CN112771815A - Key processing method and device - Google Patents
Key processing method and device Download PDFInfo
- Publication number
- CN112771815A CN112771815A CN202080005167.0A CN202080005167A CN112771815A CN 112771815 A CN112771815 A CN 112771815A CN 202080005167 A CN202080005167 A CN 202080005167A CN 112771815 A CN112771815 A CN 112771815A
- Authority
- CN
- China
- Prior art keywords
- key
- communication system
- target type
- parameter
- key parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a secret key processing method and a secret key processing device, which can be applied to a short-distance communication system and further can be used in scenes such as automatic driving, intelligent driving, robots and unmanned transportation. The method comprises the steps of obtaining a first key parameter K of a first communication system, and further determining a second key parameter K of a second communication system according to the first key parameter K and an identifier of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved. And the above process is carried out in KdHas a length of K or more or lessdIn the case of the length of the corresponding object type key, different object type keys are determined respectively,is suitable for practical application.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for processing a secret key.
Background
With the development of communication technology, the security of communication is more and more emphasized. Currently, communication security is generally ensured by encryption protection and integrity protection. For example, in the data transmission process, data to be transmitted is usually encrypted and transmitted, and a receiver decrypts a ciphertext and restores a plaintext after receiving the data. And in the data transmission process, integrity protection is carried out on the data, the integrity of the message is verified after the receiver receives the data, and the successful integrity verification indicates that the message is not modified in the transmission process. In secure data communication, both parties of communication must have a key for encryption and decryption and/or a key for integrity protection, respectively.
In the related art, one device may be compatible with a plurality of communication systems, for example, a mobile phone has a bluetooth system, a WiFi system, and other communication systems. Each communication system needs a key with the above encryption and decryption and/or integrity protection, etc. during communication.
Because the communication systems of the above-mentioned devices are completely independent, a certain communication system cannot utilize the security key negotiated by other communication systems, and thus, each communication system needs to negotiate its own key, resulting in many key negotiation deduction processes, low efficiency, and signaling waste.
Disclosure of Invention
The application provides a key processing method and a key processing device, which are used for solving the problems that each communication system needs to negotiate and deduce own key, so that the key negotiation deduction processes are more, the efficiency is low, and signaling is wasted.
In a first aspect, an embodiment of the present application provides a key processing method, which may be executed by an analysis device, and the method includes the following steps: first, a first key parameter K is obtained, where the first key parameter K is a key parameter of a first communication system. Here, the first communication system may be determined according to actual conditions, which is not particularly limited in the embodiments of the present application, and the first secretThe key parameter K may be a key used by the first communication system for encryption and decryption and/or an integrity-protected key, etc. Secondly, determining a second key parameter K of the second communication system according to the first key parameter K and the identification of the second communication systemdWherein the first communication system is different from the second communication system. Similarly, the second communication system may be determined according to actual situations, and this is not particularly limited in the embodiment of the present application. The identifier of the second communication system may be information used for identifying the identity of the second communication system, such as a name or a number of the second communication system. The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
According to the embodiment of the application, the first key parameter K of the first communication system is obtained, and then the second key parameter K of the second communication system is determined according to the first key parameter K and the identification of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, and the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, so that the key negotiation deduction process is omitted, the signaling is greatly saved, and the efficiency is improved.
In addition, the analysis device may be applied to the first communication system or the second communication system, and similarly, how to set the analysis device may be determined according to actual situations, for example, the analysis device may be applied independently of the first communication system and the second communication system, and the present embodiment is not particularly limited thereto.
In one possible design, the analysis device is applied to the first communication system, and the second key parameter K for the second communication system is determineddThen, the method further comprises the following steps:
sending the second key parameter K to the second communication systemdThe above-mentionedSecond key parameter KdFor the second communication system to determine the target type key.
For example, the analyzing device determines a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second communication system may save the second key parameter KdAs an intermediate key of the system, and then determining a key for encryption and/or integrity protection, or directly applying the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement deduction process.
In one possible design, the second key parameter K isdCorresponding to the target type key.
Determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
Here, the second key parameter K isdCorresponding target type key, wherein corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
Determining a second key parameter K of the second communication system at the analysis devicedIn the process, the first key parameter K and the identification of the second communication system are considered, and the type identification of the target type key is also considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddThe type identifier of the target type key may be information used to identify the type of the target type key, such as a type name or a number of the target type key.
One kind of possibilityThe target type key is the second key parameter Kd。
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd。
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
In one possible design, the second key parameter K isdCorresponding to the target type key.
The second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Illustratively, the preset position may include at least one of a most significant bit and a least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, after determining the length of the target type key, if the second key parameter K is greater than the target type keydIs greater than the length of the target type key, the second key parameter K is requireddIntercepting to determine the target type key as the second key parameter KdM bits from a predetermined position, for example, the target type key is determined as the second key parameter KdM bits from the most significant bit, or, determining the target type key as the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the second key parameter corresponds to a target type key.
Determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd;
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
Here, different key lengths may correspond to different or the same key derivation function, and different key types may correspond to different or the same key derivation function, depending on the system configuration. For example, the first key derivation function may be set to be determined according to the length of the target type key.
Determining a second key parameter K of said second communication systemdFirst, a first key derivation function is determined in consideration of the length of the target type key, and then a second key parameter K of the second communication system is determined by the first key derivation function, the first key parameter K, and an identifier of the second communication systemdQuickly and accurately generating a second key parameter K meeting the key requirement of a second communication systemd。
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system). In addition, the KDF may also include other input parameters, which are not particularly limited in this application.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd(ii) a The method comprises the following steps:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (a) and (b),wherein, M is the length of the target type key, and M is an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, and may be based on a plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThereby, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of said target type key is exactly equal to said plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN。
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured. Illustratively, the preset position may include at least one of a most significant bit and a least significant bit.
Illustratively, the preset position is the most significant bit, and the target type key is MSB (K)d1||Kd2……||KdNM bits). Where MSB denotes the most significant bit.
One possible design is that the plurality of first key parameters K1-KNAre obtained from a plurality of freshness parameters.
The value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
Here, different or the same key length may be corresponding to different numbers of keys, and different or the same key length may also be corresponding to different key types, depending on the system configuration, where the value of N may be set to be determined according to the length of the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
Here, in addition to the above cases, the above freshness parameters may be determined according to actual situations, and this is not particularly limited by the embodiment of the present application.
In one possible design, the method further includes:
determining the length of the target type key;
if the second key parameter K is abovedIs less than the length of the target type key, based on the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN;
Determining the target type key as the plurality of second key parameters Kd1-KdNOr, determining the target type key as the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key, N is an integer greater than 1, and M is an integer greater than 0.
In one possible design, the second key parameter K of the second communication system is determined according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd。
In one possible design, the second key derivation function corresponds to the second communication system.
Here, different communication systems may correspond to different or the same key derivation function, depending on the system configuration. For example, the second key derivation function may be configured to correspond to the second communication system, and the second key parameter K may be determined according to the first key parameter K and the identifier of the second communication system through the second key derivation function corresponding to the second communication systemdThereby omitting the process of the second communication system key agreement deduction.
One possible design may include, for example, a Hash-based Message Authentication code (HMAC) -Secure Hash Algorithm (SHA) 256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
Here, the algorithms and criteria used for the key derivation functions in the present application include, but are not limited to, those listed above, and the algorithms and criteria used for the key derivation functions in the present application may include other algorithms and criteria.
In a second aspect, an embodiment of the present application provides another key processing method, which may be performed by an analysis apparatus, and the method includes: obtaining a second key parameter K of a second communication systemdWherein the second key parameter KdThe key parameter K is determined based on a first key parameter K and an identifier of the second communication system, and the first key parameter K is a key parameter of the first communication system. Here, onThe first communication system is different from the second communication system, and the first communication system and the second communication system may be determined according to actual situations, which is not particularly limited in the embodiments of the present application. The first key parameter K may be a key used by the first communication system for encryption and decryption and/or an integrity protected key, etc. The identifier of the second communication system may be a name or a number of the second communication system, or information for identifying the identity of the second communication system. The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
The embodiment of the application acquires the second key parameter K of the second communication systemdWherein the second key parameter KdThe key parameter is determined based on the first key parameter K and the identifier of the second communication system, so that the key parameter of the communication system is determined through the key parameter of a certain communication system under the condition that all communication systems are completely independent, and further, a key for encryption and decryption and/or a key for integrity protection and the like are generated based on the key parameter, so that the key negotiation deduction process is omitted, the signaling is greatly saved, and the efficiency is improved.
In one possible design, the second key parameter K isdCorresponding to the target type key. Wherein, corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
In one possible design, the target type key is the second key parameter Kd。
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, which is the second key parameter Kd。
In one possible design, the second key parameter K isdIs longer than the above targetThe length of the type key.
The target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Illustratively, the preset position may include at least one of a most significant bit and a least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In one possible design, the first key parameter K includes a plurality of first key parameters K1-KNWherein N is an integer greater than 1.
A plurality of second key parameters K of the second communication systemd1-KdNIs based on the plurality of first key parameters K1-KNAnd an identity of the second communication system.
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key, M being an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, a plurality of second key parameters K of the second communication systemd1-KdNMay be based on a plurality of first key parameters K1-KNAnd the identity of the second communication system is determined such that the target type key is the plurality of second key parameters Kd1-KdNIn combination, e.g. if the above mentioned objects areThe length of the target type key is exactly equal to the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN。
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In a third aspect, embodiments of the present application provide a key processing apparatus, where the key processing apparatus may be the analysis apparatus itself, or a chip or an integrated circuit that implements the functions of the analysis apparatus. The device includes:
an obtaining module, configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system;
a determining module, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd;
Wherein the first communication system is different from the second communication system.
In one possible design, the apparatus further includes a sending module, configured to determine, at the determining module, a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
In one possible design, the target type key is the second key parameter Kd。
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd。
In one possible design, the determining module is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the second key parameter corresponds to a target type key;
the determining module is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd;
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parametersKd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd。
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, or the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In a fourth aspect, the present application provides a key processing apparatus comprising at least one processor and at least one memory. The at least one memory stores computer instructions; the at least one processor executes the computer instructions stored by the memory to cause the computing device to perform the method provided by the first aspect or the various possible designs of the first aspect, to cause the key processing apparatus to deploy the key processing apparatus provided by the second aspect or the various possible designs of the second aspect.
In a fifth aspect, the present application provides a computer-readable storage medium having stored therein computer instructions that instruct a computing device to perform the method provided by the above first aspect or various possible designs of the first aspect, or instruct the computing device to deploy the key processing apparatus provided by the above second aspect or various possible designs of the second aspect.
In a sixth aspect, the present application provides a computer program product comprising computer instructions. Optionally, the computer instructions are stored in a computer readable storage medium. The computer instructions may be read by a processor of a computing device from a computer-readable storage medium, and the computer instructions, when executed by the processor, cause the computing device to perform the method provided by the above first aspect or the various possible designs of the first aspect, cause the computing device to deploy the key processing apparatus provided by the above second aspect or the various possible designs of the second aspect.
In a seventh aspect, an embodiment of the present application provides a chip including at least one processor and a communication interface. Further optionally, the chip further comprises at least one memory for storing computer instructions. Wherein the communication interface is configured to provide information input and/or output to the at least one processor. The at least one processor is configured to execute the instructions to implement the method of the first aspect and any possible implementation manner of the first aspect. Optionally, the at least one processor includes at least one of a Digital Signal Processor (DSP), a Central Processing Unit (CPU), or a Graphics Processing Unit (GPU).
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a key processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 7 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of another key processing method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a key processing apparatus provided in the present application;
fig. 10A is a schematic diagram of a basic hardware architecture of a key processing apparatus provided in the present application;
fig. 10B is a schematic diagram of a basic hardware architecture of another key processing apparatus provided in the present application.
Detailed Description
The main implementation principle, the specific implementation mode and the corresponding beneficial effects of the technical scheme of the embodiment of the invention are explained in detail with reference to the drawings. In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature, and in the description of embodiments of the application, unless stated otherwise, "plurality" means two or more.
The key processing according to the embodiment of the present application is to determine a key parameter of the second communication system using a key parameter of the first communication system. The first communication system is different from the second communication system, so that the problems that each communication system needs to negotiate and deduce own secret key, so that the secret key negotiation deduction processes are multiple, the efficiency is low, and signaling is wasted are solved.
The key processing method and apparatus provided in the embodiment of the present application may be applied to a communication system, for example, one device has a plurality of communication systems, and the key processing method and apparatus provided in the embodiment of the present application may be applied to one or more communication systems of the device, where the device may be a device including a plurality of communication systems, such as a mobile phone, a vehicle, an unmanned aerial vehicle, or a robot, and the embodiment of the present application is not particularly limited thereto.
Optionally, the key processing method and apparatus provided in the embodiment of the present application may be applied to the application scenario shown in fig. 1. Fig. 1 only describes one possible application scenario of the key processing method provided in the embodiment of the present application by way of example, and the application scenario of the key processing method provided in the embodiment of the present application is not limited to the application scenario shown in fig. 1.
Fig. 1 is a schematic diagram of a key processing architecture of a device communication system. In fig. 1, taking a device as a mobile phone as an example, the device communication system key processing architecture includes an analysis apparatus 101, a mobile communication module 102, a wireless communication module 103, an antenna 1, an antenna 2, and a network or other device 104 communicating with the device.
It is to be understood that the illustrated structure of the embodiments of the present application does not constitute a specific limitation to the key processing architecture of the device communication system. In other possible embodiments of the present application, the device communication system key processing architecture may include more or less components than those shown in the drawings, or combine some components, or split some components, or arrange different components, which may be determined according to practical application scenarios, and is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In some possible embodiments, the mobile communication module 102 may include a system for wireless communication such as 2G/3G/4G/5G. The wireless communication module 103 may include a Wireless Local Area Network (WLAN) such as Wi-Fi, Bluetooth (BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and other wireless communication technologies, as well as systems of future possible short-range communication technologies.
In some possible embodiments, the antenna 1 is coupled to the mobile communication module 102, and the antenna 2 is coupled to the wireless communication module 103, so that the mobile communication module can communicate with a network and other devices through a wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division multiple access, TD-SCDMA), Long Term Evolution (LTE), and the like.
The analysis device 101 may be applied to a system of wireless communication such as 2G/3G/4G/5G of the mobile communication module 102, or may be applied to a system of wireless communication such as Wi-Fi, BT, GNSS, FM, NFC, IR of the wireless communication module 103, and similarly, the analysis device 101 may be applied independently of the mobile communication module and the wireless communication module, and how to set the analysis device may be determined according to actual situations, which is not limited in this embodiment of the application. For example, taking the analysis device 101 as an example applied to the mobile communication module and/or the wireless communication module, in fig. 1, for convenience of description, the analysis device 101 is connected to the mobile communication module 102 and the wireless communication module 103, which means that the analysis device 101 can be applied to one or more communication systems of the mobile communication module 102 and the wireless communication module 103.
The analysis means 101 is arranged to determine key parameters of other communication systems using key parameters of a certain communication system. For example, the key parameter of Wi-Fi is determined by using the key parameter of BT, thereby solving the problems that each communication system of the device needs to negotiate and deduce its own key, resulting in many key negotiation deduction processes, low efficiency, and signaling waste.
It should be understood that the network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person having ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The following describes a key processing method provided in an embodiment of the present application in detail with reference to the accompanying drawings. The subject of execution of the method may be the analysis device 101 in fig. 1. The workflow of the analysis apparatus 101 mainly includes an acquisition phase and a determination phase. In the acquisition phase, the analysis apparatus 101 acquires a key parameter of the first communication system. In the determination stage, the analysis device 101 determines the second key parameter of the second communication system according to the key parameter of the first communication system and the identifier of the second communication system, and further determines the key parameters of other communication systems according to the key parameter of a certain communication system under the condition that the communication systems are completely independent, so that the other communication systems can generate a key for encryption and decryption and/or a key for integrity protection and the like based on the key parameters, and a key negotiation deduction process is omitted, thereby greatly saving signaling and improving efficiency.
The technical solutions of the present application are described below with several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flow chart of a key processing method according to an embodiment of the present disclosure, where an execution subject of the embodiment may be the analysis device 101 in fig. 1, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 2, the method may include the following steps.
S201: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Here, the first key parameter K may be a key used by the first communication system for encryption and decryption, an integrity protection key, or the like. The first communication system may be determined according to practical situations, and is not particularly limited in the embodiments of the present application, for example, each communication system in a mobile phone is taken as an example, and the first communication system may be a BT system or other possible short-range communication technologies.
S202: determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd。
Wherein the first communication system is different from the second communication system.
The second communication system may also be determined according to actual situations, which is not particularly limited in the embodiments of the present application, for example, each communication system in a mobile phone is also taken as an example, and if the first communication system is a BT system, the second communication system may be a WiFi system.
The identifier of the second communication system may be information used for identifying the identity of the second communication system, such as a name or a number of the second communication system.
The second key parameter KdMay be a key of the second communication system or a key for generating the second communication system, the key of the second communication system may be a key for encryption and decryption and/or an integrity protected key of the second communication system, etc.
In some possible embodiments, the analyzing device is applied to the first communication system, and the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
sending the second key parameter K to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
For example, the analyzing device determines a second key parameter K of the second communication systemdThen, the second key parameter K is sent to the second communication systemdThe second communication system may save the second key parameter KdAs an intermediate key of the system, and then determining a key for encryption and/or integrity protection, or directly applying the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement pushAnd (5) performing an arithmetic process.
According to the embodiment of the application, the first key parameter K of the first communication system is obtained, and then the second key parameter K of the second communication system is determined according to the first key parameter K and the identification of the second communication systemdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is saved, and efficiency is improved.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdNot only the first key parameter K and the identity of the second communication system but also the type of key is taken into account. Fig. 3 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 3, the method includes:
s301: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S301 is the same as the implementation of step S201, and is not described herein again.
S302: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
Wherein the first communication system is different from the second communication system.
Here, the second key parameter K isdCorresponding target type key, wherein corresponding refers to the second key parameter KdFor generating a target type key, or, the second key parameter KdIs the target type key. The target type key may be a key used by the second communication system for encryption and decryption and/or an integrity protected key, etc.
Determining a second key parameter K of the second communication system at the analysis devicedIn the process, the first key parameter K and the identification of the second communication system are considered, and the type identification of the target type key is also considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddThe type identifier of the target type key may be information used to identify the type of the target type key, such as a type name or a number of the target type key.
In some possible embodiments, the second key parameter K of the second communication system is determined as described abovedBefore, still include:
determining a second key parameter KdCorresponding target type key, and further determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
For example, before determining the Key parameter of the Wi-Fi by using the Key parameter of the BT, a target type Key corresponding to the Key parameter of the Wi-Fi, such as a Pair Transient Key (PTK) and a Group Transient Key (GTK), is determined, and then the Key parameter of the Wi-Fi is determined according to the Key parameter of the BT, the identifier of the Wi-Fi system, and the type identifier of the target type Key.
According to the embodiment of the application, the first key parameter K, the identifier of the second communication system and the type identifier of the target type key corresponding to the second key parameter are considered, so that the second key parameter K meeting the key requirement of the second communication system is accurately generateddAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, andthe efficiency is high.
In addition, if the second key parameter K is setdIs equal to the second key parameter KdThe length of the corresponding target type key, which is the second key parameter Kd. Fig. 4 is a schematic flow chart of another key processing method according to an embodiment of the present disclosure, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 4, the method includes:
s401: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S401 is the same as the implementation of step S201, and is not described herein again.
S402: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd。
Wherein the first communication system is different from the second communication system. The target type key is the second key parameter Kd。
Here, if the above-mentioned second key parameter KdIs equal to the length of the target type key, which is the second key parameter Kd。
In some possible embodiments, the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
If the above-mentioned second key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter KdFurthermore, the second communication system may directly apply the second key parameter KdEncryption and/or integrity protection for the system, thereby omitting the system key agreement deduction process.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs equal to the second key parameter KdThe length of the corresponding target type key is the second key parameter KdTherefore, under the condition that all communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
In addition, if the second key parameter K is setdIs greater than the second key parameter KdThe length of the corresponding target type key, which is the second key parameter KdM bits from a preset position.
Fig. 5 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 5, the method includes:
s501: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S501 is the same as the implementation of step S201, and is not described herein again.
S502: second key parameter KdCorresponding to the target type key, determining the second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd。
Wherein the first communication system is different from the second communication system. The second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, the preset position may include at least one of the most significant bit and the least significant bit. If the above-mentioned second key parameter KdIs greater than the length of the target type key, which is the second key parameter KdM bits from a predetermined position, e.g. the target type key is the second key parameter KdM bits from the most significant bit, or the target type key is the second key parameter KdOf which M bits start from the least significant bit.
In addition, the preset position may be set according to actual conditions besides the above conditions, and this is not particularly limited in the embodiment of the present application.
In some possible embodiments, the second key parameter K of the second communication system is determineddThen, the method further comprises the following steps:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
Here, after determining the length of the target type key, if the second key parameter K is greater than the target type keydIs greater than the length of the target type key, the second key parameter K is requireddIntercepting to determine the target type key as the second key parameter KdM bits from a predetermined position, for example, the target type key is determined as the second key parameter KdM bits from the most significant bit, or, determining the target type key as the secondKey parameter KdOf which M bits start from the least significant bit.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs greater than the second key parameter KdThe length of the corresponding target type key is the second key parameter KdThe method comprises the following steps that M bits are started from a preset position, wherein M is the length of the target type key, so that under the condition that all communication systems are completely independent, key parameters of other communication systems are determined according to the key parameters of a certain communication system, the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the key negotiation deduction process is omitted, signaling is greatly saved, and efficiency is improved.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdIs determined by the first key derivation function.
Fig. 6 is a schematic flow chart of another key processing method according to an embodiment of the present application, and an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 6, the method includes:
s601: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S601 is the same as the implementation of step S201, and is not described herein again.
S602: second key parameter KdAnd determining the length of the target type key corresponding to the target type key.
S603: determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd。
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
Here, different key lengths may correspond to different or the same key derivation function, and different key types may correspond to different or the same key derivation function, depending on the system configuration. For example, the first key derivation function may be set to be determined according to the length of the target type key.
Determining a second key parameter K of said second communication systemdFirst, a first key derivation function is determined in consideration of the length of the target type key, and then a second key parameter K of the second communication system is determined by the first key derivation function, the first key parameter K, and an identifier of the second communication systemdQuickly and accurately generating a second key parameter K meeting the key requirement of a second communication systemd。
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system).
In addition, the KDF may also include other input parameters, such as the second key parameter K described abovedThe input parameter of the KDF may further include a type identifier of the target type key, and in addition, the input parameter of the KDF may further include an identifier of the first communication system, which is not particularly limited in this embodiment of the application.
Illustratively, the determining the second key parameter K of the second communication systemdThe method also comprises the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of a second communication system, and a type identifier of the target type keyd. For example, the first key parameter K and the second communication system may be used as the targetThe type identification of the target type key is used as an input parameter to generate a second key parameter K of the second communication systemd,KdKDF (K, identification of the second communication system, type identification of the target type key). Wherein the type identification of the target type key is an optional parameter.
Illustratively, the above-mentioned determination of the second key parameter K is performeddThe method can also comprise the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of the first communication system, an identifier of the second communication system, and a type identifier of the target type keyd,KdKDF (K, identity of the first communication system, identity of the second communication system, type identity of the target type key), wherein the identity of the first communication system and the type identity of the target type key are optional parameters.
In some possible embodiments, the first key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In addition, the algorithms and criteria used by the key derivation function in the embodiment of the present application may also include other algorithms and criteria, and the embodiment of the present application does not particularly limit this.
Here, the key derivation function may include different algorithms, such as the HMAC-SHA256, HMAC-SHA3, and HMAC-SM3, etc., described above. Thus, the input parameters of the KDF may also include an algorithm identification for identifying a different algorithm, and accordingly, the above-mentioned determination of the second key parameter K may be performeddThe method can also comprise the following steps:
determining the second key parameter K according to a first key derivation function, the first key parameter K, an identifier of the first communication system, an identifier of the second communication system, a type identifier of the target type key, and an algorithm identifierd,KdKDF (K, identity of first communication system, identity of second communication system, type label of target type keyIdentity, algorithm identity), wherein the identity of the first communication system, the type identity of the target type key and the algorithm identity are optional parameters.
In the embodiment of the present application, a first key derivation function is determined by considering the length of the target type key, and then a second key parameter K meeting the key requirement of the second communication system is generated by the first key derivation function, the first key parameter K, and the identifier of the second communication systemdAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
In addition, if the second key parameter K is setdIs less than the second key parameter KdLength of corresponding target type key, wherein the target type key is a plurality of second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (a). Fig. 7 is a flowchart illustrating another key processing method according to an embodiment of the present application, where an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 7, the method includes:
s701: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S701 is the same as the implementation of step S201, and is not described herein again.
S702: second key parameter KdCorresponding to the target type key, the first key parameter K includes multiple first key parameters K1-KNAccording to the plurality of first key parameters K1-KNAnd identification of the second communication systemDetermining a plurality of second key parameters K for the second communication systemd1-KdNWherein N is an integer greater than 1.
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
Here, if the above-mentioned second key parameter KdIs smaller than the length of the target type key, and may be based on a plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThereby, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of said target type key is exactly equal to said plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNCombinations of (a) and (b). Wherein the plurality of second key parameters K may be arranged in a preset orderd1-KdNThe preset sequence can be set according to actual conditions, and the embodiment of the present application does not particularly limit this. Illustratively, the target type key K is set as the target type keyd1||Kd2……||KdN。
Or, the target type key is made to be the plurality of second key parameters Kd1-KdNE.g. if the length of the target type key is smaller than the plurality of second key parameters Kd1-KdNThe target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), M being the length of the target type key.
In some possible embodiments, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured. Illustratively, the preset position may include at least one of a most significant bit and a least significant bit.
Illustratively, the preset position is the most significant bit, and the target type key is MSB (K)d1||Kd2……||KdNM bits). Where MSB denotes the most significant bit.
In some possible embodiments, the plurality of first key parameters K is1-KNAre obtained from a plurality of freshness parameters (fresh).
The value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
Here, different or the same key length may be corresponding to different numbers of keys, and different or the same key length may also be corresponding to different key types, depending on the system configuration, where the value of N may be set to be determined according to the length of the target type key.
In some possible embodiments, the freshness parameters are generated randomly, or the freshness parameters are a plurality of equally spaced values, or timestamp-related values, or the like.
Here, in addition to the above cases, the above freshness parameters may be determined according to actual situations, and this is not particularly limited by the embodiment of the present application.
In some possible embodiments, the method further comprises:
determining the length of the target type key;
if the second key parameter K is abovedIs less than the length of the target type key, based on the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining the identity of the second communication systemA plurality of second key parameters Kd1-KdNWherein N is an integer greater than 1;
determining the target type key as the plurality of second key parameters Kd1-KdNOr, determining the target type key as the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key.
According to the embodiment of the application, the second key parameter K of the second communication system is determined by obtaining the first key parameter K of the first communication systemdIf the second key parameter K isdIs less than the second key parameter KdThe length of the corresponding target type key is determined according to a plurality of first key parameters K contained in the first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdNThe target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNThe combination of the above-mentioned two communication systems, wherein M is the length of the target type key, so that under the condition that the communication systems are completely independent, the key parameters of other communication systems are determined according to the key parameters of a certain communication system, so that the other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, thereby omitting the process of key negotiation deduction, greatly saving signaling and improving efficiency.
In addition, the embodiment of the application determines the second key parameter K of the second communication systemdIs determined by the second key derivation function. Fig. 8 is a flowchart illustrating another key processing method according to an embodiment of the present application, where an execution subject of the embodiment may be the analysis device 101 in the embodiment shown in fig. 1. As shown in fig. 8, the method includes:
s801: and acquiring a first key parameter K, wherein the first key parameter K is a key parameter of the first communication system.
Step S801 is the same as the implementation of step S201, and is not described herein again.
S802: determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd。
In some possible embodiments, the second key derivation function corresponds to the second communication system.
Here, different communication systems may correspond to different or the same key derivation function, depending on the system configuration. For example, the second key derivation function may be configured to correspond to the second communication system, and the second key parameter K may be determined according to the first key parameter K and the identifier of the second communication system through the second key derivation function corresponding to the second communication systemdThereby omitting the process of the second communication system key agreement deduction.
Wherein, the Key Derivation Function (KDF) can be used to derive the input key of various algorithms, for example, the first key parameter K and the identification of the second communication system can be used as input parameters to generate the second key parameter K of the second communication systemdExemplary, such as: kdKDF (K, identification of the second communication system).
In addition, the KDF may also include other input parameters, where the first key parameter K includes a plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication systemd1-KdNFor example.
The input parameters of the KDF further comprise a type identifier of a target type key, said determining a plurality of second key parameters K of said second communication systemd1-KdNThe method can comprise the following steps:
through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system, the identification of the second communication system and the type identification of the target type keyd1-KdN。
Illustratively, the above-mentioned plurality of groups can be divided intoA key parameter K1-KNGenerating a plurality of second key parameters K of the second communication system by taking the identifier of the second communication system and the type identifier of the target type key as input parametersd1-KdNThe second key parameter is KDF (first key parameter, identification of the second communication system, type identification of the target type key). Wherein the type identification of the target type key is an optional parameter.
Here, the KDF may also comprise other input parameters, for example also an identification of the first communication system, in addition to the plurality of first key parameters K mentioned above1-KNObtained from a plurality of freshness parameters, the input parameters of the KDF may also include the freshness parameter.
Illustratively, if the input parameter of the KDF further comprises an identification of the first communication system, the determining of the plurality of second key parameters K of the second communication system is performedd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNThe identification of the first communication system, the identification of the second communication system and the type identification of the target type key determine a plurality of second key parameters K of the second communication systemd1-KdNAnd the second key parameter is KDF (first key parameter, the identifier of the first communication system, the identifier of the second communication system, and the type identifier of the target type key), where the identifier of the first communication system and the type identifier of the target type key are optional parameters.
Determining a plurality of second key parameters K for said second communication system if the input parameters of the KDF further comprise a freshness parameterd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identification of the second communication system and the type identification of the target type keyd1-KdNKDF (first key parameter, freshness parameter, identifier of the second communication system, type identifier of the target type key), wherein the freshness parameter and the type identifier of the target type key are optional parameters。
Determining a plurality of second key parameters K for said second communication system if the input parameters of the KDF further comprise an identification and freshness parameter of the first communication systemd1-KdNThe method can also comprise the following steps: through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identifier of the first communication system, the identifier of the second communication system and the type identifier of the target type keyd1-KdNAnd a second key parameter (KDF) (first key parameter, freshness parameter, identifier of the first communication system, identifier of the second communication system, and type identifier of the target type key), wherein the freshness parameter, the identifier of the first communication system, and the type identifier of the target type key are optional parameters.
In some possible embodiments, the second key derivation function may include, for example, HMAC-SHA256, HMAC-SHA3, HMAC-SM3, and the like. The key derivation function used in the present application may also use other key derivation functions in addition to the above, and this is not particularly limited in this embodiment of the present application.
In addition, the algorithms and criteria used by the key derivation function in the embodiment of the present application may also include other algorithms and criteria, and the embodiment of the present application does not particularly limit this.
Here, the key derivation function may include different algorithms, such as the HMAC-SHA256, HMAC-SHA3, and HMAC-SM3, etc., described above. The input parameters of the KDF may therefore also include an algorithm identification for identifying different algorithms, and correspondingly, the above-mentioned determining of the plurality of second key parameters K of the second communication systemd1-KdNThe method can also comprise the following steps:
through KDF, the plurality of first key parameters K1-KNDetermining a plurality of second key parameters K of the second communication system by using the freshness parameter, the identifier of the first communication system, the identifier of the second communication system, the type identifier of the target type key and the algorithm identifierd1-KdNSecond key parameter KDF (first key parameter, freshness parameter, standard of the first communication system)Identity of the second communication system, type identity of the target type key, algorithm identity), wherein the freshness parameter, the identity of the first communication system, the type identity of the target type key and the algorithm identity are optional parameters.
According to the embodiment of the application, the second key parameter K meeting the key requirement of the second communication system is accurately generated through the second key derivation function according to the first key parameter K and the identifier of the second communication systemdAnd, by acquiring the first key parameter K of the first communication system, determining the second key parameter K of the second communication systemdUnder the condition that all communication systems are completely independent, key parameters of other communication systems can be determined according to the key parameters of a certain communication system, so that other communication systems can generate keys for encryption and decryption and/or keys for integrity protection and the like based on the key parameters, the process of key negotiation deduction is omitted, signaling is greatly saved, and efficiency is improved.
Fig. 9 is a schematic structural diagram of a key processing apparatus provided in the present application, where the apparatus includes: an acquisition module 901, a determination module 902 and a sending module 903. The key processing device here may be the analysis device itself, or a chip or an integrated circuit that implements the functions of the analysis device. It should be noted here that the division of the obtaining module and the determining module is only a division of logical functions, and the obtaining module and the determining module may be integrated or independent physically.
The obtaining module 901 is configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system.
A determining module 902, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd。
Wherein the first communication system is different from the second communication system.
In one possible design, the sending module 903 is configured to determine the second key parameter K of the second communication system in the determining module 902dThereafter, the second communication system transmits the second signal to the second communication systemKey parameter KdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module 902 is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
In one possible design, the target type key is the second key parameter Kd。
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd。
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, then it is confirmedDefining the target type key as the second key parameter KdM bits from a preset position, where M is the length of the target type key, and the preset position is predefined or configured.
In one possible design, the second key parameter corresponds to a target type key;
the determining module 902 is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd;
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module 902 is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module 902 is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd。
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function includes at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
The apparatus of this embodiment may be correspondingly used to implement the technical solutions in the embodiments shown in the foregoing methods, and the implementation principles, implementation details, and technical effects thereof are similar and will not be described herein again.
Alternatively, fig. 10A and 10B schematically provide one possible basic hardware architecture of the key processing apparatus described herein.
Referring to fig. 10A and 10B, the key processing device 1000 includes at least one processor 1001 and a communication interface 1003. Further optionally, a memory 1002 and a bus 1004 may also be included.
The key processing apparatus 1000 may be a computer or a server, and the present application is not limited thereto. In the key processing device 1000, the number of the processors 1001 may be one or more, and fig. 10A and 10B illustrate only one of the processors 1001. Alternatively, the processor 1001 may be a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), or a Digital Signal Processor (DSP). If the key processing device 1000 has a plurality of processors 1001, the types of the plurality of processors 1001 may be different, or may be the same. Alternatively, the plurality of processors 1001 of the key processing device 1000 may also be integrated into a multi-core processor.
The communication interface 1003 may provide information input/output for the at least one processor. Any one or any combination of the following devices may also be included: a network interface (e.g., an ethernet interface), a wireless network card, etc. having a network access function.
Optionally, the communication interface 1003 may also be used for the key processing apparatus 1000 to perform data communication with other computing devices or terminals.
Further alternatively, fig. 10A and 10B show the bus 1004 as a thick line. A bus 1004 may connect the processor 1001 with the memory 1002 and the communication interface 1003. Thus, the processor 1001 may access the memory 1002 via the bus 1004 and may also interact with other computing devices or terminals using the communication interface 1003.
In the present application, the key processing apparatus 1000 executes computer instructions in the memory 1002, so that the key processing apparatus 1000 implements the key processing method provided in the present application, or so that the key processing apparatus 1000 deploys the key processing apparatus.
From the viewpoint of logical functional division, illustratively, as shown in fig. 10A, the memory 1002 may include an obtaining module 901 and a determining module 902. The inclusion herein merely refers to that instructions stored in the memory may, when executed, implement the functionality of the retrieving module and the determining module, respectively, and is not limited to a physical structure.
The obtaining module 901 is configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system.
A determining module 902, configured to determine a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd。
Wherein the first communication system is different from the second communication system.
In one possible design, as shown in fig. 10B, the memory 1002 further includes a sending module 903, configured to determine the second key parameter K of the second communication system in the determining module 902dThen, the second key parameter K is sent to the second communication systemdThe second key parameter KdFor the second communication system to determine the target type key.
In one possible design, the second key parameter K isdCorresponding to the target type key.
The determining module 902 is specifically configured to:
determining a second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
In one possible design, the target type key is the second key parameter Kd。
Wherein if the second key parameter K is setdIs equal to the length of the target type key, which is the second key parameter Kd。
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the above-mentionedSecond key parameter KdIs equal to the length of the target type key, the target type key is determined to be the second key parameter Kd。
In one possible design, the second key parameter K isdA corresponding target type key;
the second key parameter KdIs longer than the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
In one possible design, the determining module 902 is further configured to:
determining the length of the target type key;
if the second key parameter K is abovedIs greater than the length of the target type key, the target type key is determined to be the second key parameter KdM bits from a preset position, where M is the length of the target type key, and the preset position is predefined or configured.
In one possible design, the second key parameter corresponds to a target type key;
the determining module 902 is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of the second communication system by a first key derivation function, the first key parameter K and an identifier of the second communication systemd;
The first key derivation function is determined according to the length of the target type key, or the first key derivation function corresponds to the length of the target type key, which may also be understood as a correspondence relationship between the first key derivation function and the length of the target type key.
In one possible design, the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module 902 is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identifier of the second communication system, determining a plurality of second key parameters K of the second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
In one possible design, the target type key is the plurality of second key parameters Kd1-KdNM bits from a predetermined position, wherein the predetermined position is predefined or configured.
One possible design is that the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key, or the value of N corresponds to the length of the target type key, which can also be understood as that the value of N corresponds to the target type key.
In one possible design, the freshness parameters are generated randomly, or the freshness parameters are a plurality of values at equal intervals, or a timestamp-related value, or the like.
In one possible design, the determining module 902 is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K and an identification of a second communication systemd。
In one possible design, the second key derivation function corresponds to the second communication system.
In one possible design, the first key derivation function or the second key derivation function includes at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
In addition, the key processing device described above may be implemented by software as in fig. 10A and 10B described above, or may be implemented by hardware as a hardware module or as a circuit unit.
The present application provides a computer-readable storage medium, the computer program product comprising computer instructions that instruct a computing device to perform the above-mentioned key processing method provided herein.
The present application provides a chip comprising at least one processor and a communication interface providing information input and/or output for the at least one processor. Further, the chip may also include at least one memory for storing computer instructions. The at least one processor is used for calling and executing the computer instructions to execute the key processing method provided by the application.
The application provides a terminal, the terminal can be transport means or smart machine, for example vehicle, unmanned aerial vehicle, unmanned transport vechicle or robot etc. contain above-mentioned key processing apparatus on it.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Claims (20)
1. A method of key processing, the method comprising:
acquiring a first key parameter K, wherein the first key parameter K is a key parameter of a first communication system;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd;
Wherein the first communication system is different from the second communication system.
2. The method of claim 1, wherein the second key parameter KdA corresponding target type key;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
3. The method of claim 2, wherein the target type key is the second key parameterNumber Kd。
4. Method according to claim 1 or 2, characterized in that said second key parameter KdA corresponding target type key;
the second key parameter KdIs greater than the length of the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
5. Method according to any of claims 1 to 4, characterized in that said second key parameter KdA corresponding target type key;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemdThe method comprises the following steps:
determining the length of the target type key;
determining a second key parameter K of a second communication system by means of a first key derivation function, the first key parameter K and an identification of the second communication systemd;
Wherein the first key derivation function is determined according to a length of the target type key.
6. Method according to claim 1 or 2, characterized in that said second key parameter KdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
determining a second key parameter K of the second communication system according to the first key parameter K and the identifier of the second communication systemd(ii) a The method comprises the following steps:
according to the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining a plurality of second key parameters K of said second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
7. The method of claim 6, wherein the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key.
8. Method according to any of claims 1 to 4 and 6 to 7, wherein the second key parameter K of the second communication system is determined according to the first key parameter K and an identity of the second communication systemdThe method comprises the following steps:
determining the second key parameter K by a second key derivation function, the first key parameter K, and an identity of a second communication systemd。
9. The method of claim 5 or 8, wherein the first key derivation function or the second key derivation function comprises at least one of a hashed message authentication code, HMAC-secure hash algorithm, SHA256, HMAC-SHA3, and HMAC-SM 3.
10. A key processing apparatus, comprising:
an obtaining module, configured to obtain a first key parameter K, where the first key parameter K is a key parameter of a first communication system;
a determining module, configured to determine the second communication system according to the first key parameter K and an identifier of the second communication systemSecond key parameter K of the communication systemd;
Wherein the first communication system is different from the second communication system.
11. The apparatus of claim 10, wherein the second key parameter K is a function of the first key parameter KdA corresponding target type key;
the determining module is specifically configured to:
determining the second key parameter K of the second communication system according to the first key parameter K, the identifier of the second communication system and the type identifier of the target type keyd。
12. The apparatus of claim 11, wherein the target type key is the second key parameter Kd。
13. The apparatus according to claim 10 or 11, wherein the second key parameter K isdA corresponding target type key;
the second key parameter KdIs greater than the length of the target type key;
the target type key is the second key parameter KdM bits from a preset position, where M is the length of the target type key, the preset position is predefined or configured, and M is an integer greater than 0.
14. The apparatus according to any of claims 10 to 13, wherein the second key parameter K is a function of the second key parameter KdA corresponding target type key;
the determining module is specifically configured to:
determining the length of the target type key;
determining a second key parameter K of a second communication system by means of a first key derivation function, the first key parameter K and an identification of the second communication systemd;
Wherein the first key derivation function is determined according to a length of the target type key.
15. The apparatus according to claim 10 or 11, wherein the second key parameter K isdA corresponding target type key;
the first key parameter K comprises a plurality of first key parameters K1-KNWherein N is an integer greater than 1;
the determining module is specifically configured to:
according to the plurality of first key parameters K1-KNAnd an identification of the second communication system, determining a plurality of second key parameters K of said second communication systemd1-KdN;
Wherein the target type key is the second key parameters Kd1-KdNOr the target type key is the plurality of second key parameters Kd1-KdNM bits in the combination of (1), where M is the length of the target type key and M is an integer greater than 0.
16. The apparatus of claim 15, wherein the plurality of first key parameters K1-KNIs obtained according to a plurality of freshness parameters;
the value of N is determined according to the length of the target type key.
17. The apparatus according to any one of claims 11 to 13 and 15 to 16, wherein the determining module is specifically configured to:
determining the second key parameter K by a second key derivation function, the first key parameter K, and an identity of a second communication systemd。
18. The apparatus of claim 14 or 17, wherein the first key derivation function or the second key derivation function comprises at least one of HMAC-SHA256, HMAC-SHA3, and HMAC-SM 3.
19. A key processing apparatus, comprising:
comprises a processor and a memory;
the memory to store computer instructions;
the processor, configured to execute the computer instructions stored by the memory, to cause the key processing apparatus to implement the method of any one of claims 1 to 9.
20. A computer program product, characterized in that it comprises computer instructions for instructing a computing device to perform the method of any of claims 1 to 9.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/082628 WO2021196047A1 (en) | 2020-03-31 | 2020-03-31 | Key processing method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112771815A true CN112771815A (en) | 2021-05-07 |
CN112771815B CN112771815B (en) | 2022-11-11 |
Family
ID=75699495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202080005167.0A Active CN112771815B (en) | 2020-03-31 | 2020-03-31 | Key processing method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112771815B (en) |
WO (1) | WO2021196047A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113872752A (en) * | 2021-09-07 | 2021-12-31 | 哲库科技(北京)有限公司 | Security engine module, security engine device and communication equipment |
WO2023030148A1 (en) * | 2021-08-30 | 2023-03-09 | 华为技术有限公司 | Communication method, apparatus and system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090067623A1 (en) * | 2007-09-12 | 2009-03-12 | Samsung Electronics Co., Ltd. | Method and apparatus for performing fast authentication for vertical handover |
CN101938743A (en) * | 2009-06-30 | 2011-01-05 | 中兴通讯股份有限公司 | Generation method and device of safe keys |
CN104253692A (en) * | 2014-01-21 | 2014-12-31 | 北京印天网真科技有限公司 | SE-based (symmetric encryption based) key management method and device |
CN104852806A (en) * | 2015-05-15 | 2015-08-19 | 飞天诚信科技股份有限公司 | Method for realizing signature based on secret key type |
WO2016134536A1 (en) * | 2015-02-28 | 2016-09-01 | 华为技术有限公司 | Key generation method, device and system |
CN106209777A (en) * | 2016-06-24 | 2016-12-07 | 韩磊 | A kind of automatic driving car on-vehicle information interactive system and safety communicating method |
CN106797314A (en) * | 2014-09-04 | 2017-05-31 | 皇家飞利浦有限公司 | Arrange the cryptographic system shared for key |
US20170237780A1 (en) * | 2016-02-17 | 2017-08-17 | Nagravision S.A. | Methods and systems for enabling legal-intercept mode for a targeted secure element |
CN107079293A (en) * | 2015-04-08 | 2017-08-18 | 华为技术有限公司 | A kind of enhanced method of gprs system key, SGSN equipment, UE, HLR/HSS and gprs system |
CN109788474A (en) * | 2017-11-14 | 2019-05-21 | 华为技术有限公司 | A kind of method and device of message protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056177B (en) * | 2007-06-01 | 2011-06-29 | 清华大学 | Radio mesh re-authentication method based on the WLAN secure standard WAPI |
CN103888941B (en) * | 2012-12-20 | 2018-03-06 | 新华三技术有限公司 | The method and device that a kind of wireless network keys are consulted |
WO2015062239A1 (en) * | 2013-11-04 | 2015-05-07 | 华为技术有限公司 | Method and device for key negotiation processing |
CN108199837B (en) * | 2018-01-23 | 2020-12-25 | 新华三信息安全技术有限公司 | Key negotiation method and device |
-
2020
- 2020-03-31 CN CN202080005167.0A patent/CN112771815B/en active Active
- 2020-03-31 WO PCT/CN2020/082628 patent/WO2021196047A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090067623A1 (en) * | 2007-09-12 | 2009-03-12 | Samsung Electronics Co., Ltd. | Method and apparatus for performing fast authentication for vertical handover |
CN101938743A (en) * | 2009-06-30 | 2011-01-05 | 中兴通讯股份有限公司 | Generation method and device of safe keys |
CN104253692A (en) * | 2014-01-21 | 2014-12-31 | 北京印天网真科技有限公司 | SE-based (symmetric encryption based) key management method and device |
CN106797314A (en) * | 2014-09-04 | 2017-05-31 | 皇家飞利浦有限公司 | Arrange the cryptographic system shared for key |
WO2016134536A1 (en) * | 2015-02-28 | 2016-09-01 | 华为技术有限公司 | Key generation method, device and system |
CN107079293A (en) * | 2015-04-08 | 2017-08-18 | 华为技术有限公司 | A kind of enhanced method of gprs system key, SGSN equipment, UE, HLR/HSS and gprs system |
CN104852806A (en) * | 2015-05-15 | 2015-08-19 | 飞天诚信科技股份有限公司 | Method for realizing signature based on secret key type |
US20170237780A1 (en) * | 2016-02-17 | 2017-08-17 | Nagravision S.A. | Methods and systems for enabling legal-intercept mode for a targeted secure element |
CN106209777A (en) * | 2016-06-24 | 2016-12-07 | 韩磊 | A kind of automatic driving car on-vehicle information interactive system and safety communicating method |
CN109788474A (en) * | 2017-11-14 | 2019-05-21 | 华为技术有限公司 | A kind of method and device of message protection |
Non-Patent Citations (1)
Title |
---|
马传龙等: "《信息安全原理与实践教程》", 31 October 2011 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023030148A1 (en) * | 2021-08-30 | 2023-03-09 | 华为技术有限公司 | Communication method, apparatus and system |
CN113872752A (en) * | 2021-09-07 | 2021-12-31 | 哲库科技(北京)有限公司 | Security engine module, security engine device and communication equipment |
CN113872752B (en) * | 2021-09-07 | 2023-10-13 | 哲库科技(北京)有限公司 | Security engine module, security engine device, and communication apparatus |
Also Published As
Publication number | Publication date |
---|---|
WO2021196047A1 (en) | 2021-10-07 |
CN112771815B (en) | 2022-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110177354B (en) | Wireless control method and system for vehicle | |
CN111279310B (en) | Vehicle-mounted equipment upgrading method and related equipment | |
CN112055952B (en) | Vehicle-mounted equipment upgrading method and related equipment | |
US11924635B2 (en) | Security authentication method and apparatus thereof, and electronic device | |
EP2986045B1 (en) | Method, device and system for configuring wireless terminal | |
US20180150291A1 (en) | Bluetooth low energy device, and data update system and method | |
US9032186B2 (en) | Utilization of a microcode interpreter built in to a processor | |
EP4068675A1 (en) | Method and device for certificate application | |
CN112822177B (en) | Data transmission method, device, equipment and storage medium | |
CN112771815B (en) | Key processing method and device | |
US11637704B2 (en) | Method and apparatus for determining trust status of TPM, and storage medium | |
CN111970114A (en) | File encryption method, system, server and storage medium | |
CN114079915A (en) | Method, system and device for determining user plane security algorithm | |
WO2023279283A1 (en) | Method for establishing secure vehicle communication, and vehicle, terminal and system | |
CN111770488B (en) | EHPLMN updating method, related equipment and storage medium | |
CN115510458A (en) | Detection method and related device | |
CN115175189A (en) | Communication method and device | |
CN105472606A (en) | Safety connection method, device and system | |
CN105338524A (en) | Information transmission method and device | |
CN110297687B (en) | Data interaction method, device and system based on virtual host | |
WO2024164112A1 (en) | Inter-application communication method and apparatus, communication system, and vehicle | |
CN113098688B (en) | AKA method and device | |
US20220191010A1 (en) | Key management in an integrated circuit | |
CN117135631A (en) | Equipment authentication method and terminal equipment | |
CN117061539A (en) | Business processing method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |