
ES (1) ES2833292T3 (en)
WO (1) WO2015063991A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111030813B (en) * 2013-10-30 2024-06-11 日本电气株式会社 User equipment and method thereof
US10631162B2 (en) * 2013-10-30 2020-04-21 Samsung Electronics Co., Ltd. Method and apparatus to perform device to device communication in wireless communication network
US9941954B2 (en) * 2014-12-19 2018-04-10 Futurewei Technologies, Inc. System and method for radio link sharing
KR102422803B1 (en) * 2015-01-16 2022-07-19 삼성전자 주식회사 Method of secured transmission and reception of discovery message in a d2d communication system
CN108432205A (en) * 2015-12-16 2018-08-21 维萨国际服务协会 Use the system and method for the multi-party communication of the safety of agency
FR3082382B1 (en) * 2018-06-12 2020-09-25 Intesecc SECURE COMMUNICATION PROCESS BETWEEN TWO ELECTRONIC DEVICES, PROCESS FOR ADMINISTERING SUCH COMMUNICATION, ELECTRONIC OBJECTS IMPLEMENTING THE SAID METHODS AND ASSOCIATED SYSTEM RESPECTIVELY
CN110493027A (en) * 2018-09-27 2019-11-22 北京白山耘科技有限公司 A kind of distributed and management method
CN111615219B (en) * 2019-04-30 2022-02-22 维沃移动通信有限公司 PC5 link establishing method, equipment and system
CN115567931A (en) * 2019-09-12 2023-01-03 华为技术有限公司 Key generation method and device
WO2021067653A1 (en) * 2019-10-03 2021-04-08 Idac Holdings, Inc. Device to device discovery via a relay device
BR112022019408A2 (en) * 2020-04-01 2022-12-06 Apple Inc VEHICLE SAFETY POLICY NEGOTIATION FOR ALL (V2X) BETWEEN PEER USER EQUIPMENT (UES)
CN114079918B (en) * 2020-08-11 2024-02-02 大唐移动通信设备有限公司 Information processing method, device, equipment and readable storage medium
EP4187953A4 (en) * 2020-08-14 2023-09-06 Huawei Technologies Co., Ltd. Communication method, apparatus and system
CN115348585A (en) * 2021-05-13 2022-11-15 华为技术有限公司 Method for determining security protection opening mode, communication method and communication device
CN117296294A (en) * 2022-04-24 2023-12-26 北京小米移动软件有限公司 Method, device, equipment and storage medium for generating key of proximity communication service
CN117795917A (en) * 2022-07-27 2024-03-29 北京小米移动软件有限公司 Key generation method and device, communication equipment and storage medium

Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073801A1 (en) * 2002-10-14 2004-04-15 Kabushiki Kaisha Toshiba Methods and systems for flexible delegation
US20060063594A1 (en) * 2004-09-23 2006-03-23 Jamal Benbrahim Methods and apparatus for negotiating communications within a gaming network
US20060150241A1 (en) * 2004-12-30 2006-07-06 Samsung Electronics Co., Ltd. Method and system for public key authentication of a device in home network
US20060168446A1 (en) * 2002-09-13 2006-07-27 Pasi Ahonen Secure broadcast/multicast service
US20060236116A1 (en) * 2005-04-18 2006-10-19 Lucent Technologies, Inc. Provisioning root keys
US20070157309A1 (en) * 2005-12-30 2007-07-05 Alcatel Lucent Method and apparatus for secure communication between user equipment and private network
US20070250582A1 (en) * 2006-04-21 2007-10-25 Microsoft Corporation Peer-to-peer buddy request and response
US20080039121A1 (en) * 2006-08-09 2008-02-14 Thomas Muller Methods and Systems for Establishing Relationships Between Mobile Communication Device Users
US20080069026A1 (en) * 2006-09-14 2008-03-20 Hong Kong Applied Science And Technology Research Institute Co., Ltd. Repeater for WUSB applications
US20080091763A1 (en) * 2006-10-13 2008-04-17 Quipa Holdings Limited method for sharing functionality and/or data between two or more linked entities
US20090220091A1 (en) * 2005-08-25 2009-09-03 Vodafone Group Plc Communication security
US20090327391A1 (en) * 2008-06-27 2009-12-31 Qualcomm Incorporated Methods and apparatus for securely advertising identification and/or discovery information
US20100202618A1 (en) * 2007-09-28 2010-08-12 Huawei Technologies Co., Ltd. Method and apparatus for updating key in an active state
US20100290392A1 (en) * 2007-10-29 2010-11-18 Nokia Siemens Networks Oy Session and Media Binding to Common Control
US20110098043A1 (en) * 2009-10-23 2011-04-28 Nokia Corporation Systems, methods, and apparatuses for facilitating device-to-device connection establishment
US20120163235A1 (en) * 2008-11-24 2012-06-28 Qualcomm Incorporated Configuration of user equipment for peer-to-peer communication
US20120297193A1 (en) * 2010-01-29 2012-11-22 Huawei Technologies Co., Ltd. Mtc device authentication method, mtc gateway, and related device
US20130191639A1 (en) * 2002-11-01 2013-07-25 Sumcorp Llc System and method for securing communications between devices
US20130263223A1 (en) * 2011-09-12 2013-10-03 Qualcomm Incorporated Systems and methods of performing link setup and authentication
US20130290696A1 (en) * 2012-04-30 2013-10-31 Alcatel-Lucent Usa Inc. Secure communications for computing devices utilizing proximity services
US20140004796A1 (en) * 2012-06-27 2014-01-02 Alcatel-Lucent Usa Inc. Discovering proximity devices in broadband networks
US20140031028A1 (en) * 2012-07-27 2014-01-30 Sharp Laboratories Of America, Inc. Proximity service discovery using a licensed frequency spectrum
US20140036769A1 (en) * 2012-08-03 2014-02-06 Alexandre S. Stojanovski Communication path switching for mobile devices
US20140066058A1 (en) * 2012-08-31 2014-03-06 Nokia Siemens Networks Oy Optimization on network assisted proximity services discovery management
US20140092885A1 (en) * 2012-09-28 2014-04-03 Muthaiah Venkatachalam Discovery and operation of hybrid wireless wide area and wireless local area networks
US20140243038A1 (en) * 2013-02-28 2014-08-28 Intel Mobile Communications GmbH Radio communication devices and cellular wide area radio base station
US20140348061A1 (en) * 2013-05-21 2014-11-27 Motorola Mobility Llc Method for establishing device-to-device communication
US20140378123A1 (en) * 2013-01-17 2014-12-25 Alexandre S. Stojanovski Device-to-device discovery with direct radio signals
US20150043734A1 (en) * 2010-04-15 2015-02-12 Qualcomm Incorporated Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
US20160309401A1 (en) * 2013-03-29 2016-10-20 Samsung Electronics Co., Ltd. Method and apparatus for device-to-device communication
US10212597B2 (en) * 2013-10-30 2019-02-19 Nec Corporation Apparatus, system and method for secure direct communication in proximity based services
US20220260944A1 (en) * 2021-02-18 2022-08-18 Toshiba Tec Kabushiki Kaisha Image forming device

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4329388B2 (en) * 2003-04-22 2009-09-09 ソニー株式会社 Data communication system, data communication apparatus, data communication method, and computer program
CN101499959B (en) * 2008-01-31 2012-08-08 华为技术有限公司 Method, apparatus and system for configuring cipher key
CN101299666A (en) * 2008-06-16 2008-11-05 中兴通讯股份有限公司 Method and system for generating cryptographic-key identification identifier
KR20100050846A (en) * 2008-11-06 2010-05-14 삼성전자주식회사 System and method for interchanging key
JP2010226336A (en) * 2009-03-23 2010-10-07 Denso It Laboratory Inc Authentication method and authentication apparatus
US8260883B2 (en) 2009-04-01 2012-09-04 Wimm Labs, Inc. File sharing between devices
US9451452B2 (en) * 2009-06-29 2016-09-20 Motorola Solutions, Inc. Method of triggering a key delivery from a mesh key distributor
DE102010018285A1 (en) * 2010-04-26 2011-10-27 Siemens Enterprise Communications Gmbh & Co. Kg Network access node with key distribution function
JP5889525B2 (en) 2010-12-21 2016-03-22 パナソニックIpマネジメント株式会社 Authentication system
CN102625300B (en) * 2011-01-28 2015-07-08 华为技术有限公司 Generation method and device for key
WO2013006785A2 (en) * 2011-07-07 2013-01-10 Meng-Day Yu Cryptographic security using fuzzy credentials for device and server communications
CN103179559B (en) * 2011-12-22 2016-08-10 华为技术有限公司 The safety communicating method of a kind of low cost terminals, Apparatus and system
GB2499247B (en) * 2012-02-10 2014-04-16 Broadcom Corp Method, apparatus and computer program for facilitating secure D2D discovery information
JP2013225200A (en) 2012-04-20 2013-10-31 Ntt Comware Corp Semantic correspondence device, processing method thereof and program
JP2013226681A (en) 2012-04-25 2013-11-07 Panasonic Corp In-mold molding device
WO2013163634A1 (en) * 2012-04-27 2013-10-31 Interdigital Patent Holdings, Inc. Systems and methods for personalizing and/or tailoring a service interface
WO2013163595A2 (en) * 2012-04-27 2013-10-31 Interdigital Patent Holdings, Inc. Method and apparatus for optimizing proximity data path setup
CN102711105B (en) 2012-05-18 2016-03-02 华为技术有限公司 The method, the Apparatus and system that communicate is carried out by mobile communications network
JP2015521455A (en) * 2012-05-31 2015-07-27 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for device-to-device (D2D) mobility in a wireless system
US9204377B2 (en) * 2012-07-16 2015-12-01 Industrial Technology Research Institute Method and device for proximity-based communication
US9119182B2 (en) * 2012-10-19 2015-08-25 Qualcomm Incorporated Methods and apparatus for expression use during D2D communications in a LTE based WWAN
WO2020010515A1 (en) * 2018-07-10 2020-01-16 Apple Inc. Identity-based message integrity protection and verification for wireless communication

Patent Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060168446A1 (en) * 2002-09-13 2006-07-27 Pasi Ahonen Secure broadcast/multicast service
US20040073801A1 (en) * 2002-10-14 2004-04-15 Kabushiki Kaisha Toshiba Methods and systems for flexible delegation
US20130191639A1 (en) * 2002-11-01 2013-07-25 Sumcorp Llc System and method for securing communications between devices
US20060063594A1 (en) * 2004-09-23 2006-03-23 Jamal Benbrahim Methods and apparatus for negotiating communications within a gaming network
US20060150241A1 (en) * 2004-12-30 2006-07-06 Samsung Electronics Co., Ltd. Method and system for public key authentication of a device in home network
US20060236116A1 (en) * 2005-04-18 2006-10-19 Lucent Technologies, Inc. Provisioning root keys
US20090220091A1 (en) * 2005-08-25 2009-09-03 Vodafone Group Plc Communication security
US20070157309A1 (en) * 2005-12-30 2007-07-05 Alcatel Lucent Method and apparatus for secure communication between user equipment and private network
US20070250582A1 (en) * 2006-04-21 2007-10-25 Microsoft Corporation Peer-to-peer buddy request and response
US20080039121A1 (en) * 2006-08-09 2008-02-14 Thomas Muller Methods and Systems for Establishing Relationships Between Mobile Communication Device Users
US20080069026A1 (en) * 2006-09-14 2008-03-20 Hong Kong Applied Science And Technology Research Institute Co., Ltd. Repeater for WUSB applications
US20080091763A1 (en) * 2006-10-13 2008-04-17 Quipa Holdings Limited method for sharing functionality and/or data between two or more linked entities
US20100202618A1 (en) * 2007-09-28 2010-08-12 Huawei Technologies Co., Ltd. Method and apparatus for updating key in an active state
US20100290392A1 (en) * 2007-10-29 2010-11-18 Nokia Siemens Networks Oy Session and Media Binding to Common Control
US20090327391A1 (en) * 2008-06-27 2009-12-31 Qualcomm Incorporated Methods and apparatus for securely advertising identification and/or discovery information
US20120163235A1 (en) * 2008-11-24 2012-06-28 Qualcomm Incorporated Configuration of user equipment for peer-to-peer communication
US20110098043A1 (en) * 2009-10-23 2011-04-28 Nokia Corporation Systems, methods, and apparatuses for facilitating device-to-device connection establishment
US20120297193A1 (en) * 2010-01-29 2012-11-22 Huawei Technologies Co., Ltd. Mtc device authentication method, mtc gateway, and related device
US20150043734A1 (en) * 2010-04-15 2015-02-12 Qualcomm Incorporated Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
US20130263223A1 (en) * 2011-09-12 2013-10-03 Qualcomm Incorporated Systems and methods of performing link setup and authentication
US20130290696A1 (en) * 2012-04-30 2013-10-31 Alcatel-Lucent Usa Inc. Secure communications for computing devices utilizing proximity services
US20140004796A1 (en) * 2012-06-27 2014-01-02 Alcatel-Lucent Usa Inc. Discovering proximity devices in broadband networks
US20140031028A1 (en) * 2012-07-27 2014-01-30 Sharp Laboratories Of America, Inc. Proximity service discovery using a licensed frequency spectrum
US20140036769A1 (en) * 2012-08-03 2014-02-06 Alexandre S. Stojanovski Communication path switching for mobile devices
US20140066058A1 (en) * 2012-08-31 2014-03-06 Nokia Siemens Networks Oy Optimization on network assisted proximity services discovery management
US20140092885A1 (en) * 2012-09-28 2014-04-03 Muthaiah Venkatachalam Discovery and operation of hybrid wireless wide area and wireless local area networks
US20140378123A1 (en) * 2013-01-17 2014-12-25 Alexandre S. Stojanovski Device-to-device discovery with direct radio signals
US20140243038A1 (en) * 2013-02-28 2014-08-28 Intel Mobile Communications GmbH Radio communication devices and cellular wide area radio base station
US20160309401A1 (en) * 2013-03-29 2016-10-20 Samsung Electronics Co., Ltd. Method and apparatus for device-to-device communication
US20140348061A1 (en) * 2013-05-21 2014-11-27 Motorola Mobility Llc Method for establishing device-to-device communication
US10212597B2 (en) * 2013-10-30 2019-02-19 Nec Corporation Apparatus, system and method for secure direct communication in proximity based services
US20220260944A1 (en) * 2021-02-18 2022-08-18 Toshiba Tec Kabushiki Kaisha Image forming device

Also Published As

Publication number Publication date
CN105706474A (en) 2016-06-22
JP6555258B2 (en) 2019-08-07
EP3063970B1 (en) 2020-10-21
US10212597B2 (en) 2019-02-19
ES2833292T3 (en) 2021-06-14
JP2016538771A (en) 2016-12-08
EP3063970A1 (en) 2016-09-07
US20160269903A1 (en) 2016-09-15
CN105706474B (en) 2019-12-13
US20200351613A1 (en) 2020-11-05
EP3761690B1 (en) 2023-08-23
US20190165934A1 (en) 2019-05-30
CN111030813B (en) 2024-06-11
CN111030813A (en) 2020-04-17
EP3761690A1 (en) 2021-01-06
WO2015063991A1 (en) 2015-05-07

Similar Documents

Publication Publication Date Title
US20200228327A1 (en) Apparatus, system and method for secure direct communication in proximity based services
US20220159537A1 (en) Apparatus, system and method for dual connectivity
US9060270B2 (en) Method and device for establishing a security mechanism for an air interface link
US10271208B2 (en) Security support method and system for discovering service and group communication in mobile communication system
US20150319172A1 (en) Group authentication and key management for mtc
US20130189955A1 (en) Method for context establishment in telecommunication networks
US20190166492A1 (en) System and Method for Wireless Network Access Protection and Security Architecture
US8295488B2 (en) Exchange of key material
EP2290875B1 (en) Generating method and system for key identity identifier at the time when user device transfers
US20200187003A1 (en) Methods and apparatus for end device discovering another end device
CN108781110B (en) System and method for relaying data over a communication network
CN112956253B (en) Method and apparatus for attaching user equipment to network slice
CN107005842B (en) Authentication method, related device and system in wireless communication network
CN113498057A (en) Communication system, method and device
MX2014013183A (en) Gateway, communication system, method of controlling gateway, and computer readable medium therefor.
US11653395B2 (en) Method for establishing a connection of a mobile terminal to a mobile radio communication network and radio access network component
CN111356189A (en) Terminal switching indication, switching forwarding and switching processing method and device
US11576232B2 (en) Method for establishing a connection of a mobile terminal to a mobile radio communication network and communication network device

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION