CN113162758B - Key generation method and device - Google Patents

Key generation method and device Download PDF

Info

Publication number
CN113162758B
CN113162758B CN202010076361.XA CN202010076361A CN113162758B CN 113162758 B CN113162758 B CN 113162758B CN 202010076361 A CN202010076361 A CN 202010076361A CN 113162758 B CN113162758 B CN 113162758B
Authority
CN
China
Prior art keywords
key
authentication
akma
ausf
aanf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010076361.XA
Other languages
Chinese (zh)
Other versions
CN113162758A (en
Inventor
黄晓婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010076361.XA priority Critical patent/CN113162758B/en
Priority to PCT/CN2021/073286 priority patent/WO2021147997A1/en
Publication of CN113162758A publication Critical patent/CN113162758A/en
Application granted granted Critical
Publication of CN113162758B publication Critical patent/CN113162758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

A key generation method and device, the method includes: after the terminal completes initial registration authentication, AUSF is based on AUSF key K generated in the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal. The key generation method and the device provided by the embodiment of the invention use the RAND and the RAND in the authentication vectorAs input parameters, the freshness and the replay attack resistance of the intermediate key are improved, and the freshness and the replay attack resistance of the application layer session key which is derived from the AKMA intermediate key are improved. In addition, the key identification of the intermediate key in the embodiment of the invention is generated synchronously with the intermediate key after the terminal is successfully authenticated for the first time, so that signaling interaction cost in a key identification generation mode according to the need can be reduced.

Description

Key generation method and device
Technical Field
The invention relates to the technical field of network information security, in particular to a key generation method and device.
Background
An important feature (feature) is introduced in the 5G security technology, that is, an authentication and session key capability is provided for a third party application by using an authentication and security mechanism of an operator network, that is, an application layer authentication and session key management (AKMA, authentication and Key Management for Applications) to ensure session security between a user terminal and an application server.
Disclosure of Invention
The invention provides a key generation method, a terminal and network equipment, which solve the problem of key generation.
According to an aspect of the present invention, at least one embodiment provides a key generation method applied to an authentication server function AUSF, including:
after the terminal completes initial registration authentication, AUSF is based on AUSF key K generated in the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
According to at least one embodiment of the present invention, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
According to at least one embodiment of the invention, the AUSF generates K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
According to at least one embodiment of the invention, the authentication vector is generated based on the 5G authentication and key agreement AKA protocol or based on the extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
According to at least one embodiment of the invention, the K is generated AKMA Comprises:
the AUSF generates the K according to the random number and AAnF_id AKMA Is used for the key identification of the mobile terminal.
According to at least one embodiment of the invention, the method further comprises:
the K is processed by AKMA The key identification of (a) is sent to the terminal.
According to another aspect of the present invention, at least one embodiment provides a key generation method, applied to a terminal, including:
after the terminal completes the initial registration authentication, the terminal generates an AUSF key K according to the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
According to at least one embodiment of the present invention, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
According to at least one embodiment of the invention, the terminal generates K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
According to at least one embodiment of the invention, the authentication vector is generated based on the 5G authentication and key agreement AKA protocol or based on the extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
According to at least one embodiment of the invention, the method further comprises:
receiving the intermediate key K sent by the AUSF AKMA Is used for the key identification of the mobile terminal.
According to another aspect of the present invention, at least one embodiment provides a key generation method applied to an application layer authentication and session key management anchor function AAnF, including:
the AAnF receives a key request sent by an application function AF, wherein the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
the AAnF obtains the K from an authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
AAnF based on AKMA intermediate key K AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
According to at least one embodiment of the invention, the K AKMA Is said AUSF is based on AUSF key K generated in initial registration authentication of the terminal AUSF And generating preset parameters.
According to at least one embodiment of the present invention, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
According to at least one embodiment of the invention, the AAnF generates K according to the following formula AF
K AF =KDF(K AKMA ,AF_id)
Wherein, KDF represents a preset key derivation function; the af_id is a representation ID of the application server AF.
According to another aspect of the present invention, at least one embodiment provides an AUSF comprising:
an intermediate key generation module for generating an AUSF key K according to the initial registration authentication of the terminal after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
According to another aspect of the present invention, at least one embodiment provides an AUSF, comprising a transceiver and a processor, wherein,
the processor is used for generating an AUSF key K according to the initial registration authentication of the terminal after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
According to another aspect of the present invention, at least one embodiment provides an AUSF comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the key generation method as described above.
According to another aspect of the present invention, at least one embodiment provides a terminal including:
an intermediate key generation module for generating AUSF key K according to the initial registration authentication after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
According to another aspect of the present invention, at least one embodiment provides a terminal comprising a transceiver and a processor, wherein,
The processor is used for after the terminal completes the initial registration authentication, according to the AUSF key K generated in the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
According to another aspect of the present invention, at least one embodiment provides a terminal including: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the key generation method as described above.
According to another aspect of the present invention, at least one embodiment provides an AAnF comprising:
a receiving module, configured to receive a key request sent by an application function AF, where the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
an acquisition module for acquiring the K from the authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
A generation module for generating an intermediate key K according to AKMA AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
According to another aspect of the present invention, at least one embodiment provides an AAnF comprising a transceiver and a processor, wherein,
The transceiver is configured to receive a key request sent by an application function AF, where the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
the processor is used for acquiring the K from an authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA The method comprises the steps of carrying out a first treatment on the surface of the According to AKMA intermediate key K AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
According to another aspect of the present invention, at least one embodiment provides an AAnF comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the key generation method as described above.
According to another aspect of the invention, at least one embodiment provides a computer-readable storage medium having stored thereon a program which, when executed by a processor, implements the steps of the method as described above.
Compared with the prior art, the key generation method and the device provided by the embodiment of the invention use the RAND and the RAND in the authentication vector in the process of pushing and deriving the intermediate key As input parameters, the freshness and the replay attack resistance of the intermediate key are improved, and the freshness and the replay attack resistance of the application layer session key which is derived from the AKMA intermediate key are improved. In addition, the key identification of the intermediate key in the embodiment of the invention is generated synchronously with the intermediate key after the terminal is successfully authenticated for the first time, so that signaling interaction cost in a key identification generation mode according to the need can be reduced.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 is a schematic diagram of an AKMA network architecture;
FIG. 2 is a schematic diagram of an AKMA key hierarchy;
fig. 3 is a flowchart of a key generation method according to an embodiment of the present invention when applied to an AUSF side;
fig. 4 is a flowchart of a key generation method according to an embodiment of the present invention when applied to a terminal side;
fig. 5 is a flowchart of a key generation method according to an embodiment of the present invention when applied to an AAnF side;
Fig. 6 is a schematic structural diagram of an AUSF according to an embodiment of the present application;
fig. 7 is a schematic diagram of another structure of an AUSF according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 9 is a schematic diagram of another structure of a terminal according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of AAnF according to an embodiment of the present application;
fig. 11 is a schematic diagram of another structure of AAnF according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the application to those skilled in the art.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented, for example, in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. "and/or" in the specification and claims means at least one of the connected objects.
The techniques described herein are not limited to NR systems and long term evolution (Long Time Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems and may also be used for various wireless communication systems such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single-carrier frequency division multiple access (Single-carrier Frequency-Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" are often used interchangeably. A CDMA system may implement radio technologies such as CDMA2000, universal terrestrial radio access (Universal Terrestrial Radio Access, UTRA), and the like. UTRA includes wideband CDMA (Wideband Code Division Multiple Access, WCDMA) and other CDMA variants. TDMA systems may implement radio technologies such as the global system for mobile communications (Global System for Mobile Communication, GSM). OFDMA systems may implement radio technologies such as ultra mobile broadband (UltraMobile Broadband, UMB), evolved UTRA (E-UTRA), IEEE 802.21 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, flash-OFDM, and the like. UTRA and E-UTRA are parts of the universal mobile telecommunications system (Universal Mobile Telecommunications System, UMTS). LTE and higher LTE (e.g., LTE-a) are new UMTS releases that use E-UTRA.
UTRA, E-UTRA, UMTS, LTE, LTE-a and GSM are described in the literature from an organization named "third generation partnership project" (3rd Generation Partnership Project,3GPP).
CDMA2000 and UMB are described in the literature from an organization named "third generation partnership project 2" (3 GPP 2). The techniques described herein may be used for the systems and radio technologies mentioned above as well as for other systems and radio technologies. However, the following description describes an NR system for purposes of example, and NR terminology is used in much of the description below, although the techniques may also be applied to applications other than NR system applications.
The following description provides examples and does not limit the scope, applicability, or configuration as set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For example, the described methods may be performed in an order different than described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
Fig. 1 shows an AKMA network architecture implementing application layer authentication and session key management capabilities, which mainly includes:
application layer authentication and session key management (AKMA, authentication and Key Management for Applications)
An authentication server function (AUSF, authentication Server Function);
an application layer authentication and session key management anchor Function (AAnF, AKMA anchor Function);
application functions (AF, application Function);
terminal (UE)
Figure 2 shows an AKMA key hierarchy for subsequent AKMA key derivation using the intermediate key KAUSF in a 5G key architecture, where ME represents Mobile Equipment (Mobile Equipment) and HPLMN represents home PLMN.
In the prior art about K AKMA And K AF The details of the deriving method and parameters are not yet determined, and the following unresolved problems still exist at present:
1) How to derive into K AKMA
2) When to generate K AKMA Key identification of (a);
3) How to derive into K AF
In the prior art, a general self-starting architecture (GBA, generic Bootstrapping Architecture) technology suitable for a 2/3/4G network, similar to an AKMA technology, provides authentication and key management capabilities for upper layer applications based on network security capabilities of operators. In GBA technology, the derivation method of the intermediate key Ks and the session key ks_naf is as follows:
Ks=CK||IK;
Ks_NAF=KDF(Ks,"gba-me",RAND,IMPI,NAF_Id)。
The AKMA technique differs from the GBA technique in that:
1) GBA employs explicit authentication, i.e., based on the first authentication by the operator network, the UE and BSF using GBA independently perform AKA authentication to complete mutual authentication between the UE and BSF for subsequent GBA procedures, meaning that the BSF obtains authentication vector Authentication Vector (AV, av=rand||autn|xres|ck|ik), the BSF derives Ks _ NAF based on Ks, the RAND parameter may be obtained as an input parameter when deriving the ks_naf key to ensure freshness of the ks_naf key. The AKMA technology adopts an implicit authentication mode, namely the authentication of AKMA depends on the first authentication of the operator network, and AAnF (equivalent to BSF in GBA) can be taken from AUSF to K after the first authentication of the operator network is completed AKMA (by K) AUSF Derived), but cannot take the authentication vector.
2) In the GBA technology, the intermediate key Ks and the temporary service identifier (B-TID) are generated by the BSF after the UE initiates the GBA authentication procedure and the AKA authentication procedure is finished, and the B-TID is used to instruct the NAF to request the BSF to obtain the corresponding ks_naf when the UE requests the NAF. Whereas AKMA uses implicit authentication, intermediate key K AKMA Is composed of K AUSF Push and deriveAnd is generated by default by the UE and the AUSF after initial authentication, without requiring the terminal to initiate a separate AKMA service request.
Due to the above-mentioned differences, the intermediate key derivation and session key derivation in AKMA technology need to consider the following problems, which are not solved by the current technology:
1) In pushing and deriving K AF How to ensure freshness of the key and to resist replay attacks. Due to K AF Since the generation of (a) is in AAnF, AAnF cannot obtain the authentication vector used for initial authentication, how to design K AKMA And K AF The derivative of (c) and the design of the input parameters need to be solved.
2) Whether the generated key identification is generated on demand or in initial authentication is different from the problem that the current technology needs to solve by the AKMA technology.
To solve at least one of the above problems, an embodiment of the present invention provides a key generation method, applied to AUSF, as shown in fig. 3, including:
step 31, after the terminal completes the initial registration authentication, the AUSF generates an AUSF key K according to the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
Here, K in step 31 AUSF Typically generated by the AUSF during initial registration authentication of the terminal.
Through the steps, the embodiment of the invention confirms that the intermediate key and the key identifier of the intermediate key are synchronously generated after the terminal completes 5G initial registration authentication, but does not sequentially regenerate the key identifier of the intermediate key according to the terminal request, thereby confirming the generation time of the key identifier and providing a specific implementation means, and avoiding or reducing signaling interaction cost generated by the key identifier generation mode according to the need.
According to at least one embodiment of the present invention, the preset parameters may include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
identification of AAnF aanf_id.
Here, the random number RAND andtypically generated by a Unified Data Management (UDM) function during initial registration authentication of the terminal, the aanf_id is typically an identification of the AAnF that is preconfigured by the network.
Generating K is further provided below AKMA It should be noted that the following manner is only an example that may be adopted by the embodiments of the present invention, and is not intended to limit the present invention.
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding the sequence number SQN; RAND (RAND),And aanf_id, etc. constitute an input string S of the key derivation function.
As an implementation manner, the key derivation function may be a generic key derivation function (Generic key derivation function) in GBA technology, and the following description will simply refer to the parameters related to the function, which may refer to the related prior art for further details:
S=FC||P0||L0||P1||L1||P2||L2||P3||L3||...||Pn||Ln
wherein:
-fc= [ TBD ], where TBD denotes that the value of FC can be set as desired, e.g. predetermined to a certain value.
-P0=RAND,
L0=rand length (e.g., 0x00 x 03),
-
-length (e.g., 0x00, 0x 06)
-P2=AAnF_id
Length of l1=aanf_id (e.g., 0x00, 0x 06)
Optionally, the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol. That is, the RAND may be the RAND in the authentication vector AV (RAND, AUTN, XRES, and KAUSF) generated by 5G AKA, or the RAND in the authentication vector AV '(RAND, AUTN, XRES, CK', IK ') generated by EAP-AKA', where the RAND functions as a guard K AKMA Freshness of (1), i.e. ensure each generated K AKMA And the method is not repeated, so that the method cannot be utilized by an attacker, and even if the current key is leaked, the new key regenerated through initial authentication is different from the leaked key.
The SQN is a serial number which is a component part of AUTN in the AV and the AV' so as to resist replay attack; AK is a temporary key used to conceal a sequence number. />For pushing and deriving K AKMA And the replay attack can be resisted.
AAnF_id is an identifier of AAnF
In addition, the embodiment of the invention also provides a key ID generation mode of the AKMA intermediate key, namely, in the process of generating K AKMA In the process of (1), the UE and the AUSF synchronously generate corresponding key identification key-ID. For example, the AUSF may generate the K from the random number and AAnF_id AKMA Is used for the key identification of the mobile terminal. A specific embodiment is provided belowThe following is merely an example that may be used in the embodiments of the present invention, and is not intended to limit the present invention.
key-ID=base64encode(RAND)@AAnF_id
In the above formula, the base64 encoding is a coding mode, by which the RAND is coded, and the coded result and the @ AAnF_id together form K AKMA key-ID.
In the embodiment of the invention, the terminal can generate the intermediate key K in the same way AKMA . AUSF is generating the intermediate key K AKMA After the key identification, the intermediate key K can also be used for identifying AKMA The key identification of (a) is sent to the terminal. In this way, the terminal can obtain said intermediate key K AKMA And its key identification, and then carrying the intermediate key K when an application session establishment request can be subsequently sent to an Application Function (AF) AKMA Is used for the key identification of the mobile terminal.
The manner in which the AUSF generates the intermediate key and its identification in the embodiment of the present invention is described above.
The embodiment of the invention also provides another key generation method, which is applied to the terminal, as shown in fig. 4, and comprises the following steps:
step 41, after the terminal completes the initial registration authentication, the terminal generates an AUSF key K according to the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
Here, K in step 41 AUSF Typically generated by the terminal during an initial registration authentication procedure.
Through the steps, the terminal in the embodiment of the invention can synchronously generate the intermediate key together with the AUSF after finishing the 5G initial registration authentication, thereby defining the generation mode of the intermediate key.
According to at least one embodiment of the present invention, the preset parameters may include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number SQN in authentication vector;
identification of AAnF aanf_id.
Here, the random number RAND andtypically generated by a Unified Data Management (UDM) function during initial registration authentication of the terminal, the aanf_id is typically an identification of the AAnF that is preconfigured by the network.
Generating K is further provided below AKMA It should be noted that the following manner is only an example that may be adopted by the embodiments of the present invention, and is not intended to limit the present invention.
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding the sequence number SQN; RAND (RAND),And aanf_id, etc. constitute an input string S of the key derivation function.
Optionally, the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
Optionally, the terminal may also receive the intermediate key K sent by the AUSF AKMA Is used for the key identification of the mobile terminal. In this way, the terminal can obtain said intermediate key K AKMA And its key identification, and then carrying the intermediate key K when an application session establishment request can be subsequently sent to an Application Function (AF) AKMA Is used for the key identification of the mobile terminal.
The embodiment of the invention also provides another key generation method which is applied to AAnF, as shown in FIG. 5, and comprises the following steps:
in step 51, aanf receives a key request sent by an application function AF, where the key request carries an AF identifier of the AF and a key identifier of an AKMA intermediate key KAKMA from a terminal.
Here, before step 51, the terminal may send an application session establishment request (Application session establishment request) to the AF, carrying said intermediate key K AKMA Is used for the key identification of the mobile terminal. Said intermediate key K AKMA And the key identification of the terminal is generated by the AUSF and sent to the terminal.
Step 52, AAnF obtains the K from the AUSF of the authentication server according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
Here, the K AKMA Is AUSF key K generated by the AUSF according to the initial registration authentication of the terminal AUSF And generating preset parameters. The preset constants may include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
The K is AKMA The specific generation manner may be referred to above, and will not be described herein.
Step 53, AAnF based on AKMA intermediate key K AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
Through the steps, the embodiment of the invention provides the application function key K AF Specific generation mode of (3).
Generating the application function key K is provided further below AF It should be noted that the following manner is only an example that may be adopted by the embodiments of the present invention, and is not intended to limit the present invention.
The AAnF generates K according to the following formula AF
K AF =KDF(K AKMA ,AF_id)
Wherein, KDF represents a preset key derivation function, and as an implementation manner, the key derivation function can adopt a general key derivation function (Generic key derivation function) in GBA technology; the af_id is a representation ID of the application server AF, which is used as an input string S of the key derivation function, so that it can be ensured that the AKMA service provided by the operator provides different application keys for different applications, so as to prevent the different applications from using the same key to perform malicious attacks.
From the above, it can be seen that the key generation method according to the embodiment of the present invention uses the RAND and RAND in the authentication vector in the process of deriving the intermediate keyAs input parameters, the freshness and the replay attack resistance of the intermediate key are improved, and the freshness and the replay attack resistance of the application layer session key which is derived from the AKMA intermediate key are improved. In addition, the key identification of the intermediate key in the embodiment of the invention is generated synchronously with the intermediate key after the terminal is successfully authenticated for the first time, so that signaling interaction cost in a key identification generation mode according to the need can be reduced.
The foregoing describes various methods of embodiments of the present invention. An apparatus for carrying out the above method is further provided below.
The embodiment of the invention provides an AUSF60 shown in FIG. 6, which comprises:
an intermediate key generation module 61 for, after the terminal completes the initial registration authentication, generating an AUSF key K according to the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
Optionally, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
Sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
Optionally, the intermediate key generating module is further configured to generate K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
Optionally, the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
Optionally, the intermediate key generation module further generates the K according to the random number and aanf_id AKMA Is used for the key identification of the mobile terminal.
Optionally, the AUSF further includes:
a transmitting module for transmitting the K AKMA The key identification of (a) is sent to the terminal.
Referring to fig. 7, an embodiment of the present invention provides a schematic structure of an AUSF700, which includes: a processor 701, a transceiver 702, a memory 703 and a bus interface, wherein:
in an embodiment of the present invention, the AUSF700 further includes: a program stored on the memory 703 and executable on the processor 701, which when executed by the processor 701 performs the steps of:
After the terminal completes initial registration authentication, according to AUSF key K generated in the initial registration authentication of the terminal AUSF And preset ginsengNumber, generating application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
It can be understood that, in the embodiment of the present invention, the computer program when executed by the processor 701 can implement the respective processes of the embodiment of the key generation method shown in fig. 3 and achieve the same technical effects, so that repetition is avoided and no further description is given here.
In fig. 7, a bus architecture may be comprised of any number of interconnected buses and bridges, and in particular, one or more processors represented by the processor 701 and various circuits of memory represented by the memory 703. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. The transceiver 702 may be a number of elements, i.e., including a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 701 is responsible for managing the bus architecture and general processing, and the memory 703 may store data used by the processor 701 in performing operations.
In some embodiments of the present invention, there is also provided a computer-readable storage medium having stored thereon a program which, when executed by a processor, performs the steps of:
after the terminal completes initial registration authentication, according to AUSF key K generated in the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Is used for the key identification of the mobile terminal.
When the program is executed by the processor, all the implementation modes of the key generation method applied to the AUSF can be realized, the same technical effects can be achieved, and in order to avoid repetition, the description is omitted here.
Referring to fig. 8, an embodiment of the present invention provides a terminal 80, including:
an intermediate key generation module 81 forAfter the terminal completes the initial registration authentication, the AUSF key K generated in the initial registration authentication is used AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
Optionally, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number SQN in authentication vector;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
Optionally, the intermediate key generating module is further configured to generate K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
Optionally, the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
Optionally, the terminal further includes:
a receiving module for receiving the intermediate key K sent by the AUSF AKMA Is used for the key identification of the mobile terminal.
Referring to fig. 9, a schematic structural diagram of a terminal according to an embodiment of the present invention is provided, and the terminal 900 includes: processor 901, transceiver 902, memory 903, user interface 904, and bus interface.
In an embodiment of the present invention, the terminal 900 further includes: a program stored on the memory 903 and executable on the processor 901.
The processor 901, when executing the program, performs the steps of:
after the terminal completes the initial registration authentication, the terminal generates an AUSF key K according to the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
It can be understood that in the embodiment of the present invention, when the computer program is executed by the processor 901, the processes of the embodiment of the key generation method shown in fig. 4 can be implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
In fig. 9, a bus architecture may comprise any number of interconnected buses and bridges, with various circuits of the one or more processors, represented in particular by processor 901, and the memory, represented by memory 903, linked together. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. The transceiver 902 may be a number of elements, i.e., include a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium. The user interface 904 may also be an interface capable of interfacing with an inscribed desired device for a different user device, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 901 is responsible for managing the bus architecture and general processing, and the memory 903 may store data used by the processor 901 in performing operations.
In some embodiments of the present invention, there is also provided a computer-readable storage medium having stored thereon a program which, when executed by a processor, performs the steps of:
after the terminal completes the initial registration authentication, the terminal generates an AUSF key K according to the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
When the program is executed by the processor, all the implementation modes in the key generation method applied to the terminal side can be realized, the same technical effects can be achieved, and in order to avoid repetition, the description is omitted here.
The embodiment of the invention provides an AAnF 100 shown in FIG. 10, comprising:
a receiving module 101, configured to receive a key request sent by an application function AF, where the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
an obtaining module 102, configured to obtain the K from the authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
A generation module 103 for generating an intermediate key K according to AKMA AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
Optionally, the K AKMA Is AUSF key K generated by the AUSF according to the initial registration authentication of the terminal AUSF And generating preset parameters.
Optionally, the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
application layer authentication and session key management anchor function AAnF's identification aanf_id.
Optionally, the generating module is further configured to generate K according to the following formula AF
K AF =KDF(K AKMA ,AF_id)
Wherein, KDF represents a preset key derivation function; the af_id is a representation ID of the application server AF.
Referring to fig. 11, an embodiment of the present invention provides a schematic structural diagram of AAnF1100, which includes: processor 1101, transceiver 1102, memory 1103 and bus interface, wherein:
in an embodiment of the present invention, AAnF1100 further includes: a program stored on the memory 1103 and executable on the processor 1101, which when executed by the processor 1101, performs the steps of:
receiving a key request sent by an application function AF, wherein the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
acquiring the K from an authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
According to AKMA intermediate key K AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
It can be appreciated that in the embodiment of the present invention, when the computer program is executed by the processor 1101, the processes of the embodiment of the key generation method shown in fig. 5 can be implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is provided herein.
In fig. 11, a bus architecture may comprise any number of interconnecting buses and bridges, with various circuits of the one or more processors, as represented by the processor 1101, and the memory, as represented by the memory 1103, being linked together. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. The transceiver 1102 may be a number of elements, i.e., including a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1103 may store data used by the processor 1101 in performing the operations.
In some embodiments of the present invention, there is also provided a computer-readable storage medium having stored thereon a program which, when executed by a processor, performs the steps of:
receiving a key request sent by an application function AF, wherein the key request carries an AF identifier of the AF and an application layer authentication and session key management AKMA intermediate key K from a terminal AKMA Key identification of (a);
acquiring the K from an authentication server function AUSF according to the key request AKMA AKMA intermediate key K corresponding to the key identification of (a) AKMA
According to AKMA intermediate key K AKMA And the AF identification AF_id generates an application function key K AF And sent to the AF.
When the program is executed by the processor, all the implementation modes in the key generation method applied to the AAnF can be realized, the same technical effect can be achieved, and in order to avoid repetition, the description is omitted here.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment of the present application.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (14)

1. A key generation method applied to an authentication server function AUSF, comprising:
after the terminal completes initial registration authentication, AUSF is based on AUSF key K generated in the initial registration authentication of the terminal AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Key identification of (a);
wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
wherein the AUSF generates K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
2. The method of claim 1, wherein,
the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
3. The method of claim 1, wherein the dough is produced To the K AKMA Comprises:
the AUSF generates the K according to the random number and AAnF_id AKMA Is used for the key identification of the mobile terminal.
4. A method as claimed in any one of claims 1 to 3, further comprising:
the K is processed by AKMA The key identification of (a) is sent to the terminal.
5. A key generation method, applied to a terminal, characterized by comprising:
after the terminal completes the initial registration authentication, the terminal generates an AUSF key K according to the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
Wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
wherein the terminal generates K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
6. The method of claim 5, wherein,
the authentication vector is generated based on a 5G authentication and key agreement AKA protocol or based on an extended authentication protocol-authentication and key agreement EAP-AKA' protocol.
7. The method of any one of claims 5 to 6, further comprising:
receiving the intermediate key K sent by the AUSF AKMA Is used for the key identification of the mobile terminal.
8. An AUSF, comprising:
an intermediate key generation module for generating an AUSF key K according to the initial registration authentication of the terminal after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Key identification of (a);
wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
the intermediate key generation module is further configured to generate K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
9. An AUSF comprising a transceiver and a processor, wherein,
the processor is used for generating an AUSF key K according to the initial registration authentication of the terminal after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA And generates the K AKMA Key identification of (a);
wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
the processor is also used for generating K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
10. An AUSF, comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the key generation method of any of claims 1 to 4.
11. A terminal, comprising:
an intermediate key generation module for generating AUSF key K according to the initial registration authentication after the terminal completes the initial registration authentication AUSF And preset parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
Wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
the intermediate key generation module is further configured to generate K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
12. A terminal comprising a transceiver and a processor, wherein,
the processor is used for after the terminal completes the initial registration authentication, according to the AUSF key K generated in the initial registration authentication AUSF And pre-heatingSetting parameters, generating an application layer authentication and session key management AKMA intermediate key K AKMA
Wherein the preset parameters include one or more of the following parameters:
a random number RAND in the authentication vector;
sequence number in authentication vectorAK represents a temporary key for hiding a sequence number;
an application layer authentication and session key management anchor function AAnF's identification aanf_id;
the processor is also used for generating K according to the following formula AKMA
Wherein, KDF represents a preset key derivation function; AK represents a temporary key for hiding a sequence number; RAND (RAND),And aanf_id constitutes the input string S of the key derivation function.
13. A terminal, comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the key generation method of any of claims 5 to 7.
14. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the steps of the key generation method according to any one of claims 1 to 7.
CN202010076361.XA 2020-01-23 2020-01-23 Key generation method and device Active CN113162758B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010076361.XA CN113162758B (en) 2020-01-23 2020-01-23 Key generation method and device
PCT/CN2021/073286 WO2021147997A1 (en) 2020-01-23 2021-01-22 Key generation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010076361.XA CN113162758B (en) 2020-01-23 2020-01-23 Key generation method and device

Publications (2)

Publication Number Publication Date
CN113162758A CN113162758A (en) 2021-07-23
CN113162758B true CN113162758B (en) 2023-09-19

Family

ID=76881898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010076361.XA Active CN113162758B (en) 2020-01-23 2020-01-23 Key generation method and device

Country Status (2)

Country Link
CN (1) CN113162758B (en)
WO (1) WO2021147997A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116108458A (en) * 2021-11-10 2023-05-12 中国移动通信有限公司研究院 Key generation method, device, terminal equipment and server
CN114285557A (en) * 2021-12-23 2022-04-05 中国电信股份有限公司 Communication encryption method, system and device
CN114339745B (en) * 2021-12-28 2024-01-26 中国电信股份有限公司 Key distribution method, system and related equipment
WO2023125642A1 (en) * 2021-12-31 2023-07-06 中国移动通信有限公司研究院 Authentication and/or key management method, first device, terminal and communication device
WO2023178529A1 (en) * 2022-03-22 2023-09-28 Oppo广东移动通信有限公司 Method and device for generating key
WO2023178530A1 (en) * 2022-03-22 2023-09-28 Oppo广东移动通信有限公司 Method and device for generating key
WO2023208183A2 (en) * 2022-04-29 2023-11-02 中国移动通信有限公司研究院 Information transmission method, and device
CN117641339B (en) * 2024-01-18 2024-04-09 中国电子科技集团公司第三十研究所 System and method for fast application layer authentication and key agreement

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809635A (en) * 2017-05-05 2018-11-13 华为技术有限公司 Anchor key generation method, equipment and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG10201602150QA (en) * 2016-03-18 2017-10-30 Huawei Int Pte Ltd An agent-based authentication and key agreement method for devices without sim card

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809635A (en) * 2017-05-05 2018-11-13 华为技术有限公司 Anchor key generation method, equipment and system

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
3GPP.Technical Specification Group Services and System Aspects *
based on 3GPP credential in 5G (Release 16).《3GPP TR 33.835 V0.5.0》.2019, *
based on 3GPP credential in 5G(Release 16). TR 33.835 V0.5.0.2019,第100页. *
Clause 6.X – Deriving AKMA key during UE registration;Nokia 等;《3GPP TSG-SA3 Meeting #97,S3-194645》;20191022;第6.X节 *
Clause 6.X – Deriving AKMA key during UE registration;Nokia 等;S3-194645;第6.X节 *
Clause 6.Y – Deriving AF key for a specific Application function;NOKIA 等;《3GPP TSG-SA3 Meeting #97,S3-194229》;20191122;第6. Y节 *
Clause 6.Y – Deriving AF key for a specific Application function;NOKIA 等;S3-194229;第6. Y节 *
Huawei 等.Resovle Editor's notes in Solution for Key freshness in AKMA.S3-192065.2019,第6.22.2节. *
Resovle Editor"s notes in Solution for Key freshness in AKMA;Huawei 等;《3GPP TSG SA WG3 (Security) Meeting #95-Bis,S3-192065 》;20190628;第6.22.2节 *
Study on authentication and key management for applications *

Also Published As

Publication number Publication date
CN113162758A (en) 2021-07-23
WO2021147997A1 (en) 2021-07-29

Similar Documents

Publication Publication Date Title
CN113162758B (en) Key generation method and device
JP6121512B2 (en) Encryption key generation
KR102024653B1 (en) Access Methods, Devices, and Systems for User Equipment (UE)
JP6732095B2 (en) Unified authentication for heterogeneous networks
KR102112542B1 (en) Method and system for generating session key using Diffie-Hellman procedure
US9693226B2 (en) Method and apparatus for securing a connection in a communications network
EP2377337B1 (en) Service-based authentication to a network
CN111147231B (en) Key agreement method, related device and system
AU2020200523B2 (en) Methods and arrangements for authenticating a communication device
US11082843B2 (en) Communication method and communications apparatus
JP7237200B2 (en) Parameter transmission method and device
EP3956792B1 (en) Cryptographic key generation for mobile communications device
CN109076086A (en) Execute the security signaling before Authentication and Key Agreement
CN112087753B (en) Authentication method, device and system
CN110831002B (en) Method and device for key deduction and computing storage medium
EP2249593A1 (en) Method and apparatus for authenticating a mobile device
CN117915322A (en) Slice secondary authentication method and system based on key integrity detection
CN117424732A (en) Access method and system for virtual private network service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant