CN1941990A - Method for verifying between user terminal apparatus and network in wireless telecommunication system - Google Patents
Method for verifying between user terminal apparatus and network in wireless telecommunication system Download PDFInfo
- Publication number
- CN1941990A CN1941990A CNA2005100483099A CN200510048309A CN1941990A CN 1941990 A CN1941990 A CN 1941990A CN A2005100483099 A CNA2005100483099 A CN A2005100483099A CN 200510048309 A CN200510048309 A CN 200510048309A CN 1941990 A CN1941990 A CN 1941990A
- Authority
- CN
- China
- Prior art keywords
- network
- authentication
- message
- algorithm
- user equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
根据本发明,提出了一种无线通信系统中在用户终端设备和网络之间进行认证的方法,所述方法包括以下步骤:UE向网络传送认证请求消息,所述认证请求消息包括认证参考值;网络判断其自身所产生的认证值是否与认证参考值一致,如果一致,则表示网络侧认证成功并向UE发送认证响应消息,所述认证响应消息包含另一认证参考值;以及UE接收从网络传送来的所述认证响应消息,并验证所述认证响应消息中所包含的所述另一认证参考值是否与其自身所产生的认证值一致,如果一致,则用户终端设备侧认证成功。
According to the present invention, a method for performing authentication between a user terminal device and a network in a wireless communication system is proposed, the method includes the following steps: UE transmits an authentication request message to the network, and the authentication request message includes an authentication reference value; The network judges whether the authentication value generated by itself is consistent with the authentication reference value, and if it is consistent, it means that the network side authentication is successful and sends an authentication response message to the UE, and the authentication response message contains another authentication reference value; and the UE receives the authentication value from the network transmit the authentication response message, and verify whether the other authentication reference value contained in the authentication response message is consistent with the authentication value generated by itself, and if they are consistent, the user terminal device side authentication is successful.
Description
技术领域technical field
本发明涉及无线通信系统,特别是涉及一种在无线通信系统中网络和用户终端设备进行相互认证的方法,用于加快呼叫建立的过程。The present invention relates to a wireless communication system, in particular to a method for mutual authentication between a network and a user terminal equipment in the wireless communication system, which is used to speed up the process of call establishment.
背景技术Background technique
第三代移动通信系统的主要目的是希望能够为最终用户在全球上的任何地点和任何时间提供无缝的服务。其中,通用移动通信系统(以下简称UMTS)作为第三代移动通信系统的一种网络平台,在很多运营商的网络中都得到了应用。图1是UMTS系统的结构框架图。The main purpose of the third generation mobile communication system is to provide seamless services for end users anywhere and at any time in the world. Among them, the Universal Mobile Telecommunications System (hereinafter referred to as UMTS), as a network platform of the third generation mobile communication system, has been applied in the networks of many operators. Fig. 1 is a structural frame diagram of the UMTS system.
用户设备101(以下称为UE)是用来接收作为被叫的业务或者呼叫,发送作为主叫的业务或呼叫的一个装置。基站102(以下称为Node B)是通过发送接收器件与用户设备利用无线信号进行通信的设备。UE与NodeB之间的空中接口涉及物理层和媒体接入层(以下称为MAC层)。物理层负责处理与无线信号收发相关的操作,MAC负责将不同的业务映射到物理层上去。控制无线网络控制器(以下称为CRNC)控制基站中各个小区的无线资源管理、分配及使用,负责将各个小区中的无线资源分配给用户设备UE。无线网络控制器RNC在对于UE的角色来说可以有服务无线网络控制器(以下称为SRNC)和漂移无线网络控制器(以下称为DRNC)的区别。SRNC是为用户设备提供无线资源控制连接(以下称为RRC)的实体,通过它用户设备才可以向网络发送控制信令和从网络接收控制信令。SRNC从CRNC处得到给该用户分配的网络资源,将该资源配置参数通过RRC信令发送给用户设备。这样用户设备才能够与网络进行通信。SRNC与用户设备之间的接口为Uu接口。服务GPRS支持节点105(以下称为SGSN)是负责管理用户设备的移动管理状态及会话管理状态的实体,用户设备的移动性管理和与会话相关的服务质量的协商也是发生在UE与SGSN之间的。SGSN与用户设备的SRNC之间的接口为Iu,负责为用户数据的传输建立用户平面的传输通道及传送信令的信令连接。网关GPRS支持节点106(以下称为GGSN)为用户设备与分组数据网络(以下称为PDN)的数据传输起一个网关的功能。GGSN为用户设备分配因特网协议(以下称为IP)地址,用户发出的数据和发给该用户的数据都以该地址为标识。GGSN与SGSN之间的接口称为Gn,该接口负责在SGSN与GGSN之间对业务进行服务质量的协商,及建立用户平面的GPRS用户平面隧道(以下称为GTP-U)进行数据传输。GGSN与PDN之间的接口为Gi,该接口的功能比较广泛,可以用来对用户进行IP地址分配、鉴权认证计费等功能。GGSN最主要的功能就是接收和分析收到的数据,然后将属于某一个用户设备的数据传到相应的GTP-U隧道上去。User equipment 101 (hereinafter referred to as UE) is a device used to receive a called service or call and send a calling service or call. The base station 102 (hereinafter referred to as Node B) is a device that communicates with user equipment through wireless signals through sending and receiving devices. The air interface between UE and NodeB involves physical layer and media access layer (hereinafter referred to as MAC layer). The physical layer is responsible for processing operations related to wireless signal transmission and reception, and the MAC is responsible for mapping different services to the physical layer. The controlling radio network controller (hereinafter referred to as CRNC) controls the radio resource management, allocation and use of each cell in the base station, and is responsible for allocating the radio resources in each cell to the user equipment UE. The role of the radio network controller RNC for the UE may be distinguished from a serving radio network controller (hereinafter referred to as SRNC) and a drift radio network controller (hereinafter referred to as DRNC). The SRNC is an entity that provides a radio resource control connection (hereinafter referred to as RRC) for the user equipment, through which the user equipment can send control signaling to the network and receive control signaling from the network. The SRNC obtains the network resources allocated to the user from the CRNC, and sends the resource configuration parameters to the user equipment through RRC signaling. In this way, the user equipment can communicate with the network. The interface between SRNC and user equipment is Uu interface. Serving GPRS Support Node 105 (hereinafter referred to as SGSN) is an entity responsible for managing the mobility management state and session management state of user equipment, and the mobility management of user equipment and the negotiation of session-related service quality also occur between UE and SGSN of. The interface between the SGSN and the SRNC of the user equipment is Iu, which is responsible for establishing the transmission channel of the user plane and the signaling connection for transmitting signaling for the transmission of user data. The gateway GPRS support node 106 (hereinafter referred to as GGSN) functions as a gateway for data transmission between user equipment and packet data network (hereinafter referred to as PDN). The GGSN allocates an Internet Protocol (hereinafter referred to as IP) address for the user equipment, and the data sent by the user and the data sent to the user are all identified by the address. The interface between the GGSN and the SGSN is called Gn, which is responsible for negotiating the quality of service between the SGSN and the GGSN, and establishing a GPRS user plane tunnel (hereinafter referred to as GTP-U) on the user plane for data transmission. The interface between the GGSN and the PDN is Gi, which has a wide range of functions and can be used to allocate IP addresses, authentication, authentication, and billing to users. The main function of GGSN is to receive and analyze the received data, and then transmit the data belonging to a certain user equipment to the corresponding GTP-U tunnel.
UTRAN既可以同时和这两个域连接,也可以只和其中的一个域连接。UTRAN的目标是提供一组统一的无线承载,它可以用于突发的分组业务,也可以用于传统的电话业务。每个URAN能够在一定的区域内进行无线覆盖,提供业务。这个区域被定义为UTRAN登记区域(以下简称URA)。为了提供所述的无线覆盖,每个URAN包括一个无线网络控制器(以下简称RNC)和其控制下的至少一个基站(以下简称NodeB)。从逻辑上来说,每个NodeB又可能包含至少一个蜂窝(以下简称Cell)。RNC可以同其它RNC相连,支持由于用户终端设备(以下简称UE)移动所带来的切换和移动性管理。CN连接到其它类型的网络,从而为最终用户提供无缝服务。UTRAN can be connected with these two domains at the same time, and can only be connected with one of them. The goal of UTRAN is to provide a set of unified radio bearers, which can be used for bursty packet services as well as traditional telephone services. Each URAN can perform wireless coverage and provide services in a certain area. This area is defined as the UTRAN Registration Area (hereinafter referred to as URA). In order to provide the wireless coverage, each URAN includes a radio network controller (hereinafter referred to as RNC) and at least one base station (hereinafter referred to as NodeB) under its control. Logically, each NodeB may include at least one cell (hereinafter referred to as Cell). The RNC can be connected with other RNCs, and supports handover and mobility management brought about by the movement of user terminal equipment (hereinafter referred to as UE). CNs are connected to other types of networks to provide seamless services to end users.
无线资源处理是UTRAN的内部功能,CN不定义分配的无线资源类型。通常UE和RNC之间需要建立一个无线资源控制(以下简称RRC)连接,以便在UTRAN与UE间传送大量的用户数据流和信令流。RRC有两种模式:RRC连接模式和RRC空闲模式。RRC的模式描述了识别UE身份的方式。在RRC空闲模式,通过和CN有关的身份识别UE。在RRC连接模式,通过在公共传输信道上分配给UE的无线网络临时身份(以下简称RNTI)来识别UE。Radio resource processing is an internal function of UTRAN, and CN does not define the type of radio resource allocated. Usually, a radio resource control (RRC) connection needs to be established between the UE and the RNC, so as to transmit a large amount of user data flow and signaling flow between the UTRAN and the UE. RRC has two modes: RRC connected mode and RRC idle mode. The mode of RRC describes the way to identify the identity of the UE. In RRC idle mode, the UE is identified by an identity related to the CN. In the RRC connected mode, the UE is identified by a Radio Network Temporary Identity (hereinafter referred to as RNTI) allocated to the UE on a common transport channel.
参见图2,对于UE的移动性功能,在UMTS系统中使用四个不同的区域概念。位置区域(以下简称LA)和路由区域(以下简称RA)用于核心网。URA和蜂窝Cell区域用于UTRAN。位置区域LA与CS业务有关,路由区域RA与PS业务有关。一个位置区域LA由一个CN节点处理。UE在一个位置区域LA中登记,也就意味着UE在处理此位置区域LA的CN节点中登记。一个路由区域RA由一个CN节点处理。UE在一个路由区域RA中登记,也就意味着UE在处理此路由区域RA的CN节点中登记。在UMTS系统中,MSC/VLR使用LA来寻呼UE,SGSN使用RA来寻呼UE。URA和Cell区域只在UTRAN中可见并用于RRC连接模式。Referring to Fig. 2, for the UE's mobility function, four different area concepts are used in the UMTS system. A location area (hereinafter referred to as LA) and a routing area (hereinafter referred to as RA) are used for the core network. URA and cellular Cell area are used for UTRAN. The location area LA is related to the CS service, and the routing area RA is related to the PS service. One location area LA is handled by one CN node. The UE is registered in a location area LA, which means that the UE is registered in the CN node handling this location area LA. One routing area RA is handled by one CN node. The UE is registered in a routing area RA, which means that the UE is registered in the CN node handling this routing area RA. In UMTS system, MSC/VLR uses LA to page UE, and SGSN uses RA to page UE. The URA and Cell areas are only visible in UTRAN and used in RRC connection mode.
合并的MSC/VLR+SGSNMerged MSC/VLR+SGSN
对CS/PS业务,CN使用位置区域LA/路由区域RA。CN在开始寻呼和CS/PS业务有关的UE时,使用LA/RA。MSC/VLR和SGSN可以分配给UE一个和CS/RS业务有关的临时身份,TMSI/P-TMSI。这个临时身份在一个LA/RA内是唯一的。For CS/PS services, CN uses location area LA/routing area RA. CN uses LA/RA when starting to page UE related to CS/PS service. MSC/VLR and SGSN can assign UE a temporary identity related to CS/RS service, TMSI/P-TMSI. This temporary identity is unique within an LA/RA.
当终端处于RRC连接模式时,使用UTRAN内部区域。在UTRAN开始寻呼时使用这些区域。UTRAN内部区域更新是无线网络过程,并且在UTRAN外应该看不见UTRAN内部区域结构。在RRC连接模式,主要的状态是蜂窝连接状态和URA连接状态,可以在蜂窝级或URA级知道UE位置。在UTRAN内使用无线网络临时标识符(以下简称RNTI)作为临时的UE标识,它在RRC连接建立时分配给UE。在此模式下只有一个RNC作为服务RNC,在UE和此SRNC间建立了RRC连接。When the terminal is in RRC connected mode, the UTRAN inner area is used. These areas are used when UTRAN initiates paging. UTRAN intra-area update is a radio network procedure and the UTRAN intra-area structure should not be visible outside UTRAN. In the RRC connection mode, the main states are the cellular connection state and the URA connection state, and the UE location can be known at the cellular level or the URA level. The Radio Network Temporary Identifier (hereinafter referred to as RNTI) is used in the UTRAN as a temporary UE identity, which is allocated to the UE when the RRC connection is established. In this mode, there is only one RNC as the serving RNC, and an RRC connection is established between the UE and the SRNC.
一个RA由属于连接到同一CN节点的RNCs的多个蜂窝组成,RA与RNCs间的映射由拥有此RA的SGSN处理。一个LA由属于连接到同一CN节点的RNCs的多个蜂窝组成,LA与RNCs间的映射由拥有此LA的MSC/VLR处理。一个RA/LA只由一个CN服务节点处理,即一个SGSN或者MSC/VLR。有些运营商可能会采用以下的组网方式:RA与LA相等或一个RA是一个,且只能是一个LA的子集,也就是一个RA不会超过一个LA。LA与Cell间及RA与Cell间的映射在RNC内处理。An RA is composed of multiple cells belonging to RNCs connected to the same CN node, and the mapping between RA and RNCs is handled by the SGSN owning the RA. A LA is composed of multiple cells belonging to RNCs connected to the same CN node, and the mapping between LA and RNCs is handled by the MSC/VLR that owns the LA. One RA/LA is only handled by one CN service node, that is, one SGSN or MSC/VLR. Some operators may adopt the following networking method: RA and LA are equal or one RA is one and can only be a subset of one LA, that is, one RA cannot exceed one LA. The mapping between LA and Cell and between RA and Cell is handled in RNC.
UE一开始在CN的各自业务域进行业务登记。当UE从一个URA(以下称之为旧的URA)移动到一个新的URA时,会引起新的URA所属的RNC执行URA更新过程,这样在需要时,才能够找到此UE。因此,网络运营商就必须通过一定的验证过程来确信,发起URA更新的UE就是这个有效的UE。这个验证的过程就涉及RNC对RNC和UE之间所传输的数据进行完整性检查。At the beginning, the UE performs service registration in the respective service domains of the CN. When a UE moves from a URA (hereinafter referred to as an old URA) to a new URA, the RNC to which the new URA belongs will be caused to perform a URA update process, so that the UE can be found when needed. Therefore, the network operator must go through a certain verification process to make sure that the UE that initiates the URA update is the valid UE. This verification process involves the RNC performing an integrity check on the data transmitted between the RNC and the UE.
参见图3,每个UE内部具有一个包含了用户的特定信息、用于用户识别的用户识别模块(以下简称SIM)的卡片和用于处理其他功能、特别是支持用户移动功能的移动设备(以下简称ME)。SIM卡片上记录有各种数据和可执行文件。其中,数据部分包含了唯一永久标识用户身份的国际移动用户身份(以下简称IMSI)、UE当前的位置信息、完整性密匙(以下简称IK)以及其它安全和管理信息。在每次呼叫终止、手机完全终止服务或者当终端从一个URA移动到另一个URA时,所述的位置信息将随之被更新。位置信息包括了临时用于标识用户的匿名标识,它在每个URA内部使用。根据使用RRC模式的不同、以及CS/PS业务域的不同,这个匿名标识可能是临时用户识别码(以下简称TMSI)、分组临时移动用户码(以下简称P-TMSI)或者无线网络临时标识符(以下简称RNTI)。Referring to Fig. 3, each UE has inside a card containing specific information of the user, a Subscriber Identity Module (hereinafter referred to as SIM) for user identification, and a mobile device (hereinafter referred to as SIM) for processing other functions, especially supporting user mobile functions (hereinafter referred to as SIM). referred to as ME). Various data and executable files are recorded on the SIM card. Wherein, the data part includes the International Mobile Subscriber Identity (IMSI for short), the current location information of the UE, the integrity key (IK for short), and other security and management information, which uniquely and permanently identifies the user identity. Said location information will be updated each time a call is terminated, the handset completely terminates service or when the terminal moves from one URA to another. The location information includes an anonymous identifier temporarily used to identify the user, which is used within each URA. Depending on the RRC mode used and the CS/PS service domain, this anonymous identifier may be a Temporary Subscriber Identity (hereinafter referred to as TMSI), a Packet Temporary Mobile Subscriber Code (hereinafter referred to as P-TMSI) or a wireless network temporary identifier ( Hereinafter referred to as RNTI).
不直接使用IMSI而使用TMSI或者其它的临时标识来匿名标识某一个UE的目的是出于安全方面的考虑。因为用户身份是重要而又敏感的信息,在通信中必须保证这些信息的机密性。身份保密的目的是保护用户的隐私,避免永久用户标识IMSI信息的泄漏。The purpose of using the TMSI or other temporary identifiers to anonymously identify a certain UE instead of using the IMSI directly is for security considerations. Because user identity is important and sensitive information, the confidentiality of this information must be guaranteed in the communication. The purpose of identity confidentiality is to protect the user's privacy and avoid leakage of permanent user identification IMSI information.
TMSI/P-TMSI具有本地特征,仅在归属区域MSC/VLR或用户注册的路由区域RA内有效。在此区域外,为避免混淆,还应该附加一个位置区域标识(以下简称LAI)或路由区域标识(以下简称RAI)。临时用户标识与永久用户标识之间的关系保存在用户注册的MSC/VLR或者SGSN中。TMSI/P-TMSI has local characteristics and is only valid in the home area MSC/VLR or the routing area RA where the user is registered. Outside this area, in order to avoid confusion, a location area identifier (hereinafter referred to as LAI) or routing area identifier (hereinafter referred to as RAI) should be added. The relationship between the temporary user ID and the permanent user ID is stored in the MSC/VLR or SGSN where the user is registered.
为了避免用户的可追踪性,通常不应该长期使用同一TMSI/P-TMSI来鉴别一个用户的身份。参见图4,以PS域为例,P-TMSI的更新是在安全模式建立以后由SGSN发起,再分配过程如下:首先SGSN产生一个新的P-TMSIn,并将该P-TMSIn与IMSI的映射关系存储在它的数据库中,然后SGSN向用户发送P-TMSIn及一个新的路由区域标识RAIn;然后,用户收到之后,保存P-TMSIn并自动删除与先前P-TMSIo之间的关联后,向SGSN发送应答;最后,SGSN收到应答后,从数据库中删除与旧的P-TMSIo的关联,P-TMSIn用于随后的身份鉴别过程中。In order to avoid user traceability, generally the same TMSI/P-TMSI should not be used for a long time to identify a user. Referring to Figure 4, taking the PS domain as an example, the update of the P-TMSI is initiated by the SGSN after the security mode is established. The relationship is stored in its database, and then the SGSN sends P-TMSIn and a new routing area identifier RAIn to the user; then, after the user receives it, saves the P-TMSIn and automatically deletes the association with the previous P-TMSIo, Send a response to SGSN; finally, after receiving the response, SGSN deletes the association with the old P-TMSIo from the database, and P-TMSIn is used in the subsequent identification process.
在UMTS系统中,当用户无法通过P-TMSI来鉴别其身份时,可利用IMSI来鉴别自己的身份。此过程主要用于用户第一次注册到一个服务网络或SGSN无法从P-TMSI中得到IMSI。此时,由SGSN向用户发送IMSI请求,用户的应答是包含IMSI信息的纯文本。In the UMTS system, when the user cannot identify his identity through the P-TMSI, he can use the IMSI to identify his own identity. This process is mainly used when the user registers to a service network for the first time or the SGSN cannot obtain the IMSI from the P-TMSI. At this time, the SGSN sends an IMSI request to the user, and the user's response is a plain text containing IMSI information.
同样出于安全方面的考虑,UE和URAN之间的通信是采用加密密匙进行了加密的。加密密匙通常是在UE家乡环境中(以下简称HE)的认证中心(以下简称AuC)或者归属位置寄存器(以下简称HLR)中所保存的加密密匙CK。在CS域和PS域通常有不同的CK。为了避免使本专利的描述过于冗长,在下面的说明中,仅以PS域的操作为例,而略去了类似的CS域的详细描述。Also for security reasons, the communication between UE and URAN is encrypted using an encryption key. The encryption key is usually the encryption key CK stored in the authentication center (hereinafter referred to as AuC) or the home location register (hereinafter referred to as HLR) in the UE's home environment (hereinafter referred to as HE). There are usually different CKs in the CS domain and the PS domain. In order to avoid making the description of this patent too lengthy, in the following description, only the operation of the PS domain is taken as an example, and the detailed description of the similar CS domain is omitted.
上述的CK通过认证和密匙协商(以下简称AKA)过程而得到。所描述的过程是基于某个只被SIM和HLR所共享的密匙K来进行的,UE和网络各自通过证明自己都能够获知这个密匙,从而达到相互认证的目的。除此之外,为了支持网络认证,SIM和用户的本地环境都还各自记录着序列号SQNMS和序列号SQNHE。对每个用户都有一个单独的序列号SQNHE,SQNMS表明了SIM所接受的最高的序列号。UE给相关的SGSN发送进程接入请求消息以使其获得该移动台的参数。网络方面发出认证请求,其中包括一个随机数,UE按一定的算法对此随机数进行处理后,发送认证响应给网络方面,由网络方面判断此用户的合法性。The aforementioned CK is obtained through an authentication and key agreement (hereinafter referred to as AKA) process. The described process is based on a key K shared only by the SIM and the HLR. The UE and the network each prove that they can know the key, so as to achieve the purpose of mutual authentication. In addition, in order to support network authentication, both the SIM and the local environment of the user record the serial number SQN MS and the serial number SQN HE respectively. There is an individual serial number SQN HE for each subscriber, and SQN MS indicates the highest serial number accepted by the SIM. The UE sends a process access request message to the relevant SGSN to obtain the parameters of the mobile station. The network sends out an authentication request, which includes a random number. After the UE processes the random number according to a certain algorithm, it sends an authentication response to the network, and the network judges the legitimacy of the user.
参见图5,AKA的具体过程如下:首先,UE向SGSN发送能够表明自己身份的标识。SGSN能够从这个标识中直接,或者通过所存储的P-TMSI和IMSI的映射关系间接得到唯一永久标识用户身份的IMSI以及其归属局HLR信息。然后,SGSN向该HLR发送“认证数据请求”,请求获得与该IMSI对应的认证数据。“认证数据请求”中包含用户的IMSI和所请求的域的类别(PS或者CS)。之后,在收到SGSN的“认证数据请求”后,HLR随即生成n个认证向量(以下简称AV),或者从已经计算出的AV数据库中取出所需的数量,按照序号排序后把它们发送给VLR。图17描述了AV的生成方法。其中所述的AMF、f1、f2、f3、f4、f5算法超出了本发明的范围,因此省去了对它们的详细描述。每个AV包括以下信息:随机数RAND,期望回应XRES,加密密匙CK,完整性密匙IK,和认证令牌AUTN。每一个每个AV都能用于SGSN和SIM之间的一次认证和密匙协商。Referring to FIG. 5 , the specific process of AKA is as follows: First, the UE sends an identification that can indicate its identity to the SGSN. The SGSN can obtain the IMSI that uniquely and permanently identifies the user identity and the HLR information of the home office directly or indirectly through the stored mapping relationship between P-TMSI and IMSI from this identification. Then, the SGSN sends an "authentication data request" to the HLR, requesting to obtain the authentication data corresponding to the IMSI. The "authentication data request" contains the user's IMSI and the requested domain category (PS or CS). Afterwards, after receiving the "authentication data request" from the SGSN, the HLR generates n authentication vectors (hereinafter referred to as AVs) immediately, or takes out the required quantity from the calculated AV database, sorts them according to the serial numbers, and sends them to VLR. Fig. 17 describes the generation method of AV. The AMF, f1, f2, f3, f4, f5 algorithms described therein are beyond the scope of the present invention, so their detailed descriptions are omitted. Each AV includes the following information: random number RAND, expected response XRES, encryption key CK, integrity key IK, and authentication token AUTN. Each AV can be used for one authentication and key negotiation between SGSN and SIM.
此后,当SGSN发起一次认证和密匙协商时,它会从排了序的AV数组种选择下一个AV,将其中的随机数RAND及认证令牌AUTN发送给UE,请求用户产生认证数据。各节点对AV的处理是按照先进/先出的原则。Thereafter, when the SGSN initiates an authentication and key negotiation, it will select the next AV from the sorted AV array, send the random number RAND and the authentication token AUTN to the UE, and request the user to generate authentication data. Each node processes the AV according to the first-in/first-out principle.
接下来,SIM接收到认证请求后,首先计算XMAC,并与AUTN中的MAC进行比较,若不同,则向VLR发送拒绝认证消息,并放弃该过程。同时还要验证接受到的序列号SQN是否在有效的范围内,若不在,MS向VLR发送同步失败消息,并放弃该过程。上述两项均通过后,UE用f2计算出RES,用f3计算出CK,用f4算法计算出IK,并将RES发送给SGSN。Next, after the SIM receives the authentication request, it first calculates the XMAC and compares it with the MAC in the AUTN. If it is different, it sends a message of rejecting the authentication to the VLR and gives up the process. At the same time, it is also necessary to verify whether the received sequence number SQN is within the valid range, if not, the MS sends a synchronization failure message to the VLR, and gives up the process. After the above two items are all passed, UE calculates RES with f2, calculates CK with f3, calculates IK with f4 algorithm, and sends RES to SGSN.
最后,SGSN接收到来自UE的RES后,将RES与AV中的XRES进行比较,相同则认证成功,否则认证失败。由于MS和HLR计算CK用的都是同一种算法f3,计算IK用的都是同一种算法f4,故而所得出的CK、IK必定相同,这样经过相互身份认证和密匙协商后,SIM和SGSN分别将该过程中的CK、IK传给具体执行加密和完整性保护功能的ME和RNC,为以后UE和RNC的保密通信使用。Finally, after receiving the RES from the UE, the SGSN compares the RES with the XRES in the AV. If they are the same, the authentication succeeds; otherwise, the authentication fails. Since both MS and HLR use the same algorithm f3 for calculating CK and the same algorithm f4 for calculating IK, the resulting CK and IK must be the same. After mutual identity authentication and key negotiation, SIM and SGSN The CK and IK in this process are respectively transmitted to ME and RNC that specifically perform encryption and integrity protection functions, and are used for future confidential communication between UE and RNC.
UE和网络之间的相互身份认证包括用户认证和网络认证两方面:用户认证使服务网络能够确认用户的身份,而网络认证使用户能够确认它正在使用的服务网络是经过其所注册的家乡环境HE授权从而可以给他提供服务的,其中者也包括了确认这个授权是最新的。为了达到上述目的,通常情况下在用户和网络之间每次建立连接时,都需要彼此进行身份认证。在UMTS系统中的身份认证过程,包括AKA和本地认证两种机制。其中,AKA过程就是上述的使用来自用户家乡环境HE的认证向量来进行的过程。当用户第一次注册到一个服务网络时,或者在已注册的服务网络中发送服务请求(SERVICE REQUEST)、位置更新请求(LOCATIONUPDATE REQUEST)、路由区域更新请求(ROUTING AREA UPDATEREQUEST)、附着网络请求(ATTAH REQUEST)、脱离网络请求(DETACHREQUEST)和重建连接请求(CONNECTION RE-ESTABLISHMENTREQUEST)等命令后,采用上一次AKA所产生的IK能进行的本地认证次数已经达到了最大限制值时,服务网络发起这种AKA过程。另一种的本地认证机制是用户和服务网络之间使用上一次AKA过程中所产生的完整性密匙IK。当用户在已注册的服务网络中发送服务请求(SERVICEREQUEST)、位置更新请求(LOCATION UPDATE REQUEST)、路由区域更新请求(ROUTING AREA UPDATE REQUEST)、附着网络请求(ATTAHREQUEST)、脱离网络请求(DETACH REQUEST)和重建连接请求(CONNECTION RE-ESTABLISHMENT REQUEST)等命令后,而采用上一次的AKA所产生的IK能进行的本地认证次数还没有达到了最大限制值时,服务网络发起这种本地认证过程。由此而知,AKA过程发生的间隔时间较长;而本地认证过程发生的间隔时间较短。Mutual identity authentication between the UE and the network includes two aspects: user authentication and network authentication: user authentication enables the serving network to confirm the identity of the user, and network authentication enables the user to confirm that the serving network it is using is through its registered home environment HE authorized to provide services to him, which also includes confirming that the authorization is up to date. In order to achieve the above purpose, usually each time a connection is established between the user and the network, each other needs to be authenticated. The identity authentication process in the UMTS system includes two mechanisms of AKA and local authentication. Wherein, the AKA process is the above-mentioned process performed by using the authentication vector from the user's home environment HE. When the user registers to a service network for the first time, or sends a service request (SERVICE REQUEST), a location update request (LOCATIONUPDATE REQUEST), a routing area update request (ROUTING AREA UPDATEREQUEST), an attached network request ( ATTAH REQUEST), DETACHREQUEST, and CONNECTION RE-ESTABLISHMENTREQUEST, and the number of local authentications that can be performed using the IK generated by the last AKA has reached the maximum limit, the service network initiates this AKA process. Another local authentication mechanism is to use the integrity key IK generated in the last AKA process between the user and the service network. When the user sends a service request (SERVICEREQUEST), location update request (LOCATION UPDATE REQUEST), routing area update request (ROUTING AREA UPDATE REQUEST), attachment network request (ATTAHREQUEST), detachment network request (DETACH REQUEST) in the registered service network After commands such as CONNECTION RE-ESTABLISHMENT REQUEST and the number of local authentications that can be performed using the IK generated by the last AKA has not reached the maximum limit value, the service network initiates this local authentication process. It can be known from this that the AKA process takes place at a longer interval, while the local authentication process takes place at a shorter interval.
图6描述了UMTS系统中进行本地认证和连接建立的初始过程。Figure 6 describes the initial process of local authentication and connection establishment in the UMTS system.
在步骤601,UE在建立RRC连接的过程中将发送保存在SIM卡上的参数START的值,以及“UE的安全能力”信息给RNC。如果UE具有这个能力的话,上述步骤中还可能传输GSM等级2和3能力。所述的UE的安全能力信息包括UE所能够支持的各种加密算法UEA和完整性保护算法UIA。START值和UE的安全能力信息被存储在服务RNC(以下简称SRNC)中。如果在RRC连接建立过程中传输了GSM等级2和3能力,RNC需要存储UE的GSM域加密能力(参见步骤607)。In step 601, the UE will send the value of the parameter START stored on the SIM card and the "UE security capability" information to the RNC during the process of establishing the RRC connection. It is also possible to transmit GSM class 2 and 3 capabilities in the above steps if the UE has this capability. The security capability information of the UE includes various encryption algorithms UEA and integrity protection algorithms UIA that the UE can support. The START value and the security capability information of the UE are stored in the serving RNC (hereinafter referred to as SRNC). If the GSM level 2 and 3 capabilities are transmitted during the RRC connection establishment process, the RNC needs to store the UE's GSM domain encryption capabilities (see step 607).
在步骤602,UE并且通过初始的第三层消息给VLR/SGSN。所述的第三层消息包括“连接管理服务请求(CM_SERVICE_REQUEST)、位置更新请求(LOCATION UPDATE REQUEST)、路由区域更新请求(ROUTING AREA UPDATE REQUEST)、附着网络请求(ATTAHREQUEST)、寻呼响应(PAGING RESPONSE)等类型。它包括了用户身份识别信息和密钥组识别(以下简称KSI)信息。其中的KSI是指上一次在CS域或者PS域内认证时,由这个域所分配的对CK/IK组的标识。In step 602, the UE also sends an initial Layer 3 message to the VLR/SGSN. The third layer message includes "connection management service request (CM_SERVICE_REQUEST), location update request (LOCATION UPDATE REQUEST), routing area update request (ROUTING AREA UPDATE REQUEST), attachment network request (ATTAHREQUEST), paging response (PAGING RESPONSE ) and other types. It includes user identification information and key group identification (hereinafter referred to as KSI) information. KSI refers to the CK/IK group assigned by this domain when it was last authenticated in the CS domain or PS domain logo.
在步骤603,如果需要,网络内部以及网络和UE之间一定的交互操作,来确认用户的身份标识IMSI。根据IK能够允许的最大限制值,可能会存在AKA过程来认证用户并产生新的密匙IK和CK。同时,网络会给这个IK/CK组分配一个KSI标识。AKA的过程在图4中有描述。In step 603, if necessary, certain interactive operations within the network and between the network and the UE are performed to confirm the user's identity IMSI. According to the maximum limit value that IK can allow, there may be an AKA process to authenticate the user and generate new keys IK and CK. At the same time, the network will assign a KSI identifier to the IK/CK group. The process of AKA is depicted in Figure 4.
在步骤604,SGSN决定允许使用的各种UIA和UEA算法,并按照优先级排队。In step 604, the SGSN decides the various UIA and UEA algorithms that are allowed to be used, and queues them according to the priority.
在步骤605,SGSN通过发送RANAP消息“安全模式命令(Security_mode_command)”到RNC发起完整性保护和加密操作。“安全模式命令”消息携带的参数包括按照优先级排列的许可RNC使用的各种UIA列表和将要使用的IK。如果以后的通信要加密,那么上述消息中还包括包括按照优先级排列的各种UEA列表和将要使用的CK。如果之前进行了新的AKA过程,那么发给RNC的消息应该指示这一点。这个指示就意味着在使用新密匙时,START值将被复位成0。否则的话,RNC将使用步骤601中所得到的START值。In step 605, the SGSN initiates integrity protection and encryption operations by sending a RANAP message "Security_mode_command" to the RNC. The parameters carried in the "Security Mode Command" message include various UIA lists that are permitted to be used by the RNC and the IK to be used, arranged according to priority. If the subsequent communication is to be encrypted, the above message also includes various UEA lists arranged according to priority and the CK to be used. If a new AKA procedure was previously performed, the message to the RNC should indicate this. This indication means that when using a new key, the START value will be reset to 0. Otherwise, RNC will use the START value obtained in step 601.
在步骤606,RNC收到“安全模式命令Security_mode_command”消息后比较UE支持的UIA/UEA和其许可使用的UIA/UEA,在UE支持的算法列表中,选用最高优先级的UIA/UEA算法,并生成随机值FRESH,开始启动下行链路完整性保护。如果所收到的“安全模式命令Security_mode_command”消息中的需求不能被满足,那么RNC向SGSN发送“安全模式拒绝SECURITY MODE REJECT”消息。In step 606, after receiving the "Security mode command Security_mode_command" message, the RNC compares the UIA/UEA supported by the UE with the UIA/UEA allowed to be used by it, selects the UIA/UEA algorithm with the highest priority in the algorithm list supported by the UE, and Generate a random value FRESH and start downlink integrity protection. If the requirements in the received "Security_mode_command" message cannot be met, then the RNC sends a "SECURITY MODE REJECT" message to the SGSN.
在步骤607,RNC产生“安全模式命令Security_mode_command”消息。所属的消息中包括了UE的安全能力、可选的GSM加密能力(如果RNC在步骤601中收到此信息)、所要使用的UIA和FRESH参数以及如果使用加密的话那么所需要UEA。其它信息(如开始加密标志)也可能包含在内。由于UE能同时拥有CS域和PS域的两套加密和完整性保护密匙组,因此网络必须要加一个CN域指示,来表明要使用的是CS域还是PS域的密匙组。在发送消息之前,RNC产生用于完整性保护的消息识别码MAC-I,并把它附着到消息中。In step 607, the RNC generates a "Security Mode Command Security_mode_command" message. The associated message includes the UE's security capabilities, optional GSM encryption capabilities (if the RNC receives this information in step 601), the UIA and FRESH parameters to be used, and the required UEA if encryption is used. Other information (such as a flag to start encryption) may also be included. Since the UE can have two encryption and integrity protection key sets of the CS domain and the PS domain at the same time, the network must add a CN domain indication to indicate whether the key set of the CS domain or the PS domain is to be used. Before sending a message, RNC generates a message identification code MAC-I for integrity protection and attaches it to the message.
在步骤608,在接收到RNC发出的Security_mode_command(安全模式命令)消息后,UE首先确认此消息中的“UE的安全能力”同步骤601中的“UE的安全能力”一致。同样,如果在步骤601中包括了GSM等级能力,那么也要同样对其进行验证。UE根据在接收的Security_mode_command消息中的参数,使用指示的UIA、存储的START和接收的FRESH参数,计算XMAC-I,通过比较接收的MAC-I和生成的XMAC-I,验证完整性保护是否成功。In step 608, after receiving the Security_mode_command (security mode command) message sent by the RNC, the UE first confirms that the "UE security capability" in the message is consistent with the "UE security capability" in step 601 . Likewise, if GSM class capability is included in step 601, it is also verified. UE calculates XMAC-I according to the parameters in the received Security_mode_command message, using the indicated UIA, stored START and received FRESH parameters, and verifies whether the integrity protection is successful by comparing the received MAC-I with the generated XMAC-I .
在步骤609,如果成功实施完整性保护,UE将生成MAC-I,向RNC发出包含MAC-I的Security_mode_complete。如果没有成功实施完整性保护,那么在UE就结束本过程。In step 609, if the integrity protection is implemented successfully, the UE will generate a MAC-I, and send Security_mode_complete including the MAC-I to the RNC. If the integrity protection is not implemented successfully, the procedure ends at the UE.
在步骤610,一旦接收到响应消息“安全模式完成(Security_mode_complete)”,SRNC计算消息的XMAC-I。SRNC通过比较接收的MAC-I和生成的XMAC-I,验证完整性保护是否成功。In step 610, upon receiving the response message "Security_mode_complete", the SRNC calculates the XMAC-I of the message. The SRNC verifies whether the integrity protection is successful by comparing the received MAC-I with the generated XMAC-I.
在步骤611,如果验证成功,RNC向SGSN发送包括被选择的算法的RANAP消息Security_mode_complete,从而结束本地认证过程。In step 611, if the verification is successful, the RNC sends a RANAP message Security_mode_complete including the selected algorithm to the SGSN, thereby ending the local authentication process.
发往UE的“安全模式命令Security_mode_command”消息开始了下行的完整性保护,也就是说,这条消息和以后的发往UE的下行消息都使用新的完整性保护配置进行保护。从UE发出的“安全模式完成Security_mode_complete”消息开始了上行的完整性保护,也就是说这条消息和以后的来自UE的上行消息都使用新的完整性保护配置进行保护。当需要使用加密时,RNC和UE之间在安全模式建立过程中交换加密开始时间。这个加密开始时间就设定了使用新的加密配置开始下行加密和上行加密的RLC序列号或者CFN序列号。The "Security_mode_command" message sent to the UE starts downlink integrity protection, that is to say, this message and subsequent downlink messages sent to the UE are protected using the new integrity protection configuration. The "Security_mode_complete" message sent by the UE starts the uplink integrity protection, that is to say, this message and subsequent uplink messages from the UE are protected with the new integrity protection configuration. When encryption is required, the encryption start time is exchanged between the RNC and the UE during the establishment of the security mode. The encryption start time sets the RLC sequence number or CFN sequence number for starting downlink encryption and uplink encryption using the new encryption configuration.
在UMTS系统中,当某个UE在随机接入信道上对另一个移动台或固定网用户发起呼叫时,PLMN系统网络将开始一系列的操作。首先,UE发起呼叫时,UE中的无线资源管理RRC单元通过随机接入进程启动信令链路的建立。该进程在随机接入信道上发送信道请求消息及安全能力消息通过NodeB给RNC。若RNC成功接收到,则这个请求被送到RNC中的无线资源管理RRC单元,由其分配一个专用信道,并在接入允许信道上发送立即指配消息。UE在启动主呼进程的同时还设置定时器,以一定的时间间隔重复呼叫。如果按预定次数重复呼叫仍收不到响应,则放弃这次呼叫。In the UMTS system, when a certain UE initiates a call to another mobile station or fixed network user on a random access channel, the PLMN system network will start a series of operations. First, when the UE initiates a call, the radio resource management RRC unit in the UE initiates the establishment of a signaling link through a random access procedure. This process sends a channel request message and a security capability message to the RNC through the NodeB on the random access channel. If the RNC receives it successfully, the request is sent to the radio resource management RRC unit in the RNC, which allocates a dedicated channel and sends an immediate assignment message on the access permission channel. When the UE starts the calling process, it also sets a timer to repeat the call at a certain time interval. If no response is received after repeating the call a predetermined number of times, the call is abandoned.
当UE收到立即指配消息后转换到指定的专用信道上,从而和RNC之间建立起主信令链路。这之后一直到无线业务信道分配以前的一切信令都是在这个专用信道上进行的,业务信道接通后的通话过程中的信令则是在随路控制信道中进行。UE中的连接管理CM单元继续用发给数据链路层的业务请求消息来启动建立数据链路的进程。该业务请求实际上是被嵌入一个完整的步骤602中所述的第三层的“连接管理服务请求(CM_SERVICE_REQUEST)”消息,交RNC发给SGSN的。After receiving the immediate assignment message, the UE switches to the designated dedicated channel, thereby establishing a main signaling link with the RNC. After that, all the signaling until the allocation of the wireless service channel is carried out on this dedicated channel, and the signaling in the conversation process after the service channel is connected is carried out in the channel-associated control channel. The connection management CM unit in the UE continues to use the service request message sent to the data link layer to start the process of establishing the data link. The service request is actually embedded in a complete layer-3 "Connection Management Service Request (CM_SERVICE_REQUEST)" message described in step 602, and sent to the RNC to the SGSN.
然后,根据具体情况,经过UE和网络之间的相互身份认证之后,UE对接收到的消息进行完整性检验,其移动管理层MM同时监控完整性保护的启动。而SGSN收到来自RNC的“安全模式完成Security_mode_complete”消息,安全控制过程成功启动。如果需要加密,激活后的某个时间,UE和RNC就可以开始进行业务数据、信道标识、信令等的加密保护了。Then, according to specific circumstances, after mutual identity authentication between the UE and the network, the UE performs an integrity check on the received message, and its mobile management layer MM simultaneously monitors the start of the integrity protection. The SGSN receives the "Security_mode_complete" message from the RNC, and the security control process is successfully started. If encryption is required, UE and RNC can start encryption protection of service data, channel identification, signaling, etc. at a certain time after activation.
同理,移动台被呼过程也与此类似,在随机接入过程以后的安全流程和上述的过程一样。Similarly, the process of being called by the mobile station is similar, and the security process after the random access process is the same as the above process.
下面将描述现有技术问题需要改善的地方。The problems of the prior art that need to be improved will be described below.
现有的UMTS系统结构存在可升级性差,呼叫建立时间长,系统结构复杂等诸多缺点。目前,负责制定UMTS标准的第三代移动通信伙伴计划(3GPP)标准化组织正在进行UMTS系统的长期演化(以下简称LTE)的相关标准化工作,其中长期演化的目标之一就是加快呼叫建立过程,减少呼叫建立时间。针对UMTS系统的长期演化的各种目标,各个公司都提出了希望的长期演化后的系统结构,其中一种提出的长期演化后的系统结构如图7和图8所示。The existing UMTS system structure has many disadvantages such as poor upgradeability, long call setup time, and complex system structure. Currently, the 3rd Generation Partnership Project (3GPP) standardization organization responsible for formulating the UMTS standard is working on the long-term evolution (hereinafter referred to as LTE) related standardization work of the UMTS system. One of the goals of the long-term evolution is to speed up the call establishment process and reduce the Call setup time. Aiming at various goals of long-term evolution of the UMTS system, each company has proposed a desired system structure after long-term evolution, and one of the proposed system structures after long-term evolution is shown in FIG. 7 and FIG. 8 .
图7中演进的基站(以下称为ENB)集中了UMTS系统中基站和RNC的功能,主要负责无线信号的收发、与用户设备之间的信令连接、移动性管理等功能,而演进的GGSN(以下称为E-GGSN)则集中了UMTS系统中SGSN和GGSN的功能,主要负责移动性管理、与PDN网络的接口、业务质量的协商等。The evolved base station (hereinafter referred to as ENB) in Figure 7 integrates the functions of the base station and RNC in the UMTS system, and is mainly responsible for the functions of transmitting and receiving wireless signals, signaling connection with user equipment, and mobility management, while the evolved GGSN (hereinafter referred to as E-GGSN) integrates the functions of the SGSN and GGSN in the UMTS system, and is mainly responsible for mobility management, interface with the PDN network, and negotiation of service quality.
图8中的基站ENB跟UMTS中的基站功能差别不大,都是负责无线信号的接收与发送,还拥有部分MAC层的功能;锚点anchor与UMTS中的RNC功能类似,负责用户数据的加密解密、控制ENB中无线资源的分配、与用户设备之间的信令连接和处于连接状态时用户移动性的管理。E-GGSN的功能则融合了UMTS系统中的SGSN和GGSN的功能,主要负责移动性管理、与PDN网络的接口、业务质量的协商等。The base station ENB in Figure 8 is not much different from the base station in UMTS. Both are responsible for receiving and sending wireless signals, and also have some MAC layer functions; the anchor point anchor is similar to the RNC in UMTS, and is responsible for encrypting user data. Decryption, control allocation of radio resources in ENB, signaling connection with user equipment and management of user mobility in connected state. The functions of the E-GGSN integrate the functions of the SGSN and GGSN in the UMTS system, and are mainly responsible for mobility management, interface with the PDN network, and negotiation of service quality.
为简化起见,在下面的对本发明的描述中,将不局限于某一种体系结构。而将图7中的ENB及图8中的ENB和锚点anchor称为E-RAN,而将E-GGSN称为E-CN。For the sake of simplicity, in the following description of the present invention, it will not be limited to a certain architecture. The ENB in FIG. 7 and the ENB and the anchor point anchor in FIG. 8 are called E-RAN, and the E-GGSN is called E-CN.
从连接建立的过程上来看,通常用户在键入对方号码、按下通话键后,总是希望能够尽快的建立起这个呼叫。而根据前面的介绍,UE和RRC之间建立起主信令链路之后、需要进行UE和网络之间的相互身份认证,之后才能继续这个呼叫;而其中的UE和网络之间的相互身份认证过程就会花费很多时间。因此,仅仅从系统组成上进行简化还不足以满足LTE提出的足够短的连接建立时间的要求。From the point of view of the connection establishment process, usually the user always hopes to establish the call as soon as possible after typing in the other party's number and pressing the call button. According to the previous introduction, after the main signaling link is established between the UE and the RRC, mutual identity authentication between the UE and the network is required before the call can continue; and the mutual identity authentication between the UE and the network The process will take a lot of time. Therefore, simply simplifying the system composition is not enough to meet the short enough connection establishment time requirement proposed by LTE.
发明内容Contents of the invention
本发明为了降低呼叫建立时间,加速用户的业务接入过程,提出了一种新的耗时较短的UE和网络间的彼此认证机制的方法,从而加快呼叫建立的过程。In order to reduce the call establishment time and speed up the user's service access process, the present invention proposes a new method of mutual authentication mechanism between the UE and the network that consumes less time, thereby speeding up the call establishment process.
为了实现上述目的,根据本发明,提出了一种无线通信系统中在用户终端设备和网络之间进行认证的方法,所述方法包括以下步骤:UE向网络传送认证请求消息,所述认证请求消息包括认证参考值;网络判断其自身所产生的认证值是否与认证参考值一致,如果一致,则表示网络侧认证成功并向UE发送认证响应消息,所述认证响应消息包含另一认证参考值;以及UE接收从网络传送来的所述认证响应消息,并验证所述认证响应消息中所包含的所述另一认证参考值是否与其自身所产生的认证值一致,如果一致,则用户终端设备侧认证成功。In order to achieve the above object, according to the present invention, a method for authenticating between a user terminal device and a network in a wireless communication system is proposed, the method includes the following steps: UE transmits an authentication request message to the network, and the authentication request message Including an authentication reference value; the network judges whether the authentication value generated by itself is consistent with the authentication reference value, and if it is consistent, it means that the network side authentication is successful and sends an authentication response message to the UE, and the authentication response message contains another authentication reference value; and the UE receives the authentication response message transmitted from the network, and verifies whether the other authentication reference value contained in the authentication response message is consistent with the authentication value generated by itself, and if it is consistent, the user terminal equipment side Authentication succeeded.
优选地,所述认证请求消息包含UE所采用的加密算法、完整性保护算法和认证用参数信息。Preferably, the authentication request message includes an encryption algorithm, an integrity protection algorithm and authentication parameter information adopted by the UE.
优选地,所述网络自身所产生的认证值是根据所述加密算法、完整性保护算法、认证用参数信息、以及网络所产生的密钥信息来产生的。Preferably, the authentication value generated by the network itself is generated according to the encryption algorithm, integrity protection algorithm, parameter information for authentication, and key information generated by the network.
优选地,所述UE自身所产生的认证值是根据UE自身所保存的所述加密算法、完整性保护算法、认证用参数信息、以及密钥信息来产生的。Preferably, the authentication value generated by the UE itself is generated according to the encryption algorithm, integrity protection algorithm, authentication parameter information, and key information stored in the UE itself.
优选地,所述认证用参数信息包括FRESH随机数和START值。Preferably, the authentication parameter information includes a FRESH random number and a START value.
优选地,所述网络所产生的密钥信息包括加密密钥信息和完整性保护密钥信息。Preferably, the key information generated by the network includes encryption key information and integrity protection key information.
优选地,所述加密密钥信息和完整性保护密钥信息是由网络中的核心网实体部分所产生的。Preferably, said encryption key information and integrity protection key information are generated by a core network entity in the network.
优选地,UE向网络传送的认证请求消息所包含的加密算法和完整性保护算法是从网络所提供的多个加密算法和完整性保护算法所选的、所述UE所能支持的加密算法和完整性保护算法。Preferably, the encryption algorithm and integrity protection algorithm contained in the authentication request message transmitted by the UE to the network are selected from multiple encryption algorithms and integrity protection algorithms provided by the network, and the encryption algorithm and integrity protection algorithm that the UE can support Integrity protection algorithm.
优选地,所述随机数FRESH是由网络广播的。Preferably, the random number FRESH is broadcast by the network.
优选地,所述随机数FRESH是由UE自身所固有的。Preferably, the random number FRESH is inherent in the UE itself.
优选地,所述随机数FRESH是可更新的。Preferably, the random number FRESH is updatable.
附图说明Description of drawings
通过参考以下结合附图对所采用的优选实施例的详细描述,本发明的上述目的、优点和特征将变得显而易见,其中:The above objects, advantages and features of the present invention will become apparent by referring to the following detailed description of preferred embodiments employed in conjunction with the accompanying drawings, wherein:
图1是示出了UMTS的网络结构的图;FIG. 1 is a diagram showing a network structure of UMTS;
图2是用于解释UMTS系统中不同区域之间的关系的图;Figure 2 is a diagram for explaining the relationship between different regions in the UMTS system;
图3是示出了UE的组成结构图;FIG. 3 is a structural diagram showing the composition of UE;
图4是示出了临时标识分配过程的图;Fig. 4 is a diagram showing a temporary identification allocation process;
图5是示出了AKA过程的图;Figure 5 is a diagram showing the AKA process;
图6是示出了本地认证和连接建立过程的图;Figure 6 is a diagram illustrating a local authentication and connection establishment process;
图7是示出了E-UTMS的一种体系结构的图;FIG. 7 is a diagram showing a kind of architecture of E-UTMS;
图8是示出了E-UTMS的另一种体系结构的图;FIG. 8 is a diagram showing another architecture of E-UTMS;
图9是示出了根据本发明的网络和设备之间进行相互认证的过程的图;FIG. 9 is a diagram illustrating a process of mutual authentication between a network and a device according to the present invention;
图10是用于解释MAC-I计算及验证的图;FIG. 10 is a diagram for explaining MAC-I calculation and verification;
图11是示出了根据本发明第一实施例的网络和设备之间进行相互认证的过程的图;FIG. 11 is a diagram illustrating a process of mutual authentication between a network and a device according to a first embodiment of the present invention;
图12是示出了根据本发明第二实施例的网络和设备之间进行相互认证的过程的图;FIG. 12 is a diagram showing a process of mutual authentication between a network and a device according to a second embodiment of the present invention;
图13是示出了根据本发明实施例的消息转发方式的图;Fig. 13 is a diagram showing a message forwarding manner according to an embodiment of the present invention;
图14是示出了根据本发明实施例的相互认证过程中、UE的操作的流程图;FIG. 14 is a flow chart illustrating the operation of the UE in a mutual authentication process according to an embodiment of the present invention;
图15是示出了根据本发明实施例的相互认证过程中、E-RAN的节点的操作的流程图;FIG. 15 is a flowchart illustrating the operation of a node of the E-RAN during a mutual authentication process according to an embodiment of the present invention;
图16是示出了根据本发明实施例的相互认证过程中、E-CN的节点的操作的流程图;以及16 is a flowchart showing the operation of the nodes of the E-CN during the mutual authentication process according to an embodiment of the present invention; and
图17是用于解释鉴权矢量组生成的图。Fig. 17 is a diagram for explaining authentication vector set generation.
具体实施方式Detailed ways
首先,需要注意的是,本发明可以图7或图8的体系结构为基础,但并不仅局限于这两种体系结构。First of all, it should be noted that the present invention can be based on the architecture of FIG. 7 or FIG. 8 , but is not limited to these two architectures.
下面将参考附图来详细描述根据本发明的优选实施例。Preferred embodiments according to the present invention will be described in detail below with reference to the accompanying drawings.
图9是示出了根据本发明的网络和设备之间进行相互认证的过程的图。FIG. 9 is a diagram showing a process of mutual authentication between a network and a device according to the present invention.
如以上参考图6所述,用户设备与网络进行通信时,首先要发送消息给网络,这条消息在UMTS系统中可以是业务请求,路由区域更新等。本发明并不限制第一条发送的消息内容。在第一条消息中,UE要根据已有的参数,按照图10中描述的方法计算MAC-I及验证MAC-I。计算MAC-I的参数分别是IK,COUNT-I,MESSAGE,DIRECTION和FRESH。As mentioned above with reference to FIG. 6 , when the user equipment communicates with the network, it first needs to send a message to the network. In the UMTS system, this message may be a service request, a routing area update, and the like. The present invention does not limit the content of the first sent message. In the first message, UE shall calculate MAC-I and verify MAC-I according to the method described in Fig. 10 according to the existing parameters. The parameters for calculating MAC-I are IK, COUNT-I, MESSAGE, DIRECTION and FRESH respectively.
在特定情况下,比如用户设备在同一个地方进行周期性的路由区域更新,用户设备在与网络进行通信时,有可能两次过程会发送内容完全相同的消息。同时,也有可能某些非法的用户会窃听到一个正常进行通信的用户设备向网络所发送的消息内容,然后在合适的时候伪装成这个合法用户再次向网络发送包含这个内容的消息。这时候,网络就需要能够区分出所收到的消息是来自合法的用户还是伪装的用户。所述的FRESH参数就是为了达到这个目的。当用于计算MAC-I时的其余IK、COUNT-I、MESSAGE和DIRECTION等参数完全相同时,两次计算过程采用不同的FRESH参数也能够产生不同的MAC-I。这时候,只有真正合法的用户设备才知道IK,进而可以计算出新的MAC-I。In a specific situation, such as a user equipment performing periodic routing area update at the same place, when the user equipment communicates with the network, it is possible that two processes will send messages with exactly the same content. At the same time, it is also possible that some illegal users may eavesdrop on the content of a message sent by a normally communicating user equipment to the network, and then pretend to be the legitimate user at an appropriate time to send a message containing this content to the network again. At this time, the network needs to be able to distinguish whether the received message is from a legitimate user or a disguised user. The FRESH parameter described is for this purpose. When other parameters such as IK, COUNT-I, MESSAGE, and DIRECTION used to calculate MAC-I are completely the same, different FRESH parameters can also be used to generate different MAC-I in the two calculation processes. At this time, only the real legal user equipment knows the IK, and then can calculate a new MAC-I.
IK是在鉴权过程中产生的,具体可以参见图6的描述。因为用户设备有可能保存多个IK,那么在用户设备发给网络的第一条消息中,UE要告诉网络它用来加密和完整性保护的IK和CK是哪个。IK和CK是用一个序列号来表示的,这个序列号唯一标识一个IK和CK的组合。当E-CN收到这个序列号之后就知道用户设备用的是哪个IK和CK了。IK is generated during the authentication process, for details, please refer to the description in FIG. 6 . Because the user equipment may store multiple IKs, in the first message sent by the user equipment to the network, the UE must tell the network which IK and CK it uses for encryption and integrity protection. IK and CK are represented by a serial number, which uniquely identifies a combination of IK and CK. When the E-CN receives the serial number, it knows which IK and CK the user equipment uses.
COUNT-I是UE自己保存的一个参数。这个值是在用户设备开始与网络进行通信时,由一个START进行初始化的。START是一个UE自己保存的参数,这个参数在每次用户返回空闲状态的时候都要更新一下,更新的值是与当时的COUNT-I或者COUNT-C的最高20位一致,然后在这个值的基础上加2。COUNT-I is a parameter saved by the UE itself. This value is initialized by a START when the UE starts communicating with the network. START is a parameter saved by the UE itself. This parameter must be updated every time the user returns to the idle state. The updated value is consistent with the highest 20 digits of COUNT-I or COUNT-C at that time, and then in this value Add 2 to the base.
MESSAGE就是要进行完整性保护的消息本身。MESSAGE is the message itself to be integrity protected.
DIRECTION标识该消息的方向,是由用户设备发给网络的的上行消息还是由网络发给用户设备的下行消息。DIRECTION identifies the direction of the message, whether it is an uplink message sent by the user equipment to the network or a downlink message sent by the network to the user equipment.
FRESH这个值的获得是本发明的内容之一,会在下面描述。Obtaining the value of FRESH is one of the contents of the present invention, which will be described below.
这个五个参数输入到算法f9当中,就会计算出MAC-I。These five parameters are input into the algorithm f9, and the MAC-I will be calculated.
当接收端收到MAC-I之后,按照图10右边的算法和输入参数,算出XMAC-I。然后将收到的MAC-I与计算出的XMAC-I进行比较。如果两者相等,那么就可以认为发送端是合法的用户终端或者网络设备。After receiving MAC-I, the receiving end calculates XMAC-I according to the algorithm and input parameters on the right side of Figure 10. The received MAC-I is then compared with the calculated XMAC-I. If the two are equal, then it can be considered that the sending end is a legal user terminal or network device.
然后用户设备将给网络发送的第一条消息封装好,里面要包含MAC-I(步骤902)。当无线接入网收到这条消息后,会保存MAC-I,并将这第一条消息进行必要的处理。例如,在步骤903,将MAC-I从消息中抽取出来,将剩下的内容转发给E-CN。或者将用户设备发送的消息利用Iu+接口的消息进行封装,发送给E-CN。当E-CN收到这第一条消息之后,查看该用户设备是否有合法的标识如P-TMSI,所用的进行完整性保护的IK和加密的CK序列是哪个。然后E-CN给无线接入网络发送安全模式命令(步骤904),该消息中包含要进行加密的密钥CK和进行完整性包含的IK,及加密算法,完整性包含算法。该消息还可能有其他功能如用户平面建立、服务质量协商等,但这些因为与本发明没有关系,在此不赘述。RAN收到进行完整性保护的IK后,将从用户设备收到的MAC-I1按照图10中的过程进行验证(步骤905)。如果验证通过,RAN再产生一个MAC-I2(步骤906),这个值的产生方式与用户设备产生MAC-I的方法是一样的,输入5个参数到f9算法之后,就可以得到该结果。然后RAN将MAC-I包含在要发给用户设备的消息安全模式命令中(步骤907),该消息还有包括加密算法,完整性包含算法等参数。如果在步骤904,消息还进行服务质量协商,用户平面建立等功能,那么在步骤907,也应该有类似用户无线承载建立的功能。当用户设备收到安全模式命令后,将其他中的MAC-I取出,然后利用图10中的算法,查看这个MAC-I是否没有经过任何修改(步骤908)。若是,则表明这个RAN是可以相信的,是合法的网络设备。Then the user equipment encapsulates the first message sent to the network, which will include MAC-I (step 902). After receiving this message, the radio access network will save the MAC-I, and perform necessary processing on the first message. For example, in step 903, the MAC-I is extracted from the message, and the remaining content is forwarded to the E-CN. Alternatively, the message sent by the user equipment is encapsulated with the message of the Iu+ interface, and sent to the E-CN. After receiving the first message, the E-CN checks whether the user equipment has a legal identifier such as P-TMSI, which is the IK used for integrity protection and the encrypted CK sequence. Then the E-CN sends a security mode command to the wireless access network (step 904), the message includes the key CK to be encrypted, the IK for integrity inclusion, and the encryption algorithm and the integrity inclusion algorithm. The message may also have other functions such as user plane establishment, service quality negotiation, etc., but these are not related to the present invention, so they will not be described here. After receiving the IK for integrity protection, the RAN verifies the MAC-I1 received from the user equipment according to the process in Figure 10 (step 905). If the verification is passed, the RAN generates a MAC-I2 again (step 906). The generation method of this value is the same as that of the user equipment to generate the MAC-I. After inputting 5 parameters into the f9 algorithm, the result can be obtained. Then the RAN includes the MAC-I in the message security mode command to be sent to the user equipment (step 907), and the message also includes parameters such as an encryption algorithm and an integrity algorithm. If in step 904, the message also performs functions such as service quality negotiation and user plane establishment, then in step 907, there should also be a function similar to user radio bearer establishment. After the user equipment receives the security mode command, it takes out the MAC-I in the others, and then uses the algorithm in Figure 10 to check whether the MAC-I has not been modified (step 908). If yes, it means that the RAN is trustworthy and is a legitimate network device.
下面将描述根据本发明的第一实施例和第二实施例。A first embodiment and a second embodiment according to the present invention will be described below.
在本发明中,FRESH参数的获得可以通过不同的实施例体现出来。In the present invention, the FRESH parameters can be obtained through different embodiments.
图11是示出了根据本发明第一实施例的网络和设备之间进行相互认证的过程的图。FIG. 11 is a diagram showing a process of mutual authentication between a network and a device according to the first embodiment of the present invention.
E-CN(也就是核心网实体)确定本网络要用的加密算法和完整性保护算法,这可以是一个或多个。如果是多个,那么根据给出的顺序的不同,代表优先级的不同。例如E-CN想让用户设备在有能力的前提下优先使用算法1,次之选择算法2,再次之选择算法3,那么在步骤1101的消息安全模式广播中,会包含算法1,算法2和算法3。当E-RAN收到该广播消息后,就在其所有小区中广播这些算法及其优先级(步骤1102)。在安全模式广播消息中,不但包含网络让用户设备选择的加密算法和完整性包含算法,还包括网络想让用户设备使用的FRESH值,该参数的使用在图10中的描述中有很好的说明。当用户设备收到这些参数之后,就保存他们,以便在跟网络进行通信时使用。The E-CN (that is, the core network entity) determines the encryption algorithm and the integrity protection algorithm to be used by the network, which may be one or more. If there are more than one, then according to the order given, it represents different priorities. For example, E-CN wants the user equipment to use Algorithm 1 first, Algorithm 2 next, and Algorithm 3 again if it has the ability. Then in the message security mode broadcast in step 1101, Algorithm 1, Algorithm 2 and Algorithm 2 will be included. Algorithm 3. After E-RAN receives the broadcast message, it broadcasts these algorithms and their priorities in all its cells (step 1102). In the security mode broadcast message, it not only includes the encryption algorithm and integrity inclusion algorithm that the network allows the user equipment to select, but also includes the FRESH value that the network wants the user equipment to use. The use of this parameter is well described in the description in Figure 10. illustrate. After the user equipment receives these parameters, it saves them for use when communicating with the network.
当用户设备想与网络进行通信时,它发出第一条消息给E-RAN(步骤1103),该消息中包含它所要使用的加密密钥和完整性保护密钥的序列号,通过图10的步骤所计算出的MAC-I,以及它选择的加密算法和完整性保护算法,用户标识等参数。当E-RAN收到从用户设备处接收到的第一条消息后,就保存MAC-I,加密算法和完整性保护算法,将消息的其他部分或者消息的全部转发给E-CN(步骤1104)。这个过程在图13的时候会详细讲述。当E-CN收到从用户设备发送的第一条消息后,查看用户选择的加密算法和完整性保护算法是否合法。通过查看KSI,知道用户设备进行加密或者完整性保护所使用的密钥分别是什么。该消息中一般还包括用户的标识如P-TMSI等参数。当E-CN知道该用户设备是合法用户后,向E-RAN发送安全模式命令消息(步骤1105),该消息中包括网络想让用户设备和E-RAN进行加密和完整性保护使用的算法。该算法可以和用户设备自己在步骤1103中选择的是一样的。如果该参数不包含在该步骤1105所传送的消息中,那么E-RAN和用户设备都默认用户设备所选择的加密算法和完整性保护算法可以使用,否则就使用网络所重新配置的加密算法和完整性保护算法。步骤1105所传送的消息中还包含加密密钥CK和完整性包含密钥IK,这两个参数传给E-RAN,从而使得E-RAN对下行信令和数据可以进行完整性保护和加密操作。When the user equipment wants to communicate with the network, it sends the first message to the E-RAN (step 1103), which contains the serial number of the encryption key and the integrity protection key it will use, through Fig. 10 The MAC-I calculated in the step, as well as parameters such as the encryption algorithm and the integrity protection algorithm selected by it, and the user identification. After E-RAN receives the first message that receives from user equipment place, just preserve MAC-I, encryption algorithm and integrity protection algorithm, other parts of message or all of message are forwarded to E-CN (step 1104 ). This process will be described in detail in Figure 13. When the E-CN receives the first message sent from the user equipment, it checks whether the encryption algorithm and integrity protection algorithm selected by the user are legal. By checking the KSI, it is possible to know what keys are used by the user equipment for encryption or integrity protection. Generally, the message also includes parameters such as user identification such as P-TMSI. When E-CN knows that the user equipment is a legitimate user, it sends a security mode command message to E-RAN (step 1105), which includes the algorithm that the network wants the user equipment and E-RAN to use for encryption and integrity protection. The algorithm may be the same as that selected by the user equipment itself in step 1103 . If this parameter is not included in the message transmitted in step 1105, both the E-RAN and the user equipment default that the encryption algorithm and integrity protection algorithm selected by the user equipment can be used, otherwise the encryption algorithm and integrity protection algorithm reconfigured by the network will be used. Integrity protection algorithm. The message transmitted in step 1105 also includes the encryption key CK and the integrity key IK, and these two parameters are passed to the E-RAN, so that the E-RAN can perform integrity protection and encryption operations on the downlink signaling and data .
当E-RAN收到安全模式命令后(步骤1105),通过网络传送的IK,及用户设备在步骤1103所传送的消息中包括的完整性保护算法,对在步骤1103中收到的MAC-I按照图10中的操作方法,验证该MAC-I是否正确。如果正确,说明该用户设备是一个合法的UE,否则就是不合法的。如果该用户设备合法,E-RAN就向用户设备发送安全模式命令消息(步骤1106),该消息中包含网络想要重新配置的加密算法和完整性保护算法,如果在步骤1105,没有包含加密算法和完整性包含算法,那么在步骤1106所传送的消息中也不包含加密算法和完整性包含算法。同时E-RAN计算一个MAC-I,将其包含在安全模式命令中,发送给UE。MAC-I用的完整性保护算法应该是步骤1105中所涉及的算法,否则就是用户设备在步骤1103中告知E-RAN的。When the E-RAN receives the security mode command (step 1105), the IK transmitted through the network and the integrity protection algorithm included in the message transmitted by the user equipment in step 1103 are used for the MAC-I received in step 1103. According to the operation method in Figure 10, verify whether the MAC-I is correct. If it is correct, it means that the user equipment is a legitimate UE, otherwise it is illegal. If the user equipment is legal, the E-RAN sends a security mode command message to the user equipment (step 1106), which contains the encryption algorithm and the integrity protection algorithm that the network wants to reconfigure, if in step 1105, the encryption algorithm is not included and the integrity inclusion algorithm, then the message transmitted in step 1106 also does not include the encryption algorithm and the integrity inclusion algorithm. At the same time, the E-RAN calculates a MAC-I, includes it in the security mode command, and sends it to the UE. The integrity protection algorithm used by MAC-I should be the algorithm involved in step 1105, otherwise, it is the algorithm notified by the user equipment to the E-RAN in step 1103.
用户设备收到安全模式命令后,如果该消息中没有保护加密算法和完整性保护算法,就利用用户自己选择的完整性保护算法根据图10的方法验证MAC-I是否正确。否则就按照该消息中包含的完整性保护算法进行验证。如果验证正确,那么就认为该网络是合法的,继续下面的操作。After the user equipment receives the security mode command, if there is no protection encryption algorithm and integrity protection algorithm in the message, it uses the integrity protection algorithm selected by the user to verify whether the MAC-I is correct according to the method shown in FIG. 10 . Otherwise, verify according to the integrity protection algorithm contained in the message. If the verification is correct, then the network is considered to be legal, and the following operations are continued.
本实施例的一个变形,网络可以不广播加密算法和完整性保护算法,而是由用户设备才自己的安全能力中选择一个,同样的在步骤1103里告知E-RAN。In a variation of this embodiment, the network may not broadcast the encryption algorithm and the integrity protection algorithm, but the user equipment selects one of its own security capabilities, and similarly informs the E-RAN in step 1103 .
图12是本发明的第二个实施例。Fig. 12 is a second embodiment of the present invention.
E-GGSN(也就是核心网实体)确定本网络要用的加密算法和完整性保护算法,这可以是一个或多个。如果是多个,那么根据给出的顺序的不同,代表优先级的不同。例如E-GGSN想让用户设备在有能力的前提下优先使用算法1,次之选择算法2,再次之选择算法3,那么在消息安全模式广播中(步骤1201),会包含算法1,算法2和算法3。当E-RAN收到该消息后,就在其所有小区中广播这些算法及其优先级(步骤1202)。在步骤1202所传送的安全模式广播消息中,包含网络让用户设备选择的加密算法和完整性包含算法。当用户设备收到这些参数之后,就保存他们,以便在跟网络进行通信时使用。The E-GGSN (that is, the core network entity) determines the encryption algorithm and the integrity protection algorithm to be used by the network, which may be one or more. If there are more than one, then according to the order given, it represents different priorities. For example, E-GGSN wants the user equipment to use Algorithm 1 first if it has the ability, then choose Algorithm 2, and choose Algorithm 3 again, then in the message security mode broadcast (step 1201), Algorithm 1 and Algorithm 2 will be included and Algorithm 3. After E-RAN receives the message, it broadcasts these algorithms and their priorities in all its cells (step 1202). The security mode broadcast message transmitted in step 1202 includes the encryption algorithm and the integrity algorithm selected by the network for the user equipment. After the user equipment receives these parameters, it saves them for use when communicating with the network.
当用户设备想与网络进行通信时,它发出第一条消息给E-RAN(步骤1203),该消息中包含它所要使用的加密密钥和完整性保护密钥的序列号,通过图10的步骤所计算出的MAC-I,以及它选择的加密算法和完整性保护算法,用户标识,用来产生MAC-I的FRESH值等参数。其中计算MAC-I时,所用到的FRESH值,可以是一个随机数,也可以是START加上一个随机数或者加一个固定的值。When the user equipment wants to communicate with the network, it sends the first message to the E-RAN (step 1203), which contains the serial number of the encryption key and the integrity protection key it will use, through Fig. 10 The MAC-I calculated in the step, as well as the encryption algorithm and integrity protection algorithm selected by it, the user ID, and parameters such as the FRESH value used to generate the MAC-I. When calculating the MAC-I, the FRESH value used may be a random number, or START plus a random number or a fixed value.
当E-RAN收到从用户设备处接收到的第一条消息后(步骤1203),就保存MAC-I,FRESH,加密算法和完整性保护算法,将消息的其他部分或者消息的全部转发给E-GGSN(步骤1203)。这个过程在图13的时候会详细讲述。当E-CN收到从用户设备发送的第一条消息后(步骤1204),查看用户选择的加密算法和完整性保护算法是否合法。通过查看KSI,知道用户设备进行加密或者完整性保护所使用的密钥分别是什么。在步骤1204所传送的该消息中一般还包括用户的标识如P-TMSI等参数。当E-CN知道该用户设备是合法用户后,向E-RAN发送安全模式命令消息(步骤1205),该消息中包括网络想让用户设备和E-RAN进行加密和完整性保护使用的算法。该算法可以和用户设备自己在步骤1203中选择的是一样的。如果该参数不包含在该步骤1205所传送的消息中,那么E-RAN和用户设备都默认用户设备所选择的加密算法和完整性保护算法可以使用,否则就使用网络所重新配置的加密算法和完整性保护算法。在步骤1205中所传送的消息中还包含加密密钥CK和完整性包含密钥IK,这两个参数传给E-RAN,从而使得E-RAN对下行信令和数据可以进行完整性保护和加密操作。When E-RAN receives the first message received from user equipment (step 1203), it saves MAC-I, FRESH, encryption algorithm and integrity protection algorithm, and forwards other parts of the message or all of the message to E-GGSN (step 1203). This process will be described in detail in Figure 13. After the E-CN receives the first message sent from the user equipment (step 1204), it checks whether the encryption algorithm and the integrity protection algorithm selected by the user are legal. By checking the KSI, it is possible to know what keys are used by the user equipment for encryption or integrity protection. The message transmitted in step 1204 generally also includes parameters such as user identification such as P-TMSI. When E-CN knows that the user equipment is a legitimate user, it sends a security mode command message to E-RAN (step 1205), which includes the algorithm that the network wants the user equipment and E-RAN to use for encryption and integrity protection. The algorithm may be the same as that selected by the user equipment itself in step 1203 . If this parameter is not included in the message transmitted in step 1205, both the E-RAN and the user equipment default that the encryption algorithm and integrity protection algorithm selected by the user equipment can be used, otherwise the encryption algorithm and integrity protection algorithm reconfigured by the network will be used. Integrity protection algorithm. The message transmitted in step 1205 also includes the encryption key CK and the integrity key IK. These two parameters are passed to the E-RAN, so that the E-RAN can perform integrity protection and integrity protection on the downlink signaling and data. cryptographic operations.
当E-RAN收到安全模式命令后(步骤1205),通过网络传送的IK,及用户设备在步骤1203中所涉及的完整性保护算法和FRESH值,就对在步骤1203中收到的MAC-I按照图10中的操作方法,验证该MAC-I是否正确。如果正确,说明该用户设备是一个合法的UE,否则就是不合法的。如果该用户设备合法,E-RAN就向用户设备发送安全模式命令消息(步骤1206),该消息中包含网络想要重新配置的加密算法和完整性保护算法,如果在步骤1205中,没有包含加密算法和完整性包含算法,那么在步骤1206中也不包含加密算法和完整性包含算法。同时E-RAN计算一个MAC-I,将其包含在安全模式命令中,发送给UE。MAC-I用的完整性保护算法应该是步骤1205中包含的算法,否则就是用户设备在步骤1203中告知E-RAN的。When the E-RAN receives the security mode command (step 1205), the IK transmitted through the network, and the integrity protection algorithm and the FRESH value involved in the user equipment in step 1203, are compared to the MAC- I verify whether the MAC-I is correct according to the operation method in Fig. 10. If it is correct, it means that the user equipment is a legitimate UE, otherwise it is illegal. If the user equipment is legal, the E-RAN sends a security mode command message to the user equipment (step 1206), which includes the encryption algorithm and the integrity protection algorithm that the network wants to reconfigure, if in step 1205, the encryption algorithm and the integrity protection algorithm are not included. Algorithm and Integrity Inclusion Algorithm, then in step 1206 the encryption algorithm and Integrity Inclusion Algorithm are also not included. At the same time, the E-RAN calculates a MAC-I, includes it in the security mode command, and sends it to the UE. The integrity protection algorithm used by MAC-I should be the algorithm included in step 1205, otherwise it is the algorithm notified by the user equipment to the E-RAN in step 1203.
用户设备收到安全模式命令后,如果该消息中没有保护加密算法和完整性保护算法,就利用用户自己选择的完整性保护算法根据图10的方法验证MAC-I是否正确。否则就按照该消息中包含的完整性保护算法进行验证。如果验证正确,那么就认为该网络是合法的,继续下面的操作。After the user equipment receives the security mode command, if there is no protection encryption algorithm and integrity protection algorithm in the message, it uses the integrity protection algorithm selected by the user to verify whether the MAC-I is correct according to the method shown in FIG. 10 . Otherwise, verify according to the integrity protection algorithm contained in the message. If the verification is correct, then the network is considered to be legal, and the following operations are continued.
该实施例的一个变通就是在步骤1206所传送的安全模式命令消息中可以携带一个新的FRESH值,并且在步骤1206所传送的这条消息是通过这个新的FRESH进行完整性保护的。然后用户设备收到在步骤1206所传送的安全模式命令后,用这条消息中包含的FRESH对其进行完整性检验。如果通过,则表示该网络是可信的。A modification of this embodiment is that a new FRESH value may be carried in the security mode command message transmitted in step 1206, and the integrity protection of the message transmitted in step 1206 is performed through the new FRESH. Then, after receiving the security mode command transmitted in step 1206, the user equipment uses the FRESH included in this message to check its integrity. If it passes, the network is trusted.
本实施例的一个变形,网络可以不广播加密算法和完整性保护算法,而是由用户设备才自己的安全能力中选择一个,同样的在步骤1203里告知E-RAN。In a modification of this embodiment, the network may not broadcast the encryption algorithm and the integrity protection algorithm, but the user equipment selects one of its own security capabilities, and similarly informs the E-RAN in step 1203 .
实际上用户设备和网络可以事先约定计算MAC-I时不使用FRESH参数。这时候,为了保证对相同内容的两次计算所产生的MAC-I不一样,可以使两次计算时所使用的COUN-I不一样。由于COUNT-I是由START进行初始化的,这也就是说使两次计算时所使用的START不一样。因此,作为本实施例的一个变形,网络可以在上一次通信过程中,给用户网络设备指定一个供下次使用的新的START值。这样,在下次通信过程中,用户网络设备使用这个指定的START值进行MAC-I计算。网络同样使用所保存的START值进行MAC-I计算。这时候,所述的START值可以在下次通信过程中由用户通信设备传给网络,或者由网络传给用户通信设备,也可以不进行传输。如果进行传输,接收方可以验证本次通信过程所使用的START值是否自己所保存的START值一样。In fact, the user equipment and the network may agree in advance not to use the FRESH parameter when calculating the MAC-I. At this time, in order to ensure that the MAC-I generated by the two calculations of the same content is different, the COUN-I used in the two calculations may be different. Since COUNT-I is initialized by START, this means that the START used in the two calculations is different. Therefore, as a modification of this embodiment, the network may assign a new START value to the user network device for next use during the last communication process. In this way, in the next communication process, the user network equipment uses the specified START value to perform MAC-I calculation. The network also uses the saved START value for MAC-I calculation. At this time, the START value may be transmitted from the user communication device to the network during the next communication process, or from the network to the user communication device, or may not be transmitted. If the transmission is performed, the receiver can verify whether the START value used in this communication process is the same as the START value saved by itself.
同样,作为本实施例的另一个变形,用户设备在每次通信过程中使用一个新的START值。这样,用户网络设备和网络使用这个START值进行MAC-I计算。这时候,所述的START值需要由用户通信设备传给网络。网络可以保存上次所使用的START值,从而验证本次通信过程所使用的START值是否和自己所保存的START值一样。Likewise, as another variant of this embodiment, the user equipment uses a new START value during each communication process. In this way, the user network equipment and the network use this START value to perform MAC-I calculation. At this time, the START value needs to be transmitted from the user communication device to the network. The network can save the START value used last time, so as to verify whether the START value used in this communication process is the same as the START value saved by itself.
图13描述了用户设备如何与网络进行信令交互的方法。Fig. 13 describes the method of how the user equipment performs signaling interaction with the network.
用户设备与E-RAN之间有一个专门的接口Uu+及针对该接口的相应消息名称。其中有的消息应该负责传递从用户设备到E-CN的信令,该信令可以称为L3信令。这与现在UMTS中的初始直接传输INITIAL DIRECTTRANSFER及上行直接传输UPLINK DIRECT TRANSFER及下行直接传输DOWNLINK DIRECT TRANSFER可以是类似的。L3的信令就包含在这些特殊的Uu+接口消息中。There is a dedicated interface Uu+ between the user equipment and the E-RAN and the corresponding message name for this interface. Some of the messages should be responsible for transmitting the signaling from the user equipment to the E-CN, which may be called L3 signaling. This may be similar to the initial direct transmission INITIAL DIRECTTRANSFER, the uplink direct transmission UPLINK DIRECT TRANSFER and the downlink direct transmission DOWNLINK DIRECT TRANSFER in the current UMTS. L3 signaling is included in these special Uu+ interface messages.
当E-RAN收到这类消息之后,就将其中的L3信令转发给E-CN或者转发给UE。E-RAN与E-CN之间的接口Iu+负责传递用户设备与E-CN之间信令的消息可以与UMTS中的初始UE消息INITIAL UE MESSAGE和直接传输DIRECT TRANSFER类似。L3的信令就包含在这些特殊的Iu+接口消息中。After receiving such messages, the E-RAN forwards the L3 signaling to the E-CN or to the UE. The interface Iu+ between the E-RAN and the E-CN is responsible for transferring the signaling messages between the user equipment and the E-CN, which may be similar to the initial UE message INITIAL UE MESSAGE and the direct transmission DIRECT TRANSFER in UMTS. L3 signaling is included in these special Iu+ interface messages.
图13的1301和1302就是通过这种机制传输用户设备与E-CN之间的信令的。UE发送1301UE与E-RAN之间的信令给E-RAN,该消息中除了包含L3信令之外,还包含UE让E-RAN处理的信息单元。同样地,E-RAN在收到该消息后,将L3信令转发给E-CN,E-RAN给E-GGSN发送1302E-RAN与E-CN之间的信令转发L3信令,该消息中不仅包含L3信令,还包含该E-RAN让E-GGSN进行处理的信息单元。1301 and 1302 in FIG. 13 transmit the signaling between the user equipment and the E-CN through this mechanism. The UE sends 1301 signaling between the UE and the E-RAN to the E-RAN, and the message not only includes the L3 signaling, but also includes information elements that the UE asks the E-RAN to process. Similarly, after receiving the message, the E-RAN forwards the L3 signaling to the E-CN, and the E-RAN sends 1302 the signaling between the E-RAN and the E-CN to the E-GGSN to forward the L3 signaling. Include not only the L3 signaling, but also the information unit for the E-RAN to be processed by the E-GGSN.
用户设备与E-CN进行信令交互还可以通过1311和1312这两步来进行。1311和1312这两个消息的名称可以一样,也可以不一样,但是这两个消息在UE与E-RAN之间的接口和E-RAN与E-CN之间的接口间要能一一对应起来。E-RAN可以将1311消息中的某些信息单元抽取出来,不传递给E-CN。也可以在此消息的基础上添加某些新的信息单元,然后通过1302发送给E-CN。The signaling interaction between the user equipment and the E-CN can also be performed through two steps 1311 and 1312 . The names of the two messages 1311 and 1312 can be the same or different, but the two messages must have a one-to-one correspondence between the interface between the UE and the E-RAN and the interface between the E-RAN and the E-CN stand up. The E-RAN can extract some information units in the 1311 message and not pass them to the E-CN. Some new information units can also be added on the basis of this message, and then sent to the E-CN through 1302 .
图14描述的是本发明的UE的动作行为。FIG. 14 describes the action behavior of the UE in the present invention.
用户设备收到广播消息中的安全模式广播消息(步骤1401),消息中保护网络让用户设备选择的加密算法和完整性保护算法及其优先级。用户设备保存这些信息,以便与网络进行交互的时候使用。如果广播消息中包含FRESH,那么用户设备也要保存该参数(步骤1402)。当用户设备要向网络发送第一条消息时,根据图10中描述的过程,计算要发送消息的MAC-I,将其包含在第一条消息中,发送给E-RAN(步骤1403)。该消息还要包括用户设备要使用的加密算法和完整性保护算法。UE收到网络发送的安全模式命令,取出其中的MAC-I,按照图10描述的方法进行验证(步骤1404)。如果验证成功,就继续后续操作。否则UE认为网络不合法,退出与网络的通信过程。The user equipment receives the security mode broadcast message in the broadcast message (step 1401), and the encryption algorithm and the integrity protection algorithm and their priorities selected by the protection network for the user equipment are included in the message. The user equipment saves this information for use when interacting with the network. If FRESH is included in the broadcast message, the user equipment also saves the parameter (step 1402). When the user equipment is going to send the first message to the network, according to the process described in Figure 10, calculate the MAC-I of the message to be sent, include it in the first message, and send it to the E-RAN (step 1403). The message also includes the encryption algorithm and the integrity protection algorithm to be used by the user equipment. The UE receives the security mode command sent by the network, takes out the MAC-I therein, and performs verification according to the method described in FIG. 10 (step 1404). If the verification is successful, continue with subsequent operations. Otherwise, the UE considers that the network is illegal and exits the communication process with the network.
图15描述的是本发明的E-RAN的动作行为。Figure 15 describes the actions of the E-RAN in the present invention.
E-RAN收到E-CN发送的要在其小区广播安全模式的消息“安全模式广播”(步骤1501),该消息中包括要广播的加密算法和完整性保护算法及各自的优先级。然后E-RAN在其控制的小区的系统信息广播中将加密算法和完整性保护算法及各自的优先级以小区广播的方式告知用户设备。如果对应于本发明的第一实施例(图11所述),E-RAN还需要广播FRESH参数。当E-RAN收到用户设备的第一条消息后(步骤1502),使用该消息中包含的完整性保护算法,及其他相关参数验证其中的MAC-I是否正确(步骤1503)。E-RAN要保存用户设备所选择的加密算法和完整性保护算法。如果在步骤1501中,E-RAN有广播FRESH值,那么在步骤1503进行检验MAC-I的时候使用的FRESH就是广播消息中的,否则该消息应该包含用户进行完整性保护所使用的FRESH。验证MAC-I的方法按照图10的描述进行(步骤1504)。如果验证通过,那么在步骤1505,E-RAN向E-CN转发从用户设备处收到的第一条消息。否则,就E-RAN就认为用户设备为非法用户,结束该过程。在步骤1506,当E-RAN收到从E-CN发送的安全模式命令后,如果其中保护加密算法或完整性保护算法,那么就覆盖用户设备所选择的算法,否则就使用用户设备所选择的算法。E-RAN向用户设备发送安全模式命令消息,该消息中携带E-RAN计算出的MAC-I,及E-CN更改的加密算法和完整性保护算法。The E-RAN receives the message "Safety Mode Broadcast" sent by the E-CN to broadcast the security mode in its cell (step 1501), the message includes the encryption algorithm and the integrity protection algorithm to be broadcast and their respective priorities. Then the E-RAN notifies the user equipment of the encryption algorithm, the integrity protection algorithm and their respective priorities in the cell broadcast in the system information broadcast of the cell under its control. If it corresponds to the first embodiment of the present invention (described in FIG. 11 ), the E-RAN also needs to broadcast the FRESH parameter. After the E-RAN receives the first message from the user equipment (step 1502), it uses the integrity protection algorithm contained in the message and other relevant parameters to verify whether the MAC-I is correct (step 1503). E-RAN shall save the encryption algorithm and integrity protection algorithm selected by the user equipment. If in
图16描述了本发明的E-CN的动作行为。Figure 16 describes the action behavior of the E-CN of the present invention.
E-CN向E-RAN发送安全模式广播消息,让E-RAN在其控制的小区中广播网络设定的加密算法和完整性保护算法及各自的优先级(步骤1601)。当E-CN收到从E-RAN转发的用户设备的第一条消息后(步骤1602),该消息保护UE选择的加密算法和完整性保护算法。E-CN查看该消息中用户设备的标识如P-TMSI是否标识一个合法用户(步骤1603)。如果是,那么就向E-RAN发送安全模式命令消息(步骤1604),该消息中包括用户设备的标识,及网络想让用户设备使用的加密算法和完整保护算法。如果E-CN不想改变用户选择的加密算法和完整性保护算法,那么该消息就不携带任何算法信息,最后,在步骤1605,操作结束。The E-CN sends a security mode broadcast message to the E-RAN, so that the E-RAN broadcasts the encryption algorithm and integrity protection algorithm set by the network and their respective priorities in the cells controlled by the E-RAN (step 1601). After the E-CN receives the first message of the user equipment forwarded from the E-RAN (step 1602), the message protects the encryption algorithm and the integrity protection algorithm selected by the UE. The E-CN checks whether the identification of the user equipment in the message, such as P-TMSI, identifies a legitimate user (step 1603). If yes, then send a security mode command message to E-RAN (step 1604), the message includes the identifier of the user equipment, and the encryption algorithm and integrity protection algorithm that the network wants the user equipment to use. If the E-CN does not want to change the encryption algorithm and integrity protection algorithm selected by the user, then the message does not carry any algorithm information, and finally, in
通过如上所述的本发明,能够使得E-UMTS的呼叫建立过程短,速度快,达到优化UMTS的目的。Through the present invention as described above, the E-UMTS call establishment process can be shortened and the speed is fast, so as to achieve the purpose of optimizing UMTS.
尽管以上已经结合本发明的优选实施例示出了本发明,但是本领域的技术人员将会理解,在不脱离本发明的精神和范围的情况下,可以对本发明进行各种修改、替换和改变。因此,本发明不应由上述实施例来限定,而应由所附权利要求及其等价物来限定。Although the present invention has been illustrated in conjunction with the preferred embodiments thereof, those skilled in the art will understand that various modifications, substitutions and alterations can be made to the present invention without departing from the spirit and scope of the invention. Accordingly, the invention should not be limited by the above-described embodiments, but by the appended claims and their equivalents.
Claims (16)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA2005100483099A CN1941990A (en) | 2005-09-30 | 2005-12-28 | Method for verifying between user terminal apparatus and network in wireless telecommunication system |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200510107775 | 2005-09-30 | ||
| CN200510107775.X | 2005-12-28 | ||
| CNA2005100483099A CN1941990A (en) | 2005-09-30 | 2005-12-28 | Method for verifying between user terminal apparatus and network in wireless telecommunication system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1941990A true CN1941990A (en) | 2007-04-04 |
Family
ID=37959675
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2005100483099A Pending CN1941990A (en) | 2005-09-30 | 2005-12-28 | Method for verifying between user terminal apparatus and network in wireless telecommunication system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1941990A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010078724A1 (en) * | 2009-01-08 | 2010-07-15 | 中兴通讯股份有限公司 | Local authentication method in mobile communication system |
| US9014714B2 (en) | 2008-07-03 | 2015-04-21 | Lg Electronics Inc. | Method of providing location privacy |
| CN109428853A (en) * | 2017-08-21 | 2019-03-05 | 华为技术有限公司 | A kind of communication means and relevant device |
| CN110225490A (en) * | 2013-11-29 | 2019-09-10 | 日本电气株式会社 | Mobile communication system and its method and network node and its method |
-
2005
- 2005-12-28 CN CNA2005100483099A patent/CN1941990A/en active Pending
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9014714B2 (en) | 2008-07-03 | 2015-04-21 | Lg Electronics Inc. | Method of providing location privacy |
| CN102084674B (en) * | 2008-07-03 | 2016-05-04 | Lg电子株式会社 | The method of location privacy is provided |
| WO2010078724A1 (en) * | 2009-01-08 | 2010-07-15 | 中兴通讯股份有限公司 | Local authentication method in mobile communication system |
| CN110225490A (en) * | 2013-11-29 | 2019-09-10 | 日本电气株式会社 | Mobile communication system and its method and network node and its method |
| US11856074B2 (en) | 2013-11-29 | 2023-12-26 | Nec Corporation | Apparatus, system and method for MTC |
| CN109428853A (en) * | 2017-08-21 | 2019-03-05 | 华为技术有限公司 | A kind of communication means and relevant device |
| US10999736B2 (en) | 2017-08-21 | 2021-05-04 | Huawei Technologies Co., Ltd. | Communication method and related device |
| CN109428853B (en) * | 2017-08-21 | 2021-06-29 | 华为技术有限公司 | A communication method and related equipment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1156196C (en) | Integrity check in communication system | |
| JP7793605B2 (en) | Privacy of Relay Selection in Sliced Cellular Networks | |
| CN113329407B (en) | Mutual authentication between user equipment and evolved packet core | |
| TWI724132B (en) | Method of wireless communication, apparatus for wireless communication and computer program for performing the method | |
| CN1157982C (en) | Security procedures for universal mobile telephone service | |
| CN1310476C (en) | Method for building session connection to wireless local network user | |
| EP3371993B1 (en) | Method, ue and network node for protecting user privacy in networks | |
| CN1682487A (en) | Radio lan access authentication system | |
| CN110431882A (en) | User Plane Relocation Technology in Wireless Communication System | |
| KR101271442B1 (en) | Mobile station, radio access network device, mobile exchange station, mobile communication system, and communication service access method | |
| CN1478365A (en) | A system that secures encrypted communication after switching | |
| CN1857024A (en) | Enhanced security design for cryptography in mobile communication systems | |
| CN101262337B (en) | Secure function control method and system | |
| CN116235524A (en) | A secure communication method and device | |
| KR20170097487A (en) | Service method for converged core network, universal control entity and converged core network system | |
| CN1848994A (en) | Method for realizing right discrimination of microwave cut-in global interoperating system | |
| CN101056456A (en) | Method and secure system for authenticating the radio evolution network | |
| CN101060712B (en) | Wireless connecting establishment method | |
| CN101072092A (en) | Method for realizing control plane and user plane key synchronization | |
| CN1219407C (en) | A Method of Autonomously Selecting Wireless Link Encryption Algorithm in Secure Communication | |
| US20250227465A1 (en) | Communication method and communication apparatus | |
| CN1937487A (en) | LTE authentication and encryption method | |
| CN1867186A (en) | Method and apparatus for realizing user admittance control in wireless communication system | |
| CN1941990A (en) | Method for verifying between user terminal apparatus and network in wireless telecommunication system | |
| WO2011095077A1 (en) | Method, system and apparatus for managing air interface mapping key in wireless communication system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20070404 |