WO2013139071A1 - 检测uicc是否在授权设备上使用的方法、系统和用户设备 - Google Patents

检测uicc是否在授权设备上使用的方法、系统和用户设备 Download PDF

Info

Publication number
WO2013139071A1
WO2013139071A1 PCT/CN2012/075294 CN2012075294W WO2013139071A1 WO 2013139071 A1 WO2013139071 A1 WO 2013139071A1 CN 2012075294 W CN2012075294 W CN 2012075294W WO 2013139071 A1 WO2013139071 A1 WO 2013139071A1
Authority
WO
WIPO (PCT)
Prior art keywords
imei
user equipment
authentication data
hss
hlr
Prior art date
Application number
PCT/CN2012/075294
Other languages
English (en)
French (fr)
Inventor
曹岚健
余万涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013139071A1 publication Critical patent/WO2013139071A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, system, and user equipment for detecting whether a UICC (Universal Integrated Circuit Card) is used on an authorized device.
  • UICC Universal Integrated Circuit Card
  • MTC Machine Type Communication
  • MTC devices In the MTC system, MTC devices often perform tasks in some relatively remote environments because no human intervention is required. Since MTC devices are often exposed to unattended, remote areas and other hazardous environments, the risk behaviors that occur on MTC devices are greatly increased, such as the theft of UICC cards on MTC devices. In addition, an attacker can insert a UICC dedicated to some devices with special charging features into other smart devices to steal the communication charges of others or perform other attacks. This series of threats requires the core network to provide device authentication methods to ensure that the device is a legitimate device and that the UICC plugged into the legitimate device is authorized for use on the device.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the core network determines whether the UICC is authorized to be used on the device by detecting whether the IMSI/IMEI pairing is authorized. Then, the core network must authenticate the IMSI and IMEI uploaded by the device to ensure that the IMSI and IMEI uploaded by the device are legal, and then it can be judged whether the IMSI/IMEI pairing is authorized.
  • the standard AKA process can authenticate IMSI and ensure that IMSI is legal.
  • there is no standard in the standard for IMEI authentication that is, device authentication.
  • an enhanced AKA process is used to authenticate a device, that is, to enhance correlation.
  • the AKA process in the standard adds a device authentication process to the standard AKA process to authenticate the IMSI during the AKA process and to authenticate the IMEI.
  • this method has several disadvantages: First, the AKA process performs not only the user authentication process and the device authentication process, but also the process of establishing a secure connection. In many cases, the AKA process is performed. For example, when the core network node fails to check the integrity of the TA update request message during the TAU process, the device authentication does not need to be performed again. Therefore, device authentication in the enhanced AKA process will increase the overhead of the communication system.
  • the enhanced AKA process produces a new root key.
  • the root key has the same function as CK and IK in KASME and UTRAN in E-UTRAN, the introduction of the root key in the current communication system causes a certain change in the security architecture. Summary of the invention
  • the technical problem to be solved by the present invention is to provide a method, system and user equipment for detecting whether a UICC is used on an authorized device, reducing the signaling overhead of the device authentication process, and ensuring that a specific UICC can only be used in a specific device.
  • the present invention provides a method for detecting whether a UICC is used on an authorized device, including:
  • the core network node After receiving the attach request of the user equipment, the core network node establishes a secure connection with the user equipment;
  • the HSS/HLR performs the following: detecting whether the IMEI and the IMSI are authorized IMEI/IMSI pairs, and/or detecting the device authentication data according to the device root key corresponding to the IMEI, and determining whether the IMEI is legitimate.
  • the above method may further have the following features, and the method further includes:
  • the HSS/HLR sends the detection result to the core network node by updating the location response;
  • the core network node determines to accept or reject the attach request of the user equipment according to the detection result.
  • the foregoing method may further have the following features, the method further includes: the HSS/HLR locally configuring an authorized IMEI list of the IMSI, where the HSS/HLR determines the IMEI according to the locally configured IMSI authorized IMEI list. And whether the IMSI is an authorized IMEI/IMSI pair.
  • the foregoing method may further have the following feature: the detecting the device authentication data according to the device root key corresponding to the IMEI includes:
  • the foregoing method may further have the following feature: the lower level key is generated according to the following manner: the HSS/HLR uses a device root key, a counter COUNT value, and a monthly service network point identifier corresponding to the IMEI as input. Generating the subordinate key;
  • the COUNT is synchronized with a counter on the user equipment side, and the COUNT performs a count every time the HSS/HLR detects the device authentication data; the service network point identifier is a network point currently serving as the user equipment. logo.
  • the foregoing method may further have the following feature: the detecting, by the HSS/HLR, the device authentication data according to the subordinate key includes:
  • the HSS/HLR decrypts the device authentication data by using the lower level key to obtain a device response RES and a random number RAND;
  • the HSS/HLR uses the RAND, the COUNT and the subordinate key as input of a device response generation function, to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, and if the two are the same, the IMEI is legal, otherwise the IMEI is invalid.
  • the foregoing method may further have the following feature: the detecting, by the HSS/HLR, the device authentication data according to the device root key corresponding to the IMEI includes:
  • the HSS/HLR decrypts the device authentication data by using the device root key to obtain The device responds to the RES and the random number RAND;
  • the HSS/HLR uses the RAND, the counter COUNT value and the device root key as input to the device response generation function to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, if the two are the same, the IMEI is legal, otherwise, the IMEI is invalid;
  • the COUNT is synchronized with a counter on the user equipment side, and the COUNT performs a count every time the HSS/HLR detects the device authentication data; the service network point identifier is a network point currently serving as the user equipment. logo.
  • the present invention also provides a system for detecting whether a UICC is used on an authorized device, including: a core network node, a home subscriber server HSS/home location register HLR, where:
  • the core network node is configured to: after receiving an attach request of the user equipment, establish a secure connection with the user equipment; and send an identifier request message to the user equipment, and receive an international mobile device identifier returned by the user equipment IMEI and device authentication data; transmitting the IMEI, the international mobile subscriber identity IMSI of the universal integrated circuit card on the user equipment, and the device authentication data to the HSS/HLR through an update location request;
  • the HSS/HLR is configured to: after receiving the update location request, perform the following detection: detecting whether the IMEI and the IMSI are authorized IMEI/IMSI pairs, and/or, according to the device root key corresponding to the IMEI The device authentication data is detected to determine whether the IMEI is legal.
  • the foregoing system may further have the following feature, the HSS/HLR is further configured to: send the detection result to the core network node by using an update location response;
  • the core network node is further configured to: determine, according to the detection result, accept or reject an attach request of the user equipment.
  • the foregoing system may further have the following feature: the HSS/HLR is further configured to: locally configure an authorized IMEI list of the IMSI, and determine, according to the locally configured IMEI list of authorized IMEIs, whether the IMEI and the IMSI are authorized IMEI/IMSI. Correct.
  • the HSS/HLR is configured to: detect the device authentication data according to the device root key corresponding to the IMEI, including:
  • the HSS/HLR is configured to: generate the subordinate key according to the following manner:
  • the HSS/HLR generates the subordinate key by using a device root key, a counter COUNT value, and a monthly service network point identifier corresponding to the IMEI as input;
  • the COUNT is synchronized with a counter on the user equipment side, and the COUNT performs a count every time the HSS/HLR detects the device authentication data;
  • the service network identifier is identified as an identifier of a network point currently serving the user equipment.
  • the HSS/HLR is configured to: detect the device authentication data according to the subordinate key, including:
  • the HSS/HLR decrypts the device authentication data by using the lower level key to obtain a device response RES and a random number RAND;
  • the HSS/HLR uses the RAND, the COUNT and the subordinate key as input of a device response generation function, to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, and if the two are the same, the IMEI is legal, otherwise the IMEI is invalid.
  • the HSS/HLR is configured to: directly detect the device authentication data according to the device root key corresponding to the IMEI, including:
  • the HSS/HLR decrypts the device authentication data by using the device root key to obtain a device response RES and a random number RAND;
  • the HSS/HLR uses the RAND, the counter COUNT value and the device root key as input to the device response generation function to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, if the two are the same, the IMEI is legal, otherwise, the IMEI is invalid;
  • the COUNT is synchronized with a counter on the user equipment side, and after the device authentication data is detected by the HSS/HLR, the COUNT is counted once;
  • the former is the identifier of the network point of the user equipment.
  • the invention provides a method for detecting whether a UICC is used on an authorized device, including:
  • the user equipment sends an attach request to the core network node to establish a secure connection with the core network node.
  • the user equipment After receiving the identifier request message of the core network node, the user equipment corresponds to the international mobile device identifier IMEI of the user equipment.
  • the device root key generates device authentication data, and sends the IMEI and the device authentication data to the core network node by using an identifier response message.
  • the foregoing method may further have the following feature: the user equipment generates device authentication data according to the device root key corresponding to the IMEI of the user equipment, including:
  • the user equipment directly generates the device authentication data according to the device root key corresponding to the IMEI;
  • the user equipment generates a lower-level key according to the device root key corresponding to the IMEI, and generates the device authentication data according to the lower-level key.
  • the foregoing method may further have the following feature: the generating, by the user equipment, the subordinate key according to the device root key includes:
  • the user equipment generates the subordinate key by using the device root key, the counter COUNT value, and the service network point identifier as input;
  • the COUNT is synchronized with the counter on the network side, and the COUNT performs a count every time the user equipment generates one device authentication data;
  • the service network point identifier is an identifier of a network point currently serving the user equipment.
  • the foregoing method may further have the following feature: the user equipment generating device authentication data according to the subordinate key includes:
  • the user equipment generates a random number RAND
  • the user equipment generates the device response RES by using the random number RAND, the COUNT value, and the subordinate key as input of the device response generation function;
  • the user equipment encrypts the RES and RAND using the lower level key to generate the device authentication data.
  • the foregoing method may further have the following feature, the user equipment directly according to the IMEI Generating the device authentication data by the corresponding device root key includes:
  • the user equipment generates a random number RAND
  • the user equipment uses the random number RAND, the counter COUNT value and the device root key as input of the device response generation function to generate a device response RES;
  • the user equipment encrypts the RES and the RAND by using the device root key to generate the device authentication data
  • the COUNT is synchronized with a counter on the network side, and the COUNT performs a count every time the user equipment generates a device authentication data.
  • the above method may further have the following feature: the device root key is stored in a security component of the user equipment, and the device root key is prohibited from reading the security component.
  • the invention also provides a user equipment, comprising:
  • An attaching unit configured to: send an attach request to the core network node, and establish a secure connection with the core network node;
  • a device authentication data generating unit configured to: after receiving the identifier request message of the core network node, generate device authentication data according to the device root key corresponding to the international mobile device identifier IMEI of the user equipment;
  • a sending unit configured to: send the IMEI and the device authentication data to the core network node by using an identifier response message.
  • the user equipment may further have the following characteristics: the device authentication data generating unit is configured to: generate device authentication data according to the device root key corresponding to the IMEI of the user equipment:
  • the foregoing user equipment may further have the following features, and the user equipment further includes a counter.
  • COUNT set to: synchronous with the counter on the network side, when the device authentication data generating unit generates one device authentication data, performs counting once;
  • the device authentication data generating unit is configured to: generate a subordinate key according to the device root key, including:
  • the service network identifier is identified as an identifier of a network point currently serving the user equipment.
  • the user equipment may further have the following characteristics: the device authentication data generating unit is configured to: generate the device authentication data according to the lower level key, including:
  • the RES and RAND are encrypted using the lower level key to generate the device authentication data.
  • the user equipment may further have the following feature, the user equipment further includes a counter COUNT, which is configured to: synchronize with a counter on the network side, and the device authentication data generating unit generates one device authentication data, and performs counting once;
  • a counter COUNT which is configured to: synchronize with a counter on the network side, and the device authentication data generating unit generates one device authentication data, and performs counting once;
  • the device authentication data generating unit is configured to: generate the device authentication data directly according to the device root key corresponding to the IMEI, including:
  • the RES and RAND are encrypted using the device root key to generate the device authentication data.
  • the user equipment may further have the following features, the user equipment further comprising a security component, configured to: store the device root key, and prohibit reading the device root key from the security component.
  • a security component configured to: store the device root key, and prohibit reading the device root key from the security component.
  • the embodiment of the invention provides a method, a system and a user equipment for detecting whether a UICC is used on an authorized device, and the core network is not changed on the basis of changing the attachment process flow and the current security architecture. Authenticate the device, reduce the signaling overhead of the device authentication process; and enable the core network to detect
  • Figure 1 depicts an embodiment of performing device authentication and verifying whether the IMSI/IMEI pair is authorized
  • Figure 2 depicts an embodiment of how the device authentication and verification IMSI/IMEI is authorized during the attach process
  • FIG. 3 is a block diagram of a user equipment according to an embodiment of the present invention.
  • a root key device — root — key which is maintained by both parties to the communication, is required.
  • the device_root_key corresponds to the IMEI of the device.
  • the device_root_key is stored in the HSS/HLR; on the UE side, the device_root_key is stored in the device.
  • a security component is required to save the device—root—key, and all encryption and decryption operations and other operations related to the device—root—key are performed in this security component.
  • the device_root_key prohibits reading the security component.
  • the core network node After receiving the attach request of the user equipment, the core network node establishes a secure connection with the user equipment;
  • the core network node Sending, by the core network node, an identifier request message to the user equipment, and receiving an international mobile device identifier IMEI and device authentication data returned by the user equipment, where the IMEI, the universal integrated circuit card on the user equipment is international Mobile subscriber identity IMSI and the device authentication data Sending to the home subscriber server HSS/home location register HLR by updating the location request;
  • the HSS/HLR performs the following: detecting whether the IMEI and the IMSI are authorized IMEI/IMSI pairs, and/or detecting the device authentication data according to the device root key corresponding to the IMEI, and determining whether the IMEI is legitimate.
  • the method further includes
  • the HSS/HLR sends the detection result to the core network node by updating the location response; the core network node determines to accept or reject the attachment request of the user equipment according to the detection result.
  • the method further includes: the HSS/HLR locally configuring an authorized IMEI list of the IMSI, where the HSS/HLR determines, according to the locally configured IMEI list of authorized IMEIs, whether the IMEI and the IMSI are 4 authorized IMEI/ IMSI right.
  • the detecting the device authentication data according to the device root key corresponding to the IMEI includes:
  • the device authentication data is directly detected according to the device root key corresponding to the IMEI; or, the subordinate key is generated according to the device root key corresponding to the IMEI, and the device authentication data is detected according to the subordinate key.
  • the subordinate key is generated according to the following manner:
  • the HSS/HLR generates the subordinate key by using a device root key, a counter COUNT value, and a monthly service network point identifier corresponding to the IMEI as input;
  • the COUNT is synchronized with a counter on the user equipment side, and the COUNT performs a count every time the HSS/HLR detects the device authentication data; the service network point identifier is a network point currently serving as the user equipment. logo.
  • the above method for generating the lower level key is only an example, and the lower level key may be generated by other methods, for example, the generated lower level key is used again as the input of the key generation function, the newly generated key is used as the lower level key, etc.
  • the invention is not limited thereto.
  • the detecting, by the HSS/HLR, the device authentication data according to the subordinate key includes: the HSS/HLR decrypting the device authentication data by using the subordinate key, and obtaining Prepare response RES and random number RAND;
  • the HSS/HLR uses the RAND, the COUNT and the subordinate key as input of a device response generation function, to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, and if the two are the same, the IMEI is legal, otherwise the IMEI is invalid.
  • the detecting, by the HSS/HLR, the device authentication data according to the device root key corresponding to the IMEI includes:
  • the HSS/HLR decrypts the device authentication data by using the device root key to obtain a device response RES and a random number RAND;
  • the HSS/HLR uses the RAND, the counter COUNT value and the device root key as input to the device response generation function to obtain a desired device response XRES;
  • the HSS/HLR compares the XRES and the RES, and if the two are the same, the IMEI is legal, otherwise the IMEI is invalid.
  • the embodiment of the invention further provides a method for detecting whether the UICC is used on an authorized device, including:
  • the user equipment sends an attach request to the core network node to establish a secure connection with the core network node.
  • the user equipment After receiving the identifier request message of the core network node, the user equipment corresponds to the international mobile device identifier IMEI of the user equipment.
  • the device root key generates device authentication data, and sends the IMEI and the device authentication data to the core network node by using an identifier response message.
  • the generating, by the user equipment, the device authentication data according to the device root key corresponding to the IMEI of the user equipment includes:
  • the user equipment directly generates the device authentication data according to the device root key corresponding to the IMEI;
  • the user equipment generates a lower-level key according to the device root key corresponding to the IMEI, and generates the device authentication data according to the lower-level key.
  • the generating, by the user equipment, the subordinate key according to the device root key includes:
  • the user equipment uses the device root key, the counter COUNT value, and the service network identifier As input, generating the subordinate key;
  • the COUNT is synchronized with the counter on the network side, and the COUNT performs a count every time the user equipment generates one device authentication data;
  • the service network point identifier is an identifier of a network point currently serving the user equipment.
  • the user equipment generates the device authentication data according to the lower level key, including: the user equipment generates a random number RAND;
  • the user equipment generates the device response RES by using the random number RAND, the COUNT value, and the subordinate key as input of the device response generation function;
  • the user equipment encrypts the RES and RAND using the lower level key to generate the device authentication data.
  • the generating, by the user equipment, the device authentication data according to the device root key corresponding to the IMEI includes:
  • the user equipment generates a random number RAND
  • the user equipment uses the random number RAND, the counter COUNT value and the device root key as input of the device response generation function to generate a device response RES;
  • the user equipment encrypts the RES and the RAND by using the device root key to generate the device authentication data
  • the COUNT is synchronized with a counter on the network side, and the COUNT performs a count every time the user equipment generates a device authentication data.
  • the device root key is stored in a security component of the user equipment, and the device root key is prohibited from reading the security component.
  • the method for detecting whether the UICC is used on the authorized device includes: Step 1: A set of authorized IMEI lists are configured in advance in the HSS/HLR for each IMSI. Step 2: After sending the attach request to the core network node CN (Core Network Node), the UE performs a standard AKA process with the core network.
  • the CNN is a core network node, such as an SGSN in UTRAN/GERAN, or an MME in E-UTRAN.
  • UE and core A secure connection between the network nodes has been established and all signaling interactions between the following UEs and the CN are protected by the current security context.
  • the CN sends an "identification request" to the UE, requests the device identity of the UE, and requests device authentication data.
  • Step 3 After receiving the "Identification Request” message sent by the CNN, the UE will generate device authentication data (Device_ authentication_data), and send the device authentication data and the IMEI-in the "identification response" message to the CN. .
  • the device authentication data is generated by the device rather than by the UICC.
  • Step 4 The CNN forwards the IMSI/IMEI pair and device authentication data to the HSS/HLR in the "Update Location Request".
  • Step 5 The HSS/HLR detects the device authentication data, so as to determine whether the IMEI sent by the UE is legal, that is, the HSS/HLR performs device authentication.
  • Step 6 If the HSS/HLR detects that the IMEI is legal, the HSS further detects whether the IMSI/IMEI pair is an authorized IMSI/IMEI pair.
  • Step 7 The HSS/HLR informs CN of the detection results in steps 4 and 5 in "Update Position Response".
  • Step 8 The CN decides to accept the UE's attach request or reject the UE attach request according to the detection result notified by the HSS/HLR.
  • the detection sequence of the HSS/HLR described in the foregoing steps 5 and 6 can be reversed, that is, the HSS/HLR can first detect whether the IMSI/IMEI pair is an authorized IMSI/IMEI pair, and then check whether the IMEI is legal. In the two steps, the HSS/HLR informs the CNN to reject the attach request of the UE as long as one of the steps fails to pass the detection.
  • the UE generates device authentication data in the above step 3 and the HSS/HLR in step 5 detects the device authentication data, and the main purpose thereof is that the UE indicates to the HSS/HLR that it is holding the IMEI corresponding to the IMEI.
  • Device—root the UE of the key.
  • the HSS/HLR determines whether the device is legal or not, that is, whether the device holds the device_root_key corresponding to its IMEI.
  • the UE consists of a device and a UICC.
  • the device authentication data is generated by the device, instead of the UICC step 3A, the UE generates a random number RAND.
  • the UE uses device_root_key, COUNT, SN id (service network id) as input, and generates a next-level key next_key.
  • the method of generating the next-level key is the same as the way in which the UE uses the root key K to generate the next-level key K ASME in the EPS AKA process, except that the input parameters are different.
  • next-key can also be replaced directly with device-root-key.
  • COUNT is a counter maintained by both the UE and the HSS/HLR, which maintains synchronization between the UE and the HSS/HLR to prevent replay attacks.
  • the COUNT of the UE will count once, and each time the count can be incremented by one, or a specified value can be added.
  • the COUNT of the HSS/HLR end will be performed once. Count, for example, add 1.
  • the SN id is the site identifier currently serving the UE.
  • the SN id is information known to both the UE side and the HSS/HLR side.
  • step 3C the UE uses RAND, COUNT, and next_key as input to the device response generation function to generate a device response RES.
  • RES device response generation function (RAND , C0U T, next - key).
  • the device response generation function is a one-way function, and the device response generation function is capable of ensuring irreversible push, that is, the attacker cannot derive the next-key even if he knows three data of RES, RAND, and COUNT.
  • the method for the HSS/HLR to detect the device authentication data corresponds to the method for the device side to generate the device authentication data.
  • the HSS/HLR detects the device authentication data as follows, but is not limited to the following modes:
  • Step 5A The HSS/HLR queries the device_root_key of the device according to the IMEI.
  • step 5B the HSS/HLR uses device_root_key, COUNT, SN id (service network id) as input to generate the next-level key next_key.
  • COUNT is data that is kept in sync on the UE side and the HSS/HLR side.
  • SN id is the UE side and Data known at the HSS/HLR end.
  • the method of generating the next-level key is the same as the way in which the HSS/HLR generates the next-level key K ASME using the root key K in the EPS AKA process, except that the input parameters are different.
  • step 5C the HSS/HLR decrypts the device authentication data using next-key to obtain RES
  • the HSS/HLR uses the received RAND and uses COUNT and next_key as input to the device response generation function to obtain the expected device response XRES.
  • XRES device response generation function (RAND , COUT, next-key).
  • step 5E the HSS/HLR compares the received RES with its own generated XRES. If they are the same, the IMEI is legal; if it is different, the IMEI is invalid.
  • the present invention describes an embodiment of performing device authentication and verifying whether the IMSI/IMEI pair is authorized.
  • Step 101 A set of authorized IMEI lists are pre-defined in the HSS/HLR for each IMSI.
  • IMSI is the world's only signed subscriber ID stored in the UICC.
  • IMEI is the globally unique device identifier stored in the device.
  • the HSS/HLR can know whether the IMSI/IMEI pair is an authorized IMSI/IMEI pair, thereby determining whether the UICC corresponding to the IMSI is authorized. Used in devices corresponding to the IMEI.
  • Step 102 The UE initiates an attach request to the CN, requesting to establish a connection with the network. Then the UE and the network perform a standard AKA procedure, perform mutual authentication, and establish a secure connection. After the secure connection is established, the signaling interaction between all CNNs and UEs is protected by the current security context. After the secure connection is established, the CNN requests the device identification IMEI and device authentication data from the UE.
  • Step 103 After receiving the message of the requesting device identifier and the device authentication data sent by the CNN, the UE generates the device authentication data.
  • the process of generating device authentication data is as follows:
  • the UE generates a random number RAND.
  • the UE uses device_root_key, COUNT, SN id (service network id) as input, and generates a next-level key next_key.
  • the method of generating the next-level key is the same as the way in which the UE uses the root key K to generate the next-level key K ASM E in the EPS AKA process, except that the input parameters are different.
  • Next— key KDF(device— root—key, COUNT, SN id).
  • COUNT is a counter maintained by both the UE and the HSS/HLR, which maintains synchronization between the UE and the HSS/HLR to prevent replay attacks. For each device authentication data generated by the UE, the COUNT of the UE will be incremented by one; for each device authentication data verified by the HSS/HLR, the COUNT of the HSS/HLR will be incremented by one.
  • the SN id is the site identifier currently serving the UE.
  • the SN id is information known to both the UE side and the HSS/HLR side.
  • the UE uses RAND, COUNT, and next_key as input to the device response generation function to generate a device response RES.
  • RES device response generation function (RAND, COUT, next-key).
  • the device response generation function is a one-way function, and the device response generation function is capable of ensuring irreversible push, that is, the attacker cannot derive the next-key even if he knows three data of RES, RAND, and COUNT.
  • the UE After generating the device authentication data, the UE sends the device authentication data and the device identifier IMEI to the CN.
  • Step 104 After receiving the IMEI and device authentication data sent by the UE, the CN forwards the IMSI/IMEI pair and the device authentication data to the HSS/HLR, and requests the HSS/HLR to verify whether the IMEI is legal, and verifies whether the IMSI/IMEI pair is Authorization.
  • Step 105 After receiving the device authentication data and the IMSI/IMEI pair, the HSS/HLR first verifies whether the IMEI is legal. The way to verify that IMEI is legal is to verify device authentication data. The verification method is as follows:
  • the HSS/HLR queries the device_root_key of the device according to the IMEI.
  • the HSS/HLR uses device_root_key, COUNT, SN id (service network id) as input to generate the next-level key next-key.
  • COUNT is data that is kept in sync on the UE side and the HSS/HLR side.
  • SN id is the UE side and Data known at the HSS/HLR end.
  • the method of generating the next-level key is the same as the way in which the HSS/HLR generates the next-level key K ASME using the root key K in the EPS AKA process, except that the input parameters are different.
  • HSS/HLR uses next-key to decrypt the device authentication data and get RES
  • the HSS/HLR uses the received RAND and uses COUNT and next_key as input to the device response generation function to obtain the expected device response XRES.
  • XRES device response generation function (RAND , COUT, next-key).
  • the HSS/HLR compares the received RES with its own generated XRES. If they are the same, the IMEI is legal; if it is different, the IMEI is invalid.
  • Step 106 if step 105 verifies that the IMEI is legal, then this step is performed.
  • the HSS/HLR will further verify that the IMSI/IMEI pair is authorized.
  • the HSS/HLR can know whether the IMSI/IMEI pair is an authorized IMSI/IMEI pair by querying whether the IMEI exists in the IMEI list of authorized IMEIs.
  • Step 107 The HSS/HLR notifies the CNN of the detection results of steps 105 and 106.
  • Step 108 The CN decides to accept the attach request or reject the attach request according to the detection result notified by the HSS/HLR. If the IMEI is verified to be illegal, the CNN rejects the attach request and informs that the reason for rejecting the attach request is that the device authentication is unqualified; if the IMEI is legal but the IMSI/IMEI pair is not authorized, the CN also rejects the attach request and informs the reject attachment request The reason is that the IMSI/IMEI pair is not authorized; if the IMEI is legal and the IMSI/IMEI pair is an authorized IMSI/IMEI pair, the CN accepts the attach request.
  • Figure 2 depicts an embodiment of how the device authentication and verification IMSI/IMEI is authorized during the attach process.
  • Step 201 A set of authorized IMEI lists are pre-defined in the HSS/HLR for each IMSI.
  • IMSI is the world's only signed subscriber ID stored in the UICC.
  • IMEI is the globally unique device identifier stored in the device.
  • Step 202 The UE sends an attach request message to the CNN to initiate a network attach process, where the message includes information such as an IMSI or a temporary user identity identifier.
  • Step 203 If the UE sends the temporary user identity flag to the CNN, the CN queries or requests the IMSI of the user through the temporary user identity flag.
  • the CNN uses the IMSI to request an authentication vector from the HSS/HLR.
  • Step 204 If the CNN requests an authentication vector from the HSS/HLR, the HSS/HLR queries the root key corresponding to the IMSI according to the IMSI, generates an authentication vector, and responds to the CNN with an authentication vector.
  • Step 205 as described in step 203, if the context of the UE is not saved in the network, or if the attach request is not integrity protected, or the integrity check fails, the UE and the CNN perform a standard AKA process and establish a security. connection. After the secure connection is established, all of the following signaling is protected by the current security context.
  • Step 206 The CN sends an identifier request to the UE, requests the device identifier of the UE, and requests the UE to send the device authentication data in the message.
  • the UE After receiving the identification request message from the CNN, the UE will generate device authentication data.
  • the process of generating device authentication data is as follows:
  • the UE generates a random number RAND.
  • the UE uses device_root_key, COUNT, SN id (service network id) as input, and generates a next-level key next_key.
  • the method of generating the next-level key is the same as the way in which the UE uses the root key K to generate the next-level key K ASM E in the EPS AKA process, except that the input parameters are different.
  • COUNT is a counter maintained by both the UE and the HSS/HLR, which maintains synchronization between the UE and the HSS/HLR to prevent replay attacks. For each device authentication data generated by the UE, the COUNT of the UE will be incremented by one; for each device authentication data verified by the HSS/HLR, the COUNT of the HSS/HLR will be incremented by one.
  • the SN id is the site identifier currently serving the UE.
  • the SN id is a UE end and Information known at the HSS/HLR end.
  • the UE uses RAND, COUNT, and next_key as input to the device response generation function to generate a device response RES.
  • RES device response generation function (RAND, COUT, next-key).
  • the device response generation function is a one-way function, and the device response generation function is capable of ensuring irreversible push, that is, the attacker cannot derive the next-key even if he knows three data of RES, RAND, and COUNT.
  • Device— authentication— data
  • Step 207 The UE sends an identifier response message to the CNN, where the message is accompanied by the IMEI of the device, and the generated device authentication data is attached.
  • Step 208 The CN forwards the IMSI/IMEI pair and the device authentication data to the HSS/HLR in the update location request message.
  • Step 209 After receiving the device authentication data and the IMSI/IMEI pair, the HSS/HLR first verifies whether the IMEI is legal.
  • the way to verify that IMEI is legal is to verify device authentication data.
  • the verification method is as follows:
  • the HSS/HLR queries the device_root_key of the device according to the IMEI.
  • the HSS/HLR uses device_root_key, COUNT, SN id (service network id) as input to generate the next-level key next-key.
  • COUNT is data that is kept in sync on the UE side and the HSS/HLR side.
  • the SN id is data known both at the UE side and on the HSS/HLR side.
  • the method of generating the next-level key is the same as the way in which the HSS/HLR generates the next-level key K ASME using the root key K in the EPS AKA process, except that the input parameters are different.
  • HSS/HLR uses next-key to decrypt the device authentication data and get RES
  • HSS/HLR uses the received RAND and uses COUNT and next_key as settings
  • the input of the response generation function gets the expected device response XRES.
  • XRES device response generation function (RAND , COUT, next-key).
  • the HSS/HLR compares the received RES with its own generated XRES. If they are the same, the IMEI is legal; if it is different, the IMEI is invalid.
  • Step 210 if step 209 verifies that the IMEI is legal, then this step is performed.
  • the HSS/HLR will further verify that the IMSI/IMEI pair is authorized.
  • the HSS/HLR can know whether the IMSI/IMEI pair is an authorized IMSI/IMEI pair by querying whether the IMEI exists in the IMEI list of authorized IMEIs.
  • Step 211 The HSS/HLR informs the CN of the detection result of step 209 and step 210 in the update location response.
  • Step 212 The CN decides to accept the attach request or reject the attach request according to the detection result notified by the HSS/HLR. If the IMEI is verified to be illegal, the CNN rejects the attach request and informs that the reason for rejecting the attach request is that the device authentication is unqualified; if the IMEI is legal but the IMSI/IMEI pair is not authorized, the CN also rejects the attach request and informs the reject attachment request The reason is that the IMSI/IMEI pair is not authorized; if the IMEI is legal and the IMSI/IMEI pair is an authorized IMSI/IMEI pair, the CN accepts the attach request.
  • the embodiment of the invention further provides a system for detecting whether the UICC is used on an authorized device, including: a core network node, a home subscriber server HSS/home location register HLR, where:
  • the core network node is configured to: after receiving an attach request of the user equipment, establish a secure connection with the user equipment; and send an identifier request message to the user equipment, and receive an international mobile device identifier returned by the user equipment.
  • IMEI and device authentication data transmitting the IMEI, the international mobile subscriber identity IMSI of the universal integrated circuit card on the user equipment, and the device authentication data to the HSS/HLR through an update location request;
  • the HSS/HLR is configured to: after receiving the update location request, perform the following detection: detecting whether the IMEI and the IMSI are authorized IMEI/IMSI pairs, and/or, according to the device root key corresponding to the IMEI The device authentication data is detected to determine whether the IMEI is legal.
  • An embodiment of the present invention further provides a user equipment, as shown in FIG. 3, including: An attaching unit, configured to send an attach request to the core network node, and establish a secure connection with the core network node;
  • a device authentication data generating unit configured to: after receiving the identifier request message of the core network node, generate device authentication data according to the device root key corresponding to the international mobile device identifier IMEI of the user equipment
  • a sending unit configured to send the IMEI and the device authentication data to the core network node by using an identifier response message.
  • the device authentication data generating unit generates the device authentication data according to the device root key corresponding to the IMEI of the user equipment, including:
  • the user equipment further includes a counter COUNT, which is synchronized with a counter on the network side, and is configured to: when the device authentication data generating unit generates one device authentication data, perform counting once;
  • the generating, by the device authentication data generating unit, the subordinate key according to the device root key includes: generating the subordinate key by using the device root key, the counter COUNT value, and the service network point identifier as input;
  • the service network identifier is identified as an identifier of a network point currently serving the user equipment.
  • the device authentication data generating unit generates device authentication data according to the lower level key, including:
  • the RES and RAND are encrypted using the lower level key to generate the device authentication data.
  • the device authentication data generating unit directly according to the device root key corresponding to the IMEI Generating the device authentication data includes:
  • the RES and RAND are encrypted using the device root key to generate the device authentication data.
  • the user equipment further includes a security component, configured to store the device root key, and prohibit reading the device root key from the security component.
  • the present invention provides a method, system, and user equipment for detecting whether a UICC is used on an authorized device, and allows the core network to authenticate the device without changing the attachment process flow and the current security architecture.
  • the signaling overhead of the device authentication process and enables the core network to detect whether the IMSI/IMEI pairing is authorized, so that the core network can ensure that a specific UICC can only be used in a specific device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

检测通用集成电路卡UICC是否在授权设备上使用的方法,包括:核心网节点接收到用户设备的附着请求后,与其建立安全连接,向用户设备发送标识请求消息,接收所述用户设备返回的国际移动设备识别码IMEI和设备认证数据,将所述IMEI、所述用户设备上的通用集成电路卡的国际移动用户识别码IMSI和所述设备认证数据通过更新位置请求发送给归属用户服务器HSS/归属位置寄存器HLR;HSS/HLR进行如下检测:检测所述IMEI和IMSI是否为授权的IMEI/IMSI对,和/或,根据IMEI对应的设备根密钥检测所述设备认证数据,判断IMEI是否合法。本申请还涉及检测UICC是否在授权设备上使用的系统和用户设备。

Description

检测 UICC是否在授权设备上使用的方法、 系统和用户设备
技术领域
本发明涉及通信技术领域,具体涉及一种检测 UICC ( Universal Integrated Circuit Card, 通用集成电路卡)是否在授权设备上使用的方法、 系统和用户 设备。 背景技术
MTC(Machine Type Communication, 机器类型通信)是指一种不需要人干 涉的两实体之间的数据交互。 换而言之, MTC就是一种机器类的通信, 是机 器与机器之间的对话。
MTC 系统中, 由于不需要人的干涉, MTC设备经常会处于一些比较边 远的环境中执行任务。 由于 MTC设备经常会处于无人监督、边远地区等危险 环境中, 导致发生在 MTC设备上的危险行为大大增加, 例如 MTC设备上的 UICC 卡被盗用。 此外, 攻击者可以将专用于一些具有特殊计费特征设备的 UICC,插入到其他的智能设备上,以盗取他人通信费用或进行其他攻击手段。 这一系列的威胁都需要核心网能够提供设备认证的方法, 保证设备是合法设 备, 并保证插入到该合法设备上的 UICC是授权在该设备上使用的。
IMSI ( International Mobile Subscriber Identity, 国际移动用户识别码 )是 存在于 UICC上用于标识用户的信息, IMEI ( International Mobile Equipment Identity, 国际移动设备识别码)是存在于设备上用于标识设备的信息。 相关 技术中核心网是通过检测 IMSI/IMEI配对是否被授权, 来判断该 UICC是否 授权在该设备上使用。 那么, 核心网必须要对设备上传的 IMSI和 IMEI进行 认证, 以保证设备上传的 IMSI和 IMEI是合法, 进而才能够判断 IMSI/IMEI 配对是否被授权。 标准的 AKA过程能够对 IMSI进行认证, 能够保证 IMSI 是合法的,但是目前标准中没有规范核心网对 IMEI的认证方式, 即设备认证 的方式。
相关技术中提出了使用增强的 AKA过程来对设备进行认证,即增强相关 标准中的 AKA过程, 在标准 AKA过程中加入设备认证过程, 以便在 AKA 过程中即对 IMSI进行认证 , 又对 IMEI进行认证。 但此方法存在几个缺点: 其一, AKA过程执行的不仅仅是用户认证过程和设备认证过程, 同时也 执行了安全连接建立的过程。 在很多情况下都会进行 AKA过程, 如 TAU过 程中核心网节点对 TA更新请求消息的完整性检查失败的时候, 但此时并不 需要重新进行设备认证。所以在增强的 AKA过程中进行设备认证,会增加通 信系统的开销。
其二, 增强的 AKA 过程产生了新的根密钥。 虽然该根密钥具有和 E-UTRAN中的 KASME和 UTRAN中的 CK、 IK相同的功能, 但是在目前通 信系统中引入该根密钥, 会导致安全架构产生一定的变动。 发明内容
本发明要解决的技术问题是提供一种检测 UICC是否在授权设备上使用 的方法、 系统和用户设备, 减少设备认证过程的信令开销, 保证特定的 UICC 只能够在特定的设备中使用。
为了解决上述问题, 本发明提供了一种检测 UICC是否在授权设备上使 用的方法, 包括:
核心网节点接收到用户设备的附着请求后, 与所述用户设备建立安全连 接;
所述核心网节点向所述用户设备发送标识请求消息, 接收所述用户设备 返回的国际移动设备识别码 IMEI和设备认证数据, 将所述 IMEI、 所述用户 设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证数据 通过更新位置请求发送给归属用户服务器 HSS/归属位置寄存器 HLR;
所述 HSS/HLR进行如下检测: 检测所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对 ,和 /或 ,根据所述 IMEI对应的设备根密钥检测所述设备认证数 据, 判断所述 IMEI是否合法。
优选地, 上述方法还可具有以下特点, 所述方法还包括,
所述 HSS/HLR将检测结果通过更新位置响应发送给所述核心网节点; 所述核心网节点根据所述检测结果决定接受或者拒绝所述用户设备的附 着请求。
优选地, 上述方法还可具有以下特点, 所述方法还包括, 所述 HSS/HLR 本地配置 IMSI的授权 IMEI列表, 所述 HSS/HLR根据所述本地配置的 IMSI 的授权 IMEI列表判断所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对。
优选地,上述方法还可具有以下特点,所述根据所述 IMEI对应的设备根 密钥检测所述设备认证数据包括:
直接根据所述 IMEI对应的设备根密钥检测所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥检测所述设备认证数据。
优选地, 上述方法还可具有以下特点, 所述下级密钥根据如下方式生成: 所述 HSS/HLR使用与所述 IMEI对应的设备根密钥、计数器 COUNT值、 月良务网点标识作为输入, 生成所述下级密钥;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
优选地, 上述方法还可具有以下特点, 所述 HSS/HLR根据所述下级密钥 检测所述设备认证数据包括:
所述 HSS/HLR使用所述下级密钥对所述设备认证数据进行解密,得到设 备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,所述 COUNT和所述下级密钥作为设备 响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
优选地,上述方法还可具有以下特点,所述 HSS/HLR直接根据所述 IMEI 对应的设备根密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述设备根密钥对所述设备认证数据进行解密,得到 设备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,计数器 COUNT值和所述设备根密钥作 为设备响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
本发明还提供一种检测 UICC是否在授权设备上使用的系统, 包括: 核 心网节点, 归属用户服务器 HSS/归属位置寄存器 HLR, 其中:
所述核心网节点设置为: 接收到用户设备的附着请求后, 与所述用户设 备建立安全连接; 以及, 向所述用户设备发送标识请求消息, 接收所述用户 设备返回的国际移动设备识别码 IMEI和设备认证数据; 将所述 IMEI、 所述 用户设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证 数据通过更新位置请求发送给所述 HSS/ HLR;
所述 HSS/HLR设置为: 接收到所述更新位置请求后, 进行如下检测: 检 测所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对 , 和 /或 , 根据所述 IMEI对 应的设备根密钥检测所述设备认证数据, 判断所述 IMEI是否合法。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR还设置为: 将检测 结果通过更新位置响应发送给所述核心网节点;
所述核心网节点还用于, 根据所述检测结果决定接受或者拒绝所述用户 设备的附着请求。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR还设置为: 本地配 置 IMSI的授权 IMEI列表,根据本地配置的 IMSI的授权 IMEI列表判断所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR是设置为: 根据所 述 IMEI对应的设备根密钥检测所述设备认证数据包括:
直接根据所述 IMEI对应的设备根密钥检测所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥检测所述设备认证数据。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR是设置为: 根据如 下方式生成所述下级密钥:
所述 HSS/HLR使用与所述 IMEI对应的设备根密钥、计数器 COUNT值、 月良务网点标识作为输入, 生成所述下级密钥;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数;
所述 ^良务网点标识为当前为所述用户设备 Λ良务的网点的标识。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR是设置为: 根据所 述下级密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述下级密钥对所述设备认证数据进行解密,得到设 备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,所述 COUNT和所述下级密钥作为设备 响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
优选地, 上述系统还可具有以下特点, 所述 HSS/HLR是设置为: 直接根 据所述 IMEI对应的设备根密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述设备根密钥对所述设备认证数据进行解密,得到 设备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,计数器 COUNT值和所述设备根密钥作 为设备响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
本发明一种检测 UICC是否在授权设备上使用的方法, 包括:
用户设备向核心网节点发送附着请求,与所述核心网节点建立安全连接; 所述用户设备接收到所述核心网节点的标识请求消息后, 根据所述用户 设备的国际移动设备识别码 IMEI对应的设备根密钥生成设备认证数据,将所 述 IMEI和所述设备认证数据通过标识响应消息发送给所述核心网节点。
优选地, 上述方法还可具有以下特点, 所述用户设备根据所述用户设备 的 IMEI对应的设备根密钥生成设备认证数据包括:
所述用户设备直接根据所述 IMEI对应的设备根密钥生成所述设备认证 数据;
或者,所述用户设备根据所述 IMEI对应的设备根密钥生成下级密钥,根 据所述下级密钥生成所述设备认证数据。
优选地, 上述方法还可具有以下特点, 所述用户设备根据所述设备根密 钥生成下级密钥包括:
所述用户设备使用所述设备根密钥、 计数器 COUNT值、 服务网点标识 作为输入, 生成所述下级密钥;
其中, 所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个 设备认证数据, 所述 COUNT进行一次计数; 所述服务网点标识为当前为所 述用户设备服务的网点的标识。
优选地, 上述方法还可具有以下特点, 所述用户设备根据所述下级密钥 生成设备认证数据包括:
所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND、 所述 COUNT值和所述下级密钥为 设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述下级密钥对所述 RES和 RAND进行加密,生成所 述设备认证数据。
优选地, 上述方法还可具有以下特点, 所述用户设备直接根据所述 IMEI 对应的设备根密钥生成所述设备认证数据包括:
所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND, 计数器 COUNT值和所述设备根密 钥作为设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述设备根密钥对所述 RES和 RAND进行加密,生成 所述设备认证数据;
所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个设备认 证数据, 所述 COUNT进行一次计数。
优选地, 上述方法还可具有以下特点, 所述设备根密钥保存在所述用户 设备的安全组件中, 且禁止将所述设备根密钥读出所述安全组件。
本发明还提供一种用户设备, 包括:
附着单元, 其设置为: 向核心网节点发送附着请求, 与所述核心网节点 建立安全连接;
设备认证数据生成单元, 其设置为: 接收到所述核心网节点的标识请求 消息后,根据所述用户设备的国际移动设备识别码 IMEI对应的设备根密钥生 成设备认证数据;
发送单元,其设置为: 将所述 IMEI和所述设备认证数据通过标识响应消 息发送给所述核心网节点。
优选地, 上述用户设备还可具有以下特点, 所述设备认证数据生成单元 是设置为:根据所述用户设备的 IMEI对应的设备根密钥生成设备认证数据包 括:
直接根据所述 IMEI对应的设备根密钥生成所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥生成所述设备认证数据。
优选地, 上述用户设备还可具有以下特点, 所述用户设备还包括计数器
COUNT, 设置为: 与网络侧的计数器同步, 当所述设备认证数据生成单元每 产生一个设备认证数据, 进行一次计数; 所述设备认证数据生成单元是设置为: 根据所述设备根密钥生成下级密 钥包括:
使用所述设备根密钥、 计数器 COUNT值、 服务网点标识作为输入, 生 成所述下级密钥;
所述 ^良务网点标识为当前为所述用户设备 Λ良务的网点的标识。
优选地, 上述用户设备还可具有以下特点, 所述设备认证数据生成单元 是设置为: 根据所述下级密钥生成设备认证数据包括:
生成随机数 RAND;
以所述随机数 RAND、 所述 COUNT值和所述下级密钥为设备响应生成 函数的输入, 生成设备响应 RES;
使用所述下级密钥对所述 RES和 RAND进行加密,生成所述设备认证数 据。
优选地, 上述用户设备还可具有以下特点, 所述用户设备还包括计数器 COUNT, 设置为: 与网络侧的计数器同步, 所述设备认证数据生成单元每产 生一个设备认证数据, 进行一次计数;
所述设备认证数据生成单元是设置为:直接根据所述 IMEI对应的设备根 密钥生成所述设备认证数据包括:
生成随机数 RAND;
以所述随机数 RAND, 计数器 COUNT值和所述设备根密钥作为设备响 应生成函数的输入, 生成设备响应 RES;
使用所述设备根密钥对所述 RES和 RAND进行加密,生成所述设备认证 数据。
优选地, 上述用户设备还可具有以下特点, 所述用户设备还包括安全组 件, 设置为: 存储所述设备根密钥, 且禁止将所述设备根密钥读出所述安全 组件。
本发明实施例提供了一种检测 UICC是否在授权设备上使用的方法、 系 统和用户设备, 在不改变附着过程流程和现今安全架构的基础上, 让核心网 对设备进行认证, 减少了设备认证过程的信令开销; 并且能够让核心网检测
IMSI/IMEI配对是否被授权,使得核心网能够保证特定的 UICC只能够在特定 的设备中使用。 附图概述
图 1描述的是一种进行设备认证并且验证 IMSI/IMEI对是否授权的实施 例;
图 2描述的是如何在附着过程中实施该设备认证和验证 IMSI/IMEI对是 否授权的实施例;
图 3是本发明实施例用户设备框图。
本发明的较佳实施方式
为使本发明的目的、 技术方案和优点更加清楚明白, 下文中将结合附图 对本发明的实施例进行详细说明。 需要说明的是, 在不冲突的情况下, 本申 请中的实施例及实施例中的特征可以相互任意组合。
要使核心网能够执行设备认证, 需要一个通信双方都保有的根密钥 device— root— key。 所述 device— root— key和设备的 IMEI相对应。 在核心网端, 该 device— root— key保存在 HSS/HLR中; 在 UE端, 该 device— root— key保存在 设备中。 在设备上, 需要有一个安全组件保存该 device— root— key, 所有与该 device— root— key相关的加解密操作和其他运算都要在这个安全组件中进行。 所述 device— root— key禁止被读出该安全组件。
本发明实施例提供的一种检测 UICC是否在授权设备上使用的方法, 包 括:
核心网节点接收到用户设备的附着请求后, 与所述用户设备建立安全连 接;
所述核心网节点向所述用户设备发送标识请求消息, 接收所述用户设备 返回的国际移动设备识别码 IMEI和设备认证数据, 将所述 IMEI、 所述用户 设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证数据 通过更新位置请求发送给归属用户服务器 HSS/归属位置寄存器 HLR;
所述 HSS/HLR进行如下检测: 检测所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对 ,和 /或 ,根据所述 IMEI对应的设备根密钥检测所述设备认证数 据, 判断所述 IMEI是否合法。
其中, 所述方法还包括,
所述 HSS/HLR将检测结果通过更新位置响应发送给所述核心网节点; 所述核心网节点根据所述检测结果决定接受或者拒绝所述用户设备的附 着请求。
其中, 所述方法还包括, 所述 HSS/HLR本地配置 IMSI的授权 IMEI列 表,所述 HSS/HLR根据所述本地配置的 IMSI的授权 IMEI列表判断所述 IMEI 和 IMSI是否为 4受权的 IMEI/IMSI对。
其中, 所述根据所述 IMEI对应的设备根密钥检测所述设备认证数据包 括:
直接根据所述 IMEI对应的设备根密钥检测所述设备认证数据; 或者, 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥检测所述设备认证数据。
其中, 所述下级密钥才艮据如下方式生成:
所述 HSS/HLR使用与所述 IMEI对应的设备根密钥、计数器 COUNT值、 月良务网点标识作为输入, 生成所述下级密钥;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
上述生成下级密钥的方法仅为示例, 可以使用其他方式生成下级密钥, 比如, 将生成的下级密钥再次作为密钥生成函数的输入, 将新生成的密钥作 为下级密钥, 等等, 本发明对此不作限定。
其中, 所述 HSS/HLR根据所述下级密钥检测所述设备认证数据包括: 所述 HSS/HLR使用所述下级密钥对所述设备认证数据进行解密,得到设 备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,所述 COUNT和所述下级密钥作为设备 响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
其中, 所述 HSS/HLR直接根据所述 IMEI对应的设备根密钥检测所述设 备认证数据包括:
所述 HSS/HLR使用所述设备根密钥对所述设备认证数据进行解密,得到 设备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,计数器 COUNT值和所述设备根密钥作 为设备响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
本发明实施例还提供一种检测 UICC是否在授权设备上使用的方法, 包 括:
用户设备向核心网节点发送附着请求,与所述核心网节点建立安全连接; 所述用户设备接收到所述核心网节点的标识请求消息后, 根据所述用户 设备的国际移动设备识别码 IMEI对应的设备根密钥生成设备认证数据,将所 述 IMEI和所述设备认证数据通过标识响应消息发送给所述核心网节点。
其中,所述用户设备根据所述用户设备的 IMEI对应的设备根密钥生成设 备认证数据包括:
所述用户设备直接根据所述 IMEI对应的设备根密钥生成所述设备认证 数据;
或者,所述用户设备根据所述 IMEI对应的设备根密钥生成下级密钥,根 据所述下级密钥生成所述设备认证数据。
其中, 所述用户设备根据所述设备根密钥生成下级密钥包括:
所述用户设备使用所述设备根密钥、 计数器 COUNT值、 服务网点标识 作为输入, 生成所述下级密钥;
其中, 所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个 设备认证数据, 所述 COUNT进行一次计数; 所述服务网点标识为当前为所 述用户设备服务的网点的标识。
其中, 所述用户设备根据所述下级密钥生成设备认证数据包括: 所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND、 所述 COUNT值和所述下级密钥为 设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述下级密钥对所述 RES和 RAND进行加密,生成所 述设备认证数据。
其中,所述用户设备直接根据所述 IMEI对应的设备根密钥生成所述设备 认证数据包括:
所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND, 计数器 COUNT值和所述设备根密 钥作为设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述设备根密钥对所述 RES和 RAND进行加密,生成 所述设备认证数据;
所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个设备认 证数据, 所述 COUNT进行一次计数。
其中, 所述设备根密钥保存在所述用户设备的安全组件中, 且禁止将所 述设备根密钥读出所述安全组件。
下述实施例中将下一级密钥作为下级密钥对本发明进行说明。
本发明实施例提供的检测 UICC是否在授权设备上使用的方法包括: 步骤 1 , HSS/HLR中预先为每个 IMSI配置了一组授权的 IMEI列表。 步骤 2 , UE在向核心网节点 CN (Core Network Node)发送了附着请求后, 与核心网进行标准的 AKA过程。 CNN为核心网节点, 例如 UTRAN/GERAN 中的 SGSN, 或 E-UTRAN中的 MME。 在标准的 AKA过程之后, UE和核心 网节点之间的安全连接已建立, 以下 UE和 CN 之间的所有信令交互都由当 前安全上下文所保护。 CN 向 UE发送 "标识请求" , 请求 UE的设备标识, 并请求设备认证数据。
步骤 3 , UE在接收到 CNN发来的 "标识请求" 消息后, 将产生设备认 证数据 (Device— authentication— data), 并将设备认证数据和 IMEI—同在 "标识 响应" 消息中发送给 CN 。 所述设备认证数据由设备产生, 而不是由 UICC 产生。
步骤 4, CNN在 "更新位置请求" 中将 IMSI/IMEI对和设备认证数据转 发给 HSS/HLR。
步骤 5, HSS/HLR对该设备认证数据进行检测, 以此判断 UE发送过来 的 IMEI是否合法, 即 HSS/HLR进行设备认证。
步骤 6, 如果 HSS/HLR检测到所述 IMEI是合法的, HSS进一步检测 IMSI/IMEI对是否为授权的 IMSI/IMEI对。
步骤 7, HSS/HLR在 "更新位置响应" 中将步骤 4和步骤 5中的检测结 果告知 CN 。
步骤 8, CN 根据 HSS/HLR告知的检测结果, 决定是接受 UE的附着请 求或者拒绝 UE的附着请求。
以上步骤 5和步骤 6所述的 HSS/HLR的检测顺序可以对调,即 HSS/HLR 可以先检测 IMSI/IMEI对是否为授权的 IMSI/IMEI对,再检测所述 IMEI是否 合法。 所述的这两个步骤中, 只要其中一个步骤检测不通过, HSS/HLR则告 知 CNN拒绝所述 UE的附着请求。
以上所述步骤 3中的 UE生成设备认证数据和步骤 5中的 HSS/HLR对设 备认证数据进行检测, 其主要目的是 UE通过某种方式向 HSS/HLR表明自己 是持有与所述 IMEI对应的 device— root— key的 UE。 HSS/HLR判断设备是否合 法的方式, 就是判断该设备是否持有与其 IMEI对应的 device— root— key。
UE由设备和 UICC组成。 设备认证数据是由设备生成, 而不是由 UICC 步骤 3A, UE产生一个随机数 RAND。 步骤 3B, UE使用 device— root— key、 COUNT, SN id (服务网点 id)作为输 入, 生成下一级密钥 next— key。 生成下一级密钥的方法和 EPS AKA过程中 UE使用根密钥 K生成下一级密钥 KASME的方式相同, 只是输入参数有所 不同。 当然, next— key也可以直接使用 device— root— key替换。
next— key = KDF(device— root— key, COUNT, SN id)。
COUNT为 UE和 HSS/HLR都保有的计数器,在 UE和 HSS/HLR之间保 持同步,用于防止重放攻击。 UE每产生一个设备认证数据, UE端的 COUNT 便会进行一次计数, 每次计数可以加 1 , 也可以加一指定值; HSS/HLR每验 证一次设备认证数据, HSS/HLR端的 COUNT便会进行一次计数, 比如, 加 1。
SN id是当前正在为所述 UE服务的网点标识。 所述 SN id是 UE端和 HSS/HLR端都已知的信息。
步骤 3C, UE以 RAND、 COUNT和 next— key作为设备响应生成函数的 输入, 产生设备响应 RES。
RES =设备响应生成函数 (RAND ,C0U T, next— key)。
设备响应生成函数为单向函数, 所述设备响应生成函数要能够保证不可 逆推, 即让攻击者即便知道了 RES、 RAND, COUNT三个数据, 也不能够推 导出 next— key。
步骤 3D , UE 产生设备认证数据: Device— authentication— data = Enext key(RES||RAND)。 即设备认证数据为 RES||RAND被 next_key进行加 密后的数据。
其中, HSS/HLR检测设备认证数据的方法和终端侧产生设备认证数据的 方法相对应, HSS/HLR检测设备认证数据的一种方式如下, 但不限定于以下 方式:
步骤 5A, HSS/HLR根据所述 IMEI, 查询到该设备的 device— root— key。 步骤 5B, HSS/HLR使用 device— root— key、 COUNT, SN id (服务网点 id) 作为输入, 生成下一级密钥 next— key。
COUNT是在 UE端和 HSS/HLR端保持同步的数据。 SN id是 UE端和 HSS/HLR 端都已知的数据。 生成下一级密钥的方法和 EPS AKA过程中 HSS/HLR使用根密钥 K生成下一级密钥 KASME的方式相同,只是输入参数 有所不同。
next— key = KDF(device— root— key, COUNT, SN id)。
步骤 5C, HSS/HLR使用 next— key将设备认证数据解密,得到 RES||RAND。 步骤 5D, HSS/HLR使用接收到的 RAND, 并使用 COUNT和 next— key 作为设备响应生成函数的输入, 得到期望设备响应 XRES。
XRES =设备响应生成函数 (RAND ,COU T, next— key)。
步骤 5E, HSS/HLR将接收到的 RES和自己生成的 XRES进行比较。 如 果相同, 则说明所述 IMEI合法; 如果不同, 则说明所述 IMEI不合法。
如图 1所述, 本发明描述了一种进行设备认证并且验证 IMSI/IMEI对是 否授权的实施例。
步骤 101 , HSS/HLR中为每一个 IMSI都预先定义了一组授权的 IMEI列 表。 IMSI为保存在 UICC里面的全球唯一的签约用户标识, IMEI为保存在设 备中的全球唯一的设备标识。 HSS/HLR通过查询所述 IMEI是否存在于所述 IMSI 的授权 IMEI 列表中, 便可知道所述 IMSI/IMEI 对是否为授权的 IMSI/IMEI对,从而判断与所述 IMSI所对应的 UICC是否授权在与所述 IMEI 所对应的设备中使用。
步骤 102, UE向 CN 发起附着请求, 请求与网络建立连接。 然后 UE 和网络会进行标准的 AKA过程, 进行相互的认证, 并且建立起安全连接,安 全连接建立后,所有的 CNN和 UE之间的信令交互都会被当前安全上下文所 保护。 安全连接建立以后, CNN向 UE请求设备标识 IMEI和设备认证数据。
步骤 103 , UE在接收到 CNN发出的请求设备标识和设备认证数据的消 息后, 将产生设备认证数据。 产生设备认证数据的过程如下:
A、 UE产生一个随机数 RAND。
B、 UE使用 device— root— key、 COUNT、 SN id (服务网点 id)作为输入, 生 成下一级密钥 next— key。 生成下一级密钥的方法和 EPS AKA过程中 UE使用 根密钥 K生成下一级密钥 KASME的方式相同, 只是输入参数有所不同。 next— key = KDF(device— root— key, COUNT, SN id)。
COUNT为 UE和 HSS/HLR都保有的计数器,在 UE和 HSS/HLR之间保 持同步,用于防止重放攻击。 UE每产生一个设备认证数据, UE端的 COUNT 便会加 1 ; HSS/HLR每验证一次设备认证数据, HSS/HLR端的 COUNT便会 加 1。
SN id是当前正在为所述 UE服务的网点标识。 所述 SN id是 UE端和 HSS/HLR端都已知的信息。
C、 UE以 RAND、 COUNT和 next— key作为设备响应生成函数的输入, 产生设备响应 RES。
RES =设备响应生成函数 (RAND ,COU T, next— key)。
设备响应生成函数为单向函数, 所述设备响应生成函数要能够保证不可 逆推, 即让攻击者即便知道了 RES、 RAND, COUNT三个数据, 也不能够推 导出 next— key。
D 、 UE 产 生 设备认证数据 : Device— authentication— data = Enext key(RES||RAND)。 即设备认证数据为 RES||RAND被 next_key进行加 密后的数据。
UE在产生了设备认证数据后, 将设备认证数据和设备标识 IMEI—同发 送给 CN 。
步骤 104, CN 在接收到 UE发过来的 IMEI和设备认证数据后, 将 IMSI/IMEI对和设备认证数据转发给 HSS/HLR, 要求 HSS/HLR验证 IMEI是 否合法, 并且验证 IMSI/IMEI对是否被授权。
步骤 105, HSS/HLR在接收到设备认证数据和 IMSI/IMEI对后, 首先验 证 IMEI是否合法。 验证 IMEI是否合法的方式是验证设备认证数据, 其验证 方法如下所述:
A、 HSS/HLR根据所述 IMEI, 查询到该设备的 device— root— key。
B、 HSS/HLR使用 device— root— key、 COUNT, SN id (服务网点 id)作为输 入, 生成下一级密钥 next— key。
COUNT是在 UE端和 HSS/HLR端保持同步的数据。 SN id是 UE端和 HSS/HLR 端都已知的数据。 生成下一级密钥的方法和 EPS AKA过程中 HSS/HLR使用根密钥 K生成下一级密钥 KASME的方式相同,只是输入参数 有所不同。
next— key = KDF(device— root— key, COUNT, SN id)。
C、 HSS/HLR使用 next— key将设备认证数据解密, 得到 RES||RAND。
D、 HSS/HLR使用接收到的 RAND , 并使用 COUNT和 next— key作为设 备响应生成函数的输入, 得到期望设备响应 XRES。
XRES =设备响应生成函数 (RAND ,COU T, next— key)。
E、 HSS/HLR将接收到的 RES和自己生成的 XRES进行比较。如果相同, 则说明所述 IMEI合法; 如果不同, 则说明所述 IMEI不合法。
步骤 106, 如果步骤 105验证得出所述 IMEI是合法的, 则进行此步。 HSS/HLR将进一步验证 IMSI/IMEI对是否被授权。 HSS/HLR通过查询所述 IMEI是否存在于所述 IMSI的授权 IMEI列表中, 便可知道所述 IMSI/IMEI 对是否为授权的 IMSI/IMEI对。
步骤 107 , HSS/HLR将步骤 105和步骤 106的检测结果告知 CNN。
步骤 108, CN 根据 HSS/HLR告知的检测结果决定接受附着请求或拒绝 附着请求。 如果验证 IMEI是非法的, CNN则拒绝附着请求, 并告知拒绝附 着请求的原因是设备认证不合格;如果 IMEI合法但是 IMSI/IMEI对未被授权, CN 同样拒绝附着请求, 并告知拒绝附着请求的原因是 IMSI/IMEI对未被授 权; 如果 IMEI合法并且 IMSI/IMEI对是被授权的 IMSI/IMEI对, CN 则接 受附着请求。
图 2描述的是如何在附着过程中实施该设备认证和验证 IMSI/IMEI对是 否授权的实施例。
步骤 201 , HSS/HLR中为每一个 IMSI都预先定义了一组授权的 IMEI列 表。 IMSI为保存在 UICC里面的全球唯一的签约用户标识, IMEI为保存在设 备中的全球唯一的设备标识。 HSS/HLR通过查询所述 IMEI是否存在于所述 IMSI 的授权 IMEI 列表中, 便可知道所述 IMSI/IMEI 对是否为授权的 IMSI/IMEI对,从而判断与所述 IMSI所对应的 UICC是否授权在与所述 IMEI 所对应的设备中使用。
步骤 202, UE向 CNN发送附着请求消息, 发起网络附着过程, 消息中 包含 IMSI或临时用户身份标志等信息。
步骤 203 , 如果 UE向 CNN发送的是临时用户身份标志, CN 要通过此 临时用户身份标志查询或请求到该用户的 IMSI。
如果网络中没有保存 UE的上下文, 或者如果附着请求没有得到完整性 保护, 或者完整性检查失败, 则 CNN使用该 IMSI向 HSS/HLR请求鉴权向 量。
步骤 204 ,如果 CNN向 HSS/HLR请求了鉴权向量, HSS/HLR则根据 IMSI 查询到与该 IMSI对应的根密钥,并产生鉴权向量,并向 CNN响应鉴权向量。
步骤 205, 如步骤 203中所述, 如果网络中没有保存 UE的上下文, 或者 如果附着请求没有得到完整性保护, 或者完整性检查失败, UE和 CNN则要 进行标准的 AKA过程, 并且建立起安全连接。 安全连接建立以后, 以下所有 的信令都要被当前安全上下文所保护。
步骤 206, CN 向 UE发送标识请求, 请求该 UE的设备标识, 并在该 消息中请求 UE发送设备认证数据。
UE在收到来自于 CNN的标识请求消息后, 将生成设备认证数据。 产生 设备认证数据的过程如下:
A、 UE产生一个随机数 RAND。
B、 UE使用 device— root— key、 COUNT、 SN id (服务网点 id)作为输入, 生 成下一级密钥 next— key。 生成下一级密钥的方法和 EPS AKA过程中 UE使用 根密钥 K生成下一级密钥 KASME的方式相同, 只是输入参数有所不同。
next— key = KDF(device— root— key, COUNT, SN id)。
COUNT为 UE和 HSS/HLR都保有的计数器,在 UE和 HSS/HLR之间保 持同步,用于防止重放攻击。 UE每产生一个设备认证数据, UE端的 COUNT 便会加 1 ; HSS/HLR每验证一次设备认证数据, HSS/HLR端的 COUNT便会 加 1。
SN id是当前正在为所述 UE服务的网点标识。 所述 SN id是 UE端和 HSS/HLR端都已知的信息。
C、 UE以 RAND、 COUNT和 next— key作为设备响应生成函数的输入, 产生设备响应 RES。
RES =设备响应生成函数 (RAND ,COU T, next— key)。
设备响应生成函数为单向函数, 所述设备响应生成函数要能够保证不可 逆推, 即让攻击者即便知道了 RES、 RAND, COUNT三个数据, 也不能够推 导出 next— key。
D 、 UE 产 生 设备认证数据 : Device— authentication— data =
Enext keyCRESIIRAN0)- 即设备认证数据为 RES||RAND被 next_key进行力。 密后的数据。
步骤 207 , UE给 CNN发送标识响应消息,消息中附带所述设备的 IMEI, 并附带产生的设备认证数据。
步骤 208 , CN 在更新位置请求消息中, 将所述 IMSI/IMEI对和所述设 备认证数据转发给 HSS/HLR。
步骤 209, HSS/HLR在接收到设备认证数据和 IMSI/IMEI对后, 首先验 证 IMEI是否合法。 验证 IMEI是否合法的方式是验证设备认证数据, 其验证 方法如下所述:
A、 HSS/HLR根据所述 IMEI, 查询到该设备的 device— root— key。
B、 HSS/HLR使用 device— root— key、 COUNT, SN id (服务网点 id)作为输 入, 生成下一级密钥 next— key。
COUNT是在 UE端和 HSS/HLR端保持同步的数据。 SN id是 UE端和 HSS/HLR 端都已知的数据。 生成下一级密钥的方法和 EPS AKA过程中 HSS/HLR使用根密钥 K生成下一级密钥 KASME的方式相同,只是输入参数 有所不同。
next— key = KDF(device— root— key, COUNT, SN id)。
C、 HSS/HLR使用 next— key将设备认证数据解密, 得到 RES||RAND。
D、 HSS/HLR使用接收到的 RAND , 并使用 COUNT和 next— key作为设 备响应生成函数的输入, 得到期望设备响应 XRES。
XRES =设备响应生成函数 (RAND ,COU T, next— key)。
E、 HSS/HLR将接收到的 RES和自己生成的 XRES进行比较。如果相同, 则说明所述 IMEI合法; 如果不同, 则说明所述 IMEI不合法。
步骤 210, 如果步骤 209验证得出所述 IMEI是合法的, 则进行此步。
HSS/HLR将进一步验证 IMSI/IMEI对是否被授权。 HSS/HLR通过查询所述 IMEI是否存在于所述 IMSI的授权 IMEI列表中, 便可知道所述 IMSI/IMEI 对是否为授权的 IMSI/IMEI对。
步骤 211 , HSS/HLR在更新位置响应中将步骤 209和步骤 210的检测结 果告知 CN 。
步骤 212, CN 根据 HSS/HLR告知的检测结果决定接受附着请求或拒绝 附着请求。 如果验证 IMEI是非法的, CNN则拒绝附着请求, 并告知拒绝附 着请求的原因是设备认证不合格;如果 IMEI合法但是 IMSI/IMEI对未被授权, CN 同样拒绝附着请求, 并告知拒绝附着请求的原因是 IMSI/IMEI对未被授 权; 如果 IMEI合法并且 IMSI/IMEI对是被授权的 IMSI/IMEI对, CN 则接 受附着请求。 本发明实施例还提供一种检测 UICC是否在授权设备上使用的系统, 包 括: 核心网节点, 归属用户服务器 HSS/归属位置寄存器 HLR, 其中:
所述核心网节点用于, 接收到用户设备的附着请求后, 与所述用户设备 建立安全连接; 以及, 向所述用户设备发送标识请求消息, 接收所述用户设 备返回的国际移动设备识别码 IMEI和设备认证数据; 将所述 IMEI、 所述用 户设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证数 据通过更新位置请求发送给所述 HSS/ HLR;
所述 HSS/HLR用于, 接收到所述更新位置请求后, 进行如下检测: 检测 所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对, 和 /或, 根据所述 IMEI对应 的设备根密钥检测所述设备认证数据, 判断所述 IMEI是否合法。
核心网节点和 HSS/HLR的具体功能参见方法实施例。 本发明实施例还提供一种用户设备, 如图 3所示, 包括: 附着单元, 用于向核心网节点发送附着请求, 与所述核心网节点建立安 全连接;
设备认证数据生成单元,用于接收到所述核心网节点的标识请求消息后, 根据所述用户设备的国际移动设备识别码 IMEI对应的设备根密钥生成设备 认证数据
发送单元,用于将所述 IMEI和所述设备认证数据通过标识响应消息发送 给所述核心网节点。
其中,所述设备认证数据生成单元根据所述用户设备的 IMEI对应的设备 根密钥生成设备认证数据包括:
直接根据所述 IMEI对应的设备根密钥生成所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥生成所述设备认证数据。
其中, 所述用户设备还包括计数器 COUNT, 与网络侧的计数器同步, 用于: 当所述设备认证数据生成单元每产生一个设备认证数据, 进行一次计 数;
所述设备认证数据生成单元根据所述设备根密钥生成下级密钥包括: 使用所述设备根密钥、 计数器 COUNT值、 服务网点标识作为输入, 生 成所述下级密钥;
所述 ^良务网点标识为当前为所述用户设备 Λ良务的网点的标识。
其中, 所述设备认证数据生成单元根据所述下级密钥生成设备认证数据 包括:
生成随机数 RAND;
以所述随机数 RAND、 所述 COUNT值和所述下级密钥为设备响应生成 函数的输入, 生成设备响应 RES;
使用所述下级密钥对所述 RES和 RAND进行加密,生成所述设备认证数 据。
其中,所述设备认证数据生成单元直接根据所述 IMEI对应的设备根密钥 生成所述设备认证数据包括:
生成随机数 RAND;
以所述随机数 RAND, 计数器 COUNT值和所述设备根密钥作为设备响 应生成函数的输入, 生成设备响应 RES;
使用所述设备根密钥对所述 RES和 RAND进行加密,生成所述设备认证 数据。
其中, 所述用户设备还包括安全组件, 用于存储所述设备根密钥, 且禁 止将所述设备根密钥读出所述安全组件。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
工业实用性 本发明实施例提供了一种检测 UICC是否在授权设备上使用的方法、 系 统和用户设备, 在不改变附着过程流程和现今安全架构的基础上, 让核心网 对设备进行认证, 减少了设备认证过程的信令开销; 并且能够让核心网检测 IMSI/IMEI配对是否被授权,使得核心网能够保证特定的 UICC只能够在特定 的设备中使用。

Claims

权 利 要 求 书
1、一种检测通用集成电路卡 UICC是否在授权设备上使用的方法,包括: 核心网节点接收到用户设备的附着请求后, 与所述用户设备建立安全连 接;
所述核心网节点向所述用户设备发送标识请求消息, 接收所述用户设备 返回的国际移动设备识别码 IMEI和设备认证数据, 将所述 IMEI、 所述用户 设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证数据 通过更新位置请求发送给归属用户服务器 HSS/归属位置寄存器 HLR;
所述 HSS/HLR进行如下检测: 检测所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对 ,和 /或 ,根据所述 IMEI对应的设备根密钥检测所述设备认证数 据, 判断所述 IMEI是否合法。
2、 如权利要求 1所述的方法, 其中, 所述方法还包括,
所述 HSS/HLR将检测结果通过更新位置响应发送给所述核心网节点; 所述核心网节点根据所述检测结果决定接受或者拒绝所述用户设备的附 着请求。
3、 如权利要求 1所述的方法, 其中, 所述方法还包括, 所述 HSS/HLR 本地配置 IMSI的授权 IMEI列表, 所述 HSS/HLR根据所述本地配置的 IMSI 的授权 IMEI列表判断所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对。
4、 如权利要求 1所述的方法, 其中, 所述根据所述 IMEI对应的设备根 密钥检测所述设备认证数据包括:
直接根据所述 IMEI对应的设备根密钥检测所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥检测所述设备认证数据。
5、 如权利要去 4所述的方法, 其中, 所述下级密钥根据如下方式生成: 所述 HSS/HLR使用与所述 IMEI对应的设备根密钥、计数器 COUNT值、 月良务网点标识作为输入, 生成所述下级密钥;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
6、 如权利要求 5所述的方法, 其中, 所述 HSS/HLR根据所述下级密钥 检测所述设备认证数据包括:
所述 HSS/HLR使用所述下级密钥对所述设备认证数据进行解密,得到设 备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,所述 COUNT和所述下级密钥作为设备 响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
7、 如权利要求 4所述的方法, 其中, 所述 HSS/HLR直接根据所述 IMEI 对应的设备根密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述设备根密钥对所述设备认证数据进行解密,得到 设备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,计数器 COUNT值和所述设备根密钥作 为设备响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
8、一种检测通用集成电路卡 UICC是否在授权设备上使用的系统,包括: 核心网节点, 归属用户服务器 HSS/归属位置寄存器 HLR, 其中:
所述核心网节点设置为: 接收到用户设备的附着请求后, 与所述用户设 备建立安全连接; 以及, 向所述用户设备发送标识请求消息, 接收所述用户 设备返回的国际移动设备识别码 IMEI和设备认证数据; 将所述 IMEI、 所述 用户设备上的通用集成电路卡的国际移动用户识别码 IMSI和所述设备认证 数据通过更新位置请求发送给所述 HSS/ HLR; 所述 HSS/HLR设置为: 接收到所述更新位置请求后, 进行如下检测: 检 测所述 IMEI和 IMSI是否为授权的 IMEI/IMSI对 , 和 /或 , 根据所述 IMEI对 应的设备根密钥检测所述设备认证数据, 判断所述 IMEI是否合法。
9、 如权利要求 8所述的系统, 其中,
所述 HSS/HLR还设置为:将检测结果通过更新位置响应发送给所述核心 网节点;
所述核心网节点还设置为: 根据所述检测结果决定接受或者拒绝所述用 户设备的附着请求。
10、 如权利要求 8所述的系统, 其中, 所述 HSS/HLR还设置为: 本地配 置 IMSI的授权 IMEI列表,根据本地配置的 IMSI的授权 IMEI列表判断所述
IMEI和 IMSI是否为 4受权的 IMEI/IMSI对。
11、 如权利要求 8所述的系统, 其中, 所述 HSS/HLR是设置为: 根据所 述 IMEI对应的设备根密钥检测所述设备认证数据包括:
直接根据所述 IMEI对应的设备根密钥检测所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥检测所述设备认证数据。
12、 如权利要去 11所述的系统, 其中, 所述 HSS/HLR是设置为: 根据 如下方式生成所述下级密钥:
所述 HSS/HLR使用与所述 IMEI对应的设备根密钥、计数器 COUNT值、 月良务网点标识作为输入, 生成所述下级密钥;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数;
所述 ^良务网点标识为当前为所述用户设备 Λ良务的网点的标识。
13、 如权利要求 12所述的系统, 其中, 所述 HSS/HLR是设置为: 根据 所述下级密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述下级密钥对所述设备认证数据进行解密,得到设 备响应 RES和随机数 RAND; 所述 HSS/HLR使用所述 RAND,所述 COUNT和所述下级密钥作为设备 响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法。
14、 如权利要求 11所述的系统, 其中, 所述 HSS/HLR是设置为: 直接 根据所述 IMEI对应的设备根密钥检测所述设备认证数据包括:
所述 HSS/HLR使用所述设备根密钥对所述设备认证数据进行解密,得到 设备响应 RES和随机数 RAND;
所述 HSS/HLR使用所述 RAND,计数器 COUNT值和所述设备根密钥作 为设备响应生成函数的输入, 得到期望设备响应 XRES;
所述 HSS/HLR比较所述 XRES和所述 RES,如果二者相同,则所述 IMEI 合法, 否则, 所述 IMEI不合法;
其中, 所述 COUNT与用户设备侧的计数器同步, 所述 HSS/HLR每检测 一次设备认证数据后, 所述 COUNT进行一次计数; 所述服务网点标识为当 前为所述用户设备月良务的网点的标识。
15、 一种检测通用集成电路卡 UICC是否在授权设备上使用的方法, 包 括:
用户设备向核心网节点发送附着请求,与所述核心网节点建立安全连接; 所述用户设备接收到所述核心网节点的标识请求消息后, 根据所述用户 设备的国际移动设备识别码 IMEI对应的设备根密钥生成设备认证数据,将所 述 IMEI和所述设备认证数据通过标识响应消息发送给所述核心网节点。
16、 如权利要求 15所述的方法, 其中, 所述用户设备根据所述用户设备 的 IMEI对应的设备根密钥生成设备认证数据包括:
所述用户设备直接根据所述 IMEI对应的设备根密钥生成所述设备认证 数据;
或者,所述用户设备根据所述 IMEI对应的设备根密钥生成下级密钥,根 据所述下级密钥生成所述设备认证数据。
17、 如权利要求 16所述的方法, 其中, 所述用户设备根据所述设备根密 钥生成下级密钥包括:
所述用户设备使用所述设备根密钥、 计数器 COUNT值、 服务网点标识 作为输入, 生成所述下级密钥;
其中, 所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个 设备认证数据, 所述 COUNT进行一次计数; 所述服务网点标识为当前为所 述用户设备服务的网点的标识。
18、 如权利要求 17所述的方法, 其中, 所述用户设备根据所述下级密钥 生成设备认证数据包括:
所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND、 所述 COUNT值和所述下级密钥为 设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述下级密钥对所述 RES和 RAND进行加密,生成所 述设备认证数据。
19、如权利要求 16所述的方法,其中,所述用户设备直接根据所述 IMEI 对应的设备根密钥生成所述设备认证数据包括:
所述用户设备生成随机数 RAND;
所述用户设备以所述随机数 RAND, 计数器 COUNT值和所述设备根密 钥作为设备响应生成函数的输入, 生成设备响应 RES;
所述用户设备使用所述设备根密钥对所述 RES和 RAND进行加密,生成 所述设备认证数据;
所述 COUNT与网络侧的计数器同步, 所述用户设备每产生一个设备认 证数据, 所述 COUNT进行一次计数。
20、 如权利要求 15至 19任一所述的方法, 其中, 所述设备根密钥保存 在所述用户设备的安全组件中,且禁止将所述设备根密钥读出所述安全组件。
21、 一种用户设备, 包括:
附着单元, 其设置为: 向核心网节点发送附着请求, 与所述核心网节点 建立安全连接;
设备认证数据生成单元, 其设置为: 接收到所述核心网节点的标识请求 消息后,根据所述用户设备的国际移动设备识别码 IMEI对应的设备根密钥生 成设备认证数据;
发送单元,其设置为: 将所述 IMEI和所述设备认证数据通过标识响应消 息发送给所述核心网节点。
22、 如权利要求 21所述的用户设备, 其中, 所述设备认证数据生成单元 是设置为:根据所述用户设备的 IMEI对应的设备根密钥生成设备认证数据包 括:
直接根据所述 IMEI对应的设备根密钥生成所述设备认证数据; 或者,根据所述 IMEI对应的设备根密钥生成下级密钥,根据所述下级密 钥生成所述设备认证数据。
23、 如权利要求 22所述的用户设备, 其中, 所述用户设备还包括计数器 COUNT, 设置为: 与网络侧的计数器同步, 当所述设备认证数据生成单元每 产生一个设备认证数据, 进行一次计数;
所述设备认证数据生成单元是设置为: 根据所述设备根密钥生成下级密 钥包括:
使用所述设备根密钥、 计数器 COUNT值、 服务网点标识作为输入, 生 成所述下级密钥;
所述月良务网点标识为当前为所述用户设备月良务的网点的标识。
24、 如权利要求 23所述的用户设备, 其中, 所述设备认证数据生成单元 是设置为: 根据所述下级密钥生成设备认证数据包括:
生成随机数 RAND;
以所述随机数 RAND、 所述 COUNT值和所述下级密钥为设备响应生成 函数的输入, 生成设备响应 RES;
使用所述下级密钥对所述 RES和 RAND进行加密,生成所述设备认证数 据。
25、 如权利要求 22所述的用户设备, 其中,
所述用户设备还包括计数器 COUNT, 设置为: 与网络侧的计数器同步, 所述设备认证数据生成单元每产生一个设备认证数据, 进行一次计数;
所述设备认证数据生成单元是设置为:直接根据所述 IMEI对应的设备根 密钥生成所述设备认证数据包括:
生成随机数 RAND;
以所述随机数 RAND, 计数器 COUNT值和所述设备根密钥作为设备响 应生成函数的输入, 生成设备响应 RES;
使用所述设备根密钥对所述 RES和 RAND进行加密,生成所述设备认证 数据。
26、 如权利要求 21至 25任一所述的用户设备, 其中, 所述用户设备还 包括安全组件, 设置为: 存储所述设备根密钥, 且禁止将所述设备根密钥读 出所述安全组件。
PCT/CN2012/075294 2012-03-19 2012-05-10 检测uicc是否在授权设备上使用的方法、系统和用户设备 WO2013139071A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210072649.5 2012-03-19
CN201210072649.5A CN102595400B (zh) 2012-03-19 2012-03-19 检测uicc是否在授权设备上使用的方法、系统和用户设备

Publications (1)

Publication Number Publication Date
WO2013139071A1 true WO2013139071A1 (zh) 2013-09-26

Family

ID=46483511

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/075294 WO2013139071A1 (zh) 2012-03-19 2012-05-10 检测uicc是否在授权设备上使用的方法、系统和用户设备

Country Status (2)

Country Link
CN (1) CN102595400B (zh)
WO (1) WO2013139071A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018096311A1 (en) * 2016-11-24 2018-05-31 Trustonic Limited Handset identifier verification
WO2020182285A1 (en) * 2019-03-11 2020-09-17 Telefonaktiebolaget Lm Ericsson (Publ) Wireless device and network node for verification of a device as well as corresponding methods in a wireless communication system

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250B (zh) * 2013-01-30 2017-11-17 华为终端有限公司 配置方法和设备
US10420055B2 (en) * 2015-10-09 2019-09-17 Microsoft Technology Licensing, Llc SIM provisioning of a mobile device
EP3408992A1 (en) * 2016-01-26 2018-12-05 Google LLC Secure connections for low-power devices
CN108632818A (zh) * 2017-03-21 2018-10-09 中兴通讯股份有限公司 移动终端位置更新的方法及装置
CN109714493B (zh) * 2017-10-26 2021-06-18 中国电信股份有限公司 实现机卡池绑定的方法、装置和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951590A (zh) * 2010-09-03 2011-01-19 中兴通讯股份有限公司 认证方法、装置及系统
CN102026180A (zh) * 2009-09-15 2011-04-20 中国移动通信集团公司 M2m传输控制方法、装置及系统
CN102137397A (zh) * 2011-03-10 2011-07-27 西安电子科技大学 机器类型通信中基于共享群密钥的认证方法
CN102196436A (zh) * 2010-03-11 2011-09-21 华为技术有限公司 安全认证方法、装置及系统
CN102595401A (zh) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 一种检测uicc和设备是否配对的方法和系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9385862B2 (en) * 2010-06-16 2016-07-05 Qualcomm Incorporated Method and apparatus for binding subscriber authentication and device authentication in communication systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026180A (zh) * 2009-09-15 2011-04-20 中国移动通信集团公司 M2m传输控制方法、装置及系统
CN102196436A (zh) * 2010-03-11 2011-09-21 华为技术有限公司 安全认证方法、装置及系统
CN101951590A (zh) * 2010-09-03 2011-01-19 中兴通讯股份有限公司 认证方法、装置及系统
CN102137397A (zh) * 2011-03-10 2011-07-27 西安电子科技大学 机器类型通信中基于共享群密钥的认证方法
CN102595401A (zh) * 2012-03-19 2012-07-18 中兴通讯股份有限公司 一种检测uicc和设备是否配对的方法和系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018096311A1 (en) * 2016-11-24 2018-05-31 Trustonic Limited Handset identifier verification
US11228907B2 (en) 2016-11-24 2022-01-18 Trustonic Limited Handset identifier verification
US11882442B2 (en) 2016-11-24 2024-01-23 Trustonic Limited Handset identifier verification
WO2020182285A1 (en) * 2019-03-11 2020-09-17 Telefonaktiebolaget Lm Ericsson (Publ) Wireless device and network node for verification of a device as well as corresponding methods in a wireless communication system

Also Published As

Publication number Publication date
CN102595400B (zh) 2018-08-03
CN102595400A (zh) 2012-07-18

Similar Documents

Publication Publication Date Title
US11825303B2 (en) Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus
US9654284B2 (en) Group based bootstrapping in machine type communication
EP2347613B1 (en) Authentication in a communication network
CN102395130B (zh) 一种lte中鉴权的方法
WO2013139071A1 (zh) 检测uicc是否在授权设备上使用的方法、系统和用户设备
EP2296392A1 (en) Authentication method, re-certification method and communication device
JP2017535998A5 (zh)
US8819765B2 (en) Security policy distribution to communication terminals
CN108880813B (zh) 一种附着流程的实现方法及装置
EP2633716A1 (en) Data processing for securing local resources in a mobile device
KR20130143714A (ko) 보안 요소를 이용하는 원격국의 인증 방법
KR20070112260A (ko) Sim/uicc 키 설정을 위한 네트워크 지원 단말기
US11336445B2 (en) Method for updating a one-time secret key
CN110545252B (zh) 一种认证和信息保护的方法、终端、控制功能实体及应用服务器
WO2011038620A1 (zh) 一种移动通讯网络中的接入认证方法、装置及系统
US20150006898A1 (en) Method For Provisioning Security Credentials In User Equipment For Restrictive Binding
JP7470671B2 (ja) コアネットワークへの非3gpp装置アクセス
US20190246272A1 (en) Method for mutual authentication between user equipment and a communication network
CN106304264B (zh) 一种无线网络接入方法及装置
WO2013139070A1 (zh) 一种检测uicc和设备是否配对的方法和系统
JP7337912B2 (ja) コアネットワークへの非3gppデバイスアクセス
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
AU2015416630A1 (en) Methods and arrangements for authenticating a communication device
EP2389031A1 (en) Secure handoff method and system
CN108282775B (zh) 面向移动专用网络的动态附加认证方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12871647

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12871647

Country of ref document: EP

Kind code of ref document: A1