Embodiment
In order to make those skilled in the art person understand better the scheme of the embodiment of the present invention, below in conjunction with drawings and embodiments, the embodiment of the present invention is described in further detail.
Embodiment of the present invention key management method and equipment, key management while authenticating for EAP, master session key (MSK to existing key management mechanism, EMSK) management level are expanded, be about to the MSK of certificate server and terminal, EMSK key management layer expands to EAP authenticate key management level, as shown in Figure 1, make these EAP authenticate key management level can distinguish the many group master session key MSKs of management for dissimilar network or network domains (as mobile domains), EMSKs, particularly, can arrange for the authenticate key manager to different type network or network domains, the master session key MSKs produced by master key (MK) when office terminal is to different type network or network domains authentication respectively, EMSKs, thereby avoid when terminal need to arrive a plurality of different type network authentication simultaneously, because covering mutually, master session key causes the problem that can mutually cover with the key of current network authentication for the key generated to the objective network pre-authentication, guarantee that the communication that terminal is switched to objective network can realize.
For example, when terminal is carried out the pre-authentication of switching objective network by current network, described terminal and certificate server calculate master session key according to the MK preserved separately respectively, simultaneously, certificate server sends to the master session key calculated the authenticator of described switching objective network.The authenticator of described terminal and described switching objective network calculates respectively the pairwise master key of corresponding described switching objective network application again according to the master session key obtained separately; After terminal is switched to described switching objective network, the pairwise master key of the corresponding described switching objective network application that described terminal calculates according to oneself respectively with the authenticator of described switching objective network, generate the pair temporal key in described switching objective network communication for terminal, as terminal in described switching objective network with the encryption key of base station communication.
Certainly, the embodiment of the present invention can also need the application of key or different Network Mobility territories that the master session key manager is set for other, the master session key with management for other application.
Below from network side and end side, the method to the embodiment of the present invention is elaborated respectively.
As shown in Figure 2, be a kind of flow chart of embodiment of the present invention key management method, comprise the following steps:
Step 201, certificate server receives the authentication message that authenticator sends, and carries the network identification information of described authenticator belonging network in described authentication message;
Step 202, utilize described network identification information to determine the corresponding network of authentication.
Step 203, utilize the master key of oneself preserving to generate the master session key for described network, and will distinguish storage for the master session key of described network and the master session key for other networks.
Wherein, the master key of described preservation is that the master session key produced in the verification process while networking according to terminal initial generates.For example, according to existing EAP authentication mechanism, terminal is from a certain type network initial network entry, after terminal is successfully completed the EAP authentication, to produce master session key MSK on terminal and certificate server, EMSK, at this moment can be based on this MSK, EMSK carry out logical operation or get simply wherein some the position as MK, the existing a lot of data of concrete key schedule are introduced, can be with reference to relevant documentation, or employing and existing EAP method, as EAP-AKA(Authentication and Key Agreement, authentication and secret key negotiation mechanism), EAP-TLS(Transport Layer Security, Transport Layer Security) etc. similar key algorithm in.
When terminal initial networks, specific as follows by a process that produces completely master session key after the EAP verification process:
1. terminal sends EAPOL-Start to authenticator;
2. authenticator sends to terminal the request that EAP-Request Identity requires identity verification, requires terminal to send user profile;
3. terminal sends EAP-Response Identity response to authenticator, comprise user profile in EAP-Response Identity, the Frame that authenticator sends terminal generation RADIUS Request message after package is processed is given certificate server and is processed;
4., after certificate server is received RADIUS Request message, terminal is authenticated;
5., after authentication is passed through, certificate server sends RADIUS Accept message to authenticator;
6., after authenticator is received RADIUS Accept message, to terminal, send EAPOL Success message.
7. after authentication success, terminal and certificate server generate MSK and EMSK according to the customizing messages of terminal respectively.
Certificate server can produce above-mentioned terminal master session key MSK, EMSK in the EAP verification process when the initial network entry, directly as the master session key for the type network; Also can carry out again regenerating master session key MSK, the EMSK for the type network after logical operation based on MK obtained above.
Certificate server can, by calling corresponding EAP method, utilize master key MK to generate the master session key for a certain type network.Also can directly pass through the mutual of EAP message (EAP-Request/Response), transmit and calculate the master session key information needed, and generating the master session key for a certain type network based on master key MK, the information of carrying in concrete message interaction process and message can be with reference to corresponding EAP method document.
The master session key that certificate server utilizes master key MK to generate for a certain type network can be when terminal initial networks, utilize master key MK to generate in advance, can be also that scene generates the method that obtains MSK, EMSK in (computational methods can with reference to existing IETF(Internet Engineering Task Force, Internet Engineering task groups) document when these master session key of needs the time).For example, key for when authentication in the WiMAX network, WiMAX network authentication key management person is set, the WiMAX master session key MSK1 produced when WiMAX network initial authentication for office terminal, EMSK1, when terminal need to be when the WiMAX network carries out re-authentication, terminal and certificate server are in the process of re-authentication, to utilize master key MK to produce new WiMAX re-authentication master session key MSK3, EMSK3, at this moment WiMAX re-authentication master session key MSK3, the master session key MSK1 that EMSK3 will generate in the time of replacing terminal to WiMAX network initial authentication, EMSK1.
It should be noted that, in embodiment illustrated in fig. 2, also can be further comprising the steps:
Described certificate server sends to described authenticator by described master session key, so that described authenticator utilizes described master session key to generate the pairwise key of corresponding described network.The pairwise key of the described network of described correspondence comprises: the pairwise master key of corresponding described network and/or pair temporal key.
Embodiment of the present invention key management method, at network side, key management while authenticating for EAP, the difference management is for many groups master session key MSKs, the EMSKs of dissimilar network or network domains (as mobile domains), the authentication authorization and accounting server can be for the corresponding network of authentication, utilize the master key of oneself preserving to generate the master session key for described network, thereby can make the authenticator of described network generate the pairwise key of corresponding described network according to this master session key.Based on the EAP authentication mechanism, terminal generates identical MK with the algorithm of network side based on identical, generate master session key MSKs, the EMSKs for heterogeneous networks by MK again, thereby can avoid when terminal need to arrive a plurality of different type network authentication simultaneously, master session key mutually covers because master session key covers mutually and causes the problem that can mutually cover with the key of current network authentication for the key generated to the objective network pre-authentication, guarantees that the communication that terminal is switched to objective network can realize.
As shown in Figure 3, be the another kind of flow chart of embodiment of the present invention key management method, comprise the following steps:
Step 301, terminal is determined the objective network that needs access;
Step 302, utilize the master key of oneself preserving to generate the master session key for described objective network;
Step 303, will distinguish storage for the master session key of described objective network and the master session key for source network.
Like this, just can avoid when terminal need to arrive a plurality of different type network authentication simultaneously the problem that master session key covers mutually.
It should be noted that, the method of master key based on identical that the master key that terminal oneself is preserved is preserved with certificate server generates, that is to say, the master key that terminal oneself is preserved is identical with the master key that certificate server is preserved, and the master session key produced in the verification process in the time of can networking according to terminal initial generates.Detailed process can be with reference to the description in the embodiment of the present invention of front.
The master session key MSK, the EMSK that in EAP verification process when terminal can be by initial network entry, produce, directly as the master session key for the type network; Also can carry out again regenerating master session key MSK, the EMSK for the type network after logical operation based on MK obtained above.
Equally, the master session key that terminal utilizes master key MK to generate for a certain type network can utilize master key MK to generate in advance when terminal initial networks, and can be also that scene generates when these master session key of needs the time.
It should be noted that, in embodiments of the present invention, also can be further comprising the steps: described terminal utilization generates pairwise master key and/or the pair temporal key of corresponding described objective network for the master session key of described objective network.
Below with the injection frequency terminal, from the WiMAX network, to the WiFi network, switch to example, the key management mechanism of the expansion that the detailed description embodiment of the present invention provides.
Here said injection frequency terminal refers to and supports WiFi, two kinds of rf-modes of WiMAX, but any moment can only be worked in by a kind of radio-frequency module the terminal of emission state, referred to as WiFi/WiMAX injection frequency terminal, below said terminal just refer to this terminal.
Suppose that WiFi/WiMAX injection frequency terminal is in WiMAX network execution initial network entry process, after the EAP verification process is successfully completed, terminal and certificate server calculate MSK1, EMSK1 by master key MK respectively, and certificate server sends to the WiMAX authenticator by MSK1 simultaneously.WiMAX authenticator and terminal utilize respectively MSK1 to calculate the PMK1(pairwise master key), also can directly get front some positions of MSK1 as PMK1, terminal and WiMAX authenticator further generate the AK1(pair temporal key by interacting message), as terminal in the WiMAX network with the encryption key of base station communication.
Due to injection reason frequently, in order to make terminal when from the WiMAX network, being switched to the WiFi network, the continuity that can keep business, just need terminal to carry out in advance the pre-authentication of switching target WiFi network by current WiMAX network, the key management mechanism of the expansion provided according to the embodiment of the present invention, when terminal is carried out the pre-authentication of WiFi network at the WiMAX network by current, terminal and certificate server generate the master session key MSK2 for the WiFi network according to master key MK, EMSK2, wherein, MSK2 is for generating pairwise master key or the pair temporal key for objective network, EMSK2 is the Mobile IP at objective network for terminal, the application purpose keys such as IP secure tunnel generate.Certainly, in embodiments of the present invention, do not relate to for application purpose key generative processes such as Mobile IP, IP secure tunnels, therefore, can only generate MSK2 yet.Then, by certificate server, send MSK2 to the WiFi authenticator, terminal and WiFi authenticator obtain PMK2 by MSK2, and further by interacting message, calculate PTK2.
After terminal is accomplished to the pre-authentication of WiFi network by current WiMAX network, terminal is switching at once not, so during pre-authentication completes and really from the WiMAX network, is switched to the WiFi network with terminal, terminal may need to be carried out re-authentication at the WiMAX network due to base station switching or the reason of key lifetime.Key management mechanism according to the embodiment of the present invention, when terminal is carried out re-authentication during this in the WiMAX network, by terminal and WiMAX certificate server in the process of re-authentication, utilize master key MK to produce new WiMAX network re-authentication master session key MSK3, EMSK3, at this moment the master session key MSK3 that terminal produces when WiMAX network re-authentication, the master session key MSK1 that EMSK3 will generate in the time of replacing terminal to WiMAX network initial authentication, EMSK1, certificate server sends MSK3 to the authenticator in the WiMAX network, terminal and WiMAX authenticator calculate PMK3 by MSK3, and further by interacting message, produce new AK2, and the AK1 produced while with new AK2, replacing terminal to the WiMAX initial network entry.
When terminal need to be switched to the WiFi network from the WiMAX network, because terminal has completed the pre-authentication that arrives the WiFi network in advance, the PMK2 generated when WiFi authenticator and terminal have been preserved pre-authentication, so after WiFi, terminal only need consult to generate for terminal by 4-Way Handshake according to PMK2 with the WiFi authenticator and get final product at the PTK of WiFi network service when terminal switching radio frequency.
By said process, can find out, utilize the key management method of the embodiment of the present invention, in the EAP of certificate server and terminal authenticate key management level (MSK, EMSK management level), the master session key MSK, the EMSK that when office terminal is to WiFi network and WiMAX network authentication respectively, produce, avoided having completed after the pre-authentication of WiFi network when terminal, when the terminal problem that the master session key on terminal and server covers mutually when the WiMAX network carries out re-authentication again.
In said process, terminal and certificate server need to be determined when the key that produces when each EAP authentication is for which kind network authentication and produce, to this, IP address in the message that certificate server can receive when mutual with the heterogeneous networks authenticator, or the network identity carried in message, authenticator sign (as MAC Address), terminal iidentification etc. are identified each EAP authentication.On terminal, distinguish the authentication each time for heterogeneous networks, when terminal is used same authentication application person, because in the mutual EAP message of the authentication application person on terminal and authenticator, do not carry at present the identification information of authenticating network, so in this case, when terminal is authenticated with the network of number of different types simultaneously, the authentication application person on terminal can't distinguish the network that the master session key produced while authenticating each time belongs to that type.For this reason can be by expansion EAP message, the method for carrying therein the network identity (Net-ID) of authenticator belonging network solves this problem.When making terminal can distinguish the authentication of EAP each time for network, thereby make the main shared key manager for the different type network setting on terminal can distinguish when management authenticates for heterogeneous networks the master session key produced, as a kind of concrete EAP authentication message expansion embodiment, carry the network identity of authenticator belonging network (being also the network that terminal will authenticate) in the EAP-Request message that can send to terminal at authenticator, terminal is by resolving the network identity in this message, just can distinguish each EAP and authenticate corresponding network, thereby the master session key produced during by each EAP authentication, appointment is preserved and is managed by the master session key manager to should type network of prior setting, and when needing, the master session key user to should type network provides master session key for it.
It should be noted that, above-mentioned to handoff procedure in the description of key management mechanism, the lifetime of having supposed re-authentication master session key, pre-authentication master session key does not have expiredly, if re-authentication master session key, pre-authentication master session key lifetime are expired, need to do not exceeded the time limit by MSK or EMSK(hypothesis MSK, EMSK key) recalculate and obtain re-authentication master session key, pre-authentication master session key.If the lifetime of MSK, EMSK key is expired, terminal need to recalculate and upgrade MSK, EMSK key with certificate server, upgrades the re-authentication master session key that calculated by MSK, EMSK, pre-authentication master session key etc. simultaneously.
Visible, embodiment of the present invention key management method, key when EPA is authenticated adopts the administrative mechanism of layering, make terminal when heterogeneous network switches, the key produced when carrying out switching objective network pre-authentication by current network, the key used in current network with terminal can not cover, and, due to terminal by current network carry out switching objective network pre-authentication and terminal when former network carries out re-authentication without recalculating the process that generates MSK, EMSK, improved efficiency.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is to come the hardware that instruction is relevant to complete by program, described program can be stored in a computer read/write memory medium, described storage medium, as: ROM/RAM, magnetic disc, CD etc.
Correspondingly, the embodiment of the present invention also provides a kind of certificate server, as shown in Figure 4, is the structural representation of embodiment of the present invention certificate server.
In this embodiment, described certificate server comprises:
Receiving element 401, for receiving the authentication message of authenticator transmission, carry the network identification information of described authenticator belonging network in described authentication message;
Network determining unit 402, determine the corresponding network of authentication for utilizing described network identification information;
The first key generation unit 403, generate the master session key for described network for utilizing the master key of oneself preserving;
The first memory cell 404, for distinguishing storage for the master session key of described network and the master session key for other networks.
The generative process of described master key can, with reference to the description in the embodiment of the present invention key management method of front, not repeat them here.
In embodiments of the present invention, also can further comprise: the first master key generation unit 405 and transmitting element 406.Wherein, described the first master key generation unit 405, the master session key that the verification process when networking according to terminal initial produces generates described master key.Described transmitting element 406, for described master session key is sent to described authenticator, so that described authenticator utilizes described master session key to generate the pairwise key of corresponding described network.
The certificate server of the embodiment of the present invention, key management while authenticating for EAP, the difference management is for many groups master session key MSKs, the EMSKs of dissimilar network or network domains (as mobile domains), the authentication authorization and accounting server can be for the corresponding network of authentication, utilize the master key of oneself preserving to generate the master session key for described network, can effectively avoid when terminal need to arrive a plurality of different type network authentication simultaneously, the problem that master session key covers mutually, guarantee that the communication that terminal is switched to objective network can realize.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, as shown in Figure 5, is the structural representation of embodiment of the present invention terminal.
In this embodiment, described terminal comprises:
Access network determining unit 501, for determining the objective network that needs access;
The second key generation unit 502, generate the master session key for described objective network for utilizing the master key of oneself preserving;
The second memory cell 503, for distinguishing storage for the master session key of described objective network and the master session key for source network.
The generative process of described master key can, with reference to the description in the embodiment of the present invention key management method of front, not repeat them here.
In embodiments of the present invention, described the second key generation unit 502, also can be further used in the verification process when described terminal initial networks generating initial master session key; Correspondingly, described terminal also further comprises: the second master key generation unit 504, and for according to described initial master session key, generating described master key.
In embodiments of the present invention, described terminal also can further comprise: pairwise key generation unit 505, and for utilizing the pairwise key that generates corresponding described objective network for the master session key of described objective network.
The terminal of the embodiment of the present invention, by distinguishing storage for the master session key of described objective network and the master session key for source network, can be when heterogeneous network switches, the key produced when carrying out switching objective network pre-authentication by current network, with the key used in current network, can not cover, and, terminal by current network carry out switching objective network pre-authentication and terminal when former network carries out re-authentication without recalculating the process that generates MSK, EMSK, improved efficiency.
Above the embodiment of the present invention is described in detail, has applied embodiment herein the present invention is set forth, the explanation of above embodiment is just for helping to understand method and apparatus of the present invention; , for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention simultaneously.