WO2021244447A1 - Information protection method and system, and communication apparatus - Google Patents
Information protection method and system, and communication apparatus Download PDFInfo
- Publication number
- WO2021244447A1 WO2021244447A1 PCT/CN2021/096968 CN2021096968W WO2021244447A1 WO 2021244447 A1 WO2021244447 A1 WO 2021244447A1 CN 2021096968 W CN2021096968 W CN 2021096968W WO 2021244447 A1 WO2021244447 A1 WO 2021244447A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- function
- identification information
- information
- access network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- Network slicing is a new type of network and business model that can be customized and managed to better meet the needs of consumers and enterprises for personalized services, such as billing, policy, security, and mobility.
- Network slicing can be used for mobile bandwidth, multimedia, large-scale machine type communication (massive machine type communication), and critical machine type communication (critical machine type communication).
- a terminal device When a terminal device registers with the network, it provides the core network with the requested network slicing information, which is used by the core network to select a network slicing instance for the terminal device; the core network is based on the terminal device’s contract data, requested network slicing information, roaming agreement, and local configuration Information, operator policies and other information, select the network slices that are allowed to be accessed for the terminal device, and send the network slice information that is allowed to be accessed to the terminal device.
- the terminal device When the terminal device receives the allowed network slice information, it may request to access the corresponding network slice according to the allowed network slice information, and send the allowed network slice information to the access network device.
- the access network device When the access network device receives the allowed access network slice information, it can select the access management network element to provide services for the terminal device according to the allowed access network slice information.
- Information transmitted between terminal equipment and access network equipment such as network slice information or terminal equipment capability information, is at risk of being leaked. Therefore, how to improve the security of information transmitted between terminal equipment and access network equipment is Technical problems to be solved urgently.
- the present application provides an information protection method and communication device, which can improve the security of information transmitted between terminal equipment and access network equipment, thereby improving the security and reliability of the network.
- the access network device receives a first request message from the terminal device.
- the first request message includes the first key identifier, device identification information, random parameters, and first encryption protection information; the access network device determines the first request message corresponding to the device identification information.
- Function and second function Generate a second key according to the first key identifier, random parameters, first function and second function; Use the second key to decrypt the first encrypted protection information to obtain the protected information.
- the protection information may be network slice information, terminal device capability information, or other information that needs to be protected at the access layer.
- the first encrypted protection information is obtained by using the second key to encrypt the protection information.
- the device identification information may be the identification information of the terminal device or the identification information of the access management network element.
- the access network device when the access network device receives the first request message, it determines the function required to calculate the second key, and uses the determined function, the first key identifier and random parameters to calculate the second key , Use the second key to decrypt the first encrypted protection information to obtain the protection information, which can realize the protection of the protection information sent by the terminal device to the access network device, and effectively prevent eavesdroppers from obtaining the protection information from the access layer message.
- the security of information transmission between the terminal equipment and the access network equipment is improved, and the security and reliability of the network are improved.
- the access network device receives a first message from an access management network element, the first message includes identification information of the first function and identification information of the second function, and the access network device establishes the access The corresponding relationship between the identification information of the incoming management network element and the identification information of the first function and the identification information of the second function, so that when the access network device receives the first request message, the first request message corresponding to the device identification information can be determined One function and second function.
- the access network device may determine the first calculation parameter corresponding to the device identification information carried in the first request message according to the correspondence between each device identification information and the first calculation parameter.
- the access management network element sends a second message to the access network device when it detects that another access network device has been compromised by an attacker.
- the second message includes the identifier of the third function. Information and identification information of the fourth function; when the access network device receives the second message, it establishes a correspondence between the identification information of the access management network element and the identification information of the third function and the identification information of the fourth function.
- the second message further includes a second calculation parameter, and the access network device establishes a correspondence between the identification information of the access management network element and the identification information of the third function, the identification information of the fourth function, and the second calculation parameter relation.
- the second request message when the access network device receives the second request message from the terminal device, the second request message includes the third key identifier, device identification information, random parameters, and second encryption protection information, according to The corresponding relationship between the identification information of the access management network element and the identification information of the third function and the identification information of the fourth function is determined, and the third function and the fourth function corresponding to the device identification information are determined.
- the access network device further determines the second calculation parameter corresponding to the device identification information.
- the access network device generates the fourth key according to the third key identifier, random parameters, third function, and fourth function.
- the fourth key is generated according to the third key identifier, random parameters, third function, fourth function, and second calculation parameter.
- the access network device uses the fourth key to decrypt the second encrypted protection information to obtain the protection information.
- an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Functions and parameters for generating the decryption key.
- the access management network element when the access management network element detects that the terminal device is an attacker, it sends instruction information to the access network device, where the instruction information is used to indicate illegal key identification information. Upon receiving the instruction information, the access network device detects whether the first key identifier carried in the first request message matches the illegal key identifier information, and if they match, it indicates that the terminal device sending the first request message is an attacker , Then the access network device rejects the first request message, thereby preventing the attacker from accessing.
- the second aspect of the present application provides an information protection method, which may be executed by a terminal device, or may be executed by a device (such as a processor or a chip, etc.) in the terminal device.
- This method takes terminal equipment as an example, and includes the following content.
- the terminal device generates a second key according to the first key, random parameters and the first function, uses the second key to encrypt the protection information to obtain the first encrypted protection information; sends a first request message to the access network device,
- the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate a first key.
- the terminal device uses the second key to encrypt the protected information, and sends the encrypted first encrypted protection information to the access network device, which can realize the privacy protection of the protected information and effectively prevent eavesdroppers.
- the terminal device generates the second key according to the first key, random parameters, device identification information, and the first function, so that there are more parameters for generating the second key, which increases the complexity.
- Device identification information such as the identification information of the terminal device.
- the terminal device receives a third message from the access management network element, where the third message includes the identification information of the first function, the first key, and the first key identification.
- the first key and the first function are used for the terminal device to generate the second key; the first key identifier is used for the terminal device to be carried in the first request message so that the access network device can generate the second key.
- the access management network element sends a fourth message to the terminal device when it detects that an access network device has been compromised by an attacker, and the fourth message is used to update the terminal device
- the function and parameters of the decryption key are generated.
- the fourth message includes the identification information of the third function, the third key and the third key identification; when the terminal device receives the fourth message, it will be based on the third key, random parameters and
- the third function is to generate a fourth key, and use the fourth key to encrypt the protection information to obtain the second encrypted protection information; send a second request message to the access network device, the second request message includes the third key identifier , Device identification information, random parameters and second encryption protection information, and the third key identification is used to generate the third key.
- the access network equipment is compromised by an attacker, when the second request message is received, the protected information encrypted with the fourth key cannot be decrypted, so that the protected information cannot be obtained.
- Other access network equipment that has not been compromised by the attacker When the second request message is received, it can be decrypted correctly to obtain the protection information, so that in a scenario where an access network device is compromised by an attacker, the information transmission between the terminal device and other access network devices can be protected.
- an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Because of the function and parameters for generating the decryption key, the compromised access network device cannot obtain the parameters in the second message, and thus cannot generate the fourth key for decryption.
- the third aspect of the present application provides an information protection method, which may be executed by an access network device, or may be executed by a device (such as a processor or a chip, etc.) in the access network device.
- This method takes the access network device as an example, and includes the following content.
- the access network device when it receives the first request message, it determines the function and encryption algorithm required to calculate the second key, uses the determined function to calculate the second key, and uses the second key and The encryption algorithm decrypts the first encrypted protection information to obtain the protection information, which can realize the protection of the protection information sent by the terminal equipment to the access network equipment, and effectively prevent eavesdroppers from obtaining the protection information from the access layer message, thereby improving the terminal equipment
- the security of information transmitted with the access network equipment improves the security and reliability of the network.
- the access network device determines the correspondence between the device identification information and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm according to the correspondence between the device identification information and the identification information of the first function.
- the first function, the second function and the first encryption algorithm of, in order to generate the second key, and the first encryption protection information is decrypted by using the second key and the first encryption algorithm.
- the access network device receives a second request message from the terminal device.
- the second request message includes the third key identifier, device identification information, random parameters, and second encryption protection information;
- an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Functions and parameters for generating the decryption key.
- the access management network element when the access management network element detects that the terminal device is an attacker, it sends instruction information to the access network device, where the instruction information is used to indicate illegal key identification information. Upon receiving the instruction information, the access network device detects whether the first key identifier carried in the first request message matches the illegal key identifier information, and if they match, it indicates that the terminal device sending the first request message is an attacker , Then the access network device rejects the first request message, thereby preventing the attacker from accessing.
- the fourth aspect of the present application provides an information protection method, which may be executed by a terminal device, or may be executed by a device (such as a processor or a chip, etc.) in the terminal device.
- This method takes terminal equipment as an example, and includes the following content.
- the terminal device uses the second key and the first encryption algorithm to encrypt the protected information, and sends the encrypted first encrypted protection information to the access network device, which can realize the privacy protection of the protected information. It can effectively prevent eavesdroppers from obtaining protection information from access layer messages, thereby improving the security of information transmitted between the terminal device and the access network device, and improving the security and reliability of the network.
- the terminal device receives a third message from the access management network element, where the third message includes the second key, the algorithm identifier of the first encryption algorithm, and the first key identifier.
- the second key and the first encryption algorithm are used for the terminal device to encrypt the protection information, and the first key identifier is used for the terminal device to be carried in the first request message so that the access network device can generate the second key.
- the access management network element sends a fourth message to the terminal device when it detects that an access network device has been compromised by an attacker, and the fourth message is used to update the terminal device Function and parameters for generating the decryption key, the fourth message includes the fourth key, the algorithm identification of the second encryption algorithm, and the third key identification.
- the terminal device encrypts the protection information according to the fourth key, the random parameter and the second encryption algorithm to obtain the second encrypted protection information; sends the second request message to the access network device, the first The second request message includes the third key identification, device identification information, random parameters, and second encryption protection information.
- the protected information encrypted with the fourth key cannot be decrypted, so that the protected information cannot be obtained.
- Other access network equipment that has not been compromised by the attacker When the second request message is received, it can be decrypted correctly to obtain the protection information, so that in a scenario where an access network device is compromised by an attacker, the information transmission between the terminal device and other access network devices can be protected.
- the transceiver unit is configured to receive a first request message from a terminal device.
- the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; determining a first function and a first function corresponding to the device identification information Two functions;
- a sixth aspect of the present application provides a communication device, which includes a processor, configured to implement the method described in the first aspect or the third aspect.
- the device may also include a memory for storing instructions and data.
- the memory is coupled with the processor.
- the processor executes the instructions stored in the memory, the device can realize the foregoing first aspect and each possible implementation manner of the first aspect, or the third aspect and each possible third aspect.
- the device may also include a communication interface, which is used for the device to communicate with other devices.
- the communication interface may be a circuit hardware module such as a transceiver and a bus, and other devices may be terminal devices.
- the device includes:
- the processor is configured to receive a first request message from a terminal device, where the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; determining a first function and a first function corresponding to the device identification information Two functions; generate a second key according to the first key identifier, random parameters, first function and second function; use the second key to decrypt the first encrypted protection information to obtain the protection information.
- the seventh aspect of the present application provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the first aspect and each possible implementation manner of the first aspect, or the third aspect and the third aspect The methods provided by each possible implementation.
- a ninth aspect of the present application provides a communication device.
- the communication device may be a terminal device or a device in the terminal device.
- the device may include modules corresponding to the methods/operations/steps/actions described in the second aspect or the fourth aspect and various possible implementation modes.
- the module may be a hardware circuit or It is software, or it can be realized by hardware circuit combined with software.
- the device may include a processing unit and a transceiver unit. Exemplary,
- the processor is configured to generate a second key according to the first key, random parameters, and the first function, and use the second key to encrypt the protection information to obtain the first encrypted protection information; and send the first encrypted protection information to the access network device.
- the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate a first key.
- Figure 1 is an example flow chart of the pre-configuration information based on the granularity of the terminal device
- Figure 2 is an example flow chart of pre-configuration information based on PLMN granularity
- Figure 3 is a schematic diagram of a network architecture applying an embodiment of the present application.
- Figure 4a is a schematic diagram of UE generating a second key in the first embodiment
- Figure 5a is a schematic diagram of the access network device generating a second key in the second embodiment
- FIG. 7 is a schematic flowchart of an information protection method provided in Embodiment 4 of this application.
- FIG. 8 is a schematic flowchart of an information protection method provided in Embodiment 5 of this application.
- Network slices can also be called slices or network slice instances.
- the business can be relatively independent of management and operation and maintenance, and provide tailor-made business functions and analysis capabilities.
- Instances of different service types can be deployed on different network slices, and different instances of the same service type can also be deployed on different network slices.
- a network slice can be regarded as an instantiated core network architecture.
- the network slice in the fifth-generation (5th-generation, 5G) network is a virtual private network that can be composed of a set of network functions and sub-networks. Many network slices can be deployed in the operator's network, and each network slice can have different performance to meet the needs of different applications and different vertical industries.
- the selection process of the network slicing will be triggered.
- the selection process of the network slice relies on information such as the subscription data of the terminal device, roaming agreement, local configuration information, and operator policy.
- the requested network slice information is provided to the core network for the core network to select the network slice instance for the terminal device.
- the requested (requested) network slice information may be the requested network slice selection assistance information (network slice selection assistance information, NSSAI), which is recorded as requested NSSAI.
- NSSAI network slice selection assistance information
- the NSSAI may be composed of one or more single network slice selection assistance information (S-NSSAI), and one S-NSSAI is used to identify a single network slice type. Since NSSAI is composed of one or more S-NSSAIs, NSSAI can be replaced with S-NSSAI or S-NSSAIs.
- the core network element When the core network element receives the requested network slice information, it selects the network slice that the terminal device is allowed to access based on the terminal device's contract data, requested network slice information, roaming agreement, local configuration information, operator policy and other information , And send the allowed network slice information to the terminal device.
- the allowed network slice information can be the allowed NSSAI, which is recorded as allowed NSSAI.
- allowed NSSAI the single network slice selection auxiliary information that the current operator's network is allowed to access can be represented by allowed S-NSSAI.
- the core network element can be the access and mobility management function (AMF) network element in the 5G system, or the network slice selection function (NSSF) network element, or unified data Management (unified data management, UDM) network elements.
- AMF access and mobility management function
- NSSF network slice selection function
- UDM unified data Management
- the terminal device When the terminal device receives the allowed NSSAI, it can carry the corresponding allowed NSSAI in the non-access stratum (NAS) message of the session establishment request according to the allowed NSSAI to request the access and mobility management function network element Access the corresponding network slice.
- the terminal device can also carry allowed NSSAI in the requested NSSAI when sending a registration request (carrying requested NSSAI) next time, and send the requested NSSAI to the access network device.
- the access network device When the access network device receives the requested NSSAI, it selects according to the requested NSSAI Access management network elements, such as AMF network elements, provide services for terminal devices.
- a terminal device sends a requested NSSAI to an access network device
- the terminal device sends a requested NSSAI to the access network device through an access stratum (AS) message, that is, the requested NSSAI is carried in the AS message.
- AS access stratum
- the AS message is not protected for security and privacy, the content carried by the AS message is at risk of being leaked.
- network slices that require higher privacy and security, such as police network slices or firefighting network slices. If the NSSAI corresponding to these network slices is carried in the AS message, the attacker can distinguish between police or firefighter users and ordinary users. .
- an eavesdropper can intercept the NSSAI in the AS message to determine whether there is a police station in a certain area.
- an eavesdropper can intercept the NSSAI in the AS message, determine the type of network slice that a user has recently accessed, and infer the user's recent behavior. Therefore, how to improve the security of information transmitted between the terminal equipment and the access network equipment is a technical problem to be solved urgently.
- the transmitted information can be network slice information, such as requested NSSAI; it can also be the capability information of the terminal device, such as whether the terminal device supports confidentiality protection.
- the solution is to pre-configure some information between the terminal device and the access network device; the terminal device uses the pre-configured information to protect the NSSAI carried in the AS message. Processing (for example, encrypting the S-NSSAI in the NSSAI, or using the S-NSSAI pseudonym); when the access network device receives the processed NSSAI, it uses the pre-configuration information to obtain the NSSAI. Because the pre-configuration information exists between the terminal device and the access network device, the security of NSSAI transmission over the air interface can be ensured.
- the pre-configuration information is based on the granularity of the terminal device.
- This implementation can refer to the flowchart shown in Figure 1, and can include:
- Step 100 The terminal device has been registered to the core network, and the 5G non-access stratum (NAS) has been established.
- NAS 5G non-access stratum
- Step 101 The AMF network element generates random parameters (random, RAND), and calculates temporary S-NSSAI (temporary S-NSSAI, T-S-NSSAI) using allowed S-NSSAI and RAND. Random parameters can be understood as freshness parameters.
- the AMF network element generates a RAND for the terminal device, and uses the RAND and the allowed NSSAI corresponding to the terminal device to calculate the T-S-NSSAI (for example, using RAND as the encryption key of the confidentiality algorithm 128-NEA1). It is understandable that T-S-NSSAI is a security-protected allowed NSSAI.
- the AMF network element can generate different RANDs for different terminal devices.
- Step 102 The AMF network element sends a registration success message to the terminal device.
- the registration success message includes T-S-NSSAI and allowed S-NSSAI.
- the terminal device receives the registration success message from the AMF network element.
- T-S-NSSAI and allowed S-NSSAI can be carried in the registration success message in the form of a two-tuple.
- the registration success message is used to indicate that the terminal device is successfully registered to the core network.
- the registration success message may be an N1 message.
- Step 103 The AMF network element sends an N2 message to the access network device, and the N2 message includes RAND.
- the access network device receives the N2 message from the AMF network element.
- the N2 message includes the RAND generated by the AMF network element for the terminal device.
- step 100 to step 103 are a pre-configuration process, and the order of performing step 102 and step 103 is not limited.
- Step 104 and step 105 are the process of using the pre-configured information.
- Step 104 The terminal device sends a registration request message to the access network device, where the registration request message includes T-S-NSSAI.
- the access network device receives the registration request message from the terminal device.
- Step 104 is that the terminal device sends a registration request message again.
- the registration request message includes the T-S-NSSAI received in step 102, and the requested NSSAI does not carry allowed NSSAI.
- Step 105 The access network device calculates the allowed S-NSSAI according to RAND and T-S-NSSAI.
- the access network device When the access network device receives the registration request message from the terminal device, it calculates the T-S-NSSAI according to the RAND received in step 103 to obtain the allowed NSSAI. For example, using RAND as the decryption key of the confidentiality algorithm 128-NEA1 to decrypt T-S-NSSAI to obtain allowed S-NSSAI.
- the pre-configuration information (such as RAND) is based on the granularity of the terminal device and belongs to the context information of the terminal device.
- the access network device deletes the context information of the terminal device, so that when the terminal device initiates a registration request again, the access network device cannot obtain the RAND and thus cannot obtain the allowed NSSAI .
- the AMF network element needs to update the context information of the terminal device on the access network device under its jurisdiction , The signaling overhead is too large.
- the pre-configuration information is based on the granularity of the public land mobile network (PLMN).
- PLMN public land mobile network
- Step 201 The access network device sends an establishment request message to the AMF network element.
- the AMF network element receives the establishment request message from the access network device.
- the establishment request message carries a two-tuple of S-NSSAI and T-S-NSSAI based on tracking area (TA) granularity.
- Step 202 The AMF network element sends an establishment response message to the access network device.
- the access network device receives the establishment response message from the AMF network element.
- the establishment response message carries a two-tuple of S-NSSAI and T-S-NSSAI based on PLMN granularity, and a random parameter RAND.
- step 201 and step 202 the number of two-tuples can be one or more.
- Step 203 The AMF network element sends a registration success message to the terminal device.
- the registration success message carries the same T-S-NSSAI and RAND as in step 202.
- step 201 to step 203 are pre-configuration procedures
- step 204 and step 205 are procedures of using pre-configuration information.
- Step 204 The terminal device sends an access layer message for connection establishment to the access network device.
- the access network device receives the access layer message from the terminal device for connection establishment.
- the terminal device inputs the T-S-NSSAI, S-TMSI, and RAND into the hash operation to obtain the first hash value, and carries the first hash value in the access layer message for connection establishment. Since the number of T-S-NSSAI may be multiple, the number of the first hash value may be multiple.
- An access layer message for connection establishment such as a radio resource control (Radio Resource Control, RRC) connection establishment completion message.
- RRC Radio Resource Control
- Step 205 The access network device calculates the second hash value.
- the access network device When the access network device receives the access layer message for connection establishment, it inputs the stored T-S-NSSAI and RAND and the S-TMSI of the terminal device into the hash operation to obtain the second hash value.
- the access network device compares the first hash value with the second hash value to determine the S-NSSAI (for example, if the first hash value and the second hash value are the same, it means that the terminal device requests to access the S-NSSAI at this time).
- -NSSAI is the allowed S-NSSAI corresponding to TS-NSSAI). Further, the access network device selects an AMF network element according to the determined S-NSSAI, and sends an initial NAS message to the selected AMF network element.
- the technology described in the embodiments of this application can be used in various communication systems, such as fourth-generation (4G) communication systems, 4.5G communication systems, 5G communication systems, systems that integrate multiple communication systems, or future-evolving communication systems .
- the terminal device (also referred to as a terminal) involved in the embodiments of this application can be a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; or on the water (such as a ship Etc.); can also be deployed in the air (such as aircraft, balloons and satellites, etc.).
- the terminal device may be a UE, and the UE includes a handheld device, a vehicle-mounted device, a wearable device, or a computing device with wireless communication functions.
- the UE may be a mobile phone, a tablet computer, or a computer with a wireless transceiver function.
- Terminal equipment can also be virtual reality (VR) terminal equipment, augmented reality (augmented reality, AR) terminal equipment, smart vehicle terminal equipment, wireless terminal in industrial control, wireless terminal in unmanned driving , Wireless terminal in telemedicine, wireless terminal in smart grid, wireless terminal in smart city, wireless terminal in smart home, etc.
- the device used to implement the function of the terminal device may be a terminal device; it may also be a device capable of supporting the terminal device to implement the function, such as a chip system. The device may be installed in the terminal device or connected to the terminal device. Matching use, such as a processor.
- the device for realizing the functions of the terminal device is a terminal device as an example to describe the technical solutions provided by the embodiments of the present application.
- the access network equipment involved in the embodiments of the present application may include a base station (base station, BS), and may be a device that is deployed in a wireless access network and can communicate with a terminal device wirelessly.
- the base station may have many forms, such as macro base stations, micro base stations, relay stations, and access points.
- the access network equipment involved in the embodiments of the present application may be a base station in 5G or a base station in long term evolution (LTE), where the base station in 5G may also be referred to as a transmission point (transmission and reception point). reception point, TRP) or next generation Node B (gNB).
- the device used to implement the function of the access network device may be the access network device; it may also be a device capable of supporting the access network device to implement the function, such as a chip system, which can be installed in the access network device. Used in or matched with access network equipment, such as a processor.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the device used to implement the functions of the access network equipment is the access network equipment as an example to describe the technical solutions provided in the embodiments of the present application.
- FIG. 3 is a schematic diagram of a network architecture to which an embodiment of the present application is applied.
- FIG. 3 includes an access network device 301 and a terminal device 302.
- the terminal device 302 generates a second key according to the first key, random parameters, and the first function, and uses the second key to perform protection information such as network slice information or the capability information of the terminal device 302. Encrypt to obtain the first encrypted protection information; send a first request message to the access network device 301, the first request message including the first key identifier, device identification information, random parameters, and first encrypted protection information.
- the access network device 301 When the access network device 301 receives the first request message, it determines the first function and the second function corresponding to the device identification information; according to the first key identifier, random parameters, the first function, and the second function, a second secret is generated Key; Use the second key to decrypt the first encrypted protection information to obtain protection information such as network slice information or capability information of the terminal device 302.
- FIG. 3 also includes an access management network element 303.
- the access management network element 303 may be an AMF network element in a 5G system, or a network element with the same function as the AMF network element in a future communication system.
- the access management network element 303 can provide the access network device 301 with the correspondence between the device identification information and the identification information of the first function and the identification information of the second function, so that the access network device 301 can determine the corresponding relationship between the device identification information The first function and the second function.
- the terminal device 302 encrypts protection information such as network slice information or the capability information of the terminal device 302 according to the second key, random parameters, and the first encryption algorithm to obtain the first encrypted protection information;
- the network device 301 sends a first request message, and the first request message includes the first key identifier, device identification information, random parameters, and first encryption protection information.
- the access network device 301 receives the first request message, it determines the first function, the second function, and the first encryption algorithm corresponding to the device identification information; according to the first key identification, the first function, and the second function, the first function is generated.
- Two keys decrypt the first encrypted protection information according to the second key, random parameters and the first encryption algorithm to obtain protection information such as network slice information or capability information of the terminal device 302.
- the access management network element 303 may provide the access network device 301 with the correspondence between the device identification information and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm, so that The access network device 301 may determine the first function, the second function, and the first encryption algorithm corresponding to the device identification information.
- the information protection method provided in the embodiments of the present application can not only be applied to a scenario where a terminal device and an access network device transmit network slice information, but also can be applied to a scenario where a terminal device and an access network device transmit capability information of the terminal device.
- the terminal device is a UE as an example
- the access management network element is an AMF as an example.
- the name of the message between each network element or the name of each parameter in the message in the following embodiments of this application is just an example, and other names may also be used in specific implementations.
- the embodiments of this application do not make specific details about this. limited.
- FIG. 4 is a schematic diagram of the flow of the information protection method provided in Embodiment 1 of this application.
- the flow may include but is not limited to the following steps:
- Step 401 The UE generates a second key according to the first key, random parameters and the first function, and uses the second key to encrypt the protection information to obtain the first encrypted protection information.
- the first key can be expressed as Key_1;
- the random parameter is a random parameter RAND generated by the UE;
- the first function is an irreversible function, which can be a hash function, which can be expressed as hash_1.
- the first key, the random parameters and the first function can be obtained through step 400c.
- the first function can also be pre-configured on the UE, so that the UE can directly use the first function.
- the UE inputs Key_1 and RAND into hash_1 to obtain the second key, which can be expressed as Key_2.
- the UE inputs Key_1, RAND, and UE identifier (identifier, ID) into hash_1 to obtain the second key.
- the UE ID may be the UE's equipment identity, international mobile subscriber identity (international mobile subscriber identity, IMSI), temporary mobile subscriber identity (temporary mobile subscriber identity, TMSI), GUTI or S-TMSI, etc.
- the process of UE generating the second key can be seen in Fig. 4a, and the dotted line in Fig. 4a indicates optional.
- the UE uses the second key to encrypt the protection information to obtain the first encrypted protection information.
- the protection information can be network slice information, such as requested NSSAI or allowed NSSAI; it can also be UE capability information; it can also be sensitive information that needs to be protected at the AS layer.
- the protection information is described using S-NSSAI as an example.
- S-NSSAI can be requested NSSAI or allowed S-NSSAI.
- the first encrypted protection information is the information obtained by using Key_2 to encrypt and protect the S-NSSAI.
- the UE encrypting the S-NSSAI may be: S-NSSAI XOR hash_1 (Key_1 XOR RAND).
- XOR represents an exclusive OR operation
- the exclusive OR result of Key_1 and RAND is input to hash_1
- the output result of S-NSSAI and hash_1 is XORed to obtain the encrypted protected S-NSSAI.
- the calculation overhead is small.
- the method of using the second key to encrypt the protected information is not limited.
- Step 402 The UE sends a first request message to the access network device.
- the access network device receives the first request message from the UE.
- the first request message includes the first key identification, device identification information, random parameters, and first encryption protection information.
- the first key identifier may be identified as Key_1ID, the first key identifier may be used to generate the first key, and the UE may obtain the first key identifier through step 400c.
- the device identification information may include the UE ID.
- the AMF network element ID can be used to assist in determining the first function and the second function corresponding to the device identification information.
- the random parameter is the random parameter RAND generated by the UE.
- Step 403 The access network device determines the first function and the second function corresponding to the device identification information.
- the access network device determines the first function and the second function corresponding to the device identification information.
- the correspondence can be the first function and the second function corresponding to the device identification information, the first function and the second function corresponding to the UE ID in the device identification information, or the AMF network element ID in the UE ID.
- the second function is also an irreversible function, which can be a hash function, which can be expressed as hash_2.
- the first function and the second function can be different functions of the same type or different types of functions. It is understandable that the access network device determines the hash_1 and hash_2 corresponding to the AMF network element.
- the access network device receives a first message from each AMF network element, the first message includes the identification information of the first function and the identification information of the second function, and establishes the ID of each AMF network element and the first function The corresponding relationship between the identification information of the second function and the identification information of the second function.
- the access network device receives the first request message, it can determine its corresponding first function and second function according to the AMF network element ID carried in the first request message.
- the first message further includes a first calculation parameter, and the first calculation parameter may be expressed as a_1.
- the access network device establishes the corresponding relationship between the identification information of each AMF network element and the first function, the identification information of the second function, and the first calculation parameter. In this way, when the access network device receives the first request message, it can determine the first function, the second function, and the first calculation parameter corresponding to the AMF network element.
- the first calculation parameter, the first key identifier and the second function can be used to determine the first key.
- the identification information of the first function and the identification information of the second function are stored on the access network device.
- the access network device defaults the stored first function and second function as the first function and second function corresponding to the AMF network element.
- the first calculation parameter also exists on the access network device, and the access network device uses the stored first calculation parameter as the first calculation parameter corresponding to the AMF network element by default.
- the identification information of the above-mentioned first function may be the version number (version) or function identification of the first function, for example, hash_1version.
- the identification information of the above-mentioned second function may be the version number or function identification of the second function.
- Step 404 The access network device generates a second key according to the first key identifier, the random parameter, the first function, and the second function.
- the access network device generates a first key according to the first key identifier and the second function; and generates a second key according to the first key, random parameters and the first function.
- the access network device generates the first key according to the first key identifier, the second function, and the first calculation parameter.
- the first key identifier and the first calculation parameter are input into the second function, and the first key is output.
- the access network device generates the second key according to the first key, random parameters, UE ID, and the first function. For example, input the first key, random parameters, and UE ID into the first function, and output the second key.
- Step 405 The access network device uses the second key to decrypt the first encrypted protection information to obtain the protection information.
- the access network device uses the second key to decrypt the first encrypted protection information to obtain the protected information.
- the sensitive information of the AS layer sent by the UE to the access network device is protected, effectively preventing eavesdroppers from the AS layer message Obtain sensitive information.
- get S-NSSAI the protection of the S-NSSAI sent by the UE to the access network device can be realized, which can effectively prevent the eavesdropper from obtaining the S-NSSAI.
- the access network device continues to perform the UE registration process according to the obtained S-NSSAI and the information carried in the first request message.
- step 401 also includes steps 400a-400c before step 401. It can be understood that steps 400a-400c are the pre-configuration process in the initial registration process, and the first request message is the registration request message in the subsequent registration process.
- Step 400a The access network device sends a request message to the AMF network element.
- the AMF network element receives the request message from the access network device.
- the access network device sends a request message to the AMF network element.
- the request message is used to request the AMF network element to perform the initial configuration of the access network device and inform the AMF network element of the capability information supported by the access network device.
- the request message can be understood as a configuration request message or a network access request message.
- the request message may be, for example, a setup request (setup request) message.
- Step 400b the AMF network element sends the first message to the access network device.
- the access network device receives the first message from the AMF network element.
- the AMF network element When the AMF network element receives the request message, it sends a first message to the access network device.
- the first message is used to respond to the request message, and may be, for example, a setup response (setup response) message.
- the response message is used by the AMF network element to perform initial configuration of the access network device, and can be understood as a configuration request response message or a network access request response message.
- the first message includes identification information of the first function and identification information of the second function.
- the access network device receives the first message, it establishes the correspondence between the AMF network element ID and the identification information of the first function and the identification information of the second function.
- the correspondence may be expressed as an AMF network element. Therefore, when the access network device receives the device identification information, it can determine the first function and the second function corresponding to the AMF network element ID according to the AMF network element ID.
- the first message further includes the first calculation parameter.
- the access network device establishes the correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the first calculation parameter.
- the correspondence may be expressed as an AMF network element So that when the access network device receives the device identification information, it can obtain the AMF network element ID from the device identification information, and further determine the first function, the second function, and the first calculation parameter corresponding to the AMF network element ID.
- Step 400c the AMF network element sends a third message to the UE.
- the UE receives the third message from the AMF network element.
- the AMF network element sends a third message (for example, a registration success message) to the UE.
- the third message includes the identification information of the first function, the first key identification, and the first key.
- the first key identifier and the first key may be carried in the third message in the form of a two-tuple.
- the specific third message is what kind of message in the initial registration process, which is not limited in the embodiment of the present application.
- the AMF network element sends the first key and the identification information of the first function to the UE, so that the UE inputs the first key and random parameters into the first function to obtain the second key.
- the AMF network element sends the first key identifier to the UE, so that the UE sends the first key identifier to the access network device, so that the access network device generates the first key according to the first key identifier and the second function, and then according to The first key and the first function generate the second key.
- the above-mentioned first key may also be described as a first-level key
- the above-mentioned second key may also be described as a second-level key.
- the pre-configuration information on the access network device is the first function and the second function (optionally including the first calculation parameter), and the pre-configuration information on the UE is the first function, the first key identifier, and the first key
- the pre-configuration information does not belong to the context information of the UE, thereby overcoming the technical shortcomings of FIG. 1.
- the RANDs generated by different UEs are different, and the second keys obtained are different, so that the keys for encrypting and protecting the protected information are different, thereby overcoming the technical defect of FIG. 2.
- FIG. 5 is a schematic diagram of the flow of the information protection method provided in the second embodiment of this application.
- the flow may include but is not limited to the following steps:
- Step 501 The UE encrypts the protection information according to the second key, random parameters and the first encryption algorithm to obtain the first encryption protection information.
- the random parameter is a random parameter generated by the UE.
- the first encryption algorithm is an algorithm for encrypting or decrypting protected information.
- the second key and the first encryption algorithm can be obtained through step 500c, and for details, please refer to the detailed description of step 500c.
- the second key and the first encryption algorithm may also be default information pre-configured on the UE.
- the UE uses the second key, random parameters and the first encryption algorithm to encrypt the S-NSSAI to obtain the encrypted protected S-NSSAI, that is, the first encrypted protection information.
- Step 502 The UE sends a first request message to the access network device.
- the access network device receives the first request message from the UE.
- the first request message includes the first key identification, device identification information, random parameters, and first encryption protection information.
- the first key identifier can be used to determine the first key.
- the device identification information refer to the detailed description of the device identification information in the embodiment shown in FIG. 4.
- the random parameter is the random parameter generated by the UE.
- Step 503 The access network device determines the first function, the second function, and the first encryption algorithm corresponding to the device identification information.
- the access network device determines the first function, the second function, and the first encryption algorithm corresponding to the device identification information. Both the first function and the second function are irreversible functions, the first function can be expressed as f1(x), and the second function can be expressed as f2(x). The first function and the second function can be different functions of the same type or different types of functions. It is understandable that the access network device determines f1(x), f2(x) and the first encryption algorithm corresponding to the AMF network element.
- the access network device receives a first message from each AMF network element, the first message includes the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm, and establishes each Correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm.
- the access network device receives the first request message, it can determine its corresponding first function, second function, and first encryption algorithm according to the AMF network element ID carried in the first request message.
- the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm are stored on the access network device.
- the access network device defaults the stored first function, second function, and first encryption algorithm as the first function, second function, and first encryption algorithm corresponding to the AMF network element.
- Step 504 The access network device generates a second key according to the first key identifier, the first function, and the second function.
- the access network device generates the first key according to the first key identifier and the first function. That is, the first key identifier is used as the input of the first function, and the output of the first function is the first key.
- the first key is generated according to the first key identifier, the UE ID, and the first function. That is, the first key identifier and the UE ID are used as the input of the first function, and the output of the first function is the first key.
- the access network device generates a second key identifier according to the first key and the second function. That is, the first key is used as the input of the second function, and the output of the first function is the second key identifier.
- the second key identifier is generated according to the first key identifier, the first key, and the second function. That is, the first key identifier and the first key are used as the input of the second function, and the output of the second function is the second key identifier.
- the second key identifier is generated according to the first key, the UE ID, and the second function. That is, the first key and the UE ID are used as the input of the second function, and the output of the second function is the second key identifier.
- the second key identifier is generated according to the first key identifier, the first key, the UE ID, and the second function. That is, the first key identifier, the first key, and the UE ID are used as the input of the second function, and the output of the second function is the second key identifier.
- the access network device generates a second key according to the second key identifier and the first function. That is, the second key identifier is used as the input of the first function, and the output of the first function is the second key.
- the second key is generated according to the second key identifier, the UE ID, and the first function. That is, the second key identifier and the UE ID are used as the input of the first function, and the output of the first function is the second key.
- the process of generating the second key by the access network device can be referred to as shown in FIG. 5a.
- the dotted line in Figure 5a indicates optional.
- Step 505 The access network device decrypts the first encrypted protection information according to the second key, random parameters and the first encryption algorithm to obtain the protection information.
- the access network device continues to perform the UE registration process according to the obtained S-NSSAI and the information carried in the first request message.
- step 501 also includes steps 500a to 500c before step 501. It can be understood that steps 500a to 500c are the pre-configuration process in the initial registration process, and the first request message is the registration request message in the subsequent registration process.
- Step 500a The access network device sends a request message to the AMF network element.
- the AMF network element receives the request message from the access network device.
- the function and example of the request message can be seen in 400a, which will not be repeated here.
- step 500b the AMF network element sends the first message to the access network device.
- the access network device receives the first message from the AMF network element.
- the first message includes identification information of the first function, identification information of the second function, and algorithm identification of the first encryption algorithm.
- the access network device receives the first message, it establishes the correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm.
- the correspondence may be Expressed as AMF network element Therefore, when the access network device receives the device identification information, it can further determine the first function, the second function, and the first encryption algorithm corresponding to the AMF network element ID according to the AMF network element ID in the device identification information.
- step 500c the AMF network element sends a third message to the UE.
- the UE receives the third message from the AMF network element.
- FIG. 6 is a schematic diagram of the flow of the information protection method provided in the third embodiment of this application.
- the flow may include but is not limited to the following steps:
- step 600b the AMF network element sends the first message to the access network device.
- the access network device receives the first message from the AMF network element.
- the first message includes the identification information of the first function and the algorithm identification of the first encryption algorithm.
- step 600c the AMF network element sends a third message to the UE.
- the UE receives the third message from the AMF network element.
- the third message includes the second key identifier, the second key, and the algorithm identifier of the first encryption algorithm.
- the UE may carry the second key identifier in the first request message, so that the access network device generates the second key according to the second key identifier and the first function.
- the second key and the first encryption algorithm are used for the UE to encrypt and protect the protected information.
- Step 601 The UE encrypts the protection information according to the second key, the random parameter and the first encryption algorithm to obtain the first encryption protection information.
- step 601 refer to the specific description of step 501, which will not be repeated here.
- Step 602 The UE sends a first request message to the access network device.
- the access network device receives the first request message from the UE.
- the first request message includes the second key identification, device identification information, random parameters, and first encryption protection information.
- Step 603 The access network device determines the first function and the first encryption algorithm corresponding to the device identification information.
- Step 604 The access network device generates a second key according to the second key identifier and the first function.
- the access network device inputs the second key identifier into the first function, and the output of the first function is the second key.
- the access network device inputs the second key identifier and the UE ID into the first function, and the output of the first function is the second key.
- the process of generating the second key by the access network device can be referred to as shown in FIG. 6a.
- the dotted line in Figure 6a indicates optional.
- Step 605 The access network device decrypts the first encrypted protection information according to the second key, random parameters and the first encryption algorithm to obtain the protection information.
- step 605 refer to the specific description of step 505, which will not be repeated here.
- the difference between the embodiment shown in FIG. 6 and the embodiment shown in FIG. 5 is that the contents carried in the first message, the third message, and the first request message are different. Compared with the embodiment shown in FIG. 5, the implementation shown in FIG. 6 is simpler.
- the embodiment shown in FIG. 6 can protect the protection information sent by the UE to the access network device, and can overcome the technical defects of FIG. 1 and FIG. 2.
- FIG. 7 is a schematic flowchart of the information protection method provided in the fourth embodiment of this application.
- Figure 7 In the scenario where the AMF network element senses that the access network device 1 is compromised by an attacker, it sends a second message to other access network devices other than the access network device 1, such as the access network device 2, and sends the second message to the UE.
- the process shown in Figure 7 may include but is not limited to the following steps:
- step 701 the AMF network element senses that the access network device 1 is compromised by an attacker.
- the AMF network element can sense that the access network device 1 is breached by an attacker when it detects that the access network device 1 has abnormal traffic or the access network device 1 does not report information.
- the specific method for detecting that the access network device is compromised by an attacker is not limited in this application.
- Step 702 The AMF network element sends a second message to the access network device 2.
- the access network device 2 receives the second message from the AMF network element.
- the second message includes identification information of the third function and identification information of the fourth function.
- the access network device establishes a correspondence between the AMF network element ID and the identification information of the third function and the identification information of the fourth function.
- the second message further includes a second calculation parameter.
- the access network device establishes a correspondence between the AMF network element ID and the identification information of the third function, the identification information of the fourth function, and the second calculation parameter.
- Step 703 The AMF network element sends a fourth message to the UE.
- the UE receives the fourth message from the AMF network element.
- the fourth message includes the identification information of the third function, the third key identification and the third key.
- Step 704 The UE generates a fourth key according to the third key, random parameters and the third function, and uses the fourth key to encrypt the protection information to obtain the second encrypted protection information.
- Step 705 The UE sends a second request message to the access network device 2.
- the access network device 2 receives the second request message from the UE.
- the second request message includes the third key identification, device identification information, random parameters, and second encryption protection information.
- the random parameter carried in the second request message may be the same as or different from the random parameter carried in the first request message. For example, before the UE receives the fourth message and sends the second request message, it regenerates a random parameter, then the random parameter is different from the random parameter carried in the first request message.
- Step 706 The access network device 2 determines the third function and the fourth function corresponding to the device identification information.
- Step 707 The access network device 2 generates a fourth key according to the third key identifier, random parameters, third function, and fourth function.
- Step 708 The access network device 2 uses the fourth key to decrypt the second encrypted protection information to obtain the protection information.
- the embodiment shown in Fig. 7 is based on the embodiment shown in Fig. 4. For the same or similar parts, please refer to the specific description of the embodiment shown in Fig. 4. The difference is that the access network equipment in Fig. 4 has not been compromised by an attacker.
- the access network device 1 is compromised by an attacker, and the AMF network element updates the pre-configuration information of other access network devices and the pre-configuration information of the UE. In this way, when the access network device 1 receives the second encrypted protection information, it cannot use the previous second key to obtain the protection information, which can effectively prevent attackers from obtaining the protection information, thereby improving the security and reliability of the network.
- the pre-configuration information message updated to other access network devices is the identification information of the third function, the identification information of the fourth function, and the algorithm identification of the second encryption algorithm.
- the pre-configuration information updated for the UE in the embodiment corresponding to FIG. 5 is the third key identifier, the fourth key, and the algorithm identifier of the second encryption algorithm.
- the pre-configuration information updated for the UE in the embodiment corresponding to FIG. 6 is the fourth key identifier, the fourth key, and the algorithm identifier of the second encryption algorithm.
- FIG. 8 is a schematic flowchart of the information protection method provided in the fifth embodiment of this application.
- Figure 8 tells the access network device to reject the registration request message from the UE in the scenario where the AMF network element perceives the UE as an attacker.
- the process shown in Figure 8 may include but is not limited to the following steps:
- step 801 the AMF network element perceives that the UE is an attacker.
- the method by which the AMF network element perceives the UE as an attacker is not limited in the embodiment of this application.
- the UE may obtain the pre-configuration information through the pre-configuration process in the flow shown in FIG. 4 or FIG. 5 or FIG. 6.
- Step 802 The AMF network element sends an indication message to the access network device.
- the access network device receives the indication message from the AMF network element.
- the indication message is used to indicate the illegal key identification information.
- Step 803 The UE sends a first request message to the access network device.
- the access network device receives the first request message from the UE.
- Step 804 If the key identification included in the first request message matches the illegal key identification information, the first request message is rejected.
- the first request message includes the first key identifier. If the first key identification matches the illegal key identification information, the access network device rejects the first request message.
- the first request message includes the first key identifier. If the first key identification matches the illegal key identification information, the access network device rejects the first request message.
- the first request message includes the second key identifier. If the second key identification matches the illegal key identification information, the access network device rejects the first request message.
- the AMF network element can notify the access network device to reject the registration request message of the UE when it perceives that the UE is an attacker, thereby improving security.
- the embodiments of the present application also provide corresponding devices, including corresponding units for executing the foregoing embodiments.
- the unit may be software, hardware, or a combination of software and hardware.
- FIG. 9 is a schematic structural diagram of a communication device provided by this application.
- the communication device 900 shown in FIG. 9 includes a transceiving unit 901 and a processing unit 902.
- the device 900 is an access network device:
- the transceiver unit 901 is configured to receive a first request message from a terminal device, where the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; determining that the device identification information corresponds to The first function and the second function;
- the processing unit 902 is configured to generate a second key according to the first key identifier, random parameters, the first function, and the second function; use the second key to decrypt the first encrypted protection information to obtain the protection information.
- the device 900 When the device 900 is an access network device, it is used to implement the functions of the access network device in the embodiment shown in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. For details, refer to FIG. 4, FIG. 5, and FIG. 6, Corresponding description of the access network equipment in the embodiment shown in FIG. 7 or FIG. 8.
- the device 900 is a terminal device:
- the processing unit 902 is configured to generate a second key according to the first key, random parameters, and the first function, and use the second key to encrypt the protection information to obtain the first encrypted protection information;
- the transceiver unit 901 is configured to send a first request message to the access network device, where the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate the first key identifier One key.
- the device 900 When the device 900 is a terminal device, it is used to implement the functions of the UE in the embodiment shown in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. For details, refer to FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. The corresponding description of the UE in the illustrated embodiment.
- FIG. 10 is a schematic structural diagram of another communication device provided by this application.
- the communication device 1000 shown in FIG. 10 includes at least one processor 1001, a memory 1002, and optionally, a communication interface 1003.
- the memory 1002 may be a volatile memory, such as random access memory; the memory may also be a non-volatile memory, such as read-only memory, flash memory, hard disk drive (HDD) or solid-state drive (solid-state drive, SSD) or the memory 1002 is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto.
- the memory 1002 may be a combination of the above-mentioned memories.
- connection medium between the foregoing processor 1001 and the memory 1002 is not limited in the embodiment of the present application.
- the memory 1002 and the processor 1001 are connected through a bus 1004 in the figure, and the bus 1004 is represented by a thick line in the figure.
- the connection mode between other components is only for schematic description, and is not quoted. Is limited.
- the bus 1004 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used to represent in FIG. 10, but it does not mean that there is only one bus or one type of bus.
- the processor 1001 may have a data transceiver function and can communicate with other devices.
- an independent data transceiver module such as a communication interface 1003, may be used to send and receive data; the processor 1001 is communicating with other devices. During communication, data transmission can be performed through the communication interface 1003.
- the processor in FIG. 10 can call the computer execution instruction stored in the memory 1002, so that the access network device executes any of the foregoing method embodiments.
- the method implemented by the access network equipment can call the computer execution instruction stored in the memory 1002, so that the access network device executes any of the foregoing method embodiments. The method implemented by the access network equipment.
- the processor in FIG. 10 may invoke the computer execution instructions stored in the memory 1002 to cause the UE to execute the method executed by the UE in any of the foregoing method embodiments. .
- the functions/implementation processes of the processing unit and the transceiver unit in FIG. 9 may be implemented by the processor 1001 in FIG. 10 calling a computer execution instruction stored in the memory 1002.
- the function/implementation process of the processing unit in FIG. 9 may be implemented by the processor 1001 in FIG. 10 calling computer execution instructions stored in the memory 1002, and the function/implementation process of the transceiver unit in FIG. 9 may be implemented through the communication in FIG. Interface 1003 is implemented.
- An embodiment of the present application also provides a communication system, which may include the access network device and UE in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. Optionally, it also includes AMF network elements.
- the processing unit used to execute these technologies at a communication device can be implemented in one or more general-purpose processors, digital signal processors ( digital signal processor, DSP), digital signal processing device, application specific integrated circuit (ASIC), programmable logic device, field programmable gate array (FPGA), or other programmable logic device, Discrete gate or transistor logic, discrete hardware components, or any combination of the above.
- the general-purpose processor may be a microprocessor.
- the general-purpose processor may also be any traditional processor, controller, microcontroller, or state machine.
- the processor can also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors combined with a digital signal processor core, or any other similar configuration. accomplish.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), a Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM), which is used as an external cache.
- RAM random access memory
- static random access memory static random access memory
- dynamic RAM dynamic RAM
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous DRAM, SDRAM
- double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
- enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory serial DRAM, SLDRAM
- direct rambus RAM direct rambus RAM
- the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the function of any of the foregoing method embodiments is realized.
- This application also provides a computer program product, which, when executed by a computer, realizes the functions of any of the foregoing method embodiments.
- system and "network” in this article are often used interchangeably in this article.
- the term “and/or” in this article is only an association relationship that describes the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone In the three cases of B, A can be singular or plural, and B can be singular or plural.
- B corresponding to A means that B is associated with A, and B can be determined according to A.
- determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
- the corresponding relationships shown in the tables in this application can be configured or pre-defined.
- the value of the information in each table is only an example, and can be configured to other values, which is not limited in this application.
- the corresponding relationship shown in some rows may not be configured.
- appropriate deformation adjustments can be made based on the above table, such as splitting, merging, and so on.
- the names of the parameters shown in the titles in the above tables may also adopt other names that can be understood by the communication device, and the values or expressions of the parameters may also be other values or expressions that can be understood by the communication device.
- other data structures can also be used, such as arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables, or hash tables. Wait.
- the pre-definition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, curing, or pre-fired.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
本申请要求于2020年5月30日提交中国专利局、申请号为202010480899.7、申请名称为“信息保护方法、系统及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office, the application number is 202010480899.7, and the application name is "information protection method, system and communication device" on May 30, 2020, the entire content of which is incorporated into this application by reference middle.
本申请涉及通信技术领域,尤其涉及一种信息保护方法、系统及通信装置。This application relates to the field of communication technology, and in particular to an information protection method, system and communication device.
网络切片是一种新式网络和业务模式,可通过定制网络和管理,从而更好地满足消费者和企业的个性化服务需求,例如计费、策略、安全、移动性等需求。网络切片可被用于移动带宽、多媒体、大规模机器类通信(massive machine type communication)和关键机器类通信(critical machine type communication)。Network slicing is a new type of network and business model that can be customized and managed to better meet the needs of consumers and enterprises for personalized services, such as billing, policy, security, and mobility. Network slicing can be used for mobile bandwidth, multimedia, large-scale machine type communication (massive machine type communication), and critical machine type communication (critical machine type communication).
当终端设备向网络注册时,向核心网提供请求的网络切片信息,用于核心网为终端设备选择网络切片实例;核心网根据终端设备的签约数据、请求的网络切片信息、漫游协议、本地配置信息、运营商策略等信息,为终端设备选择允许接入的网络切片,并向终端设备发送允许接入的网络切片信息。终端设备在接收到允许接入的网络切片信息时,可根据允许接入的网络切片信息,请求接入相应的网络切片,向接入网设备发送允许接入的网络切片信息。接入网设备在接收到允许接入的网络切片信息时,可根据允许接入的网络切片信息,选择接入管理网元为终端设备提供服务。When a terminal device registers with the network, it provides the core network with the requested network slicing information, which is used by the core network to select a network slicing instance for the terminal device; the core network is based on the terminal device’s contract data, requested network slicing information, roaming agreement, and local configuration Information, operator policies and other information, select the network slices that are allowed to be accessed for the terminal device, and send the network slice information that is allowed to be accessed to the terminal device. When the terminal device receives the allowed network slice information, it may request to access the corresponding network slice according to the allowed network slice information, and send the allowed network slice information to the access network device. When the access network device receives the allowed access network slice information, it can select the access management network element to provide services for the terminal device according to the allowed access network slice information.
终端设备与接入网设备之间传输的信息,例如网络切片信息或终端设备的能力信息等,存在被泄露的风险,因此,如何提高终端设备与接入网设备之间传输信息的安全性是亟待解决的技术问题。Information transmitted between terminal equipment and access network equipment, such as network slice information or terminal equipment capability information, is at risk of being leaked. Therefore, how to improve the security of information transmitted between terminal equipment and access network equipment is Technical problems to be solved urgently.
发明内容Summary of the invention
本申请提供一种信息保护方法及通信装置,可以提高终端设备与接入网设备之间传输信息的安全性,从而提高网络的安全性、可靠性。The present application provides an information protection method and communication device, which can improve the security of information transmitted between terminal equipment and access network equipment, thereby improving the security and reliability of the network.
本申请第一方面提供一种信息保护方法,该方法可以由接入网设备执行,也可以由接入网设备中的装置(例如处理器或芯片等)执行。该方法以接入网设备为例,包括以下内容。The first aspect of the present application provides an information protection method, which may be executed by an access network device, or may be executed by a device (such as a processor or a chip, etc.) in the access network device. This method takes the access network device as an example, and includes the following content.
接入网设备接收来自终端设备的第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;接入网设备确定设备标识信息对应的第一函数和第二函数;根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥;采用第二密钥对第一加密保护信息进行解密,得到保护信息。The access network device receives a first request message from the terminal device. The first request message includes the first key identifier, device identification information, random parameters, and first encryption protection information; the access network device determines the first request message corresponding to the device identification information. Function and second function; Generate a second key according to the first key identifier, random parameters, first function and second function; Use the second key to decrypt the first encrypted protection information to obtain the protected information.
其中,保护信息可以是网络切片信息,也可以是终端设备的能力信息,还可以是其他需要在接入层保护的信息。第一加密保护信息是采用第二密钥对保护信息进行加密获得。设备标识信息可为终端设备的标识信息,也可为接入管理网元的标识信息。The protection information may be network slice information, terminal device capability information, or other information that needs to be protected at the access layer. The first encrypted protection information is obtained by using the second key to encrypt the protection information. The device identification information may be the identification information of the terminal device or the identification information of the access management network element.
本申请第一方面,接入网设备在接收到第一请求消息时,确定计算第二密钥所需的函 数,采用确定的函数、第一密钥标识和随机参数,计算得到第二密钥,采用第二密钥对第一加密保护信息进行解密,得到保护信息,可以实现对终端设备向接入网设备发送的保护信息的保护,有效防止窃听者从接入层消息中获得保护信息,从而提高终端设备与接入网设备之间传输信息的安全性,提高网络的安全性、可靠性。In the first aspect of this application, when the access network device receives the first request message, it determines the function required to calculate the second key, and uses the determined function, the first key identifier and random parameters to calculate the second key , Use the second key to decrypt the first encrypted protection information to obtain the protection information, which can realize the protection of the protection information sent by the terminal device to the access network device, and effectively prevent eavesdroppers from obtaining the protection information from the access layer message. Thereby, the security of information transmission between the terminal equipment and the access network equipment is improved, and the security and reliability of the network are improved.
在一种可能的实现方式中,接入网设备根据各个设备标识信息与第一函数的标识信息以及第二函数的标识信息之间的对应关系,确定第一请求消息携带的设备标识信息对应的第一函数和第二函数。接入网设备上存有各个设备标识信息与第一函数的标识信息以及第二函数的标识之间的对应关系,以便接入网设备可以确定第一请求消息携带的设备标识信息对应的第一函数和第二函数。In a possible implementation manner, the access network device determines the corresponding device identification information carried in the first request message according to the correspondence between each device identification information and the identification information of the first function and the identification information of the second function. The first function and the second function. The corresponding relationship between the identification information of each device and the identification information of the first function and the identification of the second function is stored on the access network device, so that the access network device can determine the first corresponding to the device identification information carried in the first request message. Function and second function.
其中,对应关系可以是终端设备的标识信息与第一函数的标识信息以及第二函数的标识信息之间的对应关系,也可以是接入管理网元的标识信息与第一函数的标识信息以及第二函数的标识信息之间的对应关系。Wherein, the corresponding relationship may be the corresponding relationship between the identification information of the terminal device and the identification information of the first function and the identification information of the second function, or the identification information of the access management network element and the identification information of the first function, and Correspondence between the identification information of the second function.
在一种可能的实现方式中,接入网设备接收来自接入管理网元的第一消息,第一消息包括第一函数的标识信息和第二函数的标识信息,接入网设备建立该接入管理网元的标识信息与第一函数的标识信息和第二函数的标识信息之间的对应关系,以便接入网设备在接收到第一请求消息时,可以确定出设备标识信息对应的第一函数和第二函数。In a possible implementation manner, the access network device receives a first message from an access management network element, the first message includes identification information of the first function and identification information of the second function, and the access network device establishes the access The corresponding relationship between the identification information of the incoming management network element and the identification information of the first function and the identification information of the second function, so that when the access network device receives the first request message, the first request message corresponding to the device identification information can be determined One function and second function.
在一种可能的实现方式中,接入网设备在生成第二密钥时,根据第一密钥标识和第二函数,生成第一密钥,根据第一密钥、随机参数和第一函数,生成第二密钥。采用两层密钥的计算,最终得到第二密钥,以解密第一加密保护信息。采用两层密钥,使得保护信息的加密密钥可频繁更换,从而增加安全性。In a possible implementation manner, when the access network device generates the second key, the first key is generated according to the first key identifier and the second function, and the first key is generated according to the first key, random parameters and the first function. , Generate the second key. Using two-layer key calculation, the second key is finally obtained to decrypt the first encrypted protection information. The use of two layers of keys allows the encryption keys to protect the information to be replaced frequently, thereby increasing security.
在一种可能的实现方式中,接入网设备根据第一密钥、随机参数、第一函数以及设备标识信息,生成第二密钥,使得生成第二密钥的参数较多,增加复杂度,以提高安全性。设备标识信息,例如终端设备的标识信息。In a possible implementation manner, the access network device generates the second key according to the first key, random parameters, first function, and device identification information, so that there are more parameters for generating the second key, which increases the complexity. To improve safety. Device identification information, such as the identification information of the terminal device.
在一种可能的实现方式中,接入网设备确定第一请求消息携带的设备标识信息对应的第一函数和第二函数的同时,还确定该设备标识信息对应的第一计算参数,第一计算参数作为生成第二密钥的一种参数,增加计算的复杂度,以提高安全性。接入网设备根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥。In a possible implementation manner, when the access network device determines the first function and the second function corresponding to the device identification information carried in the first request message, it also determines the first calculation parameter corresponding to the device identification information. The calculation parameter is used as a parameter for generating the second key, which increases the complexity of the calculation to improve security. The access network device generates the second key according to the first key identifier, the random parameter, the first function, and the second function.
接入网设备可根据各个设备标识信息与第一计算参数之间的对应关系,确定第一请求消息携带的设备标识信息对应的第一计算参数。The access network device may determine the first calculation parameter corresponding to the device identification information carried in the first request message according to the correspondence between each device identification information and the first calculation parameter.
在一种可能的实现方式中,第一消息中还包括第一计算参数,接入网设备建立接入管理网元的标识信息与第一函数的标识信息、第二函数的标识信息以及第一计算参数之间的对应关系,以便接入网设备在接收到第一请求消息时,可以确定出设备标识信息对应的第一函数、第二函数和第一计算参数。In a possible implementation manner, the first message further includes the first calculation parameter, and the access network device establishes the identification information of the access management network element and the identification information of the first function, the identification information of the second function, and the first function. The correspondence between the parameters is calculated, so that when the access network device receives the first request message, it can determine the first function, the second function, and the first calculation parameter corresponding to the device identification information.
在一种可能的实现方式中,接入管理网元在检测出另一个接入网设备被攻击者攻破的情况下,向接入网设备发送第二消息,第二消息包括第三函数的标识信息和第四函数的标识信息;接入网设备在接收到第二消息时,建立接入管理网元的标识信息与第三函数的标识信息和第四函数的标识信息之间的对应关系。可选的,第二消息还包括第二计算参数,接入网设备建立接入管理网元的标识信息与第三函数的标识信息、第四函数的标识信息以 及第二计算参数之间的对应关系。In a possible implementation, the access management network element sends a second message to the access network device when it detects that another access network device has been compromised by an attacker. The second message includes the identifier of the third function. Information and identification information of the fourth function; when the access network device receives the second message, it establishes a correspondence between the identification information of the access management network element and the identification information of the third function and the identification information of the fourth function. Optionally, the second message further includes a second calculation parameter, and the access network device establishes a correspondence between the identification information of the access management network element and the identification information of the third function, the identification information of the fourth function, and the second calculation parameter relation.
在一种可能的实现方式中,接入网设备接收到来自终端设备的第二请求消息时,第二请求消息包括第三密钥标识、设备标识信息、随机参数和第二加密保护信息,根据接入管理网元的标识信息与第三函数的标识信息和第四函数的标识信息之间的对应关系,确定设备标识信息对应的第三函数和第四函数。可选的,接入网设备还确定设备标识信息对应的第二计算参数。In a possible implementation, when the access network device receives the second request message from the terminal device, the second request message includes the third key identifier, device identification information, random parameters, and second encryption protection information, according to The corresponding relationship between the identification information of the access management network element and the identification information of the third function and the identification information of the fourth function is determined, and the third function and the fourth function corresponding to the device identification information are determined. Optionally, the access network device further determines the second calculation parameter corresponding to the device identification information.
接入网设备根据第三密钥标识、随机参数、第三函数和第四函数,生成第四密钥。可选的,根据第三密钥标识、随机参数、第三函数、第四函数和第二计算参数,生成第四密钥。The access network device generates the fourth key according to the third key identifier, random parameters, third function, and fourth function. Optionally, the fourth key is generated according to the third key identifier, random parameters, third function, fourth function, and second calculation parameter.
接入网设备采用第四密钥对第二加密保护信息进行解密,得到保护信息。The access network device uses the fourth key to decrypt the second encrypted protection information to obtain the protection information.
可以理解的是,接入管理网元在检测到某个接入网设备被攻击者攻破的情况下,向除这个接入网设备之外的其他接入网设备发送第二消息,以更新用于生成解密密钥的函数和参数。It is understandable that when an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Functions and parameters for generating the decryption key.
在一种可能的实现方式中,接入管理网元在检测到终端设备为攻击者的情况下,向接入网设备发送指示信息,该指示信息用于指示非法密钥标识信息。接入网设备在接收到该指示信息的情况下,检测第一请求消息携带的第一密钥标识与非法密钥标识信息是否匹配,若匹配,表明发送第一请求消息的终端设备为攻击者,那么接入网设备拒绝第一请求消息,从而防止攻击者接入。In a possible implementation manner, when the access management network element detects that the terminal device is an attacker, it sends instruction information to the access network device, where the instruction information is used to indicate illegal key identification information. Upon receiving the instruction information, the access network device detects whether the first key identifier carried in the first request message matches the illegal key identifier information, and if they match, it indicates that the terminal device sending the first request message is an attacker , Then the access network device rejects the first request message, thereby preventing the attacker from accessing.
本申请第二方面提供一种信息保护方法,该方法可以由终端设备执行,也可以由终端设备中的装置(例如处理器或芯片等)执行。该方法以终端设备为例,包括以下内容。The second aspect of the present application provides an information protection method, which may be executed by a terminal device, or may be executed by a device (such as a processor or a chip, etc.) in the terminal device. This method takes terminal equipment as an example, and includes the following content.
终端设备根据第一密钥、随机参数和第一函数,生成第二密钥,采用第二密钥对保护信息进行加密,得到第一加密保护信息;向接入网设备发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;第一密钥标识用于生成第一密钥。The terminal device generates a second key according to the first key, random parameters and the first function, uses the second key to encrypt the protection information to obtain the first encrypted protection information; sends a first request message to the access network device, The first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate a first key.
本申请第二方面,终端设备采用第二密钥对保护信息进行加密,并向接入网设备发送加密后的第一加密保护信息,可以实现对保护信息的隐私性保护,可以有效防止窃听者从接入层消息中获得保护信息,从而提高终端设备与接入网设备之间传输信息的安全性,提高网络的安全性、可靠性。In the second aspect of this application, the terminal device uses the second key to encrypt the protected information, and sends the encrypted first encrypted protection information to the access network device, which can realize the privacy protection of the protected information and effectively prevent eavesdroppers. Obtain protection information from the access layer message, thereby improving the security of information transmitted between the terminal device and the access network device, and improving the security and reliability of the network.
在一种可能的实现方式中,终端设备根据第一密钥、随机参数、设备标识信息和第一函数,生成第二密钥,这样使得生成第二密钥的参数较多,增加复杂度,以提高安全性。设备标识信息,例如终端设备的标识信息。In a possible implementation manner, the terminal device generates the second key according to the first key, random parameters, device identification information, and the first function, so that there are more parameters for generating the second key, which increases the complexity. To improve safety. Device identification information, such as the identification information of the terminal device.
在一种可能的实现方式中,终端设备接收来自接入管理网元的第三消息,第三消息包括第一函数的标识信息、第一密钥和第一密钥标识。第一密钥和第一函数,用于终端设备生成第二密钥;第一密钥标识用于终端设备携带在第一请求消息中,以便接入网设备生成第二密钥。In a possible implementation manner, the terminal device receives a third message from the access management network element, where the third message includes the identification information of the first function, the first key, and the first key identification. The first key and the first function are used for the terminal device to generate the second key; the first key identifier is used for the terminal device to be carried in the first request message so that the access network device can generate the second key.
在一种可能的实现方式中,接入管理网元在检测到某个接入网设备被攻击者攻破的情况下,向终端设备发送第四消息,第四消息用于更新终端设备侧用于生成解密密钥的函数和参数,第四消息包括第三函数的标识信息、第三密钥和第三密钥标识;终端设备在接收 到第四消息时,根据第三密钥、随机参数和第三函数,生成第四密钥,并采用第四密钥对保护信息进行加密,得到第二加密保护信息;向接入网设备发送第二请求消息,第二请求消息包括第三密钥标识、设备标识信息、随机参数和第二加密保护信息,第三密钥标识用于生成第三密钥。In a possible implementation, the access management network element sends a fourth message to the terminal device when it detects that an access network device has been compromised by an attacker, and the fourth message is used to update the terminal device The function and parameters of the decryption key are generated. The fourth message includes the identification information of the third function, the third key and the third key identification; when the terminal device receives the fourth message, it will be based on the third key, random parameters and The third function is to generate a fourth key, and use the fourth key to encrypt the protection information to obtain the second encrypted protection information; send a second request message to the access network device, the second request message includes the third key identifier , Device identification information, random parameters and second encryption protection information, and the third key identification is used to generate the third key.
若接入网设备被攻击者攻破,那么在接收到第二请求消息时,无法解密使用第四密钥加密过后的保护信息,从而无法获得保护信息,其他未被攻击者攻破的接入网设备在接收到第二请求消息时,可以正确解密,获得保护信息,从而在某个接入网设备被攻击者攻破的场景下,可以保护终端设备与其他接入网设备之间的信息传输。可以理解的是,接入管理网元在检测到某个接入网设备被攻击者攻破的情况下,向除这个接入网设备之外的其他接入网设备发送第二消息,以更新用于生成解密密钥的函数和参数,因此被攻破的接入网设备无法获取第二消息中的参数,进而无法生成用于解密的第四密钥。If the access network equipment is compromised by an attacker, when the second request message is received, the protected information encrypted with the fourth key cannot be decrypted, so that the protected information cannot be obtained. Other access network equipment that has not been compromised by the attacker When the second request message is received, it can be decrypted correctly to obtain the protection information, so that in a scenario where an access network device is compromised by an attacker, the information transmission between the terminal device and other access network devices can be protected. It is understandable that when an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Because of the function and parameters for generating the decryption key, the compromised access network device cannot obtain the parameters in the second message, and thus cannot generate the fourth key for decryption.
本申请第三方面提供一种信息保护方法,该方法可以由接入网设备执行,也可以由接入网设备中的装置(例如处理器或芯片等)执行。该方法以接入网设备为例,包括以下内容。The third aspect of the present application provides an information protection method, which may be executed by an access network device, or may be executed by a device (such as a processor or a chip, etc.) in the access network device. This method takes the access network device as an example, and includes the following content.
接入网设备接收来自终端设备的第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;确定设备标识信息对应的第一函数、第二函数和第一加密算法;根据第一密钥标识、第一函数和第二函数,生成第二密钥;根据第二密钥、随机参数和第一加密算法对第一加密保护信息进行解密,得到保护信息。The access network device receives a first request message from the terminal device. The first request message includes the first key identifier, device identification information, random parameters, and first encryption protection information; determining the first function and second function corresponding to the device identification information Function and the first encryption algorithm; generate the second key according to the first key identifier, the first function and the second function; decrypt the first encrypted protection information according to the second key, random parameters and the first encryption algorithm, Get protection information.
其中,保护信息可以是网络切片信息,也可以是终端设备的能力信息,还可以是其他需要在接入层保护的信息。设备标识信息可为终端设备的标识信息,也可为接入管理网元的标识信息。The protection information may be network slice information, terminal device capability information, or other information that needs to be protected at the access layer. The device identification information may be the identification information of the terminal device or the identification information of the access management network element.
本申请第三方面,接入网设备在接收到第一请求消息时,确定计算第二密钥所需的函数和加密算法,采用确定的函数计算得到第二密钥,采用第二密钥和加密算法对第一加密保护信息进行解密,得到保护信息,可以实现对终端设备向接入网设备发送的保护信息的保护,有效防止窃听者从接入层消息中获得保护信息,从而提高终端设备与接入网设备之间传输信息的安全性,提高网络的安全性、可靠性。In the third aspect of the present application, when the access network device receives the first request message, it determines the function and encryption algorithm required to calculate the second key, uses the determined function to calculate the second key, and uses the second key and The encryption algorithm decrypts the first encrypted protection information to obtain the protection information, which can realize the protection of the protection information sent by the terminal equipment to the access network equipment, and effectively prevent eavesdroppers from obtaining the protection information from the access layer message, thereby improving the terminal equipment The security of information transmitted with the access network equipment improves the security and reliability of the network.
在一种可能的实现方式中,接入网设备根据设备标识信息与第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识之间的对应关系,确定设备标识信息对应的第一函数、第二函数和第一加密算法,以便生成第二密钥,采用第二密钥和第一加密算法对第一加密保护信息进行解密。In a possible implementation manner, the access network device determines the correspondence between the device identification information and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm according to the correspondence between the device identification information and the identification information of the first function. The first function, the second function and the first encryption algorithm of, in order to generate the second key, and the first encryption protection information is decrypted by using the second key and the first encryption algorithm.
在一种可能的实现方式中,接入网设备接收来自接入管理网元的第一消息,第一消息包括第一函数的标识信息、第二函数的标识信息和第一加密算法的算法标识;建立接入管理网元的标识信息与第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识之间的对应关系。从而接入网设备在接收到第一请求消息时,可以确定出设备标识信息对应的第一函数、第二函数和第一加密算法。In a possible implementation manner, the access network device receives a first message from an access management network element, the first message includes identification information of the first function, identification information of the second function, and algorithm identification of the first encryption algorithm Establish a correspondence between the identification information of the access management network element and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm. Therefore, when the access network device receives the first request message, it can determine the first function, the second function, and the first encryption algorithm corresponding to the device identification information.
在一种可能的实现方式中,接入网设备根据第一密钥标识和第一函数,生成第一密钥;根据第一密钥和第二函数,生成第二密钥标识;根据第二密钥标识和第一函数,生成第二密钥。采用两层密钥,使得保护信息的加密密钥可频繁更换,从而增加安全性。In a possible implementation manner, the access network device generates the first key according to the first key identifier and the first function; generates the second key identifier according to the first key and the second function; The key identification and the first function generate the second key. The use of two layers of keys allows the encryption keys to protect the information to be replaced frequently, thereby increasing security.
在一种可能的实现方式中,接入网设备根据第一密钥标识、第一密钥和第二函数,生成第二密钥标识。增加计算第二密钥标识的复杂度,以提高安全性。In a possible implementation manner, the access network device generates the second key identifier according to the first key identifier, the first key, and the second function. Increase the complexity of calculating the second key identifier to improve security.
在一种可能的实现方式中,接入网设备接收来自接入管理网元的第二消息,第二消息包括第三函数的标识信息、第四函数的标识信息和第二加密算法的算法标识;建立接入网设备的标识信息与第三函数的标识信息、第四函数的标识信息以及第二加密算法的算法标识之间的对应关系。In a possible implementation manner, the access network device receives a second message from the access management network element, and the second message includes the identification information of the third function, the identification information of the fourth function, and the algorithm identification of the second encryption algorithm. Establish the correspondence between the identification information of the access network device and the identification information of the third function, the identification information of the fourth function, and the algorithm identification of the second encryption algorithm.
在一种可能的实现方式中,接入网设备接收来自终端设备的第二请求消息,第二请求消息包括第三密钥标识、设备标识信息、随机参数和第二加密保护信息;根据接入网设备的标识信息与第三函数的标识信息、第四函数的标识信息以及第二加密算法的算法标识之间的对应关系,确定设备标识信息对应的第三函数、第四函数和第二加密算法;根据第三密钥标识、第三函数和第四函数,生成第四密钥;根据第四密钥、随机参数和第二加密算法对第二加密保护信息进行解密,得到保护信息。In a possible implementation manner, the access network device receives a second request message from the terminal device. The second request message includes the third key identifier, device identification information, random parameters, and second encryption protection information; The corresponding relationship between the identification information of the network device and the identification information of the third function, the identification information of the fourth function, and the algorithm identification of the second encryption algorithm, to determine the third function, fourth function, and second encryption corresponding to the device identification information Algorithm; Generate the fourth key according to the third key identifier, the third function and the fourth function; decrypt the second encrypted protection information according to the fourth key, random parameters and the second encryption algorithm to obtain the protection information.
可以理解的是,接入管理网元在检测到某个接入网设备被攻击者攻破的情况下,向除这个接入网设备之外的其他接入网设备发送第二消息,以更新用于生成解密密钥的函数和参数。It is understandable that when an access management network element detects that a certain access network device has been compromised by an attacker, it sends a second message to other access network devices except this one to update the usage. Functions and parameters for generating the decryption key.
在一种可能的实现方式中,接入管理网元在检测到终端设备为攻击者的情况下,向接入网设备发送指示信息,该指示信息用于指示非法密钥标识信息。接入网设备在接收到该指示信息的情况下,检测第一请求消息携带的第一密钥标识与非法密钥标识信息是否匹配,若匹配,表明发送第一请求消息的终端设备为攻击者,那么接入网设备拒绝第一请求消息,从而防止攻击者接入。In a possible implementation manner, when the access management network element detects that the terminal device is an attacker, it sends instruction information to the access network device, where the instruction information is used to indicate illegal key identification information. Upon receiving the instruction information, the access network device detects whether the first key identifier carried in the first request message matches the illegal key identifier information, and if they match, it indicates that the terminal device sending the first request message is an attacker , Then the access network device rejects the first request message, thereby preventing the attacker from accessing.
本申请第四方面提供一种信息保护方法,该方法可以由终端设备执行,也可以由终端设备中的装置(例如处理器或芯片等)执行。该方法以终端设备为例,包括以下内容。The fourth aspect of the present application provides an information protection method, which may be executed by a terminal device, or may be executed by a device (such as a processor or a chip, etc.) in the terminal device. This method takes terminal equipment as an example, and includes the following content.
终端设备根据第二密钥、随机参数和第一加密算法对保护信息进行加密,得到第一加密保护信息;向接入网设备发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息。The terminal device encrypts the protection information according to the second key, random parameters, and the first encryption algorithm to obtain the first encrypted protection information; sends a first request message to the access network device, the first request message including the first key identifier, Device identification information, random parameters, and first encrypted protection information.
本申请第四方面,终端设备采用第二密钥和第一加密算法对保护信息进行加密,并向接入网设备发送加密后的第一加密保护信息,可以实现对保护信息的隐私性保护,可以有效防止窃听者从接入层消息中获得保护信息,从而提高终端设备与接入网设备之间传输信息的安全性,提高网络的安全性、可靠性。In the fourth aspect of this application, the terminal device uses the second key and the first encryption algorithm to encrypt the protected information, and sends the encrypted first encrypted protection information to the access network device, which can realize the privacy protection of the protected information. It can effectively prevent eavesdroppers from obtaining protection information from access layer messages, thereby improving the security of information transmitted between the terminal device and the access network device, and improving the security and reliability of the network.
在一种可能的实现方式中,终端设备接收来自接入管理网元的第三消息,第三消息包括第二密钥、第一加密算法的算法标识和第一密钥标识。第二密钥和第一加密算法用于终端设备对保护信息进行加密,第一密钥标识用于终端设备携带在第一请求消息中,以便接入网设备生成第二密钥。In a possible implementation manner, the terminal device receives a third message from the access management network element, where the third message includes the second key, the algorithm identifier of the first encryption algorithm, and the first key identifier. The second key and the first encryption algorithm are used for the terminal device to encrypt the protection information, and the first key identifier is used for the terminal device to be carried in the first request message so that the access network device can generate the second key.
在一种可能的实现方式中,接入管理网元在检测到某个接入网设备被攻击者攻破的情况下,向终端设备发送第四消息,第四消息用于更新终端设备侧用于生成解密密钥的函数和参数,第四消息包括第四密钥、第二加密算法的算法标识和第三密钥标识。终端设备在接收到第四消息的情况下,根据第四密钥、随机参数和第二加密算法对保护信息进行加密,得到第二加密保护信息;向接入网设备发送第二请求消息,第二请求消息包括第三密钥标 识、设备标识信息、随机参数和第二加密保护信息。In a possible implementation, the access management network element sends a fourth message to the terminal device when it detects that an access network device has been compromised by an attacker, and the fourth message is used to update the terminal device Function and parameters for generating the decryption key, the fourth message includes the fourth key, the algorithm identification of the second encryption algorithm, and the third key identification. In the case of receiving the fourth message, the terminal device encrypts the protection information according to the fourth key, the random parameter and the second encryption algorithm to obtain the second encrypted protection information; sends the second request message to the access network device, the first The second request message includes the third key identification, device identification information, random parameters, and second encryption protection information.
若接入网设备被攻击者攻破,那么在接收到第二请求消息时,无法解密使用第四密钥加密过后的保护信息,从而无法获得保护信息,其他未被攻击者攻破的接入网设备在接收到第二请求消息时,可以正确解密,获得保护信息,从而在某个接入网设备被攻击者攻破的场景下,可以保护终端设备与其他接入网设备之间的信息传输。If the access network equipment is compromised by an attacker, when the second request message is received, the protected information encrypted with the fourth key cannot be decrypted, so that the protected information cannot be obtained. Other access network equipment that has not been compromised by the attacker When the second request message is received, it can be decrypted correctly to obtain the protection information, so that in a scenario where an access network device is compromised by an attacker, the information transmission between the terminal device and other access network devices can be protected.
本申请第五方面提供一种通信装置,该通信装置可以是接入网设备,也可以是接入网设备中的装置。一种设计中,该装置可以包括执行第一方面或第三方面中,以及各种可能性实现方式所描述的方法/操作/步骤/动作所对应的模块,该模块可以是硬件电路,也可以是软件,也可以是硬件电路结合软件实现。一种设计中,该装置可以包括处理单元和收发单元。示例性的,The fifth aspect of the present application provides a communication device. The communication device may be an access network device or a device in the access network device. In one design, the device may include modules corresponding to the methods/operations/steps/actions described in the first aspect or the third aspect and various possible implementation modes. The module may be a hardware circuit or It is software, or it can be realized by hardware circuit combined with software. In one design, the device may include a processing unit and a transceiver unit. Exemplary,
收发单元,用于接收来自终端设备的第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;确定设备标识信息对应的第一函数和第二函数;The transceiver unit is configured to receive a first request message from a terminal device. The first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; determining a first function and a first function corresponding to the device identification information Two functions;
处理单元,用于根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥;采用第二密钥对第一加密保护信息进行解密,得到保护信息。The processing unit is configured to generate a second key according to the first key identifier, random parameters, the first function, and the second function; use the second key to decrypt the first encrypted protection information to obtain the protection information.
本申请第六方面提供一种通信装置,该装置包括处理器,用于实现上述第一方面或第三方面描述的方法。该装置还可以包括存储器,用于存储指令和数据。该存储器与该处理器耦合,该处理器执行该存储器中存储的指令时,可以使该装置实现上述第一方面以及第一方面的各个可能实现方式,或第三方面以及第三方面的各个可能实现方式所描述的方法。该装置还可以包括通信接口,该通信接口用于该装置与其它设备进行通信,示例性的,通信接口可以是收发器、总线等电路硬件模块,其它设备可以为终端设备等。在一种可能的设计中,该装置包括:A sixth aspect of the present application provides a communication device, which includes a processor, configured to implement the method described in the first aspect or the third aspect. The device may also include a memory for storing instructions and data. The memory is coupled with the processor. When the processor executes the instructions stored in the memory, the device can realize the foregoing first aspect and each possible implementation manner of the first aspect, or the third aspect and each possible third aspect. Implement the method described in the method. The device may also include a communication interface, which is used for the device to communicate with other devices. Illustratively, the communication interface may be a circuit hardware module such as a transceiver and a bus, and other devices may be terminal devices. In one possible design, the device includes:
存储器,用于存储程序指令;Memory, used to store program instructions;
处理器,用于接收来自终端设备的第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;确定设备标识信息对应的第一函数和第二函数;根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥;采用第二密钥对第一加密保护信息进行解密,得到保护信息。The processor is configured to receive a first request message from a terminal device, where the first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; determining a first function and a first function corresponding to the device identification information Two functions; generate a second key according to the first key identifier, random parameters, first function and second function; use the second key to decrypt the first encrypted protection information to obtain the protection information.
本申请第七方面提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行第一方面以及第一方面的各个可能实现方式,或第三方面以及第三方面的各个可能实现方式提供的方法。The seventh aspect of the present application provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the first aspect and each possible implementation manner of the first aspect, or the third aspect and the third aspect The methods provided by each possible implementation.
本申请第八方面提供一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现上述第一方面以及第一方面的各个可能实现方式,或第三方面以及第三方面的各个可能实现方式提供的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。An eighth aspect of the present application provides a chip system that includes a processor and may also include a memory, which is used to implement the foregoing first aspect and each possible implementation manner of the first aspect, or each of the third aspect and the third aspect It is possible to implement the method provided by the way. The chip system can be composed of chips, or it can include chips and other discrete devices.
本申请第九方面提供一种通信装置,该通信装置可以是终端设备,也可以是终端设备中的装置。一种设计中,该装置可以包括执行第二方面或第四方面中,以及各种可能性实现方式所描述的方法/操作/步骤/动作所对应的模块,该模块可以是硬件电路,也可以是软件,也可以是硬件电路结合软件实现。一种设计中,该装置可以包括处理单元和收发单元。示例性的,A ninth aspect of the present application provides a communication device. The communication device may be a terminal device or a device in the terminal device. In one design, the device may include modules corresponding to the methods/operations/steps/actions described in the second aspect or the fourth aspect and various possible implementation modes. The module may be a hardware circuit or It is software, or it can be realized by hardware circuit combined with software. In one design, the device may include a processing unit and a transceiver unit. Exemplary,
处理单元,用于根据第一密钥、随机参数和第一函数,生成第二密钥,采用第二密钥对保护信息进行加密,得到第一加密保护信息;The processing unit is configured to generate a second key according to the first key, random parameters, and the first function, and use the second key to encrypt the protection information to obtain the first encrypted protection information;
收发单元,用于向接入网设备发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;第一密钥标识用于生成第一密钥。The transceiver unit is configured to send a first request message to the access network device. The first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate a first Key.
本申请第十方面提供一种通信装置,该装置包括处理器,用于实现上述第二方面或第四方面描述的方法。该装置还可以包括存储器,用于存储指令和数据。该存储器与该处理器耦合,该处理器执行该存储器中存储的指令时,可以使该装置实现上述第二方面以及第二方面的各个可能实现方式,或第四方面以及第四方面的各个可能实现方式所描述的方法。该装置还可以包括通信接口,该通信接口用于该装置与其它设备进行通信,示例性的,通信接口可以是收发器、总线等电路硬件模块,其它设备可以为接入网设备等。在一种可能的设计中,该装置包括:A tenth aspect of the present application provides a communication device, which includes a processor, configured to implement the method described in the second or fourth aspect. The device may also include a memory for storing instructions and data. The memory is coupled with the processor, and when the processor executes the instructions stored in the memory, the device can realize the foregoing second aspect and each possible implementation manner of the second aspect, or the fourth aspect and each possible aspect of the fourth aspect. Implement the method described in the method. The device may also include a communication interface, which is used for the device to communicate with other devices. Illustratively, the communication interface may be a circuit hardware module such as a transceiver and a bus, and other devices may be access network devices. In one possible design, the device includes:
存储器,用于存储程序指令;Memory, used to store program instructions;
处理器,用于根据第一密钥、随机参数和第一函数,生成第二密钥,采用第二密钥对保护信息进行加密,得到第一加密保护信息;向接入网设备发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;第一密钥标识用于生成第一密钥。The processor is configured to generate a second key according to the first key, random parameters, and the first function, and use the second key to encrypt the protection information to obtain the first encrypted protection information; and send the first encrypted protection information to the access network device. A request message. The first request message includes a first key identifier, device identification information, random parameters, and first encryption protection information; the first key identifier is used to generate a first key.
本申请第十一方面提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行第二方面以及第二方面的各个可能实现方式,或第四方面以及第四方面的各个可能实现方式提供的方法。The eleventh aspect of the present application provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the second aspect and each possible implementation manner of the second aspect, or the fourth aspect and the fourth aspect The methods provided by each possible implementation.
本申请第十二方面提供一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现上述第二方面以及第二方面的各个可能实现方式,或第四方面以及第四方面的各个可能实现方式提供的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。A twelfth aspect of the present application provides a chip system, which includes a processor and may also include a memory, which is used to implement the foregoing second aspect and each possible implementation manner of the second aspect, or the fourth aspect and the fourth aspect The methods provided by each possible implementation. The chip system can be composed of chips, or it can include chips and other discrete devices.
本申请第十三方面提供一种通信系统,该通信系统包括第一方面所述的接入网设备和第二方面所述的终端设备,或包括第三方面所述的接入网设备和第四方面所述的终端设备。A thirteenth aspect of the present application provides a communication system that includes the access network device described in the first aspect and the terminal device described in the second aspect, or includes the access network device described in the third aspect and the second aspect The terminal equipment described in the four aspects.
图1为预配置信息基于终端设备粒度的流程示例图;Figure 1 is an example flow chart of the pre-configuration information based on the granularity of the terminal device;
图2为预配置信息基于PLMN粒度的流程示例图;Figure 2 is an example flow chart of pre-configuration information based on PLMN granularity;
图3为应用本申请实施例的网络架构示意图;Figure 3 is a schematic diagram of a network architecture applying an embodiment of the present application;
图4为本申请实施例一提供的信息保护方法的流程示意图;4 is a schematic flowchart of the information protection method provided by Embodiment 1 of the application;
图4a为实施例一中UE生成第二密钥的示意图;Figure 4a is a schematic diagram of UE generating a second key in the first embodiment;
图4b为实施例一中接入网设备生成第二密钥的示意图;Figure 4b is a schematic diagram of the access network device generating the second key in the first embodiment;
图5为本申请实施例二提供的信息保护方法的流程示意图;FIG. 5 is a schematic flowchart of the information protection method provided in the second embodiment of this application;
图5a为实施例二中接入网设备生成第二密钥的示意图;Figure 5a is a schematic diagram of the access network device generating a second key in the second embodiment;
图6为本申请实施例三提供的信息保护方法的流程示意图;FIG. 6 is a schematic flowchart of an information protection method provided in Embodiment 3 of this application;
图6a为实施例三中接入网设备生成第二密钥的示意图;Fig. 6a is a schematic diagram of the access network device generating the second key in the third embodiment;
图7为本申请实施例四提供的信息保护方法的流程示意图;FIG. 7 is a schematic flowchart of an information protection method provided in Embodiment 4 of this application;
图8为本申请实施例五提供的信息保护方法的流程示意图;FIG. 8 is a schematic flowchart of an information protection method provided in Embodiment 5 of this application;
图9为本申请实施例提供一种通信装置的结构示意图;FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of this application;
图10为本申请实施例提供的另一种通信装置的结构示意图。FIG. 10 is a schematic structural diagram of another communication device provided by an embodiment of this application.
为了更好地理解本申请实施例提供的技术方案,首先对本申请实施例涉及的技术术语进行介绍。In order to better understand the technical solutions provided by the embodiments of the present application, first introduce the technical terms involved in the embodiments of the present application.
(1)网络切片(1) Network slicing
网络切片也可以称为切片或网络切片实例等。为了满足多样性需求和切片间的隔离,业务间可以相对独立的管理和运维,并提供量身定做的业务功能和分析能力。不同业务类型的实例可以部署在不同的网络切片上,相同业务类型的不同实例也可以部署在不同的网络切片上。一个网络切片可以视为一个实例化的核心网络架构。Network slices can also be called slices or network slice instances. In order to meet the diversity requirements and the isolation between slices, the business can be relatively independent of management and operation and maintenance, and provide tailor-made business functions and analysis capabilities. Instances of different service types can be deployed on different network slices, and different instances of the same service type can also be deployed on different network slices. A network slice can be regarded as an instantiated core network architecture.
第五代(5th-generation,5G)网络中的网络切片,是一个虚拟的专用网络,可以由一组网络功能、子网络构成。运营商网络中可以部署很多网络切片,每个网络切片可以有不同的性能,用于满足不同应用、不同垂直行业的需求。The network slice in the fifth-generation (5th-generation, 5G) network is a virtual private network that can be composed of a set of network functions and sub-networks. Many network slices can be deployed in the operator's network, and each network slice can have different performance to meet the needs of different applications and different vertical industries.
(2)网络切片信息(2) Network slicing information
在网络部署了网络切片的情况下,终端设备注册到网络时,会触发网络切片的选择过程。网络切片的选择过程依赖于终端设备的签约数据、漫游协议、本地配置信息、运营商策略等信息。In the case that network slicing is deployed in the network, when the terminal device registers to the network, the selection process of the network slicing will be triggered. The selection process of the network slice relies on information such as the subscription data of the terminal device, roaming agreement, local configuration information, and operator policy.
当终端设备需要接入到网络切片时,向核心网提供请求的网络切片信息,用于核心网为终端设备选择网络切片实例。其中,请求的(requested)网络切片信息可以为请求的网络切片选择辅助信息(network slice selection assistance information,NSSAI),记为requested NSSAI。NSSAI可以由一个或多个单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)构成,一个S-NSSAI用于标识一个单网络切片类型。由于NSSAI由一个或多个S-NSSAI组成,那么NSSAI可以替换为S-NSSAI或S-NSSAIs。When the terminal device needs to access the network slice, the requested network slice information is provided to the core network for the core network to select the network slice instance for the terminal device. The requested (requested) network slice information may be the requested network slice selection assistance information (network slice selection assistance information, NSSAI), which is recorded as requested NSSAI. The NSSAI may be composed of one or more single network slice selection assistance information (S-NSSAI), and one S-NSSAI is used to identify a single network slice type. Since NSSAI is composed of one or more S-NSSAIs, NSSAI can be replaced with S-NSSAI or S-NSSAIs.
核心网网元在接收到请求的网络切片信息时,根据终端设备的签约数据、请求的网络切片信息、漫游协议、本地配置信息、运营商策略等信息,为终端设备选择允许接入的网络切片,并向终端设备发送允许接入的(allowed)网络切片信息,允许接入的网络切片信息可以是允许接入的NSSAI,记为allowed NSSAI。allowed NSSAI中,当前运营商网络允许接入的单网络切片选择辅助信息可用allowed S-NSSAI表示。其中,核心网网元可以是5G系统中的接入和移动性管理功能(access and mobility management function,AMF)网元,或网络切片选择功能(network slice selection function,NSSF)网元,或统一数据管理(unified data management,UDM)网元。When the core network element receives the requested network slice information, it selects the network slice that the terminal device is allowed to access based on the terminal device's contract data, requested network slice information, roaming agreement, local configuration information, operator policy and other information , And send the allowed network slice information to the terminal device. The allowed network slice information can be the allowed NSSAI, which is recorded as allowed NSSAI. In allowed NSSAI, the single network slice selection auxiliary information that the current operator's network is allowed to access can be represented by allowed S-NSSAI. Among them, the core network element can be the access and mobility management function (AMF) network element in the 5G system, or the network slice selection function (NSSF) network element, or unified data Management (unified data management, UDM) network elements.
终端设备接收到allowed NSSAI时,可以根据allowed NSSAI,在会话建立请求的非接入层(non-access stratum,NAS)消息中携带相应的allowed NSSAI,以向接入和移动性管理功能网元请求接入相应的网络切片。终端设备也可在下次发送注册请求(携带requested NSSAI)时,在requested NSSAI中携带allowed NSSAI,并向接入网设备发送该requested NSSAI,接入网设备在接收到requested NSSAI时,根据requested NSSAI选择接入管理网 元,例如AMF网元,为终端设备提供服务。When the terminal device receives the allowed NSSAI, it can carry the corresponding allowed NSSAI in the non-access stratum (NAS) message of the session establishment request according to the allowed NSSAI to request the access and mobility management function network element Access the corresponding network slice. The terminal device can also carry allowed NSSAI in the requested NSSAI when sending a registration request (carrying requested NSSAI) next time, and send the requested NSSAI to the access network device. When the access network device receives the requested NSSAI, it selects according to the requested NSSAI Access management network elements, such as AMF network elements, provide services for terminal devices.
终端设备向接入网设备发送requested NSSAI时,可以理解为终端设备通过接入层(access stratum,AS)消息向接入网设备发送requested NSSAI,即requested NSSAI携带在AS消息中。由于AS消息未进行安全和隐私保护,因此AS消息所携带的内容存在被泄露的风险。例如,警用网络切片或消防用网络切片等隐私性和安全性要求较高的网络切片,如果在AS消息中携带这些网络切片对应的NSSAI,攻击者便可以区分警察或消防员用户与普通用户。再例如,窃听者可以截取AS消息中的NSSAI,从而判断某个区域是否存在警察局。又例如,窃听者可以截取AS消息中的NSSAI,判断某个用户最近接入的网络切片类型,从而推断此用户近期行为。因此,如何提高终端设备与接入网设备之间传输信息的安全性是亟待解决的技术问题。其中,传输的信息可以是网络切片信息,例如requested NSSAI;也可以是终端设备的能力信息,例如终端设备是否支持机密性保护。When a terminal device sends a requested NSSAI to an access network device, it can be understood that the terminal device sends a requested NSSAI to the access network device through an access stratum (AS) message, that is, the requested NSSAI is carried in the AS message. Since the AS message is not protected for security and privacy, the content carried by the AS message is at risk of being leaked. For example, network slices that require higher privacy and security, such as police network slices or firefighting network slices. If the NSSAI corresponding to these network slices is carried in the AS message, the attacker can distinguish between police or firefighter users and ordinary users. . For another example, an eavesdropper can intercept the NSSAI in the AS message to determine whether there is a police station in a certain area. For another example, an eavesdropper can intercept the NSSAI in the AS message, determine the type of network slice that a user has recently accessed, and infer the user's recent behavior. Therefore, how to improve the security of information transmitted between the terminal equipment and the access network equipment is a technical problem to be solved urgently. Among them, the transmitted information can be network slice information, such as requested NSSAI; it can also be the capability information of the terminal device, such as whether the terminal device supports confidentiality protection.
鉴于此,目前提供一种方案用于解决上述技术问题,该方案是在终端设备与接入网设备之间预配置一些信息;终端设备使用预配置信息对在AS消息中携带的NSSAI进行安全保护处理(例如对NSSAI中的S-NSSAI进行加密,或使用S-NSSAI假名);接入网设备在接收到处理过的NSSAI时,使用预配置信息获取NSSAI。因为预配置信息存在于终端设备与接入网设备之间,因此可以确保NSSAI在空口传输的安全性。In view of this, a solution is currently provided to solve the above technical problems. The solution is to pre-configure some information between the terminal device and the access network device; the terminal device uses the pre-configured information to protect the NSSAI carried in the AS message. Processing (for example, encrypting the S-NSSAI in the NSSAI, or using the S-NSSAI pseudonym); when the access network device receives the processed NSSAI, it uses the pre-configuration information to obtain the NSSAI. Because the pre-configuration information exists between the terminal device and the access network device, the security of NSSAI transmission over the air interface can be ensured.
在一种实现方式中,预配置信息基于终端设备粒度。该种实现方式可参见图1所示的流程图,可包括:In one implementation, the pre-configuration information is based on the granularity of the terminal device. This implementation can refer to the flowchart shown in Figure 1, and can include:
步骤100,终端设备已经注册到核心网,5G非接入层(non-access stratum,NAS)已经建立。Step 100: The terminal device has been registered to the core network, and the 5G non-access stratum (NAS) has been established.
步骤101,AMF网元生成随机参数(random,RAND),使用allowed S-NSSAI和RAND计算得到临时S-NSSAI(temporary S-NSSAI,T-S-NSSAI)。随机参数可以理解为新鲜性参数。Step 101: The AMF network element generates random parameters (random, RAND), and calculates temporary S-NSSAI (temporary S-NSSAI, T-S-NSSAI) using allowed S-NSSAI and RAND. Random parameters can be understood as freshness parameters.
AMF网元为终端设备生成RAND,使用该RAND和该终端设备对应的allowed NSSAI计算得到T-S-NSSAI(例如使用RAND作为机密性算法128-NEA1的加密密钥)。可以理解的是,T-S-NSSAI是经过安全保护的allowed NSSAI。AMF网元可以针对不同的终端设备生成不同的RAND。The AMF network element generates a RAND for the terminal device, and uses the RAND and the allowed NSSAI corresponding to the terminal device to calculate the T-S-NSSAI (for example, using RAND as the encryption key of the confidentiality algorithm 128-NEA1). It is understandable that T-S-NSSAI is a security-protected allowed NSSAI. The AMF network element can generate different RANDs for different terminal devices.
步骤102,AMF网元向终端设备发送注册成功消息,注册成功消息包括T-S-NSSAI和allowed S-NSSAI。相应的,终端设备接收来自AMF网元的注册成功消息。Step 102: The AMF network element sends a registration success message to the terminal device. The registration success message includes T-S-NSSAI and allowed S-NSSAI. Correspondingly, the terminal device receives the registration success message from the AMF network element.
其中,T-S-NSSAI和allowed S-NSSAI可以二元组的形式携带在注册成功消息中。注册成功消息用于指示终端设备成功注册到核心网。注册成功消息可以是N1消息。Among them, T-S-NSSAI and allowed S-NSSAI can be carried in the registration success message in the form of a two-tuple. The registration success message is used to indicate that the terminal device is successfully registered to the core network. The registration success message may be an N1 message.
步骤103,AMF网元向接入网设备发送N2消息,N2消息包括RAND。相应的,接入网设备接收来自AMF网元的N2消息。Step 103: The AMF network element sends an N2 message to the access network device, and the N2 message includes RAND. Correspondingly, the access network device receives the N2 message from the AMF network element.
其中,N2消息包括AMF网元为终端设备生成的RAND。Among them, the N2 message includes the RAND generated by the AMF network element for the terminal device.
可以理解的是,步骤100-步骤103为预配置过程,其中不限定执行步骤102和步骤103的先后顺序。步骤104和步骤105为使用预配置信息的过程。It can be understood that step 100 to step 103 are a pre-configuration process, and the order of performing step 102 and step 103 is not limited. Step 104 and step 105 are the process of using the pre-configured information.
步骤104,终端设备向接入网设备发送注册请求消息,注册请求消息包括T-S-NSSAI。相应的,接入网设备接收来自终端设备的注册请求消息。Step 104: The terminal device sends a registration request message to the access network device, where the registration request message includes T-S-NSSAI. Correspondingly, the access network device receives the registration request message from the terminal device.
步骤104为终端设备再次发送注册请求消息,该注册请求消息包括步骤102接收到的T-S-NSSAI,而在requested NSSAI中不携带allowed NSSAI。Step 104 is that the terminal device sends a registration request message again. The registration request message includes the T-S-NSSAI received in step 102, and the requested NSSAI does not carry allowed NSSAI.
步骤105,接入网设备根据RAND和T-S-NSSAI,计算得到allowed S-NSSAI。Step 105: The access network device calculates the allowed S-NSSAI according to RAND and T-S-NSSAI.
接入网设备在接收到来自终端设备的注册请求消息时,根据步骤103接收到的RAND对T-S-NSSAI进行计算,以得到allowed NSSAI。例如使用RAND作为机密性算法128-NEA1的解密密钥对T-S-NSSAI进行解密得到allowed S-NSSAI。When the access network device receives the registration request message from the terminal device, it calculates the T-S-NSSAI according to the RAND received in step 103 to obtain the allowed NSSAI. For example, using RAND as the decryption key of the confidentiality algorithm 128-NEA1 to decrypt T-S-NSSAI to obtain allowed S-NSSAI.
图1所示的流程,预配置信息(例如RAND)基于终端设备粒度,属于终端设备的上下文信息。但是,在终端设备进入空闲态(idle)的情况下,接入网设备会删除终端设备的上下文信息,这样在终端设备再次发起注册请求时,接入网设备无法获得RAND,进而无法获得allowed NSSAI。并且,为了使得终端设备在移动过程中新连接的接入网设备可以正确处理终端设备提供的T-S-NSSAI,AMF网元需要对其所管辖的接入网设备上的终端设备的上下文信息进行更新,信令开销过大。In the process shown in Figure 1, the pre-configuration information (such as RAND) is based on the granularity of the terminal device and belongs to the context information of the terminal device. However, when the terminal device enters the idle state (idle), the access network device deletes the context information of the terminal device, so that when the terminal device initiates a registration request again, the access network device cannot obtain the RAND and thus cannot obtain the allowed NSSAI . In addition, in order for the newly connected access network device of the terminal device to correctly process the TS-NSSAI provided by the terminal device during its movement, the AMF network element needs to update the context information of the terminal device on the access network device under its jurisdiction , The signaling overhead is too large.
在另一种实现方式中,预配置信息基于公共陆地移动网(public land mobile network,PLMN)粒度。该种实现方式可参见图2所示的流程图,可包括:In another implementation manner, the pre-configuration information is based on the granularity of the public land mobile network (PLMN). Refer to the flowchart shown in Figure 2 for this implementation manner, which may include:
步骤201,接入网设备向AMF网元发送建立请求消息。相应的,AMF网元接收来自接入网设备的建立请求消息。Step 201: The access network device sends an establishment request message to the AMF network element. Correspondingly, the AMF network element receives the establishment request message from the access network device.
其中,建立请求消息携带基于跟踪区(tracking area,TA)粒度的S-NSSAI和T-S-NSSAI的二元组。Wherein, the establishment request message carries a two-tuple of S-NSSAI and T-S-NSSAI based on tracking area (TA) granularity.
步骤202,AMF网元向接入网设备发送建立响应消息。相应的,接入网设备接收来自AMF网元得建立响应消息。Step 202: The AMF network element sends an establishment response message to the access network device. Correspondingly, the access network device receives the establishment response message from the AMF network element.
其中,建立响应消息携带基于PLMN粒度的S-NSSAI和T-S-NSSAI的二元组,以及随机参数RAND。Among them, the establishment response message carries a two-tuple of S-NSSAI and T-S-NSSAI based on PLMN granularity, and a random parameter RAND.
需要说明的是,步骤201和步骤202中,二元组的数量可以是一个或多个。It should be noted that in step 201 and step 202, the number of two-tuples can be one or more.
步骤203,AMF网元向终端设备发送注册成功消息,注册成功消息携带与步骤202中相同的T-S-NSSAI和RAND。Step 203: The AMF network element sends a registration success message to the terminal device. The registration success message carries the same T-S-NSSAI and RAND as in step 202.
可以理解的是,步骤201-步骤203为预配置过程,步骤204和步骤205为使用预配置信息的过程。It can be understood that step 201 to step 203 are pre-configuration procedures, and step 204 and step 205 are procedures of using pre-configuration information.
步骤204,终端设备向接入网设备发送连接建立的接入层消息。相应的,接入网设备接收来自终端设备的连接建立的接入层消息。Step 204: The terminal device sends an access layer message for connection establishment to the access network device. Correspondingly, the access network device receives the access layer message from the terminal device for connection establishment.
终端设备将T-S-NSSAI、S-TMSI和RAND输入哈希运算,得到第一哈希值,并将第一哈希值携带在连接建立的接入层消息中。由于T-S-NSSAI的数量可能为多个,那么第一哈希值的数量可能为多个。连接建立的接入层消息,例如无线资源控制(radio resource control,RRC)连接建立完成消息。The terminal device inputs the T-S-NSSAI, S-TMSI, and RAND into the hash operation to obtain the first hash value, and carries the first hash value in the access layer message for connection establishment. Since the number of T-S-NSSAI may be multiple, the number of the first hash value may be multiple. An access layer message for connection establishment, such as a radio resource control (Radio Resource Control, RRC) connection establishment completion message.
步骤205,接入网设备计算得到第二哈希值。Step 205: The access network device calculates the second hash value.
接入网设备在接收到连接建立的接入层消息时,将自己存储的T-S-NSSAI和RAND,以及终端设备的S-TMSI,输入哈希运算,得到第二哈希值。接入网设备对比第一哈希值和第二哈希值,以确定S-NSSAI(例如,若第一哈希值和第二哈希值相同,则表示此时终端设备请求接入的S-NSSAI为T-S-NSSAI对应的allowed S-NSSAI)。进一步的,接入网设 备根据确定的S-NSSAI,选择AMF网元,向选择的AMF网元发送初始NAS消息。When the access network device receives the access layer message for connection establishment, it inputs the stored T-S-NSSAI and RAND and the S-TMSI of the terminal device into the hash operation to obtain the second hash value. The access network device compares the first hash value with the second hash value to determine the S-NSSAI (for example, if the first hash value and the second hash value are the same, it means that the terminal device requests to access the S-NSSAI at this time). -NSSAI is the allowed S-NSSAI corresponding to TS-NSSAI). Further, the access network device selects an AMF network element according to the determined S-NSSAI, and sends an initial NAS message to the selected AMF network element.
图2所示的流程,虽然可以解决图1所示流程的问题,但是所有终端设备会被配置相同的信息(例如T-S-NSSAI)以确定S-NSSAI。如果攻击者也通过网络注册流程获得步骤203携带的信息,那么攻击者也有能力监听和获取终端设备发送的S-NSSAI,导致接入网设备执行步骤205仍无法保证T-S-NSSAI的完全隐私性。Although the process shown in Figure 2 can solve the problem of the process shown in Figure 1, all terminal devices will be configured with the same information (for example, T-S-NSSAI) to determine the S-NSSAI. If the attacker also obtains the information carried in step 203 through the network registration process, the attacker also has the ability to monitor and obtain the S-NSSAI sent by the terminal device, resulting in the access network device performing step 205 and still cannot guarantee the complete privacy of the T-S-NSSAI.
因此,本申请实施例提供一种信息保护方法及通信装置,可以提供终端设备与接入网设备之间传输信息的安全性,还可以解决图1和图2所示流程存在的问题,从而提高网络的安全性、可靠性。Therefore, the embodiments of the present application provide an information protection method and communication device, which can provide the security of information transmission between terminal equipment and access network equipment, and can also solve the problems existing in the processes shown in Figures 1 and 2, thereby improving The security and reliability of the network.
在本申请实施例中的附图中,各个实施例所示的步骤,以及步骤之间的先后顺序用于举例,并不构成对本申请实施例的限定。应理解,执行图示中的部分步骤或调整步骤的顺序进行具体实施,均落在本申请的保护范围内。In the drawings in the embodiments of the present application, the steps shown in the various embodiments and the sequence between the steps are used as examples, and do not constitute a limitation to the embodiments of the present application. It should be understood that implementing some of the steps in the figure or adjusting the order of the steps for specific implementation falls within the protection scope of the present application.
本申请实施例描述的技术可用于各种通信系统,例如第四代(4th generation,4G)通信系统,4.5G通信系统,5G通信系统,多种通信系统融合的系统,或者未来演进的通信系统。The technology described in the embodiments of this application can be used in various communication systems, such as fourth-generation (4G) communication systems, 4.5G communication systems, 5G communication systems, systems that integrate multiple communication systems, or future-evolving communication systems .
本申请实施例涉及的终端设备(也可称为终端)可以是一种具有无线收发功能的设备,可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和人造卫星上等)。终端设备可以是UE,UE包括具有无线通信功能的手持式设备、车载设备、穿戴式设备或计算设备。示例性地,UE可以是手机(mobile phone)、平板电脑或带无线收发功能的电脑。终端设备还可以是虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、智能汽车(smart vehicle)终端设备、工业控制中的无线终端、无人驾驶中的无线终端、远程医疗中的无线终端、智能电网中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、等等。本申请实施例中,用于实现终端设备的功能的装置可以是终端设备;也可以是能够支持终端设备实现该功能的装置,例如芯片系统,该装置可以被安装在终端设备中或者和终端设备匹配使用,例如处理器。在本申请实施例提供的技术方案中,以用于实现终端设备的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。The terminal device (also referred to as a terminal) involved in the embodiments of this application can be a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; or on the water (such as a ship Etc.); can also be deployed in the air (such as aircraft, balloons and satellites, etc.). The terminal device may be a UE, and the UE includes a handheld device, a vehicle-mounted device, a wearable device, or a computing device with wireless communication functions. Exemplarily, the UE may be a mobile phone, a tablet computer, or a computer with a wireless transceiver function. Terminal equipment can also be virtual reality (VR) terminal equipment, augmented reality (augmented reality, AR) terminal equipment, smart vehicle terminal equipment, wireless terminal in industrial control, wireless terminal in unmanned driving , Wireless terminal in telemedicine, wireless terminal in smart grid, wireless terminal in smart city, wireless terminal in smart home, etc. In the embodiments of the present application, the device used to implement the function of the terminal device may be a terminal device; it may also be a device capable of supporting the terminal device to implement the function, such as a chip system. The device may be installed in the terminal device or connected to the terminal device. Matching use, such as a processor. In the technical solutions provided by the embodiments of the present application, the device for realizing the functions of the terminal device is a terminal device as an example to describe the technical solutions provided by the embodiments of the present application.
本申请实施例涉及的接入网设备,可以包括基站(base station,BS),可以是一种部署在无线接入网络中能够和终端设备进行无线通信的设备。其中,基站可能有多种形式,比如宏基站、微基站、中继站和接入点等。示例性地,本申请实施例涉及到的接入网设备可以是5G中的基站或长期演进(long term evolution,LTE)中的基站,其中,5G中的基站还可以称为发送接收点(transmission reception point,TRP)或下一代基站节点(next generation Node B,gNB)。本申请实施例中,用于实现接入网设备的功能的装置可以是接入网设备;也可以是能够支持接入网设备实现该功能的装置,例如芯片系统,该装置可以被安装在接入网设备中或者和接入网设备匹配使用,例如处理器。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。在本申请实施例提供的技术方案中,以用于实现接入网设备的功能的装置是接入网设备为例,描述本申请实施例提供的技术方案。The access network equipment involved in the embodiments of the present application may include a base station (base station, BS), and may be a device that is deployed in a wireless access network and can communicate with a terminal device wirelessly. Among them, the base station may have many forms, such as macro base stations, micro base stations, relay stations, and access points. Exemplarily, the access network equipment involved in the embodiments of the present application may be a base station in 5G or a base station in long term evolution (LTE), where the base station in 5G may also be referred to as a transmission point (transmission and reception point). reception point, TRP) or next generation Node B (gNB). In the embodiments of the present application, the device used to implement the function of the access network device may be the access network device; it may also be a device capable of supporting the access network device to implement the function, such as a chip system, which can be installed in the access network device. Used in or matched with access network equipment, such as a processor. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices. In the technical solutions provided in the embodiments of the present application, the device used to implement the functions of the access network equipment is the access network equipment as an example to describe the technical solutions provided in the embodiments of the present application.
请参见图3,为应用本申请实施例的网络架构示意图。图3包括接入网设备301和终端设备302。Please refer to FIG. 3, which is a schematic diagram of a network architecture to which an embodiment of the present application is applied. FIG. 3 includes an
在一种实现方式中,终端设备302根据第一密钥、随机参数和第一函数,生成第二密钥,并采用第二密钥对网络切片信息或终端设备302的能力信息等保护信息进行加密,得到第一加密保护信息;向接入网设备301发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息。接入网设备301在接收到第一请求消息时,确定设备标识信息对应的第一函数和第二函数;根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥;采用第二密钥对第一加密保护信息进行解密,得到网络切片信息或终端设备302的能力信息等保护信息。In an implementation manner, the
可选的,图3还包括接入管理网元303。接入管理网元303可以是5G系统中的AMF网元,或未来通信系统中与AMF网元具有相同功能的网元。接入管理网元303可以向接入网设备301提供设备标识信息与第一函数的标识信息以及第二函数的标识信息之间的对应关系,以便接入网设备301可以确定设备标识信息对应的第一函数和第二函数。Optionally, FIG. 3 also includes an access
在一种实现方式中,终端设备302根据第二密钥、随机参数和第一加密算法对网络切片信息或终端设备302的能力信息等保护信息进行加密,得到第一加密保护信息;向接入网设备301发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息。接入网设备301在接收到第一请求消息时,确定设备标识信息对应的第一函数、第二函数和第一加密算法;根据第一密钥标识、第一函数和第二函数,生成第二密钥;根据第二密钥、随机参数和第一加密算法对第一加密保护信息进行解密,得到网络切片信息或终端设备302的能力信息等保护信息。In one implementation, the
可选的,接入管理网元303可以向接入网设备301提供设备标识信息与第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识之间的对应关系,以便接入网设备301可以确定设备标识信息对应的第一函数、第二函数和第一加密算法。Optionally, the access
本申请实施例提供的信息保护方法,不仅可以应用于终端设备与接入网设备传输网络切片信息的场景,还可以应用于终端设备与接入网设备传输终端设备的能力信息的场景。The information protection method provided in the embodiments of the present application can not only be applied to a scenario where a terminal device and an access network device transmit network slice information, but also can be applied to a scenario where a terminal device and an access network device transmit capability information of the terminal device.
下面将对本申请实施例提供的信息保护方法进行具体阐述,终端设备以UE为例,接入管理网元以AMF为例。需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。The information protection method provided in the embodiments of the present application will be described in detail below. The terminal device is a UE as an example, and the access management network element is an AMF as an example. It should be noted that the name of the message between each network element or the name of each parameter in the message in the following embodiments of this application is just an example, and other names may also be used in specific implementations. The embodiments of this application do not make specific details about this. limited.
请参见图4,为本申请实施例一提供的信息保护方法的流程示意图,该流程可包括但不限于如下步骤:Please refer to FIG. 4, which is a schematic diagram of the flow of the information protection method provided in Embodiment 1 of this application. The flow may include but is not limited to the following steps:
步骤401,UE根据第一密钥、随机参数和第一函数,生成第二密钥,并采用第二密钥对保护信息进行加密,得到第一加密保护信息。Step 401: The UE generates a second key according to the first key, random parameters and the first function, and uses the second key to encrypt the protection information to obtain the first encrypted protection information.
其中,第一密钥可表示为Key_1;随机参数为UE生成的随机参数RAND;第一函数是不可逆函数,可以是哈希函数,可表示为hash_1。第一密钥,随机参数和第一函数可通过步骤400c获得,具体可参见步骤400c的描述。第一函数也可以预配置在UE上,这样UE可以直接使用第一函数。Among them, the first key can be expressed as Key_1; the random parameter is a random parameter RAND generated by the UE; the first function is an irreversible function, which can be a hash function, which can be expressed as hash_1. The first key, the random parameters and the first function can be obtained through step 400c. For details, please refer to the description of step 400c. The first function can also be pre-configured on the UE, so that the UE can directly use the first function.
UE将Key_1和RAND输入hash_1,得到第二密钥,第二密钥可表示为Key_2。可选 的,UE将Key_1、RAND以及UE标识(identifier,ID)输入hash_1,得到第二密钥。UE ID可以是UE的设备标识、国际移动用户识别码(international mobile subscriber identity,IMSI)、临时移动用户标识(temporary mobile subscriber identity,TMSI)、GUTI或S-TMSI等。UE生成第二密钥的过程可参见图4a所示,图4a中虚线表示可选的。The UE inputs Key_1 and RAND into hash_1 to obtain the second key, which can be expressed as Key_2. Optionally, the UE inputs Key_1, RAND, and UE identifier (identifier, ID) into hash_1 to obtain the second key. The UE ID may be the UE's equipment identity, international mobile subscriber identity (international mobile subscriber identity, IMSI), temporary mobile subscriber identity (temporary mobile subscriber identity, TMSI), GUTI or S-TMSI, etc. The process of UE generating the second key can be seen in Fig. 4a, and the dotted line in Fig. 4a indicates optional.
UE在生成第二密钥的情况下,采用第二密钥对保护信息进行加密,得到第一加密保护信息。其中,保护信息可以是网络切片信息,例如requested NSSAI或allowed NSSAI;也可以是UE的能力信息;还可以是需要在AS层保护的敏感信息。为了描述方便,保护信息以S-NSSAI为例进行描述,S-NSSAI可以是requested NSSAI或allowed S-NSSAI。第一加密保护信息即为采用Key_2对S-NSSAI进行加密保护得到的信息。In the case of generating the second key, the UE uses the second key to encrypt the protection information to obtain the first encrypted protection information. Among them, the protection information can be network slice information, such as requested NSSAI or allowed NSSAI; it can also be UE capability information; it can also be sensitive information that needs to be protected at the AS layer. For the convenience of description, the protection information is described using S-NSSAI as an example. S-NSSAI can be requested NSSAI or allowed S-NSSAI. The first encrypted protection information is the information obtained by using Key_2 to encrypt and protect the S-NSSAI.
示例性的,UE对S-NSSAI的加密方式可以是:S-NSSAI XOR hash_1(Key_1XOR RAND)。其中,XOR表示异或运算,将Key_1与RAND的异或结果输入hash_1,再将S-NSSAI与hash_1的输出结果进行异或,得到加密保护后的S-NSSAI。采用哈希运算和异或运算,计算开销较小。本申请实施例中,不限定采用第二密钥对保护信息进行加密的方式。Exemplarily, the UE encrypting the S-NSSAI may be: S-NSSAI XOR hash_1 (Key_1 XOR RAND). Among them, XOR represents an exclusive OR operation, the exclusive OR result of Key_1 and RAND is input to hash_1, and the output result of S-NSSAI and hash_1 is XORed to obtain the encrypted protected S-NSSAI. Using hash operation and XOR operation, the calculation overhead is small. In the embodiments of the present application, the method of using the second key to encrypt the protected information is not limited.
步骤402,UE向接入网设备发送第一请求消息。相应的,接入网设备接收来自UE的第一请求消息。Step 402: The UE sends a first request message to the access network device. Correspondingly, the access network device receives the first request message from the UE.
其中,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息。第一密钥标识可标识为Key_1ID,第一密钥标识可用于生成第一密钥,UE可通过步骤400c获得第一密钥标识,具体可参见步骤400c的描述。设备标识信息可以包括UE ID。UE ID与AMF网元ID存在对应关系。该对应关系可以是通过UE ID确定出UE对应的AMF网元ID,或UE ID包括AMF网元ID。AMF网元ID可用于辅助确定设备标识信息对应的第一函数和第二函数。随机参数即UE生成的随机参数RAND。Wherein, the first request message includes the first key identification, device identification information, random parameters, and first encryption protection information. The first key identifier may be identified as Key_1ID, the first key identifier may be used to generate the first key, and the UE may obtain the first key identifier through step 400c. For details, refer to the description of step 400c. The device identification information may include the UE ID. There is a corresponding relationship between the UE ID and the AMF network element ID. The correspondence relationship may be that the AMF network element ID corresponding to the UE is determined through the UE ID, or the UE ID includes the AMF network element ID. The AMF network element ID can be used to assist in determining the first function and the second function corresponding to the device identification information. The random parameter is the random parameter RAND generated by the UE.
步骤403,接入网设备确定设备标识信息对应的第一函数和第二函数。Step 403: The access network device determines the first function and the second function corresponding to the device identification information.
接入网设备在接收到第一请求消息时,确定设备标识信息对应的第一函数和第二函数。该对应关系可以是设备标识信息对应的第一函数和第二函数,也可以是设备标识信息中UE ID对应的第一函数和第二函数,还可以是UE ID中的AMF网元ID对应的第一函数和第二函数。第二函数也是不可逆函数,可以是哈希函数,可表示为hash_2。第一函数和第二函数可以是同一类型的不同函数,也可以是不同类型的函数。可以理解的是,接入网设备确定AMF网元对应的hash_1和hash_2。When receiving the first request message, the access network device determines the first function and the second function corresponding to the device identification information. The correspondence can be the first function and the second function corresponding to the device identification information, the first function and the second function corresponding to the UE ID in the device identification information, or the AMF network element ID in the UE ID. The first function and the second function. The second function is also an irreversible function, which can be a hash function, which can be expressed as hash_2. The first function and the second function can be different functions of the same type or different types of functions. It is understandable that the access network device determines the hash_1 and hash_2 corresponding to the AMF network element.
在一种实现方式中,接入网设备接收来自各个AMF网元的第一消息,第一消息包括第一函数的标识信息和第二函数的标识信息,建立各个AMF网元ID与第一函数的标识信息以及第二函数的标识信息之间的对应关系。这样,接入网设备在接收到第一请求消息时,可根据第一请求消息携带的AMF网元ID确定其对应的第一函数和第二函数。In an implementation manner, the access network device receives a first message from each AMF network element, the first message includes the identification information of the first function and the identification information of the second function, and establishes the ID of each AMF network element and the first function The corresponding relationship between the identification information of the second function and the identification information of the second function. In this way, when the access network device receives the first request message, it can determine its corresponding first function and second function according to the AMF network element ID carried in the first request message.
可选的,第一消息还包括第一计算参数,第一计算参数可表示为a_1。接入网设备在建立对应关系时,建立各个AMF网元与第一函数的标识信息、第二函数的标识信息以及第一计算参数之间的对应关系。这样,接入网设备在接收到第一请求消息时,可确定AMF网元对应的第一函数、第二函数和第一计算参数。第一计算参数、第一密钥标识和第二函数可用于确定出第一密钥。Optionally, the first message further includes a first calculation parameter, and the first calculation parameter may be expressed as a_1. When establishing the corresponding relationship, the access network device establishes the corresponding relationship between the identification information of each AMF network element and the first function, the identification information of the second function, and the first calculation parameter. In this way, when the access network device receives the first request message, it can determine the first function, the second function, and the first calculation parameter corresponding to the AMF network element. The first calculation parameter, the first key identifier and the second function can be used to determine the first key.
在一种实现方式中,接入网设备上存有第一函数的标识信息和第二函数的标识信息。接入网设备在接收到第一请求消息时,默认将存有的第一函数和第二函数作为AMF网元对应的第一函数和第二函数。In an implementation manner, the identification information of the first function and the identification information of the second function are stored on the access network device. When receiving the first request message, the access network device defaults the stored first function and second function as the first function and second function corresponding to the AMF network element.
可选的,接入网设备上还存在第一计算参数,接入网设备默认将存有的第一计算参数作为AMF网元对应的第一计算参数。Optionally, the first calculation parameter also exists on the access network device, and the access network device uses the stored first calculation parameter as the first calculation parameter corresponding to the AMF network element by default.
上述第一函数的标识信息可以是第一函数的版本号(version)或函数标识等,例如hash_1version。上述第二函数的标识信息可以是第二函数的版本号或函数标识等。The identification information of the above-mentioned first function may be the version number (version) or function identification of the first function, for example, hash_1version. The identification information of the above-mentioned second function may be the version number or function identification of the second function.
步骤404,接入网设备根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥。Step 404: The access network device generates a second key according to the first key identifier, the random parameter, the first function, and the second function.
接入网设备根据第一密钥标识和第二函数,生成第一密钥;根据第一密钥、随机参数和第一函数,生成第二密钥。The access network device generates a first key according to the first key identifier and the second function; and generates a second key according to the first key, random parameters and the first function.
可选的,接入网设备根据第一密钥标识、第二函数和第一计算参数,生成第一密钥。例如,将第一密钥标识和第一计算参数输入第二函数,输出第一密钥。Optionally, the access network device generates the first key according to the first key identifier, the second function, and the first calculation parameter. For example, the first key identifier and the first calculation parameter are input into the second function, and the first key is output.
可选的,接入网设备根据第一密钥、随机参数、UE ID以及第一函数,生成第二密钥。例如,将第一密钥、随机参数和UE ID输入第一函数,输出第二密钥。Optionally, the access network device generates the second key according to the first key, random parameters, UE ID, and the first function. For example, input the first key, random parameters, and UE ID into the first function, and output the second key.
接入网设备生成第二密钥的过程可参见图4b所示,图4b中虚线表示可选的。The process of generating the second key by the access network device can be seen in Fig. 4b, and the dotted line in Fig. 4b indicates optional.
步骤405,接入网设备采用第二密钥对第一加密保护信息进行解密,得到保护信息。Step 405: The access network device uses the second key to decrypt the first encrypted protection information to obtain the protection information.
接入网设备采用第二密钥对第一加密保护信息进行解密,得到保护信息,这样便实现对UE向接入网设备发送的AS层敏感信息进行保护,有效防止窃听者从AS层消息中获取敏感信息。例如得到S-NSSAI。这样便实现对UE向接入网设备发送的S-NSSAI的保护,可以有效防止窃听者获得S-NSSAI。The access network device uses the second key to decrypt the first encrypted protection information to obtain the protected information. In this way, the sensitive information of the AS layer sent by the UE to the access network device is protected, effectively preventing eavesdroppers from the AS layer message Obtain sensitive information. For example, get S-NSSAI. In this way, the protection of the S-NSSAI sent by the UE to the access network device can be realized, which can effectively prevent the eavesdropper from obtaining the S-NSSAI.
可选的,步骤405之后,接入网设备根据获得的S-NSSAI以及第一请求消息中携带的信息,继续执行UE注册流程。Optionally, after step 405, the access network device continues to perform the UE registration process according to the obtained S-NSSAI and the information carried in the first request message.
可选的,步骤401之前还包括步骤400a-步骤400c,可以理解的是,步骤400a-步骤400c为初始注册过程中的预配置过程,第一请求消息为后续注册过程中的注册请求消息。Optionally, step 401 also includes steps 400a-400c before step 401. It can be understood that steps 400a-400c are the pre-configuration process in the initial registration process, and the first request message is the registration request message in the subsequent registration process.
步骤400a,接入网设备向AMF网元发送请求消息。相应的,AMF网元接收来自接入网设备的请求消息。Step 400a: The access network device sends a request message to the AMF network element. Correspondingly, the AMF network element receives the request message from the access network device.
接入网设备在初始注册过程中,向AMF网元发送请求消息,该请求消息用于请求AMF网元对接入网设备进行初始配置,同时告知AMF网元该接入网设备支持的能力信息。该请求消息可以理解为配置请求消息或入网请求消息。请求消息例如可以是建立请求(setup request)消息。During the initial registration process, the access network device sends a request message to the AMF network element. The request message is used to request the AMF network element to perform the initial configuration of the access network device and inform the AMF network element of the capability information supported by the access network device. . The request message can be understood as a configuration request message or a network access request message. The request message may be, for example, a setup request (setup request) message.
步骤400b,AMF网元向接入网设备发送第一消息。相应的,接入网设备接收来自AMF网元的第一消息。Step 400b, the AMF network element sends the first message to the access network device. Correspondingly, the access network device receives the first message from the AMF network element.
AMF网元在接收到请求消息时,向接入网设备发送第一消息,第一消息用于响应请求消息,例如可以是建立响应(setup response)消息。该响应消息用于AMF网元对接入网设备进行初始配置,可以理解为配置请求响应消息或入网请求响应消息。When the AMF network element receives the request message, it sends a first message to the access network device. The first message is used to respond to the request message, and may be, for example, a setup response (setup response) message. The response message is used by the AMF network element to perform initial configuration of the access network device, and can be understood as a configuration request response message or a network access request response message.
其中,第一消息包括第一函数的标识信息和第二函数的标识信息。接入网设备在接收到第一消息时,建立AMF网元ID与第一函数的标识信息和第二函数的标识信息之间的对 应关系,例如该对应关系可表示为AMF网元 以便接入网设备在接收到设备标识信息时,可以根据AMF网元ID确定出该AMF网元ID对应的第一函数和第二函数。 Wherein, the first message includes identification information of the first function and identification information of the second function. When the access network device receives the first message, it establishes the correspondence between the AMF network element ID and the identification information of the first function and the identification information of the second function. For example, the correspondence may be expressed as an AMF network element. Therefore, when the access network device receives the device identification information, it can determine the first function and the second function corresponding to the AMF network element ID according to the AMF network element ID.
可选的,第一消息还包括第一计算参数。接入网设备建立AMF网元ID与第一函数的标识信息、第二函数的标识信息以及第一计算参数之间的对应关系,例如该对应关系可表示为AMF网元 以便接入网设备在接收到设备标识信息时,可以从设备标识信息中获取AMF网元ID,进一步确定出AMF网元ID对应的第一函数、第二函数和第一计算参数。 Optionally, the first message further includes the first calculation parameter. The access network device establishes the correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the first calculation parameter. For example, the correspondence may be expressed as an AMF network element So that when the access network device receives the device identification information, it can obtain the AMF network element ID from the device identification information, and further determine the first function, the second function, and the first calculation parameter corresponding to the AMF network element ID.
步骤400c,AMF网元向UE发送第三消息。相应的,UE接收来自AMF网元的第三消息。Step 400c, the AMF network element sends a third message to the UE. Correspondingly, the UE receives the third message from the AMF network element.
AMF网元在初始注册过程中,向UE发送第三消息(例如注册成功消息),第三消息包括第一函数的标识信息、第一密钥标识和第一密钥。第一密钥标识和第一密钥可以二元组的形式携带在第三消息。具体第三消息为初始注册过程中的何种消息,在本申请实施例中不作限定。During the initial registration process, the AMF network element sends a third message (for example, a registration success message) to the UE. The third message includes the identification information of the first function, the first key identification, and the first key. The first key identifier and the first key may be carried in the third message in the form of a two-tuple. The specific third message is what kind of message in the initial registration process, which is not limited in the embodiment of the present application.
AMF网元向UE发送第一密钥和第一函数的标识信息,以便UE将第一密钥和随机参数输入第一函数,得到第二密钥。AMF网元向UE发送第一密钥标识,以便UE向接入网设备发送第一密钥标识,以便接入网设备根据第一密钥标识和第二函数,生成第一密钥,进而根据第一密钥和第一函数,生成第二密钥。The AMF network element sends the first key and the identification information of the first function to the UE, so that the UE inputs the first key and random parameters into the first function to obtain the second key. The AMF network element sends the first key identifier to the UE, so that the UE sends the first key identifier to the access network device, so that the access network device generates the first key according to the first key identifier and the second function, and then according to The first key and the first function generate the second key.
上述第一密钥也可以描述为第一层密钥,上述第二密钥也可以描述为第二层密钥。The above-mentioned first key may also be described as a first-level key, and the above-mentioned second key may also be described as a second-level key.
在图4所示的实施例中,采用分层密钥的计算思想,使得保护信息的加密密钥可频繁更换,从而增加安全性。接入网设备上的预配置信息是第一函数和第二函数(可选的还包括第一计算参数),UE上的预配置信息是第一函数、第一密钥标识和第一密钥,这些预配置信息不属于UE的上下文信息,从而克服图1的技术缺陷。不同UE生成的RAND不同,进而得到的第二密钥不同,使得对保护信息进行加密保护的密钥不同,从而克服图2的技术缺陷。In the embodiment shown in FIG. 4, the calculation idea of a hierarchical key is adopted, so that the encryption key for protecting information can be replaced frequently, thereby increasing security. The pre-configuration information on the access network device is the first function and the second function (optionally including the first calculation parameter), and the pre-configuration information on the UE is the first function, the first key identifier, and the first key The pre-configuration information does not belong to the context information of the UE, thereby overcoming the technical shortcomings of FIG. 1. The RANDs generated by different UEs are different, and the second keys obtained are different, so that the keys for encrypting and protecting the protected information are different, thereby overcoming the technical defect of FIG. 2.
请参见图5,为本申请实施例二提供的信息保护方法的流程示意图,该流程可包括但不限于如下步骤:Please refer to FIG. 5, which is a schematic diagram of the flow of the information protection method provided in the second embodiment of this application. The flow may include but is not limited to the following steps:
步骤501,UE根据第二密钥、随机参数和第一加密算法对保护信息进行加密,得到第一加密保护信息。Step 501: The UE encrypts the protection information according to the second key, random parameters and the first encryption algorithm to obtain the first encryption protection information.
其中,随机参数为UE生成的随机参数。第一加密算法是对保护信息进行加密或解密的算法。第二密钥和第一加密算法可通过步骤500c获得,具体可参见步骤500c的具体描述。第二密钥和第一加密算法也可以是预配置在UE上的默认信息。Among them, the random parameter is a random parameter generated by the UE. The first encryption algorithm is an algorithm for encrypting or decrypting protected information. The second key and the first encryption algorithm can be obtained through step 500c, and for details, please refer to the detailed description of step 500c. The second key and the first encryption algorithm may also be default information pre-configured on the UE.
示例性的,UE采用第二密钥,随机参数和第一加密算法对S-NSSAI进行加密,得到加密保护后的S-NSSAI,即第一加密保护信息。Exemplarily, the UE uses the second key, random parameters and the first encryption algorithm to encrypt the S-NSSAI to obtain the encrypted protected S-NSSAI, that is, the first encrypted protection information.
步骤502,UE向接入网设备发送第一请求消息。相应的,接入网设备接收来自UE的第一请求消息。Step 502: The UE sends a first request message to the access network device. Correspondingly, the access network device receives the first request message from the UE.
其中,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息。第一密钥标识可用于确定第一密钥。设备标识信息可参见图4所示实施例中对设备标 识信息的详细描述。随机参数即为UE生成的随机参数。Wherein, the first request message includes the first key identification, device identification information, random parameters, and first encryption protection information. The first key identifier can be used to determine the first key. For the device identification information, refer to the detailed description of the device identification information in the embodiment shown in FIG. 4. The random parameter is the random parameter generated by the UE.
步骤503,接入网设备确定设备标识信息对应的第一函数、第二函数和第一加密算法。Step 503: The access network device determines the first function, the second function, and the first encryption algorithm corresponding to the device identification information.
接入网设备在接收到第一请求消息时,确定设备标识信息对应的第一函数、第二函数和第一加密算法。第一函数和第二函数均是不可逆函数,第一函数可表示为f1(x),第二函数可表示为f2(x)。第一函数和第二函数可以是同一类型的不同函数,也可以是不同类型的函数。可以理解的是,接入网设备确定AMF网元对应的f1(x)、f2(x)和第一加密算法。When receiving the first request message, the access network device determines the first function, the second function, and the first encryption algorithm corresponding to the device identification information. Both the first function and the second function are irreversible functions, the first function can be expressed as f1(x), and the second function can be expressed as f2(x). The first function and the second function can be different functions of the same type or different types of functions. It is understandable that the access network device determines f1(x), f2(x) and the first encryption algorithm corresponding to the AMF network element.
在一种实现方式中,接入网设备接收来自各个AMF网元的第一消息,第一消息包括第一函数的标识信息,第二函数的标识信息以及第一加密算法的算法标识,建立各个AMF网元ID与第一函数的标识信息,第二函数的标识信息以及第一加密算法的算法标识之间的对应关系。这样,接入网设备在接收到第一请求消息时,可根据第一请求消息携带的AMF网元ID确定其对应的第一函数、第二函数和第一加密算法。In one implementation, the access network device receives a first message from each AMF network element, the first message includes the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm, and establishes each Correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm. In this way, when the access network device receives the first request message, it can determine its corresponding first function, second function, and first encryption algorithm according to the AMF network element ID carried in the first request message.
在一种实现方式中,接入网设备上存有第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识。接入网设备在接收到第一请求消息时,默认将存有的第一函数、第二函数以及第一加密算法作为AMF网元对应的第一函数、第二函数以及第一加密算法。In an implementation manner, the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm are stored on the access network device. When receiving the first request message, the access network device defaults the stored first function, second function, and first encryption algorithm as the first function, second function, and first encryption algorithm corresponding to the AMF network element.
步骤504,接入网设备根据第一密钥标识、第一函数和第二函数,生成第二密钥。Step 504: The access network device generates a second key according to the first key identifier, the first function, and the second function.
接入网设备根据第一密钥标识和第一函数,生成第一密钥。即将第一密钥标识作为第一函数的输入,第一函数的输出即第一密钥。可选的,根据第一密钥标识、UE ID和第一函数,生成第一密钥。即将第一密钥标识、UE ID作为第一函数的输入,第一函数的输出即第一密钥。The access network device generates the first key according to the first key identifier and the first function. That is, the first key identifier is used as the input of the first function, and the output of the first function is the first key. Optionally, the first key is generated according to the first key identifier, the UE ID, and the first function. That is, the first key identifier and the UE ID are used as the input of the first function, and the output of the first function is the first key.
接入网设备根据第一密钥和第二函数,生成第二密钥标识。即将第一密钥作为第二函数的输入,第一函数的输出即第二密钥标识。可选的,根据第一密钥标识、第一密钥和第二函数,生成第二密钥标识。即将第一密钥标识和第一密钥作为第二函数的输入,第二函数的输出即第二密钥标识。可选的,根据第一密钥、UE ID和第二函数,生成第二密钥标识。即将第一密钥和UE ID作为第二函数的输入,第二函数的输出即第二密钥标识。可选的,根据第一密钥标识、第一密钥、UE ID和第二函数,生成第二密钥标识。即将第一密钥标识、第一密钥和UE ID作为第二函数的输入,第二函数的输出即第二密钥标识。The access network device generates a second key identifier according to the first key and the second function. That is, the first key is used as the input of the second function, and the output of the first function is the second key identifier. Optionally, the second key identifier is generated according to the first key identifier, the first key, and the second function. That is, the first key identifier and the first key are used as the input of the second function, and the output of the second function is the second key identifier. Optionally, the second key identifier is generated according to the first key, the UE ID, and the second function. That is, the first key and the UE ID are used as the input of the second function, and the output of the second function is the second key identifier. Optionally, the second key identifier is generated according to the first key identifier, the first key, the UE ID, and the second function. That is, the first key identifier, the first key, and the UE ID are used as the input of the second function, and the output of the second function is the second key identifier.
接入网设备根据第二密钥标识和第一函数,生成第二密钥。即将第二密钥标识作为第一函数的输入,第一函数的输出即第二密钥。可选的,根据第二密钥标识、UE ID和第一函数,生成第二密钥。即将第二密钥标识和UE ID作为第一函数的输入,第一函数的输出即第二密钥。The access network device generates a second key according to the second key identifier and the first function. That is, the second key identifier is used as the input of the first function, and the output of the first function is the second key. Optionally, the second key is generated according to the second key identifier, the UE ID, and the first function. That is, the second key identifier and the UE ID are used as the input of the first function, and the output of the first function is the second key.
在第一请求消息包括第一密钥标识的情况下,接入网设备生成第二密钥的过程可参见图5a所示。图5a中虚线表示可选的。In the case that the first request message includes the first key identifier, the process of generating the second key by the access network device can be referred to as shown in FIG. 5a. The dotted line in Figure 5a indicates optional.
步骤505,接入网设备根据第二密钥、随机参数和第一加密算法对第一加密保护信息进行解密,得到保护信息。Step 505: The access network device decrypts the first encrypted protection information according to the second key, random parameters and the first encryption algorithm to obtain the protection information.
接入网设备在得到第二密钥的情况下,采用第二密钥、第一请求消息包括的随机参数,以及确定的第一加密算法,对第一加密保护信息进行解密,得到保护信息。After obtaining the second key, the access network device uses the second key, random parameters included in the first request message, and the determined first encryption algorithm to decrypt the first encrypted protection information to obtain the protection information.
示例性的,接入网设备采用第二密钥,随机参数和第一加密算法对第一加密保护信息 进行加密,得到S-NSSAI。Exemplarily, the access network device uses the second key, random parameters and the first encryption algorithm to encrypt the first encrypted protection information to obtain the S-NSSAI.
可选的,步骤505之后,接入网设备根据获得的S-NSSAI以及第一请求消息中携带的信息,继续执行UE注册流程。Optionally, after step 505, the access network device continues to perform the UE registration process according to the obtained S-NSSAI and the information carried in the first request message.
可选的,步骤501之前还包括步骤500a-步骤500c,可以理解的是,步骤500a-步骤500c为初始注册过程中的预配置过程,第一请求消息为后续注册过程中的注册请求消息。Optionally, step 501 also includes steps 500a to 500c before step 501. It can be understood that steps 500a to 500c are the pre-configuration process in the initial registration process, and the first request message is the registration request message in the subsequent registration process.
步骤500a,接入网设备向AMF网元发送请求消息。相应的,AMF网元接收来自接入网设备的请求消息。该请求消息的功能与举例可见400a,此处不再赘述。Step 500a: The access network device sends a request message to the AMF network element. Correspondingly, the AMF network element receives the request message from the access network device. The function and example of the request message can be seen in 400a, which will not be repeated here.
步骤500b,AMF网元向接入网设备发送第一消息。相应的,接入网设备接收来自AMF网元的第一消息。In step 500b, the AMF network element sends the first message to the access network device. Correspondingly, the access network device receives the first message from the AMF network element.
其中,第一消息包括第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识。接入网设备在接收到第一消息时,建立AMF网元ID与第一函数的标识信息、第二函数的标识信息以及第一加密算法的算法标识之间的对应关系,例如该对应关系可表示为AMF网元 以便接入网设备在接收到设备标识信息时,可以根据设备标识信息中的AMF网元ID,进一步确定出AMF网元ID对应的第一函数、第二函数以及第一加密算法。 Wherein, the first message includes identification information of the first function, identification information of the second function, and algorithm identification of the first encryption algorithm. When the access network device receives the first message, it establishes the correspondence between the AMF network element ID and the identification information of the first function, the identification information of the second function, and the algorithm identification of the first encryption algorithm. For example, the correspondence may be Expressed as AMF network element Therefore, when the access network device receives the device identification information, it can further determine the first function, the second function, and the first encryption algorithm corresponding to the AMF network element ID according to the AMF network element ID in the device identification information.
步骤500c,AMF网元向UE发送第三消息。相应的,UE接收来自AMF网元的第三消息。In step 500c, the AMF network element sends a third message to the UE. Correspondingly, the UE receives the third message from the AMF network element.
其中,第三消息包括第一密钥标识、第二密钥以及第一加密算法的算法标识。UE可在第一请求消息中携带第一密钥标识,以便接入网设备可以按照图5a所示的过程获得第二密钥。第二密钥和第一加密算法,用于UE对保护信息进行加密保护。其中,第三消息的定义可参见400c步骤,此处不再赘述。Wherein, the third message includes the first key identifier, the second key, and the algorithm identifier of the first encryption algorithm. The UE may carry the first key identifier in the first request message, so that the access network device can obtain the second key according to the process shown in FIG. 5a. The second key and the first encryption algorithm are used for the UE to encrypt and protect the protected information. Among them, the definition of the third message can refer to step 400c, which will not be repeated here.
在图5所示的实施例中,采用分层密钥的计算思想,使得保护信息的加密密钥可频繁更换,从而增加安全性。接入网设备上的预配置信息是第一函数、第二函数以及第一加密算法,UE上的预配置信息是第二密钥、第一密钥标识和第一加密算法,这些预配置信息不属于UE的上下文信息,从而克服图1的技术缺陷。不同UE生成的RAND不同,进而得到的第二密钥不同,使得对保护信息进行加密保护的密钥不同,从而克服图2的技术缺陷。In the embodiment shown in FIG. 5, the calculation idea of a hierarchical key is adopted, so that the encryption key for protecting information can be replaced frequently, thereby increasing security. The pre-configuration information on the access network device is the first function, the second function, and the first encryption algorithm. The pre-configuration information on the UE is the second key, the first key identifier, and the first encryption algorithm. These pre-configuration information It does not belong to the context information of the UE, thereby overcoming the technical defect of FIG. 1. The RANDs generated by different UEs are different, and the second keys obtained are different, so that the keys for encrypting and protecting the protected information are different, thereby overcoming the technical defect of FIG. 2.
请参见图6,为本申请实施例三提供的信息保护方法的流程示意图,该流程可包括但不限于如下步骤:Please refer to FIG. 6, which is a schematic diagram of the flow of the information protection method provided in the third embodiment of this application. The flow may include but is not limited to the following steps:
步骤600a,接入网设备向AMF网元发送请求消息。相应的,AMF网元接收来自接入网设备的请求消息。Step 600a: The access network device sends a request message to the AMF network element. Correspondingly, the AMF network element receives the request message from the access network device.
步骤600b,AMF网元向接入网设备发送第一消息。相应的,接入网设备接收来自AMF网元的第一消息。In step 600b, the AMF network element sends the first message to the access network device. Correspondingly, the access network device receives the first message from the AMF network element.
其中,第一消息包括第一函数的标识信息和第一加密算法的算法标识。Wherein, the first message includes the identification information of the first function and the algorithm identification of the first encryption algorithm.
步骤600c,AMF网元向UE发送第三消息。相应的,UE接收来自AMF网元的第三消息。In step 600c, the AMF network element sends a third message to the UE. Correspondingly, the UE receives the third message from the AMF network element.
其中,第三消息包括第二密钥标识、第二密钥以及第一加密算法的算法标识。UE可在第一请求消息中携带第二密钥标识,以便接入网设备根据第二密钥标识和第一函数生成第二密钥。第二密钥和第一加密算法,用于UE对保护信息进行加密保护。Wherein, the third message includes the second key identifier, the second key, and the algorithm identifier of the first encryption algorithm. The UE may carry the second key identifier in the first request message, so that the access network device generates the second key according to the second key identifier and the first function. The second key and the first encryption algorithm are used for the UE to encrypt and protect the protected information.
步骤601,UE根据第二密钥、随机参数和第一加密算法对保护信息进行加密,得到第一加密保护信息。步骤601可参见步骤501的具体描述,在此不再赘述。Step 601: The UE encrypts the protection information according to the second key, the random parameter and the first encryption algorithm to obtain the first encryption protection information. For step 601, refer to the specific description of step 501, which will not be repeated here.
步骤602,UE向接入网设备发送第一请求消息。相应的,接入网设备接收来自UE的第一请求消息。Step 602: The UE sends a first request message to the access network device. Correspondingly, the access network device receives the first request message from the UE.
其中,第一请求消息包括第二密钥标识、设备标识信息、随机参数和第一加密保护信息。Wherein, the first request message includes the second key identification, device identification information, random parameters, and first encryption protection information.
步骤603,接入网设备确定设备标识信息对应的第一函数和第一加密算法。Step 603: The access network device determines the first function and the first encryption algorithm corresponding to the device identification information.
步骤604,接入网设备根据第二密钥标识和第一函数,生成第二密钥。Step 604: The access network device generates a second key according to the second key identifier and the first function.
接入网设备将第二密钥标识输入第一函数,第一函数的输出即第二密钥。可选的,接入网设备将第二密钥标识和UE ID输入第一函数,第一函数的输出即第二密钥。The access network device inputs the second key identifier into the first function, and the output of the first function is the second key. Optionally, the access network device inputs the second key identifier and the UE ID into the first function, and the output of the first function is the second key.
在第一请求消息包括第二密钥标识的情况下,接入网设备生成第二密钥的过程可参见图6a所示。图6a中虚线表示可选的。In the case that the first request message includes the second key identifier, the process of generating the second key by the access network device can be referred to as shown in FIG. 6a. The dotted line in Figure 6a indicates optional.
步骤605,接入网设备根据第二密钥、随机参数和第一加密算法对第一加密保护信息进行解密,得到保护信息。步骤605可参见步骤505的具体描述,在此不再赘述。Step 605: The access network device decrypts the first encrypted protection information according to the second key, random parameters and the first encryption algorithm to obtain the protection information. For step 605, refer to the specific description of step 505, which will not be repeated here.
图6所示实施例于图5所示实施例的不同之处在于,第一消息、第三消息以及第一请求消息携带的内容不同。图6所示实施例相比图5所示实施例,实现更为简单。图6所示实施例,可以保护UE向接入网设备发送的保护信息,可以克服图1和图2的技术缺陷。The difference between the embodiment shown in FIG. 6 and the embodiment shown in FIG. 5 is that the contents carried in the first message, the third message, and the first request message are different. Compared with the embodiment shown in FIG. 5, the implementation shown in FIG. 6 is simpler. The embodiment shown in FIG. 6 can protect the protection information sent by the UE to the access network device, and can overcome the technical defects of FIG. 1 and FIG. 2.
请参见图7,为本申请实施例四提供的信息保护方法的流程示意图。图7在AMF网元感知接入网设备1被攻击者攻破的场景下,向除接入网设备1以外的其他接入网设备,例如接入网设备2发送第二消息,向UE发送第四消息。图7所示的流程可包括但不限于如下步骤:Please refer to FIG. 7, which is a schematic flowchart of the information protection method provided in the fourth embodiment of this application. Figure 7 In the scenario where the AMF network element senses that the access network device 1 is compromised by an attacker, it sends a second message to other access network devices other than the access network device 1, such as the access network device 2, and sends the second message to the UE. Four news. The process shown in Figure 7 may include but is not limited to the following steps:
步骤701,AMF网元感知接入网设备1被攻击者攻破。In step 701, the AMF network element senses that the access network device 1 is compromised by an attacker.
AMF网元可在检测到接入网设备1的流量异常,或接入网设备1未上报信息的情况下,感知接入网设备1被攻击者攻破。具体检测接入网设备被攻击者攻破的方法,在本申请中不作限定。The AMF network element can sense that the access network device 1 is breached by an attacker when it detects that the access network device 1 has abnormal traffic or the access network device 1 does not report information. The specific method for detecting that the access network device is compromised by an attacker is not limited in this application.
步骤702,AMF网元向接入网设备2发送第二消息。相应的,接入网设备2接收来自AMF网元的第二消息。Step 702: The AMF network element sends a second message to the access network device 2. Correspondingly, the access network device 2 receives the second message from the AMF network element.
其中,第二消息包括第三函数的标识信息和第四函数的标识信息。接入网设备在接收到第二消息时,建立AMF网元ID与第三函数的标识信息和第四函数的标识信息之间的对应关系。Wherein, the second message includes identification information of the third function and identification information of the fourth function. When receiving the second message, the access network device establishes a correspondence between the AMF network element ID and the identification information of the third function and the identification information of the fourth function.
可选的,第二消息还包括第二计算参数。接入网设备建立AMF网元ID与第三函数的标识信息、第四函数的标识信息以及第二计算参数之间的对应关系。Optionally, the second message further includes a second calculation parameter. The access network device establishes a correspondence between the AMF network element ID and the identification information of the third function, the identification information of the fourth function, and the second calculation parameter.
步骤703,AMF网元向UE发送第四消息。相应的,UE接收来自AMF网元的第四消息。Step 703: The AMF network element sends a fourth message to the UE. Correspondingly, the UE receives the fourth message from the AMF network element.
其中,第四消息包括第三函数的标识信息、第三密钥标识和第三密钥。Wherein, the fourth message includes the identification information of the third function, the third key identification and the third key.
步骤704,UE根据第三密钥、随机参数和第三函数,生成第四密钥,并采用第四密钥对保护信息进行加密,得到第二加密保护信息。Step 704: The UE generates a fourth key according to the third key, random parameters and the third function, and uses the fourth key to encrypt the protection information to obtain the second encrypted protection information.
步骤705,UE向接入网设备2发送第二请求消息。相应的,接入网设备2接收来自 UE的第二请求消息。Step 705: The UE sends a second request message to the access network device 2. Correspondingly, the access network device 2 receives the second request message from the UE.
其中,第二请求消息包括第三密钥标识、设备标识信息、随机参数和第二加密保护信息。第二请求消息中携带的随机参数可以与第一请求消息中携带的随机参数相同,或不同。例如UE在接收到第四消息,发送第二请求消息之前,重新生成一个随机参数,那么该随机参数与第一请求消息中携带的随机参数不同。Wherein, the second request message includes the third key identification, device identification information, random parameters, and second encryption protection information. The random parameter carried in the second request message may be the same as or different from the random parameter carried in the first request message. For example, before the UE receives the fourth message and sends the second request message, it regenerates a random parameter, then the random parameter is different from the random parameter carried in the first request message.
步骤706,接入网设备2确定设备标识信息对应的第三函数和第四函数。Step 706: The access network device 2 determines the third function and the fourth function corresponding to the device identification information.
步骤707,接入网设备2根据第三密钥标识、随机参数、第三函数和第四函数,生成第四密钥。Step 707: The access network device 2 generates a fourth key according to the third key identifier, random parameters, third function, and fourth function.
步骤708,接入网设备2采用第四密钥对第二加密保护信息进行解密,得到保护信息。Step 708: The access network device 2 uses the fourth key to decrypt the second encrypted protection information to obtain the protection information.
图7所示实施例基于图4所示实施例,相同或类似的地方可参见图4所示实施例的具体描述,不同之处在于,图4中接入网设备未被攻击者攻破,而图7中接入网设备1被攻击者攻破,AMF网元更新其他接入网设备的预配置信息以及UE的预配置信息。这样,接入网设备1在接收到第二加密保护信息时,无法使用之前的第二密钥获得保护信息,从而可以有效防止攻击者获取保护信息,进而提高网络的安全性、可靠性。The embodiment shown in Fig. 7 is based on the embodiment shown in Fig. 4. For the same or similar parts, please refer to the specific description of the embodiment shown in Fig. 4. The difference is that the access network equipment in Fig. 4 has not been compromised by an attacker. In Fig. 7, the access network device 1 is compromised by an attacker, and the AMF network element updates the pre-configuration information of other access network devices and the pre-configuration information of the UE. In this way, when the access network device 1 receives the second encrypted protection information, it cannot use the previous second key to obtain the protection information, which can effectively prevent attackers from obtaining the protection information, thereby improving the security and reliability of the network.
图7所示实施例的思想也可以应用于图5或图6所示的实施例中,即AMF网元在感知接入网设备1被攻击者攻破的情况下,按照图5或图6中的预配置信息,更新其他接入网设备的预配置信息以及UE的预配置信息。如应用于图5或图6所示的实施例中,则对其他接入网设备更新的预配置信息消息为第三函数的标识信息、第四函数的标识信息以及第二加密算法的算法标识。对应图5实施例中对UE更新的预配置信息为第三密钥标识、第四密钥以及第二加密算法的算法标识。对应图6实施例中对UE更新的预配置信息为第四密钥标识、第四密钥以及第二加密算法的算法标识。The idea of the embodiment shown in FIG. 7 can also be applied to the embodiment shown in FIG. 5 or FIG. To update the pre-configuration information of other access network equipment and the pre-configuration information of the UE. As applied to the embodiment shown in FIG. 5 or FIG. 6, the pre-configuration information message updated to other access network devices is the identification information of the third function, the identification information of the fourth function, and the algorithm identification of the second encryption algorithm. . The pre-configuration information updated for the UE in the embodiment corresponding to FIG. 5 is the third key identifier, the fourth key, and the algorithm identifier of the second encryption algorithm. The pre-configuration information updated for the UE in the embodiment corresponding to FIG. 6 is the fourth key identifier, the fourth key, and the algorithm identifier of the second encryption algorithm.
请参见图8,为本申请实施例五提供的信息保护方法的流程示意图。图8在AMF网元感知UE为攻击者的场景下,告知接入网设备拒绝来自UE的注册请求消息。图8所示的流程可包括但不限于如下步骤:Please refer to FIG. 8, which is a schematic flowchart of the information protection method provided in the fifth embodiment of this application. Figure 8 tells the access network device to reject the registration request message from the UE in the scenario where the AMF network element perceives the UE as an attacker. The process shown in Figure 8 may include but is not limited to the following steps:
步骤801,AMF网元感知UE为攻击者。In step 801, the AMF network element perceives that the UE is an attacker.
AMF网元感知UE为攻击者的方法在本申请实施例中不作限定。UE可通过图4或图5或图6所示流程中的预配置过程,获取预配置信息。The method by which the AMF network element perceives the UE as an attacker is not limited in the embodiment of this application. The UE may obtain the pre-configuration information through the pre-configuration process in the flow shown in FIG. 4 or FIG. 5 or FIG. 6.
步骤802,AMF网元向接入网设备发送指示消息。相应的,接入网设备接收来自AMF网元的指示消息。Step 802: The AMF network element sends an indication message to the access network device. Correspondingly, the access network device receives the indication message from the AMF network element.
其中,指示消息用于指示非法密钥标识信息。Among them, the indication message is used to indicate the illegal key identification information.
步骤803,UE向接入网设备发送第一请求消息。相应的,接入网设备接收来自UE的第一请求消息。Step 803: The UE sends a first request message to the access network device. Correspondingly, the access network device receives the first request message from the UE.
步骤804,若第一请求消息包括的密钥标识与非法密钥标识信息匹配,则拒绝第一请求消息。Step 804: If the key identification included in the first request message matches the illegal key identification information, the first request message is rejected.
基于图4所示的实施例,第一请求消息包括第一密钥标识。若第一密钥标识与非法密钥标识信息匹配,则接入网设备拒绝第一请求消息。Based on the embodiment shown in FIG. 4, the first request message includes the first key identifier. If the first key identification matches the illegal key identification information, the access network device rejects the first request message.
基于图5所示的实施例,第一请求消息包括第一密钥标识。若第一密钥标识与非法密钥标识信息匹配,则接入网设备拒绝第一请求消息。Based on the embodiment shown in FIG. 5, the first request message includes the first key identifier. If the first key identification matches the illegal key identification information, the access network device rejects the first request message.
基于图6所示的实施例,第一请求消息包括第二密钥标识。若第二密钥标识与非法密钥标识信息匹配,则接入网设备拒绝第一请求消息。Based on the embodiment shown in FIG. 6, the first request message includes the second key identifier. If the second key identification matches the illegal key identification information, the access network device rejects the first request message.
图8所示的实施例中,AMF网元在感知UE为攻击者的情况下,可通知接入网设备拒绝该UE的注册请求消息,从而可以提高安全性。In the embodiment shown in FIG. 8, the AMF network element can notify the access network device to reject the registration request message of the UE when it perceives that the UE is an attacker, thereby improving security.
相应于上述方法实施例给出的方法,本申请实施例还提供了相应的装置,包括用于执行上述实施例相应的单元。所述单元可以是软件,也可以是硬件,或者是软件和硬件结合。Corresponding to the methods given in the foregoing method embodiments, the embodiments of the present application also provide corresponding devices, including corresponding units for executing the foregoing embodiments. The unit may be software, hardware, or a combination of software and hardware.
请参见图9,为本申请提供的一种通信装置的结构示意图。图9所示的通信装置900包括收发单元901和处理单元902。Please refer to FIG. 9, which is a schematic structural diagram of a communication device provided by this application. The communication device 900 shown in FIG. 9 includes a
在一种设计中,装置900为接入网设备:In one design, the device 900 is an access network device:
示例性的,收发单元901,用于接收来自终端设备的第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;确定设备标识信息对应的第一函数和第二函数;Exemplarily, the
处理单元902,用于根据第一密钥标识、随机参数、第一函数和第二函数,生成第二密钥;采用第二密钥对第一加密保护信息进行解密,得到保护信息。The
装置900为接入网设备时,用于实现图4、图5、图6、图7或图8所示实施例中接入网设备的功能,具体可参见图4、图5、图6、图7或图8所示实施例中接入网设备的相应描述。When the device 900 is an access network device, it is used to implement the functions of the access network device in the embodiment shown in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. For details, refer to FIG. 4, FIG. 5, and FIG. 6, Corresponding description of the access network equipment in the embodiment shown in FIG. 7 or FIG. 8.
在一种设计中,装置900为终端设备:In one design, the device 900 is a terminal device:
处理单元902,用于根据第一密钥、随机参数和第一函数,生成第二密钥,采用第二密钥对保护信息进行加密,得到第一加密保护信息;The
收发单元901,用于向接入网设备发送第一请求消息,第一请求消息包括第一密钥标识、设备标识信息、随机参数和第一加密保护信息;第一密钥标识用于生成第一密钥。The
装置900为终端设备时,用于实现图4、图5、图6、图7或图8所示实施例中UE的功能,具体可参见图4、图5、图6、图7或图8所示实施例中UE的相应描述。When the device 900 is a terminal device, it is used to implement the functions of the UE in the embodiment shown in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. For details, refer to FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. The corresponding description of the UE in the illustrated embodiment.
请参见图10,为本申请提供的另一种通信装置的结构示意图。图10所示的通信装置1000包括至少一个处理器1001、存储器1002,可选的,还可包括通信接口1003。Please refer to FIG. 10, which is a schematic structural diagram of another communication device provided by this application. The
存储器1002可以是易失性存储器,例如随机存取存储器;存储器也可以是非易失性存储器,例如只读存储器,快闪存储器,硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)、或者存储器1002是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器1002可以是上述存储器的组合。The
本申请实施例中不限定上述处理器1001以及存储器1002之间的具体连接介质。本申请实施例在图中以存储器1002和处理器1001之间通过总线1004连接,总线1004在图中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。该总线1004可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The specific connection medium between the foregoing
处理器1001可以具有数据收发功能,能够与其他设备进行通信,在如图10装置中,也可以设置独立的数据收发模块,例如通信接口1003,用于收发数据;处理器1001在与 其他设备进行通信时,可以通过通信接口1003进行数据传输。The
一种示例中,当接入网设备采用图10所示的形式时,图10中的处理器可以通过调用存储器1002中存储的计算机执行指令,使得接入网设备执行上述任一方法实施例中的接入网设备执行的方法。In an example, when the access network device adopts the form shown in FIG. 10, the processor in FIG. 10 can call the computer execution instruction stored in the
一种示例中,当终端设备采用图10所示的形式时,图10中的处理器可以通过调用存储器1002中存储的计算机执行指令,使得UE执行上述任一方法实施例中的UE执行的方法。In an example, when the terminal device adopts the form shown in FIG. 10, the processor in FIG. 10 may invoke the computer execution instructions stored in the
具体的,图9的处理单元和收发单元的功能/实现过程均可以通过图10中的处理器1001调用存储器1002中存储的计算机执行指令来实现。或者,图9的处理单元的功能/实现过程可以通过图10中的处理器1001调用存储器1002中存储的计算机执行指令来实现,图9的收发单元的功能/实现过程可以通过图10中的通信接口1003来实现。Specifically, the functions/implementation processes of the processing unit and the transceiver unit in FIG. 9 may be implemented by the
本申请实施例还提供一种通信系统,该系统可以包括图4、图5、图6、图7或图8中的接入网设备和UE。可选的,还包括AMF网元。An embodiment of the present application also provides a communication system, which may include the access network device and UE in FIG. 4, FIG. 5, FIG. 6, FIG. 7 or FIG. 8. Optionally, it also includes AMF network elements.
可以理解的是,本申请实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,比如其当前所基于的方案,而独立实施,解决相应的技术问题,达到相应的效果,也可以在某些场景下,依据需求与其他特征进行结合。相应的,本申请实施例中给出的装置也可以相应的实现这些特征或功能,在此不予赘述。It is understandable that some optional features in the embodiments of the present application, in some scenarios, may not depend on other features, such as the solutions they are currently based on, but are implemented independently to solve the corresponding technical problems and achieve the corresponding The effect can also be combined with other features according to requirements in certain scenarios. Correspondingly, the devices given in the embodiments of the present application can also implement these features or functions accordingly, which will not be repeated here.
本领域技术人员还可以理解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员对于相应的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。Those skilled in the art can also understand that various illustrative logical blocks and steps listed in the embodiments of the present application can be implemented by electronic hardware, computer software, or a combination of the two. Whether such a function is realized by hardware or software depends on the specific application and the design requirements of the entire system. For corresponding applications, those skilled in the art can use various methods to implement the functions described, but such implementation should not be understood as going beyond the protection scope of the embodiments of the present application.
本申请所描述的方案可通过各种方式来实现。例如,这些技术可以用硬件、软件或者硬件结合的方式来实现。对于硬件实现,用于在通信装置(例如,基站,终端、网络实体、核心网网元或芯片)处执行这些技术的处理单元,可以实现在一个或多个通用处理器、数字信号处理器(digital signal processor,DSP)、数字信号处理器件、专用集成电路(application specific integrated circuit,ASIC)、可编程逻辑器件、现场可编程门阵列(field programmable gate array,FPGA)、或其它可编程逻辑装置,离散门或晶体管逻辑,离散硬件部件,或上述任何组合中。通用处理器可以为微处理器,可选地,该通用处理器也可以为任何传统的处理器、控制器、微控制器或状态机。处理器也可以通过计算装置的组合来实现,例如数字信号处理器和微处理器,多个微处理器,一个或多个微处理器联合一个数字信号处理器核,或任何其它类似的配置来实现。The solution described in this application can be implemented in various ways. For example, these technologies can be implemented in hardware, software, or a combination of hardware. For hardware implementation, the processing unit used to execute these technologies at a communication device (for example, a base station, a terminal, a network entity, a core network network element, or a chip) can be implemented in one or more general-purpose processors, digital signal processors ( digital signal processor, DSP), digital signal processing device, application specific integrated circuit (ASIC), programmable logic device, field programmable gate array (FPGA), or other programmable logic device, Discrete gate or transistor logic, discrete hardware components, or any combination of the above. The general-purpose processor may be a microprocessor. Alternatively, the general-purpose processor may also be any traditional processor, controller, microcontroller, or state machine. The processor can also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors combined with a digital signal processor core, or any other similar configuration. accomplish.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态 随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), a Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
本申请还提供了一种计算机可读介质,其上存储有计算机程序,该计算机程序被计算机执行时实现上述任一方法实施例的功能。The present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the function of any of the foregoing method embodiments is realized.
本申请还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。This application also provides a computer program product, which, when executed by a computer, realizes the functions of any of the foregoing method embodiments.
可以理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下装置会做出相应的处理,并非是限定时间,且也不要求装置实现时一定要有判断的动作,也不意味着存在其它限定。It can be understood that in this application, "when", "if", and "if" all refer to the device will make corresponding processing under certain objective circumstances, and it is not a time limit, and it does not require the device to be implemented. There must be a judgmental action, and it does not mean that there are other restrictions.
本申请中的“同时”可以理解为在相同的时间点,也可以理解为在一段时间段内,还可以理解为在同一个周期内。The "simultaneous" in this application can be understood as being at the same time point, or within a period of time, or as being within the same period.
本申请中对于使用单数表示的元素旨在用于表示“一个或多个”,而并非表示“一个且仅一个”,除非有特别说明。本申请中,在没有特别说明的情况下,“至少一个”旨在用于表示“一个或者多个”,“多个”旨在用于表示“两个或两个以上”。The use of the singular element in this application is intended to mean "one or more", rather than "one and only one", unless otherwise specified. In this application, unless otherwise specified, "at least one" is intended to mean "one or more", and "multiple" is intended to mean "two or more".
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A可以是单数或者复数,B可以是单数或者复数。In addition, the terms "system" and "network" in this article are often used interchangeably in this article. The term "and/or" in this article is only an association relationship that describes the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone In the three cases of B, A can be singular or plural, and B can be singular or plural.
可以理解,在本申请各实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。It can be understood that in the embodiments of the present application, "B corresponding to A" means that B is associated with A, and B can be determined according to A. However, it should also be understood that determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。The corresponding relationships shown in the tables in this application can be configured or pre-defined. The value of the information in each table is only an example, and can be configured to other values, which is not limited in this application. When configuring the correspondence between the information and the parameters, it is not necessarily required to configure all the correspondences indicated in the tables. For example, in the table in this application, the corresponding relationship shown in some rows may not be configured. For another example, appropriate deformation adjustments can be made based on the above table, such as splitting, merging, and so on. The names of the parameters shown in the titles in the above tables may also adopt other names that can be understood by the communication device, and the values or expressions of the parameters may also be other values or expressions that can be understood by the communication device. When the above tables are implemented, other data structures can also be used, such as arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables, or hash tables. Wait.
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。The pre-definition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, curing, or pre-fired.
本领域普通技术人员可以理解,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those of ordinary skill in the art can understand that, for the convenience and conciseness of the description, the specific working processes of the systems, devices, and units described above can refer to the corresponding processes in the foregoing method embodiments, and will not be repeated here.
本申请中各个实施例之间相同或相似的部分可以互相参考。在本申请中各个实施例、 以及各实施例中的各个实施方式/实施方法/实现方法中,如果没有特殊说明以及逻辑冲突,不同的实施例之间、以及各实施例中的各个实施方式/实施方法/实现方法之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例、以及各实施例中的各个实施方式/实施方法/实现方法中的技术特征根据其内在的逻辑关系可以组合形成新的实施例、实施方式、实施方法、或实现方法。以上所述的本申请实施方式并不构成对本申请保护范围的限定。The same or similar parts in the various embodiments of this application may be referred to each other. In each embodiment of this application, and each implementation method/implementation method/implementation method in each embodiment, if there is no special description and logical conflict, between different embodiments and each implementation manner in each embodiment/ The terms and/or descriptions between the implementation methods/implementation methods are consistent and can be cited each other. The technical features in different embodiments and various implementation modes/implementation methods/implementation methods in each embodiment are based on their inherent Logical relationships can be combined to form new embodiments, implementations, implementation methods, or implementation methods. The implementation manners of the application described above do not constitute a limitation on the protection scope of the application.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application.
Claims (36)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010480899.7 | 2020-05-30 | ||
| CN202010480899.7A CN113766495A (en) | 2020-05-30 | 2020-05-30 | Information protection method, system and communication device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021244447A1 true WO2021244447A1 (en) | 2021-12-09 |
Family
ID=78782415
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2021/096968 Ceased WO2021244447A1 (en) | 2020-05-30 | 2021-05-28 | Information protection method and system, and communication apparatus |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN113766495A (en) |
| WO (1) | WO2021244447A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114339737A (en) * | 2021-12-23 | 2022-04-12 | 咻享智能(深圳)有限公司 | Wireless communication instruction encryption method and related equipment |
| CN114499888A (en) * | 2022-02-17 | 2022-05-13 | 上海焜耀网络科技有限公司 | Private key protection and analysis method and device for signature service |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117882413A (en) * | 2022-08-12 | 2024-04-12 | 北京小米移动软件有限公司 | Terminal equipment capability indication method and device |
| CN116011041B (en) * | 2022-12-07 | 2024-06-18 | 成都海光集成电路设计有限公司 | Key management method, data protection method, system, chip and computer equipment |
| CN119922540A (en) * | 2023-10-30 | 2025-05-02 | 中兴通讯股份有限公司 | Key determination method, storage medium and electronic device |
| CN120614590A (en) * | 2024-03-08 | 2025-09-09 | 维沃移动通信有限公司 | Identification indication method, device, terminal equipment and first network node |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1992587A (en) * | 2005-12-29 | 2007-07-04 | 摩托罗拉公司 | Identification-based encryption system |
| CN107846676A (en) * | 2016-09-20 | 2018-03-27 | 北京信威通信技术股份有限公司 | Safety communicating method and system based on network section security architecture |
| WO2019004929A2 (en) * | 2017-06-29 | 2019-01-03 | 华为国际有限公司 | Network slice allocation method, device and system |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4104610B2 (en) * | 2005-04-06 | 2008-06-18 | 株式会社エヌ・ティ・ティ・ドコモ | Authentication information providing server and authentication information providing method |
| KR101493212B1 (en) * | 2012-10-31 | 2015-02-23 | 삼성에스디에스 주식회사 | Method and system for id-based encryption and decryption |
-
2020
- 2020-05-30 CN CN202010480899.7A patent/CN113766495A/en active Pending
-
2021
- 2021-05-28 WO PCT/CN2021/096968 patent/WO2021244447A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1992587A (en) * | 2005-12-29 | 2007-07-04 | 摩托罗拉公司 | Identification-based encryption system |
| CN107846676A (en) * | 2016-09-20 | 2018-03-27 | 北京信威通信技术股份有限公司 | Safety communicating method and system based on network section security architecture |
| WO2019004929A2 (en) * | 2017-06-29 | 2019-01-03 | 华为国际有限公司 | Network slice allocation method, device and system |
Non-Patent Citations (1)
| Title |
|---|
| "3 Generation Partnership Project; Technical Specification Group Services and System Aspects; Security Aspects; Study on Security Aspects of Enhanced Network Slicing (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.813 V0.8.0, 3RD GENERATION PARTNERSHIP PROJECT (3GPP); F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 2 January 2020 (2020-01-02), pages 1 - 38, XP051841099 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114339737A (en) * | 2021-12-23 | 2022-04-12 | 咻享智能(深圳)有限公司 | Wireless communication instruction encryption method and related equipment |
| CN114499888A (en) * | 2022-02-17 | 2022-05-13 | 上海焜耀网络科技有限公司 | Private key protection and analysis method and device for signature service |
| CN114499888B (en) * | 2022-02-17 | 2024-02-02 | 上海焜耀网络科技有限公司 | Private key protection and analysis method and device for signature service |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113766495A (en) | 2021-12-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7443541B2 (en) | Key acquisition method and device | |
| US11510052B2 (en) | Identity information processing method, device, and system | |
| WO2021244447A1 (en) | Information protection method and system, and communication apparatus | |
| KR102358918B1 (en) | Method and device for managing a security according to a service in a wireless communication system | |
| US20200228977A1 (en) | Parameter Protection Method And Device, And System | |
| EP3629614A2 (en) | Network slice allocation method, device and system | |
| EP4021048B1 (en) | Identity authentication method and apparatus | |
| WO2019153994A1 (en) | Security negotiation method and apparatus | |
| EP4187952B1 (en) | Method, system and apparatus for determining user plane security algorithm | |
| CN112866981B (en) | Method and device for managing subscription data | |
| US12375267B2 (en) | Key management method and communication apparatus | |
| WO2017133021A1 (en) | Security processing method and relevant device | |
| JP2025114548A (en) | Communication method and related device | |
| CN109791590A (en) | Security processes | |
| WO2017132947A1 (en) | Method for acquiring security parameters of to-be-transmitted service, signalling management network element, security function node and transmitting terminal | |
| WO2022174399A1 (en) | User equipment authentication and authorization procedure for edge data network | |
| CN115412911A (en) | Authentication method, communication device and system | |
| WO2022174419A1 (en) | Root key protection method and system | |
| CN111741467B (en) | Authentication method and device | |
| WO2021073382A1 (en) | Registration method and apparatus | |
| CN117692902B (en) | Intelligent home interaction method and system based on embedded home gateway | |
| US11979743B2 (en) | Systems and methods for secure access to 5G non-public networks using mobile network operator credentials | |
| WO2025098294A1 (en) | Task-level homomorphic encryption management method and apparatus | |
| US20230362631A1 (en) | Secure storage and processing of sim data | |
| WO2025026232A1 (en) | Session establishment method and related apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21818135 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 21818135 Country of ref document: EP Kind code of ref document: A1 |