WO2011153852A1 - 空中接口密钥的更新方法、核心网节点及无线接入系统 - Google Patents

空中接口密钥的更新方法、核心网节点及无线接入系统 Download PDF

Info

Publication number
WO2011153852A1
WO2011153852A1 PCT/CN2011/071628 CN2011071628W WO2011153852A1 WO 2011153852 A1 WO2011153852 A1 WO 2011153852A1 CN 2011071628 W CN2011071628 W CN 2011071628W WO 2011153852 A1 WO2011153852 A1 WO 2011153852A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
migration
enhanced
message
core network
Prior art date
Application number
PCT/CN2011/071628
Other languages
English (en)
French (fr)
Inventor
冯成燕
甘露
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP11791844.1A priority Critical patent/EP2571305A4/en
Priority to US13/702,842 priority patent/US8938071B2/en
Priority to JP2013513528A priority patent/JP5774096B2/ja
Priority to CA2801615A priority patent/CA2801615A1/en
Publication of WO2011153852A1 publication Critical patent/WO2011153852A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information

Definitions

  • the present invention relates to the field of wireless communications, and in particular to a SRNC (Serving Radio Network Controller) migration of a wireless communication system
  • SRNC Serving Radio Network Controller
  • HSPA+ is an enhancement of 3GPP HSPA (including HSDPA and HSUPA), providing HSPA operators with a low-complexity, low-cost path from HSPA to LTE (Long Term Evolution).
  • HSPA+ will be a wireless network controller in the system architecture ( Radio Network
  • the function of the Controller (“RNC” for short) is placed on the Node B of the base station to form a completely flattened wireless access network architecture, as shown in Figure 1.
  • the Node B integrated with the full RNC function is Evolved HSPA Node B, or simply referred to as Enhanced Node B (Node B+ ) plague SGSN+ is the SGSN that has been upgraded to support HSPA+ function ( SERVICE GPRS SUPPORT NODE, ⁇ GPRS ( GPRS: General Packet Radio System) support node;) ME+ is a user terminal device capable of supporting HSPA+ function.
  • Evolved HSPA system can use 3GPP Rel-5 and later air interface versions, HSPA for air interface There is no modification of the service.
  • each Node B+ becomes a node equivalent to the RNC, and the Iu-PS interface can directly communicate with the PS CN (Core Network) (such as the SGSN in Figure 1).
  • PS CN Core Network
  • GGSN Gateway GPRS Support Node
  • Iu-PS user plane is terminated in SGSN, if the network supports direct tunneling function, Iu-PS user plane can also be terminated in GGSN (Gateway GPRS Support Node).
  • Evolved HSPA Node B The communication is performed through the Iur interface.
  • Node B+ has the ability to independently network and support complete mobility functions, including inter-system and intra-system handover.
  • K is the root key stored in AuC (Authentication Center) and USIM (UNIVERSAL SUBSCRIBER IDENTITY MODULE), and CK and IK are user equipment and HSS (Home Subscriber Server, home subscriber)
  • AuC Authentication Center
  • USIM UNIVERSAL SUBSCRIBER IDENTITY MODULE
  • CK and IK are user equipment and HSS (Home Subscriber Server, home subscriber)
  • the encryption key and integrity key calculated by K when AKA (Authentication and Key Agreement) is performed which is called the traditional key.
  • RNC encrypts and integrity protects data using traditional air interface keys CK and IK. Since the functions of the RNC are all decentralized to the base station Node B+ in the HSPA+ architecture, the encryption and decryption are performed at the Node B+, and the Node B+ is located in an unsecure environment, and the security is not high.
  • HSPA+ introduces a key hierarchy similar to E-UTRAN (Evolved Universal Terrestrial Radio Access Network), namely UTRAN Key Hierarchyhunt in UTRAN Key Hierarchy
  • the air interface keys CKu and IKu are newly introduced keys of HSPA+, which are generated by the traditional keys CK and ⁇ , and are called enhanced keys, wherein the enhanced key CCu is used to encrypt user plane data and control plane signaling.
  • the enhanced key IKu is used for integrity protection of control plane signaling.
  • SRNC/DRNC is generated due to the introduction of the Iur interface ( Drift
  • Both SRNC and DRNC are logical concepts for a particular UE.
  • the RNC that is directly connected to the CN (Core Network) and controls all resources of the UE (User Equipment) is the SRNC of the UE; the UE is not connected to the CN.
  • the RNC that provides resources only for the UE is the DRNC of the UE.
  • the UE in the connected state must have only one SRNC and can have 0 or more DRNCs.
  • SRNC Relocation refers to the process in which the SRNC of the UE changes from one RNC to another. According to the location of the UE before and after the migration, it can be divided into static migration and accompanying migration.
  • the condition for a static migration is that the UE accesses from one DRNC and only from one DRNC. Since the migration process does not require UE participation, it is also referred to as UE Not Involved migration.
  • the connection of the Iur interface is released, and the Iu interface is migrated.
  • the DRNC becomes the SRNC, as shown in Figure 3.
  • Static migration is caused by soft handoffs because of the Iur interface, so migration begins after all wireless links are linked to the DRNC.
  • the accompanying migration refers to a process in which the UE hard-switches from the SRNC to the target RNC while the Iu interface changes, as shown in FIG. 4 . Since the migration process requires the participation of the UE, it is also called UE-volved (UE Involved) migration.
  • UE Involved UE-volved
  • HSPA+ because Node B+ is in a physically insecure environment, it is vulnerable to malicious attacks and security is threatened.
  • traditional UMTS before and after SRNC migration, the encryption key CK and the integrity key IK are the same, which causes: On the one hand, after a base station is attacked by an attacker, the attacker may derive the security secret of the next hop target base station.
  • a primary object of the present invention is to provide a method for updating an air interface key, a core network node, and a wireless access system, so as to solve the problem that the communication security of the user cannot be caused by the same key during the SRNC migration in the related art. Guarantee issues.
  • a method for updating an air interface key including: receiving, by a core network node, a migration completion indication message of a target radio network controller RNC, where the migration completion indication message is used to indicate a user equipment
  • the UE migrates from the source RNC to the target RNC successfully; the core network node calculates the next mega-enhanced key using the stored legacy key and the current enhanced key; and the core network node sends the next hop enhanced key to the target RNC.
  • the legacy key comprises a legacy integrity key IK and/or a conventional encryption key CK, the enhanced key comprising an enhanced integrity key IKu and/or an enhanced encryption key CKu.
  • the next hop counter network NCC is set in the core network node, and the number of times of calculating the next hop enhanced key for the core network node is counted.
  • the source RNC sends a migration requirement message to the core network node, where the migration requirement message includes the next hop CKu and/or IKu of the source RNC;
  • the network node receives the migration required message, and sends a migration request message to the target RNC, where the migration request message includes the next hop CKu and/or IKu sent by the source RNC.
  • both the migration required message and the migration request message further include information indicated by the network NCC.
  • the step of the source RNC sending the migration requirement message to the core network node comprises: the source RNC placing the next hop IKu in the ⁇ field of the migration required message, and/or placing the next hop CKu in the CK field of the migration required message, Sending to the core network node;
  • the step of the core network node sending the migration request message to the target RNC includes: the core network node placing the next hop IKu sent by the source RNC in the IK field of the migration request message, and/or sending the source RNC One hop CKu is placed in the CK field of the migration request message and sent to the target RNC.
  • the method before the step of receiving, by the core network node, the migration completion indication message of the target RNC, the method further includes: the source RNC sending an enhanced migration request message to the target RNC, where the enhanced migration request message includes the next megacycle of the source RNC and/or IKu.
  • the step of the source RNC transmitting the enhanced migration request message to the target RNC comprises: placing the next hop IKu in the IK field of the enhanced migration request message, and/or placing the next hop CKu in the enhanced migration request The CK field of the message is sent to the target RNC.
  • the method further includes: if the target RNC does not support the enhanced security mode, the CK of the migration request message/enhanced migration request message is The content of the field is used as CK, and the content of the IK field is used as IK. If the target RNC supports the enhanced security mode, the content of the CK field of the migration request message/enhanced migration request message is used as CKu, and the content of the IK field is used as IKu.
  • the method further includes: receiving, by the core network node, a migration request acknowledgement message of the target RNC, and sending a migration command message to the source RNC, where the migration command message includes the network NCC indication
  • the source RNC receives the migration command message, and sends a migration message to the user equipment UE, where the migration message includes information indicated by the network NCC.
  • the source RNC receives the migration command message, and after transmitting the migration message to the user equipment UE, the method further includes: receiving, by the UE, the migration message, determining whether the next hop counter terminal NCC is equal to the network NCC; if yes, the UE uses the pre-corresponding to the terminal NCC.
  • the method for updating the air interface key further comprises: the core network node first attaching to the network at the user equipment UE, or the UE transitioning from the idle mode to the connected mode, or the UE from the evolved universal terrestrial radio access network E-UTRAN or Global mobile communication system GSM network mobile to pass
  • the core network node calculates the current enhanced key according to the stored legacy key; the core network node sends the current enhanced key and/or the calculation
  • the initial next hop enhancement key is given to the serving RNC.
  • CK, Parameter ); ( IK, u, CK'u ) F2 ( IK
  • the method further includes: the serving RNC receiving and storing the current enhanced key and/or the initial The hop enhance key and send a security mode command message to the UE; the UE receives the security mode command message, and calculates the enhanced key using the stored legacy key.
  • the method further includes: the UE calculating the next hop enhanced key by using the legacy key and the enhanced key.
  • a core network node including: a receiving module, configured to receive a migration completion indication message of a target RNC, where the migration completion indication message is used to indicate that the user equipment UE migrates from the source RNC to the target The RNC is successful; the calculation module is configured to: after the receiving module receives the migration completion indication message, calculate the next mega-enhanced key by using the stored traditional key and the current enhanced key; the sending module is set to be the next mega-enhanced key Send to the target RNC.
  • the core network node further includes: a next hop counter network NCC, configured to count the number of times the core network node calculates the next hop enhanced key.
  • the receiving module of the core network node is further configured to: before receiving the migration completion indication message of the target RNC, receive a migration requirement message sent by the source RNC, and the migration requirement message includes a next hop CKu and/or IKu of the source RNC;
  • the sending module is further configured to send a migration request message to the target RNC, where the migration request message includes a next hop CKu and/or IKu sent by the source RNC.
  • a wireless access system including a source RNC, a target RNC, a core network node, and a user equipment UE, where the source RNC is configured to send a migration requirement message to the core network node, where The migration requires a next hop enhanced key carrying the active RNC in the message; Receiving a migration command of the core network node, and sending a migration message to the UE; the target RNC, configured to receive a migration request message sent by the core network node, where the migration request message carries the next mega-enhanced key sent by the active RNC; The core network node sends a migration completion indication message, and receives a migration completion confirmation message of the core network node, where the migration completion confirmation message includes a next i-mega enhanced key of the target RNC; and the core network node is set to receive the migration completion indication of the target RNC.
  • the core network node of the wireless access system includes: a receiving module, configured to receive a migration completion indication message of the target RNC, where the migration completion indication message indicates that the user equipment UE migrates from the source RNC to the target RNC successfully; and the calculation module is set to After receiving the migration completion indication message, the receiving module calculates the next hop enhanced key by using the stored traditional key and the current enhanced key; and the sending module is configured to send the next mega enhanced key to the target RNC.
  • the core network node of the wireless access system further includes: a next hop counter network NCC, configured to count the number of times the core network node calculates the next hop enhanced key.
  • the UE of the radio access system comprises: a next hop counter terminal NCC, which is set to count the number of times the UE calculates the next hop enhanced key.
  • the UE of the wireless access system further includes: a determining module, configured to determine whether the terminal NCC is equal to the network NCC; and a determining module, configured to use the pre-stored CKu corresponding to the terminal NCC if the determining result of the determining module is yes And/or IKu; negation module, set to calculate CKU and/or IKU if the judgment result of the judgment module is no, and increment the corresponding terminal NCC until the terminal NCC is equal to the network NCC.
  • the core network node of the wireless access system generates the next hop enhanced key I Ku and CKu according to the traditional key IK and CK at the core network node when the terminal is initially attached or after the SRNC migration is successfully completed.
  • the source RNC and the target RNC use different enhanced keys I Ku and CKu.
  • the enhanced air interface key used by the next hop target RNC is derived from the core network, after two SRNC migrations, the source RNC cannot know the air interface key of the target RNC after two megabytes. Therefore, even if a base station is attacked or illegally controlled by an attacker, the two users can ensure secure communication after the SRNC migration, thereby ensuring the forward security of the user, thereby improving the communication security of the wireless access system as a whole.
  • FIG. 1 is a schematic diagram of a structure of a radio access network using HSPA+ technology in the related art
  • FIG. 2 is a schematic diagram of a HSPA+ security key hierarchy in the related art
  • FIG. 4 is a schematic diagram of a SRNC companion migration in the related art
  • FIG. 5 is a flow chart showing the steps of an air interface key update method according to an embodiment of the present invention
  • FIG. 7 is a flowchart of an initial air interface key establishment process according to an embodiment of the present invention
  • FIG. 8 is a flowchart of an initial air interface key establishment process according to an embodiment of the present invention
  • FIG. 9 is a flowchart of updating an air interface key when performing SRNC static migration according to an embodiment of the present invention
  • FIG. 9 is a flowchart of updating an air interface key when performing SRNC static migration according to an embodiment of the present invention
  • FIG. 11 is a structural block diagram of a wireless access system according to an embodiment of the present invention
  • SRNC is accompanied by an update flowchart of the air interface key at the time of migration.
  • BEST MODE FOR CARRYING OUT THE INVENTION the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
  • the SRNC migration involved in the UTRAN radio access system involves a core network node (SGSN+ or MSC+), a source RNC (i.e., SRNC), a target RNC, a Node B, and a UE.
  • Node B+ In the wireless access system using HSPA+, Node B+ can be seen as a combination of Node B and RNC, which are one physical entity but still two different logical entities. It should be noted that the Node B+ supporting the enhanced security key hierarchy in the embodiment of the present invention may also be equivalent to the RNC (RNC+) upgraded in the UMTS, and the SRNC and the source RNC (source Node B+) in the embodiment of the present invention are equivalent.
  • the DRNC is equivalent to the target RNC (target Node B+).
  • Step S504 The core network node calculates the next hop enhanced key by using the stored legacy key and the current enhanced key.
  • the traditional key includes a traditional integrity key IK and/or a traditional encryption key CK
  • the enhanced key includes Enhanced integrity key IKu and/or enhanced encryption key CKu.
  • the core network node calculates the next hop enhancement key IKu and/or CKu using the key generation function using the legacy keys IK and/or CK stored at the core network node, and the currently used enhanced keys IKu and/or CKu.
  • Step S506 The core network node sends the next hop enhanced key to the target RNC.
  • the core network node sends IK, u, and CK, u to the target RNC for storage, so that the target RNC is used for the next SRNC migration.
  • the key before and after the migration is not changed when the SRNC is migrated.
  • the core network node sends the updated next hop enhanced key to the target RNC, so that the user equipment performs the next time.
  • the source RNC Used when SRNC is migrated, so that the source RNC and the target RNC use different keys. Moreover, after two SRNC migrations are performed, the source RNC cannot obtain the enhanced key used by the target base station after two hops, thereby ensuring the forward security of the user communication and improving the communication security of the wireless access system.
  • the enhanced key IKu and CKu one or any combination of the following parameters may be used: Serial number SQN Or hidden key AK, user identification (such as international user identification code IMSI, temporary mobile subscriber identity TMSI), service network identity, core network node type.
  • the embodiment of the present invention provides the following key function to calculate each security key, including initial time and
  • ( IK, u, CK'u ) F2 ( IK
  • (IK,u, CK'u ) F2 ( IK
  • IK, u, CK 'u F2 ( IK
  • IKu represents an enhanced integrity key
  • CKu represents an enhanced encryption key
  • IK, u represents a next hop enhanced integrity key, ⁇ ,! ; indicates the encryption key for the next hop enhancement
  • IK, u_old indicates the currently enhanced integrity key
  • CK, u_old indicates the currently enhanced encryption key
  • " indicates cascading
  • Parameter indicates the parameter.
  • the above key function can be used in all embodiments of the present invention. Of course, those skilled in the art can also use other suitable key calculation methods in the actual situation, which is not limited by the present invention.
  • the processing of the next megabit enhanced key by the core network node is generally divided into two cases. One is that the core network node initially sends the next hop enhanced key IK, u/CK, u to the SRNC, for the first time.
  • the source RNC sends the next hop enhanced key to the target RNC.
  • the target RNC and the UE respectively use the next hop enhanced key as the IKu and CKu.
  • the other is that the core network node does not send the initial message to the SRNC.
  • Next mega enhanced Key when the first SRNC is migrated, the source RNC sends the current enhanced key IKu/CKu to the target RNC, and the target RNC and the UE respectively use the keys IKu and CKu to secure the communication.
  • the target RNC and the UE again use the next mega-enhanced key IK'u/CK'u.
  • Step S702 A core network node (such as SGSN+ or MSC+) is stored according to IK and CK calculates the enhanced key IKu/CKu.
  • the triggering condition of this step is: when the UE first attaches to the network, or when the UE transitions from the idle mode to the connected mode, or the UE moves from the evolved universal terrestrial radio access network E-UTRAN or GSM to the universal terrestrial radio access network UTRAN At the time, or when the user equipment moves from the traditional UTRAN (which does not support HSPA+ security) to the enhanced UTRAN.
  • the security mode command flow triggered when the UE transitions from the idle mode to the connected mode if a valid enhanced key I Ku/CKu is also stored at the SGSN+ or MSC/VLR+, this step is optional, and the stored enhanced key can be directly used. Without having to recalculate.
  • Step S704 The core network node calculates the next hop enhanced key IK, u/CK, u according to the legacy integrity key IK, the encryption key CK, and the enhanced keys IKu and CKu calculated in step S702.
  • Step S706 The core network node sends a security mode command message to the SRNC, where the message carries the enhanced keys IKu and CKu, and/or the next hop enhanced key IK, u/CK, u.
  • the security mode command message may also carry one of the following parameters or any combination thereof: user equipment security capability, key set identifier, selected integrity algorithm set, and encryption algorithm set.
  • the delivery of the next hop enhanced key IK, u/CK, and u is optional.
  • Step S708 After receiving the security mode command message, the SRNC stores the received enhanced key.
  • Step S710 The SRNC sends a security mode command message to the UE.
  • the security mode command message may carry the message verification code calculated by IKu, and may also carry one of the following parameters or any combination thereof: user equipment security capability, key set identifier, selected integrity algorithm, and encryption algorithm.
  • Step S714 The UE calculates the next hop enhanced key IK, u/CK, u according to the legacy encryption key CK, the integrity key IK, and the enhanced keys IKu and CKu calculated in step S712.
  • Step S716 The UE uses the IKu to verify the received security mode command message.
  • Step S718 If the security mode command message is successfully verified, the UE sends a security mode complete message to the SRNC, where the message carries the message verification code calculated by the IKu, or the UE may simultaneously encrypt the security mode complete message by using CKu.
  • Step S720 The SRNC verifies the received security mode completion message by using IKu; or, first use
  • Step S722 If the security mode complete message verification is successful, the SRNC sends a security mode complete message to the core network node, where the message may carry parameters: the selected integrity algorithm and/or the encryption algorithm. Thereafter, the UE and the NodeB+ can start the encryption and decryption operation according to the above key.
  • the core network node maintains a next hop counter network NCC for counting the number of times of calculating the next mega enhanced key to synchronize with the user side key.
  • the initial value of the network NCC is 0; when the next hop enhanced key is first calculated in step S704, the corresponding network NCC Is 1.
  • the security mode command message may also carry the parameter network NCC and send it to the SRNC, which is received and stored by the SRNC.
  • the UE also maintains a next hop counter terminal NCC for counting the number of times the UE calculates the next hop enhanced key to synchronize with the network side key, and the initial value is 0; when the UE first calculates the next mega enhanced key Key, at this time, the corresponding terminal NCC value is 1.
  • the UE calculates the next hop enhanced key and increments the corresponding terminal NCC until the terminal NCC is equal to the network NCC, so that the UE and the target RNC use the secret.
  • the keys are the same.
  • the NCC to synchronize the network side and the user side key, the consistency between the network side and the user side key is effectively ensured.
  • Fig. 8 there is shown a flowchart of updating an air interface key when performing SRNC companion migration according to the present embodiment.
  • the message interaction between the SRNC and the target RNC needs to be relayed through the core network node CNN+ (SGSN+ or MSC+).
  • Step S802 The source RNC (ie, SRNC) decides to perform SRNC migration.
  • the triggering of the decision may be: the source RNC receives the measurement report of the UE, or receives an uplink signaling transmission indication sent by the target RNC, requesting cell update or URA update, and the like.
  • Step S804 The source RNC sends a migration required message to the core network node. If the source RNC connects two CNN+ nodes at the same time, the source RNC sends a migration requirement message to the two CNN+ nodes simultaneously; if the source RNC and the target RNC are located under two different CNN+ nodes, the message needs to pass through the two CNN+ nodes. Transit.
  • the migration needs to carry parameters in the message: the next hop enhanced integrity key IK, u, and/or the next hop enhanced encryption key CK, u.
  • one or any combination of the following parameters can be carried: user equipment security capabilities, user-supported encryption algorithms, user-supported integrity algorithms, selected encryption algorithms, selected integrity algorithms, and enhanced air interfaces.
  • the security material is carried in a transparent container from the source RNC to the target RNC.
  • the source RNC considers the next hop enhanced integrity key IK'u as an enhanced integrity key, and the next hop enhanced encryption key CK,u as the enhanced encryption key CKu.
  • the migration required by the source RNC needs to carry the parameters in the message: Enhanced Integrity Key IKu, and/or Enhanced Encryption Key CKu.
  • the source RNC places the next hop enhancement keys IK, u and CK, u in the IK and CK fields of the migration required message, respectively.
  • the network entity supporting the enhanced security function coexists with the network entity supporting only the traditional security.
  • the UE migrates from a SRNC+ that supports enhanced security functions to a non-enhanced security function. The scenario of the target RNC.
  • Step S806 The core network node sends a migration request message to the target RNC, where the message carries the next mega-enhanced key ⁇ ' ⁇ and CK'u, and/or the network NCC.
  • the network side core network node maintains a next hop counter network NCC. Therefore, the migration request message may also carry network NCC information.
  • the network NCC information is sent to the target RNC to conveniently achieve the consistency of the key between the target RNC and the user.
  • the core network node places CK'u in the CK field of the migration request message, and/or places IK'u in the field of the migration request message, and sends it to the target RNC.
  • the source RNC may directly send a migration request message to the target RNC.
  • the migration request message is referred to as an enhanced migration request message.
  • the enhanced migration request message carries the next hop enhanced integrity key IK, u, and/or the next hop enhanced encryption key CK, u, and the source RNC will next mega enhanced key ⁇ , ⁇ and CK, u are placed in the IK and CK fields of the migration required message and sent to the target RNC.
  • Step S808 The target RNC stores the received key. If the target RNC supports enhanced security, the target RNC uses the value of the IK field in the received message as the enhanced key IKu, the value of the CK field as the enhanced key CCu; if the target RNC does not support enhanced security, the target RNC The value of the IK field in the received message is taken as the value of the legacy key IK, CK field as the legacy key CK.
  • Step S810 The target RNC sends a migration request acknowledgement message to the core network node. Before the message is sent, the target RNC and the core network node can establish a new Iu payload, and allocate resources such as RRC (Radio Resource Control) connection resources and radio links to the UE.
  • RRC Radio Resource Control
  • the message needs to transit through the two CNN+ nodes.
  • the migration confirmation message carries the next hop counter network NCC information.
  • the core network node sends a migration command message to the source RNC.
  • the migration command message carries the next hop counter network NCC information of the core network node.
  • S814 The source RNC sends a migration message to the UE, that is, a physical channel reconfiguration message or
  • Step S 816 If the UE supports enhanced security, the UE updates the enhanced integrity key IKu and/or the encryption key CKu according to the same algorithm as the network side. In this step, the UE sets the next hop counter terminal NCC, and the UE receives the network NCC, and determines whether the terminal NCC corresponding to the currently activated enhanced key is equal to the network NCC. If the two are equal, the UE directly uses the enhanced integrity saved by itself.
  • Step S818 The UE sends a physical channel reconfiguration complete message or a UTRAN mobility information acknowledgement message to the target RNC.
  • the above message may be integrity protected with the updated integrity key IKu, or both the integrity and encryption protection of the message with the updated integrity key IKu and the encryption key CKu.
  • the user equipment security capability parameter may also be carried in the message.
  • Step S820 The target RNC performs security verification on the message with the updated integrity key IKu and/or the encryption key CKu.
  • Step 4 S822: The core network node calculates the next hop enhanced key IK, u, CK, u based on IK, CK and the current enhanced keys IKu, CKu.
  • the core network node is The network NCC is incremented before or after the next hop enhanced key IK, u, CK'u is calculated.
  • Step S824 The core network node sends a migration completion confirmation message to the target RNC, where the message carries the next hop enhanced key IK'u, C'Ku, and/or the associated network NCC.
  • Step S826 The target RNC stores the received next hop enhanced key IK, u, CK'u, and/or the associated network NCC for use in the next SRNC migration.
  • Step S828 The core network node (SGSN+ or MSC/VLR+) releases the Iu interface with the source RNC.
  • the security operation in the embodiment shown in FIG. 8 is also applicable to the enhanced SRNC migration process. In the enhanced SRNC migration process, the source RNC communicates directly with the target RNC without passing through the core network node.
  • the message shown in steps S804 and S806 in FIG. 8 is replaced by the source RNC sending an enhanced migration request message to the target RNC, and the message shown in steps S810 and S812 in FIG. 8 is replaced by the target RNC transmitting an enhanced migration response message to the source RNC. .
  • the messages shown in steps S820, S824 in FIG. 8 are replaced with an enhanced migration completion request message and an enhanced migration completion response message between the target RNC and the core network node, respectively.
  • the parameters carried in the message, and the operations of other steps are exactly the same, and will not be mentioned here.
  • the security operation of the SRNC migration defined by the traditional UMTS is performed, that is, the source RNC will use the currently used enhancement.
  • the key IKu and/or CKu is sent to the target RNC, and the UE and the target RNC directly use the current enhanced key.
  • the second SRNC migration is performed, the above key update process is used.
  • the target RNC may initiate an internal SRNC migration. In this case, both the source RNC and the target RNC are the same SRNC. In this way, the purpose of forward security is achieved. Referring to FIG.
  • Step S902 The UE sends a URA update message, or a cell update message, or a measurement report message to the UTRAN.
  • Step S904 The target RNC sends an uplink signaling transmission indication message to the source RNC of the UE by receiving the URA update message or the cell update message of the UE, or the measurement report message.
  • Step S906 The source RNC (ie, SRNC) decides to perform SRNC migration.
  • Step S908 The source RNC sends a migration requirement message to the core network node. The message carries the next hop enhanced key IK, u and CK, u, and can also carry the network NCC.
  • Step S910 The core network node sends a migration request message to the target RNC, where the message carries the next mega enhanced key ⁇ ' ⁇ and CK'u, and/or the network NCC.
  • the network side core network node maintains a next hop counter network NCC. Therefore, the migration request message may also carry network NCC information.
  • Step S912 The target RNC stores the received key.
  • Step S914 The target RNC sends a migration request acknowledgement message to the core network node. Before the message is sent, the target RNC and the core network node can establish a new Iu payload, and allocate resources such as RRC (Radio Resource Control) connection resources and radio links to the UE.
  • the migration confirmation message carries the next hop counter network NCC information.
  • Step S916 The core network node sends a migration command message to the source RNC.
  • the migration command message carries the next hop counter network NCC information of the core network node.
  • Step S918 The source RNC sends a migration commit message to the target RNC.
  • Step S920 The target RNC sends a migration detection message to the core network node.
  • Step S922 The target RNC sends a cell update confirmation message, or a URA update confirmation message, or a RAN mobility information message to the UE.
  • the message carries indication information of the security capabilities of the target RNC.
  • the foregoing message carries the next hop counter network NCC information.
  • Step S924 If the UE supports enhanced security, the UE updates the enhanced integrity key IKu and/or the encryption key CCu according to the same algorithm as the network side.
  • the UE sets the next hop counter terminal NCC, and the UE receives the network NCC, and determines whether the terminal NCC corresponding to the currently activated enhanced key is equal to the network NCC. If the two are equal, the UE directly uses the enhanced integrity saved by itself. Key IKu and/or enhanced encryption key CCu; If the network NCC is greater than the terminal NCC, the UE calculates the enhanced key IKu/CKu and increments the corresponding terminal NCC until the terminal NCC is equal to the network NCC.
  • Step S926 The UE sends a UTRAN mobility information acknowledgement message or a RAN mobility information acknowledgement message to the target RNC.
  • the above message may be integrity protected with the updated integrity key IKu, or both the integrity and encryption protection of the message with the updated integrity key IKu and the encryption key CKu.
  • the user equipment security capability parameter may also be carried in the message.
  • Step S928 The target RNC performs security verification on the message with the updated integrity key IKu and/or the encryption key CKu. If the target RNC successfully verifies the message sent by the UE, the target RNC sends a migration completion message to the core network node (SGSN+ or MSC/VLR+), where the message carries information indicating that the migration is completed to the core network node, and may also have network NCC information.
  • the core network node SGSN+ or MSC/VLR+
  • Step S930 The core network node calculates the next hop enhanced key IK, u, CK, u based on IK, CK and the current enhanced keys IKu, CKu. Optionally, if the network side maintains a next hop counter network NCC, the core network node increments the network NCC before or after calculating the next hop enhanced key IK, u, CK'u.
  • Step S932 The core network node sends a migration completion confirmation message to the target RNC, where the message carries the next hop enhanced key IK, u, CK'u, and/or the associated network NCC.
  • Step S934 The target RNC stores the received next hop enhanced key IK, u, CK'u, and/or the associated network NCC for use in the next SRNC migration.
  • Step S936 The core network node (SGSN+ or MSC+) releases the Iu interface with the source RNC. The release of the Iu interface between the core network node (SGSN+ or MSC/VLR+) and the source RNC may also occur before step S930. It should be noted that all the foregoing embodiments are also applicable to the internal migration of the SRNC, that is, the scenario where the source RNC and the target RNC are the same RNC. Referring to FIG.
  • a structural block diagram of a core network node including: a receiving module 1002, configured to receive a migration completion indication message of a target RNC, where the migration completion indication message is used to indicate that the UE is from a source The RNC is successfully migrated to the target RNC; the calculating module 1004 is configured to: after the receiving module 1002 receives the migration completion indication message, calculate the next hop enhancement key by using the stored legacy key and the current enhanced key; the sending module 1006 is set to The next hop enhanced key is sent to the target RNC.
  • the core network node in this embodiment may further include: a next hop counter network NCC, configured to count the number of times the core network node calculates the next hop enhanced key.
  • the receiving module 1002 is further configured to: before receiving the migration completion indication message of the target RNC, receive a migration requirement message sent by the source RNC, where the migration requirement message includes a next hop CK'u and/or IK'u of the source RNC;
  • the sending module 1006 is further configured to send a migration request message to the target RNC, where the migration request message includes a next hop CK'u and/or IK'u sent by the source RNC.
  • FIG. 11 a block diagram of a wireless access system according to an embodiment of the present invention is shown, including: a source RNC 1102, a target RNC 1104, a core network node 1106, and a user equipment UE 1108.
  • the source RNC 1102 is configured to send a migration required message to the core network node 1106, where the migration needs to carry the next mega-enhanced key of the active RNC 1102; receive the migration command of the core network node 1106, and send a migration message to the UE 1108.
  • the target RNC 1104 is configured to receive a migration request message sent by the core network node 1106, where the migration request message carries a next hop enhanced key sent by the active RNC 1102, and send a migration completion indication message to the core network node 1106, and receive the core.
  • the migration completion confirmation message of the network node 1106 includes the next mega enhanced key of the target RNC 1104.
  • the core network node 1106 is configured to receive the migration complete indication message of the target RNC 1104, calculate a next hop enhanced key, and send the acknowledgement message to the target RNC 1104.
  • the user equipment UE1108 is configured to synchronize its own enhanced key according to the migration message sent by the source RNC 1102.
  • the core network node 1106 includes: a receiving module 11062, configured to receive a migration completion indication message of the target RNC 1104, the migration completion indication message indicating that the UE1108 is successfully migrated from the source RNC 1102 to the target RNC 1104; and the calculation module 11064 is configured to be in the receiving module 11062.
  • the next hop enhancement key is calculated using the stored legacy key and the current enhanced key; the sending module 11066 is configured to send the next hop enhanced key to the target RNC 1104.
  • the core network node 1106 further includes: a next hop counter network NCC, configured to count the number of times the core network node 1106 calculates the next mega enhanced key.
  • the UE1108 includes: a next hop counter terminal NCC, which is set to count the number of times the UE 1108 calculates the next hop enhanced key.
  • the UE1108 further includes: a determining module 11082, configured to determine whether the terminal NCC is equal to the network NCC; and a determining module 11084, configured to use the pre-stored CKu and/or corresponding to the terminal NCC if the determining result of the determining module 11082 is YES.
  • the IKu; negation module 11086 is configured to calculate CKu and/or IKu if the judgment result of the determination module 11082 is negative, and increment the corresponding terminal NCC until the terminal NCC is equal to the network NCC.
  • FIG. 12 there is shown a flowchart of updating an air interface key when performing SRNC companion migration according to the present embodiment.
  • Step S 1202 The source RNC (ie, SRNC) decides to perform SRNC migration.
  • the triggering of the decision may be: the source RNC receives the measurement report of the UE, or receives an uplink signaling transmission indication sent by the target RNC, requesting cell update or URA update, and the like.
  • Step S1204 The source RNC sends an enhanced migration request message to the target RNC, where the message carries the next mega enhanced key ⁇ , ⁇ and CK, u, and/or network NCC. .
  • the enhanced migration request message carries parameters: Next hop enhanced integrity key IK, u, and / Or the next hop enhanced encryption key CK, u.
  • one or any combination of the following parameters can be carried: user equipment security capabilities, user-supported encryption algorithms, user-supported integrity algorithms, selected encryption algorithms, selected integrity algorithms, and enhanced air interfaces.
  • the security material is carried in a transparent container from the source RNC to the target RNC.
  • the source RNC considers the next hop enhanced integrity key IK'u as an enhanced integrity key, and the next hop enhanced encryption key CK,u as the enhanced encryption key CKu.
  • the migration required by the source RNC needs to carry the parameters in the message: Enhanced Integrity Key IKu, and/or Enhanced Encryption Key CKu.
  • the source RNC places the next hop enhancement keys IK'u and CK, u in the IK and CK fields of the enhanced migration request message, respectively.
  • the network entity supporting the enhanced security function coexists with the network entity supporting only the traditional security.
  • the UE migrates from a SRNC+ that supports enhanced security functions to a non-enhanced security function. The scenario of the target RNC.
  • Step S 1206 The target RNC stores the received key. If the target RNC supports enhanced security, the target RNC uses the value of the IK field in the received message as the value of the enhanced key IKu, CK field as the enhanced key CCu; if the target RNC does not support enhanced security, the target RNC The value of the IK field in the received message is taken as the value of the legacy key IK, CK field as the legacy key CK.
  • Step S1208 The target RNC sends an enhanced migration response message to the source RNC.
  • the target RNC Before the message is sent, the target RNC allocates resources such as RRC (Radio Resource Control) connection resources and radio links to the UE.
  • the enhanced migration response message carries the next hop counter network NCC information.
  • the physical channel reconfiguration message or the UTRAN mobility information message is carried in the foregoing Next hop counter network NCC information.
  • Step S1212 If the UE supports enhanced security, the UE updates the enhanced integrity key IKu and/or the encryption key CKu according to the same algorithm as the network side.
  • the UE sets the next hop counter terminal NCC, and the UE receives the network NCC, and determines whether the terminal NCC corresponding to the currently activated enhanced key is equal to the network NCC. If the two are equal, the UE directly uses the enhanced integrity saved by itself. Key IKu and/or enhanced encryption key CCu; If the network NCC is greater than the terminal NCC, the UE calculates the enhanced key IKu/CKu and increments the corresponding terminal NCC until the terminal NCC is equal to the network NCC.
  • Step S1214 The UE sends a physical channel reconfiguration complete message or a UTRAN mobility information acknowledgement message to the target RNC.
  • the above message may be integrity protected with the updated integrity key IKu, or both the integrity and encryption protection of the message with the updated integrity key IKu and the encryption key CKu.
  • the user equipment security capability parameter may also be carried in the message.
  • Step S 1216 The target RNC performs security verification on the message with the updated integrity key IKu and/or the encryption key CKu. If the target RNC successfully verifies the message sent by the UE, the target RNC sends an enhanced migration completion request message to the core network node (SGSN+ or MSC/VLR+), where the message carries information indicating that the migration is completed to the core network node, optionally, There can also be network NCC information.
  • the core network node SGSN+ or MSC/VLR+
  • Step 4 S1218: The core network node calculates the next hop enhanced key IK, u, CK, u based on IK, CK and the current enhanced keys IKu, CKu. Optionally, if the network side maintains a next hop counter network NCC, the core network node increments the network NCC before or after calculating the next hop enhanced key IK, u, CK'u.
  • Step S1220 The core network node sends an enhanced migration complete request message to the target RNC, the message carrying the next hop enhanced key IK'u, CKu, and/or the associated network NCC.
  • Step S 1222 The target RNC stores the received next hop enhanced key IK, u, CK'u, and/or the associated network NCC for use in the next SRNC migration.
  • Step S 1224 The core network node (SGSN+ or MSC/VLR+) releases the Iu interface with the source RNC.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

空中接口密钥的更新方法、 核心网节点及无线接入系统 技术领域 本发明涉及无线通信领域, 具体而言, 涉及一种无线通信系统的 SRNC ( Serving Radio Network Controller, 服务无线网络控制器) 迁移时的空中接 口密钥的更新方法、 核心网节点及无线接入系统。 背景技术
3GPP ( 3rd Generation Partnership Project , 第三代合作伙伴计划) 在 Release7 中 采用 了 正交频分复用 ( Orthogonal Frequency Division Multiplexing,简称 "OFDM" )和多输入多输出( Multiple-Input Multiple-Output, 简称 " MIMO" ) 技术完成 HSDPA ( High Speed Downlink Packet Access, 高 速下行链路分组接入 )和 HSUPA ( High Speed Uplink Packet Access, 高速上 行链路分组接入) 的未来演进道路 HSPA+。 HSPA+是 3GPP HSPA (包括 HSDPA和 HSUPA ) 的增强技术, 为 HSPA运营商提供低复杂度、 低成本的 从 HSPA向 LTE ( Long Term Evolution, 长期演进 ) 平滑演进的途径。 相比较于 HSPA, HSPA+在系统架构上将无线网络控制器( Radio Network
Controller, 简称 "RNC" ) 的功能下放到基站节点 B ( Node B ), 形成完全扁 平化的无线接入网络架构,如图 1所示。此时称集成了完全 RNC功能的 Node B为 Evolved HSPA Node B , 或者简称为增强节点 B ( Node B+ )„ SGSN+为 进行了升级能支持 HSPA+功能的 SGSN ( SERVICE GPRS SUPPORT NODE, 月艮务 GPRS ( GPRS: General Packet Radio System, 通用分组无线系统)支持 节点;)。 ME+为能支持 HSPA+功能的用户终端设备。 演进的 HSPA系统能够 使用 3GPP Rel-5和以后的空中接口版本,对空中接口的 HSPA业务没有任何 修改。 釆用这种方案后, 每个 Node B+都成为一个相当于 RNC的节点, 具有 Iu-PS接口能够直接与 PS CN ( Core Network, 核心网)(如图 1中的 SGSN 和 GGSN ) 连接, Iu-PS用户面在 SGSN终结, 其中如果网络支持直通隧道 功能, Iu-PS用户面也可以在 GGSN( Gateway GPRS Support Node,网关 GPRS 支持节点) 终结。 演进的 HSPA Node B之间的通信通过 Iur接口执行。 Node B+具有独立组网的能力, 并支持完整的移动性功能, 包括系统间和系统内切 换。 由于扁平化后, 用户面数据可以不经过 RNC, 直接到达 GGSN, 这意味 着用户平面的加密和完整性保护功能必须前移至 Node B+。 目前, 爱立信提 出了一种 HSPA+安全密钥层次结构, 如图 2所示。 其中, K ( Key, 才艮密钥)、 CK ( Ciphering Key, 加密密钥) 和 IK ( Integrity Key, 完整性密钥) 的定义 与 UMTS ( Universal Mobile Telecommunications System, 通用移动通信系统 ) 中完全一致, 即 K是存储于 AuC ( Authentication Center,鉴权中心)和 USIM ( UNIVERSAL SUBSCRIBER IDENTITY MODULE, 通用订阅者身份模块) 中的根密钥, CK和 IK是用户设备与 HSS ( Home Subscriber Server, 归属用 户月艮务器 )进行 AKA ( Authentication and Key Agreement, 认证和密钥十办定 ) 时由 K计算出的加密密钥和完整性密钥, 称为传统密钥。 在 UMTS中, RNC 使用传统的空中接口密钥 CK 和 IK 对数据进行加密和完整性保护。 由于 HSPA+架构中, 将 RNC的功能全部下放到基站 Node B+, 则加解密都需在 Node B+处进行, 而 Node B+位于不安全的环境中,安全性不高。 因此 HSPA+ 引入了一个类似、于 E-UTRAN ( Evolved Universal Terrestrial Radio Access Network, 演进的通用陆地无线接入网络)的密钥层次, 即 UTRAN密钥层次 ( UTRAN Key Hierarchy )„ 在 UTRAN密钥层次结构中, 空中接口密钥 CKu 和 IKu是 HSPA+新引入的密钥, 由传统密钥 CK和 ΙΚ推导生成, 称为增强 密钥, 其中增强密钥 CKu用于加密用户面数据和控制面信令, 增强密钥 IKu 用于对控制面信令进行完整性保护。 在 WCDMA系统中, 由于 Iur接口的引入而产生了 SRNC/DRNC ( Drift
RNC, 漂移 RNC )的概念。 SRNC和 DRNC都是对于某一个具体的 UE的逻 辑概念。 简单的说, 对于某一个 UE, 其直接与 CN ( Core Network, 核心网) 相连, 并对 UE ( User Equipment, 用户设备) 的所有资源进行控制的 RNC 为该 UE的 SRNC; UE与 CN没有连接, 仅为 UE提供资源的 RNC为该 UE 的 DRNC。 处于连接状态的 UE必须而且只能有一个 SRNC, 可以有 0个或 者多个 DRNC。
WCDMA系统中, SRNC迁移( SRNC Relocation )指 UE的 SRNC从一 个 RNC变成另一个 RNC的过程。 才艮据发生迁移前后 UE所处位置的不同, 可以分为静态迁移和伴随迁移两种情况。 发生静态迁移的条件是 UE从一个 DRNC,而且只从一个 DRNC中接入。 由于迁移过程不需要 UE 的参与, 所以也称之为 UE 不涉及的 (UE Not Involved ) 迁移。 发生迁移后, Iur接口的连接被释放, Iu接口发生迁移, 原 DRNC变成 SRNC, 如图 3所示。 静态迁移是软切换时引起的, 因为 Iur接 口, 所以迁移在所有的无线链路都链接到 DRNC后才开始。 伴随迁移指 UE从 SRNC硬切换到目标 RNC, 同时 Iu接口发生变化的 过程, 如图 4所示。 由于迁移过程需要 UE的参与, 所以也称之为 UE涉及 的 (UE Involved ) 迁移。 在 HSPA+中, 由于 Node B+处于物理不安全的环境中, 容易受到恶意攻 击, 安全性受到威胁。 而传统 UMTS中, SRNC迁移前后, 加密密钥 CK和 完整性密钥 IK相同, 这会造成: 一方面, 某个基站被攻击者攻破后, 攻击 者可能推导出下一跳目标基站的安全密钥; 另一方面, 若密钥泄漏或者被攻 击者非法获取, 则攻击者可以一直监听用户的通信, 也可以伪造用户与网络 之间的数据传输, 这样都会导致用户的通信安全不能够被保障。 发明内容 本发明的主要目的在于提供一种空中接口密钥的更新方法、 核心网节点 及一种无线接入系统, 以解决相关技术中因为 SRNC迁移时密钥相同而导致 用户的通信安全不能够保障问题。 才艮据本发明的一个方面, 提供了一种空中接口密钥的更新方法, 包括: 核心网节点接收到目标无线网络控制器 RNC 的迁移完成指示消息, 该迁移 完成指示消息用于指示用户设备 UE从源 RNC迁移到所述目标 RNC成功; 核心网节点使用存储的传统密钥和当前增强密钥计算下一兆增强密钥; 核心 网节点将下一跳增强密钥发送给目标 RNC。 优选地,传统密钥包括传统完整性密钥 IK和 /或传统加密密钥 CK, 增强 密钥包括增强完整性密钥 IKu和 /或增强加密密钥 CKu。 优选地, 在核心网节点中设置下一跳计数器网络 NCC, 对核心网节点计 算下一跳增强密钥的次数计数。 优选地, 在核心网节点接收到目标 RNC的迁移完成指示消息步骤之前, 还包括:源 RNC向核心网节点发送迁移需要消息,迁移需要消息包括源 RNC 的下一跳 CKu和 /或 IKu; 核心网节点接收迁移需要消息, 并向目标 RNC发 送迁移请求消息, 迁移请求消息包括源 RNC发送的下一跳 CKu和 /或 IKu。 优选地, 迁移需要消息和迁移请求消息均还包括网络 NCC指示的信息。 优选地, 源 RNC向核心网节点发送迁移需要消息的步骤包括: 源 RNC 将下一跳 IKu置于迁移需要消息的 ΙΚ字段, 和 /或将下一跳 CKu置于迁移需 要消息的 CK字段, 向核心网节点发送; 核心网节点向目标 RNC发送迁移请 求消息的步骤包括: 核心网节点将源 RNC发送的下一跳 IKu置于迁移请求 消息的 IK字段,和 /或将源 RNC发送的下一跳 CKu置于迁移请求消息的 CK 字段, 向目标 RNC发送。 优选地, 在核心网节点接收到目标 RNC的迁移完成指示消息步骤之前, 还包括: 源 RNC向目标 RNC发送增强的迁移请求消息, 增强的迁移请求消 息包括源 RNC的下一兆 CKu和 /或 IKu。 优选地, 源 RNC向目标 RNC发送增强的迁移请求消息的步骤包括: 源 RNC将下一跳 IKu置于增强的迁移请求消息的 IK字段, 和 /或将下一跳 CKu 置于增强的迁移请求消息的 CK字段, 向目标 RNC发送。 优选地, 在核心网节点向目标 RNC发送迁移请求消息 /增强的迁移请求 消息的步骤之后, 还包括: 若目标 RNC 不支持增强的安全模式, 则将迁移 请求消息 /增强的迁移请求消息的 CK字段的内容作为 CK, IK字段的内容作 为 IK使用; 若目标 RNC支持增强的安全模式, 则将迁移请求消息 /增强的迁 移请求消息的 CK字段的内容作为 CKu , IK字段的内容作为 IKu使用。 优选地, 在核心网节点向目标 RNC 发送迁移请求消息的步骤之后, 还 包括: 核心网节点接收目标 RNC的迁移请求确认消息, 并向源 RNC发送迁 移命令消息, 迁移命令消息包括网络 NCC指示的信息; 源 RNC接收迁移命 令消息,向用户设备 UE发送迁移消息,迁移消息包括网络 NCC指示的信息。 优选地, 源 RNC接收迁移命令消息, 向用户设备 UE发送迁移消息步骤 之后, 还包括: UE接收迁移消息, 判断下一跳计数器终端 NCC是否等于网 络 NCC; 若是, 则 UE使用终端 NCC对应的预先存储的 IKu和 /或 CKu; 以 及, 若否, 则 UE计算 IKu和 /或 CKu, 并递增相对应的终端 NCC, 直到终 端 NCC等于网络 NCC。 优选地, 空中接口密钥的更新方法还包括: 核心网节点在用户设备 UE 首次附着到网络, 或者 UE从空闲模式转换到连接模式, 或者 UE从演进的 通用陆地无线接入网络 E-UTRAN或全球移动通信系统 GSM网络移动到通 用陆地无线接入网络 UTRAN, 或者 UE 从传统的 UTRAN 移动到增强的 UTRAN 时, 核心网节点才艮据存储的传统密钥计算当前增强密钥; 核心网节 点发送当前增强密钥和 /或计算的初始下一跳增强密钥给服务 RNC。 优选地, 初始下一跳增强密钥由核心网节点通过以下公式, 根据存储的 传统密钥和计算的当前增强密钥计算得到: (IKu , CKu ) = F1 ( IK||CK, Parameter ); ( IK,u, CK'u ) = F2 ( IK||CK, IKu||CKu ); 其中, Fl和 F2表示 密钥函数, IK表示传统完整性密钥, CK表示传统加密密钥, IKu表示当前 增强完整性密钥, CKu表示当前增强加密密钥, IK,u表示初始下一跳增强完 整性密钥, CK,u表示初始下一兆增强加密密钥, "II" 表示级联, Parameter 表示参数。 优选地,在核心网节点发送当前增强密钥和 /或计算的初始下一跳增强密 钥给服务 RNC 步骤之后, 还包括: 服务 RNC接收并存储当前增强密钥和 / 或计算的初始下一跳增强密钥, 并向 UE发送安全模式命令消息; UE接收安 全模式命令消息, 使用存储的传统密钥计算增强密钥。 优选地, 在 UE接收安全模式命令消息, 使用存储的传统密钥计算增强 密钥步骤之后, 还包括: UE使用传统密钥和增强密钥计算下一跳增强密钥。 根据本发明的另一方面, 还提供了一种核心网节点, 包括: 接收模块, 设置为接收目标 RNC 的迁移完成指示消息, 该迁移完成指示消息用于指示 用户设备 UE从源 RNC迁移到目标 RNC成功; 计算模块, 设置为在接收模 块接收到迁移完成指示消息后, 使用存储的传统密钥和当前增强密钥计算下 一兆增强密钥; 发送模块, 设置为将下一兆增强密钥发送给目标 RNC。 优选地, 该核心网节点还包括: 下一跳计数器网络 NCC, 设置为对核心 网节点计算下一跳增强密钥的次数计数。 优选地, 该核心网节点的接收模块, 还设置为在接收目标 RNC 的迁移 完成指示消息之前, 接收源 RNC 发送的迁移需要消息, 迁移需要消息包括 源 RNC的下一跳 CKu和 /或 IKu; 发送模块, 还设置为向目标 RNC发送迁 移请求消息, 迁移请求消息包括源 RNC发送的下一跳 CKu和 /或 IKu。 根据本发明的另一方面, 还提供了一种无线接入系统, 包括源 RNC、 目 标 RNC、 核心网节点和用户设备 UE, 其中, 源 RNC, 设置为向核心网节点 发送迁移需要消息, 该迁移需要消息中携带有源 RNC 的下一跳增强密钥; 接收核心网节点的迁移命令, 并向 UE发送迁移消息; 目标 RNC, 设置为接 收核心网节点发送的迁移请求消息, 该迁移请求消息中携带有源 RNC 发送 的下一兆增强密钥; 以及向核心网节点发送迁移完成指示消息, 接收核心网 节点的迁移完成确认消息, 该迁移完成确认消息包括目标 RNC 的下一 i?兆增 强密钥; 核心网节点, 设置为接收目标 RNC 的迁移完成指示消息, 计算下 一跳增强密钥, 并通过迁移完成确认消息发送给目标 RNC; 用户设备 UE, 设置为根据源 RNC发送的迁移消息同步自身的增强密钥。 优选地, 该无线接入系统的核心网节点包括: 接收模块, 设置为接收目 标 RNC的迁移完成指示消息,迁移完成指示消息指示用户设备 UE从源 RNC 迁移到目标 RNC 成功; 计算模块, 设置为在接收模块接收到迁移完成指示 消息后, 使用存储的传统密钥和当前增强密钥计算下一跳增强密钥; 发送模 块, 设置为将下一兆增强密钥发送给所述目标 RNC。 优选地,该无线接入系统的核心网节点还包括:下一跳计数器网络 NCC, 设置为对核心网节点计算下一跳增强密钥的次数计数。 优选地, 该无线接入系统的 UE包括: 下一跳计数器终端 NCC, 设置为 对 UE计算下一跳增强密钥的次数计数。 优选地,该无线接入系统的 UE还包括:判断模块,设置为判断终端 NCC 是否等于网络 NCC; 确定模块, 设置为若判断模块的判断结果为是, 则使用 终端 NCC对应的预先存储的 CKu和 /或 IKu; 否定模块, 设置为若判断模块 的判断结果为否, 则计算 CKU和 /或 IKU, 并递增相对应的终端 NCC, 直到 终端 NCC等于网络 NCC。 通过本发明, 无线接入系统的核心网节点在终端初始附着时, 或 SRNC 迁移成功完成后, 才艮据核心网节点处的传统密钥 IK、 CK计算生成下一跳增 强密钥 IKu和 CKu,并将下一跳增强密钥发送给目标 RNC,以备下一次 SRNC 迁移时使用,从而使得源 RNC和目标 RNC使用不同的增强密钥 IKu和 CKu。 并且由于下一跳目标 RNC 使用的增强的空中接口密钥是由核心网推导出来 的, 两次 SRNC迁移后, 源 RNC则无法获知两兆后的目标 RNC的空中接口 密钥。 因此即使某个基站被攻击者攻破或非法控制, 两次 SRNC迁移后也能 保证用户进行安全的通信, 保障了用户的前向安全, 从而整体提高了无线接 入系统的通信安全性。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1 为相关技术中的一种釆用 HSPA+技术的无线接入网络的架构示意 图; 图 2为相关技术中的一种 HSPA+安全密钥层次结构示意图; 图 3为相关技术中的一种 SRNC静态迁移示意图; 图 4为相关技术中的一种 SRNC伴随迁移示意图; 图 5 为才艮据本发明实施例的一种空中接口密钥的更新方法的步骤流程 图; 图 6为才艮据本发明实施例的一种空中接口密钥更新的密钥链的示意图; 图 7为根据本发明实施例的一种初始空中接口密钥建立过程的流程图; 图 8为根据本实施例的一种进行 SRNC伴随迁移时的空中接口密钥的更 新流程图; 图 9为根据本发明实施例的一种进行 SRNC静态迁移时的空中接口密钥 的更新流程图; 图 10为根据本发明实施例的一种核心网节点的结构框图; 图 11为根据本发明实施例的一种无线接入系统的结构框图; 图 12为根据本发明实施例的另一种进行 SRNC伴随迁移时的空中接口 密钥的更新流程图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 在釆用 UTRAN的无线接入系统中涉及到的 SRNC迁移, 如图 3和图 4 所示, 涉及核心网节点( SGSN+或 MSC+ ), 源 RNC (即 SRNC )、 目标 RNC、 Node B和 UE。在釆用 HSPA+的无线接入系统中,可以将 Node B+看故 Node B和 RNC的结合, 二者是一个物理实体, 但仍然是两个不同的逻辑实体。 需 要说明的是, 本发明实施例中支持增强安全密钥层次的 Node B+也可以等同 为 UMTS中进行了升级的 RNC( RNC+ ),本发明实施例中的 SRNC和源 RNC (源 Node B+ ) 等同, DRNC和目标 RNC (目标 Node B+ ) 等同。 参照图 5 , 示出了根据本发明实施例的一种空中接口密钥的更新方法的 步 4聚流程图, 包括以下步 4聚: 步 4聚 S502: 核心网节点接收到目标 RNC的迁移完成指示消息; 其中, 迁移完成指示消息指示用户设备 UE从源 RNC迁移到目标 RNC 成功。 步骤 S504:核心网节点使用存储的传统密钥和当前增强密钥计算下一跳 增强密钥; 其中,传统密钥包括传统完整性密钥 IK和 /或传统加密密钥 CK, 增强密 钥包括增强完整性密钥 IKu和 /或增强加密密钥 CKu。 核心网节点使用核心网节点处存储的传统密钥 IK和 /或 CK,以及当前使 用的增强密钥 IKu和 /或 CKu , 使用密钥生成函数计算下一跳增强密钥 IKu 和 /或 CKu。 为了和当前使用的当前增强密钥 IKu/CKu相区别, 本发明的实 施例中称下一兆增强密钥为 ΙΚ,υ和 CK,u。 步骤 S506: 核心网节点将下一跳增强密钥发送给目标 RNC。 本步骤中,核心网节点将 IK,u和 CK,u发送给目标 RNC保存, 以备下次 SRNC迁移时目标 RNC使用。 传统 UTRAN相关技术中在进行 SRNC迁移时,不改变迁移前后的密钥, 而通过本实施例, 核心网节点将更新的下一跳增强密钥发送给目标 RNC, 以 使用户设备在进行下一次 SRNC迁移时使用, 从而使得源 RNC和目标 RNC 使用不同的密钥。 并且, 当进行了两次 SRNC迁移后, 源 RNC不能获得两 跳后的目标基站使用的增强密钥, 从而保证了用户通信的前向安全, 提高了 无线接入系统通信安全性。 在下一兆增强密钥 ΙΚ,υ和 CK,u的计算过程中,除了传统密钥 IK和 CK、 增强密钥 IKu和 CKu夕卜,还可以使用以下参数之一或任意组合: 序列号 SQN 异或隐藏密钥 AK, 用户标识 (如国际用户识别码 IMSI、 临时移动用户识别 码 TMSI ), 服务网络标识, 核心网节点类型。 本发明实施例提供了以下密钥函数计算各安全密钥, 包括初始时和
SRNC迁移时计算各安全密钥的密钥函数, 以下密钥函数中, 括号内的参数 不分先后顺序, 其中的多个参数可以以级联形式或其它形式组合。 初始时: (IKu, CKu ) = F1 ( IK||CK, Parameter );
( IK,u, CK'u ) = F2 ( IK||CK, IKu||CKu ); SRNC迁移时: (IK,u, CK'u ) = F2 ( IK||CK, IK,u— old||CK,u— old ); 或者,
IKu = IK'u old, CKu = IK'u old,
( IK,u, CK'u ) = F2 ( IK||CK, IKu||CKu ); 其中, Fl和 F2表示不同或相同的密钥函数, 例如 3GPP定义的 KDF函 数。 IKu表示增强的完整性密钥, CKu表示增强的加密密钥, IK,u表示下一 跳增强的完整性密钥, ^^,!;表示下一跳增强的加密密钥, IK,u— old表示当前 增强的完整性密钥, CK,u— old 表示当前增强的加密密钥, "|| " 表示级联, Parameter 表示参数。 当 UE 从空闲态进入连接态时, 需要保证每次使用的 Parameter不同。 本发明的实施例均可以釆用上述密钥函数。 当然, 本领域技术人员也可 以 居实际情况, 釆用其它适当的密钥计算方法, 本发明对此不作限制。 在初始附着时, 或用户设备从空闲态返回激活态时, 或用户设备从 E-UTRAN或全球移动通信系统 GSM移动到 UTRAN时,或用户设备从传统 的 UTRAN (不支持 HSPA+安全 ) 移动到增强的 UTRAN时, 核心网节点对 下一兆增强密钥的处理一般分为两种情况, 一种是核心网节点初始时向 SRNC下发下一跳增强密钥 IK,u/CK,u, 首次 SRNC迁移时, 源 RNC把下一 跳增强密钥发送给目标 RNC, 目标 RNC和 UE分别使用该下一跳增强密钥 作为 IKu和 CKu; 另一种是核心网节点初始时不向 SRNC下发下一兆增强密 钥,首次 SRNC迁移时,源 RNC将当前增强密钥 IKu/CKu发送给目标 RNC, 目标 RNC和 UE分别使用该密钥 IKu和 CKu对通信作安全保护。 在第二次 SRNC迁移时, 目标 RNC和 UE再分别使用下一兆增强密钥 IK'u/CK'u。 空 中接口密钥更新的密钥链如图 6 所示, 其中, NCC 表示下一兆计数器。 Parameter表示参数。 参照图 7, 示出了根据本发明实施例的一种初始空中接口密钥建立过程 的流程图, 包括以下步 4聚: 步骤 S702: 核心网节点(如 SGSN+或 MSC + )根据存储的 IK和 CK计 算增强密钥 IKu/CKu。 该步骤的触发条件为: 当 UE首次附着到网络, 或者 UE从空闲模式转 换到连接模式时, 或者 UE 从演进的通用陆地无线接入网络 E-UTRAN 或 GSM 移动到通用陆地无线接入网络 UTRAN 时, 或者用户设备从传统的 UTRAN (不支持 HSPA+安全 ) 移动到增强的 UTRAN时。 对于 UE 由空闲模式转换到连接模式时触发的安全模式命令流程, 若 SGSN+或 MSC/VLR+处还存储有有效的增强密钥 IKu/CKu, 则该步骤可选, 可以直接使用存储的增强密钥, 而不必重新计算。 步骤 S704: 核心网节点才艮据传统完整性密钥 IK、 加密密钥 CK和步骤 S702中计算出的增强密钥 IKu和 CKu计算下一跳增强密钥 IK,u/CK,u。 步骤 S706: 核心网节点向 SRNC发送安全模式命令消息, 该消息携带增 强密钥 IKu和 CKu, 和 /或下一跳增强密钥 IK,u/CK,u。 其中, 安全模式命令消息还可以携带以下参数之一或其任意组合: 用户 设备安全能力、 密钥集标识、 选择的完整性算法集、 加密算法集。 其中, 下一跳增强密钥 IK,u/CK,u的下发是可选的, 即初始连接建立时, 可以不发送下一兆增强密钥 IK,u/CK,u, 而仅发送增强密钥 IKu/CKu。 步骤 S708: SRNC接收到安全模式命令消息后, 存储接收到的增强密钥
IKu和 CKu, 和 /或下一兆增强密钥 IK'u/CK'u。 步骤 S710: SRNC向 UE发送安全模式命令消息。 该安全模式命令消息中可以携带用 IKu计算的消息验证码, 还可以携带 以下参数之一或其任意组合: 用户设备安全能力、 密钥集标识、 选择的完整 性算法、 加密算法。 步骤 S712: UE接收到安全模式命令消息后, 存储加密算法和完整性算 法, 才艮据 ΑΚΑ过程生成的传统加密密钥 CK和传统完整性密钥 ΙΚ计算增强 密钥 IKu和 CKu (该过程也可发生于收到安全模式命令消息之前)。 此时, UE和 SRNC共享相同的增强的完整性密钥 IKu和 /或增强的加密密钥 CKu, 可以使用上述密钥对双方之间的通信进行保护。 本步骤中, 对于由 UE空闲模式转换到连接模式时触发的安全模式命令 流程, 若 UE处还存储有有效的增强密钥 IKu和 CKu, 则可以直接使用该增 强密钥 IKu和 CKu, 而不用重新计算。 步骤 S714: UE才艮据传统加密密钥 CK、 完整性密钥 IK和步骤 S712中 计算出的增强密钥 IKu和 CKu计算下一跳增强密钥 IK,u/CK,u。 该步骤为可选步骤, 即 UE可以在初始时不计算下一跳增强密钥, 待需 要时再计算。 步骤 S716: UE使用 IKu验证接收到的安全模式命令消息。 步骤 S718: 如果安全模式命令消息验证成功, 则 UE向 SRNC发送安全 模式完成消息, 该消息中携带有用 IKu计算的消息验证码, 或者, UE也可 以同时用 CKu对该安全模式完成消息进行加密。 步骤 S720: SRNC用 IKu验证接收到的安全模式完成消息; 或者, 先用
CKu对该消息进行解密, 再用 IKu对接收到的安全模式完成消息进行验证。 步骤 S722: 如果安全模式完成消息验证成功, 则 SRNC向核心网节点发 送安全模式完成消息, 该消息中可以携带参数: 选择的完整性算法和 /或加密 算法。 此后, UE和 NodeB+即可以根据上述密钥开始加解密操作。 优选的, 在本实施例中, 核心网节点维护一个下一跳计数器网络 NCC, 用于对计算下一兆增强密钥的次数计数, 以和用户侧密钥同步。 网络 NCC 初始值为 0; 当步骤 S704 中首次计算下一跳增强密钥时, 对应的网络 NCC 为 1。 在核心网节点维护一个网络 NCC的情况下, 安全模式命令消息中还可 以携带参数网络 NCC, 并发送给 SRNC, 由 SRNC接收和存储。 同样, UE 也维护一个下一跳计数器终端 NCC, 用于对 UE计算下一跳增强密钥的次数 计数, 以和网络侧密钥同步, 初始值为 0; 当 UE首次计算下一兆增强密钥, 此时, 对应的终端 NCC值为 1。 在以后的 SRNC迁移流程中, 当终端 NCC 与网络 NCC不等时, UE计算下一跳增强密钥并递增相对应的终端 NCC, 直 到终端 NCC等于网络 NCC, 以使 UE和目标 RNC使用的密钥一致。 使用 NCC同步网络侧和用户侧密钥, 有效保证了网络侧和用户侧密钥的一致性。 参照图 8, 示出了才艮据本实施例的一种进行 SRNC伴随迁移时的空中接 口密钥的更新流程图。本实施例中, SRNC和目标 RNC之间的消息交互需要 通过核心网节点 CNN+ ( SGSN+或 MSC+ ) 中转。 本实施例包括以下步 4聚: 步骤 S802: 源 RNC (即 SRNC ) 决策进行 SRNC迁移。 该决策的触发可以是:源 RNC收到 UE的测量报告,或者收到目标 RNC 发送的上行信令传输指示要求进行小区更新或 URA更新等。 步骤 S804: 源 RNC向核心网节点发送迁移需要消息。 若源 RNC同时连接两个 CNN+节点, 则源 RNC同时向该两个 CNN+节 点发送迁移需要消息;若源 RNC和目标 RNC位于两个不同的 CNN+节点下, 则该消息需要经过该两个 CNN+节点的中转。 迁移需要消息中携带参数: 下一跳增强的完整性密钥 IK,u, 和 /或下一跳 增强的加密密钥 CK,u。 除此之外, 还可以携带以下参数之一或任意组合: 用 户设备安全能力、 用户支持的加密算法、 用户支持的完整性算法、 选择的加 密算法、 选择的完整性算法、 与增强的空中接口密钥关联的下一跳计数器网 络 NCC。 优选地, 上述安全材料携带于源 RNC到目标 RNC的透明容器中。 可选地, 源 RNC将下一跳增强的完整性密钥 IK'u当作增强的完整性密 钥 ΙΚυ, 将下一跳增强的加密密钥 CK,u当作增强的加密密钥 CKu。 源 RNC 发送的迁移需要消息中携带参数: 增强完整性密钥 IKu, 和 /或增强加密密钥 CKu。 可选地, 由于源 RNC可能不能确定目标 RNC是否支持增强的安全, 因 此源 RNC将下一跳增强密钥 IK,u和 CK,u分别放置于迁移需要消息的 IK和 CK字段。 在实际的网络布局中, 支持增强安全功能的网络实体和仅支持传统安全 的网络实体并存, 当 SRNC迁移时, 就会存在 UE从一个支持增强安全功能 的 SRNC+迁移到一个不支持增强安全功能的目标 RNC的场景。而当 SRNC+ 做出迁移决策时, 很可能是不知道目标 RNC 是否支持增强安全功能的。 因 此, 当 SRNC迁移时, 密钥的更新也需要考虑对传统网络的安全支持。 步骤 S806: 核心网节点向目标 RNC发送迁移请求消息, 消息中携带有 下一兆增强密钥 ΙΚ'υ和 CK'u, 和 /或网络 NCC。 本实施例中,网络侧核心网节点维护一个下一跳计数器网络 NCC,因此, 迁移请求消息中还可以携带有网络 NCC信息。 将网络 NCC信息发送给目标 RNC , 以方便地实现目标 RNC与用户之间密钥的一致性。 本步骤中, 核心网节点将 CK'u置于所述迁移请求消息的 CK字段, 和 / 或将 IK'u置于所述迁移请求消息的 ΙΚ字段, 向目标 RNC发送。 需要说明的是, 在增强的 SRNC迁移过程中, 源 RNC可以直接发送迁 移请求消息给目标 RNC, 此时, 该迁移请求消息称为增强的迁移请求消息。 增强的迁移请求消息中携带下一跳增强的完整性密钥 IK,u,和 /或下一跳增强 的加密密钥 CK,u, 源 RNC将下一兆增强密钥 ΙΚ,υ和 CK,u分别放置于迁移 需要消息的 IK和 CK字段发送给目标 RNC。 步骤 S808: 目标 RNC存储接收到的密钥。若目标 RNC支持增强的安全, 则目标 RNC将接收到的消息中的 IK字段的值作为增强密钥 IKu, CK字段 的值作为增强密钥 CKu; 若目标 RNC不支持增强的安全, 则目标 RNC将接 收到的消息中的 IK字段的值作为传统密钥 IK, CK字段的值作为传统密钥 CK。 步骤 S810:目标 RNC向核心网节点发送迁移请求确认消息。 在发送该消 息之前, 目标 RNC和核心网节点可以建立新的 Iu 载, 为 UE分配 RRC ( Radio Resource Control, 无线资源控制协议 )连接资源和无线链路等资源。 若源 RNC和目标 RNC位于两个不同的 CNN+节点( SGSN+和 /或 MSC/VLR+ ) 下, 则该消息需要经过该两个 CNN+节点的中转。 可选地, 该迁移确认消息携带有下一跳计数器网络 NCC信息。 步骤 S812: 核心网节点向源 RNC发送迁移命令消息。 可选地, 该迁移命令消息携带核心网节点的下一跳计数器网络 NCC 信 息。 步 4聚 S814: 源 RNC 向 UE 发送迁移消息, 即物理信道重配置消息或
UTRAN移动性信息消息。 可选地, 上述物理信道重配置消息或 UTRAN移动性信息消息中携带有 下一跳计数器网络 NCC信息。 步骤 S 816: 若 UE支持增强的安全, 则 UE按照和网络侧同样的算法更 新增强的完整性密钥 IKu和 /或加密密钥 CKu。 本步骤中, UE中设置下一跳计数器终端 NCC, UE接收网络 NCC, 判 断当前激活的增强密钥对应的终端 NCC是否等于网络 NCC, 若二者相等, 则 UE直接使用自己保存的增强完整性密钥 IKu和 /或增强加密密钥 CKu; 若 网络 NCC大于终端 NCC, 则 UE计算增强密钥 IKu/CKu并递增相对应的终 端 NCC, 直到终端 NCC等于网络 NCC。 步骤 S818: UE向目标 RNC发送物理信道重配置完成消息或 UTRAN移 动性信息确认消息。上述消息可以用更新的完整性密钥 IKu进行完整性保护, 或用更新的完整性密钥 IKu和加密密钥 CKu对上述消息同时进行完整性和加 密保护。 该消息中还可以携带用户设备安全能力参数。 步骤 S820: 目标 RNC用更新的完整性密钥 IKu和 /或加密密钥 CKu对该 消息进行安全验证。 若目标 RNC对 UE发送的消息验证成功, 则目标 RNC 向核心网节点( SGSN+或者 MSC/VLR+ )发送迁移完成消息, 该消息携带向 核心网节点指示迁移完成的信息, 可选地, 还可以有网络 NCC信息。 步 4聚 S822: 核心网节点基于 IK、 CK和当前的增强密钥 IKu、 CKu计算 下一跳增强密钥 IK,u、 CK,u。 可选地, 若网络侧维护了一个下一跳计数器网络 NCC, 则核心网节点在 计算下一跳增强密钥 IK,u、 CK'u之前或之后递增网络 NCC。 步骤 S824: 核心网节点向目标 RNC发送迁移完成确认消息, 该消息携 带下一跳增强密钥 IK'u、 C'Ku, 和 /或相关联的网络 NCC。 步骤 S826: 目标 RNC存储接收到的下一跳增强密钥 IK,u、 CK'u, 和 / 或相关联的网络 NCC , 以备下一次 SRNC迁移时使用。 步骤 S828: 核心网节点 ( SGSN+或者 MSC/VLR+ )释放与源 RNC之间 的 Iu接口。 图 8所示的实施例中的安全操作同样适用于釆用增强 SRNC迁移流程, 在增强 SRNC迁移流程中, 源 RNC和目标 RNC之间直接进行通信, 而不用 通过核心网节点的中转。图 8中的步骤 S804、S806所示的消息替换为源 RNC 向目标 RNC发送增强的迁移请求消息, 图 8中步骤 S810、 S812所示的消息 替换为目标 RNC向源 RNC发送增强的迁移响应消息。 图 8 中步骤 S820、 S824所示的消息分别替换为目标 RNC和核心网节点之间的增强的迁移完成 请求消息和增强的迁移完成响应消息。 除此之外, 消息中携带的参数, 及其 它步骤的操作都完全相同, 此处不再赞述。 当初始时核心网节点即将下一跳增强密钥发送给 SRNC时, 当 UE进行 第一次 SRNC迁移流程时, 即可釆用上述的密钥更新流程。 当初始时核心网 节点未将下一跳增强密钥发送给 SRNC时, 当 UE进行第一次 SRNC迁移流 程时, 按照传统 UMTS定义的 SRNC迁移的安全操作执行, 即源 RNC将当 前使用的增强密钥 IKu和 /或 CKu发送给目标 RNC , UE和目标 RNC直接使 用该当前的增强密钥。 当进行第二次 SRNC迁移时, 再釆用上述的密钥更新 流程。 在一次 SRNC迁移流程成功完成后, 目标 RNC可以发起一次 SRNC内 部的迁移, 此时, 源 RNC和目标 RNC都是同一个 SRNC。 以此达到前向安 全的目的。 参照图 9, 示出了才艮据本发明实施例的一种进行 SRNC静态迁移时增强 的空中接口密钥的更新流程图。 本实施例釆用传统的 SRNC 迁移流程, 即 SRNC和目标 RNC之间的消息交互经过核心网节点的中转的流程。需要说明 的是, 该实施例的安全操作也同样适用于增强的 SRNC 伴随迁移流程, 即 SRNC和目标 RNC之间直接进行消息交互, 而不用通过核心网节点的中转。 本实施例包括以下步 4聚: 步骤 S902: UE向 UTRAN发送 URA更新消息, 或小区更新消息, 或测 量报告消息。 步骤 S904: 目标 RNC通过接收到该 UE的 URA更新消息或小区更新消 息, 或测量报告消息, 向该 UE的源 RNC发送上行信令传输指示消息。 步骤 S906: 源 RNC (即 SRNC ) 决策进行 SRNC迁移。 步骤 S908: 源 RNC向核心网节点发送迁移需要消息。 消息中携带有下 一跳增强密钥 IK,u和 CK,u , 还可以携带网络 NCC。 步骤 S910: 核心网节点向目标 RNC发送迁移请求消息, 消息中携带有 下一兆增强密钥 ΙΚ'υ和 CK'u, 和 /或网络 NCC。 本实施例中,网络侧核心网节点维护一个下一跳计数器网络 NCC,因此, 迁移请求消息中还可以携带有网络 NCC信息。 步骤 S912: 目标 RNC存储接收到的密钥。 步骤 S914: 目标 RNC向核心网节点发送迁移请求确认消息。 在发送该 消息之前, 目标 RNC和核心网节点可以建立新的 Iu 载, 为 UE分配 RRC ( Radio Resource Control, 无线资源控制协议 )连接资源和无线链路等资源。 可选地, 该迁移确认消息携带有下一跳计数器网络 NCC信息。 步骤 S916: 核心网节点向源 RNC发送迁移命令消息。 可选地, 该迁移命令消息携带核心网节点的下一跳计数器网络 NCC 信 息。 步骤 S918: 源 RNC向目标 RNC发送迁移提交消息。 步骤 S920: 目标 RNC向核心网节点发送迁移检测消息。 步骤 S922: 目标 RNC向 UE发送小区更新确认消息, 或 URA更新确认 消息, 或 RAN移动性信息消息。 该消息携带目标 RNC的安全能力的指示信 息。 可选地, 上述消息携带有下一跳计数器网络 NCC信息。 步骤 S924: 若 UE支持增强的安全, 则 UE按照和网络侧同样的算法更 新增强的完整性密钥 IKu和 /或加密密钥 CKu。 本步骤中, UE中设置下一跳计数器终端 NCC, UE接收网络 NCC, 判 断当前激活的增强密钥对应的终端 NCC是否等于网络 NCC, 若二者相等, 则 UE直接使用自己保存的增强完整性密钥 IKu和 /或增强加密密钥 CKu; 若 网络 NCC大于终端 NCC, 则 UE计算增强密钥 IKu/CKu并递增相对应的终 端 NCC , 直到终端 NCC等于网络 NCC。 步骤 S926: UE向目标 RNC发送 UTRAN移动性信息确认消息或 RAN 移动性信息确认消息。 上述消息可以用更新的完整性密钥 IKu进行完整性保 护,或用更新的完整性密钥 IKu和加密密钥 CKu对上述消息同时进行完整性 和加密保护。 该消息中还可以携带用户设备安全能力参数。 步骤 S928: 目标 RNC用更新的完整性密钥 IKu和 /或加密密钥 CKu对该 消息进行安全验证。 若目标 RNC对 UE发送的消息验证成功, 则目标 RNC 向核心网节点( SGSN+或者 MSC/VLR+ )发送迁移完成消息, 该消息携带向 核心网节点指示迁移完成的信息, 还可以有网络 NCC信息。 步骤 S930: 核心网节点基于 IK、 CK和当前的增强密钥 IKu、 CKu计算 下一跳增强密钥 IK,u、 CK,u。 可选地, 若网络侧维护了一个下一跳计数器网络 NCC, 则核心网节点在 计算下一跳增强密钥 IK,u、 CK'u之前或之后递增网络 NCC。 步骤 S932: 核心网节点向目标 RNC发送迁移完成确认消息, 该消息携 带下一跳增强密钥 IK,u、 CK'u, 和 /或相关联的网络 NCC。 步骤 S934: 目标 RNC存储接收到的下一跳增强密钥 IK,u、 CK'u, 和 / 或相关联的网络 NCC, 以备下一次 SRNC迁移时使用。 步骤 S936: 核心网节点( SGSN+或者 MSC + )释放与源 RNC之间的 Iu 接口。 本步骤核心网节点 ( SGSN+或者 MSC/VLR+ )释放与源 RNC之间的 Iu 接口也可发生于步骤 S930之前。 需要说明的是, 上述所有实施例也适用于 SRNC内部的迁移, 即源 RNC 和目标 RNC是同一个 RNC的场景。 参照图 10, 示出了根据本发明实施例的一种核心网节点的结构框图, 包 括: 接收模块 1002 , 设置为接收目标 RNC的迁移完成指示消息, 该迁移完 成指示消息用于指示 UE从源 RNC迁移到目标 RNC成功; 计算模块 1004 , 设置为在接收模块 1002 接收到迁移完成指示消息后, 使用存储的传统密钥 和当前增强密钥计算下一跳增强密钥; 发送模块 1006, 设置为将下一跳增强 密钥发送给目标 RNC。 优选的, 本实施例的核心网节点还可以包括: 下一跳计数器网络 NCC, 设置为对核心网节点计算下一跳增强密钥的次数计数。 优选的, 接收模块 1002还设置为在接收目标 RNC的迁移完成指示消息 之前, 接收源 RNC发送的迁移需要消息, 该迁移需要消息包括源 RNC的下 一跳 CK'u和 /或 IK'u; 发送模块 1006还设置为向目标 RNC发送迁移请求消 息, 该迁移请求消息包括源 RNC发送的下一跳 CK'u和 /或 IK'u。 参照图 11 , 示出了才艮据本发明实施例的一种无线接入系统的结构框图, 包括: 源 RNC1102、 目标 RNC1104、 核心网节点 1106和用户设备 UE1108。 其中, 源 RNC1102 , 设置为向核心网节点 1106发送迁移需要消息, 该 迁移需要消息中携带有源 RNC1102的下一兆增强密钥;接收核心网节点 1106 的迁移命令, 并向 UE1108发送迁移消息。 其中, 目标 RNC1104 , 设置为接收核心网节点 1106发送的迁移请求消 息, 该迁移请求消息中携带有源 RNC1102 发送的下一跳增强密钥; 以及向 核心网节点 1106发送迁移完成指示消息, 接收核心网节点 1106的迁移完成 确认消息, 该迁移完成确认消息包括目标 RNC1104的下一兆增强密钥。 其中, 核心网节点 1106 , 设置为接收目标 RNC1104的迁移完成指示消 息, 计算下一跳增强密钥, 并通过迁移完成确认消息发送给目标 RNC1104。 其中, 用户设备 UE1108, 设置为根据源 RNC1102发送的迁移消息同步 自身的增强密钥。 优选的, 核心网节点 1106 包括: 接收模块 11062 , 设置为接收目标 RNC1104 的迁移完成指示消息, 该迁移完成指示消息指示 UE1108 从源 RNC1102 迁移到目标 RNC1104成功; 计算模块 11064, 设置为在接收模块 11062 接收到迁移完成指示消息后, 使用存储的传统密钥和当前增强密钥计 算下一跳增强密钥; 发送模块 11066, 设置为将下一跳增强密钥发送给目标 RNC1104。 优选的, 核心网节点 1106还包括: 下一跳计数器网络 NCC, 设置为对 核心网节点 1106计算下一兆增强密钥的次数计数。 优选的, UE1108 包括: 下一跳计数器终端 NCC, 设置为对 UE1108计 算下一跳增强密钥的次数计数。 优选的, UE1108还包括: 判断模块 11082 , 设置为判断终端 NCC是否 等于网络 NCC; 确定模块 11084,设置为若判断模块 11082的判断结果为是, 则使用终端 NCC对应的预先存储的 CKu和 /或 IKu; 否定模块 11086, 设置 为若判断模块 11082的判断结果为否, 则计算 CKu和 /或 IKu, 并递增相对应 的终端 NCC, 直到终端 NCC等于网络 NCC。 参照图 12 ,示出了根据本实施例的一种进行 SRNC伴随迁移时的空中接 口密钥的更新流程图。本实施例中, SRNC和目标 RNC之间的消息交互不需 要通过核心网节点 CNN+ ( SGSN+或 MSC+ ) 中转, 釆用增强的 SRNS迁移 流程。 本实施例包括以下步 4聚: 步骤 S 1202: 源 RNC (即 SRNC ) 决策进行 SRNC迁移。 该决策的触发可以是:源 RNC收到 UE的测量报告,或者收到目标 RNC 发送的上行信令传输指示要求进行小区更新或 URA更新等。 步骤 S 1204: 源 RNC向目标 RNC发送增强的迁移请求消息, 消息中携 带有下一兆增强密钥 ΙΚ,υ和 CK,u , 和 /或网络 NCC。。 增强的迁移请求消息中携带参数: 下一跳增强的完整性密钥 IK,u, 和 / 或下一跳增强的加密密钥 CK,u。 除此之外,还可以携带以下参数之一或任意 组合: 用户设备安全能力、 用户支持的加密算法、 用户支持的完整性算法、 选择的加密算法、 选择的完整性算法、 与增强的空中接口密钥关联的下一跳 计数器网络 NCC。优选地, 上述安全材料携带于源 RNC到目标 RNC的透明 容器中。 可选地, 源 RNC将下一跳增强的完整性密钥 IK'u当作增强的完整性密 钥 ΙΚυ, 将下一跳增强的加密密钥 CK,u当作增强的加密密钥 CKu。 源 RNC 发送的迁移需要消息中携带参数: 增强完整性密钥 IKu, 和 /或增强加密密钥 CKu。 可选地, 由于源 RNC可能不能确定目标 RNC是否支持增强的安全, 因 此源 RNC将下一跳增强密钥 IK'u和 CK,u分别放置于增强的迁移请求消息的 IK和 CK字段。 在实际的网络布局中, 支持增强安全功能的网络实体和仅支持传统安全 的网络实体并存, 当 SRNC迁移时, 就会存在 UE从一个支持增强安全功能 的 SRNC+迁移到一个不支持增强安全功能的目标 RNC的场景。而当 SRNC+ 做出迁移决策时, 很可能是不知道目标 RNC 是否支持增强安全功能的。 因 此, 当 SRNC迁移时, 密钥的更新也需要考虑对传统网络的安全支持。 步骤 S 1206: 目标 RNC存储接收到的密钥。 若目标 RNC支持增强的安 全, 则目标 RNC将接收到的消息中的 IK字段的值作为增强密钥 IKu, CK 字段的值作为增强密钥 CKu; 若目标 RNC不支持增强的安全, 则目标 RNC 将接收到的消息中的 IK字段的值作为传统密钥 IK, CK字段的值作为传统 密钥 CK。 步骤 S 1208:目标 RNC向源 RNC发送增强的迁移响应消息。在发送该消 息之前, 目标 RNC为 UE分配 RRC ( Radio Resource Control, 无线资源控制 协议) 连接资源和无线链路等资源。 可选地, 该增强的迁移响应消息携带有下一跳计数器网络 NCC信息。 步 4聚 S 1210: 源 RNC 向 UE发送迁移消息, 即物理信道重配置消息或 UTRAN移动性信息消息。 可选地, 上述物理信道重配置消息或 UTRAN移动性信息消息中携带有 下一跳计数器网络 NCC信息。 步骤 S 1212: 若 UE支持增强的安全, 则 UE按照和网络侧同样的算法更 新增强的完整性密钥 IKu和 /或加密密钥 CKu。 本步骤中, UE中设置下一跳计数器终端 NCC, UE接收网络 NCC, 判 断当前激活的增强密钥对应的终端 NCC是否等于网络 NCC, 若二者相等, 则 UE直接使用自己保存的增强完整性密钥 IKu和 /或增强加密密钥 CKu; 若 网络 NCC大于终端 NCC, 则 UE计算增强密钥 IKu/CKu并递增相对应的终 端 NCC , 直到终端 NCC等于网络 NCC。 步骤 S 1214: UE向目标 RNC发送物理信道重配置完成消息或 UTRAN 移动性信息确认消息。 上述消息可以用更新的完整性密钥 IKu进行完整性保 护,或用更新的完整性密钥 IKu和加密密钥 CKu对上述消息同时进行完整性 和加密保护。 该消息中还可以携带用户设备安全能力参数。 步骤 S 1216: 目标 RNC用更新的完整性密钥 IKu和 /或加密密钥 CKu对 该消息进行安全验证。若目标 RNC对 UE发送的消息验证成功,则目标 RNC 向核心网节点( SGSN+或者 MSC/VLR+ )发送增强的迁移完成请求消息, 该 消息携带向核心网节点指示迁移完成的信息, 可选地, 还可以有网络 NCC 信息。 步 4聚 S 1218: 核心网节点基于 IK、 CK和当前的增强密钥 IKu、 CKu计 算下一跳增强密钥 IK,u、 CK,u。 可选地, 若网络侧维护了一个下一跳计数器网络 NCC, 则核心网节点在 计算下一跳增强密钥 IK,u、 CK'u之前或之后递增网络 NCC。 步骤 S 1220: 核心网节点向目标 RNC发送增强的迁移完成请求消息, 该 消息携带下一跳增强密钥 IK'u、 CKu, 和 /或相关联的网络 NCC。 步骤 S 1222: 目标 RNC存储接收到的下一跳增强密钥 IK,u、 CK'u, 和 / 或相关联的网络 NCC , 以备下一次 SRNC迁移时使用。 步骤 S 1224: 核心网节点 ( SGSN+或者 MSC/VLR+ )释放与源 RNC之 间的 Iu接口。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种空中接口密钥的更新方法, 包括:
核心网节点接收到目标无线网络控制器 RNC的迁移完成指示消息, 所述迁移完成指示消息用于指示用户设备 UE从源 RNC迁移到所述目标 RNC成功;
使用存储的传统密钥和当前增强密钥计算下一跳增强密钥; 将所述下一跳增强密钥发送给所述目标 RNC。
2. 根据权利要求 1所述的方法, 其中, 所述传统密钥包括传统完整性密钥 IK和 /或传统加密密钥 CK, 所述增强密钥包括增强完整性密钥 IKu和 / 或增强加密密钥 CKu。
3. 根据权利要求 2所述的方法, 其中, 在所述核心网节点中设置下一跳计 数器网络 NCC, 对所述核心网节点计算下一跳增强密钥的次数计数。
4. 根据权利要求 3所述的方法, 其中, 在所述核心网节点接收到目标 RNC 的迁移完成指示消息步骤之前, 还包括:
所述源 RNC向所述核心网节点发送迁移需要消息 ,所述迁移需要消 息包括所述源 RNC的下一兆 CKu和 /或 IKu;
所述核心网节点接收所述迁移需要消息,并向所述目标 RNC发送迁 移请求消息, 所述迁移请求消息包括所述源 RNC发送的下一兆 CKu和 / 或 IKu。
5. 根据权利要求 4所述的方法, 其中, 所述迁移需要消息和迁移请求消息 均还包括所述网络 NCC指示的信息。
6. 根据权利要求 4所述的方法, 其中, 所述源 RNC向所述核心网节点发送 迁移需要消息的步骤包括:
所述源 RNC将所述下一跳 IKu置于所述迁移需要消息的 IK字段, 和 /或将所述下一跳 CKu置于所述迁移需要消息的 CK字段,向所述核心 网节点发送;
所述核心网节点向所述目标 RNC发送迁移请求消息的步骤包括: 所述核心网节点将所述源 RNC发送的下一跳 IKu置于所述迁移请求 消息的 ΙΚ字段, 和 /或将所述源 RNC发送的下一跳 CKu置于所述迁移 请求消息的 CK字段, 向所述目标 RNC发送。
7. 根据权利要求 3所述的方法, 其中, 在所述核心网节点接收到目标 RNC 的迁移完成指示消息步骤之前, 还包括:
所述源 RNC向所述目标 RNC发送增强的迁移请求消息, 所述增强 的迁移请求消息包括所述源 RNC的下一兆 CKu和 /或 IKu。
8. 根据权利要求 7所述的方法, 其中, 所述源 RNC向所述目标 RNC发送 增强的迁移请求消息的步骤包括:
所述源 RNC将所述下一跳 IKu置于所述增强的迁移请求消息的 IK 字段,和 /或将所述下一跳 CKu置于所述增强的迁移请求消息的 CK字段, 向所述目标 RNC发送。
9. 根据权利要求 6或 8所述的方法, 其中, 在所述核心网节点向所述目标 RNC发送迁移请求消息 /增强的迁移请求消息的步骤之后, 还包括: 若所述目标 RNC不支持增强的安全模式, 则将所述迁移请求消息 / 增强的迁移请求消息的 CK字段的内容作为 CK, IK字段的内容作为 IK 使用;
若所述目标 RNC支持增强的安全模式, 则将所述迁移请求消息 /增 强的迁移请求消息的 CK字段的内容作为 CKu, IK字段的内容作为 IKu 使用。
10. 根据权利要求 4所述的方法, 其中, 在所述核心网节点向所述目标 RNC 发送迁移请求消息的步骤之后, 还包括:
所述核心网节点接收所述目标 RNC的迁移请求确认消息,并向所述 源 RNC发送迁移命令消息, 所述迁移命令消息包括所述网络 NCC指示 的信息;
所述源 RNC接收所述迁移命令消息,向用户设备 UE发送迁移消息, 所述迁移消息包括所述网络 NCC指示的信息。
11. 根据权利要求 10所述的方法, 其中, 所述源 RNC接收所述迁移命令消 息, 向用户设备 UE发送迁移消息步骤之后, 还包括: 所述 UE接收所述迁移消息, 判断当前激活的增强密钥对应的下一 跳计数器终端 NCC是否等于所述网络 NCC;
若是, 则所述 UE使用所述终端 NCC对应的预先存储的所述 IKu和 /或 CKu; 以及
若否, 则所述 UE计算所述 IKu和 /或 CKu, 并递增相对应的所述终 端 NCC, 直到所述终端 NCC等于所述网络 NCC。
12. 居权利要求 1所述的方法, 其中, 所述方法还包括:
所述核心网节点在用户设备 UE首次附着到网络, 或者所述 UE从 空闲模式转换到连接模式, 或者所述 UE从演进的通用陆地无线接入网 络 E-UTRAN或全球移动通信系统 GSM网络移动到通用陆地无线接入网 络 UTRAN , 或者所述 UE从传统的 UTRAN移动到增强的 UTRAN时, 所述核心网节点根据所述存储的传统密钥计算所述当前增强密钥;
所述核心网节点发送所述当前增强密钥和 /或计算的初始下一跳增 强密钥给服务 RNC。
13. 根据权利要求 12所述的方法, 其中, 所述初始下一跳增强密钥由所述核 心网节点通过以下公式, 才艮据所述存储的传统密钥和所述计算的当前增 强密钥计算得到:
( IKu, CKu ) = F1 ( IK||CK, Parameter );
( IK,u, CK'u ) = F2 ( IK||CK, IKu||CKu );
其中, Fl和 F2表示密钥函数, IK表示传统完整性密钥, CK表示 传统加密密钥, IKu表示当前增强完整性密钥, CKu表示当前增强加密 密钥, IK,u表示初始下一跳增强完整性密钥, CK,u表示初始下一跳增强 力口密密钥, "I I " 表示级联, Parameter表示参数。
14. 根据权利要求 12所述的方法, 其中, 在所述核心网节点发送所述当前增 强密钥和 /或计算的初始下一跳增强密钥给所述服务 RNC步骤之后, 还 包括:
所述艮务 RNC接收并存储所述当前增强密钥和 /或计算的初始下一 跳增强密钥, 并向所述 UE发送安全模式命令消息;
所述 UE接收所述安全模式命令消息, 使用存储的传统密钥计算增 强密钥。
15. 居权利要求 14所述的方法, 其中, 在所述 UE接收所述安全模式命令 消息, 使用存储的传统密钥计算增强密钥步骤之后, 还包括:
所述 UE使用所述传统密钥和增强密钥计算下一兆增强密钥。
16. —种核心网节点, 包括:
接收模块,设置为接收目标无线网络控制器 RNC的迁移完成指示消 息,所述迁移完成指示消息用于指示用户设备 UE从源 RNC迁移到所述 目标 RNC成功;
计算模块,设置为在所述接收模块接收到所述迁移完成指示消息后, 使用存储的传统密钥和当前增强密钥计算下一跳增强密钥;
发送模块, 设置为将所述下一跳增强密钥发送给所述目标 RNC。
17. 才艮据权利要求 16所述的核心网节点, 其中, 所述核心网节点还包括: 下一跳计数器网络 NCC,设置为对所述核心网节点计算下一跳增强 密钥的次数计数。
18. 才艮据权利要求 17所述的核心网节点, 其中,
所述接收模块,还设置为在接收所述目标 RNC的迁移完成指示消息 之前,接收所述源 RNC发送的迁移需要消息, 所述迁移需要消息包括所 述源 RNC的下一跳 CKu和 /或 IKu;
所述发送模块 ,还设置为向所述目标 RNC发送迁移请求消息, 所述 迁移请求消息包括所述源 RNC发送的下一兆 CKu和 /或 IKu。
19. 一种无线接入系统, 包括源无线网络控制器 RNC、 目标 RNC、 核心网 节点和用户设备 UE, 其中,
所述源 RNC, 设置为向所述核心网节点发送迁移需要消息, 所述迁 移需要消息中携带有所述源 RNC的下一跳增强密钥;接收所述核心网节 点的迁移命令, 并向所述 UE发送迁移消息;
所述目标 RNC , 设置为接收所述核心网节点发送的迁移请求消息, 所述迁移请求消息中携带有所述源 RNC发送的下一跳增强密钥;以及向 所述核心网节点发送迁移完成指示消息, 接收所述核心网节点的迁移完 成确认消息,所述迁移完成确认消息包括所述目标 RNC的下一跳增强密 钥; 所述核心网节点, 设置为接收所述目标 RNC的迁移完成指示消息, 计算下一 ^兆增强密钥, 并通过所述迁移完成确认消息发送给所述目标 RNC;
所述 UE, 设置为才艮据所述源 RNC发送的迁移消息同步自身的增强 密钥。
20. 根据权利要求 19所述的无线接入系统, 其中, 所述核心网节点包括: 接收模块,设置为接收所述目标 RNC的迁移完成指示消息, 所述迁 移完成指示消息指示用户设备 UE从源 RNC迁移到所述目标 RNC成功; 计算模块,设置为在所述接收模块接收到所述迁移完成指示消息后, 使用存储的传统密钥和当前增强密钥计算下一跳增强密钥;
发送模块, 设置为将所述下一跳增强密钥发送给所述目标 RNC。
21. 根据权利要求 20所述的无线接入系统, 其中, 所述核心网节点还包括: 下一跳计数器网络 NCC,设置为对所述核心网节点计算下一跳增强 密钥的次数计数。
22. 根据权利要求 21所述的无线接入系统, 其中, 所述 UE包括:
下一跳计数器终端 NCC, 设置为对所述 UE计算下一跳增强密钥的 次数计数。
23. 根据权利要求 22所述的无线接入系统, 其中, 所述 UE还包括:
判断模块, 设置为判断所述终端 NCC是否等于所述网络 NCC; 确定模块, 设置为若所述判断模块的判断结果为是, 则使用所述终 端 NCC对应的预先存储的所述 CKu和 /或 IKu;
否定模块, 设置为若所述判断模块的判断结果为否, 则计算所述 CKU和 /或 IKU, 并递增相对应的所述终端 NCC, 直到所述终端 NCC 等于所述网络 NCC。
PCT/CN2011/071628 2010-06-07 2011-03-09 空中接口密钥的更新方法、核心网节点及无线接入系统 WO2011153852A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP11791844.1A EP2571305A4 (en) 2010-06-07 2011-03-09 METHOD FOR UPDATING AN AIR INTERFACE KEY, NUCLEAR NETWORK NODES AND WIRELESS ACCESS SYSTEM THEREFOR
US13/702,842 US8938071B2 (en) 2010-06-07 2011-03-09 Method for updating air interface key, core network node and radio access system
JP2013513528A JP5774096B2 (ja) 2010-06-07 2011-03-09 エアインターフェースキーの更新方法、コアネットワークノード及び無線アクセスシステム
CA2801615A CA2801615A1 (en) 2010-06-07 2011-03-09 Method for updating air interface key, core network node and radio access system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010200885.1 2010-06-07
CN201010200885.1A CN101841810B (zh) 2010-06-07 2010-06-07 空中接口密钥的更新方法、核心网节点及无线接入系统

Publications (1)

Publication Number Publication Date
WO2011153852A1 true WO2011153852A1 (zh) 2011-12-15

Family

ID=42744854

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/071628 WO2011153852A1 (zh) 2010-06-07 2011-03-09 空中接口密钥的更新方法、核心网节点及无线接入系统

Country Status (6)

Country Link
US (1) US8938071B2 (zh)
EP (1) EP2571305A4 (zh)
JP (1) JP5774096B2 (zh)
CN (1) CN101841810B (zh)
CA (1) CA2801615A1 (zh)
WO (1) WO2011153852A1 (zh)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841810B (zh) * 2010-06-07 2016-01-20 中兴通讯股份有限公司 空中接口密钥的更新方法、核心网节点及无线接入系统
CN101902736B (zh) * 2010-07-23 2018-01-23 江苏悦达数梦技术有限公司 空中接口密钥的更新方法、核心网节点及无线接入系统
CN101909292B (zh) 2010-08-18 2016-04-13 中兴通讯股份有限公司 空中接口密钥的更新方法、核心网节点及用户设备
CN103096398B (zh) * 2011-11-08 2016-08-03 华为技术有限公司 一种网络切换的方法和装置
WO2017194076A1 (en) * 2016-05-09 2017-11-16 Huawei Technologies Co., Ltd. Mobile equipment identity privacy, network node and methods thereof
WO2018237374A1 (en) * 2017-06-23 2018-12-27 Motorola Mobility Llc METHOD AND APPARATUS FOR IMPLEMENTING MEDIA-SPECIFIC MODIFICATIONS AS PART OF CONNECTION RECONFIGURATION WHICH HAS CONSEQUENCES OF SAFETY KEYS DURING USE
CN110710238B (zh) * 2018-01-19 2021-01-08 Oppo广东移动通信有限公司 指示用户设备获取密钥的方法、用户设备及网络设备
CN110859058B (zh) * 2018-06-25 2023-10-10 联发科技(新加坡)私人有限公司 5g移动通信中附加安全能力指示方法及其装置
US11057766B2 (en) * 2018-11-01 2021-07-06 Nokia Technologies Oy Security management in disaggregated base station in communication system
CN109495916B (zh) * 2018-11-20 2022-05-10 华为技术服务有限公司 一种通信方法及设备
CN113795024A (zh) * 2020-05-26 2021-12-14 华为技术有限公司 一种获取密钥的方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1770917A1 (en) * 2005-09-29 2007-04-04 Nortel Networks Limited Method for managing communications and related core network node
CN101583130A (zh) * 2009-06-18 2009-11-18 中兴通讯股份有限公司 空口密钥的生成方法与装置
CN101715188A (zh) * 2010-01-14 2010-05-26 中兴通讯股份有限公司 一种空口密钥的更新方法及系统
CN101835151A (zh) * 2010-04-16 2010-09-15 中兴通讯股份有限公司 空中接口密钥的更新方法及无线接入系统
CN101841810A (zh) * 2010-06-07 2010-09-22 中兴通讯股份有限公司 空中接口密钥的更新方法、核心网节点及无线接入系统
CN101867924A (zh) * 2010-06-07 2010-10-20 中兴通讯股份有限公司 空中接口密钥的更新、生成方法及无线接入系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0020443D0 (en) * 2000-08-18 2000-10-04 Nokia Networks Oy Controlling communication between stations
WO2008115447A2 (en) * 2007-03-15 2008-09-25 Interdigital Technology Corporation Methods and apparatus to facilitate security context transfer, rohc and pdcp sn context reinitialization during handover
CN101232731B (zh) * 2008-02-04 2012-12-19 中兴通讯股份有限公司 用于ue从utran切换到eutran的密钥生成方法和系统
CN105657703B (zh) * 2008-11-03 2019-10-08 诺基亚技术有限公司 在分组交换网络和电路交换网络之间切换的方法和装置
US9344924B2 (en) * 2008-11-27 2016-05-17 Htc Corporation Method of handling handover security configuration and related communication device
CN101931951B (zh) * 2009-06-26 2012-11-07 华为技术有限公司 密钥推演方法、设备及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1770917A1 (en) * 2005-09-29 2007-04-04 Nortel Networks Limited Method for managing communications and related core network node
CN101583130A (zh) * 2009-06-18 2009-11-18 中兴通讯股份有限公司 空口密钥的生成方法与装置
CN101715188A (zh) * 2010-01-14 2010-05-26 中兴通讯股份有限公司 一种空口密钥的更新方法及系统
CN101835151A (zh) * 2010-04-16 2010-09-15 中兴通讯股份有限公司 空中接口密钥的更新方法及无线接入系统
CN101841810A (zh) * 2010-06-07 2010-09-22 中兴通讯股份有限公司 空中接口密钥的更新方法、核心网节点及无线接入系统
CN101867924A (zh) * 2010-06-07 2010-10-20 中兴通讯股份有限公司 空中接口密钥的更新、生成方法及无线接入系统

Also Published As

Publication number Publication date
US8938071B2 (en) 2015-01-20
JP2013531939A (ja) 2013-08-08
JP5774096B2 (ja) 2015-09-02
CA2801615A1 (en) 2011-12-15
CN101841810A (zh) 2010-09-22
EP2571305A4 (en) 2014-01-15
EP2571305A1 (en) 2013-03-20
CN101841810B (zh) 2016-01-20
US20130077785A1 (en) 2013-03-28

Similar Documents

Publication Publication Date Title
WO2011153852A1 (zh) 空中接口密钥的更新方法、核心网节点及无线接入系统
US8145195B2 (en) Mobility related control signalling authentication in mobile communications system
CN109417740B (zh) 保持相同无线终端的切换期间的安全密钥使用
US20080039096A1 (en) Apparatus, method and computer program product providing secure distributed HO signaling for 3.9G with secure U-plane location update from source eNB
US20070224993A1 (en) Apparatus, method and computer program product providing unified reactive and proactive handovers
WO2011085682A1 (zh) 一种空中接口密钥的更新方法及系统
JP4820429B2 (ja) 新しい鍵を生成する方法および装置
KR20100114927A (ko) 무선 통신 시스템에서 핸드오버를 실행하는 동안 키 관리를 실행하기 위한 시스템 및 방법
JP2011526097A (ja) トラフィック暗号化キー生成方法及び更新方法
US20080010677A1 (en) Apparatus, method and computer program product providing improved sequence number handling in networks
KR20130126742A (ko) Lte 모바일 유닛에서의 비접속 계층(nas) 보안을 가능하게 하는 방법 및 장치
JP5770288B2 (ja) エアーインターフェースキーの更新方法、コアネットワークノード及びユーザ設備
WO2013075417A1 (zh) 切换过程中密钥生成方法及系统
JP2011515904A (ja) ワイヤレス通信システムにおいてハンドオーバ、またはハンドオーバ実行中の鍵管理を実行するシステムおよび方法
WO2011131063A1 (zh) 一种建立增强的空口密钥的方法及系统
WO2011153855A1 (zh) 空中接口密钥的更新、生成方法及无线接入系统
CN113170369A (zh) 用于在系统间改变期间的安全上下文处理的方法和装置
WO2011143977A1 (zh) 终端移动到增强通用陆地无线接入网络(utran)时建立增强密钥的方法及系统
WO2008152611A1 (en) Apparatus, method and computer program product providing transparent container
WO2011095077A1 (zh) 无线通信系统中管理空口映射密钥的方法、系统和装置
WO2011127775A1 (zh) 空中接口密钥的更新方法及无线接入系统
WO2012009981A1 (zh) 空中接口密钥的更新方法、核心网节点及无线接入系统
WO2012022186A1 (zh) 空中接口密钥的更新方法、核心网节点、ue及无线接入系统
WO2013020420A1 (zh) 启用安全密钥的方法,接入网节点、用户设备和系统
WO2022198671A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11791844

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2011791844

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011791844

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2013513528

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2801615

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 13702842

Country of ref document: US