[go: up one dir, main page]

WO2022032525A1 - Group key distribution method and apparatus - Google Patents

Group key distribution method and apparatus Download PDF

Info

Publication number
WO2022032525A1
WO2022032525A1 PCT/CN2020/108703 CN2020108703W WO2022032525A1 WO 2022032525 A1 WO2022032525 A1 WO 2022032525A1 CN 2020108703 W CN2020108703 W CN 2020108703W WO 2022032525 A1 WO2022032525 A1 WO 2022032525A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
group
network element
identifier
management function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2020/108703
Other languages
French (fr)
Chinese (zh)
Inventor
胡力
吴义壮
郭龙华
吴�荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2020/108703 priority Critical patent/WO2022032525A1/en
Publication of WO2022032525A1 publication Critical patent/WO2022032525A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a group key distribution method and device.
  • group communication services such as location service (LCS), proximity service (Proximity-based services, ProSe), multimedia broadcast multicast service (MBMS), fifth generation ( 5th generation, 5G) local area network services, etc.
  • LCS location service
  • ProSe proximity service
  • MBMS multimedia broadcast multicast service
  • 5th generation, 5G fifth generation local area network services
  • group key management is involved when securing group communications.
  • group keys are generally shared by multiple group members, and are more difficult to distribute and manage than independent keys.
  • the present application provides a group key distribution method and device, which are used to propose a unified group key distribution mechanism to improve the security of group communication.
  • the present application provides a group key distribution method, the method may include: a group key management function network element acquiring a key identifier of a first device, and acquiring a group identifier of the first device; the The group key management function network element determines the group key according to the group identification of the first device, and determines the protection key according to the key identification of the first device; the group key management function network element determines the protection key according to the group identification of the first device; The key and the protection key generate a group key parameter, and send the group key parameter to the first device; wherein the group key is used to protect the communication content of the members of the group, and the group key A member contains the first device.
  • the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, and the security of the group communication can be improved.
  • the group key management function network element determines the group key according to the group identifier of the first device, and the specific method may be: the group key management function network element selects the group key from the The group key information is queried for the group key. If the group key information includes the corresponding relationship between the group identifier and the group key, the group key management function network element retrieves the group key from the group key. The group key corresponding to the group identifier is obtained from the information; if the group key information does not include the correspondence between the group identifier and the group key, the network element of the group key management function generates the the group key.
  • the network element of the group key management function can accurately obtain the group key, and then generate group key parameters according to the group key.
  • the group key management function network element generates the group key
  • a specific method may be: the group key management function network element generates the group key according to the root group key. In this way, when the group key is not queried, the network element of the group key management function can accurately obtain the group key, and then generate a group key parameter according to the group key.
  • the group key management function network element After the group key management function network element generates the group key, the corresponding relationship between the group identifier and the group key is stored. In this way, the group key management function network element can successfully query the group key according to the group identifier in the subsequent process.
  • the group key management function network element determines the protection key according to the key identifier of the first device
  • the specific method may be: the group key management function network element determines the protection key according to the stored first device.
  • the corresponding relationship between the key identifier of the device and the protection key is to determine the protection key corresponding to the key identifier of the first device;
  • the key identifier obtains the protection key from the key function network element.
  • the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.
  • the group key management function network element determines the protection key according to the key identifier of the first device
  • the specific method may be: the group key management function network element determines the protection key according to the first device.
  • the key identifier of the device determines a second key; the group key management function network element generates the protection key according to the second key.
  • the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.
  • the group key management function network element generates the protection key according to the second key
  • a specific method may be: the group key management function network element generates the protection key according to the second key.
  • the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first reception parameter, and a first transmission parameter; wherein , the first self-owned parameter includes a preset character string; the first received parameter includes one or more of the following: the identification of the first device, the key identification of the first device, the group identification, the application type, the application identification , a random number, a counter, and a timestamp; the first sending parameter includes one or more of the following: group key identifier, random number, counter, and timestamp.
  • the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.
  • the group key management function network element receives a first reception parameter indication from the first device or group management function network element, and obtains the first reception parameter indication according to the first reception parameter indication parameter.
  • the network element of the group key management function can generate the protection key according to the first reception parameter, and then generate a group key parameter according to the protection key.
  • the group key management function network element sends a first sending parameter indication to the first device, where the first sending parameter indication is used to indicate the first sending parameter.
  • the group key management function network element determines the second key according to the key identifier of the first device
  • the specific method may be: the group key management function network element determines the second key according to the stored first device.
  • the correspondence between the key identifier of a device and the first key is to determine the first key corresponding to the key identifier of the first device; or the group key management function network element obtains the first key from the key function network element. a key; the group key management function network element generates the second key according to the first key.
  • the group key management function network element can accurately obtain the second key, and then generate a protection key according to the second key.
  • the group key management function network element generates the second key according to the first key
  • a specific method may be: the group key management function network element generates the second key according to the first key.
  • the key and the generation parameters of the second key generate the second key;
  • the generation parameters of the second key include one or more of the following: a second own parameter, a second received parameter, a second Sending parameters; wherein, the second self-owned parameter includes a preset character string;
  • the second receiving parameter includes one or more of the following: the identification of the first device, the key identification of the first device, the group identification, the random number, counter, and timestamp;
  • the second transmission parameter includes one or more of the following: random number, counter, and timestamp.
  • the group key management function network element can accurately obtain the second key, and then generate a protection key according to the second key.
  • the group key management function network element receives a second reception parameter indication from the first device or the group management function network element, and obtains the second reception parameter indication according to the second reception parameter indication parameter. In this way, the group key management function network element can generate the second key according to the second reception parameter, and then generate a protection key according to the second key.
  • the group key management function network element sends a second transmission parameter indication to the first device or group management function network element, where the second transmission parameter indication is used to instruct the second transmission parameter.
  • the first key is K AUSF or K SEAF or K AMF or K AF .
  • the group key management function network element generates a group key parameter according to the group key and the protection key
  • the specific method may be: the group key management function network element
  • the group key, the protection key and the first algorithm generate the group key parameter
  • the first algorithm is a reversible algorithm.
  • the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.
  • the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.
  • the group key management function network element obtains the key identifier of the first device
  • the specific method may be: the group key management function network element obtains the first device from the first device. The key identifier of the device; or, the group key management function network element obtains the key identifier of the first device from the group management function network element.
  • the network element of the group key management function can accurately obtain the key identifier of the first device, and then accurately obtain the protection key based on the key identifier of the first device.
  • the group key management function network element obtains the group identifier of the first device
  • the specific method may be: the group key management function network element obtains the first device from the group management function network element. A group identifier of a device; or, the group key management function network element acquires the group identifier of the first device from the first device.
  • the network element of the group key management function can accurately obtain the group identifier of the first device, and then accurately obtain the group key based on the group identifier of the first device.
  • the first device may send an application request message to the AF, where the application request message includes The group identifier of the first device, whereby the AF sends the group identifier of the first device to the group key management function network element.
  • application function application function
  • the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element sends the group key parameter to the first device through the AF The first device sends the group key parameter.
  • the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element manages the access and mobility An access and mobility management function (AMF) network element sends the group key parameter to the first device.
  • AMF access and mobility management function
  • the first device may send a protocol data unit (protocol data unit, PDU) to the SMF A session establishment request message, thereby triggering the SMF to send the group identifier of the first device to the group key management function network element.
  • PDU protocol data unit
  • the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element sends the group key parameter to the first device through the SMF.
  • the first device sends the group key parameter.
  • the group key management function network element determines the group key identifier according to the group identifier.
  • the group key management function network element determines the group key identifier according to the group identifier
  • the specific method may be: the group key management function network element obtains the group key from the group key according to the group identifier Obtain the group key identifier from the information, and the group key information includes the correspondence between the group identifier and the group key identifier; or, the group key management function network element uses the group identifier as the group key or the group key management function network element determines the group key identifier according to the group identifier and the application type.
  • the group key management function network element sends the group key identifier to the first device.
  • the present application provides a method for distributing a group key, the method may include: a first device receives a group key parameter from a network element with a group key management function; the first device receives a group key parameter according to the group key parameter and a protection key to determine the group key, the group key being used to protect the communication content of the members of the group, the members of the group including the first device.
  • the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, and the security of the group communication can be improved.
  • the first device generates a second key according to the first key, and generates the protection key according to the second key. In this way, the first device can obtain the protection key accurately, and then obtain the group key accurately based on the protection key.
  • the group key management function network element generates a protection key according to the second key
  • the specific method may be: the first device generates a protection key according to the second key and the protection key.
  • Generating parameters to generate the protection key; the protection key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes A preset character string; the first receiving parameter includes one or more of the following: the identifier of the first device, the first device key identifier, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp;
  • the first sending parameter includes one or more of the following: a group key identifier, a random number, a counter, and a timestamp. In this way, the first device can obtain the protection key accurately, and then obtain the group key accurately based on the protection key.
  • the first device sends a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.
  • the first device receives a first transmission parameter indication from the group key management function network element, and acquires the first transmission parameter according to the first transmission parameter indication. In this way, the first device can accurately obtain the first transmission parameter, and then obtain the protection key accurately based on the first transmission parameter.
  • the first device generates the second key according to the first key
  • the specific method may be: the first device generates the second key according to the difference between the first key and the second key.
  • the generation parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter Some parameters include a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, a random number, a counter, and a timestamp; the first device Two transmission parameters include one or more of the following: random number, counter, timestamp. In this way, the first device can accurately obtain the second key, and then obtain the protection key accurately based on the second key.
  • the first device sends a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.
  • the first device receives a second transmission parameter indication from the group key management function network element, and acquires the second transmission parameter according to the second transmission parameter indication. In this way, the first device can accurately obtain the second transmission parameter, and then obtain the second key accurately based on the second transmission parameter.
  • the first device determines the group key according to the group key parameter and the protection key
  • a specific method may be: the first device determines the group key according to the protection key, The group key parameter and a second algorithm determine the group key, and the second algorithm is a reversible algorithm.
  • the first device can successfully obtain the group key. Since the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, thereby the security of the group communication can be improved.
  • the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.
  • the first key is K AUSF or K SEAF or K AMF or K AF .
  • the first device sends the key identifier of the first device to the group key management function network element; or, the first device sends the group key to the group key management function network element through the group management function network element
  • the management function network element sends the key identifier and group identifier of the first device.
  • the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.
  • the present application provides a group key distribution method, the method may include: a key function network element receiving a key identifier of a first device from a group key management function network element; the key function network element The first key is determined according to the key identifier of the first device; the key function network element determines the second key according to the first key.
  • the key function network element can subsequently provide the second key for the first device and the group key management function network element, so that the first device and the group key management function network element can further determine the protection key.
  • the key function network element determines the second key according to the first key, including:
  • the key function network element generates the second key according to the generation parameters of the first key and the second key;
  • the generation parameters of the second key include one or more of the following: Two self-owned parameters, a second receiving parameter, and a second sending parameter; wherein, the second self-owned parameter includes a preset character string;
  • the second receiving parameter includes one or more of the following: the identifier of the first device, The key identifier, group identifier, random number, counter, and timestamp of the first device;
  • the second sending parameter includes one or more of the following: random number, counter, and timestamp. In this way, the key function network element can accurately determine the second key.
  • the key function network element receives a second reception parameter indication from the first device or the group key management function network element, and obtains the second reception parameter indication according to the second reception parameter indication parameter. In this way, the key function network element can accurately obtain the second receiving parameter, and then determine the second key according to the second receiving parameter.
  • the key function network element sends a second transmission parameter indication to the first device or the group key management function network element, where the second transmission parameter indication is used to instruct the second transmission parameter.
  • the key function network element determines the protection key according to the second key; the key function network element sends the protection key to the group key management function network element.
  • the key function network element can directly provide the protection key to the group key management function network element, so that the group key management function network element can generate group key parameters according to the protection key. , to improve the security of key distribution.
  • the key function network element determines the protection key according to the second key, including:
  • the key function network element generates the protection key according to the second key and the generation parameters of the protection key; the generation parameters of the protection key include one or more of the following: the first self-owned parameter, first receiving parameter, and first sending parameter; wherein, the first self-owned parameter includes a preset character string; the first receiving parameter includes one or more of the following: the identifier of the first device, the first device key identifier, group identifier, application type, application identifier, random number, counter, and timestamp; the first sending parameter includes one or more of the following: group key identifier, random number, counter, and timestamp. In this way, the key function network element can accurately determine the protection key.
  • the key function network element receives the first reception parameter indication from the first device or group key management function network element, and obtains the first reception parameter indication according to the first reception parameter indication A received parameter. In this way, the key function network element can accurately obtain the first receiving parameter, and then determine the protection key according to the first receiving parameter.
  • the key function network element sends the first transmission parameter indication to the first device or group key management function network element, where the first transmission parameter indication is used to indicate the first transmission parameter - Send parameters.
  • the key function network element sends the second key to the group key management function network element.
  • the network element of the group key management function can subsequently generate the protection key according to the second key.
  • the first key is K AUSF or K SEAF or K AMF or K AF .
  • the key function network element may be an authentication server function (authentication server function, AUSF) network element.
  • authentication server function authentication server function, AUSF
  • the present application provides a group key distribution device, the group key distribution device may be a network element with a group key management function, and the group key distribution device has the ability to implement the first aspect or the first aspect.
  • the functions can be implemented by hardware, or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may execute the group key management function network in the first aspect or each possible design example of the first aspect.
  • the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may execute the group key management function network in the first aspect or each possible design example of the first aspect.
  • the corresponding function of the element please refer to the detailed description in the method example for details, which will not be repeated here.
  • the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory.
  • the transceiver is used to send and receive data, and to communicate with other devices in the communication system.
  • the processor is configured to support the group key distribution apparatus to perform the corresponding function of the group key management function network element in the first aspect or each possible design example of the first aspect.
  • a memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.
  • the present application provides a group key distribution apparatus
  • the group key distribution apparatus may be a first device
  • the group key distribution apparatus has various possible designs for implementing the above second aspect or the second aspect
  • the function of the first device in the example can be implemented by hardware, or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may perform the corresponding functions of the first device in the second aspect or each possible design example of the second aspect , please refer to the detailed description in the method example for details, which will not be repeated here.
  • the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory.
  • the transceiver is used to send and receive data, and to communicate with other devices in the communication system.
  • the processor is configured to support the group key distribution apparatus to perform the corresponding function of the first device in the second aspect or each possible design example of the second aspect.
  • a memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.
  • the present application provides a group key distribution device, the group key distribution device may be a key function network element, and the group key distribution device has various possibilities for implementing the third aspect or the third aspect.
  • the functions can be implemented by hardware, or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may perform the key function network element in the third aspect or each possible design example of the third aspect.
  • these units may perform the key function network element in the third aspect or each possible design example of the third aspect.
  • the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory.
  • the transceiver is used to send and receive data, and to communicate with other devices in the communication system.
  • the processor is configured to support the group key distribution apparatus to perform the corresponding function of the key function network element in the third aspect or each possible design example of the third aspect.
  • a memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.
  • an embodiment of the present application provides a communication system, which may include the above-mentioned group key management function network element, a first device, a key function network element, and the like.
  • a computer-readable storage medium provided by an embodiment of the present application, the computer-readable storage medium stores a program instruction, and when the program instruction is executed on a computer, makes the computer execute the first aspect of the embodiment of the present application and its contents.
  • a computer-readable storage medium can be any available medium that can be accessed by a computer.
  • computer readable media may include non-transitory computer readable media, random-access memory (RAM), read-only memory (ROM), electrically erasable Except programmable read only memory (electrically EPROM, EEPROM), CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of Any other media accessed by a computer.
  • RAM random-access memory
  • ROM read-only memory
  • EEPROM electrically erasable Except programmable read only memory
  • CD-ROM or other optical disk storage magnetic disk storage medium or other magnetic storage device, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of Any other media accessed by a computer.
  • the embodiments of the present application provide a computer program product including computer program codes or instructions, which, when run on a computer, enables the computer to implement the above-mentioned first aspect and any possible design thereof, the second aspect and its Any possible design or method of the third aspect and any possible design thereof.
  • the present application also provides a chip, which is coupled to a memory and used to read and execute program instructions stored in the memory, so as to implement the above-mentioned first aspect and any possible designs thereof, the third A method of the second aspect and any possible design thereof or the third aspect and any possible design thereof.
  • 1 is a schematic diagram of the architecture of a communication system provided by the application.
  • Fig. 2 is the flow chart of a kind of group key distribution method provided by this application.
  • FIG. 3 is a flowchart of an example of a group key distribution method provided by the present application.
  • FIG. 6 is a schematic structural diagram of a group key distribution device provided by the present application.
  • FIG. 7 is a structural diagram of a group key distribution apparatus provided by the present application.
  • Embodiments of the present application provide a group key distribution method and device, which are used to propose a unified group key distribution mechanism to improve the security of group communication.
  • the methods and devices described in this application are based on the same technical concept. Since the methods and devices have similar principles for solving problems, the implementations of the devices and methods can be referred to each other, and repeated descriptions will not be repeated here.
  • the embodiments of the present application provide a possible architecture of a communication system to which the communication method is applicable.
  • the architecture of the communication system may include: an access network and a core network.
  • the access network is used to realize functions related to wireless access, and the access network includes the 3rd generation partnership project (3GPP) access network and the non-3GPP (non-3GPP access network).
  • the core network mainly includes the following key logical network elements: access and mobility management function network elements, session management function network elements, user plane function network elements, policy control function network elements, and unified data management function network elements.
  • FIG. 1 shows a possible example of the architecture of the communication system, and each network element or device in the architecture of the communication system is shown as a specific example. Specifically, the architecture of the communication system shown in FIG.
  • terminal equipment using user equipment (UE) as an example
  • an access and mobility management function access and mobility management function, AMF
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • PCF policy control function
  • unified data management function network element unified data management, UDM
  • AUSF authentication server function
  • NEF network exposure function
  • application function application function, AF
  • wireless wireless access network
  • the AMF network element and the access network device can be connected through the N2 interface, the access network device and the UPF can be connected through the N3 interface, the SMF and the UPF can be connected through the N4 interface, and the AMF network element and the UE can be connected through the N4 interface. It can be connected through the N1 interface.
  • the interface name is only an example description, which is not specifically limited in this embodiment of the present application. It should be understood that the embodiments of the present application are not limited to the communication system shown in FIG. 1 , and the names of the network elements shown in FIG. 1 are only described here as an example, not as a communication system architecture applicable to the communication method of the present application. Limitation of included network elements. The following describes the functions of each network element or device in the communication system in detail:
  • Terminal equipment can be UE, handheld terminal, notebook computer, subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless data card, personal digital assistant (personal digital assistant, PDA) computer, Tablet computer, wireless modem (modem), handheld device (handheld), laptop computer (laptop computer), cordless phone (cordless phone) or wireless local loop (wireless local loop, WLL) station, machine type communication (machine type communication) type communication, MTC) terminal or other device that can access the network.
  • a certain air interface technology such as new radio (NR), LTE) is used to communicate with each other between the terminal device and the access network device.
  • NR new radio
  • LTE new radio
  • vehicle networking communication the communication terminal uploaded by the vehicle is a terminal device, and the roadside unit (RSU) can also be used as a terminal device.
  • the drone is loaded with a communication terminal, which can be regarded as a terminal device.
  • the RAN device is mainly a 3GPP network wireless network device, and the AN can be an access network device defined by non-3GPP.
  • RAN equipment It is mainly responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
  • the access network equipment may include various forms of base stations, such as: a macro base station, a micro base station (also referred to as a small cell), a relay station, an access point, and the like.
  • the names of devices with base station functions may be different, for example, in 5G systems, they are called RAN or gNB (5G NodeB), etc.
  • Access and mobility management function network element mainly responsible for the signaling processing part, such as: access control, mobility management, attachment and detachment, and gateway selection and other functions.
  • the AMF network element provides services for the session in the terminal device, it provides storage resources of the control plane for the session to store the session identifier, the SMF network element identifier associated with the session identifier, and the like.
  • the access and mobility management function network elements can be AMF network elements, such as shown in Figure 1; in future communications, such as 6G, the access and mobility management function network elements can still be AMF network elements , or other names, which are not limited in this application.
  • the access and mobility management function network element is an AMF network element, the AMF can provide Namf services.
  • Session management function network element It is mainly responsible for session management in the mobile network, such as session establishment, modification and release. Specific functions such as assigning IP addresses to users and selecting UPFs that provide packet forwarding functions.
  • the session management function network element can be an SMF network element, such as shown in Figure 1; in future communications, such as 6G, the session management function network element can still be an SMF network element, or have other names, this Application is not limited.
  • the SMF can provide Nsmf services.
  • User plane function network element responsible for forwarding and receiving user data in terminal equipment.
  • the user data can be received from the data network and transmitted to the terminal device through the access network device; the UPF network element can also receive the user data from the terminal device through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions that provide services to terminal equipment in the UPF network element are managed and controlled by the SMF network element.
  • the user plane function network element can be a UPF network element, such as shown in Figure 1; in future communications, such as 6G, the user plane function network element can still be a UPF network element, or have other names. Application is not limited.
  • Policy control function network element mainly supports providing a unified policy framework to control network behavior, provides policy rules to the control layer network function, and is responsible for obtaining user subscription information related to policy decision-making.
  • the policy control function network element can be a PCF network element, such as shown in Figure 1; in future communications, such as 6G, the policy control function network element can still be a PCF network element, or have other names, this Application is not limited.
  • the policy control function network element is a PCF network element, the PCF network element can provide Npcf services.
  • Network open function network element mainly supports the secure interaction between 3GPP network and third-party applications.
  • the network opening function network element can be a NEF network element, such as shown in Figure 1; in future communications, such as 6G, the network opening function network element can still be a NEF network element, or have other names, this Application is not limited.
  • the network open function network element is an NEF, the NEF can provide Nnef services to other network function network elements.
  • Application function network element mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
  • the application function network element may be an AF network element, such as shown in Figure 1; in future communications, such as in 6G, the application function network element may still be an AF network element, or have other names, and this application does not Do limit.
  • the application function network element is the AF network element, the AF network element can provide the Naf service.
  • the service enabler architecture layer server ((service enabler architecture layer, SEAL) server) can provide server-side functions corresponding to specific services.
  • the service can include a group management function, which is a kind of Special AF.
  • the SEAF is used to provide vertical application services, for example, including location management, group management, configuration management, identity management, key management, network resource management, and the like.
  • AKMA anchor function (AKMA anchor function, AAnF) is the function of enabling AKMA anchor key derivation in the AKMA service.
  • the security anchor function is a network element that provides authentication functions for the service network through AMF, and supports the first authentication.
  • Unified data management function network element used to generate authentication credential, user identification processing (such as storing and managing user permanent identity, etc.), access authorization control and contract data management, etc.
  • the unified data management function network element can be a UDM network element, such as shown in Figure 1; in future communications, such as in 6G, the unified data management function network element can still be a UDM network element, or have other names , which is not limited in this application.
  • the UDM network element can provide Nudm services.
  • Authentication server function network element an authentication function used to support UE to perform 3GPP access or non-3GPP access.
  • the authentication server function network element can be an AUSF network element, such as shown in Figure 1; in future communications, such as 6G, the authentication server function network element can still be an AUSF network element, or have other names, this Application is not limited.
  • the AUSF network element can provide the Nausf service.
  • a data network refers to a service network that provides data transmission services for users, such as IP multi-media service (IMS) and the Internet.
  • IMS IP multi-media service
  • the UE accesses the DN through a protocol data unit (protocol data unit, PDU) session established between the UE and the DN.
  • protocol data unit protocol data unit
  • each network element in the core network can also be called a functional entity or a device, which can be either a network element implemented on dedicated hardware, a software instance running on dedicated hardware, or a virtualization on an appropriate platform.
  • An example of a function, for example, the above-mentioned virtualization platform may be a cloud platform.
  • FIG. 1 the architecture of the communication system shown in FIG. 1 is not limited to including only the network elements shown in the figure, but may also include other devices not shown in the figure, and the specific application will not list them one by one here. .
  • the following description in this application will take the network element shown in FIG. 1 as an example, and the XX network element is directly abbreviated as XX. It should be understood that the names of all network elements in this application are only examples, and may also be referred to as other names in future communications, or the network elements involved in this application may also be identified by other entities or devices with the same function in future communications. Instead, this application does not limit this. A unified description is made here, and will not be repeated in the future.
  • the communication system shown in FIG. 1 does not constitute a limitation of the communication system to which the embodiments of the present application can be applied.
  • the communication system architecture shown in FIG. 1 is a 5G system architecture.
  • the methods in the embodiments of the present application are also applicable to various future communication systems, such as 6G or other communication networks.
  • the group key distribution method provided by the present application can be applied to the communication system (mobile communication network) shown in FIG. 1 , and the distribution of the group key in group communication is proposed.
  • a group management function (GMF) network element is used to provide group information of group members, and the group information is used to indicate the relationship between group members and the group, and may include a group identifier and a member list.
  • Group ID is used to identify a group. In particular, in this application, all members of the same group communicate using the same group key.
  • the group identifier can be an external group identifier (external group ID), an internal group identifier (internal group ID), the group members can include terminal devices, network functions (NF), AF, etc., and the member list can be a contract permanent identifier ( subscription permanent identifier, SUPI) list, generic public subscription identifier (generic public subscription identifier, GPSI) list, AF identifier list, NF identifier list, etc.
  • GMF can be an independent entity, or AMF, SMF, UDM, PCF, SEAL, AF, etc.
  • the group key management function (GKMF) network element is used to provide group key information of group members.
  • the group key information is used to indicate the relationship between the key of the group member and the group, and can include the group ID and the group key.
  • the group key information also includes a group key identifier and a member list.
  • the group key identifier is used to identify the group key, and the group key identifier and the group identifier are in one-to-one correspondence.
  • the group key identifier can also be the same as the group identifier, and in this case, the group key identifier is the group identifier.
  • the group key of the group members of the same group is the same, and the group key is used for communication protection of the members in the group.
  • GKMF can be an independent entity or PCF, UDM, AUSF, SEAL, AAnF, etc.
  • a key function (key function, KF) network element is an optional network element, and the KF is used to provide the first key of the group member.
  • the first key is generated by the UE and the KF after the two-way authentication process is performed, for example, it may be generated according to the permanent key K of the UE.
  • KF can be AUSF, AMF, SEAF, AAnF.
  • the first key may be K AUSF ;
  • KF SEAF, the first key may be K SEAF ;
  • KF is AMF, the first key may be K AMF ;
  • KF is AAnF , the first key may be K AF .
  • the group key distribution method provided by the embodiment of the present application can be applied to the communication system shown in FIG. 1 .
  • the specific process of the method may include:
  • Step 201 The network element of the group key management function obtains the key identifier of the first device.
  • the first device may be any one of the members of the group, for example, the first device may be a terminal device or the like.
  • the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.
  • the key identifier of the terminal device may be the identifier of the terminal device, such as SUPI or GPSI, or the key set identifier (KSI) of the terminal device. ).
  • the group key management function network element obtains the key identifier of the first device
  • the specific method may be: the group key management function network element obtains the key identifier from the first device.
  • the key identifier of the first device for example, the first device directly sends the key identifier of the first device to the group key management function network element (for example, as shown in the example of step 201a in FIG. 2), or , the first device sends the key identifier of the first device to the intermediate device, and the intermediate device sends the key identifier of the first device to the group key management function network element; or, the group key management function
  • the network element acquires the key identifier of the first device from the intermediate device.
  • the first device sends the key identifier of the first device to the intermediate device
  • the intermediate device sends the key identifier of the first device to the group key management function network element.
  • the intermediate device may be AMF, SMF, AF, group management function network element, and the like.
  • the intermediate device when the intermediate device is the network element of the group management function, it may be as shown in the example of step 201b in FIG. 2 .
  • Step 202 The group key management function network element acquires the group identifier of the first device.
  • the group key management function network element obtains the group identifier of the first device
  • the specific method may be: the group key management function network element obtains all the information from the intermediate device.
  • the group identifier of the first device (for example, when the intermediate device is the group management function network element, it may be as shown in the example of step 202a in FIG. 2 ); or, the group key management function network element is obtained from the group key management function network element.
  • the first device acquires the group identifier of the first device.
  • the network element of the group key management function acquires the group identifier of the first device from the intermediate device, it may be that a request from the first device to the intermediate device triggers the intermediate device to send a request to the group
  • the key management function network element sends the group identifier of the first device, wherein the group identifier of the first device is carried in the request of the first device.
  • the first device may send an application request message to the AF, where the application request message includes the group identifier of the first device, so that the AF sends the group secret to the AF
  • the key management function network element sends the group identifier of the first device.
  • the intermediate device is an SMF
  • the first device may send a PDU session establishment request message to the SMF, thereby triggering the SMF to send the first device to the group key management function network element The group ID of the device.
  • Step 203 The network element of the group key management function determines a group key according to the group identifier of the first device, and the group key is used to protect the communication content of the members of the group, and the members of the group include the first device. a device.
  • the group key management function network element determines the group key according to the group identifier of the first device, and the specific method may be: the group key management function network element determines the group key according to the The group identifier queries the group key from the group key information, and if the group key information includes the correspondence between the group identifier and the group key, the group key management function network element retrieves the group key from the group key information. Obtain the group key corresponding to the group identifier from the group key information; if the group key information does not include the correspondence between the group identifier and the group key, the group key management function network The element generates the group key, and stores the correspondence between the group identifier and the group key.
  • the group key management function network element generates the group key
  • the specific method may be: the group key management function network element generates the group key according to the root group key; or the group key management function network element generates the group key; The key management function network element randomly generates the group key.
  • the group key management function network element may determine the group key identifier according to the group identifier. For example, the group key management function network element queries the group key identifier from the group key information according to the group identifier, if the group key information includes the difference between the group identifier and the group key identifier If the group key management function network element obtains the group key identifier corresponding to the group identifier from the group key information; if the group key information does not include the group identifier and the If the corresponding relationship between the group key identifiers is determined, the group key management function network element generates the group key identifiers, and stores the corresponding relationship between the group identifiers and the group key identifiers.
  • the group key management function network element may directly use the group ID as the group key ID, or the group key management function network element may also map a group key ID according to the group ID.
  • the group key management function network element obtains the application type (used to indicate the type of the current application, such as multicast broadcast service (MBS), ProSe, LCS, etc.)
  • the The network element of the group key management function may map a group key identifier according to the group identifier and the application type.
  • the group key management function network element may acquire the application type from the group management function network element, or the group key management function network element may acquire the application type from the first device.
  • the group key management function network element obtains the group identifier 123 , and the group key management function network element may directly use the group identifier as the group key identifier, that is, 123 .
  • the group key management function network element obtains the group identifier 123 and the group application type MBS, and the group key management function network element maps a group key identifier X1.
  • the group key management function network element obtains the group identifier 123 and the group application type ProSe, and the group key management function network element maps a group key identifier X2.
  • the group key may be Kgroup.
  • Step 204 The group key management function network element determines a protection key according to the key identifier of the first device.
  • the network element of the group key management function determines the protection key according to the key identifier of the first device, which may specifically include the following methods:
  • Method a1 The group key management function network element determines the protection key (such as KGKMF) corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the protection key. ).
  • the protection key such as KGKMF
  • Method a2 the group key management function network element determines a second key (eg KGKMF) according to the key identifier of the first device; the group key management function network element determines a second key (KGKMF) according to the second key (KGKMF) ) to generate the protection key (eg Ktemp).
  • a second key eg KGKMF
  • KGKMF second key
  • Ktemp protection key
  • the network element of the group key management function generates the protection key (such as Ktemp) according to the second key (such as KGKMF), and the specific method may be: the group key
  • the key management function network element generates the protection key (such as Ktemp) according to the second key and the generation parameters of the protection key;
  • the generation parameters of the protection key include one or more of the following: first Own parameters, first receiving parameters, first sending parameters; wherein, the first own parameters include preset character strings (for example, "GK”, "GKM”, “GKMF”, “GCSE”, etc.);
  • the first receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, the group identification, the application type (such as MBS, ProSe, eLCS, etc.), the application identification (It is used to indicate the current application, which can be expressed in the form of AF ID or in the form of a full domain name), random number (RAND), counter (COUNT), timestamp,
  • the first self-owned parameter is an existing parameter of the group key management function network element and the first device.
  • the group key management function network element may receive the first reception parameter indication from the first device or the group management function network element, and obtain the first reception parameter according to the first reception parameter indication.
  • the group key management function network element sends a first sending parameter indication to the first device, where the first sending parameter indication is used to indicate the first sending parameter.
  • the application type and/or the application identifier are used as the generation parameters of the protection key, so that the network element of the group key management function is different even if the second key of the same first device is used.
  • an app When an app generates a group key, it can generate different protection keys.
  • the network element of the group key management function determines a second key (eg KGKMF) according to the key identifier of the first device
  • the specific method may be: the group key management The functional network element determines, according to the stored correspondence between the key identifier of the first device and the first key, the first key corresponding to the key identifier of the first device; or the group key management function network element from the The key function network element obtains the first key; then, the group key management function network element generates the second key (eg KGKMF) according to the first key.
  • the group key management function network element determines the second key corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the second key.
  • the group key management function network element generates the second key (such as KGKMF) according to the first key
  • the specific method may be: the group key management function network element generates the second key according to the first key.
  • a key and the generation parameters of the second key (such as KGKMF) generate the second key;
  • the generation parameters of the second key include one or more of the following: a second own parameter, a second key Receiving parameters, second sending parameters; wherein, the second self-owned parameters include preset character strings (for example: "GK”, "GKM”, “GKMF”, “GCSE”, etc.);
  • the second receiving parameters include One or more of the following: the identifier of the first device (such as SUPI, GPSI), the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp;
  • the second transmission parameter includes one or more of the following Items: random numbers (RAND), counters (COUNT), timestamps, etc.
  • the group key management function network element receives the second reception parameter indication from the first device or the group management function network element, and obtains the second reception parameter according to the second reception parameter indication.
  • the group key management function network element sends a second transmission parameter indication to the first device or the group management function network element, where the second transmission parameter indication is used to indicate the second transmission parameter.
  • using the preset character string as a parameter of the derivation of the second key in the above-mentioned manner can prevent the generated second key from duplicating other keys existing in the first device.
  • Kausf, SUPI, and the string "AKMA" are used to generate Kakma.
  • the second key can be derived by using Kausf, SUPI, and a string different from "AKMA”. .
  • own parameters do not need to be passed, which can reduce the transmission complexity.
  • the key identity of the first device even if different first devices hold the same root key, when the identity of the first device is introduced, the key identity of the first device Afterwards, different first devices can use the same key to deduce different second keys.
  • the use of the group identification makes it possible to generate different second keys even when the same first device's root key is used to generate keys for different groups.
  • the group key management function network element obtains the second key (eg KGKMF) from the key function network element according to the key identifier of the first device. Specifically, the key function network element receives the key identifier of the first device from the group key management function network element, determines the first key according to the key identifier of the first device, and determines the first key according to the first key. Second key (eg KGKMF); the key function network element sends the second key (eg KGKMF) to the group key management function network element.
  • the second key eg KGKMF
  • the method for the key function network element to determine the second key eg KGKMF
  • the method for the group key management function network element to generate the second key according to the first key is the same, which can be referred to each other, and will not be described in detail here.
  • Method a3 the group key management function network element determines a first key according to the key identifier of the first device; the group key management function network element generates the protection key according to the first key (eg KGKMF).
  • the group key management function network element determines the first key according to the key identifier of the first device
  • the specific method may be: the group key management function network element determines the first key according to the key identifier of the first device.
  • the group key management function network element generates the protection key (eg KGKMF) according to the first key
  • the specific method may be: the group key management function network element
  • the element generates the protection key according to the generation parameters of the first key and the protection key (such as KGKMF); the generation parameters of the protection key may include one or more of the following: the protection key
  • the generated parameters include one or more of the following: second own parameters, second receiving parameters, second sending parameters; wherein, the second own parameters include preset character strings (for example: "GK", “GKM” ", “GKMF”, “GCSE”, etc.);
  • the second receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, the group identification, the random number, counter, time stamp; the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), time stamp and so on.
  • Method a4 The group key management function network element obtains the protection key (eg KGKMF or Ktemp) from the key function network element according to the key identifier of the first device. For example, this may be shown as optional step 204a in FIG. 2 .
  • the protection key eg KGKMF or Ktemp
  • the key function network element stores the correspondence between the key identifier of the first device and the protection key (such as KGKMF). Or after the key function network element determines the second key, a protection key (such as Ktemp) is determined according to the second key (such as KGKMF); the key function network element reports to the group key management function network element. Send the protection key.
  • the key function network element stores the correspondence between the key identifier of the first device and the first key.
  • the method for determining the protection key (such as Ktemp) by the second key (such as KGKMF) of the key function network element is the same as that of the group key management function network element involved in the above method a3 according to the
  • the method for generating the protection key (eg Ktemp) by the second key (eg KGKMF) is the same, which can be referred to each other, and will not be described in detail here.
  • KGKMF can be directly used as a protection key; KGKMF can also be used as a second key to obtain the protection key Ktemp.
  • the first key may be K AUSF or K SEAF or K AMF or K AF .
  • Step 205 The group key management function network element generates a group key parameter according to the group key and the protection key.
  • the network element of the group key management function generates a group key parameter (for example, DerPara) according to the group key and the protection key (for example, KGKMF or Ktemp), and the specific method may be as follows: The steps are: the group key management function network element generates the group key parameter according to the group key, the protection key and a first algorithm, where the first algorithm is a reversible algorithm.
  • a group key parameter for example, DerPara
  • the protection key for example, KGKMF or Ktemp
  • the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.
  • the corresponding inverse algorithms are: XOR, XOR, subtraction, addition, and decryption.
  • the encryption algorithm may include advanced encryption standard (AES), SNOW, Zu Chongzhi's algorithm ZUC, etc.
  • Step 206 The group key management function network element sends the group key parameter to the first device.
  • the group key management function network element sends a group key identifier to the first device.
  • Step 207 The first device determines the group key according to the group key parameter and the protection key.
  • the first device before the first device determines the group key according to the group key parameter and the protection key, the first device generates a second key ( KGKMF), the protection key (eg Ktemp) is generated according to the second key.
  • KGKMF KGKMF
  • the protection key eg Ktemp
  • the method for the group key management function network element to generate a protection key (eg Ktemp) according to the second key (KGKMF) and the method for the group key management function network element in step 204 according to the second key (KGKMF) are similar, and can refer to each other, and will not be described in detail here.
  • the method for the first device to generate the second key according to the first key is similar to the method for the group key management function network element to generate the second key according to the first key in step 204 , can refer to each other, and will not be described in detail here.
  • the first device before the first device determines the group key according to the group key parameter and the protection key, the first device generates a protection key ( KGKMF).
  • the method for the first device to generate a protection key (KGKMF) according to the first key is the same as the method for generating the protection key (eg, the group key management function network element in step 204) according to the first key.
  • KGKMF protection key
  • the first device determines the group key according to the group key parameter and the protection key
  • the specific method may be: the first device determines the group key according to the protection key, the group key
  • the key parameter and a second algorithm determine the group key (eg, Kgroup), and the second algorithm is an inverse algorithm corresponding to the first algorithm.
  • the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.
  • the first device can use Kgroup to protect the content of communication with members in the group.
  • intra-group communication can be ProSe communication, proximity-based service communication 5 ((proximity-based services, ProSe) communication 5, PC5) communication, V2X communication, RAN-based local exchange, UPF-based local exchange, MBS communication, Broadcast communication or LCS communication, etc.
  • the first device also obtains the group key identifier.
  • Members of the group use Kgroup and group key identification to protect intra-group communication.
  • a member AF in the group sends group communication data to UE1 and UE2, the AF encrypts the communication content using Kgroup or a key and an encryption algorithm derived from Kgroup, and uses Kgroup or a key and an integrity protection algorithm derived from Kgroup.
  • the integrity of the communication content is protected, and then the group key identification and the protected communication content are broadcast.
  • UE1 and UE2 obtain the Kgroup according to the group key identifier, use Kgroup or the key and encryption algorithm derived from Kgroup to decrypt the communication content, and use Kgroup or the key and integrity protection algorithm derived from Kgroup to perform integrity checking on the communication content. test.
  • the UE1 when the UE1 does not have the broadcasted group key identifier, the UE1 requests the network element of the group key management function to obtain the group key corresponding to the group key identifier. In this way, the UE1 can decrypt and/or check the integrity of the communication content.
  • a group key parameter is generated for the group key shared by a plurality of group members by using the existing one-to-one key between the group member and the mobile network, which can be generated for different group members.
  • Different group key parameters so even if the group key parameter is transmitted in clear text, since the attacker does not have the key, the group key cannot be obtained from the group key parameter.
  • the present application introduces a unified group key management function network element in the mobile network to realize the storage and distribution of the group key, and the group key management function network element can obtain the group information of the first device from different group management network elements, The member information of the group can also be obtained from the first device, and the existing key information of the first device UE in the mobile network can be obtained from the key function network element according to the member information of the group, and then the key information in the existing mobile network can be obtained. key and some related transmission parameters to protect the key distribution process.
  • the distribution of the group key is protected by the group key parameter, the security of the group key distribution is improved, and the security of the group communication can be improved.
  • the group key distribution method provided by the present application will be described in detail below through specific examples.
  • the first device is the UE and the network element of the group key management function is the GKMF as an example for description.
  • FIG. 3 shows an example of a group key distribution method provided by the present application.
  • the group management function GMF network element is AF
  • the key function KF network element is AUSF as an example for detailed description.
  • the process of this example can be:
  • Step 301 The UE sends an application request message (app request) to the AF, where the application request message is used to request to obtain an application service.
  • Step 302 GKMF obtains the key ID 2 and the group ID 2 of the UE.
  • the AF sends the key identifier 1 and the group identifier 1 of the UE to the GKMF, and the GKMF obtains the key identifier 2 and the group identifier 2.
  • the AF also sends the application identifier to the GKMF.
  • the AF may obtain the key ID 1 and the group ID 1 of the UE from the application request message.
  • the AF may also obtain the context of the UE according to the application request message, and obtain the key ID 1 and the group ID 1 of the UE from the context of the UE.
  • the AF may obtain the application identifier according to the application currently accessed by the UE.
  • the key identifier 2 and the group identifier 2 of the UE obtained by the GKMF are the key identifier 1 and the group identifier 2.
  • the key identifier 1 may be SUPI, and the group identifier 1 may be an internal group ID (internal group ID).
  • the NEF may transfer the UE to the UE after obtaining the key identifier 1 and the group identifier 1 of the UE.
  • the key identifier 1 of the UE is mapped to the key identifier 2 of the UE, and/or the group identifier 1 is mapped to the group identifier 2 of the UE.
  • the NEF sends the key ID 2 and/or the group ID 2 of the UE to the GKMF.
  • the key identifier 1 is GPSI
  • the group identifier 1 is an external group ID (external group ID)
  • the key identifier 2 is SUPI
  • the group identifier 2 is an internal group ID.
  • Step 303 The GKMF determines the group key Kgroup according to the group identifier 2.
  • Step 304 The GKMF sends the key identifier 2 of the UE to the AUSF to request to obtain the KGKMF of the UE.
  • the KGKMF may be the above-mentioned second key or the above-mentioned protection key under different circumstances.
  • the GKMF may also send a second reception parameter indication to the AUSF, where the second reception parameter indication is used to indicate the second reception parameter.
  • Step 305 the AUSF obtains the KGKMF according to the key identifier 2 of the UE.
  • the AUSF obtains the K AUSF (that is, the first key involved in the above) according to the key identifier 2 of the UE.
  • the KGKMF may be generated by the AUSF according to the K AUSF (that is, the first key involved in the above).
  • the specific method for the AUSF to generate the KGKMF according to the K AUSF may be: the AUSF generates the KGKMF according to the K AUSF and the generation parameters of the KGKMF ;
  • the generation parameters of the KGKMF include one or more of the following: the second own parameter, the second receiving parameter, the second sending parameter; wherein, the second own parameter includes a preset character string (for example: "GK ", "GKM”, "GKMF”, “GCSE”, etc.);
  • the second receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, Group ID, random number, counter, timestamp;
  • the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), timestamp, etc.
  • the generation of the KGKMF may also be generated in advance before step 304 .
  • Step 306 The AUSF sends the KGKMF to the GKMF.
  • the AUSF may also send a second transmission parameter indication to the GKMF, where the second transmission parameter indication is used to indicate the second transmission parameter.
  • Step 307 The GKMF determines the group key parameter DerPara according to the KGKMF and the Kgroup.
  • the GKMF determines the DerPara according to the KGKMF, the Kgroup and the first algorithm.
  • the KGKMF is used as the protection key.
  • the GKMF determines Ktemp according to the KGKMF, and then the GKMF determines the DerPara according to the Ktemp, the Kgroup and the first algorithm.
  • the KGKMF is used as the second key
  • the Ktemp is used as the protection key.
  • the method for determining Ktemp by the GKMF according to the KGKMF may refer to the group key management function network element involved in step 204 in the embodiment shown in FIG.
  • the implementation method of the protection key (such as Ktemp) described above will not be described in detail here.
  • Step 308 The GKMF sends the DerPara to the AF.
  • the GKMF may also send a group key identifier to the AF.
  • the GKMF may also send the first transmission parameter indication and/or the second transmission parameter indication to the AF.
  • the GKMF may also send group identity 2 to the UE.
  • the GKMF may also send the Kgroup and the group key identifier to the AF.
  • Step 309 The AF sends an application response message to the UE, where the application response message includes the DerPara.
  • the application response message may further include one or more of the group key identifier, the first transmission parameter indication or the second transmission parameter indication.
  • Step 310 the UE determines the Kgroup according to the DerPara.
  • Step 311 The UE uses the Kgroup to perform group communication, so that the UE uses the Kgroup to protect the content of the communication.
  • the above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication.
  • Fig. 4 shows an example of another group key distribution method provided by the present application.
  • the group management function GMF network element is used as AF
  • the key function KF network element is used as AUSF
  • the GKMF is used as PCF or UDM
  • the process of this example can be:
  • Steps 401 to 405 are the same as steps 301 to 305 in the embodiment shown in FIG. 3 , and may refer to each other, and will not be repeated here.
  • Step 406 is the same as step 306 in the embodiment shown in FIG. 3 , and can be referred to each other, and details are not repeated here.
  • the AUSF may also send an AMF identifier to the GKMF, where the AMF identifier may be obtained by the AUSF from the stored context according to the AMF accessed by the UE.
  • Step 407 is the same as step 307 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.
  • Step 408 The GKMF sends the identity of the UE and the DerPara to the AMF.
  • the identifier of the UE may be SUPI, and the identifier of the UE is obtained by the GKMF according to the key identifier 2 (Key ID2) of the UE.
  • the GKMF may also send a group key identifier to the AMF.
  • the GKMF may also send the first sending parameter indication and the second sending parameter indication to the AMF.
  • the GKMF may also send the group ID 2 to the AMF.
  • the GKMF sends the above parameters to the AMF according to the identity of the AMF.
  • Step 409 The GKMF sends a confirmation message to the AF.
  • the confirmation message may include the Kgroup and the group key identifier.
  • the GKMF may send the confirmation message to the AF after the AMF feedback.
  • Step 410 The AMF sends a downlink non-access stratum (non access stratum, NAS) message to the UE, where the downlink NAS message includes the DerPara.
  • NAS non access stratum
  • the downlink NAS message may further include a group key identifier, a first transmission parameter indication and a second transmission parameter indication.
  • the downlink NAS message may further include the group identifier 2 .
  • the AMF fails to reply to the GKMF.
  • the GKMF does not send the confirmation message in step 409 to the AF, and can send failure message.
  • the downlink NAS message may be a downlink NAS transmission message or a UE configuration update request command message.
  • the downlink NAS transmission message includes a UE policy container, and the UE policy container includes a UE route selection policy (UE route selection policy, URSP), and the URSP may include an application identifier, a group key identifier, and the DerPara .
  • UE route selection policy UE route selection policy, URSP
  • the URSP may include an application identifier, a group key identifier, and the DerPara .
  • Step 411 The AF sends an application response message to the UE.
  • Steps 412 to 413 are the same as steps 310 to 311 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.
  • the above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication.
  • the GKMF can send DerPara to the UE by means of the control plane tunnel between the UE and the AMF, without changing the user plane protocol between the UE and the AF outside the scope of 3GPP.
  • FIG. 5 shows an example of another group key distribution method provided by the present application.
  • the group management function GMF network element is an SMF as an example for detailed description.
  • the process of this example can be:
  • Step 501 The UE sends a protocol data unit (protocol data unit, PDU) session establishment request message to the SMF, where the PDU session establishment request message is used to request the establishment of a PDU session.
  • PDU protocol data unit
  • the PDU session establishment request may include a group key request indication, where the group key request indication is used to request to obtain a group key.
  • the group key request indication may be an explicit indication or an implicit indication.
  • the implicit indication may be an application type, and when the application type indicates a specific application (eg, MBS), the SMF triggers a request to obtain the UE's group key.
  • the PDU session establishment request message may further include a group identifier.
  • Step 502 The SMF sends the identifier of the UE and the group identifier to the GKMF.
  • the SMF may send the identifier of the UE and the group identifier to the GKMF through a key request (key request) message.
  • the SMF determines the context information of the UE according to the PDU session request message, and obtains the identity SUPI of the UE from the context information of the UE.
  • the SMF obtains the group identifier from the PDU session establishment request message, or the SMF requests the UDM to obtain the subscription information of the UE, and the subscription information of the UE includes the group of the UE. logo.
  • the SMF sends the SUPI of the UE to the UDM, and the UDM obtains the group identifier corresponding to the UE according to the SUPI, and returns the group identifier to the SMF.
  • the SMF triggers sending the identifier of the UE and the group identifier to the GKMF according to the group key request indication.
  • Step 503 The GKMF determines the group key Kgroup according to the group identifier.
  • Step 504 The GKMF sends the identifier of the UE to the KF to request to obtain the KGKMF of the UE.
  • the KGKMF may be the above-mentioned second key or the above-mentioned protection key under different circumstances.
  • the GKMF may send the identifier of the UE to the KF through a key request (key request) message.
  • Step 505 The KF determines the KGKMF according to the identifier of the UE.
  • the KF obtains the first key according to the target 2 of the UE.
  • the KGKMF may be generated by the KF according to the first key.
  • the specific method for the KF to generate the KGKMF according to the first key may be: the KF generates the KGKMF according to the first key and the generation parameters of the KGKMF; the generation of the KGKMF
  • the parameters include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string (for example: "GK", “GKM”, “GKMF”, “GCSE”, etc.); the second receiving parameter includes one or more of the following: the identifier of the first device (such as SUPI, GPSI), the key identifier of the first device, the group identifier, the random number, Counter, timestamp; the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), timestamp and so on.
  • the identifier of the first device such as SUPI, GPSI
  • the key identifier of the first device such as SUPI, GPSI
  • Step 506 The KF sends the KGKMF to the GKMF.
  • Step 507 The GKMF determines the group key parameter DerPara according to the KGKMF and the Kgroup.
  • the GKMF determines the DerPara according to the KGKMF, the Kgroup and the first algorithm.
  • the KGKMF is used as the protection key.
  • the GKMF determines Ktemp according to the KGKMF, and then the GKMF determines the DerPara according to the Ktemp, the Kgroup and the first algorithm.
  • the KGKMF is used as the second key
  • the Ktemp is used as the protection key.
  • the method for determining Ktemp by the GKMF according to the KGKMF may refer to the group key management function network element involved in step 204 in the embodiment shown in FIG.
  • the implementation method of the protection key (such as Ktemp) described above will not be described in detail here.
  • Step 508 The GKMF sends the DerPara to the SMF.
  • the GKMF may also send a group key identifier to the SMF.
  • the GKMF may also send the first transmission parameter indication and/or the second transmission parameter indication to the SMF.
  • the GKMF may also send group identity 2 to the UE.
  • Step 509 The SMF sends a PDU session establishment accept message to the UE, where the PDU session establishment accept message includes the DerPara.
  • the PDU session establishment accept message may further include a group key identifier.
  • the PDU session establishment accept message may further include the first transmission parameter indication and/or the second transmission parameter indication.
  • Steps 510 to 511 are the same as steps 310 to 311 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.
  • the above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication.
  • the embodiments of the present application further provide a group key distribution apparatus.
  • the group key distribution apparatus 600 may include a transceiver unit 601 and a processing unit 602 .
  • the transceiver unit 601 is used for the group key distribution apparatus 600 to receive information (message or data) or send information (message or data), and the processing unit 602 is used for the transmission of the group key distribution apparatus 600 Actions are controlled and managed.
  • the processing unit 602 may also control the steps performed by the transceiving unit 601 .
  • the group key distribution apparatus 600 may be the group key management function network element in the foregoing embodiment, and specifically may be a processor, or a chip or a chip system in the group key management function network element, or is a functional module, etc.; or, the group of key distribution apparatuses 600 may be the first device in the above-mentioned embodiment, and specifically may be a processor in the first device, or a chip or a chip system, or a functional module, etc.; Alternatively, the set of key distribution apparatuses 600 may be a key function network element in the above embodiment, and may specifically be a processor, a chip or a chip system, or a function module in the key function network element.
  • the group key distribution apparatus 600 when used to implement the function of the group key management function network element (eg GKMF) in the above embodiment, it may specifically include:
  • the processing unit 602 is configured to acquire the key identifier of the first device; acquire the group identifier of the first device; determine a group key according to the group identifier of the first device, and the group key is used to protect the Communication content of members, the members of the group include the first device; determine a protection key according to the key identifier of the first device; generate a group key parameter according to the group key and the protection key;
  • the transceiver unit 601 is configured to send the group key parameter to the first device.
  • the processing unit 602 when determining the group key according to the group identifier of the first device, is specifically configured to: query the group from group key information according to the group identifier key, if the group key information includes the correspondence between the group identifier and the group key, obtain the group key corresponding to the group identifier from the group key information; If the group key information does not include the corresponding relationship between the group identifier and the group key, the group key is generated.
  • the processing unit 602 when generating the group key, is specifically configured to: generate the group key according to the root group key.
  • the processing unit 602 when determining the protection key according to the key identifier of the first device, is specifically configured to: determine, according to the stored correspondence between the key identifier of the first device and the protection key, to determine the protection key.
  • the protection key corresponding to the key identifier of the first device; or, obtaining the protection key from a key function network element according to the key identifier of the first device.
  • the processing unit 602 when determining the protection key according to the key identifier of the first device, is specifically configured to: determine the second key according to the key identifier of the first device; The second key generates the protection key.
  • the processing unit 602 when generating the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key ;
  • the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string;
  • the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp;
  • the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.
  • the transceiver unit 601 is further configured to receive a first reception parameter indication from the first device or group management function network element; the processing unit 602 is further configured to obtain the first reception parameter indication according to the first reception parameter indication. The first receive parameter.
  • the transceiver unit 601 is further configured to send a first transmission parameter indication to the first device, where the first transmission parameter indication is used to indicate the first transmission parameter.
  • the processing unit 602 when determining the second key according to the key identifier of the first device, is specifically configured to: determine according to the stored correspondence between the key identifier of the first device and the first key The key identifier of the first device corresponds to the first key; or the transceiver unit 601 is controlled to obtain the first key from the key function network element; and the second key is generated according to the first key.
  • the processing unit 602 when generating the second key according to the first key, is specifically configured to: generate the second key according to the generation parameters of the first key and the second key.
  • the second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following One or more items: nonce, counter, timestamp.
  • the transceiver unit 601 is further configured to receive a second reception parameter indication from the first device or group management function network element; the processing unit 602 is further configured to obtain the second reception parameter indication according to the second reception parameter indication.
  • the second receive parameter is further configured to obtain the second reception parameter indication according to the second reception parameter indication.
  • the transceiver unit 601 is further configured to send a second sending parameter indication to the first device or the network element of the group management function, where the second sending parameter indication is used to indicate the second sending parameter.
  • the first key is K AUSF or K SEAF or K AMF or K AF .
  • the processing unit 602 when generating the group key parameter according to the group key and the protection key, is specifically configured to: according to the group key, the protection key and the protection key
  • the first algorithm generates the set of key parameters, and the first algorithm is a reversible algorithm.
  • the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.
  • the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.
  • the processing unit 602 when acquiring the key identifier of the first device, is specifically configured to: control the transceiver unit 601 to acquire the encryption key of the first device from the first device or, control the transceiver unit 601 to obtain the key identifier of the first device from the group management function network element.
  • the processing unit 602 when acquiring the group identifier of the first device, is specifically configured to: control the transceiver unit 601 to acquire the first device's group identifier from the group management function network element. group identifier; or, control the transceiver unit 601 to acquire the group identifier of the first device from the first device.
  • the group key distribution apparatus 600 when used to implement the function of the first device (eg, UE) in the foregoing embodiment, it may specifically include:
  • the transceiver unit 601 is configured to receive the group key parameter from the network element of the group key management function; the processing unit 602 is configured to determine the group key according to the group key parameter and the protection key, and the group key The key is used to protect the content of communications of members of a group that includes the first device.
  • the processing unit 602 is further configured to: generate a second key according to the first key; and generate the protection key according to the second key.
  • the processing unit 602 when generating the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key; the protection key
  • the key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein the first self-owned parameter includes a preset character string; the first receiving parameter includes One or more of the following: first device identifier, first device key identifier, group identifier, application type, application identifier, random number, counter, timestamp; the first sending parameter includes one or more of the following : Group key ID, nonce, counter, timestamp.
  • the transceiver unit 601 is further configured to send a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.
  • the transceiver unit 601 is further configured to receive a first transmission parameter indication from the group key management function network element; the processing unit 602 is further configured to obtain the second transmission parameter indication according to the first transmission parameter indication. Send parameters.
  • the processing unit 602 when generating the second key according to the first key, is specifically configured to: generate according to the first key and the second key The parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter
  • the parameter includes a preset character string; the second receiving parameter includes one or more of the following: an identification of the first device, a key identification of the first device, a group identification, a random number, a counter, and a timestamp; the second Send parameters include one or more of the following: random number, counter, timestamp.
  • the transceiver unit 601 is further configured to send a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.
  • the transceiver unit 601 is further configured to receive a second transmission parameter indication from the group key management function network element; the processing unit 602 is further configured to obtain the first transmission parameter indication according to the second transmission parameter indication. Send parameters.
  • the processing unit 602 when determining the group key according to the group key parameter and the protection key, is specifically configured to: according to the protection key, the group key parameter and the second The algorithm determines the group key, and the second algorithm is a reversible algorithm.
  • the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.
  • the first key may be K AUSF or K SEAF or K AMF or K AF .
  • the transceiver unit 601 is further configured to: send the key identifier of the first device to the group key management function network element; or, send the group key management function network element to the group The key management function network element sends the key identifier and group identifier of the first device.
  • the key identifier of the first device is an identifier of the first device or a key set identifier of the first device.
  • the group key distribution apparatus 600 when used to implement the function of the key function network element (eg KF, AUSF) in the above embodiment, it may specifically include:
  • the transceiver unit 601 is configured to receive the key identifier of the first device from the group key management function network element; the processing unit 602 is configured to determine the first key according to the key identifier of the first device; The key determines the second key.
  • the processing unit 602 when determining the second key according to the first key, is specifically configured to: generate the first key according to the generation parameters of the first key and the second key Second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following one Item or items: nonce, counter, timestamp.
  • the transceiver unit 601 is further configured to receive a second reception parameter indication from the first device or the network element of the group key management function; the processing unit 602 is further configured to obtain the indication according to the second reception parameter the second received parameter.
  • the transceiver unit 601 is further configured to send a second transmission parameter indication to the first device or the network element of the group key management function, where the second transmission parameter indication is used to indicate the second transmission parameter.
  • the processing unit 602 is further configured to determine a protection key according to the second key; the transceiver unit 601 is further configured to send the protection key to a network element with a group key management function.
  • the processing unit 602 when determining the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameter of the protection key ;
  • the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string;
  • the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp;
  • the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.
  • the transceiver unit 601 is further configured to receive the first reception parameter indication from the first device or the network element of the group key management function; the processing unit 602 is further configured to receive the first reception parameter according to the first reception parameter Instruct to acquire the first reception parameter.
  • the transceiver unit 601 is further configured to send the first sending parameter indication to the first device or the network element with the group key management function, where the first sending parameter indication is used to indicate the first sending parameter.
  • the transceiver unit 601 is further configured to send the second key to the network element of the group key management function.
  • the first key may be K AUSF or K SEAF or K AMF or K AF .
  • each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the methods in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
  • the embodiments of the present application further provide a group key distribution apparatus.
  • the group key distribution apparatus 700 may include a transceiver 701 and a processor 702 .
  • the group key distribution apparatus 700 may further include a memory 703 .
  • the memory 703 may be arranged inside the group key distribution apparatus 700 or outside the group key distribution apparatus 700 .
  • the processor 702 may control the transceiver 701 to receive and transmit data or information.
  • the processor 702 may be a central processing unit (central processing unit, CPU), a network processor (network processor, NP), or a combination of CPU and NP.
  • the processor 702 may further include hardware chips.
  • the above-mentioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • the above-mentioned PLD can be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.
  • the transceiver 701 , the processor 702 and the memory 703 are connected to each other.
  • the transceiver 701, the processor 702 and the memory 703 are connected to each other through a bus 704;
  • the bus 704 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) ) bus, etc.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of presentation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
  • the memory 703 is used to store programs and the like.
  • the program may include program code, the program code including computer operation instructions.
  • Memory 703 may include RAM, and may also include non-volatile memory, such as one or more disk memories.
  • the processor 702 executes the application program stored in the memory 703 to realize the above-mentioned functions, thereby realizing the function of the group key distribution apparatus 700 .
  • the group key distribution apparatus 700 may be the above-mentioned group key management function network element, the first device or the key function network element.
  • the group key distribution apparatus 700 when used to implement the function of the group key management function network element (eg GKMF) in the above embodiment, it may specifically include:
  • the processor 702 is configured to acquire the key identifier of the first device; acquire the group identifier of the first device; determine a group key according to the group identifier of the first device, and the group key is used to protect the Communication content of members, the members of the group include the first device; determine a protection key according to the key identifier of the first device; generate a group key parameter according to the group key and the protection key;
  • the transceiver 701 is configured to send the group key parameter to the first device.
  • the processor 702 when determining the group key according to the group identifier of the first device, is specifically configured to: query the group from group key information according to the group identifier key, if the group key information includes the correspondence between the group identifier and the group key, obtain the group key corresponding to the group identifier from the group key information; If the group key information does not include the corresponding relationship between the group identifier and the group key, the group key is generated.
  • the processor 702 when generating the group key, is specifically configured to: generate the group key according to the root group key.
  • the processor 702 when determining the protection key according to the key identifier of the first device, is specifically configured to: determine, according to the stored correspondence between the key identifier of the first device and the protection key, to determine the protection key.
  • the protection key corresponding to the key identifier of the first device; or, obtaining the protection key from a key function network element according to the key identifier of the first device.
  • the processor 702 when determining the protection key according to the key identifier of the first device, is specifically configured to: determine the second key according to the key identifier of the first device; The second key generates the protection key.
  • the processor 702 when generating the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key ;
  • the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string;
  • the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp;
  • the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.
  • the transceiver 701 is further configured to receive a first reception parameter indication from the first device or group management function network element; the processor 702 is further configured to obtain the first reception parameter indication according to the first reception parameter indication. The first receive parameter.
  • the transceiver 701 is further configured to send a first transmission parameter indication to the first device, where the first transmission parameter indication is used to indicate the first transmission parameter.
  • the processor 702 when determining the second key according to the key identifier of the first device, is specifically configured to: determine according to the stored correspondence between the key identifier of the first device and the first key The key identifier of the first device corresponds to the first key; or the transceiver 701 is controlled to obtain the first key from the key function network element; and the second key is generated according to the first key.
  • the processor 702 when generating the second key according to the first key, is specifically configured to: generate the second key according to the generation parameters of the first key and the second key.
  • the second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following One or more items: nonce, counter, timestamp.
  • the transceiver 701 is further configured to receive a second reception parameter indication from the first device or group management function network element; the processor 702 is further configured to obtain the second reception parameter indication according to the second reception parameter indication. The second receive parameter.
  • the transceiver 701 is further configured to send a second transmission parameter indication to the first device or group management function network element, where the second transmission parameter indication is used to indicate the second transmission parameter.
  • the first key is K AUSF or K SEAF or K AMF or K AF .
  • the processor 702 when generating the group key parameter according to the group key and the protection key, the processor 702 is specifically configured to: according to the group key, the protection key and the protection key
  • the first algorithm generates the set of key parameters, and the first algorithm is a reversible algorithm.
  • the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.
  • the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.
  • the processor 702 when acquiring the key identifier of the first device, is specifically configured to: control the transceiver 701 to acquire the encryption key of the first device from the first device or, control the transceiver 701 to obtain the key identifier of the first device from the group management function network element.
  • the processor 702 when acquiring the group identifier of the first device, is specifically configured to: control the transceiver 701 to acquire the group identifier of the first device from the group management function network element. group identifier; or, controlling the transceiver 701 to obtain the group identifier of the first device from the first device.
  • the group key distribution apparatus 700 when configured to implement the function of the first device (eg, UE) in the foregoing embodiment, it may specifically include:
  • the transceiver 701 is configured to receive the group key parameter from the group key management function network element; the processor 702 is configured to determine the group key according to the group key parameter and the protection key, and the group key The key is used to protect the content of communications of members of a group that includes the first device.
  • the processor 702 is further configured to: generate a second key according to the first key; and generate the protection key according to the second key.
  • the processor 702 when generating the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key; the protection key
  • the key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein the first self-owned parameter includes a preset character string; the first receiving parameter includes One or more of the following: first device identifier, first device key identifier, group identifier, application type, application identifier, random number, counter, timestamp; the first sending parameter includes one or more of the following : Group key ID, nonce, counter, timestamp.
  • the transceiver 701 is further configured to send a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.
  • the transceiver 701 is further configured to receive a first transmission parameter indication from the group key management function network element; the processor 702 is further configured to obtain the second transmission parameter indication according to the first transmission parameter indication. Send parameters.
  • the processor 702 when generating the second key according to the first key, is specifically configured to: generate according to the first key and the second key The parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter
  • the parameter includes a preset character string; the second receiving parameter includes one or more of the following: an identifier of the first device, a key identifier of the first device, a group identifier, a random number, a counter, and a timestamp; the second Send parameters include one or more of the following: random number, counter, timestamp.
  • the transceiver 701 is further configured to send a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.
  • the transceiver 701 is further configured to receive a second transmission parameter indication from the group key management function network element; the processor 702 is further configured to obtain the first transmission parameter indication according to the second transmission parameter indication. Send parameters.
  • the processor 702 when determining the group key according to the group key parameter and the protection key, is specifically configured to: according to the protection key, the group key parameter and the second The algorithm determines the group key, and the second algorithm is a reversible algorithm.
  • the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.
  • the first key may be K AUSF or K SEAF or K AMF or K AF .
  • the transceiver 701 is further configured to: send the key identifier of the first device to the group key management function network element; or send the group key management function network element to the group The key management function network element sends the key identifier and group identifier of the first device.
  • the key identifier of the first device is an identifier of the first device or a key set identifier of the first device.
  • the group key distribution apparatus 700 when used to implement the function of the key function network element (eg KF, AUSF) in the above embodiment, it may specifically include:
  • the transceiver 701 is configured to receive the key identifier of the first device from the group key management function network element; the processor 702 is configured to determine the first key according to the key identifier of the first device; The key determines the second key.
  • the processor 702 when determining the second key according to the first key, is specifically configured to: generate the first key according to the generation parameters of the first key and the second key Second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following one Item or items: nonce, counter, timestamp.
  • the transceiver 701 is further configured to receive a second reception parameter indication from the first device or the network element of the group key management function; the processor 702 is further configured to obtain the indication according to the second reception parameter the second received parameter.
  • the transceiver 701 is further configured to send a second transmission parameter indication to the first device or the network element of the group key management function, where the second transmission parameter indication is used to indicate the second transmission parameter.
  • the processor 702 is further configured to determine a protection key according to the second key; the transceiver 701 is further configured to send the protection key to a network element with a group key management function.
  • the processor 702 when determining the protection key according to the second key, is specifically configured to: generate the protection key according to the second key and the generation parameter of the protection key ;
  • the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string;
  • the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp;
  • the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.
  • the transceiver 701 is further configured to receive the first receiving parameter indication from the first device or the network element of the group key management function; the processor 702 is further configured to receive the first receiving parameter according to the first receiving parameter Instruct to acquire the first reception parameter.
  • the transceiver 701 is further configured to send the first sending parameter indication to the first device or the network element of the group key management function, where the first sending parameter indication is used to indicate the first sending parameter.
  • the transceiver 701 is further configured to send the second key to the group key management function network element.
  • the first key may be K AUSF or K SEAF or K AMF or K AF .
  • the embodiments of the present application provide a communication system, and the communication system may include a group key management function network element, a first device, a key function network element, etc. involved in the above embodiments.
  • Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the group key distribution provided by the foregoing method embodiments method.
  • Embodiments of the present application further provide a computer program product, where the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the group key distribution method provided by the above method embodiments.
  • An embodiment of the present application further provides a chip, where the chip is coupled to a memory, and the chip is used to implement the group key distribution method provided by the above method embodiments.
  • An embodiment of the present application further provides a chip system, where the chip system includes a processor, configured to support the above-mentioned group key distribution apparatus to implement the above-mentioned functions.
  • the chip system further includes a memory for storing necessary program instructions and data of the group key distribution apparatus.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A group key distribution method and apparatus, wherein same are used for providing a unified group key distribution mechanism, so as to improve the security of group communication. The method comprises: a group key management function network element acquiring a key identifier of a first device and a group identifier of the first device; the group key management function network element determining a group key according to the group identifier of the first device, wherein the group key is used to protect communication content of members in a group, and the members in the group include the first device; the group key management function network element determining a protective key according to the key identifier of the first device; the group key management function network element generating a group key parameter according to the group key and the protective key, and sending the group key parameter to the first device; and the first device determining the group key according to the group key parameter and the protective key. In this way, the group key distribution is protected by means of a group key parameter, such that the security of group key distribution is improved, and the security of group communication can be improved.

Description

一种组密钥分发方法及装置Method and device for group key distribution 技术领域technical field

本申请涉及通信技术领域,尤其涉及一种组密钥分发方法及装置。The present application relates to the field of communication technologies, and in particular, to a group key distribution method and device.

背景技术Background technique

移动网络通信系统存在大量的组通信业务,例如定位服务(location service,LCS),邻近业务(proximity-based services,ProSe),多媒体广播多播业务(multimedia broadcast multicast service,MBMS),第五代(5 th generation,5G)局域网服务等。在保护组通信时,会涉及到组密钥管理。目前,组密钥一般由多个组成员共享,相较于独立密钥较难进行分发和管理。在当前移动网络通信系统中,不同的组通信对于组密钥的分发都使用各自的方式,会导致组密钥安全性不一(例如,LCS使用NAS消息传输组密钥,但是NAS消息的加密是可选的)、预配置内容不同(ProSe和MBMS可能要求终端设备预配置对称密钥或证书),组密钥存储管理分散(不同的组通信业务组密钥保存在不同的服务器上),而这些都容易成为攻击薄弱点。因此目前组密钥的分发方式会造成组通信的安全性较低。 There are a large number of group communication services in the mobile network communication system, such as location service (LCS), proximity service (Proximity-based services, ProSe), multimedia broadcast multicast service (MBMS), fifth generation ( 5th generation, 5G) local area network services, etc. Group key management is involved when securing group communications. Currently, group keys are generally shared by multiple group members, and are more difficult to distribute and manage than independent keys. In the current mobile network communication system, different group communications use their own methods for the distribution of group keys, resulting in different security of group keys (for example, LCS uses NAS messages to transmit group keys, but the encryption of NAS messages is optional), different pre-configured content (ProSe and MBMS may require terminal equipment to pre-configure a symmetric key or certificate), decentralized group key storage management (different group communication service group keys are stored on different servers), And these are easy to attack weak points. Therefore, the current distribution method of the group key will cause the security of the group communication to be low.

发明内容SUMMARY OF THE INVENTION

本申请提供一种组密钥分发方法及装置,用以提出统一的组密钥分发机制,以提高组通信的安全性。The present application provides a group key distribution method and device, which are used to propose a unified group key distribution mechanism to improve the security of group communication.

第一方面,本申请提供了一种组密钥分发方法,该方法可以包括:组密钥管理功能网元获取第一设备的密钥标识,以及获取所述第一设备的组标识;所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,以及根据所述第一设备的密钥标识确定保护密钥;所述组密钥管理功能网元根据所述组密钥和所述保护密钥生成组密钥参数,并向所述第一设备发送所述组密钥参数;其中,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。In a first aspect, the present application provides a group key distribution method, the method may include: a group key management function network element acquiring a key identifier of a first device, and acquiring a group identifier of the first device; the The group key management function network element determines the group key according to the group identification of the first device, and determines the protection key according to the key identification of the first device; the group key management function network element determines the protection key according to the group identification of the first device; The key and the protection key generate a group key parameter, and send the group key parameter to the first device; wherein the group key is used to protect the communication content of the members of the group, and the group key A member contains the first device.

通过上述方法,通过组密钥参数来保护组密钥的分发,可以提高组密钥分发的安全性,从而可以提高组通信的安全性。Through the above method, the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, and the security of the group communication can be improved.

在一个可能的设计中,所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,具体方法可以为:所述组密钥管理功能网元根据所述组标识从组密钥信息中查询所述组密钥,若所述组密钥信息包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元从所述组密钥信息中获取所述组标识对应的所述组密钥;若所述组密钥信息不包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元生成所述组密钥。In a possible design, the group key management function network element determines the group key according to the group identifier of the first device, and the specific method may be: the group key management function network element selects the group key from the The group key information is queried for the group key. If the group key information includes the corresponding relationship between the group identifier and the group key, the group key management function network element retrieves the group key from the group key. The group key corresponding to the group identifier is obtained from the information; if the group key information does not include the correspondence between the group identifier and the group key, the network element of the group key management function generates the the group key.

通过上述方法,所述组密钥管理功能网元可以准确获得所述组密钥,进而根据组密钥生成组密钥参数。Through the above method, the network element of the group key management function can accurately obtain the group key, and then generate group key parameters according to the group key.

在一个可能的设计中,所述组密钥管理功能网元生成所述组密钥,具体方法可以为:所述组密钥管理功能网元根据根组密钥生成所述组密钥。这样,在没有查询到所述组密钥时,所述组密钥管理功能网元可以准确获得所述组密钥,进而根据组密钥生成组密钥参数。In a possible design, the group key management function network element generates the group key, and a specific method may be: the group key management function network element generates the group key according to the root group key. In this way, when the group key is not queried, the network element of the group key management function can accurately obtain the group key, and then generate a group key parameter according to the group key.

在一个可能的设计中,所述组密钥管理功能网元生成所述组密钥后,存储所述组标识与所述组密钥的对应关系。这样可以使所述组密钥管理功能网元在后续过程中根据所述组 标识成功查询到所述组密钥。In a possible design, after the group key management function network element generates the group key, the corresponding relationship between the group identifier and the group key is stored. In this way, the group key management function network element can successfully query the group key according to the group identifier in the subsequent process.

在一个可能的设计中,所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥,具体方法可以为:所述组密钥管理功能网元根据存储的第一设备的密钥标识与保护密钥的对应关系,确定所述第一设备的密钥标识对应的所述保护密钥;或者,所述组密钥管理功能网元根据所述第一设备的密钥标识从密钥功能网元获取所述保护密钥。In a possible design, the group key management function network element determines the protection key according to the key identifier of the first device, and the specific method may be: the group key management function network element determines the protection key according to the stored first device. The corresponding relationship between the key identifier of the device and the protection key is to determine the protection key corresponding to the key identifier of the first device; The key identifier obtains the protection key from the key function network element.

通过上述方法,所述组密钥管理功能网元可以准确获得所述保护密钥,进而根据保护密钥生成组密钥参数。Through the above method, the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.

在一个可能的设计中,所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥,具体方法可以为:所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥;所述组密钥管理功能网元根据所述第二密钥生成所述保护密钥。In a possible design, the group key management function network element determines the protection key according to the key identifier of the first device, and the specific method may be: the group key management function network element determines the protection key according to the first device. The key identifier of the device determines a second key; the group key management function network element generates the protection key according to the second key.

通过上述方法,所述组密钥管理功能网元可以准确获得所述保护密钥,进而根据保护密钥生成组密钥参数。Through the above method, the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.

在一个可能的设计中,所述组密钥管理功能网元根据所述第二密钥生成所述保护密钥,具体方法可以为:所述组密钥管理功能网元根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。In a possible design, the group key management function network element generates the protection key according to the second key, and a specific method may be: the group key management function network element generates the protection key according to the second key. generating the protection key; the generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first reception parameter, and a first transmission parameter; wherein , the first self-owned parameter includes a preset character string; the first received parameter includes one or more of the following: the identification of the first device, the key identification of the first device, the group identification, the application type, the application identification , a random number, a counter, and a timestamp; the first sending parameter includes one or more of the following: group key identifier, random number, counter, and timestamp.

通过上述方法,所述组密钥管理功能网元可以准确获得所述保护密钥,进而根据保护密钥生成组密钥参数。Through the above method, the network element of the group key management function can accurately obtain the protection key, and then generate a group key parameter according to the protection key.

在一个可能的设计中,所述组密钥管理功能网元从所述第一设备或组管理功能网元接收第一接收参数指示,并根据所述第一接收参数指示获取所述第一接收参数。这样可以使所述组密钥管理功能网元根据所述第一接收参数生成所述保护密钥,进而根据保护密钥生成组密钥参数。In a possible design, the group key management function network element receives a first reception parameter indication from the first device or group management function network element, and obtains the first reception parameter indication according to the first reception parameter indication parameter. In this way, the network element of the group key management function can generate the protection key according to the first reception parameter, and then generate a group key parameter according to the protection key.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备发送第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。In a possible design, the group key management function network element sends a first sending parameter indication to the first device, where the first sending parameter indication is used to indicate the first sending parameter.

在一个可能的设计中,所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥,具体方法可以为:所述组密钥管理功能网元根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者所述组密钥管理功能网元从密钥功能网元获取第一密钥;所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥。In a possible design, the group key management function network element determines the second key according to the key identifier of the first device, and the specific method may be: the group key management function network element determines the second key according to the stored first device. The correspondence between the key identifier of a device and the first key is to determine the first key corresponding to the key identifier of the first device; or the group key management function network element obtains the first key from the key function network element. a key; the group key management function network element generates the second key according to the first key.

通过上述方法,所述组密钥管理功能网元可以准确获得所述第二密钥,进而根据第二密钥生成保护密钥。Through the above method, the group key management function network element can accurately obtain the second key, and then generate a protection key according to the second key.

在一个可能的设计中,所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥,具体方法可以为:所述组密钥管理功能网元根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。In a possible design, the group key management function network element generates the second key according to the first key, and a specific method may be: the group key management function network element generates the second key according to the first key. The key and the generation parameters of the second key generate the second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second received parameter, a second Sending parameters; wherein, the second self-owned parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identification of the first device, the key identification of the first device, the group identification, the random number, counter, and timestamp; the second transmission parameter includes one or more of the following: random number, counter, and timestamp.

通过上述方法,所述组密钥管理功能网元可以准确获得所述第二密钥,进而根据第二密钥生成保护密钥。Through the above method, the group key management function network element can accurately obtain the second key, and then generate a protection key according to the second key.

在一个可能的设计中,所述组密钥管理功能网元从所述第一设备或组管理功能网元接收第二接收参数指示,并根据所述第二接收参数指示获取所述第二接收参数。这样可以使所述组密钥管理功能网元根据所述第二接收参数生成所述第二密钥,进而根据第二密钥生成保护密钥。In a possible design, the group key management function network element receives a second reception parameter indication from the first device or the group management function network element, and obtains the second reception parameter indication according to the second reception parameter indication parameter. In this way, the group key management function network element can generate the second key according to the second reception parameter, and then generate a protection key according to the second key.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备或组管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。In a possible design, the group key management function network element sends a second transmission parameter indication to the first device or group management function network element, where the second transmission parameter indication is used to instruct the second transmission parameter.

在一个可能的设计中,所述第一密钥为K AUSF或K SEAF或K AMF或K AFIn a possible design, the first key is K AUSF or K SEAF or K AMF or K AF .

在一个可能的设计中,所述组密钥管理功能网元根据所述组密钥和所述保护密钥生成组密钥参数,具体方法可以为:所述组密钥管理功能网元根据所述组密钥、所述保护密钥和第一算法生成所述组密钥参数,所述第一算法为可逆算法。这样所述组密钥管理功能网元可以成功得到组密钥参数,进而通过组密钥参数来保护组密钥的分发,可以提高组密钥分发的安全性,从而可以提高组通信的安全性。In a possible design, the group key management function network element generates a group key parameter according to the group key and the protection key, and the specific method may be: the group key management function network element The group key, the protection key and the first algorithm generate the group key parameter, and the first algorithm is a reversible algorithm. In this way, the network element of the group key management function can successfully obtain the group key parameters, and then use the group key parameters to protect the distribution of the group key, which can improve the security of group key distribution and thus the security of group communication. .

在一个可能的设计中,所述第一算法可以为以下算法中的一种:异或、同或、加、减、加密。In a possible design, the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.

在一个可能的设计中,所述第一设备的密钥标识可以为所述第一设备的标识或者为所述第一设备的密钥集标识。In a possible design, the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.

在一个可能的设计中,所述组密钥管理功能网元获取第一设备的密钥标识,具体方法可以为:所述组密钥管理功能网元从所述第一设备获取所述第一设备的密钥标识;或者,所述组密钥管理功能网元从组管理功能网元获取所述第一设备的密钥标识。这样所述组密钥管理功能网元可以准确获得所述第一设备的密钥标识,进而基于所述第一设备的密钥标识准确得到保护密钥。In a possible design, the group key management function network element obtains the key identifier of the first device, and the specific method may be: the group key management function network element obtains the first device from the first device. The key identifier of the device; or, the group key management function network element obtains the key identifier of the first device from the group management function network element. In this way, the network element of the group key management function can accurately obtain the key identifier of the first device, and then accurately obtain the protection key based on the key identifier of the first device.

在一个可能的设计中,所述组密钥管理功能网元获取所述第一设备的组标识,具体方法可以为:所述组密钥管理功能网元从组管理功能网元获取所述第一设备的组标识;或者,所述组密钥管理功能网元从所述第一设备获取所述第一设备的组标识。这样所述组密钥管理功能网元可以准确获得所述第一设备的组标识,进而基于所述第一设备的组标识准确得到组密钥。In a possible design, the group key management function network element obtains the group identifier of the first device, and the specific method may be: the group key management function network element obtains the first device from the group management function network element. A group identifier of a device; or, the group key management function network element acquires the group identifier of the first device from the first device. In this way, the network element of the group key management function can accurately obtain the group identifier of the first device, and then accurately obtain the group key based on the group identifier of the first device.

在一个可能的设计中,当所述组管理功能网元为应用功能(application function,AF)网元时,所述第一设备可以向所述AF发送应用请求消息,所述应用请求消息中包含第一设备的组标识,由此所述AF向所述组密钥管理功能网元发送所述第一设备的组标识。In a possible design, when the group management function network element is an application function (application function, AF) network element, the first device may send an application request message to the AF, where the application request message includes The group identifier of the first device, whereby the AF sends the group identifier of the first device to the group key management function network element.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备发送所述组密钥参数,具体可以为:所述组密钥管理功能网元通过所述AF向所述第一设备发送所述组密钥参数。In a possible design, the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element sends the group key parameter to the first device through the AF The first device sends the group key parameter.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备发送所述组密钥参数,具体可以为:所述组密钥管理功能网元通过接入和移动性管理功能(access and mobility management function,AMF)网元向所述第一设备发送所述组密钥参数。In a possible design, the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element manages the access and mobility An access and mobility management function (AMF) network element sends the group key parameter to the first device.

在一个可能的设计中,当所述组管理功能网元会话管理功能(session management function,SMF)网元时,所述第一设备可以向所述SMF发送协议数据单元(protocol data unit,PDU)会话建立请求消息,由此触发所述SMF向所述组密钥管理功能网元发送所述第一设备的组标识。In a possible design, when the group management function network element session management function (session management function, SMF) network element, the first device may send a protocol data unit (protocol data unit, PDU) to the SMF A session establishment request message, thereby triggering the SMF to send the group identifier of the first device to the group key management function network element.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备发送所述组密钥参数,具体可以为:所述组密钥管理功能网元通过所述SMF向所述第一设备发送所述组密钥参数。In a possible design, the group key management function network element sends the group key parameter to the first device, which may specifically be: the group key management function network element sends the group key parameter to the first device through the SMF. The first device sends the group key parameter.

在一个可能的设计中,所述组密钥管理功能网元根据所述组标识确定组密钥标识。In a possible design, the group key management function network element determines the group key identifier according to the group identifier.

在一个可能的设计中,所述组密钥管理功能网元根据所述组标识确定组密钥标识,具体方法可以为:所述组密钥管理功能网元根据所述组标识从组密钥信息中获取所述组密钥标识,所述组密钥信息包括组标识与组密钥标识的对应关系;或者,所述组密钥管理功能网元将所述组标识作为所述组密钥标识;或者,所述组密钥管理功能网元根据所述组标识和应用类型确定所述组密钥标识。In a possible design, the group key management function network element determines the group key identifier according to the group identifier, and the specific method may be: the group key management function network element obtains the group key from the group key according to the group identifier Obtain the group key identifier from the information, and the group key information includes the correspondence between the group identifier and the group key identifier; or, the group key management function network element uses the group identifier as the group key or the group key management function network element determines the group key identifier according to the group identifier and the application type.

在一个可能的设计中,所述组密钥管理功能网元向所述第一设备发送所述组密钥标识。In a possible design, the group key management function network element sends the group key identifier to the first device.

第二方面,本申请提供了一种组密钥分发方法,该方法可以包括:第一设备从组密钥管理功能网元接收组密钥参数;所述第一设备根据所述组密钥参数和保护密钥确定所述组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。In a second aspect, the present application provides a method for distributing a group key, the method may include: a first device receives a group key parameter from a network element with a group key management function; the first device receives a group key parameter according to the group key parameter and a protection key to determine the group key, the group key being used to protect the communication content of the members of the group, the members of the group including the first device.

通过上述方法,通过组密钥参数来保护组密钥的分发,可以提高组密钥分发的安全性,从而可以提高组通信的安全性。Through the above method, the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, and the security of the group communication can be improved.

在一个可能的设计中,所述第一设备根据第一密钥生成第二密钥,并根据所述第二密钥生成所述保护密钥。这样所述第一设备可以准确地获得所述保护密钥,进而准确基于所述保护密钥得到所述组密钥。In a possible design, the first device generates a second key according to the first key, and generates the protection key according to the second key. In this way, the first device can obtain the protection key accurately, and then obtain the group key accurately based on the protection key.

在一个可能的设计中,所述组密钥管理功能网元根据所述第二密钥生成保护密钥,具体方法可以为:所述第一设备根据所述第二密钥和保护密钥的生成参数生成所述保护密钥;所述保护密钥生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。这样所述第一设备可以准确地获得所述保护密钥,进而准确基于所述保护密钥得到所述组密钥。In a possible design, the group key management function network element generates a protection key according to the second key, and the specific method may be: the first device generates a protection key according to the second key and the protection key. Generating parameters to generate the protection key; the protection key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes A preset character string; the first receiving parameter includes one or more of the following: the identifier of the first device, the first device key identifier, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp; The first sending parameter includes one or more of the following: a group key identifier, a random number, a counter, and a timestamp. In this way, the first device can obtain the protection key accurately, and then obtain the group key accurately based on the protection key.

在一个可能的设计中,所述第一设备向从所述组密钥管理功能网元发送第一接收参数指示,所述第一接收参数指示用于指示所述第一接收参数。In a possible design, the first device sends a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.

在一个可能的设计中,所述第一设备从所述组密钥管理功能网元接收第一发送参数指示,并根据所述第一发送参数指示获取所述第一发送参数。这样所述第一设备可以准确地获得所述第一发送参数,进而准确基于所述第一发送参数得到所述保护密钥。In a possible design, the first device receives a first transmission parameter indication from the group key management function network element, and acquires the first transmission parameter according to the first transmission parameter indication. In this way, the first device can accurately obtain the first transmission parameter, and then obtain the protection key accurately based on the first transmission parameter.

在一个可能的设计中,所述第一设备根据所述第一密钥生成第二密钥,具体方法可以为:所述第一设备根据所述第一密钥和所述第二密钥的生成参数确定所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。这样所述第一设备可以准确地获得所述第二密钥,进而准确基于所述第二密钥得到所述保护密钥。In a possible design, the first device generates the second key according to the first key, and the specific method may be: the first device generates the second key according to the difference between the first key and the second key. The generation parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter Some parameters include a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, a random number, a counter, and a timestamp; the first device Two transmission parameters include one or more of the following: random number, counter, timestamp. In this way, the first device can accurately obtain the second key, and then obtain the protection key accurately based on the second key.

在一个可能的设计中,所述第一设备向所述组密钥管理功能网元发送第二接收参数指 示,所述第二接收参数指示用于指示所述第二接收参数。In a possible design, the first device sends a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.

在一个可能的设计中,所述第一设备从所述组密钥管理功能网元接收第二发送参数指示,并根据所述第二发送参数指示获取所述第二发送参数。这样所述第一设备可以准确地获得所述第二发送参数,进而准确基于所述第二发送参数得到所述第二密钥。In a possible design, the first device receives a second transmission parameter indication from the group key management function network element, and acquires the second transmission parameter according to the second transmission parameter indication. In this way, the first device can accurately obtain the second transmission parameter, and then obtain the second key accurately based on the second transmission parameter.

在一个可能的设计中,所述第一设备根据所述组密钥参数和所述保护密钥确定所述组密钥,具体方法可以为:所述第一设备根据所述保护密钥、所述组密钥参数和第二算法确定所述组密钥,所述第二算法为可逆算法。这样第一设备可以成功得到组密钥,由于通过组密钥参数来保护组密钥的分发,可以提高组密钥分发的安全性,从而可以提高组通信的安全性。In a possible design, the first device determines the group key according to the group key parameter and the protection key, and a specific method may be: the first device determines the group key according to the protection key, The group key parameter and a second algorithm determine the group key, and the second algorithm is a reversible algorithm. In this way, the first device can successfully obtain the group key. Since the distribution of the group key is protected by the group key parameter, the security of the group key distribution can be improved, thereby the security of the group communication can be improved.

在一个可能的设计中,所述第二算法可以为以下算法中的一种:异或、同或、加、减、解密。In a possible design, the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.

在一个可能的设计中,所述第一密钥为K AUSF或K SEAF或K AMF或K AFIn a possible design, the first key is K AUSF or K SEAF or K AMF or K AF .

在一个可能的设计中,所述第一设备向所述组密钥管理功能网元发送第一设备的密钥标识;或者,所述第一设备通过组管理功能网元向所述组密钥管理功能网元发送所述第一设备的密钥标识和组标识。In a possible design, the first device sends the key identifier of the first device to the group key management function network element; or, the first device sends the group key to the group key management function network element through the group management function network element The management function network element sends the key identifier and group identifier of the first device.

在一个可能的设计中,所述第一设备的密钥标识可以为所述第一设备的标识或者为所述第一设备的密钥集标识。In a possible design, the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.

第三方面,本申请提供了一种组密钥分发方法,该方法可以包括:密钥功能网元从组密钥管理功能网元接收第一设备的密钥标识;所述密钥功能网元根据第一设备的密钥标识确定第一密钥;所述密钥功能网元根据所述第一密钥确定第二密钥。In a third aspect, the present application provides a group key distribution method, the method may include: a key function network element receiving a key identifier of a first device from a group key management function network element; the key function network element The first key is determined according to the key identifier of the first device; the key function network element determines the second key according to the first key.

通过上述方法,密钥功能网元后续可以为第一设备和组密钥管理功能网元提供第二密钥,使得第一设备和组密钥管理功能网元可以进一步确定保护密钥。Through the above method, the key function network element can subsequently provide the second key for the first device and the group key management function network element, so that the first device and the group key management function network element can further determine the protection key.

在一个可能的设计中,所述密钥功能网元根据所述第一密钥确定所述第二密钥,包括:In a possible design, the key function network element determines the second key according to the first key, including:

所述密钥功能网元根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。这样所述密钥功能网元可以准确地确定所述第二密钥。The key function network element generates the second key according to the generation parameters of the first key and the second key; the generation parameters of the second key include one or more of the following: Two self-owned parameters, a second receiving parameter, and a second sending parameter; wherein, the second self-owned parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, The key identifier, group identifier, random number, counter, and timestamp of the first device; the second sending parameter includes one or more of the following: random number, counter, and timestamp. In this way, the key function network element can accurately determine the second key.

在一个可能的设计中,所述密钥功能网元从第一设备或所述组密钥管理功能网元接收第二接收参数指示,并根据所述第二接收参数指示获取所述第二接收参数。这样所述密钥功能网元可以准确获得所述第二接收参数,进而根据所述第二接收参数确定所述第二密钥。In a possible design, the key function network element receives a second reception parameter indication from the first device or the group key management function network element, and obtains the second reception parameter indication according to the second reception parameter indication parameter. In this way, the key function network element can accurately obtain the second receiving parameter, and then determine the second key according to the second receiving parameter.

在一个可能的设计中,所述密钥功能网元向第一设备或所述组密钥管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。In a possible design, the key function network element sends a second transmission parameter indication to the first device or the group key management function network element, where the second transmission parameter indication is used to instruct the second transmission parameter.

在一个可能的设计中,所述密钥功能网元根据所述第二密钥确定保护密钥;所述密钥功能网元向组密钥管理功能网元发送所述保护密钥。这样所述密钥功能网元可以直接将所述保护密钥提供给所述组密钥管理功能网元,以使所述组密钥管理功能网元根据所述保护密钥生成组密钥参数,提高密钥分发的安全性。In a possible design, the key function network element determines the protection key according to the second key; the key function network element sends the protection key to the group key management function network element. In this way, the key function network element can directly provide the protection key to the group key management function network element, so that the group key management function network element can generate group key parameters according to the protection key. , to improve the security of key distribution.

在一个可能的设计中,所述密钥功能网元根据所述第二密钥确定所述保护密钥,包括:In a possible design, the key function network element determines the protection key according to the second key, including:

所述密钥功能网元根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。这样所述密钥功能网元可以准确地确定所述保护密钥。The key function network element generates the protection key according to the second key and the generation parameters of the protection key; the generation parameters of the protection key include one or more of the following: the first self-owned parameter, first receiving parameter, and first sending parameter; wherein, the first self-owned parameter includes a preset character string; the first receiving parameter includes one or more of the following: the identifier of the first device, the first device key identifier, group identifier, application type, application identifier, random number, counter, and timestamp; the first sending parameter includes one or more of the following: group key identifier, random number, counter, and timestamp. In this way, the key function network element can accurately determine the protection key.

在一个可能的设计中,所述密钥功能网元从所述第一设备或组密钥管理功能网元接收所述第一接收参数指示,并根据所述第一接收参数指示获取所述第一接收参数。这样所述密钥功能网元可以准确获得所述第一接收参数,进而根据所述第一接收参数确定所述保护密钥。In a possible design, the key function network element receives the first reception parameter indication from the first device or group key management function network element, and obtains the first reception parameter indication according to the first reception parameter indication A received parameter. In this way, the key function network element can accurately obtain the first receiving parameter, and then determine the protection key according to the first receiving parameter.

在一个可能的设计中,所述密钥功能网元向所述第一设备或组密钥管理功能网元发送所述第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。In a possible design, the key function network element sends the first transmission parameter indication to the first device or group key management function network element, where the first transmission parameter indication is used to indicate the first transmission parameter - Send parameters.

在一个可能的设计中,所述密钥功能网元向组密钥管理功能网元发送所述第二密钥。这样可以使组密钥管理功能网元后续根据所述第二密钥生成保护密钥。In a possible design, the key function network element sends the second key to the group key management function network element. In this way, the network element of the group key management function can subsequently generate the protection key according to the second key.

在一个可能的设计中,所述第一密钥为K AUSF或K SEAF或K AMF或K AFIn a possible design, the first key is K AUSF or K SEAF or K AMF or K AF .

在一个可能的设计中,所述密钥功能网元可以为认证服务器功能(authentication server function,AUSF)网元。In a possible design, the key function network element may be an authentication server function (authentication server function, AUSF) network element.

第四方面,本申请提供了一种组密钥分发装置,所述组密钥分发装置可以是组密钥管理功能网元,该组密钥分发装置具有实现上述第一方面或第一方面的各个可能的设计示例中组密钥管理功能网元的功能。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块。In a fourth aspect, the present application provides a group key distribution device, the group key distribution device may be a network element with a group key management function, and the group key distribution device has the ability to implement the first aspect or the first aspect. The functionality of the group key management function network element in each possible design example. The functions can be implemented by hardware, or by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions.

在一个可能的设计中,所述组密钥分发装置的结构中可以包括收发单元和处理单元,这些单元可以执行上述第一方面或第一方面的各个可能的设计示例中组密钥管理功能网元的相应功能,具体参见方法示例中的详细描述,此处不做赘述。In a possible design, the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may execute the group key management function network in the first aspect or each possible design example of the first aspect. For the corresponding function of the element, please refer to the detailed description in the method example for details, which will not be repeated here.

在一个可能的设计中,所述组密钥分发装置的结构中包括收发器和处理器,可选的还包括存储器,收发器用于收发数据,以及用于与通信系统中的其他设备进行通信交互,处理器被配置为支持所述组密钥分发装置执行上述第一方面或第一方面的各个可能的设计示例中组密钥管理功能网元的相应的功能。存储器与处理器耦合,其保存所述组密钥分发装置必要的程序指令和数据。In a possible design, the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory. The transceiver is used to send and receive data, and to communicate with other devices in the communication system. , the processor is configured to support the group key distribution apparatus to perform the corresponding function of the group key management function network element in the first aspect or each possible design example of the first aspect. A memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.

第五方面,本申请提供了一种组密钥分发装置,所述组密钥分发装置可以是第一设备,该组密钥分发装置具有实现上述第二方面或第二方面的各个可能的设计示例中第一设备的功能。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块。In a fifth aspect, the present application provides a group key distribution apparatus, the group key distribution apparatus may be a first device, and the group key distribution apparatus has various possible designs for implementing the above second aspect or the second aspect The function of the first device in the example. The functions can be implemented by hardware, or by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions.

在一个可能的设计中,所述组密钥分发装置的结构中可以包括收发单元和处理单元,这些单元可以执行上述第二方面或第二方面的各个可能的设计示例中第一设备的相应功能,具体参见方法示例中的详细描述,此处不做赘述。In a possible design, the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may perform the corresponding functions of the first device in the second aspect or each possible design example of the second aspect , please refer to the detailed description in the method example for details, which will not be repeated here.

在一个可能的设计中,所述组密钥分发装置的结构中包括收发器和处理器,可选的还包括存储器,收发器用于收发数据,以及用于与通信系统中的其他设备进行通信交互,处理器被配置为支持所述组密钥分发装置执行上述第二方面或第二方面的各个可能的设计示例中第一设备的相应的功能。存储器与处理器耦合,其保存所述组密钥分发装置必要的 程序指令和数据。In a possible design, the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory. The transceiver is used to send and receive data, and to communicate with other devices in the communication system. , the processor is configured to support the group key distribution apparatus to perform the corresponding function of the first device in the second aspect or each possible design example of the second aspect. A memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.

第六方面,本申请提供了一种组密钥分发装置,所述组密钥分发装置可以是密钥功能网元,该组密钥分发装置具有实现上述第三方面或第三方面的各个可能的设计示例中密钥功能网元的功能。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块。In a sixth aspect, the present application provides a group key distribution device, the group key distribution device may be a key function network element, and the group key distribution device has various possibilities for implementing the third aspect or the third aspect. The function of the key function network element in the design example. The functions can be implemented by hardware, or by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions.

在一个可能的设计中,所述组密钥分发装置的结构中可以包括收发单元和处理单元,这些单元可以执行上述第三方面或第三方面的各个可能的设计示例中密钥功能网元的相应功能,具体参见方法示例中的详细描述,此处不做赘述。In a possible design, the structure of the group key distribution apparatus may include a transceiver unit and a processing unit, and these units may perform the key function network element in the third aspect or each possible design example of the third aspect. For the corresponding function, please refer to the detailed description in the method example for details, which will not be repeated here.

在一个可能的设计中,所述组密钥分发装置的结构中包括收发器和处理器,可选的还包括存储器,收发器用于收发数据,以及用于与通信系统中的其他设备进行通信交互,处理器被配置为支持所述组密钥分发装置执行上述第三方面或第三方面的各个可能的设计示例中密钥功能网元的相应的功能。存储器与处理器耦合,其保存所述组密钥分发装置必要的程序指令和数据。In a possible design, the structure of the group key distribution apparatus includes a transceiver and a processor, and optionally a memory. The transceiver is used to send and receive data, and to communicate with other devices in the communication system. , the processor is configured to support the group key distribution apparatus to perform the corresponding function of the key function network element in the third aspect or each possible design example of the third aspect. A memory is coupled to the processor and holds program instructions and data necessary for the set of key distribution means.

第七方面,本申请实施例提供了一种通信系统,可以包括上述提及的组密钥管理功能网元、第一设备和密钥功能网元等。In a seventh aspect, an embodiment of the present application provides a communication system, which may include the above-mentioned group key management function network element, a first device, a key function network element, and the like.

第八方面,本申请实施例提供的一种计算机可读存储介质,该计算机可读存储介质存储有程序指令,当程序指令在计算机上运行时,使得计算机执行本申请实施例第一方面及其任一可能的设计、第二方面及其任一可能的设计或第三方面及其任一可能的设计。示例性的,计算机可读存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括非瞬态计算机可读介质、随机存取存储器(random-access memory,RAM)、只读存储器(read-only memory,ROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。In an eighth aspect, a computer-readable storage medium provided by an embodiment of the present application, the computer-readable storage medium stores a program instruction, and when the program instruction is executed on a computer, makes the computer execute the first aspect of the embodiment of the present application and its contents. Any possible design, the second aspect and any possible design thereof, or the third aspect and any possible design thereof. Illustratively, a computer-readable storage medium can be any available medium that can be accessed by a computer. Taking this as an example but not limited to: computer readable media may include non-transitory computer readable media, random-access memory (RAM), read-only memory (ROM), electrically erasable Except programmable read only memory (electrically EPROM, EEPROM), CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of Any other media accessed by a computer.

第九方面,本申请实施例提供一种包括计算机程序代码或指令的计算机程序产品,当其在计算机上运行时,使得计算机实现上述第一方面及其任一可能的设计、第二方面及其任一可能的设计或第三方面及其任一可能的设计的方法。In a ninth aspect, the embodiments of the present application provide a computer program product including computer program codes or instructions, which, when run on a computer, enables the computer to implement the above-mentioned first aspect and any possible design thereof, the second aspect and its Any possible design or method of the third aspect and any possible design thereof.

第十方面,本申请还提供了一种芯片,所述芯片与存储器耦合,用于读取并执行所述存储器中存储的程序指令,以实现上述第一方面及其任一可能的设计、第二方面及其任一可能的设计或第三方面及其任一可能的设计的方法。In a tenth aspect, the present application also provides a chip, which is coupled to a memory and used to read and execute program instructions stored in the memory, so as to implement the above-mentioned first aspect and any possible designs thereof, the third A method of the second aspect and any possible design thereof or the third aspect and any possible design thereof.

上述第四方面至第十方面中的各个方面以及各个方面可能达到的技术效果请参照上述针对第一方面、第二方面或第三方面中的各种可能方案可以达到的技术效果说明,这里不再重复赘述。Please refer to the above description of the technical effects that can be achieved by various possible solutions in the first aspect, the second aspect or the third aspect. Repeat again.

附图说明Description of drawings

图1为申请提供的一种通信系统的架构示意图;1 is a schematic diagram of the architecture of a communication system provided by the application;

图2为本申请提供的一种组密钥分发方法的流程图;Fig. 2 is the flow chart of a kind of group key distribution method provided by this application;

图3为本申请提供的一种组密钥分发方法的示例的流程图;3 is a flowchart of an example of a group key distribution method provided by the present application;

图4为本申请提供的另一种组密钥分发方法的示例的流程图;4 is a flowchart of an example of another group key distribution method provided by the present application;

图5为本申请提供的另一种组密钥分发方法的示例的流程图;5 is a flowchart of an example of another group key distribution method provided by the present application;

图6为本申请提供的一种组密钥分发装置的结构示意图;6 is a schematic structural diagram of a group key distribution device provided by the present application;

图7为本申请提供的一种组密钥分发装置的结构图。FIG. 7 is a structural diagram of a group key distribution apparatus provided by the present application.

具体实施方式detailed description

下面将结合附图,对本申请实施例进行详细描述。The embodiments of the present application will be described in detail below with reference to the accompanying drawings.

本申请实施例提供一种组密钥分发方法及装置,用以提出统一的组密钥分发机制,以提高组通信的安全性。其中,本申请所述方法和装置基于同一技术构思,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。Embodiments of the present application provide a group key distribution method and device, which are used to propose a unified group key distribution mechanism to improve the security of group communication. The methods and devices described in this application are based on the same technical concept. Since the methods and devices have similar principles for solving problems, the implementations of the devices and methods can be referred to each other, and repeated descriptions will not be repeated here.

需要说明的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。在本申请中的描述中,“至少一个(种)”是指一个(种)或者多个(种),多个(种)是指两个(种)或者两个(种)以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。It should be noted that, in the description of this application, words such as "first" and "second" are only used for the purpose of distinguishing the description, and cannot be understood as indicating or implying relative importance, nor can they be understood as indicating or implying order. In the description in this application, "at least one (species)" refers to one (species) or multiple (species), and multiple (species) refers to two (species) or more than two (species). "And/or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural. The character "/" generally indicates that the associated objects are an "or" relationship.

为了更加清晰地描述本申请实施例的技术方案,下面结合附图,对本申请实施例提供的终端设备的数据关联方法及装置进行详细说明。In order to describe the technical solutions of the embodiments of the present application more clearly, the data association method and apparatus of the terminal equipment provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

本申请实施例提供了通信方法适用的一种可能的通信系统的架构。通信系统的架构中可以包括:接入网和核心网。接入网用于实现无线接入有关的功能,接入网包含与第三代合作伙伴计划(the 3rd generation partnership project,3GPP)接入网和非3GPP(non-3GPP的接入网)。核心网主要包括以下关键逻辑网元:接入和移动性管理功能网元、会话管理功能网元、用户面功能网元、策略控制功能网元、统一数据管理功能网元等。例如,图1示出了通信系统的架构的一种可能的示例,通信系统的架构中各个网元或设备以具体的示例示出。具体的,图1所示的通信系统的架构中可以包括:终端设备(以用户设备(user equipment,UE)为例示出)、接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、策略控制功能(policy control function,PCF)网元、统一数据管理功能网元(unified data management,UDM)、认证服务器功能(authentication server function,AUSF)网元、网络开放功能(network exposure function,NEF)网元、应用功能(application function,AF)网元、(无线)接入网((radio)access network,(R)AN)设备。其中,AMF网元与接入网设备之间可以通过N2接口相连,接入网设备与UPF之间可以通过N3接口相连,SMF与UPF之间可以通过N4接口相连,AMF网元与UE之间可以通过N1接口相连。接口名称只是一个示例说明,本申请实施例对此不作具体限定。应理解,本申请实施例并不限于图1所示通信系统,图1中所示的网元的名称在这里仅作为一种示例说明,并不作为对本申请的通信方法适用的通信系统架构中包括的网元的限定。下面对通信系统中的各个网元或设备的功能进行详细描述:The embodiments of the present application provide a possible architecture of a communication system to which the communication method is applicable. The architecture of the communication system may include: an access network and a core network. The access network is used to realize functions related to wireless access, and the access network includes the 3rd generation partnership project (3GPP) access network and the non-3GPP (non-3GPP access network). The core network mainly includes the following key logical network elements: access and mobility management function network elements, session management function network elements, user plane function network elements, policy control function network elements, and unified data management function network elements. For example, FIG. 1 shows a possible example of the architecture of the communication system, and each network element or device in the architecture of the communication system is shown as a specific example. Specifically, the architecture of the communication system shown in FIG. 1 may include: terminal equipment (using user equipment (UE) as an example), an access and mobility management function (access and mobility management function, AMF) network element, session management function (SMF) network element, user plane function (UPF) network element, policy control function (PCF) network element, unified data management function network element (unified data management, UDM), authentication server function (AUSF) network element, network exposure function (NEF) network element, application function (application function, AF) network element, (wireless) access network (( radio) access network, (R)AN) equipment. The AMF network element and the access network device can be connected through the N2 interface, the access network device and the UPF can be connected through the N3 interface, the SMF and the UPF can be connected through the N4 interface, and the AMF network element and the UE can be connected through the N4 interface. It can be connected through the N1 interface. The interface name is only an example description, which is not specifically limited in this embodiment of the present application. It should be understood that the embodiments of the present application are not limited to the communication system shown in FIG. 1 , and the names of the network elements shown in FIG. 1 are only described here as an example, not as a communication system architecture applicable to the communication method of the present application. Limitation of included network elements. The following describes the functions of each network element or device in the communication system in detail:

终端设备:可以为UE、手持终端、笔记本电脑、用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端或是其他可以 接入网络的设备。终端设备与接入网设备之间采用某种空口技术(如新无线(new radio,NR)、LTE)相互通信。在车联网通信中,车辆上载的通信终端是一种终端设备,路边单元(road side unit,RSU)也可以作为一种终端设备。无人机上载有通信终端,可以看作是一种终端设备。Terminal equipment: can be UE, handheld terminal, notebook computer, subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless data card, personal digital assistant (personal digital assistant, PDA) computer, Tablet computer, wireless modem (modem), handheld device (handheld), laptop computer (laptop computer), cordless phone (cordless phone) or wireless local loop (wireless local loop, WLL) station, machine type communication (machine type communication) type communication, MTC) terminal or other device that can access the network. A certain air interface technology (such as new radio (NR), LTE) is used to communicate with each other between the terminal device and the access network device. In vehicle networking communication, the communication terminal uploaded by the vehicle is a terminal device, and the roadside unit (RSU) can also be used as a terminal device. The drone is loaded with a communication terminal, which can be regarded as a terminal device.

(R)AN设备:为终端设备提供接入的设备,包含RAN设备和AN设备。RAN设备主要是3GPP网络无线网络设备,AN可以是non-3GPP定义的接入网设备。RAN设备:主要负责空口侧的无线资源管理、服务质量(quality of service,QoS)管理、数据压缩和加密等功能。所述接入网设备可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同,例如,在5G系统中,称为RAN或者gNB(5G NodeB)等。(R)AN equipment: equipment that provides access for terminal equipment, including RAN equipment and AN equipment. The RAN device is mainly a 3GPP network wireless network device, and the AN can be an access network device defined by non-3GPP. RAN equipment: It is mainly responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side. The access network equipment may include various forms of base stations, such as: a macro base station, a micro base station (also referred to as a small cell), a relay station, an access point, and the like. In systems using different radio access technologies, the names of devices with base station functions may be different, for example, in 5G systems, they are called RAN or gNB (5G NodeB), etc.

接入和移动性管理功能网元:主要负责信令处理部分,例如:接入控制、移动性管理、附着与去附着以及网关选择等功能。AMF网元为终端设备中的会话提供服务的情况下,会为该会话提供控制面的存储资源,以存储会话标识、与会话标识关联的SMF网元标识等。例如,在5G中,接入和移动性管理功能网元可以是AMF网元,例如图1所示;在未来通信,如6G中,接入和移动性管理功能网元仍可以是AMF网元,或有其它的名称,本申请不做限定。当接入和移动性管理功能网元是AMF网元时,AMF可以提供Namf服务。Access and mobility management function network element: mainly responsible for the signaling processing part, such as: access control, mobility management, attachment and detachment, and gateway selection and other functions. When the AMF network element provides services for the session in the terminal device, it provides storage resources of the control plane for the session to store the session identifier, the SMF network element identifier associated with the session identifier, and the like. For example, in 5G, the access and mobility management function network elements can be AMF network elements, such as shown in Figure 1; in future communications, such as 6G, the access and mobility management function network elements can still be AMF network elements , or other names, which are not limited in this application. When the access and mobility management function network element is an AMF network element, the AMF can provide Namf services.

会话管理功能网元:主要负责移动网络中的会话管理,如会话建立、修改、释放。具体功能如为用户分配IP地址、选择提供报文转发功能的UPF等。例如,在5G中,会话管理功能网元可以是SMF网元,例如图1所示;在未来通信,如6G中,会话管理功能网元仍可以是SMF网元,或有其它的名称,本申请不做限定。当会话管理功能网元时SMF网元时,SMF可以提供Nsmf服务。Session management function network element: It is mainly responsible for session management in the mobile network, such as session establishment, modification and release. Specific functions such as assigning IP addresses to users and selecting UPFs that provide packet forwarding functions. For example, in 5G, the session management function network element can be an SMF network element, such as shown in Figure 1; in future communications, such as 6G, the session management function network element can still be an SMF network element, or have other names, this Application is not limited. When the session management function network element is an SMF network element, the SMF can provide Nsmf services.

用户面功能网元:负责终端设备中用户数据的转发和接收。可以从数据网络接收用户数据,通过接入网设备传输给终端设备;UPF网元还可以通过接入网设备从终端设备接收用户数据,转发到数据网络。UPF网元中为终端设备提供服务的传输资源和调度功能由SMF网元管理控制的。例如,在5G中,用户面功能网元可以是UPF网元,例如图1所示;在未来通信,如6G中,用户面功能网元仍可以是UPF网元,或有其它的名称,本申请不做限定。User plane function network element: responsible for forwarding and receiving user data in terminal equipment. The user data can be received from the data network and transmitted to the terminal device through the access network device; the UPF network element can also receive the user data from the terminal device through the access network device and forward it to the data network. The transmission resources and scheduling functions that provide services to terminal equipment in the UPF network element are managed and controlled by the SMF network element. For example, in 5G, the user plane function network element can be a UPF network element, such as shown in Figure 1; in future communications, such as 6G, the user plane function network element can still be a UPF network element, or have other names. Application is not limited.

策略控制功能网元:主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。例如,在5G中,策略控制功能网元可以是PCF网元,例如图1所示;在未来通信,如6G中,策略控制功能网元仍可以是PCF网元,或有其它的名称,本申请不做限定。当策略控制功能网元是PCF网元,PCF网元可以提供Npcf服务。Policy control function network element: mainly supports providing a unified policy framework to control network behavior, provides policy rules to the control layer network function, and is responsible for obtaining user subscription information related to policy decision-making. For example, in 5G, the policy control function network element can be a PCF network element, such as shown in Figure 1; in future communications, such as 6G, the policy control function network element can still be a PCF network element, or have other names, this Application is not limited. When the policy control function network element is a PCF network element, the PCF network element can provide Npcf services.

网络开放功能网元:主要支持3GPP网络和第三方应用安全的交互。例如,在5G中,网络开放功能网元可以是NEF网元,例如图1所示;在未来通信,如6G中,网络开放功能网元仍可以是NEF网元,或有其它的名称,本申请不做限定。当网络开放功能网元是NEF时,NEF可以向其他网络功能网元提供Nnef服务。Network open function network element: mainly supports the secure interaction between 3GPP network and third-party applications. For example, in 5G, the network opening function network element can be a NEF network element, such as shown in Figure 1; in future communications, such as 6G, the network opening function network element can still be a NEF network element, or have other names, this Application is not limited. When the network open function network element is an NEF, the NEF can provide Nnef services to other network function network elements.

应用功能网元:主要支持与3GPP核心网交互来提供服务,例如影响数据路由决策,策略控制功能或者向网络侧提供第三方的一些服务。例如,在5G中,应用功能网元可以是AF网元,例如图1所示;在未来通信,如6G中,应用功能网元仍可以是AF网元,或有其它的名称,本申请不做限定。当应用功能网元是AF网元时,AF网元可以提供Naf 服务。其中,业务使能架构层服务器((service enabler architecture layer,SEAL)server),可以提供与特定业务对应的服务端功能,具体的,若业务为组通信业务,可以包含组管理功能,是一种特殊的AF。具体的,所述SEAF用于提供垂直应用服务,例如包含位置管理、组管理、配置管理、身份管理、密钥管理、网络资源管理等。Application function network element: mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side. For example, in 5G, the application function network element may be an AF network element, such as shown in Figure 1; in future communications, such as in 6G, the application function network element may still be an AF network element, or have other names, and this application does not Do limit. When the application function network element is the AF network element, the AF network element can provide the Naf service. Among them, the service enabler architecture layer server ((service enabler architecture layer, SEAL) server) can provide server-side functions corresponding to specific services. Specifically, if the service is a group communication service, it can include a group management function, which is a kind of Special AF. Specifically, the SEAF is used to provide vertical application services, for example, including location management, group management, configuration management, identity management, key management, network resource management, and the like.

AKMA锚点功能(AKMA anchor function,AAnF),为AKMA业务中使能AKMA锚点密钥衍生的功能。The AKMA anchor function (AKMA anchor function, AAnF) is the function of enabling AKMA anchor key derivation in the AKMA service.

安全锚点功能(security anchor function,SEAF),通过AMF为服务网络提供认证功能的网元,支持首次认证。The security anchor function (SEAF) is a network element that provides authentication functions for the service network through AMF, and supports the first authentication.

统一数据管理功能网元:用于生成认证信任状,用户标识处理(如存储和管理用户永久身份等),接入授权控制和签约数据管理等。例如,在5G中,统一数据管理功能网元可以是UDM网元,例如图1所示;在未来通信,如6G中,统一数据管理功能网元仍可以是UDM网元,或有其它的名称,本申请不做限定。当统一数据管理功能网元是UDM网元时,UDM网元可以提供Nudm服务。Unified data management function network element: used to generate authentication credential, user identification processing (such as storing and managing user permanent identity, etc.), access authorization control and contract data management, etc. For example, in 5G, the unified data management function network element can be a UDM network element, such as shown in Figure 1; in future communications, such as in 6G, the unified data management function network element can still be a UDM network element, or have other names , which is not limited in this application. When the unified data management function network element is a UDM network element, the UDM network element can provide Nudm services.

认证服务器功能网元:用于支持UE进行3GPP接入或非3GPP接入的认证功能。例如,在5G中,认证服务器功能网元可以是AUSF网元,例如图1所示;在未来通信,如6G中,认证服务器功能网元仍可以是AUSF网元,或有其它的名称,本申请不做限定。当认证服务器功能网元是AUSF网元时,AUSF网元可以提供Nausf服务。Authentication server function network element: an authentication function used to support UE to perform 3GPP access or non-3GPP access. For example, in 5G, the authentication server function network element can be an AUSF network element, such as shown in Figure 1; in future communications, such as 6G, the authentication server function network element can still be an AUSF network element, or have other names, this Application is not limited. When the authentication server function network element is an AUSF network element, the AUSF network element can provide the Nausf service.

数据网络(data network,DN),指的是为用户提供数据传输服务的服务网络,如IP多媒体业务(IP multi-media service,IMS)、互联网(Internet)等。A data network (DN) refers to a service network that provides data transmission services for users, such as IP multi-media service (IMS) and the Internet.

UE通过UE到DN之间建立的协议数据单元(protocol data unit,PDU)会话,来访问DN。The UE accesses the DN through a protocol data unit (protocol data unit, PDU) session established between the UE and the DN.

其中,核心网中的各个网元也可以称为功能实体或者设备,既可以是在专用硬件上实现的网络元件,也可以是在专用硬件上运行的软件实例,或者是在适当平台上虚拟化功能的实例,例如,上述虚拟化平台可以为云平台。Among them, each network element in the core network can also be called a functional entity or a device, which can be either a network element implemented on dedicated hardware, a software instance running on dedicated hardware, or a virtualization on an appropriate platform. An example of a function, for example, the above-mentioned virtualization platform may be a cloud platform.

需要说明的是,图1所示的通信系统的架构中不限于仅包含图中所示的网元,还可以包含其它未在图中表示的设备,具体本申请在此处不再一一列举。It should be noted that the architecture of the communication system shown in FIG. 1 is not limited to including only the network elements shown in the figure, but may also include other devices not shown in the figure, and the specific application will not list them one by one here. .

需要说明的是,本申请实施例并不限定各个网元的分布形式,图1所示的分布形式只是示例性的,本申请不作限定。It should be noted that the embodiments of the present application do not limit the distribution form of each network element, and the distribution form shown in FIG. 1 is only exemplary, and is not limited in the present application.

为方便说明,本申请后续均以图1所示的网元为例进行说明,并将XX网元直接简称为XX。应理解,本申请中所有网元的名称仅仅作为示例,在未来通信中还可以称为其它名称,或者在未来通信中本申请涉及的网元还可以通过其它具有相同功能的实体或者设备等来替代,本申请对此均不作限定。这里做统一说明,后续不再赘述。For the convenience of description, the following description in this application will take the network element shown in FIG. 1 as an example, and the XX network element is directly abbreviated as XX. It should be understood that the names of all network elements in this application are only examples, and may also be referred to as other names in future communications, or the network elements involved in this application may also be identified by other entities or devices with the same function in future communications. Instead, this application does not limit this. A unified description is made here, and will not be repeated in the future.

需要说明的是,图1所示的通信系统并不构成本申请实施例能够适用的通信系统的限定。图1所示的通信系统架构为5G系统架构,可选的,本申请实施例的方法还适用于未来的各种通信系统,例如6G或者其他通信网络等。It should be noted that the communication system shown in FIG. 1 does not constitute a limitation of the communication system to which the embodiments of the present application can be applied. The communication system architecture shown in FIG. 1 is a 5G system architecture. Optionally, the methods in the embodiments of the present application are also applicable to various future communication systems, such as 6G or other communication networks.

本申请提供的组密钥分发方法可以适用于图1所示的通信系统(移动通信网络)中,提出组通信中组密钥的分发。在本申请中,组管理功能(group management function,GMF)网元用于提供组成员的组信息,组信息用于表示组成员与组的关系,可以包含组标识,成员列表。组标识用于标识一个组。特别的,本申请中,同一个组的所有成员使用相同的组密钥进行通信。例如组标识可以是外部组标识(external group ID),内部组标识(internal  group ID),组成员可以包含终端设备、网络功能(network function,NF)、AF等,成员列表可以是签约永久标识(subscription permanent identifier,SUPI)列表,通用公共签约标识(generic public subscription identifier,GPSI)列表,AF标识列表,NF标识列表等。GMF可以是独立的实体,也可以是AMF,SMF,UDM,PCF,SEAL,AF等。The group key distribution method provided by the present application can be applied to the communication system (mobile communication network) shown in FIG. 1 , and the distribution of the group key in group communication is proposed. In this application, a group management function (GMF) network element is used to provide group information of group members, and the group information is used to indicate the relationship between group members and the group, and may include a group identifier and a member list. Group ID is used to identify a group. In particular, in this application, all members of the same group communicate using the same group key. For example, the group identifier can be an external group identifier (external group ID), an internal group identifier (internal group ID), the group members can include terminal devices, network functions (NF), AF, etc., and the member list can be a contract permanent identifier ( subscription permanent identifier, SUPI) list, generic public subscription identifier (generic public subscription identifier, GPSI) list, AF identifier list, NF identifier list, etc. GMF can be an independent entity, or AMF, SMF, UDM, PCF, SEAL, AF, etc.

组密钥管理功能(group key management function,GKMF)网元用于提供组成员的组密钥信息。组密钥信息用于表示组成员的密钥与组的关系,可以包含组标识,组密钥。可选的,组密钥信息还包含组密钥标识,成员列表。其中,组密钥标识用于标识组密钥,组密钥标识与组标识是一一对应的。组密钥标识也可以与组标识是相同的,此时组密钥标识即是组标识。同一个组的组成员的组密钥是相同的,组密钥用于组内成员的通信保护。GKMF可以是独立的实体,也可以是PCF,UDM,AUSF,SEAL,AAnF等。The group key management function (GKMF) network element is used to provide group key information of group members. The group key information is used to indicate the relationship between the key of the group member and the group, and can include the group ID and the group key. Optionally, the group key information also includes a group key identifier and a member list. The group key identifier is used to identify the group key, and the group key identifier and the group identifier are in one-to-one correspondence. The group key identifier can also be the same as the group identifier, and in this case, the group key identifier is the group identifier. The group key of the group members of the same group is the same, and the group key is used for communication protection of the members in the group. GKMF can be an independent entity or PCF, UDM, AUSF, SEAL, AAnF, etc.

密钥功能(key function,KF)网元是可选网元,KF用于提供组成员的第一密钥。第一密钥是UE和KF在执行双向认证流程完成后生成的,例如可以是根据UE的永久密钥K生成的。KF可以是AUSF,AMF,SEAF,AAnF。当KF是AUSF时,第一密钥可以是K AUSF;当KF是SEAF时,第一密钥可以是K SEAF;当KF是AMF时,第一密钥可以是K AMF;当KF是AAnF时,第一密钥可以是K AFA key function (key function, KF) network element is an optional network element, and the KF is used to provide the first key of the group member. The first key is generated by the UE and the KF after the two-way authentication process is performed, for example, it may be generated according to the permanent key K of the UE. KF can be AUSF, AMF, SEAF, AAnF. When KF is AUSF, the first key may be K AUSF ; when KF is SEAF, the first key may be K SEAF ; when KF is AMF, the first key may be K AMF ; when KF is AAnF , the first key may be K AF .

为了更加清晰地描述本申请实施例的技术方案,下面结合附图,对本申请实施例提供的组密钥分发方法及装置进行详细说明。In order to describe the technical solutions of the embodiments of the present application more clearly, the group key distribution method and apparatus provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

本申请实施例提供的组密钥分发方法,可以适用于图1所示的通信系统,参阅图2所示,该方法的具体流程可以包括:The group key distribution method provided by the embodiment of the present application can be applied to the communication system shown in FIG. 1 . Referring to FIG. 2 , the specific process of the method may include:

步骤201:组密钥管理功能网元获取第一设备的密钥标识。Step 201: The network element of the group key management function obtains the key identifier of the first device.

具体的,所述第一设备可以为组的成员中的任何一个,例如,所述第一设备可以为终端设备等。Specifically, the first device may be any one of the members of the group, for example, the first device may be a terminal device or the like.

示例性的,所述第一设备的密钥标识可以为所述第一设备的标识或者为所述第一设备的密钥集标识。例如,当所述第一设备为终端设备时,所述终端设备的密钥标识可以为终端设备的标识SUPI或GPSI等,也可以为所述终端设备的密钥集标识(key set identifier,KSI)。Exemplarily, the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device. For example, when the first device is a terminal device, the key identifier of the terminal device may be the identifier of the terminal device, such as SUPI or GPSI, or the key set identifier (KSI) of the terminal device. ).

在一种可选的实施方式中,所述组密钥管理功能网元获取第一设备的密钥标识,具体方法可以为:所述组密钥管理功能网元从所述第一设备获取所述第一设备的密钥标识,例如,所述第一设备直接向所述组密钥管理功能网元发送所述第一设备的密钥标识(例如图2中步骤201a示例所示),或者,所述第一设备向中间设备发送所述第一设备的密钥标识,中间设备向组密钥管理功能网元发送所述第一设备的密钥标识;或者,所述组密钥管理功能网元从所述中间设备获取所述第一设备的密钥标识。例如,所述第一设备向所述中间设备发送第一设备的密钥标识,所述中间设备向所述组密钥管理功能网元发送所述第一设备的密钥标识。其中,所述中间设备可以是AMF,SMF,AF,组管理功能网元等。例如,所述中间设备为所述组管理功能网元时,可以如图2中步骤201b示例所示。In an optional implementation manner, the group key management function network element obtains the key identifier of the first device, and the specific method may be: the group key management function network element obtains the key identifier from the first device. The key identifier of the first device, for example, the first device directly sends the key identifier of the first device to the group key management function network element (for example, as shown in the example of step 201a in FIG. 2), or , the first device sends the key identifier of the first device to the intermediate device, and the intermediate device sends the key identifier of the first device to the group key management function network element; or, the group key management function The network element acquires the key identifier of the first device from the intermediate device. For example, the first device sends the key identifier of the first device to the intermediate device, and the intermediate device sends the key identifier of the first device to the group key management function network element. Wherein, the intermediate device may be AMF, SMF, AF, group management function network element, and the like. For example, when the intermediate device is the network element of the group management function, it may be as shown in the example of step 201b in FIG. 2 .

步骤202:所述组密钥管理功能网元获取所述第一设备的组标识。Step 202: The group key management function network element acquires the group identifier of the first device.

在一种可选的实施方式中,所述组密钥管理功能网元获取所述第一设备的组标识,具体方法可以为:所述组密钥管理功能网元从所述中间设备获取所述第一设备的组标识(例如,所述中间设备为所述组管理功能网元时,可以如图2中步骤202a示例所示);或者,所述组密钥管理功能网元从所述第一设备获取所述第一设备的组标识。In an optional implementation manner, the group key management function network element obtains the group identifier of the first device, and the specific method may be: the group key management function network element obtains all the information from the intermediate device. The group identifier of the first device (for example, when the intermediate device is the group management function network element, it may be as shown in the example of step 202a in FIG. 2 ); or, the group key management function network element is obtained from the group key management function network element. The first device acquires the group identifier of the first device.

其中,所述组密钥管理功能网元从所述中间设备获取所述第一设备的组标识时,可以是所述第一设备向所述中间设备的请求触发所述中间设备向所述组密钥管理功能网元发送所述第一设备的组标识,其中,所述第一设备的组标识携带在所述第一设备的请求中。Wherein, when the network element of the group key management function acquires the group identifier of the first device from the intermediate device, it may be that a request from the first device to the intermediate device triggers the intermediate device to send a request to the group The key management function network element sends the group identifier of the first device, wherein the group identifier of the first device is carried in the request of the first device.

例如,当所述中间设备为AF时,所述第一设备可以向所述AF发送应用请求消息,所述应用请求消息中包含第一设备的组标识,由此所述AF向所述组密钥管理功能网元发送所述第一设备的组标识。又例如,当所述中间设备为SMF时,所述第一设备可以向所述SMF发送PDU会话建立请求消息,由此触发所述SMF向所述组密钥管理功能网元发送所述第一设备的组标识。For example, when the intermediate device is an AF, the first device may send an application request message to the AF, where the application request message includes the group identifier of the first device, so that the AF sends the group secret to the AF The key management function network element sends the group identifier of the first device. For another example, when the intermediate device is an SMF, the first device may send a PDU session establishment request message to the SMF, thereby triggering the SMF to send the first device to the group key management function network element The group ID of the device.

步骤203:所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。Step 203: The network element of the group key management function determines a group key according to the group identifier of the first device, and the group key is used to protect the communication content of the members of the group, and the members of the group include the first device. a device.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,具体方法可以为:所述组密钥管理功能网元根据所述组标识从组密钥信息中查询所述组密钥,若所述组密钥信息包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元从所述组密钥信息中获取所述组标识对应的所述组密钥;若所述组密钥信息不包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元生成所述组密钥,并存储所述组标识与所述组密钥的对应关系。In an optional implementation manner, the group key management function network element determines the group key according to the group identifier of the first device, and the specific method may be: the group key management function network element determines the group key according to the The group identifier queries the group key from the group key information, and if the group key information includes the correspondence between the group identifier and the group key, the group key management function network element retrieves the group key from the group key information. Obtain the group key corresponding to the group identifier from the group key information; if the group key information does not include the correspondence between the group identifier and the group key, the group key management function network The element generates the group key, and stores the correspondence between the group identifier and the group key.

示例性的,所述组密钥管理功能网元生成所述组密钥,具体方法可以为:所述组密钥管理功能网元根据根组密钥生成所述组密钥;或者所述组密钥管理功能网元随机生成所述组密钥。Exemplarily, the group key management function network element generates the group key, and the specific method may be: the group key management function network element generates the group key according to the root group key; or the group key management function network element generates the group key; The key management function network element randomly generates the group key.

可选的,所述组密钥管理功能网元可以根据所述组标识确定组密钥标识。例如,所述组密钥管理功能网元根据所述组标识从组密钥信息中查询所述组密钥标识,若所述组密钥信息包括所述组标识与所述组密钥标识的对应关系,则所述组密钥管理功能网元从所述组密钥信息中获取所述组标识对应的所述组密钥标识;若所述组密钥信息不包括所述组标识与所述组密钥标识的对应关系,则所述组密钥管理功能网元生成所述组密钥标识,并存储所述组标识与所述组密钥标识的对应关系。Optionally, the group key management function network element may determine the group key identifier according to the group identifier. For example, the group key management function network element queries the group key identifier from the group key information according to the group identifier, if the group key information includes the difference between the group identifier and the group key identifier If the group key management function network element obtains the group key identifier corresponding to the group identifier from the group key information; if the group key information does not include the group identifier and the If the corresponding relationship between the group key identifiers is determined, the group key management function network element generates the group key identifiers, and stores the corresponding relationship between the group identifiers and the group key identifiers.

例如,所述组密钥管理功能网元可以直接将所述组标识作为所述组密钥标识,或者所述组密钥管理功能网元还可以根据组标识映射一个组密钥标识。可选的,若所述组密钥管理功能网元获得了应用类型(用于指示当前的应用的类型,例如组播广播业务(multicast broadcast service,MBS),ProSe,LCS等)时,所述组密钥管理功能网元可以根据所述组标识和所述应用类型映射一个组密钥标识。所述组密钥管理功能网元可以从所述组管理功能网元获取所述应用类型,或者所述组密钥管理功能网元可以从所述第一设备获取所述应用类型。例如,所述组密钥管理功能网元获得组标识123,所述组密钥管理功能网元可以直接将组标识作为组密钥标识,即123。或者,所述组密钥管理功能网元获得组标识123以及组应用类型MBS,所述组密钥管理功能网元映射一个组密钥标识X1。又例如,所述组密钥管理功能网元获得组标识123以及组应用类型ProSe,所述组密钥管理功能网元映射一个组密钥标识X2。通过使用组密钥标识映射方式可以防止所述组密钥管理功能网元获得的组标识重复时导致的ID冲突。For example, the group key management function network element may directly use the group ID as the group key ID, or the group key management function network element may also map a group key ID according to the group ID. Optionally, if the group key management function network element obtains the application type (used to indicate the type of the current application, such as multicast broadcast service (MBS), ProSe, LCS, etc.), the The network element of the group key management function may map a group key identifier according to the group identifier and the application type. The group key management function network element may acquire the application type from the group management function network element, or the group key management function network element may acquire the application type from the first device. For example, the group key management function network element obtains the group identifier 123 , and the group key management function network element may directly use the group identifier as the group key identifier, that is, 123 . Alternatively, the group key management function network element obtains the group identifier 123 and the group application type MBS, and the group key management function network element maps a group key identifier X1. For another example, the group key management function network element obtains the group identifier 123 and the group application type ProSe, and the group key management function network element maps a group key identifier X2. By using the group key identifier mapping method, ID conflicts caused when the group identifiers obtained by the network element of the group key management function are repeated can be prevented.

示例性的,所述组密钥可以为Kgroup。Exemplarily, the group key may be Kgroup.

步骤204:所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥。Step 204: The group key management function network element determines a protection key according to the key identifier of the first device.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一设备的密钥标识确 定保护密钥,具体可以包括以下几种方法:In an optional implementation manner, the network element of the group key management function determines the protection key according to the key identifier of the first device, which may specifically include the following methods:

方法a1:所述组密钥管理功能网元根据存储的第一设备的密钥标识与保护密钥的对应关系,确定所述第一设备的密钥标识对应的所述保护密钥(如KGKMF)。Method a1: The group key management function network element determines the protection key (such as KGKMF) corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the protection key. ).

方法a2:所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥(如KGKMF);所述组密钥管理功能网元根据所述第二密钥(KGKMF)生成所述保护密钥(如Ktemp)。Method a2: the group key management function network element determines a second key (eg KGKMF) according to the key identifier of the first device; the group key management function network element determines a second key (KGKMF) according to the second key (KGKMF) ) to generate the protection key (eg Ktemp).

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第二密钥(如KGKMF)生成所述保护密钥(如Ktemp),具体方法可以为:所述组密钥管理功能网元根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥(如Ktemp);所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串(例如,“GK”、“GKM”、“GKMF”、“GCSE”等);所述第一接收参数包括以下一项或多项:第一设备的标识(如SUPI、GPSI),第一设备的密钥标识,组标识,应用类型(例如MBS,ProSe,eLCS等),应用标识(用于指示当前的应用,可以是用AF ID的形式表示,也可以用全量域名的形式表示),随机数(RAND),计数器(COUNT),时间戳等;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。In an optional implementation manner, the network element of the group key management function generates the protection key (such as Ktemp) according to the second key (such as KGKMF), and the specific method may be: the group key The key management function network element generates the protection key (such as Ktemp) according to the second key and the generation parameters of the protection key; the generation parameters of the protection key include one or more of the following: first Own parameters, first receiving parameters, first sending parameters; wherein, the first own parameters include preset character strings (for example, "GK", "GKM", "GKMF", "GCSE", etc.); The first receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, the group identification, the application type (such as MBS, ProSe, eLCS, etc.), the application identification (It is used to indicate the current application, which can be expressed in the form of AF ID or in the form of a full domain name), random number (RAND), counter (COUNT), timestamp, etc.; the first sending parameters include the following One or more items: group key ID, nonce, counter, timestamp.

其中,所述第一自有参数为所述组密钥管理功能网元和所述第一设备已有的参数。The first self-owned parameter is an existing parameter of the group key management function network element and the first device.

具体的,所述组密钥管理功能网元可以从所述第一设备或组管理功能网元接收第一接收参数指示,并根据所述第一接收参数指示获取所述第一接收参数。Specifically, the group key management function network element may receive the first reception parameter indication from the first device or the group management function network element, and obtain the first reception parameter according to the first reception parameter indication.

具体的,所述组密钥管理功能网元向所述第一设备发送第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。Specifically, the group key management function network element sends a first sending parameter indication to the first device, where the first sending parameter indication is used to indicate the first sending parameter.

在上述方法中,使用所述应用类型和/或所述应用标识作为保护密钥的生成参数,使得所述组密钥管理功能网元即使使用同一个第一设备的第二密钥在为不同应用生成组密钥时,可以生成不同的保护密钥。In the above method, the application type and/or the application identifier are used as the generation parameters of the protection key, so that the network element of the group key management function is different even if the second key of the same first device is used. When an app generates a group key, it can generate different protection keys.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥(如KGKMF),具体方法可以为:所述组密钥管理功能网元根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者所述组密钥管理功能网元从密钥功能网元获取第一密钥;之后,所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥(如KGKMF)。或者,所述组密钥管理功能网元根据存储的第一设备的密钥标识与第二密钥的对应关系,确定所述第一设备的密钥标识对应的第二密钥。In an optional implementation manner, the network element of the group key management function determines a second key (eg KGKMF) according to the key identifier of the first device, and the specific method may be: the group key management The functional network element determines, according to the stored correspondence between the key identifier of the first device and the first key, the first key corresponding to the key identifier of the first device; or the group key management function network element from the The key function network element obtains the first key; then, the group key management function network element generates the second key (eg KGKMF) according to the first key. Alternatively, the group key management function network element determines the second key corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the second key.

示例性的,所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥(如KGKMF),具体方法可以为:所述组密钥管理功能网元根据所述第一密钥和所述第二密钥(如KGKMF)的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串(例如:“GK”、“GKM”、“GKMF”、“GCSE”等);所述第二接收参数包括以下一项或多项:第一设备的标识(如SUPI、GPSI),第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数(RAND),计数器(COUNT),时间戳等。Exemplarily, the group key management function network element generates the second key (such as KGKMF) according to the first key, and the specific method may be: the group key management function network element generates the second key according to the first key. A key and the generation parameters of the second key (such as KGKMF) generate the second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second key Receiving parameters, second sending parameters; wherein, the second self-owned parameters include preset character strings (for example: "GK", "GKM", "GKMF", "GCSE", etc.); the second receiving parameters include One or more of the following: the identifier of the first device (such as SUPI, GPSI), the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second transmission parameter includes one or more of the following Items: random numbers (RAND), counters (COUNT), timestamps, etc.

具体的,所述组密钥管理功能网元从所述第一设备或组管理功能网元接收第二接收参 数指示,并根据所述第二接收参数指示获取所述第二接收参数。Specifically, the group key management function network element receives the second reception parameter indication from the first device or the group management function network element, and obtains the second reception parameter according to the second reception parameter indication.

具体的,所述组密钥管理功能网元向所述第一设备或组管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Specifically, the group key management function network element sends a second transmission parameter indication to the first device or the group management function network element, where the second transmission parameter indication is used to indicate the second transmission parameter.

其中,在上述使用预设字符串作为第二密钥的推演的参数,可以防止生成的第二密钥与第一设备已有的其他密钥重复。例如,现有技术中使用Kausf、SUPI、字符串“AKMA”生成Kakma,为使得第二密钥与Kakma不同,可以使用Kausf、SUPI、不同于“AKMA”的字符串推衍获得第二密钥。同时,自有参数无需传递,可以减少传输复杂度。Wherein, using the preset character string as a parameter of the derivation of the second key in the above-mentioned manner can prevent the generated second key from duplicating other keys existing in the first device. For example, in the prior art, Kausf, SUPI, and the string "AKMA" are used to generate Kakma. In order to make the second key different from Kakma, the second key can be derived by using Kausf, SUPI, and a string different from "AKMA". . At the same time, own parameters do not need to be passed, which can reduce the transmission complexity.

使用第一设备的标识,第一设备的密钥标识的情况下,即使在不同的第一设备持有相同根密钥的情况下,在引入第一设备的标识,第一设备的密钥标识后,不同第一设备可以使用相同密钥推演出不同的第二密钥。In the case of using the identity of the first device, the key identity of the first device, even if different first devices hold the same root key, when the identity of the first device is introduced, the key identity of the first device Afterwards, different first devices can use the same key to deduce different second keys.

使用组标识可以即使使用同一第一设备的根密钥在为不同组生成密钥时,也可以生成不同的第二密钥。The use of the group identification makes it possible to generate different second keys even when the same first device's root key is used to generate keys for different groups.

使用随机数,计数器、时间戳的情况下,可以防止连续两次生成的第二密钥重复。例如,若使用COUNT进行第一次推衍,推衍完成后COUNT+1,那么第二次推衍使用增加的COUNT值,两次生成的第二密钥将不同。In the case of using random numbers, counters, and timestamps, it is possible to prevent the duplication of the second key generated twice in a row. For example, if COUNT is used for the first derivation, and after the derivation is completed, COUNT+1, then the second derivation uses the increased COUNT value, and the second key generated twice will be different.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一设备的密钥标识从所述密钥功能网元获取所述第二密钥(如KGKMF)。具体的,所述密钥功能网元从组密钥管理功能网元接收第一设备的密钥标识,根据第一设备的密钥标识确定第一密钥,根据所述第一密钥确定第二密钥(如KGKMF);所述密钥功能网元向组密钥管理功能网元发送所述第二密钥(如KGKMF)。In an optional implementation manner, the group key management function network element obtains the second key (eg KGKMF) from the key function network element according to the key identifier of the first device. Specifically, the key function network element receives the key identifier of the first device from the group key management function network element, determines the first key according to the key identifier of the first device, and determines the first key according to the first key. Second key (eg KGKMF); the key function network element sends the second key (eg KGKMF) to the group key management function network element.

具体的,所述密钥功能网元根据所述第一密钥确定所述第二密钥(如KGKMF)的方法,与所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥(如KGKMF)的方法相同,可以相互参见,此处不再详细描述。Specifically, the method for the key function network element to determine the second key (eg KGKMF) according to the first key, and the method for the group key management function network element to generate the second key according to the first key. The method for describing the second key (such as KGKMF) is the same, which can be referred to each other, and will not be described in detail here.

方法a3:所述组密钥管理功能网元根据所述第一设备的密钥标识确定第一密钥;所述组密钥管理功能网元根据所述第一密钥生成所述保护密钥(如KGKMF)。Method a3: the group key management function network element determines a first key according to the key identifier of the first device; the group key management function network element generates the protection key according to the first key (eg KGKMF).

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一设备的密钥标识确定第一密钥,具体方法可以为:所述组密钥管理功能网元根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者所述组密钥管理功能网元从密钥功能网元获取第一密钥。In an optional implementation manner, the group key management function network element determines the first key according to the key identifier of the first device, and the specific method may be: the group key management function network element determines the first key according to the key identifier of the first device. The stored correspondence between the key identifier of the first device and the first key, to determine the first key corresponding to the key identifier of the first device; or the group key management function network element is obtained from the key function network Meta gets the first key.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述第一密钥生成所述保护密钥(如KGKMF),具体方法可以为:所述组密钥管理功能网元根据所述第一密钥和所述保护密钥(如KGKMF)的生成参数生成所述保护密钥;所述保护密钥的生成参数可以包括以下一项或多项:所述保护密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串(例如:“GK”、“GKM”、“GKMF”、“GCSE”等);所述第二接收参数包括以下一项或多项:第一设备的标识(如SUPI、GPSI),第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数(RAND),计数器(COUNT),时间戳等。In an optional implementation manner, the group key management function network element generates the protection key (eg KGKMF) according to the first key, and the specific method may be: the group key management function network element The element generates the protection key according to the generation parameters of the first key and the protection key (such as KGKMF); the generation parameters of the protection key may include one or more of the following: the protection key The generated parameters include one or more of the following: second own parameters, second receiving parameters, second sending parameters; wherein, the second own parameters include preset character strings (for example: "GK", "GKM" ", "GKMF", "GCSE", etc.); the second receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, the group identification, the random number, counter, time stamp; the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), time stamp and so on.

方法a4:所述组密钥管理功能网元根据所述第一设备的密钥标识从密钥功能网元获取所述保护密钥(如KGKMF或Ktemp)。例如,可以以图2中可选的步骤204a示出。Method a4: The group key management function network element obtains the protection key (eg KGKMF or Ktemp) from the key function network element according to the key identifier of the first device. For example, this may be shown as optional step 204a in FIG. 2 .

其中,所述密钥功能网元中存储有第一设备的密钥标识与保护密钥(如KGKMF)的 对应关系。或者所述密钥功能网元确定第二密钥后,根据所述第二密钥(如KGKMF)确定保护密钥(如Ktemp);所述密钥功能网元向组密钥管理功能网元发送所述保护密钥。所述密钥功能网元中存储有第一设备的密钥标识与第一密钥的对应关系。Wherein, the key function network element stores the correspondence between the key identifier of the first device and the protection key (such as KGKMF). Or after the key function network element determines the second key, a protection key (such as Ktemp) is determined according to the second key (such as KGKMF); the key function network element reports to the group key management function network element. Send the protection key. The key function network element stores the correspondence between the key identifier of the first device and the first key.

具体的,所述密钥功能网元确定所述第二密钥(如KGKMF)的方法可以参见方法a3中的相关描述。Specifically, for the method for determining the second key (eg, KGKMF) by the key function network element, reference may be made to the relevant description in method a3.

具体的,所述密钥功能网元所述第二密钥(如KGKMF)确定保护密钥(如Ktemp)的方法,与上述方法a3中涉及的所述组密钥管理功能网元根据所述第二密钥(如KGKMF)生成所述保护密钥(如Ktemp)的方法相同,可以相互参见,此处不再详细描述。Specifically, the method for determining the protection key (such as Ktemp) by the second key (such as KGKMF) of the key function network element is the same as that of the group key management function network element involved in the above method a3 according to the The method for generating the protection key (eg Ktemp) by the second key (eg KGKMF) is the same, which can be referred to each other, and will not be described in detail here.

需要说明的是,上述KGKMF可以直接作为保护密钥;KGKMF也可以作为第二密钥,进而获得保护密钥Ktemp。It should be noted that the above-mentioned KGKMF can be directly used as a protection key; KGKMF can also be used as a second key to obtain the protection key Ktemp.

示例性的,所述第一密钥可以为K AUSF或K SEAF或K AMF或K AFExemplarily, the first key may be K AUSF or K SEAF or K AMF or K AF .

步骤205:所述组密钥管理功能网元根据所述组密钥和所述保护密钥生成组密钥参数。Step 205: The group key management function network element generates a group key parameter according to the group key and the protection key.

在一种可选的实施方式中,所述组密钥管理功能网元根据所述组密钥和所述保护密钥(如KGKMF或Ktemp)生成组密钥参数(例如DerPara),具体方法可以为:所述组密钥管理功能网元根据所述组密钥、所述保护密钥和第一算法生成所述组密钥参数,所述第一算法为可逆算法。In an optional implementation manner, the network element of the group key management function generates a group key parameter (for example, DerPara) according to the group key and the protection key (for example, KGKMF or Ktemp), and the specific method may be as follows: The steps are: the group key management function network element generates the group key parameter according to the group key, the protection key and a first algorithm, where the first algorithm is a reversible algorithm.

示例性的,所述第一算法可以为以下算法中的一种:异或、同或、加、减、加密。其中,相对应的逆算法为:异或、同或、减、加、解密。加密算法可以包含高级加密标准(advanced encryption standard,AES),SNOW,祖冲之算法ZUC等。Exemplarily, the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption. The corresponding inverse algorithms are: XOR, XOR, subtraction, addition, and decryption. The encryption algorithm may include advanced encryption standard (AES), SNOW, Zu Chongzhi's algorithm ZUC, etc.

步骤206:所述组密钥管理功能网元向所述第一设备发送所述组密钥参数。Step 206: The group key management function network element sends the group key parameter to the first device.

可选的,所述组密钥管理功能网元向所述第一设备发送组密钥标识。Optionally, the group key management function network element sends a group key identifier to the first device.

步骤207:所述第一设备根据所述组密钥参数和保护密钥确定所述组密钥。Step 207: The first device determines the group key according to the group key parameter and the protection key.

在一种可选的实施方式中,所述第一设备根据所述组密钥参数和保护密钥确定所述组密钥之前,所述第一设备根据第一密钥生成第二密钥(KGKMF),根据所述第二密钥生成所述保护密钥(如Ktemp)。In an optional implementation manner, before the first device determines the group key according to the group key parameter and the protection key, the first device generates a second key ( KGKMF), the protection key (eg Ktemp) is generated according to the second key.

具体的,所述组密钥管理功能网元根据所述第二密钥(KGKMF)生成保护密钥(如Ktemp)的方法与步骤204中所述组密钥管理功能网元根据所述第二密钥生成保护密钥的方法类似,可以相互参见,此处不再详细描述。Specifically, the method for the group key management function network element to generate a protection key (eg Ktemp) according to the second key (KGKMF) and the method for the group key management function network element in step 204 according to the second key (KGKMF) The methods for generating and protecting keys are similar, and can refer to each other, and will not be described in detail here.

具体的,所述第一设备根据所述第一密钥生成第二密钥的方法与步骤204中所述组密钥管理功能网元根据所述第一密钥生成第二密钥的方法类似,可以相互参见,此处不再详细描述。Specifically, the method for the first device to generate the second key according to the first key is similar to the method for the group key management function network element to generate the second key according to the first key in step 204 , can refer to each other, and will not be described in detail here.

在另一种可选的实施方式中,所述第一设备根据所述组密钥参数和保护密钥确定所述组密钥之前,所述第一设备根据第一密钥生成保护密钥(KGKMF)。In another optional implementation manner, before the first device determines the group key according to the group key parameter and the protection key, the first device generates a protection key ( KGKMF).

具体的,所述第一设备根据第一密钥生成保护密钥(KGKMF)的方法,与步骤204所述组密钥管理功能网元根据所述第一密钥生成所述保护密钥(如KGKMF)的方法类似,可以相互参见,此处不再详细描述。Specifically, the method for the first device to generate a protection key (KGKMF) according to the first key is the same as the method for generating the protection key (eg, the group key management function network element in step 204) according to the first key. KGKMF) method is similar, can refer to each other, and will not be described in detail here.

可选的,所述第一设备根据所述组密钥参数和所述保护密钥确定所述组密钥,具体方法可以为:所述第一设备根据所述保护密钥、所述组密钥参数和第二算法确定所述组密钥(如Kgroup),所述第二算法与所述第一算法对应的逆算法。Optionally, the first device determines the group key according to the group key parameter and the protection key, and the specific method may be: the first device determines the group key according to the protection key, the group key The key parameter and a second algorithm determine the group key (eg, Kgroup), and the second algorithm is an inverse algorithm corresponding to the first algorithm.

示例性的,所述第二算法可以为以下算法中的一种:异或、同或、加、减、解密。Exemplarily, the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.

具体的,所述第一设备在获得所述组密钥(Kgroup)后,可以与组内成员使用Kgroup保护通信的内容。其中,组内通信可以是ProSe通信,基于临近的服务通信5((proximity-based services,ProSe)communication 5,PC5)通信,V2X通信,基于RAN的本地交换,基于UPF的本地交换,MBS通信,广播通信或LCS通信等。可选的,第一设备还获得了组密钥标识。组内成员使用Kgroup以及组密钥标识对组内通信进行保护。例如,若组内成员AF向UE1,UE2发送组通信数据,则AF使用Kgroup或者通过Kgroup衍生的密钥和加密算法对通信内容进行加密,使用Kgroup或者通过Kgroup衍生的密钥和完整性保护算法对通信内容进行完整性保护,然后广播组密钥标识以及保护的通信内容。UE1,UE2根据组密钥标识获得Kgroup,使用Kgroup或者通过Kgroup衍生的密钥和加密算法对通信内容进行解密,使用Kgroup或者通过Kgroup衍生的密钥和完整性保护算法对通信内容进行完整性校验。Specifically, after obtaining the group key (Kgroup), the first device can use Kgroup to protect the content of communication with members in the group. Wherein, intra-group communication can be ProSe communication, proximity-based service communication 5 ((proximity-based services, ProSe) communication 5, PC5) communication, V2X communication, RAN-based local exchange, UPF-based local exchange, MBS communication, Broadcast communication or LCS communication, etc. Optionally, the first device also obtains the group key identifier. Members of the group use Kgroup and group key identification to protect intra-group communication. For example, if a member AF in the group sends group communication data to UE1 and UE2, the AF encrypts the communication content using Kgroup or a key and an encryption algorithm derived from Kgroup, and uses Kgroup or a key and an integrity protection algorithm derived from Kgroup. The integrity of the communication content is protected, and then the group key identification and the protected communication content are broadcast. UE1 and UE2 obtain the Kgroup according to the group key identifier, use Kgroup or the key and encryption algorithm derived from Kgroup to decrypt the communication content, and use Kgroup or the key and integrity protection algorithm derived from Kgroup to perform integrity checking on the communication content. test.

可选的,在UE1不具备广播的组密钥标识的情况下,UE1向组密钥管理功能网元请求获得组密钥标识对应的组密钥。如此,使得UE1对通信内容进行解密和/或完整性校验。Optionally, when the UE1 does not have the broadcasted group key identifier, the UE1 requests the network element of the group key management function to obtain the group key corresponding to the group key identifier. In this way, the UE1 can decrypt and/or check the integrity of the communication content.

上述方法中,针对不同的组成员,通过使用组成员与移动网络已经存在的一对一的密钥来为多个组成员共享的组密钥生成组密钥参数,对于不同的组成员可以产生不同的组密钥参数,因此,即使组密钥参数明文传输,由于攻击者不具备该密钥,也无法从组密钥参数获得组密钥。In the above method, for different group members, a group key parameter is generated for the group key shared by a plurality of group members by using the existing one-to-one key between the group member and the mobile network, which can be generated for different group members. Different group key parameters, so even if the group key parameter is transmitted in clear text, since the attacker does not have the key, the group key cannot be obtained from the group key parameter.

本申请引入了移动网络中统一的组密钥管理功能网元,实现了组密钥的保存和分发,组密钥管理功能网元可以从不同的组管理网元获得第一设备的组信息,还可以从第一设备获得组的成员信息,并且可以根据组的成员信息从密钥功能网元获得第一设备UE在移动网络中已有的密钥信息,然后通过已有移动网络中的密钥以及一些相关的传输参数来保护密钥的分发过程。The present application introduces a unified group key management function network element in the mobile network to realize the storage and distribution of the group key, and the group key management function network element can obtain the group information of the first device from different group management network elements, The member information of the group can also be obtained from the first device, and the existing key information of the first device UE in the mobile network can be obtained from the key function network element according to the member information of the group, and then the key information in the existing mobile network can be obtained. key and some related transmission parameters to protect the key distribution process.

采用本申请提供的密钥分发方法,通过组密钥参数来保护组密钥的分发,提高了组密钥分发的安全性,从而可以提高组通信的安全性。By using the key distribution method provided by the present application, the distribution of the group key is protected by the group key parameter, the security of the group key distribution is improved, and the security of the group communication can be improved.

基于以上实施例,下面通过具体的示例对本申请提供的组密钥分发方法进行详细说明。在以下的示例中,以第一设备为UE,组密钥管理功能网元为GKMF为例说明。Based on the above embodiments, the group key distribution method provided by the present application will be described in detail below through specific examples. In the following example, the first device is the UE and the network element of the group key management function is the GKMF as an example for description.

图3示出了本申请提供的一种组密钥分发方法的示例,在该示例中,以组管理功能GMF网元为AF,以密钥功能KF网元为AUSF为例进行详细说明。具体的,该示例的流程可以为:FIG. 3 shows an example of a group key distribution method provided by the present application. In this example, the group management function GMF network element is AF, and the key function KF network element is AUSF as an example for detailed description. Specifically, the process of this example can be:

步骤301:UE向AF发送应用请求消息(app request),所述应用请求消息用于请求获得应用服务。Step 301: The UE sends an application request message (app request) to the AF, where the application request message is used to request to obtain an application service.

步骤302:GKMF获得所述UE的密钥标识2和组标识2。Step 302: GKMF obtains the key ID 2 and the group ID 2 of the UE.

其中,所述AF向所述GKMF发送UE的密钥标识1和组标识1,GKMF获得密钥标识2和组标识2。可选的,所述AF还向GKMF发送应用标识。所述AF可以从应用请求消息中获得所述UE的密钥标识1和组标识1。所述AF也可以根据应用请求消息获得所述UE的上下文,并从所述UE的上下文中获得所述UE的密钥标识1和组标识1。所述AF可以根据所述UE当前访问的应用获得所述应用标识。The AF sends the key identifier 1 and the group identifier 1 of the UE to the GKMF, and the GKMF obtains the key identifier 2 and the group identifier 2. Optionally, the AF also sends the application identifier to the GKMF. The AF may obtain the key ID 1 and the group ID 1 of the UE from the application request message. The AF may also obtain the context of the UE according to the application request message, and obtain the key ID 1 and the group ID 1 of the UE from the context of the UE. The AF may obtain the application identifier according to the application currently accessed by the UE.

一种可选的方式中,若所述AF直接与所述GKMF通信,则所述GKMF获得的所述UE的所述密钥标识2和所述组标识2即为所述密钥标识1和所述组标识1。所述密钥标识 1可以是SUPI,所述组标识1可以是内部组ID(internal group ID)。In an optional way, if the AF directly communicates with the GKMF, the key identifier 2 and the group identifier 2 of the UE obtained by the GKMF are the key identifier 1 and the group identifier 2. The group identifies 1. The key identifier 1 may be SUPI, and the group identifier 1 may be an internal group ID (internal group ID).

另一种可选的方式中,若所述AF通过NEF与所述GKMF通信,则所述NEF可以在获得所述UE的所述密钥标识1和所述组标识1后,将所述UE的所述密钥标识1映射为所述UE的所述密钥标识2,和/或将所述组标识1映射为所述UE的所述组标识2。然后所述NEF向所述GKMF发送所述UE的所述密钥标识2,和/或所述组标识2。例如,所述密钥标识1为GPSI,所述组标识1为外部组ID(external group ID),所述密钥标识2为SUPI,所述组标识2为internal group ID。In another optional manner, if the AF communicates with the GKMF through the NEF, the NEF may transfer the UE to the UE after obtaining the key identifier 1 and the group identifier 1 of the UE. The key identifier 1 of the UE is mapped to the key identifier 2 of the UE, and/or the group identifier 1 is mapped to the group identifier 2 of the UE. Then the NEF sends the key ID 2 and/or the group ID 2 of the UE to the GKMF. For example, the key identifier 1 is GPSI, the group identifier 1 is an external group ID (external group ID), the key identifier 2 is SUPI, and the group identifier 2 is an internal group ID.

步骤303:所述GKMF根据所述组标识2确定组密钥Kgroup。Step 303: The GKMF determines the group key Kgroup according to the group identifier 2.

具体的,所述GKMF根据所述组标识2确定组密钥Kgroup的方法可以参考图2所示的实施例步骤203中的具体实现方法,此处不再详细描述。Specifically, for the method for determining the group key Kgroup by the GKMF according to the group identifier 2, reference may be made to the specific implementation method in step 203 of the embodiment shown in FIG. 2 , which will not be described in detail here.

步骤304:所述GKMF向AUSF发送所述UE的所述密钥标识2,以请求获得所述UE的KGKMF。Step 304: The GKMF sends the key identifier 2 of the UE to the AUSF to request to obtain the KGKMF of the UE.

此时,所述KGKMF在不同的情况下,可以为上述第二密钥或者为上述保护密钥。At this time, the KGKMF may be the above-mentioned second key or the above-mentioned protection key under different circumstances.

可选的,所述GKMF还可以向所述AUSF发送第二接收参数指示,所述第二接收参数指示用于指示所述第二接收参数。Optionally, the GKMF may also send a second reception parameter indication to the AUSF, where the second reception parameter indication is used to indicate the second reception parameter.

步骤305:所述AUSF根据所述UE的密钥标识2获得所述KGKMF。Step 305: the AUSF obtains the KGKMF according to the key identifier 2 of the UE.

所述AUSF根据所述UE的密钥标识2获取K AUSF(即上述涉及的第一密钥)。 The AUSF obtains the K AUSF (that is, the first key involved in the above) according to the key identifier 2 of the UE.

具体的,所述KGKMF可以是所述AUSF根据K AUSF(即上述涉及的第一密钥)生成的。具体的,所述AUSF根据所述K AUSF(即上述涉及的第一密钥)生成所述KGKMF的具体方法可以为:所述AUSF根据所述K AUSF和所述KGKMF的生成参数生成所述KGKMF;所述KGKMF的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串(例如:“GK”、“GKM”、“GKMF”、“GCSE”等);所述第二接收参数包括以下一项或多项:第一设备的标识(如SUPI、GPSI),第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数(RAND),计数器(COUNT),时间戳等。 Specifically, the KGKMF may be generated by the AUSF according to the K AUSF (that is, the first key involved in the above). Specifically, the specific method for the AUSF to generate the KGKMF according to the K AUSF (that is, the above-mentioned first key) may be: the AUSF generates the KGKMF according to the K AUSF and the generation parameters of the KGKMF ; The generation parameters of the KGKMF include one or more of the following: the second own parameter, the second receiving parameter, the second sending parameter; wherein, the second own parameter includes a preset character string (for example: "GK ", "GKM", "GKMF", "GCSE", etc.); the second receiving parameter includes one or more of the following: the identification of the first device (such as SUPI, GPSI), the key identification of the first device, Group ID, random number, counter, timestamp; the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), timestamp, etc.

其中,所述KGKMF的生成也可以在步骤304之前提前生成。Wherein, the generation of the KGKMF may also be generated in advance before step 304 .

步骤306:所述AUSF向所述GKMF发送所述KGKMF。Step 306: The AUSF sends the KGKMF to the GKMF.

可选的,所述AUSF还可以向所述GKMF发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Optionally, the AUSF may also send a second transmission parameter indication to the GKMF, where the second transmission parameter indication is used to indicate the second transmission parameter.

步骤307:所述GKMF根据所述KGKMF和所述Kgroup确定组密钥参数DerPara。Step 307: The GKMF determines the group key parameter DerPara according to the KGKMF and the Kgroup.

一种方式中,所述GKMF根据所述KGKMF、所述Kgroup和第一算法确定所述DerPara。此种情况下,所述KGKMF作为所述保护密钥。In one way, the GKMF determines the DerPara according to the KGKMF, the Kgroup and the first algorithm. In this case, the KGKMF is used as the protection key.

另一种方式中,所述GKMF根据所述KGKMF确定Ktemp,然后所述GKMF根据所述Ktemp、所述Kgroup和第一算法确定所述DerPara。此种情况中,所述KGKMF作为第二密钥,所述Ktemp作为所述保护密钥。In another manner, the GKMF determines Ktemp according to the KGKMF, and then the GKMF determines the DerPara according to the Ktemp, the Kgroup and the first algorithm. In this case, the KGKMF is used as the second key, and the Ktemp is used as the protection key.

其中,所述GKMF根据所述KGKMF确定Ktemp的方法可以参考上述图2所示的实施例步骤204中涉及的所述组密钥管理功能网元根据所述第二密钥(如KGKMF)生成所述保护密钥(如Ktemp)的实现方法,此处不再详细描述。Wherein, the method for determining Ktemp by the GKMF according to the KGKMF may refer to the group key management function network element involved in step 204 in the embodiment shown in FIG. The implementation method of the protection key (such as Ktemp) described above will not be described in detail here.

其中所述第一算法的描述也可以参见上述图2所示的实施例中涉及的第一算法的相关描述,此处不重复描述。For the description of the first algorithm, reference may also be made to the related description of the first algorithm involved in the embodiment shown in FIG. 2 , and the description is not repeated here.

步骤308:所述GKMF向所述AF发送所述DerPara。Step 308: The GKMF sends the DerPara to the AF.

可选的,所述GKMF还可以向所述AF发送组密钥标识。Optionally, the GKMF may also send a group key identifier to the AF.

可选的,所述GKMF还可以向所述AF发送第一发送参数指示和/或第二发送参数指示。Optionally, the GKMF may also send the first transmission parameter indication and/or the second transmission parameter indication to the AF.

例如,所述GKMF还可以向所述UE发送组标识2。For example, the GKMF may also send group identity 2 to the UE.

示例性的,所述GKMF还可以向所述AF发送所述Kgroup和所述组密钥标识。Exemplarily, the GKMF may also send the Kgroup and the group key identifier to the AF.

步骤309:所述AF向所述UE发送应用响应消息,所述应用响应消息包含所述DerPara。Step 309: The AF sends an application response message to the UE, where the application response message includes the DerPara.

可选的,所述应用响应消息还可以包含所述组密钥标识、所述第一发送参数指示或所述第二发送参数指示中的一项或多项。Optionally, the application response message may further include one or more of the group key identifier, the first transmission parameter indication or the second transmission parameter indication.

步骤310:所述UE根据所述DerPara确定所述Kgroup。Step 310: the UE determines the Kgroup according to the DerPara.

具体的,所述UE根据所述DerPara确定所述Kgroup的方法,可以参见上述图2所示的实施例步骤207中涉及的相关描述,此处不再详细描述。Specifically, for the method for the UE to determine the Kgroup according to the DerPara, reference may be made to the relevant description involved in step 207 of the embodiment shown in FIG. 2 , which will not be described in detail here.

步骤311:所述UE使用所述Kgroup进行组通信,实现所述UE使用Kgroup保护通信的内容。Step 311: The UE uses the Kgroup to perform group communication, so that the UE uses the Kgroup to protect the content of the communication.

具体的,所述UE使用Kgroup保护通信的内容的相关描述可以参见图2所示的实施例步骤207中涉及的相关描述,此处不再详细描述。Specifically, for the relevant description of the content that the UE uses Kgroup to protect the communication, reference may be made to the relevant description involved in step 207 of the embodiment shown in FIG. 2 , which will not be described in detail here.

上述示例,结合具体的场景描述了通过组密钥参数来保护组密钥的分发,提高了组密钥分发的安全性,从而可以提高组通信的安全性。The above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication.

图4示出了本申请提供的另一种组密钥分发方法的示例,在该示例中,以组管理功能GMF网元为AF,以密钥功能KF网元为AUSF,GKMF为PCF或者UDM为例进行详细说明。具体的,该示例的流程可以为:Fig. 4 shows an example of another group key distribution method provided by the present application. In this example, the group management function GMF network element is used as AF, the key function KF network element is used as AUSF, and the GKMF is used as PCF or UDM Take an example to describe in detail. Specifically, the process of this example can be:

步骤401-步骤405与图3所示的实施例中步骤301-305相同,可以互相参见,此处不再重复赘述。Steps 401 to 405 are the same as steps 301 to 305 in the embodiment shown in FIG. 3 , and may refer to each other, and will not be repeated here.

步骤406与图3所示的实施例中步骤306相同,可以互相参见,此处不再重复赘述。Step 406 is the same as step 306 in the embodiment shown in FIG. 3 , and can be referred to each other, and details are not repeated here.

可选的,在该步骤406中,所述AUSF还可以向所述GKMF发送AMF的标识,所述AMF的标识可以是所述AUSF从存储的上下文中根据UE访问的AMF获得的。Optionally, in this step 406, the AUSF may also send an AMF identifier to the GKMF, where the AMF identifier may be obtained by the AUSF from the stored context according to the AMF accessed by the UE.

步骤407与图3所示的实施例中步骤307相同,可以互相参见,此处不再重复赘述。Step 407 is the same as step 307 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.

步骤408:所述GKMF向AMF发送所述UE的标识和所述DerPara。Step 408: The GKMF sends the identity of the UE and the DerPara to the AMF.

其中,所述UE的标识可以是SUPI,所述UE的标识是所述GKMF根据所述UE的密钥标识2(Key ID2)获得的。Wherein, the identifier of the UE may be SUPI, and the identifier of the UE is obtained by the GKMF according to the key identifier 2 (Key ID2) of the UE.

可选的,所述GKMF还可以向所述AMF发送组密钥标识。Optionally, the GKMF may also send a group key identifier to the AMF.

可选的,所述GKMF还可以向所述AMF发送第一发送参数指示和第二发送参数指示。Optionally, the GKMF may also send the first sending parameter indication and the second sending parameter indication to the AMF.

例如,所述GKMF还可以向所述AMF发送组标识2。For example, the GKMF may also send the group ID 2 to the AMF.

可选的,所述GKMF根据所述AMF的标识向所述AMF发送上述参数。Optionally, the GKMF sends the above parameters to the AMF according to the identity of the AMF.

步骤409:所述GKMF向所述AF发送确认消息。Step 409: The GKMF sends a confirmation message to the AF.

可选的,所述确认消息可以包含所述Kgroup和所述组密钥标识。其中,所述GKMF可以等到所述AMF反馈后,向所述AF发送所述确认消息。Optionally, the confirmation message may include the Kgroup and the group key identifier. Wherein, the GKMF may send the confirmation message to the AF after the AMF feedback.

步骤410:所述AMF向所述UE发送下行非接入层(non access stratum,NAS)消息,所述下行NAS消息包含所述DerPara。其中,所述AMF根据所述UE的标识找到所述UE,并下发所述下行NAS消息。Step 410: The AMF sends a downlink non-access stratum (non access stratum, NAS) message to the UE, where the downlink NAS message includes the DerPara. Wherein, the AMF finds the UE according to the identity of the UE, and delivers the downlink NAS message.

可选的,所述下行NAS消息还可以包含组密钥标识,第一发送参数指示和第二发送参数指示。Optionally, the downlink NAS message may further include a group key identifier, a first transmission parameter indication and a second transmission parameter indication.

例如,所述下行NAS消息还可以包含组标识2。For example, the downlink NAS message may further include the group identifier 2 .

可选的,若所述AMF无法向所述UE发送下行NAS消息,则所述AMF回复所述GKMF失败,此时所述GKMF不向所述AF发送步骤409中的所述确认消息,可发送失败消息。Optionally, if the AMF cannot send the downlink NAS message to the UE, the AMF fails to reply to the GKMF. At this time, the GKMF does not send the confirmation message in step 409 to the AF, and can send failure message.

具体的,所述下行NAS消息可以是下行NAS传输消息,或者UE配置更新请求命令消息。Specifically, the downlink NAS message may be a downlink NAS transmission message or a UE configuration update request command message.

可选的,所述下行NAS传输消息包含UE策略容器,所述UE策略容器包含UE路由选择策略(UE route selection policy,URSP),所述URSP可以包含应用标识,组密钥标识以及所述DerPara。Optionally, the downlink NAS transmission message includes a UE policy container, and the UE policy container includes a UE route selection policy (UE route selection policy, URSP), and the URSP may include an application identifier, a group key identifier, and the DerPara .

步骤411:所述AF向所述UE发送应用响应消息。Step 411: The AF sends an application response message to the UE.

步骤412-步骤413与图3所示的实施例中步骤310-311相同,可以互相参见,此处不再重复赘述。Steps 412 to 413 are the same as steps 310 to 311 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.

上述示例,结合具体的场景描述了通过组密钥参数来保护组密钥的分发,提高了组密钥分发的安全性,从而可以提高组通信的安全性。同时,GKMF可以借助UE与AMF的控制面隧道向UE发送DerPara,可以不改动3GPP范围外的UE与AF的用户面协议。The above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication. At the same time, the GKMF can send DerPara to the UE by means of the control plane tunnel between the UE and the AMF, without changing the user plane protocol between the UE and the AF outside the scope of 3GPP.

图5示出了本申请提供的另一种组密钥分发方法的示例,在该示例中,以组管理功能GMF网元为SMF为例进行详细说明。具体的,该示例的流程可以为:FIG. 5 shows an example of another group key distribution method provided by the present application. In this example, the group management function GMF network element is an SMF as an example for detailed description. Specifically, the process of this example can be:

步骤501:UE向SMF发送协议数据单元(protocol data unit,PDU)会话建立请求消息,所述PDU会话建立请求消息用于请求建立PDU会话。Step 501: The UE sends a protocol data unit (protocol data unit, PDU) session establishment request message to the SMF, where the PDU session establishment request message is used to request the establishment of a PDU session.

可选的,所述PDU会话建立请求可以包含组密钥请求指示,所述组密钥请求指示用于请求获得组密钥。其中,所述组密钥请求指示可以是一个显示指示,也可以是隐式指示。例如,所述隐式指示可以是应用类型,当所述应用类型指示特定的应用时(如MBS),所述SMF触发请求获得所述UE的组密钥。可选的,所述PDU会话建立请求消息中还可以包含组标识。Optionally, the PDU session establishment request may include a group key request indication, where the group key request indication is used to request to obtain a group key. The group key request indication may be an explicit indication or an implicit indication. For example, the implicit indication may be an application type, and when the application type indicates a specific application (eg, MBS), the SMF triggers a request to obtain the UE's group key. Optionally, the PDU session establishment request message may further include a group identifier.

步骤502:所述SMF向所述GKMF发送所述UE的标识以及组标识。Step 502: The SMF sends the identifier of the UE and the group identifier to the GKMF.

其中,所述SMF可以通过密钥请求(key request)消息向所述GKMF发送所述UE的标识以及组标识。Wherein, the SMF may send the identifier of the UE and the group identifier to the GKMF through a key request (key request) message.

其中,所述SMF根据所述PDU会话请求消息确定所述UE的上下文信息,从所述UE的上下文信息中获得所述UE的标识SUPI。The SMF determines the context information of the UE according to the PDU session request message, and obtains the identity SUPI of the UE from the context information of the UE.

可选的,所述SMF从所述PDU会话建立请求消息中获得所述组标识,或者,所述SMF向UDM请求获得所述UE的签约信息,所述UE的签约信息包含所述UE的组标识。具体的,所述SMF向所述UDM发送所述UE的SUPI,所述UDM根据所述SUPI获得所述UE对应的所述组标识,并向所述SMF返回所述组标识。Optionally, the SMF obtains the group identifier from the PDU session establishment request message, or the SMF requests the UDM to obtain the subscription information of the UE, and the subscription information of the UE includes the group of the UE. logo. Specifically, the SMF sends the SUPI of the UE to the UDM, and the UDM obtains the group identifier corresponding to the UE according to the SUPI, and returns the group identifier to the SMF.

可选的,所述SMF根据所述组密钥请求指示触发向所述GKMF发送所述UE的标识以及所述组标识。Optionally, the SMF triggers sending the identifier of the UE and the group identifier to the GKMF according to the group key request indication.

步骤503:所述GKMF根据所述组标识确定组密钥Kgroup。Step 503: The GKMF determines the group key Kgroup according to the group identifier.

具体的,所述GKMF根据所述组标识确定组密钥Kgroup的方法可以参考图2所示的实施例步骤203中的具体实现方法,此处不再详细描述。Specifically, for the method for determining the group key Kgroup by the GKMF according to the group identifier, reference may be made to the specific implementation method in step 203 of the embodiment shown in FIG. 2 , which will not be described in detail here.

步骤504:所述GKMF向KF发送所述UE的标识,以请求获得所述UE的KGKMF。Step 504: The GKMF sends the identifier of the UE to the KF to request to obtain the KGKMF of the UE.

此时,所述KGKMF在不同的情况下,可以为上述第二密钥或者为上述保护密钥。At this time, the KGKMF may be the above-mentioned second key or the above-mentioned protection key under different circumstances.

具体的,所述GKMF可以通过密钥请求(key request)消息向所述KF发送所述UE的标识。Specifically, the GKMF may send the identifier of the UE to the KF through a key request (key request) message.

步骤505:所述KF根据所述UE的标识确定所述KGKMF。Step 505: The KF determines the KGKMF according to the identifier of the UE.

所述KF根据所述UE的标2获取第一密钥。具体的,所述KGKMF可以是所述KF根据第一密钥生成的。The KF obtains the first key according to the target 2 of the UE. Specifically, the KGKMF may be generated by the KF according to the first key.

具体的,所述KF根据所述第一密钥生成所述KGKMF的具体方法可以为:所述KF根据所述第一密钥和所述KGKMF的生成参数生成所述KGKMF;所述KGKMF的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串(例如:“GK”、“GKM”、“GKMF”、“GCSE”等);所述第二接收参数包括以下一项或多项:第一设备的标识(如SUPI、GPSI),第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数(RAND),计数器(COUNT),时间戳等。Specifically, the specific method for the KF to generate the KGKMF according to the first key may be: the KF generates the KGKMF according to the first key and the generation parameters of the KGKMF; the generation of the KGKMF The parameters include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string (for example: "GK", "GKM", "GKMF", "GCSE", etc.); the second receiving parameter includes one or more of the following: the identifier of the first device (such as SUPI, GPSI), the key identifier of the first device, the group identifier, the random number, Counter, timestamp; the second transmission parameter includes one or more of the following: random number (RAND), counter (COUNT), timestamp and so on.

步骤506:所述KF向所述GKMF发送所述KGKMF。Step 506: The KF sends the KGKMF to the GKMF.

步骤507:所述GKMF根据所述KGKMF和所述Kgroup确定组密钥参数DerPara。Step 507: The GKMF determines the group key parameter DerPara according to the KGKMF and the Kgroup.

一种方式中,所述GKMF根据所述KGKMF、所述Kgroup和第一算法确定所述DerPara。此种情况下,所述KGKMF作为所述保护密钥。In one way, the GKMF determines the DerPara according to the KGKMF, the Kgroup and the first algorithm. In this case, the KGKMF is used as the protection key.

另一种方式中,所述GKMF根据所述KGKMF确定Ktemp,然后所述GKMF根据所述Ktemp、所述Kgroup和第一算法确定所述DerPara。此种情况中,所述KGKMF作为第二密钥,所述Ktemp作为所述保护密钥。In another manner, the GKMF determines Ktemp according to the KGKMF, and then the GKMF determines the DerPara according to the Ktemp, the Kgroup and the first algorithm. In this case, the KGKMF is used as the second key, and the Ktemp is used as the protection key.

其中,所述GKMF根据所述KGKMF确定Ktemp的方法可以参考上述图2所示的实施例步骤204中涉及的所述组密钥管理功能网元根据所述第二密钥(如KGKMF)生成所述保护密钥(如Ktemp)的实现方法,此处不再详细描述。Wherein, the method for determining Ktemp by the GKMF according to the KGKMF may refer to the group key management function network element involved in step 204 in the embodiment shown in FIG. The implementation method of the protection key (such as Ktemp) described above will not be described in detail here.

其中所述第一算法的描述也可以参见上述图2所示的实施例中涉及的第一算法的相关描述,此处不重复描述。For the description of the first algorithm, reference may also be made to the related description of the first algorithm involved in the embodiment shown in FIG. 2 , and the description is not repeated here.

步骤508:所述GKMF向所述SMF发送所述DerPara。Step 508: The GKMF sends the DerPara to the SMF.

可选的,所述GKMF还可以向所述SMF发送组密钥标识。Optionally, the GKMF may also send a group key identifier to the SMF.

可选的,所述GKMF还可以向所述SMF发送第一发送参数指示和/或第二发送参数指示。例如,所述GKMF还可以向所述UE发送组标识2。Optionally, the GKMF may also send the first transmission parameter indication and/or the second transmission parameter indication to the SMF. For example, the GKMF may also send group identity 2 to the UE.

步骤509:所述SMF向所述UE发送PDU会话建立接受消息,所述PDU会话建立接受消息包含所述DerPara。Step 509: The SMF sends a PDU session establishment accept message to the UE, where the PDU session establishment accept message includes the DerPara.

可选的,所述PDU会话建立接受消息还可以包含组密钥标识。Optionally, the PDU session establishment accept message may further include a group key identifier.

可选的,所述PDU会话建立接受消息还可以包含第一发送参数指示和/或第二发送参数指示。Optionally, the PDU session establishment accept message may further include the first transmission parameter indication and/or the second transmission parameter indication.

步骤510-步骤511与图3所示的实施例中步骤310-311相同,可以互相参见,此处不再重复赘述。Steps 510 to 511 are the same as steps 310 to 311 in the embodiment shown in FIG. 3 , which can be referred to each other, and will not be repeated here.

上述示例,结合具体的场景描述了通过组密钥参数来保护组密钥的分发,提高了组密钥分发的安全性,从而可以提高组通信的安全性。The above example describes, in combination with a specific scenario, that the distribution of the group key is protected by the group key parameter, which improves the security of the group key distribution, thereby improving the security of the group communication.

基于上述实施例,本申请实施例还提供了一种组密钥分发装置。可以参阅图6所示,所述组密钥分发装置600可以包括收发单元601和处理单元602。其中,所述收发单元601用于所述组密钥分发装置600接收信息(消息或数据)或发送信息(消息或数据),所述处理单元602用于对所述组密钥分发装置600的动作进行控制管理。所述处理单元602还可以控制所述收发单元601执行的步骤。Based on the above embodiments, the embodiments of the present application further provide a group key distribution apparatus. As shown in FIG. 6 , the group key distribution apparatus 600 may include a transceiver unit 601 and a processing unit 602 . Wherein, the transceiver unit 601 is used for the group key distribution apparatus 600 to receive information (message or data) or send information (message or data), and the processing unit 602 is used for the transmission of the group key distribution apparatus 600 Actions are controlled and managed. The processing unit 602 may also control the steps performed by the transceiving unit 601 .

示例性的,该组密钥分发装置600可以是上述实施例中的组密钥管理功能网元,具体可以是所述组密钥管理功能网元中的处理器,或者芯片或者芯片系统,或者是一个功能模块等;或者,该组密钥分发装置600可以是上述实施例中的第一设备,具体可以是第一设备中的处理器,或者芯片或者芯片系统,或者是一个功能模块等;或者,该组密钥分发装置600可以是上述实施例中的密钥功能网元,具体可以是所述密钥功能网元中的处理器,或者芯片或者芯片系统,或者是一个功能模块等。Exemplarily, the group key distribution apparatus 600 may be the group key management function network element in the foregoing embodiment, and specifically may be a processor, or a chip or a chip system in the group key management function network element, or is a functional module, etc.; or, the group of key distribution apparatuses 600 may be the first device in the above-mentioned embodiment, and specifically may be a processor in the first device, or a chip or a chip system, or a functional module, etc.; Alternatively, the set of key distribution apparatuses 600 may be a key function network element in the above embodiment, and may specifically be a processor, a chip or a chip system, or a function module in the key function network element.

在一个实施例中,在组密钥分发装置600用于实现上述实施例中组密钥管理功能网元(例如GKMF)的功能时,具体可以包括:In one embodiment, when the group key distribution apparatus 600 is used to implement the function of the group key management function network element (eg GKMF) in the above embodiment, it may specifically include:

所述处理单元602用于获取第一设备的密钥标识;获取所述第一设备的组标识;根据所述第一设备的组标识确定组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备;根据所述第一设备的密钥标识确定保护密钥;根据所述组密钥和所述保护密钥生成组密钥参数;所述收发单元601用于向所述第一设备发送所述组密钥参数。The processing unit 602 is configured to acquire the key identifier of the first device; acquire the group identifier of the first device; determine a group key according to the group identifier of the first device, and the group key is used to protect the Communication content of members, the members of the group include the first device; determine a protection key according to the key identifier of the first device; generate a group key parameter according to the group key and the protection key; The transceiver unit 601 is configured to send the group key parameter to the first device.

在一种可选的实施方式中,所述处理单元602在根据所述第一设备的组标识确定组密钥时,具体用于:根据所述组标识从组密钥信息中查询所述组密钥,若所述组密钥信息包括所述组标识与所述组密钥的对应关系,则从所述组密钥信息中获取所述组标识对应的所述组密钥;若所述组密钥信息不包括所述组标识与所述组密钥的对应关系,则生成所述组密钥。In an optional implementation manner, when determining the group key according to the group identifier of the first device, the processing unit 602 is specifically configured to: query the group from group key information according to the group identifier key, if the group key information includes the correspondence between the group identifier and the group key, obtain the group key corresponding to the group identifier from the group key information; If the group key information does not include the corresponding relationship between the group identifier and the group key, the group key is generated.

具体的,所述处理单元602在生成所述组密钥时,具体用于:根据根组密钥生成所述组密钥。Specifically, when generating the group key, the processing unit 602 is specifically configured to: generate the group key according to the root group key.

在一个示例中,所述处理单元602在根据所述第一设备的密钥标识确定保护密钥时,具体用于:根据存储的第一设备的密钥标识与保护密钥的对应关系,确定所述第一设备的密钥标识对应的所述保护密钥;或者,根据所述第一设备的密钥标识从密钥功能网元获取所述保护密钥。In an example, when determining the protection key according to the key identifier of the first device, the processing unit 602 is specifically configured to: determine, according to the stored correspondence between the key identifier of the first device and the protection key, to determine the protection key. The protection key corresponding to the key identifier of the first device; or, obtaining the protection key from a key function network element according to the key identifier of the first device.

另一个示例中,所述处理单元602在根据所述第一设备的密钥标识确定保护密钥时,具体用于:根据所述第一设备的密钥标识确定第二密钥;根据所述第二密钥生成所述保护密钥。In another example, when determining the protection key according to the key identifier of the first device, the processing unit 602 is specifically configured to: determine the second key according to the key identifier of the first device; The second key generates the protection key.

具体的,所述处理单元602在根据所述第二密钥生成所述保护密钥时,具体用于:根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when generating the protection key according to the second key, the processing unit 602 is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key ; The generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string; the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp; the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.

可选的,所述收发单元601还用于从所述第一设备或组管理功能网元接收第一接收参数指示;所述处理单元602还用于根据所述第一接收参数指示获取所述第一接收参数。Optionally, the transceiver unit 601 is further configured to receive a first reception parameter indication from the first device or group management function network element; the processing unit 602 is further configured to obtain the first reception parameter indication according to the first reception parameter indication. The first receive parameter.

可选的,所述收发单元601还用于向所述第一设备发送第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。Optionally, the transceiver unit 601 is further configured to send a first transmission parameter indication to the first device, where the first transmission parameter indication is used to indicate the first transmission parameter.

具体的,所述处理单元602在根据所述第一设备的密钥标识确定第二密钥时,具体用于:根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者控制所述收发单元601从密钥功能网元获取第一密钥;根据所述第一密钥生成所述第二密钥。Specifically, when determining the second key according to the key identifier of the first device, the processing unit 602 is specifically configured to: determine according to the stored correspondence between the key identifier of the first device and the first key The key identifier of the first device corresponds to the first key; or the transceiver unit 601 is controlled to obtain the first key from the key function network element; and the second key is generated according to the first key.

示例性的,所述处理单元602在根据所述第一密钥生成所述第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。Exemplarily, when generating the second key according to the first key, the processing unit 602 is specifically configured to: generate the second key according to the generation parameters of the first key and the second key. The second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following One or more items: nonce, counter, timestamp.

可选的,所述收发单元601还用于从所述第一设备或组管理功能网元接收第二接收参数指示;所述处理单元602还用于根据所述第二接收参数指示获取所述第二接收参数。Optionally, the transceiver unit 601 is further configured to receive a second reception parameter indication from the first device or group management function network element; the processing unit 602 is further configured to obtain the second reception parameter indication according to the second reception parameter indication. The second receive parameter.

可选的,所述收发单元601还用于向所述第一设备或组管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Optionally, the transceiver unit 601 is further configured to send a second sending parameter indication to the first device or the network element of the group management function, where the second sending parameter indication is used to indicate the second sending parameter.

一种可选的实施方式中,所述第一密钥为K AUSF或K SEAF或K AMF或K AFIn an optional implementation manner, the first key is K AUSF or K SEAF or K AMF or K AF .

在一种具体的方式中,所述处理单元602在根据所述组密钥和所述保护密钥生成组密钥参数时,具体用于:根据所述组密钥、所述保护密钥和第一算法生成所述组密钥参数,所述第一算法为可逆算法。In a specific manner, when generating the group key parameter according to the group key and the protection key, the processing unit 602 is specifically configured to: according to the group key, the protection key and the protection key The first algorithm generates the set of key parameters, and the first algorithm is a reversible algorithm.

可选的,所述第一算法可以为以下算法中的一种:异或、同或、加、减、加密。Optionally, the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.

示例性的,所述第一设备的密钥标识可以为所述第一设备的标识或者为所述第一设备的密钥集标识。Exemplarily, the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.

在一种可选的实施方式中,所述处理单元602在获取第一设备的密钥标识时,具体用于:控制所述收发单元601从所述第一设备获取所述第一设备的密钥标识;或者,控制所述收发单元601从组管理功能网元获取所述第一设备的密钥标识。In an optional implementation manner, when acquiring the key identifier of the first device, the processing unit 602 is specifically configured to: control the transceiver unit 601 to acquire the encryption key of the first device from the first device or, control the transceiver unit 601 to obtain the key identifier of the first device from the group management function network element.

在一种可选的实施方式中,所述处理单元602在获取所述第一设备的组标识时,具体用于:控制所述收发单元601从组管理功能网元获取所述第一设备的组标识;或者,控制所述收发单元601从所述第一设备获取所述第一设备的组标识。In an optional implementation manner, when acquiring the group identifier of the first device, the processing unit 602 is specifically configured to: control the transceiver unit 601 to acquire the first device's group identifier from the group management function network element. group identifier; or, control the transceiver unit 601 to acquire the group identifier of the first device from the first device.

在另一个实施例中,在组密钥分发装置600用于实现上述实施例中第一设备(例如UE)的功能时,具体可以包括:In another embodiment, when the group key distribution apparatus 600 is used to implement the function of the first device (eg, UE) in the foregoing embodiment, it may specifically include:

所述收发单元601用于从组密钥管理功能网元接收组密钥参数;所述处理单元602用于根据所述组密钥参数和保护密钥确定所述组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。The transceiver unit 601 is configured to receive the group key parameter from the network element of the group key management function; the processing unit 602 is configured to determine the group key according to the group key parameter and the protection key, and the group key The key is used to protect the content of communications of members of a group that includes the first device.

在一种可选的实施方式中,所述处理单元602还用于:根据第一密钥生成第二密钥;根据所述第二密钥生成所述保护密钥。In an optional implementation manner, the processing unit 602 is further configured to: generate a second key according to the first key; and generate the protection key according to the second key.

具体的,所述处理单元602在根据所述第二密钥生成保护密钥时,具体用于:根据所述第二密钥和保护密钥的生成参数生成所述保护密钥;所述保护密钥生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括 预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when generating the protection key according to the second key, the processing unit 602 is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key; the protection key The key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein the first self-owned parameter includes a preset character string; the first receiving parameter includes One or more of the following: first device identifier, first device key identifier, group identifier, application type, application identifier, random number, counter, timestamp; the first sending parameter includes one or more of the following : Group key ID, nonce, counter, timestamp.

可选的,所述收发单元601还用于向从所述组密钥管理功能网元发送第一接收参数指示,所述第一接收参数指示用于指示所述第一接收参数。Optionally, the transceiver unit 601 is further configured to send a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.

可选的,所述收发单元601还用于从所述组密钥管理功能网元接收第一发送参数指示;所述处理单元602还用于根据所述第一发送参数指示获取所述第二发送参数。Optionally, the transceiver unit 601 is further configured to receive a first transmission parameter indication from the group key management function network element; the processing unit 602 is further configured to obtain the second transmission parameter indication according to the first transmission parameter indication. Send parameters.

在一种可选的实施方式中,所述处理单元602在根据所述第一密钥生成第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数确定所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。In an optional implementation manner, when generating the second key according to the first key, the processing unit 602 is specifically configured to: generate according to the first key and the second key The parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter The parameter includes a preset character string; the second receiving parameter includes one or more of the following: an identification of the first device, a key identification of the first device, a group identification, a random number, a counter, and a timestamp; the second Send parameters include one or more of the following: random number, counter, timestamp.

可选的,所述收发单元601还用于向所述组密钥管理功能网元发送第二接收参数指示,所述第二接收参数指示用于指示所述第二接收参数。Optionally, the transceiver unit 601 is further configured to send a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.

可选的,所述收发单元601还用于从所述组密钥管理功能网元接收第二发送参数指示;所述处理单元602还用于根据所述第二发送参数指示获取所述第一发送参数。Optionally, the transceiver unit 601 is further configured to receive a second transmission parameter indication from the group key management function network element; the processing unit 602 is further configured to obtain the first transmission parameter indication according to the second transmission parameter indication. Send parameters.

具体的,所述处理单元602在根据所述组密钥参数和所述保护密钥确定所述组密钥时,具体用于:根据所述保护密钥、所述组密钥参数和第二算法确定所述组密钥,所述第二算法为可逆算法。Specifically, when determining the group key according to the group key parameter and the protection key, the processing unit 602 is specifically configured to: according to the protection key, the group key parameter and the second The algorithm determines the group key, and the second algorithm is a reversible algorithm.

可选的,所述第二算法可以为以下算法中的一种:异或、同或、加、减、解密。Optionally, the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.

示例性的,所述第一密钥可以为K AUSF或K SEAF或K AMF或K AFExemplarily, the first key may be K AUSF or K SEAF or K AMF or K AF .

在一种可选的实施方式中,所述收发单元601还用于:向所述组密钥管理功能网元发送第一设备的密钥标识;或者,通过组管理功能网元向所述组密钥管理功能网元发送所述第一设备的密钥标识和组标识。In an optional implementation manner, the transceiver unit 601 is further configured to: send the key identifier of the first device to the group key management function network element; or, send the group key management function network element to the group The key management function network element sends the key identifier and group identifier of the first device.

可选的,所述第一设备的密钥标识为所述第一设备的标识或者为所述第一设备的密钥集标识。Optionally, the key identifier of the first device is an identifier of the first device or a key set identifier of the first device.

在另一个实施例中,在组密钥分发装置600用于实现上述实施例中密钥功能网元(例如KF、AUSF)的功能时,具体可以包括:In another embodiment, when the group key distribution apparatus 600 is used to implement the function of the key function network element (eg KF, AUSF) in the above embodiment, it may specifically include:

所述收发单元601用于从组密钥管理功能网元接收第一设备的密钥标识;所述处理单元602用于根据第一设备的密钥标识确定第一密钥;根据所述第一密钥确定第二密钥。The transceiver unit 601 is configured to receive the key identifier of the first device from the group key management function network element; the processing unit 602 is configured to determine the first key according to the key identifier of the first device; The key determines the second key.

具体的,所述处理单元602在根据所述第一密钥确定所述第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。Specifically, when determining the second key according to the first key, the processing unit 602 is specifically configured to: generate the first key according to the generation parameters of the first key and the second key Second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following one Item or items: nonce, counter, timestamp.

可选的,所述收发单元601还用于从第一设备或所述组密钥管理功能网元接收第二接收参数指示;所述处理单元602还用于根据所述第二接收参数指示获取所述第二接收参数。Optionally, the transceiver unit 601 is further configured to receive a second reception parameter indication from the first device or the network element of the group key management function; the processing unit 602 is further configured to obtain the indication according to the second reception parameter the second received parameter.

可选的,所述收发单元601还用于向第一设备或所述组密钥管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Optionally, the transceiver unit 601 is further configured to send a second transmission parameter indication to the first device or the network element of the group key management function, where the second transmission parameter indication is used to indicate the second transmission parameter.

可选的,所述处理单元602还用于根据所述第二密钥确定保护密钥;所述收发单元601还用于向组密钥管理功能网元发送所述保护密钥。Optionally, the processing unit 602 is further configured to determine a protection key according to the second key; the transceiver unit 601 is further configured to send the protection key to a network element with a group key management function.

具体的,所述处理单元602在根据所述第二密钥确定所述保护密钥时,具体用于:根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when determining the protection key according to the second key, the processing unit 602 is specifically configured to: generate the protection key according to the second key and the generation parameter of the protection key ; The generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string; the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp; the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.

可选的,所述收发单元601还用于从所述第一设备或组密钥管理功能网元接收所述第一接收参数指示;所述处理单元602还用于根据所述第一接收参数指示获取所述第一接收参数。Optionally, the transceiver unit 601 is further configured to receive the first reception parameter indication from the first device or the network element of the group key management function; the processing unit 602 is further configured to receive the first reception parameter according to the first reception parameter Instruct to acquire the first reception parameter.

可选的,所述收发单元601还用于向所述第一设备或组密钥管理功能网元发送所述第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。Optionally, the transceiver unit 601 is further configured to send the first sending parameter indication to the first device or the network element with the group key management function, where the first sending parameter indication is used to indicate the first sending parameter.

示例性的,所述收发单元601还用于向组密钥管理功能网元发送所述第二密钥。Exemplarily, the transceiver unit 601 is further configured to send the second key to the network element of the group key management function.

可选的,所述第一密钥可以为K AUSF或K SEAF或K AMF或K AFOptionally, the first key may be K AUSF or K SEAF or K AMF or K AF .

需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。在本申请的实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and other division methods may be used in actual implementation. Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the methods in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .

基于上述实施例,本申请实施例还提供了一种组密钥分发装置。可以参阅图7所示,组密钥分发装置700可以包括收发器701和处理器702。可选的,组密钥分发装置700中还可以包括存储器703。其中,存储器703可以设置于组密钥分发装置700内部,还可以设置于组密钥分发装置700外部。其中,处理器702可以控制收发器701接收和发送数据或信息等。Based on the above embodiments, the embodiments of the present application further provide a group key distribution apparatus. As shown in FIG. 7 , the group key distribution apparatus 700 may include a transceiver 701 and a processor 702 . Optionally, the group key distribution apparatus 700 may further include a memory 703 . The memory 703 may be arranged inside the group key distribution apparatus 700 or outside the group key distribution apparatus 700 . The processor 702 may control the transceiver 701 to receive and transmit data or information.

具体的,处理器702可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合。处理器702还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其 任意组合。Specifically, the processor 702 may be a central processing unit (central processing unit, CPU), a network processor (network processor, NP), or a combination of CPU and NP. The processor 702 may further include hardware chips. The above-mentioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof. The above-mentioned PLD can be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.

其中,收发器701、处理器702和存储器703之间相互连接。可选的,收发器701、处理器702和存储器703通过总线704相互连接;总线704可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The transceiver 701 , the processor 702 and the memory 703 are connected to each other. Optionally, the transceiver 701, the processor 702 and the memory 703 are connected to each other through a bus 704; the bus 704 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) ) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of presentation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.

在一种可选的实施方式中,存储器703,用于存放程序等。具体地,程序可以包括程序代码,该程序代码包括计算机操作指令。存储器703可能包括RAM,也可能还包括非易失性存储器(non-volatile memory),例如一个或多个磁盘存储器。处理器702执行存储器703所存放的应用程序,实现上述功能,从而实现组密钥分发装置700的功能。In an optional implementation manner, the memory 703 is used to store programs and the like. Specifically, the program may include program code, the program code including computer operation instructions. Memory 703 may include RAM, and may also include non-volatile memory, such as one or more disk memories. The processor 702 executes the application program stored in the memory 703 to realize the above-mentioned functions, thereby realizing the function of the group key distribution apparatus 700 .

示例性的,该组密钥分发装置700可以是上述组密钥管理功能网元、第一设备或者密钥功能网元。Exemplarily, the group key distribution apparatus 700 may be the above-mentioned group key management function network element, the first device or the key function network element.

在一个实施例中,在组密钥分发装置700用于实现上述实施例中组密钥管理功能网元(例如GKMF)的功能时,具体可以包括:In one embodiment, when the group key distribution apparatus 700 is used to implement the function of the group key management function network element (eg GKMF) in the above embodiment, it may specifically include:

所述处理器702用于获取第一设备的密钥标识;获取所述第一设备的组标识;根据所述第一设备的组标识确定组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备;根据所述第一设备的密钥标识确定保护密钥;根据所述组密钥和所述保护密钥生成组密钥参数;所述收发器701用于向所述第一设备发送所述组密钥参数。The processor 702 is configured to acquire the key identifier of the first device; acquire the group identifier of the first device; determine a group key according to the group identifier of the first device, and the group key is used to protect the Communication content of members, the members of the group include the first device; determine a protection key according to the key identifier of the first device; generate a group key parameter according to the group key and the protection key; The transceiver 701 is configured to send the group key parameter to the first device.

在一种可选的实施方式中,所述处理器702在根据所述第一设备的组标识确定组密钥时,具体用于:根据所述组标识从组密钥信息中查询所述组密钥,若所述组密钥信息包括所述组标识与所述组密钥的对应关系,则从所述组密钥信息中获取所述组标识对应的所述组密钥;若所述组密钥信息不包括所述组标识与所述组密钥的对应关系,则生成所述组密钥。In an optional implementation manner, when determining the group key according to the group identifier of the first device, the processor 702 is specifically configured to: query the group from group key information according to the group identifier key, if the group key information includes the correspondence between the group identifier and the group key, obtain the group key corresponding to the group identifier from the group key information; If the group key information does not include the corresponding relationship between the group identifier and the group key, the group key is generated.

具体的,所述处理器702在生成所述组密钥时,具体用于:根据根组密钥生成所述组密钥。Specifically, when generating the group key, the processor 702 is specifically configured to: generate the group key according to the root group key.

在一个示例中,所述处理器702在根据所述第一设备的密钥标识确定保护密钥时,具体用于:根据存储的第一设备的密钥标识与保护密钥的对应关系,确定所述第一设备的密钥标识对应的所述保护密钥;或者,根据所述第一设备的密钥标识从密钥功能网元获取所述保护密钥。In an example, when determining the protection key according to the key identifier of the first device, the processor 702 is specifically configured to: determine, according to the stored correspondence between the key identifier of the first device and the protection key, to determine the protection key. The protection key corresponding to the key identifier of the first device; or, obtaining the protection key from a key function network element according to the key identifier of the first device.

另一个示例中,所述处理器702在根据所述第一设备的密钥标识确定保护密钥时,具体用于:根据所述第一设备的密钥标识确定第二密钥;根据所述第二密钥生成所述保护密钥。In another example, when determining the protection key according to the key identifier of the first device, the processor 702 is specifically configured to: determine the second key according to the key identifier of the first device; The second key generates the protection key.

具体的,所述处理器702在根据所述第二密钥生成所述保护密钥时,具体用于:根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when generating the protection key according to the second key, the processor 702 is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key ; The generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string; the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp; the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.

可选的,所述收发器701还用于从所述第一设备或组管理功能网元接收第一接收参数指示;所述处理器702还用于根据所述第一接收参数指示获取所述第一接收参数。Optionally, the transceiver 701 is further configured to receive a first reception parameter indication from the first device or group management function network element; the processor 702 is further configured to obtain the first reception parameter indication according to the first reception parameter indication. The first receive parameter.

可选的,所述收发器701还用于向所述第一设备发送第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。Optionally, the transceiver 701 is further configured to send a first transmission parameter indication to the first device, where the first transmission parameter indication is used to indicate the first transmission parameter.

具体的,所述处理器702在根据所述第一设备的密钥标识确定第二密钥时,具体用于:根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者控制所述收发器701从密钥功能网元获取第一密钥;根据所述第一密钥生成所述第二密钥。Specifically, when determining the second key according to the key identifier of the first device, the processor 702 is specifically configured to: determine according to the stored correspondence between the key identifier of the first device and the first key The key identifier of the first device corresponds to the first key; or the transceiver 701 is controlled to obtain the first key from the key function network element; and the second key is generated according to the first key.

示例性的,所述处理器702在根据所述第一密钥生成所述第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。Exemplarily, when generating the second key according to the first key, the processor 702 is specifically configured to: generate the second key according to the generation parameters of the first key and the second key. The second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following One or more items: nonce, counter, timestamp.

可选的,所述收发器701还用于从所述第一设备或组管理功能网元接收第二接收参数指示;所述处理器702还用于根据所述第二接收参数指示获取所述第二接收参数。Optionally, the transceiver 701 is further configured to receive a second reception parameter indication from the first device or group management function network element; the processor 702 is further configured to obtain the second reception parameter indication according to the second reception parameter indication. The second receive parameter.

可选的,所述收发器701还用于向所述第一设备或组管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Optionally, the transceiver 701 is further configured to send a second transmission parameter indication to the first device or group management function network element, where the second transmission parameter indication is used to indicate the second transmission parameter.

一种可选的实施方式中,所述第一密钥为K AUSF或K SEAF或K AMF或K AFIn an optional implementation manner, the first key is K AUSF or K SEAF or K AMF or K AF .

在一种具体的方式中,所述处理器702在根据所述组密钥和所述保护密钥生成组密钥参数时,具体用于:根据所述组密钥、所述保护密钥和第一算法生成所述组密钥参数,所述第一算法为可逆算法。In a specific manner, when generating the group key parameter according to the group key and the protection key, the processor 702 is specifically configured to: according to the group key, the protection key and the protection key The first algorithm generates the set of key parameters, and the first algorithm is a reversible algorithm.

可选的,所述第一算法可以为以下算法中的一种:异或、同或、加、减、加密。Optionally, the first algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption.

示例性的,所述第一设备的密钥标识可以为所述第一设备的标识或者为所述第一设备的密钥集标识。Exemplarily, the key identifier of the first device may be an identifier of the first device or a key set identifier of the first device.

在一种可选的实施方式中,所述处理器702在获取第一设备的密钥标识时,具体用于:控制所述收发器701从所述第一设备获取所述第一设备的密钥标识;或者,控制所述收发器701从组管理功能网元获取所述第一设备的密钥标识。In an optional implementation manner, when acquiring the key identifier of the first device, the processor 702 is specifically configured to: control the transceiver 701 to acquire the encryption key of the first device from the first device or, control the transceiver 701 to obtain the key identifier of the first device from the group management function network element.

在一种可选的实施方式中,所述处理器702在获取所述第一设备的组标识时,具体用于:控制所述收发器701从组管理功能网元获取所述第一设备的组标识;或者,控制所述收发器701从所述第一设备获取所述第一设备的组标识。In an optional implementation manner, when acquiring the group identifier of the first device, the processor 702 is specifically configured to: control the transceiver 701 to acquire the group identifier of the first device from the group management function network element. group identifier; or, controlling the transceiver 701 to obtain the group identifier of the first device from the first device.

在另一个实施例中,在组密钥分发装置700用于实现上述实施例中第一设备(例如UE)的功能时,具体可以包括:In another embodiment, when the group key distribution apparatus 700 is configured to implement the function of the first device (eg, UE) in the foregoing embodiment, it may specifically include:

所述收发器701用于从组密钥管理功能网元接收组密钥参数;所述处理器702用于根据所述组密钥参数和保护密钥确定所述组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。The transceiver 701 is configured to receive the group key parameter from the group key management function network element; the processor 702 is configured to determine the group key according to the group key parameter and the protection key, and the group key The key is used to protect the content of communications of members of a group that includes the first device.

在一种可选的实施方式中,所述处理器702还用于:根据第一密钥生成第二密钥;根据所述第二密钥生成所述保护密钥。In an optional implementation manner, the processor 702 is further configured to: generate a second key according to the first key; and generate the protection key according to the second key.

具体的,所述处理器702在根据所述第二密钥生成保护密钥时,具体用于:根据所述第二密钥和保护密钥的生成参数生成所述保护密钥;所述保护密钥生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预 设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when generating the protection key according to the second key, the processor 702 is specifically configured to: generate the protection key according to the second key and the generation parameters of the protection key; the protection key The key generation parameters include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein the first self-owned parameter includes a preset character string; the first receiving parameter includes One or more of the following: first device identifier, first device key identifier, group identifier, application type, application identifier, random number, counter, timestamp; the first sending parameter includes one or more of the following : Group key ID, nonce, counter, timestamp.

可选的,所述收发器701还用于向从所述组密钥管理功能网元发送第一接收参数指示,所述第一接收参数指示用于指示所述第一接收参数。Optionally, the transceiver 701 is further configured to send a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter.

可选的,所述收发器701还用于从所述组密钥管理功能网元接收第一发送参数指示;所述处理器702还用于根据所述第一发送参数指示获取所述第二发送参数。Optionally, the transceiver 701 is further configured to receive a first transmission parameter indication from the group key management function network element; the processor 702 is further configured to obtain the second transmission parameter indication according to the first transmission parameter indication. Send parameters.

在一种可选的实施方式中,所述处理器702在根据所述第一密钥生成第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数确定所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。In an optional implementation manner, when generating the second key according to the first key, the processor 702 is specifically configured to: generate according to the first key and the second key The parameters determine the second key; the generation parameters of the second key include one or more of the following: a second self-owned parameter, a second receiving parameter, and a second sending parameter; wherein the second self-owned parameter The parameter includes a preset character string; the second receiving parameter includes one or more of the following: an identifier of the first device, a key identifier of the first device, a group identifier, a random number, a counter, and a timestamp; the second Send parameters include one or more of the following: random number, counter, timestamp.

可选的,所述收发器701还用于向所述组密钥管理功能网元发送第二接收参数指示,所述第二接收参数指示用于指示所述第二接收参数。Optionally, the transceiver 701 is further configured to send a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter.

可选的,所述收发器701还用于从所述组密钥管理功能网元接收第二发送参数指示;所述处理器702还用于根据所述第二发送参数指示获取所述第一发送参数。Optionally, the transceiver 701 is further configured to receive a second transmission parameter indication from the group key management function network element; the processor 702 is further configured to obtain the first transmission parameter indication according to the second transmission parameter indication. Send parameters.

具体的,所述处理器702在根据所述组密钥参数和所述保护密钥确定所述组密钥时,具体用于:根据所述保护密钥、所述组密钥参数和第二算法确定所述组密钥,所述第二算法为可逆算法。Specifically, when determining the group key according to the group key parameter and the protection key, the processor 702 is specifically configured to: according to the protection key, the group key parameter and the second The algorithm determines the group key, and the second algorithm is a reversible algorithm.

可选的,所述第二算法可以为以下算法中的一种:异或、同或、加、减、解密。Optionally, the second algorithm may be one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption.

示例性的,所述第一密钥可以为K AUSF或K SEAF或K AMF或K AFExemplarily, the first key may be K AUSF or K SEAF or K AMF or K AF .

在一种可选的实施方式中,所述收发器701还用于:向所述组密钥管理功能网元发送第一设备的密钥标识;或者,通过组管理功能网元向所述组密钥管理功能网元发送所述第一设备的密钥标识和组标识。In an optional implementation manner, the transceiver 701 is further configured to: send the key identifier of the first device to the group key management function network element; or send the group key management function network element to the group The key management function network element sends the key identifier and group identifier of the first device.

可选的,所述第一设备的密钥标识为所述第一设备的标识或者为所述第一设备的密钥集标识。Optionally, the key identifier of the first device is an identifier of the first device or a key set identifier of the first device.

在另一个实施例中,在组密钥分发装置700用于实现上述实施例中密钥功能网元(例如KF、AUSF)的功能时,具体可以包括:In another embodiment, when the group key distribution apparatus 700 is used to implement the function of the key function network element (eg KF, AUSF) in the above embodiment, it may specifically include:

所述收发器701用于从组密钥管理功能网元接收第一设备的密钥标识;所述处理器702用于根据第一设备的密钥标识确定第一密钥;根据所述第一密钥确定第二密钥。The transceiver 701 is configured to receive the key identifier of the first device from the group key management function network element; the processor 702 is configured to determine the first key according to the key identifier of the first device; The key determines the second key.

具体的,所述处理器702在根据所述第一密钥确定所述第二密钥时,具体用于:根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。Specifically, when determining the second key according to the first key, the processor 702 is specifically configured to: generate the first key according to the generation parameters of the first key and the second key Second key; the generation parameters of the second key include one or more of the following: a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second sending parameter includes the following one Item or items: nonce, counter, timestamp.

可选的,所述收发器701还用于从第一设备或所述组密钥管理功能网元接收第二接收参数指示;所述处理器702还用于根据所述第二接收参数指示获取所述第二接收参数。Optionally, the transceiver 701 is further configured to receive a second reception parameter indication from the first device or the network element of the group key management function; the processor 702 is further configured to obtain the indication according to the second reception parameter the second received parameter.

可选的,所述收发器701还用于向第一设备或所述组密钥管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。Optionally, the transceiver 701 is further configured to send a second transmission parameter indication to the first device or the network element of the group key management function, where the second transmission parameter indication is used to indicate the second transmission parameter.

可选的,所述处理器702还用于根据所述第二密钥确定保护密钥;所述收发器701还用于向组密钥管理功能网元发送所述保护密钥。Optionally, the processor 702 is further configured to determine a protection key according to the second key; the transceiver 701 is further configured to send the protection key to a network element with a group key management function.

具体的,所述处理器702在根据所述第二密钥确定所述保护密钥时,具体用于:根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。Specifically, when determining the protection key according to the second key, the processor 702 is specifically configured to: generate the protection key according to the second key and the generation parameter of the protection key ; The generation parameters of the protection key include one or more of the following: a first self-owned parameter, a first receiving parameter, and a first sending parameter; wherein, the first self-owned parameter includes a preset character string; the The first receiving parameter includes one or more of the following: the identifier of the first device, the key identifier of the first device, the group identifier, the application type, the application identifier, the random number, the counter, and the timestamp; the first sending parameter includes One or more of the following: group key identification, nonce, counter, timestamp.

可选的,所述收发器701还用于从所述第一设备或组密钥管理功能网元接收所述第一接收参数指示;所述处理器702还用于根据所述第一接收参数指示获取所述第一接收参数。Optionally, the transceiver 701 is further configured to receive the first receiving parameter indication from the first device or the network element of the group key management function; the processor 702 is further configured to receive the first receiving parameter according to the first receiving parameter Instruct to acquire the first reception parameter.

可选的,所述收发器701还用于向所述第一设备或组密钥管理功能网元发送所述第一发送参数指示,所述第一发送参数指示用于指示所述第一发送参数。Optionally, the transceiver 701 is further configured to send the first sending parameter indication to the first device or the network element of the group key management function, where the first sending parameter indication is used to indicate the first sending parameter.

示例性的,所述收发器701还用于向组密钥管理功能网元发送所述第二密钥。Exemplarily, the transceiver 701 is further configured to send the second key to the group key management function network element.

可选的,所述第一密钥可以为K AUSF或K SEAF或K AMF或K AFOptionally, the first key may be K AUSF or K SEAF or K AMF or K AF .

基于以上实施例,本申请实施例提供了一种通信系统,该通信系统可以包括上述实施例涉及的组密钥管理功能网元、第一设备和密钥功能网元等。Based on the above embodiments, the embodiments of the present application provide a communication system, and the communication system may include a group key management function network element, a first device, a key function network element, etc. involved in the above embodiments.

本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的组密钥分发方法。Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the group key distribution provided by the foregoing method embodiments method.

本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的组密钥分发方法。Embodiments of the present application further provide a computer program product, where the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the group key distribution method provided by the above method embodiments.

本申请实施例还提供一种芯片,所述芯片与存储器耦合,所述芯片用于实现上述方法实施例提供的组密钥分发方法。An embodiment of the present application further provides a chip, where the chip is coupled to a memory, and the chip is used to implement the group key distribution method provided by the above method embodiments.

本申请实施例还提供了一种芯片系统,该芯片系统包括处理器,用于支持上述组密钥分发装置实现上述所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存组密钥分发装置必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。An embodiment of the present application further provides a chip system, where the chip system includes a processor, configured to support the above-mentioned group key distribution apparatus to implement the above-mentioned functions. In a possible design, the chip system further includes a memory for storing necessary program instructions and data of the group key distribution apparatus. The chip system may be composed of chips, or may include chips and other discrete devices.

本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现 在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.

显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的保护范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the protection scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (30)

一种组密钥分发方法,其特征在于,包括:A method for group key distribution, comprising: 组密钥管理功能网元获取第一设备的密钥标识;The network element of the group key management function obtains the key identifier of the first device; 所述组密钥管理功能网元获取所述第一设备的组标识;The group key management function network element obtains the group identifier of the first device; 所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备;The group key management function network element determines a group key according to the group identifier of the first device, where the group key is used to protect the communication content of members of the group, and the members of the group include the first device; 所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥;The group key management function network element determines a protection key according to the key identifier of the first device; 所述组密钥管理功能网元根据所述组密钥和所述保护密钥生成组密钥参数;The group key management function network element generates a group key parameter according to the group key and the protection key; 所述组密钥管理功能网元向所述第一设备发送所述组密钥参数。The group key management function network element sends the group key parameter to the first device. 如权利要求1所述的方法,其特征在于,所述组密钥管理功能网元根据所述第一设备的组标识确定组密钥,包括:The method of claim 1, wherein the group key management function network element determines the group key according to the group identifier of the first device, comprising: 所述组密钥管理功能网元根据所述组标识从组密钥信息中查询所述组密钥,The group key management function network element queries the group key from the group key information according to the group identifier, 若所述组密钥信息包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元从所述组密钥信息中获取所述组标识对应的所述组密钥;If the group key information includes the correspondence between the group identifier and the group key, the group key management function network element acquires the group corresponding to the group identifier from the group key information key; 若所述组密钥信息不包括所述组标识与所述组密钥的对应关系,则所述组密钥管理功能网元生成所述组密钥。If the group key information does not include the corresponding relationship between the group identifier and the group key, the group key management function network element generates the group key. 如权利要求1或2所述的方法,其特征在于,所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥,包括:The method according to claim 1 or 2, wherein the group key management function network element determines the protection key according to the key identifier of the first device, comprising: 所述组密钥管理功能网元根据存储的第一设备的密钥标识与保护密钥的对应关系,确定所述第一设备的密钥标识对应的所述保护密钥;或者The group key management function network element determines the protection key corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the protection key; or 所述组密钥管理功能网元根据所述第一设备的密钥标识从密钥功能网元获取所述保护密钥。The group key management function network element obtains the protection key from the key function network element according to the key identifier of the first device. 如权利要求1或2所述的方法,其特征在于,所述组密钥管理功能网元根据所述第一设备的密钥标识确定保护密钥,包括:The method according to claim 1 or 2, wherein the group key management function network element determines the protection key according to the key identifier of the first device, comprising: 所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥;The group key management function network element determines the second key according to the key identifier of the first device; 所述组密钥管理功能网元根据所述第二密钥生成所述保护密钥。The group key management function network element generates the protection key according to the second key. 如权利要求4所述的方法,其特征在于,所述组密钥管理功能网元根据所述第二密钥生成所述保护密钥,包括:The method according to claim 4, wherein generating the protection key according to the second key by the group key management function network element comprises: 所述组密钥管理功能网元根据所述第二密钥和所述保护密钥的生成参数生成所述保护密钥;所述保护密钥的生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。The group key management function network element generates the protection key according to the second key and the generation parameters of the protection key; the generation parameters of the protection key include one or more of the following: first Self-owned parameter, first receiving parameter, first sending parameter; wherein, the first self-owned parameter includes a preset character string; the first receiving parameter includes one or more of the following: the identification of the first device, the first A key identifier, group identifier, application type, application identifier, random number, counter, and timestamp of a device; the first transmission parameter includes one or more of the following: group key identifier, random number, counter, timestamp . 如权利要求5所述的方法,其特征在于,所述方法还包括:The method of claim 5, wherein the method further comprises: 所述组密钥管理功能网元从所述第一设备或组管理功能网元接收第一接收参数指示,并根据所述第一接收参数指示获取所述第一接收参数。The group key management function network element receives a first reception parameter indication from the first device or the group management function network element, and acquires the first reception parameter according to the first reception parameter indication. 如权利要求5或6所述的方法,其特征在于,所述方法还包括:The method of claim 5 or 6, wherein the method further comprises: 所述组密钥管理功能网元向所述第一设备发送第一发送参数指示,所述第一发送参数 指示用于指示所述第一发送参数。The group key management function network element sends a first sending parameter indication to the first device, where the first sending parameter indication is used to indicate the first sending parameter. 如权利要求4-7任一项所述的方法,其特征在于,所述组密钥管理功能网元根据所述第一设备的密钥标识确定第二密钥,包括:The method according to any one of claims 4-7, wherein the group key management function network element determines the second key according to the key identifier of the first device, comprising: 所述组密钥管理功能网元根据存储的第一设备的密钥标识与第一密钥的对应关系,确定所述第一设备的密钥标识对应的第一密钥;或者所述组密钥管理功能网元从密钥功能网元获取第一密钥;The network element of the group key management function determines the first key corresponding to the key identifier of the first device according to the stored correspondence between the key identifier of the first device and the first key; or the group key The key management function network element obtains the first key from the key function network element; 所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥。The group key management function network element generates the second key according to the first key. 如权利要求8所述的方法,其特征在于,所述组密钥管理功能网元根据所述第一密钥生成所述第二密钥,包括:The method according to claim 8, wherein the group key management function network element generates the second key according to the first key, comprising: 所述组密钥管理功能网元根据所述第一密钥和所述第二密钥的生成参数生成所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。The group key management function network element generates the second key according to the generation parameters of the first key and the second key; the generation parameters of the second key include one or more of the following : a second own parameter, a second receiving parameter, a second sending parameter; wherein, the second own parameter includes a preset character string; the second receiving parameter includes one or more of the following: The identifier, the key identifier of the first device, the group identifier, the random number, the counter, and the timestamp; the second transmission parameter includes one or more of the following: random number, counter, and timestamp. 如权利要求9所述的方法,其特征在于,所述方法还包括:The method of claim 9, wherein the method further comprises: 所述组密钥管理功能网元从所述第一设备或组管理功能网元接收第二接收参数指示,并根据所述第二接收参数指示获取所述第二接收参数。The group key management function network element receives the second reception parameter indication from the first device or the group management function network element, and acquires the second reception parameter according to the second reception parameter indication. 如权利要求9或10所述的方法,其特征在于,所述方法还包括:The method of claim 9 or 10, wherein the method further comprises: 所述组密钥管理功能网元向所述第一设备或组管理功能网元发送第二发送参数指示,所述第二发送参数指示用于指示所述第二发送参数。The group key management function network element sends a second transmission parameter indication to the first device or the group management function network element, where the second transmission parameter indication is used to indicate the second transmission parameter. 如权利要求8-11任一项所述的方法,其特征在于,所述第一密钥为K AUSF或K SEAF或K AMF或K AFThe method according to any one of claims 8-11, wherein the first key is K AUSF or K SEAF or K AMF or K AF . 如权利要求1-12任一项所述的方法,其特征在于,所述组密钥管理功能网元根据所述组密钥和所述保护密钥生成组密钥参数,包括:The method according to any one of claims 1-12, wherein the group key management function network element generates a group key parameter according to the group key and the protection key, comprising: 所述组密钥管理功能网元根据所述组密钥、所述保护密钥和第一算法生成所述组密钥参数,所述第一算法为可逆算法。The group key management function network element generates the group key parameter according to the group key, the protection key and a first algorithm, where the first algorithm is a reversible algorithm. 如权利要求13所述的方法,其特征在于,所述第一算法为以下算法中的一种:异或、同或、加、减、加密。The method of claim 13, wherein the first algorithm is one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and encryption. 一种组密钥分发方法,其特征在于,包括:A method for group key distribution, comprising: 第一设备从组密钥管理功能网元接收组密钥参数;the first device receives the group key parameter from the group key management function network element; 所述第一设备根据所述组密钥参数和保护密钥确定所述组密钥,所述组密钥用于保护组的成员的通信内容,所述组的成员包含所述第一设备。The first device determines the group key according to the group key parameter and the protection key, where the group key is used to protect the communication content of members of the group, and the members of the group include the first device. 如权利要求15所述的方法,其特征在于,所述方法还包括:The method of claim 15, wherein the method further comprises: 所述第一设备根据第一密钥生成第二密钥;The first device generates a second key according to the first key; 所述第一设备根据所述第二密钥生成所述保护密钥。The first device generates the protection key based on the second key. 如权利要求16所述的方法,其特征在于,所述组密钥管理功能网元根据所述第二密钥生成保护密钥,包括:The method of claim 16, wherein the group key management function network element generates a protection key according to the second key, comprising: 所述第一设备根据所述第二密钥和保护密钥的生成参数生成所述保护密钥;所述保护密钥生成参数包括以下一项或多项:第一自有参数、第一接收参数、第一发送参数;其中,所述第一自有参数包括预设字符串;所述第一接收参数包括以下一项或多项:第一设备的 标识,第一设备密钥标识,组标识,应用类型,应用标识,随机数,计数器,时间戳;所述第一发送参数包括以下一项或多项:组密钥标识,随机数,计数器,时间戳。The first device generates the protection key according to the second key and the generation parameters of the protection key; the protection key generation parameters include one or more of the following: a first self-owned parameter, a first received parameters, the first sending parameter; wherein, the first self-owned parameter includes a preset character string; the first receiving parameter includes one or more of the following: the identification of the first device, the identification of the first device key, the group identifier, application type, application identifier, random number, counter, and timestamp; the first sending parameter includes one or more of the following: group key identifier, random number, counter, and timestamp. 如权利要求17所述的方法,其特征在于,所述方法还包括:The method of claim 17, wherein the method further comprises: 所述第一设备向从所述组密钥管理功能网元发送第一接收参数指示,所述第一接收参数指示用于指示所述第一接收参数。The first device sends a first reception parameter indication to the secondary group key management function network element, where the first reception parameter indication is used to indicate the first reception parameter. 如权利要求17或18所述的方法,其特征在于,所述方法还包括:The method of claim 17 or 18, wherein the method further comprises: 所述第一设备从所述组密钥管理功能网元接收第一发送参数指示,并根据所述第一发送参数指示获取所述第一发送参数。The first device receives a first transmission parameter indication from the group key management function network element, and acquires the first transmission parameter according to the first transmission parameter indication. 如权利要求16-19任一项所述的方法,其特征在于,所述第一设备根据所述第一密钥生成第二密钥,包括:The method according to any one of claims 16-19, wherein the first device generates a second key according to the first key, comprising: 所述第一设备根据所述第一密钥和所述第二密钥的生成参数确定所述第二密钥;所述第二密钥的生成参数包括以下一项或多项:第二自有参数、第二接收参数、第二发送参数;其中,所述第二自有参数包括预设字符串;所述第二接收参数包括以下一项或多项:第一设备的标识,第一设备的密钥标识,组标识,随机数,计数器,时间戳;所述第二发送参数包括以下一项或多项:随机数,计数器,时间戳。The first device determines the second key according to the generation parameters of the first key and the second key; the generation parameters of the second key include one or more of the following: a second automatic key; There are parameters, second receiving parameters, and second sending parameters; wherein, the second self-owned parameter includes a preset character string; the second receiving parameter includes one or more of the following: the identification of the first device, the first The device's key identifier, group identifier, random number, counter, and timestamp; the second transmission parameter includes one or more of the following: random number, counter, and timestamp. 如权利要求20所述的方法,其特征在于,所述方法还包括:The method of claim 20, wherein the method further comprises: 所述第一设备向所述组密钥管理功能网元发送第二接收参数指示,所述第二接收参数指示用于指示所述第二接收参数。The first device sends a second reception parameter indication to the group key management function network element, where the second reception parameter indication is used to indicate the second reception parameter. 如权利要求20或21所述的方法,其特征在于,所述方法还包括:The method of claim 20 or 21, wherein the method further comprises: 所述第一设备从所述组密钥管理功能网元接收第二发送参数指示,并根据所述第二发送参数指示获取所述第二发送参数。The first device receives a second transmission parameter indication from the group key management function network element, and acquires the second transmission parameter according to the second transmission parameter indication. 如权利要求15-22任一项所述的方法,其特征在于,所述第一设备根据所述组密钥参数和所述保护密钥确定所述组密钥,包括:The method according to any one of claims 15-22, wherein the first device determines the group key according to the group key parameter and the protection key, comprising: 所述第一设备根据所述保护密钥、所述组密钥参数和第二算法确定所述组密钥,所述第二算法为可逆算法。The first device determines the group key according to the protection key, the group key parameter, and a second algorithm, where the second algorithm is a reversible algorithm. 如权利要求23所述的方法,其特征在于,所述第二算法为以下算法中的一种:异或、同或、加、减、解密。The method of claim 23, wherein the second algorithm is one of the following algorithms: exclusive OR, exclusive OR, addition, subtraction, and decryption. 如权利要求16-22任一项所述的方法,其特征在于,所述第一密钥为K AUSF或K SEAF或K AMF或K AFThe method according to any one of claims 16-22, wherein the first key is K AUSF or K SEAF or K AMF or K AF . 一种组密钥分发装置,其特征在于,包括用于执行如权利要求1-14任一项所述的方法的单元或模块。A group key distribution apparatus, characterized by comprising a unit or module for executing the method according to any one of claims 1-14. 一种组密钥分发装置,其特征在于,包括用于执行如权利要求15-25任一项所述的方法的单元或模块。A group key distribution apparatus, characterized by comprising a unit or module for executing the method according to any one of claims 15-25. 一种组密钥分发装置,其特征在于,包括处理器和收发器,其中:A group key distribution device, comprising a processor and a transceiver, wherein: 所述收发器,用于收发数据、消息或信息;the transceiver for sending and receiving data, messages or information; 所述处理器,与存储器耦合,用于调用所述存储器中的程序使得所述组密钥分发装置执行如权利要求1-14任一项所述的方法。The processor, coupled to the memory, is configured to invoke a program in the memory to cause the group key distribution apparatus to perform the method of any one of claims 1-14. 一种组密钥分发装置,其特征在于,包括处理器和收发器,其中:A group key distribution device, comprising a processor and a transceiver, wherein: 所述收发器,用于收发数据、消息或信息;the transceiver for sending and receiving data, messages or information; 所述处理器,与存储器耦合,用于调用所述存储器中的程序使得所述组密钥分发装置 执行如权利要求15-25任一项所述的方法。The processor, coupled to the memory, invokes a program in the memory to cause the group key distribution apparatus to perform the method of any of claims 15-25. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机行如权利要求1-14中任一项所述的方法,或者执行如权利要求15-25中任一项所述的方法。A computer-readable storage medium, characterized in that it includes instructions that, when the instructions are executed on a computer, cause the computer to perform the method as claimed in any one of claims 1-14, or to execute the method as claimed in claim 15- The method of any one of 25.
PCT/CN2020/108703 2020-08-12 2020-08-12 Group key distribution method and apparatus Ceased WO2022032525A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/108703 WO2022032525A1 (en) 2020-08-12 2020-08-12 Group key distribution method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/108703 WO2022032525A1 (en) 2020-08-12 2020-08-12 Group key distribution method and apparatus

Publications (1)

Publication Number Publication Date
WO2022032525A1 true WO2022032525A1 (en) 2022-02-17

Family

ID=80246690

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/108703 Ceased WO2022032525A1 (en) 2020-08-12 2020-08-12 Group key distribution method and apparatus

Country Status (1)

Country Link
WO (1) WO2022032525A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119696896A (en) * 2024-12-17 2025-03-25 航天信息股份有限公司 Data distribution method, system, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (en) * 2008-02-15 2009-08-19 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN103096308A (en) * 2011-11-01 2013-05-08 华为技术有限公司 Method for generating group key and an associated device
CN105432058A (en) * 2013-07-31 2016-03-23 日本电气株式会社 Devices and method for MTC group key management
US20190296902A1 (en) * 2018-03-20 2019-09-26 Mocana Corporation Dynamic domain key exchange for authenticated device to device communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (en) * 2008-02-15 2009-08-19 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN103096308A (en) * 2011-11-01 2013-05-08 华为技术有限公司 Method for generating group key and an associated device
CN105432058A (en) * 2013-07-31 2016-03-23 日本电气株式会社 Devices and method for MTC group key management
US20190296902A1 (en) * 2018-03-20 2019-09-26 Mocana Corporation Dynamic domain key exchange for authenticated device to device communications

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119696896A (en) * 2024-12-17 2025-03-25 航天信息股份有限公司 Data distribution method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
EP4642074A1 (en) Communication method, communication apparatus, and communication system
KR102588974B1 (en) Methods and systems for privacy protection of 5g slice identifier
US9882894B2 (en) Secure authentication service
KR102769532B1 (en) Method, device and system for generating and managing application keys in a communication network for encrypted communication with service applications
US20200228977A1 (en) Parameter Protection Method And Device, And System
WO2020029729A1 (en) Communication method and device
US20250039667A1 (en) Secure information pushing by service applications in communication networks
WO2022222745A1 (en) Communication method and apparatus
WO2020221218A1 (en) Information acquisition method and device
WO2020220903A1 (en) Communication method and apparatus
TW202142010A (en) Method for updating subscriber data, and apparatus, node and storage medium
CN112997518A (en) Security management in a disaggregated base station in a communication system
CN110351722A (en) Information sending method, key generation method and device
CA3248651A1 (en) Verification method, communication apparatus, and communication system
WO2022032525A1 (en) Group key distribution method and apparatus
EP4478763A1 (en) Communication method and apparatus
CN108924826B (en) Data transfer control method and device
US12309580B2 (en) Multicast broadcast service keys
US20240137764A1 (en) User Equipment Authentication and Authorization Procedure for Edge Data Network
EP4475581A1 (en) Communication method, terminal device, and communication apparatus
US20240373215A1 (en) Security configuration update in communication networks
US20250392582A1 (en) Communication method and communication apparatus
US20250008323A1 (en) Systems and methods for provisioning security policies for deriving session keys
WO2018072150A1 (en) Secure machine-type communication method, apparatus, and system
CN120238860A (en) Communication method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20949024

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20949024

Country of ref document: EP

Kind code of ref document: A1