WO2010012201A1 - An authorization method, a communication apparatus and a communication system - Google Patents

An authorization method, a communication apparatus and a communication system Download PDF

Info

Publication number
WO2010012201A1
WO2010012201A1 PCT/CN2009/072845 CN2009072845W WO2010012201A1 WO 2010012201 A1 WO2010012201 A1 WO 2010012201A1 CN 2009072845 W CN2009072845 W CN 2009072845W WO 2010012201 A1 WO2010012201 A1 WO 2010012201A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
key
relay station
response value
air interface
Prior art date
Application number
PCT/CN2009/072845
Other languages
French (fr)
Chinese (zh)
Inventor
刘菁
陈璟
彭炎
张爱琴
Original Assignee
深圳华为通信技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳华为通信技术有限公司 filed Critical 深圳华为通信技术有限公司
Publication of WO2010012201A1 publication Critical patent/WO2010012201A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an authentication method, a communication device, and a communication system. Background technique
  • the network side In the mobile communication system, in order to ensure the security of the service, the network side needs to perform authentication processing on the user equipment (User Equipment, UE), so that the illegal UE cannot obtain the service provided by the network side, thereby ensuring the interests of the operator. .
  • the UE also needs to verify whether the authentication information sent by the network side is valid, that is, the UE performs authentication processing on the network side, and prevents the illegal network side from using the authentication information that has been used by the legal network side to perform replay attacks on the UE, so that the UE I believe that the illegal network side is legal.
  • the air interface link between the UE and the evolved base station (E-UTRAN Node B, eNB) is single-hop, and the Evolved Packet System (Evolved Packet System) is adopted.
  • EPS Evolved Packet System
  • AKA Authentication and Key Agreement
  • the entire authentication process is included in an authentication process, and authentication is performed by means of an authentication tuple including: a random number (RAND), an expected response (XRES), a key ( K and an authentication token (AUTN), wherein the key is derived from an encryption key (Cipher Key, CK) and an integrity key (Integrity Key, IK); the AUTN further includes an authentication sequence number (Sequence Number, SQN), Authentication Management Field (AMF) and Message Authentication Code (MAC).
  • RAND random number
  • XRES expected response
  • K K
  • an authentication token AUTN
  • the key is derived from an encryption key (Cipher Key, CK) and an integrity key (Integrity Key, IK)
  • the AUTN further includes an authentication sequence number (Sequence Number, SQN), Authentication Management Field (AMF) and Message Authentication Code (MAC).
  • the air interface link between the UE and the eNB in the LTE system is segmented, including the access link between the UE and the RS, and the relay chain between the RS and the eNB. Road.
  • the RS can be regarded as the UE for network access, that is, the RS adopts the same authentication process as the legacy UE.
  • the authentication process in the RS access process is :
  • Step 101 The RS sends an authentication request to the Mobility Management Entity (MME), where the message carries the International Mobile Subscriber Identity (IMSI) of the RS, and the capability of the RS (that is, the supported encryption and encryption).
  • IMSI International Mobile Subscriber Identity
  • KSI key identifier
  • Step 102 The MME forwards an RS authentication request to the Home Subscriber Server (HSS), where the message carries the identity identifier of the RS, the service network identifier, and the like, and the HSS finds the shared secret corresponding to the user according to the IMSI of the RS.
  • Key K and randomly generate a RAND, and then generate an authentication vector (AV) corresponding to the RS according to the RAND, the currently stored authentication SQN, RS and HSS shared key K and other information, wherein the AV includes RAND, XRES, flat and AUTN;
  • Step 103 The HSS returns an authentication response to the MME, where the message carries the authentication vector AV of the user, and the key identifier 3 ⁇ 4/ AW£ corresponding to the key SM£ , and the MME will receive the authentication of the RS.
  • Vector to save
  • Step 104 The MME sends an RS authentication request to the RS, where the message carries the corresponding RAND and AUTN in the RS authentication vector, and the key identifier/ ASM £ corresponding to the key SM£ .
  • Step 105 The RS performs verification according to the received RAND and AUTN, including: according to RAND,
  • the SQN in the AUTN and the key K shared by the network side jointly calculate a MAC value, and compare whether the MAC value is consistent with the MAC value parsed from the received AUTN. If they are consistent, the RS authenticates the network side. Passing, using RAND and the key K shared with the network side to calculate a response (Response, RES) is sent to the MME;
  • Step 106 The MME compares whether the RES received from the RS is consistent with the XRES stored in the user AV. If the network side authenticates the RS, the MME further derives the air interface key K according to the key ASM £ .
  • the eNB sends the air interface key and the encryption and integrity protection algorithm supported by the RS to the eNB through a Security Mode Command (SMC);
  • SMC Security Mode Command
  • Step 107 The eNB performs an encryption and integrity protection algorithm supported by the received RS, and The encryption and integrity protection algorithm supported by the body, the algorithm for determining the encryption and integrity protection keys of the air interface user plane and the control plane, and the selected algorithm is sent to the RS through the SMC. At this time, the RS and the eNB can each utilize the same.
  • the air interface key K eNB further derives the user air interface encryption and integrity protection key through the selected key algorithm.
  • the inventor has found that the above technical solution has at least the following drawbacks:
  • the authentication process of the RS needs to be modified correspondingly to the HSS of the core network, including increasing the HSS to the RS.
  • the embodiments of the present invention provide an authentication method, a communication device, and a communication system.
  • the embodiments of the present invention are implemented by the following technical solutions:
  • An authentication method including:
  • the first device receives the authentication request sent by the relay station, and the authentication request includes the relay station identity identifier; the first device acquires the authentication vector, sends an authentication vector to the relay station, and instructs the relay station to authenticate the authentication vector, and the authentication vector is generated by the second device independent of the core network. Corresponding to the relay station identity identifier; the first device receives the response value sent by the relay station after the authentication vector is authenticated, and authenticates the response value, and when the authentication passes, the air interface key is derived.
  • a communication device comprising:
  • a request receiving unit configured to receive an authentication request sent by the relay station, where the authentication request includes a relay station identity identifier
  • An obtaining unit configured to obtain an authentication vector, where the authentication vector is generated by a second device independent of the core network, and corresponding to the relay station identity identifier;
  • An authentication vector sending unit configured to send, to the relay station, an authentication vector acquired by the acquiring unit, and instruct the relay station to authenticate the authentication vector
  • a response value receiving unit configured to receive a response value sent by the relay station after the authentication vector authentication sent by the authentication vector sending unit passes;
  • An authentication unit configured to authenticate a response value received by the response value receiving unit
  • the air interface key deriving unit is configured to derive an air interface key when the authentication unit passes the response value authentication.
  • a communication system comprising: a first device, configured to receive an authentication request sent by the relay station, where the authentication request includes an identity of the relay station, acquire an authentication vector, send the authentication vector to the relay station, and instruct the relay station to authenticate the authentication vector And generating, by the second device independent of the core network, the identifier corresponding to the relay station, and receiving the response value sent by the relay station after the authentication vector is authenticated, and authenticating the response value. , when the authentication is passed, the air interface key is derived.
  • the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to the RS, and receives the response value sent by the RS after the authentication vector is authenticated, and the response value is authenticated, and the authentication is passed after the authentication is performed.
  • Key complete authentication of the RS.
  • a network logical entity is introduced on the access network side, and the logical entity on the access network side shares the shared key with the relay station, and the access network side completes the identity authentication and key derivation of the RS, thereby completing the network security connection of the relay station. Therefore, the network security access of the relay station can be realized without modifying the core network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
  • 1 is a signaling diagram of a prior art relay station access authentication
  • Embodiment 1 of the present invention is a flow chart of a method for implementing Embodiment 1 of the present invention
  • Embodiment 3 is a signaling diagram of a method for implementing Embodiment 2 of the present invention.
  • Embodiment 4 is a signaling diagram of a method for implementing Embodiment 4 of the present invention.
  • FIG. 6 is a schematic diagram of a communication device implementing an embodiment of the present invention.
  • Figure 7 is a block diagram showing the composition of a communication system embodying an embodiment of the present invention.
  • the embodiments of the present invention provide an authentication method, a communication device, and a communication system, which can avoid changes to the core network caused by the access network entering the RS.
  • the RS is an access network device.
  • the RS may be directly deployed by the access network operator in the network, that is, the RS and the eNB belong to one operator.
  • it may be considered to limit the impact of the introduction of the RS only on the access network side, that is, by introducing a logical entity relay station database (RSDA) in the access network, by the RSDA
  • RSDA logical entity relay station database
  • the authentication function such as RS authentication and key derivation is completed, and the logical entity stores all relevant context information of the RS. Therefore, the LTE system after the introduction of the RS does not need to be modified on the core network.
  • RS can be securely connected to the network to minimize the impact on the network.
  • the authentication method proposed by the embodiment of the present invention is based on the pre-shared permanent key K between the RS and the logical entity RSDA, and uses the AKA protocol to complete RS and network side identity authentication and key derivation.
  • the RSDA authenticates the RS, and the corresponding embodiments are given, which are described in detail below.
  • the first device and the second device on the access network side complete the authentication of the RS together, and the systems that support the symmetric key authentication mode after the introduction of the RS can authenticate the RS. Therefore, the eNB in the subsequent embodiments may be a base station supporting the symmetric key authentication mode.
  • the method includes:
  • Step 201 The first device receives an authentication request sent by the RS, where the authentication request includes a relay station identity identifier.
  • the authentication request can be included in the authentication request message.
  • Step 202 The first device acquires an authentication vector, and sends an authentication vector to the RS, instructing the RS to authenticate the authentication vector, where the authentication vector is generated by the second device independent of the core network, and corresponds to the RS identity.
  • the second device independent of the core network searches for a shared key corresponding to the RS identity, generates a random number, and generates an authentication vector corresponding to the shared key and the random number.
  • the first device may be a base station, and the second device independent of the core network is a logical entity, and the base station is connected to the logical entity.
  • the first device may be a base station, and the second device independent of the core network is a logical entity, and the logical entity may be integrated in the base station.
  • the first device and the second device independent of the core network may be the same logical entity.
  • the above base station may also be an eNB.
  • Step 203 Receive a response value sent after the RS authentication is passed, and perform the authentication on the response value. If the authentication is passed, the air interface key is derived.
  • the key derivation algorithm can also send the key derivation algorithm to the RS, and the RS can derive the encryption and integrity protection key corresponding to the key derivation algorithm.
  • the method may further include the steps of: deriving an encryption key corresponding to the air interface key and integrity protection. key.
  • the above-mentioned derived encryption key and integrity-protected key are derived from the base station on the access network side, for example: derived by an eNB in the LTE system or in a Worldwide Interoperability for Microwave Access (Wimax) system.
  • BS derived.
  • the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to the RS, and receives the response value sent by the RS after the authentication vector is authenticated, and authenticates the response value, and the air interface is authenticated after the authentication is passed. Key, complete the authentication of the RS.
  • the authentication function of the RS is completely limited to the access network side, so as to avoid the modification of the core network after the RS is introduced into the access network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
  • the first embodiment is a method for implementing authentication from the access network side
  • the second embodiment is a method for implementing authentication by using specific signaling interaction between the RS and the eNB/RSDA.
  • the eNB/RSDA completes the authentication of the RS.
  • the eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode, and the eNBs in this embodiment can be used to authenticate the RSs. The details will be described below with reference to the drawings.
  • Step 301 The RS sends an authentication request to the eNB/RSDA.
  • the authentication request may be included in an authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a key identifier corresponding to the eNB/RSDA derived key.
  • the identity of the RS may be the IMSI of the RS, or the MAC address of the RS.
  • Step 302 eNB/RSDA generates AV
  • the eNB/RSDA finds the shared key K corresponding to the RS according to the RS identity, and randomly generates a RAND, and then according to the RAND, the key shared between the SQN, RS and RSDA currently saved by itself.
  • K generates an AV corresponding to the RS, wherein the AV includes RAND, XRES, and K AUTN; the embodiment of the present invention does not limit the parameters for generating the AV.
  • Step 303 The eNB/RSDA returns an authentication response to the RS.
  • the authentication response carries the RAND and AUTN corresponding to the AV of the RS, and the key identifier KSI corresponding to the key K.
  • Step 304 The RS performs authentication and generates a RES value.
  • the RS performs verification according to the received RAND and AUTN, including: calculating a MAC value according to the RAND, the SQN in the AUTN, and the key K shared with the RSDA, and comparing the MAC value with the parsed from the received AUTN. Whether the MAC values are consistent. If the RS passes the authentication of the network side, the RES and the key K shared with the RSDA are used to calculate a RES value.
  • Step 305 The RS returns an RES value to the eNB/RSDA.
  • Step 306 The eNB/RSDA performs authentication, and derives an air interface key ⁇ ss ;
  • the eNB/RSDA compares whether the RES received from the RS is consistent with the XRES in the AV in which the RS was previously generated. If the network side authenticates the RS, the eNB/RSDA proceeds according to the key ⁇ £ ⁇ 3 ⁇ 45 Derived air interface key K eNB — RS .
  • the eNB/RSDA on the access network side has been authenticated by the RS.
  • the following steps can also be performed.
  • Step 307 The eNB/RSDA sends the air interface key K eNB — RS and the determined encryption algorithm and integrity protection algorithm to the RS through the SMC.
  • eNB/RSDA combines RS-supported encryption and integrity protection algorithms with its own supported encryption and integrity protection algorithms to determine the key derivation algorithm for the air interface user plane and control plane encryption key and integrity protection key, and will pass the SMC
  • the air interface key K eNB — RS and the determined key derivation algorithm are sent to the RS.
  • Step 308 The RS and the eNB/RSDA derive the air interface encryption key and the integrity protected key.
  • the RS and the eNB/RSDA can each further derive the air interface encryption key and the integrity protected key by using the air interface key K eNB — RS through the selected key algorithm.
  • the RSDA and the eNB are integrated on the access network side, and the authentication function of the RS is completely limited to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS. The impact of the system after the RS into the RS is minimized.
  • the second embodiment is that the physical location of the RSDA coincides with the eNB, and is completed by the RS and the eNB/RSDA entity.
  • Implementation of Authentication of RS The method of the present invention is described below. When the physical location of the RSDA and the eNB are not coincident, an embodiment of the method of the present invention is implemented, and according to the identity authentication location, it can be divided into two cases, A corresponding embodiment.
  • the identity authentication is located on the eNB, and the eNB performs the authentication function of the RS.
  • the eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode. The details will be described below with reference to the drawings.
  • Step 401 The RS sends an authentication request to the eNB.
  • the authentication request may be included in the authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a derivative key stircorresponding key identifier ⁇ / 4 hail, etc., wherein
  • the identity of the RS may be the IMSI of the RS, or the MAC address of the RS, and the like.
  • Step 402 The eNB forwards an RS authentication request to the RSDA.
  • the message carries the identity of the RS, the service network identifier, and the like.
  • Step 403 RSDA generates an AV corresponding to the RS
  • the RSDA finds the shared key K corresponding to the RS according to the identity of the RS, and randomly generates a RAND, and then generates an AV corresponding to the RS according to the key K and other information shared between the RAND, the SQN RS and the RSDA currently saved by itself.
  • the AV includes RAND XRES K AUTN; other parameters may also be used to generate the AV, and embodiments of the present invention do not limit the parameters for generating the AV.
  • Step 404 The RSDA returns an authentication response to the eNB.
  • the authentication response carries the corresponding RAND and AUTN in the AV of the RS, and the key
  • the eNB saves the received AV of the RS.
  • Step 405 The eNB sends an RS authentication request message to the RS.
  • the message carries the contents of the corresponding RAND and AUTN in the AV of the RS, and the key identifier KSI corresponding to the key 5 .
  • Step 406 The RS performs authentication, and generates an RES value.
  • the RS performs verification according to the received RAND and AUTN, and includes: calculating a MAC value according to the SQN in the RAND, the AUTN, and the key K shared with the RSDA, and comparing the MAC value and parsing from the received AUTN. Whether the MAC values are consistent. If the RS passes the authentication of the network side, the RES and the key K shared with the RSDA are used to calculate a RES.
  • Step 407 The RS sends the RES value to the eNB by sending an RS authentication response message.
  • Step 408 The eNB performs authentication, and derives an air interface key ⁇ ss ;
  • the eNB compares whether the RES received from the RS is consistent with the XRES in the AV storing the RS locally. If the network side authenticates the RS, the eNB further derives the air interface key according to the key SM £ ss.
  • the access network side has completed authentication of the RS.
  • the following steps can also be performed.
  • Step 409 The eNB sends the air interface key K eNB — RS and the determined encryption algorithm and integrity protection algorithm to the RS through the SMC.
  • the eNB combines the encryption and integrity protection algorithms supported by the RS and the encryption and integrity protection algorithms supported by the eNB to determine the key derivation algorithm of the user plane and the control plane encryption key and the integrity protection key, and the air interface key is determined by the SMC.
  • the K eNB — RS and the determined key derivation algorithm are sent to the RS.
  • Step 410 The RS and the eNB derive an air interface encryption key and an integrity protected key.
  • the RS and the eNB can each further derive the air interface encryption key and the integrity protected key by using the air interface key K eNB — RS through the selected key algorithm.
  • the context information of the RS is stored, and the RS and the RSDA pre-share a permanent key K.
  • the RSDA is connected to the eNB through a wired or wireless manner, and the eNB completes the RS identification.
  • the weight function thus completely limiting the RS access authentication to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS, so that the impact of the system after the switch into the RS affects the entire network. Minimized.
  • the third embodiment is an embodiment in which the identity authentication is located on the eNB and the eNB performs the authentication function of the RS.
  • the following describes an embodiment in which the identity authentication is located on the RSDA and the RSA performs the authentication function of the RS.
  • the identity authentication is located on the RSDA, and the RSA is authenticated by the RSDA.
  • the solution of this embodiment requires that the network identifier of all eNBs connected by wires be required on the RSDA.
  • the eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode, and the eNBs in this embodiment can be used to authenticate the RSs.
  • Step 501 The RS sends an authentication request to the RSDA.
  • the authentication request may be included in an authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a key identifier corresponding to the derived key ⁇ / 4rob.
  • the identity of the RS may be the IMSI of the RS, or the MAC address of the RS, and the like.
  • Step 502 RSDA generates AV
  • the RSDA finds the shared key K corresponding to the RS according to the RS identity, and randomly generates a RAND, and then generates an AV corresponding to the RS according to the KEY, the key K and the other information shared between the SQN, the RS and the RSDA currently saved by the RAND.
  • AV includes RAND, XRES, K
  • AUTN AUTN
  • Other parameters may also be used to generate the AV.
  • the embodiment of the present invention does not limit the parameters for generating the AV.
  • Step 503 The RSDA returns an authentication response to the RS.
  • the message carries the corresponding RAND and AUTN in the AV of the RS, and the key identifier KSI corresponding to the key K.
  • Step 505 The RS returns an RES value to the RSDA;
  • Step 506 RSDA performs authentication, and derives an air interface key ⁇
  • the RSDA compares whether the RES received from the RS is consistent with the XRES in the AV that generated the RS. If the network side authenticates the RS, the RSDA further derives the air interface key according to the key ⁇ . eNB - RS
  • the access network side has completed authentication of the RS.
  • the following steps can also be performed.
  • Step 507 The RSDA sends the derived key K eNB — RS and the encryption and integrity algorithm supported by the RS to the eNB through the SMC.
  • Step 508 The eNB sends the determined encryption algorithm and integrity protection algorithm to the RS through the SMC.
  • the eNB determines the key derivation algorithm of the air interface user plane and the control plane encryption key and the complete protection key according to the encryption and integrity protection algorithm supported by the RS and the encryption and integrity protection algorithms supported by the RS, and the SMC will The selected algorithm is sent to the RS.
  • Step 509 refers to step 410, and details are not described herein again.
  • the context information of the RS is stored, and the RS and the RSDA pre-share a permanent key K.
  • the RSDA is connected to the eNB through a wired or wireless manner, and the RS is completed by the RSDA.
  • the weight function thus completely limiting the RS access authentication to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS, so that the system after the bow I enters the RS affects the entire network. Minimized.
  • a communication device includes:
  • the request receiving unit 110 is configured to receive an authentication request sent by the RS, where the authentication request includes an RS identity identifier;
  • the obtaining unit 111 is configured to obtain an authentication vector, where the authentication vector is generated by a second device independent of the core network, and corresponds to the RS identity identifier;
  • the obtaining unit 111 may acquire the authentication vector after receiving the authentication request in the request receiving unit 110.
  • the authentication vector sending unit 112 is configured to send, to the RS, the authentication vector acquired by the acquiring unit 111, and the indication
  • the RS authenticates the authentication vector
  • the response value receiving unit 113 is configured to receive a response value that is sent by the RS after the authentication vector sent by the authentication vector sending unit 112 is passed;
  • the authentication unit 114 is configured to authenticate the response value received by the response value receiving unit 113.
  • the air interface key deriving unit 115 is configured to derive an air interface key when the authentication unit 114 passes the response value authentication.
  • the communication device further includes: a key derivation unit, configured to derive an encryption key and an integrity-protected key corresponding to the air interface key derived by the air interface key derivation unit 115.
  • the relay station 121 is configured to send an authentication request to the first device 122, where the authentication request includes an RS identity, and receives an authentication vector sent by the first device 122, and authenticates the authentication vector, and the authentication is passed. Generating a response value, and transmitting a response value to the first device 122;
  • the first device 122 is configured to receive an authentication request sent by the relay station 121, where the authentication request includes an identity of the relay station, acquire an authentication vector, send an authentication vector to the relay station 121, and receive a response value sent by the relay station 121 after the authentication vector is authenticated.
  • the value is authenticated, and when the authentication is passed, the air interface key is derived;
  • the second device 123 independent of the core network, is configured to generate an authentication vector, and the authentication vector corresponds to the relay station identity.
  • the first device 122 may be a base station, and the second device 123 independent of the core network may be a logical entity, and the logical entity is connected to the base station.
  • the first device 122 may be a base station, and the second device 123 independent of the core network may be a logical entity, and the logical entity is integrated in the base station.
  • the first device 122 and the second device 123 independent of the core network may be the same logical entity.
  • the base station is further configured to derive an encryption key and an integrity-protected key corresponding to the air interface key.
  • the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to
  • the RS receives the response value sent by the RS after the authentication vector is authenticated, and authenticates the response value. After the authentication is passed, the air interface key is derived to complete the authentication of the RS.
  • a network logical entity is introduced on the access network side, and the logical entity on the access network side shares the shared key with the relay station, and the access network side completes the identity authentication and key derivation of the RS, thereby completing the network security connection of the relay station. Therefore, the network security access of the relay station can be realized without modifying the core network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
  • the RSDA and the eNB may be integrated on the access network side to completely limit the authentication function of the RS to the access network side.
  • the context information of the RS is stored.
  • the RSDA is shared with the RSDA.
  • the RSDA is connected to the eNB by wire or wirelessly.
  • the eNB performs the authentication function of the RS or the RSA performs the authentication function of the RS.
  • the RS access authentication is completely restricted to the access network. .
  • a person skilled in the art can understand that all or part of the steps of implementing the above embodiments can be completed by a program to instruct related hardware, and the program can be stored in a computer readable storage medium, the above mentioned storage.
  • the medium can be a read only memory, a magnetic disk or a compact disk or the like.

Abstract

An authorization method, a communication apparatus and a communication system are provided, in which the realization of the authorization method includes: the first device receives an authentication request transmitted by a relay station, wherein the authentication request includes an ID identifier of the relay station; obtaining an authentication vector and transmitting it to the relay station, indicating the relay station to authenticate the authentication vector, wherein the authentication vector is generated by the second device independent of the core network and corresponds to the ID identifier of the relay station; receiving a response value which is transmitted by the relay station after the authentication for the authentication vector passes, authenticating the response value, and deriving an air key when the authentication passes.

Description

鉴权方法、 通信装置和通信系统  Authentication method, communication device and communication system
本申请要求于 2008 年 7 月 29 日提交中国专利局、 申请号为 200810041298.5、 发明名称为 "鉴权方法、 通信装置和通信系统" 的中国专利 申请的优先权, 其全部内容通过引用结合在本申请中。  This application claims priority to Chinese Patent Application No. 200810041298.5, entitled "Authentication Method, Communication Device, and Communication System", filed on July 29, 2008, the entire contents of which is incorporated herein by reference. In the application.
技术领域 Technical field
本发明涉及通信技术领域, 尤其涉及鉴权方法、 通信装置和通信系统。 背景技术  The present invention relates to the field of communications technologies, and in particular, to an authentication method, a communication device, and a communication system. Background technique
随着移动系统的覆盖范围越来越大,用户接入系统的数目逐渐增多,服务 提供商提供的服务多元化发展,使得网络的复杂程度不断提高,如何保证网络 和业务信息的安全是一个当前迫切需要解决的问题。  With the increasing coverage of mobile systems, the number of user access systems is gradually increasing, and the services provided by service providers are diversified, which makes the complexity of the network continuously improved. How to ensure the security of network and service information is a current Urgent need to solve the problem.
在移动通信系统中, 为了保证运营业务的安全性, 网络侧需要对接入的用 户设备 (User Equipment, UE )进行鉴权处理, 使得非法 UE无法得到网络侧提 供的服务, 保障运营商的利益。 同时, UE也需要验证网络侧发送的鉴权信息 是否有效, 即 UE对网络侧进行鉴权处理, 防止非法网络侧利用合法网络侧已 经使用过的鉴权信息对 UE进行重放攻击, 使 UE相信该非法网络侧合法。  In the mobile communication system, in order to ensure the security of the service, the network side needs to perform authentication processing on the user equipment (User Equipment, UE), so that the illegal UE cannot obtain the service provided by the network side, thereby ensuring the interests of the operator. . At the same time, the UE also needs to verify whether the authentication information sent by the network side is valid, that is, the UE performs authentication processing on the network side, and prevents the illegal network side from using the authentication information that has been used by the legal network side to perform replay attacks on the UE, so that the UE I believe that the illegal network side is legal.
现有长期演进( Long Term Evolved, LTE ) 网络系统中, UE和演进的基 站( E-UTRAN Node B , eNB )之间的空口链路是单跳的, 采用演进的分组系 统 ( Evolved Packet System, EPS )认证和密钥协商 ( Authentication and Key Agreement , AKA )协议来完成用户和网络侧的鉴权过程, 即包括身份认证和 密钥协商的处理, 其实现的基础是用户和网络侧预共享一个永久性对称密钥。 整个鉴权过程包含在一个鉴权处理中进行,并且采用鉴权元组的方式来进行认 证, 鉴权元组包括: 随机数(RAND ) 、 期望响应 ( Expected user Response, XRES ) 、 密钥 ( K 和鉴权令牌 ( Authentication token, AUTN ) , 其中, 密钥是由加密密钥 (Cipher Key, CK )和完整性密钥 ( Integrity Key, IK )共 同派生的; AUTN进一步包括鉴权序列号 (Sequence Number, SQN ) 、 鉴权 管理域 ( Authentication Management Field, AMF )和消息鉴权编码 ( Message Authentication Code, MAC )三个部分。  In the existing Long Term Evolved (LTE) network system, the air interface link between the UE and the evolved base station (E-UTRAN Node B, eNB) is single-hop, and the Evolved Packet System (Evolved Packet System) is adopted. EPS) Authentication and Key Agreement (AKA) protocol to complete the authentication process of the user and the network side, that is, the process of identity authentication and key agreement, which is based on the pre-shared one by the user and the network side. Permanent symmetric key. The entire authentication process is included in an authentication process, and authentication is performed by means of an authentication tuple including: a random number (RAND), an expected response (XRES), a key ( K and an authentication token (AUTN), wherein the key is derived from an encryption key (Cipher Key, CK) and an integrity key (Integrity Key, IK); the AUTN further includes an authentication sequence number (Sequence Number, SQN), Authentication Management Field (AMF) and Message Authentication Code (MAC).
引入中继站( Relay Station , RS )后, LTE系统中 UE和 eNB之间的空口 链路被分段, 包括 UE和 RS之间的接入链路, 以及 RS和 eNB之间的中继链 路。 RS的网络接入过程中, 可以将 RS看作为 UE进行网络接入, 即 RS采用 与传统 UE相同的鉴权过程,具体接入过程参见图 1 , RS接入过程中的鉴权处 理流程为: After the introduction of the relay station (RS), the air interface link between the UE and the eNB in the LTE system is segmented, including the access link between the UE and the RS, and the relay chain between the RS and the eNB. Road. In the network access process of the RS, the RS can be regarded as the UE for network access, that is, the RS adopts the same authentication process as the legacy UE. For the specific access process, refer to Figure 1. The authentication process in the RS access process is :
步骤 101: RS向移动性管理实体 ( Mobility Management Entity, MME ) 发送认证请求, 该消息中携带了 RS的国际移动用户标识( International Mobile Subscriber Identity, IMSI )、 RS的能力 (即所支持的加密和完整性保护算法)、 以及派生密钥 ( K )所对应的密钥标识符( KSI 等内容;  Step 101: The RS sends an authentication request to the Mobility Management Entity (MME), where the message carries the International Mobile Subscriber Identity (IMSI) of the RS, and the capability of the RS (that is, the supported encryption and encryption). The integrity protection algorithm), and the key identifier (KSI, etc.) corresponding to the derived key (K);
步骤 102: MME向归属用户服务器( Home Subscriber Server, HSS )转发 RS的认证请求,该消息中携带了 RS的身份标识 IMSI、服务网络标识等内容, HSS根据 RS的 IMSI找到该用户对应的共享密钥 K,并随机产生一个 RAND, 然后根据 RAND, 自身当前保存的鉴权 SQN、 RS和 HSS共享密钥 K及其它 信息生成该 RS对应的认证向量(Authentication Vector, AV ), 其中 AV包括 RAND, XRES、 扁和 AUTN;  Step 102: The MME forwards an RS authentication request to the Home Subscriber Server (HSS), where the message carries the identity identifier of the RS, the service network identifier, and the like, and the HSS finds the shared secret corresponding to the user according to the IMSI of the RS. Key K, and randomly generate a RAND, and then generate an authentication vector (AV) corresponding to the RS according to the RAND, the currently stored authentication SQN, RS and HSS shared key K and other information, wherein the AV includes RAND, XRES, flat and AUTN;
步骤 103: HSS向 MME返回认证响应, 该消息中携带了该用户的认证向 量 AV, 以及密钥 SM£所对应的密钥标识符 ¾/AW£等内容, MME将收到的该 RS的认证向量进行保存; Step 103: The HSS returns an authentication response to the MME, where the message carries the authentication vector AV of the user, and the key identifier 3⁄4/ AW£ corresponding to the key SM£ , and the MME will receive the authentication of the RS. Vector to save;
步骤 104: MME向 RS发送 RS认证请求, 该消息中携带了该 RS认证向 量中对应的 RAND和 AUTN, 以及密钥 SM£所对应的密钥标识符 /ASM£等内 谷, Step 104: The MME sends an RS authentication request to the RS, where the message carries the corresponding RAND and AUTN in the RS authentication vector, and the key identifier/ ASM £ corresponding to the key SM£ .
步骤 105: RS根据收到的 RAND和 AUTN,进行校验,包括:根据 RAND、 Step 105: The RS performs verification according to the received RAND and AUTN, including: according to RAND,
AUTN中的 SQN和与网络侧共享的密钥 K共同计算出一个 MAC值, 并比较 该 MAC值和从接收到的 AUTN中解析的 MAC值是否一致, 如果一致, 则 RS对网络侧的鉴权通过,则利用 RAND和与网络侧共享的密钥 K共同计算出 一个响应 (Response, RES )发送给 MME; The SQN in the AUTN and the key K shared by the network side jointly calculate a MAC value, and compare whether the MAC value is consistent with the MAC value parsed from the received AUTN. If they are consistent, the RS authenticates the network side. Passing, using RAND and the key K shared with the network side to calculate a response (Response, RES) is sent to the MME;
步骤 106: MME比较从 RS接收到的 RES与本地存贮该用户 AV中的 XRES 是否一致, 如果一致, 网络侧对 RS的鉴权通过, 则 MME根据密钥 ASM£进一 步派生出空口密钥 KeNB ,并通过安全模式命令( Security Mode Command, SMC ) 将该空口密钥以及 RS所支持的加密和完整性保护算法下发给 eNB; Step 106: The MME compares whether the RES received from the RS is consistent with the XRES stored in the user AV. If the network side authenticates the RS, the MME further derives the air interface key K according to the key ASM £ . The eNB sends the air interface key and the encryption and integrity protection algorithm supported by the RS to the eNB through a Security Mode Command (SMC);
步骤 107: eNB根据收到的 RS所支持的加密和完整性保护算法, 以及自 身支持的加密和完整性保护算法,确定空口用户面和控制面的加密和完整性保 护密钥的算法, 并将选定的算法通过 SMC下发给 RS, 此时, RS和 eNB可以 各自利用空口密钥 KeNB通过选定的密钥算法进一步派生出用户空口加密和完 整性保护的密钥。 Step 107: The eNB performs an encryption and integrity protection algorithm supported by the received RS, and The encryption and integrity protection algorithm supported by the body, the algorithm for determining the encryption and integrity protection keys of the air interface user plane and the control plane, and the selected algorithm is sent to the RS through the SMC. At this time, the RS and the eNB can each utilize the same. The air interface key K eNB further derives the user air interface encryption and integrity protection key through the selected key algorithm.
在实现本发明的过程中, 发明人发现上述技术方案至少存在如下缺陷: 在引入 RS后的 LTE系统中, RS的鉴权过程需要对核心网的 HSS进行相 应的修改, 包括增加 HSS对 RS的安全上下文信息的存贮。  In the process of implementing the present invention, the inventor has found that the above technical solution has at least the following drawbacks: In the LTE system after the introduction of the RS, the authentication process of the RS needs to be modified correspondingly to the HSS of the core network, including increasing the HSS to the RS. Storage of security context information.
发明内容 Summary of the invention
本发明实施例提供鉴权方法、通信装置和通信系统, 本发明实施例是通过 以下技术方案来实现的:  The embodiments of the present invention provide an authentication method, a communication device, and a communication system. The embodiments of the present invention are implemented by the following technical solutions:
一种鉴权方法, 包括:  An authentication method, including:
第一设备接收中继站发送的认证请求, 认证请求包含中继站身份标识; 第一设备获取认证向量, 向中继站发送认证向量,指示中继站对认证向量 进行认证,认证向量由独立于核心网的第二设备生成,与中继站身份标识对应; 第一设备接收中继站对认证向量认证通过后发送的响应值,对响应值进行 认证, 当认证通过时, 派生空口密钥。  The first device receives the authentication request sent by the relay station, and the authentication request includes the relay station identity identifier; the first device acquires the authentication vector, sends an authentication vector to the relay station, and instructs the relay station to authenticate the authentication vector, and the authentication vector is generated by the second device independent of the core network. Corresponding to the relay station identity identifier; the first device receives the response value sent by the relay station after the authentication vector is authenticated, and authenticates the response value, and when the authentication passes, the air interface key is derived.
一种通信装置, 包括:  A communication device comprising:
请求接收单元, 用于接收中继站发送的认证请求,认证请求包含中继站身 份标识;  a request receiving unit, configured to receive an authentication request sent by the relay station, where the authentication request includes a relay station identity identifier;
获取单元,用于获取认证向量,认证向量由独立于核心网的第二设备生成, 与中继站身份标识对应;  An obtaining unit, configured to obtain an authentication vector, where the authentication vector is generated by a second device independent of the core network, and corresponding to the relay station identity identifier;
认证向量发送单元, 用于向中继站发送获取单元获取的认证向量,指示中 继站对认证向量进行认证;  An authentication vector sending unit, configured to send, to the relay station, an authentication vector acquired by the acquiring unit, and instruct the relay station to authenticate the authentication vector;
响应值接收单元,用于接收中继站对认证向量发送单元发送的认证向量认 证通过后发送的响应值;  a response value receiving unit, configured to receive a response value sent by the relay station after the authentication vector authentication sent by the authentication vector sending unit passes;
认证单元, 用于对响应值接收单元接收的响应值进行认证;  An authentication unit, configured to authenticate a response value received by the response value receiving unit;
空口密钥派生单元, 用于在认证单元对所述响应值认证通过时, 派生空口 密钥。  The air interface key deriving unit is configured to derive an air interface key when the authentication unit passes the response value authentication.
一种通信系统, 包括: 第一设备, 用于接收所述中继站发送的认证请求, 所述认证请求包含中继 站的身份标识; 获取认证向量, 向所述中继站发送所述认证向量, 指示所述中 继站对所述认证向量进行认证, 所述认证向量由独立于核心网的第二设备生 成, 与所述中继站身份标识对应;接收所述中继站对所述认证向量认证通过后 发送的所述响应值, 对所述响应值进行认证, 当认证通过时, 派生空口密钥。 可见, 由于本发明实施例接入网侧接收 RS发送的认证请求, 生成认证向量并 发送给 RS,接收 RS对认证向量认证通过后发送的响应值, 对响应值进行认证, 认证通过后派生空口密钥, 完成对 RS的鉴权。 在接入网侧引入一个网络逻辑 实体, 由接入网侧的逻辑实体与中继站共享了共享密钥, 由接入网侧完成对 RS的身份认证及密钥派生, 从而完成中继站的网络安全接入, 因此中继站的 网络安全接入不需要对核心网进行改动就可以实现, 使得引入 RS后的系统对 整个网络的影响达到最小化。 A communication system comprising: a first device, configured to receive an authentication request sent by the relay station, where the authentication request includes an identity of the relay station, acquire an authentication vector, send the authentication vector to the relay station, and instruct the relay station to authenticate the authentication vector And generating, by the second device independent of the core network, the identifier corresponding to the relay station, and receiving the response value sent by the relay station after the authentication vector is authenticated, and authenticating the response value. , when the authentication is passed, the air interface key is derived. It can be seen that, in the embodiment of the present invention, the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to the RS, and receives the response value sent by the RS after the authentication vector is authenticated, and the response value is authenticated, and the authentication is passed after the authentication is performed. Key, complete authentication of the RS. A network logical entity is introduced on the access network side, and the logical entity on the access network side shares the shared key with the relay station, and the access network side completes the identity authentication and key derivation of the RS, thereby completing the network security connection of the relay station. Therefore, the network security access of the relay station can be realized without modifying the core network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
附图说明 DRAWINGS
图 1是现有技术中继站接入鉴权的信令图;  1 is a signaling diagram of a prior art relay station access authentication;
图 2是实现本发明实施例一的方法的流程图;  2 is a flow chart of a method for implementing Embodiment 1 of the present invention;
图 3是实现本发明实施例二的方法的信令图;  3 is a signaling diagram of a method for implementing Embodiment 2 of the present invention;
图 4是实现本发明实施例三的方法的信令图;  4 is a signaling diagram of a method for implementing Embodiment 3 of the present invention;
图 5是实现本发明实施例四的方法的信令图;  5 is a signaling diagram of a method for implementing Embodiment 4 of the present invention;
图 6是实现本发明实施例通信装置的示意图;  6 is a schematic diagram of a communication device implementing an embodiment of the present invention;
图 7是实现本发明实施例通信系统的组成框图。  Figure 7 is a block diagram showing the composition of a communication system embodying an embodiment of the present invention.
具体实施方式 detailed description
本发明实施例提供鉴权方法、通信装置和通信系统, 能够避免由于接入网 弓 I入 RS后而造成对核心网的改动。  The embodiments of the present invention provide an authentication method, a communication device, and a communication system, which can avoid changes to the core network caused by the access network entering the RS.
RS是一种接入网设备, 大多数情况下, RS在网络中可能是由接入网运营 商直接部署的, 即 RS和 eNB同属于一个运营商。 为了使得引入 RS后对整个网 络的影响最小化, 可以考虑将引入 RS的影响只限定在接入网侧, 即通过在接 入网引入一个逻辑实体中继站数据库 (Relay Station Database, RSDA ), 由 RSDA完成对 RS的身份验证及密钥派生等鉴权功能,该逻辑实体存贮了 RS所有 相关的上下文信息。 因此, 引入 RS后的 LTE系统, 不需要对核心网进行改动就 可以使得 RS安全的接入网络, 从而达到对网络影响最小化。 The RS is an access network device. In most cases, the RS may be directly deployed by the access network operator in the network, that is, the RS and the eNB belong to one operator. In order to minimize the impact on the entire network after the introduction of the RS, it may be considered to limit the impact of the introduction of the RS only on the access network side, that is, by introducing a logical entity relay station database (RSDA) in the access network, by the RSDA The authentication function such as RS authentication and key derivation is completed, and the logical entity stores all relevant context information of the RS. Therefore, the LTE system after the introduction of the RS does not need to be modified on the core network. RS can be securely connected to the network to minimize the impact on the network.
本发明实施例提出的鉴权方法,其实现的基础是 RS和逻辑实体 RSDA之间 预共享一个永久性密钥 K,并采用 AKA协议完成 RS和网络侧的身份认证和密钥 派生。  The authentication method proposed by the embodiment of the present invention is based on the pre-shared permanent key K between the RS and the logical entity RSDA, and uses the AKA protocol to complete RS and network side identity authentication and key derivation.
本发明实施例根据 RSDA的物理位置与 eNB是否重合, 以及由 eNB还是 According to the embodiment of the present invention, whether the physical location of the RSDA overlaps with the eNB, and whether the eNB is still
RSDA对 RS进行身份认证, 给出了相应的实施例, 以下分别进行详细说明。 The RSDA authenticates the RS, and the corresponding embodiments are given, which are described in detail below.
实施例一  Embodiment 1
本实施例提供的方案中, 由接入网侧的第一设备和第二设备一起完成对 RS的鉴权, 引入 RS后支持对称性密钥认证方式的各种系统都可以对 RS进行鉴 权, 因此后续实施例中的 eNB都可以为支持对称性密钥认证方式的基站。  In the solution provided by the embodiment, the first device and the second device on the access network side complete the authentication of the RS together, and the systems that support the symmetric key authentication mode after the introduction of the RS can authenticate the RS. Therefore, the eNB in the subsequent embodiments may be a base station supporting the symmetric key authentication mode.
参见图 2, 该方法包括:  Referring to Figure 2, the method includes:
步骤 201: 第一设备接收 RS发送的认证请求, 认证请求包含中继站身份标 识。  Step 201: The first device receives an authentication request sent by the RS, where the authentication request includes a relay station identity identifier.
认证请求可以被包含在认证请求消息中。  The authentication request can be included in the authentication request message.
步骤 202: 第一设备获取认证向量, 将认证向量发送给所述 RS , 指示 RS 对认证向量进行认证, 上述认证向量由独立于核心网的第二设备生成, 与 RS 身份标识对应;  Step 202: The first device acquires an authentication vector, and sends an authentication vector to the RS, instructing the RS to authenticate the authentication vector, where the authentication vector is generated by the second device independent of the core network, and corresponds to the RS identity.
独立于核心网的第二设备查找与 RS身份标识对应的共享密钥, 产生随机 数, 生成与共享密钥和随机数对应的认证向量。  The second device independent of the core network searches for a shared key corresponding to the RS identity, generates a random number, and generates an authentication vector corresponding to the shared key and the random number.
上述第一设备可以为基站,独立于核心网的第二设备为逻辑实体,基站与 逻辑实体相连。  The first device may be a base station, and the second device independent of the core network is a logical entity, and the base station is connected to the logical entity.
第一设备可以为基站,独立于核心网的第二设备为逻辑实体, 所述逻辑实 体可以集成在所述基站中。  The first device may be a base station, and the second device independent of the core network is a logical entity, and the logical entity may be integrated in the base station.
第一设备和独立于核心网的第二设备可以为同一逻辑实体。  The first device and the second device independent of the core network may be the same logical entity.
上述基站也可以是 eNB。  The above base station may also be an eNB.
步骤 203: 接收 RS认证通过后发送的响应值, 对所述响应值进行认证, 如 果认证通过, 派生空口密钥。  Step 203: Receive a response value sent after the RS authentication is passed, and perform the authentication on the response value. If the authentication is passed, the air interface key is derived.
接收 RS认证通过后发送的响应值, 将响应值与认证向量中的期望响应值 进行比较, 如果一致, 认证通过, 派生空口密钥, 确定与所述 RS的能力对应 的密钥派生算法, 还可以将所述密钥派生算法发送给 RS , RS才能派生与密钥 派生算法对应的加密和完整性保护密钥。 Receiving the response value sent after the RS authentication is passed, comparing the response value with the expected response value in the authentication vector. If the authentication is consistent, the authentication is passed, and the air interface key is derived, and the capability corresponding to the RS is determined. The key derivation algorithm can also send the key derivation algorithm to the RS, and the RS can derive the encryption and integrity protection key corresponding to the key derivation algorithm.
至此, 接入网侧已经完成对 RS的鉴权, 为了后续 RS和接入网侧能够安全 通信,还可以包含一个步骤: 派生与所述空口密钥对应的加密密钥和完整性保 护的密钥。  At this point, the access network side has completed the authentication of the RS. In order to enable the subsequent RS and the access network side to communicate securely, the method may further include the steps of: deriving an encryption key corresponding to the air interface key and integrity protection. key.
上述派生加密密钥和完整性保护的密钥由接入网侧的基站派生, 例如: 由 LTE系统中的 eNB派生或者是由微波存取全球互通 ( Worldwide Interoperability for Microwave Access , Wimax ) 系统中的 BS派生。  The above-mentioned derived encryption key and integrity-protected key are derived from the base station on the access network side, for example: derived by an eNB in the LTE system or in a Worldwide Interoperability for Microwave Access (Wimax) system. BS derived.
本实施例中, 接入网侧通过接收 RS发送的认证请求, 生成认证向量并发 送给 RS , 接收 RS对认证向量认证通过后发送的响应值, 对响应值进行认证, 认证通过后派生空口密钥, 完成对 RS的鉴权。 本实施例将 RS的鉴权功能完全 限定在接入网侧, 从而避免接入网引入 RS后对核心网的改动, 使得引入 RS后 的系统对整个网络的影响达到最小化。  In this embodiment, the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to the RS, and receives the response value sent by the RS after the authentication vector is authenticated, and authenticates the response value, and the air interface is authenticated after the authentication is passed. Key, complete the authentication of the RS. In this embodiment, the authentication function of the RS is completely limited to the access network side, so as to avoid the modification of the core network after the RS is introduced into the access network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
实施例一是从接入网侧实现鉴权的方法,实施例二是通过 RS和 eNB/RSDA 之间具体的信令交互来说明实现鉴权的方法。  The first embodiment is a method for implementing authentication from the access network side, and the second embodiment is a method for implementing authentication by using specific signaling interaction between the RS and the eNB/RSDA.
实施例二  Embodiment 2
本实施例是当 RSDA的物理位置与 eNB集成在一起, 由 eNB/RSDA来完成 对 RS的鉴权。 引入 RS后支持对称性密钥认证方式的各种系统都可以对 RS进行 鉴权, 因此本实施例中的 eNB都可以为支持对称性密钥认证方式的基站。 下面 结合附图进行详细说明。  In this embodiment, when the physical location of the RSDA is integrated with the eNB, the eNB/RSDA completes the authentication of the RS. The eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode, and the eNBs in this embodiment can be used to authenticate the RSs. The details will be described below with reference to the drawings.
参见图 3 , 下面对实现实施例二的方法的具体步骤进行详细介绍: 步骤 301 : RS向 eNB/RSDA发送认证请求;  Referring to FIG. 3, the specific steps of implementing the method in Embodiment 2 are described in detail: Step 301: The RS sends an authentication request to the eNB/RSDA.
所述认证请求可以被包含在认证请求消息中, 该消息中携带了 RS身份标 识、所支持的加密和完整性保护算法, 以及 eNB/RSDA派生密钥^ 所对应 的密钥标识符 等内容, 其中 RS的身份标识可以是 RS的 IMSI , 也可以 是 RS的 MAC地址等。  The authentication request may be included in an authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a key identifier corresponding to the eNB/RSDA derived key. The identity of the RS may be the IMSI of the RS, or the MAC address of the RS.
步骤 302: eNB/RSDA生成 AV;  Step 302: eNB/RSDA generates AV;
eNB/RSDA根据 RS身份标识找到该 RS对应的共享密钥 K,并随机产生一个 RAND , 然后根据 RAND、 自身当前保存的 SQN、 RS和 RSDA之间共享的密钥 K生成该 RS对应的 AV, 其中, AV包括 RAND、 XRES、 K AUTN; 本发 明实施例并不限定生成 AV的参数。 The eNB/RSDA finds the shared key K corresponding to the RS according to the RS identity, and randomly generates a RAND, and then according to the RAND, the key shared between the SQN, RS and RSDA currently saved by itself. K generates an AV corresponding to the RS, wherein the AV includes RAND, XRES, and K AUTN; the embodiment of the present invention does not limit the parameters for generating the AV.
步骤 303: eNB/RSDA向 RS返回认证响应;  Step 303: The eNB/RSDA returns an authentication response to the RS.
该认证响应中携带了该 RS的 AV中对应的 RAND和 AUTN , 以及密钥 K 所对应的密钥标识符 KSI 等内容。  The authentication response carries the RAND and AUTN corresponding to the AV of the RS, and the key identifier KSI corresponding to the key K.
步骤 304: RS进行认证, 并生成 RES值;  Step 304: The RS performs authentication and generates a RES value.
RS根据收到的 RAND和 AUTN进行校验, 包括: 根据 RAND、 AUTN中的 SQN和与 RSDA共享的密钥 K共同计算出一个 MAC值,并比较该 MAC值和从接 收到的 AUTN中解析的 MAC值是否一致, 如果一致, RS对网络侧鉴权通过, 则利用 RAND和与 RSDA共享的密钥 K共同计算出一个 RES值。  The RS performs verification according to the received RAND and AUTN, including: calculating a MAC value according to the RAND, the SQN in the AUTN, and the key K shared with the RSDA, and comparing the MAC value with the parsed from the received AUTN. Whether the MAC values are consistent. If the RS passes the authentication of the network side, the RES and the key K shared with the RSDA are used to calculate a RES value.
步骤 305: RS向 eNB/RSDA返回 RES值;  Step 305: The RS returns an RES value to the eNB/RSDA.
步骤 306: eNB/RSDA进行认证, 并派生出空口密钥^ ssStep 306: The eNB/RSDA performs authentication, and derives an air interface key ^ ss ;
eNB/RSDA比较从 RS接收到的 RES与之前生成该 RS的 AV中的 XRES是否 一致, 如果一致, 网络侧对 RS的鉴权通过, 则 eNB/RSDA根据密钥^ ^£¾5进 —步派生出空口密钥 KeNBRSThe eNB/RSDA compares whether the RES received from the RS is consistent with the XRES in the AV in which the RS was previously generated. If the network side authenticates the RS, the eNB/RSDA proceeds according to the key ^^ £3⁄45 Derived air interface key K eNBRS .
至此, 已经实现接入网侧的 eNB/RSDA对 RS的鉴权, 为了后续 RS与接入 网侧之间安全通信, 还可以执行以下的步骤。  So far, the eNB/RSDA on the access network side has been authenticated by the RS. For the subsequent secure communication between the RS and the access network side, the following steps can also be performed.
步骤 307: eNB/RSDA通过 SMC向 RS发送空口密钥 KeNBRS和确定的加密算 法和完整性保护算法; Step 307: The eNB/RSDA sends the air interface key K eNBRS and the determined encryption algorithm and integrity protection algorithm to the RS through the SMC.
eNB/RSDA结合 RS支持的加密和完整性保护算法以及自身支持的加密和 完整性保护算法,确定空口用户面和控制面加密密钥和完整性保护密钥的密钥 派生算法, 并通过 SMC将空口密钥 KeNBRS和确定的密钥派生算法发送给 RS。 eNB/RSDA combines RS-supported encryption and integrity protection algorithms with its own supported encryption and integrity protection algorithms to determine the key derivation algorithm for the air interface user plane and control plane encryption key and integrity protection key, and will pass the SMC The air interface key K eNBRS and the determined key derivation algorithm are sent to the RS.
步骤 308: RS和 eNB/RSDA派生出空口加密密钥和完整性保护的密钥。 Step 308: The RS and the eNB/RSDA derive the air interface encryption key and the integrity protected key.
RS和 eNB/RSDA就可以各自利用空口密钥 KeNBRS通过选定的密钥算法进 一步派生出空口加密密钥和完整性保护的密钥。 The RS and the eNB/RSDA can each further derive the air interface encryption key and the integrity protected key by using the air interface key K eNBRS through the selected key algorithm.
本实施例通过在接入网侧将 RSDA和 eNB集成在一起, 将 RS的鉴权功能完 全限定在接入网侧, 从而避免由于接入网弓 I入 RS后而造成对核心网的改动, 使得弓 )入 RS后的系统对整个网络的影响达到最小化。  In this embodiment, the RSDA and the eNB are integrated on the access network side, and the authentication function of the RS is completely limited to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS. The impact of the system after the RS into the RS is minimized.
实施例二是 RSDA的物理位置与 eNB重合, 由 RS和 eNB/RSDA实体来完成 对 RS的鉴权的实现本发明的方法, 下面介绍当 RSDA的物理位置和 eNB不重合 时实现本发明方法的实施例, 而根据身份认证位置的不同, 又可以分为两种情 况, 给出了对应的实施例。 The second embodiment is that the physical location of the RSDA coincides with the eNB, and is completed by the RS and the eNB/RSDA entity. Implementation of Authentication of RS The method of the present invention is described below. When the physical location of the RSDA and the eNB are not coincident, an embodiment of the method of the present invention is implemented, and according to the identity authentication location, it can be divided into two cases, A corresponding embodiment.
实施例三  Embodiment 3
在本实施例中, 身份认证位于 eNB上, 则由 eNB完成 RS的鉴权功能。 引入 In this embodiment, the identity authentication is located on the eNB, and the eNB performs the authentication function of the RS. Introduce
RS后支持对称性密钥认证方式的各种系统都可以对 RS进行鉴权, 因此本实施 例中的 eNB都可以为支持对称性密钥认证方式的基站。下面结合附图进行详细 说明。 The eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode. The details will be described below with reference to the drawings.
参见图 4 , 下面对实现实施例三的方法的具体步骤进行详细介绍: 步骤 401: RS向 eNB发送认证请求;  Referring to FIG. 4, the specific steps of implementing the method in Embodiment 3 are described in detail: Step 401: The RS sends an authentication request to the eNB.
所述认证请求可以被包含在认证请求消息中 该消息中携带了 RS身份标 识、 所支持的加密和完整性保护算法, 以及派生密钥 „对应的密钥标识 符^/4„等内容,其中 RS的身份标识可以是 RS的 IMSI,也可以是 RS的 MAC 地址等。 The authentication request may be included in the authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a derivative key „corresponding key identifier ^/ 4 „, etc., wherein The identity of the RS may be the IMSI of the RS, or the MAC address of the RS, and the like.
步骤 402: eNB向 RSDA转发 RS的认证请求;  Step 402: The eNB forwards an RS authentication request to the RSDA.
该消息中携带了 RS的身份标识、 服务网络标识等内容。  The message carries the identity of the RS, the service network identifier, and the like.
步骤 403: RSDA生成该 RS对应的 AV;  Step 403: RSDA generates an AV corresponding to the RS;
RSDA根据 RS的身份标识找到该 RS对应的共享密钥 K , 并随机产生一个 RAND, 然后根据 RAND、 自身当前保存的 SQN RS和 RSDA之间共享的密钥 K及其它信息生成该 RS对应的 AV,其中 AV包括 RAND XRES K AUTN; 还可以采用其它的参数来生成 AV, 本发明实施例并不限定生成 AV的参数。  The RSDA finds the shared key K corresponding to the RS according to the identity of the RS, and randomly generates a RAND, and then generates an AV corresponding to the RS according to the key K and other information shared between the RAND, the SQN RS and the RSDA currently saved by itself. Where the AV includes RAND XRES K AUTN; other parameters may also be used to generate the AV, and embodiments of the present invention do not limit the parameters for generating the AV.
步骤 404: RSDA向 eNB返回认证响应;  Step 404: The RSDA returns an authentication response to the eNB.
该认证响应中携带了该 RS的 AV中对应的 RAND和 AUTN , 以及密钥 The authentication response carries the corresponding RAND and AUTN in the AV of the RS, and the key
K 所对应的密钥标识符 KSI 等内容, eNB将收到的该 RS的 AV进行保 存。 For the content such as the key identifier KSI corresponding to K, the eNB saves the received AV of the RS.
步骤 405: eNB向 RS发送 RS认证请求消息;  Step 405: The eNB sends an RS authentication request message to the RS.
该消息中携带了该 RS的 AV中对应的 RAND和 AUTN, 以及密钥 5对 应的密钥标识符 KSI 等内容。 The message carries the contents of the corresponding RAND and AUTN in the AV of the RS, and the key identifier KSI corresponding to the key 5 .
步骤 406: RS进行认证, 并生成 RES值; RS根据收到的 RAND和 AUTN, 进行校验, 包括: 根据 RAND、 AUTN中 的 SQN和与 RSDA共享的密钥 K共同计算出一个 MAC值,并比较该 MAC值和从 接收到的 AUTN中解析的 MAC值是否一致, 如果一致, RS对网络侧的鉴权通 过, 则利用 RAND和与 RSDA共享的密钥 K共同计算出一个 RES。 Step 406: The RS performs authentication, and generates an RES value. The RS performs verification according to the received RAND and AUTN, and includes: calculating a MAC value according to the SQN in the RAND, the AUTN, and the key K shared with the RSDA, and comparing the MAC value and parsing from the received AUTN. Whether the MAC values are consistent. If the RS passes the authentication of the network side, the RES and the key K shared with the RSDA are used to calculate a RES.
步骤 407: RS通过发送 RS认证响应消息将 RES值发送给 eNB;  Step 407: The RS sends the RES value to the eNB by sending an RS authentication response message.
步骤 408: eNB进行认证, 并派生出空口密钥^ ssStep 408: The eNB performs authentication, and derives an air interface key ^ ss ;
eNB比较从 RS接收到的 RES与本地存贮该 RS的 AV中的 XRES是否一致,如 果一致, 网络侧对 RS的鉴权通过, 则 eNB根据密钥 SM£ss进一步派生出空口 密钥 o The eNB compares whether the RES received from the RS is consistent with the XRES in the AV storing the RS locally. If the network side authenticates the RS, the eNB further derives the air interface key according to the key SM £ ss.
至此, 接入网侧已经完成对 RS的鉴权, 为了后续 RS与接入网侧之间安全 通信, 还可以执行以下的步骤。  At this point, the access network side has completed authentication of the RS. In order to secure communication between the RS and the access network side, the following steps can also be performed.
步骤 409: eNB通过 SMC向 RS发送空口密钥 KeNBRS和确定的加密算法和完 整性保护算法; Step 409: The eNB sends the air interface key K eNBRS and the determined encryption algorithm and integrity protection algorithm to the RS through the SMC.
eNB结合 RS支持的加密和完整性保护算法以及自身支持的加密和完整性 保护算法, 确定用户面和控制面加密密钥和完整性保护密钥的密钥派生算法, 并通过 SMC将空口密钥 KeNBRS和确定的密钥派生算法发送给 RS。 The eNB combines the encryption and integrity protection algorithms supported by the RS and the encryption and integrity protection algorithms supported by the eNB to determine the key derivation algorithm of the user plane and the control plane encryption key and the integrity protection key, and the air interface key is determined by the SMC. The K eNBRS and the determined key derivation algorithm are sent to the RS.
步骤 410: RS和 eNB派生出空口加密密钥和完整性保护的密钥。  Step 410: The RS and the eNB derive an air interface encryption key and an integrity protected key.
RS和 eNB就可以各自利用空口密钥 KeNBRS通过选定的密钥算法进一步派 生出空口加密密钥和完整性保护的密钥。 The RS and the eNB can each further derive the air interface encryption key and the integrity protected key by using the air interface key K eNBRS through the selected key algorithm.
本实施例通过在接入网侧引入一个 RSDA, 存贮了 RS的上下文信息, RS 和 RSDA预共享一个永久性密钥 K, RSDA通过有线或无线的方式和 eNB相连, 由 eNB完成 RS的鉴权功能, 因而将 RS接入鉴权完全限定在接入网侧, 从而避 免由于接入网弓 I入 RS后而造成对核心网的改动, 使得弓 I入 RS后的系统对整个 网络的影响达到最小化。  In this embodiment, by introducing an RSDA on the access network side, the context information of the RS is stored, and the RS and the RSDA pre-share a permanent key K. The RSDA is connected to the eNB through a wired or wireless manner, and the eNB completes the RS identification. The weight function, thus completely limiting the RS access authentication to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS, so that the impact of the system after the switch into the RS affects the entire network. Minimized.
实施例三是身份认证位于 eNB上, 由 eNB完成 RS的鉴权功能的实施例, 下 面介绍一种身份认证位于 RSDA上, 由 RSDA完成 RS的鉴权功能的实施例。  The third embodiment is an embodiment in which the identity authentication is located on the eNB and the eNB performs the authentication function of the RS. The following describes an embodiment in which the identity authentication is located on the RSDA and the RSA performs the authentication function of the RS.
实施例四  Embodiment 4
在本实施例中, 身份认证位于 RSDA上, 则由 RSDA完成 RS的鉴权功能。 本实施例的方案要求 RSDA上需要配备所有通过有线相连的 eNB的网络标识。 引入 RS后支持对称性密钥认证方式的各种系统都可以对 RS进行鉴权, 因此本 实施例中的 eNB都可以为支持对称性密钥认证方式的基站。 下面结合附图进行 详细说明。 In this embodiment, the identity authentication is located on the RSDA, and the RSA is authenticated by the RSDA. The solution of this embodiment requires that the network identifier of all eNBs connected by wires be required on the RSDA. The eNBs in this embodiment can be the base stations supporting the symmetric key authentication mode, and the eNBs in this embodiment can be used to authenticate the RSs. The details will be described below with reference to the accompanying drawings.
参见图 5 , 下面对实现实施例四的方法的具体步骤进行详细介绍: 步骤 501: RS向 RSDA发送认证请求;  Referring to FIG. 5, the specific steps of implementing the method in Embodiment 4 are described in detail below: Step 501: The RS sends an authentication request to the RSDA.
所述认证请求可以被包含在认证请求消息中, 该消息中携带了 RS身份标 识、 所支持的加密和完整性保护算法, 以及派生密钥 对应的密钥标识 符^/4„等内容,其中 RS的身份标识可以是 RS的 IMSI,也可以是 RS的 MAC 地址等。 The authentication request may be included in an authentication request message, where the message carries an RS identity, a supported encryption and integrity protection algorithm, and a key identifier corresponding to the derived key ^/ 4 „ The identity of the RS may be the IMSI of the RS, or the MAC address of the RS, and the like.
步骤 502: RSDA生成 AV;  Step 502: RSDA generates AV;
RSDA根据 RS身份标识找到该 RS对应的共享密钥 K , 并随机产生一个 RAND, 然后根据 RAND、 自身当前保存的 SQN、 RS和 RSDA之间共享的密钥 K及其它信息生成该 RS对应的 AV, 其中, AV包括 RAND、 XRES、 K  The RSDA finds the shared key K corresponding to the RS according to the RS identity, and randomly generates a RAND, and then generates an AV corresponding to the RS according to the KEY, the key K and the other information shared between the SQN, the RS and the RSDA currently saved by the RAND. , where AV includes RAND, XRES, K
AUTN; 还可以采用其它的参数来生成 AV, 本发明实施例并不限定生成 AV的 参数。 AUTN; Other parameters may also be used to generate the AV. The embodiment of the present invention does not limit the parameters for generating the AV.
步骤 503: RSDA向 RS返回认证响应;  Step 503: The RSDA returns an authentication response to the RS.
该消息中携带了该 RS的 AV中对应的 RAND和 AUTN , 以及密钥 K 所 对应的密钥标识符 KSI 等内容。  The message carries the corresponding RAND and AUTN in the AV of the RS, and the key identifier KSI corresponding to the key K.
步骤 504与步骤 304, 此处不再赘述;  Step 504 and step 304, and details are not described herein;
步骤 505: RS向 RSDA返回 RES值;  Step 505: The RS returns an RES value to the RSDA;
步骤 506: RSDA进行认证, 并派生出空口密钥^  Step 506: RSDA performs authentication, and derives an air interface key ^
RSDA比较从 RS接收到的 RES与之前生成该 RS的 AV中的 XRES是否一致, 如果一致, 网络侧对 RS的鉴权通过,则 RSDA根据密钥^ ^^—^进一步派生出空 口密钫 KeNBRS RSDA compares whether the RES received from the RS is consistent with the XRES in the AV that generated the RS. If the network side authenticates the RS, the RSDA further derives the air interface key according to the key ^^^^^. eNB - RS
至此, 接入网侧已经完成对 RS的鉴权, 为了后续 RS与接入网侧之间安全 通信, 还可以执行以下的步骤。  At this point, the access network side has completed authentication of the RS. In order to secure communication between the RS and the access network side, the following steps can also be performed.
步骤 507: RSDA通过 SMC将该派生密钥 KeNBRS以及 RS所支持的加密和完 整性算法发送给 eNB; Step 507: The RSDA sends the derived key K eNBRS and the encryption and integrity algorithm supported by the RS to the eNB through the SMC.
步骤 508: eNB通过 SMC向 RS发送确定的加密算法和完整性保护算法; eNB根据收到 RS支持的加密和完整性保护算法以及自身支持的加密和完 整性保护算法,确定空口用户面和控制面加密密钥和完整保护性密钥的密钥派 生算法, 并通过 SMC将该选定的算法发送给 RS。 Step 508: The eNB sends the determined encryption algorithm and integrity protection algorithm to the RS through the SMC. The eNB determines the key derivation algorithm of the air interface user plane and the control plane encryption key and the complete protection key according to the encryption and integrity protection algorithm supported by the RS and the encryption and integrity protection algorithms supported by the RS, and the SMC will The selected algorithm is sent to the RS.
步骤 509参照步骤 410, 此处不再赘述。  Step 509 refers to step 410, and details are not described herein again.
本实施例通过在接入网侧引入一个 RSDA, 存贮了 RS的上下文信息, RS 和 RSDA预共享一个永久性密钥 K, RSDA通过有线或无线的方式和 eNB相连, 由 RSDA完成 RS的鉴权功能, 因而将 RS接入鉴权完全限定在接入网侧,从而避 免由于接入网弓 I入 RS后而造成对核心网的改动, 使得弓 I入 RS后的系统对整个 网络的影响达到最小化。  In this embodiment, by introducing an RSDA on the access network side, the context information of the RS is stored, and the RS and the RSDA pre-share a permanent key K. The RSDA is connected to the eNB through a wired or wireless manner, and the RS is completed by the RSDA. The weight function, thus completely limiting the RS access authentication to the access network side, thereby avoiding changes to the core network caused by the access network entering the RS, so that the system after the bow I enters the RS affects the entire network. Minimized.
上面的实施例介绍了几种 RS接入鉴权的方法, 下面介绍相关装置。  The above embodiment describes several methods for RS access authentication, and the related devices are described below.
参见图 6, —种通信装置, 包括:  Referring to Figure 6, a communication device includes:
请求接收单元 110, 用于接收 RS发送的认证请求, 认证请求包含 RS身份标 识;  The request receiving unit 110 is configured to receive an authentication request sent by the RS, where the authentication request includes an RS identity identifier;
获取单元 111 , 用于获取认证向量, 认证向量由独立于核心网的第二设备 生成, 与 RS身份标识对应;  The obtaining unit 111 is configured to obtain an authentication vector, where the authentication vector is generated by a second device independent of the core network, and corresponds to the RS identity identifier;
获取单元 111可以是在接收请求接收单元 110中的认证请求后获取认证向 量。  The obtaining unit 111 may acquire the authentication vector after receiving the authentication request in the request receiving unit 110.
认证向量发送单元 112,用于向 RS发送获取单元 111获取的认证向量,指示 The authentication vector sending unit 112 is configured to send, to the RS, the authentication vector acquired by the acquiring unit 111, and the indication
RS对认证向量进行认证; The RS authenticates the authentication vector;
响应值接收单元 113 , 用于接收 RS对认证向量发送单元 112发送的认证向 量认证通过后发送的响应值;  The response value receiving unit 113 is configured to receive a response value that is sent by the RS after the authentication vector sent by the authentication vector sending unit 112 is passed;
认证单元 114, 用于对响应值接收单元 113接收的响应值进行认证; 空口密钥派生单元 115, 用于在认证单元 114对响应值认证通过时, 派生空 口密钥。  The authentication unit 114 is configured to authenticate the response value received by the response value receiving unit 113. The air interface key deriving unit 115 is configured to derive an air interface key when the authentication unit 114 passes the response value authentication.
其中, 通信装置还包括: 密钥派生单元, 用于派生与所述空口密钥派生单 元 115派生的所述空口密钥对应的加密密钥和完整性保护的密钥。  The communication device further includes: a key derivation unit, configured to derive an encryption key and an integrity-protected key corresponding to the air interface key derived by the air interface key derivation unit 115.
参见图 7, —种通信系统, 包括:  See Figure 7, a communication system, including:
中继站 121 , 用于向第一设备 122发送认证请求, 所述认证请求包含 RS身 份标识, 接收第一设备 122发送的认证向量, 对认证向量进行认证, 认证通过 后生成响应值, 向第一设备 122发送响应值; The relay station 121 is configured to send an authentication request to the first device 122, where the authentication request includes an RS identity, and receives an authentication vector sent by the first device 122, and authenticates the authentication vector, and the authentication is passed. Generating a response value, and transmitting a response value to the first device 122;
第一设备 122, 用于接收中继站 121发送的认证请求,认证请求包含中继站 的身份标识, 获取认证向量, 向中继站 121发送认证向量, 接收中继站 121对认 证向量认证通过后发送的响应值, 对响应值进行认证, 当认证通过时, 派生空 口密钥;  The first device 122 is configured to receive an authentication request sent by the relay station 121, where the authentication request includes an identity of the relay station, acquire an authentication vector, send an authentication vector to the relay station 121, and receive a response value sent by the relay station 121 after the authentication vector is authenticated. The value is authenticated, and when the authentication is passed, the air interface key is derived;
独立于核心网的第二设备 123, 用于生成认证向量, 认证向量与中继站身 份标识对应。  The second device 123, independent of the core network, is configured to generate an authentication vector, and the authentication vector corresponds to the relay station identity.
其中, 第一设备 122可以为基站,独立于核心网的第二设备 123可以为逻辑 实体, 逻辑实体与所述基站相连。  The first device 122 may be a base station, and the second device 123 independent of the core network may be a logical entity, and the logical entity is connected to the base station.
其中, 第一设备 122可以为基站,独立于核心网的第二设备 123可以为逻辑 实体, 逻辑实体集成在所述基站中。  The first device 122 may be a base station, and the second device 123 independent of the core network may be a logical entity, and the logical entity is integrated in the base station.
其中, 第一设备 122和独立于核心网的第二设备 123可以为同一逻辑实体。 其中,基站还用于派生与所述空口密钥对应的加密密钥和完整性保护的密 钥。  The first device 122 and the second device 123 independent of the core network may be the same logical entity. The base station is further configured to derive an encryption key and an integrity-protected key corresponding to the air interface key.
本发明实施例接入网侧接收 RS发送的认证请求, 生成认证向量并发送给 In the embodiment of the present invention, the access network side receives the authentication request sent by the RS, generates an authentication vector, and sends the authentication vector to
RS, 接收 RS对认证向量认证通过后发送的响应值, 对响应值进行认证, 认证 通过后派生空口密钥, 完成对 RS的鉴权。 在接入网侧引入一个网络逻辑实体, 由接入网侧的逻辑实体与中继站共享了共享密钥, 由接入网侧完成对 RS的身 份认证及密钥派生,从而完成中继站的网络安全接入, 因此中继站的网络安全 接入不需要对核心网进行改动就可以实现, 使得引入 RS后的系统对整个网络 的影响达到最小化。 The RS receives the response value sent by the RS after the authentication vector is authenticated, and authenticates the response value. After the authentication is passed, the air interface key is derived to complete the authentication of the RS. A network logical entity is introduced on the access network side, and the logical entity on the access network side shares the shared key with the relay station, and the access network side completes the identity authentication and key derivation of the RS, thereby completing the network security connection of the relay station. Therefore, the network security access of the relay station can be realized without modifying the core network, so that the impact of the system after the introduction of the RS on the entire network is minimized.
进一步, 可以通过在接入网侧将 RSDA和 eNB集成在一起, 将 RS的鉴权功 能完全限定在接入网侧; 通过在接入网侧引入一个 RSDA, 存贮了 RS的上下文 信息, RS和 RSDA共享了共享密钥, RSDA通过有线或无线的方式和 eNB相连, 由 eNB完成 RS的鉴权功能或由 RSDA完成 RS的鉴权功能, 将 RS接入鉴权完全 限定在接入网侧。  Further, the RSDA and the eNB may be integrated on the access network side to completely limit the authentication function of the RS to the access network side. By introducing an RSDA on the access network side, the context information of the RS is stored. The RSDA is shared with the RSDA. The RSDA is connected to the eNB by wire or wirelessly. The eNB performs the authentication function of the RS or the RSA performs the authentication function of the RS. The RS access authentication is completely restricted to the access network. .
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤 是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可 读存储介质中, 上述提到的存储介质可以是只读存储器, 磁盘或光盘等。 以上对本发明实施例所提供的鉴权方法、通信装置和通信系统进行了详细 施例的说明只是用于帮助理解本发明的方法及其核心思想; 同时,对于本领域 的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改 变之处, 综上所述, 本说明书内容不应理解为对本发明的限制。 A person skilled in the art can understand that all or part of the steps of implementing the above embodiments can be completed by a program to instruct related hardware, and the program can be stored in a computer readable storage medium, the above mentioned storage. The medium can be a read only memory, a magnetic disk or a compact disk or the like. The foregoing detailed description of the authentication method, the communication device, and the communication system provided by the embodiments of the present invention is only for assisting in understanding the method of the present invention and its core ideas. Meanwhile, for those skilled in the art, The present invention is not limited by the scope of the present invention.

Claims

权 利 要 求 Rights request
1、 一种鉴权方法, 其特征在于, 包括:  An authentication method, comprising:
第一设备接收中继站发送的认证请求, 所述认证请求包含中继站身份标 识;  The first device receives an authentication request sent by the relay station, where the authentication request includes a relay station identity identifier;
所述第一设备获取认证向量, 向所述中继站发送所述认证向量,指示所述 中继站对所述认证向量进行认证,所述认证向量由独立于核心网的第二设备生 成, 与所述中继站身份标识对应;  The first device acquires an authentication vector, and sends the authentication vector to the relay station, instructing the relay station to authenticate the authentication vector, where the authentication vector is generated by a second device independent of the core network, and the relay station Identity corresponding;
所述第一设备接收所述中继站对所述认证向量认证通过后发送的响应值 , 对所述响应值进行认证, 当认证通过时, 派生空口密钥。  The first device receives a response value sent by the relay station after the authentication vector is authenticated, and performs authentication on the response value. When the authentication passes, the air interface key is derived.
2、 根据权利要求 1所述的鉴权方法, 其特征在于, 所述第一设备为基站, 所述第二设备为逻辑实体, 所述逻辑实体与所述基站相连;  The authentication method according to claim 1, wherein the first device is a base station, the second device is a logical entity, and the logical entity is connected to the base station;
所述第一设备获取认证向量的步骤具体为:  The step of the first device acquiring the authentication vector is specifically:
所述第一设备接收所述第二设备发送的认证向量。  The first device receives an authentication vector sent by the second device.
3、 根据权利要求 1所述的鉴权方法, 其特征在于, 所述第一设备为基站, 所述第二设备为逻辑实体, 所述逻辑实体集成在所述基站中。  The authentication method according to claim 1, wherein the first device is a base station, the second device is a logical entity, and the logical entity is integrated in the base station.
4、根据权利要求 1所述的鉴权方法, 其特征在于, 所述第一设备和所述第 二设备为同一逻辑实体。  The authentication method according to claim 1, wherein the first device and the second device are the same logical entity.
5、 根据权利要求 1至 4任一项所述的鉴权方法, 其特征在于, 所述独立于 核心网的第二设备生成认证向量的步骤具体为:  The authentication method according to any one of claims 1 to 4, wherein the step of generating the authentication vector by the second device independent of the core network is specifically:
所述独立于核心网的第二设备查找与所述中继站身份标识对应的共享密 钥, 产生随机数, 生成与所述共享密钥和所述随机数对应的所述认证向量。  The second device independent of the core network searches for a shared key corresponding to the relay station identity, generates a random number, and generates the authentication vector corresponding to the shared key and the random number.
6、 根据权利要求 1至 4任一项所述的鉴权方法, 其特征在于, 所述认证向 量包括期望响应值;  The authentication method according to any one of claims 1 to 4, wherein the authentication vector includes an expected response value;
所述对所述响应值进行认证的步骤具体为:  The step of authenticating the response value is specifically:
将所述响应值与所述认证向量中的所述期望响应值进行比较, 如果一致, 认证通过。  The response value is compared with the expected response value in the authentication vector, and if they match, the authentication passes.
7、 根据权利要求 2或 3所述的鉴权方法, 其特征在于, 所述派生空口密钥 的步骤后还包括:  The authentication method according to claim 2 or 3, wherein the step of deriving the air interface key further comprises:
基站派生与所述空口密钥对应的加密密钥和完整性保护的密钥。 The base station derives an encryption key and an integrity protected key corresponding to the air interface key.
8、根据权利要求 4所述的鉴权方法, 其特征在于, 所述派生空口密钥的步 骤后还包括: The authentication method according to claim 4, wherein the step of deriving the air interface key further comprises:
逻辑实体将所述空口密钥发送给基站,指示所述基站派生与所述空口密钥 对应的加密密钥和完整性保护的密钥。  The logical entity sends the air interface key to the base station, instructing the base station to derive an encryption key and an integrity protected key corresponding to the air interface key.
9、 一种通信装置, 其特征在于, 包括:  9. A communication device, comprising:
请求接收单元, 用于接收中继站发送的认证请求, 所述认证请求包含中继 站身份标识;  a request receiving unit, configured to receive an authentication request sent by the relay station, where the authentication request includes a relay station identity identifier;
获取单元, 用于获取认证向量, 所述认证向量由独立于核心网的第二设备 生成, 与所述中继站身份标识对应; 向量, 指示所述中继站对所述认证向量进行认证;  An acquiring unit, configured to obtain an authentication vector, where the authentication vector is generated by a second device independent of the core network, corresponding to the relay station identity identifier; and the vector indicates that the relay station authenticates the authentication vector;
响应值接收单元,用于接收所述中继站对所述认证向量发送单元发送的所 述认证向量认证通过后发送的响应值;  a response value receiving unit, configured to receive a response value that is sent by the relay station after the authentication vector sent by the authentication vector sending unit is authenticated;
认证单元, 用于对所述响应值接收单元接收的所述响应值进行认证; 空口密钥派生单元, 用于在所述认证单元对所述响应值认证通过时, 派生 空口密钥。  An authentication unit, configured to authenticate the response value received by the response value receiving unit, and an air interface key deriving unit, configured to: when the authentication unit authenticates the response value, derive an air interface key.
10、 根据权利要求 9所述的通信装置, 其特征在于, 还包括:  The communication device according to claim 9, further comprising:
密钥派生单元,用于派生与所述空口密钥派生单元派生的所述空口密钥对 应的加密密钥和完整性保护的密钥。  And a key derivation unit, configured to derive an encryption key and an integrity-protected key corresponding to the air interface key derived by the air interface key derivation unit.
11、 一种通信系统, 其特征在于, 包括:  A communication system, comprising:
第一设备,用于接收所述中继站发送的认证请求, 所述认证请求包含中继 站的身份标识; 获取认证向量, 向所述中继站发送所述认证向量, 指示所述中 继站对所述认证向量进行认证, 所述认证向量由独立于核心网的第二设备生 成, 与所述中继站身份标识对应;接收所述中继站对所述认证向量认证通过后 发送的所述响应值, 对所述响应值进行认证, 当认证通过时, 派生空口密钥。  a first device, configured to receive an authentication request sent by the relay station, where the authentication request includes an identity of the relay station, acquire an authentication vector, send the authentication vector to the relay station, and instruct the relay station to authenticate the authentication vector And generating, by the second device independent of the core network, the identifier corresponding to the relay station, and receiving the response value sent by the relay station after the authentication vector is authenticated, and authenticating the response value. , when the authentication is passed, the air interface key is derived.
12、根据权利要求 11所述的通信系统,其特征在于,所述第一设备为基站, 所述第二设备为逻辑实体, 所述逻辑实体与所述基站相连。  The communication system according to claim 11, wherein the first device is a base station, the second device is a logical entity, and the logical entity is connected to the base station.
13、根据权利要求 11所述的通信系统,其特征在于,所述第一设备为基站, 所述第二设备为逻辑实体, 所述逻辑实体集成在所述基站中。 The communication system according to claim 11, wherein the first device is a base station, the second device is a logical entity, and the logical entity is integrated in the base station.
14、 根据权利要求 11所述的通信系统, 其特征在于, 所述第一设备和所述 第二设备为同一逻辑实体。 14. The communication system according to claim 11, wherein the first device and the second device are the same logical entity.
PCT/CN2009/072845 2008-07-29 2009-07-21 An authorization method, a communication apparatus and a communication system WO2010012201A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810041298A CN101640887B (en) 2008-07-29 2008-07-29 Authentication method, communication device and communication system
CN200810041298.5 2008-07-29

Publications (1)

Publication Number Publication Date
WO2010012201A1 true WO2010012201A1 (en) 2010-02-04

Family

ID=41609952

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/072845 WO2010012201A1 (en) 2008-07-29 2009-07-21 An authorization method, a communication apparatus and a communication system

Country Status (2)

Country Link
CN (1) CN101640887B (en)
WO (1) WO2010012201A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612029A (en) * 2011-01-19 2012-07-25 华为技术有限公司 Authentication method and authentication device
CN108270560A (en) * 2017-01-03 2018-07-10 中兴通讯股份有限公司 A kind of cipher key transmission methods and device

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010124474A1 (en) 2009-04-30 2010-11-04 华为技术有限公司 Method and device for establishing security mechanism of air interface link
CN102158860B (en) * 2010-02-12 2014-05-21 华为技术有限公司 Radio node network-accessing method and system as well as relay node
CN102215474B (en) * 2010-04-12 2014-11-05 华为技术有限公司 Method and device for carrying out authentication on communication equipment
CN102238484B (en) * 2010-04-22 2016-03-30 中兴通讯股份有限公司 Based on the authentication method of group and system in the communication system of Machine To Machine
US9385862B2 (en) 2010-06-16 2016-07-05 Qualcomm Incorporated Method and apparatus for binding subscriber authentication and device authentication in communication systems
US8839373B2 (en) * 2010-06-18 2014-09-16 Qualcomm Incorporated Method and apparatus for relay node management and authorization
CN101951590B (en) * 2010-09-03 2015-07-22 中兴通讯股份有限公司 Authentication method, device and system
CN101931955B (en) * 2010-09-03 2015-01-28 中兴通讯股份有限公司 Authentication method, device and system
CN102480727B (en) * 2010-11-30 2015-08-12 中兴通讯股份有限公司 Group authentication method in machine and machine communication and system
CN104160777B (en) * 2013-03-13 2018-01-23 华为技术有限公司 The transmission method of data, device and system
EP3200486B1 (en) * 2014-11-07 2021-01-13 Huawei Technologies Co., Ltd. Connection establishment method, device, and system
CN106034300A (en) * 2015-03-11 2016-10-19 普天信息技术有限公司 Authentication connection method based on TD-LTE wireless communication network and base station
CN106792788B (en) * 2015-11-24 2019-08-23 大唐移动通信设备有限公司 A kind of terminal attachment method and base station
CN107809776B (en) * 2016-09-09 2021-06-15 中兴通讯股份有限公司 Information processing method, device and network system
WO2019051776A1 (en) * 2017-09-15 2019-03-21 华为技术有限公司 Key transmission method and device
CN112105024B (en) * 2020-11-12 2021-03-23 新华三技术有限公司 Base station identity authentication method, device and equipment
CN117560669A (en) * 2022-08-04 2024-02-13 华为技术有限公司 Authentication method, communication device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801704A (en) * 2004-12-31 2006-07-12 华为技术有限公司 Method and system for user access core network
CN1937487A (en) * 2005-09-22 2007-03-28 北京三星通信技术研究有限公司 LTE authentication and encryption method
CN101098221A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Network layer safety authentication method in wireless cellular network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100349496C (en) * 2005-07-15 2007-11-14 华为技术有限公司 Message authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801704A (en) * 2004-12-31 2006-07-12 华为技术有限公司 Method and system for user access core network
CN1937487A (en) * 2005-09-22 2007-03-28 北京三星通信技术研究有限公司 LTE authentication and encryption method
CN101098221A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Network layer safety authentication method in wireless cellular network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612029A (en) * 2011-01-19 2012-07-25 华为技术有限公司 Authentication method and authentication device
CN108270560A (en) * 2017-01-03 2018-07-10 中兴通讯股份有限公司 A kind of cipher key transmission methods and device
CN108270560B (en) * 2017-01-03 2023-06-09 中兴通讯股份有限公司 Key transmission method and device

Also Published As

Publication number Publication date
CN101640887A (en) 2010-02-03
CN101640887B (en) 2012-10-03

Similar Documents

Publication Publication Date Title
WO2010012201A1 (en) An authorization method, a communication apparatus and a communication system
EP3328108A1 (en) Authentication method, re-authentication method and communication apparatus
JP6732095B2 (en) Unified authentication for heterogeneous networks
US8533461B2 (en) Wireless local area network terminal pre-authentication method and wireless local area network system
EP2730113B1 (en) Methods and devices for authenticating a wireless device to a foreign domain
US8881235B2 (en) Service-based authentication to a network
US20130163762A1 (en) Relay node device authentication mechanism
US20110004754A1 (en) Method And Apparatuses For Authentication And Reauthentication Of A User With First And Second Authentication Procedures
CN108880813B (en) Method and device for realizing attachment process
WO2011038620A1 (en) Access authentication method, apparatus and system in mobile communication network
KR20180057665A (en) Access method, device and system for user equipment (UE)
CN106664286B (en) Switching method and switching system between heterogeneous networks
KR20120091635A (en) Authentication method and apparatus in wireless communication system
US20170223531A1 (en) Authentication in a wireless communications network
EP1754359A2 (en) Aka sequence number for replay protection in eap-aka authentication
WO2015100974A1 (en) Terminal authentication method, device and system
WO2010127539A1 (en) Method and system for authenticating accessing to stream media service
WO2012028043A1 (en) Method, device and system for authentication
US8705734B2 (en) Method and system for authenticating a mobile terminal in a wireless communication system
WO2012040949A1 (en) Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network
Gu et al. A green and secure authentication for the 4th generation mobile network
CN111526008B (en) Authentication method under mobile edge computing architecture and wireless communication system
Rajeswari Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking
CN116347445A (en) Security protocol channel establishment method, transmission method and system based on non-3 GPP network element
GB2450096A (en) Network Authentication and Reauthentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09802394

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09802394

Country of ref document: EP

Kind code of ref document: A1