WO2011085566A1 - 实现密钥映射的方法及认证服务器、终端、系统 - Google Patents

实现密钥映射的方法及认证服务器、终端、系统 Download PDF

Info

Publication number
WO2011085566A1
WO2011085566A1 PCT/CN2010/071207 CN2010071207W WO2011085566A1 WO 2011085566 A1 WO2011085566 A1 WO 2011085566A1 CN 2010071207 W CN2010071207 W CN 2010071207W WO 2011085566 A1 WO2011085566 A1 WO 2011085566A1
Authority
WO
WIPO (PCT)
Prior art keywords
mapping
destination
key material
key
original
Prior art date
Application number
PCT/CN2010/071207
Other languages
English (en)
French (fr)
Inventor
王鸿彦
韦银星
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/257,950 priority Critical patent/US20120265982A1/en
Priority to EP10842850.9A priority patent/EP2512166A4/en
Publication of WO2011085566A1 publication Critical patent/WO2011085566A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, an authentication server, a terminal, and a system for implementing key mapping in a next generation network. Background technique
  • the Next Generation Network is receiving more and more attention as an evolved packet-based network framework.
  • International Standards Organization ITU-T and other regional standards organizations such as the European Telecommunications Standards Institute (ETSI), the World Federation of Telecommunications Standards (ATIS), the NGN framework model, business and related
  • ETSI European Telecommunications Standards Institute
  • IMS World Federation of Telecommunications Standards
  • NGN framework model business and related
  • the field has undergone extensive research and standardization work.
  • NGN can support heterogeneous network access, inter-network roaming and seamless handover.
  • the continuity of the service needs to be ensured, and the privacy and integrity of the signaling data and user data between the terminal and the NGN access point are guaranteed.
  • the main purpose of the present invention is to provide a method for implementing key mapping, an authentication server, a terminal, and a system, which can speed up the generation of session keys when the terminal switches between different NGNs, and reduce the terminals in different manners. Delays in switching between networks, and reducing authentication signaling interactions, reducing the burden on the authentication server.
  • the technical solution of the present invention is achieved as follows:
  • the present invention provides a method for implementing key mapping, the method includes: when a terminal switches from an original network to a destination network, the access device in the destination network receives the key material mapping request sent by the terminal and sends the Giving an authentication server; after receiving the key material mapping request, the authentication server maps the destination key material of the destination network according to the original key material in the original network, and establishes a terminal and destination network. The communication between the security.
  • the authentication server After obtaining the destination key material, the authentication server returns a mapping response to the terminal, and the terminal maps the destination of the destination network according to the original key material in the original network.
  • the key material completes the establishment of communication security between itself and the destination network.
  • the original key material in the authentication server is generated by the authentication server after successful authentication of the terminal in the original network; or is carried by the key material mapping request sent by the terminal.
  • the process of obtaining the destination key material by the original key material specifically includes: obtaining, according to the original key material, a destination key of the destination network according to a preset mapping rule.
  • the method further includes: obtaining, according to the obtained target key material, a destination session key material in the destination network according to a key derivation manner in the destination network.
  • the present invention also provides an authentication server that implements key mapping.
  • the authentication server includes: a receiving unit, a first mapping unit, where: a receiving unit is configured to receive a secret sent by the terminal when switching from the original network to the destination network.
  • the key material mapping request is sent to the first mapping unit, and the first mapping unit is configured to receive the key material mapping request sent by the receiving unit Then, the destination key material of the destination network is obtained according to the original key material mapping in the original network.
  • the authentication server further includes: a sending unit, where: the first mapping unit is further configured to send the obtained destination key material to the sending unit, and the sending unit is configured to receive the After the destination key material sent by the first mapping unit, the mapping response is returned to the terminal.
  • the authentication server further includes: a first generating unit, configured to generate the original key material after the authentication of the terminal is successful in the original network.
  • the first mapping unit is configured to: obtain, according to a preset mapping rule, a destination key material of the destination network according to the original key material generated by the first generating unit;
  • the first mapping unit is further configured to: obtain, according to the obtained target key material, the destination session key material in the destination network according to a key derivation manner in the destination network.
  • the present invention further provides a terminal for implementing key mapping, the terminal comprising: a second generating unit, a switching unit, and a second mapping unit, where: a second generating unit, configured to generate an original key material; For switching from the original network to the destination network, and starting the second mapping unit; the second mapping unit is configured to map the destination key material according to the original key material generated by the second generating unit.
  • the present invention also provides a system for implementing key mapping, the system comprising a terminal for implementing key mapping, and an authentication server for implementing key mapping, wherein: the terminal is configured to switch from the original network to And the authentication server is configured to: after receiving the key material mapping request sent by the terminal, according to the original key material mapping in the original network, obtain the key material mapping request; Describe the destination key material of the destination network and establish communication security between the terminal and the destination network.
  • the destination root key of the destination network can be obtained from the original root key of the original key material in the generated original network according to a preset mapping rule, and then the destination root key passes the purpose.
  • the key derivation method of the network finally obtains the destination session key material, completes the mapping process of the original key material to the destination key material, and does not need to regenerate a new key to obtain the destination key when the terminal has switched to the destination network, thereby
  • the efficiency of the session key generation can be improved, and the delay of the terminal switching between different NGNs can be reduced.
  • the interaction of the authentication signaling can be effectively reduced, and the burden of the authentication server can be reduced.
  • FIG. 1 is a schematic flowchart of an implementation process of implementing a key mapping method according to the present invention
  • FIG. 2 is a schematic diagram showing an implementation flow of the target key material obtained by mapping the original key material
  • FIG. 3 is a schematic flowchart of an implementation process of a key-to-target key material mapping process on a terminal side;
  • FIG. 4 is a schematic flowchart of a method for implementing a key mapping method according to a first embodiment of the present invention;
  • FIG. 6 is a schematic flowchart of a method for implementing a key mapping method according to a third embodiment of the present invention;
  • FIG. 7 is a schematic flowchart of a method for implementing a key mapping method according to a fourth embodiment of the present invention;
  • FIG. 9 is a schematic flowchart of a method for implementing a key mapping method according to a sixth embodiment of the present invention;
  • FIG. 10 is a schematic flowchart of a method for implementing a key mapping authentication server according to the present invention; ;
  • FIG. 11 is a schematic structural diagram of a terminal structure for implementing key mapping according to the present invention.
  • FIG. 12 is a schematic structural diagram of a system for implementing key mapping according to the present invention. detailed description
  • the method for implementing the key mapping of the present invention is applied to the NGN.
  • the method mainly includes the following steps:
  • Step 101 When the terminal switches from the original network to the destination network, the access device in the destination network Receiving the key material mapping request sent by the terminal and sending the request to the authentication server; where the key material mapping request may include the original key material of the original network, or may only include the identifier used to initiate the mapping process described below information.
  • the original network and the destination network may be two networks with the same key derivation and the same media, or two networks with different key derivation methods.
  • the network medium is different
  • the authentication method is different
  • the key derivation method in the NGN is different.
  • Step 102 After receiving the key material mapping request, the authentication server maps the destination key material of the destination network according to the original key material in the original network, and establishes a terminal and a destination network. Communication between the two.
  • step 102 after obtaining the destination key material, the authentication server returns a mapping response to the terminal, and the terminal maps the destination network according to the original key material in the original network.
  • the purpose of the key material to complete the establishment of communication security between the network itself and the destination.
  • the process of mapping, by the terminal, the destination key material of the destination network according to the original key material in the original network is performed before or after the authentication server returns a mapping response to the terminal.
  • the original key material in the authentication server is generated by the authentication server after the terminal authentication succeeds in the original network; or is carried by the key material mapping request sent by the terminal.
  • the method may further include: in the original network, after the authentication server successfully authenticates the terminal, generating the original secret Key material.
  • the generated original key material may include an original root key in the original network, each original intermediate key obtained by the root key, and an original derived from the original intermediate key by using a key derivation method of the original network. Session key, etc.
  • the authentication server is composed of the original key material in the original network.
  • the process of mapping the destination key material of the destination network may include: Step 201: According to the original key material, the authentication server obtains the destination key material of the destination network according to a preset mapping rule.
  • step 201 the method further includes:
  • Step 202 According to the obtained destination key material, the authentication server obtains the destination session key material in the destination network according to the key derivation manner in the destination network.
  • the destination key material obtained by the mapping includes the destination root key in the destination network. In addition, it may further include: each destination intermediate key obtained by the key root derivation by the destination root key.
  • the preset of the mapping rule can be set according to the needs of the actual application.
  • the mapping rule can be determined according to the attributes of the root key of the original network in terms of format, size, and the attribute requirements of the destination network for its root key.
  • the mapping rule can be set to direct mapping, and the original key material can be directly used as the destination key material; or, the mapping rule can be set to intercept part of the original key material as the destination key. For example, if the original key material is a 5-bit string, and the destination root key in the destination network can only contain a 2-bit string, the 2-bit character can be arbitrarily intercepted or sequentially intercepted in the original key material as the destination key material; If the destination root key in the destination network can contain a 5-bit string, the original key material can be directly used as the destination key material.
  • a new key may be generated from the original key material according to a preset mapping rule as the destination key material.
  • the authentication server returns a mapping response to the terminal, which may be:
  • the authentication server After obtaining the destination session key material, the authentication server returns a mapping response to the terminal to notify the terminal that the key processing procedure in the destination network has been completed.
  • the mapping response may be response information including the obtained destination session key material, or may only be used to identify response information that the destination session key material has been obtained.
  • the mapping process of the source key material to the destination key material of the terminal side may specifically include the following steps:
  • Step 301 After the terminal is authenticated by the authentication server, generate the original key material.
  • Step 302 When switching from the original network to the destination network, the terminal is based on the generated original key material. Mapping results in the destination key material.
  • step 302 The specific implementation of the destination key material in the step 302 is the same as that in the foregoing step 102, and details are not described herein again.
  • the terminal after the terminal and the authentication server obtain the target session key material, the terminal can implement secure communication in the destination network by using the destination session key material.
  • the system for implementing key mapping includes: a terminal, an original access device of the original network, a destination access device of the destination network, and an authentication server.
  • the process of completing the key mapping method by the system is as follows:
  • Step 401 After the original NGN, the terminal and the authentication server complete the authentication process. After the authentication succeeds, both the terminal and the authentication server generate the original key material.
  • the original key material herein may include: an original root key in the original NGN, each original intermediate key obtained from the original root key, and an original session key finally obtained according to the original NGN cryptographic derivation method, and the terminal may The secure session in the original NGN is implemented by the original key material.
  • the original access device can also participate in the authentication process.
  • Step 402 When the terminal switches from the original NGN to the destination NGN, the terminal sends a key material mapping request to the destination access device.
  • the key material mapping request may include the generated original key material, or may not include the original key but only serves as a mapping process for starting the original key material to the destination key material. Identification information.
  • Step 403 The destination access device forwards the key material mapping request to the authentication server.
  • Step 404 The authentication server obtains the destination key material by mapping the original key material generated by the self-generated or the key material mapping request. Sending a mapping response to the destination access device after completion;
  • the obtained target key material includes a destination root key of the destination network, and each destination intermediate key obtained by the destination root key according to the cryptographic derivation of the destination NGN; after obtaining the destination key material, The destination session key material finally obtained by the destination key material according to the cryptographic derivation of the destination NGN.
  • the mapping response may contain the resulting destination session key material and/or destination key material, or may simply be information identifying the destination session key material that has been obtained.
  • Step 405 The destination access device forwards the mapping response to the terminal, and the mapping succeeds.
  • the terminal performs secure communication with other terminals or servers in the destination NGN under the protection of the destination key.
  • the terminal when the terminal switches from the original NGN to the destination NGN, the terminal also maps the destination key material according to the generated original key material, and obtains the destination key material and the destination session in both the terminal and the authentication server. After the key material, the terminal can conduct a secure session in the destination NGN through the destination key.
  • the method for completing the key mapping can also be implemented by the following process:
  • Step 501 The same as step 401;
  • Step 502 When switching from the original NGN to the destination NGN, the terminal sends a key material mapping request to the original access device.
  • Step 503 The original access device forwards the key material mapping request to the destination access device.
  • the key material mapping request may carry the address of the destination access device, and the like. Information, or, when the terminal switches from the original NGN to the destination NGN, first sends the information such as the address of the destination access device to the original access device and saves it; thus, the original access device can receive the key material.
  • the key material mapping request is forwarded to the destination access device according to information such as the address of the carried or saved destination access device.
  • Steps 504-506 The same as steps 403-405.
  • the process of the foregoing embodiment is the same as the foregoing specific embodiment 1, except that the key material mapping request sent by the terminal is forwarded to the destination access device by using the original access device.
  • the system for implementing key mapping in the specific embodiment mainly includes: a terminal, an original access device and an original authentication server of the original network, and a destination access device and a destination authentication server of the destination network.
  • the key mapping processing system of the embodiment completes the key mapping method as follows:
  • Step 601 The authentication process is completed between the terminal and the original authentication server in the original NGN. After the authentication succeeds, both the terminal and the original authentication server generate the original key.
  • Step 602 The same as step 402;
  • Step 603 The destination access device forwards the key material mapping request to the destination authentication server.
  • Step 604 The destination authentication server forwards the key material mapping request to the original authentication server.
  • the information such as the address of the original authentication server may be carried in the key material mapping request, or the information such as the address of the original authentication server may be sent to the destination authentication when the terminal switches from the original NGN to the destination NGN.
  • the server is saved.
  • the destination authentication server can forward the key material mapping request to the original authentication server according to the information such as the address of the original authentication server that is carried or saved.
  • Step 605 After the original authentication server completes the process of mapping the original key material to obtain the destination key material, sending a mapping response to the destination authentication server;
  • Step 606 The destination authentication server forwards the mapping response to the destination access device.
  • Step 607 It is exactly the same as step 405.
  • the key mapping method can be implemented by the following process by using the system for implementing key mapping in the foregoing third embodiment:
  • Step 701 It is exactly the same as step 601;
  • Step 702 The same as step 502;
  • Step 703 It is exactly the same as step 503;
  • Steps 704-708 The same as steps 603-607.
  • the key material mapping request sent by the terminal is forwarded to the destination access device by the original access device.
  • the structure of the system for implementing key mapping is the same as that of the specific embodiment 1 and the second embodiment, except that
  • the original access device includes the original access forwarding module and the original access management module
  • the destination access device includes the destination access forwarding module and the destination access management module.
  • the original access forwarding module and the destination access forwarding module have the same functions, but are not limited to the following functions: used for forwarding signaling between the terminal and the authentication server, such as an authentication message.
  • the original access management module has the same functions as the destination access management module, and is not limited to the following functions: It is used to obtain network information of the terminal, such as link information of the terminal in the network, and location information of the terminal in the network. In addition, it can also have the function of the authenticator during the authentication process, or It can also be used to forward authentication information of the terminal to the authentication server.
  • Step 801 It is exactly the same as step 401;
  • Step 802 When the original NGN is switched to the destination NGN, the terminal sends a key material mapping request to the destination access management module of the destination access device.
  • the destination access forwarding module may also be forwarded to the destination access management module.
  • Step 803 The destination access management module forwards the key material mapping request to the authentication server.
  • Step 804 After the authentication server completes the process of mapping the original key material to obtain the destination key material, sending the mapping response to the destination access device Management module
  • Step 805 The destination access management module forwards the mapping response information to the terminal, and the mapping succeeds.
  • the terminal performs security communication with other terminals or servers in the destination NGN under the protection of the destination key material.
  • the destination access management module may also forward the mapping response to the terminal through the destination access forwarding module.
  • the key mapping method can be implemented by the following process by using the system for implementing key mapping in the foregoing fifth embodiment:
  • Step 901 identical to step 801;
  • Step 902 When the original NGN is switched to the destination NGN, the terminal sends the key material mapping request to the original access management module of the original access device.
  • Step 903 The original access management module forwards the key material mapping request to the destination access management module of the destination access device.
  • Steps 904-906 The same as steps 803-805.
  • the authentication server implementing the key mapping of the present invention mainly includes: receiving Unit 11, first mapping unit 12, wherein:
  • the receiving unit 11 is configured to receive a key material mapping request sent by the terminal when switching from the original network to the destination network, and send the request to the first mapping unit 12;
  • the first mapping unit 12 is configured to obtain the destination key material of the destination network according to the original key material mapping in the original network after receiving the key material mapping request sent by the receiving unit 11.
  • the above-mentioned authentication server implementing the key mapping further includes a sending unit 13, wherein: the first mapping unit 12 is further configured to send the obtained destination key material to the sending unit 13;
  • the sending unit 13 is configured to return a mapping response to the terminal after receiving the destination key material sent by the first mapping unit 12.
  • the authentication server may further include:
  • the first generating unit 14 is configured to generate the original key material after the authentication of the terminal is successful in the original network.
  • the first mapping unit 12 is configured to: obtain, according to a preset mapping rule, a destination key material of the destination network according to the original key material generated by the first generating unit 14;
  • the mapping unit 12 is further configured to: obtain the destination session key material in the destination network according to the obtained key material according to the key derivation manner in the destination network.
  • the terminal for realizing key mapping of the present invention mainly includes: a second generation unit 21, a switching unit 22, and a second mapping unit 23, wherein:
  • a second generating unit 21 configured to generate the original key material
  • the switching unit 22 is configured to switch from the original network to the destination network, and start the second mapping unit 23;
  • the second mapping unit 23 is configured to obtain the destination key material according to the original key material mapping generated by the second generating unit 21.
  • a system for key mapping according to the present invention is shown in FIG. 12.
  • the system includes the above-mentioned terminal 31 for implementing key mapping, and the above-mentioned authentication server 32 for implementing key mapping, where:
  • the terminal 31 is configured to send a key material mapping request to the authentication server when switching from the original network to the destination network;
  • the authentication server 32 is configured to: after receiving the key material mapping request sent by the terminal 31, obtain the destination key material of the destination network according to the original key material mapping in the original network, and establish a terminal and a destination. Communication between networks is secure.
  • the authentication server, the terminal, and the system for implementing the key mapping provided by the present invention can be applied to the NGN, and the specific process of implementing the key mapping in the NGN by the above authentication server, the terminal, and the system is detailed above. , will not repeat them here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种实现密钥映射的方法,该方法可以应用于NGN中,主要包括:终端从原网络切换到目的网络时,认证服务器收到所述终端发送的密钥材料映射请求,再根据所述原网络中的原密钥材料映射得到所述目的网络的目的密钥材料,并建立终端与目的网络之间的通信安全。另外,本发明还公开了一种实现密钥映射的认证服务器、终端及系统,通过本发明的方案,能够使得终端在不同NGN之间切换时,提高其会话密钥产生的效率,减少终端在网络之间切换的时延,并有利于减少认证信令交互,减轻认证服务器的负担。

Description

实现密钥映射的方法及认证服务器、 终端、 系统 技术领域
本发明涉及通信技术领域, 尤其涉及一种在下一代网络实现密钥映射 的方法及认证服务器、 终端、 系统。 背景技术
下一代网络(NGN, Next Generation Network )作为演进的基于分组交 换的网络框架受到越来越多的关注。 国际标准组织 ITU-T和其他地区标准 组织如欧洲标准化组织 ( ETSI , European Telecommunications Standards Institute )、 世界无线通讯解决方案联盟 ( ATIS , The Alliance for Telecommunications Industry Solutions )等, 对 NGN框架模型、 业务以及相 关领域进行了广泛的研究和标准化工作。
NGN能够支持异构网络接入、 网间漫游和无缝切换。 在用户的终端进 行切换时, 需要保证业务的连续性, 同时要保证终端与 NGN接入点之间的 信令数据和用户数据的私密性、 完整性。
终端在不同网络之间切换时, 认证后需要重新生成各网络中的根密钥、 中间密钥和会话密钥, 这样会增加终端切换网络的时延, 并会大大增加认 证信令交互的负担、 以及认证服务器的负担。 发明内容
有鉴于此, 本发明的主要目的在于提供一种实现密钥映射的方法及认 证服务器、 终端、 系统, 能够使得终端在不同 NGN之间切换时, 加快会话 密钥产生的效率, 减少终端在不同网络之间中切换的时延, 并减少认证信 令交互, 减轻认证服务器的负担。 为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种实现密钥映射的方法, 所述方法包括: 在终端从原 网络切换到目的网络时, 目的网络中的接入设备接收到所述终端发送的密 钥材料映射请求并发送给认证服务器; 所述认证服务器在接收到所述密钥 材料映射请求后, 根据所述原网络中的原密钥材料, 映射得到所述目的网 络的目的密钥材料, 并建立终端与目的网络之间的通信安全。
在上述方案中, 所述认证服务器在得到所述目的密钥材料之后, 向所 述终端返回映射响应, 所述终端根据所述原网络中的原密钥材料, 映射得 到所述目的网络的目的密钥材料, 完成自身与目的网络之间通信安全的建 立。
在上述方案中, 所述终端根据所述原网络中的原密钥材料, 映射得到 所述目的网络的目的密钥材料的过程在所述认证服务器向所述终端返回映 射响应之前、 或之后、 或同时进行。
在上述方案中, 所述认证服务器中的原密钥材料由所述认证服务器在 原网络中对终端认证成功后生成; 或者, 由所述终端发送的密钥材料映射 请求携带。
在上述方案中, 由所述原密钥材料映射得到所述目的密钥材料的过程, 具体包括: 根据所述原密钥材料, 按照预设的映射规则, 得到所述目的网 络的目的密钥材料; 所述方法进一步包括: 根据所得到的目的密钥材料, 按照目的网络中的密钥推导方式, 得到所述目的网络中的目的会话密钥材 料。
本发明还提供了一种实现密钥映射的认证服务器, 所述认证服务器包 括: 接收单元、 第一映射单元, 其中: 接收单元, 用于接收终端从原网络 切换到目的网络时所发送的密钥材料映射请求, 并发送到所述第一映射单 元; 第一映射单元, 用于在接收到所述接收单元发送的密钥材料映射请求 后, 根据所述原网络中的原密钥材料映射得到所述目的网络的目的密钥材 料。
在上述方案中, 所述认证服务器还包括: 发送单元, 其中: 所述第一 映射单元, 还用于将所得到的目的密钥材料发送到发送单元; 发送单元, 用于在接收到所述第一映射单元发送的目的密钥材料后, 向所述终端返回 映射响应。
在上述方案中, 所述认证服务器, 还包括: 第一生成单元, 用于在所 述原网络中, 对所述终端的认证成功后, 生成所述原密钥材料。
在上述方案中, 所述第一映射单元, 用于: 根据所述第一生成单元所 生成的原密钥材料, 按照预设的映射规则, 得到所述目的网络的目的密钥 材料; 所述第一映射单元, 进一步用于: 根据所得到的目的密钥材料, 按 照目的网络中的密钥推导方式, 得到所述目的网络中的目的会话密钥材料。
本发明还提供了一种实现密钥映射的终端, 所述终端包括: 第二生成 单元、 切换单元和第二映射单元, 其中: 第二生成单元, 用于生成原密钥 材料; 切换单元, 用于从原网络切换到目的网络, 并启动所述第二映射单 元; 第二映射单元, 用于根据所述第二生成单元生成的原密钥材料, 映射 得到所述目的密钥材料。
本发明还提供了一种实现密钥映射的系统, 所述系统包括用于实现密 钥映射的终端、 以及用于实现密钥映射的认证服务器, 其中: 终端, 用于 在从原网络切换到目的网络时, 向所述认证服务器发送密钥材料映射请求; 认证服务器, 用于在接收到所述终端发送的密钥材料映射请求后, 根据所 述原网络中的原密钥材料映射得到所述目的网络的目的密钥材料, 并建立 终端与目的网络之间的通信安全。
通过本发明, 可以由已生成的原网络中原密钥材料的原根密钥, 按照 预设的映射规则, 得到目的网络的目的根密钥, 再由目的根密钥通过目的 网络的密钥推导方式最终得到目的会话密钥材料, 完成原密钥材料到目的 密钥材料的映射过程, 无需在终端已切换至目的网络时重新生成新的密钥 来得到目的密钥,从而可以提高会话密钥产生的效率,减少终端在不同 NGN 之间切换的时延; 还可以有效减少认证信令的交互, 减轻认证服务器的负 担。 附图说明
图 1为本发明实现密钥映射方法的实现流程示意图;
图 2为由所述原密钥材料映射得到所述目的密钥材料的实现流程示意 图;
图 3为终端侧原密钥材料到目的密钥材料映射过程的实现流程示意图; 图 4为本发明具体实施例一的实现密钥映射方法的流程示意图; 图 5为本发明具体实施例二的实现密钥映射方法的流程示意图; 图 6为本发明具体实施例三的实现密钥映射方法的流程示意图; 图 7为本发明具体实施例四的实现密钥映射方法的流程示意图; 图 8为本发明具体实施例五的实现密钥映射方法的流程示意图; 图 9为本发明具体实施例六的实现密钥映射方法的流程示意图; 图 10为本发明实现密钥映射的认证服务器组成结构示意图;
图 11为本发明实现密钥映射的终端组成结构示意图;
图 12为本发明实现密钥映射的系统组成结构示意图。 具体实施方式
下面将结合附图对本发明技术方案的具体实现方式做详细说明。
本发明的实现密钥映射的方法, 应用于 NGN中, 参照图 1所示, 主要 包括以下步骤:
步骤 101 : 在终端从原网络切换到目的网络时, 目的网络中的接入设备 接收到所述终端发送的密钥材料映射请求并发送给认证服务器; 这里, 密钥材料映射请求可以包含所述原网络的原密钥材料, 也可以 只包含用于启动下述映射过程的标识信息。
这里, 原网络与目的网络可以是密钥推导方式相同、 介质相同的两个 网络, 也可以是密钥推导方式不相同的两个网络。 一般, 网络介质不同, 认证方式不同, NGN中的密钥推导方式就会有所不同。
步骤 102: 所述认证服务器在接收到所述密钥材料映射请求后, 根据所 述原网络中的原密钥材料, 映射得到所述目的网络的目的密钥材料, 并建 立终端与目的网络之间的通信安全。
其中, 在步骤 102中, 所述认证服务器在得到所述目的密钥材料之后, 向所述终端返回映射响应, 所述终端根据所述原网络中的原密钥材料, 映 射得到所述目的网络的目的密钥材料, 完成自身与目的网络之间通信安全 的建立。
这里, 所述终端根据所述原网络中的原密钥材料, 映射得到所述目的 网络的目的密钥材料的过程在所述认证服务器向所述终端返回映射响应之 前或之后或同时进行。
其中, 所述认证服务器中的原密钥材料由所述认证服务器在原网络中 对终端认证成功后生成; 或者, 由所述终端发送的密钥材料映射请求携带。
这里, 在所述步骤 101 的所述终端从原网络切换到目的网络之前, 所 述方法还可以包括: 在所述原网络中, 认证服务器对所述终端的认证成功 后, 生成所述原密钥材料。
这里, 所生成的原密钥材料可以包括原网络中的原根密钥、 由根密钥 得到的各原中间密钥、 以及釆用原网络的密钥推导方式由原中间密钥得到 的原会话密钥等。
参照图 2所示, 步骤 102中认证服务器由所述原网络中的原密钥材料 映射得到所述目的网络的目的密钥材料的过程, 具体可以包括: 步骤 201 : 根据所述原密钥材料,认证服务器按照预设的映射规则得到 目的网络的目的密钥材料。
这里, 在步骤 201之后, 所述方法进一步包括:
步骤 202: 根据所得到的目的密钥材料, 认证服务器按照目的网络中的 密钥推导方式, 得到所述目的网络中的目的会话密钥材料。
其中, 映射得到的目的密钥材料中包含了目的网络中的目的根密钥。 此外, 还可以包括: 在由目的根密钥按照密钥推导方式得到的各个目的中 间密钥。
这里, 映射规则的预设可以根据实际应用的需要来设定。
例如, 可以根据原网络的根密钥在格式、 大小等属性、 以及目的网络 对其根密钥的属性要求, 来确定映射规则。
可以将映射规则设定为直接映射, 直接将原密钥材料作为目的密钥材 料来使用; 或者, 还可以将映射规则设定为截取部分原密钥材料作为目的 密钥。 例如, 原密钥材料为 5bit的字符串, 而目的网络中目的根密钥只能 包含 2bit的字符串, 则可以在原密钥材料中任意截取或按序截取 2bit的字 符作为目的密钥材料; 如果目的网络中的目的根密钥可以包含 5bit的字符 串, 则可以直接将原密钥材料作为目的密钥材料来使用。
或者, 还可以由原密钥材料按照预先设定的映射规则, 生成新的密钥 来作为目的密钥材料。
其中, 认证服务器向所述终端返回映射响应, 具体可以为:
在得到所述目的会话密钥材料之后, 认证服务器向所述终端返回映射 响应, 以通知所述终端在目的网络中的上述密钥处理过程已完成。
这里, 所述映射响应中可以为包含所得到的所述目的会话密钥材料的 响应信息, 也可以只是用于标识所述目的会话密钥材料已得到的响应信息。 此外, 参照图 3 所示, 在本发明实现密钥映射的方法中, 终端侧原密 钥材料到目的密钥材料的映射过程, 具体可以包括以下步骤:
步骤 301 :所述终端经过所述认证服务器认证后,生成所述原密钥材料; 步骤 302: 在从所述原网络切换到所述目的网络时, 所述终端根据所生 成的原密钥材料映射得到所述目的密钥材料。
这里, 步骤 302 中根据所生成的原密钥材料映射得到所述目的密钥材 料的具体实现方式与上述步骤 102的处理过程相同, 在此不再赘述。
在实际应用中, 在所述终端和认证服务器均得到所述的目的会话密钥 材料后, 所述终端便可以通过目的会话密钥材料, 实现在所述目的网络中 的安全通信。
下面将对本发明密钥映射方法的具体实现方式做详细说明。
具体实施例一
参照图 4所示, 实现密钥映射的系统包括: 终端、 原网络的原接入设 备、 目的网络的目的接入设备、 以及认证服务器, 通过该系统完成密钥映 射方法的流程如下:
步骤 401 : 在原 NGN, 终端与认证服务器之间完成认证过程, 认证成 功后, 终端与认证服务器均生成原密钥材料;
这里的原密钥材料可以包括: 原 NGN中的原根密钥、 由该原根密钥得 到的各原中间密钥、 以及根据原 NGN的密码推导方式最终得到的原会话密 钥, 终端可以通过原密钥材料来实现在原 NGN中的安全会话。
其中, 原接入设备也可以参与到认证过程中。
步骤 402: 终端从原 NGN切换到与目的 NGN时, 终端向目的接入设 备发送密钥材料映射请求;
其中, 密钥材料映射请求可以包含所生成的原密钥材料, 也可以不包 含所述原密钥而只是作为启动原密钥材料到目的密钥材料的映射过程的一 种标识信息。
步骤 403: 目的接入设备转发所述密钥材料映射请求到认证服务器; 步骤 404:认证服务器由自身生成的或者所述密钥材料映射请求中携带 的原密钥材料映射得到目的密钥材料, 完成后发送映射响应到目的接入设 备;
这里, 所得到的目的密钥材料中包含了目的网络的目的根密钥、 由目 的根密钥按照目的 NGN的密码推导方式得到的各个目的中间密钥等; 在得到目的密钥材料之后,再由该目的密钥材料按照目的 NGN的密码 推导方式最终得到的目的会话密钥材料。
映射响应可以包含所得到的目的会话密钥材料和 /或目的密钥材料, 也 可以只是用于标识已得到目的会话密钥材料的信息。
步骤 405: 目的接入设备转发映射响应到终端, 映射成功, 终端在目的 密钥的保护下, 与目的 NGN中的其他终端或服务器等进行安全通信。
这里, 在终端从原 NGN切换到目的 NGN时, 终端也将根据所生成的 原密钥材料映射得到所述目的密钥材料, 在终端与认证服务器中均得到所 述目的密钥材料和目的会话密钥材料后, 终端便可通过目的密钥在目的 NGN中进行安全会话。
具体实施例二
参照图 5 所示, 通过上述具体实施例一中实现密钥映射的系统, 完成 密钥映射方法还可以通过以下流程来实现:
步骤 501 : 与步骤 401完全相同;
步骤 502: 从原 NGN切换到与目的 NGN时, 终端发送密钥材料映射 请求到原接入设备;
步骤 503: 原接入设备转发所述密钥材料映射请求到目的接入设备; 具体地, 可以在所述密钥材料映射请求中携带目的接入设备的地址等 信息, 或者, 还可以在终端从原 NGN切换到目的 NGN时, 先将目的接入 设备的地址等信息发送给原接入设备并保存; 这样, 原接入设备便可以在 接收到密钥材料映射请求时, 根据所携带的或已保存的目的接入设备的地 址等信息将密钥材料映射请求转发到目的接入设备。
步骤 504-506: 与步骤 403-405完全相同。
通过以上流程可知, 本具体实施例的其他过程与上述具体实施例一完 全相同, 所不同的是通过原接入设备将终端发送的密钥材料映射请求转发 到目的接入设备。
具体实施例三
参照图 6所示, 本具体实施例中实现密钥映射的系统主要包括: 终端、 原网络的原接入设备和原认证服务器、 以及目的网络的目的接入设备和目 的认证服务器, 通过本具体实施例的密钥映射处理系统完成密钥映射方法 的流程如下:
步骤 601 : 在原 NGN, 终端与原认证服务器之间完成认证过程, 认证 成功后, 终端与原认证服务器均生成原密钥;
步骤 602: 与步骤 402完全相同;
步骤 603: 目的接入设备将所述密钥材料映射请求转发到目的认证服务 器;
步骤 604: 目的认证服务器转发所述密钥材料映射请求到原认证服务 器;
具体地, 可以在所述密钥材料映射请求中携带原认证服务器的地址等 信息, 或者, 还可以在终端从原 NGN切换到目的 NGN时, 先将原认证服 务器的地址等信息发送给目的认证服务器并保存; 这样, 目的认证服务器 在接收到密钥材料映射请求, 便可以根据所携带的或已保存的原认证服务 器的地址等信息将密钥材料映射请求转发到原认证服务器。 步骤 605:原认证服务器完成原密钥材料映射得到目的密钥材料的过程 后, 发送映射响应到目的认证服务器;
步骤 606: 目的认证服务器转发映射响应到目的接入设备;
步骤 607: 与步骤 405完全相同。
通过以上流程可知,本具体实施例可以应用于原 NGN中的认证服务器 与目的 NGN的认证服务器不相同的情况。
具体实施例四
参照图 7 所示, 通过上述具体实施例三中实现密钥映射的系统, 完成 密钥映射方法还可以通过以下流程来实现:
步骤 701 : 与步骤 601完全相同;
步骤 702: 与步骤 502完全相同;
步骤 703: 与步骤 503完全相同;
步骤 704-708: 与步骤 603-607完全相同。
在本具体实施例中, 通过原接入设备将终端发送的密钥材料映射请求 转发到目的接入设备。
具体实施例五
参照图 8所示, 在本具体实施例中, 在 ITU-T NGN中, 实现密钥映射 的系统的组成结构与具体实施例一及具体实施例二中的结构相同, 所不同 的是, 其中的原接入设备包括原接入转发模块和原接入管理模块, 目的接 入设备则包括目的接入转发模块和目的接入管理模块。
这里, 原接入转发模块和目的接入转发模块功能相同, 具有但不限于 以下功能: 用于转发终端与认证服务器之间的信令如认证消息等。
原接入管理模块与目的接入管理模块功能相同, 均具有但不限于以下 功能: 用于获取终端的网络信息, 如终端在网络中的链路信息、 终端在网 络中的位置信息等。 另外, 在认证过程中还可以具有认证者的功能, 或者 还可以用于转发终端的认证信息到认证服务器。
通过本具体实施例的实现密钥映射的系统完成密钥映射方法的流程如 下:
步骤 801 : 与步骤 401完全相同;
步骤 802: 从原 NGN切换到与目的 NGN时, 终端发送密钥材料映射 请求到目的接入设备的目的接入管理模块;
这里, 也可以通过目的接入转发模块转发到目的接入管理模块。
步骤 803: 目的接入管理模块转发密钥材料映射请求到认证服务器; 步骤 804: 认证服务器完成原密钥材料映射得到目的密钥材料的过程 后, 发送映射响应到目的接入设备的目的接入管理模块;
步骤 805: 目的接入管理模块转发映射响应信息到终端, 映射成功, 终 端在目的密钥材料的保护下,与目的 NGN中的其他终端或服务器等进行安 全通信。
这里, 目的接入管理模块也可以通过目的接入转发模块将映射响应转 发到终端。
具体实施例六
参照图 9 所示, 通过上述具体实施例五中实现密钥映射的系统, 完成 密钥映射方法还可以通过以下流程来实现:
步骤 901 : 与步骤 801完全相同;
步骤 902: 从原 NGN切换到与目的 NGN时, 终端发送密钥材料映射 请求到原接入设备的原接入管理模块;
步骤 903:原接入管理模块转发所述密钥材料映射请求到目的接入设备 的目的接入管理模块;
步骤 904-906: 与步骤 803-805完全相同。
本发明实现密钥映射的认证服务器, 参照图 10所示, 主要包括: 接收 单元 11、 第一映射单元 12, 其中:
接收单元 11 , 用于接收终端从原网络切换到与目的网络时所发送的密 钥材料映射请求, 并发送到所述第一映射单元 12;
第一映射单元 12,用于在接收到所述接收单元 11发送的密钥材料映射 请求后, 根据所述原网络中的原密钥材料映射得到所述目的网络的目的密 钥材料。
其中, 上述的实现密钥映射的认证服务器, 还包括发送单元 13 , 其中: 所述第一映射单元 12, 还用于将所得到的目的密钥材料发送到发送单 元 13;
发送单元 13 ,用于在接收到所述第一映射单元 12发送的目的密钥材料 后, 向所述终端返回映射响应。
其中, 所述认证服务器还可以包括:
第一生成单元 14, 用于在所述原网络中, 对所述终端的认证成功后, 生成所述的原密钥材料。
其中, 所述第一映射单元 12, 用于: 根据所述第一生成单元 14所生成 的原密钥材料, 按照预设的映射规则, 得到所述目的网络的目的密钥材料; 其中, 第一映射单元 12进一步用于: 根据所得到的目的密钥材料, 按 照目的网络中的密钥推导方式, 得到所述目的网络中的目的会话密钥材料。
本发明的实现密钥映射的终端, 参照图 11所示, 主要包括: 第二生成 单元 21、 切换单元 22和第二映射单元 23 , 其中:
第二生成单元 21 , 用于生成所述原密钥材料;
切换单元 22, 用于从原网络切换到目的网络, 并启动所述第二映射单 元 23;
第二映射单元 23 ,用于根据所述第二生成单元 21生成的原密钥材料映 射得到所述目的密钥材料。 本发明的一种密钥映射的系统, 参照图 12所示, 所述系统包括上述的 用于实现密钥映射的终端 31、 以及上述的用于实现密钥映射的认证服务器 32, 其中:
终端 31 , 用于在从原网络切换到目的网络时, 向所述认证服务器发送 密钥材料映射请求;
认证服务器 32 ,用于在接收到所述终端 31发送的密钥材料映射请求后 , 根据所述原网络中的原密钥材料映射得到所述目的网络的目的密钥材料, 并建立终端与目的网络之间的通信安全。
这里, 本发明所提供的实现密钥映射的认证服务器、 终端以及系统, 可以应用于 NGN中 , 通过上述认证服务器、 终端以及系统在 NGN中实现 密钥映射的具体过程, 在上文已详述, 在此不再赘述。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进 等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种实现密钥映射的方法, 其特征在于, 所述方法包括:
在终端从原网络切换到目的网络时, 目的网络中的接入设备接收到所 述终端发送的密钥材料映射请求并发送给认证服务器;
所述认证服务器在接收到所述密钥材料映射请求后, 根据所述原网络 中的原密钥材料, 映射得到所述目的网络的目的密钥材料, 并建立终端与 目的网络之间的通信安全。
2、 根据权利要求 1所述的实现密钥映射的方法, 其特征在于, 所述认 证服务器在得到所述目的密钥材料之后, 向所述终端返回映射响应; 所述 终端根据所述原网络中的原密钥材料, 映射得到所述目的网络的目的密钥 材料, 完成自身与目的网络之间通信安全的建立。
3、 根据权利要求 2所述的实现密钥映射的方法, 其特征在于, 所述终 端根据原密钥材料映射得到目的密钥材料的过程, 在所述认证服务器向所 述终端返回映射响应之前、 或之后、 或同时进行。
4、根据权利要求 1、 2、或 3所述的实现密钥映射的方法,其特征在于, 所述认证服务器中的所述原密钥材料由所述认证服务器在原网络中对终端 认证成功后生成; 或者, 由所述终端发送的密钥材料映射请求携带。
5、 根据权利要求 4所述的实现密钥映射的方法, 其特征在于, 由所述 原密钥材料映射得到所述目的密钥材料的过程, 具体包括: 根据所述原密 钥材料, 按照预设的映射规则, 得到所述目的网络的目的密钥材料;
所述方法进一步包括: 根据所得到的目的密钥材料, 按照目的网络中 的密钥推导方式, 得到所述目的网络中的目的会话密钥材料。
6、 一种实现密钥映射的认证服务器, 其特征在于, 所述认证服务器包 括: 接收单元、 第一映射单元, 其中:
接收单元, 用于接收终端从原网络切换到目的网络时所发送的密钥材 料映射请求, 并发送到所述第一映射单元;
第一映射单元, 用于在接收到所述接收单元发送的密钥材料映射请求 后, 根据所述原网络中的原密钥材料映射得到所述目的网络的目的密钥材 料。
7、 根据权利要求 6所述实现密钥映射的认证服务器, 其特征在于, 所 述认证服务器还包括: 发送单元, 其中:
所述第一映射单元, 还用于将所得到的目的密钥材料发送到发送单元; 发送单元, 用于在接收到所述第一映射单元发送的目的密钥材料后, 向所述终端返回映射响应。
8、根据权利要求 6或 7所述实现密钥映射的认证服务器,其特征在于, 所述认证服务器, 还包括:
第一生成单元, 用于在所述原网络中, 对所述终端的认证成功后, 生 成所述原密钥材料。
9、 根据权利要求 8所述实现密钥映射的认证服务器, 其特征在于, 所 述第一映射单元, 用于: 根据所述第一生成单元所生成的原密钥材料, 按 照预设的映射规则, 得到所述目的网络的目的密钥材料;
所述第一映射单元, 进一步用于: 根据所得到的目的密钥材料, 按照 目的网络中的密钥推导方式, 得到所述目的网络中的目的会话密钥材料。
10、 一种实现密钥映射的终端, 其特征在于, 所述终端包括: 第二生 成单元、 切换单元和第二映射单元, 其中:
第二生成单元, 用于生成原密钥材料;
切换单元, 用于从原网络切换到目的网络, 并启动所述第二映射单元; 第二映射单元, 用于根据所述第二生成单元生成的原密钥材料, 映射 得到所述目的密钥材料。
11、 一种实现密钥映射的系统, 其特征在于, 所述系统包括用于实现 密钥映射的终端、 以及用于实现密钥映射的认证服务器, 其中:
终端, 用于在从原网络切换到目的网络时, 向所述认证服务器发送密 钥材料映射请求;
认证服务器, 用于在接收到所述终端发送的密钥材料映射请求后, 根 据所述原网络中的原密钥材料映射得到所述目的网络的目的密钥材料, 并 建立终端与目的网络之间的通信安全。
PCT/CN2010/071207 2010-01-15 2010-03-23 实现密钥映射的方法及认证服务器、终端、系统 WO2011085566A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/257,950 US20120265982A1 (en) 2010-01-15 2010-03-23 Method, authentication server, terminal and system for implementing key mapping
EP10842850.9A EP2512166A4 (en) 2010-01-15 2010-03-23 METHOD FOR REALIZING SECRET KEY MAPPING, AUTHENTICATION SERVER, TERMINAL AND SYSTEM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010001241.X 2010-01-15
CN201010001241XA CN102131191A (zh) 2010-01-15 2010-01-15 实现密钥映射的方法及认证服务器、终端、系统

Publications (1)

Publication Number Publication Date
WO2011085566A1 true WO2011085566A1 (zh) 2011-07-21

Family

ID=44269057

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/071207 WO2011085566A1 (zh) 2010-01-15 2010-03-23 实现密钥映射的方法及认证服务器、终端、系统

Country Status (4)

Country Link
US (1) US20120265982A1 (zh)
EP (1) EP2512166A4 (zh)
CN (1) CN102131191A (zh)
WO (1) WO2011085566A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113056898A (zh) * 2021-02-26 2021-06-29 华为技术有限公司 获取密钥的方法、装置及密钥管理系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10439993B2 (en) * 2015-08-19 2019-10-08 Cisco Technology, Inc. Mapping system assisted key refreshing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1579080A (zh) * 2001-10-29 2005-02-09 太阳微系统公司 数据通信网络上分布资源的用户访问控制
CN1663168A (zh) * 2002-04-26 2005-08-31 汤姆森许可公司 接入网之间互配中可传递的认证、授权和记帐
CN1889426A (zh) * 2005-06-30 2007-01-03 联想(北京)有限公司 一种实现网络安全存储与访问的方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006124666A2 (en) * 2005-05-13 2006-11-23 Tivaro, Inc. A coordinate based computer authentication system and methods
US7996822B2 (en) * 2005-12-01 2011-08-09 International Business Machines Corporation User/process runtime system trace
US8948395B2 (en) * 2006-08-24 2015-02-03 Qualcomm Incorporated Systems and methods for key management for wireless communications systems
US8462947B2 (en) * 2006-12-19 2013-06-11 Telefonaktiebolaget L M Ericsson (Publ) Managing user access in a communications network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1579080A (zh) * 2001-10-29 2005-02-09 太阳微系统公司 数据通信网络上分布资源的用户访问控制
CN1663168A (zh) * 2002-04-26 2005-08-31 汤姆森许可公司 接入网之间互配中可传递的认证、授权和记帐
CN1889426A (zh) * 2005-06-30 2007-01-03 联想(北京)有限公司 一种实现网络安全存储与访问的方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113056898A (zh) * 2021-02-26 2021-06-29 华为技术有限公司 获取密钥的方法、装置及密钥管理系统

Also Published As

Publication number Publication date
EP2512166A1 (en) 2012-10-17
US20120265982A1 (en) 2012-10-18
EP2512166A4 (en) 2014-03-26
CN102131191A (zh) 2011-07-20

Similar Documents

Publication Publication Date Title
CN112039872B (zh) 基于区块链的跨域匿名认证方法及系统
CN101667916B (zh) 一种基于分离映射网络使用数字证书验证用户身份的方法
US8559633B2 (en) Method and device for generating local interface key
RU2663972C1 (ru) Обеспечение безопасности при связи между устройством связи и сетевым устройством
CN106936570B (zh) 一种密钥配置方法及密钥管理中心、网元
JP5143125B2 (ja) ドメイン間情報通信のための認証方法、システム、およびその装置
US20150089220A1 (en) Technique For Bypassing an IP PBX
CN111050322B (zh) 基于gba的客户端注册和密钥共享方法、装置及系统
RU2015143914A (ru) Способ и устройство для связывания аутентификации абонента и аутентификации устройства в системах связи
EP1847063A2 (en) Context limited shared secret
WO2011088658A1 (zh) 对dns报文中的身份信息进行认证的方法、服务器和系统
US11418951B2 (en) Method for identifying encrypted data stream, device, storage medium and system
WO2015144041A1 (zh) 一种网络鉴权认证的方法及设备
CN104683343B (zh) 一种终端快速登录WiFi热点的方法
CN111787533A (zh) 加密方法、切片管理方法、终端及接入和移动性管理实体
CN112291064A (zh) 认证系统,注册及认证方法、装置,存储介质及电子设备
CN104955040B (zh) 一种网络鉴权认证的方法及设备
TW202142010A (zh) 用戶資料更新方法、裝置、節點和儲存媒體
CN102546523B (zh) 一种互联网接入的安全认证方法、系统和设备
WO2007147354A1 (fr) Procédé et système pour extraire une clé de messagerie instantanée
CN110999215A (zh) 安全设备访问令牌
WO2011085566A1 (zh) 实现密钥映射的方法及认证服务器、终端、系统
EP2557727B1 (en) Method and system for multi-access authentication in next generation network
JP2018537872A (ja) 通信ネットワークにおける非アクセス層接続を確立するための通信ネットワーク及び方法
KR20100021690A (ko) 이동 통신 시스템의 인증과 비계층 프로토콜 보안 운영을 효율적으로 지원하는 관리 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10842850

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2010842850

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13257950

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE