CN101990201B - Method, system and device for generating general bootstrapping architecture (GBA) secret key - Google Patents
Method, system and device for generating general bootstrapping architecture (GBA) secret key Download PDFInfo
- Publication number
- CN101990201B CN101990201B CN200910090198.6A CN200910090198A CN101990201B CN 101990201 B CN101990201 B CN 101990201B CN 200910090198 A CN200910090198 A CN 200910090198A CN 101990201 B CN101990201 B CN 101990201B
- Authority
- CN
- China
- Prior art keywords
- key
- user
- gba
- authentication information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000008569 process Effects 0.000 claims description 29
- 230000007246 mechanism Effects 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了生成GBA密钥的方法及其系统和设备,该方法包括:BSF从HLR获取相应用户的认证信息,并将其中的随机数发送给用户终端,认证信息中的密钥是HLR根据其存储的相应密钥和该用户与网络侧共享的密钥生成的;用户终端根据所述随机数和该用户与网络侧共享的密钥生成AKA鉴权信息,根据AKA鉴权信息和该用户与网络侧共享的密钥生成GBA密钥的根密钥,生成认证码,并将生成的认证码发送给BSF设备;BSF设备根据接收到的认证码对所述用户终端认证通过后,根据其获取到的认证信息生成GBA密钥的根密钥;BSF设备和用户终端分别根据各自生成的根密钥生成GBA密钥。采用本发明,可以提高GBA密钥的安全性。
The invention discloses a method for generating a GBA key and its system and equipment. The method includes: the BSF obtains the authentication information of the corresponding user from the HLR, and sends the random number therein to the user terminal. The key in the authentication information is obtained by the HLR according to It is generated by the corresponding stored key and the key shared by the user and the network side; the user terminal generates AKA authentication information according to the random number and the key shared by the user and the network side, and generates AKA authentication information according to the AKA authentication information and the user The key shared with the network side generates the root key of the GBA key, generates an authentication code, and sends the generated authentication code to the BSF device; after the BSF device authenticates the user terminal according to the received authentication code, according to its The obtained authentication information generates the root key of the GBA key; the BSF device and the user terminal respectively generate the GBA key according to the generated root key. By adopting the invention, the security of the GBA key can be improved.
Description
技术领域 technical field
本发明涉及无线通信领域,尤其涉及生成GBA密钥的方法及其系统和设备。The invention relates to the field of wireless communication, in particular to a method for generating a GBA key and its system and equipment.
背景技术 Background technique
随着数据业务的开展,运营商和用户都需要有可靠的认证机制来保证合法的业务使用以及正确的计费。在2G(第二代移动通信网络)业务中,很多应用都需要在终端(例如UE)和应用服务器之间进行双向认证,为了验证合法用户对业务的使用,终端与业务系统之间都需要进行登录鉴权;若业务数据流需要进行加扰或加密,则终端与业务系统之间需要进行保密通信。而众多业务如果各自使用自己独立的认证,就会造成屡次更换设备。With the development of data services, both operators and users need a reliable authentication mechanism to ensure legal service use and correct billing. In 2G (second generation mobile communication network) services, many applications require two-way authentication between the terminal (such as UE) and the application server. Login authentication; if the business data flow needs to be scrambled or encrypted, confidential communication needs to be carried out between the terminal and the business system. However, if many businesses use their own independent certifications, it will result in repeated equipment replacements.
为了解决应用层的密钥共享、业务鉴权等一系列问题,3GPP(第三代移动通信标准化组织)定义了一种通用认证机制(General BootstrappingArchitecture,GBA)。GBA提供了一种在UE和服务器之间建立共享密钥的通用机制,它基于AKA鉴权机制实现。AKA鉴权机制是2G/3G网络中使用的一种相互鉴权和密钥协商的机制,GBA充分利用了AKA鉴权机制的优点来完成业务的安全引导过程。In order to solve a series of problems such as key sharing and service authentication at the application layer, 3GPP (Third Generation Mobile Communications Standardization Organization) defines a general authentication mechanism (General Bootstrapping Architecture, GBA). GBA provides a common mechanism for establishing a shared key between UE and server, which is implemented based on AKA authentication mechanism. The AKA authentication mechanism is a mutual authentication and key negotiation mechanism used in 2G/3G networks. GBA makes full use of the advantages of the AKA authentication mechanism to complete the secure boot process of services.
参见图1,为现有2G网络中GBA的简单网络模型。如图所示,BSF(Bootstrapping服务功能)为GBA机制引入的网元,可通过Zh接口从HLR(Home Location Register归属位置寄存器)获得GBA的相关用户数据;通过Ub接口与UE利用AKA协议进行相互认证,并且建立共享密钥,这个密钥将应用在UE和NAF(Network Application Function,网络应用功能)之间;通过Zn接口将该共享密钥和相关用户数据传递给NAF,以便UE和NAF之间基于该共享密钥进行安全的信息交互。其中,BSF通过查询SLF(Subscription LocaterFunction,订购关系定位功能)获得存储相关用户数据的HLR名称。在单一HLR环境和中并不需要SLF。另外,当BSF配置成使用预先指定的HLR时,也不要求使用SLF。Referring to Fig. 1, it is a simple network model of GBA in the existing 2G network. As shown in the figure, BSF (Bootstrapping Service Function) is a network element introduced by the GBA mechanism, which can obtain GBA-related user data from the HLR (Home Location Register) through the Zh interface; use the AKA protocol to communicate with the UE through the Ub interface Authentication, and establish a shared key, this key will be applied between UE and NAF (Network Application Function, network application function); pass the shared key and related user data to NAF through the Zn interface, so that the UE and NAF Secure information exchange based on the shared key. Among them, the BSF obtains the HLR name for storing relevant user data by querying the SLF (Subscription Locater Function, subscription relationship locating function). SLF is not required in a single HLR environment. Also, when the BSF is configured to use a pre-assigned HLR, the use of the SLF is not required.
GBA的相关流程通常分为GBA初始化阶段(该阶段将生成GBA密钥资料Ks)以及基于GBA的业务访问阶段(即使用Ks生成GBA密钥并以此进行业务通信)。The related process of GBA is usually divided into GBA initialization phase (in this phase, GBA key material Ks will be generated) and GBA-based business access phase (that is, using Ks to generate GBA key and use it for business communication).
基于图1所示的网络模型,2G网络中基于SIM(Subscriber Identity Module,用户身份识别模块)卡的GBA初始化阶段的流程可如图2所示,包括:Based on the network model shown in Figure 1, the process of the GBA initialization phase based on the SIM (Subscriber Identity Module) card in the 2G network can be shown in Figure 2, including:
步骤201、UE的ME(Mobile Equipment,移动设备)向BSF发送GBAbootstrapping请求,请求中携带IMSI(International Mobile Subscriber Identity,国际移动用户标识码)作为ME的标识。Step 201, the ME (Mobile Equipment, mobile equipment) of the UE sends a GBAbootstrapping request to the BSF, and the request carries IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) as the identifier of the ME.
步骤202~203、BSF向HLR请求三元组认证向量AV,HLR返回与该IMSI对应的三元组认证向量AV=(RAND,SRES,Kc)。BSF从认证向量的类型可以识别出该用户使用的是SIM卡。In steps 202-203, the BSF requests the triplet authentication vector AV from the HLR, and the HLR returns the triplet authentication vector AV=(RAND, SRES, Kc) corresponding to the IMSI. From the type of the authentication vector, the BSF can identify that the user is using a SIM card.
步骤204、BSF保存AV中的SRES和Kc,随机选择Ks_input,以401消息把随机数RAND和Ks_input发送给ME。Step 204, BSF saves SRES and Kc in AV, randomly selects Ks_input, and sends random number RAND and Ks_input to ME with 401 message.
步骤205、ME以RAND、Ks_input作为挑战对网络进行认证,认证通过后,以RAND、Ks_input作为参数调用SIM卡中的GBA模块。Step 205, ME uses RAND and Ks_input as a challenge to authenticate the network, and after passing the authentication, uses RAND and Ks_input as parameters to call the GBA module in the SIM card.
步骤206、SIM卡的GBA模块调用SIM卡中的AKA鉴权模块计算得到Kc和SRES,即Kc‖SRES=AKA(Ki,RAND);从而可以计算得到GBA根密钥Ks=KDF(key,Ks-input,”3gpp-gba-res”,SRES),并将Ks保存在SIM卡中,其中key=Kc‖Kc‖RAND,其中KDF是密钥产生函数;计算认证码RES=KDF(key,”3gpp-gba-res”,SRES),将RES返回给ME。Step 206, the GBA module of the SIM card transfers the AKA authentication module in the SIM card to calculate Kc and SRES, that is, Kc∥SRES=AKA(Ki, RAND); thereby the GBA root key Ks=KDF(key, Ks -input, "3gpp-gba-res", SRES), and save Ks in the SIM card, where key=Kc∥Kc∥RAND, where KDF is the key generation function; calculate the authentication code RES=KDF(key, " 3gpp-gba-res", SRES), return RES to ME.
步骤207、ME将RES转发给BSF作为认证码。Step 207, the ME forwards the RES to the BSF as an authentication code.
步骤208、BSF通过AV中的值计算得到认证码RES=KDF(key,”3gpp-gba-res”,SRES),与ME返回的RES比较,若相同则认证通过,否则GBA过程终止;BSF通过计算Ks=KDF(key,Ks-input,”3gpp-gba-res”,SRES)来产生GBA根密钥Ks,随机产生B-TID作为ME的临时标示符,返回给ME。Step 208, BSF calculates the authentication code RES=KDF(key, "3gpp-gba-res", SRES) through the value in AV, compares it with the RES returned by ME, if they are the same, the authentication passes, otherwise the GBA process terminates; BSF passes Calculate Ks=KDF(key, Ks-input, "3gpp-gba-res", SRES) to generate GBA root key Ks, randomly generate B-TID as the temporary identifier of ME, and return it to ME.
步骤209、BSF根据ME需要访问的业务平台NAF的标示符(即NAF_id)生成业务密钥Ks_NAF=KDF(Ks,”gba-me”,RAND,IMSI,NAF_id),作为ME与NAF通信的业务保护密钥,将Ks_NAF通过核心网安全通道发送给NAF。Step 209, BSF generates a service key Ks_NAF=KDF(Ks, "gba-me", RAND, IMSI, NAF_id) according to the identifier (NAF_id) of the service platform NAF that ME needs to access, as a service protection for communication between ME and NAF Key, send Ks_NAF to NAF through the core network security channel.
在业务访问阶段,ME在与NAF通信前,ME需要调用SIM卡的GBA模块指令,SIM卡根据NAF_id需要生成业务密钥Ks_NAF=KDF(Ks,”gba-me”,RAND,IMSI,NAF_id),作为SIM卡与NAF通信的业务保护密钥;ME与NAF的通信过程中,NAF用Ks_NAF加密消息发送给ME,ME需要将该加密消息转发给SIM卡,由SIM卡用Ks_NAF解密;ME的消息也需要转发给SIM卡用Ks_NAF加密后,再发送给NAF解密,实现ME和NAF之间的安全传输。In the service access phase, before the ME communicates with the NAF, the ME needs to call the GBA module command of the SIM card, and the SIM card needs to generate the service key Ks_NAF=KDF(Ks, "gba-me", RAND, IMSI, NAF_id) according to the NAF_id, As the service protection key for the communication between the SIM card and NAF; during the communication between ME and NAF, NAF uses Ks_NAF to encrypt the message and send it to ME, and ME needs to forward the encrypted message to the SIM card, and the SIM card uses Ks_NAF to decrypt it; ME’s message It also needs to be forwarded to the SIM card to be encrypted with Ks_NAF, and then sent to NAF for decryption, so as to realize safe transmission between ME and NAF.
若ME是一个可信的终端,由于Ks和Ks_NAF在SIM卡中,因此所有的加解密运算都需要依赖于SIM卡进行,那么该基于SIM卡的GBA方案是安全的。若ME是一个不合法的终端,或是攻击者定制的终端,那么通过修改ME的处理流程,会存在以下安全问题:If the ME is a trusted terminal, since Ks and Ks_NAF are in the SIM card, all encryption and decryption operations need to rely on the SIM card, then the GBA scheme based on the SIM card is safe. If the ME is an illegal terminal, or a terminal customized by an attacker, then by modifying the processing flow of ME, the following security problems will exist:
在GBA初始化阶段,ME接收到RAND后,不调用SIM卡的GBA模块,而是以RAND作为参数调用SIM卡中的AKA鉴权模块。SIM卡接收到AKA调用后,认为是接入鉴权请求,则调用SIM卡中的AKA鉴权模块计算得到Kc和SRES,即Kc‖SRES=AKA(Ki,RAND),将Kc、SRES返回给ME。ME利用返回的Kc、SRES模仿正常流程中SIM卡的操作,计算得到GBA根密钥Ks=KDF(key,Ks-input,”3gpp-gba-res”,SRES),并将Ks保存在ME中,其中key=Kc‖Kc‖RAND,KDF是密钥产生函数;计算认证码RES=KDF(key,”3gpp-gba-res”,SRES),将RES返回给BSF作为认证码;In the GBA initialization phase, after receiving the RAND, the ME does not call the GBA module of the SIM card, but calls the AKA authentication module in the SIM card with the RAND as a parameter. After the SIM card receives the AKA call, it thinks it is an access authentication request, and then calls the AKA authentication module in the SIM card to calculate Kc and SRES, that is, Kc∥SRES=AKA(Ki, RAND), and returns Kc and SRES to ME. ME uses the returned Kc and SRES to imitate the operation of the SIM card in the normal process, calculates the GBA root key Ks=KDF(key, Ks-input, "3gpp-gba-res", SRES), and saves Ks in the ME , where key=Kc∥Kc∥RAND, KDF is the key generation function; calculate the authentication code RES=KDF(key, "3gpp-gba-res", SRES), return RES to BSF as the authentication code;
在业务访问阶段,ME可利用Ks计算得到业务密钥Ks_NAF=KDF(Ks,”gba-me”,RAND,IMSI,NAF_id),作为ME与NAF通信的业务保护密钥,而不再调用SIM卡的GBA模块生成Ks_NAF,这样,ME可利用其生成的Ks_NAF进行加解密操作,而完全脱离SIM卡。In the service access phase, ME can use Ks to calculate the service key Ks_NAF=KDF(Ks, "gba-me", RAND, IMSI, NAF_id), as the service protection key for communication between ME and NAF, without calling the SIM card The GBA module of the GBA module generates Ks_NAF, so that ME can use the Ks_NAF generated by it to perform encryption and decryption operations, and it is completely separated from the SIM card.
因此,攻击者只需要购买一张合法的SIM卡放置在该不合法的ME中,并合法订购该业务,从而可通过上述流程获得Ks和Ks_NAF,并且将Ks和Ks_NAF定制在仿造的客户端软件中,由他人下载使用。可以看出,GBA密钥的安全性得不到应有的保证,进而导致用户数据业务的使用安全性差。Therefore, the attacker only needs to buy a legal SIM card and place it in the illegal ME, and legally order the service, so that Ks and Ks_NAF can be obtained through the above process, and Ks and Ks_NAF can be customized in the counterfeit client software , downloaded and used by others. It can be seen that the security of the GBA key cannot be properly guaranteed, which in turn leads to poor usage security of user data services.
发明内容 Contents of the invention
本发明实施例提供了生成GBA密钥的方法,以解决现有GBA密钥实现机制中GBA密钥安全性差的问题。The embodiment of the present invention provides a method for generating a GBA key to solve the problem of poor security of the GBA key in the existing GBA key implementation mechanism.
本发明的一实施例提供的生成GBA密钥的方法,包括:The method for generating the GBA key provided by an embodiment of the present invention includes:
认证服务功能BSF设备接收用户终端发送的启动GBA密钥流程的请求后,从用户信息存储设备获取相应用户的认证信息,并将其中的随机数发送给所述用户终端;所述认证信息中的密钥是所述用户信息存储设备根据其存储的相应密钥和该用户与网络侧共享的密钥生成的;After the authentication service function BSF device receives the request for starting the GBA key process sent by the user terminal, it obtains the authentication information of the corresponding user from the user information storage device, and sends the random number therein to the user terminal; The key is generated by the user information storage device according to the corresponding key stored in it and the key shared by the user and the network side;
BSF设备接收所述用户终端发送的认证码,根据接收到的认证码对所述用户终端进行认证并当认证通过后,根据其获取到的认证信息生成GBA密钥的根密钥,并根据生成的GBA密钥的根密钥生成用于在所述用户终端和网络应用功能NAF之间共享的GBA密钥。The BSF device receives the authentication code sent by the user terminal, authenticates the user terminal according to the received authentication code, and when the authentication is passed, generates the root key of the GBA key according to the obtained authentication information, and generates The root key of the GBA key generates the GBA key for sharing between the user terminal and the Network Application Function NAF.
本发明另一实施例提供的生成GBA密钥的方法,包括:The method for generating the GBA key provided by another embodiment of the present invention includes:
用户终端发送启动GBA密钥流程的请求后,接收网络侧返回的与所述用户终端对应的用户的随机数;After the user terminal sends a request to start the GBA key process, it receives the random number of the user corresponding to the user terminal returned by the network side;
所述用户终端根据所述随机数和该用户与网络侧共享的密钥生成AKA鉴权信息,根据AKA鉴权信息和该用户与网络侧共享的密钥生成GBA密钥的根密钥;以及,根据生成的GBA密钥的根密钥生成用于在所述用户终端和网络应用功能NAF之间共享的GBA密钥。The user terminal generates AKA authentication information according to the random number and the key shared by the user and the network side, and generates the root key of the GBA key according to the AKA authentication information and the key shared by the user and the network side; and , generating a GBA key for sharing between the user terminal and the network application function NAF according to the root key of the generated GBA key.
本发明的上述实施例中,在网络侧,用户信息存储设备返回给BSF设备的用户认证信息与现有技术不完全相同,其中的密钥是根据用户信息存储设备所存储的相应密钥和用户与网络侧共享的密钥生成的,即,用户信息存储设备在获取到用户的认证信息后,用其中的密钥和用户密钥生成新的密钥,将新生成的密钥代替现有技术中的认证信息中的相应密钥发送给BSF设备,从而使BSF设备利用该密钥代替现有技术中的相应密钥生成GBA密钥的根密钥,并进而生成GBA密钥;在用户终端侧,利用AKA鉴权信息和用户密钥生成GBA密钥的根密钥,并进而生成GBA密钥。由于在终端侧和网络侧生成GBA密钥的根密钥时都引入了用户密钥,从而提高了GBA密钥的安全性。假设攻击者(或非法用户终端)企图通过调用AKA鉴权模块模拟生成GBA密钥的根密钥,进而生成GBA密钥时,由于本发明实施例在GBA密钥的根密钥生成过程中引入了用户密钥,因此,攻击者(或非法用户终端)按照现有方式生成的GBA根密钥与本发明实施例所提供的合法方式生成的根密钥不同,从而保证GBA密钥的安全性,进而保证了用户使用数据业务的安全性。In the above embodiments of the present invention, on the network side, the user authentication information returned by the user information storage device to the BSF device is not completely the same as the prior art, and the key is based on the corresponding key stored in the user information storage device and the user authentication information. It is generated by a key shared with the network side, that is, after the user information storage device obtains the user's authentication information, it uses the key in it and the user key to generate a new key, and replaces the newly generated key with the existing technology The corresponding key in the authentication information in the authentication information is sent to the BSF device, so that the BSF device uses the key instead of the corresponding key in the prior art to generate the root key of the GBA key, and then generates the GBA key; at the user terminal On the side, use the AKA authentication information and the user key to generate the root key of the GBA key, and then generate the GBA key. Since the user key is introduced when the root key of the GBA key is generated on the terminal side and the network side, the security of the GBA key is improved. Assuming that an attacker (or an illegal user terminal) attempts to generate the root key of the GBA key by calling the AKA authentication module to simulate the generation of the GBA key, since the embodiment of the present invention introduces Therefore, the GBA root key generated by the attacker (or illegal user terminal) according to the existing method is different from the root key generated by the legal method provided by the embodiment of the present invention, thereby ensuring the security of the GBA key , thereby ensuring the security of users using data services.
本发明实施例还提供了一种生成GBA密钥的系统,在网络侧为上述生成GBA密钥的方法提供了设备层面的保证。The embodiment of the present invention also provides a system for generating a GBA key, which provides device-level guarantee for the above method for generating a GBA key on the network side.
本发明实施例提供的实现GBA密钥的系统,包括:The system for realizing the GBA key provided by the embodiment of the present invention includes:
用户信息存储设备,用于向BSF设备发送用户的认证信息,所述认证信息中的密钥是所述用户信息存储设备根据其存储的相应密钥和该用户与网络侧共享的密钥生成的;The user information storage device is used to send the user's authentication information to the BSF device, and the key in the authentication information is generated by the user information storage device according to the corresponding key stored in it and the key shared by the user and the network side ;
BSF设备,用于接收认证信息,根据该认证信息生成相应用户终端的GBA密钥的根密钥;以及,根据生成的根密钥生成用于在相应用户终端和网络应用功能NAF之间共享的GBA密钥。The BSF device is configured to receive the authentication information, generate the root key of the GBA key of the corresponding user terminal according to the authentication information; and generate the root key for sharing between the corresponding user terminal and the network application function NAF according to the generated root key. GBA key.
本发明的上述实施例,通过用户信息存储设备根据其存储的相应密钥和该用户与网络侧共享的密钥生成新的密钥,并用新生成的密钥代替现有技术中的相应密钥,作为认证信息发送给BSF设备,从而使BSF设备可根据该认证信息生成GBA密钥的根密钥,以及根据该根密钥生成GBA密钥。由于该认证信息中引入了用户密钥,从而提高了GBA密钥的安全性。In the above-mentioned embodiment of the present invention, a new key is generated by the user information storage device according to the corresponding key stored therein and the key shared between the user and the network side, and the corresponding key in the prior art is replaced with the newly generated key , sent to the BSF device as authentication information, so that the BSF device can generate the root key of the GBA key according to the authentication information, and generate the GBA key according to the root key. Since the user key is introduced into the authentication information, the security of the GBA key is improved.
本发明实施例还提供了一种用户身份识别模块卡,在终端侧为上述实现GBA密钥的方法提供了设备层面的保证。The embodiment of the present invention also provides a user identity identification module card, which provides equipment-level guarantee for the above-mentioned method for realizing the GBA key on the terminal side.
本发明实施例提供的用户身份识别模块卡,包括:The user identity identification module card provided by the embodiment of the present invention includes:
AKA鉴权模块,用于根据接收到的随机数和相应用户与网络侧共享的密钥生成AKA鉴权信息;An AKA authentication module, configured to generate AKA authentication information according to the received random number and the key shared by the corresponding user and the network side;
GBA模块,用于根据AKA鉴权信息和该用户与网络侧共享的密钥生成GBA密钥的根密钥,以及,根据生成的根密钥生成用于在所述用户终端和网络应用功能NAF之间共享的GBA密钥。The GBA module is used to generate the root key of the GBA key according to the AKA authentication information and the key shared by the user and the network side, and generate a NAF for the user terminal and the network application function according to the generated root key GBA key shared between.
本发明的上述实施例中,GBA模块在生成GBA密钥的根密钥时,根据AKA鉴权信息和用户与网络侧共享的密钥生成GBA密钥的根密钥,由于在生成GBA密钥的根密钥过程中引入了用户密钥,从而提高了GBA密钥的安全性。In the above embodiments of the present invention, when the GBA module generates the root key of the GBA key, it generates the root key of the GBA key according to the AKA authentication information and the key shared between the user and the network side. The user key is introduced in the root key process of GBA, which improves the security of the GBA key.
附图说明 Description of drawings
图1为现有技术中GBA的简单网络模型示意图;Fig. 1 is a schematic diagram of a simple network model of GBA in the prior art;
图2为现有技术中GBA的实现流程示意图;Fig. 2 is a schematic diagram of the implementation process of GBA in the prior art;
图3为本发明实施例中GBA的实现流程的示意图;Fig. 3 is the schematic diagram of the implementation process of GBA in the embodiment of the present invention;
图4为本发明实施例中的用户终端的结构示意图。Fig. 4 is a schematic structural diagram of a user terminal in an embodiment of the present invention.
具体实施方式 Detailed ways
通过对现有GBA流程的分析可以看出,其安全问题的主要原因在于ME可以通过调用AKA鉴权模块来调用接入鉴权过程,从而模拟SIM卡生成GBA密钥的根密钥Ks,进而生成GBA密钥。为了解决该问题,本发明实施例分别修改了SIM卡、BSF生成Ks的流程和算法,并相应修改了HLR返回给BSF的三元组认证向量AV,从而提高了GBA密钥的根密钥Ks的安全性,进而提高了GBA密钥的安全性。Through the analysis of the existing GBA process, it can be seen that the main reason for its security problem is that the ME can call the access authentication process by calling the AKA authentication module, thereby simulating the SIM card to generate the root key Ks of the GBA key, and then Generate a GBA key. In order to solve this problem, the embodiment of the present invention respectively modifies the process and algorithm of SIM card and BSF generating Ks, and correspondingly revises the three-tuple authentication vector AV returned by HLR to BSF, thereby improving the root key Ks of the GBA key. security, thereby improving the security of the GBA key.
下面结合附图对本发明实施例进行详细描述。Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
参见图3,为本发明实施例提供的2G网络中GBA初始化阶段的流程示意图。UE侧和网络侧(BSF)事先约定有一致的GBA密钥的相关算法。在GBA初始化阶段,当ME需要采用GBA安全通信机制时,检测是否有GBA密钥,如果没有,则执行以下步骤:Referring to FIG. 3 , it is a schematic flowchart of a GBA initialization phase in a 2G network provided by an embodiment of the present invention. The UE side and the network side (BSF) agree in advance on the related algorithm of the consistent GBA key. In the GBA initialization phase, when the ME needs to adopt the GBA security communication mechanism, check whether there is a GBA key, if not, perform the following steps:
步骤301、UE的ME向BSF发送GBA bootstrapping请求(GBA密钥启动请求),其中携带IMSI作为ME的标识。Step 301, the ME of the UE sends a GBA bootstrapping request (GBA key activation request) to the BSF, which carries the IMSI as the identifier of the ME.
步骤302、BSF向HLR请求三元组认证向量AV,并且可进一步在请求消息中标识出该消息是GBA请求消息(如消息中携带GBA请求消息的标识)。In step 302, the BSF requests the triplet authentication vector AV from the HLR, and may further identify in the request message that the message is a GBA request message (for example, the message carries the identifier of the GBA request message).
步骤303、HLR接收到AV请求消息,进一步判断是来自BSF的GBA请求消息(如识别出GBA请求消息标识)后,根据请求消息中携带的用户标识(如IMSI)获取该用户的三元组认证向量AV=(RAND,SRES,Kc)和用户密钥Ki,并计算Kc’=KDF(Kc,Ki),其中KDF是密钥生成函数,HLR将三元组AV’=(RAND,SRES,Kc’)返回给BSF。Step 303, HLR receives the AV request message, and after further judging that it is the GBA request message from the BSF (such as recognizing the GBA request message identifier), obtain the user's triplet authentication according to the user identification (such as IMSI) carried in the request message Vector AV=(RAND, SRES, Kc) and user key Ki, and calculate Kc'=KDF (Kc, Ki), wherein KDF is a key generation function, HLR triplet AV'=(RAND, SRES, Kc ') back to BSF.
步骤304、BSF保存AV’中的SRES和Kc’,随机选择Ks_input,以401消息的格式向ME发送RAND、Ks_input。Step 304, BSF saves SRES and Kc' in AV', randomly selects Ks_input, and sends RAND and Ks_input to ME in the format of 401 message.
步骤305、ME接收到RAND后,以RAND、Ks_input作为挑战对网络进行认证,认证通过后,以RAND、Ks_input作为参数调用SIM卡(或其他用户卡,如用户识别模块USIM卡)中的GBA模块。Step 305, after ME receives RAND, use RAND, Ks_input as a challenge to authenticate the network, after the authentication is passed, use RAND, Ks_input as a parameter to call the GBA module in the SIM card (or other user cards, such as the Subscriber Identity Module USIM card) .
步骤306、SIM卡的GBA模块接收到RAND、Ks_input后,调用SIM卡中的AKA鉴权模块计算得到Kc和SRES,即Kc‖SRES=AKA(Ki,RAND),再利用Kc计算得到Kc’=KDF(Kc,Ki),然后利用Kc’计算得到GBA根密钥Ks=KDF(key,Ks-input,“3gpp-gba-res”,SRES),并将Ks保存在SIM卡中,其中key=Kc’‖Kc’‖RAND,KDF是密钥产生函数;GBA模块还利用Kc’计算认证码RES=KDF(key,“3gpp-gba-res”,SRES),并将计算出的RES返回给ME。Step 306, after the GBA module of the SIM card receives RAND, Ks_input, call the AKA authentication module in the SIM card to calculate Kc and SRES, that is, Kc∥SRES=AKA(Ki, RAND), and then use Kc to calculate Kc'= KDF(Kc, Ki), then use Kc' to calculate the GBA root key Ks=KDF(key, Ks-input, "3gpp-gba-res", SRES), and save Ks in the SIM card, where key= Kc'‖Kc'‖RAND, KDF is the key generation function; the GBA module also uses Kc' to calculate the authentication code RES=KDF(key, "3gpp-gba-res", SRES), and returns the calculated RES to ME .
步骤307、ME接收到SIM卡返回的RES,将RES转发给BSF作为认证码。Step 307, the ME receives the RES returned by the SIM card, and forwards the RES to the BSF as an authentication code.
步骤308、BSF接收到RES后,通过三元认证向量AV’中的值计算得到认证码RES=KDF(key,“3gpp-gba-res”,SRES),其中key=Kc’‖Kc’‖RAND,KDF是密钥产生函数,与ME返回的RES比较,若相同则认证通过,否则GBA过程终止;BSF通过计算Ks=KDF(key,Ks-input,“3gpp-gba-res”,SRES)来产生GBA根密钥Ks,并随机产生B-TID作为ME的临时标示符,返回给ME。Step 308: After receiving RES, the BSF calculates the authentication code RES=KDF(key, "3gpp-gba-res", SRES) through the value in the ternary authentication vector AV', where key=Kc'∥Kc'∥RAND , KDF is a key generation function, compared with the RES returned by ME, if they are the same, the authentication is passed, otherwise the GBA process is terminated; BSF calculates Ks=KDF(key, Ks-input, "3gpp-gba-res", SRES) Generate GBA root key Ks, and randomly generate B-TID as the temporary identifier of ME, and return it to ME.
步骤309、后续BSF根据ME需要访问的NAF的标示符(即NAF_id)生成业务密钥Ks_NAF=KDF(Ks,“gba-me”,RAND,IMSI,NAF_id),作为ME与NAF通信的业务保护密钥,将Ks_NAF通过核心网安全通道发送给NAF。Step 309, the subsequent BSF generates a service key Ks_NAF=KDF(Ks, "gba-me", RAND, IMSI, NAF_id) according to the identifier (NAF_id) of the NAF that the ME needs to visit, as the service protection key for the communication between the ME and the NAF key, and send Ks_NAF to NAF through the core network security channel.
在业务访问阶段,ME在与NAF通信前,需要调用SIM卡的GBA模块指令,GBA模块根据NAF_id需要生成业务密钥Ks_NAF=KDF(Ks,“gba-me”,RAND,IMSI,NAF_id),作为SIM卡与NAF通信的业务保护密钥;ME与NAF的通信过程中,NAF用Ks_NAF加密消息发送给ME,ME需要将该加密消息转发给SIM卡,由SIM卡用Ks_NAF解密;ME的消息也需要转发给SIM卡用Ks_NAF加密后,再发送给NAF解密,实现ME和NAF之间的安全传输。In the service access phase, before the ME communicates with the NAF, it needs to call the GBA module command of the SIM card. The GBA module needs to generate the service key Ks_NAF=KDF(Ks, "gba-me", RAND, IMSI, NAF_id) according to the NAF_id, as The service protection key for the communication between the SIM card and the NAF; during the communication between the ME and the NAF, the NAF uses Ks_NAF to encrypt the message and sends it to the ME, and the ME needs to forward the encrypted message to the SIM card, and the SIM card uses Ks_NAF to decrypt it; the message of the ME also It needs to be forwarded to the SIM card to be encrypted with Ks_NAF, and then sent to NAF for decryption to realize secure transmission between ME and NAF.
通过以上流程可以看出,与现有GBA初始化流程相比,本发明实施例中,在网络侧,HLR返回给BSF的三元组认证向量AV不同,现有技术中的AV=(RAND,SRES,Kc),本发明实施例中的AV’=(RAND,SRES,Kc’),其中Kc’=KDF(Kc,Ki),即,HLR在获取到用户的三元组认证向量后,用其中的Kc和用户密钥Ki生成Kc’,将Kc’代替原来三元组认证向量中的Kc发送给BSF,从而使BSF利用Kc’代替现有技术中的Kc生成Ks,并进而生成GBA密钥Ks_NAF;在UE侧,AKA鉴权模块生成鉴权参数Kc和SRES的机制没有改变,但GBA模块增加了以下功能:利用AKA鉴权模块生成的Kc和用户密钥Ki生成Kc’,并且GBA模块后续利用Kc’代替现有技术中的Kc来生成Ks,并进而生成GBA密钥Ks_NAF。As can be seen from the above process, compared with the existing GBA initialization process, in the embodiment of the present invention, on the network side, the triplet authentication vector AV returned to the BSF by the HLR is different, and AV=(RAND, SRES in the prior art , Kc), AV'=(RAND, SRES, Kc') in the embodiment of the present invention, wherein Kc'=KDF(Kc, Ki), that is, after the HLR obtains the triplet authentication vector of the user, it uses the Kc and user key Ki generate Kc', and send Kc' instead of Kc in the original triplet authentication vector to BSF, so that BSF uses Kc' to replace Kc in the prior art to generate Ks, and then generate GBA key Ks_NAF; on the UE side, the mechanism for generating authentication parameters Kc and SRES by the AKA authentication module has not changed, but the GBA module has added the following functions: use the Kc generated by the AKA authentication module and the user key Ki to generate Kc', and the GBA module Subsequently, Kc' is used instead of Kc in the prior art to generate Ks, and then the GBA key Ks_NAF is generated.
假设攻击者(或不合法的ME)以前述同样方式通过调用AKA鉴权模块生成鉴权参数Kc,利用Kc生成Ks,利用Ks生成GBA密钥,并试图使用该密钥访问NAF时,由于本发明实施例对Ks生成函数的输入参数Kc进行了新的定义,即Kc由现有技术中的Kc和用户密钥Ki生成,而攻击者(或不合法的ME)无法获知SIM卡中的用户密钥Ki,因此其计算出的GBA密钥与合法方式计算出的GBA密钥不同,从而保证GBA密钥的安全性,进而保证了用户使用数据业务的安全性。Assume that an attacker (or an illegal ME) generates the authentication parameter Kc by calling the AKA authentication module in the same manner as above, uses Kc to generate Ks, uses Ks to generate a GBA key, and tries to use this key to access NAF, due to this The embodiment of the invention provides a new definition of the input parameter Kc of the Ks generation function, that is, Kc is generated by Kc and user key Ki in the prior art, and the attacker (or illegal ME) cannot know the user's key in the SIM card Key Ki, so the GBA key calculated by it is different from the GBA key calculated in a legal way, so as to ensure the security of the GBA key, thereby ensuring the security of the user's use of data services.
另外,本发明实施例中,BSF对UE进行认证过程中,从UE接收到的认证码RES是这样得到的:UE的SIM卡利用Kc’生成key,再利用key和AKA鉴权模块生成的SRES等参数生成RES;相应的,BSF也利用Kc’根据约定的方式来生成认证码,从而对UE进行认证。同样假设攻击者(或不合法的ME)通过调用AKA鉴权模块生成鉴权参数SRES,再利用SRES和Kc生成认证码,这种方式生成的认证码与本发明实施例中的合法方式生成的认证码不同,因此,BSF可以通过对UE认证过程及时发现攻击者(或不合法的ME),并在其后结束GBA流程,从而消除安全隐患。In addition, in the embodiment of the present invention, when the BSF authenticates the UE, the authentication code RES received from the UE is obtained as follows: the UE's SIM card uses Kc' to generate a key, and then uses the key and the SRES generated by the AKA authentication module and other parameters to generate a RES; correspondingly, the BSF also uses Kc' to generate an authentication code according to an agreed method, thereby authenticating the UE. It is also assumed that the attacker (or illegal ME) generates the authentication parameter SRES by calling the AKA authentication module, and then utilizes SRES and Kc to generate the authentication code. The authentication code generated in this way is the same as the legal method in the embodiment of the present invention The authentication codes are different. Therefore, the BSF can detect the attacker (or illegal ME) in time through the UE authentication process, and then end the GBA process, thereby eliminating security risks.
当然,UE和BSF也可采用现有方式生成认证码RES,这种情况下,即使攻击者(或不合法ME)能够通过BSF认证,但因其生成的GBA密钥和合法方式生成的GBA密钥不同,则仍然无法使用其非法生成的GBA密钥访问NAF。Of course, UE and BSF can also use the existing method to generate the authentication code RES. In this case, even if the attacker (or illegal ME) can pass the BSF authentication, the GBA key generated by the legal method and the GBA key If the key is different, it still cannot access NAF with its illegally generated GBA key.
需要说明的是,以上本发明实施例中所涉及到的算法函数,如,生成Ks和RES的算法函数等,都采用了与现有技术相同的算法函数,仅是部分输入参数与现有技术不同,这样做可以尽量少的对现有技术进行改进,但应该理解,也可以使用其他函数来生成Ks和RES等,只要保证网络侧和终端侧事先约定好算法,并且算法的输入参数中至少引入用户密钥Ki。另外,Kc’的算法函数也可由其他函数替代,但要保证输入参数中包括将Kc和用户密钥Ki。It should be noted that the algorithmic functions involved in the above embodiments of the present invention, such as the algorithmic functions for generating Ks and RES, etc., all use the same algorithmic functions as those of the prior art, and only part of the input parameters are different from those of the prior art. Different, doing so can improve the existing technology as little as possible, but it should be understood that other functions can also be used to generate Ks and RES, etc., as long as the algorithm is agreed in advance on the network side and the terminal side, and the input parameters of the algorithm are at least Introduce the user key Ki. In addition, the algorithm function of Kc' can also be replaced by other functions, but it is necessary to ensure that the input parameters include Kc and user key Ki.
还需要说明的是,以上本发明实施例以2G网络中的GBA流程为例进行描述,该机制同样适用于3G网络。在3G网络中,与GBA流程相关的网络实体和GBA流程中涉及的相应参数可参照3GPP协议规定的3G网络的GBA流程。It should also be noted that the above embodiments of the present invention are described by taking the GBA process in the 2G network as an example, and this mechanism is also applicable to the 3G network. In the 3G network, the network entity related to the GBA process and the corresponding parameters involved in the GBA process can refer to the GBA process of the 3G network stipulated in the 3GPP agreement.
基于相同的技术构思,本发明实施例还提供了一种用户终端及其用户身份识别模块卡的结构。Based on the same technical idea, the embodiment of the present invention also provides a structure of a user terminal and a user identity identification module card thereof.
参见图4,为本发明实施例提供的用户终端及其用户身份识别模块卡的结构示意图。如图所示,用户终端包括用户身份识别模块卡41和ME 42,用户身份识别模块卡41可以是SIM卡也可以是USIM卡等用户识别卡,用户身份识别模块卡41中存储有用户与网络侧共享的密钥,用户身份识别模块卡41包括:AKA鉴权模块411和GBA模块412,还包括与ME 42进行通信的接口模块413,其中:Referring to FIG. 4 , it is a schematic structural diagram of a user terminal and its user identity identification module card provided by an embodiment of the present invention. As shown in the figure, the user terminal includes a user identity module card 41 and ME 42, the user identity module card 41 can be a SIM card or a user identification card such as a USIM card, and the user and network are stored in the user identity module card 41 The key shared by the side, the user identification module card 41 includes: AKA authentication module 411 and GBA module 412, and also includes an interface module 413 communicating with ME 42, wherein:
AKA鉴权模块411,用于生成AKA鉴权信息。在GBA初始化流程中,ME 42接收到BSF设备发送的随机数后,调用用户身份识别模块卡41中的GBA模块412,GBA模块412调用AKA鉴权模块411生成AKA鉴权信息;AKA authentication module 411, configured to generate AKA authentication information. In the GBA initialization process, after the ME 42 receives the random number sent by the BSF equipment, it calls the GBA module 412 in the user identification module card 41, and the GBA module 412 calls the AKA authentication module 411 to generate the AKA authentication information;
GBA模块412,用于根据AKA鉴权模块411生成的AKA鉴权信息和用户与网络侧共享的密钥生成GBA密钥的根密钥,以及,根据生成的根密钥生成用于在该用户终端和网络应用功能NAF之间共享的GBA密钥。The GBA module 412 is configured to generate the root key of the GBA key according to the AKA authentication information generated by the AKA authentication module 411 and the key shared between the user and the network side, and generate a root key for the user based on the generated root key. GBA key shared between terminal and Network Application Function NAF.
GBA模块412还用于,根据AKA鉴权信息和用户与网络侧共享的密钥生成该用户身份识别模块卡41所在用户终端的认证码,并通过接口模块413发送到ME 42,通过ME 42发送到网络侧的BSF设备进行认证。The GBA module 412 is also used to generate the authentication code of the user terminal where the user identification module card 41 is located according to the AKA authentication information and the key shared by the user and the network side, and send it to the ME 42 through the interface module 413, and send it through the ME 42 Go to the BSF device on the network side for authentication.
其中,AKA鉴权模块411生成鉴权信息以及GBA模块412生成GBA根密钥和GBA密钥的方式可如前所述,在此不再赘述。Wherein, the AKA authentication module 411 generates the authentication information and the GBA module 412 generates the GBA root key and the GBA key in the same manner as described above, which will not be repeated here.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention also intends to include these modifications and variations.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910090198.6A CN101990201B (en) | 2009-07-31 | 2009-07-31 | Method, system and device for generating general bootstrapping architecture (GBA) secret key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910090198.6A CN101990201B (en) | 2009-07-31 | 2009-07-31 | Method, system and device for generating general bootstrapping architecture (GBA) secret key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101990201A CN101990201A (en) | 2011-03-23 |
CN101990201B true CN101990201B (en) | 2013-09-04 |
Family
ID=43746471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910090198.6A Active CN101990201B (en) | 2009-07-31 | 2009-07-31 | Method, system and device for generating general bootstrapping architecture (GBA) secret key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101990201B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188229B (en) * | 2011-12-30 | 2017-09-12 | 上海贝尔股份有限公司 | The method and apparatus accessed for secure content |
CN103313244B (en) * | 2012-03-14 | 2016-12-14 | 中国移动通信集团公司 | A kind of authentication method based on GBA and device |
CN105306406A (en) * | 2014-05-26 | 2016-02-03 | 中国移动通信集团公司 | Negotiation method of authentication and key negotiation algorithm, network side equipment and user equipment |
CN107027117A (en) * | 2016-02-02 | 2017-08-08 | 普天信息技术有限公司 | A kind of method of dynamic generation root key |
CN110536289B (en) * | 2018-12-24 | 2024-11-26 | 中兴通讯股份有限公司 | Key issuing method and device, mobile terminal, communication equipment and storage medium |
CN113015126A (en) * | 2019-12-04 | 2021-06-22 | 中兴通讯股份有限公司 | Internet of vehicles authentication method, system, terminal and storage medium |
CN113365243B (en) * | 2020-03-05 | 2023-10-20 | 华为技术有限公司 | Communication method, device, equipment and system |
CN114449515B (en) * | 2020-10-20 | 2024-10-29 | 中国电信股份有限公司 | Verification method, verification system, application platform and terminal |
CN114531254B (en) * | 2020-10-30 | 2023-03-31 | 中国移动通信有限公司研究院 | Authentication information acquisition method and device, related equipment and storage medium |
CN112311543B (en) * | 2020-11-17 | 2023-04-18 | 中国联合网络通信集团有限公司 | GBA key generation method, terminal and NAF network element |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1697373A (en) * | 2005-06-17 | 2005-11-16 | 中兴通讯股份有限公司 | Method for negotiating about cipher key shared by users and application server |
CN1770682A (en) * | 2004-11-02 | 2006-05-10 | 华为技术有限公司 | Method for network equipment to generate user card authentication random number and authentication method |
-
2009
- 2009-07-31 CN CN200910090198.6A patent/CN101990201B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1770682A (en) * | 2004-11-02 | 2006-05-10 | 华为技术有限公司 | Method for network equipment to generate user card authentication random number and authentication method |
CN1697373A (en) * | 2005-06-17 | 2005-11-16 | 中兴通讯股份有限公司 | Method for negotiating about cipher key shared by users and application server |
Non-Patent Citations (1)
Title |
---|
3GPP TSG SA WG3.Key freshness in GBA.《3GPP TSG SA WG3 Security-S3#36,S3-040940》.2004,1-2. * |
Also Published As
Publication number | Publication date |
---|---|
CN101990201A (en) | 2011-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101990201B (en) | Method, system and device for generating general bootstrapping architecture (GBA) secret key | |
US10284555B2 (en) | User equipment credential system | |
JP4263384B2 (en) | Improved method for authentication of user subscription identification module | |
CN1969580B (en) | Security in a mobile communications system | |
KR101438243B1 (en) | SIM based authentication method | |
KR101485230B1 (en) | Secure multi-uim authentication and key exchange | |
CN101053273B (en) | Method, apparatus and system for mutual authentication employing modified message authentication codes | |
US9668139B2 (en) | Secure negotiation of authentication capabilities | |
US8881235B2 (en) | Service-based authentication to a network | |
CN101366299B (en) | Bootstrap Authentication Using Special Random Challenges | |
EP2879421B1 (en) | Terminal identity verification and service authentication method, system, and terminal | |
CN110545252B (en) | A method, terminal, control function entity and application server for authentication and information protection | |
CN101039181B (en) | Method for Preventing Service Functional Entities in Universal Authentication Framework from Attacking | |
CN101641976A (en) | An authentication method | |
CN101194529A (en) | Method for negotiating a security key between at least one first communication user and a second communication user to secure a communication connection | |
JP2014524073A (en) | Service access authentication method and system | |
CN101895881B (en) | Method for realizing GBA secret key and pluggable equipment of terminal | |
CN101888626B (en) | Method and terminal equipment for realizing GBA key | |
CN101969642A (en) | Authentication vector generation device and method, subscriber identity module and method, mobile communication system | |
WO2011124051A1 (en) | Method and system for terminal authentication | |
CN102264069B (en) | Authentication control method, device and system based on universal guide architecture | |
JP2010288271A (en) | Method and apparatus for authenticating a mobile device | |
CN116961891A (en) | Key generation method, device, related equipment and storage medium | |
CN113556736A (en) | Access method, server, terminal to be accessed, electronic device and storage medium | |
HK1112124A1 (en) | Secure bootstrapping for wireless communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |