WO2023213191A1 - Security protection method and communication apparatus - Google Patents

Security protection method and communication apparatus Download PDF

Info

Publication number
WO2023213191A1
WO2023213191A1 PCT/CN2023/089347 CN2023089347W WO2023213191A1 WO 2023213191 A1 WO2023213191 A1 WO 2023213191A1 CN 2023089347 W CN2023089347 W CN 2023089347W WO 2023213191 A1 WO2023213191 A1 WO 2023213191A1
Authority
WO
WIPO (PCT)
Prior art keywords
user plane
security
key
centralized unit
plane entity
Prior art date
Application number
PCT/CN2023/089347
Other languages
French (fr)
Chinese (zh)
Inventor
亨达诺阿门•本
郭龙华
吴�荣
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023213191A1 publication Critical patent/WO2023213191A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the embodiments of the present application relate to the field of secure communications, and more specifically, to a security protection method and communication device.
  • access network equipment can be composed of a centralized unit (CU) and one or more distributed units (DU). If the separation architecture of control plane and user plane is considered, CU can be further divided into centralized unit control plane (CU-CP) entities and centralized unit user plane (CU-UP) entities. . In a scenario where one CU-CP is connected to multiple CU-UPs, the multiple CU-UPs use the same user plane security key and security algorithm to communicate with the terminal device. Once one CU-UP among multiple CU-UPs is captured by an attacker, the attacker can obtain the user plane security key from the captured CU-UP, thus causing the user plane security key to be leaked.
  • CU-CP centralized unit control plane
  • CU-UP centralized unit user plane
  • the embodiment of the present application provides a security protection method in order to reduce the risk of user plane security key leakage.
  • the first aspect provides a security protection method, which can be executed by a centralized unit control plane entity, or can also be executed by a component (such as a chip or circuit) of a centralized unit control plane entity, without limitation. , for the convenience of description, the following takes the execution by the centralized unit control plane entity as an example for explanation.
  • the method includes: a centralized unit control plane entity receives a first user plane security policy from a session management network element, and the first user plane security policy indicates that user plane security protection does not need to be enabled or user plane security protection is preferably enabled;
  • the unit control plane entity sends a fictitious key to the first centralized unit user plane entity according to the first user plane security policy.
  • the fictitious key is different from the user plane security key.
  • the user plane security key is used for terminal equipment and Enable user plane security protection between centralized unit user plane entities.
  • the centralized unit control plane entity sends a fictitious key that is different from the user plane security key to the first centralized unit user plane entity. Therefore, even if the first centralized unit user plane entity is compromised by an attacker, the attacker can only obtain the fictitious key from the first centralized unit user plane entity, but cannot obtain the user plane security key. , thereby reducing the risk of user plane security key leakage. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between the user plane entity of the first centralized unit and the terminal device will not be turned on.
  • the user plane entity of the first centralized unit will not use the fictitious key to encrypt data, thus it will not affect the user plane of the first centralized unit.
  • the fictitious key is a 128-bit random number or a predefined value.
  • the fictitious key includes a fictitious encryption key and/or a fictitious integrity key.
  • the fictitious encryption key is different from the user plane encryption key included in the user plane security key.
  • the fictitious integrity key is different from the user plane security key.
  • the user plane integrity key included in the key is different. If the first user plane security policy indicates that user plane confidentiality protection does not need to be turned on or that user plane confidentiality protection is preferably turned on, the fictitious key includes a fictitious encryption key; and/or, if the first user plane security policy indicates If there is no need to enable user plane integrity protection or it is preferable to enable user plane integrity protection, the fictitious key includes a fictitious integrity key.
  • the user plane security key is generated by the centralized unit control plane entity based on the root key.
  • the user plane security key is generated by the centralized unit user plane entity using the root key as the input key and the first key generation parameter as the input parameter.
  • the first key generation parameters include one or more of the following: an algorithm identifier and an algorithm type discriminator.
  • the method further includes: the centralized unit control plane entity selects the non-trusted centralized unit user plane entity according to the first user plane security policy.
  • the first centralized unit user plane entity selects the non-trusted centralized unit user plane entity according to the first user plane security policy.
  • the centralized unit control plane entity is selected as the first centralized unit user plane entity of the non-trusted centralized unit user plane entities. And the fictitious key is sent to the selected first centralized unit user plane entity, thereby preventing the untrusted centralized unit user plane entity from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
  • the user plane entity of the untrusted centralized unit meets at least one of the following conditions: deployed in a low security domain, managed by a third party, the physical environment is unsafe, or has not been authenticated or verified remotely.
  • the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity, including: the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity.
  • a centralized unit user plane entity sends the fictitious key and the security algorithm, which is empty.
  • the security algorithm sent by the centralized unit control plane entity to the first centralized unit user plane entity is empty, so even if the first centralized unit user plane entity is breached by the attacker, the attacker can The correct security algorithm cannot be obtained from the first centralized unit user plane entity.
  • the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity sends a request to the first user plane security policy according to the first user plane security policy.
  • the centralized unit user plane entity sends the fictitious key, including: the centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity; the method also includes: the The centralized unit control plane entity receives the security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on; the centralized unit control plane entity sends the security result to the first centralized unit user plane entity.
  • the centralized unit control plane entity Send the user plane security key to the first centralized unit user plane entity to ensure normal transmission of user plane data between the first centralized unit user plane entity and the terminal device.
  • the centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity through the bearer modification process, that is, the centralized unit control plane entity sends the bearer context modification to the first centralized unit user plane entity.
  • Request message, the bearer context modification request message includes the user plane security key.
  • the centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity through the bearer establishment process, that is, the centralized unit control plane entity sends the bearer to the first centralized unit user plane entity.
  • the context release command releases the currently established bearer.
  • the centralized unit control entity sends a bearer context establishment request message to the first centralized unit user plane entity to establish a new bearer.
  • the bearer context establishment request message includes the user plane security key.
  • the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity sends a request to the first user plane security policy according to the first user plane security policy.
  • the centralized unit user plane entity sends the fictitious key, including: the centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity; the method also includes: the The centralized unit control plane entity receives a security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on; the centralized unit control plane entity sends a bearer to the first centralized unit user plane entity Context release command; the centralized unit control plane entity sends the user plane security key to the second centralized unit user plane entity that is reselected by the centralized unit control plane entity.
  • the centralized unit control plane entity Re-select the second centralized unit user plane entity to establish the bearer, and send the user plane security key to the second centralized unit user plane entity, thereby ensuring the security of user plane data between the second centralized unit user plane entity and the terminal device. Normal transmission.
  • the second centralized unit user plane entity is a trusted centralized unit user plane entity.
  • the user plane entity of the trusted centralized unit meets at least one of the following conditions: deployed in a high security domain, managed by an operator, the physical environment is safe, or certified or verified remotely.
  • the first user plane security policy indicates that security protection is preferably turned on
  • the method further includes: the centralized unit control plane entity determines that user plane security protection does not need to be turned on;
  • the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity according to the first user plane security policy, including: the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity
  • the second user plane security policy and the fictitious key, the second user plane security policy indicates that security protection does not need to be turned on.
  • the centralized unit control plane entity determines that user plane security protection does not need to be turned on, and sends an instruction to the first centralized unit user plane entity not to turn on user plane security. It is necessary to enable the second user plane security policy and fictitious key for user plane security protection, so that even if the first centralized unit user plane entity is breached by an attacker, the attacker can only access the first centralized unit user plane entity from Obtaining the fictitious key but not the user plane security key can reduce the risk of user plane security key leakage.
  • the centralized unit control plane entity determines that user plane security protection does not need to be enabled based on one or more of the following: the load condition of the centralized unit control plane entity, or the centralized unit control plane entity's response to the terminal device. Security requirements for data transmitted to and from this centralized user plane entity.
  • the method further includes: the centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates that the terminal device does not support communication with the terminal device.
  • the first centralized unit has the ability to deduce user plane security keys based on specific key generation parameters corresponding to the user plane entity.
  • the specific key generation parameters include the identification of the first centralized unit user plane entity and/or the bearer identification, and the bearer is the bearer between the first centralized unit user plane entity and the terminal device.
  • the identifiers of different bearers between the user plane entity of the first centralized unit and the terminal equipment are different, and the identifiers of the bearers between the user plane entity of the first centralized unit and different terminal equipment are different.
  • the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives the security capability from the terminal device. information.
  • the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives data from the access and mobility management functions The security capability information of the network element.
  • the second aspect provides a security protection method that can be performed by a centralized unit control plane entity
  • the centralized unit control plane entity can also be executed by a component (such as a chip or circuit) of the centralized unit control plane entity, which is not limited.
  • a component such as a chip or circuit
  • the following description takes execution by the centralized unit control plane entity as an example.
  • the method includes: the centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates whether the terminal device supports deriving user plane security keys through specific key generation parameters corresponding to the centralized unit user plane entity. key; if the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameters, the centralized unit control plane entity determines to generate the user plane security key based on the root key and the first key. Parameters are used to generate user plane security keys, and the first key generation parameters include algorithm identifiers and/or algorithm type discriminators; if the security capability information indicates that the terminal device supports deriving user plane security keys through the specific key generation parameters. capability, the centralized unit control plane entity determines to generate a user plane security key based on the root key and the second key generation parameter, the second key generation parameter including the specific key generation parameter.
  • the centralized unit control plane entity determines the method of establishing the bearer context with the centralized unit user plane entity based on the capabilities of the terminal device, so as to avoid inconvenience in the terminal.
  • the centralized unit control plane entity or the centralized unit user plane entity uses the root key and specific key generation parameters to generate user plane security keys. , causing the terminal device and the centralized unit user plane entity to be unable to use the same user plane security key for data transmission.
  • the centralized unit control plane entity may send the root key and specific key generation parameters to the centralized unit user plane entity when the terminal device supports the ability to deduce the user plane security key through specific key generation parameters.
  • the generated user plane security key, or the root key is sent, so that the centralized unit user plane entity can generate the user plane security key based on the root key and specific key generation parameters, thereby realizing communication between different centralized unit user plane entities.
  • User plane security key isolation may be used to send the root key and specific key generation parameters to the centralized unit user plane entity when the terminal device supports the ability to deduce the user plane security key through specific key generation parameters.
  • the generated user plane security key, or the root key is sent, so that the centralized unit user plane entity can generate the user plane security key based on the root key and specific key generation parameters, thereby realizing communication between different centralized unit user plane entities.
  • the specific key generation parameters include the identity of the centralized unit user plane entity and/or the bearer identity, and the bearer is the bearer between the centralized unit user plane entity and the terminal device.
  • the identifiers of different bearers between the centralized unit user plane entity and the terminal equipment are different, and the identifiers of the bearers between the centralized unit user plane entity and different terminal equipment are different.
  • the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives the security capability from the terminal device information.
  • the centralized unit control plane entity obtains the terminal
  • the security capability information of the device includes: the centralized unit control plane entity receives the security capability information from the access and mobility management function network element.
  • a communication device in a third aspect, includes a transceiver unit.
  • the transceiver unit is configured to receive a first user plane security policy from a session management network element.
  • the first user plane security policy indicates that the user plane does not need to be opened.
  • the transceiver unit is also used to send a fictitious key to the first centralized unit user plane entity according to the first user plane security policy, the fictitious key is different from the user plane security key , this user plane security key is used to enable user plane security protection between the terminal device and the centralized unit user plane entity.
  • the fictitious key is a 128-bit random number or a predefined value.
  • the communication device further includes a processing unit, the processing unit is configured to select the non-trusted centralized unit user plane entity according to the first user plane security policy. This first centralized unit user plane entity.
  • the transceiver unit is specifically configured to send the fictitious key and the security algorithm to the first centralized unit user plane entity, and the security algorithm is empty.
  • the first user plane security policy indicates that user plane security protection is preferably turned on, and the transceiver unit is specifically configured to send the first user plane entity to the first centralized unit user plane entity.
  • a user plane security policy and the fictitious key the transceiver unit is also used to receive a security result from the user plane entity of the first centralized unit, the security result indicates that user plane security protection is turned on; the transceiver unit is also used to send a message to the The first centralized unit user plane entity sends the user plane security key.
  • the transceiver unit is also configured to send a bearer context release command to the first centralized unit user plane entity; the transceiver unit is specifically configured to send a bearer context release command to the first centralized unit user plane entity.
  • the unit user plane entity sends a bearer context establishment request message, and the bearer context establishment request message includes the user plane security key.
  • the first user plane security policy indicates that user plane security protection is preferably turned on, and the transceiver unit is specifically configured to send the first user plane entity to the first centralized unit user plane entity.
  • a user plane security policy and the fictitious key the transceiver unit is also used to receive a security result from the user plane entity of the first centralized unit, the security result indicates that user plane security protection is turned on; the transceiver unit is also used to send a message to the The first centralized unit user plane entity sends a bearer context release command; the transceiver unit is also used to send the user plane security key to the second centralized unit user plane entity, and the second centralized unit user plane entity is a centralized unit Control plane entity reselected centralized unit user plane entity used to establish bearer context.
  • the first user plane security policy indicates that security protection is preferably turned on, and the processing unit is also used to determine that user plane security protection does not need to be turned on; the transceiver unit is specifically configured to A second user plane security policy and the fictitious key are sent to the first centralized unit user plane entity, and the second user plane security policy indicates that security protection does not need to be turned on.
  • the processing unit is specifically configured to determine that user plane security protection does not need to be turned on based on one or more of the following: the load condition of the centralized unit control plane entity, or The centralized unit controls the security requirements of the data transmitted between the terminal device and the centralized user plane entity.
  • the fictitious key includes fictitious encryption Key
  • the fictitious encryption key is different from the user plane encryption key included in the user plane security key
  • the fictitious integrity key includes a fictitious integrity key that is complete with the user plane included in the user plane security key.
  • Sexual keys are different.
  • the transceiver unit is also used to obtain security capability information of the terminal device, where the security capability information indicates that the terminal device does not support communication with the user through the first centralized unit.
  • the transceiver unit is specifically configured to receive the security capability information from the terminal device.
  • the transceiver unit is specifically configured to receive the security capability information from the access and mobility management function network element.
  • a communication device in a fourth aspect, includes a transceiver unit and a processing unit.
  • the transceiver unit is used to obtain security capability information of the terminal device.
  • the security capability information indicates whether the terminal device supports communication with a centralized unit.
  • the specific key generation parameter corresponding to the user plane entity has the ability to deduce the user plane security key; if the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameter, the processing unit Used to determine to generate a user plane security key based on the root key and a first key generation parameter, the first key generation parameter including an algorithm identifier and/or an algorithm type discriminator; if the security capability information indicates that the terminal device supports The specific key generation parameter has the ability to deduce the user plane security key, then the processing unit is used to determine to generate the user plane security key according to the root key and the second key generation parameter, the second key generation parameter includes the specific Key generation parameters.
  • the transceiver unit is specifically configured to receive the security capability information from the terminal device.
  • the transceiver unit is specifically configured to receive the security capability information from the access and mobility management function network element.
  • the specific key generation parameter includes an identification and/or a bearer identification of the centralized unit user plane entity.
  • a communication device including a processor.
  • the processor is coupled to a memory and can be used to execute instructions in the memory to implement the above first aspect and the method in any of the possible implementations of the first aspect, or to implement the above second aspect and any of the second aspects. possible implementation methods.
  • the communication device also includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled to the communication interface.
  • the communication device is a centralized unit control plane entity.
  • the communication interface may be a transceiver, or an input/output interface.
  • the communication device is a chip configured in a centralized unit control plane entity.
  • the communication interface may be an input/output interface.
  • the transceiver can be a transceiver circuit.
  • the input/output interface can be an input/output circuit.
  • a processor including: an input circuit, an output circuit and a processing circuit.
  • the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any possible implementation manner from the first aspect to the second aspect.
  • the above-mentioned processor can be one or more chips
  • the input circuit can be an input pin
  • the output circuit can be an output pin
  • the processing circuit can be a transistor, a gate circuit, a flip-flop and various logic circuits, etc.
  • the input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
  • the input signal input by the output circuit may be, for example, but not limited to, a receiver.
  • the output signal may be, for example, but not limited to, output to and transmitted by the transmitter, and the input circuit and the output circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
  • the embodiments of this application do not limit the specific implementation methods of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, and can receive signals through a receiver and transmit signals through a transmitter to execute the method in any possible implementation manner of the first aspect to the second aspect.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory may be provided separately from the processor.
  • the memory can be a non-transitory memory, such as a read-only memory (ROM), which can be integrated on the same chip as the processor, or can be set in different On the chip, the embodiment of the present application does not limit the type of memory and the arrangement of the memory and the processor.
  • ROM read-only memory
  • sending the fictitious key may be a process of outputting the fictitious key from the processor
  • receiving the user plane security policy may be a process of the processor receiving the user plane security policy.
  • the data output by the processor can be output to the transmitter, and the input data received by the processor can be from the receiver.
  • the transmitter and receiver can be collectively called a transceiver.
  • the processing device in the above seventh aspect may be one or more chips.
  • the processor in the processing device can be implemented by hardware or software.
  • the processor can be a logic circuit, an integrated circuit, etc.;
  • the processor can be a general processor, which is implemented by reading software codes stored in a memory, and the memory can Integrated in the processor, it can be located outside the processor and exist independently.
  • a computer program product includes: a computer program (which may also be called a code, or an instruction).
  • a computer program which may also be called a code, or an instruction.
  • the computer program When the computer program is run, it causes the computer to execute the above-mentioned first aspect to the third aspect. Methods in any of the two possible implementation methods.
  • a computer-readable storage medium stores a computer program (which may also be called a code, or an instruction) that when run on a computer causes the above-mentioned first aspect to the third aspect. Methods in either of the two possible implementations are executed.
  • a chip in a tenth aspect, includes a processor and a communication interface.
  • the processor reads instructions stored in the memory through the communication interface and executes the method in any of the possible implementations of the first to second aspects.
  • the chip also includes a memory, in which computer programs or instructions are stored.
  • the processor is used to execute the computer programs or instructions stored in the memory.
  • the processor is used to execute The method in any possible implementation manner of the above first aspect to the second aspect.
  • a communication system including the aforementioned centralized unit control plane entity.
  • the centralized unit control plane entity is used to perform the method in the above first aspect and any possible implementation of the first aspect. , or used to perform the above second aspect and the method in any possible implementation manner of the second aspect.
  • Figure 1 is a schematic diagram of a communication system suitable for the method provided by the embodiment of the present application.
  • Figure 2 shows a schematic flow chart of a security protection method
  • Figure 3 is a schematic flow chart of the security protection method provided by the embodiment of the present application.
  • Figure 4 is a schematic flow chart of a security protection method provided by another embodiment of the present application.
  • Figure 5 is a schematic flow chart of a security protection method provided by another embodiment of the present application.
  • Figure 6 is a schematic flow chart of a security protection method provided by another embodiment of the present application.
  • Figure 7 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • Figure 8 is a schematic block diagram of a communication device provided by another embodiment of the present application.
  • Figure 9 is a schematic diagram of a chip system provided by an embodiment of the present application.
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX global interoperability for microwave access
  • 5G mobile communication system described in this application includes a non-standalone (NSA) 5G mobile communication system or a standalone (SA) 5G mobile communication system.
  • the communication system can also be a public land mobile network (PLMN), a device to device (D2D) communication system, a machine to machine (M2M) communication system, the Internet of things (Internet of things) , IoT) communication system, vehicle to everything (V2X) communication system, unmanned aerial vehicle (UAV) communication system or other communication systems.
  • PLMN public land mobile network
  • D2D device to device
  • M2M machine to machine
  • IoT Internet of things
  • V2X vehicle to everything
  • UAV unmanned aerial vehicle
  • the terminal equipment in the embodiment of this application may refer to user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or User device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a device with wireless communications Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in future evolved PLMNs, etc.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • the embodiments of this application are not limited to this .
  • the network device in the embodiment of this application can be any device with wireless transceiver function.
  • the equipment includes but is not limited to: next generation node B (gNB), evolved node B (evolved Node B, eNB), wireless network controller (radio network controller, RNC), node B (Node B) in 5G B, NB), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), access point (access point, wireless fidelity, WiFi) system, AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), etc.
  • It can also be 5G, such as gNB in the NR system, or, Transmission point (TRP or TP), one or a group (including multiple antenna panels) of antenna panels of a base station in a 5G system, or it can also be a network node that constitutes a gNB or transmission point, such as a baseband unit (BBU), or , distributed unit (DU), etc.
  • TRP Transmission point
  • TP Transmission point
  • BBU baseband unit
  • DU distributed unit
  • At least one of the following or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • at least one of a, b, or c can mean: a, b, c, a and b, b and c, a and c, or a and b and c, where a, b, c can be single or multiple.
  • words such as “first” and “second” are used to distinguish identical or similar items with basically the same functions and effects.
  • words such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not limit the number and execution order.
  • words such as “exemplary” or “for example” are used to represent examples, illustrations or explanations. Any embodiment or design described as “exemplary” or “such as” in the embodiments of the present application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as “exemplary” or “such as” is intended to present related concepts in a concrete manner that is easier to understand.
  • FIG. 1 shows a schematic structural diagram and a schematic diagram of deployment scenarios of access network equipment in NR technology.
  • access network equipment such as gNB
  • CU centralized unit
  • DU distributed unit
  • CU and DU are different logical nodes and can be deployed on different physical devices or on the same physical device.
  • CU can be further divided into a centralized unit-control plane (CU-CP) entity (or also called a CU-CP node) and a centralized unit user plane (CU-CP).
  • CU-CP centralized unit-control plane
  • CU-CP central unit-user plane
  • CU-UP central unit-user plane
  • a gNB will include one CU-CP, multiple CU-UPs, and multiple DUs.
  • DU covers the physical layer of baseband processing and some functions of the media access control (media access control, MAC) layer or the radio link control (radio link control, RLC) layer.
  • media access control media access control
  • RLC radio link control
  • DU can be deployed in a centralized manner; In sparse areas with large station spacing, such as suburban counties, mountainous areas, etc., DU can be deployed in a distributed manner.
  • CU covers the high-level protocol stack of the wireless access network and some functions of the core network, such as radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer and other functions, and can even Supporting some core network functions to be transferred to the access network, it can be called an edge computing network, which can meet the higher requirements for network latency of future communication networks for emerging services such as video, online shopping, and virtual/augmented reality.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • edge computing network which can meet the higher requirements for network latency of future communication networks for emerging services such as video, online shopping, and virtual/augmented reality.
  • CU-CP is a control plane entity that covers the functions of the RRC and PDCP layers. It mainly manages and schedules resources for DU and CU-UP, as well as manages and transfers control plane signaling.
  • CU-UP is a user plane entity, which currently mainly covers the PDCP layer. It mainly transmits user plane data (user plane traffic) and transmits data when a session arrives.
  • connection relationship between the various functional units included in the access network equipment is as follows:
  • a gNB can be composed of one CU-CP, one or more CU-UPs, and one or more DUs;
  • CU-UP and DU are connected through the F1-U interface
  • CU-UP and CU-CP are connected through the E1 interface
  • a DU is connected to a CU-UP
  • a CU-UP can only be connected to one CU-CP; in special cases, it may be connected to multiple CU-CPs; for example, in order to deploy the network more flexibly and elastically, the CU-UP may need to be connected To two or more CU-CPs, for example, when the load of one CU-CP is too large, the CU-UP may need to be allocated or routed to another CU-CP;
  • a CU-UP can be connected to multiple DUs.
  • CU-CP can be connected to the 5G core network (5G core, 5GC)
  • CU-UP can also be connected to 5GC
  • UE can be connected to DU.
  • 5GC may include but is not limited to: access and mobility management function (AMF) network elements, session management function (SMF) network elements, etc.
  • AMF access and mobility management function
  • SMF session management function
  • the AMF network element is mainly used for mobility management and access management, and is responsible for transmitting user policies between terminal equipment and policy control function (PCF) network elements.
  • PCF policy control function
  • SMF network elements are mainly used for session management, allocation and management of Internet protocol (IP) addresses of terminal devices, selection and management of user plane functions, policy control and endpoints of transceiver function interfaces, and downlink data communications.
  • IP Internet protocol
  • SMF network elements included in 5GC please refer to the definitions in 3rd generation partnership project (3GPP) technical standards (TS) 23.501.
  • 3GPP 3rd generation partnership project
  • FIG. 1 is a schematic diagram of the first deployment scenario.
  • CU-CP and CU-UP1 are in the central position, and CU-UP2 is in a distributed position.
  • This scenario may be an ultra-reliable and low-latency communication (URLLC) scenario, where user plane data is transmitted after a central interaction; it can also be implemented in the cloud on the user plane side to achieve data transmission latency. , such as data transmission under critical machine type communication (critical MTC).
  • CU-UP1 and CU-UP2 are in different security domains. Among them, CU-UP1 is in a high security domain (security domain 1 shown in (b) in Figure 1) and is trusted. (trusted) CU-UP, CU-UP2 is in a low security domain (security domain 2 described in (b) of Figure 1) and belongs to an untrusted CU-UP.
  • URLLC ultra-reliable and low-latency communication
  • FIG. 1 is a schematic diagram of the second deployment scenario.
  • CU-CP, CU-UP1 and CU-UP2 are all in the central position.
  • This scenario may be widely used in scenarios such as slicing and edge computing.
  • CU-UP2 is managed by the operator, and CU-UP1 is managed by a third party. Therefore, CU-UP1 and CU-UP2 are at different security levels. Among them, the security level 2 of CU-UP2 is high and it belongs to trusted CU-UP. The security level 1 of CU-UP1 is low and it is untrusted CU-UP.
  • FIG. 2 shows a schematic flow chart of a security protection method, which includes the following steps:
  • the UE sends a protocol data unit (PDU) session establishment request (PDU) to the SMF. session establishment request) message.
  • PDU protocol data unit
  • PDU session establishment request
  • the UE After the UE is powered on, it selects a base station for access and establishes air interface resources.
  • the base station selected by the UE may be a base station composed of DU, CU-UP and CU-CP. Further, the UE initiates a registration process, establishes a connection with the core network (such as 5GC) through the base station, and completes the authentication process. After the UE and the core network complete the authentication, the core network sends the root key of the base station (recorded as KgNB) to the CU-CP.
  • KgNB root key of the base station
  • the AMF included in the core network sends an initial context setup request (initial context setup request) message to the CU-CP, and the initial context setup request message includes KgNB.
  • the UE After the UE completes the authentication with the core network, the UE sends a PDU session establishment request message to the core network.
  • the PDU session establishment request message includes the PDU session identifier.
  • the UE sends a PDU session establishment request message to the AMF in the core network, and the AMF then sends the PDU session establishment request message to the SMF in the core network.
  • the SMF sends a PDU session request message to the CU-CP.
  • the PDU session request message includes the user plane security policy (UP security policy) of the PDU session.
  • the user plane security policy may include a user plane confidentiality security policy and a user plane integrity security policy.
  • the user plane confidentiality security policy is used to indicate whether to enable user plane confidentiality protection.
  • There are three possible values for the user plane confidentiality security policy namely "required”, "preferred” and “not needed”. Among them, required indicates that user plane confidentiality protection must be turned on, preferred indicates that user plane confidentiality protection can be preferably turned on, and not needed indicates that user plane confidentiality protection does not need to be turned on.
  • the user plane integrity security policy is used to indicate whether to enable user plane integrity protection.
  • the user plane integrity security policy also has three possible values, which are required, preferred and not needed. Among them, required means that user plane integrity protection must be turned on, preferred means that user plane integrity protection is preferably turned on, and not needed means that user plane integrity protection does not need to be turned on.
  • the SMF can send the PDU session request message to the AMF, and the AMF then sends the PDU session request message to the CU-CP.
  • CU-CP selects a security algorithm and derives a user plane security key.
  • the security algorithm includes the user plane confidentiality protection algorithm and the user plane integrity protection algorithm.
  • the user plane security key includes the user plane encryption key (denoted as Kupenc) and the user plane integrity key (denoted as Kupint).
  • the input key for deriving the user plane security key includes KgNB. If the CU-CP is connected to multiple CU-UPs, the CU-CP selects the same security algorithm for the multiple CU-UPs, and the user plane security keys derived for the multiple CU-UPs are the same.
  • security algorithm selection and user plane security key deduction can be done during the PDU session establishment process or before the PDU session is established, for example, through the AS Security Mode Command (AS Security Mode Command) process.
  • AS Security Mode Command AS Security Mode Command
  • This application The embodiment does not limit this.
  • CU-CP sends a bearer context setup request (bearer context setup request) message to CU-UP.
  • the bearer context request message includes user plane confidentiality protection algorithm, user plane integrity protection algorithm, Kupenc, Kupint and security instructions.
  • the security instructions include user plane security policy and maximum integrity protection rate.
  • the maximum integrity protection rate is used to indicate the maximum rate after the base station turns on the user plane integrity protection.
  • the maximum integrity protection rate includes the maximum uplink integrity protection rate and the maximum downlink integrity protection rate.
  • the maximum uplink integrity protection rate indicates the maximum uplink rate after the base station turns on user plane integrity protection.
  • the maximum downlink integrity protection rate indicates the maximum downlink rate after the terminal device turns on user plane integrity protection. For example, when the maximum uplink integrity protection rate is 64 kilobits per second, it means that after the base station turns on user plane integrity protection, the maximum data rate that can be received from the terminal device is 64 kilobits per second.
  • CU-CP can send bearer context modification (bearer context modification request) message, which carries the context modification request message including user plane confidentiality protection algorithm, user plane integrity protection algorithm, Kupenc, Kupint and security instructions.
  • the security instructions include user plane security policy and maximum integrity protection rate.
  • CU-UP sends a bearer context setup response (bearer context setup response) message to CU-CP.
  • the bearer context establishment response message includes security results.
  • CU-UP After receiving the bearer context establishment request message, CU-UP uses the security indication included in the bearer context establishment request message and selects a security result (security result).
  • Security results include integrity security results and confidentiality security results.
  • the value of the safety result can be "execute” or “do not execute”. Taking the integrity security result as an example, if the value of the integrity security result is "execute”, the integrity security result indicates that the user plane integrity protection is turned on; if the value of the integrity security result is "do not execute", then the integrity security result indicates that the user plane integrity protection is turned on; if the value of the integrity security result is "do not execute", the integrity The sexual security result indicates that user plane integrity protection is not turned on.
  • the security result selected by CU-UP is related to the user plane security policy included in the security indication. For example, if the value of the user plane security policy is "required”, the value of the security result selected by CU-UP is "execution”. For another example, if the value of the user plane security policy is "not needed”, the value of the security result selected by CU-UP is "not executed”. For another example, if the value of the user plane security policy is "preferred”, the value of the security result selected by CU-UP is "execute” or "do not execute”. For example, if the current load of CU-UP is large, then CU The value of the security result selected by -UP is "Do Not Execute”. For another example, if the security requirements of the data corresponding to the currently established bearer are high, the value of the security result selected by CU-UP is "Execute”.
  • CU-UP receives the bearer context modification request message from CU-CP, then in S250, CU-UP sends a bearer context modification response (bearer context modification response) message to CU-CP,
  • the bearer context modification response message includes security results.
  • CU-UP if CU-UP cannot select a security result corresponding to the user plane security policy, CU-UP sends a rejection message to CU-CP. For example, if the value of the user plane security policy is "required”, but CU-UP does not support enabling user plane security protection, that is, CU-UP cannot select a security result with a value of "execution”, then CU-UP reports to CU-CP Send a rejection message.
  • CU-UP reports to CU -CP sends a reject message.
  • CU-CP sends an RRC reconfiguration (RRC configuration) message to the UE.
  • RRC reconfiguration RRC configuration
  • the RRC reconfiguration message includes security results.
  • the UE enables user plane security protection or does not enable user plane security protection according to the security result. For example, if the value of the integrity security result included in the security result is "execute”, then the UE enables user plane integrity protection. If the value of the confidentiality security result included in the security result is "execute”, then the UE enables user plane confidentiality protection.
  • the UE sends an RRC configuration complete message to the CU-CP.
  • multiple CU-UPs connected to the same CU-CP use the same user plane security key and security algorithm.
  • multiple CU-UPs connected to the same CU-CP may include untrusted CU-UPs.
  • Trusted CU-UP is more likely to be captured by attackers. Once the untrusted CU-UP is captured by the attacker, the attacker can obtain the user plane security key from the untrusted CU-UP and use the user plane security key to secure the communication between the trusted CU-UP and the UE. Data is decrypted or tampered with.
  • embodiments of the present application provide a security protection method in order to reduce the risk of user plane security key leakage. risk.
  • the centralized unit control plane entity is denoted as CU-CP
  • the centralized unit user plane entity is denoted as CU-UP
  • the terminal device is denoted as UE
  • the session management network element is denoted as SMF.
  • the access and mobility management function network element is denoted as AMF.
  • FIG. 3 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 3, method 300 may include the following steps:
  • S310 CU-CP receives the user plane security policy from SMF.
  • SMF sends the user plane security policy to CU-CP.
  • the description of the user plane security policy may refer to S220 in Figure 2.
  • the SMF sends the user plane security policy to the CU-CP through the PDU session request message, that is, the SMF sends the PDU session request message to the CU-CP, and the PDU session request message includes the user plane security policy.
  • the CU-CP After receiving the user plane security policy, the CU-CP executes S320a and/or S320b according to the user plane security policy. For example, if the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP executes S320a. If the user plane security policy indicates that user plane security protection must be enabled or that user plane security protection is preferably enabled, the CU-CP executes S320b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on, the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection must be turned on or is preferably turned on. For face confidentiality protection, the CU-CP performs S320a and S320b.
  • CU-CP sends the fictitious key to CU-UP1.
  • CU-UP1 receives the fictitious key from CU-CP.
  • the dummy key is different from the first user plane security key.
  • the fictitious key is a 128-bit random number, or the fictitious key is a predefined value.
  • the first user plane security key is used to enable user plane security protection between the UE and CU-UP (for example, CU-UP2 below).
  • the first user plane security key is generated by the CU-CP based on the root key.
  • the first user plane security key is generated by the CU-CP using the root key as the input key and the first key generation parameter as the input parameter.
  • the first user plane security key includes a first user plane encryption key and/or a first user plane integrity key, and the first user plane encryption key is used for user plane confidentiality protection between the UE and CU-UP,
  • the first user plane integrity key is used for user plane integrity protection between the UE and the CU-UP.
  • the root key is the root key of the base station, and the base station includes CU-CP and CU-UP1.
  • the first key generation parameters include one or more of the following: an algorithm identifier and an algorithm type discriminator.
  • the value of the algorithm type discriminator includes “user plane confidentiality protection” and/or "user plane integrity protection”.
  • the algorithm identification includes the encryption protection algorithm identification and the integrity protection algorithm identification.
  • the value of the encryption protection algorithm identification includes “next generation encryption algorithm (NEA)0", “NEA1", “NEA2” or “NEA3”.
  • the values of the integrity protection algorithm identifier include "next generation integrity algorithm (NIA)0", "NIA1", “NIA2” or "NIA3".
  • the encryption protection algorithm identifier is used to generate the first user plane encryption key
  • the integrity protection algorithm identifier is used to generate the first user plane integrity key.
  • the fictitious key includes a fictitious encryption key and/or a fictitious integrity key, the fictitious encryption key being different from the first user plane encryption key.
  • the fictitious integrity key is different from the first user plane integrity key.
  • the CU-CP After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "not needed", the CU-CP generates a fictitious encryption key and The configuration encryption key is sent to CU-UP1. For another example, if the value of the user plane integrity security policy in the user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and sends the fictitious integrity key to CU-UP1.
  • CU-CP sends a fictitious key to CP-UP1, including: CU-CP sends a fictitious key and a security algorithm to CU-UP1.
  • the security algorithm is a null-scheme, or the security algorithm is null.
  • Security algorithms include user plane confidentiality security algorithms and/or user plane integrity security algorithms. If the user plane confidentiality security policy indicates that user plane confidentiality protection does not need to be turned on, the user plane confidentiality algorithm included in the security algorithm is an empty algorithm. If the user plane integrity security policy indicates that user plane integrity protection does not need to be enabled, the integrity security algorithm included in the security algorithm is an empty algorithm. Among them, the empty algorithm means that the data transmitted between CP-UP1 and UE is not encrypted.
  • the user plane confidentiality algorithm is a null algorithm, it means that the data transmitted between CP-UP1 and UE will not be encrypted and protected.
  • the user plane integrity algorithm is a null algorithm, it means that the data transmitted between CP-UP1 and UE will not be encrypted. Integrity protection
  • CU-CP sends the fictitious key to CU-UP1 through a bearer context establishment request message or a bearer context modification request message.
  • the fictitious key sent by CU-CP to CU-UP1 is carried in the information element used to carry the user plane security key in the bearer context establishment request message
  • the fictitious key sent by CU-CP to CU-UP1 is carried in the information element used to carry the user plane security key in the bearer context establishment request message.
  • the information element used to carry the user plane security key in the bearer context modification request message In the information element used to carry the user plane security key in the bearer context modification request message.
  • sending a fictitious key by CU-CP to CU-UP1 is equivalent to that the user plane security key sent by CU-CP to CU-UP1 is a fictitious value.
  • the cell used to carry the user plane security key in the bearer context establishment request message is the security information cell
  • the cell used to carry the user plane security key in the bearer context modification request message is the security information cell.
  • the fictitious key sent by CU-CP to CU-UP1 is an empty key, or in other words, CU-CP does not send the key to CU-UP1.
  • the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, that is, the security information information element in the bearer context establishment request message sent by CU-CP to CU-UP1 is empty.
  • method 300 further includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty.
  • CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The security information information element in the bearer context establishment request message is not parsed.
  • CU-CP also sends the user plane security policy to CU-UP1.
  • CU-UP1 receives the user plane security policy
  • CU-UP1 discards or does not store the fictitious key.
  • the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection does not need to be turned on
  • CU-UP1 discards or does not store the fictitious encryption key.
  • the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on
  • CU-UP1 discards or does not store the fictitious integrity key.
  • the fictitious key and user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
  • CU-UP1 discards or does not store the security algorithm according to the user plane security policy. If the user plane security policy indicates that user plane security protection does not need to be enabled, CU-UP1 discards or does not store the security algorithm.
  • CU-CP when CU-CP sends the fictitious key to CU-UP1, CU-CP may not generate the first user plane security key, but CU-CP has the ability to generate the first user plane security key. CU-CP The CP also has the ability to send the first user plane security key to the CU-UP. For example, the user plane security policy indication received on the CU-CP must be enabled When the user plane is secure, CU-CP can select CU-UP2 to establish a bearer context and send the first user plane security key generated by CU-CP to CU-UP2.
  • S320b CU-CP sends the first user plane security key to CU-UP2.
  • CU-UP2 receives the first user plane security key from CU-CP.
  • CU-CP is connected to one CU-UP
  • CU-UP2 and CU-UP1 are the same.
  • CU-UP2 and CU-UP1 are the same or different. .
  • CU-CP After CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection must be turned on or it is preferred to turn on user plane security protection, CU-CP sends the first user plane security generated by CU-CP to CU-UP2. key. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "required” or "preferred", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2. For another example, if the value of the user plane integrity security policy in the user plane security policy is "required” or "preferred", then CU-CP sends the first user plane integrity key generated by CU-CP to CU-UP2. .
  • CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message or a bearer context modification request message.
  • the method 300 also includes S330.
  • CU-CP selects CU-UP.
  • the CU-CP selects a CU-UP based on one or more of the following: the load of each CU-UP among the multiple CU-UPs connected to the CU-CP, or the load of the currently established session.
  • Business requirements such as business delay and load.
  • the CU-CP selects the CU-UP with the lowest load and meeting the requirements of the services carried by the currently established session from multiple connected CU-UPs.
  • CU-UP selects CU-UP according to the user plane security policy. If the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP selects an untrusted CU-UP (ie, CU-UP1 shown in Figure 3) from multiple connected CU-UPs. If the user plane security policy indicates that user plane security protection must be turned on or it is preferable to turn on user plane security protection, the CU-CP selects a trusted CU-UP (i.e., CU-UP2 shown in Figure 3) from multiple connected CU-UPs. .
  • CU-CP selects untrusted CU-UP. If the value of the user plane confidentiality security policy is "required” or “preferred”, and/or, the value of the user plane integrity security policy is "required” or “preferred”, then the CU-CP selects the trusted CU- UP. Exemplarily, the way in which the CU-CP selects the CU-UP according to the user plane security policy is as shown in Table 1 or Table 2.
  • the CU-CP determines whether the connected CU-UP is trusted or untrusted based on one or more of the following: the deployment location of the CU-UP, the physical environment of the CU-UP, or whether the CU-UP passes Authentication or remote attestation verification.
  • the deployment location of CU-UP indicates that CU-UP is deployed in a high security domain or a low security domain.
  • a high security domain refers to a central location, a high security level area, or a low risk level area.
  • a low security domain refers to a distributed location. , areas with low safety level or high risk level.
  • the physical environment of the CU-UP represents the physical environment of the area where the CU-UP is located.
  • the physical environment includes whether it is indoors, whether it is guarded, in a city, or in the suburbs. For example, if a CU-UP meets at least one of the following conditions: it is deployed in a high-security domain, managed by an operator, the physical environment is safe, or it has been authenticated or verified remotely, then the CU-CP determines that the CU-UP It is trusted CU-UP. If a CU-UP meets at least one of the following conditions: deployed in a low-security domain, managed by a third party, the physical environment is unsafe, or has not been certified or remotely verified, the CU-CP determines that the CU-UP Yes and no trusted CU-UP.
  • the CU-CP determines whether the connected CU-UP is trusted or untrusted based on the information obtained from the OAM, that is, the OAM determines whether the connected CU-UP is trustworthy based on one or more of the following: Trusted or untrusted: the deployment location of CU-UP, the physical environment of CU-UP, or whether CU-UP passes authentication or remote attestation verification, and sends information to CU-CP to indicate to CU-CP Whether the CU-UP connected to the CU-CP is trusted or untrusted.
  • the CU-CP After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
  • the CU-CP when the user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP sends a fictitious key that is different from the user plane security key to the CU-UP, so that even if the CU-UP When UP is breached by an attacker, the attacker can only obtain the fictitious key from CU-UP, but not the user plane security key, thus reducing the risk of user plane security key leakage. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between CU-UP and UE will not be turned on.
  • CU-CP sends a fictitious password to CU-UP, key
  • CU-UP will not use this fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
  • the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
  • the CU-CP selects an untrusted CU-UP from the multiple CU-UPs. , and sends the fictitious key to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
  • FIG. 4 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 4, method 400 may include the following steps:
  • S410 CU-CP receives the user plane security policy from SMF.
  • SMF sends the user Faced security policy.
  • the description of the user plane security policy may refer to S220 in Figure 2.
  • the CU-CP After receiving the user plane security policy, the CU-CP executes S420a and/or S420b according to the user plane security policy. For example, if the user plane security policy indicates that user plane security protection does not need to be turned on or that it is preferred to turn on user plane security protection, the CU-CP executes S420a. If the user plane security policy indicates that user plane security protection must be turned on, the CU-CP executes S420b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on or that user plane integrity protection is preferably turned on, the user plane confidentiality security policy in the user plane security policy indicates that user plane integrity protection must be turned on. If the face confidentiality is protected, the CU-CP executes S420a and S420b.
  • CU-CP sends the fictitious key and user plane security policy to CU-UP1.
  • CU-UP1 receives the fictitious key and user plane security policy from CU-CP.
  • the CU-CP After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be turned on or that user plane security protection is preferably turned on, the CU-CP generates a fictitious key and combines the fictitious key with the user plane security The policy is sent to CU-UP1. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "not needed" or "preferred", the CU-CP generates a fictitious encryption key and combines the fictitious encryption key with the user plane confidentiality security The policy is sent to CU-UP1.
  • the CU-CP For another example, if the value of the user plane integrity security policy in the user plane security policy is "not needed” or "preferred", the CU-CP generates a fictitious integrity key and combines the fictitious integrity key with the user plane The integrity security policy is sent to CU-UP1.
  • CU-CP sends a fictitious key and user plane security policy to CP-UP1, including: CU-CP sends a fictitious key, user plane security policy and security algorithm to CU-UP1, and the security algorithm is an empty algorithm, or Says security algorithm is empty.
  • the security algorithm is an empty algorithm, or Says security algorithm is empty.
  • the value of the user plane confidentiality security policy is "not needed” or "preferred”
  • the user plane confidentiality algorithm included in the security algorithm is an empty algorithm.
  • the integrity security algorithm included in the security algorithm is an empty algorithm.
  • the empty algorithm please refer to S320a in method 300.
  • CU-CP sending the fictitious key and user plane security policy to CU-UP1
  • CU-CP sending fictitious key to CU-UP1 in method 300.
  • method 400 also includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty.
  • CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The information element used to carry the user plane security key in the bearer context establishment request message is not parsed.
  • CU-UP1 After CU-UP1 receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be enabled, CU-UP1 discards or does not store the fictitious key.
  • CU-UP1 discards or does not store the security algorithm according to the user plane security policy.
  • the fictitious key and user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
  • the method 400 further includes one or more steps from S421a to S425a.
  • CU-UP1 sends the security result to CU-CP.
  • CU-CP receives the security result from CU-UP1.
  • CU-UP1 After receiving the user plane security policy from CU-CP, CU-UP1 selects a security result according to the user plane security policy. If the user plane security policy indicates that user plane security protection is preferably turned on, CU-UP1 can select a security result based on at least one of the following: the load condition of CU-UP1, or the security requirements of the currently established bearer corresponding data. For example, if the load of CU-UP1 is large and/or the security requirements of the data corresponding to the currently established bearer are low, the value of the security result selected by CU-UP1 is "not executed”. If the load of CU-UP1 is small, and/or the security requirements of the data corresponding to the currently established bearer are high, the value of the security result selected by CU-UP1 is "execute”.
  • the security results sent by CU-UP1 to CU-CP include integrity security results and/or confidentiality security results.
  • CU-CP sends a bearer context release command to CU-UP1.
  • CU-CP After CU-CP receives the security result from CU-UP1, if the value of the security result is "execute”, for example, the value of the integrity security result is “execute”, and/or the value of the confidentiality security result is "execute”, then CU-CP sends a bearer context release command (bearer context release command) to CU-UP1.
  • a bearer context release command (bearer context release command)
  • CU-UP1 can also send bearer context release complete (bearer context release complete) to CU-CP.
  • bearer context release complete (bearer context release complete)
  • the method 400 also includes S423a.
  • the CU-CP still selects CU-UP1 to establish the bearer context, and the method 400 continues to execute S424a. For example, if CU-UP1 is a trusted CU-UP, the CU-CP still selects CU-UP1 to establish the bearer context.
  • the CU-CP selects CU-UP2 from multiple connected CU-UPs to establish a bearer context, and the method 400 continues to execute S425a.
  • the CU-CP selects a trusted CU-UP2 from multiple connected CU-UPs to establish a bearer context.
  • method 400 performs one of steps S424a and S425a.
  • S424a CU-CP sends the first user plane security key to CU-UP1.
  • CU-UP1 receives the first user plane security key from CU-CP.
  • the CU-CP sends the first user plane security key to CU-UP1. Or, if the CU-CP is only connected to CU-UP1, the CU-CP sends the first user plane security key to CU-UP1.
  • the CU-CP may send the first user plane integrity key and/or the first user plane encryption key to the CU-UP1 according to the received security result. For example, if the integrity security result included in the security result indicates that user plane integrity protection is turned on, the first user plane security key sent by CU-CP to CU-UP1 includes the first user plane integrity key generated by CU-CP. . If the confidentiality security result included in the security result indicates that user plane confidentiality protection is turned on, the first user plane security key sent by CU-CP to CU-UP1 includes the first user plane encryption key generated by CU-CP.
  • CU-CP does not send the first user plane integrity key to CU-UP1. If the confidentiality security result included in the security result indicates that the user plane confidentiality protection is not turned on, the CU-CP does not send the first user plane encryption key to CU-UP1.
  • CU-CP sends the first user plane security key to CU-UP1 through a bearer context establishment request message.
  • method 400 may not perform S421a to S423a, that is, CU-CP does not instruct CU-UP1 to release the bearer context, nor will it reselect CU-UP. Then in S424a, CU-CP may pass the bearer context modification request message. Send the first user plane security key to CU-UP1.
  • the security algorithm sent by CU-CP to CU-UP1 is an empty algorithm
  • CU-CP also sends a message to CU-UP1.
  • CU-UP1 sends the security algorithm used for user plane security protection. For example, if the integrity security result included in the security result indicates that user plane integrity protection is turned on, then CU-CP sends the user plane integrity protection algorithm to CU-UP1. If the confidentiality security result included in the security result indicates that user plane confidentiality protection is turned on, then CU-CP sends the user plane confidentiality protection algorithm to CU-UP1.
  • S425a CU-CP sends the first user plane security key to CU-UP2.
  • CU-UP2 receives the first user plane security key from CU-CP.
  • the CU-CP sends the first user plane security key to CU-UP2.
  • CU-CP may send the first user plane integrity key and/or the first user plane encryption key to CU-UP2 according to the user plane security policy. For example, if the value of the user plane integrity security policy in the user plane security policy is "required” or "preferred", then the first user plane security key sent by CU-CP to CU-UP2 includes the First user plane integrity key. If the value of the user plane confidentiality security policy in the user plane security policy is "required” or "preferred”, then the first user plane security key sent by CU-CP to CU-UP2 includes the first user plane security key generated by CU-CP. User plane encryption key.
  • CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message.
  • CU-CP sends the first user plane security key to CU-UP2, including: CU-CP sends the first user plane security key and user plane security policy to CU-UP2.
  • the user plane security policy indication must be turned on.
  • S420b CU-CP sends the first user plane security key to CU-UP2.
  • CU-UP2 receives the first user plane security key from CU-CP.
  • the CU-CP After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection must be enabled, the CU-CP sends the first user plane security key generated by the CU-CP to CU-UP2. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "required", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2. For another example, if the value of the user plane integrity security policy in the user plane security policy is "required”, then CU-CP generates and sends the first user plane integrity key generated by CU-CP to CU-UP2.
  • CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message or a bearer context modification request message.
  • CU-CP can also send the user plane security policy to CU-UP2.
  • CU-UP2 can select the security result according to the user plane security policy and send the security result to CU-CP.
  • the method 400 also includes S430.
  • CU-CP selects CU-UP.
  • S430 is the same as S330 in method 300, and will not be described in detail in this embodiment for the sake of simplicity.
  • the CU-CP After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
  • CU-CP when the user plane security policy indicates that user plane security protection does not need to be turned on or that user plane security protection is preferably turned on, CU-CP sends a fictitious key that is different from the user plane security key to CU-UP. , so that even if the CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from the CU-UP, but cannot obtain the user plane security key, thus reducing the leakage of the user plane security key. risks of. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between CU-UP and UE will not be turned on.
  • CU-CP sends a fictitious message to CU-UP Key
  • CU-UP will not use this fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
  • CU-CP sends the user plane security key to CU-UP, so that Ensure normal transmission of user plane data between CU-UP and UE.
  • the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
  • the CU-CP selects an untrusted CU-UP from the multiple CU-UPs. And the fictitious key is sent to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
  • FIG. 5 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 5, method 500 may include the following steps:
  • S510 CU-CP receives the first user plane security policy from SMF.
  • the SMF sends the first user plane security policy to the CU-CP.
  • the description of the first user plane security policy may refer to S220 in Figure 2.
  • the CU-CP After receiving the first user plane security policy, the CU-CP executes S520a and/or S520b according to the first user plane security policy. For example, if the first user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP executes S520a; if the first user plane security policy indicates that user plane security protection must be enabled, the CU-CP executes S520b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on, and the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection must be turned on, then CU- The CP executes S520a and S520b.
  • the method 500 further includes S540.
  • CU-CP determines the second user plane security policy.
  • the CU-CP determines whether it is necessary Enable user plane security protection. If the CU-CP determines that user plane security protection does not need to be enabled, the CU-CP determines that the second user plane security policy indicates that user plane security protection does not need to be enabled. If the CU-CP determines that user plane security protection needs to be enabled, the CU-CP determines that the second user plane security policy indicates that user plane security protection must be enabled.
  • the CU-CP determines whether user plane security protection needs to be enabled based on one or more of the following: the load condition of the CU-CP, or the security requirements of the CU-CP for data transmitted between the UE and the CU-UP. For example, if the load of the CU-CP is large and/or the CU-CP has low security requirements for data transmitted between the UE and the CU-UP, the CU-CP determines that it is not necessary to enable user plane security protection. For another example, if the load of the CU-CP is small and/or the CU-CP has high security requirements for data transmitted between the UE and the CU-UP, the CU-CP determines that user plane security protection needs to be enabled.
  • the CU-CP executes S520a. If the second user plane security policy determined by the CU-CP indicates that the user plane security protection must be turned on, Then the CU-CP executes S520b.
  • CU-CP sends the fictitious key and the second user plane security policy to CU-UP1.
  • CU-UP1 receives the fictitious key and the second user plane security policy from CU-CP.
  • the second user plane security policy indication sent by CU-CP to CU-UP1 does not require enabling user plane security protection.
  • the value of the second user plane confidentiality security policy in the second user plane security policy is "not needed”
  • the value of the second user plane integrity security policy in the second user plane security policy is "not needed”.
  • the CU-CP After the CU-CP receives the first user plane security policy, if the first user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1, and Send the first user plane security policy to CU-UP1 as the second user plane security policy. For example, if the value of the first user plane confidentiality security policy in the first user plane security policy is "not needed", then CU-CP generates a fictitious encryption key and sends the fictitious encryption key to CU-UP1, and sending the first user plane confidentiality security policy to CU-UP1 as the second user plane confidentiality security policy.
  • the CU-CP For another example, if the value of the first user plane integrity security policy in the first user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and sends the fictitious integrity key to the CU. -UP1, and sends the first user plane integrity security policy as the second user plane integrity security policy to CU-UP1.
  • the CU-CP determines the second user plane security policy
  • the CU-CP determines the second user plane security policy
  • the CU-CP if the second user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1. and sending the second user plane security policy to CU-UP1.
  • the value of the second user plane confidentiality security policy in the second user plane security policy is "not needed”
  • the CU-CP generates a fictitious encryption key and combines the fictitious encryption key and the second user plane secret The safe side is sent to CU-UP1.
  • the CU-CP For another example, if the value of the second user plane integrity security policy in the second user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and combines the fictitious integrity key with the second The user plane integrity security policy is sent to CU-UP1.
  • CU-CP sends the fictitious key and the second user plane security policy to CP-UP1, including: CU-CP sends the fictitious key, the second user plane security policy and the security algorithm to CU-UP1.
  • the security algorithm is Empty algorithm. For example, if the value of the second user plane confidentiality security policy is "not needed”, the user plane confidentiality algorithm included in the security algorithm is an empty algorithm. If the value of the second user plane integrity security policy is "not needed”, the integrity security algorithm included in the security algorithm is an empty algorithm. For relevant description of the empty algorithm, please refer to S320a in method 300.
  • CU-CP sending the fictitious key and the second user plane security policy to CU-UP1 please refer to the description of CU-CP sending the fictitious key to CU-UP1 in method 300.
  • method 500 also includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty.
  • CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The information element used to carry the user plane security key in the bearer context establishment request message is not parsed.
  • the fictitious key and the second user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
  • CU-UP1 discards or does not store the fictitious key according to the second user plane security policy.
  • CU-UP1 discards or does not store the security algorithm according to the second user plane security policy.
  • S520b CU-CP sends the first user plane security key and the second user plane security policy to CU-UP2.
  • CU-UP2 receives the first user plane security key and the second user plane security policy from CU-CP.
  • the second user plane security policy sent by CU-CP to CU-UP2 indicates that user plane security protection must be enabled. For example, the value of the second user plane confidentiality security policy in the second user plane security policy is "required”, and/or the value of the second user plane integrity security policy in the second user plane security policy is " required”.
  • CU-CP After CU-CP receives the first user plane security policy, if the first user plane security policy indicates that user plane security protection must be enabled, CU-CP sends the first user plane security key generated by CU-CP to CU-UP2, and sending the first user plane security policy to CU-UP2 as the second user plane security policy. For example, if the value of the first user plane confidentiality security policy in the first user plane security policy is "required", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2, and The first user plane confidentiality security policy is sent to CU-UP2 as the second user plane confidentiality security policy.
  • CU-CP sends the first user plane integrity key generated by CU-CP to CU-UP2. , and send the first user plane integrity security policy to CU-UP2 as the second user plane integrity security policy.
  • CU-CP determines the second user plane security policy
  • CU-CP sends the second user plane security policy and the CU-CP-generated security policy to CU-UP2.
  • First user plane security key For example, if the value of the second user plane confidentiality security policy in the second user plane security policy is "required”, then CU-CP sends the first user plane encryption key and the second user plane confidentiality to CU-UP2. security strategy. For another example, if the value of the second user plane integrity security policy in the second user plane security policy is "required”, then CU-CP sends the second user plane integrity security policy and the CU-CP generated message to CU-UP2. The first user plane integrity key.
  • the method 500 also includes S530.
  • CU-CP selects CU-UP.
  • S530 is the same as S330 in method 300, and will not be described in detail in this embodiment for the sake of simplicity.
  • the CU-CP After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
  • the first user plane security policy indicates that user plane security does not need to be turned on, or the CU-CP
  • the CU-CP sends a fictitious key that is different from the user plane security key to the CU-UP, so that even if the When CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from CU-UP, but not the user plane security key, thus reducing the risk of user plane security key leakage.
  • the user plane security protection between the CU-UP and the UE will not be turned on. Therefore, even if the CU -CP sends a fictitious key to CU-UP, and CU-UP will not use the fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
  • the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
  • the CU-CP selects an untrusted CU-CP from the multiple CU-UPs. UP, and sends the fictitious key to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
  • FIG. 6 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 6, method 600 includes the following steps:
  • Method 600 executes S610a or S610b.
  • S610a The UE sends security capability information to the CU-CP.
  • the CU-CP receives the security capability information from the UE.
  • the security capability information is used to indicate whether the UE supports the ability to deduce the user plane security key through the specific key generation parameters corresponding to CU-UP.
  • the specific key generation parameters corresponding to CU-UP are the algorithm identifier and algorithm type discriminator.
  • Irrelevant key generation parameters for example, specific key generation parameters corresponding to CU-UP include CU-UP identifier (ID) and/or bearer ID.
  • CU-UP ID is used to identify CU-UP, and different CU-UPs have different IDs.
  • the bearer is the bearer between CU-UP and UE, and different bearers have different IDs. For example, bearers between CU-UP and different UEs have different IDs, bearers between CU-UP and the same UE have different IDs, and bearers between different CU-UPs and different UEs have different IDs.
  • the security capability information is 1-bit information.
  • the security capability information is used to indicate that the UE supports deriving user plane security keys through specific key generation parameters corresponding to CU-UP. capability; when the value of the security capability information is "0", the security capability information is used to indicate that the UE does not support the ability to derive user plane security keys through specific key generation parameters corresponding to CU-UP.
  • the security capability information is used to indicate that the UE supports the ability to deduce the user plane security key through the specific key generation parameters corresponding to CU-UP.
  • the security capability information is used to indicate that the UE does not support the ability to derive user plane security keys through specific key generation parameters corresponding to CU-UP.
  • the UE sends security capability information to the CU-CP through an uplink RRC message.
  • the security capability information is carried in the UE capability information (UECapabilityInformation) in the RRC message.
  • the method 600 also includes: the CU-CP sends a request message #1 to the UE, where the request message #1 is used to request the security capability information of the UE.
  • the UE sends the security capability information of the UE to the AMF according to the request message #1.
  • the CU-CP can also transfer the security capability information of the UE to Send to AMF.
  • the AMF can store the security capability information of the UE.
  • the CU-CP obtains the UE's security capability information from the UE.
  • the UE's security capability information is sent to the AMF.
  • the indication information is used to instruct to obtain the security capability information of the UE.
  • S610b AMF sends security capability information to CU-CP.
  • the CU-CP receives the security capability information from the AMF.
  • the AMF sends security capability information to the CU-CP through a downlink next generation application protocol (NGAP) message.
  • NGAP next generation application protocol
  • the AMF sends an initial context setup request message to the CU-CP, and the initial context setup request message includes security capability information.
  • the security capability information stored in the AMF is obtained from the UE or base station.
  • the initial non-access stratum (NSA) message sent by the UE to the AMF includes security capability information.
  • the AMF can obtain the UE's security capability information from the initial NAS message and store the UE's security capability information.
  • the AMF may send request message #2 to the base station. The request message #2 is used to request the security capability information of the UE. After receiving the request message #2, the base station sends the UE's security capability information to the AMF.
  • S620 CU-CP receives the user plane security policy from SMF.
  • SMF sends the user plane security policy to CU-CP.
  • the description of the user plane security policy may refer to S220 in Figure 2.
  • the SMF sends the user plane security policy to the CU-CP through the PDU session request message, that is, the SMF sends the PDU session request message to the CU-CP, and the PDU session request message includes the user plane security policy.
  • the CU-CP uses method 1 to communicate with the CU. -UP establishes bearer context. If the security capability information received by the CU-CP indicates that the UE does not support the ability to deduce the user plane key through the specific key generation parameters corresponding to the CU-UP, then after receiving the user plane security policy, the CU-CP uses method 2 and CU-UP establishes the bearer context.
  • CU-CP uses method 1 to establish a bearer context with CU-UP
  • S630a CU-CP sends the second user plane security key to CU-UP.
  • CU-UP receives the second user plane security key from CU-CP.
  • the second user plane security key is used to enable user plane security between the CU-UP and the UE.
  • the second user plane security key is generated by the CU-CP using the root key as the input key and the second key generation parameter as the input parameter.
  • the second key generation parameter includes a specific password corresponding to the CU-UP.
  • the second key generation parameters also include first key generation parameters.
  • the specific key generation parameters corresponding to CU-UP may include CU. -UP ID and/or bearer ID, the bearer is the bearer established between CU-UP and UE.
  • the CU-CP sends the second user plane security key to the CU-UP through the bearer context establishment request message.
  • the bearer context establishment request message sent by CU-CP to CU-UP may also include user plane security algorithms and security instructions.
  • Security directives include user plane security policy and maximum integrity protection rate.
  • S630b CU-CP sends the root key to CU-UP.
  • CU-UP receives the root key from CU-CP.
  • the CU-CP sends the root key to the CU-UP through a bearer context establishment request message.
  • the bearer context establishment request message sent by the CU-CP to the CU-UP may also include the user plane security algorithm and security instructions.
  • the security instructions include the user plane security policy and the maximum integrity protection rate.
  • S631b CU-UP sends specific key generation parameters to CU-CP. Accordingly, the CU-CP receives specific key generation parameters from the CU-UP.
  • the CU-UP After receiving the root key from the CU-CP, the CU-UP generates the second user plane key according to the root key and the second key generation parameters, and sends the specific key generation parameters to the CU-CP.
  • the CU-UP sends specific key generation parameters to the CU-UP through a bearer context establishment response message.
  • the method 600 may also include S640 .
  • the CU-CP sends specific key generation parameters to the UE.
  • the UE receives specific key generation parameters from the CU-CP.
  • the CU-CP sends the specific key generation parameters to the UE.
  • the CU-CP can send parameters unknown to the UE among the specific key generation parameters to the UE.
  • the specific key generation parameters include CU-UP ID and bearer ID, where CU-UP ID is a parameter unknown to the UE and bearer ID is a parameter known to the UE, then the CU-CP sends the CU-UP ID to the UE. If the parameters included in the specific key generation parameters are all parameters known to the UE, the CU-CP may not send the specific key generation parameters to the UE.
  • the UE After receiving the specific key generation parameters, the UE can generate the second user plane security key according to the root key and the second key generation parameters.
  • the CU-CP sends specific key generation parameters to the UE through an RRC reconfiguration (RRC reconfiguration) message.
  • RRC reconfiguration RRC reconfiguration
  • the second user plane security key is generated based on the CU-UP ID, which can implement different CU-UPs. Isolation of user plane security keys between Since IDs of different bearers are different, the second user plane security key is generated according to the bearer ID, which can realize the isolation of user plane security keys between different bearers.
  • CU-CP uses mode 2 to establish a bearer context with CU-UP
  • CU-CP sends a fictitious key to CU-UP according to the received user plane security policy, or sends a first user plane security key to CU-UP.
  • first user plane security key please refer to S320a in method 300.
  • the CU-CP sends the fictitious key to the CU-UP. If the user plane security policy indicates that the user plane security protection must be turned on or it is preferred to turn on the user plane security protection, then CU-CP sends the first user plane security key to CU-UP.
  • the user plane security policy indicates that the user plane security protection must be turned on or it is preferred to turn on the user plane security protection, then CU-CP sends the first user plane security key to CU-UP.
  • S320a and S320b please refer to S320a and S320b in method 300.
  • the CU-CP sends the fictitious key to CU-UP. If the user plane security policy indicates that user plane security protection must be turned on, Then the CU-CP sends the first user plane security key to the CU-UP.
  • S420a in Method 400 and S420b.
  • the CU-CP sends a fictitious key to CU-UP. If the user plane security policy indicates that user plane security protection must be enabled, the CU-CP sends a fictitious key to the CU-UP. UP sends the first user plane security key. If the user plane security policy indicates that user plane security protection should be enabled first, and the CU-CP determines that user plane security protection does not need to be enabled, the CU-CP sends the fictitious key to the CU-UP.
  • the CU-CP sends the first user plane security key to the CU-UP.
  • the CU-CP sends the first user plane security key to the CU-UP.
  • the CU-CP can select from the multiple connected CU-UPs according to the user plane security policy. Select a CU-UP to establish the bearer. For example, if the user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP selects the untrusted CU-UP to establish the bearer. If the user plane security policy indicates that user plane security protection must be turned on or it is preferred to turn on user plane security protection, Then the CU-CP selects the trusted CU-UP to establish the bearer. For more related descriptions, please refer to S330 in method 300.
  • the CU-CP determines the method of establishing the bearer context with the CU-UP based on the UE's capabilities to avoid deriving parameters through specific key generation when the UE does not support it.
  • CU-CP or CU-UP uses the root key and specific key generation parameters to generate user plane security keys, resulting in the UE and CU-UP being unable to use the same user plane security key. Perform data transfer.
  • the CU-CP may send the user plane security key generated based on the root key and the specific key generation parameters to the CU-UP if the UE supports the ability to deduce the user plane security key through specific key generation parameters. , or send the root key to CU-UP, so that CU-UP can generate user plane security keys based on the root key and specific key generation parameters, thereby achieving user plane security key isolation between different CU-UPs.
  • the CU-CP shall provide CU-UP sends a fictitious key that is different from the user plane security key. Therefore, even if the CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from CU-UP but not the user.
  • the user plane security key can be used to reduce the risk of user plane security key leakage.
  • Embodiments of the present application can divide the transmitting end device or the receiving end device into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module. middle.
  • the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods. The following is an example of dividing each functional module into corresponding functions.
  • FIG. 7 is a schematic block diagram of a communication device 1000 provided by an embodiment of the present application.
  • the communication device 1000 may include: a transceiver unit 1010 and a processing unit 1020 .
  • the communication device 1000 may be the centralized unit control plane entity in the above method embodiment, or may be a chip used to implement the functions of the centralized unit control plane entity in the above method embodiment. .
  • the communication device 1000 may correspond to the method 300, the method 400, the method 500 or the method of the embodiment of the present application.
  • the centralized unit control plane entity in the method 600 the communication device may include a centralized unit for performing the method 300 in Figure 3, the method 400 in Figure 4, the method 500 in Figure 5 or the method 600 in Figure 6
  • the unit controls the methods executed by the surface entity.
  • each unit in the communication device 1000 and the above-mentioned other operations and/or functions are respectively the corresponding processes of the method 300 in Figure 3, the method 400 in Figure 4, the method 500 in Figure 5, or the method 600 in Figure 6 . It should be understood that the specific process of each unit performing the above corresponding steps has been described in detail in the above method embodiments, and will not be described again for the sake of brevity.
  • transceiver unit 1010 in the communication device 1000 may correspond to the transceiver 2020 in the communication device 2000 shown in FIG. 8
  • processing unit 1020 in the communication device 1000 may correspond to the communication device shown in FIG. 8 Processors in 2000 and 2010.
  • the chip when the communication device 1000 is a chip, the chip includes a transceiver unit.
  • the chip may also include a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface; the processing unit may be a processor, microprocessor, or integrated circuit integrated on the chip.
  • the transceiver unit 1010 is used to implement the signal transceiver operation of the communication device 1000
  • the processing unit 1020 is used to implement the signal processing operation of the communication device 1000 .
  • the communication device also includes a storage unit 1030, which is used to store instructions.
  • Figure 8 is a schematic block diagram of the device 2000 provided by the embodiment of the present application.
  • the device 2000 includes: at least one processor 2010.
  • the processor 2010 is coupled to the memory and is used to execute instructions stored in the memory to perform the method described in FIG. 3, FIG. 4, FIG. 5 or FIG. 6.
  • the device 2000 also includes a transceiver 2020.
  • the processor 2010 is coupled to the memory and is used to execute instructions stored in the memory to control the transceiver 2020 to send signals and/or receive signals.
  • the processor 2010 can control Transceiver 2020 sends fictitious keys and/or receives fictitious keys.
  • the device 2000 also includes a memory 2030 for storing instructions.
  • processor 2010 and the memory 2030 can be combined into one processing device, and the processor 2010 is used to execute the program code stored in the memory 2030 to implement the above functions.
  • the memory 2030 may also be integrated in the processor 2010 or independent of the processor 2010.
  • the transceiver 2020 may include a receiver and a transmitter.
  • the transceiver 2020 may further include an antenna, and the number of antennas may be one or more.
  • the transceiver 2020 may be a communication interface or an interface circuit.
  • the chip When the device 2000 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface;
  • the processing unit may be a processor, microprocessor, or integrated circuit integrated on the chip.
  • FIG. 9 is a schematic diagram of a chip system according to an embodiment of the present application.
  • the chip system here may also be a system composed of circuits.
  • the chip system 3000 shown in Figure 9 includes: a logic circuit 3010 and an input/output interface (input/output interface) 3020.
  • the logic circuit is used to couple with the input interface and transmit data (such as the first input interface) through the input/output interface. timing configuration information) to execute the method described in Figure 3, Figure 4, Figure 5 or Figure 6.
  • An embodiment of the present application also provides a processing device, including a processor and an interface.
  • the processor may be used to execute the method in the above method embodiment.
  • the above processing device may be a chip.
  • the processing device can be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), a system on chip (SoC), or Is the central processing unit (central processing unit) processor unit (CPU), it can also be a network processor (NP), it can also be a digital signal processor (DSP), it can also be a microcontroller (micro controller unit (MCU)), it can also It is a programmable logic device (PLD) or other integrated chip.
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • NP network processor
  • DSP digital signal processor
  • MCU microcontroller
  • PLD programmable logic device
  • each step of the above method can be completed by instructions in the form of hardware integrated logic circuits or software in the processor.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor for execution, or can be executed by a combination of hardware and software modules in the processor.
  • the software module can be located in a random register, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, register, or other mature storage media in this field.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method embodiment can be completed through an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory. Erase electrically programmable read-only memory (EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • the present application also provides a computer program product.
  • the computer program product includes: computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to execute the steps shown in Figures 3 to 6. The method of any one of the embodiments is shown.
  • the present application also provides a computer-readable medium.
  • the computer-readable medium stores program code.
  • the program code When the program code is run on a computer, it causes the computer to execute the steps shown in Figures 3 to 6. The method of any one of the embodiments is shown.
  • the present application also provides a system, which includes the aforementioned centralized unit control plane entity.
  • the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented using software, they may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable information medium to another computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
  • the usable media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., high-density digital video discs (DVD)), or semiconductor media (e.g., solid state disks, SSD)) etc.
  • magnetic media e.g., floppy disks, hard disks, tapes
  • optical media e.g., high-density digital video discs (DVD)
  • DVD digital video discs
  • semiconductor media e.g., solid state disks, SSD
  • the disclosed systems, devices and methods can be achieved through other means.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided in the embodiments of the present application are a security protection method, and a communication apparatus. According to the method provided by the present application, if a user plane security policy received by a central unit-control plane entity indicates that there is no need to start user plane security protection or that the user plane security protection is to be preferably started, the central unit-control plane entity sends a virtual key to a central unit-user plane entity, the virtual key being different from a user plane security key, so that even when the central unit-user plane entity is broken through by an attacker, the attacker can only acquire from the central unit-user plane entity the virtual key rather than the user plane security key, thereby reducing the risk of user plane security key leakage.

Description

安全保护方法及通信装置Security protection method and communication device
本申请要求于2022年05月06日提交中国国家知识产权局、申请号为202210489628.7、申请名称为“安全保护方法及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office of China on May 6, 2022, with the application number 202210489628.7 and the application name "Security Protection Method and Communication Device", the entire content of which is incorporated into this application by reference. middle.
技术领域Technical field
本申请实施例涉及安全通信领域,并且更具体地,涉及一种安全保护方法及通信装置。The embodiments of the present application relate to the field of secure communications, and more specifically, to a security protection method and communication device.
背景技术Background technique
新无线(new radio,NR)技术中,接入网设备可以由一个集中式单元(centralized unit,CU)和一个或者多个分布式单元(distributed unit,DU)构成。如果考虑控制面和用户面分离架构,CU可以进一步划分为集中式单元控制面(central unit-control plane,CU-CP)实体和集中式单元用户面(central unit-user plane,CU-UP)实体。在一个CU-CP连接多个CU-UP的场景下,该多个CU-UP均使用相同的用户面安全密钥和安全算法与终端设备进行通信。一旦多个CU-UP中的一个CU-UP被攻击者俘获后,攻击者可从被俘获的CU-UP获取用户面安全密钥,从而造成用户面安全密钥的泄露。In new radio (NR) technology, access network equipment can be composed of a centralized unit (CU) and one or more distributed units (DU). If the separation architecture of control plane and user plane is considered, CU can be further divided into centralized unit control plane (CU-CP) entities and centralized unit user plane (CU-UP) entities. . In a scenario where one CU-CP is connected to multiple CU-UPs, the multiple CU-UPs use the same user plane security key and security algorithm to communicate with the terminal device. Once one CU-UP among multiple CU-UPs is captured by an attacker, the attacker can obtain the user plane security key from the captured CU-UP, thus causing the user plane security key to be leaked.
发明内容Contents of the invention
本申请实施例提供一种安全保护方法,以期减小用户面安全密钥泄露的风险。The embodiment of the present application provides a security protection method in order to reduce the risk of user plane security key leakage.
第一方面,提供了一种安全保护方法,该方法可以由集中式单元控制面实体执行,或者,也可以由集中式单元控制面实体的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由集中式单元控制面实体执行为例进行说明。The first aspect provides a security protection method, which can be executed by a centralized unit control plane entity, or can also be executed by a component (such as a chip or circuit) of a centralized unit control plane entity, without limitation. , for the convenience of description, the following takes the execution by the centralized unit control plane entity as an example for explanation.
该方法包括:集中式单元控制面实体接收来自会话管理网元的第一用户面安全策略,该第一用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护;该集中式单元控制面实体根据该第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,该虚构密钥与用户面安全密钥不同,该用户面安全密钥用于终端设备和集中式单元用户面实体之间开启用户面安全保护。The method includes: a centralized unit control plane entity receives a first user plane security policy from a session management network element, and the first user plane security policy indicates that user plane security protection does not need to be enabled or user plane security protection is preferably enabled; The unit control plane entity sends a fictitious key to the first centralized unit user plane entity according to the first user plane security policy. The fictitious key is different from the user plane security key. The user plane security key is used for terminal equipment and Enable user plane security protection between centralized unit user plane entities.
基于上述技术方案,在第一用户面安全策略指示不需要开启用户面安全保护的情况下,集中式单元控制面实体向第一集中式单元用户面实体发送不同于用户面安全密钥的虚构密钥,从而即使在该第一集中式单元用户面实体被攻击者攻破的情况下,攻击者只能从第一集中式单元用户面实体获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。可以理解,在用户面安全策略指示不需要开启用户面安全保护的情况下,第一集中式单元用户面实体与终端设备之间的用户面安全保护也不会开启,因此,即使集中式单元控制面实体向第一集中式单元用户面实体发送了虚构密钥,第一集中式单元用户面实体也不会使用该虚构密钥加密数据,从而也不会影响第一集中式单元用 户面实体与终端设备之间的用户面数据传输过程。Based on the above technical solution, when the first user plane security policy indicates that user plane security protection does not need to be turned on, the centralized unit control plane entity sends a fictitious key that is different from the user plane security key to the first centralized unit user plane entity. Therefore, even if the first centralized unit user plane entity is compromised by an attacker, the attacker can only obtain the fictitious key from the first centralized unit user plane entity, but cannot obtain the user plane security key. , thereby reducing the risk of user plane security key leakage. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between the user plane entity of the first centralized unit and the terminal device will not be turned on. Therefore, even if the centralized unit controls If the plane entity sends a fictitious key to the user plane entity of the first centralized unit, the user plane entity of the first centralized unit will not use the fictitious key to encrypt data, thus it will not affect the user plane of the first centralized unit. The user plane data transmission process between the account entity and the terminal device.
示例性的,该虚构密钥是128比特的随机数或预定义的值。For example, the fictitious key is a 128-bit random number or a predefined value.
示例性的,虚构密钥包括虚构加密密钥和/或虚构完整性密钥,虚构加密密钥与用户面安全密钥包括的用户面加密密钥不同,虚构完整性密钥与用户面安全密钥包括的用户面完整性密钥不同。若该第一用户面安全策略指示不需要开启用户面机密性保护或优选开启用户面机密性保护,则该虚构密钥包括虚构加密密钥;和/或,若该第一用户面安全策略指示不需要开启用户面完整性保护或优选开启用户面完整性保护,则该虚构密钥包括虚构完整性密钥。For example, the fictitious key includes a fictitious encryption key and/or a fictitious integrity key. The fictitious encryption key is different from the user plane encryption key included in the user plane security key. The fictitious integrity key is different from the user plane security key. The user plane integrity key included in the key is different. If the first user plane security policy indicates that user plane confidentiality protection does not need to be turned on or that user plane confidentiality protection is preferably turned on, the fictitious key includes a fictitious encryption key; and/or, if the first user plane security policy indicates If there is no need to enable user plane integrity protection or it is preferable to enable user plane integrity protection, the fictitious key includes a fictitious integrity key.
示例性的,用户面安全密钥是集中式单元控制面实体根据根密钥生成的。例如,用户面安全密钥是集中式单元用户面实体以根密钥为输入密钥,以第一密钥生成参数为输入参数生成的。第一密钥生成参数包括以下一项或多项:算法标识和算法类型鉴别器。For example, the user plane security key is generated by the centralized unit control plane entity based on the root key. For example, the user plane security key is generated by the centralized unit user plane entity using the root key as the input key and the first key generation parameter as the input parameter. The first key generation parameters include one or more of the following: an algorithm identifier and an algorithm type discriminator.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该集中式单元控制面实体根据该第一用户面安全策略,选择为非可信集中式单元用户面实体的该第一集中式单元用户面实体。In connection with the first aspect, in some implementations of the first aspect, the method further includes: the centralized unit control plane entity selects the non-trusted centralized unit user plane entity according to the first user plane security policy. The first centralized unit user plane entity.
基于上述技术方案,由于非可信集中式单元用户面实体更容易被攻击者俘获,因此集中式单元控制面实体选择为非可信集中式单元用户面实体的第一集中式单元用户面实体,并且向选择的第一集中式单元用户面实体发送虚构密钥,从而可以避免非可信集中式单元用户面实体获取到用户面安全密钥,进一步减小用户面安全密钥泄漏的风险。Based on the above technical solution, since non-trusted centralized unit user plane entities are more likely to be captured by attackers, the centralized unit control plane entity is selected as the first centralized unit user plane entity of the non-trusted centralized unit user plane entities. And the fictitious key is sent to the selected first centralized unit user plane entity, thereby preventing the untrusted centralized unit user plane entity from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
示例性的,非可信集中式单元用户面实体满足以下条件中的至少一项:部署在低安全域,由第三方管理,物理环境不安全,或未经过认证或远程证明校验。For example, the user plane entity of the untrusted centralized unit meets at least one of the following conditions: deployed in a low security domain, managed by a third party, the physical environment is unsafe, or has not been authenticated or verified remotely.
结合第一方面,在第一方面的某些实现方式中,该集中式单元控制面实体向该第一集中式单元用户面实体发送虚构密钥,包括:该集中式单元控制面实体向该第一集中式单元用户面实体发送该虚构密钥和安全算法,该安全算法为空。With reference to the first aspect, in some implementations of the first aspect, the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity, including: the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity. A centralized unit user plane entity sends the fictitious key and the security algorithm, which is empty.
基于上述技术方案,集中式单元控制面实体向第一集中式单元用户面实体发送的安全算法为空,从而即使在该第一集中式单元用户面实体被攻击者攻破的情况下,攻击者也不能从第一集中式单元用户面实体获取到正确的安全算法。Based on the above technical solution, the security algorithm sent by the centralized unit control plane entity to the first centralized unit user plane entity is empty, so even if the first centralized unit user plane entity is breached by the attacker, the attacker can The correct security algorithm cannot be obtained from the first centralized unit user plane entity.
结合第一方面,在第一方面的某些实现方式中,该第一用户面安全策略指示优选开启用户面安全保护,该集中式单元控制面实体根据该第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括:该集中式单元控制面实体向该第一集中式单元用户面实体发送该第一用户面安全策略和该虚构密钥;该方法还包括:该集中式单元控制面实体接收来自该第一集中式单元用户面实体的安全结果,该安全结果指示用户面安全保护开启;该集中式单元控制面实体向该第一集中式单元用户面实体发送该用户面安全密钥。In conjunction with the first aspect, in some implementations of the first aspect, the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity sends a request to the first user plane security policy according to the first user plane security policy. The centralized unit user plane entity sends the fictitious key, including: the centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity; the method also includes: the The centralized unit control plane entity receives the security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on; the centralized unit control plane entity sends the security result to the first centralized unit user plane entity. User plane security key.
基于上述技术方案,在第一用户面安全策略指示优选开启用户面安全保护的情况下,若第一集中式单元用户面实体选择的安全结果指示用户面安全保护开启,则集中式单元控制面实体向第一集中式单元用户面实体发送用户面安全密钥,从而保证第一集中式单元用户面实体与终端设备之间的用户面数据的正常传输。Based on the above technical solution, when the first user plane security policy indicates that user plane security protection is preferably turned on, if the security result selected by the first centralized unit user plane entity indicates that user plane security protection is turned on, the centralized unit control plane entity Send the user plane security key to the first centralized unit user plane entity to ensure normal transmission of user plane data between the first centralized unit user plane entity and the terminal device.
示例性的,集中式单元控制面实体通过承载修改流程向第一集中式单元用户面实体发送用户面安全密钥,即集中式单元控制面实体向第一集中式单元用户面实体发送承载上下文修改请求消息,承载上下文修改请求消息包括用户面安全密钥。 Exemplarily, the centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity through the bearer modification process, that is, the centralized unit control plane entity sends the bearer context modification to the first centralized unit user plane entity. Request message, the bearer context modification request message includes the user plane security key.
示例性的,集中式单元控制面实体通过承载建立流程向第一集中式单元用户面实体发送用户面安全密钥,即该集中式单元控制面实体向该第一集中式单元用户面实体发送承载上下文释放命令,释放当前建立的承载,然后,集中式单元控制实体向该第一集中式单元用户面实体发送承载上下文建立请求消息,建立新的承载,该承载上下文建立请求消息包括该用户面安全密钥。Exemplarily, the centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity through the bearer establishment process, that is, the centralized unit control plane entity sends the bearer to the first centralized unit user plane entity. The context release command releases the currently established bearer. Then, the centralized unit control entity sends a bearer context establishment request message to the first centralized unit user plane entity to establish a new bearer. The bearer context establishment request message includes the user plane security key.
结合第一方面,在第一方面的某些实现方式中,该第一用户面安全策略指示优选开启用户面安全保护,该集中式单元控制面实体根据该第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括:该集中式单元控制面实体向该第一集中式单元用户面实体发送该第一用户面安全策略和该虚构密钥;该方法还包括:该集中式单元控制面实体接收来自该第一集中式单元用户面实体的安全结果,该安全结果指示用户面安全保护开启;该集中式单元控制面实体向该第一集中式单元用户面实体发送承载上下文释放命令;该集中式单元控制面实体向第二集中式单元用户面实体发送该用户面安全密钥,该第二集中式单元用户面实体是该集中式单元控制面实体重新选择的用于建立承载上下文的集中式单元用户面实体。In conjunction with the first aspect, in some implementations of the first aspect, the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity sends a request to the first user plane security policy according to the first user plane security policy. The centralized unit user plane entity sends the fictitious key, including: the centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity; the method also includes: the The centralized unit control plane entity receives a security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on; the centralized unit control plane entity sends a bearer to the first centralized unit user plane entity Context release command; the centralized unit control plane entity sends the user plane security key to the second centralized unit user plane entity that is reselected by the centralized unit control plane entity. Establish centralized unit user plane entities that host context.
基于上述技术方案,在第一用户面安全策略指示优选开启用户面安全保护的情况下,若第一集中式单元用户面实体选择的安全结果指示用户面安全保护开启,则集中式单元控制面实体重新选择第二集中式单元用户面实体建立承载,并向第二集中式单元用户面实体发送用户面安全密钥,从而保证第二集中式单元用户面实体与终端设备之间的用户面数据的正常传输。Based on the above technical solution, when the first user plane security policy indicates that user plane security protection is preferably turned on, if the security result selected by the first centralized unit user plane entity indicates that user plane security protection is turned on, the centralized unit control plane entity Re-select the second centralized unit user plane entity to establish the bearer, and send the user plane security key to the second centralized unit user plane entity, thereby ensuring the security of user plane data between the second centralized unit user plane entity and the terminal device. Normal transmission.
示例性的,第二集中式单元用户面实体是可信的集中式单元用户面实体。示例性的,可信集中式单元用户面实体满足以下条件中的至少一项:部署在高安全域,由运营商管理,物理环境安全,或经过认证或远程证明校验。Illustratively, the second centralized unit user plane entity is a trusted centralized unit user plane entity. Illustratively, the user plane entity of the trusted centralized unit meets at least one of the following conditions: deployed in a high security domain, managed by an operator, the physical environment is safe, or certified or verified remotely.
结合第一方面,在第一方面的某些实现方式中,该第一用户面安全策略指示优选开启安全保护,该方法还包括:该集中式单元控制面实体确定不需要开启用户面安全保护;该集中式单元控制面实体根据该第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括:该集中式单元控制面实体向该第一集中式单元用户面实体发送第二用户面安全策略和该虚构密钥,该第二用户面安全策略指示不需要开启安全保护。In conjunction with the first aspect, in some implementations of the first aspect, the first user plane security policy indicates that security protection is preferably turned on, and the method further includes: the centralized unit control plane entity determines that user plane security protection does not need to be turned on; The centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity according to the first user plane security policy, including: the centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity The second user plane security policy and the fictitious key, the second user plane security policy indicates that security protection does not need to be turned on.
基于上述技术方案,在第一用户面安全策略指示优选开启用户面安全的情况下,集中式单元控制面实体确定不需要开启用户面安全保护,并向第一集中式单元用户面实体发送指示不需要开启用户面安全保护的第二用户面安全策略和虚构密钥,从而即使在第一集中式单元用户面实体被攻击者攻破的情况下,攻击者只能从第一集中式单元用户面实体获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。Based on the above technical solution, when the first user plane security policy indicates that user plane security is preferably turned on, the centralized unit control plane entity determines that user plane security protection does not need to be turned on, and sends an instruction to the first centralized unit user plane entity not to turn on user plane security. It is necessary to enable the second user plane security policy and fictitious key for user plane security protection, so that even if the first centralized unit user plane entity is breached by an attacker, the attacker can only access the first centralized unit user plane entity from Obtaining the fictitious key but not the user plane security key can reduce the risk of user plane security key leakage.
示例性的,该集中式单元控制面实体根据以下一项或多项确定不需要开启用户面安全保护:该集中式单元控制面实体的负载情况,或该集中式单元控制面实体对该终端设备与该集中式用户面实体之间传输的数据的安全要求。For example, the centralized unit control plane entity determines that user plane security protection does not need to be enabled based on one or more of the following: the load condition of the centralized unit control plane entity, or the centralized unit control plane entity's response to the terminal device. Security requirements for data transmitted to and from this centralized user plane entity.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该集中式单元控制面实体获取该终端设备的安全能力信息,该安全能力信息指示该终端设备不支持通过与该第一集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力。 In connection with the first aspect, in some implementations of the first aspect, the method further includes: the centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates that the terminal device does not support communication with the terminal device. The first centralized unit has the ability to deduce user plane security keys based on specific key generation parameters corresponding to the user plane entity.
示例性的,特定密钥生成参数包括第一集中式单元用户面实体的标识和/或承载标识,该承载是第一集中式单元用户面实体与终端设备之间的承载。第一集中式单元用户面实体与终端设备之间的不同承载的标识不同,第一集中式单元用户面实体与不同终端设备之间的承载的标识不同。Exemplarily, the specific key generation parameters include the identification of the first centralized unit user plane entity and/or the bearer identification, and the bearer is the bearer between the first centralized unit user plane entity and the terminal device. The identifiers of different bearers between the user plane entity of the first centralized unit and the terminal equipment are different, and the identifiers of the bearers between the user plane entity of the first centralized unit and different terminal equipment are different.
结合第一方面,在第一方面的某些实现方式中,该集中式单元控制面实体获取该终端设备的安全能力信息,包括:该集中式单元控制面实体接收来自该终端设备的该安全能力信息。In connection with the first aspect, in some implementations of the first aspect, the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives the security capability from the terminal device. information.
结合第一方面,在第一方面的某些实现方式中,该集中式单元控制面实体获取该终端设备的安全能力信息,包括:该集中式单元控制面实体接收来自接入和移动性管理功能网元的该安全能力信息。Combined with the first aspect, in some implementations of the first aspect, the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives data from the access and mobility management functions The security capability information of the network element.
第二方面,提供了一种安全保护方法,该方法可以由集中式单元控制面实体执行,The second aspect provides a security protection method that can be performed by a centralized unit control plane entity,
或者,也可以由集中式单元控制面实体的组成部件(例如芯片或者电路)执行,对此不作限定,为了便于描述,下面以由集中式单元控制面实体执行为例进行说明。Alternatively, it can also be executed by a component (such as a chip or circuit) of the centralized unit control plane entity, which is not limited. For convenience of description, the following description takes execution by the centralized unit control plane entity as an example.
该方法包括:该集中式单元控制面实体获取该终端设备的安全能力信息,该安全能力信息指示该终端设备是否支持通过与集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力;若该安全能力信息指示该终端设备不支持通过该特定密钥生成参数推演用户面安全密钥的能力,则该集中式单元控制面实体确定根据根密钥和第一密钥生成参数生成用户面安全密钥,该第一密钥生成参数包括算法标识和/或算法类型鉴别器;若该安全能力信息指示该终端设备支持通过该特定密钥生成参数推演用户面安全密钥的能力,则该集中式单元控制面实体确定根据根密钥和第二密钥生成参数生成用户面安全密钥,该第二密钥生成参数包括该特定密钥生成参数。The method includes: the centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates whether the terminal device supports deriving user plane security keys through specific key generation parameters corresponding to the centralized unit user plane entity. key; if the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameters, the centralized unit control plane entity determines to generate the user plane security key based on the root key and the first key. Parameters are used to generate user plane security keys, and the first key generation parameters include algorithm identifiers and/or algorithm type discriminators; if the security capability information indicates that the terminal device supports deriving user plane security keys through the specific key generation parameters. capability, the centralized unit control plane entity determines to generate a user plane security key based on the root key and the second key generation parameter, the second key generation parameter including the specific key generation parameter.
基于上述技术方案,若集中式单元控制面实体获取到终端设备的安全能力信息,则集中式单元控制面实体根据终端设备的能力确定与集中式单元用户面实体建立承载上下文的方式,避免在终端设备不支持通过特定密钥生成参数推演用户面安全密钥的能力的情况下,集中式单元控制面实体或集中式单元用户面实体使用根密钥和特定密钥生成参数生成用户面安全密钥,导致终端设备和集中式单元用户面实体无法使用相同的用户面安全密钥进行数据传输。Based on the above technical solution, if the centralized unit control plane entity obtains the security capability information of the terminal device, the centralized unit control plane entity determines the method of establishing the bearer context with the centralized unit user plane entity based on the capabilities of the terminal device, so as to avoid inconvenience in the terminal. When the device does not support the ability to deduce user plane security keys through specific key generation parameters, the centralized unit control plane entity or the centralized unit user plane entity uses the root key and specific key generation parameters to generate user plane security keys. , causing the terminal device and the centralized unit user plane entity to be unable to use the same user plane security key for data transmission.
进一步地,集中式单元控制面实体可以在终端设备支持通过特定密钥生成参数推演用户面安全密钥的能力的情况下,向集中式单元用户面实体发送根据根密钥和特定密钥生成参数生成的用户面安全密钥,或者发送根密钥,使得集中式单元用户面实体可以根据根密钥和特定密钥生成参数生成用户面安全密钥,从而实现不同集中式单元用户面实体间的用户面安全密钥隔离。Further, the centralized unit control plane entity may send the root key and specific key generation parameters to the centralized unit user plane entity when the terminal device supports the ability to deduce the user plane security key through specific key generation parameters. The generated user plane security key, or the root key is sent, so that the centralized unit user plane entity can generate the user plane security key based on the root key and specific key generation parameters, thereby realizing communication between different centralized unit user plane entities. User plane security key isolation.
示例性的,特定密钥生成参数包括集中式单元用户面实体的标识和/或承载标识,该承载是集中式单元用户面实体与终端设备之间的承载。集中式单元用户面实体与终端设备之间的不同承载的标识不同,集中式单元用户面实体与不同终端设备之间的承载的标识不同。For example, the specific key generation parameters include the identity of the centralized unit user plane entity and/or the bearer identity, and the bearer is the bearer between the centralized unit user plane entity and the terminal device. The identifiers of different bearers between the centralized unit user plane entity and the terminal equipment are different, and the identifiers of the bearers between the centralized unit user plane entity and different terminal equipment are different.
结合第二方面,在第二方面的某些实现方式中,该集中式单元控制面实体获取该终端设备的安全能力信息,包括:该集中式单元控制面实体接收来自该终端设备的该安全能力信息。Combined with the second aspect, in some implementations of the second aspect, the centralized unit control plane entity obtains the security capability information of the terminal device, including: the centralized unit control plane entity receives the security capability from the terminal device information.
结合第二方面,在第二方面的某些实现方式中,该集中式单元控制面实体获取该终端 设备的安全能力信息,包括:该集中式单元控制面实体接收来自接入和移动性管理功能网元的该安全能力信息。Combined with the second aspect, in some implementations of the second aspect, the centralized unit control plane entity obtains the terminal The security capability information of the device includes: the centralized unit control plane entity receives the security capability information from the access and mobility management function network element.
第三方面,提供了一种通信装置,该通信装置包括收发单元,该收发单元用于接收来自会话管理网元的第一用户面安全策略,该第一用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护;该收发单元还用于根据该第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,该虚构密钥与用户面安全密钥不同,该用户面安全密钥用于终端设备和集中式单元用户面实体之间开启用户面安全保护。In a third aspect, a communication device is provided. The communication device includes a transceiver unit. The transceiver unit is configured to receive a first user plane security policy from a session management network element. The first user plane security policy indicates that the user plane does not need to be opened. Security protection or preferably enable user plane security protection; the transceiver unit is also used to send a fictitious key to the first centralized unit user plane entity according to the first user plane security policy, the fictitious key is different from the user plane security key , this user plane security key is used to enable user plane security protection between the terminal device and the centralized unit user plane entity.
结合第三方面,在第三方面的某些实现方式中,该虚构密钥是128比特的随机数或预定义的值。Combined with the third aspect, in some implementations of the third aspect, the fictitious key is a 128-bit random number or a predefined value.
结合第三方面,在第三方面的某些实现方式中,该通信装置还包括处理单元,该处理单元用于根据该第一用户面安全策略,选择为非可信集中式单元用户面实体的该第一集中式单元用户面实体。In connection with the third aspect, in some implementations of the third aspect, the communication device further includes a processing unit, the processing unit is configured to select the non-trusted centralized unit user plane entity according to the first user plane security policy. This first centralized unit user plane entity.
结合第三方面,在第三方面的某些实现方式中,该收发单元具体用于向该第一集中式单元用户面实体发送该虚构密钥和安全算法,该安全算法为空。Combined with the third aspect, in some implementations of the third aspect, the transceiver unit is specifically configured to send the fictitious key and the security algorithm to the first centralized unit user plane entity, and the security algorithm is empty.
结合第三方面,在第三方面的某些实现方式中,该第一用户面安全策略指示优选开启用户面安全保护,该收发单元具体用于向该第一集中式单元用户面实体发送该第一用户面安全策略和该虚构密钥;该收发单元还用于接收来自该第一集中式单元用户面实体的安全结果,该安全结果指示用户面安全保护开启;该收发单元还用于向该第一集中式单元用户面实体发送该用户面安全密钥。Combined with the third aspect, in some implementations of the third aspect, the first user plane security policy indicates that user plane security protection is preferably turned on, and the transceiver unit is specifically configured to send the first user plane entity to the first centralized unit user plane entity. A user plane security policy and the fictitious key; the transceiver unit is also used to receive a security result from the user plane entity of the first centralized unit, the security result indicates that user plane security protection is turned on; the transceiver unit is also used to send a message to the The first centralized unit user plane entity sends the user plane security key.
结合第三方面,在第三方面的某些实现方式中,该收发单元还用于向该第一集中式单元用户面实体发送承载上下文释放命令;该收发单元具体用于向该第一集中式单元用户面实体发送承载上下文建立请求消息,该承载上下文建立请求消息包括该用户面安全密钥。With reference to the third aspect, in some implementations of the third aspect, the transceiver unit is also configured to send a bearer context release command to the first centralized unit user plane entity; the transceiver unit is specifically configured to send a bearer context release command to the first centralized unit user plane entity. The unit user plane entity sends a bearer context establishment request message, and the bearer context establishment request message includes the user plane security key.
结合第三方面,在第三方面的某些实现方式中,该第一用户面安全策略指示优选开启用户面安全保护,该收发单元具体用于向该第一集中式单元用户面实体发送该第一用户面安全策略和该虚构密钥;该收发单元还用于接收来自该第一集中式单元用户面实体的安全结果,该安全结果指示用户面安全保护开启;该收发单元还用于向该第一集中式单元用户面实体发送承载上下文释放命令;该收发单元还用于向第二集中式单元用户面实体发送该用户面安全密钥,该第二集中式单元用户面实体是集中式单元控制面实体重新选择的用于建立承载上下文的集中式单元用户面实体。Combined with the third aspect, in some implementations of the third aspect, the first user plane security policy indicates that user plane security protection is preferably turned on, and the transceiver unit is specifically configured to send the first user plane entity to the first centralized unit user plane entity. A user plane security policy and the fictitious key; the transceiver unit is also used to receive a security result from the user plane entity of the first centralized unit, the security result indicates that user plane security protection is turned on; the transceiver unit is also used to send a message to the The first centralized unit user plane entity sends a bearer context release command; the transceiver unit is also used to send the user plane security key to the second centralized unit user plane entity, and the second centralized unit user plane entity is a centralized unit Control plane entity reselected centralized unit user plane entity used to establish bearer context.
结合第三方面,在第三方面的某些实现方式中,该第一用户面安全策略指示优选开启安全保护,该处理单元还用于确定不需要开启用户面安全保护;该收发单元具体用于向该第一集中式单元用户面实体发送第二用户面安全策略和该虚构密钥,该第二用户面安全策略指示不需要开启安全保护。Combined with the third aspect, in some implementations of the third aspect, the first user plane security policy indicates that security protection is preferably turned on, and the processing unit is also used to determine that user plane security protection does not need to be turned on; the transceiver unit is specifically configured to A second user plane security policy and the fictitious key are sent to the first centralized unit user plane entity, and the second user plane security policy indicates that security protection does not need to be turned on.
结合第三方面,在第三方面的某些实现方式中,该处理单元具体用于根据以下一项或多项确定不需要开启用户面安全保护:该集中式单元控制面实体的负载情况,或该集中式单元控制面实体对该终端设备与该集中式用户面实体之间传输的数据的安全要求。Combined with the third aspect, in some implementations of the third aspect, the processing unit is specifically configured to determine that user plane security protection does not need to be turned on based on one or more of the following: the load condition of the centralized unit control plane entity, or The centralized unit controls the security requirements of the data transmitted between the terminal device and the centralized user plane entity.
结合第三方面,在第三方面的某些实现方式中,若该第一用户面安全策略指示不需要开启用户面机密性保护或优选开启用户面机密性保护,则该虚构密钥包括虚构加密密钥,该虚构加密密钥与该用户面安全密钥包括的用户面加密密钥不同;和/或,若该第一用户面 安全策略指示不需要开启用户面完整性保护或优选开启用户面完整性保护,则该虚构密钥包括虚构完整性密钥,该虚构完整性密钥与该用户面安全密钥包括的用户面完整性密钥不同。Combined with the third aspect, in some implementations of the third aspect, if the first user plane security policy indicates that user plane confidentiality protection does not need to be turned on or user plane confidentiality protection is preferably turned on, the fictitious key includes fictitious encryption Key, the fictitious encryption key is different from the user plane encryption key included in the user plane security key; and/or, if the first user plane If the security policy indicates that user plane integrity protection does not need to be turned on or user plane integrity protection is preferably turned on, the fictitious integrity key includes a fictitious integrity key that is complete with the user plane included in the user plane security key. Sexual keys are different.
结合第三方面,在第三方面的某些实现方式中,该收发单元还用于获取该终端设备的安全能力信息,该安全能力信息指示该终端设备不支持通过与该第一集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力。In connection with the third aspect, in some implementations of the third aspect, the transceiver unit is also used to obtain security capability information of the terminal device, where the security capability information indicates that the terminal device does not support communication with the user through the first centralized unit. The ability to deduce user plane security keys based on specific key generation parameters corresponding to plane entities.
结合第三方面,在第三方面的某些实现方式中,该收发单元具体用于接收来自该终端设备的该安全能力信息。With reference to the third aspect, in some implementations of the third aspect, the transceiver unit is specifically configured to receive the security capability information from the terminal device.
结合第三方面,在第三方面的某些实现方式中,该收发单元具体用于接收来自接入和移动性管理功能网元的该安全能力信息。With reference to the third aspect, in some implementations of the third aspect, the transceiver unit is specifically configured to receive the security capability information from the access and mobility management function network element.
第四方面,提供了一种通信装置,该通信装置包括收发单元和处理单元,该收发单元用于获取该终端设备的安全能力信息,该安全能力信息指示该终端设备是否支持通过与集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力;若该安全能力信息指示该终端设备不支持通过该特定密钥生成参数推演用户面安全密钥的能力,则该处理单元用于确定根据根密钥和第一密钥生成参数生成用户面安全密钥,该第一密钥生成参数包括算法标识和/或算法类型鉴别器;若该安全能力信息指示该终端设备支持通过该特定密钥生成参数推演用户面安全密钥的能力,则该处理单元用于确定根据根密钥和第二密钥生成参数生成用户面安全密钥,该第二密钥生成参数包括该特定密钥生成参数。In a fourth aspect, a communication device is provided. The communication device includes a transceiver unit and a processing unit. The transceiver unit is used to obtain security capability information of the terminal device. The security capability information indicates whether the terminal device supports communication with a centralized unit. The specific key generation parameter corresponding to the user plane entity has the ability to deduce the user plane security key; if the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameter, the processing unit Used to determine to generate a user plane security key based on the root key and a first key generation parameter, the first key generation parameter including an algorithm identifier and/or an algorithm type discriminator; if the security capability information indicates that the terminal device supports The specific key generation parameter has the ability to deduce the user plane security key, then the processing unit is used to determine to generate the user plane security key according to the root key and the second key generation parameter, the second key generation parameter includes the specific Key generation parameters.
结合第四方面,在第四方面的某些实现方式中,该收发单元具体用于接收来自该终端设备的该安全能力信息。With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver unit is specifically configured to receive the security capability information from the terminal device.
结合第四方面,在第四方面的某些实现方式中,该收发单元具体用于接收来自接入和移动性管理功能网元的该安全能力信息。With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver unit is specifically configured to receive the security capability information from the access and mobility management function network element.
结合第四方面,在第四方面的某些实现方式中,该特定密钥生成参数包括集中式单元用户面实体的标识和/或承载标识。In conjunction with the fourth aspect, in some implementations of the fourth aspect, the specific key generation parameter includes an identification and/or a bearer identification of the centralized unit user plane entity.
第五方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面及第一方面中任一种可能实现方式中的方法,或者以实现上述第二方面及第二方面中任一种可能实现方式中的方法。可选的,该通信装置还包括存储器。可选的,该通信装置还包括通信接口,处理器与通信接口耦合。In a fifth aspect, a communication device is provided, including a processor. The processor is coupled to a memory and can be used to execute instructions in the memory to implement the above first aspect and the method in any of the possible implementations of the first aspect, or to implement the above second aspect and any of the second aspects. possible implementation methods. Optionally, the communication device also includes a memory. Optionally, the communication device further includes a communication interface, and the processor is coupled to the communication interface.
在一种实现方式中,该通信装置为集中式单元控制面实体。当该通信装置为集中式单元控制面实体时,该通信接口可以是收发器,或,输入/输出接口。In one implementation, the communication device is a centralized unit control plane entity. When the communication device is a centralized unit control plane entity, the communication interface may be a transceiver, or an input/output interface.
在另一种实现方式中,该通信装置为配置于集中式单元控制面实体中的芯片。当该通信装置为配置于集中式单元控制面实体中的芯片时,该通信接口可以是输入/输出接口。In another implementation, the communication device is a chip configured in a centralized unit control plane entity. When the communication device is a chip configured in the centralized unit control plane entity, the communication interface may be an input/output interface.
可选的,该收发器可以为收发电路。可选的,该输入/输出接口可以为输入/输出电路。Optionally, the transceiver can be a transceiver circuit. Optionally, the input/output interface can be an input/output circuit.
第六方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。所述处理电路用于通过所述输入电路接收信号,并通过所述输出电路发射信号,使得所述处理器执行第一方面至第二方面中任一种可能实现方式中的方法。In a sixth aspect, a processor is provided, including: an input circuit, an output circuit and a processing circuit. The processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any possible implementation manner from the first aspect to the second aspect.
在具体实现过程中,上述处理器可以为一个或多个芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输 出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。In the specific implementation process, the above-mentioned processor can be one or more chips, the input circuit can be an input pin, the output circuit can be an output pin, and the processing circuit can be a transistor, a gate circuit, a flip-flop and various logic circuits, etc. . The input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, and the input signal input by the output circuit may be, for example, but not limited to, a receiver. The output signal may be, for example, but not limited to, output to and transmitted by the transmitter, and the input circuit and the output circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times. The embodiments of this application do not limit the specific implementation methods of the processor and various circuits.
第七方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行第一方面至第二方面中任一种可能实现方式中的方法。In a seventh aspect, a processing device is provided, including a processor and a memory. The processor is used to read instructions stored in the memory, and can receive signals through a receiver and transmit signals through a transmitter to execute the method in any possible implementation manner of the first aspect to the second aspect.
可选的,所述处理器为一个或多个,所述存储器为一个或多个。Optionally, there are one or more processors and one or more memories.
可选的,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。Optionally, the memory may be integrated with the processor, or the memory may be provided separately from the processor.
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。In the specific implementation process, the memory can be a non-transitory memory, such as a read-only memory (ROM), which can be integrated on the same chip as the processor, or can be set in different On the chip, the embodiment of the present application does not limit the type of memory and the arrangement of the memory and the processor.
应理解,相关的数据交互过程例如发送虚构密钥可以为从处理器输出虚构密钥的过程,接收用户面安全策略可以为处理器接收用户面安全策略的过程。具体地,处理器输出的数据可以输出给发射器,处理器接收的输入数据可以来自接收器。其中,发射器和接收器可以统称为收发器。It should be understood that the relevant data interaction process, for example, sending the fictitious key may be a process of outputting the fictitious key from the processor, and receiving the user plane security policy may be a process of the processor receiving the user plane security policy. Specifically, the data output by the processor can be output to the transmitter, and the input data received by the processor can be from the receiver. Among them, the transmitter and receiver can be collectively called a transceiver.
上述第七方面中的处理装置可以是一个或多个芯片。该处理装置中的处理器可以通过硬件来实现也可以通过软件来实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。The processing device in the above seventh aspect may be one or more chips. The processor in the processing device can be implemented by hardware or software. When implemented by hardware, the processor can be a logic circuit, an integrated circuit, etc.; when implemented by software, the processor can be a general processor, which is implemented by reading software codes stored in a memory, and the memory can Integrated in the processor, it can be located outside the processor and exist independently.
第八方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述第一方面至第二方面中任一种可能实现方式中的方法。In an eighth aspect, a computer program product is provided. The computer program product includes: a computer program (which may also be called a code, or an instruction). When the computer program is run, it causes the computer to execute the above-mentioned first aspect to the third aspect. Methods in any of the two possible implementation methods.
第九方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得上述第一方面至第二方面中任一种可能实现方式中的方法被执行。In a ninth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores a computer program (which may also be called a code, or an instruction) that when run on a computer causes the above-mentioned first aspect to the third aspect. Methods in either of the two possible implementations are executed.
第十方面,提供一种芯片,芯片包括处理器与通信接口,处理器通过通信接口读取存储器上存储的指令,执行上述第一方面至第二方面中任一种可能实现方式中的方法。In a tenth aspect, a chip is provided. The chip includes a processor and a communication interface. The processor reads instructions stored in the memory through the communication interface and executes the method in any of the possible implementations of the first to second aspects.
可选地,作为一种实现方式,芯片还包括存储器,存储器中存储有计算机程序或指令,处理器用于执行存储器上存储的计算机程序或指令,当计算机程序或指令被执行时,处理器用于执行上述第一方面至第二方面中任一种可能实现方式中的方法。Optionally, as an implementation manner, the chip also includes a memory, in which computer programs or instructions are stored. The processor is used to execute the computer programs or instructions stored in the memory. When the computer program or instructions are executed, the processor is used to execute The method in any possible implementation manner of the above first aspect to the second aspect.
第十一方面,提供了一种通信系统,包括前述的集中式单元控制面实体,该集中式单元控制面实体用于执行上述第一方面及第一方面中任一种可能实现方式中的方法,或者用于执行上述第二方面及第二方面中任一种可能实现方式中的方法。In an eleventh aspect, a communication system is provided, including the aforementioned centralized unit control plane entity. The centralized unit control plane entity is used to perform the method in the above first aspect and any possible implementation of the first aspect. , or used to perform the above second aspect and the method in any possible implementation manner of the second aspect.
附图说明Description of the drawings
图1是适用于本申请实施例提供的方法的通信系统的示意图;Figure 1 is a schematic diagram of a communication system suitable for the method provided by the embodiment of the present application;
图2示出了一种安全保护方法的示意性流程图;Figure 2 shows a schematic flow chart of a security protection method;
图3是本申请实施例提供的安全保护方法的示意性流程图; Figure 3 is a schematic flow chart of the security protection method provided by the embodiment of the present application;
图4是本申请另一实施例提供的安全保护方法的示意性流程图;Figure 4 is a schematic flow chart of a security protection method provided by another embodiment of the present application;
图5是本申请另一实施例提供的安全保护方法的示意性流程图;Figure 5 is a schematic flow chart of a security protection method provided by another embodiment of the present application;
图6是本申请另一实施例提供的安全保护方法的示意性流程图;Figure 6 is a schematic flow chart of a security protection method provided by another embodiment of the present application;
图7是本申请实施例提供的通信装置的示意图;Figure 7 is a schematic diagram of a communication device provided by an embodiment of the present application;
图8是本申请另一实施例提供的通信装置的示意性框图;Figure 8 is a schematic block diagram of a communication device provided by another embodiment of the present application;
图9是本申请实施例提供的一种芯片系统的示意图。Figure 9 is a schematic diagram of a chip system provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合附图,对本申请实施例中的技术方案进行描述。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统、频分双工(frequency division duplex,FDD)系统、时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)系统或新无线(new radio,NR)、第六代(6th generation,6G)系统或未来的通信系统等。本申请中所述的5G移动通信系统包括非独立组网(non-standalone,NSA)的5G移动通信系统或独立组网(standalone,SA)的5G移动通信系统。通信系统还可以是公共陆地移动网络(public land mobile network,PLMN)、设备到设备(device to device,D2D)通信系统、机器到机器(machine to machine,M2M)通信系统、物联网(Internet of things,IoT)通信系统、车联万物(vehicle to everything,V2X)通信系统、无人机(uncrewed aerial vehicle,UAV)通信系统或者其他通信系统。The technical solutions of the embodiments of this application can be applied to various communication systems, such as: long term evolution (LTE) system, frequency division duplex (FDD) system, time division duplex (TDD) ), universal mobile telecommunication system (UMTS), global interoperability for microwave access (WiMAX) communication system, fifth generation (5th generation, 5G) system or new radio (NR) ), sixth generation (6G) systems or future communication systems, etc. The 5G mobile communication system described in this application includes a non-standalone (NSA) 5G mobile communication system or a standalone (SA) 5G mobile communication system. The communication system can also be a public land mobile network (PLMN), a device to device (D2D) communication system, a machine to machine (M2M) communication system, the Internet of things (Internet of things) , IoT) communication system, vehicle to everything (V2X) communication system, unmanned aerial vehicle (UAV) communication system or other communication systems.
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的PLMN中的终端设备等,本申请实施例对此并不限定。The terminal equipment in the embodiment of this application may refer to user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or User device. The terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a device with wireless communications Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks or terminal devices in future evolved PLMNs, etc. The embodiments of this application are not limited to this .
本申请实施例中的网络设备可以是任意一种具有无线收发功能的设备。该设备包括但不限于:5G中的下一代节点B(next generation nodeB,gNB)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(baseband unit,BBU)、无线保真(wireless fidelity,WiFi)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为5G,如,NR系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(distributed unit,DU)等。The network device in the embodiment of this application can be any device with wireless transceiver function. The equipment includes but is not limited to: next generation node B (gNB), evolved node B (evolved Node B, eNB), wireless network controller (radio network controller, RNC), node B (Node B) in 5G B, NB), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), access point (access point, wireless fidelity, WiFi) system, AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), etc. It can also be 5G, such as gNB in the NR system, or, Transmission point (TRP or TP), one or a group (including multiple antenna panels) of antenna panels of a base station in a 5G system, or it can also be a network node that constitutes a gNB or transmission point, such as a baseband unit (BBU), or , distributed unit (DU), etc.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B 可以表示A或B;本申请中的“和/或”仅仅是描述关联对象的一种关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a和b,b和c,a和c,或a和b和c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。同时,在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,便于理解。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Among them, in the description of this application, unless otherwise stated, "/" indicates that the related objects are an "or" relationship, for example, A/B It can mean A or B; "and/or" in this application is just an association relationship describing related objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone and exists at the same time. A and B, and B alone exist in three cases, where A and B can be singular or plural. Furthermore, in the description of this application, unless otherwise specified, "plurality" means two or more than two. "At least one of the following" or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items). For example, at least one of a, b, or c can mean: a, b, c, a and b, b and c, a and c, or a and b and c, where a, b, c can be single or multiple. In addition, in order to facilitate a clear description of the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as “first” and “second” are used to distinguish identical or similar items with basically the same functions and effects. Those skilled in the art can understand that words such as "first" and "second" do not limit the number and execution order, and words such as "first" and "second" do not limit the number and execution order. At the same time, in the embodiments of this application, words such as "exemplary" or "for example" are used to represent examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "such as" in the embodiments of the present application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete manner that is easier to understand.
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。In addition, the network architecture and business scenarios described in the embodiments of this application are for the purpose of explaining the technical solutions of the embodiments of this application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of this application. Those of ordinary skill in the art will know that, With the evolution of network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
图1示出了NR技术中的接入网设备的结构示意图和部署场景示意图。如图1中的(a)所示,NR技术中,接入网设备(如gNB)可以由一个集中式单元(centralized unit,CU)和一个或者多个分布式单元(distributed unit,DU)构成。CU和DU是不同的逻辑节点,可以部署在不同的物理设备上,或者部署在相同的物理设备上。如果考虑控制面和用户面分离架构,CU可以进一步划分为集中式单元控制面(central unit-control plane,CU-CP)实体(或者也可称为CU-CP节点)和集中式单元用户面(central unit-user plane,CU-UP)实体(或者也可称为CU-UP节点)。如图1中的(a)所示,一个gNB会包含一个CU-CP、多个CU-UP、多个DU。Figure 1 shows a schematic structural diagram and a schematic diagram of deployment scenarios of access network equipment in NR technology. As shown in (a) in Figure 1, in NR technology, access network equipment (such as gNB) can be composed of a centralized unit (centralized unit, CU) and one or more distributed units (distributed unit, DU) . CU and DU are different logical nodes and can be deployed on different physical devices or on the same physical device. If the control plane and user plane separation architecture is considered, CU can be further divided into a centralized unit-control plane (CU-CP) entity (or also called a CU-CP node) and a centralized unit user plane (CU-CP). central unit-user plane, CU-UP) entity (or also called CU-UP node). As shown in (a) in Figure 1, a gNB will include one CU-CP, multiple CU-UPs, and multiple DUs.
其中,DU涵盖了基带处理的物理层以及介质访问控制(media access control,MAC)层或无线链路控制(radio link control,RLC)层部分功能。考虑射频拉远单元(radio remote unit,RRU)与DU的传输资源,部分DU的物理层功能可以上移到RRU。伴随RRU的小型化,甚至更激进的DU可以与RRU进行合并。DU布放取决实际网络环境,例如:核心城区、话务密度较高、站间距较小、机房资源受限的区域,像高校、大型演出场馆等,DU可以集中式布放;而话务较稀疏、站间距较大等区域,像郊县、山区等区域,DU可以采取分布式的布放方式。Among them, DU covers the physical layer of baseband processing and some functions of the media access control (media access control, MAC) layer or the radio link control (radio link control, RLC) layer. Considering the transmission resources of the radio remote unit (RRU) and DU, some of the physical layer functions of the DU can be moved up to the RRU. With the miniaturization of RRUs, even more radical DUs can be merged with RRUs. DU deployment depends on the actual network environment. For example, in core urban areas, areas with high traffic density, small station spacing, and limited computer room resources, such as universities and large performance venues, DU can be deployed in a centralized manner; In sparse areas with large station spacing, such as suburban counties, mountainous areas, etc., DU can be deployed in a distributed manner.
CU涵盖了无线接入网高层协议栈以及核心网的一部分功能,例如无线资源控制(radio resource control,RRC)层、分组数据汇聚协议(packet data convergence protocol,PDCP)层等部分功能,甚至也能够支持部分核心网功能下沉至接入网,可以称作边缘计算网络,能够满足未来通信网络对于新兴业务例如视频、网购、虚拟/增强现实,对于网络时延的更高要求。CU covers the high-level protocol stack of the wireless access network and some functions of the core network, such as radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer and other functions, and can even Supporting some core network functions to be transferred to the access network, it can be called an edge computing network, which can meet the higher requirements for network latency of future communication networks for emerging services such as video, online shopping, and virtual/augmented reality.
CU-CP为控制面实体,涵盖了RRC和PDCP层的功能,主要对DU和CU-UP进行资源的管理和调度,以及控制面信令的管理和中转。 CU-CP is a control plane entity that covers the functions of the RRC and PDCP layers. It mainly manages and schedules resources for DU and CU-UP, as well as manages and transfers control plane signaling.
CU-UP为用户面实体,目前主要涵盖PDCP层,主要对用户面数据(user plane traffic)进行传输,在会话到来的时候进行数据传输。CU-UP is a user plane entity, which currently mainly covers the PDCP layer. It mainly transmits user plane data (user plane traffic) and transmits data when a session arrives.
从图1可以看出,接入网设备包括的各个功能单元之间的连接关系如下:As can be seen from Figure 1, the connection relationship between the various functional units included in the access network equipment is as follows:
1)一个gNB可以由一个CU-CP、一个或多个CU-UP、一个或多个DU组成;1) A gNB can be composed of one CU-CP, one or more CU-UPs, and one or more DUs;
2)CU-CP和DU之间通过F1-C接口相连;2) CU-CP and DU are connected through the F1-C interface;
3)CU-UP和DU之间通过F1-U接口相连;3) CU-UP and DU are connected through the F1-U interface;
4)CU-UP和CU-CP之间通过E1接口相连;4) CU-UP and CU-CP are connected through the E1 interface;
5)一个DU连接到一个CU-UP;5) A DU is connected to a CU-UP;
6)一个CU-UP一般只能连接到一个CU-CP;特殊情况下,可能可以连到多个CU-CP;示例性的,为了更灵活、更弹性地布网,CU-UP可能需要连接到两个或两个以上CU-CP,例如当其中一个CU-CP的负荷太大,CU-UP可能需要被分配或者路由到另一个CU-CP;6) Generally, a CU-UP can only be connected to one CU-CP; in special cases, it may be connected to multiple CU-CPs; for example, in order to deploy the network more flexibly and elastically, the CU-UP may need to be connected To two or more CU-CPs, for example, when the load of one CU-CP is too large, the CU-UP may need to be allocated or routed to another CU-CP;
7)一个CU-UP可以连接到多个DU。7) A CU-UP can be connected to multiple DUs.
基于图1中的(a)所示的网络架构,在实际应用中,主要部署场景有两种,分别如图1中的(b)和图1中的(c)所示。其中,CU-CP可以连接到5G核心网(5G core,5GC),CU-UP也可以连接到5GC,UE可以连接到DU。5GC可包括但不限于:接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元,等等。其中,AMF网元主要用于移动性管理和接入管理、负责在终端设备与策略控制功能(policy control function,PCF)网元之间传递用户策略等。SMF网元主要用于会话管理、终端设备的网络互连协议(Internet protocol,IP)地址的分配和管理、选择和管理用户平面功能、策略控制和收发功能接口的终结点以及下行数据通信等。更多关于5GC包括的网元的描述可参考第三代合作伙伴项目(3rd generation partnership project,3GPP)技术标准(technical standards,TS)23.501中的定义。Based on the network architecture shown in (a) in Figure 1, in actual applications, there are two main deployment scenarios, as shown in (b) and (c) in Figure 1, respectively. Among them, CU-CP can be connected to the 5G core network (5G core, 5GC), CU-UP can also be connected to 5GC, and UE can be connected to DU. 5GC may include but is not limited to: access and mobility management function (AMF) network elements, session management function (SMF) network elements, etc. Among them, the AMF network element is mainly used for mobility management and access management, and is responsible for transmitting user policies between terminal equipment and policy control function (PCF) network elements. SMF network elements are mainly used for session management, allocation and management of Internet protocol (IP) addresses of terminal devices, selection and management of user plane functions, policy control and endpoints of transceiver function interfaces, and downlink data communications. For more descriptions of network elements included in 5GC, please refer to the definitions in 3rd generation partnership project (3GPP) technical standards (TS) 23.501.
图1中的(b)为第一种部署场景的示意图。如图1中的(b)所示,在第一种部署场景中,CU-CP和CU-UP1处于中心位置,CU-UP2处于分布式的位置。该场景可能如高可靠低时延(ultra-reliable and low-latency communication,URLLC)场景,通过一次中心交互之后的用户面数据传输;也可以进行在用户面侧的云实现,实现数据传输时延,如关键机器类通信(critical machine type communication,critical MTC)下的数据传输。在该场景下,CU-UP1和CU-UP2处于不同的安全域(security domain),其中,CU-UP1处于高安全域(图1中的(b)所示的安全域1),属于可信(trusted)CU-UP,CU-UP2处于低安全域(图1中的(b)所述的安全域2),属于非可信(untrusted)CU-UP。(b) in Figure 1 is a schematic diagram of the first deployment scenario. As shown in (b) in Figure 1, in the first deployment scenario, CU-CP and CU-UP1 are in the central position, and CU-UP2 is in a distributed position. This scenario may be an ultra-reliable and low-latency communication (URLLC) scenario, where user plane data is transmitted after a central interaction; it can also be implemented in the cloud on the user plane side to achieve data transmission latency. , such as data transmission under critical machine type communication (critical MTC). In this scenario, CU-UP1 and CU-UP2 are in different security domains. Among them, CU-UP1 is in a high security domain (security domain 1 shown in (b) in Figure 1) and is trusted. (trusted) CU-UP, CU-UP2 is in a low security domain (security domain 2 described in (b) of Figure 1) and belongs to an untrusted CU-UP.
图1中的(c)为第二种部署场景的示意图。如图1中的(c)所示,在第二种部署场景中,CU-CP、CU-UP1和CU-UP2均处于中心位置。该场景可能在如切片、边缘计算等场景中被广泛使用。CU-UP2由运营商负责管理,CU-UP1由第三方负责管理,因此CU-UP1和CU-UP2所处的安全等级不同。其中,CU-UP2所处的安全等级(security level)2的安全性高,属于可信CU-UP,CU-UP1所处的安全等级1的安全性低,属于非可信CU-UP。(c) in Figure 1 is a schematic diagram of the second deployment scenario. As shown in (c) in Figure 1, in the second deployment scenario, CU-CP, CU-UP1 and CU-UP2 are all in the central position. This scenario may be widely used in scenarios such as slicing and edge computing. CU-UP2 is managed by the operator, and CU-UP1 is managed by a third party. Therefore, CU-UP1 and CU-UP2 are at different security levels. Among them, the security level 2 of CU-UP2 is high and it belongs to trusted CU-UP. The security level 1 of CU-UP1 is low and it is untrusted CU-UP.
图2示出了一种安全保护方法的示意性流程图,该方法包括以下步骤:Figure 2 shows a schematic flow chart of a security protection method, which includes the following steps:
S210,UE向SMF发送协议数据单元(protocol data unit,PDU)会话建立请求(PDU  session establishment request)消息。S210. The UE sends a protocol data unit (PDU) session establishment request (PDU) to the SMF. session establishment request) message.
UE开机后,选择基站进行接入,并建立空口资源。UE选择的基站可以是由DU、CU-UP和CU-CP共同构成的基站。进一步地,UE发起注册流程,通过基站与核心网(例如5GC)建立连接,并完成鉴权过程。UE与核心网完成鉴权之后,核心网向CU-CP发送基站的根密钥(记为KgNB)。例如,核心网包括的AMF向CU-CP发送初始上下文建立请求(initial context setup request)消息,初始上下文建立请求消息包括KgNB。After the UE is powered on, it selects a base station for access and establishes air interface resources. The base station selected by the UE may be a base station composed of DU, CU-UP and CU-CP. Further, the UE initiates a registration process, establishes a connection with the core network (such as 5GC) through the base station, and completes the authentication process. After the UE and the core network complete the authentication, the core network sends the root key of the base station (recorded as KgNB) to the CU-CP. For example, the AMF included in the core network sends an initial context setup request (initial context setup request) message to the CU-CP, and the initial context setup request message includes KgNB.
UE与核心网完成鉴权之后,UE向核心网发送PDU会话建立请求消息,PDU会话建立请求消息包括PDU会话标识。例如,UE向核心网中的AMF发送PDU会话建立请求消息,AMF再将PDU会话建立请求消息发送至核心网中的SMF。After the UE completes the authentication with the core network, the UE sends a PDU session establishment request message to the core network. The PDU session establishment request message includes the PDU session identifier. For example, the UE sends a PDU session establishment request message to the AMF in the core network, and the AMF then sends the PDU session establishment request message to the SMF in the core network.
S220,SMF向CU-CP发送PDU会话请求消息。S220: The SMF sends a PDU session request message to the CU-CP.
PDU会话请求消息包括PDU会话的用户面安全策略(UP security policy)。用户面安全策略可以包括用户面机密性安全策略和用户面完整性安全策略。其中,用户面机密性安全策略用于指示是否开启用户面机密性保护。用户面机密性安全策略存在三种可能的取值,分别为“必须(required)”、“优选(preferred)”和“不需要(not needed)”。其中,required表示必须开启用户面机密性保护,preferred表示可以优选开启用户面机密性保护,not needed表示不需要开启用户面机密性保护。用户面完整性安全策略用于指示是否开启用户面完整性保护。用户面完整性安全策略也存在三种可能的取值,分别为required、preferred和not needed。其中,required表示必须开启用户面完整性保护,preferred表示优选开启用户面完整性保护,not needed表示不需要开启用户面完整性保护。The PDU session request message includes the user plane security policy (UP security policy) of the PDU session. The user plane security policy may include a user plane confidentiality security policy and a user plane integrity security policy. Among them, the user plane confidentiality security policy is used to indicate whether to enable user plane confidentiality protection. There are three possible values for the user plane confidentiality security policy, namely "required", "preferred" and "not needed". Among them, required indicates that user plane confidentiality protection must be turned on, preferred indicates that user plane confidentiality protection can be preferably turned on, and not needed indicates that user plane confidentiality protection does not need to be turned on. The user plane integrity security policy is used to indicate whether to enable user plane integrity protection. The user plane integrity security policy also has three possible values, which are required, preferred and not needed. Among them, required means that user plane integrity protection must be turned on, preferred means that user plane integrity protection is preferably turned on, and not needed means that user plane integrity protection does not need to be turned on.
示例性的,SMF可以将PDU会话请求消息发送至AMF,AMF再将PDU会话请求消息发送至CU-CP。For example, the SMF can send the PDU session request message to the AMF, and the AMF then sends the PDU session request message to the CU-CP.
S230,CU-CP选择安全算法和推演用户面安全密钥。S230, CU-CP selects a security algorithm and derives a user plane security key.
安全算法包括用户面机密性保护算法和用户面完整性保护算法,用户面安全密钥包括用户面加密密钥(记为Kupenc)和用户面完整性密钥(记为Kupint)。推演用户面安全密钥的输入密钥包括KgNB。若CU-CP连接了多个CU-UP,则CU-CP为该多个CU-UP选择相同的安全算法,以及为该多个CU-UP推演的用户面安全密钥相同。The security algorithm includes the user plane confidentiality protection algorithm and the user plane integrity protection algorithm. The user plane security key includes the user plane encryption key (denoted as Kupenc) and the user plane integrity key (denoted as Kupint). The input key for deriving the user plane security key includes KgNB. If the CU-CP is connected to multiple CU-UPs, the CU-CP selects the same security algorithm for the multiple CU-UPs, and the user plane security keys derived for the multiple CU-UPs are the same.
需要说明的是,安全算法选择和用户面安全密钥推演可以是在PDU会话建立流程中,也可以是在PDU会话建立之前,例如通过AS安全模式命令(AS Security Mode Command)流程完成,本申请实施例对此不作限制。It should be noted that the security algorithm selection and user plane security key deduction can be done during the PDU session establishment process or before the PDU session is established, for example, through the AS Security Mode Command (AS Security Mode Command) process. This application The embodiment does not limit this.
S240,CU-CP向CU-UP发送承载上下文建立请求(bearer context setup request)消息。S240, CU-CP sends a bearer context setup request (bearer context setup request) message to CU-UP.
承载上下文请求消息包括用户面机密性保护算法、用户面完整性保护算法、Kupenc、Kupint和安全指示,安全指示包括用户面安全策略和最大完整性保护速率。其中,最大完整性保护速率用于表示基站开启用户面完整性保护后的最大速率。最大完整性保护速率包括上行最大完整性保护速率和下行最大完整性保护速率。上行最大完整性保护速率表示基站开启用户面完整性保护后的最大上行速率。下行最大完整性保护速率表示终端设备开启用户面完整性保护后的最大下行速率。例如,当上行最大完整性保护速率为64千比特每秒时,代表基站开启用户面完整性保护后,最大可以从终端设备接收数据的速率为64千比特每秒。The bearer context request message includes user plane confidentiality protection algorithm, user plane integrity protection algorithm, Kupenc, Kupint and security instructions. The security instructions include user plane security policy and maximum integrity protection rate. Among them, the maximum integrity protection rate is used to indicate the maximum rate after the base station turns on the user plane integrity protection. The maximum integrity protection rate includes the maximum uplink integrity protection rate and the maximum downlink integrity protection rate. The maximum uplink integrity protection rate indicates the maximum uplink rate after the base station turns on user plane integrity protection. The maximum downlink integrity protection rate indicates the maximum downlink rate after the terminal device turns on user plane integrity protection. For example, when the maximum uplink integrity protection rate is 64 kilobits per second, it means that after the base station turns on user plane integrity protection, the maximum data rate that can be received from the terminal device is 64 kilobits per second.
可选的,在S240中,CU-CP可以向CU-UP发送承载上下文修改(bearer context  modification request)消息,承载上下文修改请求消息包括用户面机密性保护算法、用户面完整性保护算法、Kupenc、Kupint和安全指示,安全指示包括用户面安全策略和最大完整性保护速率。Optionally, in S240, CU-CP can send bearer context modification (bearer context modification request) message, which carries the context modification request message including user plane confidentiality protection algorithm, user plane integrity protection algorithm, Kupenc, Kupint and security instructions. The security instructions include user plane security policy and maximum integrity protection rate.
S250,CU-UP向CU-CP发送承载上下文建立响应(bearer context setup response)消息。S250, CU-UP sends a bearer context setup response (bearer context setup response) message to CU-CP.
承载上下文建立响应消息包括安全结果。The bearer context establishment response message includes security results.
CU-UP接收到承载上下文建立请求消息之后,使用承载上下文建立请求消息包括的安全指示,并选择安全结果(security result)。安全结果包括完整性安全结果和机密性安全结果。安全结果的取值可以是“执行”或“不执行”。以完整性安全结果为例,若完整性安全结果的取值是“执行”,则完整性安全结果指示用户面完整性保护开启;若完整性安全结果的取值是“不执行”,则完整性安全结果指示用户面完整性保护不开启。After receiving the bearer context establishment request message, CU-UP uses the security indication included in the bearer context establishment request message and selects a security result (security result). Security results include integrity security results and confidentiality security results. The value of the safety result can be "execute" or "do not execute". Taking the integrity security result as an example, if the value of the integrity security result is "execute", the integrity security result indicates that the user plane integrity protection is turned on; if the value of the integrity security result is "do not execute", then the integrity security result indicates that the user plane integrity protection is turned on; if the value of the integrity security result is "do not execute", the integrity The sexual security result indicates that user plane integrity protection is not turned on.
CU-UP选择的安全结果与安全指示包括的用户面安全策略相关。例如,若用户面安全策略的取值为“required”,则CU-UP选择的安全结果的取值为“执行”。又例如,若用户面安全策略的取值为“not needed”,则CU-UP选择的安全结果的取值为“不执行”。再例如,若用户面安全策略的取值为“preferred”,则CU-UP选择的安全结果的取值为“执行”或“不执行”,例如,若CU-UP当前负载较大,则CU-UP选择的安全结果的取值为“不执行”,又例如,当前建立的承载对应的数据的安全要求高,则CU-UP选择的安全结果取值为“执行”。The security result selected by CU-UP is related to the user plane security policy included in the security indication. For example, if the value of the user plane security policy is "required", the value of the security result selected by CU-UP is "execution". For another example, if the value of the user plane security policy is "not needed", the value of the security result selected by CU-UP is "not executed". For another example, if the value of the user plane security policy is "preferred", the value of the security result selected by CU-UP is "execute" or "do not execute". For example, if the current load of CU-UP is large, then CU The value of the security result selected by -UP is "Do Not Execute". For another example, if the security requirements of the data corresponding to the currently established bearer are high, the value of the security result selected by CU-UP is "Execute".
可选的,若在S240中,CU-UP接收到来自CU-CP的承载上下文修改请求消息,则在S250中,CU-UP向CU-CP发送承载上下文修改响应(bearer context modification response)消息,承载上下文修改响应消息包括安全结果。Optionally, if in S240, CU-UP receives the bearer context modification request message from CU-CP, then in S250, CU-UP sends a bearer context modification response (bearer context modification response) message to CU-CP, The bearer context modification response message includes security results.
需要说明的是,若CU-UP无法选择与用户面安全策略对应的安全结果,则CU-UP向CU-CP发送拒绝消息。例如,用户面安全策略的取值为“required”,但CU-UP不支持开启用户面安全保护,即CU-UP无法选择取值为“执行”的安全结果,则CU-UP向CU-CP发送拒绝消息。又例如,用户面安全策略的取值为“not needed”,但CU-UP要求开启用户面安全保护,即CU-UP无法选择取值为“不执行”的安全结果,则CU-UP向CU-CP发送拒绝消息。It should be noted that if CU-UP cannot select a security result corresponding to the user plane security policy, CU-UP sends a rejection message to CU-CP. For example, if the value of the user plane security policy is "required", but CU-UP does not support enabling user plane security protection, that is, CU-UP cannot select a security result with a value of "execution", then CU-UP reports to CU-CP Send a rejection message. For another example, if the value of the user plane security policy is "not needed", but CU-UP requires user plane security protection to be turned on, that is, CU-UP cannot select a security result with a value of "do not execute", then CU-UP reports to CU -CP sends a reject message.
S260,CU-CP向UE发送RRC重配置(RRC configuration)消息。S260, CU-CP sends an RRC reconfiguration (RRC configuration) message to the UE.
RRC重配置消息包括安全结果。相应的,UE根据安全结果开启用户面安全保护或者不开启用户面安全保护。例如,安全结果包括的完整性安全结果的取值为“执行”,则UE开启用户面完整性保护。安全结果包括的机密性安全结果的取值为“执行”,则UE开启用户面机密性保护。The RRC reconfiguration message includes security results. Correspondingly, the UE enables user plane security protection or does not enable user plane security protection according to the security result. For example, if the value of the integrity security result included in the security result is "execute", then the UE enables user plane integrity protection. If the value of the confidentiality security result included in the security result is "execute", then the UE enables user plane confidentiality protection.
S270,UE向CU-CP发送RRC重配置完成(RRC configuration complete)消息。S270, the UE sends an RRC configuration complete message to the CU-CP.
基于图2所示的方法,同一个CU-CP连接的多个CU-UP均使用相同的用户面安全密钥和安全算法。然而从图1中的(b)和(c)所示的部署场景可见,同一个CU-CP连接的多个CU-UP可能包括非可信CU-UP,非可信CU-UP相较于可信CU-UP更容易被攻击者俘获。一旦非可信CU-UP被攻击者俘获后,攻击者可以从非可信CU-UP中获取用户面安全密钥,并使用该用户面安全密钥对可信CU-UP和UE之间的数据进行解密或篡改。Based on the method shown in Figure 2, multiple CU-UPs connected to the same CU-CP use the same user plane security key and security algorithm. However, it can be seen from the deployment scenarios shown in (b) and (c) in Figure 1 that multiple CU-UPs connected to the same CU-CP may include untrusted CU-UPs. Compared with untrusted CU-UPs, Trusted CU-UP is more likely to be captured by attackers. Once the untrusted CU-UP is captured by the attacker, the attacker can obtain the user plane security key from the untrusted CU-UP and use the user plane security key to secure the communication between the trusted CU-UP and the UE. Data is decrypted or tampered with.
有鉴于此,本申请实施例提供一种安全保护方法,以期减小用户面安全密钥泄漏的风 险。In view of this, embodiments of the present application provide a security protection method in order to reduce the risk of user plane security key leakage. risk.
需要说明的是,下文实施例将集中式单元控制面实体记为CU-CP,将集中式单元用户面实体记为CU-UP,将终端设备记为UE,将会话管理网元记为SMF,将接入和移动性管理功能网元记为AMF。It should be noted that in the following embodiments, the centralized unit control plane entity is denoted as CU-CP, the centralized unit user plane entity is denoted as CU-UP, the terminal device is denoted as UE, and the session management network element is denoted as SMF. The access and mobility management function network element is denoted as AMF.
图3示出了本申请实施例提供的安全保护方法的示意性流程图。如图3所示,方法300可以包括以下步骤:Figure 3 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 3, method 300 may include the following steps:
S310,CU-CP接收来自SMF的用户面安全策略。相应的,SMF向CU-CP发送用户面安全策略。S310: CU-CP receives the user plane security policy from SMF. Correspondingly, SMF sends the user plane security policy to CU-CP.
用户面安全策略的描述可以参考图2中的S220。The description of the user plane security policy may refer to S220 in Figure 2.
示例性的,SMF通过PDU会话请求消息向CU-CP发送用户面安全策略,即,SMF向CU-CP发送PDU会话请求消息,PDU会话请求消息包括用户面安全策略。Exemplarily, the SMF sends the user plane security policy to the CU-CP through the PDU session request message, that is, the SMF sends the PDU session request message to the CU-CP, and the PDU session request message includes the user plane security policy.
CU-CP接收到用户面安全策略之后,根据用户面安全策略执行S320a和/或S320b。例如,若用户面安全策略指示不需要开启用户面安全保护,则CU-CP执行S320a,若用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护,则CU-CP执行S320b。又例如,若用户面安全策略中的用户面完整性安全策略指示不需要开启用户面完整性保护,用户面安全策略中的用户面机密性安全策略指示必须开启用户面机密性保护或优选开启用户面机密性保护,则CU-CP执行S320a和S320b。After receiving the user plane security policy, the CU-CP executes S320a and/or S320b according to the user plane security policy. For example, if the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP executes S320a. If the user plane security policy indicates that user plane security protection must be enabled or that user plane security protection is preferably enabled, the CU-CP executes S320b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on, the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection must be turned on or is preferably turned on. For face confidentiality protection, the CU-CP performs S320a and S320b.
S320a,CU-CP向CU-UP1发送虚构密钥。相应的,CU-UP1接收来自CU-CP的虚构密钥。S320a, CU-CP sends the fictitious key to CU-UP1. Correspondingly, CU-UP1 receives the fictitious key from CU-CP.
其中,虚构密钥(dummy key)不同于第一用户面安全密钥。示例性的,虚构密钥是128比特(bit)的随机数,或者,虚构密钥是预定义的值。Among them, the dummy key is different from the first user plane security key. For example, the fictitious key is a 128-bit random number, or the fictitious key is a predefined value.
第一用户面安全密钥用于UE与CU-UP(例如下文的CU-UP2)之间开启用户面安全保护。示例性的,第一用户面安全密钥是CU-CP根据根密钥生成的。例如,第一用户面安全密钥是CU-CP以根密钥为输入密钥,以第一密钥生成参数为输入参数生成的。第一用户面安全密钥包括第一用户面加密密钥和/或第一用户面完整性密钥,第一用户面加密密钥用于UE与CU-UP之间进行用户面机密性保护,第一用户面完整性密钥用于UE与CU-UP之间进行用户面完整性保护。示例性的,根密钥是基站的根密钥,基站包括CU-CP和CU-UP1。第一密钥生成参数包括以下一项或多项:算法标识和算法类型鉴别器。其中,算法类型鉴别器的取值包括“用户面机密性保护”和/或“用户面完整性保护”。算法标识包括加密保护算法标识和完整性保护算法标识,加密保护算法标识的取值包括“下一代加密算法(next generation encryption algorithm,NEA)0”、“NEA1”、“NEA2”或“NEA3”,完整性保护算法标识的取值包括“下一代完整性算法(next generation integrity algorithm,NIA)0”、“NIA1”、“NIA2”或“NIA3”。加密保护算法标识用于生成第一用户面加密密钥,完整性保护算法标识用于生成第一用户面完整性密钥。The first user plane security key is used to enable user plane security protection between the UE and CU-UP (for example, CU-UP2 below). For example, the first user plane security key is generated by the CU-CP based on the root key. For example, the first user plane security key is generated by the CU-CP using the root key as the input key and the first key generation parameter as the input parameter. The first user plane security key includes a first user plane encryption key and/or a first user plane integrity key, and the first user plane encryption key is used for user plane confidentiality protection between the UE and CU-UP, The first user plane integrity key is used for user plane integrity protection between the UE and the CU-UP. For example, the root key is the root key of the base station, and the base station includes CU-CP and CU-UP1. The first key generation parameters include one or more of the following: an algorithm identifier and an algorithm type discriminator. Among them, the value of the algorithm type discriminator includes "user plane confidentiality protection" and/or "user plane integrity protection". The algorithm identification includes the encryption protection algorithm identification and the integrity protection algorithm identification. The value of the encryption protection algorithm identification includes "next generation encryption algorithm (NEA)0", "NEA1", "NEA2" or "NEA3". The values of the integrity protection algorithm identifier include "next generation integrity algorithm (NIA)0", "NIA1", "NIA2" or "NIA3". The encryption protection algorithm identifier is used to generate the first user plane encryption key, and the integrity protection algorithm identifier is used to generate the first user plane integrity key.
虚构密钥包括虚构加密密钥和/或虚构完整性密钥,虚构加密密钥不同于第一用户面加密密钥。虚构完整性密钥不同于第一用户面完整性密钥。The fictitious key includes a fictitious encryption key and/or a fictitious integrity key, the fictitious encryption key being different from the first user plane encryption key. The fictitious integrity key is different from the first user plane integrity key.
CU-CP接收到用户面安全策略之后,若用户面安全策略指示不需要开启用户面安全保护,则CU-CP生成虚构密钥,并将虚构密钥发送至CU-UP1。例如,若用户面安全策略中的用户面机密性安全策略的取值是“not needed”,则CU-CP生成虚构加密密钥,并将虚 构加密密钥发送至CU-UP1。又例如,若用户面安全策略中的用户面完整性安全策略的取值是“not needed”,则CU-CP生成虚构完整性密钥,并将虚构完整性密钥发送至CU-UP1。After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "not needed", the CU-CP generates a fictitious encryption key and The configuration encryption key is sent to CU-UP1. For another example, if the value of the user plane integrity security policy in the user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and sends the fictitious integrity key to CU-UP1.
可选的,CU-CP向CP-UP1发送虚构密钥,包括:CU-CP向CU-UP1发送虚构密钥和安全算法,安全算法是空算法(null-scheme),或者说安全算法为空。安全算法包括用户面机密性安全算法和/或用户面完整性安全算法。若用户面机密性安全策略指示不需要开启用户面机密性保护,则安全算法包括的用户面机密性算法是空算法。若用户面完整性安全策略指示不需要开启用户面完整性保护,则安全算法包括的完整性安全算法是空算法。其中,空算法表示CP-UP1与UE之间传输的数据不加密。例如,用户面机密性算法是空算法,则表示CP-UP1与UE之间传输的数据不进行加密保护,用户面完整性算法是空算法,则表示CP-UP1与UE之间传输的数据不进行完整性保护Optionally, CU-CP sends a fictitious key to CP-UP1, including: CU-CP sends a fictitious key and a security algorithm to CU-UP1. The security algorithm is a null-scheme, or the security algorithm is null. . Security algorithms include user plane confidentiality security algorithms and/or user plane integrity security algorithms. If the user plane confidentiality security policy indicates that user plane confidentiality protection does not need to be turned on, the user plane confidentiality algorithm included in the security algorithm is an empty algorithm. If the user plane integrity security policy indicates that user plane integrity protection does not need to be enabled, the integrity security algorithm included in the security algorithm is an empty algorithm. Among them, the empty algorithm means that the data transmitted between CP-UP1 and UE is not encrypted. For example, if the user plane confidentiality algorithm is a null algorithm, it means that the data transmitted between CP-UP1 and UE will not be encrypted and protected. If the user plane integrity algorithm is a null algorithm, it means that the data transmitted between CP-UP1 and UE will not be encrypted. Integrity protection
示例性的,CU-CP通过承载上下文建立请求消息或承载上下文修改请求消息向CU-UP1发送虚构密钥。例如,CU-CP向CU-UP1发送的虚构密钥携带在承载上下文建立请求消息中用于携带用户面安全密钥的信元中,或者,CU-CP向CU-UP1发送的虚构密钥携带在承载上下文修改请求消息中用于携带用户面安全密钥的信元中。也可以说,CU-CP向CU-UP1发送虚构密钥相当于,CU-CP向CU-UP1发送的用户面安全密钥是虚构值。承载上下文建立请求消息中用于携带用户面安全密钥的信元是安全信息(security information)信元,承载上下文修改请求消息中用于携带用户面安全密钥的信元是security information信元。For example, CU-CP sends the fictitious key to CU-UP1 through a bearer context establishment request message or a bearer context modification request message. For example, the fictitious key sent by CU-CP to CU-UP1 is carried in the information element used to carry the user plane security key in the bearer context establishment request message, or the fictitious key sent by CU-CP to CU-UP1 is carried in the information element used to carry the user plane security key in the bearer context establishment request message. In the information element used to carry the user plane security key in the bearer context modification request message. It can also be said that sending a fictitious key by CU-CP to CU-UP1 is equivalent to that the user plane security key sent by CU-CP to CU-UP1 is a fictitious value. The cell used to carry the user plane security key in the bearer context establishment request message is the security information cell, and the cell used to carry the user plane security key in the bearer context modification request message is the security information cell.
可选的,CU-CP向CU-UP1发送的虚构密钥是空密钥,或者说,CU-CP不向CU-UP1发送密钥。例如,CU-CP向CU-UP1发送的承载上下文建立请求消息不包括密钥,即CU-CP向CU-UP1发送的承载上下文建立请求消息中的security information信元为空。Optionally, the fictitious key sent by CU-CP to CU-UP1 is an empty key, or in other words, CU-CP does not send the key to CU-UP1. For example, the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, that is, the security information information element in the bearer context establishment request message sent by CU-CP to CU-UP1 is empty.
可选的,方法300还包括:CU-CP向CU-UP1发送指示信息,指示信息用于指示用户面安全密钥为空。相应的,CU-UP1根据该指示信息确定接收到的用户面安全密钥是虚构值,或者确定未接收到用户面安全密钥。例如,若CU-CP通过承载上下文建立请求消息向CU-UP1发送虚构密钥,或者CU-CP向CU-UP1发送的承载上下文建立请求消息不包括密钥,则CU-UP1根据该指示信息,不解析承载上下文建立请求消息中的security information信元。Optionally, method 300 further includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty. Correspondingly, CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The security information information element in the bearer context establishment request message is not parsed.
可选的,CU-CP还向CU-UP1发送用户面安全策略。相应的,CU-UP1接收到用户面安全策略之后,若用户面安全策略指示不需要开启用户面安全保护,则CU-UP1丢弃或不存储虚构密钥。例如,若用户面安全策略中的用户面机密性安全策略指示不需要开启用户面机密性保护,则CU-UP1丢弃或不存储虚构加密密钥。又例如,若用户面安全策略中的用户面完整性安全策略指示不需要开启用户面完整性保护,则CU-UP1丢弃或不存储虚构完整性密钥。CU-CP向CU-UP1发送的虚构密钥和用户面安全策略可以携带在同一条消息中,也可以携带在不同的消息中,本申请实施例对此不做限定。Optionally, CU-CP also sends the user plane security policy to CU-UP1. Correspondingly, after CU-UP1 receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be enabled, CU-UP1 discards or does not store the fictitious key. For example, if the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection does not need to be turned on, CU-UP1 discards or does not store the fictitious encryption key. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on, CU-UP1 discards or does not store the fictitious integrity key. The fictitious key and user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
可选的,CU-UP1根据用户面安全策略,丢弃或不存储安全算法。若用户面安全策略指示不需要开启用户面安全保护,则CU-UP1丢弃或不存储安全算法。Optionally, CU-UP1 discards or does not store the security algorithm according to the user plane security policy. If the user plane security policy indicates that user plane security protection does not need to be enabled, CU-UP1 discards or does not store the security algorithm.
需要说明的是,CU-CP向CU-UP1发送虚构密钥时,CU-CP可能未生成第一用户面安全密钥,但是CU-CP具备生成第一用户面安全密钥的能力,CU-CP还具备向CU-UP发送第一用户面安全密钥的能力。例如,在CU-CP接收到的用户面安全策略指示必须开启 用户面安全的情况下,CU-CP可以选择CU-UP2建立承载上下文,并向CU-UP2发送CU-CP生成的第一用户面安全密钥。It should be noted that when CU-CP sends the fictitious key to CU-UP1, CU-CP may not generate the first user plane security key, but CU-CP has the ability to generate the first user plane security key. CU-CP The CP also has the ability to send the first user plane security key to the CU-UP. For example, the user plane security policy indication received on the CU-CP must be enabled When the user plane is secure, CU-CP can select CU-UP2 to establish a bearer context and send the first user plane security key generated by CU-CP to CU-UP2.
S320b,CU-CP向CU-UP2发送第一用户面安全密钥。相应的,CU-UP2接收来自CU-CP的第一用户面安全密钥。S320b: CU-CP sends the first user plane security key to CU-UP2. Correspondingly, CU-UP2 receives the first user plane security key from CU-CP.
需要说明的是,若CU-CP连接了一个CU-UP,则CU-UP2与CU-UP1相同,若CU-CP连接了多个CU-UP,则CU-UP2与CU-UP1相同,或者不同。It should be noted that if CU-CP is connected to one CU-UP, CU-UP2 and CU-UP1 are the same. If CU-CP is connected to multiple CU-UPs, CU-UP2 and CU-UP1 are the same or different. .
CU-CP接收到用户面安全策略之后,若用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护,则CU-CP向CU-UP2发送CU-CP生成的第一用户面安全密钥。例如,若用户面安全策略中的用户面机密性安全策略的取值是“required”或“preferred”,则CU-CP向CU-UP2发送CU-CP生成的第一用户面加密密钥。又例如,若用户面安全策略中的用户面完整性安全策略的取值是“required”或“preferred”,则CU-CP向CU-UP2发送CU-CP生成的第一用户面完整性密钥。After CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection must be turned on or it is preferred to turn on user plane security protection, CU-CP sends the first user plane security generated by CU-CP to CU-UP2. key. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "required" or "preferred", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2. For another example, if the value of the user plane integrity security policy in the user plane security policy is "required" or "preferred", then CU-CP sends the first user plane integrity key generated by CU-CP to CU-UP2. .
示例性的,CU-CP通过承载上下文建立请求消息或承载上下文修改请求消息向CU-UP2发送第一用户面安全密钥。Exemplarily, CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message or a bearer context modification request message.
可选的,若CU-CP与多个CU-UP连接,则在S320a或S320b之前,方法300还包括S330。Optionally, if the CU-CP is connected to multiple CU-UPs, before S320a or S320b, the method 300 also includes S330.
S330,CU-CP选择CU-UP。S330, CU-CP selects CU-UP.
一种可能的实现方式中,CU-CP根据以下一项或多项选择CU-UP:CU-CP连接的多个CU-UP中每个CU-UP的负载情况,或当前建立的会话承载的业务的时延、负载等业务需求。例如,CU-CP从连接的多个CU-UP中选择负载最低且满足当前建立的会话承载的业务的需求的CU-UP。In a possible implementation, the CU-CP selects a CU-UP based on one or more of the following: the load of each CU-UP among the multiple CU-UPs connected to the CU-CP, or the load of the currently established session. Business requirements such as business delay and load. For example, the CU-CP selects the CU-UP with the lowest load and meeting the requirements of the services carried by the currently established session from multiple connected CU-UPs.
另一种可能的实现方式中,CU-UP根据用户面安全策略选择CU-UP。若用户面安全策略指示不需要开启用户面安全保护,则CU-CP从连接的多个CU-UP中选择非可信CU-UP(即图3示出的CU-UP1)。若用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护,则CU-CP从连接的多个CU-UP中选择可信CU-UP(即图3示出的CU-UP2)。In another possible implementation, CU-UP selects CU-UP according to the user plane security policy. If the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP selects an untrusted CU-UP (ie, CU-UP1 shown in Figure 3) from multiple connected CU-UPs. If the user plane security policy indicates that user plane security protection must be turned on or it is preferable to turn on user plane security protection, the CU-CP selects a trusted CU-UP (i.e., CU-UP2 shown in Figure 3) from multiple connected CU-UPs. .
例如,若用户面安全策略中的用户面机密性安全策略和用户面完整性安全策略的取值都是“not needed”,则CU-CP选择非可信CU-UP。若用户面机密性安全策略的取值是“required”或“preferred”,和/或,用户面完整性安全策略的取值是“required”或“preferred”,则CU-CP选择可信CU-UP。示例性的,CU-CP根据用户面安全策略选择CU-UP的方式如表1或表2所示。For example, if the values of the user plane confidentiality security policy and the user plane integrity security policy in the user plane security policy are both "not needed", then CU-CP selects untrusted CU-UP. If the value of the user plane confidentiality security policy is "required" or "preferred", and/or, the value of the user plane integrity security policy is "required" or "preferred", then the CU-CP selects the trusted CU- UP. Exemplarily, the way in which the CU-CP selects the CU-UP according to the user plane security policy is as shown in Table 1 or Table 2.
表1
Table 1
表2
Table 2
示例性的,CU-CP根据以下一项或多项判断连接的CU-UP是可信的还是非可信的:CU-UP的部署位置,CU-UP的物理环境,或CU-UP是否通过认证或远程证明校验。CU-UP的部署位置指示CU-UP部署在高安全域或低安全域,高安全域指的是中心位置、安全等级高的区域或风险等级低的区域,低安全域指的是分布式位置、安全等级低或风险等级高的区域。CU-UP的物理环境表示CU-UP所在的区域的物理环境,例如,物理环境包括是否在室内、是否有人看守、在城市内或在郊外。例如,若某个CU-UP满足以下条件中的至少一项:部署在高安全域,由运营商管理,物理环境安全,或经过认证或远程证明校验,则CU-CP确定该CU-UP是可信CU-UP。若某个CU-UP满足以下条件中的至少一项:部署在低安全域,由第三方管理,物理环境不安全,或未经过认证或远程校验证明,则CU-CP确定该CU-UP是非可信CU-UP。For example, the CU-CP determines whether the connected CU-UP is trusted or untrusted based on one or more of the following: the deployment location of the CU-UP, the physical environment of the CU-UP, or whether the CU-UP passes Authentication or remote attestation verification. The deployment location of CU-UP indicates that CU-UP is deployed in a high security domain or a low security domain. A high security domain refers to a central location, a high security level area, or a low risk level area. A low security domain refers to a distributed location. , areas with low safety level or high risk level. The physical environment of the CU-UP represents the physical environment of the area where the CU-UP is located. For example, the physical environment includes whether it is indoors, whether it is guarded, in a city, or in the suburbs. For example, if a CU-UP meets at least one of the following conditions: it is deployed in a high-security domain, managed by an operator, the physical environment is safe, or it has been authenticated or verified remotely, then the CU-CP determines that the CU-UP It is trusted CU-UP. If a CU-UP meets at least one of the following conditions: deployed in a low-security domain, managed by a third party, the physical environment is unsafe, or has not been certified or remotely verified, the CU-CP determines that the CU-UP Yes and no trusted CU-UP.
又示例性的,CU-CP根据从OAM获取的信息确定连接的CU-UP是可信的还是非可信的,即OAM根据以下一项或多项判断CU-CP连接的CU-UP是可信的还是非可信的:CU-UP的部署位置,CU-UP的物理环境,或CU-UP的是否通过认证或远程证明校验,并且向CU-CP发送信息,以向CU-CP指示CU-CP连接的CU-UP是可信的还是非可信的。In another example, the CU-CP determines whether the connected CU-UP is trusted or untrusted based on the information obtained from the OAM, that is, the OAM determines whether the connected CU-UP is trustworthy based on one or more of the following: Trusted or untrusted: the deployment location of CU-UP, the physical environment of CU-UP, or whether CU-UP passes authentication or remote attestation verification, and sends information to CU-CP to indicate to CU-CP Whether the CU-UP connected to the CU-CP is trusted or untrusted.
CU-CP从连接的多个CU-UP中选择CU-UP1或CU-UP2之后,向选择的CU-UP1发送虚构密钥,或者,向选择的CU-UP2发送第一用户面安全密钥。After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
在本申请实施例中,在用户面安全策略指示不需要开启用户面安全保护的情况下,CU-CP向CU-UP发送不同于用户面安全密钥的虚构密钥,从而即使在该CU-UP被攻击者攻破的情况下,攻击者只能从CU-UP获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。可以理解,在用户面安全策略指示不需要开启用户面安全保护的情况下,CU-UP与UE之间的用户面安全保护不会开启,因此,即使CU-CP向CU-UP发送了虚构密钥,CU-UP也不会使用该虚构密钥加密数据,从而不会影响CU-UP与UE之间的用户面数据传输过程。In this embodiment of the present application, when the user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP sends a fictitious key that is different from the user plane security key to the CU-UP, so that even if the CU-UP When UP is breached by an attacker, the attacker can only obtain the fictitious key from CU-UP, but not the user plane security key, thus reducing the risk of user plane security key leakage. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between CU-UP and UE will not be turned on. Therefore, even if CU-CP sends a fictitious password to CU-UP, key, CU-UP will not use this fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
此外,若CU-CP向CU-UP发送虚构密钥,则CU-CP向CU-UP发送的安全算法是空算法,从而即使在该CU-UP被攻击者攻破的情况下,攻击者也不能从CU-UP获取到正确的安全算法,从而可以减小攻击者从CU-UP获取的信息量。In addition, if CU-CP sends a fictitious key to CU-UP, the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
此外,在用户面安全策略指示不需要开启用户面安全保护的情况下,若CU-CP连接了多个CU-UP,则CU-CP从该多个CU-UP中选择非可信CU-UP,并且向选择的CU-UP发送虚构密钥,从而可以避免非可信CU-UP获取到用户面安全密钥,进一步减小用户面安全密钥泄漏的风险。In addition, when the user plane security policy indicates that user plane security protection does not need to be turned on, if the CU-CP is connected to multiple CU-UPs, the CU-CP selects an untrusted CU-UP from the multiple CU-UPs. , and sends the fictitious key to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
图4示出了本申请实施例提供的安全保护方法的示意性流程图。如图4所示,方法400可以包括以下步骤:Figure 4 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 4, method 400 may include the following steps:
S410,CU-CP接收来自SMF的用户面安全策略。相应的,SMF向CU-CP发送用户 面安全策略。S410: CU-CP receives the user plane security policy from SMF. Correspondingly, SMF sends the user Faced security policy.
用户面安全策略的描述可以参考图2中的S220。The description of the user plane security policy may refer to S220 in Figure 2.
CU-CP接收到用户面安全策略之后,根据用户面安全策略执行S420a和/或S420b。例如,若用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护,则CU-CP执行S420a,若用户面安全策略指示必须开启用户面安全保护,则CU-CP执行S420b。又例如,若用户面安全策略中的用户面完整性安全策略指示不需要开启用户面完整性保护或优选开启用户面完整性保护,用户面安全策略中的用户面机密性安全策略指示必须开启用户面机密性保护,则CU-CP执行S420a和S420b。After receiving the user plane security policy, the CU-CP executes S420a and/or S420b according to the user plane security policy. For example, if the user plane security policy indicates that user plane security protection does not need to be turned on or that it is preferred to turn on user plane security protection, the CU-CP executes S420a. If the user plane security policy indicates that user plane security protection must be turned on, the CU-CP executes S420b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on or that user plane integrity protection is preferably turned on, the user plane confidentiality security policy in the user plane security policy indicates that user plane integrity protection must be turned on. If the face confidentiality is protected, the CU-CP executes S420a and S420b.
S420a,CU-CP向CU-UP1发送虚构密钥和用户面安全策略。相应的,CU-UP1接收来自CU-CP的虚构密钥和用户面安全策略。S420a, CU-CP sends the fictitious key and user plane security policy to CU-UP1. Correspondingly, CU-UP1 receives the fictitious key and user plane security policy from CU-CP.
虚构密钥的相关描述可以参考方法300中的S320a。For relevant description of the fictitious key, please refer to S320a in method 300.
CU-CP接收到用户面安全策略之后,若用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护,则CU-CP生成虚构密钥,并将虚构密钥和用户面安全策略发送至CU-UP1。例如,若用户面安全策略中的用户面机密性安全策略的取值是“not needed”或“preferred”,则CU-CP生成虚构加密密钥,并将虚构加密密钥和用户面机密性安全策略发送至CU-UP1。又例如,若用户面安全策略中的用户面完整性安全策略的取值是“not needed”或“preferred”,则CU-CP生成虚构完整性密钥,并将虚构完整性密钥和用户面完整性安全策略发送至CU-UP1。After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be turned on or that user plane security protection is preferably turned on, the CU-CP generates a fictitious key and combines the fictitious key with the user plane security The policy is sent to CU-UP1. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "not needed" or "preferred", the CU-CP generates a fictitious encryption key and combines the fictitious encryption key with the user plane confidentiality security The policy is sent to CU-UP1. For another example, if the value of the user plane integrity security policy in the user plane security policy is "not needed" or "preferred", the CU-CP generates a fictitious integrity key and combines the fictitious integrity key with the user plane The integrity security policy is sent to CU-UP1.
可选的,CU-CP向CP-UP1发送虚构密钥和用户面安全策略,包括:CU-CP向CU-UP1发送虚构密钥、用户面安全策略和安全算法,安全算法是空算法,或者说安全算法为空。例如,若用户面机密性安全策略的取值是“not needed”或“preferred”,则安全算法包括的用户面机密性算法是空算法。若用户面完整性安全策略的取值是“not needed”或“preferred”,则安全算法包括的完整性安全算法是空算法。空算法的相关描述可以参考方法300中的S320a。Optionally, CU-CP sends a fictitious key and user plane security policy to CP-UP1, including: CU-CP sends a fictitious key, user plane security policy and security algorithm to CU-UP1, and the security algorithm is an empty algorithm, or Says security algorithm is empty. For example, if the value of the user plane confidentiality security policy is "not needed" or "preferred", the user plane confidentiality algorithm included in the security algorithm is an empty algorithm. If the value of the user plane integrity security policy is "not needed" or "preferred", the integrity security algorithm included in the security algorithm is an empty algorithm. For relevant description of the empty algorithm, please refer to S320a in method 300.
CU-CP向CU-UP1发送虚构密钥和用户面安全策略的更多描述,可以参考方法300中CU-CP向CU-UP1发送虚构密钥的描述。For more description of CU-CP sending the fictitious key and user plane security policy to CU-UP1, please refer to the description of CU-CP sending fictitious key to CU-UP1 in method 300.
可选的,方法400还包括:CU-CP向CU-UP1发送指示信息,指示信息用于指示用户面安全密钥为空。相应的,CU-UP1根据该指示信息确定接收到的用户面安全密钥是虚构值,或者确定未接收到用户面安全密钥。例如,若CU-CP通过承载上下文建立请求消息向CU-UP1发送虚构密钥,或者CU-CP向CU-UP1发送的承载上下文建立请求消息不包括密钥,则CU-UP1根据该指示信息,不解析承载上下文建立请求消息中用于携带用户面安全密钥的信元。Optionally, method 400 also includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty. Correspondingly, CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The information element used to carry the user plane security key in the bearer context establishment request message is not parsed.
可选的,CU-UP1接收到用户面安全策略之后,若用户面安全策略指示不需要开启用户面安全保护,则CU-UP1丢弃或不存储虚构密钥。Optionally, after CU-UP1 receives the user plane security policy, if the user plane security policy indicates that user plane security protection does not need to be enabled, CU-UP1 discards or does not store the fictitious key.
可选的,CU-UP1根据用户面安全策略,丢弃或不存储安全算法。Optionally, CU-UP1 discards or does not store the security algorithm according to the user plane security policy.
CU-CP向CU-UP1发送的虚构密钥和用户面安全策略可以携带在同一条消息中,也可以携带在不同的消息中,本申请实施例对此不做限定。The fictitious key and user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
可选的,若用户面安全策略指示优选开启用户面安全保护,则在S420a之后,方法400还包括S421a至S425a中的一个或多个步骤。 Optionally, if the user plane security policy indicates that user plane security protection is preferably enabled, after S420a, the method 400 further includes one or more steps from S421a to S425a.
S421a,CU-UP1向CU-CP发送安全结果。相应的,CU-CP接收来自CU-UP1的安全结果。S421a, CU-UP1 sends the security result to CU-CP. Correspondingly, CU-CP receives the security result from CU-UP1.
CU-UP1接收到来自CU-CP的用户面安全策略之后,根据用户面安全策略选择安全结果。若用户面安全策略指示优选开启用户面安全保护,则CU-UP1可以根据以下至少一项选择安全结果:CU-UP1的负载情况,或当前建立的承载对应的数据的安全要求。例如,若CU-UP1的负载较大,和/或,当前建立的承载对应的数据的安全要求低,则CU-UP1选择的安全结果的取值为“不执行”。若CU-UP1的负载较小,和/或,当前建立的承载对应的数据的安全要求高,则CU-UP1选择的安全结果的取值为“执行”。After receiving the user plane security policy from CU-CP, CU-UP1 selects a security result according to the user plane security policy. If the user plane security policy indicates that user plane security protection is preferably turned on, CU-UP1 can select a security result based on at least one of the following: the load condition of CU-UP1, or the security requirements of the currently established bearer corresponding data. For example, if the load of CU-UP1 is large and/or the security requirements of the data corresponding to the currently established bearer are low, the value of the security result selected by CU-UP1 is "not executed". If the load of CU-UP1 is small, and/or the security requirements of the data corresponding to the currently established bearer are high, the value of the security result selected by CU-UP1 is "execute".
CU-UP1向CU-CP发送的安全结果包括完整性安全结果和/或机密性安全结果。The security results sent by CU-UP1 to CU-CP include integrity security results and/or confidentiality security results.
S422a,CU-CP向CU-UP1发送承载上下文释放命令。S422a, CU-CP sends a bearer context release command to CU-UP1.
CU-CP接收到来自CU-UP1的安全结果之后,若安全结果的取值为“执行”,例如,完整性安全结果的取值为“执行”,和/或,机密性安全结果的取值为“执行”,则CU-CP向CU-UP1发送承载上下文释放命令(bearer context release command)。After CU-CP receives the security result from CU-UP1, if the value of the security result is "execute", for example, the value of the integrity security result is "execute", and/or the value of the confidentiality security result is "execute", then CU-CP sends a bearer context release command (bearer context release command) to CU-UP1.
可选的,CU-UP1接收到承载上下文释放命令之后,还可以向CU-CP发送承载上下文释放完成(bearer context release complete)。Optionally, after receiving the bearer context release command, CU-UP1 can also send bearer context release complete (bearer context release complete) to CU-CP.
可选的,若CU-CP连接多个CU-UP,则方法400还包括S423a。Optionally, if the CU-CP is connected to multiple CU-UPs, the method 400 also includes S423a.
S423a,CU-CP重选CU-UP。S423a, CU-CP reselects CU-UP.
一种可能的实现方式中,CU-CP仍然选择CU-UP1建立承载上下文,则方法400继续执行S424a。示例性的,若CU-UP1是可信CU-UP,则CU-CP仍然选择CU-UP1建立承载上下文。In a possible implementation, the CU-CP still selects CU-UP1 to establish the bearer context, and the method 400 continues to execute S424a. For example, if CU-UP1 is a trusted CU-UP, the CU-CP still selects CU-UP1 to establish the bearer context.
另一种可能的实现方式中,CU-CP从连接的多个CU-UP中选择CU-UP2建立承载上下文,则方法400继续执行S425a。示例性的,CU-CP从连接的多个CU-UP中选择可信的CU-UP2建立承载上下文。In another possible implementation, the CU-CP selects CU-UP2 from multiple connected CU-UPs to establish a bearer context, and the method 400 continues to execute S425a. For example, the CU-CP selects a trusted CU-UP2 from multiple connected CU-UPs to establish a bearer context.
可以理解,CU-CP不会选择CU-UP1和CU-UP2建立同一个承载上下文,因此方法400执行S424a和S425a中的一个步骤。It can be understood that CU-CP will not select CU-UP1 and CU-UP2 to establish the same bearer context, so method 400 performs one of steps S424a and S425a.
S424a,CU-CP向CU-UP1发送第一用户面安全密钥。相应的,CU-UP1接收来自CU-CP的第一用户面安全密钥。S424a: CU-CP sends the first user plane security key to CU-UP1. Correspondingly, CU-UP1 receives the first user plane security key from CU-CP.
第一用户面安全密钥的相关描述可以参考方法300中的S320a。For relevant description of the first user plane security key, please refer to S320a in method 300.
如上文所述,若CU-CP仍然选择CU-UP1建立承载上下文,则CU-CP向CU-UP1发送第一用户面安全密钥。或者,若CU-CP只连接了CU-UP1,则CU-CP向CU-UP1发送第一用户面安全密钥。As mentioned above, if the CU-CP still selects CU-UP1 to establish the bearer context, the CU-CP sends the first user plane security key to CU-UP1. Or, if the CU-CP is only connected to CU-UP1, the CU-CP sends the first user plane security key to CU-UP1.
示例性的,CU-CP可以根据接收的安全结果向CU-UP1发送第一用户面完整性密钥和/或第一用户面加密密钥。例如,若安全结果包括的完整性安全结果指示用户面完整性保护开启,则CU-CP向CU-UP1发送的第一用户面安全密钥包括CU-CP生成的第一用户面完整性密钥。若安全结果包括的机密性安全结果指示用户面机密性保护开启,则CU-CP向CU-UP1发送的第一用户面安全密钥包括CU-CP生成的第一用户面加密密钥。又例如,若安全结果包括的完整性安全结果指示用户面完整性保护不开启,则CU-CP不向CU-UP1发送第一用户面完整性密钥。若安全结果包括的机密性安全结果指示用户面机密性保护不开启,则CU-CP不向CU-UP1发送第一用户面加密密钥。 For example, the CU-CP may send the first user plane integrity key and/or the first user plane encryption key to the CU-UP1 according to the received security result. For example, if the integrity security result included in the security result indicates that user plane integrity protection is turned on, the first user plane security key sent by CU-CP to CU-UP1 includes the first user plane integrity key generated by CU-CP. . If the confidentiality security result included in the security result indicates that user plane confidentiality protection is turned on, the first user plane security key sent by CU-CP to CU-UP1 includes the first user plane encryption key generated by CU-CP. For another example, if the integrity security result included in the security result indicates that user plane integrity protection is not enabled, then CU-CP does not send the first user plane integrity key to CU-UP1. If the confidentiality security result included in the security result indicates that the user plane confidentiality protection is not turned on, the CU-CP does not send the first user plane encryption key to CU-UP1.
示例性的,CU-CP通过承载上下文建立请求消息向CU-UP1发送第一用户面安全密钥。Exemplarily, CU-CP sends the first user plane security key to CU-UP1 through a bearer context establishment request message.
可选的,方法400可以不执行S421a至S423a,即CU-CP不指示CU-UP1释放承载上下文,也不会重选CU-UP,则在S424a中,CU-CP可以通过承载上下文修改请求消息向CU-UP1发送第一用户面安全密钥。Optionally, method 400 may not perform S421a to S423a, that is, CU-CP does not instruct CU-UP1 to release the bearer context, nor will it reselect CU-UP. Then in S424a, CU-CP may pass the bearer context modification request message. Send the first user plane security key to CU-UP1.
可选的,若在S420a中,CU-CP向CU-UP1发送的安全算法是空算法,则在S424a中,若CU-CP接收的安全结果指示用户面安全保护开启,则CU-CP还向CU-UP1发送用于用户面安全保护的安全算法。例如,若安全结果包括的完整性安全结果指示用户面完整性保护开启,则CU-CP向CU-UP1发送用户面完整性保护算法。若安全结果包括的机密性安全结果指示用户面机密性保护开启,则CU-CP向CU-UP1发送用户面机密性保护算法。Optionally, if in S420a, the security algorithm sent by CU-CP to CU-UP1 is an empty algorithm, then in S424a, if the security result received by CU-CP indicates that user plane security protection is turned on, then CU-CP also sends a message to CU-UP1. CU-UP1 sends the security algorithm used for user plane security protection. For example, if the integrity security result included in the security result indicates that user plane integrity protection is turned on, then CU-CP sends the user plane integrity protection algorithm to CU-UP1. If the confidentiality security result included in the security result indicates that user plane confidentiality protection is turned on, then CU-CP sends the user plane confidentiality protection algorithm to CU-UP1.
S425a,CU-CP向CU-UP2发送第一用户面安全密钥。相应的,CU-UP2接收来自CU-CP的第一用户面安全密钥。S425a: CU-CP sends the first user plane security key to CU-UP2. Correspondingly, CU-UP2 receives the first user plane security key from CU-CP.
第一用户面安全密钥的相关描述可以参考方法300中的S320a。For relevant description of the first user plane security key, please refer to S320a in method 300.
如上文所述,若CU-CP选择CU-UP2建立承载上下文,则CU-CP向CU-UP2发送第一用户面安全密钥。As mentioned above, if the CU-CP selects CU-UP2 to establish the bearer context, the CU-CP sends the first user plane security key to CU-UP2.
示例性的,CU-CP可以根据用户面安全策略向CU-UP2发送第一用户面完整性密钥和/或第一用户面加密密钥。例如,若用户面安全策略中的用户面完整性安全策略的取值为“required”或“preferred”,则CU-CP向CU-UP2发送的第一用户面安全密钥包括CU-CP生成的第一用户面完整性密钥。若用户面安全策略中的用户面机密性安全策略的取值为“required”或“preferred”,则CU-CP向CU-UP2发送的第一用户面安全密钥包括CU-CP生成的第一用户面加密密钥。For example, CU-CP may send the first user plane integrity key and/or the first user plane encryption key to CU-UP2 according to the user plane security policy. For example, if the value of the user plane integrity security policy in the user plane security policy is "required" or "preferred", then the first user plane security key sent by CU-CP to CU-UP2 includes the First user plane integrity key. If the value of the user plane confidentiality security policy in the user plane security policy is "required" or "preferred", then the first user plane security key sent by CU-CP to CU-UP2 includes the first user plane security key generated by CU-CP. User plane encryption key.
示例性的,CU-CP通过承载上下文建立请求消息向CU-UP2发送第一用户面安全密钥。Exemplarily, CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message.
可选的,CU-CP向CU-UP2发送第一用户面安全密钥,包括:CU-CP向CU-UP2发送第一用户面安全密钥和用户面安全策略,用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护。例如,用户面安全策略中的用户面完整性安全策略的取值为“required”或“preferred”,和/或,用户面安全策略中的用户面机密性安全策略的取值为“required”或“preferred”。Optionally, CU-CP sends the first user plane security key to CU-UP2, including: CU-CP sends the first user plane security key and user plane security policy to CU-UP2. The user plane security policy indication must be turned on. User plane security protection or preferably enable user plane security protection. For example, the value of the user plane integrity security policy in the user plane security policy is "required" or "preferred", and/or the value of the user plane confidentiality security policy in the user plane security policy is "required" or "required" or "preferred". "preferred".
S420b,CU-CP向CU-UP2发送第一用户面安全密钥。相应的,CU-UP2接收来自CU-CP的第一用户面安全密钥。S420b: CU-CP sends the first user plane security key to CU-UP2. Correspondingly, CU-UP2 receives the first user plane security key from CU-CP.
第一用户面安全密钥的相关描述可以参考方法300中的S320a。For relevant description of the first user plane security key, please refer to S320a in method 300.
CU-CP接收到用户面安全策略之后,若用户面安全策略指示必须开启用户面安全保护,则CU-CP向CU-UP2发送CU-CP生成的第一用户面安全密钥。例如,若用户面安全策略中的用户面机密性安全策略的取值是“required”,则CU-CP向CU-UP2发送CU-CP生成的第一用户面加密密钥。又例如,若用户面安全策略中的用户面完整性安全策略的取值是“required”,则CU-CP生成向CU-UP2发送CU-CP生成的第一用户面完整性密钥。After the CU-CP receives the user plane security policy, if the user plane security policy indicates that user plane security protection must be enabled, the CU-CP sends the first user plane security key generated by the CU-CP to CU-UP2. For example, if the value of the user plane confidentiality security policy in the user plane security policy is "required", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2. For another example, if the value of the user plane integrity security policy in the user plane security policy is "required", then CU-CP generates and sends the first user plane integrity key generated by CU-CP to CU-UP2.
示例性的,CU-CP通过承载上下文建立请求消息或承载上下文修改请求消息向CU-UP2发送第一用户面安全密钥。Exemplarily, CU-CP sends the first user plane security key to CU-UP2 through a bearer context establishment request message or a bearer context modification request message.
可以理解,在S420b中,CU-CP也可以向CU-UP2发送用户面安全策略。相应的, CU-UP2可以根据用户面安全策略选择安全结果,并向CU-CP发送安全结果。It can be understood that in S420b, CU-CP can also send the user plane security policy to CU-UP2. corresponding, CU-UP2 can select the security result according to the user plane security policy and send the security result to CU-CP.
可选的,若CU-CP与多个CU-UP连接,则在S420a或S420b之前,方法400还包括S430。Optionally, if the CU-CP is connected to multiple CU-UPs, before S420a or S420b, the method 400 also includes S430.
S430,CU-CP选择CU-UP。S430, CU-CP selects CU-UP.
S430与方法300中的S330相同,为了简洁,本申请实施例不再详述。S430 is the same as S330 in method 300, and will not be described in detail in this embodiment for the sake of simplicity.
CU-CP从连接的多个CU-UP中选择CU-UP1或CU-UP2之后,向选择的CU-UP1发送虚构密钥,或者,向选择的CU-UP2发送第一用户面安全密钥。After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
在本申请实施例中,在用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护的情况下,CU-CP向CU-UP发送不同于用户面安全密钥的虚构密钥,从而即使在该CU-UP被攻击者攻破的情况下,攻击者只能从CU-UP获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。可以理解,在用户面安全策略指示不需要开启用户面安全保护的情况下,CU-UP与UE之间的用户面安全保护也不会开启,因此,即使CU-CP向CU-UP发送了虚构密钥,CU-UP也不会使用该虚构密钥加密数据,从而也不会影响CU-UP与UE之间的用户面数据传输过程。In this embodiment of the present application, when the user plane security policy indicates that user plane security protection does not need to be turned on or that user plane security protection is preferably turned on, CU-CP sends a fictitious key that is different from the user plane security key to CU-UP. , so that even if the CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from the CU-UP, but cannot obtain the user plane security key, thus reducing the leakage of the user plane security key. risks of. It can be understood that when the user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between CU-UP and UE will not be turned on. Therefore, even if CU-CP sends a fictitious message to CU-UP Key, CU-UP will not use this fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
进一步地,在用户面安全策略指示优选开启用户面安全保护的情况下,若CU-UP选择的安全结果指示用户面安全保护开启,则CU-CP向CU-UP发送用户面安全密钥,从而保证CU-UP与UE之间的用户面数据的正常传输。Further, when the user plane security policy indicates that user plane security protection is preferably turned on, if the security result selected by CU-UP indicates that user plane security protection is turned on, CU-CP sends the user plane security key to CU-UP, so that Ensure normal transmission of user plane data between CU-UP and UE.
此外,若CU-CP向CU-UP发送虚构密钥,则CU-CP向CU-UP发送的安全算法是空算法,从而即使在该CU-UP被攻击者攻破的情况下,攻击者也不能从CU-UP获取到正确的安全算法,从而可以减小攻击者从CU-UP获取的信息量。In addition, if CU-CP sends a fictitious key to CU-UP, the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
此外,在用户面安全策略指示不需要开启用户面安全的情况下,若CU-CP连接了多个CU-UP,则CU-CP从该多个CU-UP中选择非可信CU-UP,并且向选择的CU-UP发送虚构密钥,从而可以避免非可信CU-UP获取到用户面安全密钥,进一步减小用户面安全密钥泄漏的风险。In addition, when the user plane security policy indicates that user plane security does not need to be turned on, if the CU-CP is connected to multiple CU-UPs, the CU-CP selects an untrusted CU-UP from the multiple CU-UPs. And the fictitious key is sent to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
图5示出了本申请实施例提供的安全保护方法的示意性流程图。如图5所示,方法500可以包括以下步骤:Figure 5 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 5, method 500 may include the following steps:
S510,CU-CP接收来自SMF的第一用户面安全策略。相应的,SMF向CU-CP发送第一用户面安全策略。S510: CU-CP receives the first user plane security policy from SMF. Correspondingly, the SMF sends the first user plane security policy to the CU-CP.
第一用户面安全策略的描述可以参考图2中的S220。The description of the first user plane security policy may refer to S220 in Figure 2.
CU-CP接收到第一用户面安全策略之后,根据第一用户面安全策略执行S520a和/或S520b。例如,若第一用户面安全策略指示不需要开启用户面安全保护,则CU-CP执行S520a,若第一用户面安全策略指示必须开启用户面安全保护,则CU-CP执行S520b。又例如,若用户面安全策略中的用户面完整性安全策略指示不需要开启用户面完整性保护,用户面安全策略中的用户面机密性安全策略指示必须开启用户面机密性保护,则CU-CP执行S520a和S520b。After receiving the first user plane security policy, the CU-CP executes S520a and/or S520b according to the first user plane security policy. For example, if the first user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP executes S520a; if the first user plane security policy indicates that user plane security protection must be enabled, the CU-CP executes S520b. For another example, if the user plane integrity security policy in the user plane security policy indicates that user plane integrity protection does not need to be turned on, and the user plane confidentiality security policy in the user plane security policy indicates that user plane confidentiality protection must be turned on, then CU- The CP executes S520a and S520b.
若第一用户面安全策略指示优选开启用户面安全保护,则在S520a或S520b之前,方法500还包括S540。If the first user plane security policy indicates that user plane security protection is preferably enabled, before S520a or S520b, the method 500 further includes S540.
S540,CU-CP确定第二用户面安全策略。S540, CU-CP determines the second user plane security policy.
在第一用户面安全策略指示优选开启用户面安全保护的情况下,CU-CP确定是否需要 开启用户面安全保护。若CU-CP确定不需要开启用户面安全保护,则CU-CP确定第二用户面安全策略指示不需要开启用户面安全保护。若CU-CP确定需要开启用户面安全保护,则CU-CP确定第二用户面安全策略指示必须开启用户面安全保护。When the first user plane security policy indicates that user plane security protection is preferably turned on, the CU-CP determines whether it is necessary Enable user plane security protection. If the CU-CP determines that user plane security protection does not need to be enabled, the CU-CP determines that the second user plane security policy indicates that user plane security protection does not need to be enabled. If the CU-CP determines that user plane security protection needs to be enabled, the CU-CP determines that the second user plane security policy indicates that user plane security protection must be enabled.
示例性的,CU-CP根据以下一项或多项确定是否需要开启用户面安全保护:CU-CP的负载情况,或CU-CP对UE与CU-UP之间传输的数据的安全要求。例如,若CU-CP的负载较大,和/或,CU-CP对UE与CU-UP之间传输的数据的安全要求低,则CU-CP确定不需要开启用户面安全保护。又例如,若CU-CP的负载较小,和/或,CU-CP对UE与CU-UP之间传输的数据的安全要求高,则CU-CP确定需要开启用户面安全保护。For example, the CU-CP determines whether user plane security protection needs to be enabled based on one or more of the following: the load condition of the CU-CP, or the security requirements of the CU-CP for data transmitted between the UE and the CU-UP. For example, if the load of the CU-CP is large and/or the CU-CP has low security requirements for data transmitted between the UE and the CU-UP, the CU-CP determines that it is not necessary to enable user plane security protection. For another example, if the load of the CU-CP is small and/or the CU-CP has high security requirements for data transmitted between the UE and the CU-UP, the CU-CP determines that user plane security protection needs to be enabled.
进而,若CU-CP确定的第二用户面安全策略指示不需要开启用户面安全保护,则CU-CP执行S520a,若CU-CP确定的第二用户面安全策略指示必须开启用户面安全保护,则CU-CP执行S520b。Furthermore, if the second user plane security policy determined by the CU-CP indicates that user plane security protection does not need to be turned on, then the CU-CP executes S520a. If the second user plane security policy determined by the CU-CP indicates that the user plane security protection must be turned on, Then the CU-CP executes S520b.
S520a,CU-CP向CU-UP1发送虚构密钥和第二用户面安全策略。相应的,CU-UP1接收来自CU-CP的虚构密钥和第二用户面安全策略。S520a, CU-CP sends the fictitious key and the second user plane security policy to CU-UP1. Correspondingly, CU-UP1 receives the fictitious key and the second user plane security policy from CU-CP.
虚构密钥的相关描述可以参考方法300中的S320a。CU-CP向CU-UP1发送的第二用户面安全策略指示不需要开启用户面安全保护。例如,第二用户面安全策略中的第二用户面机密性安全策略的取值是“not needed”,和/或,第二用户面安全策略中的第二用户面完整性安全策略取值是“not needed”。For relevant description of the fictitious key, please refer to S320a in method 300. The second user plane security policy indication sent by CU-CP to CU-UP1 does not require enabling user plane security protection. For example, the value of the second user plane confidentiality security policy in the second user plane security policy is "not needed", and/or the value of the second user plane integrity security policy in the second user plane security policy is "not needed".
CU-CP接收到第一用户面安全策略之后,若第一用户面安全策略指示不需要开启用户面安全保护,则CU-CP生成虚构密钥,并将虚构密钥发送至CU-UP1,以及将第一用户面安全策略作为第二用户面安全策略发送至CU-UP1。例如,若第一用户面安全策略中的第一用户面机密性安全策略的取值是“not needed”,则CU-CP生成虚构加密密钥,并将虚构加密密钥发送至CU-UP1,以及将第一用户面机密性安全策略作为第二用户面机密性安全策略发送至CU-UP1。又例如,若第一用户面安全策略中的第一用户面完整性安全策略的取值是“not needed”,则CU-CP生成虚构完整性密钥,并将虚构完整性密钥发送至CU-UP1,以及将第一用户面完整性安全策略作为第二用户面完整性安全策略发送至CU-UP1。After the CU-CP receives the first user plane security policy, if the first user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1, and Send the first user plane security policy to CU-UP1 as the second user plane security policy. For example, if the value of the first user plane confidentiality security policy in the first user plane security policy is "not needed", then CU-CP generates a fictitious encryption key and sends the fictitious encryption key to CU-UP1, and sending the first user plane confidentiality security policy to CU-UP1 as the second user plane confidentiality security policy. For another example, if the value of the first user plane integrity security policy in the first user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and sends the fictitious integrity key to the CU. -UP1, and sends the first user plane integrity security policy as the second user plane integrity security policy to CU-UP1.
或者,CU-CP确定第二用户面安全策略之后,若第二用户面安全策略指示不需要开启用户面安全保护,则CU-CP生成虚构密钥,并将虚构密钥发送至CU-UP1,以及将第二用户面安全策略发送至CU-UP1。例如,若第二用户面安全策略中的第二用户面机密性安全策略的取值是“not needed”,则CU-CP生成虚构加密密钥,并将虚构加密密钥和第二用户面机密性安全侧发送至CU-UP1。又例如,若第二用户面安全策略中的第二用户面完整性安全策略的取值是“not needed”,则CU-CP生成虚构完整性密钥,并将虚构完整性密钥和第二用户面完整性安全策略发送至CU-UP1。Alternatively, after the CU-CP determines the second user plane security policy, if the second user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP generates a fictitious key and sends the fictitious key to CU-UP1. and sending the second user plane security policy to CU-UP1. For example, if the value of the second user plane confidentiality security policy in the second user plane security policy is "not needed", the CU-CP generates a fictitious encryption key and combines the fictitious encryption key and the second user plane secret The safe side is sent to CU-UP1. For another example, if the value of the second user plane integrity security policy in the second user plane security policy is "not needed", the CU-CP generates a fictitious integrity key and combines the fictitious integrity key with the second The user plane integrity security policy is sent to CU-UP1.
可选的,CU-CP向CP-UP1发送虚构密钥和第二用户面安全策略,包括:CU-CP向CU-UP1发送虚构密钥、第二用户面安全策略和安全算法,安全算法是空算法。例如,若第二用户面机密性安全策略的取值是“not needed”,则安全算法包括的用户面机密性算法是空算法。若第二用户面完整性安全策略的取值是“not needed”,则安全算法包括的完整性安全算法是空算法。空算法的相关描述可以参考方法300中的S320a。Optionally, CU-CP sends the fictitious key and the second user plane security policy to CP-UP1, including: CU-CP sends the fictitious key, the second user plane security policy and the security algorithm to CU-UP1. The security algorithm is Empty algorithm. For example, if the value of the second user plane confidentiality security policy is "not needed", the user plane confidentiality algorithm included in the security algorithm is an empty algorithm. If the value of the second user plane integrity security policy is "not needed", the integrity security algorithm included in the security algorithm is an empty algorithm. For relevant description of the empty algorithm, please refer to S320a in method 300.
CU-CP向CU-UP1发送虚构密钥和第二用户面安全策略的更多描述可以参考方法300中,CU-CP向CU-UP1发送虚构密钥的描述。 For more description of CU-CP sending the fictitious key and the second user plane security policy to CU-UP1, please refer to the description of CU-CP sending the fictitious key to CU-UP1 in method 300.
可选的,方法500还包括:CU-CP向CU-UP1发送指示信息,指示信息用于指示用户面安全密钥为空。相应的,CU-UP1根据该指示信息确定接收到的用户面安全密钥是虚构值,或者确定未接收到用户面安全密钥。例如,若CU-CP通过承载上下文建立请求消息向CU-UP1发送虚构密钥,或者CU-CP向CU-UP1发送的承载上下文建立请求消息不包括密钥,则CU-UP1根据该指示信息,不解析承载上下文建立请求消息中用于携带用户面安全密钥的信元。Optionally, method 500 also includes: CU-CP sending indication information to CU-UP1, where the indication information is used to indicate that the user plane security key is empty. Correspondingly, CU-UP1 determines that the received user plane security key is a fictitious value according to the indication information, or determines that the user plane security key has not been received. For example, if CU-CP sends a fictitious key to CU-UP1 through the bearer context establishment request message, or the bearer context establishment request message sent by CU-CP to CU-UP1 does not include the key, then CU-UP1 will, based on the indication information, The information element used to carry the user plane security key in the bearer context establishment request message is not parsed.
CU-CP向CU-UP1发送的虚构密钥和第二用户面安全策略可以携带在同一条消息中,也可以携带在不同的消息中,本申请实施例对此不做限定。The fictitious key and the second user plane security policy sent by CU-CP to CU-UP1 may be carried in the same message or in different messages. This is not limited in the embodiment of the present application.
可选的,CU-UP1接收到第二用户面安全策略之后,根据第二用户面安全策略丢弃或不存储虚构密钥。Optionally, after receiving the second user plane security policy, CU-UP1 discards or does not store the fictitious key according to the second user plane security policy.
可选的,CU-UP1根据第二用户面安全策略,丢弃或不存储安全算法。Optionally, CU-UP1 discards or does not store the security algorithm according to the second user plane security policy.
S520b,CU-CP向CU-UP2发送第一用户面安全密钥和第二用户面安全策略。相应的,CU-UP2接收来自CU-CP的第一用户面安全密钥和第二用户面安全策略。S520b: CU-CP sends the first user plane security key and the second user plane security policy to CU-UP2. Correspondingly, CU-UP2 receives the first user plane security key and the second user plane security policy from CU-CP.
第一用户面安全密钥的相关描述可以参考方法300中的S320a。For relevant description of the first user plane security key, please refer to S320a in method 300.
CU-CP向CU-UP2发送的第二用户面安全策略指示必须开启用户面安全保护。例如,第二用户面安全策略中的第二用户面机密性安全策略的取值是“required”,和/或,第二用户面安全策略中的第二用户面完整性安全策略取值是“required”。The second user plane security policy sent by CU-CP to CU-UP2 indicates that user plane security protection must be enabled. For example, the value of the second user plane confidentiality security policy in the second user plane security policy is "required", and/or the value of the second user plane integrity security policy in the second user plane security policy is " required".
CU-CP接收到第一用户面安全策略之后,若第一用户面安全策略指示必须开启用户面安全保护,则CU-CP向CU-UP2发送CU-CP生成的第一用户面安全密钥,以及将第一用户面安全策略作为第二用户面安全策略发送至CU-UP2。例如,若第一用户面安全策略中的第一用户面机密性安全策略的取值是“required”,则CU-CP向CU-UP2发送CU-CP生成的第一用户面加密密钥,以及将第一用户面机密性安全策略作为第二用户面机密性安全策略发送至CU-UP2。又例如,若第一用户面安全策略中的第一用户面完整性安全策略的取值是“required”,则CU-CP向CU-UP2发送CU-CP生成的第一用户面完整性密钥,以及将第一用户面完整性安全策略作为第二用户面完整性安全策略发送至CU-UP2。After CU-CP receives the first user plane security policy, if the first user plane security policy indicates that user plane security protection must be enabled, CU-CP sends the first user plane security key generated by CU-CP to CU-UP2, and sending the first user plane security policy to CU-UP2 as the second user plane security policy. For example, if the value of the first user plane confidentiality security policy in the first user plane security policy is "required", then CU-CP sends the first user plane encryption key generated by CU-CP to CU-UP2, and The first user plane confidentiality security policy is sent to CU-UP2 as the second user plane confidentiality security policy. For another example, if the value of the first user plane integrity security policy in the first user plane security policy is "required", then CU-CP sends the first user plane integrity key generated by CU-CP to CU-UP2. , and send the first user plane integrity security policy to CU-UP2 as the second user plane integrity security policy.
或者,CU-CP确定第二用户面安全策略之后,若第二用户面安全策略指示必须开启用户面安全保护,则CU-CP向CU-UP2发送第二用户面安全策略和CU-CP生成的第一用户面安全密钥。例如,若第二用户面安全策略中的第二用户面机密性安全策略的取值是“required”,则CU-CP向CU-UP2发送第一用户面加密密钥和第二用户面机密性安全策略。又例如,若第二用户面安全策略中的第二用户面完整性安全策略的取值是“required”,则CU-CP向CU-UP2发送第二用户面完整性安全策略和CU-CP生成的第一用户面完整性密钥。Alternatively, after CU-CP determines the second user plane security policy, if the second user plane security policy indicates that user plane security protection must be enabled, CU-CP sends the second user plane security policy and the CU-CP-generated security policy to CU-UP2. First user plane security key. For example, if the value of the second user plane confidentiality security policy in the second user plane security policy is "required", then CU-CP sends the first user plane encryption key and the second user plane confidentiality to CU-UP2. security strategy. For another example, if the value of the second user plane integrity security policy in the second user plane security policy is "required", then CU-CP sends the second user plane integrity security policy and the CU-CP generated message to CU-UP2. The first user plane integrity key.
可选的,若CU-CP与多个CU-UP连接,则在S520a或S520b之前,方法500还包括S530。Optionally, if the CU-CP is connected to multiple CU-UPs, before S520a or S520b, the method 500 also includes S530.
S530,CU-CP选择CU-UP。S530, CU-CP selects CU-UP.
S530与方法300中的S330相同,为了简洁,本申请实施例不再详述。S530 is the same as S330 in method 300, and will not be described in detail in this embodiment for the sake of simplicity.
CU-CP从连接的多个CU-UP中选择CU-UP1或CU-UP2之后,向选择的CU-UP1发送虚构密钥,或者,向选择的CU-UP2发送第一用户面安全密钥。After the CU-CP selects CU-UP1 or CU-UP2 from multiple connected CU-UPs, it sends the fictitious key to the selected CU-UP1, or sends the first user plane security key to the selected CU-UP2.
在本申请实施例中,在第一用户面安全策略指示不需要开启用户面安全,或者CU-CP 根据第一用户面安全策略确定的第二用户面安全策略指示不需要开启用户面安全的情况下,CU-CP向CU-UP发送不同于用户面安全密钥的虚构密钥,从而即使在该CU-UP被攻击者攻破的情况下,攻击者只能从CU-UP获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。可以理解,在第一用户面安全策略或第二用户面安全策略指示不需要开启用户面安全保护的情况下,CU-UP与UE之间的用户面安全保护也不会开启,因此,即使CU-CP向CU-UP发送了虚构密钥,CU-UP也不会使用该虚构密钥加密数据,从而也不会影响CU-UP与UE之间的用户面数据传输过程。In this embodiment of the present application, the first user plane security policy indicates that user plane security does not need to be turned on, or the CU-CP When the second user plane security policy determined based on the first user plane security policy indicates that user plane security does not need to be turned on, the CU-CP sends a fictitious key that is different from the user plane security key to the CU-UP, so that even if the When CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from CU-UP, but not the user plane security key, thus reducing the risk of user plane security key leakage. It can be understood that when the first user plane security policy or the second user plane security policy indicates that user plane security protection does not need to be turned on, the user plane security protection between the CU-UP and the UE will not be turned on. Therefore, even if the CU -CP sends a fictitious key to CU-UP, and CU-UP will not use the fictitious key to encrypt data, thus it will not affect the user plane data transmission process between CU-UP and UE.
此外,若CU-CP向CU-UP发送虚构密钥,则CU-CP向CU-UP发送的安全算法是空算法,从而即使在该CU-UP被攻击者攻破的情况下,攻击者也不能从CU-UP获取到正确的安全算法,从而可以减小攻击者从CU-UP获取的信息量。In addition, if CU-CP sends a fictitious key to CU-UP, the security algorithm sent by CU-CP to CU-UP is an empty algorithm. Therefore, even if the CU-UP is compromised by an attacker, the attacker cannot The correct security algorithm is obtained from CU-UP, which can reduce the amount of information obtained by the attacker from CU-UP.
此外,在第一用户面安全策略指示不需要开启用户面安全的情况下,若CU-CP连接了多个CU-UP,则CU-CP从该多个CU-UP中选择非可信CU-UP,并且向选择的CU-UP发送虚构密钥,从而可以避免非可信CU-UP获取到用户面安全密钥,进一步减小用户面安全密钥泄漏的风险。In addition, when the first user plane security policy indicates that user plane security does not need to be turned on, if the CU-CP is connected to multiple CU-UPs, the CU-CP selects an untrusted CU-CP from the multiple CU-UPs. UP, and sends the fictitious key to the selected CU-UP, thereby preventing the untrusted CU-UP from obtaining the user plane security key and further reducing the risk of user plane security key leakage.
图6示出了本申请实施例提供的安全保护方法的示意性流程图。如图6所示,方法600包括以下步骤:Figure 6 shows a schematic flow chart of the security protection method provided by the embodiment of the present application. As shown in Figure 6, method 600 includes the following steps:
方法600执行S610a或S610b。Method 600 executes S610a or S610b.
S610a,UE向CU-CP发送安全能力信息。相应的,CU-CP接收来自UE的安全能力信息。S610a: The UE sends security capability information to the CU-CP. Correspondingly, the CU-CP receives the security capability information from the UE.
安全能力信息用于指示UE是否支持通过与CU-UP对应的特定密钥生成参数推演用户面安全密钥的能力,与CU-UP对应的特定密钥生成参数是与算法标识和算法类型鉴别器无关的密钥生成参数,例如,与CU-UP对应的特定密钥生成参数包括CU-UP标识(identifier,ID)和/或承载标识(bearer ID)。CU-UP ID用于标识CU-UP,不同CU-UP的ID不同。承载是CU-UP与UE之间的承载,不同承载的ID不同。例如,CU-UP与不同UE之间的承载的ID不同,CU-UP与同一个UE之间的不同承载的ID不同,不同CU-UP与不同UE之间的承载的ID不同。The security capability information is used to indicate whether the UE supports the ability to deduce the user plane security key through the specific key generation parameters corresponding to CU-UP. The specific key generation parameters corresponding to CU-UP are the algorithm identifier and algorithm type discriminator. Irrelevant key generation parameters, for example, specific key generation parameters corresponding to CU-UP include CU-UP identifier (ID) and/or bearer ID. CU-UP ID is used to identify CU-UP, and different CU-UPs have different IDs. The bearer is the bearer between CU-UP and UE, and different bearers have different IDs. For example, bearers between CU-UP and different UEs have different IDs, bearers between CU-UP and the same UE have different IDs, and bearers between different CU-UPs and different UEs have different IDs.
例如,安全能力信息是1比特的信息,当安全能力信息的取值为“1”时,安全能力信息用于指示UE支持通过与CU-UP对应的特定密钥生成参数推演用户面安全密钥的能力;当安全能力信息的取值为“0”时,安全能力信息用于指示UE不支持通过与CU-UP对应的特定密钥生成参数推演用户面安全密钥的能力。或者,当安全能力信息的取值为“0”时,安全能力信息用于指示UE支持通过与CU-UP对应的特定密钥生成参数推演用户面安全密钥的能力,当安全能力信息的取值为“1”时,安全能力信息用于指示UE不支持通过与CU-UP对应的特定密钥生成参数推演用户面安全密钥的能力。For example, the security capability information is 1-bit information. When the value of the security capability information is "1", the security capability information is used to indicate that the UE supports deriving user plane security keys through specific key generation parameters corresponding to CU-UP. capability; when the value of the security capability information is "0", the security capability information is used to indicate that the UE does not support the ability to derive user plane security keys through specific key generation parameters corresponding to CU-UP. Alternatively, when the value of the security capability information is "0", the security capability information is used to indicate that the UE supports the ability to deduce the user plane security key through the specific key generation parameters corresponding to CU-UP. When the value is "1", the security capability information is used to indicate that the UE does not support the ability to derive user plane security keys through specific key generation parameters corresponding to CU-UP.
示例性的,UE通过上行RRC消息向CU-CP发送安全能力信息。例如,安全能力信息承载于RRC消息中的UE能力信息(UECapabilityInformation)中。Exemplarily, the UE sends security capability information to the CU-CP through an uplink RRC message. For example, the security capability information is carried in the UE capability information (UECapabilityInformation) in the RRC message.
可选的,在S610a之前,方法600还包括:CU-CP向UE发送请求消息#1,请求消息#1用于请求UE的安全能力信息。相应的,UE根据请求消息#1向AMF发送UE的安全能力信息。Optionally, before S610a, the method 600 also includes: the CU-CP sends a request message #1 to the UE, where the request message #1 is used to request the security capability information of the UE. Correspondingly, the UE sends the security capability information of the UE to the AMF according to the request message #1.
可选的,CU-CP接收到来自UE的安全能力信息之后,还可以将UE的安全能力信息 发送至AMF。相应的,AMF接收到UE的安全能力信息之后,可以存储UE的安全能力信息。可选的,若CU-CP接收的来自AMF的下行下一代应用协议(next generation application protocol,NGAP)消息包括指示信息,或者不包括UE的安全能力信息,则CU-CP从UE获取到UE的安全能力信息之后,向AMF发送UE的安全能力信息。指示信息用于指示获取UE的安全能力信息。Optionally, after receiving the security capability information from the UE, the CU-CP can also transfer the security capability information of the UE to Send to AMF. Correspondingly, after receiving the security capability information of the UE, the AMF can store the security capability information of the UE. Optionally, if the downlink next generation application protocol (NGAP) message received by the CU-CP from the AMF includes indication information or does not include the UE's security capability information, the CU-CP obtains the UE's security capability information from the UE. After receiving the security capability information, the UE's security capability information is sent to the AMF. The indication information is used to instruct to obtain the security capability information of the UE.
S610b,AMF向CU-CP发送安全能力信息。相应的,CU-CP接收来自AMF的安全能力信息。S610b: AMF sends security capability information to CU-CP. Correspondingly, the CU-CP receives the security capability information from the AMF.
示例性的,AMF通过下行下一代应用协议(next generation application protocol,NGAP)消息向CU-CP发送安全能力信息。例如,AMF向CU-CP发送初始上下文建立请求(initial context setup request)消息,初始上下文建立请求消息包括安全能力信息。Illustratively, the AMF sends security capability information to the CU-CP through a downlink next generation application protocol (NGAP) message. For example, the AMF sends an initial context setup request message to the CU-CP, and the initial context setup request message includes security capability information.
AMF存储的安全能力信息是从UE或基站获取的。例如,UE向AMF发送的初始非接入层(non access stratum,NSA)消息中包括安全能力信息,相应的,AMF可以从初始NAS消息中获取UE的安全能力信息,并存储UE的安全能力信息。又例如,AMF可以向基站发送请求消息#2,请求消息#2用于请求UE的安全能力信息。基站接收到请求消息#2之后,则向AMF发送UE的安全能力信息。The security capability information stored in the AMF is obtained from the UE or base station. For example, the initial non-access stratum (NSA) message sent by the UE to the AMF includes security capability information. Correspondingly, the AMF can obtain the UE's security capability information from the initial NAS message and store the UE's security capability information. . For another example, the AMF may send request message #2 to the base station. The request message #2 is used to request the security capability information of the UE. After receiving the request message #2, the base station sends the UE's security capability information to the AMF.
S620,CU-CP接收来自SMF的用户面安全策略。相应的,SMF向CU-CP发送用户面安全策略。S620: CU-CP receives the user plane security policy from SMF. Correspondingly, SMF sends the user plane security policy to CU-CP.
用户面安全策略的描述可以参考图2中的S220。The description of the user plane security policy may refer to S220 in Figure 2.
示例性的,SMF通过PDU会话请求消息向CU-CP发送用户面安全策略,即,SMF向CU-CP发送PDU会话请求消息,PDU会话请求消息包括用户面安全策略。Exemplarily, the SMF sends the user plane security policy to the CU-CP through the PDU session request message, that is, the SMF sends the PDU session request message to the CU-CP, and the PDU session request message includes the user plane security policy.
若CU-CP接收到的安全能力信息指示UE支持通过与CU-UP对应的特定密钥生成参数推演用户面密钥的能力,则CU-CP接收到用户面安全策略之后,采用方式1与CU-UP建立承载上下文。若CU-CP接收到的安全能力信息指示UE不支持通过与CU-UP对应的特定密钥生成参数推演用户面密钥的能力,则CU-CP接收到用户面安全策略之后,采用方式2与CU-UP建立承载上下文。If the security capability information received by the CU-CP indicates that the UE supports the ability to deduce the user plane key through the specific key generation parameters corresponding to the CU-UP, then after receiving the user plane security policy, the CU-CP uses method 1 to communicate with the CU. -UP establishes bearer context. If the security capability information received by the CU-CP indicates that the UE does not support the ability to deduce the user plane key through the specific key generation parameters corresponding to the CU-UP, then after receiving the user plane security policy, the CU-CP uses method 2 and CU-UP establishes the bearer context.
方式1:Way 1:
当CU-CP采用方式1与CU-UP建立承载上下文时,具体可以有两种方式:方式1.1和方式1.2。若CU-CP采用方式1.1与CU-UP建立承载上下文,则方法600执行S630a。若CU-UP采用方式1.2与CU-UP建立承载上下文,则方法600包括S630b和S631b。When CU-CP uses method 1 to establish a bearer context with CU-UP, there are two methods: method 1.1 and method 1.2. If the CU-CP uses method 1.1 to establish a bearer context with the CU-UP, the method 600 executes S630a. If the CU-UP uses method 1.2 to establish a bearer context with the CU-UP, the method 600 includes S630b and S631b.
S630a,CU-CP向CU-UP发送第二用户面安全密钥。相应的,CU-UP接收来自CU-CP的第二用户面安全密钥。S630a: CU-CP sends the second user plane security key to CU-UP. Correspondingly, CU-UP receives the second user plane security key from CU-CP.
第二用户面安全密钥用于CU-UP与UE之间开启用户面安全。例如,第二用户面安全密钥是CU-CP以根密钥为输入密钥,以第二密钥生成参数为输入参数生成的,第二密钥生成参数包括与CU-UP对应的特定密钥生成参数。可选的,第二密钥生成参数还包括第一密钥生成参数,第一密钥生成参数的相关描述可以参考方法300中的S320a,与CU-UP对应的特定密钥生成参数可以包括CU-UP ID和/或承载ID,承载是CU-UP与UE之间建立的承载。The second user plane security key is used to enable user plane security between the CU-UP and the UE. For example, the second user plane security key is generated by the CU-CP using the root key as the input key and the second key generation parameter as the input parameter. The second key generation parameter includes a specific password corresponding to the CU-UP. Key generation parameters. Optionally, the second key generation parameters also include first key generation parameters. For a related description of the first key generation parameters, refer to S320a in method 300. The specific key generation parameters corresponding to CU-UP may include CU. -UP ID and/or bearer ID, the bearer is the bearer established between CU-UP and UE.
示例性的,CU-CP通过承载上下文建立请求消息向CU-UP发送第二用户面安全密钥。CU-CP向CU-UP发送的承载上下文建立请求消息还可以包括用户面安全算法和安全指示, 安全指示包括用户面安全策略和最大完整性保护速率。Exemplarily, the CU-CP sends the second user plane security key to the CU-UP through the bearer context establishment request message. The bearer context establishment request message sent by CU-CP to CU-UP may also include user plane security algorithms and security instructions. Security directives include user plane security policy and maximum integrity protection rate.
S630b,CU-CP向CU-UP发送根密钥。相应的,CU-UP接收来自CU-CP的根密钥。S630b: CU-CP sends the root key to CU-UP. Correspondingly, CU-UP receives the root key from CU-CP.
示例性的,CU-CP通过承载上下文建立请求消息向CU-UP发送根密钥。CU-CP向CU-UP发送的承载上下文建立请求消息还可以包括用户面安全算法和安全指示,安全指示包括用户面安全策略和最大完整性保护速率。Exemplarily, the CU-CP sends the root key to the CU-UP through a bearer context establishment request message. The bearer context establishment request message sent by the CU-CP to the CU-UP may also include the user plane security algorithm and security instructions. The security instructions include the user plane security policy and the maximum integrity protection rate.
S631b,CU-UP向CU-CP发送特定密钥生成参数。相应的,CU-CP接收来自CU-UP的特定密钥生成参数。S631b: CU-UP sends specific key generation parameters to CU-CP. Accordingly, the CU-CP receives specific key generation parameters from the CU-UP.
CU-UP接收到来自CU-CP的根密钥之后,则根据根密钥和第二密钥生成参数生成第二用户面密钥,并将特定密钥生成参数发送至CU-CP。After receiving the root key from the CU-CP, the CU-UP generates the second user plane key according to the root key and the second key generation parameters, and sends the specific key generation parameters to the CU-CP.
示例性的,CU-UP通过承载上下文建立响应消息向CU-UP发送特定密钥生成参数。Exemplarily, the CU-UP sends specific key generation parameters to the CU-UP through a bearer context establishment response message.
进一步的,CU-CP根据根密钥和第二密钥生成参数生成第二用户面安全密钥,或者CU-CP接收到来自CU-UP的特定密钥生成参数之后,方法600还可以包括S640。Further, after the CU-CP generates the second user plane security key according to the root key and the second key generation parameter, or after the CU-CP receives the specific key generation parameter from the CU-UP, the method 600 may also include S640 .
S640,CU-CP向UE发送特定密钥生成参数。相应的,UE接收来自CU-CP的特定密钥生成参数。S640: The CU-CP sends specific key generation parameters to the UE. Correspondingly, the UE receives specific key generation parameters from the CU-CP.
示例性的,若特定密钥生成参数包括UE未知的参数,例如,特定密钥生成参数包括CU-UP ID,则CU-CP向UE发送特定密钥生成参数。可选的,CU-CP可以向UE发送特定密钥生成参数中UE未知的参数。例如,特定密钥生成参数包括CU-UP ID和承载ID,其中,CU-UP ID是UE未知的参数,承载ID是UE已知的参数,则CU-CP向UE发送CU-UP ID。若特定密钥生成参数包括的参数都是UE已知的参数,则CU-CP可以不向UE发送特定密钥生成参数。For example, if the specific key generation parameters include parameters unknown to the UE, for example, the specific key generation parameters include the CU-UP ID, then the CU-CP sends the specific key generation parameters to the UE. Optionally, the CU-CP can send parameters unknown to the UE among the specific key generation parameters to the UE. For example, the specific key generation parameters include CU-UP ID and bearer ID, where CU-UP ID is a parameter unknown to the UE and bearer ID is a parameter known to the UE, then the CU-CP sends the CU-UP ID to the UE. If the parameters included in the specific key generation parameters are all parameters known to the UE, the CU-CP may not send the specific key generation parameters to the UE.
UE接收到特定密钥生成参数之后,可以根据根密钥和第二密钥生成参数生成第二用户面安全密钥。After receiving the specific key generation parameters, the UE can generate the second user plane security key according to the root key and the second key generation parameters.
示例性的,CU-CP通过RRC重配置(RRC reconfiguration)消息向UE发送特定密钥生成参数。Exemplarily, the CU-CP sends specific key generation parameters to the UE through an RRC reconfiguration (RRC reconfiguration) message.
可以理解,当CU-CP采用方式1与CU-UP建立承载上下文时,由于不同CU-UP的ID不同,因此根据CU-UP ID生成第二用户面安全密钥,可以实现不同CU-UP之间的用户面安全密钥的隔离。由于不同承载的ID不同,因此根据承载ID生成第二用户面安全密钥,可以实现不同承载之间的用户面安全密钥的隔离。It can be understood that when the CU-CP uses method 1 to establish a bearer context with the CU-UP, since the IDs of different CU-UPs are different, the second user plane security key is generated based on the CU-UP ID, which can implement different CU-UPs. Isolation of user plane security keys between Since IDs of different bearers are different, the second user plane security key is generated according to the bearer ID, which can realize the isolation of user plane security keys between different bearers.
方式2:Way 2:
当CU-CP采用方式2与CU-UP建立承载上下文时,CU-CP根据接收到的用户面安全策略向CU-UP发送虚构密钥,或者向CU-UP发送第一用户面安全密钥,第一用户面安全密钥的相关描述可以参考方法300中的S320a。When CU-CP uses mode 2 to establish a bearer context with CU-UP, CU-CP sends a fictitious key to CU-UP according to the received user plane security policy, or sends a first user plane security key to CU-UP. For relevant description of the first user plane security key, please refer to S320a in method 300.
例如,若用户面安全策略指示不需要开启用户面安全保护,则CU-CP向CU-UP发送虚构密钥,若用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护,则CU-CP向CU-UP发送第一用户面安全密钥。更多相关描述可以参考方法300中的S320a和S320b。For example, if the user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP sends the fictitious key to the CU-UP. If the user plane security policy indicates that the user plane security protection must be turned on or it is preferred to turn on the user plane security protection, then CU-CP sends the first user plane security key to CU-UP. For more related descriptions, please refer to S320a and S320b in method 300.
又例如,若用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护,则CU-CP向CU-UP发送虚构密钥,若用户面安全策略指示必须开启用户面安全保护,则CU-CP向CU-UP发送第一用户面安全密钥。更多相关描述可以参考方法400中的S420a 和S420b。For another example, if the user plane security policy indicates that user plane security protection does not need to be turned on or that it is preferred to turn on user plane security protection, the CU-CP sends the fictitious key to CU-UP. If the user plane security policy indicates that user plane security protection must be turned on, Then the CU-CP sends the first user plane security key to the CU-UP. For more related descriptions, please refer to S420a in Method 400 and S420b.
再例如,若用户面安全策略指示不需要开启用户面安全保护,则CU-CP向CU-UP发送虚构密钥,若用户面安全策略指示必须开启用户面安全保护,则CU-CP向CU-UP发送第一用户面安全密钥。若用户面安全策略指示优先开启用户面安全保护,且CU-CP确定不需要开启用户面安全保护,则CU-CP向CU-UP发送虚构密钥。若用户面安全策略指示优先开启用户面安全保护,且CU-CP确定需要开启用户面安全保护,则CU-CP向CU-UP发送第一用户面安全密钥。更多相关描述可以参考方法500中的S520a和S520b。For another example, if the user plane security policy indicates that user plane security protection does not need to be enabled, the CU-CP sends a fictitious key to CU-UP. If the user plane security policy indicates that user plane security protection must be enabled, the CU-CP sends a fictitious key to the CU-UP. UP sends the first user plane security key. If the user plane security policy indicates that user plane security protection should be enabled first, and the CU-CP determines that user plane security protection does not need to be enabled, the CU-CP sends the fictitious key to the CU-UP. If the user plane security policy indicates that user plane security protection is enabled first, and the CU-CP determines that user plane security protection needs to be enabled, the CU-CP sends the first user plane security key to the CU-UP. For more related descriptions, please refer to S520a and S520b in method 500.
可选的,若CU-CP连接多个CU-UP,则当CU-CP采用方式2与CU-UP建立承载上下文时,CU-CP可以根据用户面安全策略从连接的多个CU-UP中选择一个CU-UP用于建立承载。例如,若用户面安全策略指示不需要开启用户面安全保护,则CU-CP选择非可信CU-UP建立承载,若用户面安全策略指示必须开启用户面安全保护或优选开启用户面安全保护,则CU-CP选择可信CU-UP建立承载。更多相关描述可以参考方法300中的S330。Optionally, if the CU-CP is connected to multiple CU-UPs, when the CU-CP uses mode 2 to establish a bearer context with the CU-UP, the CU-CP can select from the multiple connected CU-UPs according to the user plane security policy. Select a CU-UP to establish the bearer. For example, if the user plane security policy indicates that user plane security protection does not need to be turned on, the CU-CP selects the untrusted CU-UP to establish the bearer. If the user plane security policy indicates that user plane security protection must be turned on or it is preferred to turn on user plane security protection, Then the CU-CP selects the trusted CU-UP to establish the bearer. For more related descriptions, please refer to S330 in method 300.
在本申请实施例中,若CU-CP获取到UE的安全能力信息,则CU-CP根据UE的能力确定与CU-UP建立承载上下文的方式,避免在UE不支持通过特定密钥生成参数推演用户面安全密钥的能力的情况下,CU-CP或CU-UP使用根密钥和特定密钥生成参数生成用户面安全密钥,导致UE和CU-UP无法使用相同的用户面安全密钥进行数据传输。In the embodiment of this application, if the CU-CP obtains the security capability information of the UE, the CU-CP determines the method of establishing the bearer context with the CU-UP based on the UE's capabilities to avoid deriving parameters through specific key generation when the UE does not support it. In the case of user plane security key capability, CU-CP or CU-UP uses the root key and specific key generation parameters to generate user plane security keys, resulting in the UE and CU-UP being unable to use the same user plane security key. Perform data transfer.
进一步地,CU-CP可以在UE支持通过特定密钥生成参数推演用户面安全密钥的能力的情况下,向CU-UP发送根据根密钥和特定密钥生成参数生成的用户面安全密钥,或者向CU-UP发送根密钥,使得CU-UP可以根据根密钥和特定密钥生成参数生成用户面安全密钥,从而实现不同CU-UP间的用户面安全密钥隔离。或者,若UE不支持通过特定密钥生成参数推演用户面安全密钥的能力,则CU-CP在用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护的情况下,向CU-UP发送不同于用户面安全密钥的虚构密钥,从而即使在该CU-UP被攻击者攻破的情况下,攻击者只能从CU-UP获取到虚构密钥,而不能获取到用户面安全密钥,从而可以减小用户面安全密钥泄漏的风险。Further, the CU-CP may send the user plane security key generated based on the root key and the specific key generation parameters to the CU-UP if the UE supports the ability to deduce the user plane security key through specific key generation parameters. , or send the root key to CU-UP, so that CU-UP can generate user plane security keys based on the root key and specific key generation parameters, thereby achieving user plane security key isolation between different CU-UPs. Alternatively, if the UE does not support the ability to deduce the user plane security key through specific key generation parameters, then the CU-CP shall provide CU-UP sends a fictitious key that is different from the user plane security key. Therefore, even if the CU-UP is compromised by an attacker, the attacker can only obtain the fictitious key from CU-UP but not the user. The user plane security key can be used to reduce the risk of user plane security key leakage.
以上,结合图3至图6详细说明了本申请实施例提供的方法。以下,结合图7至图9详细说明本申请实施例提供的通信装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。Above, the method provided by the embodiment of the present application is described in detail with reference to FIGS. 3 to 6 . The communication device provided by the embodiment of the present application will be described in detail below with reference to FIGS. 7 to 9 . It should be understood that the description of the device embodiments corresponds to the description of the method embodiments. Therefore, for content that is not described in detail, please refer to the above method embodiments. For the sake of brevity, they will not be described again here.
本申请实施例可以根据上述方法示例对发射端设备或者接收端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明Embodiments of the present application can divide the transmitting end device or the receiving end device into functional modules according to the above method examples. For example, each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module. middle. The above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods. The following is an example of dividing each functional module into corresponding functions.
图7是本申请实施例提供的通信装置1000的示意性框图。如图7所示,该通信装置1000可以包括:收发单元1010和处理单元1020。FIG. 7 is a schematic block diagram of a communication device 1000 provided by an embodiment of the present application. As shown in FIG. 7 , the communication device 1000 may include: a transceiver unit 1010 and a processing unit 1020 .
在一种可能的设计中,该通信装置1000可以是上文方法实施例中的集中式单元控制面实体,也可以是用于实现上文方法实施例中集中式单元控制面实体的功能的芯片。In a possible design, the communication device 1000 may be the centralized unit control plane entity in the above method embodiment, or may be a chip used to implement the functions of the centralized unit control plane entity in the above method embodiment. .
应理解,该通信装置1000可对应于本申请实施例的方法300、方法400、方法500或 方法600中的集中式单元控制面实体,该通信装置可以包括用于执行图3中的方法300、图4中的方法400、图5中的方法500或图6中的方法600中的集中式单元控制面实体执行的方法的单元。并且,该通信装置1000中的各单元和上述其他操作和/或功能分别为了图3中的方法300、图4中的方法400、图5中的方法500或图6中的方法600的相应流程。应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the communication device 1000 may correspond to the method 300, the method 400, the method 500 or the method of the embodiment of the present application. The centralized unit control plane entity in the method 600, the communication device may include a centralized unit for performing the method 300 in Figure 3, the method 400 in Figure 4, the method 500 in Figure 5 or the method 600 in Figure 6 The unit controls the methods executed by the surface entity. Moreover, each unit in the communication device 1000 and the above-mentioned other operations and/or functions are respectively the corresponding processes of the method 300 in Figure 3, the method 400 in Figure 4, the method 500 in Figure 5, or the method 600 in Figure 6 . It should be understood that the specific process of each unit performing the above corresponding steps has been described in detail in the above method embodiments, and will not be described again for the sake of brevity.
还应理解,该通信装置1000中的收发单元1010可对应图8中示出的通信设备2000中的收发器2020,该通信装置1000中的处理单元1020可对应于图8中示出的通信设备2000中的处理器2010。It should also be understood that the transceiver unit 1010 in the communication device 1000 may correspond to the transceiver 2020 in the communication device 2000 shown in FIG. 8 , and the processing unit 1020 in the communication device 1000 may correspond to the communication device shown in FIG. 8 Processors in 2000 and 2010.
还应理解,当该通信装置1000为芯片时,该芯片包括收发单元。可选的,该芯片还可以包括处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元可以为该芯片上集成的处理器或者微处理器或者集成电路。It should also be understood that when the communication device 1000 is a chip, the chip includes a transceiver unit. Optionally, the chip may also include a processing unit. The transceiver unit may be an input-output circuit or a communication interface; the processing unit may be a processor, microprocessor, or integrated circuit integrated on the chip.
收发单元1010用于实现通信装置1000的信号的收发操作,处理单元1020用于实现通信装置1000的信号的处理操作。The transceiver unit 1010 is used to implement the signal transceiver operation of the communication device 1000 , and the processing unit 1020 is used to implement the signal processing operation of the communication device 1000 .
可选的,该通信装置还包括存储单元1030,该存储单元1030用于存储指令。Optionally, the communication device also includes a storage unit 1030, which is used to store instructions.
图8是本申请实施例提供的装置2000的示意性框图。如图8所示,该装置2000包括:至少一个处理器2010。该处理器2010与存储器耦合,用于执行存储器中存储的指令,以执行图3、图4、图5或图6中所述的方法。可选的,该装置2000还包括收发器2020,该处理器2010与存储器耦合,用于执行存储器中存储的指令,以控制收发器2020发送信号和/或接收信号,例如,处理器2010可以控制收发器2020发送虚构密钥和/或接收虚构密钥。可选的,该装置2000还包括存储器2030,用于存储指令。Figure 8 is a schematic block diagram of the device 2000 provided by the embodiment of the present application. As shown in Figure 8, the device 2000 includes: at least one processor 2010. The processor 2010 is coupled to the memory and is used to execute instructions stored in the memory to perform the method described in FIG. 3, FIG. 4, FIG. 5 or FIG. 6. Optionally, the device 2000 also includes a transceiver 2020. The processor 2010 is coupled to the memory and is used to execute instructions stored in the memory to control the transceiver 2020 to send signals and/or receive signals. For example, the processor 2010 can control Transceiver 2020 sends fictitious keys and/or receives fictitious keys. Optionally, the device 2000 also includes a memory 2030 for storing instructions.
应理解,上述处理器2010和存储器2030可以合成一个处理装置,处理器2010用于执行存储器2030中存储的程序代码来实现上述功能。具体实现时,该存储器2030也可以集成在处理器2010中,或者独立于处理器2010。It should be understood that the above-mentioned processor 2010 and the memory 2030 can be combined into one processing device, and the processor 2010 is used to execute the program code stored in the memory 2030 to implement the above functions. During specific implementation, the memory 2030 may also be integrated in the processor 2010 or independent of the processor 2010.
还应理解,收发器2020可以包括接收器(或者称,接收机)和发射器(或者称,发射机)。收发器2020还可以进一步包括天线,天线的数量可以为一个或多个。收发器2020又可以是通信接口或者接口电路。It should also be understood that the transceiver 2020 may include a receiver and a transmitter. The transceiver 2020 may further include an antenna, and the number of antennas may be one or more. The transceiver 2020 may be a communication interface or an interface circuit.
当该装置2000为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路或通信接口;处理单元可以为该芯片上集成的处理器或者微处理器或者集成电路。When the device 2000 is a chip, the chip includes a transceiver unit and a processing unit. The transceiver unit may be an input-output circuit or a communication interface; the processing unit may be a processor, microprocessor, or integrated circuit integrated on the chip.
图9是本申请实施例的一种芯片系统的示意图。这里的芯片系统也可为电路组成的系统。图9所示的芯片系统3000包括:逻辑电路3010以及输入/输出接口(input/output interface)3020,所述逻辑电路用于与输入接口耦合,通过所述输入/输出接口传输数据(例如第一授时配置信息),以执行图3、图4、图5或图6所述的方法。Figure 9 is a schematic diagram of a chip system according to an embodiment of the present application. The chip system here may also be a system composed of circuits. The chip system 3000 shown in Figure 9 includes: a logic circuit 3010 and an input/output interface (input/output interface) 3020. The logic circuit is used to couple with the input interface and transmit data (such as the first input interface) through the input/output interface. timing configuration information) to execute the method described in Figure 3, Figure 4, Figure 5 or Figure 6.
本申请实施例还提供了一种处理装置,包括处理器和接口。所述处理器可用于执行上述方法实施例中的方法。An embodiment of the present application also provides a processing device, including a processor and an interface. The processor may be used to execute the method in the above method embodiment.
应理解,上述处理装置可以是一个芯片。例如,该处理装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central  processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。It should be understood that the above processing device may be a chip. For example, the processing device can be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), a system on chip (SoC), or Is the central processing unit (central processing unit) processor unit (CPU), it can also be a network processor (NP), it can also be a digital signal processor (DSP), it can also be a microcontroller (micro controller unit (MCU)), it can also It is a programmable logic device (PLD) or other integrated chip.
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机寄存器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。During the implementation process, each step of the above method can be completed by instructions in the form of hardware integrated logic circuits or software in the processor. The steps of the methods disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor for execution, or can be executed by a combination of hardware and software modules in the processor. The software module can be located in a random register, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, register, or other mature storage media in this field. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be noted that the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capabilities. During the implementation process, each step of the above method embodiment can be completed through an integrated logic circuit of hardware in the processor or instructions in the form of software. The above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components. . Each method, step and logical block diagram disclosed in the embodiment of this application can be implemented or executed. A general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。It can be understood that the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories. Among them, non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory. Erase electrically programmable read-only memory (EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RAM), which is used as an external cache.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行图3至图6所示实施例中任意一个实施例的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer program product. The computer program product includes: computer program code. When the computer program code is run on a computer, it causes the computer to execute the steps shown in Figures 3 to 6. The method of any one of the embodiments is shown.
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图3至图6所示实施例中任意一个实施例的方法。According to the method provided by the embodiment of the present application, the present application also provides a computer-readable medium. The computer-readable medium stores program code. When the program code is run on a computer, it causes the computer to execute the steps shown in Figures 3 to 6. The method of any one of the embodiments is shown.
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的集中式单元控制面实体。According to the method provided by the embodiment of the present application, the present application also provides a system, which includes the aforementioned centralized unit control plane entity.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现,当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读信息介质向另一个计算机可读存储介质传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。In the above embodiments, they may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using software, they may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable information medium to another computer-readable storage medium. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated. The usable media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., high-density digital video discs (DVD)), or semiconductor media (e.g., solid state disks, SSD)) etc.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通 过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其他的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods can be achieved through other means. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。 The above are only specific embodiments of the present application, but the protection scope of the present application is not limited thereto. Any person familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application. should be covered by the protection scope of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (28)

  1. 一种安全保护方法,其特征在于,包括:A security protection method, characterized by including:
    集中式单元控制面实体接收来自会话管理网元的第一用户面安全策略,所述第一用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护;The centralized unit control plane entity receives the first user plane security policy from the session management network element, and the first user plane security policy indicates that user plane security protection does not need to be enabled or user plane security protection is preferably enabled;
    所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,所述虚构密钥与用户面安全密钥不同,所述用户面安全密钥用于终端设备和集中式单元用户面实体之间开启用户面安全保护。The centralized unit control plane entity sends a fictitious key to the first centralized unit user plane entity according to the first user plane security policy. The fictitious key is different from the user plane security key. The user plane is secure. The key is used to enable user plane security protection between the terminal device and the centralized unit user plane entity.
  2. 根据权利要求1所述的方法,其特征在于,所述虚构密钥是128比特的随机数或预定义的值。The method of claim 1, wherein the fictitious key is a 128-bit random number or a predefined value.
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, characterized in that, the method further includes:
    所述集中式单元控制面实体根据所述第一用户面安全策略,选择为非可信集中式单元用户面实体的所述第一集中式单元用户面实体。The centralized unit control plane entity selects the first centralized unit user plane entity as an untrusted centralized unit user plane entity according to the first user plane security policy.
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述集中式单元控制面实体向所述第一集中式单元用户面实体发送虚构密钥,包括:The method according to any one of claims 1 to 3, characterized in that the centralized unit control plane entity sends a fictitious key to the first centralized unit user plane entity, including:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述虚构密钥和安全算法,所述安全算法为空。The centralized unit control plane entity sends the fictitious key and security algorithm to the first centralized unit user plane entity, and the security algorithm is empty.
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一用户面安全策略指示优选开启用户面安全保护,所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括:The method according to any one of claims 1 to 4, characterized in that the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity Security policy, sending fictitious keys to the first centralized unit user plane entity, including:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述第一用户面安全策略和所述虚构密钥;The centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity;
    所述方法还包括:The method also includes:
    所述集中式单元控制面实体接收来自所述第一集中式单元用户面实体的安全结果,所述安全结果指示用户面安全保护开启;The centralized unit control plane entity receives a security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on;
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述用户面安全密钥。The centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity.
  6. 根据权利要求5所述的方法,其特征在于,所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述用户面安全密钥之前,所述方法还包括:The method according to claim 5, characterized in that before the centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity, the method further includes:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送承载上下文释放命令;The centralized unit control plane entity sends a bearer context release command to the first centralized unit user plane entity;
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述用户面安全密钥,包括:The centralized unit control plane entity sends the user plane security key to the first centralized unit user plane entity, including:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送承载上下文建立请求消息,所述承载上下文建立请求消息包括所述用户面安全密钥。The centralized unit control plane entity sends a bearer context establishment request message to the first centralized unit user plane entity, where the bearer context establishment request message includes the user plane security key.
  7. 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一用户面安全策略指示优选开启用户面安全保护,所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括: The method according to any one of claims 1 to 4, characterized in that the first user plane security policy indicates that user plane security protection is preferably turned on, and the centralized unit control plane entity Security policy, sending fictitious keys to the first centralized unit user plane entity, including:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送所述第一用户面安全策略和所述虚构密钥;The centralized unit control plane entity sends the first user plane security policy and the fictitious key to the first centralized unit user plane entity;
    所述方法还包括:The method also includes:
    所述集中式单元控制面实体接收来自所述第一集中式单元用户面实体的安全结果,所述安全结果指示用户面安全保护开启;The centralized unit control plane entity receives a security result from the first centralized unit user plane entity, and the security result indicates that user plane security protection is turned on;
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送承载上下文释放命令;The centralized unit control plane entity sends a bearer context release command to the first centralized unit user plane entity;
    所述集中式单元控制面实体向第二集中式单元用户面实体发送所述用户面安全密钥,所述第二集中式单元用户面实体是所述集中式单元控制面实体重新选择的用于建立承载上下文的集中式单元用户面实体。The centralized unit control plane entity sends the user plane security key to a second centralized unit user plane entity that is reselected by the centralized unit control plane entity. Establish centralized unit user plane entities that host context.
  8. 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一用户面安全策略指示优选开启安全保护,所述方法还包括:The method according to any one of claims 1 to 4, characterized in that the first user plane security policy indicates that security protection is preferably turned on, and the method further includes:
    所述集中式单元控制面实体确定不需要开启用户面安全保护;The centralized unit control plane entity determines that user plane security protection does not need to be turned on;
    所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,包括:The centralized unit control plane entity sends the fictitious key to the first centralized unit user plane entity according to the first user plane security policy, including:
    所述集中式单元控制面实体向所述第一集中式单元用户面实体发送第二用户面安全策略和所述虚构密钥,所述第二用户面安全策略指示不需要开启安全保护。The centralized unit control plane entity sends a second user plane security policy and the fictitious key to the first centralized unit user plane entity, and the second user plane security policy indicates that security protection does not need to be turned on.
  9. 根据权利要求8所述的方法,其特征在于,所述集中式单元控制面实体确定不需要开启用户面安全保护,包括:The method according to claim 8, characterized in that the centralized unit control plane entity determines that user plane security protection does not need to be turned on, including:
    所述集中式单元控制面实体根据以下一项或多项确定不需要开启用户面安全保护:所述集中式单元控制面实体的负载情况,或所述集中式单元控制面实体对所述终端设备与所述集中式用户面实体之间传输的数据的安全要求。The centralized unit control plane entity determines that user plane security protection does not need to be turned on based on one or more of the following: the load condition of the centralized unit control plane entity, or the impact of the centralized unit control plane entity on the terminal device Security requirements for data transmitted to and from the centralized user plane entity.
  10. 根据权利要求1至9中任一项所述的方法,其特征在于,若所述第一用户面安全策略指示不需要开启用户面机密性保护或优选开启用户面机密性保护,则所述虚构密钥包括虚构加密密钥,所述虚构加密密钥与所述用户面安全密钥包括的用户面加密密钥不同;和/或,The method according to any one of claims 1 to 9, characterized in that if the first user plane security policy indicates that user plane confidentiality protection does not need to be turned on or user plane confidentiality protection is preferably turned on, then the fictitious The key includes a fictitious encryption key that is different from the user plane encryption key included in the user plane security key; and/or,
    若所述第一用户面安全策略指示不需要开启用户面完整性保护或优选开启用户面完整性保护,则所述虚构密钥包括虚构完整性密钥,所述虚构完整性密钥与所述用户面安全密钥包括的用户面完整性密钥不同。If the first user plane security policy indicates that user plane integrity protection does not need to be turned on or user plane integrity protection is preferably turned on, the fictitious key includes a fictitious integrity key, and the fictitious integrity key is the same as the fictitious integrity key. The user plane security key includes a different user plane integrity key.
  11. 根据权利要求1至10中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 10, characterized in that the method further includes:
    所述集中式单元控制面实体获取所述终端设备的安全能力信息,所述安全能力信息指示所述终端设备不支持通过与所述第一集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力。The centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates that the terminal device does not support deduction through a specific key generation parameter corresponding to the first centralized unit user plane entity. User plane security key capabilities.
  12. 根据权利要求11所述的方法,其特征在于,所述集中式单元控制面实体获取所述终端设备的安全能力信息,包括:The method according to claim 11, characterized in that the centralized unit control plane entity obtains the security capability information of the terminal device, including:
    所述集中式单元控制面实体接收来自所述终端设备的所述安全能力信息。The centralized unit control plane entity receives the security capability information from the terminal device.
  13. 根据权利要求12所述的方法,其特征在于,所述集中式单元控制面实体获取所述终端设备的安全能力信息,包括:The method according to claim 12, characterized in that the centralized unit control plane entity obtains the security capability information of the terminal device, including:
    所述集中式单元控制面实体接收来自接入和移动性管理功能网元的所述安全能力信 息。The centralized unit control plane entity receives the security capability information from the access and mobility management function network element. interest.
  14. 一种安全保护方法,其特征在于,包括:A security protection method, characterized by including:
    集中式单元控制面实体获取终端设备的安全能力信息,所述安全能力信息指示所述终端设备是否支持通过与集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力;The centralized unit control plane entity obtains security capability information of the terminal device, and the security capability information indicates whether the terminal device supports the ability to deduce user plane security keys through specific key generation parameters corresponding to the centralized unit user plane entity;
    若所述安全能力信息指示所述终端设备不支持通过所述特定密钥生成参数推演用户面安全密钥的能力,则所述集中式单元控制面实体确定根据根密钥和第一密钥生成参数生成用户面安全密钥,所述第一密钥生成参数包括算法标识和/或算法类型鉴别器;If the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameter, the centralized unit control plane entity determines to generate the user plane security key based on the root key and the first key. Generate user plane security keys with parameters, where the first key generation parameters include an algorithm identifier and/or an algorithm type discriminator;
    若所述安全能力信息指示所述终端设备支持通过所述特定密钥生成参数推演用户面安全密钥的能力,则所述集中式单元控制面实体确定根据根密钥和第二密钥生成参数生成用户面安全密钥,所述第二密钥生成参数包括所述特定密钥生成参数。If the security capability information indicates that the terminal device supports the ability to deduce user plane security keys through the specific key generation parameters, the centralized unit control plane entity determines the user plane security key based on the root key and the second key generation parameter. A user plane security key is generated, and the second key generation parameters include the specific key generation parameters.
  15. 根据权利要求14所述的方法,其特征在于,所述集中式单元控制面实体获取所述终端设备的安全能力信息,包括:The method according to claim 14, characterized in that the centralized unit control plane entity obtains the security capability information of the terminal device, including:
    所述集中式单元控制面实体接收来自所述终端设备的所述安全能力信息。The centralized unit control plane entity receives the security capability information from the terminal device.
  16. 根据权利要求14所述的方法,其特征在于,所述集中式单元控制面实体获取所述终端设备的安全能力信息,包括:The method according to claim 14, characterized in that the centralized unit control plane entity obtains the security capability information of the terminal device, including:
    所述集中式单元控制面实体接收来自接入和移动性管理功能网元的所述安全能力信息。The centralized unit control plane entity receives the security capability information from the access and mobility management function network element.
  17. 根据权利要求14至16中任一项所述的方法,其特征在于,所述特定密钥生成参数包括所述集中式单元用户面实体的标识和/或承载标识。The method according to any one of claims 14 to 16, characterized in that the specific key generation parameters include an identification and/or a bearer identification of the centralized unit user plane entity.
  18. 一种通信装置,其特征在于,包括用于实现如权利要求1至13中任意一项所述的方法的单元。A communication device, characterized by comprising a unit for implementing the method according to any one of claims 1 to 13.
  19. 一种通信装置,其特征在于,包括用于实现如权利要求14至17中任意一项所述的方法的单元。A communication device, characterized by comprising a unit for implementing the method according to any one of claims 14 to 17.
  20. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读介质存储有计算机程序;所述计算机程序在计算机上运行时,使得所述计算机执行权利要求1至17中任一项所述的方法。A computer-readable storage medium, characterized in that it includes: the computer-readable medium stores a computer program; when the computer program is run on a computer, it causes the computer to execute any one of claims 1 to 17. method described.
  21. 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信装置执行如权利要求1至17中任意一项所述的方法。A chip system, characterized in that it includes: a processor for calling and running a computer program from a memory, so that a communication device installed with the chip system executes the method according to any one of claims 1 to 17 .
  22. 一种通信系统,其特征在于,所述通信系统包括如权利要求18所述的通信装置,所述通信系统还包括以下一项或多项:A communication system, characterized in that the communication system includes the communication device according to claim 18, and the communication system further includes one or more of the following:
    会话管理网元,用于提供第一用户面安全策略;Session management network element, used to provide the first user plane security policy;
    第一集中式单元用户面实体,用于接收虚构密钥以开启与终端设备之间的用户面安全保护。The first centralized unit user plane entity is used to receive the fictitious key to enable user plane security protection with the terminal device.
  23. 一种通信系统,其特征在于,所述通信系统包括如权利要求19所述的通信装置,所述通信系统还包括用于提供终端设备的安全能力信息的设备。A communication system, characterized in that the communication system includes the communication device according to claim 19, and the communication system further includes a device for providing security capability information of a terminal device.
  24. 一种安全保护方法,其特征在于,包括:A security protection method, characterized by including:
    会话管理网元向集中式单元控制面实体发送第一用户面安全策略,所述第一用户面 安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护;The session management network element sends the first user plane security policy to the centralized unit control plane entity, and the first user plane The security policy indicates that user plane security protection does not need to be enabled or user plane security protection is preferably enabled;
    所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,所述虚构密钥与用户面安全密钥不同,所述用户面安全密钥用于终端设备和集中式单元用户面实体之间开启用户面安全保护。The centralized unit control plane entity sends a fictitious key to the first centralized unit user plane entity according to the first user plane security policy. The fictitious key is different from the user plane security key. The user plane is secure. The key is used to enable user plane security protection between the terminal device and the centralized unit user plane entity.
  25. 一种安全保护方法,其特征在于,包括:A security protection method, characterized by including:
    集中式单元控制面实体接收来自会话管理网元的第一用户面安全策略,所述第一用户面安全策略指示不需要开启用户面安全保护或优选开启用户面安全保护;The centralized unit control plane entity receives the first user plane security policy from the session management network element, and the first user plane security policy indicates that user plane security protection does not need to be enabled or user plane security protection is preferably enabled;
    所述集中式单元控制面实体根据所述第一用户面安全策略,向第一集中式单元用户面实体发送虚构密钥,所述虚构密钥与用户面安全密钥不同,所述用户面安全密钥用于终端设备和集中式单元用户面实体之间开启用户面安全保护;The centralized unit control plane entity sends a fictitious key to the first centralized unit user plane entity according to the first user plane security policy. The fictitious key is different from the user plane security key. The user plane is secure. The key is used to enable user plane security protection between the terminal device and the centralized unit user plane entity;
    所述第一集中式单元用户面实体接收所述虚构密钥。The first centralized unit user plane entity receives the fictitious key.
  26. 根据权利要求25所述的方法,其特征在于,还包括:The method according to claim 25, further comprising:
    第一集中式单元用户面实体开启与终端设备之间的用户面安全保护。The first centralized unit user plane entity enables user plane security protection between the terminal device and the user plane entity.
  27. 根据权利要求25或26所述的方法,其特征在于,还包括:The method according to claim 25 or 26, further comprising:
    所述会话管理网元向所述集中式单元控制面实体发送所述第一用户面安全策略。The session management network element sends the first user plane security policy to the centralized unit control plane entity.
  28. 一种安全保护方法,其特征在于,包括:A security protection method, characterized by including:
    网元向集中式单元控制面实体发送终端设备的安全能力信息,所述安全能力信息指示所述终端设备是否支持通过与集中式单元用户面实体对应的特定密钥生成参数推演用户面安全密钥的能力;The network element sends the security capability information of the terminal device to the centralized unit control plane entity. The security capability information indicates whether the terminal device supports deriving user plane security keys through specific key generation parameters corresponding to the centralized unit user plane entity. Ability;
    若所述安全能力信息指示所述终端设备不支持通过所述特定密钥生成参数推演用户面安全密钥的能力,则所述集中式单元控制面实体确定根据根密钥和第一密钥生成参数生成用户面安全密钥,所述第一密钥生成参数包括算法标识和/或算法类型鉴别器;If the security capability information indicates that the terminal device does not support the ability to deduce the user plane security key through the specific key generation parameter, the centralized unit control plane entity determines to generate the user plane security key based on the root key and the first key. Generate user plane security keys with parameters, where the first key generation parameters include an algorithm identifier and/or an algorithm type discriminator;
    若所述安全能力信息指示所述终端设备支持通过所述特定密钥生成参数推演用户面安全密钥的能力,则所述集中式单元控制面实体确定根据根密钥和第二密钥生成参数生成用户面安全密钥,所述第二密钥生成参数包括所述特定密钥生成参数。 If the security capability information indicates that the terminal device supports the ability to deduce user plane security keys through the specific key generation parameters, the centralized unit control plane entity determines the user plane security key based on the root key and the second key generation parameter. A user plane security key is generated, and the second key generation parameters include the specific key generation parameters.
PCT/CN2023/089347 2022-05-06 2023-04-19 Security protection method and communication apparatus WO2023213191A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210489628.7 2022-05-06
CN202210489628.7A CN117062055A (en) 2022-05-06 2022-05-06 Security protection method and communication device

Publications (1)

Publication Number Publication Date
WO2023213191A1 true WO2023213191A1 (en) 2023-11-09

Family

ID=88646237

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/089347 WO2023213191A1 (en) 2022-05-06 2023-04-19 Security protection method and communication apparatus

Country Status (2)

Country Link
CN (1) CN117062055A (en)
WO (1) WO2023213191A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365470A (en) * 2018-03-26 2019-10-22 华为技术有限公司 A kind of key generation method and relevant apparatus
US20200015088A1 (en) * 2017-09-29 2020-01-09 Huawei Technologies Co., Ltd. Data Security Processing Method and Apparatus
CN112399409A (en) * 2019-08-16 2021-02-23 华为技术有限公司 Method and device for secure encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200015088A1 (en) * 2017-09-29 2020-01-09 Huawei Technologies Co., Ltd. Data Security Processing Method and Apparatus
CN110365470A (en) * 2018-03-26 2019-10-22 华为技术有限公司 A kind of key generation method and relevant apparatus
CN112399409A (en) * 2019-08-16 2021-02-23 华为技术有限公司 Method and device for secure encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, ORANGE, CATT: "Supporting EPS User Plane Integrity Protection", 3GPP DRAFT; R3-220660, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. E-meeting; 20220117 - 20220126, 7 January 2022 (2022-01-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052099122 *

Also Published As

Publication number Publication date
CN117062055A (en) 2023-11-14

Similar Documents

Publication Publication Date Title
CN111052781B (en) Method and apparatus for negotiating security and integrity algorithms
WO2020029938A1 (en) Secure conversation method and device
WO2018027988A1 (en) Method for selecting network slices, wireless access device and terminal
EP3735018B1 (en) Security negotiation method and apparatus
JP6304788B2 (en) Apparatus, system and method for securing communication of user equipment (UE) in a wireless local area network
CN110830993B (en) Data processing method and device and computer readable storage medium
US20230014494A1 (en) Communication method, apparatus, and system
WO2019158117A1 (en) System and method for providing security in a wireless communications system with user plane separation
WO2020056433A2 (en) SECURE COMMUNICATION OF RADIO RESOURCE CONTROL (RRC) REQUEST OVER SIGNAL RADIO BEARER ZERO (SRBo)
US20230337002A1 (en) Security context generation method and apparatus, and computer-readable storage medium
WO2020238957A1 (en) Verification method and apparatus
WO2022253083A1 (en) Isolation method, apparatus and system for public and private network services
CN113676904B (en) Slice authentication method and device
TWI799064B (en) Method and related device for generating key identification
US20220086145A1 (en) Secondary Authentication Method And Apparatus
CN113395697B (en) Method and communication device for transmitting paging information
WO2023011630A1 (en) Authorization verification method and apparatus
WO2023016160A1 (en) Session establishment method and related apparatus
WO2022252867A1 (en) Communication method and communication apparatus
WO2023213191A1 (en) Security protection method and communication apparatus
CN114600487B (en) Identity authentication method and communication device
WO2019213925A1 (en) Key update method, device, and storage medium
CN112789896A (en) Method and device for switching transmission path
WO2022147846A1 (en) Method, system and apparatus for generating key for communication between devices
WO2022155915A1 (en) Network intercommunication method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23799178

Country of ref document: EP

Kind code of ref document: A1