[go: up one dir, main page]

WO2016011588A1 - 移动管理实体、归属服务器、终端、身份认证系统和方法 - Google Patents

移动管理实体、归属服务器、终端、身份认证系统和方法 Download PDF

Info

Publication number
WO2016011588A1
WO2016011588A1 PCT/CN2014/082656 CN2014082656W WO2016011588A1 WO 2016011588 A1 WO2016011588 A1 WO 2016011588A1 CN 2014082656 W CN2014082656 W CN 2014082656W WO 2016011588 A1 WO2016011588 A1 WO 2016011588A1
Authority
WO
WIPO (PCT)
Prior art keywords
management entity
mobility management
encryption key
terminal
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2014/082656
Other languages
English (en)
French (fr)
Inventor
钟焰涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201480080618.1A priority Critical patent/CN106576237B/zh
Priority to PCT/CN2014/082656 priority patent/WO2016011588A1/zh
Priority to US15/327,597 priority patent/US20170201884A1/en
Priority to EP14898188.9A priority patent/EP3174324A4/en
Publication of WO2016011588A1 publication Critical patent/WO2016011588A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Definitions

  • Mobile management entity home server, terminal, identity authentication system and method
  • the present invention relates to the field of terminal technologies, and in particular, to a mobility management entity, a home server, a terminal, an identity authentication system, and an identity authentication method. Background technique
  • AKA Authentication and Key Agreement
  • EPS-AK Evolved Packet System
  • an intermediate key K ASME is generated between the UE (User Equipment) and the MME (Mobility Management Entity), and then the UE and the MME according to the key K.
  • the ASME performs the authentication process as shown in Figure 2.
  • the MME allocates a temporary GUTI (Globally Unique Temporary UE Identity) code to the UE, and maintains the GUTI code and the IMSI of the UE ( The mapping relationship between the codes of the International Mobile Subscriber Identity (International Mobile Subscriber Identity), so that the MME can make a call to the UE through the unique identifier GUTI code of the user, and track the user by tracking the IMSI code.
  • GUTI Globally Unique Temporary UE Identity
  • the MME may mistakenly consider the mapping relationship between the lost GUTI code and the IMSI of the user UE (for example, the UE returns an incorrect RES, and the UE does not verify the MAC parameter separated by the AUTH parameter sent by the MME to the UE. If the return information with MAC failure is returned correctly or the UE returns the reject information with non-EPS authentication unacceptable due to the incorrect value of one of the AMF parameters sent by the MME, the MME requests the UE to explicitly use the message.
  • the IMSI code is sent to itself to redistribute the GUTI code.
  • the identity authentication process shown in Figure 3 may be exploited by an attacker.
  • the attacker can transmit a strong signal through the pseudo base station, flood the signal of the legal base station, and initiate the signal with the pseudo base station signal.
  • the identity authentication process shown in Figure 3 forces the UE to send the IMSI code to the pseudo base station in clear text, thereby obtaining the user's IMSI code and illegally utilizing the user's private information, which poses a great threat to the user's privacy.
  • the present invention is based on the above problems, and proposes a new technical solution, which can effectively improve the security of the IMSI code sent by the UE, and ensure that only the legitimate base station and the legal MME can complete the identity authentication process and obtain the IMSI code.
  • an aspect of the present invention provides a mobility management entity, including: a sending unit, when detecting that a mapping relationship between a global unique temporary terminal identifier and an international mobile subscriber identity is lost, sending an identity authentication request and encrypting a key and a digital certificate corresponding to the encryption key to the terminal, for the terminal to verify the mobility management entity according to the digital certificate, and when the verification is passed, the terminal uses the encryption key Encrypting the international mobile subscriber identity code and transmitting the encrypted international mobile subscriber identity to the mobile management entity; receiving unit, receiving the encrypted international mobile subscriber identity code sent by the terminal; The stored decryption key corresponding to the encryption key decrypts the encrypted international mobile subscriber identity.
  • the mobility management entity sends an identity authentication request to the terminal, and the terminal can ensure the mobility management entity by using the encryption key and the digital certificate corresponding to the encryption key.
  • Legitimacy preventing the intrusion of the illegal mobile management entity, and at the same time, by encrypting the international mobile subscriber identity, it can be ensured that only the legitimate mobile management entity having the decryption key corresponding to the encryption key can use the international Mobile user identification, and the illegal mobile management entity cannot use the international mobile subscriber identity even if the international mobile subscriber identity is obtained, so that the international mobile subscriber identity cannot be used effectively, thereby effectively improving user information security.
  • the encryption key and the encryption key may correspond to a public key and a private key, that is, encrypted by a public key, and decrypted by a private key corresponding to the public key during decryption.
  • a public key and a private key that is, encrypted by a public key, and decrypted by a private key corresponding to the public key during decryption.
  • the encryption method of the present application includes, but is not limited to, public key encryption, and may also be implemented by other existing encryption methods.
  • the method further includes: a key generation unit, when the mobility management entity first accesses the network, generating an encryption key and a decryption key corresponding to the encryption key; The encryption key and a decryption key corresponding to the encryption key.
  • each mobility management entity corresponds to a pair of encryption keys and decryption keys, and each pair of encryption keys and the decryption key correspond, the terminal can be given to the mobility management entity.
  • the international mobile subscriber identity is sent, the international mobile subscriber identity is encrypted to ensure that only the legitimate mobile management entity having the decryption key corresponding to the encryption key can use the international mobile subscriber identity, which is beneficial to the enhanced The international mobile users know the security of the other 'J code.
  • the sending unit is further configured to: send the encryption key and entity identity information of the mobility management entity to a home subscriber manager, where the home subscriber manager The identity of the mobility management entity is verified, and when the verification is passed, a digital certificate corresponding to the encryption key is generated and sent to the mobility management entity;
  • the receiving unit is further configured to: receive, send, by the home subscriber manager The digital certificate corresponding to the encryption key.
  • the digital certificate corresponding to the encryption key may be used by the terminal to verify whether the mobile management entity is legal according to the data certificate, so as to prevent the illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • the method further includes: the processing unit stops the verification when receiving the information of the termination verification sent by the terminal.
  • a home server including: a receiving unit, receiving an encryption key sent by a mobility management entity and entity identity information of the mobility management entity; a verification unit, according to the encryption key and the The entity identity information of the mobility management entity verifies the identity of the mobility management entity; the generating unit, when the verification is passed, generates the encryption key Corresponding digital certificate; sending unit, sending the digital certificate to the mobile management entity.
  • the digital certificate corresponding to the encryption key may be used by the terminal to verify whether the mobile management entity is legal according to the data certificate, so as to prevent the illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • a further aspect of the present invention provides a terminal, comprising: a receiving unit, receiving an identity authentication request, an encryption key, and a digital certificate sent by the mobility management entity; and a verification unit, according to the identity authentication request, to the mobile The digital certificate of the management entity is verified; the encryption unit encrypts the international mobile subscriber identity code in the terminal by using the encryption key sent by the mobility management entity to obtain encryption when the digital certificate verification is passed a subsequent international mobile subscriber identity; the sending unit, transmitting the encrypted international mobile subscriber identity to the mobility management entity.
  • the legitimacy of the mobility management entity can be ensured, and the international mobile subscriber identity can be further ensured by encrypting the international mobile subscriber identity.
  • the security ensures that only the legitimate mobile management entity can use the international mobile subscriber identity.
  • the encryption unit includes: an obtaining unit, when the digital certificate verification is passed, acquiring a national mobile subscriber identity code in the terminal; and a calculating unit, according to the encryption key and the pre- The encryption function is configured to calculate the international mobile subscriber identity to obtain an encrypted international mobile subscriber identity.
  • the method further includes: the processing unit, when the digital certificate verification fails, stops the verification, and sends the information for terminating the verification to the mobility management entity.
  • the terminal when the digital certificate verification fails, the terminal has determined that the mobility management entity is illegal, the terminal stops the verification, and sends the information of terminating the verification to the mobility management entity, so that The mobility management entity stops transmitting a digital certificate verification request to the terminal.
  • a further aspect of the present invention provides an identity authentication method for an identity authentication system, where the identity authentication system includes a mobility management entity, a terminal, and a home server, including: the mobility management entity detecting a global unique temporary terminal identifier Transmitting an identity authentication request, an encryption key, and a digital certificate corresponding to the encryption key to the terminal when the mapping relationship with the international mobile subscriber identity is lost; the terminal receiving the identity sent by the mobility management entity Certification please And verifying, by the mobile management entity, the digital certificate according to the identity authentication request, and verifying, by the mobile management entity, the Encrypting an international mobile subscriber identity code in the terminal, and transmitting the encrypted international mobile subscriber identity to the mobility management entity; the mobility management entity corresponding to the stored encryption key The decryption key decrypts the encrypted international mobile subscriber identity.
  • the mobility management entity sends an identity authentication request to the terminal, and the terminal can ensure the legitimacy of the mobility management entity and prevent the intrusion of the illegal mobile management entity by verifying the encryption key and the digital certificate corresponding to the encryption key.
  • the terminal can ensure the legitimacy of the mobility management entity and prevent the intrusion of the illegal mobile management entity by verifying the encryption key and the digital certificate corresponding to the encryption key.
  • the illegal mobile management entity obtains the The international mobile subscriber identity cannot use the international mobile subscriber identity because there is no corresponding decryption key. Therefore, this can effectively improve the security of the user information and prevent the illegal MME from stealing the user's international mobile subscriber identity.
  • the method further includes: the mobility management entity transmitting the encryption key and entity identity information of the mobility management entity to the home subscriber manager; the home subscriber manager receiving the mobile An encryption key sent by the management entity and entity identity information of the mobility management entity, and authenticating the identity of the mobility management entity according to the encryption key and entity identity information of the mobility management entity;
  • the home subscriber manager When the authentication of the management entity passes, the home subscriber manager generates a digital certificate corresponding to the encryption key, and sends the digital certificate to the mobility management entity; the mobility management entity receives the home subscriber management The digital certificate corresponding to the encryption key sent by the device.
  • the terminal may be configured to verify, according to the data certificate, whether the mobility management entity is legal, Prevents an illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • the method further includes: when the mobile management entity accesses the network for the first time, generating an encryption key and a decryption key corresponding to the encryption key, and storing the encryption key and The decryption key corresponding to the encryption key.
  • each mobility management entity corresponds to a pair of encryption keys and a decryption key, and each pair of encryption keys and the decryption key correspond, the terminal can be given When the mobile management entity sends the international mobile subscriber identity code, the international mobile subscriber identity code is encrypted to ensure that only the legal mobile mobility management entity having the decryption key corresponding to the encryption key can use the international mobile subscriber identity code. It is beneficial to enhance the security of the international mobile user to recognize the other 'J code.
  • the terminal encrypts the international mobile subscriber identity code in the terminal by using the encryption key sent by the mobility management entity, specifically including And: when the digital certificate is verified, the terminal acquires a national mobile subscriber identity, and calculates the international mobile subscriber identity according to the encryption key and a preset encryption function to obtain an encrypted international Mobile user ID.
  • the method further includes: when the digital certificate verification fails, the terminal stops verifying, and sends information for terminating verification to the mobility management entity; the mobile management entity receives the location When the information about the termination verification sent by the terminal is described, the verification is stopped.
  • the mobile management entity corresponding to the digital certificate is illegal, and the terminal stops the verification, and sends a stop verification signal to the mobility management entity. So that the mobility management entity stops sending a digital certificate insurance request to the terminal.
  • FIG. 1 is a schematic flow chart showing the authentication and key agreement in the related art
  • FIG. 2 is a schematic flow chart of performing authentication and key agreement using K ASME in the related art.
  • FIG. 3 is a schematic flow chart showing the process of issuing a digital certificate for a mobile management entity in the related art.
  • FIG. 5 is a schematic structural diagram of a home server according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention
  • FIG. 7 is a block diagram showing the structure of an identity authentication system according to an embodiment of the present invention.
  • FIG. 8 is a flow chart showing an identity authentication method according to an embodiment of the present invention.
  • FIG. 9 is a flow chart showing an identity authentication method according to another embodiment of the present invention. detailed description
  • the mobility management entity 400 includes: a sending unit 402, when detecting that a mapping relationship between a global unique temporary terminal identifier and an international mobile subscriber identity is lost, sending an identity authentication request And an encryption key and a digital certificate corresponding to the encryption key to the terminal, where the terminal verifies the mobile management entity according to the digital certificate, and when the verification passes, the terminal uses the encryption
  • the key encrypts the international mobile subscriber identity code and sends the encrypted international mobile subscriber identity to the mobile management entity
  • the receiving unit 404 receives the encrypted international mobile subscriber identity code sent by the terminal
  • the unit 406 decrypts the encrypted international mobile subscriber identity based on the stored decryption key corresponding to the encryption key.
  • the mobility management entity sends an identity authentication request to the terminal, and the terminal can ensure the legitimacy of the mobility management entity and prevent the intrusion of the illegal mobile management entity by verifying the encryption key and the digital certificate corresponding to the encryption key.
  • the terminal can ensure the legitimacy of the mobility management entity and prevent the intrusion of the illegal mobile management entity by verifying the encryption key and the digital certificate corresponding to the encryption key.
  • the illegal mobile management entity obtains international Mobile user identification, because there is no corresponding decryption key, and international mobile subscriber identification cannot be used. Therefore, this can effectively improve the security of user information and prevent illegal The MME steals the user's international mobile subscriber identity.
  • the encryption key and the encryption key may correspond to a public key and a private key, that is, encrypted by a public key, and decrypted by a private key corresponding to the public key during decryption.
  • a public key and a private key that is, encrypted by a public key, and decrypted by a private key corresponding to the public key during decryption.
  • the encryption method of the present application includes, but is not limited to, public key encryption, and may be implemented by other existing encryption methods.
  • the method further includes: a key generating unit 408, when the mobility management entity first accesses the network, generating an encryption key and a decryption key corresponding to the encryption key; The encryption key and a decryption key corresponding to the encryption key are stored.
  • each mobility management entity corresponds to a pair of encryption keys and decryption keys, and each pair of encryption keys and the decryption key correspond, the terminal can be given to the mobility management entity.
  • the international mobile subscriber identity is sent, the international mobile subscriber identity is encrypted to ensure that only the legitimate mobile management entity having the decryption key corresponding to the encryption key can use the international mobile subscriber identity, which is beneficial to the enhanced The international mobile users know the security of the other 'J code.
  • the sending unit 402 is further configured to: send the encryption key and entity identity information of the mobility management entity to a home subscriber manager, where the home subscriber manager is The identity of the mobility management entity is verified, and when the verification is passed, a digital certificate corresponding to the encryption key is generated and sent to the mobility management entity;
  • the receiving unit 404 is further configured to: receive the home subscriber management The digital certificate corresponding to the encryption key sent by the device.
  • the digital certificate corresponding to the encryption key may be used by the terminal to verify whether the mobile management entity is legal according to the data certificate, so as to prevent the illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • the processing unit 412 further stops the verification when receiving the information of the termination verification sent by the terminal.
  • FIG. 5 shows a schematic structural diagram of a home server according to an embodiment of the present invention.
  • the home server 500 includes: a receiving unit 502, which receives an encryption key sent by a mobility management entity and a physical body of the mobility management entity.
  • the verification unit 504 verifying the identity of the mobility management entity according to the encryption key and the entity identity information of the mobility management entity; and generating unit 506, when the verification is passed, generating the encryption key Corresponding digital certificate; sending unit 508, sending the digital certificate to the mobility management entity.
  • the digital certificate corresponding to the encryption key may be used by the terminal to verify whether the mobile management entity is legal according to the data certificate, so as to prevent the illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • FIG. 6 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal 600 includes: a receiving unit 602, receiving an identity authentication request, an encryption key, and a digital certificate sent by the mobility management entity; and a verification unit 604, according to the identity authentication.
  • Requesting verifying the digital certificate of the mobility management entity; the encryption unit 606, when the digital certificate verification is passed, identifying the international mobile subscriber in the terminal by using the encryption key sent by the mobility management entity
  • the code is encrypted to obtain an encrypted international mobile subscriber identity; the transmitting unit 608 transmits the encrypted international mobile subscriber identity to the mobility management entity.
  • the legitimacy of the mobility management entity can be ensured, and the international mobile subscriber identity can be further ensured by encrypting the international mobile subscriber identity.
  • the security ensures that only the legitimate mobile management entity can use the international mobile subscriber identity.
  • the encryption unit 606 includes: an obtaining unit 6062, when the digital certificate verification is passed, acquiring a national mobile subscriber identity code in the terminal; and calculating unit 6064, according to the encryption key
  • the key and the preset encryption function calculate the international mobile subscriber identity to obtain an encrypted international mobile subscriber identity.
  • the method further includes: the processing unit 610, when the digital certificate verification fails, stops the verification, and sends the information of terminating the verification to the mobility management entity.
  • the terminal when the digital certificate verification fails, the terminal has determined that the mobility management entity is illegal, the terminal stops the verification, and sends the information of terminating the verification to the mobility management entity, so that The mobility management entity stops sending digital certificates to the terminal Book verification request.
  • FIG. 7 shows a schematic structural diagram of an identity authentication system according to an embodiment of the present invention.
  • an identity authentication system includes: a mobility management entity 400, a home server 500, and a terminal 600.
  • the home server 500 is configured to verify the identity of the mobility management entity 400, and when the identity verification of the mobility management entity 400 is successful, issue a digital certificate to the mobility management entity 400;
  • the mobility management entity 400 is configured to send an identity authentication request, an encryption key, and a digital certificate issued by the home server 500 to the terminal 600 when detecting that the mapping relationship between the global unique temporary terminal identifier and the international mobile subscriber identity is lost;
  • the terminal 600 is configured to verify the mobility management entity 400 according to the digital certificate, and when the verification is passed, the terminal 600 encrypts the international mobile subscriber identity using the encryption key and encrypts the encrypted An international mobile subscriber identity is sent to the mobility management entity 400.
  • FIG. 8 shows a flow chart of an identity authentication method according to an embodiment of the present invention.
  • the flow of the identity authentication method includes: Step 802: When the mobility management entity detects that the mapping relationship between the global unique temporary terminal identifier and the international mobile subscriber identity is lost, And sending an identity authentication request, an encryption key, and a digital certificate corresponding to the encryption key to the terminal; Step 804, the terminal receiving an identity authentication request, an encryption key, and a digital certificate sent by the mobility management entity, And verifying, by the identity authentication request, the digital certificate of the mobility management entity; Step 806, when the digital certificate is verified, the terminal sends the encryption key to the The international mobile subscriber identity code in the terminal is encrypted, and the encrypted international mobile subscriber identity code is sent to the mobility management entity.
  • Step 808 The mobility management entity performs decryption according to the stored encryption key corresponding to the encryption key. The key decrypts the encrypted international mobile user to identify another 'J code.
  • the mobility management entity sends an identity authentication request to the terminal, and the terminal can ensure the location by verifying the encryption key and a digital certificate corresponding to the encryption key. Describe the legitimacy of the mobile management entity to prevent the intrusion of the illegal mobile management entity.
  • the international mobile subscriber identity by encrypting the international mobile subscriber identity, it can guarantee only A legitimate mobile management entity having a decryption key corresponding to the encryption key can use the international mobile subscriber identity, and an illegal mobile management entity obtains the international mobile subscriber identity, because there is no corresponding decryption secret.
  • the key cannot be used for the international mobile subscriber identity. Therefore, this can effectively improve the security of the user information and prevent the illegal MME from stealing the user's international mobile subscriber identity.
  • the method further includes: the mobility management entity transmitting the encryption key and entity identity information of the mobility management entity to the home subscriber manager; the home subscriber manager receiving the mobile An encryption key sent by the management entity and entity identity information of the mobility management entity, and authenticating the identity of the mobility management entity according to the encryption key and entity identity information of the mobility management entity;
  • the home subscriber manager When the authentication of the management entity passes, the home subscriber manager generates a digital certificate corresponding to the encryption key, and sends the digital certificate to the mobility management entity; the mobility management entity receives the home subscriber management The digital certificate corresponding to the encryption key sent by the device.
  • the terminal may be configured to verify, according to the data certificate, whether the mobility management entity is legal, Prevents an illegal mobile management entity from stealing the international mobile subscriber identity of the terminal.
  • the method further includes: when the mobile management entity accesses the network for the first time, generating an encryption key and a decryption key corresponding to the encryption key, and storing the encryption key and The decryption key corresponding to the encryption key.
  • each mobility management entity corresponds to a pair of encryption keys and decryption keys, and each pair of encryption keys and the decryption key correspond, the terminal can be given to the mobility management entity.
  • the international mobile subscriber identity is sent, the international mobile subscriber identity is encrypted to ensure that only the legitimate mobile management entity having the decryption key corresponding to the encryption key can use the international mobile subscriber identity, which is beneficial to the enhanced The international mobile users know the security of the other 'J code.
  • the terminal when the digital certificate verification is passed, the terminal encrypts the international mobile subscriber identity code in the terminal by using the encryption key sent by the mobility management entity, specifically including And: when the digital certificate is verified, the terminal acquires a national mobile subscriber identity, and calculates the international mobile subscriber identity according to the encryption key and a preset encryption function to obtain an encrypted international Mobile user ID.
  • the method further includes: when the digital certificate verification fails, the terminal stops verifying, and sends information for terminating verification to the mobility management entity; the mobile management entity receives the location When the information about the termination verification sent by the terminal is described, the verification is stopped.
  • the mobile management entity corresponding to the digital certificate is illegal, and the terminal stops the verification, and sends a stop verification signal to the mobility management entity. So that the mobility management entity stops sending a digital certificate insurance request to the terminal.
  • FIG. 9 is a flow chart showing an identity authentication method in accordance with another embodiment of the present invention.
  • a flow of an identity authentication method according to another embodiment of the present invention includes:
  • Step 902 The MME (Mobility Management Entity) initiates an identity authentication request to the UE (terminal).
  • MME Mobility Management Entity
  • Step 904 After the UE responds to the identity authentication request of the MME, the MME sends the encryption key and the certificate cert to the UE.
  • Step 906 The UE starts to verify the correctness of the MME encryption key and the certificate cert.
  • Step 908 Determine whether the certificate of the MME is successful. The cert passes the verification, and when the certificate is not verified, step 910 is performed; otherwise, step 912 is performed.
  • Step 910 When the certificate of the MME fails to pass the verification, the UE terminates the verification and returns the termination information to the MME.
  • Step 912 When the certificate of the MME passes the verification, the UE encrypts the IMSI code by using an encryption key.
  • Step 914 The UE sends the encrypted IMSI code to the MME.
  • Step 916 The MME decrypts the encrypted IMSI code by using a decryption key to obtain an IMSI code of the UE. Schematic diagram of the process.
  • the following takes the encryption key as the public key and the decryption key as the private key as an example to describe in detail the process by which the home server issues a digital certificate for the mobility management entity.
  • the home server As shown in FIG. 10, the home server according to an embodiment of the present invention is presented to the mobility management entity.
  • the process of issuing a digital certificate including:
  • Step 1002 When the MME accesses the network for the first time, generate a private key corresponding to the public key and form a public-private key pair (pk, sk).
  • Step 1004 The MME sends the public key pk and the entity identity information to the HSS/CA.
  • step 1006 the HSS/CA (Home Server) starts to verify the identity of the MME.
  • Step 1008 The HSS/CA determines, according to the entity identity information of the MME, whether the MME can pass the authentication, and when the MME fails to perform the identity verification, step 1010 is performed; otherwise, step 1012 is performed.
  • Step 1010 When the MME fails to authenticate, the HSS/CA terminates the verification and returns termination information to the MME.
  • Step 1012 When the MME is authenticated, the HSS/CA generates an MME-a digital certificate cert corresponding to the public key pk according to the public key pk of the MME.
  • step 1014 the HSS/CA sends the cert to the MME.
  • the technical solution of the present invention is described in detail with reference to the accompanying drawings.
  • the technical solution of the present invention can effectively improve the security of the IMSI code sent by the UE, and ensure that only the legal base station and the legal MME can complete the identity authentication process and obtain IMSI code.
  • a program product stored on a non-transitory machine readable medium for identity authentication, the program product comprising machine executable instructions for causing a computer system to perform the following steps
  • the mobility management entity detects that the mapping relationship between the global unique temporary terminal identifier and the international mobile subscriber identity is lost, sending an identity authentication request, an encryption key, and a digital certificate corresponding to the encryption key to the terminal;
  • the terminal receives the identity authentication request, the encryption key, and the digital certificate sent by the mobility management entity, and performs verification on the digital certificate of the mobility management entity according to the identity authentication request; when the digital certificate is verified, the The terminal encrypts the international mobile subscriber identity code in the terminal by using the encryption key sent by the mobility management entity, and sends the encrypted international mobile subscriber identity to the mobility management entity;
  • the entity according to the stored decryption key corresponding to the encryption key The encrypted international mobile subscriber identity to decrypt.
  • a non-transitory machine readable medium storing a program product for identity authentication, the program product comprising machine executable instructions for causing a computer system to perform the steps of:
  • the mobile management entity detects the only temporary temporary terminal in the world.
  • the encryption key encrypts an international mobile subscriber identity code in the terminal, and sends the encrypted international mobile subscriber identity to the mobility management entity; the mobility management entity is configured according to the encryption and the encryption The decrypted key corresponding to the key decrypts the encrypted international mobile subscriber identity.
  • a machine readable program the program causing a machine to perform the identity authentication method according to any one of the technical solutions described above.
  • a storage medium storing a machine readable program, wherein the machine readable program causes the machine to perform the identity authentication method according to any one of the technical solutions described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种移动管理实体、一种归属服务器、一种终端和一种身份认证系统和身份认证方法,移动管理实体包括:发送单元,在检测到全球唯一临时终端标识和国际移动用户识别码之间的映射关系丢失时,发送身份认证请求、加密密钥以及对应的数字证书至终端,以供终端根据数字证书对移动管理实体进行验证,在验证通过时使用加密密钥对国际移动用户识别码进行加密并发送至移动管理实体;接收单元,接收终端发送的加密后的国际移动用户识别码;解密单元,根据存储的与加密密钥对应的解密密钥对加密后的国际移动用户识别码进行解密。通过本发明的技术方案,可以确保只有合法的基站和合法的移动管理实体才能完成身份认证流程并获取国际移动用户识别码。

Description

移动管理实体、 归属服务器、 终端、 身份认证系统和方法 技术领域
本发明涉及终端技术领域, 具体而言, 涉及一种移动管理实体、 一种 归属服务器、 一种终端、 一种身份认证系统和一种身份认证方法。 背景技术
在 LTE ( Long Term Evolution, 长期演进) 网络中, 演进分组系统 EPS ( Evolved Packet System ) 中的 AKA ( Authentication and Key Agreement, 鉴权和密钥协商)是保证安全性的重要手段, 而 EPS- AK A的 具体过程如图 1所示。
而鉴权和密钥协商后, UE ( User Equipment , 用户设备) 和 MME ( Mobility Management Entity, 移动管理实体)之间会产生一个中间密钥 KASME, 然后 UE和 MME会根据所述密钥 KASME, 进行如图 2所示的鉴权 流程, 鉴权结束后, MME 会为 UE 分配临时的 GUTI ( Globally Unique Temporary UE Identity, 全球唯一临时 UE标识)码, 并维护 GUTI码和 UE的 IMSI (International Mobile Subscriber Identity, 国际移动用户标识)码 之间的映射关系, 这样, MME就可以通过用户唯一的标识 GUTI码对 UE 进行呼叫, 并通过跟踪 IMSI码来实现对用户的跟踪。
但 MME 可能会由于某种原因, 误认为丟失 GUTI 码和用户 UE 的 IMSI之间的映射关系 (例如, UE返回错误的 RES、 UE 因 MME 向 UE 发送的 AUTH 参数中分离出的 MAC 参数验证不正确而返回带有 MAC failure的 reject信息或 UE因 MME发送的 AMF参数中某一位的值不正确 而返回带有 non-EPS authentication unacceptable 的 reject 信息。 ) 时, MME就要求 UE以明文方式将 IMSI码发给自己, 以重新分配 GUTI码。
但是, 如图 3所示的身份认证流程就可能被攻击者利用, 攻击者可以 通过伪基站发射强大信号, 淹没合法基站的信号, 并以伪基站信号发起如 图 3 所示的身份认证流程, 以迫使 UE 以明文形式发送 IMSI 码给伪基 站, 从而获取用户的 IMSI 码, 并非法利用用户的隐私信息, 这对用户的 隐私带来很大的威胁。
因此, 如何有效地保护 UE发出的 IMSI码, 以确保只有合法的基站 和合法的 MME 才能完成身份认证流程并获取 IMSI码, 而非法的基站和 非法的 MME无法完成上述身份认证流程, 也无法获取 UE 的 IMSI码, 成为亟待解决的问题。 发明内容
本发明正是基于上述问题, 提出了一种新的技术方案, 可以有效地提 高 UE 发出的 IMSI 码的安全性, 并确保只有合法的基站和合法的 MME 才能完成身份认证流程并获取 IMSI码。
有鉴于此, 本发明的一方面提出了一种移动管理实体, 包括: 发送单 元, 在检测到全球唯一临时终端标识和国际移动用户识别码之间的映射关 系丟失时, 发送身份认证请求、 加密密钥以及与所述加密密钥对应的数字 证书至终端, 以供所述终端根据所述数字证书对所述移动管理实体进行验 证, 并在验证通过时, 所述终端使用所述加密密钥对国际移动用户识别码 进行加密并将加密后的国际移动用户识别码发送至所述移动管理实体; 接 收单元, 接收所述终端发送的所述加密后的国际移动用户识别码; 解密单 元, 根据存储的与所述加密密钥对应的解密密钥对所述加密后的国际移动 用户识别码进行解密。
在该技术方案中, 在移动管理实体向所述终端发送身份认证请求, 所 述终端通过险证所述加密密钥以及与所述加密密钥对应的数字证书, 可以 确保所述移动管理实体的合法性, 防止非法移动管理实体的入侵, 同时, 通过将所述国际移动用户识别码进行加密, 可以保证只有拥有与所述加密 密钥对应的解密密钥的合法移动管理实体才能使用所述国际移动用户识 别, 而非法的移动管理实体即便是得到了所述国际移动用户识别, 由于没 有对应的解密密钥, 也无法使用所述国际移动用户识别, 因而, 这可以有 效地提高用户信息安全性, 防止非法的 MME 盗用用户的国际移动用户识 别。 其中, 加密密钥和加密密钥可以对应于公钥和私钥, 即通过公钥进行 加密, 在解密时通过与公钥对应的私钥进行解密。 当然, 本领域技术人员 应当理解, 本申请的加密方法包括但是不限于公钥加密, 还可以是釆用其 他现有的加密方法实现。
在上述技术方案中, 优选地, 还包括: 密钥生成单元, 在所述移动管 理实体首次接入网络时, 生成加密密钥和与所述加密密钥对应的解密密 钥; 存储单元, 存储所述加密密钥和与所述加密密钥对应的解密密钥。
在该技术方案中, 由于每个移动管理实体都对应一对加密密钥和解密 密钥, 且每对加密密钥与解密密钥都是相对应的, 因而, 可以使终端在给 移动管理实体发送国际移动用户识别码时, 对国际移动用户识别码进行加 密, 以保证只有拥有与加密密钥对应的解密密钥的合法移动管理实体才能 使用所述国际移动用户识别码, 这有利于增强所述国际移动用户识另 'J码的 安全性。
在上述技术方案中, 优选地, 所述发送单元还用于: 将所述加密密钥 和所述移动管理实体的实体身份信息发送至归属用户管理器, 以供所述归 属用户管理器对所述移动管理实体的身份进行验证, 并在验证通过时, 生 成与所述加密密钥对应的数字证书发送至所述移动管理实体; 所述接收单 元还用于: 接收所述归属用户管理器发送的与所述加密密钥对应的所述数 字证书。 与加密密钥对应的数字证书, 可以使终端根据所述数据证书来验证所述移 动管理实体是否合法, 以防止非法的移动管理实体盗窃终端的国际移动用 户识别码。
在上述技术方案中, 优选地, 还包括: 处理单元, 在接收到所述终端 发送的终止验证的信息时, 停止验证。
在该技术方案中, 在接收到终端发送的终止验证时, 说明终端已判定 所述移动管理实体是非法的, 所述移动管理实体将无法继续身份验证。
本发明的另一方面提出了一种归属服务器, 包括: 接收单元, 接收移 动管理实体发送的加密密钥和所述移动管理实体的实体身份信息; 验证单 元, 根据所述加密密钥和所述移动管理实体的实体身份信息对所述移动管 理实体的身份进行验证; 生成单元, 在验证通过时, 生成与所述加密密钥 对应的数字证书; 发送单元, 发送所述数字证书至所述移动管理实体。 与加密密钥对应的数字证书, 可以使终端根据所述数据证书来验证所述移 动管理实体是否合法, 以防止非法的移动管理实体盗窃终端的国际移动用 户识别码。
本发明的又一方面提出了一种终端, 包括: 接收单元, 接收所述移动 管理实体发送的身份认证请求、 加密密钥以及数字证书; 验证单元, 根据 所述身份认证请求, 对所述移动管理实体的数字证书进行验证; 加密单 元, 在所述数字证书验证通过时, 通过所述移动管理实体发送的所述加密 密钥对所述终端中的国际移动用户识别码进行加密, 以得到加密后的国际 移动用户识别码; 发送单元, 将所述加密后的国际移动用户识别码发送至 所述移动管理实体。
在该技术方案中, 通过验证所述移动管理实体的数字证书, 可以确保 所述移动管理实体的合法性, 通过对所述国际移动用户识别码进行加密, 可以进一步保证所述国际移动用户识别码的安全性, 保证只有合法的移动 管理实体才能使用所述国际移动用户识别码。
在上述技术方案中, 优选地, 所述加密单元包括: 获取单元, 在所述 数字证书验证通过时, 获取所述终端中的国家移动用户识别码; 计算单 元, 根据所述加密密钥和预设的加密函数对所述国际移动用户识别码进行 计算, 以得到加密后的国际移动用户识别码。
在上述技术方案中, 优选地, 还包括: 处理单元, 在所述数字证书验 证未通过时, 停止验证, 并向所述移动管理实体发送终止验证的信息。
在该技术方案中, 在所述数字证书验证失败时, 说明终端已判定所述 移动管理实体是非法的, 所述终端将停止验证, 同时向所述移动管理实体 发送终止验证的信息, 以使所述移动管理实体停止向所述终端发送数字证 书验证请求。
本发明的再一方面提出了一种身份认证方法, 用于身份认证系统, 所 述身份认证系统包括移动管理实体、 终端和归属服务器, 包括: 所述移动 管理实体在检测到全球唯一临时终端标识和国际移动用户识别码之间的映 射关系丟失时, 发送身份认证请求、 加密密钥以及与所述加密密钥对应的 数字证书至所述终端; 所述终端接收所述移动管理实体发送的身份认证请 求、 加密密钥以及数字证书, 根据所述身份认证请求, 对所述移动管理实 体的数字证书进行验证; 在所述数字证书验证通过时, 所述终端通过所述 移动管理实体发送的所述加密密钥对所述终端中的国际移动用户识别码进 行加密, 并将加密后的国际移动用户识别码发送至所述移动管理实体; 所 述移动管理实体根据存储的与所述加密密钥对应的解密密钥对所述加密后 的国际移动用户识别码进行解密。
在该技术方案中, 在移动管理实体向终端发送身份认证请求, 终端通 过验证加密密钥以及与加密密钥对应的数字证书, 可以确保移动管理实体 的合法性, 防止非法移动管理实体的入侵, 同时, 通过将国际移动用户识 别码进行加密, 可以保证只有拥有与加密密钥对应的解密密钥的合法移动 管理实体才能使用所述国际移动用户识别, 而非法的移动管理实体即便是 得到了所述国际移动用户识别, 由于没有对应的解密密钥, 也无法使用所 述国际移动用户识别, 因而, 这可以有效地提高用户信息安全性, 防止非 法的 MME盗用用户的国际移动用户识别。
在上述技术方案中, 优选地, 还包括: 所述移动管理实体将所述加密 密钥和所述移动管理实体的实体身份信息发送至所述归属用户管理器; 所 述归属用户管理器接收移动管理实体发送的加密密钥和所述移动管理实体 的实体身份信息, 并根据所述加密密钥和所述移动管理实体的实体身份信 息对所述移动管理实体的身份进行验证; 在所述移动管理实体的身份验证 通过时, 所述归属用户管理器生成与所述加密密钥对应的数字证书, 并发 送所述数字证书至所述移动管理实体; 所述移动管理实体接收所述归属用 户管理器发送的与所述加密密钥对应的所述数字证书。
在该技术方案中, 通过对所述移动管理实体的实体身份信息进行验 证, 并为每个移动管理实体颁发一个数字证书, 可以使终端根据所述数据 证书验证所述移动管理实体是否合法, 以防止非法的移动管理实体盗窃终 端的国际移动用户识别码。
在上述技术方案中, 优选地, 还包括: 所述移动管理实体在首次接入 网络时, 生成加密密钥和与所述加密密钥对应的解密密钥, 并存储所述加 密密钥和与所述加密密钥对应的解密密钥。
在该技术方案中, 由于每个移动管理实体都对应一对加密密钥和解密 密钥, 且每对加密密钥与解密密钥都是相对应的, 因而, 可以使终端在给 移动管理实体发送国际移动用户识别码时, 对国际移动用户识别码进行加 密, 以保证只有拥有与加密密钥对应的解密密钥的合法移动管理实体才能 使用所述国际移动用户识别码, 这有利于增强所述国际移动用户识另 'J码的 安全性。
在上述技术方案中, 优选地, 在所述数字证书验证通过时, 所述终端 通过所述移动管理实体发送的所述加密密钥对所述终端中的国际移动用户 识别码进行加密, 具体包括: 在所述数字证书验证通过时, 所述终端获取 国家移动用户识别码, 并根据所述加密密钥和预设的加密函数对所述国际 移动用户识别码进行计算, 以得到加密后的国际移动用户识别码。
在上述技术方案中, 优选地, 还包括: 在所述数字证书验证未通过 时, 所述终端停止验证, 并向所述移动管理实体发送终止验证的信息; 所 述移动管理实体在接收到所述终端发送的终止验证的信息时, 停止验证。
在该技术方案中, 在数字证书未通过验证时, 说明所述数字证书对应 的所述移动管理实体是非法的, 这时, 终端就会停止验证, 并向所述移动 管理实体发送停止验证信号, 以使所述移动管理实体停止向终端发送数字 证书险证请求。
通过以上技术方案, 可以有效地提高 UE发出的 IMSI码的安全性, 并确保只有合法的基站和合法的 MME才能完成身份认证流程并获取 IMSI 码。 附图说明
图 1示出了相关技术中鉴权和密钥协商的流程示意截图;
图 2示出了相关技术中利用 KASME进行鉴权和密钥协商的流程示意截 图 3 示出了相关技术中为移动管理实体颁发数字证书的流程示意截
图 5示出了根据本发明的实施例的归属服务器的结构示意图; 图 6示出了根据本发明的实施例的终端的结构示意图;
图 7示出了根据本发明的实施例的身份认证系统的结构示意图; 图 8示出了根据本发明的实施例的身份认证方法的流程示意图; 图 9 示出了根据本发明的另一个实施例的身份认证方法的流程示意 图; 流程示意图。 具体实施方式
为了能够更清楚地理解本发明的上述目的、 特征和优点, 下面结合附 图和具体实施方式对本发明进行进一步的详细描述。 需要说明的是, 在不 冲突的情况下, 本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明, 但是, 本发明还可以釆用其他不同于在此描述的其他方式来实施, 因此, 本发明 的保护范围并不受下面公开的具体实施例的限制。 如图 4 所示, 根据本发明的实施例的移动管理实体 400, 包括: 发送 单元 402, 在检测到全球唯一临时终端标识和国际移动用户识别码之间的 映射关系丟失时, 发送身份认证请求、 加密密钥以及与所述加密密钥对应 的数字证书至终端, 以供所述终端根据所述数字证书对所述移动管理实体 进行验证, 并在验证通过时, 所述终端使用所述加密密钥对国际移动用户 识别码进行加密并将加密后的国际移动用户识别码发送至所述移动管理实 体; 接收单元 404, 接收所述终端发送的所述加密后的国际移动用户识别 码; 解密单元 406, 根据存储的与所述加密密钥对应的解密密钥对所述加 密后的国际移动用户识别码进行解密。
在该技术方案中, 在移动管理实体向终端发送身份认证请求, 终端通 过验证加密密钥以及与加密密钥对应的数字证书, 可以确保移动管理实体 的合法性, 防止非法移动管理实体的入侵, 同时, 通过将国际移动用户识 别码进行加密, 可以保证只有拥有与加密密钥对应的解密密钥的合法移动 管理实体才能使用所述国际移动用户识别, 而非法的移动管理实体即便是 得到了国际移动用户识别, 由于没有对应的解密密钥, 也无法使用国际移 动用户识别, 因而, 这可以有效地提高用户信息安全性, 防止非法的 MME盗用用户的国际移动用户识别。
其中, 加密密钥和加密密钥可以对应于公钥和私钥, 即通过公钥进行 加密, 在解密时通过与公钥对应的私钥进行解密。 当然, 本领域技术人员 应当理解, 本申请的加密方法包括但是不限于公钥加密, 还可以是釆用其 他现有的加密方法实现。
在上述技术方案中, 优选地, 还包括: 密钥生成单元 408, 在所述移 动管理实体首次接入网络时, 生成加密密钥和与所述加密密钥对应的解密 密钥; 存储单元, 存储所述加密密钥和与所述加密密钥对应的解密密钥。
在该技术方案中, 由于每个移动管理实体都对应一对加密密钥和解密 密钥, 且每对加密密钥与解密密钥都是相对应的, 因而, 可以使终端在给 移动管理实体发送国际移动用户识别码时, 对国际移动用户识别码进行加 密, 以保证只有拥有与加密密钥对应的解密密钥的合法移动管理实体才能 使用所述国际移动用户识别码, 这有利于增强所述国际移动用户识另 'J码的 安全性。
在上述技术方案中, 优选地, 所述发送单元 402还用于: 将所述加密 密钥和所述移动管理实体的实体身份信息发送至归属用户管理器, 以供所 述归属用户管理器对所述移动管理实体的身份进行验证, 并在验证通过 时, 生成与所述加密密钥对应的数字证书发送至所述移动管理实体; 所述 接收单元 404还用于: 接收所述归属用户管理器发送的与所述加密密钥对 应的所述数字证书。 与加密密钥对应的数字证书, 可以使终端根据所述数据证书来验证所述移 动管理实体是否合法, 以防止非法的移动管理实体盗窃终端的国际移动用 户识别码。
在上述技术方案中, 优选地, 还包括: 处理单元 412, 在接收到所述 终端发送的终止验证的信息时, 停止验证。
在该技术方案中, 在接收到终端发送的终止验证时, 说明终端已判定 所述移动管理实体是非法的, 所述移动管理实体将无法继续身份验证。
图 5示出了根据本发明的实施例的归属服务器的结构示意图。
如图 5 所示, 根据本发明的实施例的归属服务器 500, 包括: 接收单 元 502, 接收移动管理实体发送的加密密钥和所述移动管理实体的实体身 份信息; 验证单元 504, 根据所述加密密钥和所述移动管理实体的实体身 份信息对所述移动管理实体的身份进行验证; 生成单元 506, 在验证通过 时, 生成与所述加密密钥对应的数字证书; 发送单元 508, 发送所述数字 证书至所述移动管理实体。 与加密密钥对应的数字证书, 可以使终端根据所述数据证书来验证所述移 动管理实体是否合法, 以防止非法的移动管理实体盗窃终端的国际移动用 户识别码。
图 6示出了根据本发明的实施例的终端的结构示意图。
如图 6 所示, 根据本发明的实施例的终端 600, 包括: 接收单元 602 , 接收所述移动管理实体发送的身份认证请求、 加密密钥以及数字证 书; 验证单元 604, 根据所述身份认证请求, 对所述移动管理实体的数字 证书进行验证; 加密单元 606, 在所述数字证书验证通过时, 通过所述移 动管理实体发送的所述加密密钥对所述终端中的国际移动用户识别码进行 加密, 以得到加密后的国际移动用户识别码; 发送单元 608, 将所述加密 后的国际移动用户识别码发送至所述移动管理实体。
在该技术方案中, 通过验证所述移动管理实体的数字证书, 可以确保 所述移动管理实体的合法性, 通过对所述国际移动用户识别码进行加密, 可以进一步保证所述国际移动用户识别码的安全性, 保证只有合法的移动 管理实体才能使用所述国际移动用户识别码。
在上述技术方案中, 优选地, 所述加密单元 606 包括: 获取单元 6062, 在所述数字证书验证通过时, 获取所述终端中的国家移动用户识别 码; 计算单元 6064, 根据所述加密密钥和预设的加密函数对所述国际移 动用户识别码进行计算, 以得到加密后的国际移动用户识别码。
在上述技术方案中, 优选地, 还包括: 处理单元 610, 在所述数字证 书验证未通过时, 停止验证, 并向所述移动管理实体发送终止验证的信 息。
在该技术方案中, 在所述数字证书验证失败时, 说明终端已判定所述 移动管理实体是非法的, 所述终端将停止验证, 同时向所述移动管理实体 发送终止验证的信息, 以使所述移动管理实体停止向所述终端发送数字证 书验证请求。
图 7示出了根据本发明的实施例的身份认证系统的结构示意图。
如图 7所示, 根据本发明的实施例的身份认证系统包括: 移动管理实 体 400、 归属服务器 500和终端 600。
其中, 归属服务器 500用于对移动管理实体 400的身份进行验证, 并 在移动管理实体 400的身份验证成功时, 为移动管理实体 400颁发数字证 书;
移动管理实体 400用于在检测到全球唯一临时终端标识和国际移动用 户识别码之间的映射关系丟失时, 则向终端 600发送身份认证请求、 加密 密钥以及归属服务器 500颁发的数字证书;
所述终端 600用于根据所述数字证书对所述移动管理实体 400进行验 证, 并在验证通过时, 所述终端 600使用所述加密密钥对国际移动用户识 别码进行加密并将加密后的国际移动用户识别码发送至所述移动管理实体 400。
图 8示出了根据本发明的实施例的身份认证方法的流程示意图。
如图 8所示, 根据本发明的实施例的身份认证方法的流程, 包括: 步 骤 802, 所述移动管理实体在检测到全球唯一临时终端标识和国际移动用 户识别码之间的映射关系丟失时, 发送身份认证请求、 加密密钥以及与所 述加密密钥对应的数字证书至所述终端; 步骤 804, 所述终端接收所述移 动管理实体发送的身份认证请求、 加密密钥以及数字证书, 根据所述身份 认证请求, 对所述移动管理实体的数字证书进行验证; 步骤 806, 在所述 数字证书验证通过时, 所述终端通过所述移动管理实体发送的所述加密密 钥对所述终端中的国际移动用户识别码进行加密, 并将加密后的国际移动 用户识别码发送至所述移动管理实体; 步骤 808, 所述移动管理实体根据 存储的与所述加密密钥对应的解密密钥对所述加密后的国际移动用户识另 'J 码进行解密。
在该技术方案中, 在该技术方案中, 在移动管理实体向所述终端发送 身份认证请求, 所述终端通过验证所述加密密钥以及与所述加密密钥对应 的数字证书, 可以确保所述移动管理实体的合法性, 防止非法移动管理实 体的入侵, 同时, 通过将所述国际移动用户识别码进行加密, 可以保证只 有拥有与所述加密密钥对应的解密密钥的合法移动管理实体才能使用所述 国际移动用户识别, 而非法的移动管理实体即便是得到了所述国际移动用 户识别, 由于没有对应的解密密钥, 也无法使用所述国际移动用户识别, 因而, 这可以有效地提高用户信息安全性, 防止非法的 MME盗用用户的 国际移动用户识别。
在上述技术方案中, 优选地, 还包括: 所述移动管理实体将所述加密 密钥和所述移动管理实体的实体身份信息发送至所述归属用户管理器; 所 述归属用户管理器接收移动管理实体发送的加密密钥和所述移动管理实体 的实体身份信息, 并根据所述加密密钥和所述移动管理实体的实体身份信 息对所述移动管理实体的身份进行验证; 在所述移动管理实体的身份验证 通过时, 所述归属用户管理器生成与所述加密密钥对应的数字证书, 并发 送所述数字证书至所述移动管理实体; 所述移动管理实体接收所述归属用 户管理器发送的与所述加密密钥对应的所述数字证书。
在该技术方案中, 通过对所述移动管理实体的实体身份信息进行验 证, 并为每个移动管理实体颁发一个数字证书, 可以使终端根据所述数据 证书验证所述移动管理实体是否合法, 以防止非法的移动管理实体盗窃终 端的国际移动用户识别码。
在上述技术方案中, 优选地, 还包括: 所述移动管理实体在首次接入 网络时, 生成加密密钥和与所述加密密钥对应的解密密钥, 并存储所述加 密密钥和与所述加密密钥对应的解密密钥。
在该技术方案中, 由于每个移动管理实体都对应一对加密密钥和解密 密钥, 且每对加密密钥与解密密钥都是相对应的, 因而, 可以使终端在给 移动管理实体发送国际移动用户识别码时, 对国际移动用户识别码进行加 密, 以保证只有拥有与加密密钥对应的解密密钥的合法移动管理实体才能 使用所述国际移动用户识别码, 这有利于增强所述国际移动用户识另 'J码的 安全性。
在上述技术方案中, 优选地, 在所述数字证书验证通过时, 所述终端 通过所述移动管理实体发送的所述加密密钥对所述终端中的国际移动用户 识别码进行加密, 具体包括: 在所述数字证书验证通过时, 所述终端获取 国家移动用户识别码, 并根据所述加密密钥和预设的加密函数对所述国际 移动用户识别码进行计算, 以得到加密后的国际移动用户识别码。 在上述技术方案中, 优选地, 还包括: 在所述数字证书验证未通过 时, 所述终端停止验证, 并向所述移动管理实体发送终止验证的信息; 所 述移动管理实体在接收到所述终端发送的终止验证的信息时, 停止验证。
在该技术方案中, 在数字证书未通过验证时, 说明所述数字证书对应 的所述移动管理实体是非法的, 这时, 终端就会停止验证, 并向所述移动 管理实体发送停止验证信号, 以使所述移动管理实体停止向终端发送数字 证书险证请求。
图 9 示出了根据本发明的另一个实施例的身份认证方法的流程示意 图。
如图 9所示, 根据本发明的另一个实施例的身份认证方法的流程, 包 括:
步骤 902, MME (移动管理实体) 向 UE (终端) 发起身份认证请 求。
步骤 904, 在 UE响应 MME的身份认证请求之后, MME将加密密钥 和证书 cert发送给 UE。
步骤 906, UE开始验证 MME的加密密钥和证书 cert的正确性。
步骤 908, 判断 MME的证书是否成功 cert通过验证, 并在证书未通 过验证时, 执行步骤 910; 反之, 执行步骤 912。
步骤 910, 在 MME的证书未通过验证时, UE终止验证并向 MME返 回终止信息。
步骤 912, 在 MME的证书通过验证时, UE将 IMSI码通过加密密钥 加密。
步骤 914, UE将加密后的 IMSI码发送给 MME。
步骤 916, MME利用解密密钥对加密后的 IMSI码进行解密, 以得到 UE的 IMSI码。 流程示意图。
下面以加密密钥为公钥, 解密密钥为私钥为例, 详细说明归属服务器 为移动管理实体颁发数字证书的流程。
如图 10 所示, 根据本发明的实施例的归属服务器为移动管理实体颁 发数字证书的流程, 包括:
步骤 1002, 在 MME首次接入网络时, 生成公钥与公钥对应的私钥, 组成公私密钥对 (pk, sk)。
步骤 1004, MME将公钥 pk和实体身份信息发送给 HSS/CA。
步骤 1006, HSS/CA (归属服务器 ) 开始验证 MME的身份。
步骤 1008, HSS/CA根据 MME的实体身份信息来判断 MME是否可 以通过身份验证, 并在 MME未通过身份验证时, 执行步骤 1010; 反之, 执行步骤 1012。
步骤 1010, 在 MME 未通过身份验证时, HSS/CA 终止验证并向 MME返回终止信息。
步骤 1012, 在 MME通过身份验证时, HSS/CA根据 MME的公钥 pk 生成 MME—个与公钥 pk对应的数字证书 cert。
步骤 1014, HSS/CA将 cert发送给 MME。
以上结合附图详细说明了本发明的技术方案, 通过本发明的技术方 案, 可以有效地提高 UE发出的 IMSI码的安全性, 并确保只有合法的基 站和合法的 MME才能完成身份认证流程并获取 IMSI码。
根据本发明的实施方式, 还提供了一种存储在非易失性机器可读介质 上的程序产品, 用于身份认证, 所述程序产品包括用于使计算机系统执行 以下步骤的机器可执行指令: 移动管理实体在检测到全球唯一临时终端标 识和国际移动用户识别码之间的映射关系丟失时, 发送身份认证请求、 加 密密钥以及与所述加密密钥对应的数字证书至终端; 所述终端接收所述移 动管理实体发送的身份认证请求、 加密密钥以及数字证书, 根据所述身份 认证请求, 对所述移动管理实体的数字证书进行验证; 在所述数字证书验 证通过时, 所述终端通过所述移动管理实体发送的所述加密密钥对所述终 端中的国际移动用户识别码进行加密, 并将加密后的国际移动用户识别码 发送至所述移动管理实体; 所述移动管理实体根据存储的与所述加密密钥 对应的解密密钥对所述加密后的国际移动用户识别码进行解密。
根据本发明的实施方式, 还提供了一种非易失机器可读介质, 存储有 用于身份认证的程序产品, 所述程序产品包括用于使计算机系统执行以下 步骤的机器可执行指令: 所述移动管理实体在检测到全球唯一临时终端标 识和国际移动用户识别码之间的映射关系丟失时, 发送身份认证请求、 加 密密钥以及与所述加密密钥对应的数字证书至所述终端; 所述终端接收所 述移动管理实体发送的身份认证请求、 加密密钥以及数字证书, 根据所述 身份认证请求, 对所述移动管理实体的数字证书进行验证; 在所述数字证 书验证通过时, 所述终端通过所述移动管理实体发送的所述加密密钥对所 述终端中的国际移动用户识别码进行加密, 并将加密后的国际移动用户识 别码发送至所述移动管理实体; 所述移动管理实体根据存储的与所述加密 密钥对应的解密密钥对所述加密后的国际移动用户识别码进行解密。
根据本发明的实施方式, 还提供了一种机器可读程序, 所述程序使机 器执行如上所述技术方案中任一所述的身份认证方法。
根据本发明的实施方式, 还提供了一种存储有机器可读程序的存储介 质, 其中, 所述机器可读程序使得机器执行如上所述技术方案中任一所述 的身份认证方法。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于 本领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精 神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明 的保护范围之内。

Claims

权 利 要 求 书
1. 一种移动管理实体, 其特征在于, 包括:
发送单元, 在检测到全球唯一临时终端标识和国际移动用户识别码之 间的映射关系丟失时, 发送身份认证请求、 加密密钥以及与所述加密密钥 对应的数字证书至终端, 以供所述终端根据所述数字证书对所述移动管理 实体进行验证, 并在验证通过时, 所述终端使用所述加密密钥对国际移动 用户识别码进行加密, 并将加密后的国际移动用户识别码发送至所述移动 管理实体;
接收单元, 接收所述终端发送的所述加密后的国际移动用户识别码; 解密单元, 根据存储的与所述加密密钥对应的解密密钥对所述加密后 的国际移动用户识别码进行解密。
2. 根据权利要求 1所述的移动管理实体, 其特征在于, 还包括: 密钥生成单元, 在所述移动管理实体首次接入网络时, 生成加密密钥 和与所述加密密钥对应的解密密钥;
存储单元, 存储所述加密密钥和与所述加密密钥对应的解密密钥。
3. 根据权利要求 1所述的移动管理实体, 其特征在于,
所述发送单元还用于:
将所述加密密钥和所述移动管理实体的实体身份信息发送至归属用户 管理器, 以供所述归属用户管理器对所述移动管理实体的身份进行验证, 并在验证通过时, 生成与所述加密密钥对应的数字证书发送至所述移动管 理实体;
所述接收单元还用于:
接收所述归属用户管理器发送的与所述加密密钥对应的所述数字证 书。
4. 根据权利要求 1 至 3 中任一项所述的移动管理实体, 其特征在 于, 还包括:
处理单元, 在接收到所述终端发送的终止验证的信息时, 停止验证。
5. 一种归属服务器, 其特征在于, 包括:
接收单元, 接收移动管理实体发送的加密密钥和所述移动管理实体的 实体身份信息;
验证单元, 根据所述加密密钥和所述移动管理实体的实体身份信息对 所述移动管理实体的身份进行验证;
生成单元, 在验证通过时, 生成与所述加密密钥对应的数字证书; 发送单元, 发送所述数字证书至所述移动管理实体。
6. 一种终端, 其特征在于, 包括:
接收单元, 接收所述移动管理实体发送的身份认证请求、 加密密钥以 及数字证书;
验证单元, 根据所述身份认证请求, 对所述移动管理实体的数字证书 进行验证;
加密单元, 在所述数字证书验证通过时, 通过所述移动管理实体发送 的所述加密密钥对所述终端中的国际移动用户识别码进行加密, 以得到加 密后的国际移动用户识别码;
发送单元, 将所述加密后的国际移动用户识别码发送至所述移动管理 实体。
7. 根据权利要求 6所述的终端, 其特征在于, 所述加密单元包括: 获取单元, 在所述数字证书验证通过时, 获取所述终端中的国家移动 用户识别码;
计算单元, 根据所述加密密钥和预设的加密函数对所述国际移动用户 识别码进行计算, 以得到加密后的国际移动用户识别码。
8. 根据权利要求 6或 7所述的终端, 其特征在于, 还包括: 处理单元, 在所述数字证书验证未通过时, 停止验证, 并向所述移动 管理实体发送终止验证的信息。
9. 一种身份认证系统, 其特征在于, 包括权利要求 1 至 4 中任一项 所述的移动管理实体, 权利要求 5所述的归属服务器和权利要求 6至 8中 任一项所述的终端。
10. 一种身份认证方法, 用于身份认证系统, 所述身份认证系统包括 移动管理实体、 终端和归属服务器, 其特征在于,
所述移动管理实体在检测到全球唯一临时终端标识和国际移动用户识 别码之间的映射关系丟失时, 发送身份认证请求、 加密密钥以及与所述加 密密钥对应的数字证书至所述终端; 所述终端接收所述移动管理实体发送的身份认证请求、 加密密钥以及 数字证书, 根据所述身份认证请求, 对所述移动管理实体的数字证书进行 验证;
在所述数字证书验证通过时, 所述终端通过所述移动管理实体发送的 所述加密密钥对所述终端中的国际移动用户识别码进行加密, 并将加密后 的国际移动用户识别码发送至所述移动管理实体;
所述移动管理实体根据存储的与所述加密密钥对应的解密密钥对所述 加密后的国际移动用户识别码进行解密。
11. 根据权利要求 10所述的身份认证方法, 其特征在于, 还包括: 所述移动管理实体将所述加密密钥和所述移动管理实体的实体身份信 息发送至所述归属用户管理器;
所述归属用户管理器接收移动管理实体发送的加密密钥和所述移动管 理实体的实体身份信息, 并根据所述加密密钥和所述移动管理实体的实体 身份信息对所述移动管理实体的身份进行验证;
在所述移动管理实体的身份验证通过时, 所述归属用户管理器生成与 所述加密密钥对应的数字证书, 并发送所述数字证书至所述移动管理实 体;
所述移动管理实体接收所述归属用户管理器发送的与所述加密密钥对 应的所述数字证书。
12. 根据权利要求 10所述的身份认证方法, 其特征在于, 还包括: 所述移动管理实体在首次接入网络时, 生成加密密钥和与所述加密密 钥对应的解密密钥, 并存储所述加密密钥和与所述加密密钥对应的解密密 钥。
13. 根据权利要求 10 所述的身份认证方法, 其特征在于, 在所述数 字证书验证通过时, 所述终端通过所述移动管理实体发送的所述加密密钥 对所述终端中的国际移动用户识别码进行加密, 具体包括:
在所述数字证书验证通过时, 所述终端获取国家移动用户识别码, 并 根据所述加密密钥和预设的加密函数对所述国际移动用户识别码进行计 算, 以得到加密后的国际移动用户识别码。
14. 根据权利要求 10至 13中任一项所述的身份认证方法, 其特征在 于, 还包括: 在所述数字证书验证未通过时, 所述终端停止验证, 并向所述移动管 理实体发送终止验证的信息;
所述移动管理实体在接收到所述终端发送的终止验证的信息时, 停止 验证。
PCT/CN2014/082656 2014-07-21 2014-07-21 移动管理实体、归属服务器、终端、身份认证系统和方法 Ceased WO2016011588A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201480080618.1A CN106576237B (zh) 2014-07-21 2014-07-21 移动管理实体、归属服务器、终端、身份认证系统和方法
PCT/CN2014/082656 WO2016011588A1 (zh) 2014-07-21 2014-07-21 移动管理实体、归属服务器、终端、身份认证系统和方法
US15/327,597 US20170201884A1 (en) 2014-07-21 2014-07-21 Mobility Management Entity, Terminal, and Identity Authentication Method
EP14898188.9A EP3174324A4 (en) 2014-07-21 2014-07-21 Mobility management entity, home server, terminal, and identity authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/082656 WO2016011588A1 (zh) 2014-07-21 2014-07-21 移动管理实体、归属服务器、终端、身份认证系统和方法

Publications (1)

Publication Number Publication Date
WO2016011588A1 true WO2016011588A1 (zh) 2016-01-28

Family

ID=55162393

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/082656 Ceased WO2016011588A1 (zh) 2014-07-21 2014-07-21 移动管理实体、归属服务器、终端、身份认证系统和方法

Country Status (4)

Country Link
US (1) US20170201884A1 (zh)
EP (1) EP3174324A4 (zh)
CN (1) CN106576237B (zh)
WO (1) WO2016011588A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616889A (zh) * 2016-12-21 2018-10-02 中国移动通信集团公司 一种攻击伪基站的方法及装置
US20210211296A1 (en) * 2016-03-10 2021-07-08 Futurewei Technologies, Inc. Authentication Mechanism for 5G Technologies

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10257702B2 (en) 2017-09-08 2019-04-09 At&T Intellectual Property I, L.P. Validating international mobile equipment identity (IMEI) in mobile networks
EP4240043A3 (en) * 2017-11-16 2023-11-15 Nokia Technologies Oy Privacy managing entity selection in communication system
CN108965222B (zh) * 2017-12-08 2021-12-07 普华云创科技(北京)有限公司 身份认证方法、系统及计算机可读存储介质
WO2019221033A1 (en) 2018-05-18 2019-11-21 Nec Corporation A method for synchronizing status of ue in a communication network
CN111465020A (zh) * 2019-01-18 2020-07-28 中兴通讯股份有限公司 一种防伪基站方法及装置、计算机可读存储介质
CN116405192A (zh) * 2019-12-18 2023-07-07 华为技术有限公司 一种证书申请方法及设备
CN114257382B (zh) * 2022-01-30 2024-06-11 支付宝(杭州)信息技术有限公司 密钥管理和业务处理方法、装置及系统
CN116017444A (zh) * 2022-11-30 2023-04-25 天翼物联科技有限公司 基于量子密钥的物联网设备登录方法、设备及介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801029A (zh) * 2004-12-31 2006-07-12 联想(北京)有限公司 生成数字证书及应用该所生成的数字证书的方法
CN101771992A (zh) * 2009-01-04 2010-07-07 中国移动通信集团公司 国际移动用户标识符imsi机密性保护的方法、设备及系统
CN102026178A (zh) * 2010-12-31 2011-04-20 成都三零瑞通移动通信有限公司 一种基于公钥机制的用户身份保护方法
CN102131188A (zh) * 2010-09-01 2011-07-20 华为技术有限公司 用户身份信息传输的方法、用户设备、网络侧设备及系统
CN102395130A (zh) * 2011-11-01 2012-03-28 重庆邮电大学 一种lte中鉴权的方法
US20120263298A1 (en) * 2009-12-31 2012-10-18 Samsung Electronics Co. Ltd. Method and system for supporting security in a mobile communication system

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030015790A (ko) * 2001-08-17 2003-02-25 엘지전자 주식회사 이동 통신 시스템에서 가입자 정보 확인 방법
EP1873998B1 (en) * 2006-06-27 2018-09-19 Vringo Infrastructure Inc. Identifiers in a communication system
US8347090B2 (en) * 2006-10-16 2013-01-01 Nokia Corporation Encryption of identifiers in a communication system
CN101267303B (zh) * 2007-03-13 2012-07-04 中兴通讯股份有限公司 服务节点间的通信方法
CN101552668A (zh) * 2008-03-31 2009-10-07 展讯通信(上海)有限公司 用户设备接入网络时的认证方法、用户设备及基站
CN101640886B (zh) * 2008-07-29 2012-04-25 上海华为技术有限公司 鉴权方法、重认证方法和通信装置
US8693642B2 (en) * 2009-04-16 2014-04-08 Alcatel Lucent Emergency call handling in accordance with authentication procedure in communication network
KR101700448B1 (ko) * 2009-10-27 2017-01-26 삼성전자주식회사 이동 통신 시스템에서 보안 관리 시스템 및 방법
US8839373B2 (en) * 2010-06-18 2014-09-16 Qualcomm Incorporated Method and apparatus for relay node management and authorization
KR20120028706A (ko) * 2010-09-15 2012-03-23 주식회사 케이티 Lte 시스템에서 통신 단말의 고유 식별번호를 획득하는 방법 및 이를 위한 무선망 접속 장치
CN102036236A (zh) * 2010-10-29 2011-04-27 深圳市爱贝信息技术有限公司 一种对移动终端认证的方法和装置
US20120159151A1 (en) * 2010-12-21 2012-06-21 Tektronix, Inc. Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring
US8687556B2 (en) * 2011-11-18 2014-04-01 Cisco Technology, Inc. Method for correlating connection information with mobile device identity
CN102438330A (zh) * 2011-12-06 2012-05-02 大唐移动通信设备有限公司 一种附着到e-tran的方法及移动性管理实体
CN102905265B (zh) * 2012-10-11 2016-02-10 大唐移动通信设备有限公司 一种实现移动设备附着的方法及装置
CN102916968B (zh) * 2012-10-29 2016-01-27 北京天诚盛业科技有限公司 身份认证方法、身份认证服务器和身份认证装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801029A (zh) * 2004-12-31 2006-07-12 联想(北京)有限公司 生成数字证书及应用该所生成的数字证书的方法
CN101771992A (zh) * 2009-01-04 2010-07-07 中国移动通信集团公司 国际移动用户标识符imsi机密性保护的方法、设备及系统
US20120263298A1 (en) * 2009-12-31 2012-10-18 Samsung Electronics Co. Ltd. Method and system for supporting security in a mobile communication system
CN102131188A (zh) * 2010-09-01 2011-07-20 华为技术有限公司 用户身份信息传输的方法、用户设备、网络侧设备及系统
CN102026178A (zh) * 2010-12-31 2011-04-20 成都三零瑞通移动通信有限公司 一种基于公钥机制的用户身份保护方法
CN102395130A (zh) * 2011-11-01 2012-03-28 重庆邮电大学 一种lte中鉴权的方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3174324A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210211296A1 (en) * 2016-03-10 2021-07-08 Futurewei Technologies, Inc. Authentication Mechanism for 5G Technologies
US11700131B2 (en) * 2016-03-10 2023-07-11 Futurewei Technologies, Inc. Authentication mechanism for 5G technologies
US12166897B2 (en) 2016-03-10 2024-12-10 Futurewei Technologies, Inc. Authentication mechanism for 5G technologies
CN108616889A (zh) * 2016-12-21 2018-10-02 中国移动通信集团公司 一种攻击伪基站的方法及装置

Also Published As

Publication number Publication date
EP3174324A4 (en) 2018-09-05
CN106576237B (zh) 2020-10-16
CN106576237A (zh) 2017-04-19
EP3174324A1 (en) 2017-05-31
US20170201884A1 (en) 2017-07-13

Similar Documents

Publication Publication Date Title
CN106603485B (zh) 密钥协商方法及装置
CN106576237B (zh) 移动管理实体、归属服务器、终端、身份认证系统和方法
CN102196436B (zh) 安全认证方法、装置及系统
CN105050081B (zh) 网络接入设备接入无线网络接入点的方法、装置和系统
CN106899410B (zh) 一种设备身份认证的方法及装置
WO2018076365A1 (zh) 密钥协商方法及装置
CN104754575B (zh) 一种终端认证的方法、装置及系统
CN107820239B (zh) 信息处理方法及装置
JP2017535998A5 (zh)
CN103763356A (zh) 一种安全套接层连接的建立方法、装置及系统
WO2014180198A1 (zh) 终端接入方法、系统、设备和计算机存储介质
CN108809903B (zh) 一种认证方法、装置及系统
CN106888092B (zh) 信息处理方法及装置
WO2017185913A1 (zh) 一种无线局域网认证机制的改进方法
WO2014187210A1 (zh) 一种电子签名令牌私钥的备份方法和系统
WO2015158228A1 (zh) 一种服务器、用户设备以及用户设备与服务器的交互方法
WO2017020530A1 (zh) 一种增强的wlan证书鉴别方法、装置及系统
CN104243452A (zh) 一种云计算访问控制方法及系统
CN106465109A (zh) 蜂窝网络认证
CN104683103A (zh) 一种终端设备登录认证的方法和设备
WO2018126791A1 (zh) 一种认证方法及装置、计算机存储介质
CN101547091A (zh) 一种信息发送的方法及装置
CN115022850A (zh) 一种d2d通信的认证方法、装置、系统、电子设备及介质
HK1207495A1 (zh) 一种密钥协商方法及装置
CN109818903B (zh) 数据传输方法、系统、装置和计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14898188

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15327597

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014898188

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014898188

Country of ref document: EP