WO2007022727A1 - Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation - Google Patents

Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation Download PDF

Info

Publication number
WO2007022727A1
WO2007022727A1 PCT/CN2006/002167 CN2006002167W WO2007022727A1 WO 2007022727 A1 WO2007022727 A1 WO 2007022727A1 CN 2006002167 W CN2006002167 W CN 2006002167W WO 2007022727 A1 WO2007022727 A1 WO 2007022727A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
base station
authenticator
mobile terminal
target base
Prior art date
Application number
PCT/CN2006/002167
Other languages
English (en)
French (fr)
Inventor
Zhengfei Xiao
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2007022727A1 publication Critical patent/WO2007022727A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the field of mobile communication technologies, and particularly discloses a method and system for transmitting authentication key context information of a mobile terminal in a handover process of a mobile terminal user. Background technique
  • the IEEE 802.16d/e series of protocols defines the standard for the wireless broadband fixed and mobile access air interface part.
  • the protocol defines a security sublayer (Privacy Sublayer) for authentication of users. Key distribution and management, as well as encryption and authentication of subsequent data.
  • the BS and MSS Mobile Subscribe Station
  • PKM Primary Key Management
  • two authentication methods are defined in the protocol. One is RSA authentication based on the public key algorithm. The authentication result is a PAK (Primary Authorization Key) generated by the authentication parties. The other is the EAP authentication method. The result of the authentication is that a PMK (Pairwise Master Key) is generated on both sides of the authentication.
  • the MSS and the BS are derived for deriving the other.
  • the authentication key AK (Authorization Key) of the key resource.
  • the AK is set to be valid within a certain lifetime (Lifetime).
  • Lifetime In a protection time before the end of the AK life cycle, the MSS must complete the re-authentication with the BS and Generate a new AK. In this way, the MSS and the BS can simultaneously maintain two valid AKs.
  • the current protocol uses an attribute called the AK Sequence Number to distinguish between two valid AKs that exist simultaneously.
  • the MSS roams to a new target BS, it also performs a network re-entry process to obtain key resources through re-authentication or backhaul (Backhaul) according to the corresponding security policy.
  • the IEEE 802.16e D10 defines an authentication key context (AK Context ) for storing context information related to the authentication key, such as AK, AKID, AK Lifetime, AK Sequence Number, and the like.
  • H 802.16d defines HMAC (Hash Message Authentication Code), which is a message verification code calculated by the hash algorithm and the AK derived key, and the message is sent.
  • HMAC Hash Message Authentication Code
  • IEEE 802.16e also defines a Cipher-based Message Authentication Code (CMAC), which is a message verification code calculated based on an encryption algorithm.
  • CMAC Cipher-based Message Authentication Code
  • the message sender uses the message authentication code to send a management message sequence, in addition to carrying the CMAC and AK Sequence Number, and carries a management message sequence number.
  • the sequence number is CMAC_PN-U.
  • the serial number is CMAC-PN-D. The sequence number is incremented at the sender of the message as the message is sent.
  • the authentication process for the message is similar to HMAC. However, whether the message is a resend message can be determined according to the sequence number in the message, the message authentication code, and the information of the received message sequence number maintained in the corresponding AK context. Therefore, in order to support CMAC to prevent replay of management messages, parameters such as CMAC_PN_* (CMAC_PN_D or CMAC_PN_U) are also defined in the AK Context. It also stipulates that for the same AK, a ⁇ CMAC_PN_*, AK ⁇ cannot be used multiple times, that is, for an AK, when the CMAC_PN_* in its context reaches the maximum, it needs to be heavy. Certification.
  • a new AK will be generated during re-authentication, and the AK Context should be regenerated according to the new authentication result, such as: AK Lifetime, AK Sequence Number should be regenerated during the authentication process, CMAC_PN_*, etc.
  • the parameter should be reinitialized to some initial value.
  • the mobile terminal may move between multiple BSs.
  • BS2 new target base station
  • re-authentication may not be required.
  • the base stations involved in the terminal handover process do not need to perform re-authentication if they belong to the same authentication domain. If re-authentication is performed, the relevant security information on each functional entity is re-initialized, so that there is no need to worry about some security information, such as the problem of inconsistent serial number.
  • Level key PMK Level key
  • WiMAX Worldwide Interoperability for Microwave Access
  • EAP Extensible Authentication Protocol
  • each BS is connected to a Key Receiver.
  • a specific BS set Key Receiver may belong to a Key Receiver.
  • the Key Receiver may be set independently or on one of the BSs.
  • Key Receiver implements key management on the BS side.
  • the Key Receiver connects to Key Distributor/Authenticator through a secure channel, where: Authenticator provides proxy functionality for MSS authentication, authorization, and accounting functions; Key Distributor: Depends on the authentication server and MSS The root key information MSSK (Master Session Key), and derives the PMK, and then derives the air interface key AK shared between the BS and the MSS, and distributes it to the Key Receiver, which is received by the Key Receiver.
  • MSSK Master Session Key
  • the air interface key AK and derives other keys between the BS and the MSS.
  • the Authentication server is mainly configured to perform MSS authentication, authorization, and accounting functions, and through the key generation mechanism between the MSS and the MSS. Exchange the information necessary to generate the key, and change the user information to notify the Authenticator and other network element information of the consequences. Since this information is exchanged before establishing a secure channel, the key algorithm used between the Authentication server and the MSS must ensure that information leakage does not affect the security mechanism.
  • Key Distributor/Authenticator will be located in the same physical entity. For example, Authenticator and entities that interact directly with AAA, things such as derived keys are Authenticator completed, and derived The good key is to be distributed to the relevant used entity, such as BS.
  • WiMAX NWG WiMAX Network Work Group WiMAX Interoperability Network Working Group
  • the BS needs to interact with the corresponding Key Distributor in the back-end network to acquire a new one through the AK Transfer protocol. Authentication key and related information.
  • the AK Transfer protocol defines a message interaction process for passing authentication keys between Key Distributor and Key Receiver and Key Distributor, which includes an optional AK Request message and a mandatory implementation.
  • AK Transfer (AK Transfer) message.
  • the AK Request message is used by Key Receiver to request a new AK, AK Transfer message or transfer AK, AKID, AK Lifetime and EIK (Extensible Authentication Protocol Integrity Key) to Key Distributor for the current BS, or to indicate AK Request failed.
  • the AK Transfer protocol defines an AK Delete message for deleting an existing AK. The contents of these messages are shown in Table 2:
  • FIG. 1 shows the AK transmission process triggered by MOB HO IND: As shown in Figure 1, when the handover occurs, the service eNB and the target BS2 are connected to the same Authenticator/Key Distributor as an example. The MSS is currently assigned to the Authenticator/Key Distributor, and the Key Receiver to which the target BS2 belongs is used between the BS2 and the terminal.
  • the flow of AK and its related context information is as follows:
  • the MSS sends an air interface message MOB_HO_IND to the service BS1, where the message includes the MSS and the identifier of the target BS2 to be switched;
  • the monthly service BS1 sends a HO Request message to the Authenticator/Key Distributor connected thereto, where the message includes the identifiers of the MSS and the target BS2.
  • Authenticator/Key Distributor generates an air interface key AK2 for the target BS2; and after the Authenticator/Key Distributor receives the handover request, according to the request message
  • a paired master key (PMK) of the mobile terminal corresponding to the mobile terminal identifier saved by the MSS identifier and the target BS2 identifier, and the authentication key between the mobile terminal and the target base station is derived, and
  • the target base station exchanges a handover preparation message.
  • the target BS2 interacts with the Authenticator/Key Distributor to prepare for handover.
  • the Authenticator/Key Distributor sends a HO Response message to the serving BS1 as a response message to the HO Request.
  • the Key Receiver to which the target BS2 belongs sends an AK Request message to the Authenticator/Key Distributor, where the message includes the identifier of the MSS.
  • the Authenticator Key Distributor generates the AK2 on the established secure channel and sends the AK Transfer message to the Key Receiver to which the target BS2 belongs.
  • the message includes
  • MSS identification air interface key information AK2, AKID, AK life cycle and other key information such as EIK;
  • the Key Receiver of the target BS2 may be set in BS2, in other BSs that belong to the same authentication domain as BS2, or as independent network elements. If the Key Receiver to which the target BS2 belongs is located on the BS2, the key AK2 is directly transmitted to the target BS2 through the internal interface, and if not on the BS2, the AK2 is transmitted to the target BS2 through the external secure channel.
  • the target BS2 restores the session before the handover.
  • A may need to be transmitted between Key Distributor and Key Receiver in different physical network elements. Therefore, it is necessary to ensure a secure channel between Key Receiver and Key Distributor in order to securely transmit information such as AK. That is, there should be a mechanism outside the protocol to ensure that there is a secure connection between each Key Receiver and Key Distributor, on which AK, AKID, AK Lifetime, and EIK are encrypted and signed on Key Distributor.
  • the AK Transfer message is transmitted to the Key Receiver.
  • the Key Receiver decrypts the encrypted AK, AKID, AK Lifetime and EIK in the message and saves it to the local BS or transmits it to the BS. Secure communication between AK and MSS.
  • the prior art solves the problem of secure transmission of keys between Key Receiver and Key Distributor, but after the MSS switches to a new BS, it needs to use the obtained AK and its related information to generate a new AK context.
  • the target BS can recover part of the AK context content using the obtained AK:, AKID, AK Lifetime, and EIK, but other information in the AK context such as AK Sequence Number, CMAC_PN_*, etc. needs to be regenerated, which may be related to the mobile terminal.
  • the AK context information saved on the side is inconsistent, which affects the security of the session. Summary of the invention
  • the present invention provides a method and system for transmitting authentication key context information in a mobile terminal handover process, to solve the sequence number information in the context of the AK generated by the target base station and the sequence in the AK context saved by the mobile terminal side in the prior art.
  • the problem of inconsistent information is a problem of inconsistent information.
  • the present invention provides the following technical solutions:
  • a method for sending authentication key context information includes the following steps:
  • the authenticator/key distributor to which the mobile terminal currently belongs receives the related message triggered during the handover process of the mobile terminal, generates an authentication key between the mobile terminal and the target base station that is handed over, and updates the authentication key context information. Retaining the current authentication key sequence number being used in the updated context information;
  • the authenticator/key distributor to which the mobile terminal currently belongs receives the request message for obtaining the authentication key information for the key recipient to which the target base station belongs, the authentication key and the current authentication are dense.
  • the key sequence number is sent to the key recipient to which the target base station belongs.
  • the updated uplink information still retains the current uplink management message authentication code sequence number and/or the current downlink management message authentication code sequence number being used; and the authenticator/key distributor At the same time, the current uplink management message authentication code sequence number and/or the current downlink management message authentication code sequence number are sent to the key receiver to which the target base station belongs.
  • the related message received by the authenticator/key distributor to which the mobile terminal currently belongs is one of the following:
  • the current serving base station of the mobile terminal receives the handover indication request message of the mobile terminal
  • the target base station When the mobile terminal switches to the target base station and performs network reentry, the target base station triggers the associated key recipient to send an authentication key request message to the authenticator/key distributor to which the mobile terminal currently belongs.
  • the key receiver to which the target base station belongs sends the key request message to the authenticator/key distributor connected to the target base station, where the message carries the address of the authenticator/key distributor to which the mobile terminal currently belongs.
  • an authenticator/key distributor connected by the target base station itself generates a new key request message according to the address information and sends it to the authenticator/key distributor to which the mobile terminal currently belongs; or
  • the target base station forwards the key request message by an authenticater/key distributor connected by itself, and the destination address of the message is the address of the authenticator/key distributor to which the mobile terminal currently belongs, and the target base station will Forwarding to the authenticator/key distributor to which the mobile terminal currently belongs according to the destination address of the message.
  • the key receiver of the target base station transmits the authentication key and the associated sequence number to the target base station; the target base station constructs the authentication key context according to the authentication key and the associated sequence number.
  • a transmission system for authenticating key context information provided by the present invention includes at least one base station, The method further includes: an authenticator/key distributor to which the mobile terminal currently belongs, a key receiver to which the target base station to which the mobile terminal switches, and an authenticator/key distributor and mobile to which the mobile terminal currently belongs The current serving base station of the terminal is connected;
  • the authenticator/key distributor to which the mobile terminal currently belongs receives the related message triggered during the handover process of the mobile terminal, generates an authentication key between the mobile terminal and the target base station to be switched, and updates the authentication key.
  • Context information the updated context information retains the current authentication key sequence number being used; and upon receiving the authentication key request message from the key recipient to which the target base station belongs, The authentication key and the current authentication key sequence number are sent to the key recipient to which the target base station belongs.
  • the authenticator/key distributor to which the mobile terminal currently belongs includes:
  • An authentication key generating unit configured to generate an authentication key between the mobile terminal and the target base station; a context updating unit, configured to update the context information, where the updated context information includes the authentication key, reserved Having the current authentication key sequence number, further retaining a current uplink management message authentication code sequence number and/or a current downlink management message authentication code sequence number being used; and an information sending unit, configured to use the updated After extracting the authentication key and the current authentication key sequence number in the context information, the current uplink management message authentication code sequence number and/or the current downlink management message authentication code sequence number are simultaneously extracted and sent to the office.
  • the key recipient to which the target base station belongs.
  • the system also includes a target base station to which the mobile terminal is handed over:
  • the current serving base station of the mobile terminal receives the handover indication request message of the mobile terminal
  • an indication message is sent to the home authenticator/key distributor, and when the authenticator/key distributor receives the indication message, the mobile terminal is generated and switched to The authentication key between the target base stations and update the authentication key context information;
  • the target base station to which the mobile terminal is handed over triggers the associated key recipient to send an authentication key request message to the authenticator/key distributor connected to the current serving base station when the mobile terminal completes the handover and performs network reentry.
  • the authority/key distributor Upon receiving the request message, the authority/key distributor generates an authentication key between the mobile terminal and the target base station to which the handover is made and updates the signing key context information.
  • the key recipient of the target base station directly transmits the authentication key request message to the authenticator/key distributor; and the authenticator/key distributor directly directly uses the authentication key and the associated serial number The key recipient sent directly to the target base station.
  • the target base station and the serving base station are respectively connected to each other directly connected to the authenticator/key distributor, wherein:
  • the key receiver to which the target base station belongs sends the key request message to the authenticator/key distributor connected to the target base station, where the message carries the address of the authenticator/key distributor to which the mobile terminal currently belongs.
  • Information, by the authenticator/key distributor to which the target base station belongs, generates a new key request message according to the address information and sends it to the authenticator/key distributor to which the mobile terminal currently belongs; or
  • the target base station forwards the key request message by an authenticater/key distributor connected by itself, and the destination address of the message is the address of the authenticator/key distributor to which the mobile terminal currently belongs, and the target base station will Directly forwarding to the authenticator/key distributor to which the mobile terminal currently belongs according to the destination address of the message;
  • the authenticator/key distributor to which the mobile terminal currently belongs transmits the authentication key and the associated sequence number to the authenticator/key distributor connected to the target base station; the authenticator/key distribution of the target base station connection The user extracts the authentication key and the associated serial number and then forwards it to the key recipient of the target base station.
  • the key receiver of the target base station is set in the base station, in other base stations, or as a separate network element.
  • the target base station includes: a receiving unit that receives the authentication key and a related sequence number forwarded by a key receiver; and a context constructing unit that constructs an authentication key context according to the authentication key and the associated serial number.
  • the authentication key context generated on the target base station by using the method of the present invention includes an authentication key sequence number that is consistent with the mobile terminal side, and the authentication key sequence number is used to determine the corresponding authentication.
  • Key when the target base station receives the uplink management message that is sent by the mobile terminal and carries the authentication key column number, confirms the corresponding authentication key according to the authentication key sequence number, and derives the corresponding key to verify And the message authentication code carried in the upper and lower management messages to determine the validity of the message source; or when the target base station sends the downlink management message to the mobile terminal, generating the downlink management message by using the authentication key a message authentication code, and the message authentication code and the authentication key sequence number are carried in the downlink management message, and when the mobile terminal receives the downlink management message, according to the authentication key
  • 'Serial number determines the corresponding authentication key and derives the corresponding key for the legality of the certificate message
  • the continuity of the authentication key sequence number and the management message sequence number in the authentication key context is maintained during the handover process of the mobile terminal, ensuring secure communication with the mobile terminal, and effectively preventing possible occurrence
  • the replay attack guarantees the security of the session after recovery.
  • FIG. 1 is a flowchart of a target BS2 acquiring AK2 and its context information when a handover occurs in a mobile terminal;
  • FIG. 2 is a flow chart of the target BS2 acquiring AK2 and its context information when the mobile terminal is switched according to the present invention, wherein the service BS1 and the target BS2 are connected to the same Authenticator/Key Distributor;
  • FIG. 3 is a flow chart of the target BS2 acquiring AK2 and its context information when the mobile terminal is switched according to the present invention, wherein the service BS1 and the target BS2 are connected to different Authenticator/Key Distributors;
  • FIG. 4 is a schematic diagram of a network structure of a different Authenticator/Key Distributor connected to a monthly base station and a target base station;
  • FIG. 5 is a schematic diagram showing the main structure of a system for implementing the method of the present invention when a base station and a target base station are connected to the same Authenticator/Key Distributor;
  • FIG. 6 is a schematic diagram of a main structure of an Authenticator/Key Distributor connected to a serving base station
  • FIG. 7 is a schematic diagram of a main structure of a system for implementing the method of the present invention when a serving base station and a target base station are connected to different Authenticator/Key Distributors
  • FIG. 8 is a schematic diagram of the main structure of a target base station.
  • the prior art solves the problem of secure transmission of keys between Key Receiver and Key Distributor, but the definition of AK and related information transmitted in AK Transfer is not accurate and complete. Considering that MSS switches to a new BS, it needs to be used. The obtained AK and its related information generate a new AK context. According to the prior art, the new BS can recover partial AK context content using the obtained AK, AKID, AK Lifetime and EIK, but other information in the AK context such as AK Sequence Number , CMAC_PN - * and other information needs to be regenerated.
  • the target BS may maintain two valid AKs between the MSS and the BS in subsequent communication with the MSS, and distinguish the two AKs by using the AK Sequence Number in the respective context.
  • the MSS carries the HMAC/CMAC in the management message sent to the BS, and also carries an AK Sequence Number.
  • the BS uses the AK Sequence Number to find the corresponding AK for authenticating the management message.
  • the BS carries the HMAC/CMAC in the management message sent to the MSS, it also needs to carry the AK Sequence Number corresponding to the AK used by the HMAC/CMAC. After receiving the management message, the MSS searches for the corresponding AK according to the AK Sequence Number. Used to authenticate messages.
  • the A and the related information obtained by the target BS through the AK Transfer message do not include the AK Sequence Number.
  • the BS After the MSS switches to the target BS, the BS cannot implement the authentication of the management message sent by the MSS, and cannot generate the same. Management messages sent to the MSS. Therefore, in order to ensure that the session before the handover can be restored after the handover and the security of the session is guaranteed, the AK Transfer needs to be delivered in addition to the already defined information, such as AK, AK Lifetime and EIK. It should include the AK Sequence Number, CMAC_PN_*, etc. in the AK Context.
  • the key distributor in the back-end network receives the information of the phase of the target BS2 after receiving the corresponding handover indication. , but retain other information in the original context, such as the current AK Sequence Number and CMAC_PN_* that the mobile terminal is using, and the target BS2 obtains the AK and its context information from the key distributor through the AK Transfer message, and according to the information Constructing a new authentication key context, thus ensuring consistency with the associated serial number information in the newly constructed authentication key context of the mobile terminal side, thereby ensuring security between the target BS2 and the mobile terminal after the restoration session Communication.
  • the AK Transfer message defined in the AK Transfer protocol is modified to carry the AK Sequence Number and CMAC_PN_* in the AK Context, and the modified message content is as follows:
  • the MSS can derive a new authentication key AK according to its locally stored root key information and the information of the BS2 and update its context, in the context of the mobile terminal update, The current AK Sequence Number and CMAC-PN-* are being used.
  • the Key Receiver entity to which the target BS2 belongs is located on the BS2, and the BS1 and the BS2 are connected.
  • the same Authenticator/Key Distributor is used as an example.
  • the Authenticator/Key Distributor connected to the target BS2 stores the current AK of the MSS and its context information, and the Key Receiver of the target BS2 acquires the AK and the related information.
  • the flow of context information is as follows:
  • the S20 MSS sends an air interface message MOB_HO_IND to the service BS1, where the message includes the MSS and the identifier of the target BS2 to be switched;
  • the service BS1 sends a message HO Request to the Authenticator/Key Distributor to which the mobile terminal is connected, that is, the Authenticator/Key Distributor to which the mobile terminal belongs, and the message includes the identifiers of the MSS and the target BS2.
  • the Authenticator/Key Distributor to which the mobile terminal belongs currently generates the air interface key AK2 for the target BS2 and updates the context information, where the updated context information is included;
  • AK2 according to the AK derivative formula defined by AK Context in IEEE 802.16e, AK is derived by Authenticator/Key Distributor according to the identification information of root key, MSS and BS;
  • AKID according to the IEEE 802.16e derivative formula for AKID, the identifier is derived from the identification information of AK:, AK Sequence Number, MSS and BS, and therefore, it is not necessarily carried in the subsequent AK Transfer message, and may be carried by BS2 is generated based on the obtained corresponding information;
  • AK2 Lifetime according to the IEEE 802.16e definition of AK Lifetime, which is equal to the smaller of the current possible root key PAK and PMK life cycle;
  • EIK according to the IEEE 802.16e definition of EIK, which is derived directly from the root key
  • KEK KEK
  • W IEEE 802.16e key derivation formula these two keys are derived from the identification information of AK, MSS and BS. Therefore, it is not necessarily carried in the subsequent AK Transfer message. It is generated by BS2 based on the obtained corresponding information.
  • the target BS2 interacts with the Authenticator/Key Distributor to prepare for the handover.
  • the Authenticator/Key Distributor sends a message HO Response to the service BS1 as a response to the HO Request.
  • the Key Receiver to which the target BS2 belongs sends an AK Request message to the Authenticator/Key Distributor to which the mobile terminal belongs, and the message includes the identifier of the MSS.
  • the AK2 generated by the Authenticator/Key Distributor is sent to the Key Receiver on the target BS2 by using the message AK Transfer on the established secure channel, where the message includes the identifier of the MSS, and the air interface key information AK2, AK in the context information. Lifetime, EIK, AK Sequence Number and CMAC-PN-D and CMAC-PN-U, where:
  • the Key Receiver on the target BS2 then transmits AK2 and its associated context information to the target BS2.
  • the target BS2 After the above process, the target BS2 generates a new AK context according to the obtained AK2 and its context information, and the information such as AK, AKID and the like in the AK context of the target BS2 changes with the handover of the BS, compared with the AK context of the serving BS1. However, information such as AK Lifetime ⁇ AK Sequence Number, CMAC-PN-* remains unchanged.
  • the target BS2 learns the address information of the service Authenticator/Key Distributorl to which the service BS1 is connected.
  • BS2 sends the key to the target Authenticator/Key Distributor2 that is connected to itself.
  • the message will carry the address of the service Authenticator/Key Distributor2 connected to the service BS1.
  • Authenticator/Key Distributoi'2 modifies the address information of the key request message according to the address information of the service Authenticator/Key Distributor 1 carried in the key request message of the BS2, and sends a key request message to the service Authenticator/Key Distributorl, in the message Carrying identification information of the mobile terminal;
  • the Authenticator/Key Distributorl After receiving the key request message, the Authenticator/Key Distributorl identifies the mobile terminal's authentication key AK2, the authentication key sequence number, and the CMAC_PN_* in the authentication key context of the mobile terminal identifier carried in the message. The information is transmitted to the Authenticator/Key Distributor2 on the secure channel by transmitting the message through the key;
  • the Authenticator/Key Distributor After receiving the key transmission message, the Authenticator/Key Distributor extracts and saves the AK2 and its context information. When receiving the key request message from the Key Receiver on the target BS2, it is carried in the AKTransfer message and sent to the target through the secure channel. Key Receiver on BS2.
  • the process of requesting the key from the Authenticator/Key Distributor1 connected to the serving base station of the mobile terminal by the Key Receiver in the target BS2 may be that the target BS2 directly addresses the address of the Authenticator/Key Distributor1 of the terminal obtained by the target BS2.
  • the Authenticator/Key Distributorl of the terminal requests the authentication key and the context, including the Ak sequence number.
  • the services BS1 and BS3, BS4 are equivalently connected to the service Authenticator/Key Distributorl, and respectively belong to the mobile terminal.
  • target BS2 and BS5 are equivalently connected to
  • Authenticator/Key is distributed and directly connected to the Authenticator/Key Distributor2 security channel. Since the target BS2 and Authenticator/Key Distributorl are not connected, the messages exchanged between the two need to be forwarded by Authenticator/Key Distributor2.
  • the specific implementation process of the Key Receiver on the target BS2 requesting the key directly from the Authenticator/Key Distributorl includes: The Key Receiver on the target BS2 requests a key from the Authenticator/Key Distributor1 to which the mobile terminal belongs by using the Authen3 ⁇ 4cator/Key Distributor2 to which the mobile terminal is connected.
  • the request message carries the identification information of the mobile terminal, and the destination address of the request message is directly filled in.
  • Authenticator/Key Distributor 1 instead of Authenticator/Key Distributor2;
  • Authenticator/Key Distributor2 does not process the message, but forwards the request message directly to Authenticator Key Distributorl;
  • Authenticator/Key Distributorl will identify the mobile terminal's authentication key AK2, authentication key sequence number, and authentication key context in the request message.
  • Authenticator/Key Distributor2 After receiving the key transmission message, Authenticator/Key Distributor2 extracts and saves the AK2 and its context information, and then sends an AK Transfer message carrying AK2 and its context information to the Key Receiver on BS2 through the secure channel.
  • the timing for generating a key for the Authenticator Key Distributor1 to which the mobile terminal currently belongs includes the following three cases:
  • the service BS1 After the BS1 receives the terminal handover indication request message MOB_HO_I D of the air interface, the service BS1 sends a corresponding message indicating the service Authenticator/Key to which the mobile terminal currently belongs.
  • Distributorl generates the key and associated context, including the Ak sequence number, which is described in the process given above:
  • the service BS1 After the service BS1 receives the air interface terminal handover request message MOB_MSSHO_REQ, the service BS1 sends a corresponding message indicating the Authenticator/Key to which the mobile terminal currently belongs.
  • Distributorl generates a secret month and related context, including Ak sequence number
  • the target BS2 When the mobile terminal switches to the target BS2 and performs network re-entry, that is, after the mobile terminal sends the RNG-REQ message to the target BS2 to request the network to re-enter, the target BS2 does not obtain the corresponding reference of the mobile terminal beforehand.
  • the target BS2 In the case of the authorization key, the target BS2 directly requests the authentication key and the related context from the service Authenticator Key Distributor1 of the terminal, including the Ak sequence number; at this time, the Authenticator/Key Distributorl of the mobile terminal is based on the destination.
  • the identifier of the target BS2 and the identifier of the mobile terminal generate a key and context information for the terminal according to information such as the PMK of the mobile terminal that it previously reserved, including the Ak sequence number.
  • the air interface is received.
  • MOB_HO_ID the terminal handover indication request message
  • the target BS2 When the mobile terminal switches to the target BS2 and performs network re-entry, that is, after the mobile terminal sends the RNG_REQ message to the target BS2 to request network re-entry, if the target BS2 does not obtain the authentication authorization key corresponding to the mobile terminal beforehand, The target BS2 directly requests the authentication key and related context, including the Ak sequence number, from the Authenticator/Key Distributorl to which the terminal currently belongs.
  • the above-mentioned authentication key and corresponding context information may also be accompanied by a handover request between the serving BS1 and the target BS2 and a message such as handover confirmation. This information is included.
  • a system for transmitting authentication key context information includes:
  • the following related message triggered during the handover process triggers the Authenticator Distributor 400 connected to the MSS current serving base station 100 to generate a new authentication key:
  • the current serving base station 100 After receiving the handover indication request message MOB_HOJND or the handover request message MOB_MSSHO_REQ of the MSS, the current serving base station 100 sends an indication message to the connected Authenticator/Distributor 400, and the Aut enticator/Distributor 400 generates the MSS when receiving the indication message. And the authentication key context information that is switched to the target base station 200 and the authentication key context information is updated; or 2. the target base station 200 triggers the associated key when the MSS completes the handover and performs network reentry.
  • the Receiver 300 sends an authentication key request message to the Authenticator/Distributor 400 connected to the current monthly service base station 100, and the Authenticator/Distributor 400 generates the MSS when receiving the request message. Switching to the authentication key between the target base stations 200 and updating the authentication key context information;
  • the authentication key between the MSS and the target base station 200 to be switched is generated and the authentication key context information is updated and updated.
  • the current context information and the current downlink management message authentication code sequence number are reserved in the following context information; and when the authentication key request message from the Key Receiver 300 to which the target base station 200 belongs is received, The weight key and the current weighting key sequence number and the current uplink/downlink management message authentication code sequence number are sent to the Key Receiver 300 to which the target base station 200 belongs, or the current downlink management message authentication code sequence number may also be used.
  • the Aut enticator/Distributor 400 to which the MSS currently belongs includes: an authentication key generating unit 401, configured to generate an authentication key between the MSS and the target base station 200; and a context updating unit 402, configured to update Context information, the updated context information includes an authentication key, retaining the current authentication key sequence number, and retaining the current uplink/downlink management message authentication code sequence number being used;
  • the information sending unit 403 is configured to: after extracting the authentication key and the current authentication key sequence number from the updated context information, and simultaneously extracting the current uplink/downlink management message authentication code serial number, and carrying the transmission message The key is transmitted to the Key Receiver 300 to which the target base station 200 belongs.
  • the current serving base station 100 and the target base station 200 are simultaneously connected to the Authenticator/Distributor 400, and the current serving base station 100 and the target base station 200 are respectively connected to the connected Authenticator/Distributor 400, where:
  • the Key Receiver 300 of the target base station 200 directly sends an authentication key request message to the Authenticator/Distributor 400; and the Authenticator/Distributor 400 directly transmits the authentication key and the associated sequence number directly to the Key Receiver 300 of the target base station 200.
  • the system of the present invention should also include:
  • the Authenticator/Distributor is directly connected to each other, and the key should be sent in the following two ways:
  • the Key Receiver 300 to which the target base station 200 belongs sends a key request message to the Authenticator/Distributor 500 connected to the target base station 200, where the message carries the address information of the Authenticator/Distributor 400 to which the current serving base station 100 belongs, and the Authenticator/ to which the target base station 200 belongs.
  • the Distributor 500 generates a new key request message according to the address information and sends it to the Authenticator/Distributor 400 to which the current serving base station 100 belongs;
  • the target base station 200 forwards the key request message through the Authenticator/Distributor 500 connected to itself.
  • the destination address of the message is the address of the Authenticator Distributor 400 to which the current serving base station 100 belongs, and the target base station 200 directly forwards the destination address according to the message. Giving the Authenticator/Distributor400 to which the current base station 100 belongs;
  • the Authenticator/Distributor 400 connected to the current serving base station 100 transmits the authentication key and the associated sequence number to the Authenticator/Distributor 400 connected to the target base station 200; the Authenticator/Distributor 400 connected to the target base station 200 extracts the authentication key and the associated serial number and then forwards it.
  • Key Receiver 300 to target base station 200 o
  • the Key Receiver 300 of the target base station 200 may be set in the BS2, and other base stations in which the BS2 belongs to the same authentication domain or set as an independent network element in the network.
  • Figures 5 and 7 only illustrate the structure in which it is located in the base station.
  • the target base station 200 constructs the authentication key context after receiving the authentication key and the associated sequence number. Therefore, as shown in FIG. 8, the target base station 200 includes:
  • the receiving unit 201 receives the authentication key and the associated sequence number forwarded by the Key Receiver 300; the context constructing unit 202 constructs the authentication key context according to the authentication key and the associated serial number.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种鉴权密钥上下文信息的发送方法及系统 技术领域
本发明涉及移动通信技术领域, 特别公开一种移动终端用户在切换过程 中, 移动终端的鉴权密钥上下文信息的发送方法及系统。 背景技术
随着因特网业务的蓬勃发展和无线网络的广泛应用, 移动用户的安全性 已经对于无线系统提出了越来越多的要求, 除了以往一些设备鉴权、 用户鉴 权和服务授权等问题外, 无线用户与 AP ( Access Point,接入点)或 BS ( Base Station, 基站)之间的安全通道的建立、 保密信息的交换、 以及 BS 和密钥 Distributor/Authenticator (分发者 /鉴权者)之间、 Distributor/Authenticator和 Authentication Server (鉴权服务器)之间的保密通道、保密信息的交换等问题 目前已经得到大量关注。
IEEE 802.16d/e 系列协议定义了无线宽带固定和移动接入空中接口部分 的标准, 为了保证空中接口数据的安全, 协议定义了一个安全子层(Privacy Sublayer ), 用于实现对用户的认证、 密钥分发和管理, 以及后续数据的加密 和认证。 认证完成后, BS和 MSS ( Mobile Subscribe Station, 移动签约用户) 之间通过 PKM ( Privacy Key Management, 私有密钥管理)协议产生、 分发并 管理密钥。目前协议中定义了两种认证方式,一种是基于公开密钥算法的 RSA 认证, 该认证结果是在认证双方产生一个 PAK ( Primary Authorization Key, 根授权密钥);另一种是 EAP认证方式,认证的结果就是在认证双方产生 PMK ( Pairwise Master Key, 对称主密钥), 根据 PAK和 /或 PM 以及其它信息, 如 MSS和 BS的标识信息, 派生出 MSS和 BS之间用于派生其它密钥资源的 鉴权密钥 AK ( Authorization Key )。 为了进一步增强安全性, AK被设定在一 定的生命周期 (Lifetime ) 内有效, 在 AK的生命周期终止前的一个保护时间 里, MSS必须完成和 BS之间的重认证 ( Re-authentication ) 并产生新的 AK。 这样, MSS和 BS就可能同时维护两个有效的 AK。 目前协议中使用一个称为 AK序列号(AK Sequence Number )的属性区分同时存在的两个有效 AK。 当 MSS漫游到一个新的目标 BS时,还要进行网络重入(Network re-entry )过程, 根据相应的安全策略, 通过重认证或后端网络(Backhaul )获得密钥资源。
为了便于对密钥进行管理, IEEE 802.16e D10中定义鉴权密钥上下文( AK Context ),用于保存和鉴权密钥相关的上下文信息,如 AK、AKID、AK Lifetime, AK Sequence Number等。 为了实现对管理消息的认证, ΊΕΕΕ 802.16d中定义 了 HMAC ( Hash Message Authentication Code, 哈希消息认证码), 这是一个 通过哈希算法及 AK派生的密钥计算出来的消息验证码, 消息发送方在发送 的管理消息中携带了 HMAC和 AK Sequence Number, 消息接收方收到消息 后, 根据 AK Sequence Number找到对应的 AK, 派生相应的密钥, 据消息 内容计算一个新的消息认证码并与消息中携带的消息认证码进行比较, 从而 实现了对消息的认证。 此外, 为了防止管理消息的重放, IEEE 802.16e中还定 义了基于加密的 CMAC ( Ciper-based Message Authentication Code , 消息认证 码), 这是一个基于加密算法计算出来的消息验证码。 使用这种消息认证码, 消息发送方在发送的管理消息中, 除了携带 CMAC和 AK Sequence Number 夕卜,还携带了一个管理消息序列号,在上行方向上,该序列号为 CMAC_PN— U, 在下行方向, 该序列号为 CMAC— PN— D。 该序列号在消息发送方随着消息的 发送而递增。消息接收方收到管理消息后,对消息的认证过程和 HMAC类似。 但还能根据消息中的序列号、 消息认证码以及对应的 AK上下文中维护的已 接收消息序列号的信息, 判断消息是否为重发消息。 因此, 为了支持 CMAC 以防止管理消息的重放, 在 AK Context 中还定义了 CMAC— PN— * ( CMAC— PN— D或 CMAC_PN_U )等参数。 并且规定了对同一个 AK来说, 一个 {CMAC_PN_*,AK}不能被多次使用, 也就是说, 对于某个 AK来说, 当 其上下文中的 CMAC— PN_*达到最大时, 需要进行重认证。 重认证时会产生 了新的 AK, 同时 AK Context应该根据新的认证结果重新产生, 如: AK Lifetime, AK Sequence Number应该在认证过程中重新生成, CMAC_PN— *等 参数应该重新初始化为某个初始值。
在 IEEE 802.16e D10草案中, 定义的 AK Context内容如表 1所示: 表 1.AK Context for PKMv2
Figure imgf000005_0001
移动终端可能会在多个 BS之间移动, 根据相应的安全策略, 当 MSS移 动到新的目标基站(以下简称 BS2 ) 时, 因为一个认证过程会带来较大的时 延, 在终端切换网络重入过程中, 可能不需要进行重认证, 例如在无线系统 中通常规定在终端切换过程中所涉及到的基站如果属于同一个认证域, 则不 用进行重认证。 如果执行重认证, 则各功能实体上相关的安全信息都会重新 初始化, 从而不必担心出现部分安全信息, 例如相关序列号不一致的问题。
虽然不需要进行重认证, 但是可能会需要重新产生关于在这个新基站下 的相关密钥,如 AK和 AK context, 而这些相关密钥可能会与新的基站标识等 有关, 但产生这些相关密钥的上一级密钥则还是继续利用之前认证过程中产 生的上一级密钥 PMK:。
这样当不进行重认证时, 需要根据上次认证产生的根密钥, 利用 BS2的 标识重新派生一个新的 AK, 并且通过骨干网消息传输到 BS2上。 出于对切 换场景下的网络安全考虑, WiMAX ( Worldwide Interoperability for Microwave Access , 微波接入全球互操作) 论坛已经通过的提案中提出了基于 EAP ( Extensible Authentication Protocol, 可扩展认证协议) 的安全架构, 定义了 基于 IEEE 802.16的空中接口的网络安全模型。
在这种架构下, 每一个 BS连接一个 Key Receiver (密钥接收者), 某个 特定的 BS集合 Key Receiver可能归属到一个 Key Receiver, 该 Key Receiver 可能独立设置, 也可能位于其中一个 BS上或其它网络实体上, Key Receiver 实现 BS 侧的密钥管理。 Key Receiver 通过安全通道连接 Key Distributor/Authenticator (密钥分发者 /養权者), 其中: Authenticator为 MSS 认证、授权和计费功能提供代理功能; Key Distributor: 根据 Authentication服 务器提供的与 MSS之间对等的根密钥信息 MSSK ( Master Session Key, 基本 会话密钥), 并派生出 PMK, 进而派生出 BS和 MSS之间共享的空中接口密 钥 AK,并且分发到 Key Receiver上, 由 Key Receiver接收空中接口密钥 AK, 并派生 BS和 MSS之间的其它密钥。 此外, 作为一个完整的安全网络架构体 系, 还应该包括后端网络的 Authenticator服务器, Authentication服务器主要 是完成为 MSS认证、 授权和计费功能, 并且通过和 MSS之间的达成的密钥 生成机制相互交换产生密钥所必需的信息, 在用户信息产生变化, 及时通知 Authenticator和其他网元信息改变所产生的后果。由于这些信息是在建立安全 通道之前交换的, Authentication服务器和 MSS之间采用的密钥算法等都必 须保证信息的泄漏并不对安全机制产生影响。 在无线通信系统里, Key Distributor/Authenticator会位于同一个物理实体内。 比如 Authenticator和直接 和 AAA交互的实体, 对于派生密钥等事情就是 Authenticator完成的, 而派生 好了的密钥是需要分发到相关使用到的实体上去, 比如 BS。
当前 WiMAX NWG( WiMAX Network Work Group WiMAX微波接入全球 互操作网络工作组)草案中定义了在 Key Distributor和 Key Receiver之间安全 传递密钥的 AK传输协议。当 MSS在 BS之间切换并且不进行重认证时, MSS 切换到新的 BS并且与 BS完成同步后, 能够根据其本地存储的根密钥信息以 及 BS的信息派生出新的鉴权密钥 AK并更新其上下文, 在更新的上下文中, 保持原相关序列号信息。 但由于 BS上没有存储根密钥信息, 而且这时 MSS 和 BS之间也没有建立安全通道, 所以 BS需要通过与后端网络中对应的 Key Distributor进行交互, 通过 AK Transfer (传输)协议获取新的鉴权密钥及相 关信息。
WiMAX NWG草案中, AK Transfer协议定义了在 Key Distributor和 Key Receiver以及 Key Distributor之间传递鉴权密钥的消息交互过程,该过程包含 了一个可选的 AK Request( AK请求)消息和一个强制实现的 AK Transfer( AK 传输 )消息。 AK Request消息用于 Key Receiver向 Key Distributor为当前 BS 请求一个新的 AK, AK Transfer消息或者传输 AK、 AKID、 AK Lifetime和 EIK ( EAP Integrity Key, 可扩展认证协议完整性密钥), 或者指示 AK请求失 败。 此外, AK Transfer协议还定义了一个 AK Delete消息, 用于删除一个已 经存在的 AK。 这些消息包含的内容如表 2所示:
表 2.AK Transfer协议中定义的消息
Figure imgf000007_0001
一般来说, 在切换过程中有三个消息可能触发 AK的传输, 这三个消息 分别为切换指示消息 (Mobile Handover Indication,MOB HO IND )、 测距请求 消息( Ranging Request, RNG REQ )和终端切换请求消息( Mobile MS Handover Request, MOB MSHO REQ )。 图 1所示的就是由 MOB HO IND触发的 AK传 输过程: 如图 1 所示, 在发生切换时, 以服务 BS1 和目标 BS2 连接同一 Authenticator/Key Distributor为例说明, MSS当前归属于该 Authenticator/Key Distributor, 目标 BS2所属的 Key Receiver获取 BS2与终端之间使用的 AK及 其相关上下文信息的流程如下:
S101、 MSS向服务 BS1发送空中接口消息 MOB—HO— IND, 消息中包含 了 MSS以及将要切换的目标 BS2的标识;
S102、月良务 BS1向其连接的 Authenticator/Key Distributor发送 HO Request 消息, 消息中包含了 MSS和目标 BS2的标识;
S 103、 Authenticator/Key Distributor为目标 BS2产生空中接口密钥 AK2; Authenticator/Key Distributor 收到切换请求后, 根据该请求消息携带的
MSS标识和目标 BS2标识, 以及其自身保存的该移动终端标识对应的移动终 端的成对主密钥(PMK ),派生出该移动终端与目标基站之间的所述鉴权密钥, 并与该目标基站交互切换准备消息。
S104、目标 BS2与 Authenticator/Key Distributor进行交互,为切换做准备; S 105、 Authenticator/Key Distributor向服务 BS 1发送 HO Response消息, 作为对 HO Request的响应消息;
5106、目标 BS2所属的 Key Receiver向 Authenticator/Key Distributor发送 AK Request消息, 消息中包含了 MSS的标识;
5107、 Authenticator Key Distributor将产生的 AK2在已经建立的安全通道 上通过 AK Transfer消息发送给目标 BS2所属的 Key Receiver, 消息中包含了
MSS的标识、 空中接口密钥信息 AK2、 AKID、 AK的生命周期以及其它密钥 信息如 EIK;
目标 BS2的 Key Receiver可以设置在 BS2中、与 BS2同属一个认证域的 其它 BS中或设置为独立网元。 如果目标 BS2所属的 Key Receiver位于 BS2 上, 则通过内部接口直接将密钥 AK2传输给目标 BS2, 如果不在 BS2上, 则 通过外部安全通道将 AK2发送给目标 BS2。
5108、 目标 BS2获得空中接口密钥 AK2后, 恢复切换前的会话。 A 可能需要在位于不同物理网元中 Key Distributor和 Key Receiver之间 传输, 因此, 必须保证在 Key Receiver和 Key Distributor之间存在安全的通道 以便能够安全地传输 AK等信息。 也就是, 应该存在一种协议以外地机制保 证在每个 Key Receiver和 Key Distributor之间存在一个安全地连接,在这条连 接上, AK、 AKID、 AK Lifetime和 EIK在 Key Distributor上被加密和签名后, 使用 AK Transfer消息传输给 Key Receiver, Key Receiver收到 AK Transfer消 息后解密消息中被加密的 AK、 AKID、 AK Lifetime和 EIK并将其保存到本地 的 BS或再传输给 BS, BS后续使用 AK与 MSS之间实现安全通信。
现有技术解决了在 Key Receiver和 Key Distributor之间安全传输密钥的问 题, 但是当 MSS切换到新的 BS后, 需要使用获得的 AK及其相关信息生成 新的 AK上下文, 按照现有技术, 目标 BS能够利用获得的 AK:、 AKID、 AK Lifetime和 EIK恢复部分 AK上下文内容, 但是 AK上下文中的其它信息如 AK Sequence Number, CMAC— PN— *等信息需要重新生成,这样可能会与移动 终端侧保存的 AK上下文信息不一致, 影响会话的安全性。 发明内容
本发明提供一种移动终端切换过程中, 鉴权密钥上下文信息的发送方法 及系统, 以解决现有技术中目标基站生成 AK的上下文中序列号信息与移动 终端侧保存的 AK上下文中的序列号信息不一致的问题。
为解决上述技术问题, 本发明提供如下技术方案:
一种鉴权密钥上下文信息的发送方法, 包括如下步骤:
移动终端当前所属的鉴权者 /密钥分发者收到移动终端切换过程中触发的 相关消息时, 生成移动终端与切换到的目标基站之间的鉴权密钥并更新鉴权 密钥上下文信息, 更新后的所述上下文信息中保留有正在使用的当前鉴权密 钥序列号;
移动终端当前所属的鉴权者 /密钥分发者收到来自为所述目标基站所属的 密钥接收者获得鉴权密钥信息的请求消息时, 将所述鉴权密钥和当前鉴权密 钥序列号发送给该目标基站所属的所述的密钥接收者。
进一步, 所述方法中, 所述更新后的上下文信息中还保留有正在使用的 当前上行管理消息认证码序列号和 /或当前下行管理消息认证码序列号; 以及 鉴权者 /密钥分发者同时将所述当前上行管理消息认证码序列号和 /或当前下 行管理消息认证码序列号发送给所述目标基站所属的密钥接收者。
其中, 所述移动终端当前所属的鉴权者 /密钥分发者收到的相关消息为如 下之一:
移动终端的当前服务基站收到移动终端的切换指示请求消息
MOB— HO— IND或切换请求消息 MOB_MSSHO— REQ后, 向移动终端当前所 属的鉴权者 /密钥分发者发送的指示消息;
移动终端切换到目标基站上并进行网络重入时, 目标基站触发所属的密 钥接收者向移动终端当前所属的鉴权者 /密钥分发者发送鉴权密钥请求消息。
本发明另一种实施方式中, 所述目标基站和服务基站连接于不同的鉴权 者 /密钥分发者时:
目标基站所属的密钥接收者向目标基站连接的鉴权者 /密钥分发者发送所 述密钥请求消息, 该消息中携带所述移动终端当前所属的鉴权者 /密钥分发者 的地址信息, 由目标基站自己连接的鉴权者 /密钥分发者根据所述地址信息生 成新的密钥请求消息并发送给所述移动终端当前所属的鉴权者 /密钥分发者; 或者
目标基站通过自己连接的鉴权者 /密钥分发者转发所述密钥请求消息 , 该 消息的目的地址为所述移动终端当前所属的鉴权者 /密钥分发者的地址, 由目 标基站将根据该消息的目的地址直接转发给所述移动终端当前所属的鉴权者 / 密钥分发者。
上述两种实施方式中 , 目标基站的密钥接收者将所述鉴权密钥和相关序 列号传输给目标基站; 目标基站根据所述鉴权密钥和相关序列号构造鉴权密 钥上下文。
本发明提供的一种鉴权密钥上下文信息的发送系统, 包括至少一个基站, 其特征在于, 还包括: 移动终端当前所属的鉴权者 /密钥分发者、 移动终端切 换的目标基站所属的密钥接收者, 其中移动终端当前所属的鉴权者 /密钥分发 者与移动终端当前服务基站相连接;
所述移动终端当前所属的鉴权者 /密钥分发者收到移动终端切换过程中触 发的相关消息时, 生成移动终端与切换到的目标基站之间的鉴权密钥并更新 鉴权密钥上下文信息, 更新后的所述上下文信息中保留有正在使用的当前鉴 权密钥序列号; 并在收到来自所述目标基站所属的密钥接收者的鉴权密钥请 求消息时, 将所述鉴权密钥和当前鉴权密钥序列号发送给该目标基站所属的 所述的密钥接收者。
其中, 所述移动终端当前所属的鉴权者 /密钥分发者中包括:
鉴权密钥生成单元, 用于生成移动终端和目标基站之间的鉴权密钥; 上下文更新单元, 用于更新所述上下文信息, 更新后的上下文信息中包 括所述鉴权密钥, 保留有所述当前鉴权密钥序列号, 还保留有正在使用的当 前上行管理消息认证码序列号和 /或当前下行管理消息认证码序列号; 以及 信息发送单元, 用于从所述更新后的上下文信息中提取所述鉴权密钥、 所述当前鉴权密钥序列号后, 还同时提取所述当前上行管理消息认证码序列 号和 /或当前下行管理消息认证码序列号后发送给所述目标基站所属的密钥接 收者。
所述系统还包括移动终端切换到的目标基站:
移动终端的当前服务基站收到移动终端的切换指示请求消息
MOB_HO_IND后或切换请求消息 MOB—MSHO— REQ后, 向归属的鉴权者 / 密钥分发者发送指示消息, 该鉴权者 /密钥分发者收到该指示消息时, 生成移 动终端与切换到的目标基站之间的鉴权密钥并更新鉴权密钥上下文信息;
移动终端切换到的目标基站在移动终端完成切换并进行网络重入时, 触 发所属的密钥接收者向当前服务基站连接的鉴权者 /密钥分发者发送鉴权密钥 请求消息, 该鉴权者 /密钥分发者收到请求消息时, 生成移动终端与切换到的 目标基站之间的鉴权密钥并更新签权密钥上下文信息。 当所述目标基站连接并归属于所述当前服务基站所归属的鉴权者 /密钥分 发者, 其中:
目标基站的密钥接收者直接向该鉴权者 /密钥分发者发送所述鉴权密钥请 求消息; 以及该鉴权者 /密钥分发者直接将所述鉴权密钥和相关序列号直接发 送给目标基站的密钥接收者。
或者, 目标基站和服务基站分别连接各自连接的鉴权者 /密钥分发者之间 直接相连接, 其中:
目标基站所属的密钥接收者向目标基站连接的鉴权者 /密钥分发者发送所 述密钥请求消息, 该消息中携带所述移动终端当前所属的鉴权者 /密钥分发者 的地址信息, 由目标基站自己所属的鉴权者 /密钥分发者根据所述地址信息生 成新的密钥请求消息并发送给所述移动终端当前所属的鉴权者 /密钥分发者; 或者
目标基站通过自己连接的鉴权者 /密钥分发者转发所述密钥请求消息, 该 消息的目的地址为所述移动终端当前所属的鉴权者 /密钥分发者的地址, 由目 标基站将根据该消息的目的地址直接转发给所述移动终端当前所属的鉴权者 / 密钥分发者; 以及
移动终端当前所属的鉴权者 /密钥分发者将所述鉴权密钥以及相关序列号 发送给目标基站连接的鉴权者 /密钥分发者; 目标基站连接的鉴权者 /密钥分发 者提取所述鉴权密钥以及相关序列号后再转发给目标基站的密钥接收者。
所述目标基站的密钥接收者设置在所述基站中、 其它基站中或设置为独 立网元。
所述目标基站包括: 接收单元, 接收密钥接收者转发的所述鉴权密钥和 相关序列号; 上下文构造单元, 根据所述鉴权密钥和相关序列号构造鉴权密 钥上下文。
本发明的有益效果如下:
使用本发明所述方法在目标基站上生成的鉴权密钥上下文中, 包括与移 动终端侧保持一致的鉴权密钥序列号, 鉴权密钥序列号用于确定对应的鉴权 密钥, 当目标基站接收到移动终端发送的携带有鉴权密 許列号的上行管理 消息时, 根据该鉴权密钥序列号确认对应的鉴权密钥, 并派生相应的密钥来 验证该上下管理消息中所携带的消息认证码, 以确定消息来源的合法性; 或 者当目标基站向所述移动终端发送的下行管理消息时, 利用所述的鉴权密钥 生成该下行管理消息的消息认证码, 并将消息认证码和鉴权密钥序列号携带 在下行管理消息中一起发送, 移动终端收到下行管理消息时, 根据鉴权密钥
'序列号确定对应的鉴权密钥并派生相应的密钥用于^ r证消息的合法性;
因此, 使用本发明方案, 移动终端切换过程中保持了鉴权密钥上下文中 鉴权密钥序列号、 管理消息序列号的连续性, 保证了与移动终端的安全通信, 并有效地防止可能出现的重放攻击, 保证了恢复后的会话安全性。 附图说明
图 1现有移动终端在发生切换时, 目标 BS2获取 AK2及其上下文信息的 流程图;
图 2为本发明所述移动终端在发生切换时, 目标 BS2获取 AK2及其上下 文信息的流程图, 其中服务 BS1 和目标 BS2 连接同一 Authenticator/Key Distributor;
图 3为本发明所述移动终端在发生切换时, 目标 BS2获取 AK2及其上下 文信息的流程图, 其中服务 BS1 和目标 BS2连接不同的 Authenticator/Key Distributor;
图 4为月良务基站和目标基站连接不同 Authenticator/Key Distributor的网络 结构示意图;
图 5为月艮务基站和目标基站连接同一 Authenticator/Key Distributor时, 实 现本发明所述方法的系统主要结构示意图;
图 6为服务基站连接的 Authenticator/Key Distributor的主要结构示意图; 图 7为服务基站和目标基站连接不同 Authenticator/Key Distributor时, 实 现本发明所述方法的系统主要结构示意图; 图 8为目标基站的主要结构示意图。 具体实施方式
现有技术解决了在 Key Receiver和 Key Distributor之间安全传输密钥的问 题, 但是对在 AK Transfer中传输的 AK及相关信息定义不够准确和完整, 考 虑到 MSS切换到新的 BS后,需要使用获得的 AK及其相关信息生成新的 AK 上下文, 按照现有技术, 新的 BS能够利用获得的 AK、 AKID、 AK Lifetime 和 EIK 恢复部分 AK上下文内容, 但是 AK上下文中的其它信息如 AK Sequence Number, CMAC_PN— *等信息需要重新生成。
当移动终端漫游到不同的 BS上时,没有经过重认证而是通过 AK Transfer 协议获取对应的 AK及相关信息, 如果只按照目前定义的 AK Transfer消息传 递 AK及其相关信息, 就会出现流程的不完整性。 以 AK Sequence Number为 例, 目标 BS在获得 AK后, 在与 MSS的后续通信中, MSS和 BS之间可能 同时维护两个有效的 AK, 并使用各自上下文中 AK Sequence Number区分这 两个 AK。 MSS在发送给 BS的管理消息中, 如果携带了 HMAC/CMAC, 则 同时也会携带一个 AK Sequence Number, BS使用 AK Sequence Number查找 对应的 AK,用于对管理消息进行认证。
此外, BS在发送给 MSS的管理消息中如果携带 HMAC/CMAC, 也需要 携带计算该 HMAC/CMAC使用的 AK对应的 AK Sequence Number, MSS收 到管理消息后, 根据 AK Sequence Number查找相应的 AK, 用于对消息进行 认证。
此外, 考虑一种移动终端在多个 BS之间快速移动的场景, 当 MSS先后 两次漫游到一个 BS上时, 如果不需要发生重认证, 那么 BS将先后两次使用 相同的 AK 与 MSS 通信, 如果在获得 AK 的同时没有获得其上下文中的 CMAC— PN__*信息。 BS将重新初始化 CMAC_PN—*, 那么在前后两次通信中 相同的 {CMAC_PN_*,AK}可能被使用多次, 这与 IEEE 802.16e协议中规定的 同一个 {CMAC— PN_*,AK}不能被多次使用的原则相违背。 而在现有技术中, 目标 BS通过 AK Transfer消息获得的 A 及相关信息 中没有包括 AK Sequence Number, 当 MSS切换到目标 BS后, BS无法实现 对 MSS发送的管理消息的认证, 同时也无法生成发给 MSS的管理消息, 因 此, 为了保证切换后能够恢复切换前的会话并保证会话的安全性, 在 AK Transfer中需要传递的除了包括已经定义的信息, 如 AK、 AK Lifetime和 EIK 外, 还应该包括 AK Context中的 AK Sequence Number, CMAC— PN— *等。
在本发明的方案中, 如果移动终端在切换到新的 BS2上但没有发生重认 证时, 后端网络中的密钥分发者在收到相应的切换指示后才艮据目标 BS2的相 的信息, 但保留原上下文中的其它信息, 例如移动终端正在使用的当前 AK Sequence Number和 CMAC— PN— *等, 目标 BS2通过 AK Transfer消息从密钥 分发者获取 AK及其上下文信息, 并根据这些信息构造新的鉴权密钥上下文, 这样, 保证了和移动终端侧新构造的鉴权密钥上下文中, 相关序列号信息的 一致性, 从而保证了恢复会话后目标 BS2与移动终端之间的安全通信。
针对现有技术一的方案, 修改 AK Transfer协议中定义的 AK Transfer消 息,使其携带 AK Context中的 AK Sequence Number和 CMAC— PN— * ,修改后 的消息内容如下:
表 3 修改后的 AK Transfer消息
Figure imgf000015_0001
下面以具体实施例并结合附图详细说明修改后的 AK Transfer流程。
MSS切换到新的 BS2并且与 BS2完成同步后, MSS能够根据其本地存 储的根密钥信息以及 BS2的信息派生出新的鉴权密钥 AK并更新其上下文, 移动终端更新的上下文中, 保留了正在使用的当前 AK Sequence Number和 CMAC— PN— *等。
以目标 BS2所属的 Key Receiver实体位于 BS2上,并且 BS1和 BS2连接 同一个 Authenticator/Key Distributor为例, 如图 2所示 ί在发生切换时, 目标 BS2连接的 Authenticator/Key Distributor上保存有 MSS的当前 AK及其上下 文信息时, 目标 BS2的 Key Receiver获取 AK以及相关上下文信息的流程如 下:
S20 MSS向服务 BS1发送空中接口消息 MOB— HO— IND, 消息中包含 了 MSS以及将要切换的目标 BS2的标识;
S202、 服务 BS1向其所连接的 Authenticator/Key Distributo 即移动终端 当前所属的 Authenticator/Key Distributor发送消息 HO Request,消息中包含了 MSS和目标 BS2的标识;
S203、移动终端当前所属的 Authenticator/Key Distributor为目标 BS2产生 空中接口密钥 AK2并更新上下文信息, 更新后的上下文信息中包括;
1 )、 AK2, 根据 IEEE 802.16e中 AK Context定义的 AK派生公式, AK 由 Authenticator/Key Distributor根据根密钥, MSS和 BS的标识信息派生;
2 )、 AK Sequence Number, 为了保证切换后的安全性, 保留当前正在使 用的 AK Sequence Number, 等于原 AK上下文中的相应的值;
3 )、 AKID, 根据 IEEE 802.16e关于 AKID的派生公式, 该标识由 AK:、 AK Sequence Number, MSS和 BS的标识信息派生, 因此, 在后续发送的 AK Transfer消息中不一定需要携带, 可以由 BS2根据获得的相应信息生成;
4 )、 AK2 Lifetime, 根据 IEEE 802.16e关于 AK Lifetime的定义, 它等于 当前可能的根密钥 PAK和 PMK的生命周期中的较小值;
5 )、 EIK, 根据 IEEE 802.16e关于 EIK的定义, 它由根密钥直接派生;
6 )、 CMAC— PN— D和 CMAC— PN— U, 为了保证切换后的安全性, 这两个 序列号的值等于原 AK上下文中的相应的值;
7 )、 CMAC— KEY— D和 CMAC— KEY— U, 根据 IEEE 802.16e中密钥派生 公式, 这两个密钥是由 AK、 MSS和 BS的标识信息派生出来的, 因此, 在后 续发送的 AK Transfer消息中不一定需要携带,可以由 BS2根据获得的相应信 息生成; 8 )、 PMK Sequence Number, 由于切换过程中没有 '发生 PMK的迁移, 所 以该序列号不需要在后续发送的 AK Transfer中传输;
9 )、 KEK, W IEEE 802.16e中密钥派生公式, 这两个密钥是由 AK, MSS和 BS的标识信息派生出来的, 因此, 在后续发送的 AK Transfer消息中 不一定需要携带, 可以由 BS2根据获得的相应信息生成。
5204、目标 BS2与 Authenticator/Key Distributor进行交互,为切换做准备;
5205、 Authenticator/Key Distributor向服务 BS1发送消息 HO Response, 作为对 HO Request的响应;
5206、 目标 BS2 归属的 Key Receiver 向移动终端当前所属的 Authenticator/Key Distributor发送 AK Request消息, 消息中包含了 MSS的标 识;
5207、 Authenticator/Key Distributor将产生的 AK2在已经建立的安全通道 上通过消息 AK Transfer发送给目标 BS2上的 Key Receiver, 消息中包含了 MSS的标识, 上下文信息中的空中接口密钥信息 AK2、 AK Lifetime, EIK、 AK Sequence Number和 CMAC—PN—D和 CMAC—PN—U, 其中:
5208、然后目标 BS2上的 Key Receiver将 AK2及其相关上下文信息传输 给目标 BS2。
' 经过上述流程, 目标 BS2根据获得的 AK2及其上下文信息生成新的 AK 上下文, 和服务 BS1的 AK上下文相比, 目标 BS2的 AK上下文中的 AK、 AKID等信息随着 BS的切换而改变, 但 AK Lifetime^ AK Sequence Number, CMAC— PN— *等信息保持不变。
如图 3所示,月艮务 BS 1和目标 BS2连接不同的 Authenticator/Key Distributor 时,目标 BS2连接的 Authenticator/ ey Distributor2上没有保存有 MSS的当前 AK及其上下文信息, 服务 BS1连接的服务 Authenticator/Key Distributorl收 到切换请求消息后会和目标 BS2进行切换准备消息交互,这个过程中目标 BS2 获知服务 BS1连接的服务 Authenticator/Key Distributorl的地址信息。
则 BS2在发送给自己连接的目标 Authenticator/Key Distributor2的密钥请 求消息中将携带服务 BS1连接的服务 Authenticator/Key Distributor2的地址信
Authenticator/Key Distributoi'2根据 BS2 的密钥请求消息中携带的服务 Authenticator/Key Distributor 1的地址信息,修改密钥请求消息的地址信息,并 向服务 Authenticator/Key Distributorl发送密钥请求消息, 消息中携带了移动 终端的标识信息;
Authenticator/Key Distributorl收到密钥请求消息后,将消息中携带的移动 终端标识对应的移动终端的鉴权密钥 AK2、 鉴权密钥序列号、 鉴权密钥上下 文中的 CMAC— PN— *等信息通过密钥传输消息, 在安全通道上发送给 Authenticator/Key Distributor2;
Authenticator/Key Distributor接收到密钥传输消息后,提取 AK2及其上下 文信息并保存, 当收到来自目标 BS2上的 Key Receiver的密钥请求消息时, 携带在 AKTransfer消息中,通过安全通道发送给目标 BS2上的 Key Receiver。
本实施例中目标 BS2上的 Key Receiver向移动终端的服务基站连接的 Authenticator/Key Distributorl请求密钥的过程也可以是目标 BS2根据之前得 到的该终端的 Authenticator/Key Distributorl的地址信息, 直接向该终端的 Authenticator/Key Distributorl请求鉴权密钥以及上下文, 其中包括 Ak sequence number。
参阅图 4所示的连接关系, 假设服务 BS1和 BS3、 BS4等同连接于服务 Authenticator/Key Distributorl , 并分别和移动终端当前所属的
Authenticator/Key Distributorl直接连接; 目标 BS2和 BS5等同连接于
Authenticator/Key Distributed,并分别和 Authenticator/Key Distributor2直接连 安全通道直接连接, 由于目标 BS2和 Authenticator/Key Distributorl没有之间 连接, 所以二者之间交互的消息需要经过 Authenticator/Key Distributor2转发。
仍参阅图 3所示, 目标 BS2上的 Key Receiver直接向 Authenticator/Key Distributorl请求密钥的具体实现过程包括: 目标 BS2上的 Key Receiver通过其连接的 Authen¾cator/Key Distributor2 向移动终端当前所属的 Authenticator/Key Distributorl请求密钥 , 请求消息中 携带了移动终端的标识信息, 并且请求消息的目的地址直接填写的是
Authenticator/Key Distributor 1 , 而不是 Authenticator/Key Distributor2;
Authenticator/Key Distributor2 并不处理该消息 , 而是直接将请求消息转 发给 Authenticator Key Distributorl;
Authenticator/Key Distributorl将请求消息中携带的移动终端标识对应的 移动终端的鉴权密钥 AK2、 鉴权密钥序列号、 鉴权密钥上下文中的
CMAC— PN— *等信息通过密钥传输消息, 在安全通道上发送给
Authenticator Key Distributor2;
Authenticator/Key Distributor2接收到密钥传输消息后 , 提取 AK2及其上 下文信息并保存, 然后通过安全通道向 BS2上的 Key Receiver发送携带 AK2 及其上下文信息的 AK Transfer消息。
具体到针对该移动终端当前所属的 Authenticator Key Distributorl生成密 钥的时机, 包括以下三种情况:
1、服务 BS1收到空口的终端切换指示请求消息 MOB— HO— I D后, 服务 BS1发送相应的消息指示移动终端当前所属的服务 Authenticator/Key
Distributorl生成密钥及相关上下文, 包括 Ak sequence number,该实现过程参 见以上给出的流程中:
2、 服务 BS1收到空口的终端切换请求消息 MOB— MSSHO— REQ后, 服 务 BS1发送相应的消息指示移动终端当前所属的 Authenticator/Key
Distributorl生成密月及相关上下文, 包括 Ak sequence number;
3、移动终端切换到目标 BS2上并进行网络重入的时候, 即移动终端在目 标 BS2下发送 RNG— REQ消息给目标 BS2要求网络重入后,如果目标 BS2事 先没有获得该移动终端对应的鉴权授权密钥的情况下, 目标 BS2直接向该终 端的服务 Authenticator Key Distributorl请求鉴权密钥以及相关上下文, 包括 Ak sequence number; 此时该移动终端的 Authenticator/Key Distributorl基于目 标 BS2的标识以及移动终端的标识,根据之前其保留的该移动终端的 PMK等 信息为该终端生成密钥以及上下文信息, 包括 Ak sequence number。
进一步地, 具体到切换过程中该移动终端目标 BS2到属于该移动终端当 前所属的 Authenticator/Key Distributorl请求密钥以及上下文, 包括 Ak sequence number的时机, 除了以上流程中提到的服务 BS1收到空口的终端切 换指示请求消息 MOB—HO— I D后的情况外, 还会发生在:
移动终端切换到目标 BS2并进行网络重入的时候, 即移动终端下发 RNG_REQ消息给目标 BS2要求网络重入后, 如果目标 BS2事先没有获得该 移动终端对应的鉴权授权密钥的情况下, 目标 BS2直接向该终端当前所属的 Authenticator/Key Distributorl请求鉴权密钥以及相关上下文, 包括 Ak sequence number。
同时, 以上提到的鉴权密钥以及相应的上下文信息, 包括 Ak sequence number的传递到目标 BS2的过程也可以是伴随着服务 BS1和目标 BS2之间 的切换请求以及切换确认等消息的传递将这些信息包含其中。
如图 5所示, 本发明提供的一种鉴权密钥上下文信息的发送系统, 包括:
MSS的当前月良务基站 100、 MSS准备切换的目标基站 200、 目标基站 200 所属的 Key Receiver300和 MSS 当前所属的 Authenticator/Distributor400, Authenticator/Distributor400与 MSS当前服务基站 100连接;
在切换过程中触发的如下相关消息会触发 MSS当前服务基站 100连接的 Authenticator Distributor400生成新的鉴权密钥:
1、 当前服务基站 100收到 MSS的切换指示请求消息 MOB_HOJND或 切换请求消息 MOB— MSSHO—REQ后, 向连接的 Authenticator/Distributor400 发送指示消息, 该 Aut enticator/Distributor400收到该指示消息时, 生成 MSS 与切换到的目标基站 200之间的鉴权密钥并更新鉴权密钥上下文信息; 或者 2、 目标基站 200在 MSS完成切换并进行网络重入时, 触发所属的 Key
Receiver300向当前月艮务基站 100连接的 Authenticator/Distributor400发送鉴权 密钥请求消息, 该 Authenticator/Distributor400收到请求消息时, 生成 MSS与 切换到的目标基站 200之间的鉴权密钥并更新鉴权密钥上下文信息;
MSS当前服务基站 100连接的 Authenticator/Distributor400收到 MSS切 换过程中触发的上述任意一个消息时, 生成 MSS与切换到的目标基站 200之 间的鉴权密钥并更新鉴权密钥上下文信息, 更新后的上下文信息中保留有正 在使用的当前鉴权密钥序列号和当前下行管理消息认证码序列号; 并在收到 来自目标基站 200所属的 Key Receiver300的鉴权密钥请求消息时, 将鉴权密 钥和当前養权密钥序列号和当前上 /下行管理消息认证码序列号发送给该目标 基站 200所属的的 Key Receiver300, 或者还可以将当前下行管理消息认证码 序列号。
进而如图 6所示, MSS当前所属的 Aut enticator/Distributor400中包括: 鉴权密钥生成单元 401 ,用于生成 MSS和目标基站 200之间的鉴权密钥; 上下文更新单元 402, 用于更新上下文信息, 更新后的上下文信息中包括 鉴权密钥, 保留有当前鉴权密钥序列号, 还保留有正在使用的当前上 /下行管 理消息认证码序列号; 以及
信息发送单元 403, 用于从更新后的上下文信息中提取鉴权密钥、 当前鉴 权密钥序列号后, 还可以同时提取当前上上 /下行管理消息认证码序列号后, 携带在传输消息中发送给目标基站 200所属的 Key Receiver300。
参阅图 5 所示, 当前服务基站 100 和目标基站 200 同时连接于 Authenticator/Distributor400 ,则当前服务基站 100和目标基站 200分别连接连 接的 Authenticator/Distributor400, 其中:
目标基站 200的 Key Receiver300直接向该 Authenticator/Distributor400发 送鉴权密钥请求消息; 以及该 Authenticator/Distributor400直接将鉴权密钥和 相关序列号直接发送给目标基站 200的 Key Receiver300。
参阅图 7 所示当前服务基站 100 和目标基站 200 分别连接于不同的 Authenticator/Distributor时 , 本发明系统还应该包括:
目标基站 200连接的 Authenticator/Distributor500, 目标基站 200和服务 基站分别连接各自连接的 Authenticator/Distributor , 各自连接的两个 Authenticator/Distributor之间直接相连接, 其中密钥请i ^肖息的发送包括如下 两种方式:
1、 目标基站 200 所属的 Key Receiver300 向目标基站 200 连接的 Authenticator/Distributor500发送密钥请求消息, 该消息中携带当前服务基站 100所属的 Authenticator/Distributor400的地址信息, 由目标基站 200 自己所 属的 Authenticator/Distributor500 据地址信息生成新的密钥请求消息并发送 给当前服务基站 100所属的 Authenticator/Distributor400;
2、 目标基站 200通过自己连接的 Authenticator/Distributor500转发密钥请 求消 息 , 该 消 息的 目 的地址为 当 前服务基站 100 所属 的 Authenticator Distributor400的地址, 由目标基站 200将才艮据该消息的目的地 址直接转发给当前 务基站 100所属的 Authenticator/Distributor400;
则鉴权密钥以及相关序列号的发送过程为:
当前服务基站 100连接的 Authenticator/Distributor400将鉴权密钥以及相 关序列号发送给目标基站 200连接的 Authenticator/Distributor400; ϋ标基站 200连接的 Authenticator/Distributor400提取鉴权密钥以及相关序列号后再转 发给目标基站 200的 Key Receiver300o
上述系统中, 目标基站 200的 Key Receiver300可以设置在 BS2中、 和 BS2属于同一个认证域的其它基站中或在网络中设置为独立网元。图 5和图 7 仅示例了其位于基站中的结构。
目标基站 200 收到鉴权密钥以及相关序列号后构造鉴权密钥上下文, 因 此, 如图 8所示, 目标基站 200中包括:
接收单元 201 , 接收 Key Receiver300转发的鉴权密钥和相关序列号; 上下文构造单元 202, 根据鉴权密钥和相关序列号构造鉴权密钥上下文。 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。

Claims

权 利 要 求
1、 一种鉴权密钥上下文信息的发送方法, 其特征在于, 包括如下步骤: 移动终端当前所属的鉴权者 /密钥分发者收到移动终端切换过程中触发的 相关消息时, 生成移动终端与切换到的目标基站之间的鉴权密钥并更新鉴权 密钥上下文信息, 更新后的所述上下文信息中保留有正在使用的当前鉴权密 钥序列号;
移动终端当前所属的鉴权者 /密钥分发者收到来自为所述目标基站所属的 密钥接收者获得鉴权密钥信息的请求消息时 , 将所述鉴权密钥和当前鉴权密 钥序列号发送给该目标基站所属的所述的密钥接收者。
2、 如权利要求 1所述的方法, 其特征在于,
所述更新后的上下文信息中还保留有正在使用的当前上行管理消息认证 码序列号和 /或当前下行管理消息认证码序列号; 以及
鉴权者 /密钥分发者同时将所述当前上行管理消息认证码序列号和 /或当 前下行管理消息认证码序列号发送给所述目标基站所属的密钥接收者。
3、 如权利要求 1或 2所述的方法, 其特征在于, 所述移动终端当前所属 的鉴权者 /密钥分发者收到的相关消息为如下之一:
移动终端的当前服务基站收到移动终端的切换指示请求消息 MOB_HO_IND或切换请求消息 MOB_MSSHO—REQ后, 向移动终端当前所 属的鉴权者 /密钥分发者发送的指示消息;
移动终端切换到目标基站上并进行网络重入时, 目标基站触发所属的密 钥接收者向移动终端当前所属的鉴权者 /密钥分发者发送鉴权密钥请求消息。
4、 如权利要求 1或 2所述的方法, 其特征在于, 所述目标基站同时归属 于所述移动终端当前所属的鉴权者 /密钥分发者时, 该目标基站的密钥接收者 直接向该鉴权者 /密钥分发者发送所述鉴权密钥请求消息; 以及该鉴权者 /密钥 分发者直接将所述鉴权密钥和相关序列号直接发送给目标基站的密钥接收 者。
5、 如权利要求 4所述的方法, 其特征在于, 所述方法还包括: 目标基站的密钥接收者将所述鉴权密钥和相关序列号传输给目标基站; 目标基站根据所述鉴权密钥和相关序列号构造鉴权密钥上下文。
6、 如权利要求 1或 2所述的方法, 其特征在于, 所述目标基站和服务基 站连接于不同的鉴权者 /密钥分发者时:
目标基站所属的密钥接收者向目标基站连接的鉴权者 /密钥分发者发送所 述密钥请求消息, 该消息中携带所述移动终端当前所属的鉴权者 /密钥分发者 的地址信息, 由目标基站自己所属的鉴权者 /密钥分发者根据所述地址信息生 成新的密钥请求消息并发送给所述移动终端当前所属的鉴权者 /密钥分发者; 或者
目标基站通过自己归属的鉴权者 /密钥分发者转发所述密钥请求消息, 该 消息的目的地址为所述移动终端当前所属的鉴权者 /密钥分发者的地址, 由目 标基站将根据该消息的目的地址直接转发给所述移动终端当前所属的鉴权者 / 密钥分发者。
7、 如权利要求 6所述的方法, 其特征在于,
移动终端当前所属的鉴权者 /密钥分发者将所述鉴权密钥以及相关序列号 发送给目标基站连接的鉴权者 /密钥分发者;
目标基站连接的鉴权者 /密钥分发者提取所述鉴权密钥以及相关序列号后 再转发给目标基站的密钥接收者。
8、 如权利要求 7所述的方法, 其特征在于, 所述方法还包括:
目标基站的密钥接收者将所述鉴权密钥和相关序列号传输给目标基站; 目标基站根据所述鉴权密钥和相关序列号构造鉴权密钥上下文。
9、 一种鉴权密钥上下文信息的发送系统, 包括至少一个基站, 其特征在 于, 还包括: 移动终端当前所属的鉴权者 /密钥分发者、 移动终端切换的目标 基站所属的密钥接收者, 其中移动终端当前所属的鉴权者 /密钥分发者与移动 终端当前服务基站相连接;
所述移动终端当前所属的鉴权者 /密钥分发者收到移动终端切换过程中触 发的相关消息时, 生成移动终端与切换到的目标基 之间的鉴权密钥并更新 鉴权密钥上下文信息, 更新后的所述上下文信息中保留有正在使用的当前鉴 权密钥序列号; 并在收到来自所述目标基站所属的密钥接收者的鉴权密钥请 求消息时, 将所述鉴权密钥和当前鉴权密钥序列号发送给该目标基站所属的 所述的密钥接收者。
10、 如权利要求 9所述的系统, 其特征在于, 所述移动终端当前所属的 鉴权者 /密钥分发者中包括:
鉴权密钥生成单元, 用于生成移动终端和目标基站之间的鉴权密钥; 上下文更新单元, 用于更新所述上下文信息, 更新后的上下文信息中包 括所述鉴权密钥, 保留有所述当前鉴权密钥序列号, 还保留有正在使用的当 前上行管理消息认证码序列号和 /或当前下行管理消息认证码序列号; 以及 信息发送单元, 用于从所述更新后的上下文信息中提取所述鉴权密钥、 所述当前鉴权密钥序列号后, 还同时提取所述当前上行管理消息认证码序列 号和 /或当前下行管理消息认证码序列号后发送给所述目标基站所属的密钥接 收者。
11、 如权利要求 9或 10所述的系统, 其特征在于, 所述系统至少还包括 移动终端切换到的目标基站:
移动终端的当前服务基站收到移动终端的切换指示请求消息 MOB_HO_IND后或切换请求消息 MOB— MSHO— REQ后, 向移动终端当前所 属的鉴权者 /密钥分发者发送指示消息, 该鉴权者 /密钥分发者收到该指示消息 时, 生成移动终端与切换到的目标基站之间的鉴权密钥并更新鉴权密钥上下 文信息;
移动终端的目标基站在移动终端完成切换并进行网络重入时, 触发所属 的密钥接收者向移动终端当前归属的鉴权者 /密钥分发者发送鉴权密钥请求消 息, 该鉴权者 /密钥分发者收到请求消息时, 生成移动终端与切换到的目标基 站之间的鉴权密钥并更新鉴权密钥上下文信息。
12、 如权利要求 9或 10所述的系统, 其特征在于, 所述目标基站连接所 述移动终端当前所归属的鉴权者 /密钥分发者, 其中:
目标基站的密钥接收者直接向该鉴权者 /密钥分发者发送所述鉴权密钥请 求消息; 以及该鉴权者 /密钥分发者直接将所述鉴权密钥和相关序列号直接发 送给目标基站的密钥接收者。
13、 如权利要求 12所述的系统, 其特征在于, 所述目标基站的密钥接收 者设置在所述基站中、 其它基站中或设置为独立网元。
14、 如权利要求 9或 10所述的系统, 其特征在于, 所述系统还包括: 目 标基站连接的鉴权者 /密钥分发者, 与移动终端当前所属的鉴权者 /密钥分发者 之间直接相连接, 其中:
目标基站所属的密钥接收者向移动终端当前所属的鉴权者 /密钥分发者发 送所述密钥请求消息, 该消息中携带所述移动终端当前所属的鉴权者 /密钥分 发者的地址信息, 由目标基站自己所连接的鉴权者 /密钥分发者根据所述地址 信息生成新的密钥请求消息并发送给所述移动终端当前所属的鉴权者 /密钥分 发者; 或者
目标基站通过自己连接的鉴权者 /密钥分发者转发所述密钥请求消息, 该 消息的目的地址为所述移动终端当前所属的鉴权者 /密钥分发者的地址, 由目 标基站将根据该消息的目的地址直接转发给所述移动终端当前所属的鉴权者 / 密钥分发者; 以及
移动终端当前归属的鉴权者 /密钥分发者将所述鉴权密钥以及相关序列号 发送给目标基站连接的鉴权者 /密钥分发者; 目标基站连接的鉴权者 /密钥分发 者提取所述鉴权密钥以及相关序列号后再转发给目标基站的密钥接收者。
15、 如权利要求 14所述的系统, 其特征在于, 所述目标基站的密钥接收 者设置在所述基站中、 其它基站中或设置为独立网元。
16、 如权利要求 13或 15所述的系统, 其特征在于, 所述目标基站包括: 接收单元, 接收密钥接收者转发的所述鉴权密钥和相关序列号;
上下文构造单元, 根据所述鉴权密钥和相关序列号构造鉴权密钥上下文。
PCT/CN2006/002167 2005-08-24 2006-08-24 Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation WO2007022727A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2005100929076A CN100488281C (zh) 2005-08-24 2005-08-24 一种目标基站获取鉴权密钥上下文信息的方法
CN200510092907.6 2005-08-24

Publications (1)

Publication Number Publication Date
WO2007022727A1 true WO2007022727A1 (fr) 2007-03-01

Family

ID=36919332

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/002167 WO2007022727A1 (fr) 2005-08-24 2006-08-24 Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation

Country Status (2)

Country Link
CN (1) CN100488281C (zh)
WO (1) WO2007022727A1 (zh)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137191B (zh) * 2006-08-28 2012-07-18 北京三星通信技术研究有限公司 管理手机在无线通信系统间移动时的安全信息的方法
CN101212798B (zh) * 2006-12-26 2011-07-20 中兴通讯股份有限公司 支持快速切换的预认证方法
CN101321396B (zh) * 2008-04-14 2014-03-12 中兴通讯股份有限公司 移动台的切换实现方法及构建安全接入服务网络的方法
CN101945449B (zh) * 2009-07-10 2015-06-03 中兴通讯股份有限公司 终端切换到家庭基站的方法与装置
CN101820622B (zh) * 2010-02-05 2016-02-10 中兴通讯股份有限公司 无线通信系统中管理空口映射密钥的方法和系统
CN102201915B (zh) * 2010-03-22 2014-05-21 中国移动通信集团公司 一种基于单点登录的终端认证方法和装置
CN105451195B (zh) * 2014-07-25 2018-11-30 成都鼎桥通信技术有限公司 端到端集群密钥分发方法和核心网设备
US9585013B2 (en) * 2014-10-29 2017-02-28 Alcatel Lucent Generation of multiple shared keys by user equipment and base station using key expansion multiplier
CN107294723A (zh) * 2016-03-31 2017-10-24 中兴通讯股份有限公司 消息完整性认证信息的生成和验证方法、装置及验证系统
CN110178394B (zh) 2017-07-27 2021-02-12 华为技术有限公司 小区切换方法和装置
CN110536298B (zh) * 2018-08-10 2023-11-03 中兴通讯股份有限公司 非接入层消息安全指示方法、装置、amf设备、终端及介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455556A (zh) * 2003-05-14 2003-11-12 东南大学 无线局域网安全接入控制方法
CN1553730A (zh) * 2003-05-30 2004-12-08 华为技术有限公司 一种无线局域网中用于移动台切换的密钥协商方法
WO2005027559A1 (en) * 2003-09-12 2005-03-24 Docomo Communications Laboratories Europe Gmbh Fast authentication method and apparatus for inter-domain handover

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455556A (zh) * 2003-05-14 2003-11-12 东南大学 无线局域网安全接入控制方法
CN1553730A (zh) * 2003-05-30 2004-12-08 华为技术有限公司 一种无线局域网中用于移动台切换的密钥协商方法
WO2005027559A1 (en) * 2003-09-12 2005-03-24 Docomo Communications Laboratories Europe Gmbh Fast authentication method and apparatus for inter-domain handover

Also Published As

Publication number Publication date
CN100488281C (zh) 2009-05-13
CN1819698A (zh) 2006-08-16

Similar Documents

Publication Publication Date Title
WO2007022727A1 (fr) Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation
US8374582B2 (en) Access method and system for cellular mobile communication network
KR100704675B1 (ko) 무선 휴대 인터넷 시스템의 인증 방법 및 관련 키 생성방법
US8533461B2 (en) Wireless local area network terminal pre-authentication method and wireless local area network system
US8707045B2 (en) Method and apparatus for traffic count key management and key count management
AU2003295466B2 (en) 802.11using a compressed reassociation exchange to facilitate fast handoff
WO2019019736A1 (zh) 安全实现方法、相关装置以及系统
AU2004231612B2 (en) 802.11 using a compressed reassociation exchange to facilitate fast handoff
US10694376B2 (en) Network authentication method, network device, terminal device, and storage medium
JP2011526097A (ja) トラフィック暗号化キー生成方法及び更新方法
US20020120844A1 (en) Authentication and distribution of keys in mobile IP network
KR20060042045A (ko) 무선 휴대 인터넷 시스템에서 eap를 이용한 보안 관계협상 방법
WO2012146282A1 (en) Authenticating a device in a network
WO2011137805A1 (zh) 切换过程中的安全处理方法、装置和系统
WO2009094942A1 (fr) Procédé et système de réseau de communication pour établir une conjonction de sécurité
CN101083839A (zh) 在不同移动接入系统中切换时的密钥处理方法
WO2009097789A1 (zh) 建立安全关联的方法和通信系统
CN101102600A (zh) 在不同移动接入系统中切换时的密钥处理方法
WO2007134547A1 (fr) Procédé et système pour créer et distribuer une clé de sécurité ip mobile après réauthentification
WO2013075417A1 (zh) 切换过程中密钥生成方法及系统
WO2007025484A1 (fr) Procede de negociation de mise a jour pour cle d'autorisation et dispositif associe
KR20080056055A (ko) 통신 사업자간 로밍 인증방법 및 키 설정 방법과 그 방법을포함하는 프로그램이 저장된 기록매체
Nguyen et al. An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks
KR20100092353A (ko) 트래픽 암호화 키 관리방법 및 장치
WO2021109770A1 (zh) 无线网络切换方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06775485

Country of ref document: EP

Kind code of ref document: A1