WO2011147364A1 - 用户身份信息传输的方法、用户设备、网络侧设备及系统 - Google Patents

用户身份信息传输的方法、用户设备、网络侧设备及系统 Download PDF

Info

Publication number
WO2011147364A1
WO2011147364A1 PCT/CN2011/075347 CN2011075347W WO2011147364A1 WO 2011147364 A1 WO2011147364 A1 WO 2011147364A1 CN 2011075347 W CN2011075347 W CN 2011075347W WO 2011147364 A1 WO2011147364 A1 WO 2011147364A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
user
ciphertext
identity
management entity
Prior art date
Application number
PCT/CN2011/075347
Other languages
English (en)
French (fr)
Inventor
肖志宇
于江
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP11786136.9A priority Critical patent/EP2613581A4/en
Publication of WO2011147364A1 publication Critical patent/WO2011147364A1/zh
Priority to US13/782,700 priority patent/US20130170643A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Definitions

  • the Third Generation Partnership Project (3GPP) is investigating a new evolutionary network architecture to meet the application needs of future mobile networks, including System Architecture Evolvement (SAE) and long-term evolution of access networks (Long Time Evolvement, LTE),
  • SAE System Architecture Evolvement
  • LTE Long Time Evolvement
  • the goal of network evolution is to provide a low latency, high data rate, high system capacity and coverage, low cost, fully IP based network.
  • the LTE radio access network uses Orthogonal Frequency Division Multiplexing (OFDM) technology and Multiple Input Multiple Output (MIMO) technology to support Frequency Division Duplex (FDD) and time division. Duplex (Time Division Duplex, TDD).
  • OFDM Orthogonal Frequency Division Multiplexing
  • MIMO Multiple Input Multiple Output
  • LTE is also known as the 3.9G. wireless communication system.
  • FIG. 1 is a schematic diagram of an evolved network architecture in a prior art, including a User Equipment (UE), an Evolved UMTS Territorial Radio Access Network (E-UTRAN), and an Evolved Packet Core ( Evolved Packet Core, EPC).
  • the E-UTRAN is composed of an Evolved Node B (eNodeB).
  • the eNodeBs are connected through an X2 interface, and the UE and the eNodeB are connected through an LTE-Uu port.
  • the EPC includes: a Mobility Management Entity (MME), a Serving SAE Gateway, and the like.
  • MME Mobility Management Entity
  • SME Serving SAE Gateway
  • the MME is responsible for mobility management of the control plane, including user context and mobility state management, assigning user temporary identity, etc., and is connected to the E-UTRAN through the S1-MME interface, and is connected to the serving SAE gateway through the S1-U interface;
  • the system shown further includes a Home Subscriber Server (HSS), and the HSS and the MME are connected through an S6a interface.
  • HSS Home Subscriber Server
  • the MME In the existing network security mechanism, the MME usually needs to use User Equipment (UE). The identity of the user is identified. When the MME cannot identify the mobile device/ME I UMTS Subscriber Identity Module (USIM) of the user equipment through the Globally Unique Temporary ID (GUTI), or when the MME finds an unknown When accessing a user, the MME initiates a request flow for the identity information of the user. Generally, the MME requests the identity of the user to obtain the International Mobile Subscriber Identity (IMSI) of the user equipment, and the IMSI usually uniquely identifies the user. A user device that can independently identify a subscriber.
  • UE User Equipment
  • the inventor finds that in the process of requesting the user identity information initiated by the existing MME, the IMS I is included in the user identity corresponding message fed back to the MME by the UE and exists in the form of plaintext, so the user
  • the IMSI is easy to parse and the security is very low. Due to the low security, the bad consequences are, for example, once the malicious person knows the IMSI of the UE, the user of the UE can be tracked and the like.
  • the purpose of the embodiment of the present invention is to solve the problem that the IMSI of the UE that is currently user identity authentication mechanism is easily parsed and the security is not high.
  • An embodiment of the present invention provides a method for transmitting user identity information, where the method includes: receiving a user identity request message from a mobility management entity; encrypting an international mobile user identity of the user equipment to generate a ciphertext; The management entity sends a user identity response message including the international mobile subscriber identity ciphertext.
  • the embodiment of the invention further provides a user equipment, where the user equipment includes:
  • a first receiving unit, a first processing unit, and a first sending unit configured to receive a user identity request message from a mobility management entity, where the first processing unit is configured to be in the first
  • the receiving unit encrypts the international mobile user identifier of the user equipment to generate a ciphertext of the international mobile subscriber identity of the user equipment; the first sending unit, And a method for sending, to the mobility management entity, a user identity response message that includes the ciphertext of the international mobile subscriber identity of the user equipment generated by the first processing unit.
  • the embodiment of the invention further provides a method for transmitting user identity information, the method comprising:
  • the embodiment of the present invention further provides a network side device, where the network side device includes:
  • the second sending unit is configured to send a user identity request message to the user equipment
  • the second receiving unit is configured to receive the user from the user Equipment User identity response message, the user identity response message includes a ciphertext of the international mobile subscriber identity of the user equipment
  • the second processing unit is configured to decrypt the ciphertext of the international mobile subscriber identity of the user equipment, and obtain the The international mobile subscriber identity of the user equipment.
  • the embodiment of the present invention further provides a network side device, where the network side device includes:
  • a third receiving unit, a third sending unit, and a third processing unit configured to receive a user identity response message from the user equipment forwarded by the mobility management entity, where the user identity response message includes the user a ciphertext of the international mobile subscriber identity of the device; the third processing unit, configured to decrypt the ciphertext of the international mobile subscriber identity of the user equipment received by the third receiving slip, and obtain an international mobile of the user equipment a user identifier, which further encrypts an international mobile subscriber identity of the user equipment by using a pre-obtained mobility management entity public key and a home subscriber server private key to generate a ciphertext of the international mobile subscriber identity of the user equipment; And a unit, configured to send, to the mobility management entity, the ciphertext of the international mobile subscriber identity of the user equipment generated by the third processing unit.
  • An embodiment of the present invention further provides a user identity information transmission system, where the system includes:
  • FIG. 1 is a schematic diagram of an evolved network architecture in the prior art
  • FIG. 2 is a schematic flowchart of a user identity request process of an MME to a UE in the prior art
  • FIG. 3 is a schematic structural diagram of a user equipment according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic structural diagram of another user equipment according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of a method for transmitting user identity information according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of a network side device according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic diagram of a network side device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic flowchart of a method for transmitting user identity information according to an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of a network side device according to an embodiment of the present disclosure
  • FIG. 10 is a schematic diagram of a network side device according to an embodiment of the present disclosure
  • FIG. 11 is a schematic diagram of a network side device according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic flowchart of a method for transmitting user identity information according to an embodiment of the present invention
  • FIG. 13 is a schematic diagram of a communication system for user identity information transmission according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a process for a MME to initiate a user identity request to a UE in the prior art, including the following steps:
  • Step 101 The MME sends a User Identity Request (Identity Reques t) message to the UE to obtain the
  • the brain of the UE The brain of the UE;
  • Step 102 After receiving the user identity request (Identity Reques t) message sent by the MME, the UE feeds back, to the MME, a User Identity Response (Identity Response) message including the IMSI of the UE.
  • Identity Response User Identity Response
  • the symmetric cryptographic algorithm that is, the encryption key can be derived from the decryption key, and vice versa.
  • the encryption and decryption keys are the same.
  • These algorithms also known as secret key algorithms or single-key algorithms, require the sender and receiver to agree on a key before communicating securely.
  • the security of a symmetric algorithm depends on the key, and leaking the key means that anyone can force the message. Secret decryption.
  • An asymmetric encryption algorithm also known as a public key algorithm, generally requires two keys: an encryption key and a decryption key.
  • the encryption key is also called ⁇ (so public key (Publ ic- Key, referred to as public key), and the decryption key is also called private key (Pr ivate-Key, referred to as private key).
  • Public key and private key are one Yes, if the data is encrypted with a public key, it can only be decrypted with the corresponding private key. If the data is encrypted with a private key, it can only be decrypted with the corresponding public key. Because encryption and decryption are used. Two different keys, so this algorithm is called an asymmetric encryption algorithm.
  • the decryption key cannot be calculated based on the encryption key.
  • the reason is called public key algorithm because of encryption.
  • the key can be made public, ie the stranger can encrypt the information with the encryption key, but the information can only be decrypted with the corresponding decryption key.
  • FIG. 3 is a schematic structural diagram of a user equipment (UE), where the user equipment 20 includes a first receiving unit 201, a first processing unit 202, and a first sending unit 203, where The first receiving unit 201 is configured to receive a user identity request message from a network side device, such as a mobility management entity, where the identifier of the user identity request message is an Identity Reques t message, where the user identity request message is One purpose is to obtain an IMSI of the user equipment; the first processing unit 202 is configured to encrypt an IMSI of the user equipment, and generate a ciphertext of an international mobile subscriber identity of the user equipment; The unit 203 is configured to send, to the network side device, a user identity response message that includes the ciphertext of the IMSI of the user equipment that is generated by the first processing unit 202.
  • a network side device such as a mobility management entity
  • the identifier of the user identity request message is an Identity Reques t message
  • the user identity request message is One purpose
  • FIG. 4 is a schematic structural diagram of another user equipment 20 according to an embodiment of the present invention.
  • the user equipment 20 includes a first receiving unit 201, a first processing unit 202, and a first
  • the sending unit 203 further includes: a first storage unit 204, configured to store the key set ⁇ ki ⁇ , i before the first receiving unit receives the user identity request message from the network side device, such as the mobility management entity. Is a sequence of positive integers.
  • the key set ⁇ ki ⁇ may be a subset of the permanent key set ⁇ K ⁇ saved by the network side device, such as ⁇ ki ⁇ may be a permanent secret saved by the Home Subscr iber Server (HSS).
  • HSS Home Subscr iber Server
  • a subset of the key set ⁇ K ⁇ , ⁇ ki ⁇ can also be a subset of the permanent key set stored on the network side ⁇ .
  • the key set ⁇ ki ⁇ can be customized in the user equipment according to the needs of the mobile communication user, such as being stored in the first storage unit 204, and the key set ⁇ ki ⁇ can also be used as a mobile communication user. And obtaining a reasonable timing to acquire, stored in the first storage unit 204 of the user equipment; the key set ⁇ ki ⁇ may also be updated in the usage requirement of the mobile communication user.
  • the larger the i of the key set ⁇ ki ⁇ the larger the set of keys customized by the user. When the key is randomly selected, the closer it is to one time, the higher the security of the system.
  • the first processing unit 202 is further configured to generate a random number R2, and randomly select a key ki corresponding to the positive integer i, where the key ki belongs to the HSS. Or the range of the permanent key set saved by the MME; the first processing unit 202 uses the random number R2 and the key Ki to perform symmetric key encryption on the IMSI of the user equipment, such as expressed as E2 (ki, IMSI, R2)
  • the first sending unit 203 is further configured to send a user identity response message that includes the ciphertext of the IMSI of the user equipment, where the user identity response message may be expressed as Identity Response E2 (ki, IMSI. R2) ).
  • the random number R2 and the positive integer i provided to the network side device for decrypting the ciphertext may be included in the user identity response message, or may be included in other response messages or through specific The message is sent to the network side device.
  • the first sending unit 203 uses the ciphertext of the IMSI including the user equipment to The message of the random number R2 and the positive integer i (which can be expressed as: Identity Response E2(ki, IMSI, R2), R2, i, 7) is sent to the device on the network side, such as the MME, and the MME determines the next processing:
  • the MME may forward the message (E2 (ki, IMSI, R2), R2, i, ...) to the HSS; after receiving the message, the HSS may save the permanent key according to i.
  • the HSS may save the permanent key according to i.
  • Find the ki in the set ⁇ K ⁇ decrypt the IMSI of the user equipment, and then encrypt the IMSI using the pre-obtained KMme-pub, KHSS-pri to form the ciphertext El (IMSI, KMme-pub, KHSS- Pri)
  • the HSS sends the ciphertext El (IMSI, KMme-pub, KHSS-pri) to the MME, and the MME calculates the El using the KMme-pri, KHSS-pub obtained in advance, and obtains the IMSI of the user.
  • the (KHSS-pub, KHSS-pri) may represent an asymmetric key pair generated by the HSS side
  • the MME may also have the function of the HSS provided by this embodiment, that is, ⁇ ki ⁇ is a subset of the permanent key set ⁇ K ⁇ saved by the network side ME, and the MME may be based on the random number R2. And decrypting the IMSI of the user equipment according to i finding the key ki in its saved permanent key set ⁇ 10.
  • the functions of the first receiving unit 201, the first processing unit 202, the sending unit 203, and the storage unit 204 can be implemented by using physical/logical modules independently set in the user equipment.
  • the above modules can also be implemented in whole or in part by the same physical/logical entity. For example, all or part of the above modules are implemented by the ME/USIM set in the user equipment.
  • the user equipment of the present invention adopts a technical method of encrypting the IMSI of the user equipment to generate ciphertext feedback to the network side device, and overcomes the problem that the IMSI of the UE existing in the current user identity authentication mechanism is easily parsed, thereby achieving the problem.
  • the technical effect of improving the confidentiality of user identity is easily improved.
  • Another embodiment of the present invention with reference to the user equipment disclosed in the embodiment of the present invention, is adapted to the user equipment, and the embodiment of the present invention further provides a method for transmitting user identity information, as shown in FIG. 5, The method includes:
  • Step 401 Receive a user identity request message from a network side device.
  • the method for transmitting the user identity information may further include: storing a key set ⁇ ki ⁇ , where i is a positive integer sequence, and the key set ⁇ ki ⁇ may be saved by the network side HSS or the MME.
  • the key set ⁇ ki ⁇ can be customized in the user equipment according to the needs of the mobile communication user, and the key set ⁇ ki ⁇ can also be used by the mobile communication user to select a reasonable time to acquire and store in the user equipment; Key collection ⁇ ki ⁇ It can also be updated according to the usage requirements of mobile communication users.
  • the larger the i of the key set ⁇ ki ⁇ the larger the set of keys customized by the user, and the closer the key is used, the closer it is to one time, which improves the security of the system.
  • Step 402 Encrypt the IMSI of the user equipment to generate the ciphertext of the IMSI.
  • an encryption method that can be adopted is to generate a random number R2 and randomly select a key ki corresponding to the positive integer i (the key ki may be a permanent key that belongs to the HSS or the MME. Using the random number R2 and the key K i to perform symmetric key encryption on the IMSI of the user equipment, and encrypting the IMSI of the user equipment to form a ciphertext, such as expressed as E2 ( Ki, IMSI, R2).
  • Step 403 Send a user identity response message including the ciphertext of the IMSI of the user equipment to the network side device.
  • the user identity response message may be expressed as Identity Response E2 (ki, IMSI, R2).
  • the user identity response message may include a random number R2 and a positive integer sequence i used by the network side device to decrypt the ciphertext, and the random number R2 and the positive integer sequence i for decrypting the ciphertext may also be included in other
  • the response message is sent to the network side device through a specific message.
  • An implementation scenario is as follows: a ciphertext containing the IMSI of the user equipment, and a message of a random number R2 and a positive integer i (which can be expressed as: Identity Response E2 (ki, IMSI, R2), R2, i, . . . ) , sent to the device on the network side, determined by the next step:
  • the message may be forwarded ( ⁇ 2 (ki, IMSI, R2), R2, i, ...) to the HSS; after receiving the message, the HSS according to the permanent key saved by i Find ki in set 00, decrypt the IMSI of the user equipment, and then encrypt the IMSI using the pre-obtained KMme-pub, KHSS-pr i to form ciphertext El (IMSI, Mme-pub, KHSS-pr i), the HSS sends the ciphertext El (IMSI, KMme-pub, KHSS-pri) to the MME, and the MME calculates the El using the KMme-pr i, KHSS-pub obtained in advance and obtains the user's IMSI;
  • the (KHSS-pub, KHSS-pr i ) may represent an asymmetric key pair generated by the HSS side, and the (KMme-pub, KMme- pr i ) may represent an asymmetric
  • the MME may also have the function of the HSS provided by this embodiment, that is, ⁇ ki ⁇ is a subset of the permanent key set ⁇ K ⁇ saved by the network side MME, and the MME may be based on the random number R2. And obtaining the key ki according to i in its saved permanent key set 0, decrypting to obtain the IMSI of the user equipment.
  • the IMSI of the user equipment is encrypted to generate ciphertext feedback to the network side device.
  • the technical means of the backup overcomes the problem that the IMSI of the UE existing in the current user identity authentication mechanism is easily resolved, thereby achieving the technical effect of improving the confidentiality of the user identity.
  • FIG. 6 is a network side according to an embodiment of the present invention.
  • a schematic diagram of a device, the network side device 50 includes a second sending unit 501, a second receiving unit 502, and a second processing unit 503.
  • the second sending unit 501 is configured to send a user identity request message to the user equipment, and one purpose of sending the user identity request message is to obtain an IMSI of the user equipment.
  • the second receiving unit 502 is configured to receive a user identity response message from the user equipment. After receiving the user identity request message sent by the second sending unit 501, the user equipment feeds back the user identity corresponding message to the network side device 50, where the user identity response message includes the ciphertext of the international mobile user identity of the user equipment, where the user
  • the ciphertext of the IMSI of the device may be obtained by the user equipment by using a symmetric key encryption (refer to the encryption process of the user equipment to the IMSI disclosed in Embodiment 1): the user equipment generates a random number R2 and randomly selects
  • the positive integer sequence i obtains the corresponding permanent key ki from the key set ⁇ ki ⁇ , and performs symmetric key encryption on the international mobile subscriber identity of the user equipment, and the key set ⁇ ki ⁇ may be saved by the network side device.
  • a subset of the permanent key set 0, such as ⁇ ki ⁇ , may be a subset of the permanent key set 0 stored by the Home Subscr iber Server (HSS), or may be permanently stored by the network side MME.
  • HSS Home Subscr iber Server
  • the user identity response message may be expressed as Identity Response E2 (ki, IMSI, R2), and the random number R2 and the positive integer provided to the device on the network side for decrypting the ciphertext of the user equipment IMSI.
  • the i may be included in the user identity response message, or may be sent to the network side device by using another response message or by a specific message, where the network side of the ciphertext of the user equipment IMSI is decrypted.
  • the device may be the home network server HSS, or may be the network side device 50 itself, such as the MME, that is, after the MME receives the user identity response message fed back by the user equipment, the second processing unit 503 may use the user identity.
  • the ciphertext of the user equipment IMSI is decrypted by R2 and i in the response message, and the IMSI of the user equipment is obtained.
  • the second sending unit 501 is further configured to forward the user identity response message from the user equipment received by the second receiving unit 502 to the home network server HSS.
  • the second receiving unit 502 is further configured to receive an international mobile subscriber identity from the user equipment that is encrypted by the home subscriber server.
  • the second processing unit 503 may be configured to decrypt the ciphertext of the IMSI from the user equipment of the home subscriber server that is received by the second receiving unit, to obtain an international mobile subscriber identity of the user equipment;
  • the mobile management entity may be a mobile management entity, and then the second processing unit 503 performs a specific decryption process, such as: the second processing unit 503 is configured according to the mobile management entity private key and the attribution obtained in advance.
  • the user server public key decryption obtains the international mobile subscriber identity of the user equipment.
  • the network side device 50 may further include a first authentication unit 504 and a second storage unit 505.
  • the first authentication unit 504 is configured to enable the network side device 50 to obtain identity authentication of other devices on the network side, such as obtaining the network side device HSS, before the second sending unit 501 sends the user identity request message to the user equipment. Certification.
  • the first authentication unit 504 may further include: a first authentication receiving unit 5041, as shown in FIG.
  • the first authentication processing unit 5042 is configured by the first authentication sending unit 5043.
  • the authentication receiving unit 5041 is configured to receive an authentication request message from a home subscriber server, where the authentication request message includes a home subscriber server public key and a random number R1, and the received home subscriber server public key and or random
  • the number R1 may be saved in the second storage unit 505;
  • the first authentication processing unit 5042 can be configured to generate an asymmetric key pair after the first authentication receiving unit 5041 receives the authentication request message from the home subscriber server, for example, when the network side device 50 is
  • the MME generates a mobility management entity public key and a mobility management entity private key
  • the first authentication processing unit 5042 uses the home subscriber server public key, the random number R1, and the mobile received by the first authentication receiving unit 5041.
  • the mobility management entity of the management entity identifies the ciphertext that generates the identity of the mobility management entity.
  • the mobility management entity public key and the mobility management entity private key generated by the first authentication processing unit 5042 may be stored in the second storage unit 505;
  • the first acknowledgment unit 5043 is configured to send the ciphertext identified by the mobility management entity and the mobility management entity public key to the home subscriber server.
  • the network side device 50 disclosed in the embodiment of the present invention is implemented by each physical/logical module independently set in the network side device 50, and the foregoing modules may all or part of the same physical/logical entity.
  • the functions of the three modules in the first authentication unit 504, such as the first authentication receiving unit 5041, the first authentication processing unit 5042, and the first authentication sending unit 5043, may also be implemented in the network side device 50.
  • the second receiving unit 502, the second sending unit 501 and the second processing unit 503 are implemented.
  • the function of the first authentication receiving unit 5041 can be implemented by the second receiving unit 502
  • the function of the first authentication sending unit 5043 can be implemented by the second The sending unit 501 is implemented, and so on.
  • Another embodiment of the present invention with reference to the implementation of the network side device 50 disclosed in the embodiment of the present invention, is adapted to the network side device 50, and the embodiment of the present invention further provides a method for transmitting user identity information. As shown in FIG. 8, the method includes:
  • Step 801 Send a user identity request message to the user equipment.
  • the network side device such as the MME
  • a method for the MME to obtain the identity authentication of the HSS such as: Figure E receives an authentication request from the HSS.
  • the authentication request message includes a preset home subscriber server public key and a random number R1; After requesting the message, the MME saves the home subscriber server public key to generate an asymmetric key pair: a mobility management entity public key and a mobility management entity private key, and then uses the home subscriber server public key, the random number R1, and The mobility management entity of the mobility management entity identifies the ciphertext of the mobility management entity identifier, and sends the ciphertext that encrypts the mobility management entity identifier and the mobility management entity public key to the home subscriber server
  • the MME saves the home subscriber server public key to generate an asymmetric key pair: a mobility management entity public key and a mobility management entity private key, and then uses the home subscriber server public key, the random number R1, and
  • the mobility management entity of the mobility management entity identifies the ciphertext of the mobility management entity identifier, and sends the ciphertext that encrypts the mobility management entity identifier and the mobility management entity public key to
  • Step 802 Receive a user identity response message from the user equipment, where the user identity response message includes a ciphertext of an international mobile subscriber identity of the user equipment.
  • the ciphertext of the received international mobile subscriber identity of the user equipment may be obtained by the user equipment by using a symmetric key encryption, and the user equipment obtains a corresponding permanent secret by generating a random number R2 and randomly selecting the positive integer sequence i.
  • the permanent key set ⁇ ki ⁇ stored by the user equipment end is a subset of the permanent key set 0 of the home subscriber server, i is a sequence of positive integers, and the permanent key set ⁇ ki ⁇ saved by the user equipment side may also be a subset of the key set 0 stored in the MME; the received user identity response message of the user equipment Also included is the random number R2 and the positive integer sequence i for decrypting the ciphertext.
  • Step 803 Decrypt a ciphertext of the international mobile subscriber identity of the user equipment, and obtain an international mobile subscriber identity of the user equipment.
  • the permanent key set ⁇ ki ⁇ saved by the user equipment end is a subset of the key set 0 stored in the garden E.
  • the network side device decrypts the ciphertext of the international mobile subscriber identity of the user equipment, and obtains the international mobile subscriber identity of the user equipment, and the network side device is the MME, the MME receives the user identity response fed back by the user equipment. After the message, the ciphertext of the user equipment IMSI is decrypted by using R2 and i in the user identity response message, and the IMSI of the user equipment is obtained.
  • An implementation manner is as follows: the permanent key set ⁇ ki ⁇ saved by the user equipment end is a subset of the key set ⁇ K ⁇ stored in the HSS.
  • the network side device may forward the user identity response message from the user equipment to the home network server HSS, and after receiving the message, the HSS according to i Finding ki in its saved permanent key set 0, decrypting the IMSI of the user equipment, and then encrypting the IMSI using a preset KMme-pub, KHSS-pr i to form a ciphertext El (IMSI, Mme-pub, KHSS-pr i), the HSS sends the ciphertext El (IMSI, KMme-pub, KHSS- pr i) to the MME, and the E is further encrypted by the IMSI from the user equipment of the home subscriber server.
  • the file is decrypted, and the international mobile subscriber identity of the user equipment is obtained according to the previously obtained mobility management entity private key and the home subscriber server public key decryption.
  • the (KHSS-pub, KHSS-pr i ) may represent an asymmetric key pair generated by the HSS end, and the (Dime- pub, KMme- pr i ) may represent an asymmetric key generated by the MME side. Correct.
  • the method for encrypting the IMSI of the user equipment to generate the ciphertext transmission to the network side device is adopted, which overcomes the problem that the IMSI of the UE existing in the current user identity authentication mechanism is easily parsed;
  • the technical effect of the confidentiality of the user identity information transmission is further enhanced by performing identity authentication on the network side device such as the MME.
  • FIG. 9 A user equipment 20 and a network side device 50 disclosed in the foregoing embodiments are applicable.
  • a network side device 90 is provided in the embodiment of the present invention, and FIG. 9 is a network side device 90.
  • the network side device 90 includes a third sending unit 901, a third receiving unit 902, and a third processing unit 903, where:
  • a third receiving unit 902 configured to receive a user identity response message from a user equipment of another network side device, such as a mobility management entity, where the user identity response message of the user equipment includes a ciphertext of the international mobile subscriber identity of the user equipment,
  • the user identity response message is forwarded by the mobility management entity to the network side device, and the user identity response message may further include a random number R2 and a positive integer sequence i, where the random number R2 and the positive integer sequence i are used to encrypt the user equipment side.
  • the international mobile subscriber identity of the user equipment, the random number R2 and the positive integer sequence i may also be used to decrypt the international mobile subscriber identity of the user equipment on the network device side.
  • the user equipment stores a permanent key set ⁇ ki ⁇ , which is a subset of the persistent key set ⁇ 10 stored by the network side device 90, such as the home subscriber server, and the i is a positive integer sequence.
  • the third processing unit 903 is configured to decrypt the ciphertext of the international mobile subscriber identity of the user equipment received by the third receiving unit 902, and obtain the international mobile subscriber identity of the user equipment, where the third processing unit 903 can be configured according to The random number R2 and the positive integer sequence received by the third receiving unit 90 2 decrypt the international mobile subscriber identity ciphertext including the user equipment; when the network side device 90 is a home subscriber server, The third processing unit 903 is further configured to encrypt the international mobile subscriber identity of the user equipment by using a preset mobility management entity public key and a home subscriber server private key.
  • a third sending unit 901 configured to encrypt, by using the previously obtained mobile management entity public key and a home user server private key, the international mobile user identifier of the user equipment to generate the international
  • the ciphertext of the mobile subscriber identity is sent to the other network side device, such as the mobility management entity, and the ciphertext of the international mobile subscriber identity of the user equipment is decrypted by the other network side device to obtain the ciphertext of the user equipment.
  • IMSI the other network side device
  • the network side device 90 may further include a third storage unit 904, configured to store the pre-acquired mobility management entity public key and the home subscriber server private key, and may also be used to store the permanent key set 00.
  • the network side device 90 may further include a second authentication unit 905, where the second authentication unit 905 may be configured to receive the mobility management entity at the third receiving unit 902. Before the user identity response message of the forwarded user equipment, identity authentication is performed to other devices on the network side, such as the mobility management entity.
  • the second authentication unit 905 may further include: a second authentication sending unit 9051, a second authentication processing unit 9052, and a second authentication receiving unit. 9053.
  • the second authentication processing unit 9052 can be configured to generate an asymmetric key pair: a home subscriber server public key and a home subscriber server private key, and also generate a random number R1.
  • the home subscriber server public key and the home subscriber server private key may be stored in the third storage unit 904.
  • the second authentication sending unit 9051 is configured to send an authentication request message to another network side device, such as a mobility management entity, where the authentication request message includes a home user server public key generated by the second authentication processing unit 9052 and the random Number Rl.
  • the second authentication receiving unit 9053 is configured to receive the ciphertext and the mobility management entity public key from the mobility management entity identifier fed back by other network side devices, such as the mobility management entity.
  • the mobile management entity public key received by the second authentication receiving unit 9053 may be saved in the third storage unit 904.
  • the MME When the other network side device is an MME, the MME generates a ciphertext of the mobility management entity identifier by using a home subscriber server public key, a random number R1, and a mobility management entity identifier of the mobility management entity, and The ciphertext of the mobility management entity identifier and the mobility management entity public key are sent to the second authentication receiving unit 9053.
  • the second authentication processing unit 9052 is further configured to receive according to the second authentication receiving unit 9053. Determining the ciphertext of the mobility management entity, obtaining the mobility management entity identifier (such as decrypting the ciphertext of the mobility management entity by using the home subscriber server public key, the random number R1), and the home subscriber server The saved mobility management entity identifier is compared to verify the validity of the mobility management entity, and the mobile management entity public key is saved by the verification, and the mobility management entity public Hu can be saved in the third storage unit 904.
  • the third storage unit 9 (M may also save a mobile management entity identification list.
  • the network side device embodiment of the present invention overcomes the current user identity authentication mechanism by using the technical means of performing identity authentication (optional) on the network side device, such as the MME, and then encrypting and transmitting the international mobile user identity of the user equipment.
  • the IMSI is easily resolved, and the technical effect of improving the confidentiality of the user identity information transmission is achieved.
  • the embodiment of the present invention further provides a A method for transmitting user identity information, as shown in FIG. 12, the method includes:
  • Step 1001 Receive a user identity response message of the user equipment forwarded by the mobility management entity, where the user identity response message includes a ciphertext of the international mobile subscriber identity of the user equipment.
  • the mobile management entity on the network side may also be authenticated: Generate an asymmetric key pair: Home subscriber The server public key and the home subscriber server private key, and also generate a random number R1, and send an authentication request message to the mobility management entity, where the authentication request message includes the home subscriber server public key and the random number R1; After the mobility management entity sends the authentication request message, the mobility management entity generates the ciphertext of the mobility management entity identifier by using the home subscriber server public key, the random number R1, and the mobility management entity identifier of the mobility management entity, The mobile management entity feeds back, to the home subscriber server, a message including the ciphertext of the mobility management entity identifier and the mobility management entity public key; the home subscriber server obtains the mobility management entity identifier according to the ciphertext identified by the mobility management entity (if used) Home user server
  • Step 1002 Decrypt the ciphertext to obtain an international mobile subscriber identity of the user equipment.
  • the ciphertext of the international mobile subscriber identity of the user equipment included in the user identity response message of the user equipment forwarded by the network side device, such as the MME, may be obtained by the user equipment end by using symmetric key encryption, as described above.
  • the user equipment performs symmetric key encryption on the international mobile subscriber identity of the user equipment by generating a random number R2 and randomly selecting the positive integer sequence i to obtain a corresponding permanent key ki; wherein, the user equipment side saves the permanent
  • the key set ⁇ ki ⁇ is a subset of the permanent key set 0 saved by the home user server, i is a positive integer sequence; the permanent key set ⁇ ki ⁇ saved by the user equipment side may also be a permanent saved by the MME.
  • the received user identity response message of the user equipment may further include the random number R2 and the positive integer sequence i for decrypting the ciphertext; after receiving the user identity response message, according to the The random number R2 and the positive integer sequence [corresponding permanent key ki] decrypt the international mobile subscriber identity of the user equipment.
  • Step 1003 Send the international mobile subscriber identity of the user equipment obtained by decrypting the ciphertext to the mobility management entity.
  • the international mobile subscriber identity of the user equipment may be encrypted by using the mobility management entity public key and the home subscriber server private key, and then sent to the mobility management entity.
  • the embodiment of the present invention overcomes the IMSI of the UE existing in the current user identity authentication mechanism because it adopts the technical means of performing identity authentication (optional) on the network side device, such as the MME, and then encrypting and transmitting the international mobile subscriber identity of the user equipment.
  • Embodiment 4 :
  • FIG. 13 a schematic diagram of a communication system for user identity information transmission according to an embodiment of the present invention, where the system includes a user
  • the device 20, the mobility management entity 50, and the home subscriber server 90 are described as an example, where:
  • User equipment 20 configured to receive a user identity request message from the mobility management entity 50; encrypt an international mobile user identity of the user device 60 to generate a ciphertext; and send the mobile mobile entity identity to the mobile management entity 50 User identity response message for ciphertext.
  • a mobile management entity 50 configured to send a user identity request message to the user equipment 20; the mobility management entity 50 receives a user identity response message from the user equipment 20, where the user identity response message includes the user equipment The ciphertext of the international mobile subscriber identity of 20, the mobility management entity 50 forwards the user identity response message to the home subscriber server 90;
  • the home subscriber server 90 is configured to receive a user identity response message from the user equipment 20 forwarded by the mobility management entity 50, where the user identity response message includes a ciphertext of the international mobile subscriber identity of the user equipment 20;
  • the server 90 decrypts the ciphertext to obtain the international mobile subscriber identity of the user equipment 20;
  • the international mobile subscriber identity of the user equipment 20 obtained by decrypting the ciphertext is encrypted and then sent to the mobility management entity 50.
  • the home subscriber server 90 is further configured to authenticate the mobility management entity 50 before the mobility management entity 50 sends the user identity request message to the user equipment 20.
  • the system embodiment of the present invention overcomes the problem that the IMSI of the UE existing in the current user identity authentication mechanism is easily parsed by using the technical means of encrypting the international mobile subscriber identity of the user equipment to generate the ciphertext feedback to the network side device.
  • the problem of low confidentiality of the currently existing user identity is solved, and the security of the user identity transmission is further enhanced by first authenticating the home subscriber server.
  • FIG. 14 is an example of a method for transmitting user identity information according to an embodiment of the present invention.
  • K is represented as a permanent key
  • K pri is represented as a private key
  • K pub is represented as a public key
  • E1 0 is represented as a public key encryption algorithm
  • D1 0 is represented as a public key decryption algorithm
  • E2 () is represented as a symmetric key encryption algorithm
  • D2 () is represented as a symmetric key decryption algorithm
  • C is represented as ciphertext
  • M is expressed as plaintext .
  • the plaintext M is encrypted with the public key K pub as:
  • decryption with the corresponding private key K p can be expressed as:
  • the ciphertext C can be restored to M by the private key K P and the decryption algorithm D1 0 by encrypting the plaintext M into the ciphertext C by the public key and the encryption algorithm E1 0.
  • the public key and the private key exist in pairs. If the public key is used for encryption, it must be decrypted with the corresponding private key. This process can generally be used for authentication authentication. Similarly, when using private key encryption, it needs to be decrypted with the corresponding public key. This process is generally available for digital signatures.
  • the operator can use IP-based security mechanisms to ensure security between the MME and the HSS.
  • IP-based security mechanisms to further improve security, such as preventing MME spoofing (ie, failing to pass HSS authentication).
  • the existing security mechanism is based.
  • each time a user identity request is made the asymmetric key pair is replaced, so that the last used asymmetric key pair is different from the next used asymmetric key pair.
  • This embodiment assumes that the HSS is legal, and the MME and the UE have potential threats in some cases.
  • the MME needs to steal the UE-related information, it will impersonate the legal MME and send an IMSI request message to the UE, thereby causing adverse consequences. , for example:
  • the fake SP or the SP itself is a malicious SP that provides the user with services that the user does not need. This threat exists when there is a lack of authentication at the application layer for the user. This threat exists for all users.
  • the permanent key K of the UE is stored on the USIM card, and the same permanent key K exists on the HSS.
  • the ⁇ on the USIM card can be from the HSS when the USIM card is shipped.
  • the UE's permanent key can be a set ⁇ ki ⁇ , and ⁇ ki ⁇ is a subset of the HSS-side permanent key set 0; the permanent key set between different UEs ⁇ ki ⁇ can be repeated, but since the method of randomly selecting a permanent key is adopted, the probability of permanent key repetition is actually small, and therefore, the management and storage burden on the permanent key set ⁇ K ⁇ at the HSS side does not increase, Where i>0; i is larger, the larger the set of permanent keys customized by the user, the closer to one secret each time the key is used.
  • An application example of the present invention requires the HSS to authenticate the identity of the MME while exchanging public keys.
  • the method includes:
  • step 1101 the HSS generates an asymmetric key pair (Kong ss-pub , KHSS-Pli ) and generates a random number R1.
  • Step 1102 The HSS sends a message (Kong ss — pub , Rl ) to the MME by means of a message.
  • step 1104 the MME sends a response (El (Kêt ss - pub , MMEI, Rl), K Mme-pub ) to the HSS.
  • the HSS determines whether the MME is legal.
  • the HSS stores the unique identifier MMEI of the MME.
  • the HSS calculates the MMEI according to the El (K details ss-pub) MMEI, R1) sent by the MME, and the MMEI saved with the HSS end.
  • the comparison verifies the validity of the MME, and the verification passes the K TE-PUB of the MME.
  • the HSS end stores (K, KHSS- ⁇ ⁇
  • Step 1106 When the MME needs to obtain the IMSI of the UE at a certain moment, the MME initiates an Identity Request message to the UE.
  • Step 1107 After receiving the Identity Request message, the UE generates a random number R2, randomly selects the permanent key ki corresponding to the positive integer sequence i, and obtains E2 (ki, IMSI, R2) for the IMSI encryption protection.
  • Step 1108 The UE sends a User Identity Response (E2(ki, IMSI, R2), R2, i) to the MME.
  • E2(ki, IMSI, R2), R2, i) a User Identity Response
  • step 1109 the MME forwards the Identity Response (E2 (ki, IMSI, R2), R2, i) to the HSS, where only some of the cells of the Identity Response message are listed in parentheses.
  • Step 1110 After receiving the Identity Response (E2 (ki, IMSI, R2), R2, i), the HSS decrypts the IMSI according to i finding ki in ⁇ K ⁇ .
  • Step 1111 After the HSS obtains the IMSI, the ciphertext El (IMSI, Uêt ss-pri ) is generated, and a Response (El (IMSI, K M — , K mecanic ss-pri )) is sent to the hall.
  • IMSI ciphertext El
  • El IMSI, K M — , K mecanic ss-pri
  • the MME calculates the IMSI according to K Consuming e — pri , K linen ss — pub .
  • Step 1113 Optionally, repeat steps 1101-1105, and the HSS and the MME are keys related to the next user identity authentication negotiation.
  • the mechanism uses the HSS to authenticate the MME first, and solves the problem that the MME may be faked.
  • the public key is exchanged, and symmetric encryption is further used.
  • the dual mechanism of asymmetric encryption protects the IMSI, further improving the security of user authentication; the permanent key can be randomly selected at the UE end, so that the effect of one time and one secret can be approximated, and the security is improved;
  • a permanent key set ⁇ ki ⁇ is stored according to user requirements, and ⁇ ki ⁇ is a subset of the HSS-side permanent key set 00, where i>0;
  • the security level of the USIM card the user can also increase the security capability of the USIM card, thereby improving the purchasing power.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

用户身份信息传输的方法、 用户设备、 网络侧设备及系统
本申请要求于 2010年 09月 01 日提交中国专利局、 申请号为 201010268963.1、 发 明名称为"用户身份信息传输的方法、 用户设备、 网络侧设备及系统"的中国专利申请的 优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明涉及无线通信领域, 尤其涉及一种用户身份信息传输方法、 用户设备、 网 络侧设备及系统。 背景技术
三代合作伙伴计划(Third Generation Partnership Project, 3GPP )正在研究一种全新 的演进网络架构以满足未来移动网络的应用需求, 包括系统架构演进 (System Architecture Evolvement, SAE )和接入网的长期演进 ( Long Time Evolvement, LTE ) , 网络演进的目标是希望提供一种低时延、 高数据速率、 高系统容量和覆盖、 低成本、 完 全基于 IP的网络。
LTE无线接入网使用正交频分复用 (Orthogonal Frequency Division Multiplexing, OFDM )技术以及多输入多输出 ( Multiple Input Multiple Output, MIMO )技术, 支持频 分双工( Frequency Division Duplex, FDD )和时分双工( Time Division Duplex, TDD ) 。
LTE也被俗称为 3.9G.无线通信系统。
图 1 为现有技术中演进网络架构的示意图, 该网络架构中包括用户设备(User Equipment, UE )、演进陆地无线接入网( Evolved UMTS Territorial Radio Access Network, E-UTRAN )和演进分组核心( Evolved Packet Core, EPC )。 E-UTRAN由演进基站( Evolved Node B, eNodeB )组成, eNodeB之间通过 X2接口连接, UE和 eNodeB之间通过 LTE-Uu 口连接。 EPC中包括: 移动管理实体(Mobility Management Entity, MME )、 服务 SAE 网关( Serving SAE Gateway )等。 其中, MME负责控制面的移动性管理, 包括用户上 下文和移动状态管理、分配用户临时身份标识等,与 E-UTRAN通过 S1-MME接口连接, 与服务 SAE 网关通过 S1-U接口连接; 图 2所示系统还包括归属网络服务器(Home Subscriber Server, HSS ) , 所述 HSS与 MME通过 S6a接口连接。
在现有网络安全机制中, MME通常需要对用户设备( User Equipment, UE )的用 户身份进行识别。 当 MME不能通过全球唯一临时标识( Globally Unique Temporary ID, GUTI )识别用户设备的移动设备 /通用用户标识模块( Mobile Equipment, ME I UMTS Subscriber Identity Module, USIM )时, 或者当 MME发现了一个未知的接入用户时, MME会发起对此用户的身份信息的请求流程, 通常 MME请求用户身份的目的是为了 获得所述用户设备的国际移动用户标识( International Mobile Subscriber Identity, IMSI ) , IMSI通常唯一标识一个用户设备, 可独立地识别一个签约用户。 在本发明创造过程中, 发明人发现, 在现有 MME发起的对用户身份信息的请求流程 过程中, IMS I包含在 UE反馈给 MME的用户身份相应消息中且以明文的形式存在, 因此 用户的 IMSI很容易被解析出来, 安全性很低。 由于安全性低, 带来的不良后果比如, 一旦被恶意者知道了 UE的 IMSI , 就可以对该 UE的用户进行追踪等非法操作。 发明内容
本发明实施例的目的是为了解决目前用户身份认证机制存在的 UE的 IMSI极易被 解析出来的而导致的安全性不高的问题,
本发明实施例提供了一种用户身份信息传输方法, 所述方法包括: 接收来自于移 动管理实体的用户身份请求消息; 将用户设备的国际移动用户标识进行加密以生成密 文; 向所述移动管理实体发送包括所述国际移动用户标识密文的用户身份响应消息。
本发明实施例还提供了一种用户设备, 所述用户设备包括:
第一接收单元、 第一处理单元、 第一发送单元; 所述第一接收单元, 用于接收来 自于移动管理实体的用户身份请求消息; 所述第一处理单元, 用于在所述第一接收单元 接收到来自于网络侧设备的用户身份请求消息后,将所述用户设备的国际移动用户标识 进行加密, 生成所述用户设备的国际移动用户标识的密文; 所述第一发送单元, 用于向 所述移动管理实体发送包括所述第一处理单元生成的所述包含所述用户设备的国际移 动用户标识的密文的用户身份响应消息。
本发明实施例还提供了一种用户身份信息传输方法, 所述方法包括:
向用户设备发送用户身份请求消息; 接收来自于所述用户设备的用户身份响应 消息, 所述用户身份响应消息包括所述用户设备的国际移动用户标识的密文; 解密所述 用户设备的国际移动用户标识的密文, 获得所述用户设备的国际移动用户标识。
本发明实施例还提供了一种网络侧设备, 所述网络侧设备包括:
第二发送单元、 第二接收单元和第二处理单元, 其中: 所述第二发送单元, 用于 向用户设备发送用户身份请求消息; 所述第二接收单元, 用于接收来自于所迷用户设备 的用户身份响应消息,所述用户身份响应消息包括所述用户设备的国际移动用户标识的 密文; 所述第二处理单元, 用于解密用户设备的国际移动用户标识的密文, 获得所述用 户设备的国际移动用户标识。
本发明实施例还提供了一种网络侧设备, 所述网络侧设备包括:
第三接收单元、 第三发送单元和第三处理单元; 所述第三接收单元, 用于接收来 自于移动管理实体转发的用户设备的用户身份响应消息, 所述用户身份响应消息包括所 述用户设备的国际移动用户标识的密文; 所述第三处理单元, 用于解密所述第三接收单 接收到的所述用户设备的国际移动用户标识的密文,获得所述用户设备的国际移动用户 标识,还使用预先获得的移动管理实体公钥和归属用户服务器私钥对所述用户设备的国 际移动用户标识进行加密生成所述用户设备的国际移动用户标识的密文; 所述第三发送 单元,用于将所述第三处理单元生成的所述用户设备的国际移动用户标识的密文发送给 移动管理实体。
本发明实施例还提供了一种用户身份信息传输系统, 所述系统包括:
上述本发明实施例所揭示的任一用户设备, 和或, 上述本发明实施例所揭示的任 一网络侧设备。 通过实施本发明上述实施例所揭示的技术方案,克服了目前用户身份认证机制存在 的 UE的 IMSI极易被解析出来的问题,进而达到提高解决用户身份认证机制的安全性的 技术效果。 附图说明
此处所说明的附图用来提供对本发明实施例的进一步理解, 构成本申请的一部分, 并不构成对本发明的限定。 在附图中:
图 1为现有技术中演进网络架构的示意图;
图 2为现有技术中 MME对 UE的用户身份请求流程示意图;
图 3为本发明实施例提供的一种用户设备结构示意图;
图 4为本发明实施例提供的另一种用户设备结构示意图;
图 5为本发明实施例提供的一种传输用户身份信息的方法示意图;
图 6为本发明实施例提供的一种网络侧设备的示意图;
图 7为本发明实施例提供的一种网络侧设备的示意图;
图 8为本发明实施例提供的一种传输用户身份信息的方法流程示意图;
图 9为本发明实施例提供的一种网络侧设备的示意图; 图 10为本发明实施例提供的一种网络侧设备的示意图;
图 11为本发明实施例提供的一种网络侧设备的示意图;
图 12为本发明实施例提供的一种传输用户身份信息的方法流程示意图; 图 13为本发明实施例提供的一种用于用户身份信息传输的通信系统示意图; 图 14为本发明提供的一种用户身份信息传输方法实例示意图。 具体实施方式
如图 2所示, 图 2为现有技术中 MME对 UE发起用户身份请求流程的示意图, 包括 如下步骤:
步骤 101, MME向 UE发送用户身份请求(Ident i ty Reques t )消息, 以获得所述
UE的腦;
步骤 102 , UE收到 MME发来的用户身份请求 ( Ident i ty Reques t )消息后, 向 MME 反馈包含所述 UE的 IMSI的用户身份响应 ( Ident i ty Response )消息。
为便于理解本发明实施例,对本发明实施例涉及的两种加密算法进行介绍:对称加 密算法和非对称加密算法。
对称密码算法, 就是加密密钥能够从解密密钥中推算出来, 反过来也成立。在大多 数对称算法中, 加密解密密钥是相同的。 这些算法也叫秘密密钥算法或单密钥算法, 它 要求发送者和接收者在安全通信之前, 商定一个密钥。 对称算法的安全性依赖于密钥, 泄漏密钥就意味着任何人都能对消息进行力。密解密。
非对称加密算法, 也叫公开密钥算法, 一般需要两个密钥: 加密密钥和解密密钥。 加密密钥也叫^ (故公开密钥 (Publ ic- Key , 简称公钥) , 解密密钥也叫做私有密钥 ( Pr ivate-Key, 简称私钥) 。 公开密钥与私有密钥是一对, 如果用公开密钥对数据进 行加密, 只有用对应的私有密钥才能解密; 如果用私有密钥对数据进行加密, 那么只有 用对应的公开密钥才能解密。 因为加密和解密使用的是两个不同的密钥, 所以这种算法 叫作非对称加密算法,一般在假定的合理长时间内, 解密密钥不能根据加密密钥计算出 来, 之所以叫做公开密钥算法, 是因为加密密钥能够公开, 即陌生者能够用加密密钥加 密信息, 但只有用相应的解密密钥才能解密信息。
基于背景技术, 为使本发明实施例的目的、技术方案和有益效果更加清楚明白, 下 面结合实施方式和附图, 对本发明做进一步详细说明。 在此, 本发明的示意性实施方式 及其说明可用于理解和解释本发明, 但并不作为对本发明的限定。 实施例一:
本发明实施例的一方面, 如图 3所示一种用户设备(UE )的结构示意图, 所述用户 设备 20, 包括第一接收单元 201、 第一处理单元 202、 第一发送单元 203, 其中: 第一 接收单元 201, 用于接收来自于网络側设备如移动管理实体的用户身份请求消息, 所述 用户身份请求消息的一种表达为 Ident i ty Reques t 消息, 所述用户身份请求消息的一 个目的是获得所述用户设备的 IMSI ; 所述第一处理单元 202 , 用于将所述用户设备的 IMSI进行加密,生成所述用户设备的国际移动用户标识的密文;所述第一发送单元 203, 用于向网络侧设备发送包含所述第一处理单元 202加密生成的所述用户设备的 IMSI的 密文的用户身份响应消息。
参考图 3所示意的用户设备, 图 4所示为本发明实施例揭示的另一种用户设备 20 的结构示意图, 所述用户设备 20, 包括第一接收单元 201、 第一处理单元 202和第一发 送单元 203 , 还包括: 第一存储单元 204, 用于在所述第一接收单元接收到来自于网络 侧设备如移动管理实体的用户身份请求消息之前,存储密钥集合 {ki}, i为正整数序列。 所述密钥集合 {k i}可以是网络侧设备保存的永久密钥集合 {K}的一个子集, 如 {ki}可以 是网络侧归属用户服务器 ( Home Subscr iber Server , HSS )保存的永久密钥集合 {K}的 一个子集, {k i}也可以是网络侧 ΜΜΕ保存的永久密钥集合 }的一个子集。 所述密钥集 合 {ki}可以根据移动通信用户的需求定制在所述用户设备中,如保存在所述第一存储单 元 204中, 所述密钥集合 {k i}也可以移动通信用户的需要, 选择合理的时机获取, 存储 在所述用户设备的第一存储单元 204中; 所述密钥集合 {ki}也可以 居移动通信用户的 使用需求更新。 一般来说, 密钥集合 {ki}的 i越大, 意味着用户定制的密钥集合越大, 当随机选取密钥使用时, 就越接近一次一密, 提高了系统的安全性。
参考图 3或者图 4所示意的用户设备, 所述第一处理单元 202 , 进一步用于生成随 机数 R2, 并随机选择所述正整数 i对应的一个密钥 ki , 所述密钥 ki属于 HSS或 MME保 存的永久密钥集合 的范围; 所述第一处理单元 202使用所述随机数 R2和密钥 Ki ,对 用户设备的 IMSI进行对称密钥加密,如表达成 E2 (k i, IMSI, R2) ;所述第一发送单元 203, 进一步用于发送包括所述用户设备的 IMSI 的密文的用户身份响应消息, 所述用户身份 响应消息可以表达成 Ident i ty Response E2 (ki , IMSI. R2)。 所述提供给网络侧设备用于 解密所述密文的所述随机数 R2和所述正整数 i可以包含在所述用户身份响应消息中, 也可以通过包含在其他的响应消息或者通过特定的消息发给网络侧设备。
一种实施场景如, 所述第一发送单元 203把包含所述用户设备的 IMSI的密文, 以 及随机数 R2 和正整数 i 的 消 息 ( 可以表达为 : Identity Response E2(ki, IMSI,R2),R2, i,... ) , 发送给网络侧的设备如 MME, 由 MME确定下一步处理:
MME收到所述消息后, MME可以转发所述消息 (E2 (ki, IMSI, R2), R2, i,…)到 HSS; HSS收到所述消息后, 根据 i在其保存的永久密钥集合 {K}中找到 k i, 解密出所述用户 设备的 IMSI, 然后再使用预先获得的 KMme- pub, KHSS-pri对所述 IMSI进行加密, 形成 密文 El (IMSI, KMme- pub, KHSS-pri), HSS将所述密文 El (IMSI, KMme- pub, KHSS- pri)发给 MME, MME使用预先获得的 KMme- pri, KHSS- pub对所述 El进行计算并获得所述用户的 IMSI; 所述(KHSS- pub, KHSS- pri )可以表示是由 HSS 端生成的非对称密钥对, 所述 ( KMme- pub, KMme- pri )可以表示是由 MME端生成的非对称密钥对。
在 MME端和或 HSS端, 生成非对称密钥对很容易,选择一种现有技术中普遍使用的 公钥算法, 如采用 RSA (Rivest Shamir Adleman)算法, 即可得到 ( Kpub, Kpri ) 。
在另一个实施场景中, MME也可以具备本实施例所提供的 HSS的功能, 即 {ki}是网 络侧 M E保存的永久密钥集合 {K}的一个子集, MME可以根据随机数 R2, 以及根据 i在 其保存的永久密钥集合 {10中找到密钥 ki, 解密出所述用户设备的 IMSI。
以上本发明实施例揭示的用户设备中,所述第一接收单元 201、第一处理单元 202、 发送单元 203, 以及存储单元 204的功能实现,可以通过用户设备中各独立设置的物理 / 逻辑模块实现; 上述各模块也可以全部或者部分通过同一个物理 /逻辑实体来实现, 比 如, 上述全部或者部分模块通过用户设备中设置的 ME/USIM来实现。
本发明用户设备实施例采用将用户设备的 IMSI进行加密以生成密文反馈给网络侧 设备的技术手段,克服了目前用户身份认证机制存在的 UE的 IMSI极易被解析出来的问 题, 进而达到了提高用户身份机密性的技术效果。
本发明实施例的另一方面,参考本发明实施例所揭示的用户设备, 与所述用户设备 相适应, 本发明实施例还提供了一种传输用户身份信息的方法, 如图 5所示, 所述方法 包括:
步骤 401, 接收来自于网络侧设备的用户身份请求消息。
所述用户身份请求消息的一种表达为 Identity Request消息。 在步骤 401之前, 所述传输用户身份信息的方法还可以包括: 存储密钥集合 {ki}, 所述 i为正整数序列, 所述密钥集合 {ki}可以是网络侧 HSS或 MME保存的永久密钥集合 {K}的一个子集。 所述 密钥集合 {ki}可以根据移动通信用户的需求定制在用户设备中,所述密钥集合 {ki}也可 以移动通信用户的需要, 选择合理的时机获取, 存储在用户设备中; 所述密钥集合 {ki} 也可以根据移动通信用户的使用需求更新。 一般来说, 密钥集合 {ki}的 i越大, 意味着 用户定制的密钥集合越大, 当随机选取密钥使用时, 就越接近一次一密, 提高了系统的 安全性。
步骤 402, 将所述用户设备的 IMSI进行加密, 生成所述 IMSI的密文。
在本步骤中, 可以采用的一种加密方式是通过生成随机数 R2 , 并随机选择所述正 整数 i对应的一个密钥 k i(所述密钥 ki可以是属于 HSS或 MME保存的永久密钥集合 {K} 的子集); 使用所述随机数 R2和密钥 K i , 对用户设备的 IMSI进行对称密钥加密, 对所 述用户设备的 IMSI进行加密形成密文, 如表达成 E2 (k i , IMSI,R2)。
步骤 403, 向网络侧设备发送包括所述用户设备的 IMSI的密文的用户身份响应消 息。
所述用户身份响应消息可以表达成 Ident i ty Response E2 (ki, IMSI, R2)。 用户身 份响应消息可以包括所述网络侧设备用于解密所述密文的随机数 R2和正整数序列 i,所 述用于解密所述密文的随机数 R2和正整数序列 i也可以通过包含在其他的响应消息或 者通过特定的消息发给网络侧设备。
一种实施场景如, 把包含所述用户设备的 IMSI的密文, 以及随机数 R2和正整数 i 的消息 (可以表达为: Ident i ty Response E2 (ki , IMSI , R2) , R2, i , . . . ) , 发送给网络 侧的设备 ΜΜΕ, 由 ΜΜΕ确定下一步处理:
ΜΜΕ收到所述消息后, ΜΜΕ可以转发所述消息 (Ε2 (ki, IMSI, R2) , R2, i,…)到 HSS; HSS收到所述消息后, 根据 i在其保存的永久密钥集合 00中找到 ki, 解密出所述用户 设备的 IMSI , 然后再使用预先获得的 KMme-pub, KHSS-pr i对所述 IMSI进行加密, 形成 密文 El (IMSI, Mme-pub, KHSS-pr i), HSS将所述密文 El (IMSI, KMme-pub, KHSS- pri)发给 MME, MME使用预先获得的 KMme- pr i, KHSS- pub对所述 El进行计算并获得所述用户的 IMSI ; 所述(KHSS- pub, KHSS-pr i )可以表示是由 HSS 端生成的非对称密钥对, 所述 ( KMme-pub, KMme- pr i )可以表示是由 MME端生成的非对称密钥对。
在 MME端和 HSS端,生成非对称密钥对很容易,选择一种现有技术中普遍使用的公 钥算法, 如采用 RSA算法, 即可得到 (Kpub, Kpr i )。
在另一个实施场景中, MME也可以具备本实施例所提供的 HSS的功能, 即 {ki}是网 络侧 MME保存的永久密钥集合 {K}的一个子集, MME可以根据随机数 R2 , 以及根据 i在 其保存的永久密钥集合 0中找到密钥 ki , 解密获得所述用户设备的 IMSI。
本发明实施例, 由于采用将用户设备的 IMSI进行加密以生成密文反馈给网络侧设 备的技术手段,克服了目前用户身份认证机制存在的 UE的 IMSI极易被解析出来的问题, 进而达到了提高用户身份机密性的技术效果。 实施例二:
参考本发明实施例揭示的用户设备的实现,对应的,本发明实施例相应的还提供了 一种网络侧设备 50,参考图 6所示, 图 6为本发明实施例提供的一种网络侧设备的示意 图,所述网络侧设备 50包括第二发送单元 501、第二接收单元 502和第二处理单元 503。
所述的第二发送单元 501, 可用于向用户设备发送用户身份请求消息, 发送所述用 户身份请求消息的一个目的是获得所述用户设备的 IMSI。
所述第二接收单元 502 , 用于接收来自于用户设备的用户身份响应消息。 用户设备 在接收到第二发送单元 501发送的用户身份请求消息后, 用户设备向该网络侧设备 50 反馈用户身份相应消息, 用户身份响应消息包括用户设备的国际移动用户标识的密文, 这里用户设备的 IMSI 的密文, 可以是所述用户设备通过对称密钥加密而获得(可参考 实施例一所揭示的用户设备对 IMSI的加密过程 ): 所述用户设备通过生成随机数 R2和 随机选择正整数序列 i从密钥集合 {k i}中得到对应的永久密钥 ki,对所述用户设备的国 际移动用户标识进行对称密钥加密,所述密钥集合 {ki}可以是网络侧设备保存的永久密 钥集合 0的一个子集,如 {k i}可以是网络侧归属用户服务器(Home Subscr iber Server , HSS )保存的永久密钥集合 0的一个子集, 或者是网络侧 MME保存的永久密钥集合 {10 的一个子集。
所述用户身份响应消息可以表达成 Ident i ty Response E2 (ki , IMSI, R2) , 提供给 网络侧的设备用于解密所述用户设备 IMSI的密文的所述随机数 R2和所述正整数 i可以 包含在所述用户身份响应消息中,也可以通过包含在其他的响应消息或者通过特定的消 息发给网络侧的设备, 这里所说的解密所述用户设备 IMSI 的密文的网络侧的设备, 可 以是归属网络服务器 HSS, 也可以是所述网络侧设备 50自身, 如 MME, 即 MME收到用户 设备反馈的用户身份响应消息后,所述第二处理单元 503可以使用所述用户身份响应消 息中的 R2和 i, 解密所述用户设备 IMSI的密文, 得到所述用户设备的 IMSI。
所述的第二发送单元 501, 还可用于向归属网络服务器 HSS转发所述第二接收单元 502接收到的来自于用户设备的用户身份响应消息。
所述第二接收单元 502 , 还可用于接收来自于所述归属用户服务器加密后的所述用 户设备的国际移动用户标识。 所述第二处理单元 503 , 可用于解密所述第二接收单元接收到的来自于归属用户服 务器所述用户设备的 IMSI 的密文, 以获得用户设备的国际移动用户标识; 所述网络侧 设备 50在现网实现中, 可以是移动管理实体, 那么对应的, 所述第二处理单元 503具 体的解密过程如: 第二处理单元 503根据预先获得的所述移动管理实体私钥和所述归属 用户服务器公钥解密获得所述用户设备的国际移动用户标识。
所述网络侧设备 50还可以包括第一认证单元 504, 第二存储单元 505。所述第一认 证单元 504, 用于在所述第二发送单元 501向用户设备发送用户身份请求消息之前, 使 得所述网络侧设备 50获得网络侧其他设备的身份认证,如获得网络侧设备 HSS的认证。
基于图 6所对应的网络侧设备 50 , 所述网络侧设备 50的另一种实现方式中, 如图 7所示, 所述第一认证单元 504 , 还可以进一步包括: 第一认证接收单元 5041, 第一认 证处理单元 5042 , 第一认证发送单元 5043。
所述认证接收单元 5041, 可用于接收来自于归属用户服务器的认证请求消息, 所 述认证请求消息中包括归属用户服务器公钥和随机数 R1,所述接收到的归属用户服务器 公钥和或随机数 R1可以保存在所述第二存储单元 505中;
所述第一认证处理单元 5042, 可用于在所述第一认证接收单元 5041接收到来自于 归属用户服务器的认证请求消息后, 生成非对称密钥对, 如, 当所述网络侧设备 50为 MME 时, 则生成移动管理实体公钥和移动管理实体私钥, 所述第一认证处理单元 5042 使用所述第一认证接收单元 5041接收到的归属用户服务器公钥、随机数 R1和所述移动 管理实体的移动管理实体标识生成所述移动管理实体标识的密文。所述第一认证处理单 元 5042生成的移动管理实体公钥和移动管理实体私钥, 可以保存在所述第二存储单元 505中;
所述第一认 ·ί£发送单元 5043 , 可用于将所述移动管理实体标识的密文和所述移动 管理实体公钥发送给所述归属用户服务器。
上述本发明实施例揭示的网络侧设备 50, 其中的各功能模块, 通过网络侧设备 50 中各独立设置的物理 /逻辑模块实现,上述各模块也可以全部或者部分通过同一个物理 / 逻辑实体来实现; 第一认证单元 504中的各个子模块, 如第一认证接收单元 5041 , 第一 认证处理单元 5042 , 第一认证发送单元 5043这三个模块的功能, 也可以通过网络侧设 备 50中的第二接收单元 502,第二发送单元 501和第二处理单元 503来实现,如第一认 证接收单元 5041的功能可以由第二接收单元 502实现,第一认证发送单元 5043的功能 可以由第二发送单元 501来实现, 以此类推。 本发明实施例的另一方面,参考本发明实施例所揭示的网络侧设备 50的实施方式, 与所述网络侧设备 50相适应, 本发明实施例还提供了一种传输用户身份信息的方法, 如图 8所示, 所述方法包括:
步骤 801 , 向用户设备发送用户身份请求消息。
发送所述用户身份请求消息的一个目的是获得所述用户设备的 IMSI。 网络侧设备, 如 MME,向用户设备发送用户身份请求消息之前,还可以先获得其他网络侧设备,如 HSS 的身份认证, 以进一步增强用户身份信息传输的安全性。 MME获得 HSS的身份认证的一 种方法, 如: 圖 E接收来自于 HSS的认证请求.消息, 所述认证请求消息包括预先设置的 归属用户服务器公钥和随机数 R1 ; 在收到所述认证请求消息后, MME将所述归属用户服 务器公钥保存, 生成非对称密钥对: 移动管理实体公钥和移动管理实体私钥, 然后使用 所述归属用户服务器公钥、 所述随机数 R1和所述移动管理实体的移动管理实体标识生 成所述移动管理实体标识的密文,并将所述加密所述移动管理实体标识的密文和所述移 动管理实体公钥发送给所述归属用户服务器, 具体 MME的实现, 可以参考本发明实施例 提供的网络侧设备 50的实现方式。
步骤 802, 接收来自于所述用户设备的用户身份响应消息, 其中, 所述用户身份响 应消息包括所述用户设备的国际移动用户标识的密文。
所述接收到的用户设备的国际移动用户标识的密文可以是用户设备通过对称密钥 加密而获得, 所述用户设备通过生成随机数 R2和随机选择所述正整数序列 i得到对应 的永久密钥 k i ,对所述用户设备的国际移动用户标识进行对称密钥加密; 所述用户设备 端保存的永久密钥集合 {k i}为归属用户服务器的永久密钥集合 0的一个子集, 所述 i 为正整数序列,所述用户设备端保存的永久密钥集合 {ki}也可以是保存在 MME的密钥集 合 0的一个子集; 所述接收到的所述用户设备的用户身份响应消息还包括用于解密所 述密文的所述随机数 R2和所述正整数序列 i。
步骤 803 , 解密所述用户设备的国际移动用户标识的密文, 获得所述用户设备的国 际移动用户标识。
一种实现方式如:所述用户设备端保存的永久密钥集合 {k i}是保存在園 E的密钥集 合 0的一个子集。 网络侧设备解密所述用户设备的国际移动用户标识的密文, 获得所 述用户设备的国际移动用户标识, 且所述网络侧设备是 MME时, 所述 MME收到用户设备 反馈的用户身份响应消息后,使用所述用户身份响应消息中的 R2和 i ,解密所述用户设 备 IMSI的密文, 得到所述用户设备的 IMSI。 一种实现方式如:所述用户设备端保存的永久密钥集合 {ki}是保存在 HSS的密钥集 合 {K}的一个子集。 在解密获得所述用户设备的国际移动用户标识之前, 网络侧设备如 圖 E还可向归属网络服务器 HSS转发所述来自于用户设备的用户身份响应消息, HSS收 到所述消息后, 根据 i在其保存的永久密钥集合 0中找到 k i, 解密出所述用户设备的 IMSI , 然后再使用预先设置的 KMme-pub,KHSS-pr i 对所述 IMSI 进行加密, 形成密文 El (IMSI, Mme-pub, KHSS-pr i) , HSS将所述密文 El (IMSI, KMme-pub, KHSS- pr i)发给 MME, 園 E再对来自于归属用户服务器所述用户设备的 IMSI的密文进行解密,根据预先获得的 所述移动管理实体私钥和所述归属用户服务器公钥解密获得所述用户设备的国际移动 用户标识。 所述(KHSS- pub, KHSS-pr i )可以表示是由 HSS端生成的非对称密钥对, 所 述(Dime- pub, KMme- pr i )可以表示是由 MME端生成的非对称密钥对。
本发明实施例, 由于采用将用户设备的 IMSI进行加密以生成密文传输给网络侧设 备的技术手段,克服了目前用户身份认证机制存在的 UE的 IMSI极易被解析出来的问题; 可选的, 通过对网络侧设备如 MME先进行身份认证, 进一步提升了用户身份信息传输机 密性的技术效果。 实施例三:
与上述实施例揭示的一种用户设备 20和一种网络侧设备 50相适应, 如图 9所示, 为本发明实施例还提供了一种网络侧设备 90,图 9为网络侧设备 90的一种结构示意图。
所述网络侧设备 90包括第三发送单元 901、第三接收单元 902和第三处理单元 903, 其中:
第三接收单元 902, 用于接收来自于其他网络侧设备如移动管理实体的用户设备的 用户身份响应消息,所述用户设备的用户身份响应消息包括用户设备的国际移动用户标 识的密文, 可以是由所述移动管理实体转发给所述网络侧设备, 所述用户身份响应消息 还可以包括随机数 R2和正整数序列 i, 所述随机数 R2和正整数序列 i用于在用户设备 侧加密所述用户设备的国际移动用户标识, 所述随机数 R2和正整数序列 i还可用于在 网络设备侧解密所述用户设备的国际移动用户标识。所述用户设备保存了一个永久密钥 集合 {ki} , 是所述网络侧设备 90如归属用户服务器, 保存的永久密钥集合 {10的一个子 集, 所述 i为正整数序列。
第三处理单元 903, 用于解密第三接收单元 902接收到的所述用户设备的国际移动 用户标识的密文, 获得用户设备的国际移动用户标识, 所述第三处理单元 903可以根据 所述第三接收单元 902接收到的随机数 R2和正整数序列 〖对所述包含所述用户设备的 国际移动用户标识密文进行解密; 当所述网络侧设备 90为归属用户服务器时, 所述第 三处理单元 903还用于使用预先设置的移动管理实体公钥和归属用户服务器私钥对所述 用户设备的国际移动用户标识进行加密。
第三发送单元 901, 用于将所述第三处理单元 903使用预先获得的移动管理实体公 钥和归属用户服务器私钥对所述用户设备的国际移动用户标识进行加密生成所述用户 设备的国际移动用户标识的密文, 发送给所述其他网络侧设备, 如移动管理实体, 可以 再由其他网络侧设备对所述用户设备的国际移动用户标识的密文进行解密,获得所述用 户设备的 IMSI。
所述网络侧设备 90还可以包括第三存储单元 904 , 用于存储所述预先获取的移动 管理实体公钥和归属用户服务器私钥, 还可用于存储永久密钥集合 00。
如图 10所示,基于图 9所示的网络侧设备,所述网络侧设备 90还可以包括第二认 证单元 905, 所述第二认证单元 905可用于在第三接收单元 902接收移动管理实体转发 的用户设备的用户身份响应消息之前, 对网络侧的其他设备, 如移动管理实体进行身份 认证。
如图 11所示, 基于图 9 , 图 10所示的网络侧设备, 所述第二认证单元 905, 可以 进一步包括:第二认证发送单元 9051 ,第二认证处理单元 9052 ,第二认证接收单元 9053。
所述第二认证处理单元 9052, 可用于生成非对称密钥对: 归属用户服务器公钥和 归属用户服务器私钥, 同时还生成随机数 Rl。所述归属用户服务器公钥和归属用户服务 器私钥可以保存在第三存储单元 904中。
所述第二认证发送单元 9051, 用于向其他网络侧设备如移动管理实体发送认证请 求消息, 其中, 所述认证请求消息包括第二认证处理单元 9052生成的归属用户服务器 公钥和所述随机数 Rl。
所述第二认证接收单元 9053, 用于接收来自于其他网络侧设备, 如移动管理实体 反馈的所述移动管理实体标识的密文和所述移动管理实体公钥。所述第二认证接收单元 9053接收到的移动管理实体公钥可以保存在第三存储单元 904中。当所述其他网络侧设 备为 MME时, 所述 MME使用归属用户服务器公钥、 随机数 R1和所述移动管理实体的移 动管理实体标识生成所述移动管理实体标识的密文,并将所述移动管理实体标识的密文 和所述移动管理实体公钥发给第二认证接收单元 9053。
所述第二认证处理单元 9052,还用于根据所述第二认证接收单元 9053接收到的所 述移动管理实体标识的密文,获得所述移动管理实体标识(如使用归属用户服务器公钥、 随机数 R1对所述移动管理实体标识的密文的进行解密) , 并与所述归属用户服务器端 已保存的移动管理实体标识比较以验证所述移动管理实体的合法性,验证通过则保存所 述移动管理实体公钥, 所述移动管理实体公胡可以保存在所述第三存储单元 904中, 所 述第三存储单元 9(M还可以保存一个移动管理实体标识列表。
本发明网络侧设备实施例因为采用对网络侧设备如 MME先进行身份认证(可选) , 然后将用户设备的国际移动用户标识进行加密传输的技术手段,克服了目前用户身份认 证机制存在的 UE的 IMSI极易被解析出来的问题,进而达到提高用户身份信息传输机密 性的技术效果。
本发明实施例的另一方面,参考本发明实施例所揭示的网络侧设备 90的实施方式, 与所述网络侧设备 50以及用户设备 20的实现相适应,本发明实施例还提供了一种传输 用户身份信息的方法, 如图 12所示, 所述方法包括:
步骤 1001、 接收移动管理实体转发的用户设备的用户身份响应消息, 其中, 所述 用户身份响应消息包括所述用户设备的国际移动用户标识的密文。
为了进一步提高用户身份信息传输的安全性,在接收网络侧设备如 MME转发的用户 设备的用户身份响应消息之前, 还可以对网络侧的移动管理实体进行认证: 生成非对称 密钥对: 归属用户服务器公钥和归属用户服务器私钥, 同时还生成随机数 R1 , 向所述移 动管理实体发送认证请求消息,所述认证请求消息包括所述归属用户服务器公钥和所述 随机数 R1 ;在向所述移动管理实体发送认证请求消息后,所述移动管理实体使用归属用 户服务器公钥、 随机数 R1和所述移动管理实体的移动管理实体标识生成所述移动管理 实体标识的密文, 所述移动管理实体向归属用户服务器反馈包含所述移动管理实体标识 的密文和移动管理实体公钥的消息; 归属用户服务器根据所述移动管理实体标识的密文 获得所述移动管理实体标识(如使用归属用户服务器公钥、 移动管理实体公钥以及随机 数 R1对所述移动管理实体标识的密文的进行解密) , 并将获得的移动管理实体标识与 归属用户服务器端已保存的移动管理实体标识比较以验证所述移动管理实体的合法性, 如该移动管理实体标识已在 HSS端作为合法用户保存, 则通过验证, 验证通过则保存所 述移动管理实体公钥。
步骤 1002、 解密密文获得所述用户设备的国际移动用户标识。
网络侧设备如 MME 转发的用户设备的用户身份响应消息中包括的所述用户设备的 国际移动用户标识的密文, 可以是用户设备端进行通过对称密钥加密而获得, 如所述用 户设备通过生成随机数 R2和随机选择所述正整数序列 i得到对应的永久密钥 ki, 对所 述用户设备的国际移动用户标识进行对称密钥加密; 其中, 所述用户设备端保存的永久 密钥集合 {k i}为所述归属用户服务器端保存的永久密钥集合 0的一个子集, i为正整 数序列; 用户设备端保存的永久密钥集合 {ki}也可以是 MME保存的永久密钥集合 {K}的 一个子集。接收到的所述用户设备的用户身份响应消息中还可以包括用于解密所述密文 的所述随机数 R2和所述正整数序列 i ;在收到所述用户身份响应消息后,根据所述随机 数 R2和所述正整数序列 〖对应的永久密钥 ki , 解密出所述用户设备的国际移动用户标 识。
步骤 1003、将解密密文获得的用户设备的国际移动用户标识发送给移动管理实体。 可以利用移动管理实体公钥和所述归属用户服务器私钥对所述用户设备的国际移 动用户标识进行加密后, 发送给所述移动管理实体。
本发明实施例因为采用对网络侧设备如 MME先进行身份认证 (可选), 然后将用户 设备的国际移动用户标识进行加密传输的技术手段,克服了目前用户身份认证机制存在 的 UE的 IMSI极易被解析出来的问题,进而达到提高用户身份信息传输机密性的技术效 果。 实施例四:
参考上述实施例揭示的用户设备 20及网络侧设备 50、 网络侧设备 90, 如图 13所 示, 为本发明实施例一种用于用户身份信息传输的通信系统示意图, 所述系统以包括用 户设备 20、 移动管理实体 50、 归属用户服务器 90为例进行说明, 其中:
用户设备 20, 用于接收来自于移动管理实体 50的用户身份请求消息; 将用户设备 60的国际移动用户标识进行加密以生成密文; 向所述移动管理实体 50发送包括所述国 际移动用户标识密文的用户身份响应消息。
移动管理实体 50, 用于向用户设备 20发送用户身份请求消息; 所述移动管理实体 50接收来自于所述用户设备 20的用户身份响应消息, 其中, 所述用户身份响应消息包 括所述用户设备 20的国际移动用户标识的密文,所述移动管理实体 50转发所述用户身 份响应消息给归属用户服务器 90;
归属用户服务器 90, 用于接收所述移动管理实体 50转发的来自于用户设备 20的 用户身份响应消息, 其中, 用户身份响应消息包括用户设备 20的国际移动用户标识的 密文; 所述归属用户服务器 90解密所述密文获得用户设备 20的国际移动用户标识; 将 解密所述密文获得的所述用户设备 20的国际移动用户标识进行加密后, 再发送给所述 移动管理实体 50。
可选的, 为了进一步增强用户身份传输的安全性, 在移动管理实体 50向用户设备 20发送用户身份请求消息之前,归属用户服务器 90还用于对移动管理实体 50进行认证。
本发明上述系统实施例通过采用将用户设备的国际移动用户标识进行加密以生成 密文反馈给网络侧设备的技术手段,克服了目前用户身份认证机制存在的 UE的 IMSI极 易被解析出来的问题, 解决了当前存在的用户身份机密性低的问题, 以及通过对归属用 户服务器先进行身份验证, 进一步增强了用户身份传输的安全性。 实施例五:
参考上述本发明用户设备、 网络侧设备以及系统实施例及提供的技术方案的实现, 对应的, 如图 14所示, 为本发明实施例提供的一种用户身份信息传输方法实例。
为了描述方便, 用 K表示为永久密钥, Kpri表示为私有密钥, Kpub表示为公开密钥。 E1 0表示为公钥加密算法, D1 0表示为公钥解密算法, E2 ()表示为对称密钥加密算法, D2 ()表示为对称密钥解密算法, C表示为密文, M表示为明文。
用公开密钥 Kpub加密明文 M表示为:
E M) = C,
虽然公开密钥和私有密钥不同, 但用相应的私有密钥 Kp 解密可表示为:
DlKpri (0 = M,
通过公开密钥 和加密算法 E1 0加密明文 M为密文 C,则通过私有密钥 KP 和解密 算法 D1 0可以将密文 C还原成 M。 公钥和私钥是成对存在的, 使用公钥加密, 就必须用 对应的私钥解密, 此过程一般可用于鉴权认证; 同样, 使用私钥加密, 就需要用对应的 公钥解密, 此过程一般可用于数字签名。
在 MME和 HSS之间,运营商可使用基于 IP的安全机制保证 MME和 HSS之间的安全; 为了进一步提高安全性, 如防止 MME假冒(即没有通过 HSS认证 ) , 在已有的安全机制 基础上, 每进行一次用户身份请求, 就更换一次非对称密钥对, 这样可使上一次使用的 非对称密钥对和下一次使用的非对称密钥对不一样。本实施例假定 HSS是合法的,而 MME 和 UE在某些情况下存在潜在威胁,当 MME需要窃取 UE—些相关信息时,会冒充合法 MME, 并向 UE发送 IMSI请求消息, 从而造成不利后果, 比如:
1、 根据用户的 IMSI对用户进行跟踪, 此威胁可能只针对少数高端用户; 2、 假冒用户访问业务; 此威胁在缺乏应用层的业务对用户的认证时存在, 对所有 用户 /服务供应商(Service Provider, SP )存在;
3、 假冒 SP或者 SP本身就是一个恶意的 SP, 为用户提供用户本不需要的服务。 此 威胁在缺乏应用层的用户对业务的认证时存在。 此威胁对所有用户存在。
在一种实施情况中, UE端的的永久密钥 K是保存在 USIM卡上的, 在 HSS端也存在 相同的永久密钥 K, USIM卡上的 Κ可以是在 USIM卡出厂时从 HSS端上随 ΐ 由取, 以此 类推, UE端的永久密钥可以为一个集合 {ki} , 且 {ki}是 HSS端永久密钥集合 0的一个 子集; 不同 UE之间的永久密钥集合 {ki}可以重复, 但由于采取了随机选择永久密钥的 方式, 实际上永久密钥重复的机率很小, 因此, 在 HSS端对永久密钥集合 {K}的管理和 存储负担不会增大, 其中, 所述 i>0; i越大, 用户定制的永久密钥集合越大, 每次使 用密钥时越接近一次一密。 本发明的一个应用实例在相互交换公钥的同时, HSS需要对 MME的身份进行认证。 所述方法包括:
步骤 1101, HSS生成非对称密钥对(K„ss-pub, KHSS-Pli) , 同时生成随机数 Rl。
步骤 1102, HSS通过消息(Message)形式向 MME发送 Message ( K„sspub, Rl ) 。 步骤 1103, MME收到 Message (K„ss-pub, Rl )后, 将 K„ss-pub保存, 同时生成非对称密 钥对 KMme-pri ); 并通过 K„ss_pub、 Rl和 MME的标识 MMEI (MME唯一标识码)生成认 证码 El (K„ss-Pllb, MMEI, Rl)。
步骤 1104, MME发送响应 (El (K„ss-pub, MMEI, Rl), KMme-pub)到 HSS。
步骤 1105, HSS判断 MME是否合法; 在 HSS端保存有 MME的唯一标识 MMEI, HSS 根据 MME发来的 El (K„ss-pub) MMEI, Rl)计算出 MMEI, 并与 HSS端已保存的 MMEI比较来验 证 MME的合法性, 验证通过则保存该 MME的 KTE-PUB。 至此, HSS端存有(K , KHSS-ΡΓΪ Ϊ
KMme-pub ) , 而 MME端存有 ( KMme-pUb, KMme_pri, -pu ) 。
步骤 1106, 当某个时刻 MME需要获得 UE的 IMSI时, MME向 UE发起用户身 求 ( Identity Request ) 消息。
步骤 1107, UE收到 Identity Request消息后, 生成随机数 R2, 随机选择所述正 整数序列 i对应的永久密钥 ki, 对 IMSI加密保护得到 E2(ki, IMSI,R2)。
步骤 1108, UE发送用户身份响应(Identity Response) (E2(ki, IMSI,R2),R2, i) 到 MME。
步骤 1109, MME转发 Identity Response (E2 (ki, IMSI, R2) , R2, i)到 HSS, 其中, 括号中只列举了 Identity Response消息的部分信元。 步骤 1110, HSS收到 Identity Response (E2 (ki, IMSI, R2), R2, i)后, 根据 i在 {K} 中找到 ki, 解密出 IMSI。
步骤 1111 , HSS 得到 IMSI 后, 生成密文 El(IMSI,U„ss-pri) , 并发送 Response (El (IMSI,KM— , K„ss-pri))到廳。
步骤 1112, MME根据 K„„epri, K„sspub计算出 IMSI。
步骤 1113, 可选的, 重复步骤 1101-1105, HSS和 MME之间为下次用户身份认证协 商相关的密钥。
在 MME端和 HSS端,生成非对称密钥对很容易,选择一种当今普遍使用的公钥算法, 如 RSA (Rivest Shamir Adleman)算法(一种既能用于数据加密也能用于数字签名的算 法) , 即可得到 (Kpb,Kpri) 。 对于 UE端和 HSS端之间的加解密, 由于使用随机的永久 密钥进行保护, 安全性比较高。 假设第三方想冒充合法的 MME, 由于有 HSS对 MME身份 的认证, 这使得第三方达不到冒充的目的, 因此该机制有足够的安全性。
本发明上述这个方法实例技术方案带来的有益效果:
1、 解决了用户身份机密性的问题: 通过使用随机永久密钥加密 IMSI, 近似的达到 了加密的一次一密的效果;
2、 安全性高: 本机制在网络侧设备向 UE发送用户身份请求消息之前, 利用 HSS 对 MME先进行认证, 解决了 MME有可能假冒的问题, 同时相互交换了公钥, 进一步使用 了对称加密和非对称加密双重机制对 IMSI进行保护, 进一步提高了对用户认证的安全 性; 在 UE端可以随机选择永久密钥, 从而能近似达到一次一密的效果, 提高了安全性;
3、 提高 USIM卡的营销能力: 在 UE端根据用户需求存有永久密钥集合 {ki}, {ki} 为 HSS端永久密钥集合 00的一个子集, 其中 i>0; i越大, 用户定制的永久密钥集合越 大, 每次使用密钥时越接近一次一密。 因此, 运营商可以根据 USIM卡的安全等级制定 相应的价格等级, 通过 USIM卡的安全等级, 还可以增加用户对 USIM卡的安全能力的选 择, 从而提高其购买力。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤是可以通 过程序来指令相关硬件来完成, 所述的程序可以存储于一计算机可读取存储介质中, 该 程序在执行时, 包括上述全部或部分步骤, 所述的存储介质, 如: ROM/RAM, 磁盘、 光 盘等。 以上所述的具体实施方式, 对本发明的目的、技术方案和有益效果进行了进一步详 细说明, 所应理解的是, 以上所述仅为本发明的具体实施方式而已, 并不用于限定本发 明的保护范围, 凡在本发明的精神和原则之内, 所做的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求
1、一种用户身份信息传输方法, 其特征在于, 所述方法包括:
接收来自于移动管理实体的用户身份请求消息;
将用户设备的国际移动用户标识进行加密以生成密文;
向所述移动管理实体发送包括所述国际移动用户标识密文的用户身份响应消息。
2、 如权利要求 1所述的方法, 其特征在于, 所述接收来自于网络侧设备的用户身 份请求消息之前, 所述方法还包括:
存储永久密钥集合 {ki} , 其中, 所述永久密钥集合 {ki}为属于归属用户服务器存储 的永久密钥集合 {K}的一个子集, 所述 i为正整数。
3、 如权利要求 1或 2任一所述的方法, 其特征在于, 所述将用户设备的国际移动 用户标识进行加密以生成密文的过程, 包括: 生成随机数 R2和随机选择一个正整数 i 得到对应的永久密钥 ki, 对所述用户设备的国际移动用户标识进行加密;
所述向移动管理实体发送包括所述国际移动用户标识密文的用户身份响应消息, 包括网络侧设备用于解密所述密文的所述随机数 R2和所述正整数 i。
4、 一种用户设备, 其特征在于, 所述用户设备包括:
第一接收单元、 第一处理单元、 第一发送单元;
所述第一接收单元, 用于接收来自于移动管理实体的用户身份请求消息; 所述第一处理单元, 用于在所述第一接收单元接收到来自于网络侧设备的用户身 份请求消息后, 将所述用户设备的国际移动用户标识进行加密, 生成所述用户设备的国 际移动用户标识的密文;
所述第一发送单元, 用于向所述移动管理实体发送包括所述第一处理单元生成的 所述包含所述用户设备的国际移动用户标识的密文的用户身份响应消息。
5、 如权利要求 4所述的用户设备, 其特征在于, 所述用户设备还包括: 第一存储单元, 用于在所述第一接收单元接收到来自于移动管理实体的用户身份 请求消息之前, 存储永久密钥集合 {ki} , 其中, 所述永久密钥集合 {ki}为归属用户服务 器保存的永久密钥集合 {K}的一个子集, 所述 i为正整数。
6、 如权利要求 4或 5任一所述的用户设备, 其特征在于, 所述第一处理单元还用 于通过生成随机数 R2和随机选择正整数 i得到对应的永久密钥 ki, 对所述用户设备的 国际移动用户标识进行对称加密而生成所述用户设备的国际移动用户标识的密文; 所述第一发送单元发送的所述用户身份响应消息还包括网络侧设备用于解密所述 密文的所述随机数 R2和所述正整数序列 i。
7、 一种用户身份信息传输方法, 其特征在于, 所述方法包括:
向用户设备发送用户身份请求消息;
接收来自于所述用户设备的用户身份响应消息, 所述用户身份响应消息包括所述 用户设备的国际移动用户标识的密文;
解密所述用户设备的国际移动用户标识的密文, 获得所述用户设备的国际移动用 户标识。
8、 如权利要求 7所述的方法, 其特征在于, 所述向用户设备发送用户身份请求消 息之前, 包括:
接收来自于归属用户服务器的认证请求消息, 所述认证请求消息包括所述归属用 户服务器公钥和所述随机数 R1;
使用获得的所述归属用户服务器公 4月、随机数 R1和移动管理实体的移动管理实体 标识生成所述移动管理实体标识的密文;将所述移动管理实体标识的密文和所述移动管 理实体公胡发送给所述归属用户服务器。
9、 如权利要求 7-8任一所述的方法, 其特征在于, 所述接收到的所述用户设备的 国际移动用户标识的密文为用户设备通过对称密钥加密而获得:
所述用户设备通过生成随机数 R2和随机选择正整数 i得到对应的永久密钥 ki, 对 所述用户设备的国际移动用户标识进行对称密钥加密;
所述用户设备保存的永久密钥集合 {ki}为归属用户服务器保存的永久密钥集合 {K} 的一个子集;
所述接收到的所述用户设备的用户身份响应消息还包括网络侧设备用于解密所述 密文的所述随机数 R2和所述正整数序列 i。
10、 如权利要求 7-9任一所述的方法, 其特征在于, 所述解密所述用户设备的国际 移动用户标识的密文, 获得所述用户设备的国际移动用户标识的步骤, 包括:
转发所述用户设备的用户身份响应消息给归属用户服务器;
收到来自于所述归属用户服务器加密后的所述用户设备的国际移动用户标识; 根据预先获得的所述移动管理实体私钥和所述归属用户服务器公钥解密获得所述 用户设备的国际移动用户标识。
11、 一种网络侧设备, 其特征在于, 所述网络侧设备包括:
第二发送单元、 第二接收单元和第二处理单元; 所述第二发送单元, 用于向用户设备发送用户身份请求消息;
所述第二接收单元, 用于接收来自于所述用户设备的用户身份响应消息, 所述用 户身份响应消息包括所述用户设备的国际移动用户标识的密文;
所述第二处理单元, 用于解密用户设备的国际移动用户标识的密文, 获得所述用 户设备的国际移动用户标识。
12、 如权利要求 1 1所述的网络侧设备, 其特征在于, 所述网络侧设备还包括: 第 一认证单元;
所述第一认证单元, 用于在所述第二发送单元向所述用户设备发送用户身份请求 消息之前, 使得所述网络侧设备获得归属用户服务器的认证。
13、 如权利要求 1 1或 12任一所述的网络侧设备, 其特征在于, 所述第一认证单 元还包括:
第一认证接收单元, 第一认证处理单元, 第一认证发送单元;
所述第一认证接收单元, 用于接收来自于所述归属用户服务器的认证请求消息, 所述认证请求消息包括所述归属用户服务器公钥和所述随机数 R1;
所述第一认证处理单元, 用于在所述第一认证接收单元接收到来自于所述归属用 户服务器的认证请求消息后, 将所述归属用户服务器公钥保存, 所述第一认证处理单元 还生成移动管理实体公胡和移动管理实体私钥, 使用所述归属用户服务器公钥、 所述随 机数 R 1和所述移动管理实体的移动管理实体标识生成所述移动管理实体标识的密文; 所述第一认证发送单元, 用于将所述第一认证处理单元生成的所述移动管理实体 标识的密文和所述移动管理实体公铜发送给所述归属用户服务器。
14、 如权利要求 1 1-13任一所述网络侧设备, 其特征在于,
所述第二接收单元接收到的所述用户设备的国际移动用户标识的密文为所述用户 设备通过对称密钥加密而获得:
所述用户设备通过生成随机数 R2和随机选择正整数 i得到对应的永久密钥 ki, 对 所述用户设备的国际移动用户标识进行对称密钥加密;
所述用户设备端保存的永久密钥集合 {ki}为所述归属用户服务器保存的永久密钥 集合 {K}的一个子集;
所述第二接收单元接收到的所述用户设备的用户身份响应消息还包括网络侧设备 用于解密所述密文的所述随机数 R2和所述正整数序列 i。
15、 如权利要求 1 1-14任一所述网络侧设备, 其特征在于, 所述第二发送单元, 还用于向归属网络服务器转发所述第二接收单元接收到的来 自于用户设备的用户身份响应消息;
所述第二接收单元, 还用于接收来自于所述归属用户服务器加密后的所述用户设 备的国际移动用户标识;
所述第二处理单元, 还用于解密第二接收单元接收到的来自于归属用户服务器所 述用户设备的国际移动用户标识的密文, 以获得所述用户设备的国际移动用户标识。
16、 一种网络侧设备, 其特征在于, 所述网络侧设备包括:
第三接收单元、 第三发送单元和第三处理单元;
所述第三接收单元, 用于接收来自于移动管理实体转发的用户设备的用户身份响 应消息, 所述用户身份响应消息包括所述用户设备的国际移动用户标识的密文;
所述第三处理单元, 用于解密所述第三接收单接收到的所述用户设备的国际移动 用户标识的密文, 获得所述用户设备的国际移动用户标识, 还使用预先获得的移动管理 实体公钥和归属用户服务器私钥对所述用户设备的国际移动用户标识进行加密生成所 述用户设备的国际移动用户标识的密文;
所述第三发送单元, 用于将所述第三处理单元生成的所述用户设备的国际移动用 户标识的密文发送给移动管理实体。
17、 如权利要求 16所述的网络侧设备, 其特征在于, 所述网络侧设备还包括: 第 二认证单元,用于在所述第三接收单元接收所述移动管理实体转发的用户设备的用户身 份响应消息之前, 对所述移动管理实体进行身份认证。
18、 如权利要求 16或 17任一所述的网络侧设备, 其特征在于, 所述第二认证单 元, 还包括: 第二认证发送单元, 第二认证处理单元, 第二认证接收单元;
所述第二认证处理单元, 用于生成归属用户服务器公钥, 归属用户服务器私钥和 随机数 R1 ;
所述第二认证发送单元, 用于向所述移动管理实体发送认证请求消息, 所述认证 请求消息包括所述第二认证处理单元生成的所述归属用户服务器公钥和所述随机数 R1; 所述第二认证接收单元, 用于在所述第二认证发送单元向所述移动管理实体发送 认证请求消息后,接收来自于移动管理实体反馈的所述移动管理实体标识的密文和所述 移动管理实体公钥;
所述第二认证处理单元, 还用于根据所述第二认证接收单元接收到的所述移动管 理实体标识的密文, 获得所述移动管理实体标识, 并与所述归属用户服务器端已保存的 移动管理实体标识比较以验证所述移动管理实体的合法性。
19、 如权利要求 16-18任一所述的网络侧设备, 其特征在于,
所述第三接收单元接收的来自于移动管理实体转发的用户设备的用户身份响应消 息中所述用户设备的国际移动用户标识的密文,为所述用户设备进行通过对称密钥加密 而得:
所述用户设备通过生成随机数 R2和随机选择所述正整数 i得到对应的永久密钥 ki, 对所述用户设备的国际移动用户标识进行对称密钥加密;
所述用户设备端保存的永久密钥集合 {ki}为所述归属用户服务器保存的永久密钥 集合 {K}的一个子集;
所述第三接收单元接收到的所述用户设备的用户身份响应消息还包括所述归属用 户服务器用于解密所述密文的所述随机数 R2和所述正整数 L
20、一种用户身份信息传输系统, 其特征在于, 所述系统包括: 如权利要求 4-6任一所述的用户设备, 和或, 如权利要求 11-15任一所述的网絡側 设备, 和或, 如权利要求 16-19任一所述的网络侧设备。
PCT/CN2011/075347 2010-09-01 2011-06-03 用户身份信息传输的方法、用户设备、网络侧设备及系统 WO2011147364A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP11786136.9A EP2613581A4 (en) 2010-09-01 2011-06-03 METHOD FOR TRANSFERRING USER IDENTITY INFORMATION AND USER DEVICE, INTERNAL-SITE DEVICE AND SYSTEM
US13/782,700 US20130170643A1 (en) 2010-09-01 2013-03-01 Method and system for transmitting subscriber identity information, user equipment, network device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010102689631A CN102131188B (zh) 2010-09-01 2010-09-01 用户身份信息传输的方法、用户设备、网络侧设备及系统
CN201010268963.1 2010-09-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/782,700 Continuation US20130170643A1 (en) 2010-09-01 2013-03-01 Method and system for transmitting subscriber identity information, user equipment, network device

Publications (1)

Publication Number Publication Date
WO2011147364A1 true WO2011147364A1 (zh) 2011-12-01

Family

ID=44269054

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075347 WO2011147364A1 (zh) 2010-09-01 2011-06-03 用户身份信息传输的方法、用户设备、网络侧设备及系统

Country Status (4)

Country Link
US (1) US20130170643A1 (zh)
EP (1) EP2613581A4 (zh)
CN (1) CN102131188B (zh)
WO (1) WO2011147364A1 (zh)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841922B (zh) * 2012-07-04 2015-09-23 北京国双科技有限公司 数据采集方法及装置
CN103596176B (zh) * 2013-10-18 2016-10-12 北京北方烽火科技有限公司 基于演进分组系统的小规模核心网的鉴权方法及装置
WO2015072788A1 (en) * 2013-11-14 2015-05-21 Samsung Electronics Co., Ltd. Method and apparatus for managing security key in a near fieldd2d communication system
US10206098B2 (en) * 2014-01-07 2019-02-12 Cellco Partnership System and methods of transaction originator identifier for on-line commercial transaction
CN106576237B (zh) * 2014-07-21 2020-10-16 宇龙计算机通信科技(深圳)有限公司 移动管理实体、归属服务器、终端、身份认证系统和方法
US9491618B2 (en) 2014-09-26 2016-11-08 Qualcomm Incorporated Serving network authentication
CN107086908B (zh) * 2016-02-15 2021-07-06 阿里巴巴集团控股有限公司 一种量子密钥分发方法及装置
US10873464B2 (en) 2016-03-10 2020-12-22 Futurewei Technologies, Inc. Authentication mechanism for 5G technologies
US10382206B2 (en) * 2016-03-10 2019-08-13 Futurewei Technologies, Inc. Authentication mechanism for 5G technologies
EP3465978B1 (en) * 2016-05-30 2021-07-07 Telecom Italia S.p.A. Protection of privacy in wireless telecommunication networks
US10516994B2 (en) * 2016-07-17 2019-12-24 Qualcomm Incorporated Authentication with privacy identity
CN106230784B (zh) * 2016-07-20 2020-09-18 新华三技术有限公司 一种设备验证方法及装置
CN106888092B (zh) * 2016-09-12 2019-06-25 中国移动通信有限公司研究院 信息处理方法及装置
CN113923659B (zh) 2016-09-12 2024-02-23 中兴通讯股份有限公司 入网认证方法及装置
CN106330968B (zh) * 2016-10-31 2021-02-26 杭州迪普科技股份有限公司 一种访问设备的身份认证方法及装置
CN106533669B (zh) * 2016-11-15 2018-07-13 百度在线网络技术(北京)有限公司 设备识别的方法、装置和系统
CN108243416B (zh) * 2016-12-27 2020-11-03 中国移动通信集团公司 用户设备鉴权方法、移动管理实体及用户设备
US11792172B2 (en) 2017-05-05 2023-10-17 Nokia Technologies Oy Privacy indicators for controlling authentication requests
US10492056B2 (en) * 2017-06-15 2019-11-26 T-Mobile Usa, Inc. Enhanced mobile subscriber privacy in telecommunications networks
GB201712493D0 (en) * 2017-08-03 2017-09-20 Nchain Holdings Ltd Computer-Implemented system and method
CN109391937B (zh) * 2017-08-04 2021-10-19 华为技术有限公司 公钥的获取方法、设备及系统
CN109391942A (zh) 2017-08-07 2019-02-26 华为技术有限公司 触发网络鉴权的方法及相关设备
EP3738329B1 (en) * 2018-01-12 2024-01-31 Telefonaktiebolaget LM Ericsson (publ) Validation of subscription concealed identifiers in mobile networks
CN108154590A (zh) * 2018-01-18 2018-06-12 南京熊猫电子股份有限公司 基于手机imsi号的道闸控制系统及方法
US11134376B2 (en) * 2018-12-20 2021-09-28 T-Mobile Usa, Inc. 5G device compatibility with legacy SIM
US11228903B2 (en) 2018-12-28 2022-01-18 T-Mobile Usa, Inc. 5G service compatible 4G SIM
CN110536291A (zh) * 2019-01-18 2019-12-03 中兴通讯股份有限公司 一种认证方法、装置和系统
CN112399409A (zh) * 2019-08-16 2021-02-23 华为技术有限公司 一种安全加密的方法及装置
CN110730447B (zh) * 2019-10-18 2022-02-22 中国联合网络通信集团有限公司 一种用户身份保护方法、用户终端和核心网
US20230247436A1 (en) * 2022-01-31 2023-08-03 Apple Inc. MINIMAL CONFIGURATION SYNTHETIC eSIM PROFILES FOR WIRELESS DEVICES

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (zh) * 2008-02-15 2009-08-19 中国移动通信集团公司 组密钥的更新方法、设备及系统
CN101808313A (zh) * 2010-03-09 2010-08-18 华为技术有限公司 获取tmsi的方法、移动台、归属位置寄存器和通信系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI106604B (fi) * 1997-04-16 2001-02-28 Nokia Networks Oy Menetelmä tilaajan identiteetin suojaamiseksi
CA2276872A1 (en) * 1998-08-28 2000-02-28 Lucent Technologies Inc. Method for protecting mobile anonymity
EP1209934A1 (en) * 2000-11-27 2002-05-29 Siemens Aktiengesellschaft Method and apparatus to counter the rogue shell threat by means of local key derivation
EP1873998B1 (en) * 2006-06-27 2018-09-19 Vringo Infrastructure Inc. Identifiers in a communication system
US8347090B2 (en) * 2006-10-16 2013-01-01 Nokia Corporation Encryption of identifiers in a communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (zh) * 2008-02-15 2009-08-19 中国移动通信集团公司 组密钥的更新方法、设备及系统
CN101808313A (zh) * 2010-03-09 2010-08-18 华为技术有限公司 获取tmsi的方法、移动台、归属位置寄存器和通信系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2613581A4 *

Also Published As

Publication number Publication date
EP2613581A4 (en) 2013-12-04
CN102131188A (zh) 2011-07-20
CN102131188B (zh) 2013-12-04
US20130170643A1 (en) 2013-07-04
EP2613581A1 (en) 2013-07-10

Similar Documents

Publication Publication Date Title
WO2011147364A1 (zh) 用户身份信息传输的方法、用户设备、网络侧设备及系统
EP3493502B1 (en) Supplying an iot-device with an authentication key
CN101473668B (zh) 用于对初始信令消息中的原始用户标识进行安全保护的方法和设备
Hussain et al. Insecure connection bootstrapping in cellular networks: the root of all evil
CN106797564B (zh) 请求式服务网络认证方法及装置
KR101263980B1 (ko) 기지국 자가 구성을 위한 방법 및 장치
TWI338489B (en) Asymmetric cryptography for wireless systems
Alezabi et al. An efficient authentication and key agreement protocol for 4G (LTE) networks
US20060059344A1 (en) Service authentication
US10588019B2 (en) Secure signaling before performing an authentication and key agreement
Mun et al. 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA
WO2018053271A1 (en) Unified authentication framework
CN112154624A (zh) 针对伪基站的用户身份隐私保护
Amadeo et al. Securing the mobile edge through named data networking
CN107342860B (zh) 一种实现lte-wlan融合网络接入认证协议的方法
Kanani et al. Hybrid PKDS in 4G using secured DCC
Trimintzios et al. WiFi and WiMAX secure deployments
Cao et al. Unified handover authentication between heterogeneous access systems in LTE networks
Singh et al. Security analysis of lte/sae networks with the possibilities of tampering e-utran on ns3
CN116321158B (zh) 基于证书的本地ue认证
Ahmed Kazi et al. End-to-End Security for Connected Vehicles
Wan et al. Access control protocols with two-layer architecture for wireless networks
Prakash et al. EPMOS based secure mobile communication in LTE/SAE networks
WO2023011702A1 (en) Establishment of forward secrecy during digest authentication
Li et al. Authentication in Wireless Cellular Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11786136

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2011786136

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011786136

Country of ref document: EP