WO2015058378A1 - 用户设备之间进行安全通信的方法及装置 - Google Patents

用户设备之间进行安全通信的方法及装置 Download PDF

Info

Publication number
WO2015058378A1
WO2015058378A1 PCT/CN2013/085821 CN2013085821W WO2015058378A1 WO 2015058378 A1 WO2015058378 A1 WO 2015058378A1 CN 2013085821 W CN2013085821 W CN 2013085821W WO 2015058378 A1 WO2015058378 A1 WO 2015058378A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
user equipment
communication
certificate
random number
Prior art date
Application number
PCT/CN2013/085821
Other languages
English (en)
French (fr)
Inventor
张冬梅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380003389.9A priority Critical patent/CN104769982B/zh
Priority to PCT/CN2013/085821 priority patent/WO2015058378A1/zh
Priority to CN201910256482.XA priority patent/CN109922080A/zh
Publication of WO2015058378A1 publication Critical patent/WO2015058378A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and apparatus for secure communication between user equipments. Background technique
  • ProSe Proximity Service
  • LTE Long Term Evolution
  • UE User Equipment
  • the UEs When the UEs communicate in the ProSe scenario, they can communicate between the UEs through the network, or directly between the UEs. In any communication scenario, when communicating directly between the UEs, mutual authentication is required to confirm The identity of the peer is authentic, and the key is generated to ensure the security of the communication data.
  • Embodiments of the present invention provide a method and apparatus for performing secure communication between user equipments to improve the security of communication between UEs.
  • the first aspect provides a method for performing secure communication between user equipments, where: the first user equipment and the second user equipment respectively configure a certificate;
  • the first user equipment and the second user equipment perform mutual authentication and negotiate a key based on the certificate, and obtain a first key generated after the certificate is authenticated;
  • the first user equipment and the second user equipment perform key push according to the first key Performing, obtaining an encryption key and a security key;
  • configuring a certificate includes: configuring a certificate locally, or registering a certificate with a certificate authority through a network;
  • the certificate includes: a certificate of the local public land mobile network HPLMN to which the current user equipment belongs, and a root certificate of the local public land mobile network HPLMN to which each target user equipment authenticated with the current user equipment belongs.
  • the two-way authentication and the negotiation key are performed based on the certificate, and the first key generated after the certificate authentication is obtained, Includes:
  • the certificate based on the Internet Key Exchange IKE at the IP layer, mutual authentication is performed, and an IP layer key is negotiated to generate the first key.
  • the two-way authentication and the negotiation key are performed based on the certificate, and the first key generated after the certificate authentication is obtained, Includes:
  • the certificate is carried in the wireless transmission signaling and sent to the peer user equipment, and the certificate is authenticated. After the certificate authentication is passed, the generated communication key is used as the first key, or the peer user equipment is obtained.
  • the transmitted communication key is used as the first key, and the input parameter of the communication key derivation includes a group identification ID and/or a random number, and the group identification ID is an identifier of the communication group to which the user equipment communicates. .
  • the method before the certificate is sent to the peer user equipment in the wireless transmission signaling, the method further includes:
  • the certificate or the identification of the certificate is encrypted using the shared key.
  • the performing a key derivation according to the first key to obtain an encryption key and a security key including: Key derivation is performed according to the first key and the IP address of the current user equipment and/or the IP address of the peer user equipment, to obtain an encryption key and a security key.
  • the second aspect provides a method for performing secure communication between user equipments, including: performing authentication on a peer user equipment that communicates with the current user equipment;
  • the first random number is generated, and the communication key is generated according to the group identifier ID and the first random number, where the group identifier ID is an identifier of the communication group to which the current user equipment communicates with the peer user equipment;
  • the communication data when performing unicast communication between the current user equipment and the opposite user equipment is secured by using the encryption key and/or the security key.
  • the method also includes:
  • the communication data when performing unicast communication between the current user equipment and the opposite user equipment is secured by using the encryption key and/or the security key.
  • the method also includes:
  • the method further includes:
  • the key deriving an encryption key and/or a security key for unicast communication with the current user equipment, and using the derived encryption key and/or the security key, to perform with the current user equipment
  • the communication data during unicast communication is secured.
  • the encryption key and/or the security key are utilized before the communication data in the unicast communication between the current user equipment and the peer user equipment is secured, the method further includes:
  • the encryption key and/or the security key are strongly secreted
  • the decrypted encryption key and/or the secured key are used to secure communication data when performing unicast communication with the current user equipment.
  • the third aspect provides a method for performing secure communication between user equipments, including: performing authentication on a peer user equipment that communicates with the current user equipment;
  • a random sequence is generated, and a multicast key is obtained according to the random sequence.
  • a multicast key is obtained according to the random sequence.
  • an encryption key and/or a multicast communication between the current user equipment and the peer user equipment are determined. Or securing the key, and using the encryption key and/or the security key to secure the communication data when the current user equipment and the peer user equipment perform multicast communication.
  • the method further includes: utilizing Sharing the key or the public key of the peer user equipment, and performing secret authorization on the encryption key and/or the security key; Sending the encrypted encryption key and/or the security key to the peer user equipment, and instructing the peer user equipment to decrypt the encrypted encryption key and/or the secured key, and decrypting The subsequent encryption key and/or the security key securely protect the communication data when performing multicast communication with the current user equipment.
  • the fourth aspect provides a method for performing secure communication between user equipments, including:
  • the communication key sent by the peer user equipment is obtained, where the communication key is a key generated by the peer user equipment according to the group identifier ID and/or the first random number, the group identifier
  • the ID is the identifier of the communication group to which the current user equipment communicates with the peer user equipment;
  • a secure communication device including a configuration unit, an authentication unit, a key generation unit, and a data protection unit, where
  • the configuration unit separately configures a certificate for the first user equipment and the second user equipment, and transmits the configured certificate to the authentication unit;
  • the authentication unit receives the certificate transmitted by the configuration unit, and performs mutual authentication and negotiation of the key between the first user equipment and the second user equipment based on the certificate, and obtains the first generated after the certificate authentication. Decrypting the generated first key to the key generation unit; the key generation unit receiving the first key sent by the authentication unit, and performing key derivation according to the first key Obtaining an encryption key and a security key, and sending the obtained encryption key and the security key to the data protection unit;
  • the data protection unit securely protects communication data between the first user equipment and the second user equipment by using the encryption key and the security key sent by the key generation unit.
  • the configuration unit is specifically configured to: locally configure a certificate, or register a certificate with a certificate authority through a network;
  • the certificate includes: a certificate of the local public land mobile network HPLMN to which the current user equipment belongs, and a root certificate of the local public land mobile network HPLMN to which each target user equipment authenticated with the current user equipment belongs.
  • the authenticating unit is specifically configured to:
  • the certificate based on the Internet Key Exchange IKE at the IP layer, mutual authentication is performed, and an IP layer key is negotiated to generate the first key.
  • the authenticating unit is specifically configured to:
  • the certificate is carried in the wireless transmission signaling and sent to the peer user equipment, and the certificate is authenticated. After the certificate authentication is passed, the generated communication key is used as the first key, or the peer user equipment is obtained.
  • the transmitted communication key is used as the first key, and the input parameter of the communication key derivation includes a group identification ID and/or a random number, and the group identification ID is an identifier of the communication group to which the user equipment communicates. .
  • the authentication unit is further configured to:
  • the certificate or the identification of the certificate is encrypted using the shared key.
  • the key generating unit is specifically configured to:
  • the key derivation is performed according to the first key, the IP address of the current user equipment, and/or the IP address of the peer user equipment, to obtain an encryption key and a security key.
  • a communication device including an authentication unit, a key generation unit, and a data protection unit, where
  • the authentication unit is configured to perform authentication on the peer user equipment that communicates with the current user equipment, and send the information that the authentication passes to the key generation unit after the authentication is passed;
  • the key generation unit generates a first random number when receiving the authentication pass information sent by the authentication unit, and generates a communication key according to the group identifier ID and the first random number, where the group identifier ID is The identifier of the communication group to which the current user equipment communicates with the peer user equipment; and based on the communication key, deducing the encryption key and/or the security when performing unicast communication between the current user equipment and the peer user equipment Key, sending the derived encryption key and/or the secured key to the data protection unit;
  • the data protection unit secures the communication data when the unicast communication between the current user equipment and the opposite user equipment is performed by using the encryption key and/or the security key derived by the key generation unit. protection.
  • the data protection unit is further configured to:
  • the data protection unit is further configured to:
  • the encryption key and/or the security key to secure the communication data when the unicast communication between the current user equipment and the opposite user equipment is performed, using the shared key, the first random Number is encrypted;
  • the key generating unit is further configured to: After the identifier ID and the first random number generate a communication key, the communication key is encrypted by using the shared key or the public key of the peer user equipment; and the encrypted communication key is sent to the peer end And the user equipment, instructing the peer user equipment to derive an encryption key and/or a security key when performing unicast communication with the current user equipment according to the encrypted communication key;
  • the data protection unit is further configured to: use the encryption key and/or the security key derived by the peer user equipment to securely protect communication data when performing unicast communication with the current user equipment.
  • the data protection unit is further configured to:
  • the encryption key and/or the security key are used to secure the communication data during the unicast communication between the current user equipment and the peer user equipment, and use the shared key or the public key of the peer user equipment. Encrypting the encryption key and/or the secured key;
  • the decrypted encryption key and/or the secured key are used to secure communication data when performing unicast communication with the current user equipment.
  • a communication device including an authentication unit, a key generation unit, and a data protection unit, where
  • the authentication unit is configured to authenticate the peer user equipment that communicates with the current user equipment, and send the information of the authentication pass to the key generation unit after the authentication is passed;
  • the key generating unit is configured to: when receiving the information that the authentication unit sends the authentication pass, generate a random sequence, obtain a multicast key according to the random sequence; determine the current user according to the multicast key The encryption key and/or the security key when performing multicast communication between the device and the peer user equipment, and sending the derived encryption key and/or the security key to the data protection unit;
  • the data protection unit using the key generation unit to derive the encryption key and/or Or the security key protects the communication data when the current user equipment and the peer user equipment perform multicast communication.
  • the data protection unit is further configured to:
  • the encryption key and/or Or the security key is encrypted;
  • a communication device including: an authentication unit, a key generation unit, and a data protection unit, where
  • the authentication unit is configured to authenticate the peer user equipment that communicates with the current user equipment, and send the information of the authentication pass to the key generation unit after the authentication is passed;
  • the key generating unit after receiving the authentication pass information sent by the authentication unit, acquires a communication key sent by the peer user equipment, and derives an encryption key and/or a guarantee according to the communication key. Decrypting the obtained encryption key and/or the security key to the data protection unit, where the communication key is generated by the peer user equipment according to the group identification ID and/or the first random number. a key, where the group identifier ID is an identifier of a communication group to which the current user equipment communicates with the peer user equipment;
  • the data protection unit secures the communication data when the unicast communication between the current user equipment and the opposite user equipment is performed by using the encryption key and/or the security key derived by the key generation unit. protection.
  • the method and device for performing secure communication between user equipments provided by the embodiments of the present invention, performing mutual authentication based on a certificate and negotiating a key, performing key deduction according to the first key generated after the certificate authentication, obtaining an encryption key and securing Key, and secure the communication data with the encryption key and the security key Protection, which can protect all communication data in communication between user equipments, and provide security for communication between user equipments.
  • FIG. 1 is a schematic flowchart of an authentication method according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of IKE authentication according to an embodiment of the present invention.
  • FIG. 3 is another schematic diagram of IKE authentication according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of the use of multicast or broadcast communication in the public security field of the ProSe UE;
  • FIG. 5 is a schematic diagram of authentication between the UE and the GO in the embodiment of the present invention.
  • 6A-6B are schematic diagrams showing another authentication between a UE and a GO according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a communication apparatus according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of still another communication apparatus according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a communications controller according to an embodiment of the present invention. detailed description
  • FIG. 1 is a schematic diagram of a process of performing secure communication between UEs in a communication scenario between UEs according to Embodiment 1 of the present invention, including:
  • S101 The first UE and the second UE respectively configure a certificate.
  • the local configuration mode may be used, or the manner of registering the certificate with the certificate authority through the network connection may be used.
  • S102 Acquire a first key generated after the authentication, based on the certificate authentication and the negotiation key.
  • the first UE and the second UE that communicate in the embodiment of the present invention are based on the certificate configured in S101. Perform two-way authentication and negotiate a key, and obtain the first key generated after authentication.
  • S103 Perform key derivation according to the obtained first key to obtain an encryption key and a security key.
  • S104 Secure the communication data by using the encryption key and the security key obtained in S103.
  • the two-way authentication between the UEs is performed based on the certificate, and the key is deduced according to the first key generated after the certificate is authenticated, and the encryption key and the security key are obtained, and the encryption key and the security are used.
  • the key securely protects communication data between the first UE and the second UE, and provides security for communication between devices in a communication scenario in which the UE directly communicates.
  • the ProSe communication scenario is taken as an example.
  • the E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • the certificate authority by using the E-UTRAN (Evolved Universal Terrestrial Radio Access Network) network.
  • the certificate can also be registered in the local configuration mode.
  • the certificate issued by the HPLMN Home Public Land Mobile Network
  • the HPLMN root certificate to which the target UE may be authenticated with the current UE may be configured to implement different security. Certificate authentication between UEs in the domain.
  • the IP layer may perform mutual authentication based on IKE (Internet Key Exchange), and negotiate to generate an IP layer key, as the first
  • the key may be carried in the wireless signaling, and the two-way authentication may be performed.
  • the generated communication key is used as the first key, or the communication key sent by the peer user equipment is obtained as the first key.
  • a key wherein the input parameter of the communication key derivation includes a group identification ID and/or a random number, and the group identifier is an identifier of the communication group to which the user equipment performs unicast communication.
  • the UE performs authentication based on IKE at the IP layer, and the UE connects to the certificate authority through the E-UTRAN network, registers the certificate of the HPLMN to which the UE belongs, and other PLMN root certificates to which the target UE belongs.
  • Embodiment 2 of the present invention is applicable to a network The covered ProSe communication scenario, the specific implementation process is shown in Figure 2, including:
  • S201 UE1 establishes a network connection with a ProSe function and establishes a security association.
  • the UE1 presets a vendor certificate and a ProSe function root certificate before leaving the factory, and the UE1 accesses the E-UTRAN network to obtain an IP network connection, establishes a network connection with the ProSe function, implements mutual authentication, and establishes security. Association.
  • S202 UE1 acquires ProSe information, and registers a certificate of the HPLMN, and a list of each PLMN root certificate to which the target user equipment UE belongs.
  • UE1 obtains ProSe configuration information from the ProSe function, and registers UE1's certificate in the HPLMN.
  • the ProSe function requests the proxy function of the PLMN to which each target UE belongs according to the PLMN id requested by the UE1, and the ProSe function obtains the response, and then provides each PLMN root certificate to the UE1.
  • the UE2 configures the certificate of the HPLMN and the root certificate list of each PLMN root certificate to which the target user equipment UE belongs by using the ProSe function entity in the same manner as the UE1.
  • S204 UE1 and UE2 perform certificate authentication based on IKE at the IP layer, establish a security association tunnel Ipsec, and generate an IP layer key Kd according to Ipsec.
  • UE1 and UE2 perform certificate authentication based on IKE at the IP layer, establish IPsec, generate an IP layer key Kd according to IPsec, and obtain an IP layer key Kd as a derivation encryption key and a security key.
  • a key a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is accessed in IP layer, establish IPsec, generate an IP layer key Kd according to IPsec, and obtain an IP layer key Kd as a derivation encryption key and a security key.
  • a key a key.
  • S205a The UE1 performs key derivation according to the IP layer key Kd generated by the IPsec, and obtains the encryption key Kenc and the security key Kint.
  • S205b The UE2 performs key deduction according to the IP layer key Kd generated by the IPsec, and obtains the encryption key Kenc and the security key Kint.
  • the key deduction may be performed according to the IP layer key Kd generated by the IPsec, the IP address of the current UE, and/or the IP address of the peer UE, and of course Key derivation can be performed based on other identification information such as IP header information.
  • the key derivation can be performed based on the IP layer key Kd generated by the IPsec, and the IP address of the UE1 and/or the IP address of the UE2.
  • the execution processes of S205a and S205b may be performed indefinitely or simultaneously.
  • the encryption key Kenc and the security key Kint may be sent to the IP.
  • a security layer below the layer which may be an access side, a non-access stratum, or other layer.
  • S206 Secure the communication data by using the encryption key Kenc obtained in S205a and S205b and the security key Kint.
  • UE1 and UE2 initiate security protection by using an activation process negotiation algorithm, and use the encryption key Kenc and the security key Kint obtained in S205a and S205b to secure communication data between UE1 and UE2.
  • UE1 and UE2 when UE1 and UE2 perform certificate registration, not only the certificate of the HPLMN but also the root certificate of the PLMN to which the target UE belongs may be registered, so that the UEs in different security domains can perform certificate authentication and perform certificate authentication based on IKE.
  • the key deduction is performed according to the IP layer key generated after the certificate is authenticated, and the encryption key and the security key are obtained, and the communication data is securely protected by using the encryption key and the security key, which can be used by the UE in the ProSe communication scenario. Inter-communication provides security assurance.
  • the UE performs certificate authentication based on the IKE at the IP layer, and the UE registers the certificate of the HPLMN to which the UE belongs, and the other PLMN root certificate to which the target UE belongs, in the local configuration mode. Therefore, the third embodiment is registered in the third embodiment of the present invention.
  • the certificate is not required to be connected to the network. Therefore, the authentication method provided in the third embodiment of the present invention is applicable to a ProSe communication scenario with and without network coverage.
  • the specific implementation process is as shown in FIG. 3, and includes:
  • S301a UE1 registers the HPLMN certificate of UE1 and the certificate of the PLMN to which the ProSe application of the target UE belongs, by using the local configuration mode.
  • S301b The UE2 registers the HPLMN certificate of the UE2 and the certificate of the PLMN to which the ProSe application of the target UE belongs, by using the local configuration mode. Specifically, in the embodiment of the present invention, UE1 and UE2 preset a vendor certificate and a ProSe function certificate before leaving the factory.
  • S302 UE1 and UE2 perform certificate authentication based on IKE at the IP layer, establish a security association tunnel Ipsec, and generate an IP layer key Kd according to Ipsec.
  • UE1 and UE2 perform certificate authentication based on IKE at the IP layer, establish IPsec, generate an IP layer key Kd according to IPsec, and obtain an IP layer key Kd as a derivation encryption key and a security key.
  • a key a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is a key that is accessed in IP layer, establish IPsec, generate an IP layer key Kd according to IPsec, and obtain an IP layer key Kd as a derivation encryption key and a security key.
  • a key a key.
  • S303a The UE1 performs key derivation according to the IP layer key Kd generated by the IPsec, and obtains the encryption key Kenc and the security key Kint.
  • S303b The UE2 performs key derivation according to the IP layer key Kd generated by the IPsec, and obtains the encryption key Kenc and the security key Kint.
  • S303a and S303b may be performed in either order or simultaneously.
  • the encryption key Kenc and the security key Kint may be sent to the IP.
  • a security layer below the layer which may be an access side, a non-access stratum, or other layer.
  • S304 Secure the communication data by using the encryption key Kenc and the security key Kint obtained in S303a and S303b.
  • UE1 and UE2 initiate security protection by using an activation process negotiation algorithm, and use the encryption key Kenc and the security key Kint obtained in S303a and S303b to secure the communication data between UE1 and UE2.
  • UE1 and UE2 when UE1 and UE2 perform certificate registration, not only the certificate of the HPLMN but also the root certificate of the PLMN to which the target UE belongs may be registered, so that the UEs in different security domains can perform certificate authentication and perform certificate authentication based on IKE.
  • the key deduction is performed according to the IP layer key generated after the certificate is authenticated, and the encryption key and the security key are obtained, and the communication data is securely protected by using the encryption key and the security key, which can be used by the UE in the ProSe communication scenario. Inter-communication provides security assurance.
  • the present invention in order to secure communication data when the UE directly communicates with each other, the present invention The following describes the process of generating a key after completing UE authentication in detail.
  • the UE works in the ProSe scenario as an example.
  • the ProSe UE works in the public security communication field, and usually communicates between the UE and the GO (Group Owner) in a multicast or broadcast manner, such as Figure 4 shows.
  • the GO After the UE and the GO complete the authentication based on the certificate or the shared key, the GO generates an encryption key and/or a security key adapted to the unicast communication scenario, and adapts to the encryption key and/or the multicast communication scenario.
  • Security key is an encryption key and/or a security key adapted to the unicast communication scenario.
  • the GO when the UE performs unicast communication with the GO, when the UE joins the communication group to which the GO belongs, the GO generates a group identification ID for the communication group.
  • the GO when the UE performs unicast communication with the GO, the GO After the peer UE is authenticated, the first random number is generated, and the communication key shared by the GO and the peer UE is generated according to the group identifier ID and the first random number, and then the communication key is deduced according to the communication key.
  • the encryption key and/or the security key when performing unicast communication between the peer UEs.
  • the communication key sent by the GO is obtained, and an encryption key and a security key are generated according to the communication key, and the communication key is a secret generated by the GO according to the group identification ID and/or the random number. key.
  • the multicast key is obtained, and the multicast key is generated according to a random sequence generated by the GO, and may be a key generated by the GO after the first authenticated UE, or may be generated. It is a preset key, and based on the acquired multicast key, determines an encryption key and/or a security key when performing multicast communication with all UEs in the group.
  • the public key of the peer device or the shared key that is negotiated may be used to encrypt the random number, the communication key, and the multicast key. Then, it is sent to the UE, and the UE itself derives the encryption key and/or the security key required to generate the communication between the two, and can also use the peer device public key or the negotiated shared key to generate the generated encryption key and / or a security key, as an encryption key and / or a security key to communicate with the GO.
  • the following describes the process of generating a key after the UE and the GO are authenticated in combination with a specific application scenario.
  • the ProSe UE works in the field of public safety communication, and the GO sends the root key to the UE, and the UE derives the encryption key and the security key as an example, as shown in FIG. 5A.
  • the local configuration mode when the UE and the GO perform certificate registration, the local configuration mode may be used according to the actual network coverage, or the certificate of the HPLMN to be associated with the ProSe function entity, and each PLMN root certificate to which the target user equipment UE belongs may be configured. A list of the root certificates that make up.
  • the certificate when the UE is located in the network coverage, the certificate can be registered in the local configuration mode or the ProSe function entity configuration mode. When the UE is outside the network coverage, the certificate can be registered only through the local configuration mode. .
  • S402 The UE and the GO perform a DH (Diffie-Hellman) exchange process, and the shared key Kdh is negotiated.
  • DH Dynamic Hossion Initiation Protocol
  • S402 is an optional step. If S402 is executed, the certificate in the certificate authentication process is encrypted by using the negotiated shared key.
  • S403 The UE sends its own certificate to the GO.
  • the UE sends its own certificate to the GO in the wireless signaling request, for example, the certificate may be placed in the direct connection request of the UE.
  • the GO authenticates the UE based on the UE certificate, and derives the communication key Kgroup
  • unicast KDF (group ID, nonce).
  • the group ID is used as an input parameter of the derivation communication key Kgroup
  • a random sequence may be generated, and the multicast key Kgroup
  • the public key of the UE may be used to encrypt nonce, Kgrou
  • S405 Send the GO certificate to the UE. Further, in the embodiment of the present invention, if nonce, Kgrouplunicast, and/or Kgroup
  • S406 The UE verifies the GO certificate, decrypts with the private key, and obtains nonce, Kgrouplunicast, and/or Kgroup
  • S407 The UE sends the nonce back to the GO.
  • S407 is an optional step, and the encrypted random number is sent to the peer device, so that the peer device verifies whether the first key is tampered with the encrypted random number.
  • S408a The UE derives the encryption key Kenc and the security key Kint according to the communication key Kgrouplunicast, and protects the communication data between the UE and the GO by using the derived encryption key Kenc and the security key Kint.
  • the UE if the GO in the S404 uses the public key of the UE to perform the secret key encryption on the communication key Kgrouplunicast, and sends the communication key Kgrouplunicast in the S405 to the UE in S405, the UE encrypts The subsequent communication key Kgrouplunicast decrypts, and uses the decrypted communication key Kgrouplunicast to derive the encryption key and/or the security key when performing unicast communication with the GO, and uses the derived encryption key and/or the security key. , Secure communication data when performing unicast communication with GO.
  • S408b The GO derives the encryption key Kenc and the security key Kint according to the communication key Kgrouplunicast, and protects the communication data between the UE and the GO by using the derived encryption key Kenc and/or the security key Kint.
  • the GO verifies whether the second random number nonce is the same as the first random number nonce. If the nonce received by the GO is a nonce previously sent to the UE, the communication process is indicated. If the key is not changed, the communication data for communication between the GO and the UE can be secured by using the encryption key and/or the security key generated in S408b. If the nonce received by the GO is not a nonce previously sent to the UE, that is, the second random number is inconsistent with the first random number, it indicates that the previously transmitted communication key Kgrouplunicast and nonce are modified, then the GO regenerates the communication key.
  • the generated encryption key and/or the security key are encrypted by using the public key of the UE, and then sent to the UE. Instructing the UE to decrypt the encrypted encryption key and/or the security key, and using the decrypted encryption key and/or the security key to secure the communication data between the two, as shown in FIG. 5B.
  • the communication key Kgrouplunicast is generated according to the group identification ID and/or the random number, and the encryption key when performing unicast communication with the UE according to the communication key Kgrouplunicast is deduced.
  • the encrypted encryption key and/or the secured key are decrypted and encrypted using the decrypted encryption key and/or the secured key with the communication data between the GO and the GO.
  • the certificate is carried in the wireless signaling request, and the certificate authentication process and the key distribution process are encrypted by using the public key of the peer device, and the certificate group ID and nonce are input as the input of the communication key.
  • the parameter ensures that the group communication keys of each UE in the group are different, the security of communication data between different UEs and GOs, and whether the communication key is tampered by the nonce, further ensures the security of the communication data.
  • the certificate is carried in the wireless signaling, and the certificate is authenticated. After the certificate is authenticated, the communication key generated by the peer device is obtained as the first key. In the embodiment of the present invention, the certificate is carried in the wireless transmission. Before the certificate is authenticated in the signaling, the method further includes: performing DH exchange with the peer device to negotiate a shared key; and encrypting the certificate by using the negotiated shared key to ensure the security of the certificate.
  • the implementation process of the embodiment of the present invention is as shown in FIG. 6A, and includes:
  • S501 The UE and the GO respectively perform certificate registration.
  • the local configuration mode may be used according to the actual network coverage, or the certificate of the HPLMN belongs to the ProSe function entity. And a list of root certificates composed of respective PLMN root certificates to which the target user equipment UE belongs. Specifically, when the UE is located in the network coverage, the certificate can be registered in the local configuration mode or the ProSe function entity configuration mode. When the UE is outside the network coverage, the certificate can be registered only through the local configuration mode. .
  • S502 The UE and the GO perform a DH exchange process, and the shared key Kdh is negotiated.
  • the UE and the GO perform a DH exchange process, and the shared key is negotiated.
  • Kdh uses the negotiated shared key to encrypt the subsequent certificate authentication process and key distribution process.
  • S503 The UE sends its own certificate to the GO.
  • the UE sends its own certificate to the GO in the wireless signaling request, for example, the certificate may be placed in the direct connection request of the UE.
  • S504 The GO completes the authentication of the UE based on the received UE certificate, and derives the communication key Kgroup
  • the GO after the GO authenticates the UE, the GO generates a random number nonce, and derives a communication key Kgroup
  • group ID identity, identity
  • nonce value the group ID and nonce value to derive the communication key Kgroup
  • unicast KDF(group ID , nonce) .
  • the group ID is used as an input parameter of the derivation communication key Kgroup
  • ubroadcast in the group may be acquired, and the nonce, Kgroup
  • Kgrouplbroadcast execute S505.
  • S505 Send the GO certificate, nonce, Kgroup
  • S506 The UE completes verification of the GO based on the GO certificate, obtains nonce, Kgroup
  • S507 The UE sends the second random number nonce back to the GO.
  • S507 is an optional step, and the encrypted random number is sent to the GO.
  • the purpose is to determine whether the GO is consistent with the first random number nonce value sent to the UE by the encrypted nonce. Whether the key has been tampered with.
  • S508a The UE derives the encryption key Kenc and/or the security key Kint according to the communication key Kgroup
  • S508b The GO derives the encryption key Kenc and/or the secret key Kint according to the communication key Kgrouplunicast, and protects the communication data between the UE and the GO by using the derived encryption key Kenc and the security key Kint.
  • the GO deduces the encryption key Kenc and/or the security key Kint required for performing unicast communication according to the communication key Kgrouplunicast, and uses the multicast key Kgroup
  • the required encryption key Kenc and/or the security key Kint is the encryption key Kenc and/or the security key Kint.
  • the GO verifies whether the second random number nonce is the same as the first random number nonce, and if the second random number nonce received by the GO is the same as the first random number, it indicates The second random number nonce is the first random number nonce previously sent to the UE, indicating that the key is not changed during the communication, and the encryption key and/or the security key generated by S508b may be used as the GO and The encryption key and the security key for communication between the UEs secure the communication data for communication between the GO and the UE.
  • the GO regenerates the communication key Kgrouplunicast and executes S505 and the following step, that is, using the communication key Kgrouplunicast as the root key, re-introducing the encryption key Kenc and the security key Kint used for actual communication, and protecting the communication data between the UE and the GO.
  • the generated encryption key and/or the security key are encrypted by using the shared key Kdh, and then sent to the UE. Instructing the UE to decrypt the encrypted encryption key and/or the secured key, using the decrypted encryption key
  • the key and/or the secured key secure the communication data between the two, as shown in Figure 6B.
  • the communication key Kgrouplunicast is generated according to the group identification ID and/or the random number, and the encryption when performing unicast communication with the UE is determined according to the communication key Kgroup
  • the UE is instructed to decrypt the encrypted encryption key and/or the secured key, and encrypts the communication data between the GO and the GO using the decrypted encryption key and/or the secured key.
  • the multicast key is obtained according to the generated random sequence, and the multicast key is encrypted and sent to
  • the UE by the UE itself, derives an encryption key and/or a security key, or generates an encryption key and/or a security key required for multicast communication with the UE according to the multicast key, and utilizes the shared key.
  • the public key of the UE is encrypted and sent to the UE after encrypting the encryption key and/or the security key, and the UE directly uses the decrypted encryption key and/or the security key to perform communication data communication between the UE and the GO.
  • Safety protection see Figures 5A-5B and 6A-6B again.
  • the certificate is carried in the wireless signaling request, and the certificate authentication process and the key distribution process are encrypted by using the negotiated shared key, and the certificate group ID and nonce are input as the input of the communication key.
  • the parameters are such that the group communication keys of different UEs in the group are different, the security of communication data between different UEs and GOs is ensured, and whether the communication key is falsified by the nonce is verified, thereby further ensuring the security of the communication data.
  • the sixth embodiment of the present invention provides a communication device based on the method for performing secure communication between user equipments according to the first embodiment to the third embodiment.
  • the communication device includes: a configuration unit 601, an authentication unit 602, and a secret. a key generation unit 603 and a data protection unit 604, wherein
  • the configuration unit 601 is configured to separately configure a certificate for the first user equipment and the second user equipment, and transmit the configured certificate to the authentication unit 602.
  • the authentication unit 602 receives the certificate transmitted by the configuration unit 601, and performs mutual authentication and negotiation of the key between the first user equipment and the second user equipment based on the certificate, and obtains the first generated after the certificate authentication. a key, and transmitting the generated first key to the key generation unit 603;
  • the key generation unit 603 receives the first key sent by the authentication unit 602, and performs key deduction according to the first key to obtain an encryption key and a security key, and obtains the obtained encryption key and the security key.
  • Data protection unit 604 sends
  • the data protection unit 604 secures the communication data between the first user equipment and the second user equipment by using the encryption key and the security key transmitted by the key generation unit 603.
  • the configuration unit 601 is specifically configured to:
  • the certificate includes: the certificate of the local public land mobile network HPLMN to which the current user equipment belongs, and the certificate of the local public land mobile network HPLMN to which each target user equipment authenticated with the current user equipment belongs.
  • the authentication unit 602 is specifically configured to:
  • the certificate based on the Internet Key Exchange IKE at the IP layer, mutual authentication is performed, and an IP layer key is generated and negotiated as the first key.
  • the authentication unit 602 is specifically configured to:
  • the certificate is carried in the wireless transmission signaling and sent to the peer user equipment, and the certificate is authenticated. After the certificate authentication is passed, the generated communication key is used as the first key, or the peer user equipment is sent.
  • the communication key is used as the first key, and the input parameter derived from the communication key includes a group identification ID and/or a random number, and the group identification ID is an identifier of the communication group to which the user equipment communicates.
  • the authentication unit 602 is further configured to:
  • the key generating unit 603 is specifically configured to: perform key derivation according to the first key, an IP address of the current user equipment, and/or an IP address of the peer user equipment. , get the encryption key and the security key.
  • the user equipment when the user equipment performs certificate registration, not only the certificate of the HPLMN but also the root certificate of the PLMN to which the target device belongs may be registered, so that the user equipments in different security domains can perform certificate authentication and perform certificate authentication based on IKE.
  • the key deduction is performed according to the IP layer key generated after the certificate is authenticated, and the encryption key and the security key are obtained, and the communication data is securely protected by using the encryption key and the security key, and communication between the user equipments can be performed. Provide security guarantees.
  • the embodiment of the present invention provides a communication apparatus.
  • the communication apparatus includes an authentication unit 701, a key generation unit 702, and data. Protection unit 703, wherein
  • the authentication unit 701 is configured to authenticate the peer user equipment that communicates with the current user equipment, and after the authentication is passed, send the information that the authentication passes to the key generation unit 702.
  • the key generation unit 702 when receiving the information of the authentication pass sent by the authentication unit 701, generates a first random number, and generates a communication key according to the group identifier ID and the first random number, where the group identifier ID is the current user equipment and the peer end.
  • the key and/or the secured key are sent to the data protection unit 703;
  • the data protection unit 703 uses the encryption key and/or the security key derived by the key generation unit 702 to secure the communication data when the current user equipment and the opposite user equipment perform unicast communication.
  • the data protection unit 703604 is further configured to: when performing unicast communication between the current user equipment and the opposite user equipment by using the encryption key and/or the security key Before the communication data is securely protected, the first random number is encrypted by using the public key of the peer user equipment;
  • the data protection unit 703 is further configured to: when performing unicast communication between the current user equipment and the opposite user equipment by using the encryption key and/or the security key Before the communication data is securely protected, the first random number is strongly secreted by using the shared key;
  • the key generating unit 702 is further configured to: after generating the communication key according to the group identifier ID and the first random number, using the shared key or the public key of the peer user equipment, Encrypting the communication key; transmitting the encrypted communication key to the peer user equipment, instructing the peer user equipment to derive an encryption key for unicast communication with the current user equipment according to the encrypted communication key And/or a security key;
  • the data protection unit 703 is further configured to: use the encryption key and/or the security key derived by the peer user equipment to securely protect communication data when performing unicast communication with the current user equipment.
  • the data protection unit 703 is further configured to: when performing unicast communication between the current user equipment and the opposite user equipment by using the encryption key and/or the security key Before the communication data is secured, the encryption key and/or the security key are encrypted by using the shared key or the public key of the peer user equipment;
  • the key and/or the secured key pair securely protects the communication data when unicast communication is performed with the current user equipment.
  • Another aspect of the embodiment of the present invention further provides a communication device, including an authentication unit 701, a key generation unit 702, and a data protection unit 703.
  • a communication device including an authentication unit 701, a key generation unit 702, and a data protection unit 703.
  • the authentication unit 701 is configured to identify the peer user equipment that communicates with the current user equipment. Passing, after the authentication is passed, transmitting the information of the authentication pass to the key generation unit 702;
  • the key generation unit 702 is configured to: when receiving the information that the authentication unit sends the authentication, the random sequence is generated, and the multicast key is obtained according to the random sequence; and the current user equipment and the peer user equipment are determined according to the multicast key. Encryption key and/or security key when multicast communication is performed, and the derived encryption key and/or the security key are sent to the data protection unit 703;
  • the data protection unit 703 secures the communication data when the current user equipment and the peer user equipment perform multicast communication by using the encryption key and/or the security key derived by the key generation unit 702.
  • the data protection unit 703 is further configured to: after determining an encryption key and/or a security key when performing multicast communication between the current user equipment and the peer user equipment, Encrypting the encryption key and/or the secured key using the shared key or the public key of the peer user device;
  • the key and/or the secured key pair securely protect the communication data when performing multicast communication with the current user equipment.
  • the embodiment of the present invention further provides a communication device, including: an authentication unit 701, a key generation unit 702, and a data protection unit 703.
  • a communication device including: an authentication unit 701, a key generation unit 702, and a data protection unit 703.
  • the authentication unit 701 is configured to authenticate the peer user equipment that communicates with the current user equipment, and after the authentication is passed, send the information that the authentication passes to the key generation unit 702.
  • the key generation unit 702 after receiving the authentication pass information sent by the authentication unit 701, acquires the communication key sent by the peer user equipment, and deducts the encryption key and/or the security key according to the communication key, and the derivation is obtained.
  • the encryption key and/or the security key are sent to the data protection unit 703.
  • the communication key is a key generated by the peer user equipment according to the group identification ID and/or the first random number, and the group identification ID is the current user equipment and The identifier of the communication group to which the peer user equipment communicates;
  • the data protection unit 703 secures the communication data when the unicast communication between the current user equipment and the opposite user equipment is performed by using the obtained encryption key and/or the security key by the key generation unit 702.
  • the certificate is carried in the wireless signaling request, and the certificate authentication process and the key distribution process are encrypted by using the public key of the peer device or the shared key that is negotiated, and when the communication key is deduced,
  • the certificate group ID and nonce are used as input parameters to ensure that the group communication keys of different UEs in the group are different, the security of communication data between different UEs and GOs, and whether the communication key is tampered by the nonce to further ensure communication. The security of the data.
  • the communication device provided in the sixth embodiment and the seventh embodiment of the present invention may be a separate component, or may be integrated into other components.
  • the foregoing communication device provided by the embodiment of the present invention may be an existing communication network.
  • the user equipment UE in the middle may also be a new component integrated in the user equipment UE.
  • Embodiment 8 of the present invention is based on the method and apparatus for performing secure communication between user equipments according to the foregoing embodiments, and further provides a communication controller.
  • the communication controller includes a transceiver 801, a memory 802, and a processing. 803, wherein
  • the transceiver 801 is configured to receive indication information for performing secure communication sent by the user equipment, and send the indication information to the processor 803;
  • a memory 802 configured to store an application
  • the processor 803 is configured to invoke the application stored in the memory 802, and perform the following operations: after receiving the indication information sent by the user equipment, configuring a certificate for the first user equipment and the second user equipment respectively, based on the configured certificate, The user equipment and the second user equipment perform mutual authentication and negotiate a key, and obtain a first key generated after the certificate is authenticated; perform key deduction according to the first key to obtain an encryption key and a security key; and use the encryption key And the security key protects the communication data between the first user equipment and the second user equipment.
  • the processor 803 is further configured to: locally configure a certificate, or register a certificate with a certificate authority through a network; the configured certificate includes: a certificate of a local public land mobile network HPLMN to which the current user equipment belongs, and authentication with the current user equipment. Each target user device belongs to The root certificate of the local public land mobile network HPLMN.
  • the processor 803 is further configured to: perform authentication on the peer user equipment that communicates with the current user equipment; after the authentication is passed, generate a first random number, and generate a communication key according to the group identifier ID and the first random number. Deriving an encryption key and/or a security key for unicast communication between the current user equipment and the peer user equipment according to the communication key, and using the encryption key and/or the security key to the current user The communication data when the device performs unicast communication with the peer user device is protected.
  • the processor 803 is further configured to: perform authentication on the peer user equipment that communicates with the current user equipment; after the authentication is passed, generate a random sequence, and obtain a multicast key according to the random sequence; according to the multicast key, Determining an encryption key and/or a security key when performing multicast communication between the current user equipment and the peer user equipment, and using the encryption key and/or the security key to the current user equipment and the opposite user equipment The communication data during multicast communication is secured.
  • the processor 803 is further configured to: authenticate the peer user equipment that communicates with the current user equipment; and obtain the communication key sent by the peer user equipment after the authentication is passed, where the communication key is the peer user.
  • the identifier generated by the device according to the group identifier ID and/or the first random number, and the group identifier ID is an identifier of the communication group to which the current user equipment communicates with the peer user equipment; and the encryption key is deduced according to the communication key and/or finished.
  • the security key protects the communication data when the unicast communication between the current user equipment and the opposite user equipment is performed by using the encryption key and/or the security key.
  • the communication controller provided by the embodiment of the present invention performs security authentication based on the certificate when the processor performs secure communication processing between the user equipments, and not only registers the HPLMN certificate to which the current user equipment belongs but also registers the target user equipment when registering the certificate.
  • the root certificate of HPLMN enables authentication of user devices between different security domains.
  • the processor when the key is generated, the communication key and the multicast key are generated, and the communication key is generated according to the group identifier and the random number, and each guarantee is generated.
  • the communication keys generated by the user equipment of the secondary group are different, and the security of the communication is further ensured.
  • embodiments of the invention may be provided as a method, system, or Computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer-usable storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.) in which computer usable program code is embodied.
  • a computer-usable storage medium including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种用户设备之间进行安全通信的方法及装置,以提高UE之间通信的安全性。本发明中,第一用户设备与第二用户设备分别配置证书,并基于证书,进行双向认证并协商密钥,获取证书认证后生成的第一密钥;根据所述第一密钥进行密钥推演,得到加密密钥和完保密钥;利用所述加密密钥和所述完保密钥对所述第一用户设备与所述第二用户设备之间的通信数据进行安全保护。通过本发明,能够对用户设备之间进行通信中的全部通信数据进行安全保护,进而为用户设备之间的通信提供安全保证。

Description

用户设备之间进行安全通信的方法及装置
技术领域
本发明涉及通信技术领域, 尤其涉及一种用户设备之间进行安全通信的 方法及装置。 背景技术
ProSe( Proximity Service ,近巨离业务 )是 3GPP( 3rd Generation Partnership Project, 第 3代合作伙伴 )最新定义的基于 LTE ( Long Term Evolution, 长期 演进)技术的 UE ( User Equipment, 用户设备 )之间通信的技术。
UE之间在 ProSe场景下进行通信时,可通过网络辅助在 UE间进行通信, 也可以直接在 UE间进行通信, 无论哪种通信场景, UE间直接进行通信时, 都需要进行双向认证以确认对端身份真实性, 并生成密钥保证通信数据的安 全性。
一般的, 当前技术中 UE之间进行双向认证时, 在有 IP协议层的两个实 体间的双向认证, 认证过程在 IP层完成并生成密钥, 认证过程中生成的密钥 能保护 IP层及以上层通信数据的安全,但是在 ProSe通信场景下, UE间进行 通信时还可能有控制面和用户面等下层的通信数据, 在 IP层生成的密钥无法 保护下层通信数据的安全性, UE之间进行通信的安全性较低。 发明内容
本发明实施例提供一种用户设备之间进行安全通信的方法及装置, 以提 高 UE之间通信的安全性。
第一方面, 提供一种用户设备之间进行安全通信的方法, 包括: 第一用户设备与第二用户设备分别配置证书;
所述第一用户设备与所述第二用户设备, 基于所述证书, 进行双向认证 并协商密钥, 获取证书认证后生成的第一密钥;
所述第一用户设备与所述第二用户设备, 根据所述第一密钥进行密钥推 演, 得到加密密钥和完保密钥;
利用所述加密密钥和所述完保密钥对所述第一用户设备与所述第二用户 设备之间的通信数据进行安全保护。
结合第一方面, 在第一种可能的实现方式中, 配置证书, 包括: 本地配置证书, 或者通过网络向证书颁发机构注册证书;
所述证书包括: 当前用户设备所属本地公用陆地移动网络 HPLMN的证 书, 以及与当前用户设备进行认证的各个目标用户设备所属本地公用陆地移 动网络 HPLMN的根证书。
结合第一方面、 第一方面的第一种可能实现方式, 在第二种可能的实现 方式中, 基于所述证书, 进行双向认证并协商密钥, 获取证书认证后生成的 第一密钥, 包括:
根据所述证书在 IP层基于因特网密钥交换 IKE, 进行双向认证, 协商生 成 IP层密钥, 作为所述第一密钥。
结合第一方面、 第一方面的第一种可能实现方式, 在第三种可能的实现 方式中, 基于所述证书, 进行双向认证并协商密钥, 获取证书认证后生成的 第一密钥, 包括:
将证书携带在无线传输信令中向对端用户设备发送, 并进行证书的认证; 当证书认证通过后, 将自身推演生成的通信密钥作为所述第一密钥, 或 者获取对端用户设备发送的通信密钥作为所述第一密钥, 所述通信密钥推演 的输入参数包括组标识 ID和 /或随机数, 所述组标识 ID为用户设备之间进行 通信时所属通信组的标识。
结合第一方面的第三种可能实现方式, 在第四种可能的实现方式中, 将 证书携带在无线传输信令中向对端用户设备发送之前, 还包括:
与对端用户设备进行迪菲-赫尔曼 DH交换, 协商出共享密钥;
利用所述共享密钥对所述证书或所述证书的标识进行加密。
结合第一方面, 在第五种可能的实现方式中, 所述根据所述第一密钥进 行密钥推演, 得到加密密钥和完保密钥, 包括: 根据所述第一密钥、以及当前用户设备的 IP地址和 /或对端用户设备的 IP 地址, 进行密钥推演, 得到加密密钥和完保密钥。
第二方面, 提供一种用户设备之间进行安全通信的方法, 包括: 对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 生成第一随机数, 根据组标识 ID和所述第一随机数生成 通信密钥, 所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通 信组的标识;
根据所述通信密钥, 推演当前用户设备与对端用户设备之间进行单播通 信时的加密密钥和 /或完保密钥, 并利用所述加密密钥和 /或完保密钥, 对当前 用户设备与对端用户设备之间进行单播通信时的通信数据进行安全保护。
结合第二方面, 在第一种可能的实现方式中, 利用所述加密密钥和 /或完 保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进 行安全保护之前, 该方法还包括:
利用对端用户设备的公钥, 对所述第一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 并接收所述对端 用户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的 第一随机数解密后, 并利用当前用户设备的公钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
结合第二方面, 在第二种可能的实现方式中, 利用所述加密密钥和 /或完 保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进 行安全保护之前, 该方法还包括:
利用共享密钥, 对所述第一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 接收所述对端用 户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的第 一随机数解密后并利用共享密钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
结合第二方面、 第二方面的第一种可能实现方式或第二方面的第二种可 能实现方式, 在第三种可能的实现方式中, 根据组标识 ID和所述第一随机数 生成通信密钥之后, 该方法还包括:
利用共享密钥或对端用户设备的公钥, 对所述通信密钥进行加密; 将加密后的通信密钥发送给所述对端用户设备, 指示所述对端用户设备 根据加密后的通信密钥, 推演与当前用户设备之间进行单播通信时的加密密 钥和 /或完保密钥, 并利用推演的加密密钥和 /或完保密钥, 对与当前用户设备 之间进行单播通信时的通信数据进行安全保护。
结合第二方面、 第二方面的第一种可能实现方式或第二方面的第二种可 能实现方式,在第四种可能的实现方式中, 利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进行安全保 护之前, 该方法还包括:
利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或完保密钥进 行力口密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 指示所述 对端用户设备对所述加密后的加密密钥和 /或完保密钥进行解密, 并使用解密 后的加密密钥和 /或完保密钥对与当前用户设备之间进行单播通信时的通信数 据进行安全保护。
第三方面, 提供一种用户设备之间进行安全通信的方法, 包括: 对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 生成随机序列, 根据所述随机序列获取组播密钥; 根据所述组播密钥, 确定当前用户设备与对端用户设备之间进行组播通 信时的加密密钥和 /或完保密钥, 并利用所述加密密钥和 /或完保密钥对当前用 户设备与对端用户设备之间进行组播通信时的通信数据进行安全保护。
结合第三方面, 在第一种可能的实现方式中, 确定当前用户设备与对端 用户设备之间进行组播通信时的加密密钥和 /或完保密钥之后,该方法还包括: 利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或完保密钥进 行力口密; 将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 并指示所 述对端用户设备对加密后的加密密钥和 /或完保密钥解密, 并使用解密后的加 密密钥和 /或完保密钥对与当前用户设备进行组播通信时的通信数据进行安全 保护。
第四方面提供一种用户设备之间进行安全通信的方法, 包括:
对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 获取所述对端用户设备发送的通信密钥, 所述通信密钥 为所述对端用户设备根据组标识 ID和 /或第一随机数生成的密钥,所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通信组的标识;
根据所述通信密钥推演加密密钥和 /或完保密钥, 利用所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
第五方面, 提供一种安全通信装置, 包括配置单元、 认证单元、 密钥生 成单元和数据保护单元, 其中,
所述配置单元, 对第一用户设备与第二用户设备分别配置证书, 并将配 置的证书向所述认证单元传输;
所述认证单元, 接收所述配置单元传输的证书, 并基于所述证书, 对所 述第一用户设备与所述第二用户设备进行双向认证并协商密钥, 获取证书认 证后生成的第一密钥, 并将该生成的第一密钥向所述密钥生成单元发送; 所述密钥生成单元, 接收认证单元发送的第一密钥, 并根据所述第一密 钥进行密钥推演, 得到加密密钥和完保密钥, 将得到的加密密钥和完保密钥 向所述数据保护单元发送;
所述数据保护单元, 利用密钥生成单元发送的所述加密密钥和所述完保 密钥对所述第一用户设备与所述第二用户设备之间的通信数据进行安全保 护。
结合第五方面, 在第一种可能的实现方式中, 所述配置单元, 具体用于: 本地配置证书, 或者通过网络向证书颁发机构注册证书; 所述证书包括: 当前用户设备所属本地公用陆地移动网络 HPLMN的证 书, 以及与当前用户设备进行认证的各个目标用户设备所属本地公用陆地移 动网络 HPLMN的根证书。
结合第五方面或者第五方面的第一种可能实现方式, 在第二种可能的实 现方式中, 所述认证单元, 具体用于:
根据所述证书在 IP层基于因特网密钥交换 IKE, 进行双向认证, 协商生 成 IP层密钥, 作为所述第一密钥。
结合第五方面或者第五方面的第一种可能实现方式, 在第三种可能的实 现方式中, 所述认证单元, 具体用于:
将证书携带在无线传输信令中向对端用户设备发送, 并进行证书的认证; 当证书认证通过后, 将自身推演生成的通信密钥作为所述第一密钥, 或 者获取对端用户设备发送的通信密钥作为所述第一密钥, 所述通信密钥推演 的输入参数包括组标识 ID和 /或随机数, 所述组标识 ID为用户设备之间进行 通信时所属通信组的标识。
结合第五方面的第三种可能实现方式, 在第四种可能的实现方式中, 所 述认证单元, 还用于:
将证书携带在无线传输信令中向对端用户设备发送之前, 与对端用户设 备进行迪菲-赫尔曼 DH交换, 协商出共享密钥;
利用所述共享密钥对所述证书或所述证书的标识进行加密。
结合第五方面, 在第五种可能的实现方式中, 所述密钥生成单元, 具体 用于:
根据所述第一密钥、以及当前用户设备的 IP地址和 /或对端用户设备的 IP 地址, 进行密钥推演, 得到加密密钥和完保密钥。
第六方面, 提供一种通信装置, 包括认证单元、 密钥生成单元和数据保 护单元, 其中,
所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息; 所述密钥生成单元, 当接收到所述认证单元发送的认证通过的信息时, 生成第一随机数, 根据组标识 ID和所述第一随机数生成通信密钥, 所述组标 识 ID为当前用户设备与对端用户设备进行通信时所属通信组的标识; 并根据 所述通信密钥, 推演当前用户设备与对端用户设备之间进行单播通信时的加 密密钥和 /或完保密钥, 将推演得到的加密密钥和 /或完保密钥向所述数据保护 单元发送;
所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
结合第六方面, 在第一种可能的实现方式中, 所述数据保护单元, 还用 于:
在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用对端用户设备的公钥, 对所述第一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 并接收所述对端 用户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的 第一随机数解密后, 并利用当前用户设备的公钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
结合第六方面, 在第二种可能的实现方式中, 所述数据保护单元, 还用 于:
在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用共享密钥, 对所述第 一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 接收所述对端用 户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的第 一随机数解密后并利用共享密钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。 结合第六方面、 第六方面的第一种可能实现方式或第六方面的第二种可 能实现方式, 在第三种可能的实现方式中, 所述密钥生成单元, 还用于: 根 据组标识 ID和所述第一随机数生成通信密钥之后, 利用共享密钥或对端用户 设备的公钥, 对所述通信密钥进行加密; 将加密后的通信密钥发送给所述对 端用户设备, 指示所述对端用户设备根据加密后的通信密钥, 推演与当前用 户设备之间进行单播通信时的加密密钥和 /或完保密钥;
所述数据保护单元, 还用于, 利用对端用户设备推演得到的加密密钥和 / 或完保密钥, 对与当前用户设备之间进行单播通信时的通信数据进行安全保 护。
结合第六方面、 第六方面的第一种可能实现方式或第六方面的第二种可 能实现方式, 在第四种可能的实现方式中, 所述数据保护单元, 还用于: 在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用共享密钥或对端用户 设备的公钥, 对所述加密密钥和 /或完保密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 指示所述 对端用户设备对所述加密后的加密密钥和 /或完保密钥进行解密, 并使用解密 后的加密密钥和 /或完保密钥对与当前用户设备之间进行单播通信时的通信数 据进行安全保护。
第七方面, 提供一种通信装置, 包括认证单元、 密钥生成单元和数据保 护单元, 其中,
所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息;
所述密钥生成单元, 用于当接收到所述认证单元发送的认证通过的信息 时, 生成随机序列, 根据所述随机序列获取组播密钥; 根据所述组播密钥, 确定当前用户设备与对端用户设备之间进行组播通信时的加密密钥和 /或完保 密钥, 将推演得到的加密密钥和 /或完保密钥向所述数据保护单元发送;
所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥对当前用户设备与对端用户设备之间进行组播通信时的通信数据 进行安全保护。
结合第七方面, 在第一种可能的实现方式中, 所述数据保护单元, 还用 于:
确定当前用户设备与对端用户设备之间进行组播通信时的加密密钥和 /或 完保密钥之后, 利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或 完保密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 并指示所 述对端用户设备对加密后的加密密钥和 /或完保密钥解密, 并使用解密后的加 密密钥和 /或完保密钥对与当前用户设备进行组播通信时的通信数据进行安全 保护。
第八方面, 提供一种通信装置, 包括: 认证单元、 密钥生成单元和数据 保护单元, 其中,
所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息;
所述密钥生成单元, 当接收到所述认证单元发送的认证通过的信息后, 获取所述对端用户设备发送的通信密钥, 根据所述通信密钥推演加密密钥和 / 或完保密钥,将推演得到的加密密钥和 /或完保密钥向所述数据保护单元发送, 所述通信密钥为所述对端用户设备根据组标识 ID 和 /或第一随机数生成的密 钥, 所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通信组的 标识;
所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
本发明实施例提供的用户设备之间进行安全通信的方法及装置, 基于证 书进行双向认证并协商密钥, 根据证书认证后生成的第一密钥进行密钥推演, 得到加密密钥和完保密钥, 并利用加密密钥和完保密钥对通信数据进行安全 保护, 能够对用户设备之间进行通信中的全部通信数据进行安全保护, 进而 为用户设备之间的通信提供安全保证。 附图说明
图 1为本发明实施例提供的认证方法流程示意图;
图 2为本发明实施例提供的基于 IKE认证的示意图;
图 3为本发明实施例提供的基于 IKE认证的另一示意图;
图 4为 ProSe UE工作在公共安全领域利用组播或广播通信示意图; 图 5 A-图 5B为本发明实施例中 UE与 GO之间认证示意图;
图 6A-图 6B为本发明实施例中 UE与 GO之间认证另一示意图;
图 7为本发明实施例提供的通信装置结构示意图;
图 8为本发明实施例提供的又一通信装置结构示意图;
图 9为本发明实施例提供的通信控制器构成示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是 全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创 造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
实施例一
如图 1所示为本发明实施例一提供的 UE之间通信场景下, UE之间进行 安全通信过程示意图, 包括:
S101 : 第一 UE与第二 UE分别配置证书。
本发明实施例中, 第一 UE与第二 UE进行证书配置时, 可釆用本地配置 方式, 也可釆用通过网络连接向证书颁发机构注册证书的方式。
S102: 基于证书认证并协商密钥, 获取认证后生成的第一密钥。
本发明实施例中进行通信的第一 UE和第二 UE基于 S101中配置的证书 , 进行双向认证以及协商密钥, 并分别获取认证后生成的第一密钥。
S103: 根据获取的第一密钥进行密钥推演, 得到加密密钥和完保密钥。
S104:利用 S103中得到的加密密钥和完保密钥对通信数据进行安全保护。 本发明实施例中,基于证书进行 UE之间的双向认证, 并根据证书认证后 生成的第一密钥进行密钥推演, 得到加密密钥和完保密钥, 利用加密密钥和 完保密钥对第一 UE与第二 UE之间的通信数据进行安全保护, 为 UE间直接 通信的通信场景中设备之间的通信提供安全保证。
本发明实施例中,以 ProSe通信场景为例进行说明, UE进行证书配置时, 可通过 E-UTRAN ( Evolved Universal Terrestrial Radio Access Network, 演进 通用陆地无线接入网) 网络与证书颁发机构连接, 注册证书, 也可釆用本地 配置方式, 注册证书。 并且进行证书配置时, 配置自身所属 HPLMN ( Home Public Land Mobile Network, 本地公用陆地移动网络 )颁发的证书, 以及其它 可能与当前 UE进行证书认证的目标 UE所属的 HPLMN根证书 ,进而实现在 不同安全域内 UE之间的证书认证。
进一步的, 本发明实施例中 ProSe UE基于证书进行双向认证时, 可在 IP 层基于 IKE ( Internet Key Exchange , 因特网密钥交换)进行双向认证, , 协 商生成 IP层密钥, 作为所述第一密钥; 也可在无线信令中携带证书, 进行双 向认证, 当证书认证通过后, 将自身推演生成的通信密钥作为第一密钥, 或 者获取对端用户设备发送的通信密钥作为第一密钥, 其中, 通信密钥推演的 输入参数包括组标识 ID和 /或随机数,该组标识为用户设备之间进行单播通信 时所属通信组的标识。
本发明以下实施例将结合具体的应用场景对实施例一涉及的认证方法进 行详细说明。
实施例二
本发明实施例二中 UE之间在 IP层基于 IKE进行认证, 并且 UE通过 E-UTRAN网络与证书颁发机构连接, 注册自己所属 HPLMN的证书, 以及可 能的目标 UE所属的其他 PLMN根证书, 因此本发明实施例二适用于有网络 覆盖的 ProSe通信场景, 具体实现过程如图 2所示, 包括:
S201 : UE1与 ProSe function (近距离业务功能实体)建立网络连接并建 立安全关联。
具体的, 本发明实施例中 UE1在出厂之前会预置厂商证书, 以及 ProSe function根证书, UEl接入 E-UTRAN网络,获得 IP网络连接,与 ProSe function 建立网络连接实现双向认证, 并建立安全关联。
S202: UE1获取 ProSe信息, 并注册 HPLMN的证书, 以及目标用户设 备 UE所属的各个 PLMN根证书列表。
具体的, UE1从 ProSe function获得 ProSe配置信息,注册 UE1在 HPLMN 的证书。 另夕卜, ProSe function会根据 UEl请求的 PLMN id向其他 PLMN的 ProSe function (或证书颁发机构 )请求各目标 UE所属的 PLMN的才艮证书, ProSe function得到响应以后, 向 UE1提供各个 PLMN根证书 , 使 UE1注册 通过 ProSe function实体配置目标用户设备 UE所属的证书。
S203: UE2釆用与 UE1相同的方法,通过 ProSe function实体配置 HPLMN 的证书, 以及目标用户设备 UE所属的各个 PLMN根证书组成的根证书列表。
S204: UE1与 UE2在 IP层基于 IKE进行证书认证, 建立安全关联隧道 Ipsec, 并依据 Ipsec生成 IP层密钥 Kd。
具体的 , 本发明实施例中 UE1与 UE2在 IP层基于 IKE进行证书认证, 建立 Ipsec, 依据 Ipsec生成 IP层密钥 Kd, 获取 IP层密钥 Kd作为推演加密 密钥和完保密钥的第一密钥。
S205a: UEl根据 Ipsec生成的 IP层密钥 Kd进行密钥推演, 得到加密密 钥 Kenc和完保密钥 Kint。
S205b: UE2根据 Ipsec生成的 IP层密钥 Kd进行密钥推演, 得到加密密 钥 Kenc和完保密钥 Kint。
具体的, 进行加密密钥 Kenc和完保密钥 Kint推演时, 可根据 Ipsec生成 的 IP层密钥 Kd、 以及当前 UE的 IP地址和 /或对端 UE的 IP地址进行密钥推 演,当然还可以根据例如 IP头部信息等其他标识信息进行密钥推演。例如 UE1 进行加密密钥 Kenc和完保密钥 Kint推演时, 可根据 Ipsec生成的 IP层密钥 Kd、 以及 UE1的 IP地址和 /或 UE2的 IP地址进行密钥推演。
需要说明的是, S205a和 S205b执行过程不分先后 ,也可以是同时进行的 , 当推演得到加密密钥 Kenc和完保密钥 Kint, 可将加密密钥 Kenc和完保密钥 Kint发送给 IP层以下的安全层, 该安全层可以是接入侧、 非接入层或者其它 层。
S206: 利用 S205a和 S205b中得到的加密密钥 Kenc和完保密钥 Kint, 对 通信数据进行安全保护。
具体的, UE1与 UE2之间通过激活过程协商算法, 启动安全保护, 利用 S205a和 S205b中得到的加密密钥 Kenc和完保密钥 Kint, 对 UE1与 UE2之 间的通信数据进行安全保护。
本发明实施例中 UE1与 UE2进行证书注册时,不仅注册 HPLMN的证书 , 还注册可能的目标 UE所属的 PLMN的根证书, 使得不同安全域中的 UE可 以进行证书认证, 并且基于 IKE进行证书认证, 根据证书认证后生成的 IP层 密钥进行密钥推演, 得到加密密钥和完保密钥, 利用加密密钥和完保密钥对 通信数据进行安全保护,能够为 ProSe通信场景中 UE之间的通信提供安全保 证。
实施例三
本发明实施例三中 UE间在 IP层基于 IKE进行证书认证, 并且 UE通过 本地配置方式, 注册自己所属 HPLMN的证书, 以及可能目标 UE所属的其他 PLMN根证书, 因此本发明实施例三中注册证书时, 不需要接入网络, 因此 本发明实施例三提供的认证方法, 适用于有网络覆盖和无网络覆盖的 ProSe 通信场景, 具体实现过程如图 3所示, 包括:
S301a: UE1通过本地配置方式, 注册 UE1 的 HPLMN证书以及可能的 目标 UE的 ProSe应用所属 PLMN的才艮证书。
S301b: UE2通过本地配置方式, 注册 UE2的 HPLMN证书以及可能目 标 UE的 ProSe应用所属 PLMN的才艮证书。 具体的, 本发明实施例中 UE1和 UE2在出厂之前会预置厂商证书, 以及 ProSe function才艮证书。
S302: UE1与 UE2在 IP层基于 IKE进行证书认证, 建立安全关联隧道 Ipsec, 并依据 Ipsec生成 IP层密钥 Kd。
具体的 , 本发明实施例中 UE1与 UE2在 IP层基于 IKE进行证书认证, 建立 Ipsec, 依据 Ipsec生成 IP层密钥 Kd, 获取 IP层密钥 Kd作为推演加密 密钥和完保密钥的第一密钥。
S303a: UE1根据 Ipsec生成的 IP层密钥 Kd进行密钥推演, 得到加密密 钥 Kenc和完保密钥 Kint。
S303b: UE2根据 Ipsec生成的 IP层密钥 Kd进行密钥推演, 得到加密密 钥 Kenc和完保密钥 Kint。
需要说明的是, S303a和 S303b执行过程不分先后 ,也可以是同时进行的 , 当推演得到加密密钥 Kenc和完保密钥 Kint, 可将加密密钥 Kenc和完保密钥 Kint发送给 IP层以下的安全层, 该安全层可以是接入侧、 非接入层或者其它 层。
S304: 利用 S303a和 S303b中得到的加密密钥 Kenc和完保密钥 Kint, 对 通信数据进行安全保护。
具体的, UE1与 UE2之间通过激活过程协商算法, 启动安全保护, 利用 S303a和 S303b中得到的加密密钥 Kenc和完保密钥 Kint, 对 UE1与 UE2之 间的通信数据进行安全保护。
本发明实施例中 UE1与 UE2进行证书注册时,不仅注册 HPLMN的证书 , 还注册可能的目标 UE所属的 PLMN的根证书, 使得不同安全域中的 UE可 以进行证书认证, 并且基于 IKE进行证书认证, 根据证书认证后生成的 IP层 密钥进行密钥推演, 得到加密密钥和完保密钥, 利用加密密钥和完保密钥对 通信数据进行安全保护,能够为 ProSe通信场景中 UE之间的通信提供安全保 证。
进一步的, 为对 UE之间直接进行通信时的通信数据进行安全保护,本发 明实施例以下将对完成 UE认证后生成密钥的过程进行详细说明。 本发明实施例仍以 UE工作在 ProSe场景下为例进行说明, ProSe UE工 作在公共安全通信领域, 通常以组播或广播方式在 UE与 GO ( Group Owner, 组长)之间进行通信, 如图 4所示。 UE与 GO之间基于证书或者共享密钥完 成认证后, GO 生成适应单播通信场景下的加密密钥和 /或完保密钥, 以及适 应组播通信场景下的加密密钥和 /或完保密钥。
进一步的, UE与 GO进行单播通信时, 当 UE加入 GO所管属的通信组 时, GO会为该通信组生成一个组标识 ID, 本发明实施例中 UE与 GO进行单 播通信时, GO完成与其进行通信的对端 UE认证后, 生成第一随机数, 并根 据组标识 ID和该第一随机数生成 GO与对端 UE共享的通信密钥, 然后根据 该通信密钥, 推演其与对端 UE之间进行单播通信时的加密密钥和 /或完保密 钥。 UE对 GO进行认证后, 获取 GO发送的通信密钥, 并根据该通信密钥推 演生成加密密钥和完保密钥 ,该通信密钥为 GO根据组标识 ID和 /或随机数生 成的密钥。 UE 与 GO 进行组播通信时, 获取组播密钥, 该组播密钥是根据 GO生成的随机序列生成的, 可以是 GO对第一个验证通过的 UE后, 生成的 密钥, 也可以是预先设置的密钥, 并根据该获取的组播密钥, 确定与组内所 有 UE之间进行组播通信时的加密密钥和 /或完保密钥。
更进一步的, 本发明实施例中 GO对与其进行通信的 UE验证通过后, 可 利用对端设备公钥或者协商出的共享密钥, 对随机数、 通信密钥和组播密钥 进行加密, 然后发送给 UE, 由 UE自身推演生成二者通信所需的加密密钥和 /或完保密钥, 也可利用对端设备公钥或者协商出的共享密钥, 对生成的加密 密钥和 /或完保密钥, 作为与 GO进行通信的加密密钥和 /或完保密钥。
本发明以下将结合具体的应用场景对 UE与 GO之间进行认证后,生成密 钥的过程进行详细说明。
实施例四
本发明实施例四以 ProSe UE工作在公共安全通信领域, GO向 UE发送 根密钥, 由 UE自身推演加密密钥和完保密钥为例进行说明, 如图 5A所示。 S401 : UE和 GO分别进行证书注册。
本发明实施例中 UE和 GO进行证书注册时,可根据实际的网络覆盖情况, 釆用本地配置方式, 或者通过 ProSe function实体配置所属 HPLMN的证书、 以及可能目标用户设备 UE所属的各个 PLMN根证书组成的根证书列表。
具体的,当 UE位于网络覆盖范围内,则可釆用本地配置方式或通过 ProSe function实体配置方式, 注册证书, 当 UE位于网络覆盖范围外时, 则只能通 过本地配置方式, 进行证书的注册。
S402: UE和 GO进行 DH ( Diffie- Hellman, 迪菲-赫尔曼) 交换过程, 协商出共享密钥 Kdh。
具体的, 本发明实施例中 S402为可选步骤, 若执行了 S402, 则利用协商 出的共享密钥对证书认证过程中的证书进行加密。
S403: UE将自己的证书发给 GO。
具体的, 本发明实施例中, UE将自己的证书携带在无线信令请求中向 GO发送, 例如证书可以放在 UE的直接连接请求里。
S404: GO基于 UE证书对 UE进行认证,并推演通信密钥 Kgroup |unicast。 具体的,本发明实施例中 GO对 UE验证通过后,则生成第一随机数 nonce , 并根据组 ID ( Identity, 标识)和 nonce值推演出 UE和 GO之间的通信密钥 Kgrou |unicast , 利用组 ID和 nonce值推演通信密钥 Kgroup |unicast可以按照 密钥推演函数 Kgrou |unicast=KDF(group ID , nonce) , 进行推演。
本发明实施例中将组 ID作为推演通信密钥 Kgroup|unicast的输入参数, 能够保证 UE 每次入组的密钥不同, 并引入 nonce 值作为推演通信密钥 Kgroup|unicast的输入参数, 能保证组内各个 UE的组通信密钥不同。
更进一步的,本发明实施例中, GO对 UE验证通过后,可生成随机序列, 根据该随机序列获取组内的组播密钥 Kgroup|ubroadcast。
进一步的, 本发明实施例中可用 UE 的公钥加密 nonce, Kgrou |unicast 和 /或 Kgroup |broadcast。
S405: 将 GO证书发送给 UE。 进一步的, 本发明实施例中若 S404 中用 UE 的公钥加密 nonce , Kgrouplunicast和 /或 Kgroup|broadcast, 则将力口密的 nonce, Kgrouplunicast和 / 或 Kgrou (broadcast发送给 UE„
S406: UE验证 GO证书, 用私钥解密并获取 nonce, Kgrouplunicast和 / 或 Kgroup|broadcast, 利用 GO公钥力口密 nonce, 得到第二随机数 nonce。
S407: UE将 nonce发回给 GO。
本发明实施例中 S407为可选步骤, 将加密后的随机数发送给对端设备, 目的是为了使对端设备通过该加密后的随机数验证第一密钥是否被篡改。
S408a: UE根据通信密钥 Kgrouplunicast推演加密密钥 Kenc和完保密钥 Kint, 并用推演出的加密密钥 Kenc和完保密钥 Kint对 UE与 GO之间的通信 数据进行保护。
具体的, 本发明实施例中若 S404 中 GO 利用 UE 的公钥对通信密钥 Kgrouplunicast进行了力口密, 并在 S405中将力口密后的通信密钥 Kgrouplunicast 发送给 UE, 则 UE对加密后的通信密钥 Kgrouplunicast进行解密, 利用解密 后的通信密钥 Kgrouplunicast推演与 GO进行单播通信时的加密密钥和 /或完保 密钥, 利用推演的加密密钥和 /或完保密钥, 对与 GO之间进行单播通信时的 通信数据进行安全保护。
S408b: GO根据通信密钥 Kgrouplunicast推演加密密钥 Kenc和完保密钥 Kint,并用推演出的加密密钥 Kenc和 /或完保密钥 Kint对 UE与 GO之间的通 信数据进行保护。
进一步的,本发明实施例中若执行了 S407 ,则 GO验证第二随机数 nonce 是否与第一随机数 nonce相同, 若该 GO接收到的 nonce为之前发送给 UE的 nonce, 则表明该通信过程中, 密钥没有被更改, 则可利用 S408b中生成的加 密密钥和 /或完保密钥, 对 GO与 UE间进行通信的通信数据进行安全保护。 若该 GO接收到的 nonce不是之前发送给 UE的 nonce, 即第二随机数与第一 随机数不一致, 则表明之前发送的通信密钥 Kgrouplunicast及 nonce为被修改 过, 则 GO重新生成通信密钥 Kgrouplunicast, 并执行 S405及以下步骤, 即釆 用通信密钥 Kgrouplunicast作为根密钥, 重新推演实际通信使用的加密密钥 Kenc和完保密钥 Kint, 对 UE与 GO之间的通信数据进行保护。
进一步的, 本发明实施例中 GO还可生成加密密钥和 /或完保密钥后, 将 生成的加密密钥和 /或完保密钥, 利用 UE的公钥进行加密后发送给 UE, 指示 UE对该加密的加密密钥和 /或完保密钥进行解密, 利用解密后的加密密钥和 / 或完保密钥对二者之间的通信数据进行安全保护, 如图 5B所示, 本发明实施 例中当 GO完成对 UE的验证后, 根据组标识 ID和 /或随机数生成通信密钥 Kgrouplunicast, 根据通信密钥 Kgrouplunicast, 推演与 UE之间进行单播通信 时的加密密钥和 /或完保密钥, 利用 UE的公钥对生成的加密密钥和 /或完保密 钥进行加密, 并将加密后的加密密钥和 /或完保密钥发送给 UE, UE对该加密 的加密密钥和 /或完保密钥进行解密, 并利用解密后的加密密钥和 /或完保密钥 其与 GO之间的通信数据进行加密。
本发明实施例中将证书携带在无线信令请求中, 利用对端设备的公钥对 证书认证过程以及密钥分发过程进行加密, 并在推演通信密钥时, 将证书组 ID和 nonce作为输入参数, 保证组内各个 UE的组通信密钥不同, 不同 UE 与 GO之间通信数据的安全性, 并且通过 nonce的验证通信密钥是否被篡改, 进一步保证了通信数据的安全性。
实施例五
本发明实施例五在无线信令中携带证书, 进行证书的认证, 当证书认证 通过后, 获取对端设备生成的通信密钥作为第一密钥, 本发明实施例中将证 书携带在无线传输信令中进行证书的认证之前, 还包括: 与对端设备进行 DH 交换, 协商出共享密钥; 利用协商出的共享密钥对证书进行加密, 以保证证 书的安全性。
本发明实施例的实施过程如图 6A所示, 包括:
S501 : UE和 GO分别进行证书注册。
本发明实施例中 UE和 GO进行证书注册时,可根据实际的网络覆盖情况, 釆用本地配置方式, 或者通过 ProSe function实体配置所属 HPLMN的证书、 以及可能目标用户设备 UE所属的各个 PLMN根证书组成的根证书列表。 具体的,当 UE位于网络覆盖范围内,则可釆用本地配置方式或通过 ProSe function实体配置方式, 注册证书, 当 UE位于网络覆盖范围外时, 则只能通 过本地配置方式, 进行证书的注册。
S502: UE和 GO进行 DH交换过程, 协商出共享密钥 Kdh。
具体的, 本发明实施例中 UE和 GO进行 DH交换过程, 协商出共享密钥
Kdh,利用协商出的共享密钥对后续的证书认证过程以及密钥分发过程进行加 密。
S503: UE将自己的证书发给 GO。
具体的, 本发明实施例中, UE将自己的证书携带在无线信令请求中向 GO发送, 例如证书可以放在 UE的直接连接请求里。
S504: GO基于收到的 UE证书完成对 UE 的认证, 并推演通信密钥 Kgroup|unicast。
具体的, 本发明实施例中 GO对 UE验证通过后, GO生成随机数 nonce, 并根据组 ID ( Identity, 身份标识)和 nonce值推演出 UE和 GO之间的通信 密钥 Kgroup|unicast。 利用组 ID和 nonce值推演通信密钥 Kgroup|unicast可以 按照密钥推演函数 Kgroup|unicast=KDF(group ID , nonce) , 进行推演。
本发明实施例中将组 ID作为推演通信密钥 Kgroup|unicast的输入参数, 能够保证 UE 每次入组的密钥不同, 并引入 nonce 值作为推演通信密钥 Kgroup|unicast的输入参数, 能保证组内各个 UE的组通信密钥不同。
更进一步的, 本发明实施例中, 当推演出通信密钥 Kgrouplunicast后, 可 获取组内的广播密钥 Kgroup|ubroadcast,用 S502中推演出的共享密钥 Kdh加 密 nonce, Kgroup|unicast和 /或 Kgrouplbroadcast, 执行 S505。
S505: 将 GO证书, 力口密的 nonce, Kgroup|unicast, Kgrouplbroadcast发 送给 UE。
S506: UE基于 GO证书完成对 GO的验证, 获取 nonce, Kgroup|unicast, Kgrouplbroadcast, 并利用共享密钥 Kdh加密 nonce, 得到第二随机数 nonce。 S507: UE将第二随机数 nonce发回给 GO。
本发明实施例中 S507为可选步骤, 将加密随机数发送给 GO, 目的是为 了使 GO通过该加密 nonce是否与其之前发送给 UE的第一随机数 nonce值一 致, 判断对通信数据进行保护的密钥是否被篡改。
S508a: UE根据通信密钥 Kgroup|unicast推演加密密钥 Kenc和 /或完保密 钥 Kint,并用推演出的加密密钥 Kenc和完保密钥 Kint对 UE与 GO之间的通 信数据进行保护。
S508b: GO根据通信密钥 Kgrouplunicast推演加密密钥 Kenc和 /或完保密 钥 Kint,并用推演出的加密密钥 Kenc和完保密钥 Kint对 UE与 GO之间的通 信数据进行保护。
具体的, 本发明实施例中 GO根据通信密钥 Kgrouplunicast推演进行单播 通信时所需的加密密钥 Kenc 和 /或完保密钥 Kint , 并用组播密钥 Kgroup|broadcast推演组播通信时所需的加密密钥 Kenc和 /或完保密钥 Kint。
进一步的,本发明实施例中若执行了 S507 ,则 GO验证第二随机数 nonce 是否与第一随机数 nonce相同,若该 GO接收到的第二随机数 nonce与第一随 机数相同, 则表明第二随机数 nonce为之前发送给 UE的第一随机数 nonce , 则表明该通信过程中, 密钥没有被更改, 则可利用 S508b生成的加密密钥和 / 或完保密钥, 作为 GO与 UE间进行通信的加密密钥和完保密钥, 对 GO与 UE间进行通信的通信数据进行安全保护。若该 GO接收到的第二随机数 nonce 不是之前发送给 UE 的第一随机数 nonce , 则表明之前发送的通信密钥 Kgrouplunicast及 nonce为被爹改过,则 GO重新生成通信密钥 Kgrouplunicast, 并执行 S505及以下步骤, 即釆用通信密钥 Kgrouplunicast作为根密钥, 重新 推演实际通信使用的加密密钥 Kenc和完保密钥 Kint, 对 UE与 GO之间的通 信数据进行保护。
进一步的, 本发明实施例中 GO还可生成加密密钥和 /或完保密钥后, 将 生成的加密密钥和 /或完保密钥, 利用共享密钥 Kdh进行加密后发送给 UE, 指示 UE对该加密的加密密钥和 /或完保密钥进行解密, 利用解密后的加密密 钥和 /或完保密钥对二者之间的通信数据进行安全保护, 如图 6B所示。
本发明实施例中, 当 GO完成对 UE的验证后, 根据组标识 ID和 /或随机 数生成通信密钥 Kgrouplunicast, 根据通信密钥 Kgroup|unicast, 确定与 UE之 间进行单播通信时的加密密钥和 /或完保密钥; 利用协商出的共享密钥 Kdh对 生成的加密密钥和 /或完保密钥进行加密, 并将加密后的加密密钥和 /或完保密 钥发送给 UE, 指示 UE对该加密的加密密钥和 /或完保密钥进行解密, 并利用 解密后的加密密钥和 /或完保密钥其与 GO之间的通信数据进行加密。
同样的, 本发明实施例中若 GO与 UE之间进行组播通信, 则 GO对 UE 认证通过后, 则根据生成的随机序列获取组播密钥, 并将该组播密钥加密后 发送给 UE, 由 UE自己推演加密密钥和 /或完保密钥, 或者根据该组播密钥生 成与 UE进行组播通信所需的加密密钥和 /或完保密钥, 并利用共享密钥或者 UE的公钥对加密密钥和 /或完保密钥加密后发送给 UE, UE直接利用解密后 的加密密钥和 /或完保密钥对其与 GO 之间进行通信的通信数据进行安全保 护, 可再次参阅图 5A-图 5B以及图 6A-图 6B。
本发明实施例中将证书携带在无线信令请求中, 利用协商出的共享密钥 对证书认证过程以及密钥分发过程进行加密, 并在推演通信密钥时, 将证书 组 ID和 nonce作为输入参数, 使得组内各个 UE的组通信密钥不同, 保证不 同 UE与 GO之间通信数据的安全性,并且通过 nonce的验证通信密钥是否被 篡改, 进一步保证了通信数据的安全性。
实施例六
本发明实施例六基于实施例一至实施例三提供的用户设备之间进行安全 通信的方法, 提供一种通信装置, 如图 7 所示, 该通信装置包括: 配置单元 601、 认证单元 602、 密钥生成单元 603和数据保护单元 604, 其中,
配置单元 601 ,对第一用户设备与第二用户设备分别配置证书, 并将配置 的证书向认证单元 602传输;
认证单元 602, 接收配置单元 601传输的证书, 并基于证书, 对第一用户 设备与第二用户设备进行双向认证并协商密钥, 获取证书认证后生成的第一 密钥, 并将该生成的第一密钥向密钥生成单元 603发送;
密钥生成单元 603 ,接收认证单元 602发送的第一密钥, 并根据第一密钥 进行密钥推演, 得到加密密钥和完保密钥, 将得到的加密密钥和完保密钥向 数据保护单元 604发送;
数据保护单元 604,利用密钥生成单元 603发送的加密密钥和完保密钥对 第一用户设备与第二用户设备之间的通信数据进行安全保护。
其中, 在第一种可能的实现方式中, 配置单元 601 , 具体用于:
本地配置证书, 或者通过网络向证书颁发机构注册证书;
证书包括: 当前用户设备所属本地公用陆地移动网络 HPLMN的证书, 以及与当前用户设备进行认证的各个目标用户设备所属本地公用陆地移动网 络 HPLMN的才艮证书。
其中, 在第二种可能的实现方式中, 认证单元 602, 具体用于:
根据证书在 IP层基于因特网密钥交换 IKE, 进行双向认证, 协商生成 IP 层密钥, 作为第一密钥。
其中, 在第三种可能的实现方式中, 认证单元 602, 具体用于:
将证书携带在无线传输信令中向对端用户设备发送, 并进行证书的认证; 当证书认证通过后, 将自身推演生成的通信密钥作为第一密钥, 或者获 取对端用户设备发送的通信密钥作为第一密钥, 通信密钥推演的输入参数包 括组标识 ID和 /或随机数, 组标识 ID为用户设备之间进行通信时所属通信组 的标识。
其中, 在第四种可能的实现方式中, 认证单元 602, 还用于:
将证书携带在无线传输信令中向对端用户设备发送之前, 与对端用户设 备进行迪菲-赫尔曼 DH交换, 协商出共享密钥;
利用共享密钥对证书或证书的标识进行加密。
其中, 在第五种可能的实现方式中, 密钥生成单元 603 , 具体用于: 根据第一密钥、 以及当前用户设备的 IP地址和 /或对端用户设备的 IP地 址, 进行密钥推演, 得到加密密钥和完保密钥。 本发明实施例中用户设备进行证书注册时, 不仅注册 HPLMN的证书, 还注册可能的目标设备所属的 PLMN的根证书, 使得不同安全域中的用户设 备可以进行证书认证, 并且基于 IKE进行证书认证, 根据证书认证后生成的 IP层密钥进行密钥推演, 得到加密密钥和完保密钥, 利用加密密钥和完保密 钥对通信数据进行安全保护, 能够为用户设备之间进行通信提供安全保证。
实施例七
结合实施例四至实施例五涉及的用户设备之间进行安全通信的方法, 本 发明实施例提供一种通信装置, 如图 8所示, 该通信装置包括认证单元 701、 密钥生成单元 702和数据保护单元 703 , 其中,
认证单元 701 , 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向密钥生成单元 702发送认证通过的信息;
密钥生成单元 702, 当接收到认证单元 701发送的认证通过的信息时, 生 成第一随机数, 根据组标识 ID和第一随机数生成通信密钥, 组标识 ID为当 前用户设备与对端用户设备进行通信时所属通信组的标识; 并根据通信密钥, 推演当前用户设备与对端用户设备之间进行单播通信时的加密密钥和 /或完保 密钥, 将推演得到的加密密钥和 /或完保密钥向数据保护单元 703发送;
数据保护单元 703 , 利用密钥生成单元 702推演得到的加密密钥和 /或完 保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进 行安全保护。
其中, 在第一种可能的实现方式中, 数据保护单元 703604, 还用于: 在利用加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之间进 行单播通信时的通信数据进行安全保护之前, 利用对端用户设备的公钥, 对 第一随机数进行加密;
将加密后的第一随机数发送给对端用户设备, 并接收对端用户设备发送 第二随机数, 第二随机数为对端用户设备对加密后的第一随机数解密后, 并 利用当前用户设备的公钥, 重新加密的随机数;
确定第二随机数与第一随机数相同。 其中, 在第二种可能的实现方式中, 数据保护单元 703 , 还用于: 在利用加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之间进 行单播通信时的通信数据进行安全保护之前, 利用共享密钥, 对第一随机数 进行力口密;
将加密后的第一随机数发送给对端用户设备, 接收对端用户设备发送第 二随机数, 第二随机数为对端用户设备对加密后的第一随机数解密后并利用 共享密钥, 重新加密的随机数;
确定第二随机数与第一随机数相同。
其中, 在第三种可能的实现方式中, 密钥生成单元 702, 还用于: 根据组 标识 ID和第一随机数生成通信密钥之后, 利用共享密钥或对端用户设备的公 钥, 对通信密钥进行加密; 将加密后的通信密钥发送给对端用户设备, 指示 对端用户设备根据加密后的通信密钥, 推演与当前用户设备之间进行单播通 信时的加密密钥和 /或完保密钥;
数据保护单元 703 , 还用于, 利用对端用户设备推演得到的加密密钥和 / 或完保密钥, 对与当前用户设备之间进行单播通信时的通信数据进行安全保 护。
其中, 在第四种可能的实现方式中, 数据保护单元 703 , 还用于: 在利用加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之间进 行单播通信时的通信数据进行安全保护之前, 利用共享密钥或对端用户设备 的公钥, 对加密密钥和 /或完保密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给对端用户设备, 指示对端用户 设备对加密后的加密密钥和 /或完保密钥进行解密, 并使用解密后的加密密钥 和 /或完保密钥对与当前用户设备之间进行单播通信时的通信数据进行安全保 护。
本发明实施例另一方面还提供一种通信装置, 包括认证单元 701、 密钥生 成单元 702和数据保护单元 703 , 可再次参阅图 8, 其中,
认证单元 701 , 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向密钥生成单元 702发送认证通过的信息;
密钥生成单元 702 ,用于当接收到认证单元 701发送的认证通过的信息时 , 生成随机序列, 根据随机序列获取组播密钥; 根据组播密钥, 确定当前用户 设备与对端用户设备之间进行组播通信时的加密密钥和 /或完保密钥, 将推演 得到的加密密钥和 /或完保密钥向数据保护单元 703发送;
数据保护单元 703 , 利用密钥生成单元 702推演得到的加密密钥和 /或完 保密钥对当前用户设备与对端用户设备之间进行组播通信时的通信数据进行 安全保护。
其中, 在第一种可能的实现方式中, 数据保护单元 703 , 还用于: 确定当前用户设备与对端用户设备之间进行组播通信时的加密密钥和 /或 完保密钥之后, 利用共享密钥或对端用户设备的公钥, 对加密密钥和 /或完保 密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给对端用户设备, 并指示对端用 户设备对加密后的加密密钥和 /或完保密钥解密, 并使用解密后的加密密钥和 / 或完保密钥对与当前用户设备进行组播通信时的通信数据进行安全保护。
本发明实施例还提供一种通信装置, 包括: 认证单元 701、 密钥生成单元 702和数据保护单元 703 , 可再次参阅图 8, 其中,
认证单元 701 , 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向密钥生成单元 702发送认证通过的信息;
密钥生成单元 702, 当接收到认证单元 701发送的认证通过的信息后, 获 取对端用户设备发送的通信密钥,根据通信密钥推演加密密钥和 /或完保密钥, 将推演得到的加密密钥和 /或完保密钥向数据保护单元 703发送, 通信密钥为 对端用户设备根据组标识 ID和 /或第一随机数生成的密钥, 组标识 ID为当前 用户设备与对端用户设备进行通信时所属通信组的标识;
数据保护单元 703 , 利用密钥生成单元 702推演得到的加密密钥和 /或完 保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进 行安全保护。 本发明实施例中将证书携带在无线信令请求中, 利用对端设备的公钥或 者协商出的共享密钥, 对证书认证过程以及密钥分发过程进行加密, 并在推 演通信密钥时, 将证书组 ID和 nonce作为输入参数, 保证组内各个 UE的组 通信密钥不同, 不同 UE与 GO之间通信数据的安全性, 并且通过 nonce的验 证通信密钥是否被篡改, 进一步保证了通信数据的安全性。
需要说明的是, 本发明实施例六和实施例七提供的通信装置, 可以是独 立的部件, 也可以是集成于其他部件中, 例如本发明实施例提供的上述通信 装置可以是现有通信网络中的用户设备 UE,也可以是集成于用户设备 UE内的 新的部件。
需要说明的是, 本发明实施例中的通信装置的各个模块 /单元的功能实现 以及交互方式可以进一步参照相关方法实施例的描述。
实施例八
本发明实施例八基于上述实施例涉及的用户设备之间进行安全通信的方 法及装置, 还提供一种通信控制器, 如图 9 所示, 该通信控制器包括收发器 801 , 存储器 802和处理器 803 , 其中,
收发器 801 , 用于接收用户设备发送的进行安全通信的指示信息, 并将该 指示信息发送给处理器 803;
存储器 802, 用于存储应用程序;
处理器 803 , 用于调用存储器 802存储的应用程序, 执行如下操作: 接收到用户设备发送的指示信息后, 对第一用户设备与第二用户设备分 别配置证书, 基于配置的证书, 对第一用户设备和第二用户设备进行双向认 证并协商密钥, 获取证书认证后生成的第一密钥; 根据第一密钥进行密钥推 演, 得到加密密钥和完保密钥; 利用加密密钥和完保密钥对第一用户设备与 第二用户设备之间的通信数据进行安全保护。
进一步的, 处理器 803还用于: 本地配置证书, 或者通过网络向证书颁 发机构注册证书; 配置的证书包括: 当前用户设备所属本地公用陆地移动网 络 HPLMN的证书, 以及与当前用户设备进行认证的各个目标用户设备所属 本地公用陆地移动网络 HPLMN的根证书。
进一步的, 处理器 803 , 还用于: 对与当前用户设备进行通信的对端用户 设备进行认证; 当认证通过后, 生成第一随机数, 根据组标识 ID和第一随机 数生成通信密钥; 根据通信密钥, 推演当前用户设备与对端用户设备之间进 行单播通信时的加密密钥和 /或完保密钥, 并利用加密密钥和 /或完保密钥, 对 当前用户设备与对端用户设备之间进行单播通信时的通信数据进行安全保 护。
进一步的, 处理器 803 , 还用于: 对与当前用户设备进行通信的对端用户 设备进行认证; 当认证通过后, 生成随机序列, 根据随机序列获取组播密钥; 根据组播密钥, 确定当前用户设备与对端用户设备之间进行组播通信时的加 密密钥和 /或完保密钥, 并利用加密密钥和 /或完保密钥对当前用户设备与对端 用户设备之间进行组播通信时的通信数据进行安全保护。
更进一步的, 处理器 803 , 还用于: 对与当前用户设备进行通信的对端用 户设备进行认证; 当认证通过后, 获取对端用户设备发送的通信密钥, 通信 密钥为对端用户设备根据组标识 ID和 /或第一随机数生成的密钥, 组标识 ID 为当前用户设备与对端用户设备进行通信时所属通信组的标识; 根据通信密 钥推演加密密钥和 /或完保密钥, 利用加密密钥和 /或完保密钥, 对当前用户设 备与对端用户设备之间进行单播通信时的通信数据进行安全保护。
本发明实施例提供的通信控制器, 处理器对用户设备之间进行安全通信 处理时, 基于证书进行安全认证, 并且注册证书时不仅注册当前用户设备所 属的 HPLMN证书 , 还注册目标用户设备所述的 HPLMN的根证书 , 能够实 现不同安全域之间用户设备的认证。
进一步的, 本发明实施例中处理器对用户设备之间进行安全通信处理时, 在生成密钥时, 生成通信密钥与组播密钥, 通信密钥根据组标识和随机数生 成, 保证每次入组的用户设备生成的通信密钥都不同, 进一步保证通信的安 全性。
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或 计算机程序产品。 因此, 本发明可釆用完全硬件实施例、 完全软件实施例、 或结合软件和硬件方面的实施例的形式。 而且, 本发明可釆用在一个或多个 其中包含有计算机可用程序代码的计算机可用存储介质 (包括但不限于磁盘 存储器、 CD-ROM、 光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序产 品的流程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图 和 /或方框图中的每一流程和 /或方框、 以及流程图和 /或方框图中的流程 和 /或方框的结合。 可提供这些计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器, 使得通 过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流 程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设 备以特定方式工作的计算机可读存储器中, 使得存储在该计算机可读存储器 中的指令产生包括指令装置的制造品, 该指令装置实现在流程图一个流程或 多个流程和 /或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的 处理, 从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图 一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的步 骤。
尽管已描述了本发明的优选实施例, 但本领域内的技术人员一旦得知了 基本创造性概念, 则可对这些实施例作出另外的变更和修改。 所以, 所附权 利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。 脱离本发明实施例的精神和范围。 这样, 倘若本发明实施例的这些修改和变 型属于本发明权利要求及其等同技术的范围之内, 则本发明也意图包含这些 改动和变型在内。

Claims

权 利 要 求
1、 一种用户设备之间进行安全通信的方法, 其特征在于, 包括: 第一用户设备与第二用户设备分别配置证书;
所述第一用户设备与所述第二用户设备, 基于所述证书, 进行双向认证 并协商密钥, 获取证书认证后生成的第一密钥;
所述第一用户设备与所述第二用户设备, 根据所述第一密钥进行密钥推 演, 得到加密密钥和完保密钥;
利用所述加密密钥和所述完保密钥对所述第一用户设备与所述第二用户 设备之间的通信数据进行安全保护。
2、 如权利要求 1所述的方法, 其特征在于, 配置证书, 包括:
本地配置证书, 或者通过网络向证书颁发机构注册证书;
所述证书包括: 当前用户设备所属本地公用陆地移动网络 HPLMN的证 书, 以及与当前用户设备进行认证的各个目标用户设备所属本地公用陆地移 动网络 HPLMN的根证书。
3、 如权利要求 1或 2所述的方法, 其特征在于, 基于所述证书, 进行双 向认证并协商密钥, 获取证书认证后生成的第一密钥, 包括:
根据所述证书在 IP层基于因特网密钥交换 IKE, 进行双向认证, 协商生 成 IP层密钥, 作为所述第一密钥。
4、 如权利要求 1或 2所述的方法, 其特征在于, 基于所述证书, 进行双 向认证并协商密钥, 获取证书认证后生成的第一密钥, 包括:
将证书携带在无线传输信令中向对端用户设备发送, 并进行证书的认证; 当证书认证通过后, 将自身推演生成的通信密钥作为所述第一密钥, 或 者获取对端用户设备发送的通信密钥作为所述第一密钥, 所述通信密钥推演 的输入参数包括组标识 ID和 /或随机数, 所述组标识 ID为用户设备之间进行 通信时所属通信组的标识。
5、 如权利要求 4所述的方法, 其特征在于, 将证书携带在无线传输信令 中向对端用户设备发送之前, 还包括:
与对端用户设备进行迪菲-赫尔曼 DH交换, 协商出共享密钥;
利用所述共享密钥对所述证书或所述证书的标识进行加密。
6、 如权利要求 1所述的方法, 其特征在于, 所述根据所述第一密钥进行 密钥推演, 得到加密密钥和完保密钥, 包括:
根据所述第一密钥、以及当前用户设备的 IP地址和 /或对端用户设备的 IP 地址, 进行密钥推演, 得到加密密钥和完保密钥。
7、 一种用户设备之间进行安全通信的方法, 其特征在于, 包括: 对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 生成第一随机数, 根据组标识 ID和所述第一随机数生成 通信密钥, 所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通 信组的标识;
根据所述通信密钥, 推演当前用户设备与对端用户设备之间进行单播通 信时的加密密钥和 /或完保密钥, 并利用所述加密密钥和 /或完保密钥, 对当前 用户设备与对端用户设备之间进行单播通信时的通信数据进行安全保护。
8、 如权利要求 7所述的方法, 其特征在于, 利用所述加密密钥和 /或完 保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进 行安全保护之前, 该方法还包括:
利用对端用户设备的公钥, 对所述第一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 并接收所述对端 用户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的 第一随机数解密后, 并利用当前用户设备的公钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
9、 如权利要求 7所述的方法, 其特征在于, 利用所述加密密钥和 /或完保 密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数据进行 安全保护之前, 该方法还包括:
利用共享密钥, 对所述第一随机数进行加密; 将加密后的所述第一随机数发送给所述对端用户设备, 接收所述对端用 户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的第 一随机数解密后并利用共享密钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
10、 如权利要求 7-9任一项所述的方法, 其特征在于, 根据组标识 ID和 所述第一随机数生成通信密钥之后, 该方法还包括:
利用共享密钥或对端用户设备的公钥, 对所述通信密钥进行加密; 将加密后的通信密钥发送给所述对端用户设备, 指示所述对端用户设备 根据加密后的通信密钥, 推演与当前用户设备之间进行单播通信时的加密密 钥和 /或完保密钥, 并利用推演的加密密钥和 /或完保密钥, 对与当前用户设备 之间进行单播通信时的通信数据进行安全保护。
11、 如权利要求 7-9任一项所述的方法, 其特征在于, 利用所述加密密钥 和 /或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信 数据进行安全保护之前, 该方法还包括:
利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或完保密钥进 行力口密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 指示所述 对端用户设备对所述加密后的加密密钥和 /或完保密钥进行解密, 并使用解密 后的加密密钥和 /或完保密钥对与当前用户设备之间进行单播通信时的通信数 据进行安全保护。
12、 一种用户设备之间进行安全通信的方法, 其特征在于, 包括: 对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 生成随机序列, 根据所述随机序列获取组播密钥; 根据所述组播密钥, 确定当前用户设备与对端用户设备之间进行组播通 信时的加密密钥和 /或完保密钥, 并利用所述加密密钥和 /或完保密钥对当前用 户设备与对端用户设备之间进行组播通信时的通信数据进行安全保护。
13、 如权利要求 12所述的方法, 其特征在于, 确定当前用户设备与对端 用户设备之间进行组播通信时的加密密钥和 /或完保密钥之后,该方法还包括: 利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或完保密钥进 行力口密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 并指示所 述对端用户设备对加密后的加密密钥和 /或完保密钥解密, 并使用解密后的加 密密钥和 /或完保密钥对与当前用户设备进行组播通信时的通信数据进行安全 保护。
14、 一种用户设备之间进行安全通信的方法, 其特征在于, 包括: 对与当前用户设备进行通信的对端用户设备进行认证;
当认证通过后, 获取所述对端用户设备发送的通信密钥, 所述通信密钥 为所述对端用户设备根据组标识 ID和 /或第一随机数生成的密钥,所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通信组的标识;
根据所述通信密钥推演加密密钥和 /或完保密钥, 利用所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
15、 一种安全通信装置, 其特征在于, 包括配置单元、 认证单元、 密钥 生成单元和数据保护单元, 其中,
所述配置单元, 对第一用户设备与第二用户设备分别配置证书, 并将配 置的证书向所述认证单元传输;
所述认证单元, 接收所述配置单元传输的证书, 并基于所述证书, 对所 述第一用户设备与所述第二用户设备进行双向认证并协商密钥, 获取证书认 证后生成的第一密钥, 并将该生成的第一密钥向所述密钥生成单元发送; 所述密钥生成单元, 接收认证单元发送的第一密钥, 并根据所述第一密 钥进行密钥推演, 得到加密密钥和完保密钥, 将得到的加密密钥和完保密钥 向所述数据保护单元发送;
所述数据保护单元, 利用密钥生成单元发送的所述加密密钥和所述完保 密钥对所述第一用户设备与所述第二用户设备之间的通信数据进行安全保 护。
16、如权利要求 15所述的装置, 其特征在于, 所述配置单元, 具体用于: 本地配置证书, 或者通过网络向证书颁发机构注册证书;
所述证书包括: 当前用户设备所属本地公用陆地移动网络 HPLMN的证 书, 以及与当前用户设备进行认证的各个目标用户设备所属本地公用陆地移 动网络 HPLMN的根证书。
17、 如权利要求 15或 16所述的装置, 其特征在于, 所述认证单元, 具 体用于:
根据所述证书在 IP层基于因特网密钥交换 IKE, 进行双向认证, 协商生 成 IP层密钥, 作为所述第一密钥。
18、 如权利要求 15或 16所述的装置, 其特征在于, 所述认证单元, 具 体用于:
将证书携带在无线传输信令中向对端用户设备发送, 并进行证书的认证; 当证书认证通过后, 将自身推演生成的通信密钥作为所述第一密钥, 或 者获取对端用户设备发送的通信密钥作为所述第一密钥, 所述通信密钥推演 的输入参数包括组标识 ID和 /或随机数, 所述组标识 ID为用户设备之间进行 通信时所属通信组的标识。
19、 如权利要求 18所述的装置, 其特征在于, 所述认证单元, 还用于: 将证书携带在无线传输信令中向对端用户设备发送之前, 与对端用户设 备进行迪菲-赫尔曼 DH交换, 协商出共享密钥;
利用所述共享密钥对所述证书或所述证书的标识进行加密。
20、 如权利要求 15所述的装置, 其特征在于, 所述密钥生成单元, 具体 用于:
根据所述第一密钥、以及当前用户设备的 IP地址和 /或对端用户设备的 IP 地址, 进行密钥推演, 得到加密密钥和完保密钥。
21、 一种通信装置, 其特征在于, 包括认证单元、 密钥生成单元和数据 保护单元, 其中, 所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息;
所述密钥生成单元, 当接收到所述认证单元发送的认证通过的信息时, 生成第一随机数, 根据组标识 ID和所述第一随机数生成通信密钥, 所述组标 识 ID为当前用户设备与对端用户设备进行通信时所属通信组的标识; 并根据 所述通信密钥, 推演当前用户设备与对端用户设备之间进行单播通信时的加 密密钥和 /或完保密钥, 将推演得到的加密密钥和 /或完保密钥向所述数据保护 单元发送;
所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
22、 如权利要求 21 所述的装置, 其特征在于, 所述数据保护单元, 还 用于:
在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用对端用户设备的公钥, 对所述第一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 并接收所述对端 用户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的 第一随机数解密后, 并利用当前用户设备的公钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
23、 如权利要求 21所述的装置, 其特征在于, 所述数据保护单元, 还用 于:
在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用共享密钥, 对所述第 一随机数进行加密;
将加密后的所述第一随机数发送给所述对端用户设备, 接收所述对端用 户设备发送第二随机数, 所述第二随机数为所述对端用户设备对加密后的第 一随机数解密后并利用共享密钥, 重新加密的随机数;
确定所述第二随机数与所述第一随机数相同。
24、 如权利要求 21-23任一项所述的装置, 其特征在于, 所述密钥生成单 元, 还用于: 根据组标识 ID和所述第一随机数生成通信密钥之后, 利用共享 密钥或对端用户设备的公钥, 对所述通信密钥进行加密; 将加密后的通信密 钥发送给所述对端用户设备, 指示所述对端用户设备根据加密后的通信密钥 , 推演与当前用户设备之间进行单播通信时的加密密钥和 /或完保密钥;
所述数据保护单元, 还用于, 利用对端用户设备推演得到的加密密钥和 / 或完保密钥, 对与当前用户设备之间进行单播通信时的通信数据进行安全保 护。
25、 如权利要求 21-23任一项所述的装置, 其特征在于, 所述数据保护单 元, 还用于:
在利用所述加密密钥和 /或完保密钥, 对当前用户设备与对端用户设备之 间进行单播通信时的通信数据进行安全保护之前, 利用共享密钥或对端用户 设备的公钥, 对所述加密密钥和 /或完保密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 指示所述 对端用户设备对所述加密后的加密密钥和 /或完保密钥进行解密, 并使用解密 后的加密密钥和 /或完保密钥对与当前用户设备之间进行单播通信时的通信数 据进行安全保护。
26、 一种通信装置, 其特征在于, 包括认证单元、 密钥生成单元和数据 保护单元, 其中,
所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息;
所述密钥生成单元, 用于当接收到所述认证单元发送的认证通过的信息 时, 生成随机序列, 根据所述随机序列获取组播密钥; 根据所述组播密钥, 确定当前用户设备与对端用户设备之间进行组播通信时的加密密钥和 /或完保 密钥, 将推演得到的加密密钥和 /或完保密钥向所述数据保护单元发送; 所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥对当前用户设备与对端用户设备之间进行组播通信时的通信数据 进行安全保护。
27、 如权利要求 25所述的装置, 其特征在于, 所述数据保护单元, 还用 于:
确定当前用户设备与对端用户设备之间进行组播通信时的加密密钥和 /或 完保密钥之后, 利用共享密钥或对端用户设备的公钥, 对所述加密密钥和 /或 完保密钥进行加密;
将加密后的加密密钥和 /或完保密钥发送给所述对端用户设备, 并指示所 述对端用户设备对加密后的加密密钥和 /或完保密钥解密, 并使用解密后的加 密密钥和 /或完保密钥对与当前用户设备进行组播通信时的通信数据进行安全 保护。
28、 一种通信装置, 其特征在于, 包括: 认证单元、 密钥生成单元和数 据保护单元, 其中,
所述认证单元, 用于对与当前用户设备进行通信的对端用户设备进行认 证, 当认证通过后, 向所述密钥生成单元发送认证通过的信息;
所述密钥生成单元, 当接收到所述认证单元发送的认证通过的信息后, 获取所述对端用户设备发送的通信密钥, 根据所述通信密钥推演加密密钥和 / 或完保密钥,将推演得到的加密密钥和 /或完保密钥向所述数据保护单元发送, 所述通信密钥为所述对端用户设备根据组标识 ID 和 /或第一随机数生成的密 钥, 所述组标识 ID为当前用户设备与对端用户设备进行通信时所属通信组的 标识;
所述数据保护单元, 利用所述密钥生成单元推演得到的所述加密密钥和 / 或完保密钥, 对当前用户设备与对端用户设备之间进行单播通信时的通信数 据进行安全保护。
PCT/CN2013/085821 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置 WO2015058378A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201380003389.9A CN104769982B (zh) 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置
PCT/CN2013/085821 WO2015058378A1 (zh) 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置
CN201910256482.XA CN109922080A (zh) 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/085821 WO2015058378A1 (zh) 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置

Publications (1)

Publication Number Publication Date
WO2015058378A1 true WO2015058378A1 (zh) 2015-04-30

Family

ID=52992141

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/085821 WO2015058378A1 (zh) 2013-10-23 2013-10-23 用户设备之间进行安全通信的方法及装置

Country Status (2)

Country Link
CN (2) CN104769982B (zh)
WO (1) WO2015058378A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023078666A1 (en) * 2021-11-08 2023-05-11 Telefonaktiebolaget Lm Ericsson (Publ) Authentication for a proximity-based service in a wireless communication network

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015058378A1 (zh) * 2013-10-23 2015-04-30 华为技术有限公司 用户设备之间进行安全通信的方法及装置
WO2018222133A2 (zh) * 2017-06-01 2018-12-06 华为国际有限公司 数据保护方法、装置以及系统
CN109120649B (zh) * 2018-11-02 2020-11-06 美的集团股份有限公司 密钥协商方法、云服务器、设备、存储介质以及系统
US11234125B2 (en) * 2019-08-09 2022-01-25 Rosemount Inc. Two-factor authentication for wireless field devices
CN112449323B (zh) * 2019-08-14 2022-04-05 华为技术有限公司 一种通信方法、装置和系统
CN110505059B (zh) * 2019-08-23 2022-03-18 深圳成谷科技有限公司 一种用于pc5接口点到点通信的直接密钥生成方法及装置
CN113132323B (zh) * 2019-12-31 2022-11-18 华为技术有限公司 一种通信方法及装置
CN111010412B (zh) * 2020-03-11 2021-03-12 北京信安世纪科技股份有限公司 通信的方法、装置、路边设备和存储介质
KR20230051592A (ko) * 2020-08-28 2023-04-18 후아웨이 테크놀러지 컴퍼니 리미티드 통신 방법 및 관련 장치
US11683172B2 (en) * 2020-10-26 2023-06-20 Dell Products L.P. Distributed secure communication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640886A (zh) * 2008-07-29 2010-02-03 上海华为技术有限公司 鉴权方法、重认证方法和通信装置
CN103167492A (zh) * 2011-12-15 2013-06-19 华为技术有限公司 在通信系统中生成接入层密钥的方法及其设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359B (zh) * 2006-01-18 2010-12-08 华为技术有限公司 一种实现终端设备间安全通信的方法及装置
CN101056456A (zh) * 2006-04-10 2007-10-17 华为技术有限公司 无线演进网络实现认证的方法及安全系统
CN102325321B (zh) * 2006-06-23 2014-12-17 华为技术有限公司 演进无线通信网络中的密钥获取方法和用户设备
CN100558035C (zh) * 2006-08-03 2009-11-04 西安电子科技大学 一种双向认证方法及系统
CN101237444B (zh) * 2007-01-31 2013-04-17 华为技术有限公司 密钥处理方法、系统和设备
CA2621147C (en) * 2008-02-15 2013-10-08 Connotech Experts-Conseils Inc. Method of bootstrapping an authenticated data session configuration
CN101286843B (zh) * 2008-06-03 2010-08-18 江西省电力信息通讯有限公司 点对点模式下单点登录方法
CN101594616B (zh) * 2009-07-08 2012-05-23 华为终端有限公司 认证方法、服务器、用户设备及通信系统
US20130110920A1 (en) * 2011-10-27 2013-05-02 Alcatel-Lucent Usa Inc. Network-assisted peer-to-peer secure communication establishment
WO2015058378A1 (zh) * 2013-10-23 2015-04-30 华为技术有限公司 用户设备之间进行安全通信的方法及装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640886A (zh) * 2008-07-29 2010-02-03 上海华为技术有限公司 鉴权方法、重认证方法和通信装置
CN103167492A (zh) * 2011-12-15 2013-06-19 华为技术有限公司 在通信系统中生成接入层密钥的方法及其设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023078666A1 (en) * 2021-11-08 2023-05-11 Telefonaktiebolaget Lm Ericsson (Publ) Authentication for a proximity-based service in a wireless communication network

Also Published As

Publication number Publication date
CN104769982B (zh) 2019-05-03
CN109922080A (zh) 2019-06-21
CN104769982A (zh) 2015-07-08

Similar Documents

Publication Publication Date Title
WO2015058378A1 (zh) 用户设备之间进行安全通信的方法及装置
JP6844908B2 (ja) セキュアセッションの確立と暗号化データ交換のためのコンピュータ利用システム及びコンピュータ利用方法
US10601594B2 (en) End-to-end service layer authentication
CN107809411B (zh) 移动网络的认证方法、终端设备、服务器和网络认证实体
TWI672933B (zh) 用於下一代蜂巢網路的使用者面安全
KR102068367B1 (ko) 사물인터넷을 위한 데이터그램 전송에서 경량 인증을 위한 컴퓨터 구현 시스템 및 방법
AU2011268205B2 (en) Method and apparatus for binding subscriber authentication and device authentication in communication systems
US8694782B2 (en) Wireless authentication using beacon messages
US20170026174A1 (en) Method, device, and system for establishing secure connection
TW201701226A (zh) 電子處方操作方法、裝置及系統
US20170310655A1 (en) Secure connections establishment
WO2019051776A1 (zh) 密钥的传输方法及设备
WO2011140924A1 (zh) 一种网关、节点和服务器进行鉴权的方法、装置及系统
WO2015100974A1 (zh) 一种终端认证的方法、装置及系统
KR20120047972A (ko) 암호화 정보를 교섭하기 위한 방법, 장치 및 네트워크 시스템
WO2009094942A1 (fr) Procédé et système de réseau de communication pour établir une conjonction de sécurité
JP7470671B2 (ja) コアネットワークへの非3gpp装置アクセス
WO2018120217A1 (zh) 验证密钥请求方的方法和设备
WO2016011588A1 (zh) 移动管理实体、归属服务器、终端、身份认证系统和方法
JP6666517B2 (ja) 第1の通信デバイスに、第2の通信デバイスを用いて、プロビジョニングする方法
WO2016184351A1 (zh) 无线网络的ip地址分配方法和系统
WO2014071885A1 (zh) 一种信息配置方法、设备及系统
WO2014117524A1 (zh) Wlan接入网络中传递成对主密钥的方法和系统
WO2016112860A1 (zh) 无线设备的通讯方法、无线设备和服务器
JP6851480B2 (ja) 特に自動車環境における少なくとも1つのサービスを提供するための方法および装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13896024

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13896024

Country of ref document: EP

Kind code of ref document: A1