[go: up one dir, main page]

WO2014040518A1 - 密钥隔离方法及设备 - Google Patents

密钥隔离方法及设备 Download PDF

Info

Publication number
WO2014040518A1
WO2014040518A1 PCT/CN2013/083165 CN2013083165W WO2014040518A1 WO 2014040518 A1 WO2014040518 A1 WO 2014040518A1 CN 2013083165 W CN2013083165 W CN 2013083165W WO 2014040518 A1 WO2014040518 A1 WO 2014040518A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
key
user equipment
macro base
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2013/083165
Other languages
English (en)
French (fr)
Inventor
杨义
梁靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Telecommunications Technology CATT
Original Assignee
China Academy of Telecommunications Technology CATT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Telecommunications Technology CATT filed Critical China Academy of Telecommunications Technology CATT
Priority to US14/421,442 priority Critical patent/US9473933B2/en
Priority to EP13836407.0A priority patent/EP2897398B1/en
Publication of WO2014040518A1 publication Critical patent/WO2014040518A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0058Transmission of hand-off measurement information, e.g. measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • H04W36/00695Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink using split of the control plane or user plane
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/04Reselecting a cell layer in multi-layered cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/20Interfaces between hierarchically similar devices between access points

Definitions

  • the present invention relates to the field of wireless communications, and in particular, to a key isolation method and device. Background of the invention
  • the layered networking technology also provides a low power local base station (local eNB). Local base stations cover a small range, including Femto/Pico/Relay.
  • the switching frequency and number of UEs are greatly increased. Therefore, in order to reduce the frequency of handover between the macro cell managed by the macro base station and the small cell managed by the local base station, a network deployment manner in which the user plane and the control plane are separated is introduced.
  • the macro cell provides basic coverage
  • the small cell provides hotspot coverage
  • the user plane may be transferred to the local base station to obtain a better quality service provided by the local base station; when the UE is away from the cell controlled by the local base station, the user plane needs to be converted. Go to the cell controlled by the macro base station to maintain the wireless connection.
  • the control plane and the user plane of the UE that is, the data radio bearer (DRB: Data Radio Bearer) are all in the Acer.
  • DRB Data Radio Bearer
  • the embodiment of the invention provides a key isolation method and device for implementing key isolation between base stations in a bearer separation network to ensure communication security of user equipment.
  • the target base station After the macro base station decides to switch the user plane bearer of the user equipment, according to the difference parameter of the target base station, and the temporary key shared by the macro base station and the user equipment, the target base station generates communication with the user equipment. Key used;
  • the macro base station device includes: a handover decision module, a key management module, a key generation module, and a first sending module, where:
  • a handover decision module configured to perform a user plane bearer handover decision on the user equipment
  • a key management module configured to send the generation secret to the key generation module when the handover decision module decides to perform user plane bearer handover on the user equipment An indication of the key, and sending an indication to the first sending module to transmit the difference parameter
  • a key generation module configured to generate, according to the indication of the key management module, the target base station and the user according to a difference parameter of the target base station, and a temporary key shared by the macro base station device and the user equipment The key used by the device to communicate;
  • a first sending module configured to send the difference parameter to the user equipment according to the indication of the key management module, so that the user equipment, according to the different parameter, and the user equipment and the macro base station
  • the shared temporary key generates a key used by the user equipment to communicate with the target base station.
  • the macro base station when the user plane of the user equipment is carried between the base stations for handover, the macro base station generates a session key on radio interface for the target base station, and uses the target base station to be distinguished from other base stations.
  • the parameters therefore, can ensure that the air interface session keys generated by the macro base station for different base stations are different, thereby realizing key isolation between the base stations.
  • FIG. 2 is a schematic diagram of an interface relationship between a control plane and a user plane separation architecture.
  • FIG 3 is a schematic diagram of a user plane protocol stack of a local eNB in a control plane and user plane separation architecture.
  • FIG. 4 is a schematic diagram of an interface relationship between another control plane and a user plane separation architecture.
  • FIG. 5 is a schematic diagram of a control plane protocol stack of a local eNB in a control plane and user plane separation architecture.
  • FIG. 6 is a schematic flowchart diagram of a key isolation method according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of a key isolation method according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a base station device according to an embodiment of the present invention. Mode for carrying out the invention
  • FIG. 2 shows a network architecture using a control plane and user plane separation technique, where the UE is simultaneously connected to two eNBs.
  • the ML interface in the figure represents a logical interface between the macro eNB and the local eNB, which may be predefined or may utilize an already standardized X2 interface.
  • the SRB (Signaling Radio Bearer) of the UE is reserved on the macro eNB, and the PDCP (Packet Data Convergence Protocol, packet data of all or part of the DRB)
  • the aggregation protocol)/RLC (Radio Link Control)/MAC (Media Access Control)/PHY (Physical Layer) part remains on the local eNB.
  • the uplink data of the UE After the uplink data of the UE arrives at the local eNB, it is directly sent to the SGW (Serving Gateway). After the downlink data of the UE reaches the SGW, it is directly sent to the local eNB, thereby reducing the processing load of the macro eNB on the UE data packet.
  • SGW Serving Gateway
  • FIG. 4 is a schematic diagram showing the interface relationship between another control plane and a user plane separation architecture.
  • the macro eNB has a complete user plane and control plane protocol stack.
  • the user plane protocol stack between the macro eNB and the UE is as shown in FIG. 3.
  • the local eNB has a complete user plane protocol stack and some RRC (Radio Resource Control) protocol functions.
  • the user plane protocol stack of the local eNB is also shown in FIG. 3, and the control plane protocol stack is as shown in FIG. 5, where "Sub RRC layer" indicates that only a part of the RRC function protocol stack is included, for example, only the radio resource management function is included.
  • the PDCP layer exists on the local eNB, so the local eNB needs to obtain the encryption key of the UE.
  • the local eNB also needs to obtain an integrity key for integrity protection of the RRC message.
  • Step 601 The macro eNB performs a user plane handover decision according to the measurement report sent by the UE, and the result of the decision is to switch the user plane bearer of the UE to the target local eNB.
  • Step 602 The macro eNB generates, according to the difference parameter of the target local eNB, a temporary key (also referred to as an intermediate key) shared by the macro eNB and the UE, a key used by the target local eNB to communicate with the UE, that is, an air interface. Session key.
  • different local eNBs have different distinguishing parameters, so the difference parameter of the target local eNB can distinguish the target local eNB from other eNBs.
  • the temporary key may be a KeNB or a Next Hop (NH).
  • the macro eNB may send the air interface session key to the target local eNB through a user plane handover request message, and may also send the air interface session key to the target local eNB by using a message predefined in the embodiment of the present invention.
  • Step 604 The macro eNB sends the difference parameter of the target local eNB to the UE.
  • the macro eNB may send the difference parameter to the UE by using a user plane handover command.
  • Step 605 The UE generates a key used by the UE to communicate with the target local eNB, that is, an air interface session key, according to the received difference parameter and the temporary key shared by the UE and the macro eNB.
  • the foregoing process may be applicable to the process of switching the user plane bearer of the UE from the macro eNB to the local eNB, or switching the user plane bearer of the UE from one local eNB in the coverage of the macro eNB to another local.
  • the process of the eNB may be applicable to the process of switching the user plane bearer of the UE from the macro eNB to the local eNB, or switching the user plane bearer of the UE from one local eNB in the coverage of the macro eNB to another local.
  • the process of the eNB may be applicable to the process of switching the user plane bearer of the UE from the macro eNB to the local eNB, or switching the user plane bearer of the UE from one local eNB in the coverage of the macro eNB to another local.
  • the macro eNB since the macro eNB uses the differentiated parameter of the macro eNB in generating the air interface session key, the macro eNB can be distinguished from other base stations, such as other macro eNBs and local eNBs, thereby ensuring the generated by the macro eNB.
  • the air interface session key is different from the air interface session key generated for other local eNBs under the macro eNB, and the air interface session key generated by other macro eNBs, thereby implementing key isolation between the base stations.
  • the macro eNB performs a user plane handover decision. If the macro eNB decides to transfer the user plane bearer of the UE from the macro eNB to the target local eNB, the macro eNB generates a random number, and calculates the encryption key using the temporary key, the random number, and the encryption algorithm.
  • the temporary key It can be KeNB or the latest NH.
  • the macro eNB sends a user plane handover request message to the target local eNB.
  • the user plane handover request message includes an encryption key calculated by the macro eNB in addition to the handover preparation related information.
  • the macro eNB can also notify the process by generating a generated encryption key through a separate key.
  • the macro eNB may also send the temporary key, the random number, and the information indicating the encryption algorithm required to calculate the encryption key to the target local eNB through a separate key notification process (not shown in FIG. 7) instead of carrying it.
  • the user plane handover request message is sent to the target local eNB.
  • the target local eNB refers to the message, performs an admission decision according to the QoS (Quality of Service) information of the bearer to be admitted, and performs the underlying configuration to prepare for handover if the UE is allowed to be admitted.
  • QoS Quality of Service
  • the target local eNB receives from the macro eNB the temporary key, the random number, and the information indicating the encryption algorithm required to calculate the encryption key, the target local eNB according to the received temporary key, the random number, and the indicated encryption algorithm. Calculate the encryption key.
  • the target local eNB returns a user plane handover request response message to the macro eNB, where
  • the message includes an RRC container (RRC container), and the specific content is a user plane switching command that triggers the UE to perform user plane bearer switching.
  • RRC container RRC container
  • step 7 After the macro eNB adds the random number used in step 3 and the parameter NCC (Next-hop Chaining Counter) to indicate whether NH needs to be calculated in the received user plane switching command, The user plane switching command is sent to the UE. After receiving the user plane switching command, the UE stops transmitting and receiving data on the macro eNB.
  • NCC Next-hop Chaining Counter
  • the macro eNB sends the sequence number status information of the current data, for example, the sequence number of the downlink data packet that is not successfully transmitted, the first sequence number that the target local eNB can allocate, and the like to the target local eNB.
  • the UE After receiving the user plane switching command, the UE calculates the encryption key by using the random number in the user plane switching command and the KeNB and the encryption algorithm saved by itself. If the NCC in the user plane handover command indicates that NH is required, the UE calculates the encryption key using the random number and NH in the user plane switching command and the encryption algorithm. The encryption algorithm used by the UE side is consistent with the encryption algorithm used by the macro eNB. Thereafter, the UE configures the calculated encryption key to the PDCP entity for use, and then returns a handover complete message to the macro eNB.
  • the UE Since the encryption key of the UE is changed, the UE also needs to reconstruct the PDCP/RLC/MAC layer.
  • the following process is a general process of the handover process, which is basically similar to the handover process in the prior art, and is described as follows.
  • the macro eNB initiates a path switching request to the MME, and carries the user plane transport layer address and the downlink GTP (GPRS Tunnel Protocol) tunnel identifier assigned by the local eNB for each UE EPS (Evolved Packet System). .
  • GTP GPRS Tunnel Protocol
  • the MME requests the SGW to carry the modification request, and notifies the SGW of the downlink user plane transport layer address and the GTP tunnel identifier allocated by the macro eNB for each UE EPS bearer.
  • the SGW performs path switching, and transfers the downlink data transmission path of the UE to the target local eNB.
  • the SGW returns a bearer modification response to the MME, and carries the user plane transport layer address and the uplink GTP tunnel identifier respectively allocated by the SGW for each UE EPS bearer.
  • the MME returns a path switch request response to the macro eNB, and carries the uplink user plane transport layer address and the GTP tunnel identifier respectively allocated by the SGW for each UE EPS bearer; the macro eNB returns a path switch request response to the target local eNB.
  • the target local eNB sends a terminal context release request to the macro eNB.
  • the macro eNB releases the relevant resources allocated for the handover UE.
  • the UE may return a random number received from the macro eNB to the macro eNB by using a handover complete message.
  • the macro eNB may compare the random number carried in the handover complete message with the random number used in step 3. If the random number carried in the handover complete message is consistent with the random number used in step 3, the decision is made. The random number is not modified by the tomb. If the random number carried in the handover completion message is inconsistent with the random number used in step 3, the random number is considered to be changed by the tomb.
  • the RRC layer may be notified to release the RRC connection with the UE.
  • the foregoing random number is also used by the macro eNB and the UE to calculate the integrity protection secret of the protection RRC message. key.
  • the integrity protection key is sent by the macro eNB to the target local eNB.
  • the macro eNB and the UE may also recalculate the air interface session key between the macro eNB and the UE. For example, an integrity protection key including an encryption key and an RRC message.
  • the macro eNB and the UE can be in the existing manner,
  • the air interface session key may also be generated in the above manner according to an embodiment of the present invention. If the air interface session key is generated in the existing manner, the air interface session key used by the macro eNB and the target local eNB is different.
  • the macro eNB and the target local eNB The air interface session key used is the same.
  • the KeNB or NH is used, and an encryption key and an RRC message integrity protection key are calculated by using an encryption algorithm.
  • the encryption key and the RRC message integrity protection key are calculated by using KeNB or NH, a random number, and using an encryption algorithm.
  • the encryption algorithm may be: an encryption algorithm (Advanced Encryption Standard, AES), a SNOW 3G, an algorithm (ZUC), and the like.
  • AES Advanced Encryption Standard
  • SNOW 3G SNOW 3G
  • ZUC algorithm
  • all user plane bearers of the UE may be handed over from the local eNB to the macro eNB.
  • a possible user switching process includes the following steps 1 ⁇ 15.
  • the macro eNB performs measurement configuration on the UE, and the UE performs measurement according to the received measurement configuration information.
  • the UE reports the measurement result on the uplink resource allocated by the macro eNB for the UE, and the measurement result is used to assist the macro eNB.
  • the user plane switches the decision.
  • the macro eNB performs a user plane handover decision. If the macro eNB decides to transfer the user plane 7 held by the UE and the local eNB to the macro eNB, the macro eNB generates a random number, and calculates an encryption key by using KeNB or the latest NH (if any), a random number, and an encryption algorithm. .
  • the macro eNB configures the encryption key to the local PDCP entity corresponding to the UE, and is used for carrying data between the macro eNB and the UE after the UE user plane handover is completed. Encrypted.
  • the macro eNB performs an admission decision according to the QoS information of the bearer to be admitted, and if the UE is allowed to be admitted, performs an underlay configuration to prepare for handover.
  • the macro eNB sends a user plane transmission suspension message to the local eNB, and the local eNB stops transmitting data to the UE according to the message, and returns the serial number status information of the current data transmission to the macro eNB.
  • the macro eNB sends a user plane handover command to the UE, where the random number used in step 3 and the parameter NCC indicating whether the NH needs to be calculated are included. After receiving the user plane handover command, the UE stops transmitting and receiving data at the source local eNB.
  • the UE After receiving the user plane switching command, the UE calculates the encryption key by using the random number in the user plane switching command and the KeNB and the encryption algorithm saved by itself. If the NCC in the user plane handover command indicates that NH is required, the UE calculates the encryption key using the random number and NH in the user plane switching command and the encryption algorithm. The encryption algorithm used by the UE side is consistent with the encryption algorithm used by the macro eNB. Thereafter, the UE configures the calculated encryption key to the PDCP entity for use, and then returns a handover complete message to the macro eNB.
  • the UE Since the encryption key of the UE is changed, the UE also needs to reconstruct the PDCP/RLC/MAC layer.
  • the following process is a general process of the handover process, which is basically similar to the handover process in the prior art, and is described as follows.
  • the MME requests the SGW to carry the modification request, and notifies the SGW of the downlink user plane transport layer address and the GTP tunnel identifier allocated by the macro eNB for each UE EPS bearer.
  • the SGW performs path conversion, and transfers the downlink data transmission path of the UE to the macro. eNB.
  • the SGW returns a bearer modification response to the MME, and carries the uplink user plane transport layer address and the GTP tunnel identifier respectively allocated by the SGW for each UE EPS bearer.
  • the MME returns a path switch response to the macro eNB, and carries the uplink user plane transport layer address and the GTP tunnel identifier respectively allocated by the SGW for each UE EPS bearer; the message carries a new key NH and a counter NCC corresponding thereto.
  • the macro eNB sends a terminal context release request to the source local eNB.
  • the UE may return a random number received from the macro eNB to the macro eNB by using a handover complete message.
  • the macro eNB may compare the random number carried in the handover complete message with the random number used in step 3. If the random number carried in the handover complete message is consistent with the random number used in step 3, the decision is made. The random number is not modified by the tomb. If the random number carried in the handover completion message is inconsistent with the random number used in step 3, the random number is considered to be changed by the tomb.
  • the RRC layer may be notified to release the RRC connection with the UE.
  • the macro eNB when the source local eNB has a partial RRC function before the handover, for example, when the source local eNB has the architecture shown in FIG. 4, the macro eNB needs to switch the part of the control plane 7 to the macro eNB, and the front The random number is also used by the macro eNB and the UE to calculate an integrity protection key for protecting the RRC message.
  • the random number generated by the macro eNB may be replaced by other information capable of uniquely distinguishing the macro eNB, such as a global base station identifier, or a combination of PCI+ frequencies, and the like.
  • the user plane of the UE bears a handover procedure when switching from one local eNB to another local eNB under the macro eNB, and the procedure is the UE in the first embodiment.
  • the process of switching from the macro eNB to the local eNB is similar.
  • the additional procedure is that the macro eNB needs to notify the source local eNB to stop the user plane data forwarding and delete the key associated with the UE.
  • the difference parameters of the target eNB such as the random number generated by the macro eNB and the temporary key shared by the user and the network side (KeNB or NH) It is a main parameter. Therefore, the foregoing embodiments are described as an example. In the specific implementation, other parameters may be introduced to participate in the calculation of the air interface session key.
  • the embodiment of the present invention further provides a base station device applied to a bearer separation network, for example, a base station device applied to a network where the control plane and the user plane are separated.
  • FIG. 9 is a schematic structural diagram of a base station device according to an embodiment of the present invention.
  • the base station device is a macro base station device according to an embodiment of the present invention.
  • the macro base station device may include: a handover decision module 901, a key management module 902, a key generation module 903, a first sending module 905, and further a second sending module 904.
  • the handover decision module 901 is configured to perform a user plane bearer handover decision on the user equipment.
  • the key management module 902 is configured to send an indication of generating a key to the key generation module 903 when the handover decision module 901 decides to perform user plane bearer handover on the user equipment, and send an indication of the transmission difference parameter to the first sending module 905.
  • the key generation module 903 is configured to generate the target base station and the user equipment according to the indication of the key management module 902, according to the difference parameter of the target base station, and the temporary key shared by the macro base station device and the user equipment.
  • the difference parameter is a random number generated by the macro base station or information capable of uniquely distinguishing the target base station.
  • the first sending module 905 is configured to send the difference parameter to the user equipment according to the indication of the key management module 902, so that the user equipment, according to the different parameter, and the user equipment and the macro base station a shared temporary key, generating the user equipment and the The key used by the target base station to communicate.
  • the target base station may be the macro base station.
  • the target base station may be a target local base station.
  • the handover decision module 901 decides to switch the user plane bearer of the user equipment from the macro base station to the target local base station, or decides to switch the user plane bearer of the user equipment from the current local base station to the target local base station.
  • the key management module 902 is further configured to send an indication of the transmission key to the second sending module 904.
  • the second sending module 904 is configured to send the key generated by the key generating module 903 to the target local base station according to the indication of the key management module.
  • the key management module 902 is further configured to instruct the key generation module 903 to be local according to the target. a difference parameter of the base station, and a temporary key shared by the macro base station and the user equipment, to generate a key used by the macro base station to communicate with the user equipment.
  • the key management module 902 is further configured to instruct the key generation module 903 to perform the macro base station and the user according to the A temporary key shared by the device, generating a key used by the macro base station to communicate with the user equipment.
  • the handover decision module 901 is further configured to perform a control plane bearer decision.
  • the key management module 902 is specifically configured to instruct the key generation module 903 to generate an encryption key and integrity protection.
  • the handover decision module 901 decides to handover the user plane bearer of the user equipment from the local base station to the macro base station, and before the handover, the local base station has a part of the control plane bearer of the user equipment, and key management
  • the module 902 is specifically configured to instruct the key generation module 903 to generate an encryption key and an integrity protection key.
  • the second sending module 904 carries the generated key in a user plane handover request message or a predefined message, and sends the key to the target local base station.
  • the first sending module 905 sends the difference parameter to the user plane switching command and sends the command to the user equipment.
  • the methods and apparatus provided by the embodiments of the present invention may be implemented by hardware, or computer readable instructions, or a combination of hardware and computer readable instructions.
  • the computer readable instructions used in this embodiment are stored by a plurality of processors in a readable storage medium, such as a hard disk, a CD-ROM,
  • DVD DVD, CD, floppy disk, tape, RAM, ROM or other suitable storage device.
  • computer readable instructions may be replaced by specific hardware, such as custom integrated circuits, gate arrays, FPGAs, PLDs, and computers with specific functions, and the like.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions for causing a computer to perform the methods described herein.
  • the system or device provided by this embodiment has a storage medium in which computer readable program code is stored for implementing the functions of any of the above embodiments, and these systems or devices (or CPUs or MPUs) can read and Execute the program code stored on the storage medium.
  • the program code read from the storage medium can implement any of the above embodiments, and thus the program code and the storage medium storing the program code are part of the technical solution.
  • Storage media for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (eg, CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), disks, Flash card, ROM, etc.
  • the program code can also be downloaded from the server computer via the communication network.
  • an operation at least partially implemented by the program code may be implemented by an operating system running on a computer, thereby implementing the technical solution of any of the above embodiments, wherein the computer is executed based on the program code. instruction.
  • program code in the storage medium is written to the memory, wherein the memory is located in an expansion board inserted in the computer or in an expansion unit connected to the computer.
  • the CPU in the expansion board or the expansion unit performs at least part of the operation based on the program code according to the instruction, thereby implementing the technical solution of any of the above embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

密钥隔离方法及设备
技术领域
本发明涉及无线通信领域, 尤其涉及一种密钥隔离 ( key isolation ) 方法及设备。 发明背景
随着数据业务的速率和容量不断增长, 分层组网技术被引入来提高 数据速率, 增加网络容量和降低业务的成本。 除了宏基站(macro eNB ) 之外, 分层组网技术还提供了低功率的本地基站 (local eNB )。 本地基 站覆盖的范围较小, 包括 Femto/Pico/Relay等形式。
由于本地基站的覆盖范围小,使得 UE ( User Equipment, 用户设备 ) 的切换频率和次数都大大增加。 因此为了降低 UE在宏基站管理的宏小 区和本地基站管理的小小区 (small cell )之间进行切换的频率, 一种用 户面和控制面分离的网络部署方式被引入。 如图 1所示, 宏小区提供基 础覆盖, 小小区提供热点 (hotspot )覆盖, 小小区与宏小区之间存在数 据 /信令接口 (有线 /无线接口)。 当连接到宏基站的 UE接近本地基站控 制的小区时, 可以将用户面转移到本地基站以获得本地基站提供的质量 更好的服务; 当 UE远离本地基站控制的小区时, 需要将用户面转换到 宏基站控制的小区, 以保持无线连接。
在以上承载分离的网络架构下, 当 UE在只有宏小区覆盖的区域, UE的控制面连接 ( control plane )和用户面连接 ( user plane ) 即数据无 线承载(DRB: Data Radio Bearer )都在宏基站; 当 UE移动到宏小区和 小小区重叠覆盖区域时, UE 的全部或者部分用户面连接被转移到本地 基站, 以获得更高的业务传输速率, 控制面连接仍然保持在宏基站, 以 防止控制面连接切换失败造成 UE掉话。 发明内容
本发明实施例提供了一种密钥隔离方法及设备, 用以在承载分离网 络中实现基站间的密钥隔离, 以保证用户设备通信安全。
本发明实施例提供的密钥隔离方法, 包括:
宏基站在判决对用户设备的用户面承载进行切换后, 根据目标基站 的区别参数, 以及所述宏基站与所述用户设备共享的临时密钥, 生成所 述目标基站与所述用户设备通信时使用的密钥;
所述宏基站将所述区别参数发送给所述用户设备, 以使所述用户设 备根据所述区别参数以及所述用户设备与所述宏基站共享的临时密钥, 生成所述用户设备与所述目标基站通信时使用的密钥。
本发明实施例提供的宏基站设备, 包括: 切换判决模块、 密钥管理 模块、 密钥生成模块和第一发送模块, 其中:
切换判决模块, 用于对用户设备进行用户面承载切换判决; 密钥管理模块, 用于在所述切换判决模块判决对用户设备进行用户 面承载切换时, 向所述密钥生成模块发送生成密钥的指示, 并向所述第 一发送模块发送传输所述区别参数的指示;
密钥生成模块, 用于按照所述密钥管理模块的指示, 根据目标基站 的区别参数, 以及所述宏基站设备与所述用户设备共享的临时密钥, 生 成所述目标基站与所述用户设备通信时使用的密钥;
第一发送模块, 用于根据所述密钥管理模块的指示, 将所述区别参 数发送给所述用户设备, 以使所述用户设备根据所述区别参数以及所述 用户设备与所述宏基站共享的临时密钥, 生成所述用户设备与所述目标 基站通信时使用的密钥。 根据本发明实施例,当用户设备的用户面承载在基站间进行切换时, 宏基站在为目标基站生成空口会话密钥 ( session key on radio interface ) 时, 使用了该目标基站区别于其它基站的参数, 因此, 能够保证宏基站 为不同的基站所生成的空口会话密钥各不相同, 从而实现基站间的密钥 隔离。 附图简要说明
图 1为一种用户面和控制面分离的网络架构示意图。
图 2为一种控制面和用户面分离架构的接口关系示意图。
图 3为一种控制面和用户面分离架构中的 local eNB的用户面协议栈 的示意图。
图 4为另一种控制面和用户面分离架构的接口关系示意图。
图 5为一种控制面和用户面分离架构中的 local eNB的控制面协议栈 的示意图。
图 6为本发明实施例提供的密钥隔离方法的流程示意图。
图 7为本发明实施例提供的密钥隔离方法的流程示意图。
图 8为本发明实施例提供的密钥隔离方法的流程示意图。
图 9为本发明实施例提供的基站设备的结构示意图。 实施本发明的方式
图 2示出了一种采用控制面与用户面分离技术的网络架构,UE同时 连接到两个 eNB。 图中 M-L接口表示 macro eNB与 local eNB之间的逻 辑接口, 可以是预先定义的, 也可以利用已经标准化的 X2接口。 UE的 SRB ( Signaling Radio Bearer, 信令无线承载)保留在 macro eNB上, 而 所有或部分 DRB的 PDCP ( Packet Data Convergence Protocol, 分组数据 汇聚协议)/RLC( Radio Link Control,无线连接控制)/MAC( Media Access Control,媒体接入控制 ) /PHY ( Physical layer,物理层 )部分保持在 local eNB上。 UE的上行数据到达 local eNB之后直接发往 SGW(服务网关), UE的下行数据到达 SGW之后直接发往 local eNB, 从而减少了 macro eNB对 UE数据包的处理负担。
在图 2所示的架构中, local eNB具有完整的用户面协议栈( protocol stack ), 图 3示出了 UE与 local eNB之间的用户面协议栈。
图 4示出了另一种控制面与用户面分离架构的接口关系示意图。 其 中, macro eNB具有完整的用户面和控制面协议栈。 macro eNB与 UE 之间的用户面协议栈如图 3所示。 local eNB具有完整的用户面协议栈, 以及部分 RRC ( Radio Resource Control,无线资源控制)协议功能。 local eNB的用户面协议栈也如图 3所示, 而控制面协议栈如图 5所示, 其中 "Sub RRC层" 表示只含有部分 RRC功能的协议栈, 例如仅包含无线 资源管理功能。
在图 2和图 4所示的两种采用控制面与用户面分离技术的网络架构 下, local eNB上存在 PDCP层, 因此 local eNB需要获得 UE的加密密 钥 ( encryption key )。 对于图 4所示架构, local eNB还需要获得对 RRC 消息进行完整性保护的密钥 (integrity key)。
如果一个 macro eNB覆盖范围内部署了多个 local eNB,并且有可能 local eNB之间存在重叠覆盖区, 那么 UE有可能在 local eNB之间进行 切换, 或是在 macro eNB和 local eNB之间进行切换。 local eNB作为一 个不安全的接入网节点,有可能被黑客攻破。若 UE在连接某个 local eNB 时, 还连接了其他基站, 如 macro eNB和其它 local eNB , 为了保证该某 个 local eNB被攻破后不影响 UE在其他基站上的通信安全,需要在 local eNB之间以及 macro eNB和 local eNB之间进行密钥隔离( key isolation )。 图 6为本发明实施例提供的密钥隔离方法的流程示意图,如图所示, 该流程可包括以下步骤。
步骤 601 , macro eNB根据 UE发送的测量 4艮告 ( measure report )进 行用户面 7?载切换判决 ( handover decision ), 判决结果为将 UE的用户 面承载切换到目标 local eNB。
步骤 602, macro eNB根据该目标 local eNB的区别参数,以及 macro eNB与该 UE共享的临时密钥 (也称为中间密钥), 生成目标 local eNB 与该 UE通信时使用的密钥, 即空口会话密钥。
在本发明实施例中, 不同的 local eNB具有不同的区别参数, 因此目 标 local eNB的区别参数可以区别该目标 local eNB与其它 eNB。
该临时密钥可以是 KeNB或下一跳密钥 (Next Hop, NH )。
步骤 603 , macro eNB将步骤 602中生成的空口会话密钥发送给该目 标 local eNB进行保存。
在本发明实施例中, macro eNB可通过用户面切换请求消息发送该 空口会话密钥给该目标 local eNB ,也可通过本发明实施例预先定义的消 息发送该空口会话密钥给该目标 local eNB。
步骤 604, macro eNB将该目标 local eNB的区别参数发送给该 UE。 在本发明实施例中, macro eNB可通过用户面切换命令将该区别参 数发送给该 UE。
步骤 605 ,该 UE根据接收到的区别参数,以及该 UE与该 macro eNB 共享的临时密钥,生成该 UE与该目标 local eNB通信时使用的密钥, 即 空口会话密钥。
后续, UE与该目标 local eNB进行通信时, 即可使用与该 local eNB 之间的空口会话密钥对传输的数据进行加密处理。 由于 macro eNB在为 目标 local eNB生成空口会话密钥时, 使用了该目标 local eNB的区别参 数, 因此, 能够保证 macro eNB为不同的 local eNB所生成的空口会话 密钥各不相同, 从而实现基站间的密钥隔离。
在本发明实施例中, 以上流程可以适用于将 UE 的用户面承载从 macro eNB切换到 local eNB的过程, 或者将 UE的用户面承载从 macro eNB覆盖范围内的一个 local eNB切换到另一个 local eNB的过程。
如果步骤 601中 macro eNB判决将 UE的用户面承载从 local eNB切 换到 macro eNB, 则步骤 602中 macro eNB生成的空口密钥为该 macro eNB与该 UE间的空口会话密钥, 且无需发送给 local eNB , 即不执行步 骤 603。步骤 604中 UE生成的空口会话密钥将用于该 UE与该 macro eNB 的通信过程。 这种情况下, 由于 macro eNB在生成空口会话密钥时使用 了该 macro eNB的区别参数, 能够区别该 macro eNB与其它基站, 如其 他 macro eNB和 local eNB ,因此保证了该 macro eNB所生成的空口会话 密钥与为该 macro eNB下的其它 local eNB所生成的空口会话密钥, 以 及与其它 macro eNB所生成的空口会话密钥各不相同, 从而实现基站间 的密钥隔离。
下面结合具体切换场景, 对本发明实施例进行描述。
根据本发明实施例, UE 的部分或者全部用户面承载可以从 macro eNB切换到 local eNB。如图 7所示, 一种可能的用户切换流程包括如下 步骤 1~16。
1~2、 macro eNB对 UE进行测量配置, UE后继根据收到的测量配 置信息执行测量。 UE在 macro eNB为 UE分配的上行资源上, 上报测 量结果, 该测量结果将用于辅助 macro eNB进行用户面切换判决。
3、 macro eNB进行用户面切换判决。 若 macro eNB决定将 UE的用 户面承载从 macro eNB转移到目标 local eNB,则 macro eNB生成随机数, 利用临时密钥、 随机数以及加密算法计算出加密密钥。 其中该临时密钥 可以是 KeNB或者最新的 NH。
4、 macro eNB向目标 local eNB发送用户面切换请求消息, 该用户 面切换请求消息中除了包含切换准备相关信息以外, 还包含 macro eNB 计算出的加密密钥。
macro eNB 也可将生成的加密密钥通过一个单独的密钥通知过程
(图 7中未示出)发送给目标 local eNB , 而不是携带于用户面切换请求 消息发送给目标 local eNB。
根据本发明实施例,在本步骤中, macro eNB还可以向目标 local eNB 发送用户面切换请求消息, 该消息中除了包含切换准备相关信息以外, 还包含计算加密密钥所需的临时密钥、 随机数以及指示加密算法的信 息。
macro eNB也可将计算加密密钥所需的临时密钥、 随机数以及指示 加密算法的信息通过一个单独的密钥通知过程(图 7中未示出)发送给 目标 local eNB , 而不是携带于用户面切换请求消息发送给目标 local eNB。
5、目标 local eNB参考该消息,根据待接纳的承载的 QoS ( Quality of Service, 服务质量)信息进行接纳判决, 并在允许接纳该 UE的情况下, 进行底层配置以准备切换。
目标 local eNB 还将该加密密钥配置到本地与该 UE 载对应的 PDCP实体, 用于 UE用户面承载转移成功后, 目标 local eNB和 UE之 间的承载数据的加密。
如果该目标 local eNB从 macro eNB接收到的是计算加密密钥所需 的临时密钥、 随机数以及指示加密算法的信息, 目标 local eNB根据收 到的临时密钥、 随机数以及指示的加密算法计算出加密密钥。
6、 目标 local eNB向 macro eNB返回用户面切换请求响应消息, 该 消息中包含一个 RRC容器( RRC container ), 具体内容是触发 UE进行 用户面承载切换的用户面切换命令。
7、 macro eNB在收到的用户面切换命令中添加步骤 3中使用的随机 数以及用于指示是否需要计算 NH 的参数 NCC ( Next-hop Chaining Counter, 下一跳密钥链计数器)之后, 将用户面切换命令发送给 UE。 UE接收到用户面切换命令后, 停止在 macro eNB进行数据收发。
8、 macro eNB将当前数据发送的序列号状态信息, 如: 未成功发送 的下行数据包的序列号, 目标 local eNB可以分配的第一个序列号等, 发送给目标 local eNB。
9、 UE收到用户面切换命令后, 利用用户面切换命令中的随机数和 自己保存的 KeNB以及加密算法计算出加密密钥。 如果用户面切换命令 中的 NCC指示需要使用 NH的话, UE利用用户面切换命令中的随机数 和 NH以及加密算法计算出加密密钥。 其中, UE侧所使用的加密算法 与 macro eNB所使用的加密算法一致。 之后, UE将计算出的加密密钥 配置到 PDCP实体使用, 然后向 macro eNB返回切换完成消息。
由于 UE的加密密钥改变了, 所以 UE还需要重建 PDCP/RLC/MAC 层。
通过以上流程实现了密钥隔离, 以下流程为切换过程的常规流程, 基本与现有技术中的切换流程类似, 筒述如下。
10、 macro eNB向 MME发起路径转换请求, 携带 local eNB为各 UE EPS ( Evolved Packet System, 演进的分组系统 ) 载分配的用户面 传输层地址和下行 GTP ( GPRS Tunnel Protocol, GPRS隧道协议 ) 隧道 标识。
11、 MME请求 SGW承载修改请求, 将 macro eNB发来的为各 UE EPS承载分配的下行用户面传输层地址和 GTP隧道标识通知 SGW。 12、 SGW进行路径转换, 将该 UE的下行数据传输路径转移到目标 local eNB。
13、 SGW向 MME返回承载修改响应, 携带 SGW为各 UE EPS承 载分别分配的用户面传输层地址和上行 GTP隧道标识。
14-15, MME向 macro eNB返回路径转换请求响应, 携带 SGW为 各 UE EPS承载分别分配的上行用户面传输层地址和 GTP隧道标识; macro eNB向目标 local eNB返回路径转换请求响应。
16、 目标 local eNB向 macro eNB发送终端上下文释放请求。
17、 macro eNB释放为切换 UE所分配的相关资源。
根据本发明实施例, 在步骤 9 中, UE可通过切换完成消息, 将从 macro eNB接收到的随机数返回给该 macro eNB。 macro eNB可将该切 换完成消息中携带的随机数与步骤 3中所使用的随机数进行比较, 若该 切换完成消息中携带的随机数与步骤 3中所使用的随机数一致, 则判决 该随机数没有被墓改, 若该切换完成消息中携带的随机数与步骤 3中所 使用的随机数不一致, 则认为该随机数被墓改。 为了保证通信安全, 若 macro eNB发现该随机数已经被墓改, 则可通知 RRC层释放与该 UE的 RRC连接。
根据本发明实施例,当 local eNB存在部分 RRC功能时,例如当 local eNB具有图 4所示架构时, 前面所述的随机数也被 macro eNB和 UE用 来计算保护 RRC消息的完整性保护密钥。所述完整性保护密钥由 macro eNB发给目标 local eNB。
根据本发明实施例, 当 macro eNB仅将部分用户面承载切换到目标 local eNB, 而将部分用户承载保留在 macro eNB时, macro eNB和 UE 也可以重新计算 macro eNB与 UE间的空口会话密钥, 例如包括加密密 钥和 RRC消息的完整性保护密钥。 macro eNB和 UE可按照现有方式, 也可以按照本发明实施例的上述方式生成空口会话密钥。 如果按照现有 方式生成空口会话密钥, 则 macro eNB和目标 local eNB所使用的空口 会话密钥不同, 如果按照本发明实施例的上述方式生成空口会话密钥, 则 macro eNB和目标 local eNB所使用的空口会话密钥相同。 当采用现 有方式时, 利用 KeNB或 NH, 并采用加密算法计算出加密密钥和 RRC 消息完整性保护密钥。 当采用本发明实施例的方式时, 利用 KeNB 或 NH、 随机数, 并采用加密算法计算出加密密钥和 RRC消息完整性保护 密钥。
在本发明实施例中, 加密算法可以是加密算法可以是: 高级加密标 准( Advanced Encryption Standard, AES)、 SNOW 3G、祖沖之算法( ZUC ) 等等。
在本发明实施例中, macro eNB生成的随机数可用其它能够唯一区 分 local eNB的信息代替, 比如, 全球基站标识, 或是 PCI ( Physical Cell Identifier, 物理层小区标识) +频率的组合, 等等。
根据本发明实施例, UE的全部用户面承载可以从 local eNB切换到 macro eNB。如图 8所示,一种可能的用户切换流程包括如下步骤 1~15。
1~2、 macro eNB对 UE进行测量配置, UE后继根据收到的测量配 置信息执行测量; UE在 macro eNB为 UE分配的上行资源上, 上报测 量结果, 该测量结果将用于辅助 macro eNB进行用户面切换判决。
3、 macro eNB进行用户面切换判决。若 macro eNB决定将 UE与 local eNB保持的用户面 7 载转移到该 macro eNB ,则 macro eNB生成随机数, 利用 KeNB或是最新的 NH (如果有)、 随机数以及加密算法计算出加密 密钥。
macro eNB将该加密密钥配置到本地与该 UE |载对应的 PDCP实 体, 用于 UE用户面切换完成后的 macro eNB和 UE之间的承载数据的 加密。
4、 macro eNB根据待接纳的承载的 QoS信息进行接纳判决, 并在 允许接纳该 UE的情况下, 进行底层配置以准备切换。
5-6、 macro eNB向该 local eNB发送用户面传输中止消息, 该 local eNB根据该消息中止向该 UE传输数据, 并向 macro eNB返回当前数据 发送的序列号状态信息。
7、 macro eNB向 UE发送用户面切换命令, 其中包含步骤 3中使用 的随机数以及用于指示是否需要计算 NH的参数 NCC。 UE接收到用户 面切换命令后, 停止在源 local eNB进行数据收发。
8、 UE收到用户面切换命令后, 利用用户面切换命令中的随机数和 自己保存的 KeNB以及加密算法计算出加密密钥。 如果用户面切换命令 中的 NCC指示需要使用 NH的话, UE利用用户面切换命令中的随机数 和 NH以及加密算法计算出加密密钥。 其中 UE侧所使用的加密算法与 macro eNB所使用的加密算法一致。之后, UE将计算出的加密密钥配置 到 PDCP实体使用, 然后向 macro eNB返回切换完成消息。
由于 UE的加密密钥改变了, 所以 UE还需要重建 PDCP/RLC/MAC 层。
通过以上流程实现了密钥隔离, 以下流程为切换过程的常规流程, 基本与现有技术中的切换流程类似, 筒述如下。
9、 macro eNB向 MME发起路径转换请求, 携带 macro eNB为各 UE EPS ( Evolved Packet System, 演进的分组系统) 载分配的下行用 户面传输层地址和 GTP隧道标识。
10、 MME请求 SGW承载修改请求, 将 macro eNB为各 UE EPS承 载分配的下行用户面传输层地址和 GTP隧道标识通知 SGW。
11 , SGW进行路径转换,将该 UE的下行数据传输路径转移到 macro eNB。
12、 SGW向 MME返回承载修改响应, 携带 SGW为各 UE EPS承 载分别分配的上行用户面传输层地址和 GTP隧道标识。
13、 MME向 macro eNB返回路径切换响应,携带 SGW为各 UE EPS 承载分别分配的上行用户面传输层地址和 GTP隧道标识;该消息中携带 一个新的密钥 NH和与之对应的计数器 NCC。
14、 macro eNB向源 local eNB发送终端上下文释放请求。
15、 源 local eNB根据该请求释放为切换 UE所分配的相关资源。 根据本发明实施例, 在步骤 8 中, UE可通过切换完成消息, 将从 macro eNB接收到的随机数返回给该 macro eNB。 macro eNB可将该切 换完成消息中携带的随机数与步骤 3中所使用的随机数进行比较, 若该 切换完成消息中携带的随机数与步骤 3中所使用的随机数一致, 则判决 该随机数没有被墓改, 若该切换完成消息中携带的随机数与步骤 3中所 使用的随机数不一致, 则认为该随机数被墓改。 为了保证通信安全, 若 macro eNB发现该随机数已经被墓改, 则可通知 RRC层释放与该 UE的 RRC连接。
根据本发明实施例,当源 local eNB在切换前存在部分 RRC功能时, 例如当源 local eNB具有图 4所示架构时, macro eNB需要将这部分控制 面 7 载切换到 macro eNB上, 并且前面所述的随机数也被 macro eNB和 UE用来计算保护 RRC消息的完整性保护密钥。
在本发明实施例中, macro eNB生成的随机数可用其它能够唯一区 分 macro eNB的信息代替,比如,全球基站标识,或是 PCI+频率的组合, 等等。
根据本发明实施例, UE的用户面承载从 macro eNB下的一个 local eNB切换到另一个 local eNB时的切换流程, 该流程与实施例一中 UE 从 macro eNB切换到 local eNB的流程类似, 额外的过程是 macro eNB 需要通知源 local eNB停止用户面数据转发,并删除与该 UE相关的密钥。
需要说明的是, 以上各实施例中, macro eNB在生成空口会话密钥 时, 由于目标 eNB的区别参数,如 macro eNB生成的随机数以及用户和 网络侧共享的临时密钥 (KeNB 或 NH )是主要参数, 因此上述各实施 例以此为例进行说明, 在具体实施时, 还可以在此基础上引入其它参数 参与空口会话密钥的计算。
本发明实施例还提供了一种应用于承载分离网络的基站设备, 例如 应用于控制面和用户面分离的网络的基站设备。
参见图 9, 为本发明实施例提供的基站设备的结构示意图。 根据本 发明实施例基站设备为宏基站设备。
如图所示, 该宏基站设备可包括: 切换判决模块 901、 密钥管理模 块 902、 密钥生成模块 903、 第一发送模块 905 , 进一步还可包括第二发 送模块 904。
切换判决模块 901用于对用户设备进行用户面承载切换判决。
密钥管理模块 902用于在切换判决模块 901判决对用户设备进行用 户面承载切换时, 向密钥生成模块 903发送生成密钥的指示, 并向第一 发送模块 905发送传输区别参数的指示。
密钥生成模块 903 , 用于按照密钥管理模块 902的指示, 根据目标 基站的区别参数, 以及该宏基站设备与所述用户设备共享的临时密钥, 生成所述目标基站与所述用户设备通信时使用的密钥。 该区别参数为所 述宏基站生成的随机数, 或者为能够唯一区分所述目标基站的信息。
第一发送模块 905 , 用于根据密钥管理模块 902的指示, 将所述区 别参数发送给所述用户设备, 以使所述用户设备根据所述区别参数以及 所述用户设备与所述宏基站共享的临时密钥, 生成所述用户设备与所述 目标基站通信时使用的密钥。
根据本发明实施例, 若切换判决模块 901判决将用户设备的用户面 7|载从本地基站切换到该宏基站时, 该目标基站可以是该宏基站。
根据本发明实施例, 目标基站可以是目标本地基站。
根据本发明实施例, 若切换判决模块 901判决将用户设备的用户面 承载从所述宏基站切换到目标本地基站, 或者判决将用户设备的用户面 承载从当前所在的本地基站切换到目标本地基站, 密钥管理模块 902还 用于向第二发送模块 904发送传输密钥的指示。 相应的, 第二发送模块 904用于根据所述密钥管理模块的指示, 将密钥生成模块 903生成的密 钥发送给所述目标本地基站。
根据本发明实施例, 若切换判决模块 901判决将用户设备的部分用 户面承载从所述宏基站切换到目标本地基站, 密钥管理模块 902还用于 指示密钥生成模块 903根据所述目标本地基站的区别参数, 以及所述宏 基站与所述用户设备共享的临时密钥, 生成所述宏基站与所述用户设备 通信时使用的密钥。 或者, 若切换判决模块 901判决将用户设备的部分 用户面承载从所述宏基站切换到目标本地基站, 密钥管理模块 902还用 于指示密钥生成模块 903根据所述宏基站与所述用户设备共享的临时密 钥, 生成所述宏基站与所述用户设备通信时使用的密钥。
根据本发明实施例,切换判决模块 901还用于进行控制面承载判决。 相应的, 若切换判决模块 901判决将所述用户设备的部分控制面承载从 宏基站切换到目标本地基站, 密钥管理模块 902具体用于指示密钥生成 模块 903生成加密密钥和完整性保护密钥; 或者, 若切换判决模块 901 判决将用户设备的用户面承载从本地基站切换到宏基站, 且在切换前, 所述本地基站上存在所述用户设备的部分控制面承载, 密钥管理模块 902具体用于指示密钥生成模块 903生成加密密钥和完整性保护密钥。 根据本发明实施例, 第二发送模块 904将生成的密钥携带于用户面 切换请求消息或预先定义的消息, 发送给所述目标本地基站。
根据本发明实施例, 第一发送模块 905将所述区别参数携带于用户 面切换命令发送给所述用户设备。
本发明实施例提供的方法和设备可以由硬件、 或计算机可读指令、 或者硬件和计算机可读指令的结合来实现。 本实施例中使用的计算机可 读指令由多个处理器存储在可读存储介质中, 例如硬盘、 CD-ROM、
DVD, 光盘、 软盘、 磁带、 RAM、 ROM或其它合适的存储设备。 或者, 至少部分计算机可读指令可以由具体硬件替换, 例如, 定制集成线路、 门阵列、 FPGA、 PLD和具体功能的计算机等等。
本发明实施例提供了计算机可读存储介质, 用于存储指令使得计算 机执行本文所述的方法。 具体地, 本实施例提供的系统或设备都具有存 储介质, 其中存储了计算机可读程序代码, 用于实现上述任意实施例的 功能, 并且这些系统或设备 (或 CPU或 MPU ) 能够读取并且执行存储 在存储介质中的程序代码。
在这种情况下, 从存储介质中读取的程序代码可以实现上述任一实 施例, 因此该程序代码和存储该程序代码的存储介质是技术方案的一部 分。
用于提供程序代码的存储介质包括软盘、 硬盘、 磁光盘、 光盘(例 如 CD-ROM、 CD-R, CD-RW、 DVD-ROM、 DVD-RAM、 DVD-RW, DVD+RW ), 磁盘、 闪存卡、 ROM等等。 可选地, 程序代码也可以通过 通信网络从 务器电脑上下载。
应该注意的是, 对于由计算机执行的程序代码, 至少部分由程序代 码实现的操作可以由运行在计算机上的操作系统实现, 从而实现上述任 一实施例的技术方案, 其中该计算机基于程序代码执行指令。 另外, 存储介质中的程序代码被被写入存储器, 其中, 该存储器位 于插入在计算机中的扩展板中, 或者位于连接到计算机的扩展单元中。 在本实施例中, 扩展板或扩展单元中的 CPU根据指令, 基于程序代码执 行至少部分操作, 从而实现上述任一实施例的技术方案。
以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域 的普通技术人员来说, 在不脱离本发明原理的前提下, 还可以做出若干 改进和润饰, 这些改进和润饰也应视本发明的保护范围。

Claims

权利要求书
1、 一种密钥隔离方法, 其特征在于, 该方法包括:
宏基站在判决对用户设备的用户面承载进行切换后, 根据目标基站 的区别参数, 以及所述宏基站与所述用户设备共享的临时密钥, 生成所 述目标基站与所述用户设备通信时使用的密钥;
所述宏基站将所述区别参数发送给所述用户设备, 以使所述用户设 备根据所述区别参数以及所述用户设备与所述宏基站共享的临时密钥, 生成所述用户设备与所述目标基站通信时使用的密钥。
2、如权利要求 1所述的方法, 其特征在于, 若所述宏基站判决将用 户设备的用户面承载从所述宏基站切换到所述目标本地基站, 或者判决 将用户设备的用户面承载从当前所在的本地基站切换到目标本地基站, 进一步包括:
将生成的密钥发送到所述目标本地基站。
3、如权利要求 1所述的方法, 其特征在于, 若所述宏基站判决将用 户设备的用户面承载从所述宏基站切换到所述目标本地基站, 或者判决 将用户设备的用户面承载从当前所在的本地基站切换到目标本地基站, 进一步包括:
将所述区别参数, 临时密钥和指示加密算法的信息发送给所述目标 本地基站。
4、如权利要求 2或 3所述的方法, 其特征在于, 若所述宏基站判决 将用户设备的部分用户面承载从所述宏基站切换到目标本地基站, 则该 方法还包括:
所述宏基站根据所述目标本地基站的区别参数, 以及所述宏基站与 所述用户设备共享的临时密钥, 生成所述宏基站与所述用户设备通信时 使用的密钥; 所述用户设备还将其生成的密钥用于与所述宏基站进行通 信的过程;
或者,所述宏基站根据所述宏基站与所述用户设备共享的临时密钥, 生成所述宏基站与所述用户设备通信时使用的密钥; 所述用户设备根据 所述用户设备与所述宏基站共享的临时密钥, 生成所述用户设备站与所 述宏基站通信时使用的密钥。
5、如权利要求 2或 3所述的方法, 其特征在于, 若所述宏基站还判 决将所述用户设备的部分控制面承载切换到目标本地基站, 则所述宏基 站所生成的密钥包括加密密钥和完整性保护密钥。
6、如权利要求 2所述的方法, 其特征在于, 所述宏基站将生成的密 钥携带于用户面切换请求消息或预先定义的消息, 发送给所述目标本地 基站。
7、如权利要求 3所述的方法, 其特征在于, 所述宏基站将所述区别 参数, 临时密钥和指示加密算法的信息携带于用户面切换请求消息或预 先定义的消息, 发送给所述目标本地基站。
8、如权利要求 1所述的方法, 其特征在于, 若所述宏基站判决将所 述用户设备的用户面承载从本地基站切换到所述宏基站, 且在切换前, 所述本地基站上存在所述用户设备的部分控制面承载, 则所述宏基站还 将该部分控制面承载切换到所述宏基站上, 所述宏基站所生成的密钥包 括加密密钥和完整性保护密钥。
9、 如权利要求 1-8之一所述的方法, 其特征在于, 所述宏基站将所 述区别参数携带于用户面切换命令发送给所述用户设备。
10、 如权利要求 1-8之一所述的方法, 其特征在于, 所述区别参数 为所述宏基站生成的随机数, 或者为能够唯一区分所述目标基站的信 息。
11、 一种宏基站设备, 其特征在于, 包括: 切换判决模块、 密钥管 理模块、 密钥生成模块和第一发送模块, 其中:
切换判决模块, 用于对用户设备进行用户面承载切换判决; 密钥管理模块, 用于在所述切换判决模块判决对用户设备进行用户 面承载切换时, 向所述密钥生成模块发送生成密钥的指示, 并向所述第 一发送模块发送传输所述区别参数的指示;
密钥生成模块, 用于按照所述密钥管理模块的指示, 根据目标基站 的区别参数, 以及所述宏基站设备与所述用户设备共享的临时密钥, 生 成所述目标基站与所述用户设备通信时使用的密钥;
第一发送模块, 用于根据所述密钥管理模块的指示, 将所述区别参 数发送给所述用户设备, 以使所述用户设备根据所述区别参数以及所述 用户设备与所述宏基站共享的临时密钥, 生成所述用户设备与所述目标 基站通信时使用的密钥。
12、 如权利要求 11所述的设备, 其特征在于, 所述目标基站是目标 本地基站;
若所述切换判决模块判决将用户设备的用户面承载从所述宏基站切 换到目标本地基站, 或者若所述切换判决模块判决将用户设备的用户面 承载从当前所在的本地基站切换到目标本地基站, 所述宏基站设备还包 括第二发送模块;
所述密钥管理模块还用于向第二发送模块发送传输密钥的指示; 所述第二发送模块用于根据所述密钥管理模块的指示, 将所述密钥 生成模块生成的密钥发送给所述目标本地基站。
13、 如权利要求 11所述的设备, 其特征在于, 所述目标基站是目标 本地基站;
若所述切换判决模块判决将用户设备的用户面承载从所述宏基站切 换到目标本地基站, 或者若所述切换判决模块判决将用户设备的用户面 承载从当前所在的本地基站切换到目标本地基站, 所述宏基站设备还包 括第二发送模块;
所述密钥管理模块还用于向第二发送模块发送传输密钥的指示; 所述第二发送模块用于根据所述密钥管理模块的指示, 将所述区别 参数, 临时密钥和指示加密算法的信息发送给所述目标本地基站。
14、 如权利要求 12或 13所述的设备, 其特征在于, 若所述切换判 决模块判决将用户设备的部分用户面承载从所述宏基站切换到目标本 地基站, 所述密钥管理模块还用于指示所述密钥生成模块根据用于将所 述目标本地基站的区别参数, 以及所述宏基站设备与所述用户设备共享 的临时密钥, 生成所述宏基站与所述用户设备通信时使用的密钥; 或者, 若所述切换判决模块判决将用户设备的部分用户面承载从所 述宏基站切换到目标本地基站, 所述密钥管理模块还用于指示所述密钥 生成模块根据所述宏基站设备与所述用户设备共享的临时密钥, 生成所 述宏基站设备与所述用户设备通信时使用的密钥。
15、 如权利要求 12或 13所述的设备, 其特征在于, 所述切换判决 模块还用于进行控制面承载判决;
若所述切换判决模块判决将所述用户设备的部分控制面承载从宏基 站切换到目标本地基站, 所述密钥管理模块具体用于指示所述密钥生成 模块生成加密密钥和完整性保护密钥。
16、 如权利要求 11所述的设备, 其特征在于, 所述切换判决模块还 用于进行控制面承载判决;
若所述切换判决模块判决将用户设备的用户面承载从本地基站切换 到宏基站, 且在切换前, 所述本地基站上存在所述用户设备的部分控制 面承载, 所述密钥管理模块具体用于指示所述密钥生成模块生成加密密 钥和完整性保护密钥。
17、如权利要求 12所述的设备, 其特征在于, 所述第二发送模块具 体用于将所述生成的密钥携带于用户面切换请求消息或预先定义的消 息, 发送给所述目标本地基站。
18、如权利要求 13所述的设备, 其特征在于, 所述第二发送模块具 体用于将所述生成的密钥携带于用户面切换请求消息或预先定义的消 息, 发送给所述目标本地基站。
19、 如权利要求 11-18之一所述的设备, 其特征在于, 所述第一发 送模块具体用于, 将所述区别参数携带于用户面切换命令发送给所述用 户设备。
20、 如权利要求 11-18之一所述的设备, 其特征在于, 所述区别参 数为所述宏基站生成的随机数, 或者为能够唯一区分所述目标基站的信 息。
PCT/CN2013/083165 2012-09-13 2013-09-10 密钥隔离方法及设备 Ceased WO2014040518A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/421,442 US9473933B2 (en) 2012-09-13 2013-09-10 Key isolation method and device
EP13836407.0A EP2897398B1 (en) 2012-09-13 2013-09-10 Key isolation method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210338194.7 2012-09-13
CN201210338194.7A CN103686708B (zh) 2012-09-13 2012-09-13 一种密钥隔离方法及设备

Publications (1)

Publication Number Publication Date
WO2014040518A1 true WO2014040518A1 (zh) 2014-03-20

Family

ID=50277616

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/083165 Ceased WO2014040518A1 (zh) 2012-09-13 2013-09-10 密钥隔离方法及设备

Country Status (4)

Country Link
US (1) US9473933B2 (zh)
EP (1) EP2897398B1 (zh)
CN (1) CN103686708B (zh)
WO (1) WO2014040518A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017067329A1 (zh) * 2015-10-20 2017-04-27 上海斐讯数据通信技术有限公司 一种基于app控制的无线网络认证方法及系统
CN111817836A (zh) * 2014-03-26 2020-10-23 三星电子株式会社 用于无线通信系统中的载波聚合通信的方法和装置
EP3917031A1 (en) * 2014-03-26 2021-12-01 Samsung Electronics Co., Ltd. Method and apparatus for carrier aggregation communication in wireless communication system

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277874B (zh) 2013-11-22 2019-12-17 索尼公司 通信系统中的电子装置和通信方法、计算机可读存储介质
CN103929297B (zh) * 2014-04-17 2017-05-17 福建联迪商用设备有限公司 一种pos和移动终端通信方法、加密方法和装置及一种pos
US10362011B2 (en) 2015-07-12 2019-07-23 Qualcomm Incorporated Network security architecture
US9883385B2 (en) * 2015-09-15 2018-01-30 Qualcomm Incorporated Apparatus and method for mobility procedure involving mobility management entity relocation
CN105592512B (zh) * 2016-03-08 2019-04-09 中国联合网络通信集团有限公司 Rrc连接建立方法、终端和基站
CN108282781A (zh) * 2017-01-06 2018-07-13 中兴通讯股份有限公司 移动过程中的数据传输的方法、终端和基站
CN108668281B (zh) * 2017-03-31 2021-07-09 华为技术有限公司 一种通信方法、相关设备及系统
US11071021B2 (en) * 2017-07-28 2021-07-20 Qualcomm Incorporated Security key derivation for handover
CN109413005A (zh) * 2017-08-17 2019-03-01 中兴通讯股份有限公司 数据流传输安全控制方法及装置
US10979902B2 (en) * 2018-10-15 2021-04-13 Wipro Limited Method and system for securing user plane communication between user equipments and evolved NodeBs

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090054063A1 (en) * 2004-01-20 2009-02-26 M-Stack Limited Apparatus and method for taking measurements in universal mobile telecommunications systems user equipment
CN101552983A (zh) * 2008-04-01 2009-10-07 华为技术有限公司 密钥生成方法、密钥生成装置、移动管理实体与用户设备
CN102056157A (zh) * 2009-11-04 2011-05-11 大唐移动通信设备有限公司 一种确定密钥和密文的方法、系统及装置

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101689922B (zh) * 2007-06-18 2013-03-20 Lg电子株式会社 切换中的下行链路分组数据汇聚协议行为
CN101897210B (zh) * 2007-12-11 2014-05-28 爱立信电话股份有限公司 生成蜂窝无线电系统中的无线电基站密钥的方法和设备
CN101616408B (zh) * 2008-06-23 2012-04-18 华为技术有限公司 密钥衍生方法、设备及系统
JP4505528B2 (ja) * 2008-09-22 2010-07-21 株式会社エヌ・ティ・ティ・ドコモ 移動通信方法
US20120213346A1 (en) * 2009-02-04 2012-08-23 Huawei Device Co.,Ltd. Method, server and terminal device for playing multimedia ring tone during call
CN101931950B (zh) * 2009-06-19 2014-02-05 电信科学技术研究院 切换时的密钥获取方法、系统和设备
CN102056160B (zh) * 2009-11-03 2013-10-09 华为技术有限公司 一种密钥生成的方法、装置和系统
EP4009733A1 (en) 2010-02-12 2022-06-08 InterDigital Technology Corporation Data split between multiple sites
CN102340772B (zh) * 2010-07-15 2014-04-16 华为技术有限公司 切换过程中的安全处理方法、装置和系统
CN102480755A (zh) * 2010-11-24 2012-05-30 北京三星通信技术研究有限公司 向Femtocell进行激活切换的方法及适用于该方法的位置信息服务器
CN102065424A (zh) * 2011-01-11 2011-05-18 大唐移动通信设备有限公司 一种安全隔离的方法和设备
CN103517356B (zh) * 2012-06-28 2017-04-05 电信科学技术研究院 一种进行切换的方法、系统和设备
GB2506917B (en) * 2012-10-12 2015-06-03 Samsung Electronics Co Ltd Re-establishment of a connection with a mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090054063A1 (en) * 2004-01-20 2009-02-26 M-Stack Limited Apparatus and method for taking measurements in universal mobile telecommunications systems user equipment
CN101552983A (zh) * 2008-04-01 2009-10-07 华为技术有限公司 密钥生成方法、密钥生成装置、移动管理实体与用户设备
CN102056157A (zh) * 2009-11-04 2011-05-11 大唐移动通信设备有限公司 一种确定密钥和密文的方法、系统及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2897398A4 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111817836A (zh) * 2014-03-26 2020-10-23 三星电子株式会社 用于无线通信系统中的载波聚合通信的方法和装置
EP3917031A1 (en) * 2014-03-26 2021-12-01 Samsung Electronics Co., Ltd. Method and apparatus for carrier aggregation communication in wireless communication system
CN111817836B (zh) * 2014-03-26 2022-12-09 三星电子株式会社 用于无线通信系统中的载波聚合通信的方法和装置
EP4170930A1 (en) * 2014-03-26 2023-04-26 Samsung Electronics Co., Ltd. Method and apparatus for carrier aggregation communication in wireless communication system
EP4311128A1 (en) * 2014-03-26 2024-01-24 Samsung Electronics Co., Ltd. Method and apparatus for carrier aggregation communication in wireless communication system
US12526719B2 (en) 2014-03-26 2026-01-13 Samsung Electronics Co., Ltd. Method and apparatus for carrier aggregation communication in wireless communication system
WO2017067329A1 (zh) * 2015-10-20 2017-04-27 上海斐讯数据通信技术有限公司 一种基于app控制的无线网络认证方法及系统

Also Published As

Publication number Publication date
US20150223058A1 (en) 2015-08-06
EP2897398A1 (en) 2015-07-22
EP2897398B1 (en) 2017-05-03
US9473933B2 (en) 2016-10-18
CN103686708A (zh) 2014-03-26
EP2897398A4 (en) 2016-01-13
CN103686708B (zh) 2018-01-19

Similar Documents

Publication Publication Date Title
WO2014040518A1 (zh) 密钥隔离方法及设备
JP5142417B2 (ja) リンク障害復旧のためのハンドオーバー方法とこの方法を具現するための無線機器及び基地局
EP2995164B1 (en) Packet data transfer re-establishment
CN113873509B (zh) 用于支持双连接的pdcp分布式结构的安全密钥生成和管理方法
CN109088714B (zh) 用于传递安全密钥信息的系统和方法
CN110035054B (zh) 用于使能用于enb间的传输的安全通信的方法和系统
CN109315008B (zh) 多连接通信方法和设备
EP3461216B1 (en) Multi-connection communication method and device
US20230403617A1 (en) Managing integrated access and backhaul mobility
US20090285176A1 (en) Framework for internetworking between wman and wlan networks
US20240031893A1 (en) Managing ue connections after network topology change
CN104969592A (zh) 无线通信网络中用户设备的双连通操作模式
WO2013185579A1 (zh) 一种密钥更新方法、装置及系统
WO2015158060A1 (zh) 一种双连接架构下的csg接入控制方法及系统
JP2012080318A (ja) 移動通信システム、通信制御方法及び無線基地局
WO2014173359A1 (zh) 一种切换方法、基站、载波聚合系统、存储介质
WO2015161575A1 (zh) 用户终端位置上报方法、基站、移动管理实体及系统
WO2016061785A1 (zh) 无线资源控制rrc连接方法、重连接方法和装置
TWI503016B (zh) A method for performing handover, the system and apparatus
WO2014205772A1 (zh) 一种无线网络的建立方法、设备及系统
WO2013087010A1 (zh) 在通信系统中生成接入层密钥的方法及其设备
WO2012094958A1 (zh) 一种安全隔离的方法和设备
CN113225784A (zh) 消息的识别方法和装置
WO2015154345A1 (zh) 一种封闭成员组身份状态更新的方法、系统及基站
WO2012116599A1 (zh) 安全隧道建立方法和基站

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13836407

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14421442

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2013836407

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013836407

Country of ref document: EP