CN112771815A - Key processing method and device - Google Patents

Key processing method and device Download PDF

Info

Publication number
CN112771815A
CN112771815A CN202080005167.0A CN202080005167A CN112771815A CN 112771815 A CN112771815 A CN 112771815A CN 202080005167 A CN202080005167 A CN 202080005167A CN 112771815 A CN112771815 A CN 112771815A
Authority
CN
China
Prior art keywords
key
communication system
target type
parameter
key parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080005167.0A
Other languages
Chinese (zh)
Other versions
CN112771815B (en
Inventor
王勇
陈璟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN112771815A publication Critical patent/CN112771815A/en
Application granted granted Critical
Publication of CN112771815B publication Critical patent/CN112771815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a secret key processing method and a secret key processing device, which can be applied to a short-distance communication system and further can be used in scenes such as automatic driving, intelligent driving, robots and unmanned transportation. The method comprises the steps of obtaining a first key parameter K of a first communication system, and further determining a second key parameter K of a second communication system according to the first key parameter K and an identifier of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved. And the above process is carried out in KdHas a length of K or more or lessdIn the case of the length of the corresponding object type key, different object type keys are determined respectively,is suitable for practical application.

Description

Key processing method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for processing a secret key.
Background
With the development of communication technology, the security of communication is more and more emphasized. Currently, communication security is generally ensured by encryption protection and integrity protection. For example, in the data transmission process, data to be transmitted is usually encrypted and transmitted, and a receiver decrypts a ciphertext and restores a plaintext after receiving the data. And in the data transmission process, integrity protection is carried out on the data, the integrity of the message is verified after the receiver receives the data, and the successful integrity verification indicates that the message is not modified in the transmission process. In secure data communication, both parties of communication must have a key for encryption and decryption and/or a key for integrity protection, respectively.
In the related art, one device may be compatible with a plurality of communication systems, for example, a mobile phone has a bluetooth system, a WiFi system, and other communication systems. Each communication system needs a key with the above encryption and decryption and/or integrity protection, etc. during communication.
Because the communication systems of the above-mentioned devices are completely independent, a certain communication system cannot utilize the security key negotiated by other communication systems, and thus, each communication system needs to negotiate its own key, resulting in many key negotiation deduction processes, low efficiency, and signaling waste.
Disclosure of Invention
The application provides a key processing method and a key processing device, which are used for solving the problems that each communication system needs to negotiate and deduce own key, so that the key negotiation deduction processes are more, the efficiency is low, and signaling is wasted.
In a first aspect, an embodiment of the present application provides a key processing method, which may be executed by an analysis device, and the method includes the following steps: first, a first key parameter K is obtained, where the first key parameter K is a key parameter of a first communication system. Here, the first communication system may be determined according to actual conditions, which is not particularly limited in the embodiments of the present application, and the first secretThe key parameter K may be a key used by the first communication system for encryption and decryption and/or an integrity-protected key, etc. Secondly, determining a second key parameter K of the second communication system according to the first key parameter K and the identification of the second communication systemdWherein the first communication system is different from the second communication system. Similarly, the second communication system may be determined according to actual situations, and this is not particularly limited in the embodiment of the present application. The identifier of the second communication system may be information used for identifying the identity of the second communication system, such as a name or a number of the second communication system. The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
According to the embodiment of the application, the first key parameter K of the first communication system is obtained, and then the second key parameter K of the second communication system is determined according to the first key parameter K and the identification of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, and the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, so that the key negotiation deduction process is omitted, the signaling is greatly saved, and the efficiency is improved.
In addition, the analysis device may be applied to the first communication system or the second communication system, and similarly, how to set the analysis device may be determined according to actual situations, for example, the analysis device may be applied independently of the first communication system and the second communication system, and the present embodiment is not particularly limited thereto.
In one possible design, the analysis device is applied to the first communication system, and the second key parameter K for the second communication system is determineddThen, the method further comprises the following steps:
sending the second key parameter K to the second communication systemdThe above-mentionedSecond key parameter KdFor the second communication system to determine the target type key.
For example, the analyzing device determines a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second communication system may save the second key parameter KdAs an intermediate key of the system, and then determining a key for encryption and/or integrity protection, or directly applying the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement deduction process.
In one possible design, the second key parameter K isdCorresponding to the target type key.
Determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
Here, the second key parameter K isdCorresponding target type key, wherein corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
Determining a second key parameter K of the second communication system at the analysis devicedIn the process, the first key parameter K and the identification of the second communication system are considered, and the type identification of the target type key is also considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddThe type identifier of the target type key may be information used to identify the type of the target type key, such as a type name or a number of the target type key.
One kind of possibilityThe target type key is the second key parameter Kd
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
In one possible design, the second key parameter K isdCorresponding to the target type key.
The second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Illustratively, the preset position may include at least one of a most significant bit and a least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, after determining the length of the target type key, if the second key parameter K is greater than the target type keydIs greater than the length of the target type key, the second key parameter K is requireddIntercepting to determine the target type key as the second key parameter KdM bits from a predetermined position, for example, the target type key is determined as the second key parameter KdM bits from the most significant bit, or, determining the target type key as the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the second key parameter corresponds to a target type key.
Determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
Here, different key lengths may correspond to different or the same key derivation function, and different key types may correspond to different or the same key derivation function, depending on the system configuration. For example, the first key derivation function may be set to be determined according to the length of the target type key.
Determining a second key parameter K of said second communication systemdFirst, a first key derivation function is determined in consideration of the length of the target type key, and then a second key parameter K of the second communication system is determined by the first key derivation function, the first key parameter K, and an identifier of the second communication systemdQuickly and accurately generating a second key parameter K meeting the key requirement of a second communication systemd
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system). In addition, the KDF may also include other input parameters, which are not particularly limited in this application.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd(ii) a The method comprises the following steps:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (a) and (b),wherein, M is the length of the target type key, and M is an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, and may be based on a plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThereby, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of said target type key is exactly equal to said plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured. Illustratively, the preset position may include at least one of a most significant bit and a least significant bit.
Illustratively, the preset position is the most significant bit, and the target type key is MSB (K)d1||Kd2……||KdNM bits). Where MSB denotes the most significant bit.
One possible design is that the plurality of first key parameters K1-KNAre obtained from a plurality of freshness parameters.
The value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
Here, different or the same key length may be corresponding to different numbers of keys, and different or the same key length may also be corresponding to different key types, depending on the system configuration, where the value of N may be set to be determined according to the length of the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
Here, in addition to the above cases, the above freshness parameters may be determined according to actual situations, and this is not particularly limited by the embodiment of the present application.
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs less than the length of the target type key, based on the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN
Determining the target type key as the plurality of second key parameters Kd1-KdNOr, determining the target type key as the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key, N is an integer greater than 1, and M is an integer greater than 0.
In one possible design, the second key parameter K of the second communication system is determined according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd
In one possible design, the second key derivation function corresponds to the second communication system.
Here, different communication systems may correspond to different or the same key derivation function, depending on the system configuration. For example, the second key derivation function may be configured to correspond to the second communication system, and the second key parameter K may be determined according to the first key parameter K and the identifier of the second communication system through the second key derivation function corresponding to the second communication systemdThereby omitting the process of the second communication system key agreement deduction.
One possible design may include, for example, a Hash-based Message Authentication code (HMAC) -Secure Hash Algorithm (SHA) 256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
Here, the algorithms and criteria used for the key derivation functions in the present application include, but are not limited to, those listed above, and the algorithms and criteria used for the key derivation functions in the present application may include other algorithms and criteria.
In a second aspect, an embodiment of the present application provides another key processing method, which may be performed by an analysis apparatus, and the method includes: obtaining a second key parameter K of a second communication systemdWherein the second key parameter KdThe key parameter K is determined based on a first key parameter K and an identifier of the second communication system, and the first key parameter K is a key parameter of the first communication system. Here, onThe first communication system is different from the second communication system, and the first communication system and the second communication system may be determined according to actual situations, which is not particularly limited in the embodiments of the present application. The first key parameter K may be a key used by the first communication system for encryption and decryption and/or an integrity protected key, etc. The identifier of the second communication system may be a name or a number of the second communication system, or information for identifying the identity of the second communication system. The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
The embodiment of the application acquires the second key parameter K of the second communication systemdWherein the second key parameter KdThe key parameter is determined based on the first key parameter K and the identifier of the second communication system, so that the key parameter of the communication system is determined through the key parameter of a certain communication system under the condition that all communication systems are completely independent, and further, a key for encryption and decryption and/or a key for integrity protection and the like are generated based on the key parameter, so that the key negotiation deduction process is omitted, the signaling is greatly saved, and the efficiency is improved.
In one possible design, the second key parameter K isdCorresponding to the target type key. Wherein, corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
In one possible design, the target type key is the second key parameter Kd
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, which is the second key parameter Kd
In one possible design, the second key parameter K isdIs longer than the above targetThe length of the type key.
The target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Illustratively, the preset position may include at least one of a most significant bit and a least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the first key parameter K includes a plurality of first key parameters K1-KNWherein N is an integer greater than 1.
A plurality of second key parameters K of the second communication systemd1-KdNIs based on the plurality of first key parameters K1-KNAnd an identity of the second communication system.
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key, M being an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, a plurality of second key parameters K of the second communication systemd1-KdNMay be based on a plurality of first key parameters K1-KNAnd the identity of the second communication system is determined such that the target type key is the plurality of second key parameters Kd1-KdNIn combination, e.g. if the above mentioned objects areThe length of the target type key is exactly equal to the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In a third aspect, embodiments of the present application provide a key processing apparatus, where the key processing apparatus may be the analysis apparatus itself, or a chip or an integrated circuit that implements the functions of the analysis apparatus. The device includes:
an obtaining module, configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system;
a determining module, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system.
In one possible design, the apparatus further includes a sending module, configured to determine, at the determining module, a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
In one possible design, the target type key is the second key parameter Kd
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd
In one possible design, the determining module is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the second key parameter corresponds to a target type key;
the determining module is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parametersKd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, or the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In a fourth aspect, the present application provides a key processing apparatus comprising at least one processor and at least one memory. The at least one memory stores computer instructions; the at least one processor executes the computer instructions stored by the memory to cause the computing device to perform the method provided by the first aspect or the various possible designs of the first aspect, to cause the key processing apparatus to deploy the key processing apparatus provided by the second aspect or the various possible designs of the second aspect.
In a fifth aspect, the present application provides a computer-readable storage medium having stored therein computer instructions that instruct a computing device to perform the method provided by the above first aspect or various possible designs of the first aspect, or instruct the computing device to deploy the key processing apparatus provided by the above second aspect or various possible designs of the second aspect.
In a sixth aspect, the present application provides a computer program product comprising computer instructions. Optionally, the computer instructions are stored in a computer readable storage medium. The computer instructions may be read by a processor of a computing device from a computer-readable storage medium, and the computer instructions, when executed by the processor, cause the computing device to perform the method provided by the above first aspect or the various possible designs of the first aspect, cause the computing device to deploy the key processing apparatus provided by the above second aspect or the various possible designs of the second aspect.
In a seventh aspect, an embodiment of the present application provides a chip including at least one processor and a communication interface. Further optionally, the chip further comprises at least one memory for storing computer instructions. Wherein the communication interface is configured to provide information input and/or output to the at least one processor. The at least one processor is configured to execute the instructions to implement the method of the first aspect and any possible implementation manner of the first aspect. Optionally, the at least one processor includes at least one of a Digital Signal Processor (DSP), a Central Processing Unit (CPU), or a Graphics Processing Unit (GPU).
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a key processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 7 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a key processing apparatus provided in the present application;
fig. 10A is a schematic diagram of a basic hardware architecture of a key processing apparatus provided in the present application;
fig. 10B is a schematic diagram of a basic hardware architecture of another key processing apparatus provided in the present application.
Detailed Description
The main implementation principle, the specific implementation mode and the corresponding beneficial effects of the technical scheme of the embodiment of the invention are explained in detail with reference to the drawings. In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature, and in the description of embodiments of the application, unless stated otherwise, "plurality" means two or more.
The key processing according to the embodiment of the present application is to determine a key parameter of the second communication system using a key parameter of the first communication system. The first communication system is different from the second communication system, so that the problems that each communication system needs to negotiate and deduce own secret key, so that the secret key negotiation deduction processes are multiple, the efficiency is low, and signaling is wasted are solved.
The key processing method and apparatus provided in the embodiment of the present application may be applied to a communication system, for example, one device has a plurality of communication systems, and the key processing method and apparatus provided in the embodiment of the present application may be applied to one or more communication systems of the device, where the device may be a device including a plurality of communication systems, such as a mobile phone, a vehicle, an unmanned aerial vehicle, or a robot, and the embodiment of the present application is not particularly limited thereto.
Optionally, the key processing method and apparatus provided in the embodiment of the present application may be applied to the application scenario shown in fig. 1. Fig. 1 only describes one possible application scenario of the key processing method provided in the embodiment of the present application by way of example, and the application scenario of the key processing method provided in the embodiment of the present application is not limited to the application scenario shown in fig. 1.
Fig. 1 is a schematic diagram of a key processing architecture of a device communication system. In fig. 1, taking a device as a mobile phone as an example, the device communication system key processing architecture includes an analysis apparatus 101, a mobile communication module 102, a wireless communication module 103, an antenna 1, an antenna 2, and a network or other device 104 communicating with the device.
It is to be understood that the illustrated structure of the embodiments of the present application does not constitute a specific limitation to the key processing architecture of the device communication system. In other possible embodiments of the present application, the device communication system key processing architecture may include more or less components than those shown in the drawings, or combine some components, or split some components, or arrange different components, which may be determined according to practical application scenarios, and is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In some possible embodiments, the mobile communication module 102 may include a system for wireless communication such as 2G/3G/4G/5G. The wireless communication module 103 may include a Wireless Local Area Network (WLAN) such as Wi-Fi, Bluetooth (BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and other wireless communication technologies, as well as systems of future possible short-range communication technologies.
In some possible embodiments, the antenna 1 is coupled to the mobile communication module 102, and the antenna 2 is coupled to the wireless communication module 103, so that the mobile communication module can communicate with a network and other devices through a wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division multiple access, TD-SCDMA), Long Term Evolution (LTE), and the like.
The analysis device 101 may be applied to a system of wireless communication such as 2G/3G/4G/5G of the mobile communication module 102, or may be applied to a system of wireless communication such as Wi-Fi, BT, GNSS, FM, NFC, IR of the wireless communication module 103, and similarly, the analysis device 101 may be applied independently of the mobile communication module and the wireless communication module, and how to set the analysis device may be determined according to actual situations, which is not limited in this embodiment of the application. For example, taking the analysis device 101 as an example applied to the mobile communication module and/or the wireless communication module, in fig. 1, for convenience of description, the analysis device 101 is connected to the mobile communication module 102 and the wireless communication module 103, which means that the analysis device 101 can be applied to one or more communication systems of the mobile communication module 102 and the wireless communication module 103.
The analysis means 101 is arranged to determine key parameters of other communication systems using key parameters of a certain communication system. For example, the key parameter of Wi-Fi is determined by using the key parameter of BT, thereby solving the problems that each communication system of the device needs to negotiate and deduce its own key, resulting in many key negotiation deduction processes, low efficiency, and signaling waste.
It should be understood that the network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person having ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The following describes a key processing method provided in an embodiment of the present application in detail with reference to the accompanying drawings. The subject of execution of the method may be the analysis device 101 in fig. 1. The workflow of the analysis apparatus 101 mainly includes an acquisition phase and a determination phase. In the acquisition phase, the analysis apparatus 101 acquires a key parameter of the first communication system. In the determination stage, the analysis device 101 determines the second key parameter of the second communication system according to the key parameter of the first communication system and the identifier of the second communication system, and further determines the key parameters of other communication systems according to the key parameter of a certain communication system under the condition that the communication systems are completely independent, so that the other communication systems can generate a key for encryption and decryption and/or a key for integrity protection and the like based on the key parameters, and a key negotiation deduction process is omitted, thereby greatly saving signaling and improving efficiency.
The technical solutions of the present application are described below with several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flow chart of a key processing method according to an embodiment of the present disclosure, where an execution subject of the embodiment may be the analysis device 101 in fig. 1, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 2, the method may include the following steps.
S201: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Here, the first key parameter K may be a key used by the first communication system for encryption and decryption, an integrity protection key, or the like. The first communication system may be determined according to practical situations, and is not particularly limited in the embodiments of the present application, for example, each communication system in a mobile phone is taken as an example, and the first communication system may be a BT system or other possible short-range communication technologies.
S202: determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system.
The second communication system may also be determined according to actual situations, which is not particularly limited in the embodiments of the present application, for example, each communication system in a mobile phone is also taken as an example, and if the first communication system is a BT system, the second communication system may be a WiFi system.
The identifier of the second communication system may be information used for identifying the identity of the second communication system, such as a name or a number of the second communication system.
The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
In some possible embodiments, the analyzing device is applied to the first communication system, and the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
sending the second key parameter K to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
For example, the analyzing device determines a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second communication system may save the second key parameter KdAs an intermediate key of the system, and then determining a key for encryption and/or integrity protection, or directly applying the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement pushAnd (5) performing an arithmetic process.
According to the embodiment of the application, the first key parameter K of the first communication system is obtained, and then the second key parameter K of the second communication system is determined according to the first key parameter K and the identification of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is saved, and efficiency is improved.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdNot only the first key parameter K and the identity of the second communication system but also the type of key is taken into account. Fig. 3 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 3, the method includes:
s301: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S301 is the same as the implementation of step S201, and is not described herein again.
S302: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
Wherein the first communication system is different from the second communication system.
Here, the second key parameter K isdCorresponding target type key, wherein corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
Determining a second key parameter K of the second communication system at the analysis devicedIn the process, the first key parameter K and the identification of the second communication system are considered, and the type identification of the target type key is also considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddThe type identifier of the target type key may be information used to identify the type of the target type key, such as a type name or a number of the target type key.
In some possible embodiments, the second key parameter K of the second communication system is determined as described abovedBefore, still include:
determining a second key parameter KdCorresponding target type key, and further determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
For example, before determining the Key parameter of the Wi-Fi by using the Key parameter of the BT, a target type Key corresponding to the Key parameter of the Wi-Fi, such as a Pair Transient Key (PTK) and a Group Transient Key (GTK), is determined, and then the Key parameter of the Wi-Fi is determined according to the Key parameter of the BT, the identifier of the Wi-Fi system, and the type identifier of the target type Key.
According to the embodiment of the application, the first key parameter K, the identifier of the second communication system and the type identifier of the target type key corresponding to the second key parameter are considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, andthe efficiency is high.
In addition, if the second key parameter K is setdIs equal to the second key parameter KdThe length of the corresponding target type key, which is the second key parameter Kd. Fig. 4 is a schematic flow chart of another key processing method according to an embodiment of the present disclosure, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 4, the method includes:
s401: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S401 is the same as the implementation of step S201, and is not described herein again.
S402: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system. The target type key is the second key parameter Kd
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, which is the second key parameter Kd
In some possible embodiments, the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
If the above-mentioned second key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter KdFurthermore, the second communication system may directly apply the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement deduction process.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs equal to the second key parameter KdThe length of the corresponding target type key is the second key parameter KdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
In addition, if the second key parameter K is setdIs greater than the second key parameter KdThe length of the corresponding target type key, which is the second key parameter KdM bits from a preset position.
Fig. 5 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 5, the method includes:
s501: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S501 is the same as the implementation of step S201, and is not described herein again.
S502: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system. The second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, the preset position may include at least one of the most significant bit and the least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In addition, the preset position may be set according to actual conditions besides the above conditions, and this is not particularly limited in the embodiment of the present application.
In some possible embodiments, the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, after determining the length of the target type key, if the second key parameter K is greater than the target type keydIs greater than the length of the target type key, the second key parameter K is requireddIntercepting to determine the target type key as the second key parameter KdM bits from a predetermined position, for example, the target type key is determined as the second key parameter KdM bits from the most significant bit, or, determining the target type key as the secondKey parameter KdOf which M bits start from the least significant bit.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs greater than the second key parameter KdThe length of the corresponding target type key is the second key parameter KdThe method comprises the following steps that M bits are started from a preset position, wherein M is the length of the target type key, so that under the condition that all communication systems are completely independent, key parameters of other communication systems are determined according to the key parameters of a certain communication system, the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the key negotiation deduction process is omitted, signaling is greatly saved, and efficiency is improved.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdIs determined by the first key derivation function.
Fig. 6 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 6, the method includes:
s601: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S601 is the same as the implementation of step S201, and is not described herein again.
S602: second key parameter KdAnd determining the length of the target type key corresponding to the target type key.
S603: determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
Here, different key lengths may correspond to different or the same key derivation function, and different key types may correspond to different or the same key derivation function, depending on the system configuration. For example, the first key derivation function may be set to be determined according to the length of the target type key.
Determining a second key parameter K of said second communication systemdFirst, a first key derivation function is determined in consideration of the length of the target type key, and then a second key parameter K of the second communication system is determined by the first key derivation function, the first key parameter K, and an identifier of the second communication systemdQuickly and accurately generating a second key parameter K meeting the key requirement of a second communication systemd
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system).
In addition, the KDF may also include other input parameters, such as the second key parameter K described abovedThe input parameter of the KDF may further include a type identifier of the target type key, and in addition, the input parameter of the KDF may further include an identifier of the first communication system, which is not particularly limited in this embodiment of the application.
Illustratively, the determining the second key parameter K of the second communication systemdThe method also comprises the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of a second communication system, and a type identifier of the target type keyd. For example, the first key parameter K and the second communication system may be used as the targetThe type identification of the target type key is used as an input parameter to generate a second key parameter K of the second communication systemd,KdKDF (K, identification of the second communication system, type identification of the target type key). Wherein the type identification of the target type key is an optional parameter.
Illustratively, the above-mentioned determination of the second key parameter K is performeddThe method can also comprise the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of the first communication system, an identifier of the second communication system, and a type identifier of the target type keyd,KdKDF (K, identity of the first communication system, identity of the second communication system, type identity of the target type key), wherein the identity of the first communication system and the type identity of the target type key are optional parameters.
In some possible embodiments, the first key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In addition, the algorithms and criteria used by the key derivation function in the embodiment of the present application may also include other algorithms and criteria, and the embodiment of the present application does not particularly limit this.
Here, the key derivation function may include different algorithms, such as the HMAC-SHA256, HMAC-SHA3, and HMAC-SM3, etc., described above. Thus, the input parameters of the KDF may also include an algorithm identification for identifying a different algorithm, and accordingly, the above-mentioned determination of the second key parameter K may be performeddThe method can also comprise the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of the first communication system, an identifier of the second communication system, a type identifier of the target type key, and an algorithm identifierd,KdKDF (K, identity of first communication system, identity of second communication system, type label of target type keyIdentity, algorithm identity), wherein the identity of the first communication system, the type identity of the target type key and the algorithm identity are optional parameters.
In the embodiment of the present application, a first key derivation function is determined by considering the length of the target type key, and then a second key parameter K meeting the key requirement of the second communication system is generated by the first key derivation function, the first key parameter K, and the identifier of the second communication systemdAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
In addition, if the second key parameter K is setdIs less than the second key parameter KdLength of corresponding target type key, wherein the target type key is a plurality of second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (a). Fig. 7 is a flowchart illustrating another key processing method according to an embodiment of the present application, where an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 7, the method includes:
s701: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S701 is the same as the implementation of step S201, and is not described herein again.
S702: second key parameter KdCorresponding to the target type key, the first key parameter K includes multiple first key parameters K1-KNAccording to the plurality of first key parameters K1-KNAnd identification of the second communication systemDetermining a plurality of second key parameters K for the second communication systemd1-KdNWherein N is an integer greater than 1.
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, and may be based on a plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThereby, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of said target type key is exactly equal to said plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
In some possible embodiments, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured. Illustratively, the preset position may include at least one of a most significant bit and a least significant bit.
Illustratively, the preset position is the most significant bit, and the target type key is MSB (K)d1||Kd2……||KdNM bits). Where MSB denotes the most significant bit.
In some possible embodiments, the plurality of first key parameters K is1-KNAre obtained from a plurality of freshness parameters (fresh).
The value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
Here, different or the same key length may be corresponding to different numbers of keys, and different or the same key length may also be corresponding to different key types, depending on the system configuration, where the value of N may be set to be determined according to the length of the target type key.
In some possible embodiments, the freshness parameters are generated randomly, or the freshness parameters are a plurality of equally spaced values, or timestamp-related values, or the like.
Here, in addition to the above cases, the above freshness parameters may be determined according to actual situations, and this is not particularly limited by the embodiment of the present application.
In some possible embodiments, the method further comprises:
determining the length of the target type key;
if the second key parameter K is abovedIs less than the length of the target type key, based on the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining the identity of the second communication systemA plurality of second key parameters Kd1-KdNWherein N is an integer greater than 1;
determining the target type key as the plurality of second key parameters Kd1-KdNOr, determining the target type key as the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs less than the second key parameter KdThe length of the corresponding target type key is determined according to a plurality of first key parameters K contained in the first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThe target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNThe combination of the above-mentioned two communication systems, wherein M is the length of the target type key, so that under the condition that the communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, thereby omitting the process of key negotiation deduction, greatly saving signaling and improving efficiency.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdIs determined by the second key derivation function. Fig. 8 is a flowchart illustrating another key processing method according to an embodiment of the present application, where an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 8, the method includes:
s801: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S801 is the same as the implementation of step S201, and is not described herein again.
S802: determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd
In some possible embodiments, the second key derivation function corresponds to the second communication system.
Here, different communication systems may correspond to different or the same key derivation function, depending on the system configuration. For example, the second key derivation function may be configured to correspond to the second communication system, and the second key parameter K may be determined according to the first key parameter K and the identifier of the second communication system through the second key derivation function corresponding to the second communication systemdThereby omitting the process of the second communication system key agreement deduction.
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system).
In addition, the KDF may also include other input parameters, where the first key parameter K includes a plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication systemd1-KdNFor example.
The input parameters of the KDF further comprise a type identifier of a target type key, said determining a plurality of second key parameters K of said second communication systemd1-KdNThe method can comprise the following steps:
through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system, the identification of the second communication system and the type identification of the target type keyd1-KdN
Illustratively, the above-mentioned plurality of groups can be divided intoA key parameter K1-KNGenerating a plurality of second key parameters K of the second communication system by taking the identifier of the second communication system and the type identifier of the target type key as input parametersd1-KdNThe second key parameter is KDF (first key parameter, identification of the second communication system, type identification of the target type key). Wherein the type identification of the target type key is an optional parameter.
Here, the KDF may also comprise other input parameters, for example also an identification of the first communication system, in addition to the plurality of first key parameters K mentioned above1-KNObtained from a plurality of freshness parameters, the input parameters of the KDF may also include the freshness parameter.
Illustratively, if the input parameter of the KDF further comprises an identification of the first communication system, the determining of the plurality of second key parameters K of the second communication system is performedd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNThe identification of the first communication system, the identification of the second communication system and the type identification of the target type key determine a plurality of second key parameters K of the second communication systemd1-KdNAnd the second key parameter is KDF (first key parameter, the identifier of the first communication system, the identifier of the second communication system, and the type identifier of the target type key), where the identifier of the first communication system and the type identifier of the target type key are optional parameters.
Determining a plurality of second key parameters K for said second communication system if the input parameters of the KDF further comprise a freshness parameterd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identification of the second communication system and the type identification of the target type keyd1-KdNKDF (first key parameter, freshness parameter, identifier of the second communication system, type identifier of the target type key), wherein the freshness parameter and the type identifier of the target type key are optional parameters。
Determining a plurality of second key parameters K for said second communication system if the input parameters of the KDF further comprise an identification and freshness parameter of the first communication systemd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identifier of the first communication system, the identifier of the second communication system and the type identifier of the target type keyd1-KdNAnd a second key parameter (KDF) (first key parameter, freshness parameter, identifier of the first communication system, identifier of the second communication system, and type identifier of the target type key), wherein the freshness parameter, the identifier of the first communication system, and the type identifier of the target type key are optional parameters.
In some possible embodiments, the second key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In addition, the algorithms and criteria used by the key derivation function in the embodiment of the present application may also include other algorithms and criteria, and the embodiment of the present application does not particularly limit this.
Here, the key derivation function may include different algorithms, such as the HMAC-SHA256, HMAC-SHA3, and HMAC-SM3, etc., described above. The input parameters of the KDF may therefore also include an algorithm identification for identifying different algorithms, and correspondingly, the above-mentioned determining of the plurality of second key parameters K of the second communication systemd1-KdNThe method can also comprise the following steps:
through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identifier of the first communication system, the identifier of the second communication system, the type identifier of the target type key and the algorithm identifierd1-KdNSecond key parameter KDF (first key parameter, freshness parameter, standard of the first communication system)Identity of the second communication system, type identity of the target type key, algorithm identity), wherein the freshness parameter, the identity of the first communication system, the type identity of the target type key and the algorithm identity are optional parameters.
According to the embodiment of the application, the second key parameter K meeting the key requirement of the second communication system is accurately generated through the second key derivation function according to the first key parameter K and the identifier of the second communication systemdAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
Fig. 9 is a schematic structural diagram of a key processing apparatus provided in the present application, where the apparatus includes: an acquisition module 901, a determination module 902 and a sending module 903. The key processing device here may be the analysis device itself, or a chip or an integrated circuit that implements the functions of the analysis device. It should be noted here that the division of the obtaining module and the determining module is only a division of logical functions, and the obtaining module and the determining module may be integrated or independent physically.
The obtaining module 901 is configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system.
A determining module 902, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system.
In one possible design, the sending module 903 is configured to determine the second key parameter K of the second communication system in the determining module 902dThereafter, the second communication system transmits the second signal to the second communication systemKey parameter KdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module 902 is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
In one possible design, the target type key is the second key parameter Kd
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, then it is confirmedDefining the target type key as the second key parameter KdM bits from a preset position, where M is the length of the target type key, and the preset position is predefined or configured.
In one possible design, the second key parameter corresponds to a target type key;
the determining module 902 is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module 902 is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module 902 is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function includes at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
The apparatus of this embodiment may be correspondingly used to implement the technical solutions in the embodiments shown in the foregoing methods, and the implementation principles, implementation details, and technical effects thereof are similar and will not be described herein again.
Alternatively, fig. 10A and 10B schematically provide one possible basic hardware architecture of the key processing apparatus described herein.
Referring to fig. 10A and 10B, the key processing device 1000 includes at least one processor 1001 and a communication interface 1003. Further optionally, a memory 1002 and a bus 1004 may also be included.
The key processing apparatus 1000 may be a computer or a server, and the present application is not limited thereto. In the key processing device 1000, the number of the processors 1001 may be one or more, and fig. 10A and 10B illustrate only one of the processors 1001. Alternatively, the processor 1001 may be a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), or a Digital Signal Processor (DSP). If the key processing device 1000 has a plurality of processors 1001, the types of the plurality of processors 1001 may be different, or may be the same. Alternatively, the plurality of processors 1001 of the key processing device 1000 may also be integrated into a multi-core processor.
Memory 1002 stores computer instructions and data; the memory 1002 may store computer instructions and data required to implement the key processing methods provided herein, e.g., the memory 1002 stores instructions for implementing the steps of the key processing methods described above. The memory 1002 may be any one or any combination of the following storage media: nonvolatile memory (e.g., Read Only Memory (ROM), Solid State Disk (SSD), hard disk (HDD), optical disk), volatile memory.
The communication interface 1003 may provide information input/output for the at least one processor. Any one or any combination of the following devices may also be included: a network interface (e.g., an ethernet interface), a wireless network card, etc. having a network access function.
Optionally, the communication interface 1003 may also be used for the key processing apparatus 1000 to perform data communication with other computing devices or terminals.
Further alternatively, fig. 10A and 10B show the bus 1004 as a thick line. A bus 1004 may connect the processor 1001 with the memory 1002 and the communication interface 1003. Thus, the processor 1001 may access the memory 1002 via the bus 1004 and may also interact with other computing devices or terminals using the communication interface 1003.
In the present application, the key processing apparatus 1000 executes computer instructions in the memory 1002, so that the key processing apparatus 1000 implements the key processing method provided in the present application, or so that the key processing apparatus 1000 deploys the key processing apparatus.
From the viewpoint of logical functional division, illustratively, as shown in fig. 10A, the memory 1002 may include an obtaining module 901 and a determining module 902. The inclusion herein merely refers to that instructions stored in the memory may, when executed, implement the functionality of the retrieving module and the determining module, respectively, and is not limited to a physical structure.
The obtaining module 901 is configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system.
A determining module 902, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system.
In one possible design, as shown in fig. 10B, the memory 1002 further includes a sending module 903, configured to determine the second key parameter K of the second communication system in the determining module 902dThen, the second key parameter K is sent to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module 902 is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
In one possible design, the target type key is the second key parameter Kd
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the above-mentionedSecond key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, and the preset position is predefined or configured.
In one possible design, the second key parameter corresponds to a target type key;
the determining module 902 is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module 902 is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module 902 is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function includes at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
In addition, the key processing device described above may be implemented by software as in fig. 10A and 10B described above, or may be implemented by hardware as a hardware module or as a circuit unit.
The present application provides a computer-readable storage medium, the computer program product comprising computer instructions that instruct a computing device to perform the above-mentioned key processing method provided herein.
The present application provides a chip comprising at least one processor and a communication interface providing information input and/or output for the at least one processor. Further, the chip may also include at least one memory for storing computer instructions. The at least one processor is used for calling and executing the computer instructions to execute the key processing method provided by the application.
The application provides a terminal, the terminal can be transport means or smart machine, for example vehicle, unmanned aerial vehicle, unmanned transport vechicle or robot etc. contain above-mentioned key processing apparatus on it.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.

Claims (20)

1. A method of key processing, the method comprising:
acquiring a first key parameter K, wherein the first key parameter K is a key parameter of a first communication system;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd
Wherein the first communication system is different from the second communication system.
2. The method of claim 1, wherein the second key parameter KdA corresponding target type key;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
3. The method of claim 2, wherein the target type key is the second key parameterNumber Kd
4. Method according to claim 1 or 2, characterized in that said second key parameter KdA corresponding target type key;
the second key parameter KdIs greater than the length of the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
5. Method according to any of claims 1 to 4, characterized in that said second key parameter KdA corresponding target type key;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the length of the target type key;
determining a second key parameter K of a second communication system by means of a first key derivation function, the first key parameter K and an identification of the second communication systemd
Wherein the first key derivation function is determined according to a length of the target type key.
6. Method according to claim 1 or 2, characterized in that said second key parameter KdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd(ii) a The method comprises the following steps:
according to the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining a plurality of second key parameters K of said second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
7. The method of claim 6, wherein the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key.
8. Method according to any of claims 1 to 4 and 6 to 7, wherein the second key parameter K of the second communication system is determined according to the first key parameter K and an identity of the second communication systemdThe method comprises the following steps:
determining the second key parameter K by a second key derivation function, the first key parameter K, and an identity of a second communication systemd
9. The method of claim 5 or 8, wherein the first key derivation function or the second key derivation function comprises at least one of a hashed message authentication code, HMAC-secure hash algorithm, SHA256, HMAC-SHA3, and HMAC-SM 3.
10. A key processing apparatus, comprising:
an obtaining module, configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system;
a determining module, configured to determine the second communication system according to the first key parameter K and an identifier of the second communication systemSecond key parameter K of the communication systemd
Wherein the first communication system is different from the second communication system.
11. The apparatus of claim 10, wherein the second key parameter K is a function of the first key parameter KdA corresponding target type key;
the determining module is specifically configured to:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd
12. The apparatus of claim 11, wherein the target type key is the second key parameter Kd
13. The apparatus according to claim 10 or 11, wherein the second key parameter K isdA corresponding target type key;
the second key parameter KdIs greater than the length of the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
14. The apparatus according to any of claims 10 to 13, wherein the second key parameter K is a function of the second key parameter KdA corresponding target type key;
the determining module is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of a second communication system by means of a first key derivation function, the first key parameter K and an identification of the second communication systemd
Wherein the first key derivation function is determined according to a length of the target type key.
15. The apparatus according to claim 10 or 11, wherein the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining a plurality of second key parameters K of said second communication systemd1-KdN
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
16. The apparatus of claim 15, wherein the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key.
17. The apparatus according to any one of claims 11 to 13 and 15 to 16, wherein the determining module is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K, and an identity of a second communication systemd
18. The apparatus of claim 14 or 17, wherein the first key derivation function or the second key derivation function comprises at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
19. A key processing apparatus, comprising:
comprises a processor and a memory;
the memory to store computer instructions;
the processor, configured to execute the computer instructions stored by the memory, to cause the key processing apparatus to implement the method of any one of claims 1 to 9.
20. A computer program product, characterized in that it comprises computer instructions for instructing a computing device to perform the method of any of claims 1 to 9.
CN202080005167.0A 2020-03-31 2020-03-31 Key processing method and device Active CN112771815B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/082628 WO2021196047A1 (en) 2020-03-31 2020-03-31 Key processing method and apparatus

Publications (2)

Publication Number Publication Date
CN112771815A true CN112771815A (en) 2021-05-07
CN112771815B CN112771815B (en) 2022-11-11

Family

ID=75699495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080005167.0A Active CN112771815B (en) 2020-03-31 2020-03-31 Key processing method and device

Country Status (2)

Country Link
CN (1) CN112771815B (en)
WO (1) WO2021196047A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113872752A (en) * 2021-09-07 2021-12-31 哲库科技(北京)有限公司 Security engine module, security engine device and communication equipment
WO2023030148A1 (en) * 2021-08-30 2023-03-09 华为技术有限公司 Communication method, apparatus and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090067623A1 (en) * 2007-09-12 2009-03-12 Samsung Electronics Co., Ltd. Method and apparatus for performing fast authentication for vertical handover
CN101938743A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 Generation method and device of safe keys
CN104253692A (en) * 2014-01-21 2014-12-31 北京印天网真科技有限公司 SE-based (symmetric encryption based) key management method and device
CN104852806A (en) * 2015-05-15 2015-08-19 飞天诚信科技股份有限公司 Method for realizing signature based on secret key type
WO2016134536A1 (en) * 2015-02-28 2016-09-01 华为技术有限公司 Key generation method, device and system
CN106209777A (en) * 2016-06-24 2016-12-07 韩磊 A kind of automatic driving car on-vehicle information interactive system and safety communicating method
CN106797314A (en) * 2014-09-04 2017-05-31 皇家飞利浦有限公司 Arrange the cryptographic system shared for key
US20170237780A1 (en) * 2016-02-17 2017-08-17 Nagravision S.A. Methods and systems for enabling legal-intercept mode for a targeted secure element
CN107079293A (en) * 2015-04-08 2017-08-18 华为技术有限公司 A kind of enhanced method of gprs system key, SGSN equipment, UE, HLR/HSS and gprs system
CN109788474A (en) * 2017-11-14 2019-05-21 华为技术有限公司 A kind of method and device of message protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056177B (en) * 2007-06-01 2011-06-29 清华大学 Radio mesh re-authentication method based on the WLAN secure standard WAPI
CN103888941B (en) * 2012-12-20 2018-03-06 新华三技术有限公司 The method and device that a kind of wireless network keys are consulted
WO2015062239A1 (en) * 2013-11-04 2015-05-07 华为技术有限公司 Method and device for key negotiation processing
CN108199837B (en) * 2018-01-23 2020-12-25 新华三信息安全技术有限公司 Key negotiation method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090067623A1 (en) * 2007-09-12 2009-03-12 Samsung Electronics Co., Ltd. Method and apparatus for performing fast authentication for vertical handover
CN101938743A (en) * 2009-06-30 2011-01-05 中兴通讯股份有限公司 Generation method and device of safe keys
CN104253692A (en) * 2014-01-21 2014-12-31 北京印天网真科技有限公司 SE-based (symmetric encryption based) key management method and device
CN106797314A (en) * 2014-09-04 2017-05-31 皇家飞利浦有限公司 Arrange the cryptographic system shared for key
WO2016134536A1 (en) * 2015-02-28 2016-09-01 华为技术有限公司 Key generation method, device and system
CN107079293A (en) * 2015-04-08 2017-08-18 华为技术有限公司 A kind of enhanced method of gprs system key, SGSN equipment, UE, HLR/HSS and gprs system
CN104852806A (en) * 2015-05-15 2015-08-19 飞天诚信科技股份有限公司 Method for realizing signature based on secret key type
US20170237780A1 (en) * 2016-02-17 2017-08-17 Nagravision S.A. Methods and systems for enabling legal-intercept mode for a targeted secure element
CN106209777A (en) * 2016-06-24 2016-12-07 韩磊 A kind of automatic driving car on-vehicle information interactive system and safety communicating method
CN109788474A (en) * 2017-11-14 2019-05-21 华为技术有限公司 A kind of method and device of message protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马传龙等: "《信息安全原理与实践教程》", 31 October 2011 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023030148A1 (en) * 2021-08-30 2023-03-09 华为技术有限公司 Communication method, apparatus and system
CN113872752A (en) * 2021-09-07 2021-12-31 哲库科技(北京)有限公司 Security engine module, security engine device and communication equipment
CN113872752B (en) * 2021-09-07 2023-10-13 哲库科技(北京)有限公司 Security engine module, security engine device, and communication apparatus

Also Published As

Publication number Publication date
WO2021196047A1 (en) 2021-10-07
CN112771815B (en) 2022-11-11

Similar Documents

Publication Publication Date Title
CN110177354B (en) Wireless control method and system for vehicle
CN111279310B (en) Vehicle-mounted equipment upgrading method and related equipment
CN112055952B (en) Vehicle-mounted equipment upgrading method and related equipment
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
EP2986045B1 (en) Method, device and system for configuring wireless terminal
US20180150291A1 (en) Bluetooth low energy device, and data update system and method
US9032186B2 (en) Utilization of a microcode interpreter built in to a processor
EP4068675A1 (en) Method and device for certificate application
CN112822177B (en) Data transmission method, device, equipment and storage medium
CN112771815B (en) Key processing method and device
US11637704B2 (en) Method and apparatus for determining trust status of TPM, and storage medium
CN111970114A (en) File encryption method, system, server and storage medium
CN114079915A (en) Method, system and device for determining user plane security algorithm
WO2023279283A1 (en) Method for establishing secure vehicle communication, and vehicle, terminal and system
CN111770488B (en) EHPLMN updating method, related equipment and storage medium
CN115510458A (en) Detection method and related device
CN115175189A (en) Communication method and device
CN105472606A (en) Safety connection method, device and system
CN105338524A (en) Information transmission method and device
CN110297687B (en) Data interaction method, device and system based on virtual host
WO2024164112A1 (en) Inter-application communication method and apparatus, communication system, and vehicle
CN113098688B (en) AKA method and device
US20220191010A1 (en) Key management in an integrated circuit
CN117135631A (en) Equipment authentication method and terminal equipment
CN117061539A (en) Business processing method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant