WO2016169232A1 - 一种d2d业务组播的认证方法、装置和系统 - Google Patents
一种d2d业务组播的认证方法、装置和系统 Download PDFInfo
- Publication number
- WO2016169232A1 WO2016169232A1 PCT/CN2015/092118 CN2015092118W WO2016169232A1 WO 2016169232 A1 WO2016169232 A1 WO 2016169232A1 CN 2015092118 W CN2015092118 W CN 2015092118W WO 2016169232 A1 WO2016169232 A1 WO 2016169232A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- group
- terminal
- key
- tmgi
- response message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
Definitions
- Embodiments of the present invention relate to, but are not limited to, the field of mobile communications, and in particular, to a method, an apparatus, and a system for authenticating D2D service multicast.
- Direct communication between devices in the vicinity using Device to Device can bring many benefits to the terminal, such as higher speed, lower latency and lower power consumption, and greatly improved.
- the radio resource efficiency of the operator, the D2D relay mode helps the operator to improve the wireless coverage; for the application, the proximity information in the D2D communication process can be used to develop a more attractive new service.
- the Public Safety system can also use D2D technology to enable communication between terminals without wireless coverage.
- FIG. 1 is a schematic diagram of a D2D Relay architecture related to 3GPP (3rd Generation Partnership Project) in the related art. As shown in FIG. 1 , the functions related to the network element are as follows:
- Remote terminal Also known as User Equipment (UE), the terminal is in the no-mobile signal coverage, supports D2D discovery and communication through the PC5 interface and other terminals, and the remote terminal can also perform through the Relay node and the network.
- UE User Equipment
- the node is a terminal, which is within the coverage of the mobile signal, and supports other remote terminals to communicate with the network through the terminal.
- the Relay node supports the Relay discovery broadcast, and the remote terminal selects the appropriate Relay node by reading the broadcast information and Communicate through the node and the network;
- Base station provides wireless coverage for the Relay node, and can also perform radio resource authorization and allocation for D2D discovery or communication during the relay node.
- eMBMS Evolution Multimedia Broadcast Multicast Service
- the base station The downlink data transmission by broadcasting is beneficial to save air interface resources, and the air interface between the base station and the terminal or the relay node is a Uu port;
- Core network mainly responsible for registration of Relay nodes, allocation of IP (Internet Protocol, network mutual The protocol and the bearer are established, and the Relay node communicates with the external network through the core network, and the interface between the base station and the core network is an S1 interface;
- Cluster communication server The main functions of the cluster service include the management of the cluster service group, call setup, release, and management.
- the UE and the cluster communication server are PC1 interfaces. The UE uses this interface to initiate registration with the cluster communication server and communicate with the cluster.
- the server obtains service-related information, and the UE also initiates a group call, a request right, and the like to the cluster communication server through the interface.
- the D2D service can provide the eMBMS multicast service to the remote terminal by using the relay node.
- the related process is shown in Figure 2, including:
- the remote terminal finds a relay node, and the application provides a TMGI (Temporary Mobile Group Identity) to the remote terminal, where the application is installed on the remote terminal and can interact with the cluster communication server;
- TMGI Temporal Mobile Group Identity
- the remote terminal sends a TMGI interception request message to the relay node, where the message includes a TMGI parameter.
- the relay node sends a TMGI interception response message to the remote terminal, where the message includes a ProSe (Proximity-based Services) layer 2 group identifier and a TMGI timer.
- ProSe Proximity-based Services
- the relay node listens to the TMGI broadcast.
- the relay node sends a TMGI notification message to the remote terminal, where the message includes a TMGI parameter.
- the remote terminal can receive the broadcast content by using a relay of the relay node.
- the D2D multicast mode is used for communication between the relay node and the remote terminal. This requires the relay node and the remote terminal to join the same D2D multicast group and obtain the group key of the group. However, the remote terminal does not have network coverage and cannot interact with the network to complete the process of joining the group and acquiring the group key, and thus cannot provide a secure eMBMS service.
- the embodiment of the invention provides a method, a device and a system for authenticating a D2D service multicast, which implements multicast authentication of a relay node to a remote terminal in a D2D service.
- the embodiment of the invention provides a device-to-device D2D service multicast authentication method, including:
- the terminal When the security capability of the terminal supports the security algorithm of the D2D group to be accessed, the terminal sends a key response message to the terminal, where the key response message carries the group key information of the D2D group.
- the method further includes: when the security capability of the terminal does not support the security algorithm of the D2D group to be accessed, sending a key response message to the terminal, where the key response message carries the failure identifier and the failure Reason information.
- the method further includes: interacting with the proximity-based service ProSe key management function entity to acquire group key information of the D2D group.
- the method before the receiving the key request message sent by the terminal, the method further includes:
- the group request message is sent to the ProSe function entity, and the ProSe function entity sends a group response message, where the group response message carries the ProSe function entity.
- the terminal allocates ProSe group information; and sends a TMGI interception response message to the terminal;
- TMGI snoop response message is sent to the terminal.
- the method further includes: sending a multimedia internet key MIKEY message to the terminal, where the MIKEY message is used to transmit the secret Key data.
- the key request message includes: a D2D group identifier to be accessed and a terminal security capability parameter; or includes a temporary mobility group identifier TMGI parameter and a terminal security capability parameter; or includes a D2D group identifier to be accessed, Terminal identification and terminal security capability parameters.
- the group key information includes: the D2D group member identifier, the ProSe group key PGK identifier, the PGK, and the security algorithm of the D2D group to be accessed; or the D2D group identifier to be accessed.
- the embodiment of the invention further provides a device-to-device D2D service multicast authentication method, including:
- the method before the sending the key request message to the relay node, the method further includes:
- the embodiment of the invention further provides a device-to-device D2D service multicast authentication device, which is set in the relay node, and includes:
- a first receiving module configured to receive a key request message sent by the terminal
- a verification module configured to verify the security capabilities of the terminal
- a first sending module configured to send a key response message to the terminal when the security capability of the terminal supports a security algorithm to be accessed by the D2D group, where the key response message carries the group secret of the D2D group Key information.
- the first sending module is further configured to: when the security capability of the terminal is not supported When the security algorithm of the D2D group is to be accessed, the key response message is sent to the terminal, where the key response message carries the failure identifier and the failure reason information.
- the device further includes an interaction module,
- the interaction module is configured to interact with the proximity-based service ProSe key management function entity to acquire group key information of the D2D group.
- the device further includes a determining module
- the first receiving module is further configured to receive a temporary mobile group identity TMGI listening request message sent by the terminal;
- the determining module is configured to determine, according to the TMGI listening request message, whether there is a ProSe group corresponding to the TMGI;
- the first sending module is further configured to send a group request message to the ProSe function entity when there is no ProSe group corresponding to the TMGI;
- the first receiving module is further configured to receive the group response message by the ProSe function entity, where the group response message carries the ProSe function entity to allocate ProSe group information to the terminal;
- the first sending module is further configured to send a TMGI snoop response message to the terminal.
- the first sending module is further configured to send a multimedia internet key MIKEY message to the terminal after sending the key response message to the terminal, where the MIKEY message is used to transmit the key data.
- the embodiment of the invention further provides a device-to-device D2D service multicast authentication device, which is set in the terminal, and includes:
- a second sending module configured to send a key request message to the relay node
- the second receiving module is configured to receive a key response message returned by the relay node, where the key response message carries group key information of the D2D group to be accessed.
- the second sending module is further configured to send a temporary mobile group identity TMGI listening request message to the relay node;
- the second receiving module is further configured to receive a TMGI interception response message returned by the relay node.
- the embodiment of the present invention further provides a device-to-device D2D service multicast authentication system, including the foregoing relay node and the foregoing terminal.
- the embodiment of the invention further provides a computer readable storage medium storing program instructions, which can be implemented when the program instructions are executed.
- the relay node has the function of the ProSe management function entity, or the terminal interacts with the ProSe key management function entity through the relay node, and allocates the D2D group key to the terminal, thereby realizing the use of the D2D relay node to provide security to the terminal.
- eMBMS multicast service This enhances the functionality and security of the ProSe system.
- 1 is a schematic diagram of a D2D service Relay architecture
- FIG. 2 is a flowchart of a related art for providing an eMBMS multicast service to a remote terminal by using a relay node;
- FIG. 3 is a basic flowchart of using the relay node to provide a secure eMBMS multicast service to a remote terminal according to an embodiment of the present invention
- FIG. 4 is a flowchart of a second embodiment of the present invention, which uses a relay node to provide a secure eMBMS multicast service to a remote terminal, and combines a listen request and a key request message;
- FIG. 5 is a flowchart of using the relay node to provide a secure eMBMS multicast service to a remote terminal, and using MIKEY to send parameters such as a PGK;
- FIG. 6 is a flow chart of the application of the ProSe key management function entity independently by using the relay node to provide a secure eMBMS multicast service to the remote terminal according to the fourth embodiment of the present invention
- FIG. 7 is a flowchart of a method for authenticating D2D service multicast on a relay node side according to an embodiment of the present invention
- FIG. 8 is a flowchart of a method for authenticating a D2D service multicast on a terminal side according to an embodiment of the present invention
- FIG. 9 is a schematic structural diagram of an apparatus for authenticating a D2D service multicast on a relay node side according to an embodiment of the present invention.
- FIG. 10 is a schematic structural diagram of an apparatus for authenticating a D2D service multicast on a terminal side according to an embodiment of the present invention.
- a method for authenticating a device to device D2D service multicast is applied to a relay node, including:
- the key response message is sent to the terminal, and the key response message carries the failure identifier and the failure reason information.
- the method further includes: interacting with the ProSe key management function entity to acquire group key information of the D2D group.
- the relay node performs multicast authentication to the terminal, and the relay node may have the function of the ProSe key management function entity, or the terminal interacts with the ProSe key management function entity through the relay node.
- the terminal requests a group key from the relay node for D2D multicast communication.
- the relay node receives eMBMS multicast and converts the content into D2D multicast transmission. It realizes the use of D2D relay nodes to provide secure eMBMS multicast services to remote terminals. This enhances the functionality and security of the ProSe system.
- Sa also includes:
- the group request message is sent to the ProSe function entity, and the ProSe function entity sends a group response message, where the group response message carries the ProSe function entity.
- the terminal allocates ProSe group information; sends the information to the terminal Send a TMGI listening response message;
- TMGI snoop response message is sent to the terminal.
- the method further includes: sending a multimedia internet key MIKEY message to the terminal, where the MIKEY message is used to transmit the key data.
- the key request message includes: a D2D group identifier to be accessed and a terminal security capability parameter;
- the group key information includes: the D2D group member identifier, a PGK (ProSe Group Key) identifier, PGK and security algorithm to be connected to the D2D group.
- PGK ProSe Group Key
- the group key information includes a D2D group identifier to be accessed, the D2D group member identifier, a PGK identifier, a PGK, and a to-be-accessed A security algorithm and a TMGI timer parameter of the D2D group; or a security algorithm including the D2D group member identifier, a PMK (ProSe MIKEY Key) identifier, a PMK, and a D2D group to be accessed.
- PMK ProSe MIKEY Key
- the key request message includes a D2D group identifier to be accessed, a terminal identifier, and a terminal security capability parameter; the group key information includes a terminal identifier, the D2D group member identifier, a PGK identifier, a PGK, and a D2D to be accessed. Group of security algorithms.
- the MIKEY message is defined by RFC (Remote Function Call) 3830.
- the MIKEY message can establish a secure connection between two entities for transmitting important data such as keys.
- PGK is the shared key of the ProSe group. The key encrypted in the MIKEY message.
- a method for authenticating a device to a device D2D service multicast is applied to a terminal, including:
- the key response message returned by the relay node is received, where the key response message carries group key information of the D2D group to be accessed.
- Sd before Sd, it also includes:
- the apparatus for device-to-device D2D service multicast authentication is configured in a relay node, and includes:
- the first receiving module 110 is configured to receive a key request message sent by the terminal;
- the verification module 120 is configured to verify the security capabilities of the terminal
- the first sending module 130 is configured to send a key response message to the terminal when the security capability of the terminal supports the security algorithm of the D2D group to be accessed, where the key response message carries the group of the D2D group Key information.
- the first sending module 130 is further configured to send a key response message to the terminal when the security capability of the terminal does not support the security algorithm of the D2D group to be accessed, where the key response message carries a failure identifier and a failure. Reason information.
- the foregoing authentication device further includes an interaction module 140, where the interaction module 140 is configured to interact with the ProSe key management function entity to acquire group key information of the D2D group.
- the foregoing authentication device further includes a determining module 150,
- the first receiving module 110 is further configured to receive a temporary mobile group identity TMGI listening request message sent by the terminal;
- the determining module 150 is configured to determine, according to the TMGI listening request message, whether there is a ProSe group corresponding to the TMGI;
- the first sending module 130 is further configured to: when there is no ProSe group corresponding to the TMGI, send a group request message to the ProSe function entity;
- the first receiving module 110 is further configured to receive the group response message by the ProSe function entity, where the group response message carries the ProSe function entity to allocate ProSe group information to the terminal;
- the first sending module 130 is further configured to send a TMGI interception response message to the terminal.
- the first sending module 130 is further configured to send a multimedia internet key MIKEY message to the terminal after sending the key response message to the terminal, where the MIKEY message is used to transmit the key data.
- the device-to-device D2D service multicast identification provided by the embodiment of the present invention is as shown in FIG.
- the card device, set in the terminal includes:
- the second sending module 210 is configured to send a key request message to the relay node
- the second receiving module 220 is configured to receive a key response message returned by the relay node, where the key response message carries group key information of the D2D group to be accessed.
- the second sending module 210 is further configured to send a temporary mobile group identity TMGI listening request message to the relay node;
- the second receiving module 220 is further configured to receive a TMGI snoop response message returned by the relay node.
- the embodiment of the invention further provides a device-to-device D2D service multicast authentication system, including the above-mentioned relay node and terminal.
- the remote terminal discovers the relay node, and the application provides the TMGI to the remote terminal.
- the remote terminal sends a TMGI interception request message to the relay node, where the message includes a TMGI parameter.
- the relay node sends a TMGI interception response message to the remote terminal, where the message includes parameters such as a ProSe layer 2 group identifier and a TMGI timer.
- the remote terminal sends a key request message to the relay node, where the message includes parameters such as a ProSe layer 2 group identifier and a terminal security capability.
- the relay node performs an algorithm check to determine whether the security capability of the remote terminal supports the group security algorithm.
- the relay node sends a key response message to the remote terminal, where the message includes a group member identifier, a PGK identifier, a PGK, and an algorithm.
- the relay node listens to the TMGI broadcast.
- the relay node sends a TMGI notification message to the remote terminal, where the message includes a TMGI parameter.
- the remote terminal can receive the broadcast content by using a relay of the relay node.
- the process of providing a secure eMBMS multicast service to a remote terminal by using a relay node the process of combining the interception request and the key request message is as follows:
- the remote terminal discovers the relay node, and the application provides the TMGI to the remote terminal.
- the remote terminal sends a TMGI interception and key request message to the relay node, where the message includes parameters such as a TMGI parameter and a terminal security capability.
- the relay node performs an algorithm check to determine whether the security capability of the remote terminal supports the group security algorithm.
- the relay node sends a TMGI snooping and key response message to the remote terminal, where the message includes parameters such as a ProSe layer 2 group identifier, a group member identifier, a PGK identifier, a PGK, an algorithm, and a TMGI timer.
- the relay node listens to the TMGI broadcast.
- the relay node sends a TMGI notification message to the remote terminal, where the message includes a TMGI parameter.
- the remote terminal can receive the broadcast content by using a relay of the relay node.
- the process of using the relay node to provide secure eMBMS multicast service to the remote terminal and using MIKEY to send parameters such as PGK is as follows:
- the remote terminal discovers the relay node, and the application provides the TMGI to the remote terminal.
- the remote terminal sends a TMGI interception request message to the relay node, where the message includes a TMGI parameter.
- the relay node sends a TMGI interception response message to the remote terminal, where the message includes parameters such as a ProSe layer 2 group identifier and a TMGI timer.
- the remote terminal sends a key request message to the relay node, where the message includes parameters such as a ProSe layer 2 group identifier and a terminal security capability.
- the relay node performs an algorithm check to determine whether the security capability of the remote terminal supports the group security algorithm.
- the relay node sends a key response message to the remote terminal, where the message includes a group member identifier, a PMK identifier, a PMK, and an algorithm.
- the relay node sends a parameter such as a PGK, a PGK identifier, and a timer to the remote terminal by using a MIKEY message.
- the relay node listens to the TMGI broadcast.
- the relay node sends a TMGI notification message to the remote terminal, where the message includes a TMGI parameter.
- the remote terminal can receive the broadcast content by using a relay of the relay node.
- the relay node provides a secure eMBMS multicast service to the remote terminal, and the process of independently setting the ProSe key management function entity is as follows:
- the remote terminal discovers the relay node, and the application provides the TMGI to the remote terminal;
- the remote terminal sends a TMGI interception request message to the relay node, where the message includes parameters such as a terminal identifier and a TMGI.
- the relay node checks whether there is a ProSe group corresponding to the TMGI, or whether there is an allocated ProSe group that has not been used yet. If yes, go to step 605; if not, go to step 603;
- the relay node sends a group request message to the ProSe function entity, where the message includes a relay node terminal identifier and a far terminal terminal identifier.
- the ProSe function entity allocates a ProSe group to the relay node and the remote terminal, and the ProSe key management function entity generates a PGK for the group; the ProSe function entity sends a group response message to the relay node in the message.
- the ProSe function entity includes ProSe layer 2 group identification parameters;
- the relay node sends a TMGI interception response message to the remote terminal, where the message includes parameters such as a ProSe layer 2 group identifier and a TMGI timer.
- the remote terminal sends a key request message to the ProSe key management function entity by using the relay node, where the message includes parameters such as a ProSe layer 2 group identifier, a terminal identifier, and a terminal security capability.
- the ProSe key management function entity performs an algorithm check to determine whether the security capability of the remote terminal supports the group security algorithm.
- the ProSe key management function entity sends a key response message to the remote terminal by using the relay node, where the message includes a terminal identifier, a group member identifier, a PGK identifier, a PGK, and an algorithm of the far terminal.
- the relay node listens to the TMGI broadcast.
- the relay node sends a TMGI notification message to the remote terminal, where the message includes a TMGI parameter.
- the remote terminal can receive the broadcast content by using a relay of the relay node.
- the relay node has the function of the ProSe management function entity, or the terminal interacts with the ProSe key management function entity through the relay node, and allocates the D2D group key to the terminal, thereby realizing the use of the D2D relay node to provide secure eMBMS multicast to the terminal. business. This enhances the functionality and security of the ProSe system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例公布了一种D2D业务组播的认证方法、装置和系统,所述的认证方法包括:接收终端发送的密钥请求消息;对所述终端的安全能力进行验证;当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
Description
本发明实施例涉及但不限于移动通信领域,尤其涉及一种D2D业务组播的认证方法、装置和系统。
临近区域的终端利用设备到设备(Device to Device,简称为D2D)直接通信能够给终端带来很多好处,比如更高的速率,更低的延迟以及更小的功耗,同时也极大地提高了运营商的无线资源效率,D2D的中继(Relay)模式有利于运营商提高无线覆盖;对于应用来说利用D2D通讯过程中的临近信息可以开发出更加吸引人的新业务。公共安全(Public Safety)系统也可以利用D2D技术实现没有无线覆盖的情况下终端之间的通讯。
图1是相关技术中与3GPP(3rd Generation Partnership Project,第三代合作伙伴计划)相关的D2D Relay架构示意图,如图1所示,涉及网元的功能说明如下:
远终端:也称为用户设备(User Equipment,简称为UE),该终端处于无移动信号覆盖之内,支持通过PC5接口和其他终端进行D2D发现和通信,远终端也可以通过Relay节点和网络进行通信;
Relay节点:该节点是一个终端,处于有移动信号覆盖之内,支持其他远终端通过该终端和网络通信,Relay节点支持Relay发现广播,远终端通过读取该广播信息,选择合适的Relay节点并通过该节点和网络进行通信;
基站:为Relay节点提供无线覆盖,也可以为Relay节点进行D2D发现或者通信时候进行无线资源授权和分配,在进行eMBMS(Evolved Multimedia Broadcast Multicast Service,增强型多媒体广播多播业务)广播的时候,基站通过广播进行下行数据发送,有利于节约空口资源,基站和终端或中继节点之间的空中接口为Uu口;
核心网:主要负责Relay节点的注册、分配IP(Internet Protocol,网络互
连协议)地址以及承载建立,Relay节点通过核心网和外部网络进行通信,基站和核心网之间接口为S1接口;
集群通信服务器:集群服务主要功能包括集群业务组的管理、呼叫建立、释放和管理等功能,UE和集群通信服务器之间为PC1接口,UE利用该接口向集群通信服务器发起注册,并从集群通信服务器获得业务相关信息,UE也通过该接口向集群通信服务器发起组呼叫、请求话权等功能。
D2D业务可以利用中继节点向远终端提供eMBMS组播业务,相关的流程如图2所示,包括:
201,远终端发现中继节点,应用向远终端提供TMGI(Temporary Mobile Group Identity,临时移动组标识),其中所述应用安装远终端上,可以跟集群通信服务器交互;
202,远终端向中继节点发送TMGI监听请求消息,消息中包括TMGI参数;
203,中继节点向远终端回送TMGI监听响应消息,消息中包括ProSe(Proximity-based Services,基于邻近的业务)层2组标识和TMGI定时器等参数;
204,中继节点监听到TMGI广播;
205,中继节点向远终端发送TMGI通知消息,消息中包括TMGI参数;
206,远终端可以通过中继节点的中继接收广播内容。
在以上的流程中,中继节点和远终端之间使用D2D组播方式进行通讯,这要求中继节点和远终端加入同一个D2D组播组,并获取该组的群组密钥。但是,远终端没有网络覆盖,无法跟网络交互完成加入群组和获取群组密钥的过程,因此无法提供安全的eMBMS业务。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供一种D2D业务组播的认证方法、装置和系统,实现在D2D业务中中继节点向远终端进行组播的认证。
本发明实施例提供了一种设备到设备D2D业务组播的认证方法,包括:
接收终端发送的密钥请求消息;
对所述终端的安全能力进行验证;
当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
可选地,所述方法还包括:当所述终端的安全能力不支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
可选地,所述接收终端发送的密钥请求消息之后,所述方法还包括:与基于邻近的业务ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
可选地,所述接收终端发送的密钥请求消息之前,所述方法还包括:
接收所述终端发送的临时移动组标识TMGI监听请求消息;
根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;
当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;并接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;向所述终端发送TMGI监听响应消息;
当存在与所述TMGI对应的ProSe组时,向所述终端发送TMGI监听响应消息。
可选地,所述向所述终端发送密钥响应消息之后,所述方法还包括:向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密
钥数据。
可选地,其中,所述密钥请求消息包括:待接入D2D组标识和终端安全能力参数;或者包括临时移动组标识TMGI参数和终端安全能力参数;或者包括待接入D2D组标识、所述终端标识和终端安全能力参数。
可选地,其中,所述群组密钥信息包括:所述D2D组成员标识、ProSe组密钥PGK标识、PGK和待接入D2D组的安全算法;或者包括待接入D2D组标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法和TMGI定时器参数;或者包括所述D2D组成员标识、ProSe多媒体互联网密钥PMK标识、PMK和待接入D2D组的安全算法;或者包括所述终端标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法。
本发明实施例还提供一种设备到设备D2D业务组播的认证方法,包括:
向中继节点发送密钥请求消息;
接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
可选地,所述向中继节点发送密钥请求消息之前,所述方法还包括:
向所述中继节点发送临时移动组标识TMGI监听请求消息;
接收所述中继节点返回的TMGI监听响应消息。
本发明实施例还提供一种设备到设备D2D业务组播的认证装置,设置在中继节点,包括:
第一接收模块,设置为接收终端发送的密钥请求消息;
验证模块,设置为对所述终端的安全能力进行验证;以及
第一发送模块,设置为当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
可选地,其中,所述第一发送模块还设置为当所述终端的安全能力不支
持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
可选地,所述装置还包括交互模块,
所述交互模块,设置为与基于邻近的业务ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
可选地,所述装置还包括确定模块,
所述第一接收模块,还设置为接收所述终端发送的临时移动组标识TMGI监听请求消息;
所述确定模块,设置为根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;
所述第一发送模块,还设置为当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;
所述第一接收模块,还设置为接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;
所述第一发送模块,还设置为向所述终端发送TMGI监听响应消息。
可选地,其中,所述第一发送模块,还设置为向所述终端发送密钥响应消息之后,向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密钥数据。
本发明实施例还提供一种设备到设备D2D业务组播的认证装置,设置在终端,包括:
第二发送模块,设置为向中继节点发送密钥请求消息;以及
第二接收模块,设置为接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
可选地,其中,所述第二发送模块,还设置为向所述中继节点发送临时移动组标识TMGI监听请求消息;
所述第二接收模块,还设置为接收所述中继节点返回的TMGI监听响应消息。
本发明实施例还提供一种设备到设备D2D业务组播的认证系统,包括上述的中继节点和上述的终端。
本发明实施例还提供一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现上述方法。
本发明实施例通过中继节点具有ProSe管理功能实体的功能,或者终端通过中继节点与ProSe密钥管理功能实体交互,向终端分配D2D组密钥,实现了使用D2D中继节点向终端提供安全的eMBMS组播业务。由此增强了ProSe系统功能和安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1是D2D业务Relay架构示意图;
图2是相关技术利用中继节点向远终端提供eMBMS组播业务的流程图;
图3是本发明应用实施例一利用中继节点向远终端提供安全的eMBMS组播业务的基本流程图;
图4是本发明应用实施例二利用中继节点向远终端提供安全的eMBMS组播业务,合并监听请求和密钥请求消息的流程图;
图5是本发明应用实施例三利用中继节点向远终端提供安全的eMBMS组播业务,使用MIKEY发送PGK等参数的流程图;
图6是本发明应用实施例四利用中继节点向远终端提供安全的eMBMS组播业务,ProSe密钥管理功能实体独立设置的流程图;
图7是本发明实施例中继节点侧D2D业务组播的认证方法的流程图;
图8是本发明实施例终端侧D2D业务组播的认证方法的流程图;
图9本发明实施例中继节点侧D2D业务组播的认证装置的结构示意图;
图10是本发明实施例终端侧D2D业务组播的认证装置的结构示意图。
下面结合附图对本发明实施例进行说明,需要说明的是,在不冲突的情况下,本申请中的实施例和实施例中的特征可以相互任意组合。
如图7所示,本发明实施例提供的一种设备到设备D2D业务组播的认证方法,应用于中继节点,包括:
Sa、接收终端发送的密钥请求消息;
Sb、对所述终端的安全能力进行验证;
Sc、当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
Sc中如果所述终端的安全能力不支持待接入D2D组的安全算法,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
可选地,Sa之后还包括:与ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
在D2D业务中中继节点向终端进行组播的认证,中继节点可具有ProSe密钥管理功能实体的功能,或者终端通过中继节点与ProSe密钥管理功能实体交互。终端向中继节点请求组密钥,用于D2D组播通讯。中继节点接收eMBMS组播,将内容转换为D2D组播发送。实现了使用D2D中继节点向远终端提供安全的eMBMS组播业务。由此增强了ProSe系统功能和安全性。
可选地,Sa之前还包括:
接收所述终端发送的临时移动组标识TMGI监听请求消息;
根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;
当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;并接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;向所述终端发
送TMGI监听响应消息;
当存在与所述TMGI对应的ProSe组时,向所述终端发送TMGI监听响应消息。
可选地,Sc之后还包括:向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密钥数据。
当所述密钥请求消息包括:待接入D2D组标识和终端安全能力参数;所述群组密钥信息包括:所述D2D组成员标识、PGK(ProSe Group Key,ProSe组密钥)标识、PGK和待接入D2D组的安全算法。
当所述密钥请求消息包括临时移动组标识TMGI参数和终端安全能力参数;所述群组密钥信息包括待接入D2D组标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法和TMGI定时器参数;或者包括所述D2D组成员标识、PMK(ProSe MIKEY Key,ProSe多媒体互联网密钥)标识、PMK和待接入D2D组的安全算法。
当所述密钥请求消息包括待接入D2D组标识、终端标识和终端安全能力参数;所述群组密钥信息包括终端标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法。
其中,MIKEY消息由RFC(Remote Function Call,远程函数调用)3830定义,MIKEY消息可以在两个实体间建立安全连接,用于传送密钥等重要数据,PGK为ProSe组的共享密钥,PMK用于MIKEY消息加密的密钥。
如图8所示,本发明实施例提供的一种设备到设备D2D业务组播的认证方法,应用于终端,包括:
Sd、向中继节点发送密钥请求消息;
Se、接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
可选地,Sd之前还包括:
向所述中继节点发送临时移动组标识TMGI监听请求消息;
接收所述中继节点返回的TMGI监听响应消息。
如图9所示,本发明实施例提供的一种设备到设备D2D业务组播的认证装置,设置在中继节点,包括:
第一接收模块110,设置为接收终端发送的密钥请求消息;
验证模块120,设置为对所述终端的安全能力进行验证;以及
第一发送模块130,设置为当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
所述第一发送模块130还设置为当所述终端的安全能力不支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
可选地,上述认证装置还包括交互模块140,所述交互模块140,设置为与ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
可选地,上述认证装置还包括确定模块150,
所述第一接收模块110,还设置为接收所述终端发送的临时移动组标识TMGI监听请求消息;
所述确定模块150,设置为根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;
所述第一发送模块130,还设置为当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;
所述第一接收模块110,还设置为接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;
所述第一发送模块130,还设置为向所述终端发送TMGI监听响应消息。
可选地,所述第一发送模块130,还设置为向所述终端发送密钥响应消息之后,向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密钥数据。
如图10所示、本发明实施例提供的一种设备到设备D2D业务组播的认
证装置,设置在终端,包括:
第二发送模块210,设置为向中继节点发送密钥请求消息;以及
第二接收模块220,设置为接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
可选地,所述第二发送模块210,还设置为向所述中继节点发送临时移动组标识TMGI监听请求消息;
所述第二接收模块220,还设置为接收所述中继节点返回的TMGI监听响应消息。
本发明实施例还提供一种设备到设备D2D业务组播的认证系统,包括上述的中继节点和终端。
应用实施例一:
如图3所示,利用中继节点向远终端提供安全的eMBMS组播业务的基本流程如下所示:
301,远终端发现中继节点,应用向远终端提供TMGI;
302,远终端向中继节点发送TMGI监听请求消息,消息中包括TMGI参数;
303,中继节点向远终端回送TMGI监听响应消息,消息中包括ProSe层2组标识和TMGI定时器等参数;
304,远终端向中继节点发送密钥请求消息,消息中包括ProSe层2组标识和终端安全能力等参数;
305,中继节点进行算法检查,确定远终端的安全能力是否支持组安全算法;
306,中继节点向远终端回送密钥响应消息,消息中包括组成员标识、PGK标识、PGK和算法等参数;
307,中继节点监听到TMGI广播;
308,中继节点向远终端发送TMGI通知消息,消息中包括TMGI参数;
309,远终端可以通过中继节点的中继接收广播内容。
应用实施例二:
如图4所示,利用中继节点向远终端提供安全的eMBMS组播业务,合并监听请求和密钥请求消息的流程如下所示:
401,远终端发现中继节点,应用向远终端提供TMGI;
402,远终端向中继节点发送TMGI监听与密钥请求消息,消息中包括TMGI参数和终端安全能力等参数;
403,中继节点进行算法检查,确定远终端的安全能力是否支持组安全算法;
404,中继节点向远终端回送TMGI监听与密钥响应消息,消息中包括ProSe层2组标识、组成员标识、PGK标识、PGK、算法和TMGI定时器等参数;
405,中继节点监听到TMGI广播;
406,中继节点向远终端发送TMGI通知消息,消息中包括TMGI参数;
407,远终端可以通过中继节点的中继接收广播内容。
应用实施例三:
如图5所示,利用中继节点向远终端提供安全的eMBMS组播业务,使用MIKEY发送PGK等参数的流程如下所示:
501,远终端发现中继节点,应用向远终端提供TMGI;
502,远终端向中继节点发送TMGI监听请求消息,消息中包括TMGI参数;
503,中继节点向远终端回送TMGI监听响应消息,消息中包括ProSe层2组标识和TMGI定时器等参数;
504,远终端向中继节点发送密钥请求消息,消息中包括ProSe层2组标识和终端安全能力等参数;
505,中继节点进行算法检查,确定远终端的安全能力是否支持组安全算法;
506,中继节点向远终端回送密钥响应消息,消息中包括组成员标识、PMK标识、PMK和算法等参数;
507,中继节点使用MIKEY消息向远终端发送PGK、PGK标识和定时器等参数;
508,中继节点监听到TMGI广播;
509,中继节点向远终端发送TMGI通知消息,消息中包括TMGI参数;
510,远终端可以通过中继节点的中继接收广播内容。
应用实施例四:
如图6所示,利用中继节点向远终端提供安全的eMBMS组播业务,ProSe密钥管理功能实体独立设置的流程如下所示:
601,远终端发现中继节点,应用向远终端提供TMGI;
602,远终端向中继节点发送TMGI监听请求消息,消息中包括终端标识和TMGI等参数;中继节点检查是否存在与该TMGI对应的ProSe组,或是否存在已分配而尚未使用的ProSe组,如有,则转至步骤605;如无,则转至步骤603;
603,可选地,中继节点向ProSe功能实体发送群组请求消息,消息中包括中继节点终端标识和远终端终端标识;
604,可选地,ProSe功能实体为该中继节点和远终端分配ProSe群组,ProSe密钥管理功能实体为该群组生成PGK;ProSe功能实体向中继节点回送群组响应消息,消息中包括ProSe层2组标识参数;
605,中继节点向远终端回送TMGI监听响应消息,消息中包括ProSe层2组标识和TMGI定时器等参数;
604,远终端向通过中继节点向ProSe密钥管理功能实体发送密钥请求消息,消息中包括ProSe层2组标识、终端标识和终端安全能力等参数;
605,ProSe密钥管理功能实体进行算法检查,确定远终端的安全能力是否支持组安全算法;
606,ProSe密钥管理功能实体通过中继节点向远终端回送密钥响应消息,消息中包括远终端的终端标识、组成员标识、PGK标识、PGK和算法等参数;
607,中继节点监听到TMGI广播;
608,中继节点向远终端发送TMGI通知消息,消息中包括TMGI参数;
609,远终端可以通过中继节点的中继接收广播内容。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,上述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本发明实施例不限制于任何特定形式的硬件和软件的结合。
虽然所揭示的实施方式如上,但只是为了便于理解本发明技术方案而采用的实施方式,并非用于限定本发明。
通过中继节点具有ProSe管理功能实体的功能,或者终端通过中继节点与ProSe密钥管理功能实体交互,向终端分配D2D组密钥,实现了使用D2D中继节点向终端提供安全的eMBMS组播业务。由此增强了ProSe系统功能和安全性。
Claims (19)
- 一种设备到设备D2D业务组播的认证方法,包括:接收终端发送的密钥请求消息;对所述终端的安全能力进行验证;当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
- 如权利要求1所述的方法,所述方法还包括:当所述终端的安全能力不支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
- 如权利要求1所述的方法,所述接收终端发送的密钥请求消息之后,所述方法还包括:与基于邻近的业务ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
- 如权利要求3所述的方法,所述接收终端发送的密钥请求消息之前,所述方法还包括:接收所述终端发送的临时移动组标识TMGI监听请求消息;根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;并接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;向所述终端发送TMGI监听响应消息;当存在与所述TMGI对应的ProSe组时,向所述终端发送TMGI监听响应消息。
- 如权利要求1所述的方法,所述向所述终端发送密钥响应消息之后,所述方法还包括:向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密钥数据。
- 如权利要求1所述的方法,其中:所述密钥请求消息包括:待接入 D2D组标识和终端安全能力参数;或者包括临时移动组标识TMGI参数和终端安全能力参数;或者包括待接入D2D组标识、所述终端标识和终端安全能力参数。
- 如权利要求1所述的方法,其中:所述群组密钥信息包括:所述D2D组成员标识、ProSe组密钥PGK标识、PGK和待接入D2D组的安全算法;或者包括待接入D2D组标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法和TMGI定时器参数;或者包括所述D2D组成员标识、ProSe多媒体互联网密钥PMK标识、PMK和待接入D2D组的安全算法;或者包括所述终端标识、所述D2D组成员标识、PGK标识、PGK、待接入D2D组的安全算法。
- 一种设备到设备D2D业务组播的认证方法,包括:向中继节点发送密钥请求消息;接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
- 如权利要求8所述的方法,所述向中继节点发送密钥请求消息之前,所述方法还包括:向所述中继节点发送临时移动组标识TMGI监听请求消息;接收所述中继节点返回的TMGI监听响应消息。
- 一种设备到设备D2D业务组播的认证装置,其特征在于,设置在中继节点,包括:第一接收模块,设置为接收终端发送的密钥请求消息;验证模块,设置为对所述终端的安全能力进行验证;以及第一发送模块,设置为当所述终端的安全能力支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带所述D2D组的群组密钥信息。
- 如权利要求10所述的装置,其中:所述第一发送模块还设置为当所述终端的安全能力不支持待接入D2D组的安全算法时,向所述终端发送密钥响应消息,所述密钥响应消息携带失败标识和失败原因信息。
- 如权利要求10所述的装置,所述装置还包括交互模块,所述交互模块,设置为与基于邻近的业务ProSe密钥管理功能实体交互,获取所述D2D组的群组密钥信息。
- 如权利要求12所述的装置,所述装置还包括确定模块,所述第一接收模块,还设置为接收所述终端发送的临时移动组标识TMGI监听请求消息;所述确定模块,设置为根据所述TMGI监听请求消息确定是否存在与所述TMGI对应的ProSe组;所述第一发送模块,还设置为当不存在与所述TMGI对应的ProSe组时,向ProSe功能实体发送群组请求消息;所述第一接收模块,还设置为接收所述ProSe功能实体发送群组响应消息,所述群组响应消息中携带所述ProSe功能实体为所述终端分配ProSe组信息;所述第一发送模块,还设置为向所述终端发送TMGI监听响应消息。
- 如权利要求10所述的装置,其中:所述第一发送模块,还设置为向所述终端发送密钥响应消息之后,向所述终端发送多媒体互联网密钥MIKEY消息,所述MIKEY消息用于传送密钥数据。
- 一种设备到设备D2D业务组播的认证装置,其特征在于,设置在终端,包括:第二发送模块,设置为向中继节点发送密钥请求消息;以及第二接收模块,设置为接收所述中继节点返回的密钥响应消息,所述密钥响应消息携带待接入D2D组的群组密钥信息。
- 如权利要求15所述的装置,其中:所述第二发送模块,还设置为向所述中继节点发送临时移动组标识TMGI监听请求消息;所述第二接收模块,还设置为接收所述中继节点返回的TMGI监听响应消息。
- 一种设备到设备D2D业务组播的认证系统,包括权利要求10至14任一所述的中继节点和权利要求15至16任一所述的终端。
- 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求1-7任一项所述的方法。
- 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求8-9任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510196876.2 | 2015-04-23 | ||
CN201510196876.2A CN106162618A (zh) | 2015-04-23 | 2015-04-23 | 一种d2d业务组播的认证方法、装置和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016169232A1 true WO2016169232A1 (zh) | 2016-10-27 |
Family
ID=57143654
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/092118 WO2016169232A1 (zh) | 2015-04-23 | 2015-10-16 | 一种d2d业务组播的认证方法、装置和系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106162618A (zh) |
WO (1) | WO2016169232A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210051005A1 (en) * | 2019-08-16 | 2021-02-18 | Lenovo (Singapore) Pte. Ltd. | Security capabilities in an encryption key request |
CN115250450A (zh) * | 2021-04-28 | 2022-10-28 | 大唐移动通信设备有限公司 | 一种获取组通信密钥的方法及设备 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112019489B (zh) * | 2019-05-31 | 2022-03-04 | 华为技术有限公司 | 验证方法及装置 |
CN114339622B (zh) * | 2020-09-29 | 2022-09-23 | 大唐移动通信设备有限公司 | 一种ProSe通信组的通信方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984699A (zh) * | 2012-12-03 | 2013-03-20 | 中国联合网络通信集团有限公司 | D2d通信数据处理方法、设备和系统 |
CN103297961A (zh) * | 2012-03-05 | 2013-09-11 | 上海贝尔股份有限公司 | 一种用于设备间安全通信的设备与系统 |
CN103959739A (zh) * | 2011-12-19 | 2014-07-30 | 美国博通公司 | 无线通信系统和方法 |
WO2014126386A1 (en) * | 2013-02-13 | 2014-08-21 | Samsung Electronics Co., Ltd. | Method and apparatus for performing initial entry for device-to-device communication in a wireless communication system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771659B (zh) * | 2008-11-20 | 2013-06-12 | 华为终端有限公司 | 一种安全切换配置方法、系统和设备 |
CN101917272B (zh) * | 2010-08-12 | 2012-07-18 | 西安西电捷通无线网络通信股份有限公司 | 一种邻居用户终端间保密通信方法及系统 |
CN102833742B (zh) * | 2011-06-17 | 2016-03-30 | 华为技术有限公司 | 机器类通信设备组算法的协商方法和设备 |
US9332400B2 (en) * | 2012-03-16 | 2016-05-03 | Kyocera Corporation | Multimedia broadcast multicast service (MBMS) frequency prioritization |
-
2015
- 2015-04-23 CN CN201510196876.2A patent/CN106162618A/zh not_active Withdrawn
- 2015-10-16 WO PCT/CN2015/092118 patent/WO2016169232A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103959739A (zh) * | 2011-12-19 | 2014-07-30 | 美国博通公司 | 无线通信系统和方法 |
CN103297961A (zh) * | 2012-03-05 | 2013-09-11 | 上海贝尔股份有限公司 | 一种用于设备间安全通信的设备与系统 |
CN102984699A (zh) * | 2012-12-03 | 2013-03-20 | 中国联合网络通信集团有限公司 | D2d通信数据处理方法、设备和系统 |
WO2014126386A1 (en) * | 2013-02-13 | 2014-08-21 | Samsung Electronics Co., Ltd. | Method and apparatus for performing initial entry for device-to-device communication in a wireless communication system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210051005A1 (en) * | 2019-08-16 | 2021-02-18 | Lenovo (Singapore) Pte. Ltd. | Security capabilities in an encryption key request |
US11863665B2 (en) * | 2019-08-16 | 2024-01-02 | Lenovo (Singapore) Pte. Ltd. | Security capabilities in an encryption key request |
CN115250450A (zh) * | 2021-04-28 | 2022-10-28 | 大唐移动通信设备有限公司 | 一种获取组通信密钥的方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN106162618A (zh) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11627515B2 (en) | Method for supporting lawful interception of remote ProSe UE in network | |
US20240314112A1 (en) | Authentication and authorization in proximity based service communication using a group key | |
US10362451B2 (en) | Methods, devices, and computer program products for facilitating device-to-device communication among wireless communication devices | |
US20240224036A1 (en) | Secure group creation in proximity based service communication | |
US8441974B2 (en) | Method of providing multicast broadcast service | |
EP2982084B1 (en) | Method and apparatus for routing proximity-based service message in wireless communication system | |
WO2015131831A1 (zh) | 一种通信的方法和设备 | |
WO2014040506A1 (zh) | 终端的发现、发现处理方法及装置 | |
KR20210024985A (ko) | 무선 네트워크에서 IAB(Integrated Access and Backhaul) 노드의 인증을 위한 방법 및 장치 | |
CN104662997A (zh) | 用于缺乏网络覆盖的情况下的设备到设备通信的系统和方法 | |
CN108307391B (zh) | 一种终端接入方法和系统 | |
WO2022079572A1 (en) | Relay ue and remote ue authorization | |
WO2016169232A1 (zh) | 一种d2d业务组播的认证方法、装置和系统 | |
WO2014166440A1 (zh) | 集群中继方法、装置、系统及存储介质 | |
JP2017528074A5 (zh) | ||
WO2015149463A1 (zh) | D2d发现的处理方法及装置 | |
WO2022175538A1 (en) | A method for operating a cellular network | |
WO2014117662A1 (zh) | 一种集群业务控制方法及网络侧设备及用户设备 | |
WO2014056377A1 (zh) | D2d的通信处理、通信方法及装置 | |
WO2014172836A1 (zh) | 接入网络的方法、装置及网络系统 | |
WO2010124569A1 (zh) | 用户接入控制方法和系统 | |
WO2016134543A1 (zh) | 一种小区接入方法、汇聚终端和接入终端 | |
WO2014047923A1 (zh) | 接入网络的方法和装置 | |
WO2016062000A1 (zh) | 设备到设备限制发现业务广播、监听方法、装置及系统 | |
WO2016112496A1 (zh) | 一种集群业务的处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15889715 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15889715 Country of ref document: EP Kind code of ref document: A1 |