CN104244247B - Non-Access Stratum, access layer security algorithm processing method and equipment - Google Patents

Non-Access Stratum, access layer security algorithm processing method and equipment Download PDF

Info

Publication number
CN104244247B
CN104244247B CN201310226174.5A CN201310226174A CN104244247B CN 104244247 B CN104244247 B CN 104244247B CN 201310226174 A CN201310226174 A CN 201310226174A CN 104244247 B CN104244247 B CN 104244247B
Authority
CN
China
Prior art keywords
algorithm
security
base station
mme
integrallty
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310226174.5A
Other languages
Chinese (zh)
Other versions
CN104244247A (en
Inventor
许怡娴
崔洋
陈璟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201310226174.5A priority Critical patent/CN104244247B/en
Priority to PCT/CN2014/078658 priority patent/WO2014194787A1/en
Publication of CN104244247A publication Critical patent/CN104244247A/en
Application granted granted Critical
Publication of CN104244247B publication Critical patent/CN104244247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present invention provides a kind of Non-Access Stratum, access layer security algorithm processing method and equipment.The access layer security algorithm processing method, comprising: mobile management entity MME determines the attributed region of the UE according to the mark of user equipment (UE);The MME judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty according to the attributed region of the UE and the security capability information of the UE.Non-Access Stratum, access layer security algorithm processing method and equipment provided in this embodiment, can provide safe protection mechanism for user equipment.

Description

Non-Access Stratum, access layer security algorithm processing method and equipment
Technical field
The present embodiments relate to the communication technology more particularly to a kind of Non-Access Stratums, access layer security algorithm processing method And equipment.
Background technique
In communication system, the safety of data is all based on algorithm to realize, various algorithms can provide machine for data The protection of close property and integrality.
3G (Third Generation) Moblie partnership (3rd Generation Partnership Project, referred to as: 3GPP) Tissue approve algorithm mainly include three kinds, respectively Advanced Encryption Standard (advanced encryption standard, AES) algorithm, SNOW3G algorithm and Zu Chongzhi algorithm (ZUC), wherein ZUC algorithm is optional algorithm.
However, in the prior art, due to user equipment (User Equipment, abbreviation UE) Encryption Algorithm supported and complete Whole property protection algorism differs greatly, and especially part UE does not support default security algorithm, leads to mobile management entity (Mobility Management Entity, abbreviation MME) or base station safe protection mechanism can not be provided for all UE.
Summary of the invention
The embodiment of the present invention provides a kind of Non-Access Stratum, access layer security algorithm processing method and equipment, is user equipment The protection mechanism of safety is provided.
In a first aspect, the embodiment of the present invention provides a kind of Non-Access Stratum security algorithm processing method, comprising:
Mobile management entity MME determines the attributed region of the UE according to the mark of user equipment (UE);
The MME judges the available encryption of the UE according to the attributed region of the UE and the security capability information of the UE Algorithm and/or protection algorithm integrallty.
With reference to first aspect, in the first possible implementation of the first aspect, the MME returning according to the UE The security capability information for belonging to region and the UE judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty, comprising:
The MME judges that the attributed region of the UE for predeterminable area, then judges according to the security capability information of the UE Whether the UE supports default security algorithm, if it is not, selecting integrity protection to calculate according to default protection algorithm integrallty priority Method, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, alternatively, if the MME judges the attributed region of the UE For non-predeterminable area, then judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, root Protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or selects empty algorithm as Encryption Algorithm;Or
The MME judges that the UE does not support default security algorithm according to the security capability information, then judges the UE Attributed region whether be predeterminable area, if so, according to default protection algorithm integrallty priority select integrity protection calculate Method, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then preferential according to protection algorithm integrallty is preset Grade selection protection algorithm integrallty, and/or select empty algorithm as Encryption Algorithm.
With reference to first aspect or the first possible implementation of first aspect, second in first aspect are possible Implementation in, before the mobile management entity MME determines the attributed region of the UE according to the mark of user equipment (UE), Further include:
The MME receives the Redirection Request message that SGSN is sent, and includes the UE's in the Redirection Request message Mark and security capability information;Or
The MME receives the Attach Request message that user equipment (UE) is sent, and includes the UE in the Attach Request message Mark and security capability information;Or
The MME receives the location update request message that user equipment (UE) is sent, and wraps in the location update request message Include the mark and security capability information of the UE.
With reference to first aspect, in a third possible implementation of the first aspect, the mobile management entity MME root Before the attributed region for determining the UE according to the mark of user equipment (UE), further includes:
The MME receives the Redirection Request message that SGSN is sent, and includes the UE's in the Redirection Request message Mark, alternatively, the MME receives the location update request message that user equipment (UE) is sent, in the location update request message Mark including the UE,
The MME judges the available Encryption Algorithm of the UE according to the attributed region and the security capability information of the UE And/or protection algorithm integrallty, comprising:
The MME judges not include the safe energy in the Redirection Request message or the location update request message Force information, and the attributed region of the UE is predeterminable area, then the MME is selected according to default protection algorithm integrallty priority Protection algorithm integrallty, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority;Or
The MME judges not include the safe energy in the Redirection Request message or the location update request message Force information, and the attributed region of the UE is non-predeterminable area, then the MME is selected according to default protection algorithm integrallty priority Protection algorithm integrallty is selected, and/or selects empty algorithm as Encryption Algorithm.
With reference to first aspect, the first of first aspect is to the third any possible implementation, in first aspect The 4th kind of possible implementation in, the MME determines the attributed region of the UE according to the mark, comprising:
The MME is identified as international mobile subscriber identity IMSI described in determining, then according to the IMSI obtain MNC and MCC judges the attributed region of the UE according to the MNC and the MCC;Or
The MME determines that the identification code is temporary identifier, then obtains the corresponding IMSI of the temporary identifier, and according to institute It states IMSI and obtains MNC and MCC, the attributed region of the UE is judged according to the MNC and the MCC;Or
The MME is identified as mobile subscriber number MSISDN described in determining, then determines the UE's according to the MSISDN Attributed region;Or
The MME sends identification request message to network entity device, and the identification request message includes the mark, and The identification response message that the network entity device is sent is received, the identification response message includes the attributed region of the UE, Or the identification response message includes that can recognize mark, so that the MME determines the UE's according to the recognizable mark Attributed region.
Second aspect, the embodiment of the present invention provide a kind of access layer security algorithm processing method, comprising:
Base station obtains the attributed region of user equipment (UE) and the security capability information of the UE, or obtains the safety calculation of UE Method information;
It is calculated according to the attributed region of the UE and the security capability information of the UE, or according to the safety base station Method information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty;
Wherein, the security algorithm information includes the security capability information of UE, algorithms selection instruction, the available encryption calculation of UE It is any or combinations thereof in method and protection algorithm integrallty.
In conjunction with second aspect, in the first possible implementation of the second aspect, the base station is according to the UE's The security capability information of attributed region and the UE judge the available Encryption Algorithm of the UE and/or protection algorithm integrallty, packet It includes:
The base station judges that the attributed region of the UE for predeterminable area, then judges according to the security capability information of the UE Whether the UE supports default security algorithm, if it is not, selecting integrity protection to calculate according to default protection algorithm integrallty priority Method, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, alternatively, if the base station judges the home zone of the UE Domain is non-predeterminable area, then judges whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, Protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or selects empty algorithm as Encryption Algorithm;Or Person
The base station judges that the UE does not support default security algorithm according to the security capability information of the UE, then judges institute Whether the attributed region for stating UE is predeterminable area, if so, selecting integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then according to default protection algorithm integrallty Priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm.
In conjunction with the possible implementation of the first of second aspect or second aspect, second in second aspect may Implementation in, the base station obtains the attributed region of user equipment (UE) and the security capability information of the UE, comprising:
The base station receives the attaching information and security capability information for the UE that mobile management entity MME is sent, and root The attributed region of the UE is determined according to the region instruction in the attaching information;Or
The base station receives the switching request message that the MME is sent, and the handoff request message includes the peace of the UE The attributed region of all-round force information and the UE.
In conjunction with second aspect, in the third possible implementation of the second aspect, the base station obtains the safety of UE Algorithm information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty according to the security algorithm information of the UE, Include:
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, and the base station receives The available protection algorithm integrallty of the UE and/or Encryption Algorithm that mobile management entity MME is sent, the integrity protection are calculated Method is protection algorithm integrallty included in the security capability information of the UE, and the Encryption Algorithm is empty algorithm;Or
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, and the base station receives The first algorithms selection instruction that mobile management entity MME is sent, the first algorithms selection instruction is to indicate the base station choosing Sky algorithm is selected as Encryption Algorithm, and/or protection algorithm integrallty is selected according to default protection algorithm integrallty priority, or The first algorithms selection instruction is to indicate that the base station selects integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or forbids the Encryption Algorithm other than the base station selected empty algorithm.
In conjunction with second aspect, in the fourth possible implementation of the second aspect, the base station obtains the safety of UE Algorithm information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty according to the security algorithm information of the UE, Include:
If the attributed region of the UE is predeterminable area, the base station receives the UE that mobile management entity MME is sent Security capability information, and judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, The base station selects protection algorithm integrallty according to default protection algorithm integrallty priority, and/or according to predetermined encryption algorithm Priority selects Encryption Algorithm;Or
If the attributed region of the UE is predeterminable area, the UE does not support default security algorithm, and the base station, which receives, to be moved The second algorithms selection instruction that dynamic management entity MME is sent, the second algorithms selection instruction to indicate the base station according to Default protection algorithm integrallty priority selects protection algorithm integrallty, and/or is added according to the selection of predetermined encryption algorithm priority Close algorithm;Or
If the attributed region of the UE is predeterminable area, the UE supports default security algorithm, and the base station receives movement The third algorithm that management entity MME is sent selects instruction, and the third algorithm selection instruction is to indicate the base station according to pre- If security algorithm determines protection algorithm integrallty and/or Encryption Algorithm.
In conjunction with the third or the 4th kind of possible implementation of second aspect, in the 5th kind of possible reality of second aspect In existing mode, the method also includes:
The base station sends the security capability information of the base station to the MME, so that the MME determines the peace of the UE Full algorithm information.
The third aspect, the embodiment of the present invention provide a kind of mobile management entity, comprising:
Determining module determines the attributed region of the UE for the mark according to user equipment (UE);
Judgment module, for judging that the UE is available according to the attributed region of the UE and the security capability information of the UE Encryption Algorithm and/or protection algorithm integrallty.
In conjunction with the third aspect, in the first possible implementation of the third aspect, the judgment module is specifically used for:
Judge that the attributed region of the UE for predeterminable area, then judges that the UE is according to the security capability information of the UE It is no to support default security algorithm, if it is not, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Select Encryption Algorithm according to predetermined encryption algorithm priority, alternatively, judge the attributed region of the UE for non-predeterminable area, then root Judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to default integrity protection Algorithm priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm;Or
Judge that the UE does not support default security algorithm according to the security capability information, then judges the home zone of the UE Whether domain is predeterminable area, if so, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then having selected according to default protection algorithm integrallty priority Whole property protection algorism, and/or select empty algorithm as Encryption Algorithm.
In conjunction with the possible implementation of the first of the third aspect or the third aspect, second in the third aspect may Implementation in, further include the first receiving module, for determining the home zone of the UE in the mark according to user equipment (UE) Before domain,
The Redirection Request message that SGSN is sent is received, includes the mark and peace of the UE in the Redirection Request message All-round force information;Or
Receive the Attach Request message that user equipment (UE) is sent, mark in the Attach Request message including the UE and Security capability information;Or
The location update request message that user equipment (UE) is sent is received, includes the UE in the location update request message Mark and security capability information.
Further include the second receiving module in the third possible implementation of the third aspect in conjunction with the third aspect, uses Before the attributed region in the determining UE of mark according to user equipment (UE),
The Redirection Request message that SGSN is sent is received, includes the mark of the UE in the Redirection Request message, or Person, the MME receive the location update request message that user equipment (UE) is sent, and include described in the location update request message The mark of UE,
The judgment module is specifically used for: judging in the Redirection Request message or the location update request message not Including the security capability information, and the attributed region of the UE is predeterminable area, then excellent according to protection algorithm integrallty is preset First grade selects protection algorithm integrallty, and/or selects Encryption Algorithm according to predetermined encryption algorithm priority;Or
Judge in the Redirection Request message or the location update request message not including the security capability information, And the attributed region of the UE is non-predeterminable area, then the MME is selected complete according to default protection algorithm integrallty priority Property protection algorism, and/or select empty algorithm as Encryption Algorithm.
In conjunction with the third aspect, the third aspect the first to the third any possible implementation, in the third aspect The 4th kind of possible implementation in, the determining module is specifically used for:
It is identified as international mobile subscriber identity IMSI described in determination, then MNC and MCC is obtained according to the IMSI, according to The MNC and MCC judges the attributed region of the UE;Or
It determines that the identification code is temporary identifier, then obtains the corresponding IMSI of the temporary identifier, and according to the IMSI MNC and MCC is obtained, the attributed region of the UE is judged according to the MNC and the MCC;Or
It is identified as mobile subscriber number MSISDN described in determination, then determines the home zone of the UE according to the MSISDN Domain;Or
Identification request message is sent to network entity device, the identification request message includes the mark, and receives institute The identification response message of network entity device transmission is stated, the identification response message includes the attributed region of the UE, Huo Zhesuo Stating identification response message includes that can recognize mark, so that the MME determines the home zone of the UE according to the recognizable mark Domain.
Fourth aspect, the embodiment of the present invention provide a kind of base station, comprising:
Module is obtained, for obtaining the attributed region of user equipment (UE) and the security capability information of the UE, or acquisition The security algorithm information of UE;
Judgment module, for according to the attributed region of the UE and the security capability information of the UE, or according to described Security algorithm information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty;
Wherein, the security algorithm information includes the security capability information of UE, algorithms selection instruction, the available encryption calculation of UE It is any or combinations thereof in method and protection algorithm integrallty.
In conjunction with fourth aspect, in the first possible implementation of the fourth aspect, the judgment module is specifically used for:
Judge that the attributed region of the UE for predeterminable area, then judges that the UE is according to the security capability information of the UE It is no to support default security algorithm, if it is not, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Select Encryption Algorithm according to predetermined encryption algorithm priority, alternatively, judge the attributed region of the UE for non-predeterminable area, then root Judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to default integrity protection Algorithm priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm;Or
Judge that the UE does not support default security algorithm according to the security capability information of the UE, then judges returning for the UE Belong to whether region is predeterminable area, if so, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, And/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then according to default protection algorithm integrallty priority choosing Protection algorithm integrallty is selected, and/or selects empty algorithm as Encryption Algorithm.
In conjunction with the possible implementation of the first of fourth aspect or fourth aspect, second in fourth aspect may Implementation in, the acquisition module is specifically used for:
The attaching information and security capability information of the UE that mobile management entity MME is sent are received, and is returned according to described Belong to the attributed region that the region instruction in information determines the UE;Or
The switching request message that the MME is sent is received, the handoff request message includes the security capabilities letter of the UE The attributed region of breath and the UE.
In conjunction with fourth aspect, in the third possible implementation of the fourth aspect, the judgment module is specifically used for:
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management The available protection algorithm integrallty of the UE and/or Encryption Algorithm, the protection algorithm integrallty that entity MME is sent are described Included protection algorithm integrallty in the security capability information of UE, the Encryption Algorithm are empty algorithm;Or
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management The first algorithms selection instruction that entity MME is sent, the first algorithms selection instruction is to indicate the base station selected empty algorithm Protection algorithm integrallty or described first is selected as Encryption Algorithm, and/or according to default protection algorithm integrallty priority Algorithms selection instruction to indicate the base station according to default protection algorithm integrallty priority selection protection algorithm integrallty, And/or forbid Encryption Algorithm other than the base station selected empty algorithm.
In conjunction with fourth aspect, in the fourth possible implementation of the fourth aspect, the judgment module is specifically used for: If the attributed region of the UE is predeterminable area, the base station receives the safe energy for the UE that mobile management entity MME is sent Force information, and judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to default Protection algorithm integrallty priority selects protection algorithm integrallty, and/or selects encryption to calculate according to predetermined encryption algorithm priority Method;Or
If the attributed region of the UE is predeterminable area, the UE does not support default security algorithm, it is real to receive mobile management The second algorithms selection instruction that body MME is sent, the second algorithms selection instruction is to indicate the base station according to default complete Property protection algorism priority select protection algorithm integrallty, and/or according to predetermined encryption algorithm priority select Encryption Algorithm;Or Person
If the attributed region of the UE is predeterminable area, the UE supports default security algorithm, receives mobile management entity The third algorithm that MME is sent selects instruction, and the third algorithm selection instruction is to indicate that the base station is calculated according to default safety Method determines protection algorithm integrallty and/or Encryption Algorithm.
In conjunction with the third or the 4th kind of possible implementation of fourth aspect, in the 5th kind of possible reality of fourth aspect In existing mode, further includes:
Sending module, for sending the security capability information of the base station to the MME, so that described in the MME is determining The security algorithm information of UE.
Non-Access Stratum, access layer security algorithm processing method and equipment provided in an embodiment of the present invention.Access layer safety Algorithm process method, comprising: mobile management entity MME determines the attributed region of the UE according to the mark of user equipment (UE);Institute State MME according to the attributed region of the UE and the security capability information of the UE judge the available Encryption Algorithm of the UE and/or Protection algorithm integrallty.Non-Access Stratum, access layer security algorithm processing method and equipment provided in this embodiment can be user Equipment provides the protection mechanism of safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with It obtains other drawings based on these drawings.
Fig. 1 is the flow chart of Non-Access Stratum security algorithm processing method embodiment one of the present invention;
Fig. 2 is the signaling process figure of Non-Access Stratum security algorithm processing method embodiment one of the present invention;
Fig. 3 is the flow chart of access layer security algorithm processing method embodiment one of the present invention;
Fig. 4 is the signaling process figure one of access layer security algorithm processing method embodiment one of the present invention;
Fig. 5 is the signaling process figure two of access layer security algorithm processing method embodiment one of the present invention;
Fig. 6 is the structural schematic diagram of mobile management entity embodiment one of the present invention;
Fig. 7 is the structural schematic diagram of mobile management entity embodiment two of the present invention;
Fig. 8 is the structural schematic diagram of base station embodiment one of the present invention;
Fig. 9 is the structural schematic diagram of base station embodiment two of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The security algorithm processing method of Non-Access Stratum and access layer is described in detail in the embodiment of the present invention.Wherein, it connects Enter the process of layer and the process of Non-Access Stratum, really from the angle of protocol stack.In protocol stack, wireless heterogeneous networks (Radio Resource Control, referred to as: RRC) and wireless access network application obscure portions (Radio Access Network Application Part, abbreviation RANAP) layer and its protocol layer below be known as access layer, the session management on them (Session Management, referred to as: SM), Call- Control1 (Call Control, referred to as: CC), short message service (Short Message Service, referred to as: SMS) etc. be known as Non-Access Stratum.Briefly, the process of access layer, that is, refer to and wirelessly connect Enter equipment radio network controller (Radio Network Controller, referred to as: RNC), the base station the UMTS (UMTS of layer Base Station, abbreviation NodeB) need participate in processing process.The process of Non-Access Stratum just refers to only UE and core net (Core Network, referred to as: CN) signaling process to be treated, Radio Access Network RNC, NodeB be not required to it is to be processed.
Fig. 1 is the flow chart of Non-Access Stratum security algorithm processing method embodiment one of the present invention.As shown in Figure 1, this implementation The executing subject of example is mobile management entity (Mobility Management Entity, abbreviation MME), which can pass through Software and or hardware realization.Non-Access Stratum security algorithm processing method provided in this embodiment includes:
Step 101, mobile management entity MME determine the attributed region of the UE according to the mark of user equipment (UE);
Step 102, the MME judge that the UE can according to the attributed region of the UE and the security capability information of the UE Encryption Algorithm and/or protection algorithm integrallty.
In a communications system, the Non-Access Stratum (Non- between MME and user equipment (User Equipment, abbreviation UE) Access Stratum, abbreviation NAS) in signaling connection, there are NAS security mechanisms, once security process is established, all NAS Layer signaling all can be by safeguard protection, including encryption and integrity protection.
During specific implementation, Encryption Algorithm (EPS Enerption Algorithm, abbreviation EEA) is selected by MME And/or protection algorithm integrallty (EPS Integrity Algorithm, abbreviation EIA).In 3 gpp, SNOW3G, aes algorithm Corresponding EEA and EIA are respectively included with ZUC algorithm, wherein SNOW3G algorithm includes EEA1 and EIA1, and aes algorithm includes EEA2 and EIA2, ZUC algorithm include EEA3 and EIA3.
In a step 101, MME determines the attributed region of the UE according to the mark of UE.During specific implementation, MME It include following possible implementation according to the attributed region for determining UE is identified.
A kind of possible implementation are as follows: be identified as IMSI International Mobile Subscriber Identity (International described in MME is determining Mobile Subscriber Identity, referred to as: IMSI), then mobile network code (Mobile is obtained according to the IMSI Network Code, abbreviation MNC) and Mobile Country Code MCC (Mobile Country Code, abbreviation MCC), according to the MNC and The MCC judges the attributed region of the UE.
Specifically, MME can be parsed out MNC and MCC according to IMSI, and MCC can be with state belonging to unique identification mobile subscriber Family, distinguish each user from country, therefore international roaming may be implemented.In same country, if there is multiple Mobile Network Operator can be distinguished by MNC.Therefore, the attributed region that may determine that UE according to MNC and MCC, can To determine the attributed region of UE as predeterminable area or non-predeterminable area, wherein predeterminable area can be foreign countries, and non-predeterminable area can Think the country.For example, MME determines that the UE is Foreign User according to MCC, or determines that the UE is domestic user according to MCC, according to MNC determines the UE Mobile Network Operator.
Alternatively possible implementation are as follows: be identified as temporary identifier described in the MME is determining, then obtain the interim mark Know corresponding IMSI, and MNC and MCC is obtained according to the IMSI, the ownership of the UE is judged according to the MNC and the MCC Region.
Specifically, MME determination is identified as temporary identifier, for example, the temporary identifier is interim identity (Temporary Mobile Subscriber Identity, abbreviation TMSI), then MME determines the TMSI according to the corresponding relationship of TMSI and IMSI Then corresponding IMSI obtains MNC and MCC according to IMSI, and judges the attributed region of UE.The temporary identifier can also be the whole world Unique temporary identity accord with (Globally Unique Temporary Identifier, abbreviation GUTI), MME according to GUTI with The corresponding relationship of IMSI determines the corresponding IMSI of the GUTI, then obtains MNC and MCC according to IMSI, and judge the home zone of UE Domain.
Another possible implementation are as follows: be identified as mobile subscriber number (Mobile described in the MME is determining Subscriber International ISDN/PSTN number, abbreviation MSISDN), then institute is determined according to the MSISDN State the attributed region of UE.
Specifically, MME determines that identification code determines UE's according to the corresponding relationship of MSISDN and attributed region for MSISDN Attributed region.
Another possible implementation are as follows: the MME sends identification request message, the identification to network entity device Request message includes the mark, and receives the identification response message that the network entity device is sent, and the identification response disappears Breath includes the attributed region of the UE.
Specifically, the determination of the attributed region of UE is determined that MME is without judgement by other network entity devices.MME can Include mark in the identification response message to send identification response message to network entity device, the network entity device according to The mark judges the attributed region of UE.Then network entity device sends identification response message, identification response to MME Message includes the attributed region of UE.It will be understood by those skilled in the art that ownership of the network entity device according to mark interpretation UE The mode in region, according to identifying, the determining mode of attributed region of UE is similar, and details are not described herein again for the present embodiment with MME.
The security capability information of UE refers to the security algorithm that UE is supported, the security algorithm that different UE is supported is different, for example, UE supports default security algorithm, which is that Zu Chongzhi algorithm (ZUC) or the UE do not support ZUC algorithm, supports SNOW3G, aes algorithm, then alternatively, the UE supports ZUC algorithm, support SNOW3G, aes algorithm.
In a step 102, MME according to the attributed region and security capability information of UE determine the available Encryption Algorithm of UE and/ Or protection algorithm integrallty.That is MME not only considers the security capability information of UE, determines that UE is available also according to the attributed region of UE Encryption Algorithm and/or protection algorithm integrallty.For example, when UE does not support default security algorithm, if the attributed region of UE is pre- If region, then protection algorithm integrallty is selected according to default protection algorithm integrallty priority, it is preferential according to predetermined encryption algorithm Grade selection Encryption Algorithm, if the attributed region of UE is non-predeterminable area, according to default protection algorithm integrallty priority choosing Protection algorithm integrallty is selected, and selects empty algorithm as Encryption Algorithm.It will be understood by those skilled in the art that MME can only root The available Encryption Algorithm of UE is judged according to attributed region and security capability information, determines that the integrity protection of UE is calculated according to the prior art Method, alternatively, MME can judge the available protection algorithm integrallty of UE according only to attributed region and security capability information, according to existing There is technology to determine the Encryption Algorithm of UE, alternatively, MME judges the available Encryption Algorithm of UE according to attributed region and security capability information And protection algorithm integrallty.
After step 102, MME sends Security Mode Command message to UE, and Security Mode Command message includes UE available Encryption Algorithm and protection algorithm integrallty, the protection algorithm integrallty that UE uses MME to specify, calculation of integrity protection algorism is close Key simultaneously carries out integrity protection check to message, if examining successfully, UE sends safe mode to MME and completes message, and MME receives institute The safe mode for stating UE transmission completes message, establishes Non-Access Stratum NAS security process.NAS signaling afterwards will use should Encryption Algorithm and protection algorithm integrallty carry out safeguard protection.
Non-Access Stratum security algorithm processing method provided in an embodiment of the present invention, mobile management entity MME are set according to user The mark of standby UE determines the attributed region of the UE;The MME is according to the attributed region of the UE and the security capabilities of the UE Information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty, and safe protection can be provided for all UE Mechanism.
The mark of UE and the different modes of security capability information are determined below according to MME, using several specific embodiments, Non-Access Stratum security algorithm processing method in the embodiment of the present invention is described in detail.
In one possible implementation, the mobile management entity MME determines institute according to the mark of user equipment (UE) Before the attributed region for stating UE, MME can obtain the mark and security capability information of UE simultaneously.
Specifically, MME can determine the mark and security capability information of UE by following situation.
A kind of possible situation, under the redirection scene of UE, MME receives the Redirection Request message that SGSN is sent, institute State the mark and security capability information in Redirection Request message including the UE.
Alternatively possible situation, when UE is established and is connected to the network, the MME receives the attachment that user equipment (UE) is sent and asks Message is sought, includes the mark and security capability information of the UE in the Attach Request message.
Another possible situation, when UE carries out location updating, the MME receives the position of user equipment (UE) transmission more New request message includes the mark and security capability information of the UE in the location update request message.
After MME gets mark and the security capability information of UE, MME determines the home zone of UE according to the mark of UE Domain, then MME according to the attributed region and the security capability information of the UE judge the available Encryption Algorithm of the UE and/or Protection algorithm integrallty specifically includes following possible situation.
A kind of possible situation is that MME first judges the attributed region of UE, and the encryption of UE is determined further according to security capability information Algorithm and/or protection algorithm integrallty, specific as follows shown:
If the MME judges that the attributed region of the UE for predeterminable area, is sentenced according to the security capability information of the UE Whether the UE that breaks supports default security algorithm, if it is not, selecting integrity protection according to default protection algorithm integrallty priority Algorithm, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority.
During specific implementation, when MME judges that the attributed region of UE for predeterminable area, then continues the security capabilities according to UE Information judges whether UE supports to preset security algorithm, if supporting, using the default corresponding Encryption Algorithm of security algorithm and completely Property protection algorism.For example, then UE can use EEA3 and EIA3 when default security algorithm is ZUC.When UE does not support default security algorithm When, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or according to predetermined encryption algorithm priority Select Encryption Algorithm.
If the MME judges the attributed region of the UE for non-predeterminable area, according to the security capability information of the UE Judge whether the UE supports default security algorithm, if it is not, selecting integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or selects empty algorithm as Encryption Algorithm.
During specific implementation, when MME judges that the attributed region of UE for non-predeterminable area, then continues the safe energy according to UE Force information judges whether UE supports default security algorithm, if supporting, using the default corresponding Encryption Algorithm of security algorithm and complete Whole property protection algorism.When UE does not support default security algorithm, integrality is selected according to default protection algorithm integrallty priority Protection algorism, and/or select empty algorithm as Encryption Algorithm, empty algorithm is not implemented to encrypt.
Alternatively possible situation, MME first judge security capability information, then judge the attributed region of UE, specific as follows:
The MME judges that the UE does not support default security algorithm according to the security capability information, then judges the UE Attributed region whether be predeterminable area, if so, according to default protection algorithm integrallty priority select integrity protection calculate Method, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then preferential according to protection algorithm integrallty is preset Grade selection protection algorithm integrallty, and/or select empty algorithm as Encryption Algorithm.
Specifically, MME first judges that UE does not support default security algorithm according to security capability information, then judges the ownership of UE Whether region is predeterminable area.If predeterminable area, then MME selects integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority.If non-predeterminable area, then MME is according to having preset Whole property protection algorism priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm.
In alternatively possible implementation, MME only obtains security capability information, the mark without getting UE. It is specific as follows:
The MME receives the Redirection Request message that SGSN is sent, and includes the UE's in the Redirection Request message Mark;Alternatively, the MME receives the location update request message that user equipment (UE) is sent, in the location update request message Mark including the UE.
At this point, the MME judges not include described in the Redirection Request message or the location update request message Security capability information, and the attributed region of the UE is predeterminable area, then the MME is preferential according to default protection algorithm integrallty Grade selection protection algorithm integrallty, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority;Or
The MME judges not include the safe energy in the Redirection Request message or the location update request message Force information, and the attributed region of the UE is non-predeterminable area, then the MME is selected according to default protection algorithm integrallty priority Protection algorithm integrallty is selected, and/or selects empty algorithm as Encryption Algorithm.
In above-mentioned each possible implementation, when default security algorithm is ZUC algorithm, for predetermined encryption algorithm Priority, the priority of EEA3 are higher than EEA1 and EEA2, and the priority of EEA1, could possibly be higher than EEA2, it is also possible to it is lower than EEA2, The present embodiment is not particularly limited herein.When the priority of EEA1 is high, then EEA1 is selected, when the priority of EEA2 is high, then Select EEA2.For presetting protection algorithm integrallty priority, the priority of EIA3 is higher than EIA1 and EIA2, and EIA1's is preferential Grade, could possibly be higher than EIA2, it is also possible to be lower than EIA2, the present embodiment is not particularly limited herein.When the priority of EIA1 is high, then Selection EIA1 then selects EIA2 when the priority of EIA2 is high.It will be understood by those skilled in the art that when default security algorithm When for other algorithms, the priority of EEA3 can be lower than EEA1 and EEA2, and the priority of EIA3 is lower than EIA1 and EIA2.For pre- If security algorithm is other algorithms, the priority of EEA3, EEA1, EEA2, the priority of EIA3, EIA1, EIA2, the present embodiment is not It is particularly limited.
Fig. 2 is the signaling process figure of Non-Access Stratum security algorithm processing method embodiment one of the present invention.The present embodiment is to non- The signaling process of access layer security algorithm processing method is illustrated.
Step 201, UE send Attach Request message to MME;
It will be understood by those skilled in the art that UE not only can send Attach Request message to MME, can also be sent out to MME Send location update request message.Alternatively, Redirection Request message can also be sent to MME for SGSN.MME can be according to above-mentioned three Kind message determines the mark and security capability information of user equipment (UE).Specific method of determination, reference can be made to embodiment illustrated in fig. 1.
Step 202, MME sentence according to the attributed region for determining UE is identified according to the attributed region of UE and security capability information The disconnected available Encryption Algorithm of UE and/or protection algorithm integrallty;
MME judges the process of the available Encryption Algorithm of UE and/or protection algorithm integrallty, and for details, reference can be made to real shown in Fig. 1 Apply example.
Step 203, MME send Security Mode Command message to UE;
Step 204, UE send safe mode to MME and complete message.
Non-Access Stratum security algorithm processing method provided in an embodiment of the present invention, mobile management entity MME are set according to user The mark of standby UE determines the attributed region of the UE;The MME is according to the attributed region of the UE and the security capabilities of the UE Information judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty, and safe protection can be provided for all UE Mechanism.
Fig. 3 is the flow chart of access layer security algorithm processing method embodiment one of the present invention.As shown in figure 3, the present embodiment Executing subject be base station, which can pass through software and or hardware realization.Access layer security algorithm provided in this embodiment Processing method includes:
Step 301, base station obtain the attributed region of user equipment (UE) and the security capability information of the UE, or obtain UE Security algorithm information;
Step 302, the base station are according to the attributed region of the UE and the security capability information of the UE, or according to institute It states security algorithm information and judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty.
Wherein, the security algorithm information includes the security capability information of UE, algorithms selection instruction, the available encryption calculation of UE It is any or combinations thereof in method and protection algorithm integrallty.
Large number of due to base station deployment, distribution area is wide, and no matter each network entity is from geographical location between access layer On still in logic all in high degree of dispersion, operator can not carry out in safe collection it and control, and each base station is all in non- Safety zone, so each base station requires to be selected according to the security capabilities of UE between each UE for access layer security mechanism Security algorithm.
In step 301, base station obtains the attributed region of user equipment (UE) and security capability information includes that following two can The case where energy.
A kind of possible situation are as follows: the base station receive the UE that mobile management entity MME is sent attaching information and Security capability information, and according to the attributed region of the determining UE of region instruction in the attaching information.
Specifically, there are many implementations of the region instruction in attaching information, for example, region instruction can with " 0 " or " 1 " indicates, wherein 0 indicates non-predeterminable area, it can be the country, 1 indicates predeterminable area, can be foreign countries;Or region instruction With character representation, non-predeterminable area such as is indicated with " domestic ", can be the country, indicates default with " international " Region can be foreign countries.
Alternatively possible situation are as follows: the base station receives the switching request message that the MME is sent, the switching request Message includes the security capability information of the UE and the attributed region of the UE.
Under handoff scenario, base station receives the switching request message that MME is sent, and handoff request message includes the peace of the UE The attributed region of all-round force information and the UE.
Secondly, base station can receive the UE security algorithm information that MME is sent, wherein the security algorithm information of UE includes UE's Any in security capability information, algorithms selection instruction, the available Encryption Algorithm of UE and protection algorithm integrallty.
In step 302, base station according to the attributed region and security capability information of the UE judge the UE it is available plus Close algorithm and/or protection algorithm integrallty.
It will be understood by those skilled in the art that base station can judge that base station can according only to attributed region and security capability information Encryption Algorithm determines the protection algorithm integrallty of UE according to the prior art, alternatively, base station can according only to attributed region and Security capability information judges the available protection algorithm integrallty of UE, and the Encryption Algorithm of UE is determined according to the prior art, alternatively, base station The available Encryption Algorithm of UE and protection algorithm integrallty are judged according to attributed region and security capability information.Can specifically include with Lower possible situation.
A kind of possible situation, base station first judge the attributed region of UE, and the encryption of UE is determined further according to security capability information Algorithm and/or protection algorithm integrallty, specific as follows shown:
If the base station judges that the attributed region of the UE for predeterminable area, is sentenced according to the security capability information of the UE Whether the UE that breaks supports default security algorithm, if it is not, selecting integrity protection according to default protection algorithm integrallty priority Algorithm, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority;
During specific implementation, when base station judges that the attributed region of UE for predeterminable area, then continues the safe energy according to UE Force information judges whether UE supports default security algorithm, if supporting, using the default corresponding Encryption Algorithm of security algorithm and complete Whole property protection algorism.For example, then UE can use EEA3 and EIA3 when default security algorithm is ZUC.When UE does not support default safety to calculate When method, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or preferential according to predetermined encryption algorithm Grade selection Encryption Algorithm.It will be understood by those skilled in the art that the locally-supported security algorithm in base station include ZUC, AES, SNOW3G。
If the base station judges the attributed region of the UE for non-predeterminable area, according to the security capability information of the UE Judge whether the UE supports default security algorithm, if it is not, selecting integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or selects empty algorithm as Encryption Algorithm.
Specifically, when base station judges that the attributed region of UE for non-predeterminable area, then continues the security capability information according to UE Judge whether UE supports default security algorithm, if supporting, is protected using the default corresponding Encryption Algorithm of security algorithm and integrality Protect algorithm.When UE does not support default security algorithm, integrity protection is selected to calculate according to default protection algorithm integrallty priority Method, and/or select empty algorithm as Encryption Algorithm, empty algorithm is not implemented to encrypt.
Alternatively possible situation, base station first judges the security capability information of UE, then attributed region, further according to security capabilities Information determines the Encryption Algorithm and/or protection algorithm integrallty of UE, specific as follows shown:
The base station judges that the UE does not support default security algorithm according to the security capability information of the UE, then judges institute Whether the attributed region for stating UE is predeterminable area, if so, selecting integrality to protect according to default protection algorithm integrallty priority Algorithm is protected, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then according to default protection algorithm integrallty Priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm.
Specifically, base station first judges that the UE does not support default security algorithm according to the security capability information of UE, then sentences Whether the attributed region of disconnected UE is predeterminable area, if predeterminable area, then according to default protection algorithm integrallty priority selection Protection algorithm integrallty, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if non-predeterminable area, then basis Predetermined encryption algorithm priority selects Encryption Algorithm, and/or selects empty algorithm as Encryption Algorithm.
In above-mentioned each possible implementation, when default security algorithm is ZUC algorithm, for predetermined encryption algorithm Priority, the priority of EEA3 are higher than EEA1 and EEA2, and the priority of EEA1, could possibly be higher than EEA2, it is also possible to it is lower than EEA2, The present embodiment is not particularly limited herein.When the priority of EEA1 is high, then EEA1 is selected, when the priority of EEA2 is high, then Select EEA2.For presetting protection algorithm integrallty priority, the priority of EIA3 is higher than EIA1 and EIA2, and EIA1's is preferential Grade, could possibly be higher than EIA2, it is also possible to be lower than EIA2, the present embodiment is not particularly limited herein.When the priority of EIA1 is high, then Selection EIA1 then selects EIA2 when the priority of EIA2 is high.It will be understood by those skilled in the art that when default security algorithm When for other algorithms, the priority of EEA3 can be lower than EEA1 and EEA2, and the priority of EIA3 is lower than EIA1 and EIA2.For pre- If security algorithm is other algorithms, the priority of EEA3, EEA1, EEA2, the priority of EIA3, EIA1, EIA2, the present embodiment is not It is particularly limited.
Base station determines the available Encryption Algorithm of UE and/or protection algorithm integrallty according to security algorithm information.Specific implementation In the process, base station can receive the available protection algorithm integrallty of UE and/or Encryption Algorithm or base station that MME is directly transmitted The available protection algorithm integrallty of UE and/or Encryption Algorithm can be determined according to the security capability information of UE, then alternatively, base station can To be indicated to determine the available protection algorithm integrallty of UE and/or Encryption Algorithm according to algorithms selection.
After base station determines the available algorithm and/or Encryption Algorithm of UE, Security Mode Command message, safety are sent to UE Mode Command Message includes the available Encryption Algorithm of UE and protection algorithm integrallty, and UE is calculated using the integrity protection that base station is specified Method, calculation of integrity protection algorism key simultaneously carries out integrity protection check to message, if examining successfully, UE is sent to base station to be pacified Syntype completes message, and base station receives the safe mode that the UE is sent and completes message, establishes access layer AS security process.With AS signaling afterwards will use the Encryption Algorithm and protection algorithm integrallty to carry out safeguard protection.
Method provided in an embodiment of the present invention, base station obtain the attributed region of user equipment (UE) and the security capabilities of the UE Information, or obtain the security algorithm information of UE;The base station is according to the attributed region of the UE and the security capabilities of the UE Information, or the available Encryption Algorithm of the UE and/or protection algorithm integrallty are judged according to the security algorithm information, it can Safe protection mechanism is provided for UE.
Fig. 4 is the signaling process figure one of access layer security algorithm processing method embodiment one of the present invention.The present embodiment docking Enter a layer signaling process for security algorithm processing method to be illustrated.
Step 401, MME determine the attaching information and security capability information of UE;
Wherein, the attaching information that MME is determined includes the attributed region of UE.
Step 402, MME send the attaching information and security capability information of UE to base station;
Alternatively, MME can also send switching request message to base station, handoff request message includes the security capability information of UE And the attributed region of the UE.Particularly, MME determines the attributed region of UE and the mode of security capability information, reference can be made to non- Access layer security algorithm embodiment.
Step 403, base station according to the attributed region of UE and the security capability information of UE judge the available Encryption Algorithm of UE and/ Or protection algorithm integrallty.
Base station determines the concrete mode of the available Encryption Algorithm of UE and/or protection algorithm integrallty, reference can be made to Fig. 3 is implemented Example.
Step 404, base station send Security Mode Command message to UE;
Step 405, UE receive the safe mode that base station is sent and complete message.
The embodiment of the present invention obtains the attributed region and security capability information of user equipment (UE) by base station;The base station root The available Encryption Algorithm of the UE and/or protection algorithm integrallty are judged according to the attributed region and security capability information of the UE, Safe protection mechanism can be provided for UE.
It further include the security capabilities of MME modification UE in access layer security algorithm processing method provided in this embodiment, or The method of the person MME instruction specific security algorithm of base station selection.It specifically can be as shown in figure 5, Fig. 5 be that access layer of the present invention is calculated safely The signaling process figure two of method processing method embodiment one.As shown in Figure 5, comprising the following steps:
Step 501, MME obtain the security capability information of base station.
During specific implementation, MME obtains the security capability information of base station in the following manner first:
Base station sends the security capability information of base station to MME, and base station can add the machine in the Attach Request message of UE Security capability information, or increase a piece of news newly after context establishes request, include the security capabilities of base station in the message Information;Or
By way of presetting the security capability information of base station, MME obtains the security capability information of base station;Or
The security capability information of base station is sent from Provider Equipment to MME.
Step 502, MME determine the attaching information and security capability information of UE.
It will be understood by those skilled in the art that the sequential relationship that step 501 and step 502 be not stringent.
Step 503, MME modify UE's according to the attributed region of UE, security capability information and the security capability information of base station Security capabilities, and determine algorithms selection instruction.
Step 504, MME send security capabilities and the algorithms selection instruction of modified UE to base station.
MME is directed to the different attributed regions of UE, sends modified Encryption Algorithm to base station and/or integrity protection is calculated Method or algorithms selection instruction.
Step 505, base station are indicated according to the security capabilities and algorithms selection of modified UE, determine the available encryption of UE Algorithm and protection algorithm integrallty.
506, base station sends Security Mode Command message to UE.
507, UE sends safe mode to base station and completes message.
During specific implementation, the realization process of step 503 to step 505 is specific as follows:
A kind of possible implementation, if MME determines that the attributed region of UE is non-predeterminable area, UE does not support default safety Algorithm.It will be understood by those skilled in the art that MME determines that the attributed region of UE is non-predeterminable area, UE does not support default safety Algorithm, the not stringent sequential relationship of the two.Then MME determines the security capability information of UE, and sends security capabilities to base station Information.Specifically include following situations:
A kind of possible situation, MME sends the protection algorithm integrallty and/or Encryption Algorithm of UE to base station, wherein completely Property protection algorism be UE security capability information in include protection algorithm integrallty, Encryption Algorithm is empty algorithm.
Base station receives the protection algorithm integrallty and/or Encryption Algorithm for the UE that mobile management entity MME is sent, described Protection algorithm integrallty is protection algorithm integrallty included in the security capability information of the UE, and the Encryption Algorithm is sky Algorithm.
Alternatively possible situation, MME send the instruction of the first algorithms selection to base station.
Base station receives the first algorithms selection instruction that mobile management entity MME is sent.Wherein, first algorithms selection refers to Show that and/or according to base station to preset protection algorithm integrallty preferential to indicate the base station selected empty algorithm as Encryption Algorithm Grade selection protection algorithm integrallty or first algorithms selection instruction are to indicate that the base station is protected according to default integrality It protects algorithm priority and selects protection algorithm integrallty, and/or forbid the Encryption Algorithm other than the base station selected empty algorithm.
Alternatively possible implementation, if MME determines that the attributed region of UE is predeterminable area.Then MME determines UE's Security capability information, and security capability information is sent to base station.Specifically include following situations:
A kind of possible situation: MME sends the security capability information of UE to base station.
Base station receives the security capability information for the UE that mobile management entity MME is sent, and according to the safety of the UE Ability information judges whether the UE supports default security algorithm, if it is not, the base station is excellent according to default protection algorithm integrallty First grade selects protection algorithm integrallty, and/or selects Encryption Algorithm according to predetermined encryption algorithm priority.
Alternatively possible situation: when MME determines that UE does not support default security algorithm, MME sends the second choosing to base station Select algorithms selection instruction.It will be understood by those skilled in the art that MME determines that UE does not support default security algorithm and MME to determine institute The attributed region for stating UE is predeterminable area, not stringent sequential relationship.
Base station receives the second algorithms selection instruction that MME is sent, and the second algorithms selection instruction is to indicate the base It stands and protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or according to predetermined encryption algorithm priority Select Encryption Algorithm.
Another possible situation, when MME determines that UE supports default security algorithm, MME sends third algorithm to base station Selection instruction.It will be understood by those skilled in the art that MME determines that UE supports default security algorithm and MME to determine returning for the UE Category region is predeterminable area, not stringent sequential relationship.
Base station receives the third algorithm that mobile management entity MME is sent and selects instruction, and the third algorithm selection instruction is used To indicate that the base station determines protection algorithm integrallty and/or Encryption Algorithm according to default security algorithm.
Method provided in an embodiment of the present invention receives the security capabilities of the UE of MME modification by base station or algorithms selection refers to Show, only UE does not provide safe protection base station, also reduces the treating capacity of base station.
Fig. 6 is the structural schematic diagram of mobile management entity embodiment one of the present invention.As shown in fig. 6, provided in this embodiment Mobile management entity 60 includes determining module 601, judgment module 602.
Wherein it is determined that module 601, the attributed region of the UE is determined for the mark according to user equipment (UE);
Judgment module 602, for judging the UE according to the attributed region of the UE and the security capability information of the UE Available Encryption Algorithm and/or protection algorithm integrallty.
The mobile management entity of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1, realize Principle is similar with technical effect, and details are not described herein again.
Fig. 7 is the structural schematic diagram of mobile management entity embodiment two of the present invention.The present embodiment is on the basis of Fig. 6 embodiment Upper realization, specific as follows:
Optionally, the judgment module 602 is specifically used for:
Judge that the attributed region of the UE for predeterminable area, then judges that the UE is according to the security capability information of the UE It is no to support default security algorithm, if it is not, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Select Encryption Algorithm according to predetermined encryption algorithm priority, alternatively, judge the attributed region of the UE for non-predeterminable area, then root Judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to default integrity protection Algorithm priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm;Or
Judge that the UE does not support default security algorithm according to the security capability information, then judges the home zone of the UE Whether domain is predeterminable area, if so, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then having selected according to default protection algorithm integrallty priority Whole property protection algorism, and/or select empty algorithm as Encryption Algorithm.
It optionally, further include the first receiving module 603, for determining returning for the UE according to the mark of user equipment (UE) Before belonging to region,
The Redirection Request message that SGSN is sent is received, includes the mark and peace of the UE in the Redirection Request message All-round force information;Or
Receive the Attach Request message that user equipment (UE) is sent, mark in the Attach Request message including the UE and Security capability information;Or
The location update request message that user equipment (UE) is sent is received, includes the UE in the location update request message Mark and security capability information.
It optionally, further include the second receiving module 604, for determining returning for the UE according to the mark of user equipment (UE) Before belonging to region,
The Redirection Request message that SGSN is sent is received, includes the mark of the UE in the Redirection Request message, or Person, the MME receive the location update request message that user equipment (UE) is sent, and include described in the location update request message The mark of UE,
The judgment module 602 is specifically used for: judging the Redirection Request message or the location update request message In do not include the security capability information, and the attributed region of the UE is predeterminable area, then calculates according to presetting integrity protection Method priority selects protection algorithm integrallty, and/or selects Encryption Algorithm according to predetermined encryption algorithm priority;Or
Judge in the Redirection Request message or the location update request message not including the security capability information, And the attributed region of the UE is non-predeterminable area, then the MME is selected complete according to default protection algorithm integrallty priority Property protection algorism, and/or select empty algorithm as Encryption Algorithm.
Optionally, the determining module 601 is specifically used for:
It is identified as international mobile subscriber identity IMSI described in determination, then MNC and MCC is obtained according to the IMSI, according to The MNC and MCC judges the attributed region of the UE;Or
It determines that the identification code is temporary identifier, then obtains the corresponding IMSI of the temporary identifier, and according to the IMSI MNC and MCC is obtained, the attributed region of the UE is judged according to the MNC and the MCC;Or
It is identified as mobile subscriber number MSISDN described in determination, then determines the home zone of the UE according to the MSISDN Domain;Or
Identification request message is sent to network entity device, the identification request message includes the mark, and receives institute The identification response message of network entity device transmission is stated, the identification response message includes the attributed region of the UE, Huo Zhesuo Stating identification response message includes that can recognize mark, so that the MME determines the home zone of the UE according to the recognizable mark Domain.
The mobile management entity of the present embodiment can be used for executing the technical solution of above method embodiment, realize former Reason is similar with technical effect, and details are not described herein again.
Fig. 8 is the structural schematic diagram of base station embodiment one of the present invention.As shown in figure 8, base station provided in an embodiment of the present invention 80 include: to obtain module 801, judgment module 802.
Wherein, module 801 is obtained, for obtaining the attributed region of user equipment (UE) and the security capability information of the UE, Or obtain the security algorithm information of UE;
Judgment module 802, for according to the attributed region of the UE and the security capability information of the UE, or according to institute It states security algorithm information and judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty;
Wherein, the security algorithm information includes the security capability information of UE, algorithms selection instruction, the available encryption calculation of UE It is any or combinations thereof in method and protection algorithm integrallty.
The base station of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 3, realization principle and skill Art effect is similar, and details are not described herein again.
Fig. 9 is the structural schematic diagram of base station embodiment two of the present invention.The present embodiment realizes on the basis of Fig. 8 embodiment, It is specific as follows:
Optionally, the judgment module 802 is specifically used for:
Judge that the attributed region of the UE for predeterminable area, then judges that the UE is according to the security capability information of the UE It is no to support default security algorithm, if it is not, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, and/or Select Encryption Algorithm according to predetermined encryption algorithm priority, alternatively, judge the attributed region of the UE for non-predeterminable area, then root Judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to default integrity protection Algorithm priority selects protection algorithm integrallty, and/or selects empty algorithm as Encryption Algorithm;Or
Judge that the UE does not support default security algorithm according to the security capability information of the UE, then judges returning for the UE Belong to whether region is predeterminable area, if so, protection algorithm integrallty is selected according to default protection algorithm integrallty priority, And/or Encryption Algorithm is selected according to predetermined encryption algorithm priority, if it is not, then according to default protection algorithm integrallty priority choosing Protection algorithm integrallty is selected, and/or selects empty algorithm as Encryption Algorithm.
Optionally, the acquisition module 801 is specifically used for:
The attaching information and security capability information of the UE that mobile management entity MME is sent are received, and is returned according to described Belong to the attributed region that the region instruction in information determines the UE;Or
The switching request message that the MME is sent is received, the handoff request message includes the security capabilities letter of the UE The attributed region of breath and the UE.
Optionally, the judgment module 802 is specifically used for:
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management The available protection algorithm integrallty of the UE and/or Encryption Algorithm, the protection algorithm integrallty that entity MME is sent are described Included protection algorithm integrallty in the security capability information of UE, the Encryption Algorithm are empty algorithm;Or
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management The first algorithms selection instruction that entity MME is sent, the first algorithms selection instruction is to indicate the base station selected empty algorithm Protection algorithm integrallty or described first is selected as Encryption Algorithm, and/or according to default protection algorithm integrallty priority Algorithms selection instruction to indicate the base station according to default protection algorithm integrallty priority selection protection algorithm integrallty, And/or forbid Encryption Algorithm other than the base station selected empty algorithm.
Optionally, the judgment module 802 is specifically used for: if the attributed region of the UE is predeterminable area, the base station The security capability information for the UE that mobile management entity MME is sent is received, and is judged according to the security capability information of the UE Whether the UE supports default security algorithm, if it is not, selecting integrity protection to calculate according to default protection algorithm integrallty priority Method, and/or Encryption Algorithm is selected according to predetermined encryption algorithm priority;Or
If the attributed region of the UE is predeterminable area, the UE does not support default security algorithm, it is real to receive mobile management The second algorithms selection instruction that body MME is sent, the second algorithms selection instruction is to indicate the base station according to default complete Property protection algorism priority select protection algorithm integrallty, and/or according to predetermined encryption algorithm priority select Encryption Algorithm;Or Person
If the attributed region of the UE is predeterminable area, the UE supports default security algorithm, receives mobile management entity The third algorithm that MME is sent selects instruction, and the third algorithm selection instruction is to indicate that the base station is calculated according to default safety Method determines protection algorithm integrallty and/or Encryption Algorithm.
Optionally, further includes:
Sending module 803, for sending the security capability information of the base station to the MME, so that the MME determines institute State the security algorithm information of UE.
The base station of the present embodiment can be used for executing the technical solution of above method embodiment, realization principle and technology Effect is similar, and details are not described herein again.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (14)

1. a kind of access layer security algorithm processing method characterized by comprising
Mobile management entity MME determines the attributed region of the UE according to the mark of user equipment (UE);
The MME determines the security capability information of UE;
Attributed region, the security capability information of the UE and the security capability information of base station of the MME according to the UE, modification The security capabilities of UE, and determine algorithms selection instruction;
The MME sends the security algorithm information of UE to the base station, and the security algorithm information includes the peace of modified UE All-round power and/or algorithms selection instruction, judge the available Encryption Algorithm of UE according to the security algorithm information for the base station And protection algorithm integrallty.
2. the method according to claim 1, wherein the mobile management entity MME is according to user equipment (UE) Mark determines before the attributed region of the UE, further includes:
The MME receives the Redirection Request message that SGSN is sent, and includes the mark of the UE in the Redirection Request message And security capability information;Or
The MME receives the Attach Request message that user equipment (UE) is sent, and includes the mark of the UE in the Attach Request message Knowledge and security capability information;Or
The MME receives the location update request message that user equipment (UE) is sent, and includes institute in the location update request message State the mark and security capability information of UE.
3. method according to claim 1 or 2, which is characterized in that the mobile management entity MME is according to user equipment (UE) Mark determine the attributed region of the UE, comprising:
The MME is identified as international mobile subscriber identity IMSI described in determining, then obtains MNC and MCC, root according to the IMSI The attributed region of the UE is judged according to the MNC and the MCC;Or
The MME determines that the identification code is temporary identifier, then obtains the corresponding IMSI of the temporary identifier, and according to described IMSI obtains MNC and MCC, and the attributed region of the UE is judged according to the MNC and the MCC;Or
The MME is identified as mobile subscriber number MSISDN described in determining, then the ownership of the UE is determined according to the MSISDN Region;Or
The MME sends identification request message to network entity device, and the identification request message includes the mark, and is received The identification response message that the network entity device is sent, the identification response message include the attributed region of the UE, or The identification response message includes that can recognize mark, so that the MME determines the ownership of the UE according to the recognizable mark Region.
4. a kind of access layer security algorithm processing method characterized by comprising
Base station sends the security capability information of base station to mobile management entity MME;
The base station receives security capabilities and/or the algorithms selection instruction for the modified user equipment (UE) that MM is sent;
The base station judges that the available encryption of the UE is calculated according to the instruction of the security capabilities and algorithms selection of the modified UE Method and/or protection algorithm integrallty;
Wherein, the security capabilities of the modified UE and algorithms selection instruction be the MME according to the attributed region of the UE, What security capability information and the security capability information of base station determined.
5. according to the method described in claim 4, it is characterized in that, the base station obtains the security algorithm information of UE, according to institute The security algorithm information for stating UE judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty, comprising:
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, and the base station receives MME hair The available protection algorithm integrallty of the UE and/or Encryption Algorithm sent, the protection algorithm integrallty are the safety of the UE Included protection algorithm integrallty in ability information, the Encryption Algorithm are empty algorithm;Or
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, and the base station receives movement The first algorithms selection instruction that management entity MME is sent, the first algorithms selection instruction is to indicate the base station selected sky Algorithm selects protection algorithm integrallty or described as Encryption Algorithm, and/or according to default protection algorithm integrallty priority The instruction of first algorithms selection is to indicate that the base station selects integrity protection to calculate according to default protection algorithm integrallty priority Method, and/or forbid the Encryption Algorithm other than the base station selected empty algorithm.
6. according to the method described in claim 4, it is characterized in that, the base station obtains the security algorithm information of UE, according to institute The security algorithm information for stating UE judges the available Encryption Algorithm of the UE and/or protection algorithm integrallty, comprising:
If the attributed region of the UE is predeterminable area, the base station receives the peace for the UE that mobile management entity MME is sent All-round force information, and judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, described Base station selects protection algorithm integrallty according to default protection algorithm integrallty priority, and/or preferential according to predetermined encryption algorithm Grade selection Encryption Algorithm;Or
If the attributed region of the UE is predeterminable area, the UE does not support default security algorithm, and the base station receives moving tube The second algorithms selection instruction that entity MME is sent is managed, the second algorithms selection instruction is to indicate the base station according to default Protection algorithm integrallty priority selects protection algorithm integrallty, and/or selects encryption to calculate according to predetermined encryption algorithm priority Method;Or
If the attributed region of the UE is predeterminable area, the UE supports default security algorithm, and the base station receives mobile management The third algorithm that entity MME is sent selects instruction, and the third algorithm selection instruction is to indicate the base station according to default peace Full algorithm determines protection algorithm integrallty and/or Encryption Algorithm.
7. method according to claim 5 or 6, which is characterized in that the method also includes:
The base station sends the security capability information of the base station to the MME, so that the MME determines that the safety of the UE is calculated Method information.
8. a kind of mobile management entity characterized by comprising
Determining module determines the attributed region of the UE for the mark according to user equipment (UE);
The determining module is also used to: determining the security capability information of UE;
The determining module is also used to: according to the safety of the attributed region of the UE, the security capability information of the UE and base station Ability information modifies the security capabilities of UE, and determines algorithms selection instruction;
Sending module, for sending the security algorithm information of UE to the base station, the security algorithm information includes modified The security capabilities and/or algorithms selection of UE indicates, judges that UE is available according to the security algorithm information for the base station and adds Close algorithm and protection algorithm integrallty.
9. mobile management entity according to claim 8, which is characterized in that further include the first receiving module, in institute Before stating the attributed region that determining module determines the UE according to the mark of user equipment (UE),
Receive the Redirection Request message that SGSN is sent, mark and safe energy in the Redirection Request message including the UE Force information;Or
The Attach Request message that user equipment (UE) is sent is received, includes the mark and safety of the UE in the Attach Request message Ability information;Or
The location update request message that user equipment (UE) is sent is received, includes the mark of the UE in the location update request message Knowledge and security capability information.
10. mobile management entity according to claim 8 or claim 9, which is characterized in that the determining module is specifically used for:
It is identified as international mobile subscriber identity IMSI described in determination, then MNC and MCC is obtained according to the IMSI, according to described The MNC and MCC judges the attributed region of the UE;Or
It determines that the identification code is temporary identifier, then obtains the corresponding IMSI of the temporary identifier, and obtain according to the IMSI MNC and MCC judges the attributed region of the UE according to the MNC and the MCC;Or
It is identified as mobile subscriber number MSISDN described in determination, then determines the attributed region of the UE according to the MSISDN;Or Person
Identification request message is sent to network entity device, the identification request message includes the mark, and receives the net Network entity device send identification response message, it is described identification response message include the UE attributed region or the knowledge Holding your noise and answering message includes that can recognize mark, so that MME determines the attributed region of the UE according to the recognizable mark.
11. a kind of base station characterized by comprising
Sending module, for sending the security capability information of base station to mobile management entity MME;
Module is obtained, for receiving security capabilities and/or the algorithms selection instruction of the modified user equipment (UE) of MM transmission;
Judgment module adds for judging that the UE is available according to the instruction of the security capabilities and algorithms selection of the modified UE Close algorithm and/or protection algorithm integrallty;
Wherein, the security capabilities of the modified UE and algorithms selection instruction be the MME according to the attributed region of the UE, What security capability information and the security capability information of base station determined.
12. base station according to claim 11, which is characterized in that the judgment module is specifically used for:
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management entity The available protection algorithm integrallty of the UE and/or Encryption Algorithm that MME is sent, the protection algorithm integrallty are the UE's Included protection algorithm integrallty in security capability information, the Encryption Algorithm are empty algorithm;Or
If the attributed region of the UE is non-predeterminable area, the UE does not support default security algorithm, receives mobile management entity The first algorithms selection instruction that MME is sent, the first algorithms selection instruction is to indicate the base station selected empty algorithm conduct Encryption Algorithm, and/or protection algorithm integrallty or first algorithm are selected according to default protection algorithm integrallty priority Selection instruction to indicate the base station according to default protection algorithm integrallty priority selection protection algorithm integrallty, and/or Forbid the Encryption Algorithm other than the base station selected empty algorithm.
13. base station according to claim 11, which is characterized in that the judgment module is specifically used for:
If the attributed region of the UE is predeterminable area, the base station receives the peace for the UE that mobile management entity MME is sent All-round force information, and judge whether the UE supports default security algorithm according to the security capability information of the UE, if it is not, according to Default protection algorithm integrallty priority selects protection algorithm integrallty, and/or is added according to the selection of predetermined encryption algorithm priority Close algorithm;Or
If the attributed region of the UE is predeterminable area, the UE does not support default security algorithm, receives mobile management entity MME The the second algorithms selection instruction sent, the second algorithms selection instruction is to indicate the base station according to default integrity protection Algorithm priority selects protection algorithm integrallty, and/or selects Encryption Algorithm according to predetermined encryption algorithm priority;Or
If the attributed region of the UE is predeterminable area, the UE supports default security algorithm, receives mobile management entity MME hair The third algorithm selection instruction sent, the third algorithm selection instruction is to indicate that the base station is determined according to default security algorithm Protection algorithm integrallty and/or Encryption Algorithm.
14. base station according to claim 12 or 13, which is characterized in that further include:
Sending module, for sending the security capability information of the base station to the MME, so that the MME determines the UE's Security algorithm information.
CN201310226174.5A 2013-06-07 2013-06-07 Non-Access Stratum, access layer security algorithm processing method and equipment Active CN104244247B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310226174.5A CN104244247B (en) 2013-06-07 2013-06-07 Non-Access Stratum, access layer security algorithm processing method and equipment
PCT/CN2014/078658 WO2014194787A1 (en) 2013-06-07 2014-05-28 Non-access layer and access layer security algorithm processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310226174.5A CN104244247B (en) 2013-06-07 2013-06-07 Non-Access Stratum, access layer security algorithm processing method and equipment

Publications (2)

Publication Number Publication Date
CN104244247A CN104244247A (en) 2014-12-24
CN104244247B true CN104244247B (en) 2019-02-05

Family

ID=52007550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310226174.5A Active CN104244247B (en) 2013-06-07 2013-06-07 Non-Access Stratum, access layer security algorithm processing method and equipment

Country Status (2)

Country Link
CN (1) CN104244247B (en)
WO (1) WO2014194787A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967984B (en) * 2015-04-29 2019-04-05 大唐移动通信设备有限公司 A kind of method and system for the information obtaining user equipment
CN106792676B (en) * 2017-02-10 2018-03-20 北京浩瀚深度信息技术股份有限公司 The decryption method and device of NAS message inside a kind of LTE system
CN110121168B (en) * 2018-02-06 2021-09-21 华为技术有限公司 Security negotiation method and device
KR102412441B1 (en) 2018-04-04 2022-06-22 지티이 코포레이션 Techniques for managing integrity protection
CN115118419B (en) * 2022-08-25 2022-12-20 广州万协通信息技术有限公司 Data transmission method of security chip, security chip device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564513A (en) * 2004-04-02 2005-01-12 中兴通讯股份有限公司 Method of selecting encryption computation in mobile communication system
CN101128061A (en) * 2007-09-27 2008-02-20 中兴通讯股份有限公司 Method and system for mobile management unit, evolving base station and identifying whether UI is encrypted
CN101242630A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, device and network system for secure algorithm negotiation
CN101330376A (en) * 2007-06-22 2008-12-24 华为技术有限公司 Negotiation method for safety algorithm
CN101384079A (en) * 2007-09-03 2009-03-11 华为技术有限公司 Method, system and apparatus for preventing degraded attack when terminal moving
CN101854625A (en) * 2009-04-03 2010-10-06 华为技术有限公司 Selective processing method and device of security algorithm, network entity and communication system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399767B (en) * 2007-09-29 2011-04-20 华为技术有限公司 Method, system and apparatus for security capability negotiation during terminal moving
CN101754186B (en) * 2009-12-10 2013-06-12 中兴通讯股份有限公司 Method and system for residing when mobile terminal is powered on
US20110271096A1 (en) * 2010-04-29 2011-11-03 Sonus Networks, Inc. Loosely-Coupled Encryption Functionality for Operating Systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564513A (en) * 2004-04-02 2005-01-12 中兴通讯股份有限公司 Method of selecting encryption computation in mobile communication system
CN101242630A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, device and network system for secure algorithm negotiation
CN101330376A (en) * 2007-06-22 2008-12-24 华为技术有限公司 Negotiation method for safety algorithm
CN101384079A (en) * 2007-09-03 2009-03-11 华为技术有限公司 Method, system and apparatus for preventing degraded attack when terminal moving
CN101128061A (en) * 2007-09-27 2008-02-20 中兴通讯股份有限公司 Method and system for mobile management unit, evolving base station and identifying whether UI is encrypted
CN101854625A (en) * 2009-04-03 2010-10-06 华为技术有限公司 Selective processing method and device of security algorithm, network entity and communication system

Also Published As

Publication number Publication date
WO2014194787A1 (en) 2014-12-11
CN104244247A (en) 2014-12-24

Similar Documents

Publication Publication Date Title
US11641601B2 (en) Method, apparatus and device for allowing terminal to move between 4G and 5G networks
US10674363B2 (en) Access control method, user equipment, and network device
CN107682848B (en) Base station and terminal in wireless communication system and data communication method thereof
EP2785125B1 (en) Method and system for determining accessibility of terminal group
TWI397339B (en) Method of setting radio access capability and related communication device
EP2205014A2 (en) Method of handling inter-system handover security in wireless communications system and related communication device
CN104244247B (en) Non-Access Stratum, access layer security algorithm processing method and equipment
US9706474B2 (en) Method of barring network access, mobile device and processor
EP2963968B1 (en) Congestion control
EP2567559A1 (en) Methods and arrangements for communication channel re-establishment
US11044276B2 (en) Cellular security framework
KR101992278B1 (en) Mobile communication system and method of radio resource connection for controlling overload thereof
EP3596985B1 (en) Method and apparatus for protection of privacy in paging of user equipment
CN106572508B (en) A kind of method, apparatus and base station that terminal device is switched to Target cell
CN105340212A (en) Methods and apparatus for generating keys in device-to-device communications
CN105323231B (en) Security algorithm selection method, apparatus and system
EP3182654B1 (en) Offload strategy negotiation method and apparatus
CN102870470B (en) Re-orientation processes method, equipment and system
CN102905265A (en) Mobile equipment (ME) attaching method and device
CN103493541A (en) Method and terminal for switching operator network
CN102948203B (en) Load control method and equipment and communication system
CN112806044A (en) Pseudo base station identification method and device, mobile terminal and storage medium
EP2827628A1 (en) Authentication method, device and system for user equipment
CN102137381B (en) Method, device and system for network communication through home base station
TWI488514B (en) Method of cell reselection for a mobile communication system and related mobile device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant