WO2022237561A1 - 一种通信方法及装置 - Google Patents
一种通信方法及装置 Download PDFInfo
- Publication number
- WO2022237561A1 WO2022237561A1 PCT/CN2022/089936 CN2022089936W WO2022237561A1 WO 2022237561 A1 WO2022237561 A1 WO 2022237561A1 CN 2022089936 W CN2022089936 W CN 2022089936W WO 2022237561 A1 WO2022237561 A1 WO 2022237561A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- user equipment
- request
- home network
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 147
- 238000004891 communication Methods 0.000 title claims abstract description 143
- 238000012545 processing Methods 0.000 claims description 33
- 238000013523 data management Methods 0.000 claims description 31
- 238000004590 computer program Methods 0.000 claims description 21
- 238000004422 calculation algorithm Methods 0.000 claims description 13
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000011664 signaling Effects 0.000 claims 2
- 230000008569 process Effects 0.000 abstract description 26
- 230000006870 function Effects 0.000 description 108
- 238000013461 design Methods 0.000 description 30
- 230000004044 response Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 12
- 238000007726 management method Methods 0.000 description 7
- 230000007774 longterm Effects 0.000 description 6
- 238000009795 derivation Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 230000014509 gene expression Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the present application relates to the technical field of communication, and in particular to a communication method and device.
- 4G technology defines a power-saving security scheme, which is called battery efficient security for very low throughput machine-type communication equipment.
- type communication devices BEST
- HPLMN home public land mobile network
- HSE HPLMN security endpoint
- UE user equipment
- the cipher key (CK) and the integrity key (integrity key, IK) derive a security key for protecting UE data, which is used to protect UE data security.
- the HSE cannot obtain the CK and IK of the UE, and cannot derive the security key based on the CK and IK. Therefore, the BEST authentication method of 4G technology cannot be fully applied to the 5G architecture, resulting in data security risks for the UE. Increase.
- the purpose of the embodiments of the present application is to provide a communication method and device for providing a security key acquisition method suitable for 5G and other network architectures, so as to reduce data security risks of user equipment under 5G and other network architectures.
- the embodiment of the present application provides a communication method.
- the method may be executed by a home network security node, including: the home network security node may receive a first request from a user equipment, where the first request includes a first identifier of the user equipment.
- the home network security node may also send a second request to the first network function, where the second request includes a second identifier of the user equipment, and the second identifier is determined according to the first identifier, or the second identifier is the same as the first identifier.
- the home network security node receives the first key from the first network function, and the first key is generated according to the encryption key, the integrity key and the first information.
- the home network security node may generate a second key according to the first key, and the second key includes a confidentiality protection key and/or an integrity protection key between the user equipment and the home network security node.
- the first information includes: at least one of the service network name of the user equipment, the identifier of the home network security node, the SUPI of the user equipment, and the BEST service identifier.
- the home network security node can obtain the first key, wherein the first key is generated according to the encryption key, the integrity key and the first information, therefore, the home network security node does not need to obtain the UE's encrypted
- the secret key and the integrity key can obtain the first key, and then a security key for protecting user equipment data can be generated according to the first key. Therefore, this solution can provide a security key acquisition method suitable for 5G and other network architectures, and can reduce the data security risk of user equipment.
- the first identifier of the user equipment includes the SUCI of the user equipment
- the second identifier of the user equipment includes the SUPI of the user equipment
- it may further include:
- the home network security node obtains the SUPI of the user equipment according to the SUCI.
- the home network security node decrypts SUCI according to the home network security node's private key to obtain SUPI, wherein SUCI is obtained by encrypting SUPI with the home network security node's public key.
- the first identifier of the user equipment includes an identifier assigned to the user equipment by the home network security node
- the second identifier of the user equipment includes the SUPI of the user equipment
- the home network security node sends a second request to the first network function
- the method may further include: the home network security node acquires the SUPI of the user equipment according to the identifier assigned by the home network security node to the user equipment.
- the home network security node obtains the SUPI of the user equipment according to the SUCI, which may include: the home network security node sends the SUCI of the user equipment to the first network function; the home network security node receives the SUPI from the first network function .
- the first identifier includes SUCI and/or SUPI of the user equipment.
- the user equipment and the home network security node communicate based on the user equipment's SUCI, SUPI or the identity assigned to the UE by the home network security node, but do not use the IMSI to communicate, so as to be applicable to network architectures such as 5G way of communication.
- authentication and key derivation via SUCI can further improve security.
- the second request is a user equipment authentication acquisition request
- the user equipment authentication acquisition request may also include indication information
- the indication information is used to indicate that the first encryption key is generated according to the encryption key, the integrity key, and the first information. key.
- the first request further includes the service network name of the user equipment
- the second request further includes the service network name
- the first network function includes an authentication service function or a unified data management function.
- the home network security node may send the random number and/or the authentication token to the user equipment.
- the home network security node generates the second key according to the first key, including: the home network security node generates the second key according to the first key and second information, and the second information includes the following At least one: the identity of the home network security node, the algorithm type identifier of the BEST service of the user equipment, the serial number used in the calculation of the authentication token in the user equipment, the hidden key, the SUPI of the user equipment, the random number, or the authentication token .
- the second information may come from the first network function.
- the first request further includes an encryption instruction, and may further include: enabling the encryption service by the home network security node. If the encryption service is enabled, the second key includes a confidentiality protection key.
- the home network security node before the home network security node generates the second key according to the first key, it may further include: the home network security node receiving the encryption instruction from the first network function; the home network security node according to the encryption instruction Determine whether to enable the user plane encryption service of the user equipment.
- a communication method may be executed by a unified data management function, including: the unified data management function receives a second request from the home network security node, where the second request includes a second identifier of the user equipment.
- the unified data management function may generate an encryption key and an integrity key of the user equipment according to the second identification, and generate a first key according to the encryption key, the integrity key and the first information.
- the unified data management function may send the first key to the home network security node.
- the first information includes: at least one of the service network name of the user equipment, the identifier of the home network security node, the SUPI of the user equipment, and the BEST service identifier.
- the method may further include: the unified data management function receives the SUCI of the user equipment from the home network security node; the unified data management function determines the SUPI of the user equipment according to the SUCI; The node sends the SUPI of the user equipment.
- the second identifier may include SUCI or SUPI of the user equipment.
- the method may further include: the unified data management function sends an encryption instruction to the home network security node.
- the second request is a user equipment authentication acquisition request
- the user equipment authentication acquisition request also includes indication information
- the unified data management function generates the first key according to the encryption key, the integrity key and the first information, It may include: after receiving the indication information, the unified data management function generates the first key according to the encryption key, the integrity key and the first information.
- the second request may further include a service network name of the user equipment.
- the method may further include: the unified data management function determines the registered or authenticated or service network name of the user equipment according to the second identifier.
- the unified data management function may send the second information to the home network security node, and the second information includes at least one of the following: the identity of the home network security node, the algorithm type identifier of the BEST service of the user equipment, The serial number, secret key, SUPI of the user device, nonce, or authentication token used in computing the authentication token in the user device.
- a communication method may be performed by a user equipment, and includes: the user equipment sends a first request to a home network security node, where the first request includes an identifier of the user equipment.
- the user equipment may also receive the random number sent by the home network security node.
- the user equipment can generate the encryption key and the integrity key according to the random number and the root key of the user equipment, and the user equipment can generate the first key according to the encryption key, the integrity key and the first information, and according to the first key Generate a second key.
- the second key comprises a confidentiality protection key and/or an integrity protection key between the user equipment and the home network security node.
- the first information includes: at least one of the service network name of the user equipment, the identifier of the home network security node, the SUPI of the user equipment, and the BEST service identifier.
- the user equipment generating the second key according to the first key may include: generating the second key according to the first key and third information; the third information includes at least one of the following: the home network The identity of the security node, the algorithm type identifier of the BEST service of the user equipment, the serial number used to calculate the authentication token in the user equipment, the hidden key, the SUPI of the user equipment, the random number, or the authentication token.
- the first request further includes a service network name of the user equipment; and/or the first request further includes an encryption indication, and the encryption indication is used to instruct the user equipment to request a user plane encryption service.
- the identifier of the user equipment includes SUCI, SUPI of the user equipment or an identifier assigned to the user equipment by the home network security node.
- an embodiment of the present application provides a communication device, the communication device includes a processor, and the processor is coupled to a memory, wherein: the memory is used to store instructions; the processor is used to execute the instructions stored in the memory according to the instructions stored in the memory.
- the communication device may further include the memory.
- the communication device may further include a transceiver, configured to support the communication device in sending and/or receiving information in the above method.
- the communication device may be a terminal device, or a device in a terminal device, such as a chip or a chip system, wherein the chip system includes at least one chip, and the chip system may also include other circuit structures and/or discrete devices.
- the embodiment of the present application provides a communication device, which is used to implement the method in any possible design of the first aspect to the third aspect or the above aspects, including corresponding functional modules, for example, including a processing unit, The communication unit and the like are respectively used to realize the steps in the above methods.
- an embodiment of the present application provides a computer-readable storage medium, where computer-readable instructions are stored in the computer-readable medium, and when the computer reads and executes the computer-readable instructions, the communication device executes the first Aspect to the third aspect or a method in any possible design of the above aspects.
- the embodiment of the present application provides a computer program product.
- the communication device executes any possible design of the first aspect to the third aspect or the above aspects. Methods.
- the embodiment of the present application provides a chip, the chip is connected to the memory, and is used to read and execute the software program stored in the memory, so as to execute any one of the first to third aspects or the above aspects a possible design approach.
- the embodiment of the present application provides a communication device, including a processor, the processor is configured to be coupled with the transceiver, read and execute the instructions in the memory, so as to implement the first aspect to the third aspect or above A method in any one of the possible designs of the aspect.
- the embodiment of the present application provides a communication system, including a device for performing the method in the first aspect or any possible design of the first aspect, and for performing the second aspect or any of the second aspects A method of one possible design, and an apparatus for performing the method of the third aspect or any of the possible designs of the third aspect.
- FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
- Figure 2 is a schematic diagram of the network architecture of the 4G BEST solution
- Figure 3 is a schematic diagram of the key architecture of the 4G BEST scheme
- FIG. 4 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
- FIG. 5 is a schematic flowchart of a communication method provided by an embodiment of the present application.
- FIG. 6 is a schematic flowchart of another communication method provided by the embodiment of the present application.
- FIG. 7 is a schematic flowchart of another communication method provided by the embodiment of the present application.
- FIG. 8 is a schematic flowchart of another communication method provided by the embodiment of the present application.
- FIG. 9 is a schematic flowchart of another communication method provided by the embodiment of the present application.
- FIG. 10 is a schematic flowchart of another communication method provided by the embodiment of the present application.
- FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
- At least one means one, or more than one, including one, two, three and more.
- a plurality refers to two, or more than two, including two, three or more.
- Carrying may mean that a certain message is used to carry certain information or data, or it may mean that a certain message is composed of certain information.
- Coupling refers to an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
- At least one item (unit) of a, b or c can represent: a, b, c, a and b, a and c, b and c, or a, b and c, wherein a, b, c Can be single or multiple.
- a wireless communication system 100 may include a terminal device 101 and a network device 102 .
- the wireless communication system 100 provided in the embodiment of the present application can be applied to both low frequency scenarios (sub 6G) and high frequency scenarios (above 6G).
- the application scenarios of the wireless communication system 100 provided by the embodiment of the present application include but are not limited to wideband code division multiple access (WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term term evolution (LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), global interconnected microwave access Access (worldwide interoperability for microwave access, WiMAX) communication system, fifth generation system or new radio (new radio, NR) communication system, etc.
- WCDMA wideband code division multiple access
- GPRS general packet radio service
- LTE long term evolution
- LTE frequency division duplex frequency division duplex
- FDD frequency division duplex
- TDD time division duplex
- the terminal device 101 shown above may be a user equipment, a terminal (terminal), a mobile station (mobile station, MS), a mobile terminal (mobile terminal) and the like, and the terminal device 101 can communicate with one or more communication systems of one or more communicate with each network device and accept network services provided by the network device, the network device here includes but not limited to the network device 102 shown in the figure.
- the terminal device 101 in the embodiment of the present application can be a mobile phone (or called a "cellular" phone), a computer with a mobile terminal, etc., and the terminal device 101 can also be a portable, pocket-sized, hand-held, computer built-in or vehicle-mounted mobile devices.
- the terminal device 101 may also be a communication chip with a communication module.
- the network device 102 shown above may include the access network device (or referred to as an access network site) described in this application. Specifically, the network device 102 may include an access network device.
- an access network device refers to a device that provides a network access function, such as a radio access network (radio access network, RAN) base station and the like.
- RAN radio access network
- the network device 102 may include a base station (base station, BS), or include a base station and a radio resource management device for controlling the base station, etc., and the network device 102 may be a relay station (relay device), an access point, a vehicle-mounted device, or a
- the embodiments of the present application are not limited to wearable devices, base stations in networks such as 5G in the future, base stations in public land mobile network (PLMN) networks that will evolve in the future, or NR base stations.
- the network device 102 may also be a communication chip with a communication module.
- the network device 102 can serve as a RAN base station to provide a wireless network connection to the terminal device 101, for example, the network device 102 can serve as a 4G access network—evolved universal mobile telecommunications system (universal mobile telecommunications system, UMTS) terrestrial radio access network (evolved UMTS terrestrial radio access network, E-UTRAN) access network base station, or, the network device 102 can be used as a 5G access network——Access network base station in 5G RAN, Alternatively, the network device 102 may serve as an access network base station in a future wireless communication system.
- 4G access network evolved universal mobile telecommunications system (universal mobile telecommunications system, UMTS) terrestrial radio access network (evolved UMTS terrestrial radio access network, E-UTRAN) access network base station
- the network device 102 can be used as a 5G access network——Access network base station in 5G RAN
- the network device 102 may serve as an access network base station in a
- FIG. 1 Currently, 4G defines a power-saving security scheme called BEST for low-throughput machine-type communication devices.
- Figure 2 describes the network architecture of this scheme. The main purpose is to complete the authentication and key generation with the UE through the HSE, so as to derive the security key used to protect the UE data. The overall structure of the key is shown in Figure 3.
- HSE home subscriber server
- HSS home subscriber server
- One is the direct interaction between the HSE and the HSS through the interface, and the other is the end-to-intermediate encryption.
- the key server end to middle key server, EMKS
- EMKS end to middle key server
- UE and EAS perform end-to-end (end to end, E2E) protection.
- HSE needs to generate an intermediate key and EAS-specific pre-shared key for EAS, that is, K Intermediate and K Intermediate in Figure 3 EAS_PSK .
- the EAS and the UE regenerate the E2E security key according to K EAS_PSK , that is, K E2Eenc and K E2Eint in Fig. 3, which are the confidentiality protection key and the integrity protection key respectively.
- UE, HSE and EAS perform hop-by-hop (hop-by-hop) protection.
- HSE only needs to generate the security key between itself and UE, that is, K E2Menc and K E2Mint in Figure 3 .
- the UE may carry the IMSI to request the HSE to establish a session, and the HSE judges whether the UE needs to generate a key, that is, judges whether there is a valid key with a valid counter value for the UE , the judgment method is as follows:
- the HSE may reject the command.
- HSE judging whether there is a valid key with a valid counter value for the UE
- HSE will obtain authentication vector from HSS
- authentication vector includes random number (RAND), authentication token (AUTN), CK and IK
- HSE calculates HSE key according to authentication vector.
- the HSE will send RAND and AUTN to the UE for UE authentication.
- the UE verifies the AUTN successfully, it may return the verification data (RES) to the HSE for the HSE verification, or it may not return.
- RES verification data
- UE and HSE will generate other keys based on CK and IK derivation, including but not limited to K E2Eenc , K E2Eint , K E2Menc and K E2Mint .
- the 5G network architecture may include three parts, namely UE, data network (data network, DN) and operator network.
- the operator network may include network slice selection function (network slice selection function, NSSF), network exposure function (network exposure function, NEF), network storage function (network function repository function, NRF), policy control function (policy control function, PCF), unified data management (unified data management, UDM), application function (application function, AF), network slice specific authentication and authorization function (network slice specific authentication and authorization function, NSSAAF), authentication server function (authentication server function, AUSF), access and mobility management function (access and mobility management function, AMF), session management function (session management function, SMF), (wireless) access network ((radio) access network, (R)AN ), HSE, EAS and user plane function (user plane function, UPF) and other network functions (network function, NF).
- the part other than the (wireless) access network part may be referred to as the core network (CN) part.
- the (R)AN is referred to as RAN as an example in the following description.
- the user equipment may include the UE shown in FIG. 4 .
- UE can be a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, hand-held or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons, etc. and satellites, etc.).
- the UE may be a mobile phone, a tablet computer (pad), a computer with a wireless transceiver function, a virtual reality (virtual reality, VR) terminal, an augmented reality (augmented reality, AR) terminal, an industrial control (industrial control) Wireless terminals in self driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety, Wireless terminals in smart cities, wireless terminals in smart homes, etc.
- the UE may also be the terminal device 101 shown in FIG. 1 .
- the aforementioned UE can establish a connection with the operator network through an interface provided by the operator network (for example, N1, etc.), and use services such as data and/or voice provided by the operator network.
- the UE can also access the DN through the operator network, and use operator services deployed on the DN, and/or services provided by a third party.
- the above-mentioned third party may be a service party other than the operator's network and the UE, and may provide other services such as data and/or voice for the UE.
- the specific form of expression of the above-mentioned third party can be determined according to the actual application scenario, and is not limited here.
- the home network security node in this application may include the HSE shown in Figure 4.
- the home network security node may still be an HSE or have other names, which are not limited in this application.
- the authentication service function may include the AUSF shown in Figure 4. In future communications such as 6G, the authentication service function may still be AUSF, or have other names, which are not limited in this application.
- the unified data management function may include UDM shown in Figure 4. In future communications such as 6G, the unified data management function may still be UDM or have other names, which are not limited in this application.
- Nnssf, Nnef, Nausf, Nnrf, Npcf, Nudm, Naf, Namf, Nssaaf, Nsmf, Nhse, N1, N2, N3, N4, N6, BEST-C, BEST-U, EAS-C, and EAS- U are the serial numbers of the interfaces respectively.
- the meaning and usage of these interface serial numbers can refer to the meaning defined in the 3GPP standard agreement, and there is no limitation here.
- the UE data can still be authenticated and protected through the HSE.
- the HSE cannot obtain CK and IK, so the key generation method under the 4G network architecture cannot be used.
- HSE generates keys based on CK and IK, causing incompatibility when referencing the BEST service under the 4G network architecture to the 5G network architecture.
- an embodiment of the present application provides a communication method.
- the method can be implemented by the user equipment, the home network security node and the first network function.
- the first network function may be an authentication service function and/or a unified data management function.
- the user equipment is UE
- the home network security node is HSE
- the authentication service function is AUSF
- the unified data management function is UDM as an example.
- the method may include the following steps:
- the UE sends a first request to the HSE, where the first request includes a first identifier of the UE.
- the HSE receives the first request from the UE, where the first request includes the first identifier of the UE.
- the method provided in this embodiment of the present application may be implemented in conjunction with a session establishment process to provide data security protection for the session of the UE.
- the HSE sends a second request to the first network function, where the second request includes the second identifier of the UE.
- the first network function may be AUSF and/or UDM.
- the second request is, for example, an authentication vector acquisition request.
- An authentication vector may be a set that includes a key or parameters used to derive the key.
- the second identifier may be determined according to the first identifier.
- the first identifier may be a UE's subscription concealed identifier (SUCI)
- the second identifier may be a UE's permanent subscriber identifier (subscription concealed identifier, SUCI) determined according to the SUCI. permanent identifier, SUPI).
- the first identity may be an identity allocated to the UE by the HSE
- the second identity may be the SUPI of the UE.
- the second identity may also be the same as the first identity, for example, both the first identity and the second identity are SUCI of the UE, or both are SUPI of the UE.
- the first network function receives the second request from the HSE, and the second request includes the second identifier of the UE.
- the second request may be sent by the HSE to the UDM.
- the first network function is AUSF
- the second request may be sent by the HSE to the AUSF, and then the AUSF may send a new request to the UDM, and the content of the new request may be the same as the second request.
- the first network function generates a first key according to the second identifier of the UE.
- the UDM can generate the CK and IK of the UE according to the second identity of the UE, and generate the first key according to the CK, IK and the first information.
- the UDM can obtain the long-term key of the UE according to the second identity of the UE, and then generate the CK and IK of the UE according to the long-term key, and then the UDM can generate the first key according to the CK, IK and the first information.
- the first information includes at least one of the service network (serving network, SN) name of the UE of the user equipment, the identifier of the home network security node, the SUPI of the user equipment, and the BEST service identifier.
- the above-mentioned first information may include the UE's serving network (serving network, SN) name, or, the first information may be an HSE identification (HSE ID), UE's SUPI and BEST service identification, or, the first information may be UE's service network name, HSE ID, UE's SUPI and BEST service ID.
- the first information may also be other parameters shared by the UE and the HSE. These parameters need to be sent by the HSE and/or the UE to the first network function. For example, the HSE carries these parameters in the second request.
- the first information may also be parameters determined by the HSE, and the HSE may send these parameters to the UE and the first network function.
- the first network function is UDM
- the UDM can use CK and IK as keys, and use the service network name SQN or AK of the UE as an input parameter to derive Kausf, and Kausf is the first key at this time.
- the UDM uses CK and IK or Kausf as keys, and uses the HSE ID or the UE's SUPI or BEST service ID as input parameters to derive Kbest, where Kbest is the first key.
- the AUSF sends a fourth request to the UDM, where the fourth request may carry the second identifier of the UE.
- the UDM can obtain the long-term key of the UE according to the second identity of the UE, and then generate the CK and IK of the UE according to the long-term key.
- the UDM then generates a fourth key according to the CK, IK and first information.
- the first information includes at least the service network name of the UE, and/or at least one of the HSE identifier, the UE SUPI or the BEST service identifier.
- the UDM returns the fourth key to the AUSF.
- the AUSF generates the first key according to the fourth key and the first information. This item may also include at least one of the identifier of the HSE, the SUPI of the UE or the BEST service identifier, or other parameters shared by the UE and the HSE, or parameters determined by the HSE.
- the first network function is AUSF
- UDM can use CK and IK or Kausf as keys to serve network name, and/or, SQN XOR AK, and/or, HSE ID, UE SUPI or BEST service ID At least one of them is the input parameter to derive a fourth key, and then the fourth key is sent to AUSF, and AUSF generates Kbest' according to the fourth key, and Kbest' at this time is the first key.
- the second request may include indication information, and the first network function will execute S104 after receiving the indication information, that is, generate the first key.
- the indication information may be used to indicate the security parameters of requesting BEST, such as requesting BEST authentication vector or requesting BEST key, or used to request 5G authentication and key agreement (5G authentication and key agreement, AKA) authentication vector or 5G AKA authentication key, or indicate that the requested authentication method is 5G AKA or BEST.
- the UDM may also generate 5G AKA security parameters or BEST security parameters according to the indication information and return the security parameters in the response, where the security parameters include the first key.
- the security parameters also include parameters such as authentication response, which are not limited. This explanation is applicable to all scenarios of this application, and will not be repeated hereafter.
- the fourth request may include indication information, and after receiving the indication information, the UDM will execute S103, that is, generate the first key according to the encryption key, the integrity key, and the first information.
- the indication information may be used to indicate the security parameters of requesting BEST, such as requesting BEST authentication vector or requesting BEST key, or for requesting 5G AKA authentication vector or 5G AKA authentication key, or indicating the requested authentication method is 5G AKA or BEST.
- the HSE can use the existing services of UDM, such as UE authentication service.
- the second request is UE authentication acquisition request (Nudm_UEAuthentication_Get), and the second request needs to carry instruction information, and UDM uses the instruction information Generate and return the first key.
- This application also includes defining a new service in the UDM.
- the second request is different from other requests in the UE authentication acquisition request, and is a service request dedicated to BEST authentication.
- the UDM can generate and The first key is returned without carrying indication information in the second request.
- the fourth request is a UE authentication acquisition request, and the fourth request needs to carry instruction information, and UDM generates and sends information according to the instruction information. Return said Kausf to AUSF.
- This application also includes defining a new service in the UDM.
- the fourth request is different from the other requests in the UE authentication acquisition request, and is a service request dedicated to BEST authentication.
- the UDM can be generated according to the dedicated service and The Kausf is returned without carrying indication information in the fourth request.
- the indication information may be carried by the AUSF, or obtained by the AUSF from the second request of the HSE, and then carried in the fourth request.
- S104 The first network function sends the first key to the HSE.
- the HSE receives the first key from the first network function.
- the first network function may send the authentication vector to the HSE, and the HSE receives the authentication vector accordingly.
- the authentication vector includes the first key.
- the authentication vector may also include a random number, an authentication token, and RES or RES*.
- RES* is generated using CK
- S105 The HSE generates a second key according to the first key.
- the second key includes a confidentiality protection key and/or an integrity protection key between the UE and the HSE.
- the second key includes a confidentiality protection key, for example, the second key includes a confidentiality protection key and an integrity protection key.
- the second key when the HSE receives an encryption instruction from the first network function, the second key includes a confidentiality protection key.
- the second key may be an integrity protection key, or may include a confidentiality protection key and an integrity protection key. Key, just do not enable the confidentiality protection service, and do not use the confidentiality protection key.
- the HSE may generate the second key according to the authentication vector.
- the HSE judges whether the UE already has a legal key. If so, skip S102-S104 and execute S105; otherwise, if the HSE determines that the UE does not have a legal key, execute S102-S105.
- legal keys include the first key or the second key.
- the legal key of the UE may be obtained by the HSE during the session establishment process of the UE.
- the HSE can store the correspondence between the SUPI of the UE and the legal key.
- the HSE can query whether the UE has a legal key according to the SUPI, or, when receiving the SUPI carried in the first request, the HSE can query whether the UE has a valid key.
- the HSE can obtain the SUPI of the UE according to the SUCI of the UE or the identity assigned to the UE by the HSE, and query whether the UE has a valid key according to the SUPI.
- S106 The UE receives the random number.
- the random number may be sent by the HSE, for example, after S104, the HSE sends the random number to the UE.
- the random number is carried in the session start message.
- An authentication token may also be sent in the session start message.
- the UE generates an encryption key and an integrity key according to the random number and the root key of the UE.
- CK is related to RAND, or in other words, CK is determined according to RAND.
- IK is related to RAND, or in other words, IK is determined according to RAND.
- S108 The UE generates a first key according to the encryption key, the integrity key, and the first information.
- S109 The UE generates a second key according to the first key, where the second key includes a confidentiality protection key and/or an integrity protection key between the UE and the HSE.
- the UE and/or the HSE may generate the second key according to the first key and the second information.
- the second information may include the identifier of the HSE, the algorithm type identifier of the UE's BEST service, the serial number of the UE used to calculate the authentication token, the hidden key (anonymity key, AK), the UE's SUPI, a random number, or At least one of the authentication tokens.
- the home network security node can obtain the first key, wherein the first key is generated according to the encryption key, the integrity key and the first information, therefore, the home network security node does not need to obtain the UE's encrypted
- the secret key and the integrity key can obtain the first key, and then a security key for protecting user equipment data can be generated according to the first key. Therefore, this solution can provide a secure key acquisition method suitable for 5G network architecture and reduce the data security risk of user equipment.
- the first key can be Kausf, Kbest or Kbest'.
- Kausf can be determined according to at least one of CK and IK, and the service network name, the sequence number (sequence number, SQN) or AK used to determine the authentication token of the UE.
- Kausf can be determined through a key derivation function (KDF) according to CK and IK, the service network name, the length of the service network name, the SQN XOR AK, and the length of the SQN XOR AK.
- KDF key derivation function
- the key derivation function is, for example, a secure hash algorithm 256 (secure hash algorithm 256, SHA-256) function, and the secure hash algorithm 256 is one of the hash-based message authentication code (hash-based message authentication code, HMAC) algorithms kind.
- a secure hash algorithm 256 secure hash algorithm 256, SHA-256
- the secure hash algorithm 256 is one of the hash-based message authentication code (hash-based message authentication code, HMAC) algorithms kind.
- the serving network name of the UE may be carried in the first request and sent to the HSE, and the HSE sends it to the UDM through the second request or the AUSF through the fourth request.
- the UDM uses the stored name of the serving network where the UE is authenticated or registered. If the HSE carries the service network name of the UE in the second request or the AUSF carries the service network name in the fourth request, the UDM can also judge whether the service network name carried in the HSE is correct according to the service network name where the UE is authenticated or registered.
- AK may be related to RAND, for example, CK is determined according to RAND.
- Kbest is a key deduced by Kausf.
- the derivation method can be a new key generated by using the HMAC algorithm with Kausf as the key and additional parameters as the input transmission. For example, refer to the formula 1 Determine the new key.
- the additional parameter may be HSE ID, SUPI, BEST service ID, etc., which are not limited.
- the HSE can directly obtain the Kbest or the authentication vector including the Kbest from the UDM, or obtain the Kbest from the UDM through the AUSF, or obtain the authentication vector including the Kbest.
- the authentication vector sent by UDM to AUSF may include at least one of Kausf, RAND, AUTN, RES or RES*, and AUSF further deduces Kbest according to Kausf.
- the UDM can also derive the Kbest, and the AUSF forwards the Kbest or forwards the authentication vector including the Kbest to the HSE.
- the AUTN can be derived according to the SQN, AK, AMF value and MAC value
- the AMF value is a 16-bit field, which can be set.
- the MAC value can be derived from the SQN, RAND and AMF values.
- Kbest' can be determined according to at least one of CK and IK, and the service network name of the UE, the identity of the HSE, the SUPI, the BEST service identity, and the like.
- CK can also be replaced by CK', and IK can be replaced by IK'.
- 5G can use the extended authentication protocol 'authentication and key negotiation ( extensible authentication protocol-authentication and key agreement, EAP-AKA').
- EAP-AKA' extensible authentication protocol-authentication and key agreement
- CK' and IK' can be derived from CK and IK.
- the following describes the method for the HSE to determine the second identity of the UE involved in S102 according to the first identity of the UE.
- the first identifier may be SUCI
- the second identifier may be SUPI
- the HSE may determine the second identifier through UDM.
- the UDM can decrypt the SUCI to obtain the SUPI. Therefore, when the HSE obtains the SUCI carried in the first request, it can send the UE's SUCI to the UDM, request the UE's SUPI, and then receive the SUPI returned by the UDM.
- the HSE may send a third request to the UDM, which carries the UE's SUCI, and the third request may be a UE identity acquisition request.
- the UDM may send a UE identity acquisition response message to the HSE, which carries the UE's SUPI.
- the first identifier may be SUCI
- the second identifier may be SUPI
- the HSE may obtain the second identifier after processing the first identifier locally.
- the HSE can be made to store a key that can be used to decrypt SUCI to obtain SUPI. For example, UE encrypts SUPI according to HSE's public key to obtain SUCI, and carries SUCI in the first request. After receiving the first request, HSE can decrypt SUCI in the first request according to HSE's private key to obtain UE's SUPI.
- the first identifier may be an identifier assigned by the HSE to the UE, the second identifier is SUPI, and the HSE may obtain the second identifier after processing the first identifier locally.
- the HSE may store the corresponding relationship between the identifier assigned by the HSE to the UE and the SUPI of the UE, for determining the SUPI of the UE corresponding to the identifier in the first request.
- the HSE assigns an ID to the UE according to the SUPI of the UE
- the HSE can store the correspondence between the ID of the UE and the SUPI of the UE, and send Before the second request, the SUPI of the UE corresponding to the UE identifier carried in the first request is determined according to the corresponding relationship.
- S102-S104 may be skipped, and S105 may be executed.
- an exemplary communication method provided by the embodiment of the present application may include the following steps:
- S201 The UE sends a session request to the HSE, which carries a first identifier of the UE.
- the session request may also include the service network name and/or encryption indication of the UE.
- the encryption indication may be used to request encryption services.
- S202 The HSE judges whether the UE has a legal key, if not, execute S203, and if yes, execute S206.
- the first identifier is the SUPI of the UE.
- the first identity is SUCI or an identity allocated by the HSE, and the HSE determines the SUPI of the UE according to the first identity.
- the HSE sends an authentication vector acquisition request to the first network function, where the second identifier of the UE is carried.
- the authentication vector acquisition request may include the UE's serving network name.
- the first network function may be UDM or AUSF, and for the specific implementation manner of UDM or AUSF, refer to the description in S103.
- the first network function generates a first key according to the second identifier of the UE, where the first information is required as an input parameter in a process of generating the first key.
- the first information includes at least the service network name of the UE.
- the first information may also include at least one of the HSE identifier, the UE's SUPI or the BEST service identifier. That is to say, the first key is at least generated according to the identity of the serving network name of the UE.
- the first network function may obtain the serving network name of the UE according to the second identifier of the UE.
- the first network function is UDM, and the UDM can acquire the service network name of the UE according to the second identifier of the UE.
- the AUSF may query the UDM for the service network name of the UE according to the second identifier of the UE.
- the first network function sends an authentication vector acquisition response message to the HSE, where the authentication vector is carried, and the authentication vector includes at least the first key.
- the authentication vector may also include at least one of RAND, AUTN, RES or RES*.
- the authentication vector acquisition response message may also include an encryption indication.
- the HSE judges according to the encryption indication Whether to enable the confidentiality protection service with the UE.
- S207 The HSE sends a session start message to the UE.
- the session start message may include the RAND, or the HSE sends the RAND to the UE through other messages.
- the way of acquiring RAND can refer to existing standards, which is not specifically limited in this application.
- the session start message carries an identifier assigned by the HSE to the UE.
- the UE may send a session start confirmation message to the HSE.
- S208 The UE generates CK and IK according to the random number and the root key of the UE.
- S209 The UE generates a first key according to the CK, the IK and the first information.
- the first information here is the same as the first information used to generate the first key in S204.
- S210 The UE generates a second key according to the first key.
- timing of S207-S210 and S206 is not strictly limited, for example, S207-S210 may be executed before or after S206.
- the UE and the HSE can obtain the second key respectively, wherein at least the service network name of the UE is introduced in the second key generation process, so the HSE does not need to know the CK and IK, and can be applied to the 5G network architecture.
- the method shown in FIG. 6 is initiated according to the first identity of the UE, and is performed between the HSE and the first network function according to the second identity of the UE. It does not need to introduce the IMSI of the UE, and is better applicable to the 5G network architecture to support 5G BEST. If the first identifier is SUCI, it further satisfies the requirement that the UE communicates using SUCI to protect the security of SUPI transmission.
- the UE can carry an encryption indication in the session request, and the HSE can generate a confidentiality protection key according to the encryption indication.
- a communication method provided by an embodiment of the present application includes the following steps:
- S301 The UE sends a session request to the HSE, which carries a first identifier of the UE.
- the session request may also include the service network name of the UE.
- the service network name of the UE can be used to indicate to obtain the encryption service.
- S302 The HSE judges whether the UE has a legal key, if not, executes S303, and if yes, executes S306.
- the first identifier is the SUPI of the UE.
- the first identity is SUCI or an identity allocated by the HSE, and the HSE determines the SUPI of the UE according to the first identity.
- the HSE sends an authentication vector acquisition request to the first network function, where the second identifier of the UE is carried.
- the first network function may be UDM or AUSF, and for the specific implementation manner of UDM or AUSF, refer to the description in S103.
- the first network function generates a first key according to the second identifier of the UE, where the first information is required as an input parameter in a process of generating the first key.
- the first information may include at least one of the identifier of the HSE, the SUPI or the BEST service identifier of the UE. That is to say, the first key is generated according to at least one of the identifier of the HSE, the SUPI or the BEST service identifier of the UE.
- the first network function sends an authentication vector acquisition response message to the HSE, where the authentication vector is carried, and the authentication vector includes at least the first key.
- the authentication vector may also include at least one of RAND, AUTN, RES or RES*.
- the authentication vector acquisition response message may also include an encryption indication.
- the HSE will Serving network name or encryption indication, judging whether to enable the confidentiality protection service with the UE.
- S307 The HSE sends a session start message to the UE.
- the session start message may include the RAND, or the HSE sends the RAND to the UE through other messages.
- the way of acquiring RAND can refer to existing standards, which is not specifically limited in this application.
- the UE may send a session start confirmation message to the HSE.
- S308 The UE generates CK and IK according to the random number and the root key of the UE.
- S309 The UE generates a first key according to the CK, the IK and the first information.
- the first information here is the same as the first information used to generate the first key in S204.
- S310 The UE generates a second key according to the first key.
- timing of S307-S310 and S306 is not strictly limited, for example, S307-S310 may be executed before or after S306.
- the UE and the HSE can obtain the second key respectively, wherein at least one of RAND, AUTN, RES or RES* is introduced into the second key generation process, so the HSE does not need to know CK and IK , can be applied to 5G network architecture.
- the method shown in Figure 7 is initiated according to the first identity of the UE, and is performed between the HSE and the first network function according to the second identity of the UE. It does not need to introduce the IMSI of the UE, and is better applicable to the 5G network architecture to support 5G BEST. If the first identifier is SUCI, it further satisfies the requirement that the UE communicates using SUCI to protect the security of SUPI transmission.
- the UE can carry the service network name in the session request, and the HSE can generate a confidentiality protection key according to the service network name.
- the Kausf generated in the main authentication of UE and PLMN can be used for implicit authentication instead of the explicit authentication method in 4G BEST.
- implicit authentication means that there is no need for AUTN and RES authentication between UE and HSE
- explicit authentication means that AUTN and RES authentication need to be performed between UE and HSE before key generation .
- the premise of this implementation is that the UE and the network have completed the primary authentication, and both the UE and the AUSF have obtained the Kausf in the primary authentication. If the UE subscribes to the BEST service, the UDM will also return the BEST indication when returning the authentication vector to the AUSF in the main authentication.
- the authentication vector may include Kausf and at least one of RAND, AUTN or RES.
- AUSF pushes the generated Kbest and key ID (key ID) to HSE according to the instruction.
- Subsequent UE can generate Kbest and key ID according to Kausf, and carry the key ID to initiate a session request to HSE, and HSE will find the corresponding Kbest according to the Key ID, that is, obtain the Kbest of UE.
- the UE and the HSE can also share the same Kbest.
- Kbest as the root key to derive the subsequent E2M or E2E key.
- the generation of KBEST can consider introducing parameters such as BEST service code, SUPI, HSE ID; the calculation of Key ID can introduce parameters such as SUPI and key ID code. All derived keys can use Kausf.
- Kausf may be used as a key, and parameters such as BEST service code, SUPI or HSE identification may be used as additional parameters.
- Kausf can be used as the key, and parameters such as SUPI or key ID code can be used as additional parameters.
- the key ID code is, for example, related to BEST temporary UE identifier (B-TID) or application authentication and key management (authentication and key management for applications, AKMA) temporary UE identifier (AKMA temporary UE identifier, A- TID) and so on, for example, strings such as B-TID or A-TID.
- the communication method provided by the embodiment of the present application may include the following steps:
- the UDM determines that the UE subscribes to the BEST service.
- the UDM can query the subscription data of the UDM to determine whether the UE has subscribed to the BEST service.
- the AUSF sends a UE authentication acquisition request to the UDM.
- the UDM returns a UE authentication acquisition response message to the AUSF, which carries the UE's SUPI and indication information.
- the indication information may be BEST indication, which means that the UE needs to use the BEST service.
- AUSF stores the correspondence between Kbest and key ID.
- the AUSF sends a key registration request to the HSE, which carries the SUPI, Kbest and key ID of the UE.
- S407 UE generates Kbest and key ID according to Kausf.
- S407 may be performed before or after the UE sends the session request, or after the Kausf is generated, which is not specifically limited. For example, when UE wants to establish a session, it generates Kbest and key ID.
- S408 The UE sends a session request to the HSE, which carries a key ID.
- the HSE acquires the Kbest corresponding to the key ID from the UE.
- S410 The HSE generates a security key of the UE according to Kbest.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- S411 The HSE sends a session start message to the UE.
- S412 The UE generates a security key according to Kbest.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- the HSE can query Kbest according to the key ID of the UE, so as to obtain the confidentiality protection key and/or integrity protection key of the UE according to Kbest.
- This process reuses the result of UE main authentication and the key to complete the key sharing between UE and HSE, which saves the separate authentication process of UE and HSE, thus better matching the requirements of BEST for energy saving.
- the key generation method under the 4G network architecture can be used, the UDM provides the CK and IK to the HSE, and the UE and the HSE generate the BEST key according to the CK and IK.
- the HSE may send a UE authentication acquisition request to the UDM, and after receiving the UE authentication acquisition request, the UDM may generate a third key, or generate a third key through a new service other than the UE authentication service.
- the third key may include CK and IK.
- the UDM may generate the third key according to the indication information; otherwise, the UDM may generate the third key through services other than the UE authentication service.
- the indication information here can be used to indicate the security parameters of requesting BEST, such as requesting BEST authentication vector or requesting BEST key, or used to request 5G authentication and key negotiation authentication vector or 5G AKA authentication key, or indicating the requested The authentication method is 5G AKA or BEST.
- the UDM may send an authentication vector to the HSE, including the third key, and may also include at least one of RAND, AUTN, or RES, and the HSE generates the security key of the UE after receiving the authentication vector.
- the UE generates a security key according to the same parameters.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- the process of generating authentication keys by UE and HSE according to CK and IK may include the following steps:
- S501 The UE sends a session request to the HSE, which carries the SUPI of the UE.
- S502 The HSE judges whether the UE has a legal key according to the SUPI of the UE.
- an authentication key for the UE may be generated according to the legal key, and then S506 is performed; otherwise, if there is no legal key, S503 is performed.
- the HSE sends a BEST authentication vector acquisition request to the UDM, which carries the SUPI of the UE.
- the UDM sends a BEST authentication vector acquisition response message to the HSE, which carries an authentication vector, the authentication vector includes the third key, and may also include at least one of RAND, AUTN, or RES.
- the HSE can generate a security key for the UE according to the third key.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- the same UE security key ie a confidentiality protection key and/or an integrity protection key, can be generated at the UE side.
- S506 The HSE sends a session start message to the UE.
- the UE returns a session start response message to the HSE.
- the authentication vector consistent with the 4G BEST authentication vector can be obtained from the UDM, so that the UE and the HSE can complete the authentication and key generation while being better compatible with the existing security design, because the modification on the UE side is relatively difficult. Small.
- the HSE when the UE accesses through the 4G network, the HSE can obtain the authentication vector through the HSS, that is, the HSS requests the UDM to obtain the authentication vector, and then the HSS sends it to the HSE.
- the carried UE identifier is IMSI.
- the HSS may send a UE authentication acquisition request to the UDM.
- the UDM may generate the fourth key, or generate the fourth key through a new service other than the UE authentication service.
- the UDM may generate the fourth key according to the indication information; otherwise, the UDM may generate the fourth key through services other than the UE authentication service.
- the indication information here can be used to indicate the security parameters of requesting BEST, such as requesting BEST authentication vector or requesting BEST key, or used to request 5G authentication and key negotiation authentication vector or 5G AKA authentication key, or indicating the requested The authentication method is 5G AKA or BEST.
- the fourth key may include CK and IK.
- the UDM may send the authentication vector to the HSS, which includes the fourth key and may also include at least one of RAND, AUTN or RES.
- the HSS forwards the authentication vector to the HSE, and the HSE generates the security key of the UE after receiving the authentication vector.
- the UE generates a security key according to the same parameters.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- generating the authentication key by UE and HSE according to CK and IK may include the following steps:
- S601 The UE sends a session request to the HSE, which carries the IMSI of the UE.
- S602 The HSE judges whether the UE has a legal key according to the IMSI of the UE.
- an authentication key for the UE may be generated according to the legal key, and then S608 is executed; otherwise, if there is no legal key, S603 is executed.
- the HSE sends an authentication information request to the HSS, carrying the IMSI of the UE.
- the HSS sends a BEST authentication vector acquisition request to the UDM, which carries the IMSI of the UE.
- the UDM sends a BEST authentication vector acquisition response to the HSS, which carries an authentication vector, the authentication vector includes the fourth key, and may also include at least one of RAND, AUTN, or RES.
- the HSS sends an authentication information response message to the HSE, where the response message carries an authentication vector, where the authentication vector includes the fourth key, and may also include at least one of RAND, AUTN, or RES.
- the HSE can generate a security key for the UE according to the fourth key.
- the security key of the UE includes a confidentiality protection key and/or an integrity protection key.
- the same confidentiality protection key and/or integrity protection key may be generated at the UE side.
- the HSE sends a session start message to the UE.
- the UE after receiving the session start message, the UE returns a session start response message to the HSE.
- the authentication vector when the UE accesses through the 4G network, can be obtained from the UDM through the HSS, so that the UE can also use the 5G credentials to access the BEST service when accessing from the 4G network.
- the HSE may also directly send an authentication service acquisition request to the UDM, the difference being that the authentication service acquisition request here carries the IMSI of the UE.
- the embodiment of the present application further provides an apparatus 1100 for implementing the above method.
- the device may be a software module or a system on a chip.
- the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
- the apparatus 1100 may include: a processing unit 1101 and a communication unit 1102 .
- the device may include the HSE, UDM or UE shown in the above method embodiments, or a device having the functions of the HSE, UDM or UE shown in the above method embodiments.
- the communication unit may also be referred to as a transceiver unit, and may include a sending unit and/or a receiving unit, respectively configured to perform the steps of sending and receiving by HSE, UDM or UE in the above method embodiments.
- the communication unit 1102 may also be called a transceiver, a transceiver, a transceiver device, and the like.
- the processing unit 1101 may also be called a processor, a processing board, a processing module, a processing device, and the like.
- the device in the communication unit 1102 for realizing the receiving function may be regarded as a receiving unit
- the device in the communication unit 1102 for realizing the sending function may be regarded as a sending unit, that is, the communication unit 1102 includes a receiving unit and a sending unit.
- the communication unit 1102 may sometimes be called a transceiver, a transceiver, or a transceiver circuit and the like.
- the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit, etc.
- the sending unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit, etc.
- the communication unit 1102 may be configured to receive a first request from a UE, where the first request includes a first identifier of the UE.
- the communication unit 1102 is further configured to send a second request to the first network function, where the second request includes a second identifier of the UE, and the second identifier is determined according to the first identifier, or the second identifier is the same as the first identifier.
- the communication unit 1102 is further configured to receive a first key from the first network function, where the first key is generated according to the encryption key, the integrity key, and the first information.
- the processing unit 1101 may be configured to generate a second key according to the first key, where the second key includes a confidentiality protection key and/or an integrity protection key between the UE and the HSE.
- the first information includes at least one of the service network name of the UE, the HSE identifier, the SUPI of the UE, and the BEST service identifier.
- the communication unit and the processing unit may also perform other operations, for example, the communication unit 1102 is used to perform the sending and receiving operations of the HSE in the method embodiments shown in FIGS.
- the communication unit 1102 is used to perform the sending and receiving operations of the HSE in the method embodiments shown in FIGS.
- other operations of the HSE except for the transceiving operation may refer to the foregoing description for details, and details are not repeated here.
- the communication unit 1102 may be configured to receive a second request from the HSE, where the second request includes the second identifier of the UE.
- the processing unit 1101 may be configured to generate an encryption key and an integrity key of the UE according to the second identity, and generate a first key according to the encryption key, the integrity key and the first information.
- the communication unit 1102 is also configured to send the first key to the HSE.
- the first information includes at least one of the service network name of the UE, the HSE identifier, the SUPI of the UE, and the BEST service identifier.
- the communication unit and the processing unit may also perform other operations, for example, the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- the communication unit 1102 may be configured to send a first request to the HSE, where the first request includes an identifier of the UE, and receive a random number sent by the HSE.
- the processing unit 1101 may be configured to generate an encryption key and an integrity key according to the random number and the root key of the UE, generate a first key according to the encryption key, the integrity key, and the first information, and generate second key.
- the second key includes a confidentiality protection key and/or an integrity protection key between the UE and the HSE.
- the first information includes at least one of the service network name of the UE, the HSE identifier, the SUPI of the UE, and the BEST service identifier.
- the communication unit and the processing unit may also perform other operations, for example, the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- the communication unit 1102 is used to perform the UDM sending and receiving operations in the method embodiments shown in FIGS.
- FIG. 12 is another communication device provided by the embodiment of the present application.
- the device shown in FIG. 12 may be a hardware circuit implementation of the device shown in FIG. 11 .
- the communication device may be applicable to the flow chart shown above, and execute the functions of the HSE, UDM or UE in the above method embodiments.
- FIG. 12 only shows the main components of the communication device.
- Apparatus 1200 may also include at least one memory 1230 for storing program instructions and/or data.
- the memory 1230 is coupled to the processor 1220 .
- the coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
- Processor 1220 may cooperate with memory 1230 .
- Processor 1220 may execute program instructions stored in memory 1230 . At least one of the at least one memory may be included in the processor.
- the apparatus 1200 shown in FIG. 12 includes at least one processor 1220 and a communication interface 1210 , and the processor 1220 is configured to execute instructions or programs stored in a memory 1230 .
- the processor 1220 is used to perform operations performed by the processing unit 1101 in the above embodiments
- the communication interface 1210 is used to perform operations performed by the communication unit 1102 in the above embodiments.
- the communication interface may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces.
- the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver integrated with a transceiver function, or be a communication interface.
- Apparatus 1200 may also include a communication link 1240 .
- the communication interface 1210, the processor 1220 and the memory 1230 can be connected to each other through the communication line 1240;
- the communication line 1240 can be a peripheral component interconnect standard (peripheral component interconnect, referred to as PCI) bus or an extended industry standard architecture (extended industry standard architecture , referred to as EISA) bus and so on.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the communication line 1240 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 12 , but it does not mean that there is only one bus or one type of bus.
- the present application also provides a communication system, configured to execute the method provided in any of the above processes, for example, execute any of the processes in FIG. 5 to FIG. 10 .
- the communication system may include the architecture shown in FIG. 5 .
- the present application also provides a computer-readable storage medium for storing a computer program, and the computer program includes instructions for executing the method provided in any of the processes above.
- the present application also provides a computer program product, the computer program product comprising: computer program code, when the computer program code is run on a computer, the computer is made to execute the method provided in any one of the processes above.
- the present application also provides a chip, including a processor, the processor is coupled with the memory, and is used to execute the computer program or instruction stored in the memory, when the processor executes the computer program or instruction, so that The methods provided in either flow above are implemented.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) having computer-usable program code embodied therein.
- These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions
- the device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (29)
- 一种通信方法,其特征在于,包括:归属网络安全节点接收来自于用户设备的第一请求,所述第一请求包括所述用户设备的第一标识;所述归属网络安全节点向第一网络功能发送第二请求,所述第二请求包括所述用户设备的第二标识,所述第二标识根据所述第一标识确定,或者所述第二标识与第一标识相同;所述归属网络安全节点接收来自于所述第一网络功能的第一密钥,所述第一密钥根据加密密钥、完整性密钥和第一信息生成,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中的至少一个;所述归属网络安全节点根据所述第一密钥和第三信息生成第二密钥,所述第三信息包括:归属网络安全节点的标识、用户设备的BEST服务的算法类型标识符、用户设备中用于计算认证令牌的序列号、隐藏密钥、用户设备的SUPI、随机数,或者认证令牌;所述第二密钥包括所述用户设备与所述归属网络安全节点之间的机密性保护密钥和/或完整性保护密钥。
- 如权利要求1所述的方法,其特征在于,所述用户设备的第一标识包括所述用户设备的用户隐藏标识SUCI,所述用户设备的第二标识包括所述用户设备的SUPI,所述归属网络安全节点向第一网络功能发送第二请求之前,还包括:所述归属网络安全节点根据所述SUCI获取所述用户设备的SUPI。
- 如权利要求2所述的方法,其特征在于,所述归属网络安全节点根据所述SUCI获取所述用户设备的SUPI,包括:所述归属网络安全节点根据所述归属网络安全节点的私钥解密所述SUCI获得所述SUPI,其中,所述SUCI是根据所述归属网络安全节点的公钥加密所述SUPI获得的;或者,包括:所述归属网络安全节点向所述第一网络功能发送所述用户设备的SUCI;所述归属网络安全节点接收来自于所述第一网络功能的所述SUPI。
- 如权利要求1-3中任一所述的方法,其特征在于,所述第二请求为用户设备认证获取请求,所述用户设备认证获取请求还包括指示信息,所述指示信息用于指示根据所述加密密钥、所述完整性密钥和所述第一信息生成所述第一密钥。
- 如权利要求1-4中任一所述的方法,其特征在于,所述第一请求还包括所述用户设备的服务网络名称,所述第二请求还包括所述服务网络名称。
- 如权利要求1-5中任一所述的方法,其特征在于,所述第一网络功能包括认证服务功能或统一数据管理功能。
- 如权利要求1-6中任一所述的方法,其特征在于,所述第一请求还包括加密指示,所述加密指示用于指示所述用户设备请求用户面加密服务。
- 一种通信方法,其特征在于,包括:统一数据管理功能接收来自于归属网络安全节点的第二请求,所述第二请求包括用户设备的第二标识;所述统一数据管理功能根据所述第二标识生成所述用户设备的加密密钥和完整性密钥;所述统一数据管理功能根据所述加密密钥、完整性密钥和第一信息生成第一密钥,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中的至少一个;所述统一数据管理功能向所述归属网络安全节点发送所述第一密钥。
- 如权利要求8所述的方法,其特征在于,还包括:所述统一数据管理功能接收来自于所述归属网络安全节点的所述用户设备的用户隐藏标识SUCI;所述统一数据管理功能根据所述SUCI确定所述用户设备的SUPI;所述统一数据管理功能向所述归属网络安全节点发送所述用户设备的SUPI。
- 如权利要求8或9所述的方法,其特征在于,所述第二请求为用户设备认证获取请求,所述用户设备认证获取请求还包括指示信息,所述统一数据管理功能根据所述加密密钥和完整性密钥和第一信息生成第一密钥,包括:所述统一数据管理功能在收到所述指示信息后,根据所述加密密钥和完整性密钥和第一信息生成所述第一密钥。
- 如权利要求8-10中任一所述的方法,其特征在于,所述第二请求还包括所述用户设备的服务网络名称;或者,所述方法还包括:所述统一数据管理功能根据所述第二标识确定所述用户设备的注册的或认证的或所在的服务网络名称。
- 一种通信方法,其特征在于,包括:用户设备向归属网络安全节点发送第一请求,所述第一请求包括所述用户设备的标识;所述用户设备接收来自于所述归属网络安全节点的随机数;所述用户设备根据所述随机数以及所述用户设备的根密钥生成加密密钥和完整性密钥;所述用户设备根据所述加密密钥、完整性密钥和第一信息生成第一密钥,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中 的至少一个;所述用户设备根据所述第一密钥和第三信息生成第二密钥,所述第三信息包括:归属网络安全节点的标识、用户设备的BEST服务的算法类型标识符、用户设备中用于计算认证令牌的序列号、隐藏密钥、用户设备的SUPI、随机数,或者认证令牌;所述第二密钥包括所述用户设备与所述归属网络安全节点之间的机密性保护密钥和/或完整性保护密钥。
- 如权利要求12所述的方法,其特征在于,所述第一请求还包括所述用户设备的服务网络名称;和/或所述第一请求还包括加密指示,所述加密指示用于指示所述用户设备请求用户面加密服务。
- 一种通信装置,其特征在于,包括通信单元和处理单元:所述通信单元用于,接收来自于用户设备的第一请求,所述第一请求包括所述用户设备的第一标识;所述通信单元还用于,向第一网络功能发送第二请求,所述第二请求包括所述用户设备的第二标识,所述第二标识根据所述第一标识确定,或者所述第二标识与第一标识相同;所述通信单元还用于,接收来自于所述第一网络功能的第一密钥,所述第一密钥根据加密密钥、完整性密钥和第一信息生成,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中的至少一个;所述处理单元用于,根据所述第一密钥和第三信息生成第二密钥,所述第三信息包括:归属网络安全节点的标识、用户设备的BEST服务的算法类型标识符、用户设备中用于计算认证令牌的序列号、隐藏密钥、用户设备的SUPI、随机数,或者认证令牌;所述第二密钥包括所述用户设备与归属网络安全节点之间的机密性保护密钥和/或完整性保护密钥。
- 如权利要求14所述的通信装置,其特征在于,所述第一标识包括所述用户设备的用户隐藏标识SUCI,所述处理单元还用于:根据所述SUCI获取所述用户设备的SUPI。
- 如权利要求15所述的通信装置,其特征在于,所述处理单元具体用于:根据所述归属网络安全节点的私钥解密所述SUCI获得所述SUPI,其中,所述SUCI是根据所述归属网络安全节点的公钥加密所述SUPI获得的;或者,所述通信单元还用于:向所述第一网络功能发送所述用户设备的SUCI;接收来自于所述第一网络功能的所述SUPI。
- 如权利要求14-16中任一所述的通信装置,其特征在于,所述第二请求为用户设备认证获取请求,所述用户设备认证获取请求还包括指示信息,所述指示信息用于指示根据所述加密密钥、所述完整性密钥和所述第一信息生成所述第一密钥。
- 如权利要求14-17中任一所述的通信装置,其特征在于,所述第一请求还包括所述用户设备的服务网络名称,所述第二请求还包括所述服务网络名称。
- 如权利要求14-18中任一所述的通信装置,其特征在于,所述第一网络功能包括认证服务功能或统一数据管理功能。
- 如权利要求14-19中任一所述的通信装置,其特征在于,所述第一请求还包括加密指示,所述加密指示用于指示所述用户设备请求用户面加密服务。
- 一种通信装置,其特征在于,包括通信单元和处理单元:所述通信单元用于,接收来自于归属网络安全节点的第二请求,所述第二请求包括用户设备的第二标识;所述处理单元用于,根据所述第二标识生成所述用户设备的加密密钥和完整性密钥;所述处理单元还用于,根据所述加密密钥、完整性密钥和第一信息生成第一密钥,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中的至少一个;所述通信单元还用于,向所述归属网络安全节点发送所述第一密钥。
- 如权利要求21所述的通信装置,其特征在于,所述通信单元还用于:接收来自于所述归属网络安全节点的所述用户设备的用户隐藏标识SUCI;所述处理单元还用于:所述统一数据管理功能根据所述SUCI确定所述用户设备的SUPI;所述通信单元还用于:向所述归属网络安全节点发送所述用户设备的SUPI。
- 如权利要求21或22所述的通信装置,其特征在于,所述第二请求为用户设备认证获取请求,所述用户设备认证获取请求还包括指示信息,所述处理单元具体用于:在收到所述指示信息后,根据所述加密密钥和完整性密钥和第一信息生成所述第一密钥。
- 如权利要求21-23中任一所述的通信装置,其特征在于,所述第二请求还包括所述用户设备的服务网络名称;或者,所述处理单元还用于:根据所述第二标识确定所述用户设备的注册的或认证的或所在的服务网络名称。
- 一种通信装置,其特征在于,包括通信单元和处理单元:所述通信单元用于,向归属网络安全节点发送第一请求,所述第一请求包括所述用户设备的标识;所述通信单元还用于,接收来自于所述归属网络安全节点的随机数;所述处理单元用于,根据所述随机数以及所述用户设备的根密钥生成加密密钥和完整性密钥;所述处理单元还用于,根据所述加密密钥、完整性密钥和第一信息生成第一密钥,所述第一信息包括:所述用户设备的服务网络名称、所述归属网络安全节点的标识、所述用户设备的用户永久标识SUPI,以及为低吞吐量机器类型通信设备设计的省电安全BEST服务标识中的至少一个;所述处理单元还用于,根据所述第一密钥和第三信息生成第二密钥,所述第三信息包括:归属网络安全节点的标识、用户设备的BEST服务的算法类型标识符、用户设备中用于计算认证令牌的序列号、隐藏密钥、用户设备的SUPI、随机数,或者认证令牌;所述第二密钥包括所述用户设备与所述归属网络安全节点之间的机密性保护密钥和/或完整性保护密钥。
- 如权利要求25所述的通信装置,其特征在于,所述第一请求还包括所述用户设备的服务网络名称;和/或所述第一请求还包括加密指示,所述加密指示用于指示所述用户设备请求用户面加密服务。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序或指令,当所述计算机程序或指令被计算设备执行时,以使得所述计算设备执行如权利要求1至7中任一项所述的方法,或使得所述计算设备执行如权利要求8至11中任一项所述的方法,或使得所述计算设备执行如权利要求12或13所述的方法。
- 一种通信系统,其特征在于,包括如权利要求14-20中任一所述的通信装置,和如权利要求21-24中任一所述的通信装置,和如权利要求25或26所述的通信装置。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机指令,当所述计算机指令被信令保护装置执行时,使得所述信令保护装置执行如权利要求1至7中任一项所述的方法,或执行如权利要求8至11中任一项所述的方法,或执行如权利要求12或13所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22806530.6A EP4322579A4 (en) | 2021-05-10 | 2022-04-28 | COMMUNICATION METHOD AND DEVICE |
US18/505,391 US20240089728A1 (en) | 2021-05-10 | 2023-11-09 | Communication method and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110504785.6A CN115412909A (zh) | 2021-05-10 | 2021-05-10 | 一种通信方法及装置 |
CN202110504785.6 | 2021-05-10 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/505,391 Continuation US20240089728A1 (en) | 2021-05-10 | 2023-11-09 | Communication method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022237561A1 true WO2022237561A1 (zh) | 2022-11-17 |
Family
ID=84027998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/089936 WO2022237561A1 (zh) | 2021-05-10 | 2022-04-28 | 一种通信方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240089728A1 (zh) |
EP (1) | EP4322579A4 (zh) |
CN (1) | CN115412909A (zh) |
WO (1) | WO2022237561A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115941204B (zh) * | 2022-12-06 | 2024-04-12 | 镁佳(北京)科技有限公司 | 一种基于hse的数据防重放方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104852896A (zh) * | 2015-02-03 | 2015-08-19 | 四川通信科研规划设计有限责任公司 | 一种Wi-Fi无线节点入网方法及系统 |
CN107925869A (zh) * | 2015-08-17 | 2018-04-17 | 诺基亚通信公司 | 用于蜂窝物联网的安全性过程 |
CN109756872A (zh) * | 2018-12-06 | 2019-05-14 | 国网山东省电力公司电力科学研究院 | 基于物理不可克隆函数的电网NB-IoT端到端数据处理方法 |
WO2020145064A1 (en) * | 2019-01-11 | 2020-07-16 | Nec Corporation | A method and a device for enabling key re-usage in a communication network |
-
2021
- 2021-05-10 CN CN202110504785.6A patent/CN115412909A/zh active Pending
-
2022
- 2022-04-28 EP EP22806530.6A patent/EP4322579A4/en active Pending
- 2022-04-28 WO PCT/CN2022/089936 patent/WO2022237561A1/zh active Application Filing
-
2023
- 2023-11-09 US US18/505,391 patent/US20240089728A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104852896A (zh) * | 2015-02-03 | 2015-08-19 | 四川通信科研规划设计有限责任公司 | 一种Wi-Fi无线节点入网方法及系统 |
CN107925869A (zh) * | 2015-08-17 | 2018-04-17 | 诺基亚通信公司 | 用于蜂窝物联网的安全性过程 |
US20180241757A1 (en) * | 2015-08-17 | 2018-08-23 | Nokia Solutions And Networks Oy | Security procedures for the cellular internet of things |
CN109756872A (zh) * | 2018-12-06 | 2019-05-14 | 国网山东省电力公司电力科学研究院 | 基于物理不可克隆函数的电网NB-IoT端到端数据处理方法 |
WO2020145064A1 (en) * | 2019-01-11 | 2020-07-16 | Nec Corporation | A method and a device for enabling key re-usage in a communication network |
Non-Patent Citations (2)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on authentication and key management for applications based on 3GPP credential in 5G (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.835, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), vol. SA WG3, no. V2.0.0, 4 December 2019 (2019-12-04), pages 1 - 83, XP051840699 * |
See also references of EP4322579A4 * |
Also Published As
Publication number | Publication date |
---|---|
US20240089728A1 (en) | 2024-03-14 |
EP4322579A4 (en) | 2024-08-07 |
CN115412909A (zh) | 2022-11-29 |
EP4322579A1 (en) | 2024-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111669276B (zh) | 一种网络验证方法、装置及系统 | |
CN110830991B (zh) | 安全会话方法和装置 | |
JP5597676B2 (ja) | 鍵マテリアルの交換 | |
CN113395693B (zh) | 用于802.1x载体热点和Wi-Fi呼叫认证的基于经加密的IMSI的方案 | |
US10798082B2 (en) | Network authentication triggering method and related device | |
US11570617B2 (en) | Communication method and communications apparatus | |
CN106134231B (zh) | 密钥生成方法、设备及系统 | |
WO2019041802A1 (zh) | 基于服务化架构的发现方法及装置 | |
EP1972125A2 (en) | Apparatus and method for protection of management frames | |
JP2018532325A (ja) | ユーザ機器ueのアクセス方法、アクセスデバイス、およびアクセスシステム | |
WO2019214351A1 (zh) | 消息处理方法及装置 | |
WO2013174267A1 (zh) | 无线局域网络的安全建立方法及系统、设备 | |
US20240080316A1 (en) | Methods and apparatus for provisioning, authentication, authorization, and user equipment (ue) key generation and distribution in an on-demand network | |
US11553561B2 (en) | Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication | |
WO2023083170A1 (zh) | 密钥生成方法、装置、终端设备及服务器 | |
WO2020063540A1 (zh) | 一种安全通信方法、加密信息确定方法及装置 | |
US20240089728A1 (en) | Communication method and apparatus | |
US20190149326A1 (en) | Key obtaining method and apparatus | |
WO2022134089A1 (zh) | 一种安全上下文生成方法、装置及计算机可读存储介质 | |
CN113395697A (zh) | 传输寻呼信息的方法和通信装置 | |
EP4391614A1 (en) | Communication method, apparatus and system | |
WO2019144350A1 (zh) | 通信方法和通信装置 | |
JP2021524167A (ja) | 複数の登録のための方法および装置 | |
WO2024026735A1 (zh) | 认证方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22806530 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202327074778 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022806530 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022806530 Country of ref document: EP Effective date: 20231107 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11202308390Y Country of ref document: SG |