WO2012022188A1 - 多系统无线接入网获知密钥的方法和多系统无线接入网 - Google Patents

多系统无线接入网获知密钥的方法和多系统无线接入网 Download PDF

Info

Publication number
WO2012022188A1
WO2012022188A1 PCT/CN2011/075560 CN2011075560W WO2012022188A1 WO 2012022188 A1 WO2012022188 A1 WO 2012022188A1 CN 2011075560 W CN2011075560 W CN 2011075560W WO 2012022188 A1 WO2012022188 A1 WO 2012022188A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
authentication
core network
access network
sent
Prior art date
Application number
PCT/CN2011/075560
Other languages
English (en)
French (fr)
Other versions
WO2012022188A8 (zh
Inventor
刘芙蕾
窦建武
董小虎
Original Assignee
刘建
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 刘建 filed Critical 刘建
Priority to EP11817715.3A priority Critical patent/EP2600646B1/en
Publication of WO2012022188A1 publication Critical patent/WO2012022188A1/zh
Publication of WO2012022188A8 publication Critical patent/WO2012022188A8/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to mobile communication technologies, and more particularly to a method for obtaining a key by a multi-system radio access network and a multi-system radio access network.
  • the authentication and encryption of the UMTS (Universal Mobile Telecommunications System) and the GSM (Global System for Mobile Communications) system defined by the 3GPP protocol are independently performed.
  • the authentication of the UMTS system is in the USIM (Universal Subscriber Identity Module) and the VLR (Visit Location Register)/SGSN (Serving GPRS Support Node), HLR (Home Location Register). , Home Location Memory) /AuC (Authentication Center) completed between.
  • the authentication quintuple is used: RAND (Random challenge, random number yXRES (Expected Response) / CK (Ciphering Key) / ⁇ (Integrity Key) / AUTN (Authentication Token)
  • RAND Random challenge, random number yXRES (Expected Response) / CK (Ciphering Key) / ⁇ (Integrity Key) / AUTN (Authentication Token)
  • the VLR sends the keys CK and IK to the RNC, and the RNC and the USIM complete the encryption
  • PS Packet Switch
  • the SGSN and the USIM complete the encryption.
  • the authentication of the GSM system is performed between the SIM (Subscriber Identity Module) and the VLR/SGSN, HLR/AuC.
  • the authentication triple is used: RAND (Random challenge random number) /SRES(Signed Response)/Kc(Cipher Key).
  • the VLR sends the key Kc to the BSC, and the BSC and SIM complete the encryption;
  • the SGSN and the SIM complete the encryption.
  • the R99+HLR/AuC and the R99+ VLR/SGSN have different radio access networks UTRAN (UMTS Terrestrial Radio Access Network, Mobile Equipment and Terrestrial Radio Access Network) or BSS. (B Ase Station System, base station system) The function of converting keys CK/IK and Kc.
  • the VLR/SGSN will be delivered by the HLR/AuC according to the UTRAN or BSS of the radio access network.
  • the directly generated key or the key that is converted according to the radio access network For example, when the USIM accesses from the UTRAN, the VLR sends the keys CK and IK directly generated by the HLR/AuC to the UTRAN.
  • the VLR When the USIM accesses from the GSM BSS, the VLR will generate the key CK generated by the HLR/AuC. IK is converted to Kc and sent to BSS.
  • the VLR converts the Kc generated by the HLR/AuC into CK and IK and sends it to the UTRAN.
  • the VLR When the SIM accesses from the GSM BSS, the VLR will directly generate the Kc generated by the HLR/AuC. Send it to BSS. In this way, when the mobile user switches between systems, such as from UMTS to GSM (and vice versa), if both systems use encryption and the encryption key is different, the CS domain voice service must wait until the radio side RNC or BSC. After the VLR obtains the key, the business can continue.
  • the present invention provides a method for obtaining a key by a multi-system radio access network, the method comprising:
  • the multi-system radio access network receives and parses the authentication message sent by the multi-system core network, and determines, according to the parsing result, whether the key sent by the subsequent multi-system core network is an initial value;
  • the multi-system radio access network performs key conversion on the key to obtain a secret of the destination system. key.
  • the multi-system radio access network includes a radio network controller (RNC) and a base station controller (BSC); and determining, according to the parsing result, whether the key sent by the multi-system core network is an initial value comprises: When the user equipment is initially accessed by the RNC, and the authentication message is a 5-tuple authentication message, or when the user equipment is initially accessed through the BSC, and the authentication message is not a 5-tuple authentication message, Then, it is determined that the key sent by the multi-system core network is an initial value.
  • RNC radio network controller
  • BSC base station controller
  • the authentication message includes an authentication request and an authentication response.
  • the step of receiving and parsing the authentication message includes: if the authentication request carries an authentication token (AUTN) or the authentication response carries an authentication response parameter An extension (Authentication Response parameter (extension)) determines that the authentication message is a 5-tuple authentication message.
  • AUTN authentication token
  • An extension Authentication Response parameter (extension)
  • the step of performing key conversion on the key by the multi-system radio access network to obtain the key of the destination system includes: if the key sent by the multi-system core network is an encryption key (CK) and a consistency key (IK) And the CK and IK are initial values, when the user equipment switches from a Universal Mobile Telecommunications System (UMTS) or a Time Division Synchronous Code Division Multiple Access (TD-SCDMA) system to a Global System for Mobile Communications (GSM) system, The multi-system radio access network converts the CK and IK into a cryptographic key (Kc); or, if the key sent by the multi-system core network is Kc and the Kc is an initial value, then the user When the device switches from the GSM system to the USIM or TD-SCDMA system, the multi-system radio access network converts the Kc to CK and IK.
  • UMTS Universal Mobile Telecommunications System
  • TD-SCDMA Time Division Synchronous Code Division Multiple Access
  • GSM Global System for Mobile Communications
  • the multi-system radio access network includes a radio network controller (RNC) and a base station controller (BSC); the step of converting the CK and IK to Kc comprises: when the user equipment switches to the GSM system, the RNC completes the slave Converting CK and IK to Kc and transmitting to the BSC; the step of converting the Kc to CK and IK includes: when the user equipment switches to the UMTS or TD-SCDMA system, the BSC completes from Kc to CK and IK Converted and sent to the RNC.
  • RNC radio network controller
  • BSC base station controller
  • the multi-system radio access network is in a single mode or a multi-mode form.
  • the present invention further provides a multi-system radio access network, comprising: an authentication message parsing and judging module, which is configured to: receive and parse a multi-system core network to transmit when the user equipment initially accesses Authentication message
  • a key judging module configured to determine, according to the parsing result, whether a key sent by the multi-system core network is an initial value
  • a key conversion module configured to: if the key determination module determines that the key sent by the multi-system core network is an initial value, when the user equipment performs multi-system handover, sending the multi-system core network The key is keyed to obtain the key of the destination system.
  • the multi-system radio access network includes two logic units, a radio network controller (RNC) and a base station controller (BSC), and the RNC and the BSC both include an authentication message parsing judging module, a key judging module, and a key. Conversion module, where:
  • the key determination module of the RNC is configured to determine the multi-system core by: Whether the key sent by the network is an initial value: when the user equipment is initially accessed by the RNC, and the authentication message parsing and determining unit of the RNC determines that the received authentication message is a 5-tuple authentication message, The key sent by the multi-system core network is an initial value;
  • the key determining module of the BSC is configured to determine whether the key sent by the multi-system core network is an initial value by: initializing access by the user equipment by using the BSC, and authenticating the BSC When the message parsing judging module judges that the received authentication message is not a 5-tuple authentication message, it determines that the key sent by the multi-system core network is an initial value.
  • the authentication message includes an authentication request and an authentication response.
  • the authentication message parsing and determining module is configured to parse the authentication message sent by the multi-system core network by: if the authentication request carries an authentication token Or the authentication response carries the authentication response parameter extension, and then determines that the authentication message is a 5-tuple authentication message.
  • the key conversion module of the RNC is configured to perform key conversion on a key sent by the multi-system core network to obtain a key of the destination system: if the key sent by the multi-system core network is an initial value, and The key includes CK and IK, and when the user equipment switches from the UMTS or TD-SCDMA system to the GSM system, the CK and IK are converted into a cipher key Kc and sent to the BSC; the BSC
  • the key conversion module is configured to perform key conversion on a key sent by the multi-system core network to obtain a key of the destination system: if the key sent by the multi-system core network is an initial value, and the secret
  • the key is Kc, and when the user equipment switches from the GSM system to the USIM or TD-SCDMA system, the Kc is converted to CK and IK and sent to the RNC.
  • the multi-system wireless access network is in single mode or multi-mode form.
  • the invention analyzes the authentication message through the multi-system radio access network, and knows whether the key is an initial value, and in the initial value, without the core network participating, directly performing key conversion to obtain the target system key, shortening
  • the interruption of the user plane data stream improves the user's perception of the voice service.
  • FIG. 1 is a schematic diagram of a method for acquiring a key in a multi-system radio access network according to the present invention
  • FIG. 2 is a connection diagram of each network element of a multi-system network
  • Figure 3 is a flow chart of Embodiment 1 of the present invention
  • FIG. 5 is a flowchart of Embodiment 3 of the present invention.
  • FIG. 6 is a block diagram showing the structure of a multi-system radio access network according to the present invention.
  • the UTRAN/BSS of the radio access network needs to interact with the VLR to obtain the encryption key of the system, in order to shorten the interruption time of the user plane data and reduce the handover.
  • the UTRAN/BSS of the radio access network converts and exchanges key information by itself, and tries to make the core network not aware.
  • the RNC/BSC of the radio access network can obtain the encryption key generated by the HLR/AuC only before the key CK/ can be performed by itself. Conversion between IK and Kc.
  • the present invention is directed to a method in which the radio access network RNC or the BSC obtains a key from the VLR and cannot know whether it is directly generated by the HLR/AuC, or is converted by the VLR.
  • the radio access network RNC or the BSC obtains a key from the VLR and cannot know whether it is directly generated by the HLR/AuC, or is converted by the VLR.
  • NAS Non-Access-Stratum
  • the present invention is not limited to the UMTS and GSM systems, and is equally applicable to the TD-SCDMA system.
  • the method for obtaining a key by a multi-system radio access network includes the following steps: Step 101: When a user equipment initially accesses, the multi-system radio access network receives and parses the information sent by the multi-system core network. And determining, according to the parsing result, whether the key sent by the subsequent multi-system core network is an initial value;
  • the multi-system handover referred to in the present invention refers to handover between a 2G system and a 3G system
  • the 3G system refers to a Universal Mobile Telecommunications System (UMTS) or a Time Division Synchronous Code Division Multiple Access (TD-SCDMA) system
  • 2G system refers to global mobile communication. (GSM).
  • the multi-system radio access network includes an RNC (Radio Network Controller) and a BSC (Base Station Controller).
  • the application scenario is that RNC and BSC are connected to the same R99+ VLR/SGSN (R98-VLR/SGSN does not support RNC) or two different R99+ VLR/SGSN, and multiple systems use the same R98- or R99+HLR/AuC, such as Figure 2 shows.
  • the authentication process is performed between the USIM or SIM and the VLR/SGSN, and the message interaction is directly performed between the two.
  • the authentication quintuple is used when the USIM card and the VLR/SGSN are authenticated, and the authentication triplet is used when the SIM card and the VLR/SGSN are authenticated.
  • the NAS authentication messages exchanged between the USIM or the SIM and the VLR are: AUTHENTICATION REQUEST and AUTHENTICATION RESPONSE, and the RNC or BSC in the multi-system is parsed.
  • the AUTHENTICATION REQUEST is implemented on the wireless interface through Direct Transfer and Downlink direct transfer messages.
  • the AUTHENTICATION RESPONSE is implemented on the wireless interface by Uplink direct transfer and Direct transfer.
  • the method for obtaining an authentication group is as follows:
  • AUTHENTICATION REQUEST includes an authentication parameter AUTN (Authentication Token); and the AUTN cell is not included in the authentication request for triplet authentication.
  • AUTN Authentication Token
  • the RNC or the BSC resolves the AUTHENTICATION REQUEST, if the authentication parameter AUTN is found, the USIM card is being authenticated, that is, the authentication request is a 5-tuple authentication message. If not, the SIM card is in progress. Authentication, that is, the authentication request is a triple authentication message.
  • Authentication response for quintuple authentication according to the message structure defined by the 3GPP protocol (AUTHENTICATION RESPONSE) includes an authentication response parameter (extension) cell; the authentication request for triplet authentication does not include the cell.
  • AUTHENTICATION RESPONSE includes an authentication response parameter (extension) cell; the authentication request for triplet authentication does not include the cell.
  • the RNC or BSC parses the AUTHENTICATION RESPONSE, if there is an authentication response parameter extension, it is a USIM card, that is, the authentication response is a 5-tuple authentication message, and if not, it is a SIM card, that is, the authentication response is Triad authentication message.
  • the RNC or the BSC determines whether the key sent by the subsequent core network is an initial value, and determines the initial value in the following two cases:
  • Scenario 1 The user equipment is initially accessed by the RNC, and the received authentication message is a 5-tuple authentication message, that is, the RNC parses out the access system by the USIM card;
  • Case 2 The user equipment is initially accessed through the BSC, and the received authentication message is not a 5-tuple authentication message, that is, the BSC resolves the access system by the SIM card.
  • Case 1 The user equipment is initially accessed through the RNC, and the received authentication message is not a 5-tuple authentication message, that is, the RNC parses out the access system by the SIM card;
  • Scenario 2 The user equipment is initially accessed by the BSC, and the received authentication message is a quintuple authentication message. That is, the BSC resolves the access system by the USIM card.
  • Step 102 If it is determined that the key sent by the multi-system core network is an initial value, when the user equipment performs multi-system handover, the multi-system radio access network performs key conversion on the key to obtain a destination system. Key.
  • key conversion can be performed by the radio access network only when it is judged to be the initial value.
  • the key sent by the multi-system core network is an encryption key (CK) and a consistency key (IK) and is determined to be an initial value, and the user equipment is from the Universal Mobile Telecommunications System (UMTS) or Time Division Synchronous Code Division Multiple Access. (TD-SCDMA) when the system switches to a Global System for Mobile Communications (GSM) system, the multi-system radio access network converts the CK and IK into a cryptographic key (Kc), specifically,
  • the RNC uses the c3 algorithm to convert the CK and IK sent by the MSC/VLR through the Security mode command to Kc and then to the BSC.
  • CK CK1
  • CK2 and IK IK1
  • Kc Kc
  • the BSC uses the c4 and c5 algorithms to convert the Kc sent by the MSC/VLR into CK and IK, and then sends it to the RNC.
  • CK[UMTS] Kc II Kc
  • the USIM user voice service authentication encryption process includes:
  • Step 301 The USIM sends the IMSI to the HLR/AuC through the MSC/VLR.
  • Step 302 The HLR/AuC generates an authentication quintuple: RAND, XRES, CK, IK, and AUTN, where the AUTN includes an SQN (Sequence Number Sequence Number), an AK (Anonymity Key Anonymous Key), and an AMF (Authentication Management Field Authentication). Management domain), MAC (message authentication code), and sent to the MSC/VLR;
  • Step 303 The MSC/VLR sends the RAND and the AUTN to the USIM through an authentication request (AUTHENTICATION REQUEST);
  • the MSC/VLR sends a direct transfer to the RNC, and the NAS messages (such as RAND and AUTN) that need to be transparently transmitted are carried in the IE NAS-PDU (Packet Data Unit);
  • NAS messages such as RAND and AUTN
  • IE NAS-PDU Packet Data Unit
  • the RNC sends a Downlink direct transfer to the UE, and the NAS message that needs to be transparently transmitted is carried in the IE NAS message;
  • the radio side RNC parses the message. If it is found that there is an AUTN, it indicates that the USIM card is being authenticated, and the RNC can save the information.
  • Step 304 The USIM calculates a five-tuple according to K (authentication key; ) and RAND: RAND, XRES, CK, IK, and AUTN;
  • Step 305 The USIM compares the MAC calculated by itself with the MAC sent by the MSC/VLR.
  • Step 306 If the two are equal, the USIM sends the self-calculated XRES to the MSC/VLR through an authentication response (AUTHENTICATION RESPONSE);
  • the UE sends an Uplink direct transfer to the RNC, and the NAS message (such as XRES) that needs to be transparently transmitted is carried in the IE NAS message;
  • the NAS message such as XRES
  • the RNC sends a direct transfer to the MSC/VLR, and the NAS message that needs to be transparently transmitted is carried in the IE NAS-PDU;
  • the RNC parses this information on the wireless side. If it finds a cell Authentication Response parameter (extension), it means that it is a USIM card, and the RNC can save the information. The RNC only needs to parse out any one of the steps 303 or 306;
  • Step 307 The MSC/VLR compares the XRES transmitted by the HLR/AuC with the XRES sent by the USIM. If the two are equal, the MSC/VLR sends an encrypted message to the RNC.
  • Step 308 The MSC/VLR sends a security mode command to the RNC, carrying the keys CK and IK;
  • step 303 or step 306 the RNC parses the USIM card for authentication. If the UE switches to the GSM system in the subsequent process, the RNC directly uses the c3 algorithm to obtain the Kc and delivers it to the BSC without interacting with the VLR.
  • Step 309 The RNC sends a security mode command to the UE to perform a security policy
  • Step 310 The UE replies to the RNC with a security mode complete (Security mode complete) indicating that the wireless side encryption is completed.
  • Step 311 The RNC replies to the MSC/VLR with a security mode complete (Security mode complete) indicating that the security key is completed.
  • the USIM user voice service authentication encryption process includes the following steps:
  • Step 401 The USIM sends the IMSI to the HLR/AuC through the MSC/VLR.
  • Step 402 The HLR/AuC generates an authentication quintuple: RAND, XRES, CK, IK and AUTN and sends it to the MSC/VLR;
  • Step 403 The MSC/VLR puts the RAND and the AUTHENTICATION REQUEST
  • the wireless side BSC transparently transmits and parses the message. If the AUTN is found, the USIM card is being authenticated, and the BSC can save the information.
  • Step 404 The USIM calculates a five-tuple according to K (authentication key) and RAND: RAND, XRES, CK, IK, and AUTN;
  • Step 405 The USIM compares the MAC calculated by itself with the MAC sent by the MSC/VLR.
  • Step 406 If the two are equal, the USIM sends the self-calculated XRES to the MSC/VLR through the AUTHENTICATION RESPONSE;
  • the wireless side BSC transparently transmits and parses out this message if it finds a cell authentication.
  • the response parameter (extension) indicates that it is a USIM card, and the BSC can save the information.
  • the BSC only needs to parse out any one of the steps 403 or 406;
  • Step 407 The MSC/VLR compares the XRES transmitted by the HLR/AuC with the XRES sent by the USIM. If the two are equal, the MSC/VLR prepares to send an encrypted message to the BSC.
  • Step 408 Since the radio access network is a BSS, the MSC/VLR needs to convert the keys CK and IK into Kc to send to the BSC;
  • Step 409 The MSC/VLR sends the Kc through the cipher mode command. Send to BSC.
  • step 403 or step 406 the BSC parses the USIM card for authentication, and determines that the key sent by the subsequent core network is a calculated value instead of an initial value. If the UE switches to the UTRAN system in the subsequent process, the BSC may not directly Using c4 and c5 algorithms to get CK and IK to the RNC, the initial CK and IK must be sent to the RNC through the VLR;
  • Step 410 The BSC sends an encryption mode setting (Cipher mode setting) to the UE for encryption, carrying the key Kc;
  • Step 411 The UE converts the initially generated CK and IK into Kc by itself;
  • Step 412 The UE and the BSC complete the encryption and reply to the cipher response.
  • the SIM user authentication and encryption process includes the following steps:
  • Step 501 The SIM sends the IMSI to the HLR/AuC through the MSC/VLR.
  • Step 502 The HLR/AuC generates an authentication triplet and sends it to the MSC/VLR.
  • the authentication triples are RAND, SRES and Kc.
  • Step 503 The MSC/VLR sends an authentication request (Authentication Request) to the SIM, where the RAND is carried;
  • the BSC transparently transmits and parses the message. If it is found that there is no AUTN, it indicates that the SIM card is being authenticated, and the BSC can save the information.
  • Step 504 The SIM calculates SRES and Kc according to K (authentication key) and RAND;
  • the wireless side BSC transparently transmits and parses out this information. If it is found that there is no cell Authentication Response parameter (extension), it indicates that it is a SIM card, and the BSC can save the information. BSC Only one of the messages of step 503 or step 505 needs to be parsed.
  • Step 506 The MSC/VLR compares the SRES transmitted by the HLR/AuC with the SRES sent by the SIM;
  • Step 507 If the two are equal, the MSC/VLR sends a Cipher mode command to the BSC;
  • step 503 or step 505 the BSC parses the SIM card for authentication, and then determines that the key sent by the subsequent core network is an initial value. If the UE switches to the UTRAN system in the subsequent process, the BSC directly uses the c4 and c5 algorithms to obtain the CK. And IK is passed to the RNC, and then CK and IK are directly passed to the RNC through the Iur-g interface to omit the interaction with the VLR;
  • Step 508 The BSC sends a Cipher mode setting command to the UE, indicating that the encryption is performed by using Kc.
  • Step 509 The UE returns a Cipher response to the BSC, indicating that the wireless side encryption is completed.
  • Step 510 The BSC returns a Cipher mode complete message to the MSC/VLR indicating that the encryption is complete.
  • the present invention further provides a multi-system radio access network.
  • the multi-system radio access network includes:
  • the authentication message parsing and judging module is configured to: receive and parse an authentication message sent by the multi-system core network when the user equipment initially accesses;
  • a key judging module configured to determine, according to the parsing result, whether a key sent by the multi-system core network is an initial value
  • a key conversion module configured to: when the key determination module determines that the key sent by the multi-system core network is an initial value, and the user equipment performs multi-system handover, the secret sent to the multi-system core network The key is keyed to obtain the key of the destination system.
  • the multi-system radio access network includes two logic units, a radio network controller (RNC) and a base station controller (BSC), and the RNC and the BSC both include an authentication message parsing judging module and a key judging module. And a key conversion module, where: When the user equipment is initially accessed by the RNC, if the authentication message parsing determination module of the RNC determines that the received authentication message is a 5-tuple authentication message, the key determination module of the RNC determines the The key sent by the multi-system core network is an initial value;
  • the key determination module of the BSC determines The key sent by the multi-system core network is an initial value.
  • the authentication message includes an authentication request and an authentication response. If the authentication request carries an authentication token (AUTN) or the authentication response carries an authentication response parameter (extension), the RNC and the BSC are authenticated.
  • the right message parsing and judging module judges that the authentication message is a 5-tuple authentication message. If the authentication request does not carry the AUTN and the authentication response does not carry the authentication response parameter extension, it is determined that the authentication message is not a 5-tuple authentication message. .
  • the key determination module of the RNC determines that the key sent by the multi-system core network is an initial value, and the key includes an encryption key (CK) and a consistency key (IK), then the user When the device switches from a Universal Mobile Telecommunications System (UMTS) or a Time Division Synchronous Code Division Multiple Access (TD-SCDMA) system to a Global System for Mobile Communications (GSM) system, the key state transition module of the RNC converts the CK and IK into a cryptographic key (Kc) and sent to the BSC;
  • UMTS Universal Mobile Telecommunications System
  • TD-SCDMA Time Division Synchronous Code Division Multiple Access
  • GSM Global System for Mobile Communications
  • the key determination module of the BSC determines that the key sent by the multi-system core network is an initial value, and the key is Kc, when the user equipment switches from the GSM system to the USIM or TD-SCDMA system
  • the key state transition module of the BSC converts Kc into CK and IK and sends it to the RNC.
  • the multi-system radio access network is in a single mode or a multi-mode form.
  • the present invention is applicable to the handover after the initial access of the CS domain service. If the original system is switched back after switching, the core network does not need to participate, and the wireless access network performs encryption according to the cached key.
  • the technical solution of the present invention is to obtain the destination system key by the radio access network without the participation of the core network. Therefore, the source system can be wirelessly connected if the key is the initial value. The initial value of the key can be sent to the wireless access network of the destination system, and the key access is completed by the wireless access network of the destination system.
  • the method and the radio access network of the present invention analyze the authentication message through the radio access network, and know whether the key is an initial value, and in the initial value, without the core network participating, directly performing key conversion to obtain the target system
  • the key shortens the interruption time of the user plane data stream and improves the user's perception of the voice service.
  • the core network is not perceived; the radio access network (RNC/BSC) and the core network (VLR) are reduced.
  • the present invention analyzes the authentication message through the multi-system radio access network, and knows whether the key is an initial value, and in the initial value, without the core network participating, directly performing key conversion, obtaining
  • the destination system key shortens the interruption time of the user plane data stream and improves the user's perception of the voice service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及一种多系统无线接入网获知密钥的方法以及多系统网络,该方法包括:用户设备初始接入时,多系统无线接入网接收并解析多系统核心网发送的鉴权消息,并根据解析结果判断后续所述多系统核心网发送的密钥是否为初始值;以及,若判断所述多系统核心网发送的密钥为初始值,则在所述用户设备执行多系统切换时,所述多系统无线接入网对所述密钥进行密钥转换获得目的系统的密钥。本发明方法和多系统无线接入网可以在不需要多系统核心网参与的情况下,获得目的系统密钥。

Description

多系统无线接入网获知密钥的方法和多系统无线接入网
技术领域
本发明涉及移动通信技术, 尤指一种多系统无线接入网获知密钥的方法 和多系统无线接入网。
背景技术
目前 3GPP 协议定义的 UMTS (Universal Mobile Telecommunications System,通用移动通信系统)和 GSM(Global System for Mobile Communications, 全球移动通信)系统的鉴权和加密都是分别独立进行的。 其中, UMTS系统的 鉴权在 USIM(Universal Subscriber Identity Module , 通用用户识别卡)与 VLR( Visiting Location Register,访问位置存储器) /SGSN(Serving GPRS Support Node, 服务 GPRS支持节点) , HLR(Home Location Register, 归属位置存储 器) /AuC ( Authentication Center, 鉴权中心)之间完成。 使用的是鉴权五元组: RAND(Random challenge , 随机数 yXRES(Expected Response , 期望响 应)/CK(Ciphering Key , 加密密钥)/ΙΚ ( Integrity Key , 一致性密钥 ) /AUTN(Authentication Token,鉴权标记)。鉴权通过后,对于 CS(Circuit Switch, 电路交换)域, VLR把密钥 CK和 IK发送给 RNC, RNC和 USIM完成加密; 对于 PS(Packet Switch, 分组交换)域, SGSN和 USIM完成加密。 GSM系统 的鉴权在 SIM ( Subscriber Identity Module, 用户识别卡)与 VLR/SGSN, HLR/AuC 之间完成。 使用的是鉴权三元组: RAND(Random challenge 随机 数) /SRES(Signed Response, 符号响应)/ Kc(Cipher Key, 密码密钥)。 SIM与 VLR/SGSN完成鉴权后, 对于 CS域, VLR把密钥 Kc发送给 BSC, BSC和 SIM完成加密; 对于 PS域, SGSN和 SIM完成加密。 另夕卜, R99+HLR/AuC 和 R99+ VLR/SGSN具有根据不同的无线接入网 UTRAN ( UMTS Terrestrial Radio Access Network, 移动设备和陆地无线接入网)或 BSS ( Base Station System, 基站系统 )转换密钥 CK/IK和 Kc的功能。
因此, VLR/SGSN会根据无线接入网 UTRAN或 BSS下发由 HLR/AuC 直接产生的密钥或自己根据无线接入网转换后的密钥。 比如当 USIM从 UTRAN接入时, VLR会给 UTRAN下发由 HLR/AuC直接产生的密钥 CK和 IK; 而当 USIM从 GSM BSS接入时, VLR会把 HLR/AuC产生的密钥 CK和 IK转换成 Kc下发给 BSS。 反之, 当 SIM从 UTRAN接入时, VLR会把 HLR/AuC产生的 Kc转换成 CK和 IK下发给 UTRAN;而当 SIM从 GSM BSS 接入时, VLR会把 HLR/AuC产生的 Kc直接下发给 BSS。 这样移动用户在跨 系统切换时, 比如从 UMTS切换到 GSM时(反之亦然) , 如果两个系统都 釆用加密, 而加密密钥不同, 对于 CS域语音业务要等到无线侧 RNC或 BSC 从 VLR获得密钥后, 业务才能继续。
发明内容
本发明的目的是提供一种多系统无线接入网获知密钥的方法以及多系统 网络, 以在不需要多系统核心网参与的情况下, 获得目的系统密钥。
为解决以上技术问题, 本发明提供了一种多系统无线接入网获知密钥的 方法, 该方法包括:
用户设备初始接入时, 多系统无线接入网接收并解析多系统核心网发送 的鉴权消息, 并根据解析结果判断后续所述多系统核心网发送的密钥是否为 初始值; 以及
若判断所述多系统核心网发送的密钥为初始值, 则当所述用户设备执行 多系统切换时, 所述多系统无线接入网对所述密钥进行密钥转换获得目的系 统的密钥。
所述多系统无线接入网包括无线网络控制器 (RNC ) 和基站控制器 ( BSC ) ; 根据解析结果判断后续所述多系统核心网发送的密钥是否为初始 值的步骤包括: 当所述用户设备通过 RNC初始接入, 且所述鉴权消息为五元 组鉴权消息时, 或者, 当所述用户设备通过 BSC初始接入, 且所述鉴权消息 不是五元组鉴权消息时,则判断后续所述多系统核心网发送的密钥为初始值。
所述鉴权消息包括鉴权请求及鉴权响应; 接收并解析所述鉴权消息的步 骤包括: 若鉴权请求携带鉴权标记(AUTN )或鉴权响应携带鉴权响应参数 扩展 ( Authentication Response parameter (extension) ) , 则判断该鉴权消息为 五元组鉴权消息。
多系统无线接入网对所述密钥进行密钥转换获得目的系统的密钥的步骤 包括: 若所述多系统核心网发送的密钥为加密密钥(CK )和一致性密钥(IK ) 且所述 CK和 IK为初始值,则在所述用户设备从通用移动通信系统( UMTS ) 或时分同步码分多址(TD-SCDMA ) 系统切换到全球移动通信(GSM ) 系统 时, 所述多系统无线接入网将所述 CK和 IK转换为密码密钥 (Kc ) ; 或者, 若所述多系统核心网发送的密钥为 Kc且所述 Kc为初始值, 则在所述用 户设备从 GSM系统切换到 USIM或 TD-SCDMA系统时, 所述多系统无线接 入网将所述 Kc转换为 CK和 IK。
所述多系统无线接入网包括无线网络控制器 (RNC ) 和基站控制器 ( BSC ); 将所述 CK和 IK转换为 Kc的步骤包括: 用户设备切换至 GSM系 统时, 所述 RNC完成从 CK和 IK到 Kc的转换并发送给所述 BSC; 将所述 Kc转换为 CK和 IK的步骤包括: 用户设备切换至 UMTS或 TD-SCDMA系 统时, 所述 BSC完成从 Kc到 CK和 IK的转换并发送给所述 RNC。
所述多系统无线接入网为单模或多模形式。
为解决以上技术问题, 本发明还提供了一种多系统无线接入网, 包括: 鉴权消息解析判断模块, 其设置成: 在用户设备初始接入时, 接收并解 析多系统核心网发送的鉴权消息;
密钥判断模块, 其设置成根据解析结果判断后续所述多系统核心网发送 的密钥是否为初始值;
密钥转换模块, 其设置成: 若当所述密钥判断模块判断所述多系统核心 网发送的密钥为初始值, 则在所述用户设备执行多系统切换时, 对多系统核 心网发送的密钥进行密钥转换获得目的系统的密钥。
所述多系统无线接入网包括无线网络控制器( RNC )和基站控制器( BSC ) 两个逻辑单元, 且所述 RNC和 BSC都包括鉴权消息解析判断模块、 密钥判 断模块和密钥转换模块, 其中:
所述 RNC 的密钥判断模块是设置成通过如下方式判断所述多系统核心 网发送的密钥是否为初始值: 当用户设备通过所述 RNC初始接入, 且所述 RNC的鉴权消息解析判断模块判断接收的鉴权消息为五元组鉴权消息时, 判 断所述多系统核心网发送的密钥为初始值;
所述 BSC的密钥判断模块是设置成通过如下方式判断所述多系统核心网 发送的密钥是否为初始值: 当所述用户设备通过所述 BSC初始接入, 且所述 BSC的鉴权消息解析判断模块判断接收的鉴权消息不是五元组鉴权消息时, 判断所述多系统核心网发送的密钥为初始值。 鉴权消息包括鉴权请求及鉴权响应; 所述鉴权消息解析判断模块是设置 成通过如下方式解析所述多系统核心网所发送的鉴权消息: 若所述鉴权请求 携带鉴权标记或所述鉴权响应携带鉴权响应参数扩展, 则判断该鉴权消息为 五元组鉴权消息。
所述 RNC 的密钥转换模块是设置成通过如下方式对多系统核心网发送 的密钥进行密钥转换获得目的系统的密钥: 若所述多系统核心网发送的密钥 为初始值, 且所述密钥包括 CK 和 IK, 则在所述用户设备从 UMTS 或 TD-SCDMA系统切换到 GSM系统时, 将所述 CK和 IK转换为密码密钥 Kc 并发送给所述 BSC;所述 BSC的密钥转换模块是设置成通过如下方式对多系 统核心网发送的密钥进行密钥转换获得目的系统的密钥: 若所述多系统核心 网发送的密钥为初始值, 且所述密钥为 Kc, 则在所述用户设备从 GSM系统 切换到 USIM或 TD-SCDMA系统时,将所述 Kc转换为 CK和 IK并发送给所 述 RNC。
多系统无线接入网为单模或多模形式。
本发明通过多系统无线接入网对鉴权消息的解析, 获知密钥是否为初始 值, 并在初始值情况下, 无需核心网参与, 直接进行密钥转换, 获得目的系 统密钥, 缩短了用户面数据流的中断的时间, 提高用户对语音业务的感受。 附图概述
图 1是本发明多系统无线接入网获知密钥方法的示意图;
图 2是多系统网络各网元的连接图; 图 3是本发明实施例一的流程图;
图 4是本发明实施例二的流程图;
图 5是本发明实施例三的流程图;
图 6是本发明多系统无线接入网的模块结构示意图。
本发明的较佳实施方式
由于 UTRAN和 GSM加密密钥不同,现有技术中,用户在多系统切换时, 无线接入网 UTRAN/BSS需要与 VLR交互获得自己系统的加密密钥,为了缩 短用户面数据中断时间, 减少切换时延, 本发明中无线接入网 UTRAN/BSS 自行换算和交互密钥信息, 尽量做到核心网不感知。 同时, 由于 CK/IK和 Kc 之间换算算法 c3,c4和 c5的非自完备性, 所以无线接入网 RNC/BSC只有得 到 HLR/AuC初始产生的加密密钥, 才能自行进行密钥 CK/IK与 Kc之间的转 换。
进一步地,本发明针对无线接入网 RNC或 BSC从 VLR得到密钥时无法 得知是由 HLR/AuC直接产生的, 还是由 VLR转换而来这一问题的解决方法 是, 由无线接入网通过解析 NAS ( Non-Access-Stratum, 非接入层)消息从而 得知接入本系统的是 USIM卡还是 SIM卡, 从而得知 VLR发给无线接入网 的密钥是否是 HLR/AuC产生的初始值,进而判断无线接入网是否可以在多模 系统切换中自行执行密钥转换。
另外,本发明内容不仅限定于 UMTS和 GSM系统,对于 TD-SCDMA系 统也同样适用。
如图 1所示, 本发明多系统无线接入网获知密钥的方法, 该方法包括: 步骤 101 : 用户设备初始接入时, 多系统无线接入网接收并解析多系统 核心网发送的鉴权消息, 并根据解析结果判断后续所述多系统核心网发送的 密钥是否为初始值;
本发明所说的多系统切换指 2G系统和 3G系统之间的切换, 3 G系统指 通用移动通信系统(UMTS )或时分同步码分多址(TD-SCDMA ) 系统; 2G 系统指全球移动通信(GSM ) 。 多系统无线接入网包括 RNC ( Radio Network Controller, 无线网络控制 器)和 BSC(Base Station Controller, 基站控制器)。
应用的场景为 RNC 和 BSC 连接到同一个 R99+ VLR/SGSN ( R98- VLR/SGSN不支持 RNC )或两个不同的 R99+ VLR/SGSN, 多系统使用同一 个 R98- 或 R99+HLR/AuC, 如图 2所示。
无论 UMTS系统、 TD-SCDMA系统、 还是 GSM系统, 鉴权过程都是在 USIM或 SIM与 VLR/SGSN之间完成, 消息交互也是在两者之间直接进行。 USIM卡与 VLR/SGSN鉴权时使用的是鉴权五元组, 而 SIM卡与 VLR/SGSN 鉴权时使用的是鉴权三元组。
如图 3和图 5所示, USIM或 SIM与 VLR之间交互的 NAS鉴权消息是: 鉴权请求( AUTHENTICATION REQUEST )和鉴权响应( AUTHENTICATION RESPONSE ) , 多系统中的 RNC或 BSC只要解析出这两个消息中的一个 IE ( Information Element, 信元) , 也即鉴权消息是鉴权五元组消息还是鉴权三 元组消息, 即可知将要接入当前系统的是 USIM卡还是 SIM卡。 在 UMTS系 统中, AUTHENTICATION REQUEST在无线接口上通过直传( Direct transfer ) 和下行直传 (Downlink direct transfer ) 消息实现; AUTHENTICATION RESPONSE 在无线接口上通过上行直传 ( Uplink direct transfer ) 和 Direct transfer实现。
获得鉴权组的方法如下:
根据 3GPP 协议定义的消息结构, 用于五元组鉴权的鉴权请求
( AUTHENTICATION REQUEST ) 中包含鉴权参数 AUTN ( Authentication Token, 鉴权标记); 而用于三元组鉴权的鉴权请求中不包括该 AUTN信元。
RNC或 BSC只要解析出 AUTHENTICATION REQUEST,如果发现其中 有鉴权参数 AUTN, 则说明是 USIM卡正在进行鉴权, 也即该鉴权请求为五 元组鉴权消息, 如果没有说明是 SIM卡正在进行鉴权, 也即鉴权请求为三元 组鉴权消息。
根据 3GPP 协议定义的消息结构, 用于五元组鉴权的鉴权响应 ( AUTHENTICATION RESPONSE )中包含鉴权响应参数扩展( Authentication Response parameter(extension) )这一信元; 而用于三元组鉴权的鉴权请求中不 包括该信元。
RNC或 BSC解析 AUTHENTICATION RESPONSE时, 如果存在鉴权响 应参数扩展, 则说明是 USIM卡, 也即该鉴权响应为五元组鉴权消息, 如果 没有则是 SIM卡, 也即该鉴权响应为三元组鉴权消息。
RNC或 BSC通过解析鉴权请求或鉴权响应后,进而判断后续核心网发送 的密钥是否为初始值, 在以下两种情形下判断为初始值:
情形一: 用户设备通过 RNC初始接入,且接收的鉴权消息为五元组鉴权 消息, 即, RNC解析出接入系统的是 USIM卡;
情形二: 用户设备通过 BSC初始接入, 且接收的鉴权消息不是五元组鉴 权消息, 即, BSC解析出接入系统的是 SIM卡。
相反地, 在以下两种情形下判断为计算值而非初始值:
情形一: 用户设备通过 RNC初始接入,且接收的鉴权消息不是五元组鉴 权消息, 即, RNC解析出接入系统的是 SIM卡;
情形二: 用户设备通过 BSC初始接入, 且接收的鉴权消息是五元组鉴权 消息, 即, BSC解析出接入系统的是 USIM卡。
步骤 102: 若判断所述多系统核心网发送的密钥为初始值, 则所述用户 设备执行多系统切换时, 所述多系统无线接入网对所述密钥进行密钥转换获 得目的系统的密钥。
本发明中, 只有判断为初始值时, 才可以由无线接入网进行密钥转换。 所述多系统核心网发送的密钥为加密密钥(CK )和一致性密钥(IK )且 判断为初始值, 所述用户设备从通用移动通信系统(UMTS )或时分同步码 分多址(TD-SCDMA ) 系统切换到全球移动通信(GSM ) 系统时, 所述多系 统无线接入网将所述 CK和 IK转换为密码密钥 (Kc ) , 具体地,
RNC 使用 c3 算法把 MSC/VLR 通过安全模式命令 (Security mode command )发送过来的 CK和 IK换算成 Kc, 然后发送给 BSC。 c3算法为: Kc[GSM] = CK1 xor CK2 xor IK1 xor IK2;
其中, CKi和 IKi都是 64 bits, CK = CK1 || CK2 and IK = IK1 || IK2。 所述多系统核心网发送的密钥为 Kc且判断为初始值, 所述用户设备从 GSM系统切换到 USIM或 TD-SCDMA系统时, 所述多系统无线接入网将所 述 Kc转换为 CK和 IK, 具体地,
BSC使用 c4和 c5算法把 MSC/VLR发送过来的 Kc换算成 CK和 IK,然 后发送给 RNC。
c4算法为: CK[UMTS] = Kc II Kc;
c5算法为: IK[UMTS] = Kcl xor Kc2 || Kc || Kcl xor Kc2;
在 c5中, Kci是 32 bits并且 Kc = Kcl || Kc2。
实施例一
如图 3所示, 当无线接入网是 UTRAN时, USIM用户语音业务鉴权加密 流程包括:
步骤 301 : USIM把 IMSI通过 MSC/VLR发送给 HLR/AuC;
步骤 302: HLR/AuC产生鉴权五元组: RAND,XRES,CK,IK和 AUTN, 其中 AUTN包括 SQN ( Sequence number序列编号) 、 AK ( Anonymity Key 匿名密钥)、 AMF( Authentication management field鉴权管理域)、MAC( message authentication code消息鉴权编码 ) , 并发送给 MSC/VLR;
步骤 303: MSC/VLR通过鉴权请求( AUTHENTICATION REQUEST ) 把 RAND和 AUTN发送给 USIM;
在无线接口上通过以下消息实现:
MSC/VLR给 RNC发送直传( Direct transfer ) , 需要透传的 NAS消息 (如 RAND和 AUTN )在 IE NAS-PDU( Protocol Data Unit, 分组数据单元) 中携带;
RNC向 UE发送下行直传( Downlink direct transfer ) , 需要透传的 NAS 消息在 IE NAS message中携带; 无线侧 RNC解析这条消息,如果发现其中有 AUTN, 则说明正在鉴权的 是 USIM卡, RNC可以保存该信息;
步骤 304: USIM根据 K (鉴权密钥; )和 RAND计算出五元组: RAND, XRES,CK,IK和 AUTN;
步骤 305: USIM把自己计算出的 MAC和 MSC/VLR发送来的 MAC进 行比较;
步骤 306: 如果两者相等, USIM通过鉴权响应 (AUTHENTICATION RESPONSE ) 向 MSC/VLR发送自己计算的 XRES;
在无线接口上通过以下消息来实现:
UE向 RNC发送上行直传( Uplink direct transfer ) , 需要透传的 NAS消 息 (如 XRES )在 IE NAS message中携带;
RNC向 MSC/VLR发送直传( Direct transfer ) , 需要透传的 NAS消息在 IE NAS-PDU中携带;
无线侧 RNC解析出这条信息, 如果发现有信元 Authentication Response parameter(extension) 则说明是 USIM卡, RNC可以保存该信息。 RNC只需要 解析出步骤 303或步骤 306的任何一个消息即可;
步骤 307: MSC/VLR把 HLR/AuC传过来的 XRES与 USIM发过来的 XRES进行比较, 如果两者相等, 则 MSC/VLR向 RNC发送加密消息;
步骤 308 : MSC/VLR 向 RNC 发送安全模式命令 ( Security mode command ) , 携带密钥 CK和 IK;
在步骤 303或步骤 306中 RNC解析出鉴权的是 USIM卡,则在后续过程 中如果 UE切换到 GSM系统, RNC直接使用 c3算法得到 Kc, 传递给 BSC, 而不需要通过与 VLR的交互;
步骤 309: RNC向 UE发送安全模式命令 ( Security mode command )进 行力口密;
步骤 310: UE向 RNC回复安全模式完成( Security mode complete )表示 无线侧加密完成; 步骤 311 : RNC向 MSC/VLR回复安全模式完成 (Security mode complete ) 表示力口密完成。
实施例二
如图 4所示, 当无线接入网是 BSS时, USIM用户语音业务鉴权加密流 程包括以下步骤:
步骤 401: USIM把 IMSI通过 MSC/VLR发送给 HLR/AuC;
步骤 402: HLR/AuC产生鉴权五元组: RAND,XRES,CK,IK和 AUTN并 发送给 MSC/VLR;
步骤 403: MSC/VLR通过 AUTHENTICATION REQUEST把 RAND和
AUTN发送给 USIM;
与实施例一相同, 无线侧 BSC透传并解析这条消息, 如果发现其中有 AUTN, 则说明正在鉴权的是 USIM卡, BSC可以保存该信息;
步骤 404: USIM根据 K (鉴权密钥)和 RAND计算出五元组: RAND, XRES,CK,IK,和 AUTN;
步骤 405: USIM把自己计算出的 MAC和 MSC/VLR发送来的 MAC进 行比较;
步骤 406: 如果两者相等, USIM通过 AUTHENTICATION RESPONSE 向 MSC/VLR发送自己计算的 XRES;
无线侧 BSC 透传并解析出这条信息, 如果发现有信元 Authentication
Response parameter(extension) 则说明是 USIM卡, BSC可以保存该信息。 BSC 只需要解析出步骤 403或步骤 406的任何一个消息即可;
步骤 407: MSC/VLR把 HLR/AuC传过来的 XRES与 USIM发过来的 XRES 进行比较, 如果两者相等, 则 MSC/VLR向 BSC准备发送加密消息;
步骤 408: 因无线接入网是 BSS, MSC/VLR需要将密钥 CK和 IK转换 成 Kc才能发送给 BSC;
步骤 409: MSC/VLR通过加密模式命令 ( cipher mode command )将 Kc 发送给 BSC。
在步骤 403或步骤 406中 BSC解析出鉴权的是 USIM卡, 则判断后续核 心网发送的密钥为计算值,而非初始值,在后续过程中如果 UE切换到 UTRAN 系统, BSC不可以直接使用 c4和 c5算法得到 CK和 IK传递给 RNC,必须通 过 VLR把初始 CK和 IK发送给 RNC;
步骤 410: BSC向 UE发送加密模式设置 (Cipher mode setting )进行加 密, 携带密钥 Kc;
步骤 411 : UE自行将初始生成的 CK和 IK转换成 Kc;
步骤 412: UE与 BSC完成加密, 回复加密响应 ( cipher response ) ; 步骤 413: BSC向 MSC/VLR回复加密模式完成( Cipher mode complete ) 表示力口密完成。
实施例三
如图 5所示, 当无线接入网是 BSS时, SIM用户鉴权加密流程包括以下 步骤:
步骤 501 : SIM把 IMSI通过 MSC/VLR发送给 HLR/AuC;
步骤 502 : HLR/AuC产生鉴权三元组并发送给 MSC/VLR;
鉴权三元组为 RAND, SRES和 Kc。
步骤 503 : MSC/VLR向 SIM发送鉴权请求( Authentication request ) , 其中携带 RAND;
无线侧 BSC透传并解析这条消息, 如果发现其中没有 AUTN, 则说明正 在鉴权的是 SIM卡, BSC可以保存该信息。
步骤 504 : SIM根据 K (鉴权密钥 )和 RAND计算出 SRES和 Kc; 步骤 505: SIM向 MSC/VLR发送鉴权响应 ( Authentication response ) , 携带自己计算的 SRES;
无线侧 BSC透传并解析出这条信息, 如果发现没有信元 Authentication Response parameter(extension) 则说明是 SIM卡, BSC可以保存该信息。 BSC 只需要解析出步骤 503或步骤 505的任何一个消息即可。
步骤 506 : MSC/VLR把 HLR/AuC传过来的 SRES与 SIM发过来的 SRES 进行比较;
步骤 507 :如果两者相等, MSC/VLR向 BSC发送密码模式命令(Cipher mode command ) ;
在步骤 503或步骤 505中 BSC解析出鉴权的是 SIM卡,则判断后续核心 网发送的密钥为初始值, 在后续过程中如果 UE切换到 UTRAN系统, BSC 直接使用 c4和 c5算法得到 CK和 IK传递给 RNC, 然后通过 Iur-g接口直接 将 CK和 IK传递给 RNC , 以略去与 VLR的交互;
步骤 508 : BSC向 UE发送密码模式设置命令(Cipher mode setting ) , 指示用 Kc进行加密;
步骤 509 : UE向 BSC返回密码响应( Cipher response ) , 表示无线侧加 密完成;
步骤 510 : BSC向 MSC/VLR返回密码模式完成( Cipher mode complete ) 消息指示加密完成。
为实现以上方法, 本发明还提供了一种多系统无线接入网, 如图 6所示, 所述多系统无线接入网包括:
鉴权消息解析判断模块, 其设置成: 在用户设备初始接入时, 接收并解 析多系统核心网发送的鉴权消息;
密钥判断模块, 其设置成根据解析结果判断后续所述多系统核心网发送 的密钥是否为初始值;
密钥转换模块, 其设置成: 当所述密钥判断模块判断所述多系统核心网 发送的密钥为初始值, 且所述用户设备执行多系统切换时, 对多系统核心网 发送的密钥进行密钥转换获得目的系统的密钥。
具体地, 所述多系统无线接入网包括无线网络控制器(RNC )和基站控 制器(BSC ) 两个逻辑单元, 且所述 RNC和 BSC都包括鉴权消息解析判断 模块、 密钥判断模块和密钥转换模块, 其中: 所述用户设备通过所述 RNC初始接入时 , 若所述 RNC的鉴权消息解析 判断模块判断接收的鉴权消息为五元组鉴权消息,则所述 RNC的密钥判断模 块判断所述多系统核心网发送的密钥为初始值;
或者, 所述用户设备通过所述 BSC初始接入时, 若所述 BSC的鉴权消 息解析判断模块判断接收的鉴权消息不是五元组鉴权消息, 则所述 BSC的密 钥判断模块判断所述多系统核心网发送的密钥为初始值。
鉴权消息包括鉴权请求及鉴权响应, 若鉴权请求携带鉴权标记(AUTN ) 或鉴权响应携带鉴权响应参数扩展 ( Authentication Response parameter (extension) ) , 则所述 RNC和 BSC的鉴权消息解析判断模块判断该鉴权消息 为五元组鉴权消息, 若鉴权请求不携带 AUTN且鉴权响应不携带鉴权响应参 数扩展, 则判断该鉴权消息不是五元组鉴权消息。
若所述 RNC 的密钥判断模块判断所述多系统核心网发送的密钥为初始 值, 且所述密钥包括加密密钥 (CK )和一致性密钥 (IK ) , 则当所述用户设 备从通用移动通信系统(UMTS )或时分同步码分多址(TD-SCDMA ) 系统 切换到全球移动通信(GSM ) 系统时, 所述 RNC 的密钥状态转换模块将所 述 CK和 IK转换为密码密钥 (Kc )并发送给所述 BSC;
若所述 BSC 的密钥判断模块判断所述多系统核心网发送的密钥为初始 值, 且所述密钥为 Kc, 则当所述用户设备从 GSM 系统切换到 USIM或 TD-SCDMA系统时, 所述 BSC的密钥状态转换模块将 Kc转换为 CK和 IK 并发送给所述 RNC。
所述多系统无线接入网为单模或多模形式。
本发明适用于 CS域业务初始接入后的切换, 如果是切换后再切换回的 原来的系统, 亦仍无需核心网参与, 由无线接入网根据緩存的密钥执行加密 即可。
本发明解决技术问题的思路在于, 在无需核心网参与的情况下, 由无线 接入网自行获得目的系统密钥, 因此, 可变换地, 在密钥为初始值的情况下, 源系统无线接入网可以将密钥初始值发送给目的系统无线接入网, 由目的系 统无线接入网完成密钥转换。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
本领域的普通技术人员应当理解, 可以对本发明进行修改、 变形或者等 同替换, 而不脱离本发明的精神和范围, 其均应涵盖在本发明的权利要求范 围当中。
本发明方法和无线接入网, 通过无线接入网对鉴权消息的解析, 获知密 钥是否为初始值, 并在初始值情况下, 无需核心网参与, 直接进行密钥转换, 获得目的系统密钥, 缩短了用户面数据流的中断的时间, 提高用户对语音业 务的感受, 一些场景中可以 ^1到核心网不感知; 减少了无线接入网 ( RNC/BSC )与核心网 (VLR )之间信令交互获得加密密钥的过程和时间, 尤其当 RNC和 BSC连接到两个不同的 VLR时, 改进尤其显著。
工业实用性
与现有技术相比, 本发明通过多系统无线接入网对鉴权消息的解析, 获 知密钥是否为初始值, 并在初始值情况下, 无需核心网参与, 直接进行密钥 转换, 获得目的系统密钥, 缩短了用户面数据流的中断的时间, 提高用户对 语音业务的感受。

Claims

权 利 要 求 书
1、 一种多系统无线接入网获知密钥的方法, 包括:
用户设备初始接入时, 多系统无线接入网接收并解析多系统核心网发送 的鉴权消息, 并根据解析结果判断后续所述多系统核心网发送的密钥是否为 初始值; 以及
若判断所述多系统核心网发送的密钥为初始值, 则当所述用户设备执行 多系统切换时, 所述多系统无线接入网对所述密钥进行密钥转换获得目的系 统的密钥。
2、 如权利要求 1所述的方法, 其中,
所述多系统无线接入网包括无线网络控制器 (RNC ) 和基站控制器
( BSC ) ;
根据解析结果判断后续所述多系统核心网发送的密钥是否为初始值的步 骤包括: 当所述用户设备通过 RNC初始接入, 且所述鉴权消息为五元组鉴权 消息时, 或者, 当所述用户设备通过 BSC初始接入, 且所述鉴权消息不是五 元组鉴权消息时, 则判断后续所述多系统核心网发送的密钥为初始值。
3、 如权利要求 1或 2所述的方法, 其中, 所述鉴权消息包括鉴权请求及 鉴权响应; 接收并解析所述鉴权消息的步骤包括: 若所述鉴权请求携带鉴权标记或 者所述鉴权响应携带鉴权响应参数扩展, 则判断该鉴权消息为五元组鉴权消 息。
4、 如权利要求 1所述的方法, 其中, 所述多系统无线接入网对所述密钥 进行密钥转换获得目的系统的密钥的步骤包括: 若所述多系统核心网发送的密钥为加密密钥 (CK )和一致性密钥 (IK ) 且所述 CK和 IK为初始值,则在所述用户设备从通用移动通信系统( UMTS ) 或时分同步码分多址(TD-SCDMA ) 系统切换到全球移动通信(GSM ) 系统 时, 所述多系统无线接入网将所述 CK和 IK转换为密码密钥 (Kc ) ; 或者, 若所述多系统核心网发送的密钥为 Kc且所述 Kc为初始值, 则在所述用 户设备从 GSM系统切换到 USIM或 TD-SCDMA系统时, 所述多系统无线接 入网将所述 Kc转换为 CK和 IK。
5、 如权利要求 4所述的方法, 其中, 所述多系统无线接入网包括无线网 络控制器 ( RNC )和基站控制器( BSC ) ; 将所述 CK和 IK转换为 Kc的步骤包括: 用户设备切换至 GSM系统时, 所述 RNC完成从 CK和 IK到 Kc的转换并将所述 Kc发送给所述 BSC; 将所述 Kc转换为 CK和 IK 的步骤包括: 用户设备切换至 UMTS 或 TD-SCDMA系统时, 所述 BSC完成从 Kc到 CK和 IK的转换并将所述 CK 和 IK发送给所述 RNC。
6、 如权利要求 1所述的方法, 其中, 所述多系统无线接入网为单模或多 模形式。
7、 一种多系统无线接入网, 包括:
鉴权消息解析判断模块, 其设置成: 在用户设备初始接入时, 接收并解 析多系统核心网发送的鉴权消息;
密钥判断模块, 其设置成根据解析结果判断后续所述多系统核心网发送 的密钥是否为初始值;
密钥转换模块, 其设置成: 若所述密钥判断模块判断所述多系统核心网 发送的密钥为初始值, 则在所述用户设备执行多系统切换时, 对多系统核心 网发送的密钥进行密钥转换获得目的系统的密钥。
8、 如权利要求 7所述的多系统无线接入网, 其中, 所述多系统无线接入 网包括无线网络控制器 (RNC )和基站控制器(BSC ) 两个逻辑单元, 且所 述 RNC和 BSC都包括鉴权消息解析判断模块、 密钥判断模块和密钥转换模 块, 其中:
所述 RNC 的密钥判断模块是设置成通过如下方式判断所述多系统核心 网发送的密钥是否为初始值: 当用户设备通过所述 RNC初始接入, 且所述 RNC的鉴权消息解析判断模块判断接收的鉴权消息为五元组鉴权消息时, 则 判断所述多系统核心网发送的密钥为初始值;
所述 BSC的密钥判断模块是设置成通过如下方式判断所述多系统核心网 发送的密钥是否为初始值: 当所述用户设备通过所述 BSC初始接入, 且所述 BSC的鉴权消息解析判断模块判断接收的鉴权消息不是五元组鉴权消息时, 则判断所述多系统核心网发送的密钥为初始值。
9、 如权利要求 7所述的多系统无线接入网, 其中, 所述鉴权消息包括鉴 权请求及鉴权响应; 所述鉴权消息解析判断模块是设置成通过如下方式解析所述多系统核心 网所发送的鉴权消息: 若所述鉴权请求携带鉴权标记或所述鉴权响应携带鉴 权响应参数扩展, 则判断该鉴权消息为五元组鉴权消息。
10、 如权利要求 8所述的多系统无线接入网, 其中,
所述 RNC 的密钥转换模块是设置成通过如下方式对多系统核心网发送 的密钥进行密钥转换获得目的系统的密钥: 若所述多系统核心网发送的密钥 为初始值, 且所述密钥包括加密密钥 (CK )和一致性密钥 (IK ) , 则在所述 用户设备从通用移动通信系统( UMTS )或时分同步码分多址( TD-SCDMA ) 系统切换到全球移动通信(GSM )系统时, 将所述 CK和 IK转换为密码密钥 ( Kc )并发送给所述 BSC;
所述 BSC的密钥转换模块是设置成通过如下方式对多系统核心网发送的 密钥进行密钥转换获得目的系统的密钥: 若所述多系统核心网发送的密钥为 初始值, 且所述密钥为 Kc, 则在所述用户设备从 GSM系统切换到 USIM或 TD-SCDMA系统时, 将所述 Kc转换为 CK和 IK并发送给所述 RNC。
11、 如权利要求 7所述的多系统无线接入网, 其中, 所述多系统无线接 入网为单模或多模形式。
PCT/CN2011/075560 2010-08-17 2011-06-10 多系统无线接入网获知密钥的方法和多系统无线接入网 WO2012022188A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP11817715.3A EP2600646B1 (en) 2010-08-17 2011-06-10 Method for deriving key by multisystem radio access network and multisystem radio access network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010258921.X 2010-08-17
CN201010258921.XA CN102378169B (zh) 2010-08-17 2010-08-17 多系统无线接入网获知密钥的方法和多系统无线接入网

Publications (2)

Publication Number Publication Date
WO2012022188A1 true WO2012022188A1 (zh) 2012-02-23
WO2012022188A8 WO2012022188A8 (zh) 2012-07-12

Family

ID=45604745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075560 WO2012022188A1 (zh) 2010-08-17 2011-06-10 多系统无线接入网获知密钥的方法和多系统无线接入网

Country Status (3)

Country Link
EP (1) EP2600646B1 (zh)
CN (1) CN102378169B (zh)
WO (1) WO2012022188A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428689B (zh) * 2012-05-16 2017-03-15 中兴通讯股份有限公司 密钥处理方法及装置
CN104349317A (zh) * 2013-07-31 2015-02-11 中兴通讯股份有限公司 一种移动网络的接入方法、ue、安全服务网关和系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671507B1 (en) * 2000-06-16 2003-12-30 Siemens Aktiengesellschaft Authentication method for inter-system handover between at least two radio communications systems
EP1915022A1 (en) * 2003-02-13 2008-04-23 Innovative Sonic Limited Method for storing a security start value in a wireless communications system
WO2009082172A2 (en) * 2007-12-24 2009-07-02 Samsung Electronics Co., Ltd. A system and method of handover decision for inter rat handover
CN101772019A (zh) * 2009-01-05 2010-07-07 宏达国际电子股份有限公司 处理跨系统交递保密的方法及其相关通讯装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1705261A (zh) * 2004-05-28 2005-12-07 华为技术有限公司 一种端对端加密通讯系统及方法
CN102572833B (zh) * 2008-04-28 2016-08-10 华为技术有限公司 一种保持用户业务连续性的方法、系统及装置
CN101364865B (zh) * 2008-09-19 2012-02-01 西安西电捷通无线网络通信股份有限公司 一种无线城域网组播密钥管理方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671507B1 (en) * 2000-06-16 2003-12-30 Siemens Aktiengesellschaft Authentication method for inter-system handover between at least two radio communications systems
EP1915022A1 (en) * 2003-02-13 2008-04-23 Innovative Sonic Limited Method for storing a security start value in a wireless communications system
WO2009082172A2 (en) * 2007-12-24 2009-07-02 Samsung Electronics Co., Ltd. A system and method of handover decision for inter rat handover
CN101772019A (zh) * 2009-01-05 2010-07-07 宏达国际电子股份有限公司 处理跨系统交递保密的方法及其相关通讯装置

Also Published As

Publication number Publication date
EP2600646A4 (en) 2014-05-21
WO2012022188A8 (zh) 2012-07-12
EP2600646A1 (en) 2013-06-05
CN102378169A (zh) 2012-03-14
CN102378169B (zh) 2015-08-12
EP2600646B1 (en) 2019-05-15

Similar Documents

Publication Publication Date Title
US9729523B2 (en) Method, network element, and mobile station for negotiating encryption algorithms
US20170359719A1 (en) Key generation method, device, and system
JP4688808B2 (ja) 移動体通信システムにおける暗号化の強化セキュリティ構成
US10306432B2 (en) Method for setting terminal in mobile communication system
TWI332345B (en) Security considerations for the lte of umts
US9667413B2 (en) Encryption realization method and system
JP5597676B2 (ja) 鍵マテリアルの交換
US10798082B2 (en) Network authentication triggering method and related device
CN112154624A (zh) 针对伪基站的用户身份隐私保护
KR20180057665A (ko) 사용자 장비(ue)를 위한 액세스 방법, 디바이스 및 시스템
WO2011127791A1 (zh) 终端移动到增强utran时建立增强密钥的方法及系统
WO2011143977A1 (zh) 终端移动到增强通用陆地无线接入网络(utran)时建立增强密钥的方法及系统
WO2015054853A1 (zh) 分流方法、基站及用户设备
WO2012022188A1 (zh) 多系统无线接入网获知密钥的方法和多系统无线接入网
EP2566205B1 (en) Notifying key method for multi-system core network and multi-system network
JP2020505845A (ja) 緊急アクセス中のパラメータ交換のための方法およびデバイス
KR102593167B1 (ko) 통신 네트워크 시스템의 동작방법
WO2012022192A1 (zh) 安全信息获取方法及多系统网络
Dinckan et al. Authentication and ciphering in GPRS Network
WO2012044484A1 (en) Cipher key generation in communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11817715

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2011817715

Country of ref document: EP