WO2013131461A1 - 一种用户设备接入融合控制网元的实现方法及装置 - Google Patents

一种用户设备接入融合控制网元的实现方法及装置 Download PDF

Info

Publication number
WO2013131461A1
WO2013131461A1 PCT/CN2013/072152 CN2013072152W WO2013131461A1 WO 2013131461 A1 WO2013131461 A1 WO 2013131461A1 CN 2013072152 W CN2013072152 W CN 2013072152W WO 2013131461 A1 WO2013131461 A1 WO 2013131461A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
iagw
network element
control network
message
Prior art date
Application number
PCT/CN2013/072152
Other languages
English (en)
French (fr)
Inventor
陈淑
梁爽
朱春晖
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013131461A1 publication Critical patent/WO2013131461A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to mobile communication technologies, and in particular, to a method and an apparatus for implementing user equipment (UE) access to a converged control network element.
  • UE user equipment
  • FIG. 1 is a schematic diagram showing the structure of a 3GPP access system accessing an EPS.
  • the entire EPS system is divided into a wireless access network and a core network.
  • the home subscriber server (HSS) the mobility management entity (MME, Mobility Management Entity), the Serving GPRS Support Node (SGSN), and the policy charging rule function (PCRF) are included.
  • PCRF policy charging rule function
  • S-GW Serving Gateway
  • PDN Gateway Packet Data Gateway
  • OIS Operator s IP Services
  • the HSS is a permanent storage location for user subscription data, located in the home network to which the user subscribes.
  • the MME is a location where the subscriber subscription data is stored in the current network, and is responsible for UE-to-network non-access stratum signaling management, UE security verification function, UE mobility management, user idle mode tracking and paging management functions, and Bearer management.
  • SGSN is the GSM (Enhanced Data Rate for GSM Evolution) Radio Access Network (GSM, GSM EDGE Radio Access Network).
  • GSM Enhanced Data Rate for GSM Evolution
  • GSM EDGE Radio Access Network GSM EDGE Radio Access Network
  • UMTS UMTS Terrestrial Radio Access Network
  • S-GW which is the gateway of the core network to the wireless system, is responsible for the user plane bearer of the UE to the core network
  • the data buffer in the UE idle mode the function of initiating the service request on the network side, the lawful interception and the packet data routing and forwarding function; the S-GW is responsible for counting the situation in which the UE uses the wireless network, and generates the CDRs of the UE using the wireless network, and transmits the CDRs to the PCRF. .
  • P-GW which is the gateway of the evolved system and the external packet data network of the system.
  • the P-GW is connected to the Internet and the packet data network, and is responsible for the Internet Protocol (IP, Internet Protocol) address allocation, charging function, and packet filtering of the UE. And functions such as policy control.
  • IP Internet Protocol
  • the PCRF is a server in the evolution system that provides rules for charging control, online credit control, threshold control, and quality of service (QoS) policies.
  • QoS quality of service
  • the radio access network is composed of an evolved base station (eNodeB, Evolved NodeB, abbreviated as) and a 3G radio network controller (RNC, Radio Network Controllor), and is mainly responsible for transmitting and receiving wireless signals, and communicating with the UE through the air interface to manage the air interface. Radio resources, resource scheduling, and access control.
  • eNodeB evolved base station
  • RNC Radio Network Controllor
  • the SGSN is an upgraded SGSN, and is capable of supporting an S4 interface with the S-GW, and interworking with the MME using GPRS Tunneling Protocol version 2 (GTPv2).
  • GTPv2 GPRS Tunneling Protocol version 2
  • the SGSN and the MME are connected by Gn interface, and the interworking uses the GPRS tunneling protocol version 1 (GTPvl, GPRS Tunneling Protocol). Version 1 ) 0
  • the SGSN cannot be connected to the S-GW, and is connected to the Gateway GPRS Support Node (GGSN) through the Gn interface to directly access the packet data network.
  • GGSN Gateway GPRS Support Node
  • EPS In addition to supporting the above 3GPP network access, EPS also supports non-3GPP network access, as shown in the figure. As shown in FIG. 2, the interworking with the non-3GPP network is implemented through the S2a/S2b interface, and the P-GW serves as an anchor point between the 3GPP and the non-3GPP network.
  • the non-3GPP network is divided into a non-trusted non-3GPP access network (U-TNAN, Un-Trusted Non-3GPP IP Access Network) and a trusted non-3GPP access network (TNAN, Trusted Non- 3 GPP IP Access Network );
  • U-TNAN non-trusted non-3GPP access network
  • TNAN Trusted Non- 3 GPP IP Access Network
  • the U-TNAN needs to be connected to the P-GW through an EPLG (Evolved Packet Data Gateway), and the interface between the ePDG and the P-GW is S2b; the TNAN can directly pass through the S2a interface.
  • the S2a interface uses the PMIP protocol for information exchange.
  • wireless local area network As a TNAN, wireless local area network (WLAN) is used to divert data traffic and is gradually being paid attention to by many operators.
  • HPLMN local public land mobile network
  • HPLMN includes HSS, PCRF, P-GW, S-GW, 3GPP Authentication Authorization Account Server (AAA Server, Authentication, Authorization and Account Server), Non-3 GPP Networks For TNAN and U-TNAN.
  • the 3GPP UE accesses the EPS system using the architecture shown in Figure 1.
  • the non-3GPP UE accesses the EPS system using the architecture shown in Figure 2.
  • These two access technologies require two different access networks and core networks.
  • the non-3GPP UE accesses the EPS system.
  • the Long Term Evolution (LTE) network resources and the MME in Figure 1 cannot be used by the non-3GPP access system.
  • LTE Long Term Evolution
  • the 3GPP AAA Server needs to be deployed, resulting in network requirements. There are additional operating costs to operate and maintain.
  • the main purpose of the present invention is to provide a method and a device for implementing a user equipment to access a converged control network element, so that the UE can securely access the converged control network element and make full use of the network.
  • Network resources expand network processing capacity.
  • the invention provides a method for implementing user equipment accessing a fusion control network element, and the method includes:
  • iAGW converged access gateway
  • the iAGW After the UE is connected to the iAGW, the iAGW converts the authentication message between the iAGW and the UE into an authentication message between the iAGW and the converged control network element, where the converged control network element performs the access entity and the iAGW. Authentication of the UE; among them,
  • the fused control network element is a 4G fused control network element; and when the access entity is UTRAN, the fused control network element is a 3G fused control network element.
  • the iAGW converts an authentication message between the iAGW and the UE into an authentication message between the iAGW and the converged control network element, and the converged control network element performs UE authentication by using the access entity and the iAGW. , for:
  • the iAGW provides an International Mobile Subscriber Identity (IMSI) of the UE to the Fusion Control Network Element by the access entity;
  • IMSI International Mobile Subscriber Identity
  • the convergence control network element obtains an authentication vector according to the IMSI, and sends a user authentication request to the iAGW by using the access entity;
  • the iAGW triggers the fusion control network element to complete the authentication of the UE.
  • the iAGW provides the IMSI of the UE to the convergence control network element by using an access entity, where:
  • the iAGW sends an attach request to the 4G fusion control network element by using the eNodeB; the 4G fusion control network element sends an identification request to the iAGW; the iAGW requests the permanent identifier of the user from the UE by using an Extensible Authentication Protocol (EAP) request-identification message;
  • EAP Extensible Authentication Protocol
  • the UE provides a permanent identifier of the user to the iAGW through an EAP Reply-Identification message; the iAGW resolves the permanent identifier of the user, Extracting the IMSI and providing the IMSL to the 4G convergence control network element through the eNodeB.
  • the iAGW triggers the fusion control network element to complete the authentication of the UE: iAGW extracts and calculates the authentication token from the user authentication request.
  • the message authentication code transmits the random number, the authentication token, and the message authentication code to the UE through the EAP request-challenge message; the UE runs an authentication and key agreement algorithm, checks the authentication token and the message authentication code, generates a response, and
  • the master session key transmits the response and the message authentication code to the iAGW through the EAP response to the 4 Mbps message; when the iAGW determines that the calculated message authentication code and the received message authentication code are consistent, the eNodeB controls the network element through the eNodeB.
  • the user authentication response is sent back, and the response of the received UE is carried.
  • the 4G fusion control network element determines that the user authentication response sent by the iAGW is consistent with the expected response of the home subscriber server (HSS), and determines that the user authentication succeeds.
  • HSS home subscriber server
  • the method further includes: after determining that the user authentication is successful, sending, by the 4G convergence control network element, a non-access stratum security mode command to the iAGW, where the non-access stratum security mode command includes the evolved universal terrestrial wireless The key set identifier of the access network, the UE security capability, the encryption algorithm, the integrity protection algorithm, and the non-access stratum message authentication code.
  • the method further includes: the iAGW generates a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command.
  • the method further includes: performing, by the iAGW, integrity verification on the received non-access stratum security mode command message according to the generated non-access stratum integrity protection key.
  • the iAGW provides the IMSI of the UE to the 3G fusion control network element by using the access entity, where:
  • the iAGW sends an attach request to the 3G converged control network element through the UTRAN; the 3G converged control network element sends an identification request to the iAGW through the UTRAN; the iAGW requests the permanent identity of the user from the UE through the EAP request-recognition message; the UE responds through the EAP Identifying the message, providing the iAGW with the permanent identity of the user; the iAGW parsing the permanent identity of the user, extracting the IMSI, and providing the IMSI to the 3G Converged Control Network Element through the UTRAN.
  • the iAGW triggers the fusion control network element to complete the authentication of the UE: the iAGW extracts the calculated message authentication code from the authentication token of the user authentication request, and sends the message to the UE through the EAP request-challenge message.
  • the UE runs an authentication and key agreement algorithm, checks the authentication token and the message authentication code, generates a response and a primary session key, and responds to the message through the EAP to the iAGW Transmitting the response and the message authentication code; when the iAGW determines that the calculated message authentication code is consistent with the received message authentication code, the UTRAN sends back a user authentication response to the 3G fusion control network element, and carries the received UE response; 3G The merging control network element determines that the user authentication response sent by the iAGW is consistent with the expected response of the HSS/Home Location Register (HLR), and sends an authentication result indication message to the iAGW, carrying a success indication; the iAGW is carried in the message according to the authentication result indication message. A success indication indicates that the security authentication is passed, and an EAP-success message is sent to the UE.
  • HLR Home Location Register
  • An apparatus for accessing a convergence control network element by a user equipment is located at an iAGW, and includes: an authentication conversion module, configured between the UE and the convergence control network element, configured to connect the iAGW and the UE The authentication message is converted into an authentication message between the iAGW and the converged control network element.
  • the authentication conversion module includes: an IMSI providing module, and a first authentication module;
  • the IMSI providing module configured to provide the IMSI of the UE to the fused control network element by using an access entity
  • the first authentication module is configured to: after receiving the user authentication request, trigger the fusion control network element to complete authentication of the UE;
  • the fused control network element is a 4G fused control network element.
  • the fused control network element is a 3G fused control network element.
  • the IMSI providing module is specifically configured to send an attach request to the 4G convergence control network element by using the eNodeB, and request the user to be permanent by using the EAP request-identification message.
  • the first authentication module is further configured to receive a non-access stratum security mode command sent by the eNodeB from the 4G converged control network element, where the non-access stratum security mode command includes an evolved universal terrestrial radio access network Key set identification, UE security capabilities, encryption algorithms, integrity protection algorithms, and non-access layer message authentication codes.
  • the non-access stratum security mode command includes an evolved universal terrestrial radio access network Key set identification, UE security capabilities, encryption algorithms, integrity protection algorithms, and non-access layer message authentication codes.
  • the IMSI providing module is specifically configured to send an attach request to the 3G fusion control network element by using the UTRAN; request the permanent identifier of the user by using the EAP request-recognition message; parse the permanent identifier of the user, and extract the IMSI, And providing an IMSI to the 3G fusion control network element through the UTRAN; extracting and calculating the message authentication code from the authentication token of the user authentication request, and transmitting the random number, the authentication token, and the message authentication code to the UE by using the EAP request war message
  • the user authentication response is sent back to the 3G convergence control network element through the UTRAN; and the success of the message is sent according to the authentication result sent by the 3G convergence control network element. Instructing to determine that the security authentication is passed, and sending an EAP-success message to the UE;
  • the first authentication module is further configured to receive a non-access stratum security mode command sent by the UTRAN from the 3G converged control network element, where the non-access stratum security mode command includes an evolved universal terrestrial radio access network. Key set identification, UE security capabilities, encryption algorithms, integrity protection algorithms, and non-access layer message authentication codes.
  • the first authentication module is further configured to generate a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command; Layer integrity protection key, integrity check of received non-access stratum security mode command messages After the integrity check is passed, the 4G converged control network element responds to the non-access stratum security mode completion message through the eNodeB.
  • the first authentication module is further configured to generate a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command; Layer integrity protection key, performing integrity check on the received non-access stratum security mode command message; determining that the integrity check is passed, responding to the non-access stratum security mode completion message by the UTRAN to the 3G converged control network element .
  • the device for implementing the access control of the user equipment by the user equipment is located in the fusion control network element, and the device includes:
  • a second authentication module configured to perform authentication on the UE by using the access entity and the iAGW; wherein, when the access entity is an eNodeB, the second authentication module is configured in a 4G fusion control network element;
  • the second authentication module is set in the 3G fusion control network element.
  • the second authentication module is specifically configured to obtain an authentication vector according to the IMSI of the UE, and send a user authentication request to the iAGW through the access entity, and perform authentication on the UE according to the trigger of the iAGW.
  • the second authentication module when the second authentication module is configured in the 4G convergence control network element, the second authentication module is configured to send an identification request to the iAGW through the eNodeB, and receive the IMSI extracted by the iAGW from the permanent identifier; Obtaining the IMSI, obtaining an authentication vector from the HSS; saving the authentication vector sent by the HSS, sending a user authentication request to the iAGW through the eNodeB; receiving the user authentication response sent by the iAGW, determining the user authentication response sent by the iAGW and sending the HSS When the expected response is consistent, the user authentication is determined to be successful.
  • the second authentication module when the second authentication module is configured in the 3G convergence control network element, the second authentication module is configured to send an identification request to the iAGW through the UTRAN, and receive the iAGW from the permanent And identifying the IMSI extracted from the identifier; and obtaining the authentication information from the HSS/HLR by using the obtained IMSI; saving the authentication information response sent by the HSS/HLR, sending the user authentication request to the iAGW through the UTRAN; and receiving the user profile sent by the iAGW
  • the right response when determining that the user authentication response sent by the iAGW is consistent with the expected response of the HSS/HLR, sends an authentication result indication message to the iAGW through the UTRAN.
  • the second authentication module is further configured to: after determining that the user is successfully authenticated, send a non-access stratum security mode command to the iAGW by using the eNodeB, where the non-access stratum security mode command includes the evolved universal ground. a key set identifier of the radio access network, a UE security capability, an encryption algorithm, an integrity protection algorithm, and a non-access stratum message authentication code; receiving a non-access stratum security mode completion message, and storing the non-access stratum message authentication code therein .
  • the second authentication module is further configured to: after sending the authentication result indication message, send a non-access stratum security mode command to the iAGW by using the UTRAN, where the non-access stratum security mode command includes an evolution The key set identifier of the universal terrestrial radio access network, the UE security capability, the encryption algorithm, the integrity protection algorithm, and the non-access stratum message authentication code; receive the non-access stratum security mode completion message, and save the non-access stratum therein Message authentication code.
  • the present invention provides an implementation method and apparatus for a user equipment to access a converged control network element.
  • the iAGW connects the iAGW to the UE.
  • the authentication message is converted into an authentication message between the iAGW and the fused control network element, and the fused control network element performs authentication of the UE by using the access entity and the iAGW; thus, the UE can securely access the fused control network element.
  • FIG. 1 is a schematic structural diagram of a 3GPP access system accessing an EPS in the prior art
  • FIG. 2 is a schematic structural diagram of a non-3GPP access system accessing an EPS in the prior art
  • FIG. 3 is a flow chart showing a method for implementing a user equipment accessing a fusion control network element according to the present invention
  • FIG. 4 is a schematic structural diagram of a 4G fusion control network element provided by the present invention.
  • FIG. 5 is a schematic diagram of a network structure of an Evolved Packet Core (EPC) network of a UE that is LTE-accessed by the UE according to the present invention
  • EPC Evolved Packet Core
  • FIG. 6 is a schematic structural diagram of a 3G fusion control network element provided by the present invention.
  • FIG. 7 is a schematic diagram of a network structure of a UE accessing a fused EPC through a UTRAN according to the present invention.
  • FIG. 8 is a schematic structural diagram of a first implementation apparatus for a user equipment to access a fusion control network element according to the present invention
  • FIG. 9 is a schematic structural diagram of a second implementation apparatus for a user equipment to access a fusion control network element according to the present invention.
  • FIG. 10 is a schematic flowchart of a method for implementing a user equipment to access a 4G convergence control network element according to Embodiment 1 of the present invention.
  • FIG. 11 is a schematic flowchart of a method for implementing a user equipment to access a 3G convergence control network element according to Embodiment 2 of the present invention. detailed description
  • the basic idea of the present invention is: setting an iAGW between the UE and the converged control network element, and after the UE is connected to the iAGW, the iAGW converts the authentication message between the iAGW and the UE into an iAGW and a converged control network element. The authentication message between the two ends to authenticate the UE.
  • iAGW is not limited to supporting WLAN, if iAGW can support UTRAN/GERAN air interface, or other non-3GPP defined air interfaces, such as CDMA, WiMAX, etc., iAGW It is also possible to support terminals of these access types to access the network, and implement authentication and authorization with the converged control network element. If these terminals support the EAP authentication process, then the authentication of the WLAN as described below has been verified. The procedures are similar.
  • WLAN terminal access is taken as an example, and is no longer described for different radio access technology types (RAT, Radio Access Technology).
  • the present invention implements a method for implementing user equipment access to a converged control network element. As shown in FIG. 3, the method includes the following steps:
  • Step 101 Set an iAGW between the UE and the convergence control network element.
  • the converged control network element is a 4G converged control network element that is accessed through LTE.
  • the 4G converged control network element includes an MME and an AAA logical entity, and the MME and the MME The St interface between AAA is used to convey context information;
  • an iAGW is set between the UE and the eNodeB, and the interface between the UE and the iAGW is a WLAN radio interface, and the interface between the iAGW and the eNodeB is an LTE-Uu interface, so that the UE is simulated into one.
  • 3GPP UE accesses to LTE and EPC;
  • the iAGW has the following functions:
  • iAGW supports UE access to LTE and EPC networks
  • the iAGW implements the function of the UE, that is, the eNodeB regards the iAGW as a normal UE, and the iAGW accesses the eNodeB according to the access procedure of the normal UE, and always maintains the booting state.
  • the converged control network element is a 3G converged control network element accessed through the UTRAN.
  • the 3G converged control network element includes the SGSN and the AAA logic.
  • the entity, the Uv interface between the SGSN and the AAA is used to deliver context information;
  • an iAGW is set between the UE and the UTRAN, the interface between the UE and the iAGW is a WLAN radio interface, and the interface between the iAGW and the UTRAN is a Uu interface, so that the UE is simulated as a 3GPP UE.
  • the iAGW has the following functions:
  • iAGW supports UE access to UTRAN and EPC networks; 2)
  • the iAGW implements the function of the UE, that is, the UTRAN regards the iAGW as a normal UE, and the iAGW accesses the UTRAN according to the access procedure of the normal UE, and always maintains the boot attachment state.
  • Step 102 After the UE is connected to the iAGW, the iAGW converts an authentication message between the iAGW and the UE into an authentication message between the iAGW and the converged control network element, where the converged control network element passes the access entity. Performing UE authentication with iAGW;
  • the iAGW provides an International Mobile Subscriber Identity (IMSI) of the UE to the Fusion Control Network Element by using an access entity; the Fusion Control Network Element obtains an authentication according to the IMSI. a vector, and sending, by the access entity, a user authentication request to the iAGW; the iAGW triggers the fusion control network element to authenticate the UE;
  • IMSI International Mobile Subscriber Identity
  • the iAGW provides the IMSI of the UE to the fused control network element by using an access entity, specifically:
  • the fused control network element is a 4G fused control network element.
  • the UE is connected to the iAGW, and the iAGW sends an attach request to the 4G fused control network element by using the eNodeB.
  • the 4G convergence control network element sends an identification request to the iAGW according to the indication that the WLAN access does not have a permanent identifier of the user;
  • the iAGW requests the user from the UE by using an EAP request-identification message
  • the permanent identifier of the user is provided by the UE to the iAGW through the EAP response-recognition message;
  • the iAGW resolves the permanent identifier of the user, extracts the IMSI, and provides the IMSI to the 4G fusion control network element;
  • the fused control network element is a 3G fused control network element.
  • the UE is connected to the iAGW, and the iAGW sends an attach request to the 3G fused control network element through the UTRAN, carrying the An indication of the WLAN access;
  • the 3G convergence control network element sends an identification request to the iAGW according to the indication that the WLAN access does not have a permanent identifier of the user;
  • the iAGW requests the permanent identifier of the user from the UE by using an EAP request-recognition message;
  • the UE provides the permanent identifier of the user to the iAGW through the EAP response-recognition message;
  • the iAGW parses the permanent identifier of the user, extracts the IMSI, and provides the IMSI to the 3G fusion control network element.
  • the convergence control network element obtains an authentication vector according to the IMSI, and sends a user authentication request to the iAGW by using the access entity,
  • the fused control network element is a 4G fused control network element.
  • the 4G fused control network element obtains an authentication vector from the HSS by using the obtained IMSI.
  • the HSS provides an authentication vector to the 4G fusion control network element, where the authentication vector includes a random number, an authentication token, an expected response, and an access security management entity key;
  • the 4G fusion control network element stores the authentication vector, Sending, by the eNodeB, a user authentication request to the iAGW, where the user authentication request includes a random number, an authentication token, and an access security management entity key set identifier;
  • the fused control network element is a 3G fused control network element.
  • the 3G fused control network element obtains the authentication information from the HSS/HLR by using the obtained IMSI.
  • the HSS/HLR returns an authentication information response to the 3G fusion control network element, where the authentication information response includes a random number, an expected response, an authentication token, an encryption key, and an integrity protection key; 3G fusion control network element And saving the authentication information response, and sending a user authentication request to the iAGW by using the UTRAN, where the user authentication request includes a random number, an authentication token, and an access security management entity key set identifier.
  • the iAGW triggers the convergence control network element to complete the authentication of the UE, specifically:
  • the fused control network element is a 4G fused control network element.
  • the iAGW extracts and calculates a message authentication code from the authentication token of the user authentication request, and passes the EAP.
  • a war message transmitting a random number, an authentication token, and a message authentication code to the UE; the UE running an authentication and key agreement algorithm, verifying the authentication token and the message authentication code, generating a response and a primary session key, and passing the EAP Responding to the message, transmitting the response and the message authentication code to the iAGW; when the iAGW determines that the calculated message authentication code is consistent with the received message authentication code, the eNodeB sends back the user authentication response to the 4G convergence control network element, and carries the received message.
  • the 4G fusion control network element determines that the user authentication response sent by the iAGW is consistent with the expected response sent by the HSS, and determines that the user authentication succeeds; Further, after determining that the user authentication is successful, the 4G convergence control network element sends a non-access stratum security mode command to the iAGW through the eNodeB, where the non-access stratum security mode command includes the evolved universal terrestrial radio access network. Key set identification, UE security capability, encryption algorithm, integrity protection algorithm, and non-access layer message authentication code;
  • the iAGW generates a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command;
  • the iAGW determines, according to the non-access stratum security mode command, whether the security capability of the UE is consistent with the security capability of the UE that is sent by itself. When the iAGW is consistent, the security capability of the UE is not changed and attacked, and the non-access stratum of the UE may be accepted.
  • the message, iAGW generates a non-access stratum encryption key using the key set identifier and encryption algorithm of the evolved universal terrestrial radio access network, and generates a non-access layer using the key set identifier and integrity protection algorithm of the evolved universal terrestrial radio access network. Access layer integrity protection key;
  • the iAGW performs integrity check on the received non-access stratum security mode command message according to the generated non-access stratum integrity protection key.
  • the iAGW determines that the integrity check is passed, it indicates that the non-access stratum security mode command is acceptable, and the secure channel is available, and the eNodeB responds to the non-access stratum security mode completion message to the 4G converged control network element, including the non- Access layer message authentication code;
  • the iAGW does not send an initial context setup request to the eNodeB, and sends an EAP-success message to the UE, and the UE authentication succeeds;
  • the converged control network element is a 3G converged control network element.
  • the iAGW extracts and calculates a message authentication code from the authentication token of the user authentication request, and passes the EAP.
  • a war message transmitting a random number, an authentication token, and a message authentication code to the UE; the UE running an authentication and key agreement algorithm, verifying the authentication token and the message authentication code, generating a response and a primary session key, and passing the EAP Responding to the war message, delivering the response and message authentication code to the iAGW;
  • the UTRAN sends a user authentication response to the 3G fusion control network element to carry the response of the received UE; the 3G fusion control network element determines the user sent by the iAGW.
  • the authentication response is consistent with the expected response sent by the HSS/HLR, the authentication succeeds, and the authentication result indication message is sent to the iAGW, where the authentication result indication message carries a success indication; the iAGW indicates the success carried in the message according to the authentication result. Instructing, determining that the security authentication is passed, sending an EAP-success message to the UE, and the UE is successfully authenticated;
  • the 3G convergence control network element sends a non-access stratum security mode command to the iAGW through the UTRAN, where the non-access stratum security mode command includes an evolved universal terrestrial radio connection.
  • the iAGW generates a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command;
  • the iAGW determines, according to the non-access stratum security mode command, whether the security capability of the UE is consistent with the security capability of the UE that is sent by itself. When the iAGW is consistent, the security capability of the UE is not changed and attacked, and the non-access stratum of the UE may be accepted.
  • the message, iAGW generates a non-access stratum encryption key using the key set identifier and encryption algorithm of the evolved universal terrestrial radio access network, and generates a non-access layer using the key set identifier and integrity protection algorithm of the evolved universal terrestrial radio access network. Access layer integrity protection key;
  • the iAGW performs integrity check on the received non-access stratum security mode command message according to the generated non-access stratum integrity protection key.
  • the iAGW determines that the integrity check is passed, it indicates that the non-access stratum security mode command is acceptable, and the secure channel is available, and the NGRAN responds to the non-access stratum security mode completion message to the 3G converged control network element, including the non- Access layer message authentication code;
  • the iAGW does not send an initial context setup request to the 3G converged control network element to the UE.
  • the EAP-success message is sent, and the UE is successfully authenticated.
  • the merging control network element also needs to record the context mapping relationship between the terminal accessed by the iAGW and the iAGW, so that the terminal accessed through the base station and the terminal accessed through the iAGW can be distinguished and processed separately.
  • the converged control network element does not need to re-establish a secure connection between the iAGW and the air interface of the base station, but considers that the iAGW is directly connected to the air interface of the base station in the iAGW access network. The time is still valid.
  • the present invention provides an apparatus for implementing a user equipment to access a converged control network element, and is located at the iAGW.
  • the apparatus includes: an authentication conversion module 21, configured between the UE and the converged control network element. And used to convert the authentication message between the iAGW and the UE into an authentication message between the iAGW and the converged control network element.
  • the authentication conversion module 21 includes: an IMSI providing module 211 and a first authentication module 212;
  • the IMSI providing module 211 is configured to provide the IMSI of the UE to the fused control network element by using an access entity;
  • the first authentication module 212 is configured to: after receiving the user authentication request, trigger the fusion control network element to complete authentication of the UE;
  • the fused control network element is a 4G fused control network element; when the access entity is UTRAN, the fused control network element is a 3G fused control network element; the IMSI providing module 211 Specifically, the eNodeB sends an attach request to the 4G convergence control network element; the EAP request-recognition message is used to request the permanent identifier of the user from the UE; the permanent identifier of the user is parsed, the IMSI is extracted, and the IMSI is provided to the 4G fusion control network element.
  • the authentication response carries the response of the received UE;
  • the first authentication module 212 is further configured to receive a non-access stratum security mode command sent by the eNodeB from the 4G converged control network element, where the non-access stratum security mode command includes an evolved universal terrestrial radio access network. Key set identifier, UE security capability, encryption algorithm, integrity protection algorithm, and non-access layer message authentication code;
  • the first authentication module 212 is further configured to generate a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command; according to the generated non-access stratum integrity Protecting the key, performing integrity check on the received non-access stratum security mode command message; determining that the integrity check is passed, and responding to the non-access stratum security mode completion message by the eNodeB to the 4G converged control network element;
  • the IMSI providing module 211 is specifically configured to send an attach request to the 3G converged control network element by using the UTRAN; request the permanent identifier of the user by using the EAP request-recognition message; parse the permanent identifier of the user, extract the IMSI, and pass the UTRAN Providing an IMSI to the 3G fusion control network element; extracting and calculating a message authentication code from the authentication token of the user authentication request, and transmitting the random number, the authentication token, and the message authentication code to the UE by using the EAP request-challenge message; When the calculated message authentication code is consistent with the message authentication code sent by the UE, the user authentication response is sent back to the 3G convergence control network element by the UTRAN; and the success indication carried in the message is sent according to the authentication result indication message sent by the 3G convergence control network element.
  • the first authentication module 212 is further configured to receive a non-access stratum security mode command sent by the UTRAN from the 3G converged control network element, where the non-access The layer security mode command includes the key set identifier of the evolved universal terrestrial radio access network, the UE security capability, the encryption algorithm, Integrity protection algorithm and non-access stratum message authentication code;
  • the first authentication module 212 is further configured to generate a non-access stratum encryption key and a non-access stratum integrity protection key according to the non-access stratum security mode command;
  • the integrity protection key is used to perform integrity check on the received non-access stratum security mode command message. After the integrity check is passed, the non-access stratum security mode completion message is sent to the 3G converged control network element through the UTRAN.
  • the present invention further provides an apparatus for implementing a user equipment to access a converged control network element, which is located in a converged control network element.
  • the apparatus includes:
  • the second authentication module 31 is configured to perform authentication on the UE by using the access entity and the iAGW; wherein, when the access entity is an eNodeB, the second authentication module is configured in a 4G fusion control network element;
  • the second authentication module is set in the 3G fusion control network element
  • the overall network architecture includes a 4G convergence control network element, an HSS, an S-GW, a P-GW, a PCRF, and an OIS;
  • the 4G convergence control network element is provided with a device for accessing the fusion control network element, and the second authentication module 31 of the device is specifically configured to send an identification request to the iAGW through the eNodeB according to the indication that the WLAN access does not have the permanent identifier of the user.
  • An HSS configured to provide an authentication vector to the second authentication module 41, where the authentication vector includes a random number, an authentication token, an expected response, and an access security management entity key;
  • the second authentication module 31 is further configured to send a non-connection to the iAGW through the eNodeB after determining that the user authentication succeeds.
  • the non-access stratum security mode command includes The key set identifier of the universal terrestrial radio access network, the UE security capability, the encryption algorithm, the integrity protection algorithm, and the non-access stratum message authentication code; receive the non-access stratum security mode completion message, and save the non-access Layer message authentication code;
  • the overall network architecture includes a 3G fusion control network element, an HSS/HLR, an S-GW, a P-GW, a PCRF, and an OIS;
  • a device for accessing the fused control network element is configured in the 3G fused control network element, where the second authentication module 31 is configured to send an identification request to the iAGW according to the WLAN access indication without the permanent identifier of the user, and receive The IMSI extracted from the permanent identifier by the iAGW; and obtains the authentication information from the HSS/HLR by using the obtained IMSI; saves the authentication information response sent by the HSS/HLR, and sends a user authentication request to the iAGW, where the user authentication request is sent Including the random number, the authentication token, and the access security management entity key set identifier; and receiving the user authentication response sent by the iAGW, when determining that the user authentication response sent by the iAGW is consistent with the expected response sent by the HSS/HLR, indicating If the authentication succeeds, the authentication result indication message is sent to the iAGW, where the authentication result indication message carries a success indication;
  • An HSS/HLR configured to return an authentication information response to the second authentication module 31, where the authentication information response includes a random number, an expected response, an authentication token, an encryption key, and an integrity protection key;
  • the second authentication module 31 is further configured to send the authentication result indication message to the iAGW through the UTRAN.
  • the WLAN UE accesses the EPC through LTE as an example to implement a method for accessing the 4G convergence control network element. As shown in FIG. 10, the method includes the following steps:
  • Step 201 The WLAN UE is connected to the iAGW, and the connection relationship is established according to the access procedure.
  • Step 204 The 4G fusion control network element sends an identification request to the iAGW.
  • Step 205 The iAGW requests the permanent identifier of the user from the WLAN UE by using an EAP request-identification message.
  • Step 206 The WLAN UE provides the permanent identifier of the user to the iAGW by using an EAP response-recognition message.
  • Step 207 The iAGW parses the permanent identifier of the user, extracts the IMSI, and provides the IMSI to the MME by using the identity response.
  • Step 208 The 4G fusion control network element obtains an authentication vector from the HSS according to the IMSI.
  • Step 210 The 4G fusion control network element saves the authentication vector, and initiates a user authentication request to the iAGW, including the random number, the authentication token, and the access security management entity key set identifier.
  • Step 211 The iAGW extracts the message authentication code from the authentication token.
  • Step 212 The iAGW sends the random number, the authentication token, and the message authentication code to the WLAN UE by using the EAP to request the war message.
  • Step 213 The WLAN UE runs an authentication and key agreement algorithm, checks the authentication token and the message authentication code, generates a response and a primary session key, and the WLAN UE transmits a response and a message authentication code to the iAGW through the EAP response-challenge message. ; Sending a user authentication response to the 4G convergence control network element, carrying the response of the received WLAN UE; Step 215, the 4G fusion control network element determines that the received response is consistent with the expected response transmitted from the HSS, indicating that the user authentication succeeds.
  • a non-access stratum security mode command to the iAGW, including a key set identifier of the evolved universal terrestrial radio access network, a UE security capability, an encryption algorithm, an integrity protection algorithm, and a non-access stratum message authentication code;
  • Step 216 The iAGW determines whether the security capability of the UE is consistent with the security capability of the UE that has been sent to the network. When the iAGW is consistent, the iAGW uses the key set identifier and the encryption algorithm of the evolved universal terrestrial radio access network to generate the non-access layer encryption key. Key, iAGW uses the key set identifier and integrity protection algorithm of the evolved universal terrestrial radio access network to generate a non-access stratum integrity protection key, and the iAGW protects the key and algorithm according to the newly generated non-access stratum integrity. Performing integrity check on the received non-access stratum security mode command message;
  • Step 217 After determining that the integrity check is passed, the iAGW responds to the non-access stratum security mode completion message to the 4G converged control network element, and includes the non-access stratum message authentication code. All non-access stratum signaling messages will then be encrypted and integrity protected.
  • Step 218 The iAGW determines that the non-access stratum security authentication is passed, does not send an initial context setup request to the eNodeB, and sends an EAP-success message to the WLAN UE, and the WLAN UE authenticates successfully.
  • the WLAN UE accesses the UTRAN and the EPC as an example to implement a method for accessing the 3G convergence control network element. As shown in FIG. 11, the method includes the following steps:
  • Step 301 The WLAN UE connects to the iAGW, and establishes a connection relationship according to the access procedure.
  • Step 302 The iAGW sends an attach request to the UTRAN, and carries an indication of the WLAN access.
  • Step 304 The connection signaling that the WLAN UE accesses for the first time may not provide the permanent identifier of the user, and the 3G convergence control network element initiates an identification request to the iAGW.
  • Step 306 The WLAN UE provides the permanent identifier of the user to the iAGW by using an EAP response-recognition message.
  • Step 307 the iAGW parses the permanent identifier of the user, extracts the IMSI, and provides the IMSI to the 3G fusion control network element through the identity response;
  • Step 308 The 3G fusion control network element obtains the authentication information from the HSS/HLR by using the obtained IMSI.
  • Step 309 The HSS/HLR returns an authentication information response to the 3G fusion control network element, where the message includes a random number, an expected response, an authentication token, an encryption key, and an integrity protection key.
  • Step 310 The 3G fusion control network element saves the authentication vector, and initiates an authentication and encryption request to the iAGW, including a random number, an authentication token, and a key set identifier.
  • Step 311 The iAGW extracts the calculated message authentication code from the authentication token.
  • Step 312 The iAGW sends a random number, an authentication token, and a message authentication code to the WLAN UE by using an EAP request message.
  • Step 313 The WLAN UE runs an authentication and key agreement algorithm, checks the authentication token and the message authentication code, and generates a response and a primary session key.
  • the WLAN UE transmits a response and a message authentication code to the iAGW through the EAP Answer-Challenge message;
  • Step 314 The iAGW determines that the calculated message authentication code is consistent with the received message authentication code, and sends back an authentication and an encryption response to the 3G convergence control network element, and carries the received response of the WLAN UE.
  • Step 315 3G Fusion Control Network Element Determining that the received response is consistent with the expected response from the HLR, indicating that the user authentication succeeds, and sending an authentication result indication message to the iAGW;
  • Step 316 The iAGW determines that the authentication result indication message carries a success indication, indicating that the security authentication is passed, and sends an EAP-Success message to the WLAN UE, and the WLAN UE is successfully authenticated.
  • the base station in the access entity may be a normal base station or may also be The home base station, but the functions provided are similar, so the above description takes the base station as an example.
  • the above is only the preferred embodiment of the present invention and is not intended to limit the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种用户设备(UE)接入融合控制网元的实现方法,在UE与融合控制网元之间设置融合的接入网关(iAGW),UE连接到所述iAGW后,所述iAGW将iAGW和UE之间的鉴权消息,转换为iAGW和融合控制网元之间的鉴权消息,所述融合控制网元通过接入实体与iAGW进行UE的鉴权;本发明同时还公开了用户设备接入融合控制网元的实现装置,通过本发明的方案,UE能够安全的接入融合控制网元,充分利用网络资源,扩大网络处理容量,并能够保证用户对用户业务在QoS、移动性、安全和节能等方面的要求。

Description

一种用户设备接入融合控制网元的实现方法及装置 技术领域
本发明涉及移动通信技术, 尤其涉及一种用户设备 ( UE )接入融合控 制网元的实现方法及装置。 背景技术
为了保持第三代移动通信系统在通信领域的竟争力, 为用户提供速率 更快、 时延更低、 以及更加个性化的移动通信服务, 同时, 降低运营商的 运营成本, 第三代合作伙伴计划(3GPP, 3rd Generation Partnership Project ) 标准工作组正致力于演进分组系统( EPS , Evolved Packet System )的研究。 图 1示出了 3GPP接入系统接入 EPS的结构示意图,如图 1所示,整个 EPS 系统分为无线接入网和核心网两部分。 在核心网中, 包含了归属用户服务 器 (HSS , Home Subscriber Server ), 移动性管理实体 (MME , Mobility Management Entity )、 服务 GPRS支持节点 ( SGSN, Serving GPRS Support Node )、 策略计费规则功能( PCRF , Policy and Charging Rule Function )、 月良 务网关(S-GW, Serving Gateway )、 分组数据网关(P-GW, PDN Gateway ) 和 OIS ( Operator s IP Services )。 下面详细描述各部分功能:
HSS, 是用户签约数据的永久存放地点, 位于用户签约的归属网。
MME, 是用户签约数据在当前网络的存放地点, 负责 UE到网络的非 接入层信令管理、 UE的安全验证功能、 UE的移动性管理、 用户空闲模式 下的跟踪和寻呼管理功能和承载管理。
SGSN , 是全球移动通讯系统 ( GSM , Global System for Mobile Communications )增强数据率 GSM演进(EDGE, Enhanced Data Rate for GSM Evolution )无线接入网 ( GERAN, GSM EDGE Radio Access Network ) 和通用移动通信系统 ( UMTS, Universal Mobile Telecommunications System ) 陆地无线接入网 (UTRAN, UMTS Terrestrial Radio Access Network ) UE接 入核心网络的业务支持点, 功能上与 MME类似, 负责 UE的位置更新、 寻 呼管理和承载管理等功能。
S-GW,是核心网到无线系统的网关, 负责 UE到核心网的用户面承载、
UE空闲模式下的数据緩存、 网络侧发起业务请求的功能、 合法监听和分组 数据路由和转发功能; S-GW负责统计 UE使用无线网的情况, 并产生 UE 使用无线网的话单, 传送给 PCRF。
P-GW, 是演进系统和该系统外部分组数据网络的网关, P-GW连接到 因特网和分组数据网络上 , 负责 UE的互联网协议 ( IP , Internet Protocol ) 地址分配、 计费功能、 分组包过滤、 以及策略控制等功能。
PCRF, 是演进系统中负责提供计费控制、 在线信用控制、 门限控制、 以及服务质量(QoS, Quality of Service ) 策略方面规则的服务器。
无线接入网, 是由演进基站 (eNodeB, Evolved NodeB, 简称为)和 3G无线网络控制器(RNC, Radio Network Controllor )组成, 主要负责无 线信号的收发, 通过空中接口和 UE联系, 管理空中接口的无线资源、 资源 调度、 以及接入控制。
上述 SGSN是升级过的 SGSN, 能够支持与 S-GW之间的 S4接口, 并 与 MME之间采用 GPRS隧道协议版本 2 ( GTPv2, GPRS Tunneling Protocol version 2 )进行互通。 而对于支持 3G核心网的 SGSN来说, 分组交换 ( PS, Packet Switching )域网络架构与图 1有所不同, SGSN与 MME采用 Gn接 口相连,互通采用 GPRS隧道协议版本 1 ( GTPvl , GPRS Tunneling Protocol version 1 )0 SGSN不能与 S-GW相连, 通过 Gn接口连接到网关 GPRS支持 节点(GGSN, Gateway GPRS Support Node ), 直接进行分组数据网络访问。
EPS除了支持上述 3GPP网络接入外, 还支持非 3GPP网络接入, 如图 2所示, 其中, 与非 3GPP网络的互通通过 S2a/S2b接口实现, P-GW作为 3GPP与非 3GPP网络间的锚点。 在 EPS的系统架构图中, 非 3GPP网络被 分为不可信任非 3GPP接入网 ( U-TNAN, Un-Trusted Non-3GPP IP Access Network )和可信任非 3GPP接入网 (TNAN, Trusted Non-3 GPP IP Access Network ); 其中, U-TNAN 需经过演进的分组数据网关 ( ePDG, Evolved Packet Data Gateway )与 P-GW相连, ePDG与 P-GW间的接口为 S2b; TNAN 可直接通过 S2a接口与 P-GW连接, S2a接口采用 PMIP协议进行信息交互。
无线局域网 (WLAN )作为 TNAN, 用于分流数据流量, 逐渐被很多 运营商关注, 其架构如图 2所示, 包括本地公用陆地移动网络( HPLMN, Home Public Land Mobile Network )和非 3 GPP网络( Non-3 GPP Networks ), HPLMN包括 HSS、 PCRF、 P-GW, S-GW、 3GPP验证授权账户服务器( AAA Server, Authentication, Authorization and Account Server ), 非 3 GPP网络 ( Non-3 GPP Networks )分为 TNAN和 U-TNAN。
3GPP UE接入 EPS系统采用图 1所示的架构, 非 3GPP UE接入 EPS 系统采用图 2 所示的架构, 这两种接入技术需要两种不同的接入网和核心 网。
非 3GPP UE接入 EPS 系统, 图 1 中的长期演进 ( LTE, Long Term Evolution ) 网络资源、 MME不能为非 3GPP接入系统使用, 如图 2所示, 还需要部署 3GPP AAA Server,导致网络需要有额外的运营成本来操作和维 护。
如何充分利用 LTE 网络资源, 帮助 EPS 网络的运营商吸引更多的 WLAN UE接入 LTE网络资源 , 成为必须要解决的问题。 发明内容
有鉴于此, 本发明的主要目的在于提供一种用户设备接入融合控制网 元的实现方法及装置,使得 UE能够安全地接入融合控制网元,充分利用网 络资源, 扩大网络处理容量。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供的一种用户设备接入融合控制网元的实现方法, 该方法包 括:
在 UE 与融合控制网元之间设置融合的接入网关 (iAGW, integrated Access Gateway );
UE连接到所述 iAGW后, 所述 iAGW将 iAGW和 UE之间的鉴权消 息, 转换为 iAGW和融合控制网元之间的鉴权消息, 所述融合控制网元通 过接入实体与 iAGW进行 UE的鉴权; 其中,
所述接入实体为 eNodeB时, 所述融合控制网元为 4G融合控制网元; 所述接入实体为 UTRAN时, 所述融合控制网元为 3G融合控制网元。 上述方案中,所述 iAGW将 iAGW和 UE之间的鉴权消息,转换为 iAGW 和融合控制网元之间的鉴权消息,所述融合控制网元通过接入实体与 iAGW 进行 UE的鉴权, 为:
所述 iAGW通过接入实体向融合控制网元提供所述 UE的国际移动用 户识别码 ( IMSI );
所述融合控制网元根据所述 IMSI 获取鉴权向量, 并通过接入实体向 iAGW发送用户鉴权请求;
所述 iAGW触发融合控制网元完成对 UE的鉴权。
上述方案中, 所述接入实体为 eNodeB时, 所述 iAGW通过接入实体 向融合控制网元提供所述 UE的 IMSI , 为:
所述 iAGW通过 eNodeB向 4G融合控制网元发送附着请求; 4G融合 控制网元向 iAGW发送识别请求; iAGW通过可扩展认证协议( EAP )请 求-识别消息, 向所述 UE请求用户的永久标识; 所述 UE通过 EAP应答- 识别消息向 iAGW提供用户的永久标识;所述 iAGW解析用户的永久标识, 提取出 IMSI, 并通过 eNodeB向 4G融合控制网元提供 IMSL 上述方案中, 所述 iAGW触发融合控制网元完成对 UE的鉴权为: iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码,通过 EAP 请求-挑战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; UE运行鉴 权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主会话密钥, 通过 EAP应答 4兆战消息, 向 iAGW传送所述响应和消息认证码; iAGW判 定计算出的消息认证码和收到的消息认证码一致时, 通过 eNodeB向 4G融 合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 4G融合控制网元 判定 iAGW发送的用户鉴权响应和归属用户服务器(HSS ) 的预期响应一 致时, 确定用户鉴权成功。
上述方案中, 该方法还包括: 所述 4G融合控制网元在确定用户鉴权成 功后, 向 iAGW发送非接入层安全模式命令, 所述非接入层安全模式命令 包括演进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算法以及非接入层消息认证码。
上述方案中, 该方法还包括: 所述 iAGW根据所述非接入层安全模式 命令生成非接入层加密密钥、 非接入层完整性保护密钥。
上述方案中, 该方法还包括: 所述 iAGW根据生成的非接入层完整性 保护密钥, 对收到的非接入层安全模式命令消息进行完整性校验。
上述方案中, 所述接入实体为 UTRAN时, 所述 iAGW通过接入实体 向 3G融合控制网元提供所述 UE的 IMSI, 为:
iAGW通过 UTRAN向 3G融合控制网元发送附着请求; 3G融合控制 网元通过 UTRAN向 iAGW发送识别请求; 所述 iAGW通过 EAP请求-识 别消息, 向 UE请求用户的永久标识; 所述 UE通过 EAP应答-识别消息, 向 iAGW提供用户的永久标识; 所述 iAGW解析用户的永久标识, 提取出 IMSI, 并通过 UTRAN向 3G融合控制网元提供 IMSI。 上述方案中, 所述 iAGW触发融合控制网元完成对 UE的鉴权为: 所述 iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通 过 EAP请求-挑战消息, 向 UE传递随机数、鉴权令牌以及消息认证码; UE 运行鉴权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主会 话密钥, 通过 EAP应答 战消息, 向 iAGW传递所述响应和消息认证码; iAGW判定计算出的消息认证码和收到的消息认证码一致时,通过 UTRAN 向 3G融合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 3G融合 控制网元判定 iAGW发送的用户鉴权响应和 HSS/归属位置寄存器( HLR ) 的预期响应一致时,向 iAGW发送鉴权结果指示消息,携带成功指示; iAGW 根据鉴权结果指示消息中携带的成功指示,确定安全认证通过, 向 UE发送 EAP-成功消息。
本发明提供的一种用户设备接入融合控制网元的实现装置, 位于 iAGW, 该装置包括: 鉴权转换模块, 设置于 UE与融合控制网元之间, 用 于将 iAGW和 UE之间的鉴权消息, 转换为 iAGW和融合控制网元之间的 鉴权消息。
上述方案中, 所述鉴权转换模块包括: IMSI提供模块、 第一鉴权模块; 其中,
所述 IMSI提供模块, 用于通过接入实体向融合控制网元提供所述 UE 的 IMSI;
所述第一鉴权模块, 用于在收到用户鉴权请求后, 触发融合控制网元 完成对 UE的鉴权; 其中,
所述接入实体为 eNodeB时, 所述融合控制网元为 4G融合控制网元; 所述接入实体为 UTRAN时, 所述融合控制网元为 3G融合控制网元。 上述方案中, 所述 IMSI提供模块, 具体用于通过 eNodeB向 4G融合 控制网元发送附着请求; 通过 EAP请求 -识别消息, 向 UE请求用户的永久 标识;解析用户的永久标识,提取出 IMSI,并向 4G融合控制网元提供 IMSI; 从用户鉴权请求的鉴权令牌中提取计算出消息认证码,通过 EAP请求 -挑战 消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; 判定计算出的消息认 证码和 UE发送的消息认证码一致时 , 通过 eNodeB向 4G融合控制网元回 送用户鉴权响应, 携带收到的 UE的响应;
所述第一鉴权模块, 还用于接收通过 eNodeB发送的来自 4G融合控制 网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进的通 用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算 法以及非接入层消息认证码。
上述方案中, 所述 IMSI提供模块, 具体用于通过 UTRAN向 3G融合 控制网元发送附着请求; 通过 EAP请求 -识别消息, 向 UE请求用户的永久 标识; 解析用户的永久标识, 提取出 IMSI, 并通过 UTRAN向 3G融合控 制网元提供 IMSI; 从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP请求 战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; 判定计算出的消息认证码和 UE发送的消息认证码一致时,通过 UTRAN向 3G融合控制网元回送用户鉴权响应; 并根据 3G融合控制网元发送的鉴权 结果指示消息中携带的成功指示, 确定安全认证通过, 向 UE发送 EAP-成 功消息;
所述第一鉴权模块,还用于接收通过 UTRAN发送的来自 3G融合控制 网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进的通 用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算 法以及非接入层消息认证码。
上述方案中, 所述第一鉴权模块, 还用于根据所述非接入层安全模式 命令生成非接入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接 入层完整性保护密钥, 对收到的非接入层安全模式命令消息进行完整性校 验; 判定完整性校验通过后, 通过 eNodeB向 4G融合控制网元响应非接入 层安全模式完成消息。
上述方案中, 所述第一鉴权模块, 还用于根据所述非接入层安全模式 命令生成非接入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接 入层完整性保护密钥, 对收到的非接入层安全模式命令消息进行完整性校 验; 判定完整性校验通过后, 通过 UTRAN向 3G融合控制网元响应非接入 层安全模式完成消息。
本发明提供的一种用户设备接入融合控制网元的实现装置, 位于融合 控制网元, 该装置包括:
第二鉴权模块, 用于通过接入实体与 iAGW进行 UE的鉴权; 其中, 所述接入实体为 eNodeB时, 所述第二鉴权模块设置在 4G融合 控制网元;
所述接入实体为 UTRAN时,所述第二鉴权模块设置在 3G融合控制网 元。
上述方案中, 所述第二鉴权模块, 具体用于根据 UE的 IMSI获取鉴权 向量, 并通过接入实体向 iAGW发送用户鉴权请求, 根据 iAGW的触发完 成对 UE的鉴权。
上述方案中, 所述第二鉴权模块设置在 4G融合控制网元时, 所述第二 鉴权模块, 用于通过 eNodeB向 iAGW发送识别请求, 接收 iAGW从永久 标识中提取的 IMSI; 并使用获取到的 IMSI, 向 HSS获取鉴权向量; 保存 HSS发送的鉴权向量,通过 eNodeB向 iAGW发送用户鉴权请求;接收 iAGW 发送的用户鉴权响应, 判定 iAGW发送的用户鉴权响应和 HSS发送的预期 响应一致时, 确定用户鉴权成功。
上述方案中, 所述第二鉴权模块设置在 3G融合控制网元时, 所述第二 鉴权模块, 用于通过 UTRAN向 iAGW发送识别请求, 接收 iAGW从永久 标识中提取的 IMSI; 并使用获取到的 IMSI, 向 HSS/HLR获取鉴权信息; 保存 HSS/HLR发送的鉴权信息响应,通过 UTRAN向 iAGW发送用户鉴权 请求; 并接收 iAGW发送的用户鉴权响应, 在判定 iAGW发送的用户鉴权 响应和 HSS/HLR的预期响应一致时,通过 UTRAN向 iAGW发送鉴权结果 指示消息。
上述方案中, 所述第二鉴权模块, 还用于在确定用户鉴权成功后, 通 过 eNodeB向 iAGW发送非接入层安全模式命令, 所述非接入层安全模式 命令包含演进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算 法、 完整性保护算法以及非接入层消息认证码; 接收非接入层安全模式完 成消息, 保存其中的非接入层消息认证码。
上述方案中, 所述第二鉴权模块, 还用于在发送所述鉴权结果指示消 息后, 通过 UTRAN向 iAGW发送非接入层安全模式命令, 所述非接入层 安全模式命令包含演进的通用地面无线接入网的密钥集标识、 UE 安全能 力、 加密算法、 完整性保护算法以及非接入层消息认证码; 接收非接入层 安全模式完成消息, 保存其中的非接入层消息认证码。
本发明提供了一种用户设备接入融合控制网元的实现方法及装置, 在 UE与融合控制网元之间设置 iAGW, UE连接到所述 iAGW后,所述 iAGW 将 iAGW和 UE之间的鉴权消息, 转换为 iAGW和融合控制网元之间的鉴 权消息, 所述融合控制网元通过接入实体与 iAGW进行 UE的鉴权; 如此, UE能够安全的接入融合控制网元,充分利用网络资源,扩大网络处理容量, 并能够保证用户对用户业务在 QoS、 移动性、 安全和节能等方面的要求。 附图说明
图 1为现有技术中 3GPP接入系统接入 EPS的结构示意图;
图 2为现有技术中非 3GPP接入系统接入 EPS的结构示意图; 图 3 为本发明提供的用户设备接入融合控制网元的实现方法的流程示 意图;
图 4为本发明提供的 4G融合控制网元的结构示意图;
图 5 为本发明提供的 UE通过 LTE接入的融合的演进的分组核心网 ( EPC, Evolved Packet Core ) 的网络结构示意图;
图 6为本发明提供的 3G融合控制网元的结构示意图;
图 7为本发明提供的 UE通过 UTRAN接入融合的 EPC的网络结构示 意图;
图 8 为本发明提供的用户设备接入融合控制网元的第一种实现装置结 构示意图;
图 9为本发明提供的用户设备接入融合控制网元的第二种实现装置结 构示意图;
图 10为本发明实施例一提供的用户设备接入 4G融合控制网元的实现 方法的流程示意图;
图 11为本发明实施例二提供的用户设备接入 3G融合控制网元的实现 方法的流程示意图。 具体实施方式
本发明的基本思想是: 在 UE与融合控制网元之间设置 iAGW, UE连 接到所述 iAGW后, 所述 iAGW将 iAGW和 UE之间的鉴权消息, 转换为 iAGW和融合控制网元之间的鉴权消息,所述融合控制网元完成对 UE的鉴 权。
此外, 虽然背景技术中仅仅提及支持 WLAN终端接入, 但是 iAGW不 局限于支持 WLAN, 如果 iAGW能够支持 UTRAN/GERAN的空口, 或者 其他非 3GPP定义的空口, 例如 CDMA、 WiMAX等等, 则 iAGW也可以 支持这些接入类型的终端接入网络, 并与融合控制网元对其实现鉴权授权。 这些终端如果支持 EAP认证过程,那么与如下描述的 WLAN的鉴权认证过 程都是类似, 这里以 WLAN终端接入为例, 不再针对不同无线接入技术类 型 ( RAT, Radio Access Technology ) 描述。
下面通过附图及具体实施例对本发明做进一步的详细说明。
本发明实现一种用户设备接入融合控制网元的实现方法, 如图 3所示, 该方法包括以下几个步驟:
步驟 101 : 在 UE与融合控制网元之间设置 iAGW;
具体的, 在 eNodeB作为接入实体时, 所述融合控制网元为通过 LTE 接入的 4G融合控制网元, 如图 4所示 , 该 4G融合控制网元包含 MME和 AAA逻辑实体, MME与 AAA之间的 St接口用于传递上下文信息;
如图 5所示, 在 UE与 eNodeB之间设置 iAGW, 所述 UE和 iAGW之 间的接口为 WLAN无线接口, iAGW和 eNodeB之间的接口为 LTE-Uu接 口, 这样, UE就被模拟成一个 3GPP UE接入到 LTE和 EPC;
此时, 所述 iAGW具备如下功能:
1 ) iAGW支持 UE接入 LTE和 EPC网络;
2 ) iAGW实现 UE的功能, 即 eNodeB将 iAGW当作普通 UE, iAGW 按照普通 UE的接入流程接入 eNodeB, 且始终保持开机附着状态。
在陆地无线接入网 (UTRAN )作为接入实体时, 所述融合控制网元为 通过 UTRAN接入的 3G融合控制网元, 如图 6所示, 该 3G融合控制网元 包含 SGSN和 AAA逻辑实体, SGSN与 AAA之间的 Uv接口用于传递上 下文信息;
如图 7所示, 在 UE和 UTRAN之间设置 iAGW, 所述 UE和 iAGW之 间的接口为 WLAN无线接口, iAGW和 UTRAN之间的接口为 Uu接口, 这样, UE就被模拟成一个 3GPP UE接入到 UTRAN和 EPC;
此时, 所述 iAGW具备如下功能:
1 ) iAGW支持 UE接入 UTRAN和 EPC网络; 2 ) iAGW实现 UE的功能, 即 UTRAN将 iAGW当作普通 UE, iAGW 按照普通 UE的接入流程接入 UTRAN, 且始终保持开机附着状态。
步驟 102: UE连接到所述 iAGW后, 所述 iAGW将 iAGW和 UE之间 的鉴权消息, 转换为 iAGW和融合控制网元之间的鉴权消息, 所述融合控 制网元通过接入实体与 iAGW进行 UE的鉴权;
具体的, UE连接到所述 iAGW后, 所述 iAGW通过接入实体向融合 控制网元提供所述 UE的国际移动用户识别码(IMSI ); 所述融合控制网元 根据所述 IMSI获取鉴权向量,并通过接入实体向 iAGW发送用户鉴权请求; 所述 iAGW触发融合控制网元对 UE的鉴权;
所述 iAGW通过接入实体向融合控制网元提供所述 UE的 IMSI, 具体 为:
在所述接入实体为 eNodeB时,所述融合控制网元为 4G融合控制网元, 如图 5所示, UE连接到 iAGW, iAGW通过 eNodeB向 4G融合控制网元 发送附着请求, 携带所述 WLAN接入的指示; 4G融合控制网元根据所述 WLAN接入的指示中没有用户的永久标识, 向所述 iAGW发送识别请求; 所述 iAGW通过 EAP请求-识别消息, 向所述 UE请求用户的永久标识; 所 述 UE通过 EAP应答-识别消息,向 iAGW提供用户的永久标识;所述 iAGW 解析用户的永久标识, 提取出 IMSI, 并向 4G融合控制网元提供 IMSI;
在所述接入实体为 UTRAN时,所述融合控制网元为 3G融合控制网元, 如图 7所示, UE连接到 iAGW, iAGW通过 UTRAN向 3G融合控制网元 发送附着请求, 携带所述 WLAN接入的指示; 3G融合控制网元根据所述 WLAN接入的指示中没有用户的永久标识, 向 iAGW发送识别请求; 所述 iAGW通过 EAP请求-识别消息, 向 UE请求用户的永久标识; 所述 UE通 过 EAP应答-识别消息, 向 iAGW提供用户的永久标识; 所述 iAGW解析 用户的永久标识, 提取出 IMSI, 并向 3G融合控制网元提供 IMSI。 所述融合控制网元根据所述 IMSI 获取鉴权向量, 并通过接入实体向 iAGW发送用户鉴权请求, 具体为:
在所述接入实体为 eNodeB时,所述融合控制网元为 4G融合控制网元, 如图 5所示, 所述 4G融合控制网元使用获取到的 IMSI, 向 HSS获取鉴权 向量; 所述 HSS向 4G融合控制网元提供鉴权向量, 所述鉴权向量包括随 机数、 鉴权令牌、 预期响应以及接入安全管理实体密钥; 4G融合控制网元 保存所述鉴权向量, 通过 eNodeB向 iAGW发送用户鉴权请求, 所述用户 鉴权请求包括随机数、 鉴权令牌以及接入安全管理实体密钥集标识;
在所述接入实体为 UTRAN时,所述融合控制网元为 3G融合控制网元, 如图 7所示, 所述 3G融合控制网元使用获取到的 IMSI, 向 HSS/HLR获取 鉴权信息; HSS/HLR向 3G融合控制网元返回鉴权信息响应, 所述鉴权信 息响应中包括随机数、 预期响应、 鉴权令牌、 加密密钥以及完整性保护密 钥; 3G融合控制网元保存所述鉴权信息响应, 通过 UTRAN向 iAGW发送 用户鉴权请求, 所述用户鉴权请求包括随机数、 鉴权令牌以及接入安全管 理实体密钥集标识。
所述 iAGW触发融合控制网元完成对 UE的鉴权, 具体为:
在所述接入实体为 eNodeB时,所述融合控制网元为 4G融合控制网元, 如图 5所示, iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP请求 战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; UE运行鉴权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主 会话密钥,通过 EAP应答 战消息,向 iAGW传送所述响应和消息认证码; iAGW判定计算出的消息认证码和收到的消息认证码一致时, 通过 eNodeB 向 4G融合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 4G融合 控制网元判定 iAGW发送的用户鉴权响应和 HSS发送的预期响应一致时, 确定用户鉴权成功; 进一步的 ,所述 4G融合控制网元在确定用户鉴权成功后 ,通过 eNodeB 向 iAGW发送非接入层安全模式命令, 所述非接入层安全模式命令包括演 进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性 保护算法以及非接入层消息认证码;
进一步的, iAGW根据所述非接入层安全模式命令生成非接入层加密 密钥、 非接入层完整性保护密钥;
具体的, iAGW根据所述非接入层安全模式命令判断 UE安全能力和自 身发送的 UE安全能力是否一致, 在一致时, 表示 UE安全能力未被更改和 攻击, 可以接受 UE的非接入层消息, iAGW使用演进的通用地面无线接入 网的密钥集标识和加密算法生成非接入层加密密钥, 使用演进的通用地面 无线接入网的密钥集标识和完整性保护算法生成非接入层完整性保护密 钥;
进一步的, iAGW根据生成的非接入层完整性保护密钥, 对收到的非 接入层安全模式命令消息进行完整性校验;
进一步的, iAGW判定完整性校验通过后, 表示该非接入层安全模式 命令可接受, 且此安全通道可用, 通过 eNodeB向 4G融合控制网元响应非 接入层安全模式完成消息, 包含非接入层消息认证码;
进一步的, iAGW通过 eNodeB向 4G融合控制网元响应非接入层安全 模式完成消息后,不向 eNodeB发送初始上下文建立请求,向 UE发送 EAP- 成功消息, UE鉴权成功;
在所述接入实体为 UTRAN时,所述融合控制网元为 3G融合控制网元, 如图 7所示, iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP请求 战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; UE运行鉴权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主 会话密钥,通过 EAP应答 战消息,向 iAGW传递所述响应和消息认证码; iAGW判定计算出的消息认证码和收到的消息认证码一致时,通过 UTRAN 向 3G融合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 3G融合 控制网元判定 iAGW发送的用户鉴权响应和 HSS/HLR发送的预期响应一致 时, 表示鉴权成功, 向 iAGW发送鉴权结果指示消息, 所述鉴权结果指示 消息携带成功指示; iAGW根据鉴权结果指示消息中携带的成功指示, 确 定安全认证通过, 向 UE发送 EAP-成功消息, UE鉴权成功;
进一步的, 所述 3G融合控制网元在发送所述鉴权结果指示消息后, 通 过 UTRAN向 iAGW发送非接入层安全模式命令, 所述非接入层安全模式 命令包括演进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算 法、 完整性保护算法以及非接入层消息认证码;
进一步的, iAGW根据所述非接入层安全模式命令生成非接入层加密 密钥、 非接入层完整性保护密钥;
具体的, iAGW根据所述非接入层安全模式命令判断 UE安全能力和自 身发送的 UE安全能力是否一致, 在一致时, 表示 UE安全能力未被更改和 攻击, 可以接受 UE的非接入层消息, iAGW使用演进的通用地面无线接入 网的密钥集标识和加密算法生成非接入层加密密钥, 使用演进的通用地面 无线接入网的密钥集标识和完整性保护算法生成非接入层完整性保护密 钥;
进一步的, iAGW根据生成的非接入层完整性保护密钥, 对收到的非 接入层安全模式命令消息进行完整性校验;
进一步的, iAGW判定完整性校验通过后, 表示该非接入层安全模式 命令可接受, 且此安全通道可用, 通过 UTRAN向 3G融合控制网元响应非 接入层安全模式完成消息, 包含非接入层消息认证码;
进一步的, iAGW通过 UTRAN向 3G融合控制网元响应非接入层安全 模式完成消息后, 不向 3G融合控制网元发送初始上下文建立请求, 向 UE 发送 EAP-成功消息, UE鉴权成功。
在上述过程中, 由于融合控制网元还需要记录通过 iAGW接入的终端 与 iAGW 的上下文映射关系, 因此能够区分通过基站接入的终端和通过 iAGW接入的终端, 进行区分处理。 具体是因为当终端通过 iAGW接入网 络进行鉴权认证时, 融合控制网元不需要对 iAGW与基站的空口重新建立 安全连接, 而是认为 iAGW与基站直接的空口安全连接在 iAGW接入网络 的时候依然有效。
基于上述方法, 本发明提供一种用户设备接入融合控制网元的实现装 置, 位于 iAGW, 如图 8所示, 该装置包括: 鉴权转换模块 21 , 设置于 UE 与融合控制网元之间,用于将 iAGW和 UE之间的鉴权消息,转换为 iAGW 和融合控制网元之间的鉴权消息。
所述鉴权转换模块 21包括: IMSI提供模块 211、 第一鉴权模块 212; 其中,
所述 IMSI提供模块 211 , 用于通过接入实体向融合控制网元提供所述 UE的 IMSI;
所述第一鉴权模块 212 , 用于在收到用户鉴权请求后, 触发融合控制网 元完成对 UE的鉴权; 其中,
所述接入实体为 eNodeB时, 所述融合控制网元为 4G融合控制网元; 所述接入实体为 UTRAN时, 所述融合控制网元为 3G融合控制网元; 所述 IMSI提供模块 211 ,具体用于通过 eNodeB向 4G融合控制网元发 送附着请求; 通过 EAP请求-识别消息, 向 UE请求用户的永久标识; 解析 用户的永久标识, 提取出 IMSI, 并向 4G融合控制网元提供 IMSI; 从用户 鉴权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP请求 -挑战消息, 向 UE传递随机数、鉴权令牌以及消息认证码; 判定计算出的消息认证码和 UE发送的消息认证码一致时, 通过 eNodeB向 4G融合控制网元回送用户 鉴权响应, 携带收到的 UE的响应;
所述第一鉴权模块 212, 还用于接收通过 eNodeB发送的来自 4G融合 控制网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进 的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保 护算法以及非接入层消息认证码;
所述第一鉴权模块 212,进一步用于根据所述非接入层安全模式命令生 成非接入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接入层完 整性保护密钥, 对收到的非接入层安全模式命令消息进行完整性校验; 判 定完整性校验通过后, 通过 eNodeB向 4G融合控制网元响应非接入层安全 模式完成消息;
或者,
所述 IMSI提供模块 211 , 具体用于通过 UTRAN向 3G融合控制网元 发送附着请求; 通过 EAP请求-识别消息, 向 UE请求用户的永久标识; 解 析用户的永久标识, 提取出 IMSI, 并通过 UTRAN向 3G融合控制网元提 供 IMSI; 从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP 请求-挑战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; 判定计算 出的消息认证码和 UE发送的消息认证码一致时 , 通过 UTRAN向 3G融合 控制网元回送用户鉴权响应;并根据 3G融合控制网元发送的鉴权结果指示 消息中携带的成功指示, 确定安全认证通过, 向 UE发送 EAP-成功消息; 所述第一鉴权模块 212, 还用于接收通过 UTRAN发送的来自 3G融合 控制网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进 的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保 护算法以及非接入层消息认证码;
所述第一鉴权模块 212,进一步用于根据所述非接入层安全模式命令生 成非接入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接入层完 整性保护密钥, 对收到的非接入层安全模式命令消息进行完整性校验; 判 定完整性校验通过后,通过 UTRAN向 3G融合控制网元响应非接入层安全 模式完成消息。
基于上述方法, 本发明还提供一种用户设备接入融合控制网元的实现 装置, 位于融合控制网元, 如图 9所示, 该装置包括:
第二鉴权模块 31 , 用于通过接入实体与 iAGW进行 UE的鉴权; 其中, 所述接入实体为 eNodeB时, 所述第二鉴权模块设置在 4G融合 控制网元;
所述接入实体为 UTRAN时,所述第二鉴权模块设置在 3G融合控制网 元;
所述接入实体为 eNodeB时, 如图 5所示, 整体网络架构包括 4G融合 控制网元、 HSS、 S-GW、 P-GW、 PCRF、 OIS; 其中,
4G融合控制网元中设置有接入融合控制网元的装置, 该装置的第二鉴 权模块 31 , 具体用于根据 WLAN接入的指示中没有用户的永久标识,通过 eNodeB向 iAGW发送识别请求, 接收 iAGW从永久标识中提取的 IMSI; 并使用获取到的 IMSI, 向 HSS获取鉴权向量; 保存 HSS发送的鉴权向量, 通过 eNodeB向 iAGW发送用户鉴权请求, 所述用户鉴权请求包括随机数、 鉴权令牌以及接入安全管理实体密钥集标识; 接收 iAGW发送的用户鉴权 响应, 判定 iAGW发送的用户鉴权响应和 HSS发送的预期响应一致时, 确 定用户鉴权成功;
HSS, 用于向所述第二鉴权模块 41提供鉴权向量, 所述鉴权向量包括 随机数、 鉴权令牌、 预期响应以及接入安全管理实体密钥;
S-GW、 P-GW、 PCRF、 OIS的功能为现有技术, 这里不再赘述; 所述第二鉴权模块 31 , 还用于在确定用户鉴权成功后, 通过 eNodeB 向 iAGW发送非接入层安全模式命令, 所述非接入层安全模式命令包含演 进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性 保护算法以及非接入层消息认证码; 接收非接入层安全模式完成消息, 保 存其中的非接入层消息认证码;
所述接入实体为 UTRAN时, 如图 7所示, 该整体网络架构包括 3G融 合控制网元、 HSS/HLR、 S-GW、 P-GW、 PCRF、 OIS; 其中,
3G融合控制网元中设置有接入融合控制网元的装置, 该装置的第二鉴 权模块 31 , 具体用于根据 WLAN接入的指示中没有用户的永久标识, 向 iAGW发送识别请求, 接收 iAGW从永久标识中提取的 IMSI; 并使用获取 到的 IMSI, 向 HSS/HLR获取鉴权信息; 保存 HSS/HLR发送的鉴权信息响 应, 向 iAGW发送用户鉴权请求, 所述用户鉴权请求包括随机数、 鉴权令 牌以及接入安全管理实体密钥集标识;并接收 iAGW发送的用户鉴权响应 , 在判定 iAGW发送的用户鉴权响应和 HSS/HLR发送的预期响应一致时,表 示鉴权成功, 向 iAGW发送鉴权结果指示消息, 所述鉴权结果指示消息携 带成功指示;
HSS/HLR, 用于向所述第二鉴权模块 31返回鉴权信息响应, 所述鉴权 信息响应中包括随机数、 预期响应、 鉴权令牌、 加密密钥以及完整性保护 密钥;
S-GW、 P-GW、 PCRF、 OIS的功能为现有技术, 这里不再赘述; 所述第二鉴权模块 31 , 还用于在发送所述鉴权结果指示消息后, 通过 UTRAN向 iAGW发送非接入层安全模式命令,所述非接入层安全模式命令 包含演进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算法以及非接入层消息认证码; 接收非接入层安全模式完成消 息, 保存其中的非接入层消息认证码。 实施例一 本实施例以 WLAN UE通过 LTE接入 EPC为例 , 实现接入 4G融合控 制网元的方法, 如图 10所示, 该方法包括以下几个步驟:
步驟 201 , WLAN UE连接到 iAGW, 按照接入流程建立连接关系; 步驟 202, iAGW向 eNodeB发送附着请求, 携带 WLAN接入的指示; 步驟 203 , eNodeB向 4G融合控制网元发送附着请求, 携带 WLAN接 入的指示;
步驟 204 , 4G融合控制网元向 iAGW发送识别请求;
步驟 205 , iAGW通过 EAP请求-识别消息, 向 WLAN UE请求用户的 永久标识;
步驟 206, WLAN UE通过 EAP应答-识别消息, 向 iAGW提供用户的 永久标识;
步驟 207, iAGW解析用户的永久标识, 提取出 IMSI, 并通过身份响 应向 MME提供 IMSI;
步驟 208, 4G融合控制网元根据 IMSI向 HSS获取鉴权向量; 步驟 209, HSS向 4G融合控制网元提供鉴权向量, 包含随机数、 鉴权 令牌、 预期响应以及接入安全管理实体密钥;
步驟 210, 4G融合控制网元保存鉴权向量, 向 iAGW发起用户鉴权请 求, 包含随机数、 鉴权令牌以及接入安全管理实体密钥集标识;
步驟 211 , iAGW从鉴权令牌中提取出消息认证码;
步驟 212 , iAGW通过 EAP请求 战消息,向 WLAN UE传递随机数、 鉴权令牌以及消息认证码;
步驟 213 , WLAN UE运行鉴权和密钥协商算法, 校验鉴权令牌和消息 认证码, 产生响应和主会话密钥, WLAN UE通过 EAP应答-挑战消息, 向 iAGW传递响应和消息认证码; 向 4G融合控制网元回送用户鉴权响应, 携带收到的 WLAN UE的响应; 步驟 215, 4G融合控制网元判断收到的响应和从 HSS传递来的预期响 应一致, 表示用户鉴权成功, 向 iAGW发送非接入层安全模式命令, 包含 演进的通用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整 性保护算法以及非接入层消息认证码;
步驟 216, iAGW判断 UE安全能力和自身曾发送给网络的 UE安全能 力是否一致, 在一致时, iAGW使用演进的通用地面无线接入网的密钥集 标识和加密算法生成非接入层加密密钥, iAGW使用演进的通用地面无线 接入网的密钥集标识和完整性保护算法生成非接入层完整性保护密钥, iAGW根据新产生的非接入层完整性保护密钥和算法, 对收到的非接入层 安全模式命令消息进行完整性校验;
步驟 217, iAGW判定完整性校验通过后, 向 4G融合控制网元响应非 接入层安全模式完成消息, 包含非接入层消息认证码。 此后所有的非接入 层信令消息都将被加密和完整性保护。
步驟 218, iAGW判断非接入层安全认证通过, 不向 eNodeB发送初始 上下文建立请求,向 WLAN UE发送 EAP-成功消息, WLAN UE鉴权成功。
实施例二
本实施例以 WLAN UE接入 UTRAN和 EPC为例 , 实现接入 3G融合 控制网元的方法, 如图 11所示, 该方法包括以下几个步驟:
步驟 301 , WLAN UE连接到 iAGW, 按照接入流程建立连接关系。 步驟 302, iAGW向 UTRAN发送附着请求, 携带 WLAN接入的指示; 步驟 303 , UTRAN向 3G融合控制网元发送附着请求, 携带 WLAN接 入的指示;
步驟 304, WLAN UE首次接入的连接信令, 可能不提供用户的永久标 识, 3G融合控制网元向 iAGW发起识别请求; 步驟 305 , iAGW通过 EAP请求-识别消息, 向 WLAN UE请求用户的 永久标识;
步驟 306, WLAN UE通过 EAP应答-识别消息, 向 iAGW提供用户的 永久标识;
步驟 307, iAGW解析用户的永久标识, 提取出 IMSI, 并通过身份响 应向 3G融合控制网元提供 IMSI;
步驟 308 , 3G融合控制网元使用获取到的 IMSI , 向 HSS/HLR获取鉴 权信息;
步驟 309, HSS/HLR向 3G融合控制网元返回鉴权信息响应, 消息中包 含随机数、 预期响应、 鉴权令牌、 加密密钥以及完整性保护密钥;
步驟 310, 3G融合控制网元保存鉴权向量, 向 iAGW发起鉴权和加密 请求, 包含随机数、 鉴权令牌以及密钥集标识;
步驟 311 , iAGW从鉴权令牌中提取计算出消息认证码;
步驟 312, iAGW通过 EAP请求 战消息,向 WLAN UE传递随机数、 鉴权令牌以及消息认证码;
步驟 313 , WLAN UE运行鉴权和密钥协商算法, 校验鉴权令牌和消息 认证码, 产生响应和主会话密钥。 WLAN UE通过 EAP应答-挑战消息, 向 iAGW传递响应和消息认证码;
步驟 314, iAGW判断计算出的消息认证码和收到的消息认证码一致, 向 3G融合控制网元回送鉴权和加密响应 , 携带收到的 WLAN UE的响应; 步驟 315 , 3G融合控制网元判断收到的响应和从 HLR传递来的预期响 应一致, 表示用户鉴权成功, 向 iAGW发送鉴权结果指示消息;
步驟 316, iAGW判断鉴权结果指示消息中携带成功指示, 表示安全认 证通过, 向 WLAN UE发送 EAP-成功消息, WLAN UE鉴权成功。
此外, 对于架构中, 接入实体中的基站可以为普通基站或者也可以为 家用基站, 但是提供的功能都是类似的, 因此上述描述都以基站为例。 以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。

Claims

权利要求书
1、 一种用户设备接入融合控制网元的实现方法, 其特征在于, 该方法 包括:
在用户设备(UE )与融合控制网元之间设置融合的接入网关(iAGW );
UE连接到所述 iAGW后, 所述 iAGW将 iAGW和 UE之间的鉴权消 息, 转换为 iAGW和融合控制网元之间的鉴权消息, 所述融合控制网元通 过接入实体与 iAGW进行 UE的鉴权; 其中,
所述接入实体为演进基站(eNodeB ) 时, 所述融合控制网元为 4G融 合控制网元;
所述接入实体为通用移动通信系统陆地无线接入网 (UTRAN ) 时, 所 述融合控制网元为 3G融合控制网元。
2、根据权利要求 1所述的实现方法,其特征在于,所述 iAGW将 iAGW 和 UE之间的鉴权消息, 转换为 iAGW和融合控制网元之间的鉴权消息, 所述融合控制网元通过接入实体与 iAGW进行 UE的鉴权, 为:
所述 iAGW通过接入实体向融合控制网元提供所述 UE的国际移动用 户识别码 ( IMSI );
所述融合控制网元根据所述 IMSI 获取鉴权向量, 并通过接入实体向 iAGW发送用户鉴权请求;
所述 iAGW触发融合控制网元完成对 UE的鉴权。
3、 根据权利要求 2 所述的实现方法, 其特征在于, 所述接入实体为 eNodeB时,所述 iAGW通过接入实体向融合控制网元提供所述 UE的 IMSI, 为:
所述 iAGW通过 eNodeB向 4G融合控制网元发送附着请求; 4G融合 控制网元向 iAGW发送识别请求; iAGW通过可扩展认证协议( EAP )请 求-识别消息, 向所述 UE请求用户的永久标识; 所述 UE通过 EAP应答- 识别消息向 iAGW提供用户的永久标识;所述 iAGW解析用户的永久标识, 提取出 IMSI, 并通过 eNodeB向 4G融合控制网元提供 IMSL
4、 根据权利要求 3所述的实现方法, 其特征在于, 所述 iAGW触发融 合控制网元完成对 UE的鉴权为:
iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码,通过 EAP 请求-挑战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; UE运行鉴 权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主会话密钥, 通过 EAP应答 4兆战消息, 向 iAGW传送所述响应和消息认证码; iAGW判 定计算出的消息认证码和收到的消息认证码一致时, 通过 eNodeB向 4G融 合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 4G融合控制网元 判定 iAGW发送的用户鉴权响应和归属用户服务器(HSS ) 的预期响应一 致时, 确定用户鉴权成功。
5、 根据权利要求 4所述的实现方法, 其特征在于, 该方法还包括: 所 述 4G融合控制网元在确定用户鉴权成功后 ,向 iAGW发送非接入层安全模 式命令, 所述非接入层安全模式命令包括演进的通用地面无线接入网的密 钥集标识、 UE安全能力、 加密算法、 完整性保护算法以及非接入层消息认 证码。
6、 根据权利要求 5所述的实现方法, 其特征在于, 该方法还包括: 所 述 iAGW根据所述非接入层安全模式命令生成非接入层加密密钥、 非接入 层完整性保护密钥。
7、 根据权利要求 6所述的实现方法, 其特征在于, 该方法还包括: 所 述 iAGW根据生成的非接入层完整性保护密钥, 对收到的非接入层安全模 式命令消息进行完整性校验。
8、 根据权利要求 2 所述的实现方法, 其特征在于, 所述接入实体为 UTRAN时, 所述 iAGW通过接入实体向 3G融合控制网元提供所述 UE的 IMSI, 为:
iAGW通过 UTRAN向 3G融合控制网元发送附着请求; 3G融合控制 网元通过 UTRAN向 iAGW发送识别请求; 所述 iAGW通过 EAP请求-识 别消息, 向 UE请求用户的永久标识; 所述 UE通过 EAP应答-识别消息, 向 iAGW提供用户的永久标识; 所述 iAGW解析用户的永久标识, 提取出 IMSI, 并通过 UTRAN向 3G融合控制网元提供 IMSI。
9、 根据权利要求 8所述的实现方法, 其特征在于, 所述 iAGW触发融 合控制网元完成对 UE的鉴权为:
所述 iAGW从用户鉴权请求的鉴权令牌中提取计算出消息认证码, 通 过 EAP请求-挑战消息, 向 UE传递随机数、鉴权令牌以及消息认证码; UE 运行鉴权和密钥协商算法, 校验鉴权令牌和消息认证码, 产生响应和主会 话密钥 , 通过 EAP应答 战消息 , 向 iAGW传递所述响应和消息认证码; iAGW判定计算出的消息认证码和收到的消息认证码一致时,通过 UTRAN 向 3G融合控制网元回送用户鉴权响应, 携带收到的 UE的响应; 3G融合 控制网元判定 iAGW发送的用户鉴权响应和 HSS/归属位置寄存器( HLR ) 的预期响应一致时,向 iAGW发送鉴权结果指示消息,携带成功指示; iAGW 根据鉴权结果指示消息中携带的成功指示,确定安全认证通过, 向 UE发送 EAP-成功消息。
10、 一种用户设备接入融合控制网元的实现装置, 位于 iAGW, 其特 征在于, 该装置包括: 鉴权转换模块, 设置于 UE与融合控制网元之间, 用 于将 iAGW和 UE之间的鉴权消息, 转换为 iAGW和融合控制网元之间的 鉴权消息。
11、 根据权利要求 10所述的实现装置, 其特征在于, 所述鉴权转换模 块包括: IMSI提供模块、 第一鉴权模块; 其中,
所述 IMSI提供模块, 用于通过接入实体向融合控制网元提供所述 UE 的 IMSI;
所述第一鉴权模块, 用于在收到用户鉴权请求后, 触发融合控制网元 完成对 UE的鉴权; 其中,
所述接入实体为 eNodeB时, 所述融合控制网元为 4G融合控制网元; 所述接入实体为 UTRAN时, 所述融合控制网元为 3G融合控制网元。
12、 根据权利要求 11所述的实现装置, 其特征在于,
所述 IMSI提供模块, 具体用于通过 eNodeB向 4G融合控制网元发送 附着请求; 通过 EAP请求-识别消息, 向 UE请求用户的永久标识; 解析用 户的永久标识, 提取出 IMSI, 并向 4G融合控制网元提供 IMSI; 从用户鉴 权请求的鉴权令牌中提取计算出消息认证码, 通过 EAP请求 -挑战消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; 判定计算出的消息认证码和 UE发送的消息认证码一致时, 通过 eNodeB向 4G融合控制网元回送用户 鉴权响应, 携带收到的 UE的响应;
所述第一鉴权模块, 还用于接收通过 eNodeB发送的来自 4G融合控制 网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进的通 用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算 法以及非接入层消息认证码。
13、 根据权利要求 11所述的实现装置, 其特征在于,
所述 IMSI提供模块, 具体用于通过 UTRAN向 3G融合控制网元发送 附着请求; 通过 EAP请求-识别消息, 向 UE请求用户的永久标识; 解析用 户的永久标识,提取出 IMSI ,并通过 UTRAN向 3G融合控制网元提供 IMSI; 从用户鉴权请求的鉴权令牌中提取计算出消息认证码,通过 EAP请求 -挑战 消息, 向 UE传递随机数、 鉴权令牌以及消息认证码; 判定计算出的消息认 证码和 UE发送的消息认证码一致时 , 通过 UTRAN向 3G融合控制网元回 送用户鉴权响应;并根据 3G融合控制网元发送的鉴权结果指示消息中携带 的成功指示, 确定安全认证通过, 向 UE发送 EAP-成功消息; 所述第一鉴权模块,还用于接收通过 UTRAN发送的来自 3G融合控制 网元的非接入层安全模式命令, 所述非接入层安全模式命令包含演进的通 用地面无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算 法以及非接入层消息认证码。
14、 根据权利要求 12所述的实现装置, 其特征在于,
所述第一鉴权模块, 还用于根据所述非接入层安全模式命令生成非接 入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接入层完整性保 护密钥, 对收到的非接入层安全模式命令消息进行完整性校验; 判定完整 性校验通过后, 通过 eNodeB向 4G融合控制网元响应非接入层安全模式完 成消息。
15、 根据权利要求 13所述的实现装置, 其特征在于,
所述第一鉴权模块, 还用于根据所述非接入层安全模式命令生成非接 入层加密密钥、 非接入层完整性保护密钥; 根据生成的非接入层完整性保 护密钥, 对收到的非接入层安全模式命令消息进行完整性校验; 判定完整 性校验通过后,通过 UTRAN向 3G融合控制网元响应非接入层安全模式完 成消息。
16、 一种用户设备接入融合控制网元的实现装置, 位于融合控制网元, 其特征在于, 该装置包括:
第二鉴权模块, 用于通过接入实体与 iAGW进行 UE的鉴权; 其中, 所述接入实体为 eNodeB时, 所述第二鉴权模块设置在 4G融合 控制网元;
所述接入实体为 UTRAN时,所述第二鉴权模块设置在 3G融合控制网 元。
17、 根据权利要求 16所述的实现装置, 其特征在于, 所述第二鉴权模块, 具体用于根据 UE的 IMSI获取鉴权向量, 并通过 接入实体向 iAGW发送用户鉴权请求, 根据 iAGW的触发完成对 UE的鉴 权。
18、 根据权利要求 17所述的实现装置, 其特征在于,
所述第二鉴权模块设置在 4G融合控制网元时, 所述第二鉴权模块, 用 于通过 eNodeB向 iAGW发送识别请求, 接收 iAGW从永久标识中提取的 IMSI; 并使用获取到的 IMSI, 向 HSS获取鉴权向量; 保存 HSS发送的鉴 权向量, 通过 eNodeB向 iAGW发送用户鉴权请求; 接收 iAGW发送的用 户鉴权响应, 判定 iAGW发送的用户鉴权响应和 HSS发送的预期响应一致 时, 确定用户鉴权成功。
19、 根据权利要求 17所述的实现装置, 其特征在于, 所述第二鉴权模 块设置在 3G融合控制网元时, 所述第二鉴权模块, 用于通过 UTRAN向 iAGW发送识别请求, 接收 iAGW从永久标识中提取的 IMSI; 并使用获取 到的 IMSI, 向 HSS/HLR获取鉴权信息; 保存 HSS/HLR发送的鉴权信息响 应, 通过 UTRAN向 iAGW发送用户鉴权请求; 并接收 iAGW发送的用户 鉴权响应,在判定 iAGW发送的用户鉴权响应和 HSS/HLR的预期响应一致 时, 通过 UTRAN向 iAGW发送鉴权结果指示消息。
20、 根据权利要求 18所述的实现装置, 其特征在于, 所述第二鉴权模 块, 还用于在确定用户鉴权成功后, 通过 eNodeB向 iAGW发送非接入层 安全模式命令, 所述非接入层安全模式命令包含演进的通用地面无线接入 网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算法以及非接入层 消息认证码; 接收非接入层安全模式完成消息, 保存其中的非接入层消息 认证码。
21、 根据权利要求 19所述的实现装置, 其特征在于, 所述第二鉴权模 块, 还用于在发送所述鉴权结果指示消息后, 通过 UTRAN向 iAGW发送 非接入层安全模式命令, 所述非接入层安全模式命令包含演进的通用地面 无线接入网的密钥集标识、 UE安全能力、 加密算法、 完整性保护算法以及 非接入层消息认证码; 接收非接入层安全模式完成消息, 保存其中的非接 入层消息认证码。
PCT/CN2013/072152 2012-03-06 2013-03-04 一种用户设备接入融合控制网元的实现方法及装置 WO2013131461A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210057119.3 2012-03-06
CN201210057119.3A CN103313239B (zh) 2012-03-06 2012-03-06 一种用户设备接入融合核心网的方法及系统

Publications (1)

Publication Number Publication Date
WO2013131461A1 true WO2013131461A1 (zh) 2013-09-12

Family

ID=49115943

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/072152 WO2013131461A1 (zh) 2012-03-06 2013-03-04 一种用户设备接入融合控制网元的实现方法及装置

Country Status (2)

Country Link
CN (1) CN103313239B (zh)
WO (1) WO2013131461A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516376A (zh) * 2014-09-24 2016-04-20 中兴通讯股份有限公司 一种移动终端接入家庭网关的控制方法及家庭网关
CN113852949A (zh) * 2021-09-26 2021-12-28 中国电子科技集团公司第五十四研究所 接入网关及卫星终端通过接入网关接入5g移动网络方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107005843B (zh) * 2015-04-03 2020-02-14 华为技术有限公司 一种无线通信网络中的接入方法、相关装置及系统
CN106535182A (zh) * 2015-09-10 2017-03-22 中兴通讯股份有限公司 一种无线网络鉴权方法及核心网网元、接入网网元、终端
CN109417439B (zh) * 2016-07-07 2021-10-15 Idac控股公司 用于利用icn的基于动态配置网络编码的多源分组传输的过程
CN109560919B (zh) 2017-09-27 2021-02-09 华为技术有限公司 一种密钥衍生算法的协商方法及装置
KR20200088872A (ko) * 2017-11-27 2020-07-23 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 시스템 및 사용자 기기
CN107896370B (zh) * 2017-12-27 2020-12-18 海能达通信股份有限公司 一种故障弱化模式下接入网络的方法、装置
CN110881020B (zh) * 2018-09-06 2021-07-23 大唐移动通信设备有限公司 一种用户签约数据的鉴权方法及数据管理网元
CN112469043B (zh) * 2019-09-09 2022-10-28 华为技术有限公司 一种鉴权的方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960566A (zh) * 2005-11-01 2007-05-09 华为技术有限公司 演进的移动通信网及3gpp和非3gpp接入网之间移动性管理方法
CN101204038A (zh) * 2005-06-16 2008-06-18 法国电信公司 鉴权协议转换方法
CN101656956A (zh) * 2008-08-22 2010-02-24 华为技术有限公司 一种接入3gpp网络的方法、系统和网关
CN102056321A (zh) * 2009-10-30 2011-05-11 中兴通讯股份有限公司 一种实现本地接入的方法及系统
US20110128913A1 (en) * 2009-11-23 2011-06-02 Kuntal Chowdhury Providing proxy mobile ip over a communication network
CN102098237A (zh) * 2011-01-27 2011-06-15 大唐移动通信设备有限公司 一种网关设备及使用方法、信息传输方法及设备

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1752012B1 (en) * 2004-06-02 2010-07-21 Nokia Corporation Method for roaming between networks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101204038A (zh) * 2005-06-16 2008-06-18 法国电信公司 鉴权协议转换方法
CN1960566A (zh) * 2005-11-01 2007-05-09 华为技术有限公司 演进的移动通信网及3gpp和非3gpp接入网之间移动性管理方法
CN101656956A (zh) * 2008-08-22 2010-02-24 华为技术有限公司 一种接入3gpp网络的方法、系统和网关
CN102056321A (zh) * 2009-10-30 2011-05-11 中兴通讯股份有限公司 一种实现本地接入的方法及系统
US20110128913A1 (en) * 2009-11-23 2011-06-02 Kuntal Chowdhury Providing proxy mobile ip over a communication network
CN102098237A (zh) * 2011-01-27 2011-06-15 大唐移动通信设备有限公司 一种网关设备及使用方法、信息传输方法及设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516376A (zh) * 2014-09-24 2016-04-20 中兴通讯股份有限公司 一种移动终端接入家庭网关的控制方法及家庭网关
CN105516376B (zh) * 2014-09-24 2020-09-08 中兴通讯股份有限公司 一种移动终端接入家庭网关的控制方法及家庭网关
CN113852949A (zh) * 2021-09-26 2021-12-28 中国电子科技集团公司第五十四研究所 接入网关及卫星终端通过接入网关接入5g移动网络方法
CN113852949B (zh) * 2021-09-26 2024-02-23 中国电子科技集团公司第五十四研究所 接入网关及卫星终端通过接入网关接入5g移动网络方法

Also Published As

Publication number Publication date
CN103313239B (zh) 2018-05-11
CN103313239A (zh) 2013-09-18

Similar Documents

Publication Publication Date Title
WO2013131461A1 (zh) 一种用户设备接入融合控制网元的实现方法及装置
US9167430B2 (en) Access method and system, and mobile intelligent access point
US9113436B2 (en) Method and system for information transmission
WO2008131689A1 (fr) Procédé et système de fourniture d'un service de communication d'urgence et dispositifs correspondants
WO2014056445A1 (zh) 一种路由转发的方法、系统及控制器
US9332435B2 (en) Device, system and method using EAP for external authentication
WO2009059544A1 (fr) Procédé, dispositif et système permettant de mettre en œuvre la commutation entre des réseaux
US9544832B2 (en) Method, apparatus and system for policy control
US9800404B2 (en) Configuration of liveness check using internet key exchange messages
WO2010081329A1 (zh) 业务流迁移过程中对网络资源进行控制的方法和系统
WO2011127774A1 (zh) 一种用户终端接入互联网方式的控制方法及装置
WO2012126302A1 (zh) 一种支持双模双待终端同时通信的方法和系统
WO2018058365A1 (zh) 一种网络接入授权方法、相关设备及系统
US20140177530A1 (en) Access method and system and mobile intelligent access point
WO2012142889A1 (zh) 一种网关的选择方法、实现设备及系统
WO2016065639A1 (zh) 数据处理的方法、装置、终端、移动管理实体及系统
WO2008099254A2 (en) Authorizing n0n-3gpp ip access during tunnel establishment
WO2010091589A1 (zh) 一种安全认证方法
WO2014071790A1 (zh) 固网移动融合的策略控制方法、装置及系统
WO2014048191A1 (zh) 一种选择vplmn的方法、系统及分组数据网络网关
WO2012146093A1 (zh) 一种实现业务处理的方法和系统
US11758395B2 (en) Support of dedicated core networks for WLAN access
WO2011032522A1 (zh) 一种实现本地接入的系统及方法
US10701592B2 (en) Service data flow packet transmission method, apparatus, and system
WO2013152655A1 (zh) 一种融合网络中的策略控制方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13757547

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13757547

Country of ref document: EP

Kind code of ref document: A1