WO2017024579A1 - 一种消息保护的方法、相关设备以及系统 - Google Patents

一种消息保护的方法、相关设备以及系统 Download PDF

Info

Publication number
WO2017024579A1
WO2017024579A1 PCT/CN2015/086836 CN2015086836W WO2017024579A1 WO 2017024579 A1 WO2017024579 A1 WO 2017024579A1 CN 2015086836 W CN2015086836 W CN 2015086836W WO 2017024579 A1 WO2017024579 A1 WO 2017024579A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
algorithm
protocol layer
authentication
sgsn
Prior art date
Application number
PCT/CN2015/086836
Other languages
English (en)
French (fr)
Inventor
应江威
张丽佳
陈璟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2015/086836 priority Critical patent/WO2017024579A1/zh
Priority to CA2995514A priority patent/CA2995514C/en
Priority to CN201580024607.6A priority patent/CN106797562B/zh
Priority to RU2018108240A priority patent/RU2697645C1/ru
Priority to KR1020187006884A priority patent/KR102024331B1/ko
Priority to JP2018506905A priority patent/JP6548348B2/ja
Priority to EP15900777.2A priority patent/EP3328107B1/en
Publication of WO2017024579A1 publication Critical patent/WO2017024579A1/zh
Priority to US15/892,488 priority patent/US20180167807A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to the field of communications, and in particular, to a message protection method, related device, and system.
  • the user equipment (English full name: User Equipment, English abbreviation: UE) in the cellular Internet of Things (English full name: Internet of Things, English abbreviation: IoT) has the characteristics of small data volume and low transmission data frequency.
  • UE User Equipment
  • IoT Internet of Things
  • the security of the general packet radio service technology (English name: General Packet Radio Service, English abbreviation: GPRS) is considered to ensure the security of the cellular IoT communication.
  • the method includes: enhancing one-way authentication algorithm negotiation between the UE and the network side (English full name: Authentication Key Agreement, ABR) to two-way authentication; generating an integrity protection key to protect the UE and the serving GPRS support node ( English full name: Serving GPRS Support Node, English abbreviation: SGSN) Signaling security.
  • FIG. 1 is a schematic diagram of a GPRS-based integrity signaling protection process in the prior art, where authentication and key agreement are implemented in a process, and authentication and keys are required according to security requirements.
  • the negotiation request message is protected by an IoT integrity protection key (English name: Session key of Gb based cellular IOT for integrity protection, English abbreviation: Kti) and an integrity protection algorithm.
  • the UE receives the authentication and key agreement request message and performs integrity verification on the message. After the verification succeeds, the UE and the SGSN respectively perform encryption protection on the data plane and encryption and integrity protection on the signaling plane.
  • the UE When the UE receives the authentication and key association sent by the SGSN on the LLC protocol layer
  • the UE When the message is requested by the UE, the UE has not obtained the key and algorithm from the GMM/SM protocol layer, and thus the integrity of the authentication and key agreement request message cannot be verified, so that the prior art lacks a supportable implementation solution. , resulting in operational difficulties in practical applications.
  • the embodiment of the invention provides a message protection method, a related device and a system, which can be supported in practical applications, thereby improving the security of the solution and preventing an attacker from degrading the algorithm.
  • the first aspect of the present invention provides a method for message protection, including:
  • the user equipment UE receives the authentication and key agreement request message sent by the serving GPRS support node SGSN through the GPRS mobility management GMM/session management SM protocol layer of the UE, where the authentication and key agreement request message carries the first message verification. a code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the UE acquires the first algorithm identifier according to the authentication and key agreement request message on the GMM/SM protocol layer of the UE, and generates a first key;
  • the UE verifies the first message verification code on the GMM/SM protocol layer of the UE according to the first key and the first algorithm;
  • the UE determines that the first message verification code is verified, generating an authentication and a key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm,
  • the authentication and key agreement response message carries a second message verification code.
  • the UE sends the authentication and key agreement response message to the SGSN by using the GMM/SM protocol layer of the UE, so that the SGSN verifies the second message verification code.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the method further includes:
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the authentication and key agreement response message on the GMM/SM protocol layer of the UE. Encryption;
  • the UE uses the first integrity key and the first integrity protection algorithm to identify the indicated first integrity protection algorithm, and the authentication and key are performed on the GMM/SM protocol layer of the UE.
  • Negotiate response messages for integrity protection
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the authentication and key agreement response message on the GMM/SM protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, the authentication on the GMM/SM protocol layer of the UE And the key negotiation response message for integrity protection.
  • the UE receives an SGSN by using a GMM/SM protocol layer of the UE.
  • the method further includes:
  • the UE sends an attach request message to the GMM/SM protocol layer of the SGSN by using the GMM/SM protocol layer of the UE, where the attach request message carries the identifier of the UE and the network capability information of the UE, And causing the SGSN to generate the authentication and key agreement request message on the GMM/SM protocol layer of the SGSN according to the attach request message.
  • the UE passes the GMM/SM protocol layer of the UE. After the sending the authentication and key agreement response message to the SGSN, the method further includes:
  • the UE sends the first key and the first algorithm identifier to a logical link control LLC protocol layer of the UE by using a GMM/SM protocol layer of the UE.
  • the method further includes :
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier;
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the user plane data and the control plane information on an LLC protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, the control plane is on the LLC protocol layer of the UE Signaling for integrity protection.
  • a second aspect of the present invention provides a method for message protection, including:
  • the serving GPRS support node SGSN obtains the second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm;
  • the SGSN generates an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm, and sends the authentication and key agreement request message to The user equipment UE, the authentication and key agreement request message carries a first message verification code and a second algorithm identifier;
  • the SGSN receives the authentication and key agreement response message sent by the UE by using the GMM/SM protocol layer of the SGSN, where the authentication and key agreement response message carries a second message verification code;
  • the SGSN verifies the second message verification code on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm.
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key
  • the second algorithm includes the second integrity guarantee Protection algorithm
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the method further includes:
  • the SGSN receives an attach request message sent by the UE by using a GMM/SM protocol layer of the SGSN, where the attach request message carries an identifier of the UE and network capability information of the UE;
  • the SGSN obtains the second algorithm identifier on the GMM/SM protocol layer of the SGSN, and generates a second key, including:
  • the SGSN acquires the second algorithm according to network capability information of the UE;
  • the SGSN acquires authentication vector information of the UE according to the identifier of the UE, and generates the second key according to the authentication vector information.
  • the SGSN uses the second key and the second The method, after verifying the second message verification code on the GMM/SM protocol layer of the SGSN, the method further includes:
  • the SGSN determines that the second message verification code passes, transmitting, by the GMM/SM protocol layer of the SGSN, the second key and the second algorithm to a logical link control LLC protocol layer of the SGSN. logo.
  • the GMM/ of the SGSN is adopted. After the SM protocol layer sends the second key and the second algorithm identifier to the logical link control LLC protocol layer of the SGSN, the method further includes:
  • the SGSN uses the second encryption key and the second encryption algorithm to identify the second encryption algorithm indicated, and the user plane data and the control surface information on the LLC protocol layer of the SGSN. Encrypted;
  • the SGSN uses the second encryption key and the second encryption algorithm indicated by the second encryption algorithm to identify the user plane data and the control plane on the LLC protocol layer of the SGSN. Encrypting, and using the second integrity key and the second integrity protection algorithm to identify the indicated second integrity protection algorithm, the control plane is on the LLC protocol layer of the SGSN Signaling for integrity protection.
  • a third aspect of the present invention provides a method for message protection, including:
  • the user equipment UE receives the first authentication and key agreement request message sent by the serving GPRS support node SGSN by using the logical link control LLC protocol layer of the UE, where the first authentication and key agreement request message carries the first a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the UE processes the first authentication and key agreement request message at the LLC protocol layer, obtains a second authentication and key agreement request message, and sends the second authentication and key agreement request message to the The GPRS mobility management GMM/session management SM protocol layer of the UE;
  • the UE acquires a first algorithm identifier according to the second authentication and key agreement request on the GMM/SM protocol layer of the UE, generates a first key, and uses the first key and the first
  • the algorithm identifies an LLC protocol layer that is sent to the UE;
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates the first authentication and key agreement response on the GMM/SM protocol layer of the UE.
  • the UE performs encryption and/or integrity protection on the first authentication and key agreement response message on the LLC protocol layer of the UE to obtain a second authentication and key agreement response message, the second authentication and key agreement.
  • the second message verification code is carried in the response message;
  • the UE sends the second authentication and key agreement response message to the SGSN by using an LLC protocol layer of the UE, so that the SGSN verifies the second message verification code.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the UE performs the first authentication and the key agreement response message on the LLC protocol layer of the UE. Encryption and/or integrity protection results in a second authentication and key agreement response message, including:
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the first authentication and key agreement response message on the LLC protocol layer of the UE. Performing encryption to obtain the second authentication and key agreement response message;
  • the UE uses the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, and the first authentication and the LLC authentication layer on the UE Performing integrity protection on the key agreement response message to obtain the second authentication and key agreement response message;
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the first authentication and key agreement response message on the LLC protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm identifier to indicate the first integrity protection algorithm, the first authentication on the LLC protocol layer of the UE Performing integrity protection with the key agreement response message to obtain the second authentication and key agreement response message.
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier;
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the user plane data and the control plane information on an LLC protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, the control plane is on the LLC protocol layer of the UE Signaling for integrity protection.
  • a fourth aspect of the present invention provides a method for message protection, including:
  • the serving GPRS support node SGSN obtains the second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm;
  • the SGSN sends the second algorithm identifier and the second key to the logical link control LLC protocol layer of the SGSN by using a GMM/SM protocol layer of the SGSN;
  • the SGSN performs integrity protection on the first authentication and key agreement request message on the LLC protocol layer of the SGSN, and generates a first message verification code
  • the SGSN sends the first authentication and key agreement request message to the LLC protocol layer of the UE by using the LLC protocol layer of the SGSN, where the first authentication and key agreement request message carries the first message verification code. And a second algorithm identifier;
  • the SGSN receives the second authentication and key agreement response sent by the UE by using an LLC protocol layer of the SGSN. a message, where the second authentication and key agreement response message carries a second message verification code;
  • the SGSN verifies the second message verification code on the LLC protocol layer of the SGSN by using the second key and the second algorithm.
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes the second integrity protection algorithm;
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the SGSN uses the second key and the second algorithm, After verifying the second message verification code on the LLC protocol layer of the SGSN, the method further includes:
  • the SGSN encrypts the data and the signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm indicated by the second encryption algorithm identifier;
  • the SGSN uses the second encryption key and the second encryption algorithm indicated by the second encryption algorithm to identify the user plane data and the control plane on the LLC protocol layer of the SGSN. Encrypting, and using the second integrity key and the second integrity protection algorithm to identify the indicated second integrity protection algorithm, the control plane is on the LLC protocol layer of the SGSN Signaling for integrity protection.
  • a fifth aspect of the present invention provides a user equipment, including:
  • a receiving module configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries the first a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • An acquiring module configured to acquire the first algorithm identifier according to the authentication and key agreement request message received by the receiving module on a GMM/SM protocol layer of the UE, and generate a first key;
  • a verification module configured to verify the first message verification code on a GMM/SM protocol layer of the UE according to the first key acquired by the acquiring module and the generated first algorithm
  • a generating module configured to generate an authentication and a GMM/SM protocol layer on the UE according to the first key and the first algorithm, if the verification module determines that the first message verification code is verified to pass a key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • a first sending module configured to send, by using a GMM/SM protocol layer of the UE, the authentication and key agreement response message generated by the generating module to the SGSN, so that the SGSN verifies the second message The code is verified.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the user equipment further includes:
  • a message processing module configured to: after the generating, by using the first key and the first algorithm, an authentication and a key agreement response message on a GMM/SM protocol layer of the UE, using the first Encrypting the key and the first encryption algorithm indicated by the first encryption algorithm identifier, and encrypting the authentication and key agreement response message on a GMM/SM protocol layer of the UE;
  • the authentication and key agreement response message on the GMM/SM protocol layer of the UE Integrity protection Using the first integrity key and the first integrity protection algorithm to identify the indicated first integrity protection algorithm, the authentication and key agreement response message on the GMM/SM protocol layer of the UE Integrity protection;
  • the user equipment further includes:
  • a second sending module configured to send, by the GMM/SM protocol layer of the UE, the GMM/SM protocol layer of the UE to the GMM of the SGSN, before the receiving module receives the authentication and key agreement request message sent by the SGSN /SM protocol layer sends an attach request message, in the attach request message And carrying the identifier of the UE and the network capability information of the UE, so that the SGSN generates the authentication and key agreement request message on the GMM/SM protocol layer of the SGSN according to the attach request message.
  • the user equipment further includes:
  • a third sending module configured to send, by the GMM/SM protocol layer of the UE, the authentication and key agreement response message to the SGSN by using the GMM/SM protocol layer of the UE
  • the logical link control LLC protocol layer of the UE sends the first key and the first algorithm identifier.
  • the user equipment further includes:
  • An encryption module configured to: after the third sending module sends the first key and the first algorithm to a logical link control LLC protocol layer of the UE by using a GMM/SM protocol layer of the UE, Decoding the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier;
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the user plane data and the control plane information on an LLC protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, the control plane is on the LLC protocol layer of the UE Signaling for integrity protection.
  • a sixth aspect of the present invention provides a serving GPRS support node, including:
  • An acquiring module configured to acquire a second algorithm identifier on a GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm;
  • a generating module configured to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm acquired by the acquiring module, and generate the authentication And the key agreement request message is sent to the user equipment UE, where the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • a first receiving module configured to receive, by using a GMM/SM protocol layer of the SGSN, an authentication and a key agreement response message sent by the generating module, where the authentication and key agreement response message carries a second message verification code ;
  • a verification module configured to verify, by using the second key and the second algorithm, the second message verification code received by the first receiving module on a GMM/SM protocol layer of the SGSN.
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes the second integrity protection algorithm;
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the device further includes:
  • a second receiving module configured to generate, by the generating module, an authentication and a key agreement request message on the GMM/SM protocol layer of the SGSN, and send the authentication and key agreement request message to the user equipment UE, Receiving, by the GMM/SM protocol layer of the SGSN, an attach request message sent by the UE, where the attach request message carries an identifier of the UE and network capability information of the UE;
  • the obtaining module includes:
  • An acquiring unit configured to acquire the second algorithm according to network capability information of the UE
  • a generating unit configured to acquire, according to the identifier of the UE, authentication vector information of the UE, and generate the second key according to the authentication vector information.
  • the device further includes:
  • a sending module configured to send, by using a GMM/SM protocol layer of the SGSN, a logical link control LLC protocol layer of the SGSN, by using a second message verification code after the verification module is verified The key and the second algorithm identifier.
  • the device further includes:
  • An encryption module configured to: after the sending module sends the second key and the second algorithm to a logical link control LLC protocol layer of the SGSN by using a GMM/SM protocol layer of the SGSN, the SGSN is used by the SGSN
  • the second encryption key and the second encryption algorithm indicated by the second encryption algorithm identifier encrypt user plane data and control plane signaling on an LLC protocol layer of the SGSN;
  • a seventh aspect of the present invention provides a user equipment method, including:
  • a receiving module configured to receive, by the logical link control LLC protocol layer of the UE, a first authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the first authentication and the key agreement request message are carried a first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • a processing module configured to process, by the LLC protocol layer, the first authentication and key agreement request message received by the receiving module, obtain a second authentication and key agreement request message, and obtain the second authentication And a key agreement request message is sent to the GPRS mobility management GMM/session management SM protocol layer of the UE;
  • An acquiring module after the processing module sends the second authentication and key agreement request message to the GMM/SM protocol layer of the UE, according to the second on the GMM/SM protocol layer of the UE
  • the authentication and the key agreement request acquires the first algorithm identifier, generates a first key, and sends the first key and the first algorithm identifier to the LLC protocol layer of the UE;
  • a generating module configured to: if the first algorithm and the first key are used to obtain the first message verification code verification by using the acquiring module on the LLC protocol layer of the UE, the UE is in the Generating the first authentication and key agreement response message on the GMM/SM protocol layer of the UE;
  • a message processing module configured to generate, by the generating module on an LLC protocol layer of the UE
  • the first authentication and the key agreement response message are encrypted and/or integrity protected to obtain a second authentication and key agreement response message, and the second authentication and key agreement response message carries the second message verification code;
  • a sending module configured to send the second authentication and key agreement response message obtained by the message processing module to the SGSN by using an LLC protocol layer of the UE, to enable the SGSN to use the second message Verification code for verification.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the message processing module includes:
  • An encryption unit configured to use the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier to perform the first authentication and key agreement on an LLC protocol layer of the UE Encrypting the response message to obtain the second authentication and key agreement response message;
  • the first authentication and key agreement on the LLC protocol layer of the UE Performing integrity protection on the response message to obtain the second authentication and key agreement response message;
  • the negotiation response message performs integrity protection to obtain the second authentication and key agreement response message.
  • the user equipment further includes:
  • the cryptographic module after the generating module generates the first authentication and key agreement response message on the GMM/SM protocol layer of the UE, using the first encryption key and the first encryption algorithm identifier Instructing the first encryption algorithm to encrypt user plane data and control plane signaling on an LLC protocol layer of the UE;
  • An eighth aspect of the present invention provides a serving GPRS support node, including:
  • An acquiring module configured to acquire a second algorithm identifier on a GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm;
  • a first sending module configured to send, by using a GMM/SM protocol layer of the SGSN, the second algorithm identifier acquired by the acquiring module and the generated second secret to a logical link control LLC protocol layer of the SGSN key;
  • a message processing module configured to perform integrity on the first authentication and key agreement request message by using the second algorithm and the second key sent by the first sending module on an LLC protocol layer of the SGSN Protect and generate a first message verification code
  • a second sending module configured to send, by using an LLC protocol layer of the SGSN, the first authentication and key agreement request message processed by the message processing module to an LLC protocol layer of the UE, where the first authentication and The key agreement request message carries the first message verification code and the second algorithm identifier;
  • a receiving module configured to: if the UE determines, by using the LLC protocol layer of the UE, that the first message verification code sent by the second sending module is verified, the SGSN is received by the LLC protocol layer of the SGSN a second authentication and key agreement response message sent by the UE, where the second authentication and key agreement response message carries a second message verification code;
  • a verification module configured by the SGSN to verify, by using the second key and the second algorithm, the second message verification code received by the receiving module on an LLC protocol layer of the SGSN.
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes the second integrity protection algorithm;
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the device further includes:
  • an encryption module configured to use, by the verification module, the second message and the second algorithm, after verifying the second message verification code on an LLC protocol layer of the SGSN. And using the second encryption key and the second encryption algorithm to identify the indicated second encryption algorithm, encrypting data and signaling on an LLC protocol layer of the SGSN;
  • a ninth aspect of the present invention provides a user equipment, including:
  • Input device output device, processor, and memory
  • the input device performs the following process:
  • the processor performs the following process:
  • the UE determines that the first message verification code is verified, generating an authentication and a key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm,
  • the authentication and key agreement response message carries a second message verification code.
  • the output device performs the following process:
  • a tenth aspect of the present invention provides a serving GPRS support node, including:
  • Input device output device, processor, and memory
  • the input device performs the following process:
  • the processor performs the following process:
  • the authentication and key agreement request message carries a first message verification code and a second algorithm identifier.
  • the second message verification code is verified on the GMM/SM protocol layer of the SGSN using the second key and the second algorithm.
  • An eleventh aspect of the present invention provides a user equipment, including:
  • Input device output device, processor, and memory
  • the input device performs the following process:
  • the processor performs the following process:
  • the LLC protocol layer Processing, by the LLC protocol layer, the first authentication and key agreement request message, obtaining a second authentication and key agreement request message, and sending the second authentication and key agreement request message to the UE GPRS mobility management GMM/session management SM protocol layer;
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates the first authentication and key agreement response on the GMM/SM protocol layer of the UE.
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates the first authentication and key agreement response on the GMM/SM protocol layer of the UE.
  • the output device performs the following process:
  • a twelfth aspect of the present invention provides a serving GPRS support node, including:
  • Input device output device, processor, and memory
  • the input device performs the following process:
  • the SGSN receives the second authentication and key agreement response sent by the UE by using an LLC protocol layer of the SGSN. a message, where the second authentication and key agreement response message carries a second message verification code;
  • the processor performs the following process:
  • the output device performs the following process:
  • the LLC protocol layer of the SGSN Transmitting, by the LLC protocol layer of the SGSN, the first authentication and key agreement request message to the LLC protocol layer of the UE, where the first authentication and key agreement request message carries a first message verification code and a second Algorithm identification.
  • a thirteenth aspect of the present invention provides a message protection system, including: a user terminal and a serving GPRS support node;
  • the user terminal is the fifth aspect, the user terminal in the first to fifth possible implementation manners of the fifth aspect;
  • the serving GPRS support node is the sixth aspect, the serving GPRS support node in the first to fourth possible implementation manners of the sixth aspect.
  • a fourteenth aspect of the present invention provides a message protection system, including: a user terminal and a serving GPRS support node;
  • the user terminal is the user terminal in the seventh aspect, the first to the third possible implementation manners of the seventh aspect;
  • the serving GPRS support node is the above-mentioned eighth aspect, the serving GPRS support node in the first to second possible implementation manners of the eighth aspect.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed at the GMM/SM protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the function of the integrity protection of the LLC protocol layer of the UE and the SGSN in the prior art is solved.
  • the authentication and the GMM/SM protocol layers of the UE and the SGSN respectively
  • the key negotiation request message and the authentication and key agreement response messages are used for integrity protection, which can be supported in practical applications, thereby improving the security of the solution and preventing the attacker from degrading the algorithm.
  • FIG. 1 is a schematic diagram of a GPRS-based integrity signaling protection process in the prior art
  • FIG. 2 is a schematic diagram of an embodiment of a method for message protection according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of another embodiment of a method for message protection according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of another embodiment of a method for message protection in an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of another embodiment of another method for message protection according to an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a method for message protection in an application scenario according to an embodiment of the present invention.
  • FIG. 7 is another schematic flowchart of a method for message protection in an application scenario according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of another embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of another embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of another embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 12 is a schematic diagram of another embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of an embodiment of a serving GPRS support node according to an embodiment of the present invention.
  • FIG. 14 is a schematic diagram of another embodiment of a serving GPRS support node according to an embodiment of the present invention.
  • FIG. 15 is a schematic diagram of another embodiment of a serving GPRS support node according to an embodiment of the present invention.
  • FIG. 16 is a schematic diagram of another embodiment of a serving GPRS support node according to an embodiment of the present invention.
  • FIG. 17 is a schematic diagram of another embodiment of a user terminal according to an embodiment of the present invention.
  • FIG. 18 is a schematic diagram of another embodiment of another user terminal according to an embodiment of the present invention.
  • FIG. 19 is a schematic diagram of another embodiment of another user terminal according to an embodiment of the present invention.
  • FIG. 20 is a schematic diagram of another embodiment of a serving GPRS support node according to an embodiment of the present invention.
  • 21 is a schematic diagram of another embodiment of another serving GPRS support node according to an embodiment of the present invention.
  • FIG. 22 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
  • FIG. 23 is a schematic structural diagram of a serving GPRS support node according to an embodiment of the present invention.
  • FIG. 24 is a schematic diagram of an embodiment of a message protection system according to an embodiment of the present invention.
  • the embodiment of the invention provides a message protection method, which can be supported in practical applications, thereby improving the security of the solution and preventing the attacker from degrading the algorithm.
  • a corresponding message protection system is provided.
  • related devices please refer to FIG. 2 to FIG. 24, which will be described in detail below through specific embodiments.
  • the message protection method provided by the embodiment of the present invention is applicable to a wireless communication system, and the embodiment of the present invention is applied to long-term evolution (English term: Long Term Evolution, English abbreviation: LTE)/upgrade long-term evolution technology (English full name: LTE -Advanced, abbreviation: LTE-A)
  • LTE Long Term Evolution
  • LTE-A upgrade long-term evolution technology
  • the wireless communication system is an example for analyzing the method, and does not constitute a limitation of the present invention.
  • the message protection method in the embodiment of the present invention is mainly used to protect information on the GMM/SM protocol layer, or to protect information on the LLC protocol layer, and the two specifications are respectively introduced in this specification.
  • the embodiment of the invention provides a method for message protection, wherein for the convenience of description, the description will be made from the perspective of the UE.
  • FIG. 2 is a schematic diagram of an embodiment of a message protection method according to an embodiment of the present invention, where the message protection method may include:
  • the user equipment UE receives the authentication and key agreement request message sent by the serving GPRS support node SGSN through the GPRS mobility management GMM/session management SM protocol layer of the UE, where the authentication and key agreement request message carries the first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the UE receives the authentication and key agreement request message sent by the SGSN through the GMM/SM protocol layer of the UE, where the authentication and the key agreement request message carries the first message verification code, and the first message verification code may be Message verification code - integrity (English name: message authentication code-Integrity, English abbreviation: MAC-I).
  • the first algorithm identifier is used to indicate the type of the first algorithm, and the specific first algorithm may be determined according to the first algorithm identifier.
  • the GMM protocol used by the GMM protocol layer is mainly used to support mobility management functions, such as GPRS attach, detach, security, location area (English full name: Location Area, English abbreviation: LA) update and routing area (English full name) :Routing Area, English abbreviation: RA) update, etc.
  • the SM protocol used by the SM protocol layer is mainly used to support packet data protocols (English full name: Packet Data Protocol, PDP), deactivation, and PDP context modification.
  • the UE acquires the first algorithm identifier according to the authentication and key agreement request message on the GMM/SM protocol layer of the UE, and generates a first key.
  • the UE receives the authentication and key agreement request message on the GMM/SM protocol layer of the UE, and obtains the carried first algorithm identifier from the authentication and key agreement request message, so as to determine according to the identifier.
  • the first algorithm simultaneously generates the first key.
  • the root key of the USIM card is calculated with a random number to obtain the first key; or, the root key in the USIM card is calculated with a random number to obtain the middle.
  • the key, the intermediate key and the first algorithm identifier are taken as inputs, and the first key is generated by the key generation function, and the key generation function may be a hash algorithm (English name: hash message authentication code-Secure Hash Algorith-256, English abbreviations: HMAC-SHA-256), the specific method of generating the first key here is not specifically limited.
  • hash algorithm English name: hash message authentication code-Secure Hash Algorith-256, English abbreviations: HMAC-SHA-256
  • the UE verifies the first message verification code on the GMM/SM protocol layer of the UE according to the first key and the first algorithm.
  • the UE verifies the first message verification code MAC-I on the GMM/SM protocol layer of the UE by using the obtained first algorithm and the generated first key.
  • the UE determines that the first message verification code is verified, generating an authentication and key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm, where the authentication and the key agreement response are performed.
  • the message carries a second message verification code
  • the UE when the UE determines that the first message verification code passes the verification, the UE generates an authentication and key agreement response message corresponding to the authentication and key agreement request message on the GMM/SM protocol layer of the UE, and uses the first The key and the first algorithm generate a second message verification code MAC-I for the authentication and key agreement response message.
  • the method for verifying the first message verification code may be specifically: the authentication token of the network to the terminal in the five-member authentication group according to the prior art at the GMM/SM protocol layer (English full name: Authentication Token, English abbreviation: AUTN) to verify, and generate terminal authentication parameters for the network (English full name: response, English abbreviation: RES).
  • the USIM card calculates the expected MAC-I value XMAC-I according to the stored root key K and the AUTN sent by the SGSN side and the random number (English name: Random, English abbreviation: RAND), and the slave authentication and The first message verification code MAC-I carried in the key agreement request message is verified.
  • the UE sends an authentication and a key agreement response message to the SGSN by using a GMM/SM protocol layer of the UE, so that the SGSN verifies the second message verification code.
  • the UE passes the GMM/SM protocol of the UE to the GMM/SM protocol of the SGSN.
  • the layer sends an authentication and key agreement response message, and after receiving the authentication and key agreement response message, the SGSN verifies the second message verification code MAC-I.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed at the GMM/SM protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the function of the integrity protection of the LLC protocol layer of the UE and the SGSN in the prior art is solved.
  • the UE and the GMM/SM protocol layer of the SGSN respectively perform integrity protection on the authentication and key agreement request messages, and the authentication and key agreement response messages, which can be supported in practical applications, thereby improving the security of the solution and preventing attacks. A degraded attack on the algorithm.
  • the first key includes a first encryption key, and the first algorithm includes a first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes a first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes a first encryption algorithm and a first integrity protection algorithm.
  • the first key may include the first encryption key and the first integrity key, or may be only the first encryption key, or just the first integrity key.
  • the first encryption key here is the Internet of Things encryption key (English name: Session key of Gb based cellular IoT for confidentiality protection, English abbreviation: Ktc), and the first integrity key is the Internet of Things integrity protection key. Full name: Session key of Gb based cellular IoT for integrity protection, English abbreviation: Kti).
  • the first algorithm includes a first encryption algorithm and a first integrity protection algorithm, and may be only the first encryption algorithm or just the first integrity protection algorithm.
  • the integrity protection algorithm is mainly used to protect the integrity of the transmitted data at the transmitting end from being destroyed and to check whether the integrity of the received data is destroyed at the receiving end.
  • the data of the sender and the receiver are respectively calculated by the integrity protection algorithm to obtain the message verification code MAC-I and the expected message verification code XMAC-I, and the comparison between the two can confirm the integrity of the data.
  • the first key and the first algorithm are embodied to support the present
  • the flexibility of the scheme is enhanced, and the specific algorithm is selected for the specific scenario to include the data, and the plasticity of the scheme is also increased.
  • the method may further include:
  • the UE encrypts the authentication and key agreement response message on the GMM/SM protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm;
  • the UE uses the first integrity key and the first integrity protection algorithm to identify the indicated first integrity protection algorithm, and performs integrity protection on the authentication and key agreement response message on the GMM/SM protocol layer of the UE;
  • the UE encrypts the authentication and key agreement response message on the GMM/SM protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm, and uses the first integrity key.
  • the first integrity protection algorithm indicated by the key and the first integrity protection algorithm identifier performs integrity protection on the authentication and key agreement response messages on the GMM/SM protocol layer of the UE.
  • the UE needs to protect the authentication and the key agreement response message. Specifically, there are three protection methods as follows:
  • the UE encrypts the authentication and key agreement response message on the GMM/SM protocol of the UE by using the first encryption key Ktc and the corresponding first encryption algorithm, that is, the encryption of the message is understood, and the purpose is to ensure the security of the message.
  • the first encryption algorithm is determined according to the identifier of the first encryption algorithm, and the identifier of the first encryption algorithm may be a sequence number of the encryption algorithm.
  • the UE may use the first integrity key Kti and the corresponding first integrity protection algorithm to perform integrity protection on the authentication and key agreement response messages on the GMM/SM protocol layer of the UE, the purpose of which is to ensure the air interface. Transmitting the continuity and integrity of the message, wherein the first integrity protection algorithm is determined according to the first integrity protection algorithm identifier, and the first integrity protection algorithm identifier may be a sequence number of the integrity protection algorithm;
  • the UE performs both encryption protection and integrity protection on the authentication and key agreement response messages.
  • the implementation is similar to the above-mentioned implementation, that is, using Ktc and the first encryption algorithm to encrypt the authentication and key agreement request on the GMM/SM protocol layer of the UE, and using the Kti and the first integrity protection algorithm in the UE The integrity of the authentication and key agreement response messages is protected at the GMM/SM protocol layer.
  • the UE receives the authentication and the secret sent by the SGSN through the GMM/SM protocol layer of the UE.
  • the message may further include:
  • the UE sends an attach request message to the GMM/SM protocol layer of the SGSN through the GMM/SM protocol layer of the UE, where the attach request message carries the identifier of the UE and the network capability information of the UE, so that the SGSN is in the GMM/SM of the SGSN according to the attach request message.
  • An authentication and key agreement request message is generated on the protocol layer.
  • the UE sends an attach request message to the GMM/SM protocol layer of the SGSN by using the GMM/SM protocol layer of the UE, where the attach request message carries the identifier of the UE, such as the temporary logical link identifier of the UE (English full name: Temporary Logical Link Identifier (TLLI), or International Mobile Subscriber Identification Number (English full name: International Mobile Subscriber Identification Number, IMSI).
  • the attach request message also carries the network capability information of the UE, and the SGSN is attached.
  • the identifier of the UE in the request message and the network capability information of the UE are generated, and an authentication and key agreement request message is generated on the GMM/SM protocol layer of the SGSN.
  • the timer T3360 is started. After the timeout, the SGSN does not receive the response. The SGSN resends the authentication request message.
  • the number of retransmissions is N times, and N is greater than A positive integer equal to 1.
  • timer T3360 can be configured for 6 seconds or other time values, and the number of retransmissions N can be 4 times. Other configurations can be performed according to actual conditions, so the limitation is not limited herein.
  • the UE sends an attach request message to the SGSN, so that the SGSN
  • the related parameters of the authentication may be obtained according to the attach request message.
  • the specific implementation basis is provided for the actual application of the solution of the present invention.
  • the UE interacts with the network side, and completes the network with the attach request. The interaction of information between the two increases the practicality of the solution.
  • the UE passes the GMM/SM of the UE according to the foregoing first to third embodiments corresponding to FIG. 2 and FIG.
  • the protocol layer may further include:
  • the UE sends the first key and the first algorithm identifier to the logical link control LLC protocol layer of the UE by using the GMM/SM protocol layer of the UE.
  • the UE after the UE sends the authentication and key agreement response message to the SGSN through the GMM/SM protocol layer of the UE, the UE also sends the first key and the first key to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE.
  • An algorithm identifier is used to indicate a specific algorithm to be used, so that the UE can process the user plane data and the control plane signaling by using the first key and the first algorithm on the LLC protocol layer.
  • the UE may further send the first algorithm and the first key to the LLC protocol layer of the UE, so that the UE is in the UE.
  • the LLC protocol layer data and signaling can be processed accordingly to increase the reliability of the solution and further enhance the practicability of the solution.
  • the UE uses the GMM/SM protocol layer of the UE to the UE.
  • the link control LLC protocol layer may further include:
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm;
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm, and uses the first integrity key. And the first integrity protection algorithm indicated by the first integrity protection algorithm identifier performs integrity protection on the control plane signaling on the LLC protocol layer of the UE.
  • the UE sends the first key and the first algorithm identifier to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE, and the first algorithm identifier is also used to indicate the algorithm class to be used. type.
  • the LLC protocol layer of the UE there is simultaneous signaling of the user plane data and the control plane.
  • the user plane data may be a message, such as a message or a notification, and the signaling refers to a signal on the control plane, such as a voice or a data packet.
  • the UE encrypts data and signaling simultaneously on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm, and enhances security of data and signaling during transmission.
  • the UE encrypts the data on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm, and performs both encryption protection and integrity protection on the signaling protocol layer of the UE.
  • encryption protection can be performed for the data, and for signaling, encryption protection can be used. Integrity protection is possible. The corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the method for message protection in the embodiment of the present invention is described above from the perspective of the UE.
  • the method for message protection in the embodiment of the present invention is described from the perspective of the SGSN to be tested. Referring to FIG. 3, the message protection in the embodiment of the present invention is described.
  • Another embodiment of the method includes:
  • the serving GPRS support node SGSN obtains a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm.
  • the SGSN may obtain the second algorithm identifier on the GMM/SM protocol layer, and the second algorithm identifier is used to indicate the type of the second algorithm, and is in the GMM of the SGSN.
  • a second key is generated on the SM protocol layer.
  • the manner of generating the second key is similar to the manner of generating the first key mentioned in the foregoing embodiment, and details are not described herein.
  • the SGSN generates an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm, and sends the authentication and key agreement request message to the user equipment.
  • the UE the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the SGSN generates an authentication and a key agreement request message on the GMM/SM protocol layer of the SGSN by using the second algorithm and the second algorithm, where the authentication and key agreement request message carries the first message verification code and the first
  • the second algorithm identifies that the first message verification code is generated after the SGSN performs integrity protection on the authentication and key agreement request message on the GMM/SM protocol layer of the SGSN, and the second algorithm identifier is used to indicate the type of the second algorithm.
  • the SGSN After generating the authentication and key agreement request message on the GMM/SM protocol layer of the SGSN, the SGSN first sends the message to the LLC protocol layer of the SGSN, and then the SGSN sends the authentication to the LLC protocol layer of the UE at the LLC protocol layer of the SGSN. And the key negotiation request message.
  • the second algorithm type here is the same as the first algorithm mentioned in the first to fifth embodiments corresponding to FIG. 2 and FIG. 2 above, and the “first” and “here” here.
  • the SGSN receives the authentication and key agreement response message sent by the UE by using the GMM/SM protocol layer of the SGSN, where the authentication and the key agreement response message carries the second message verification code.
  • the UE determines that the first message verification code is verified, the UE generates an authentication and key agreement response message corresponding to the authentication and key agreement request message on the GMM/SM protocol layer of the UE.
  • the SGSN receives the authentication and key agreement response message sent by the UE through the GMM/SM protocol layer of the SGSN, where the authentication and key agreement response message carries the second message verification code.
  • the SGSN uses the second key and the second algorithm to verify the second message verification code on the GMM/SM protocol layer of the SGSN.
  • the SGSN verifies whether the second message verification code is accurate on the GMM/SM protocol layer of the SGSN by using the generated second key and the obtained second algorithm.
  • an implementation scheme for integrity protection of a key and algorithm negotiation process between a UE and an SGSN is provided, specifically, an authentication and a key agreement request message, and an authentication and key agreement response message are in the GMM/
  • the SM protocol layer performs integrity protection, and solves the problem that the integrity protection of the UE and the SGSN's LLC protocol layer cannot be implemented in the prior art.
  • the UE and the GMM/SM protocol layer of the SGSN respectively perform integrity protection on the authentication and key agreement request messages, and the authentication and key agreement response messages, which can be supported in practical applications, thereby improving the security of the solution and preventing attacks. A degraded attack on the algorithm.
  • the second key includes a second encryption key, and the second algorithm includes a second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes a second integrity protection algorithm
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes a second encryption algorithm and a second integrity protection algorithm
  • the second key may include the second encryption key and the second integrity key, or may be only the second encryption key, or just the second integrity key.
  • the second encryption key here is Ktc and the second integrity key is Kti.
  • the second algorithm includes a second encryption algorithm and a second integrity protection algorithm, or just a second encryption algorithm, or just a second integrity protection algorithm.
  • the integrity protection algorithm is mainly used to protect the integrity of the transmitted data at the transmitting end from being destroyed and to check whether the integrity of the received data is destroyed at the receiving end.
  • the data of the sender and the receiver are respectively calculated by the integrity protection algorithm to obtain the message verification code MAC-I and the expected message verification code XMAC-I, and the comparison between the two can confirm the integrity of the data.
  • the second key and the second algorithm are embodied to support the situation of the solution of the present invention in the actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for the specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • the GMM/SM protocol layer of the SGSN is generated on the basis of the foregoing first embodiment corresponding to FIG. 3 or FIG.
  • the method may further include:
  • the SGSN receives the attach request message sent by the UE by using the GMM/SM protocol layer of the SGSN, where the attach request message carries the identifier of the UE and the network capability information of the UE.
  • the SGSN obtains the second algorithm identifier on the GMM/SM protocol layer of the SGSN, and generates a second key, which may include:
  • the SGSN acquires the second algorithm according to the network capability information of the UE.
  • the SGSN acquires the authentication vector information of the UE according to the identifier of the UE, and generates the second key according to the authentication vector information.
  • the SGSN receives the attach request message sent by the UE through the GMM/SM protocol before sending the authentication and key agreement request message to the UE through the GMM/SM protocol layer of the SGSN, where the attach request message carries the identifier of the UE and UE network capability information.
  • the UE sends a GPRS attach request message to the SGSN, and after receiving the attach request message sent by the UE, the SGSN will use the home location register (English name: Home Location Register, English abbreviation: HLR) or the home subscription user server (English full name) :Home Subscriber Server, English abbreviation: HSS) Obtain an authentication vector (English full name: Authentication Vectors, English abbreviation: AV), where AV can include RAND, XRES, AUTN, CK, and IK.
  • HLR Home Location Register
  • HSS home subscription user server
  • the SGSN obtains a second algorithm on the GPRS mobility management GMM/Session Management SM protocol layer of the SGSN, and generates a second key according to the second algorithm. Specifically, after receiving the attach request message sent by the UE, the SGSN obtains the attach request according to the attach request. The identifier of the UE carried in the message is obtained from the HLR or the HSS, and the second algorithm is obtained according to the network capability information of the UE and an algorithm supported by the SGSN. The SGSN generates a second key on the GMM/SM protocol layer according to the AV.
  • the network capability information of the UE refers to the network performance of the UE, for example, the retransmission rate, the throughput, or the signal strength, and the comprehensive performance information of multiple network capabilities, which is not limited herein.
  • the SGSN receives the attach request message sent by the UE, and obtains the relevant parameters of the authentication according to the attach request message, which provides a specific implementation basis for the practical application of the solution of the present invention, and on the other hand, the UE and the SGSN. A way of interacting, through the attachment request to complete the information interaction with the network, thereby improving the practicability of the solution.
  • the SGSN When the SGSN receives the attach request information carrying the identifier of the UE and the network capability information of the UE, selecting a reasonable algorithm according to the network capability information of the UE, and confirming the authentication vector information corresponding to the UE by using the identifier of the UE, so that the scheme is It is more rationalized in practical applications, and specific algorithms and key selections are performed for specific UEs to enhance the feasibility of the entire solution.
  • the SGSN uses the second key and the first
  • the second algorithm after verifying the second message verification code on the GMM/SM protocol layer of the SGSN, may further include:
  • the second key and the second algorithm identifier are sent to the logical link control LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN.
  • the SGSN verifies the second message verification code in the authentication and key agreement response message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm, and when the SGSN determines that the second message verification code passes, And sending, by the GMM/SM protocol layer of the SGSN, the second key and the second algorithm identifier to the LLC protocol layer of the SGSN, where the second algorithm identifier may be used to determine the corresponding second algorithm, so that the SGSN uses the second layer on the LLC protocol layer.
  • the key and the second algorithm process the data and signaling.
  • the SGSN after determining that the second message verification code is passed, the SGSN sends the second key and the second algorithm to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN, so that the SGSN is on the LLC protocol layer.
  • the data and signaling can be processed accordingly to increase the reliability of the solution and further enhance the practicability of the solution.
  • the SGSN determines that the second message verification code passes, the SGSN is passed through the SGSN.
  • the method may further include:
  • the SGSN encrypts the user plane data and the control plane signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm to identify the indicated second encryption algorithm.
  • the SGSN encrypts the user plane data and the control plane signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm to identify the indicated second encryption algorithm, and uses the second integrity key and the first
  • the second integrity protection algorithm identifies the second integrity protection algorithm indicated, and performs integrity protection on the control plane signaling on the LLC protocol layer of the SGSN.
  • the SGSN sends the second key and the second algorithm identifier to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN, and the user plane data and the control plane signaling exist simultaneously on the LLC protocol layer of the SGSN.
  • the data and signaling may be processed by using the second key and the second algorithm, and the specific processing manner may be:
  • the SGSN encrypts the data and signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm, and enhances the security of the data and signaling during transmission.
  • the SGSN uses the second encryption key and the second encryption algorithm in the LLC protocol layer of the SGSN.
  • the data is encrypted, and the signaling is both cryptographically protected and integrity-protected at the LLC protocol layer of the SGSN.
  • encryption protection can be performed for data, and for signaling, encryption protection can be used. Integrity protection is possible.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the embodiment of the invention provides a method for message protection, wherein for the convenience of description, the description will be made from the perspective of the UE.
  • the user equipment UE receives the first authentication and key agreement request message sent by the serving GPRS support node SGSN by using the logical link control of the UE, where the first authentication and the key agreement request message carry the first message verification. a code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the GMM/SM protocol layer of the SGSN sends the first authentication and key agreement request message to the LLC of the SGSN.
  • the protocol layer performs integrity protection at the LLC protocol layer and sends the first authentication and key agreement request message to the LLC protocol layer of the UE through the LLC protocol layer of the SGSN.
  • the first authentication and the key agreement request message may generate the first message verification code MAC-I after performing the integrity protection, and the first authentication and the key agreement request message may carry the first message verification code, and simultaneously
  • the first algorithm identifier is carried in the message, and the first algorithm identifier is used to indicate the first algorithm type, and the specific first algorithm is obtained according to the first algorithm identifier.
  • the UE processes the first authentication and the key agreement request message at the LLC protocol layer, obtains the second authentication and key agreement request message, and sends the second authentication and key agreement request message to the GPRS mobility management of the UE.
  • GMM/session management SM protocol layer ;
  • the UE sends the UE to the GMM/SM protocol layer of the UE through the LLC protocol layer of the UE.
  • a second authentication and a key agreement request message where the second authentication and the key agreement request message are obtained after the UE processes the first authentication and the key agreement request message at the LLC protocol layer, and the specific processing mode is used for the first authentication.
  • the first message verification code MAC-I in the key agreement request is removed, or no change is made.
  • the first message verification code may be located at the last part of the first authentication and key agreement request message. If the first message verification code needs to be removed, the header part of the first authentication and key agreement request message may be directly processed.
  • the first message verification code is still included in the second authentication and key agreement request message.
  • the first message verification code may be sent to the GMM/SM protocol layer of the UE as part of the service data unit (English full name: Service Data Unit: SDU).
  • SDU Service Data Unit
  • the UE may save the first authentication and key agreement request message in the LLC protocol layer of the UE, and may also understand The current protocol data unit (English name: PDU) is stored for the LLC protocol layer of the UE.
  • the PDU refers to the data unit transmitted between the peer layers.
  • the PDU transmitted by the physical layer is Data bits
  • PDUs transmitted by the data link layer are data frames
  • PDUs transmitted by the network layer are data packets
  • PDUs transmitted by the data layer are data segments
  • PDUs transmitted between other higher layers are packets.
  • the UE acquires the first algorithm identifier according to the second authentication and the key agreement request on the GMM/SM protocol layer of the UE, generates a first key, and sends the first key and the first algorithm identifier to the LLC protocol of the UE.
  • Floor
  • the UE verifies the AUTN according to the prior art on the GMM/SM protocol layer of the UE, and generates an RES.
  • the UE performs AUTN authentication on the GMM/SM protocol layer. If the AUTN authentication succeeds, the network side is authenticated, that is, the acknowledgement data is sent from the home network, and the UE calculates the RES at the GMM/SM protocol layer to verify the user. Whether the certification passed.
  • the UE When the foregoing authentication process is passed, the UE generates a corresponding first key according to the network capability of the UE. Determining the corresponding first algorithm according to the first algorithm identifier, where the first algorithm identifier is obtained from the second authentication and key agreement request message, and the first authentication and the key agreement request message are processed. At the time, the first algorithm identifier is not removed.
  • the UE sends the first key and the first algorithm to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE.
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates a first authentication and a key agreement response message on the GMM/SM protocol layer of the UE.
  • the UE uses the first message verification code to compare with the calculated expected message verification code. When the first message verification code is consistent with the calculated expected message verification code, the first message verification code is verified. At this time, the UE generates a corresponding first authentication and key response message on the GMM/SM protocol layer of the UE.
  • the UE sends a verification failure result of the first message verification code to the GMM/SM protocol layer of the UE through the LLC protocol layer of the UE, and the result of the verification failure may be
  • the first message verification code is re-verified, or the subsequent operation is stopped, and the newly generated first message verification code is re-received.
  • the UE performs encryption and/or integrity protection on the first protocol and the key agreement response message on the LLC protocol layer of the UE to obtain a second authentication and key agreement response message, where the second authentication and the key agreement response message are carried.
  • Second message verification code
  • the first authentication and the key agreement response message are generated by the UE on the GMM/SM protocol layer of the UE, and the UE sends the first authentication and the key to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE.
  • the negotiation response message after the UE performs encryption and/or integrity protection on the first authentication and key agreement response message on the LLC protocol layer of the UE, obtains a second authentication and key agreement response message.
  • the UE Similar to the process of performing integrity protection on the first authentication and the key agreement request message, after the integrity protection of the first authentication and the key agreement response message by the LLC protocol layer, the UE generates a second message verification code MAC-I.
  • the UE sends a second authentication and key agreement response message to the SGSN through the LLC protocol layer of the UE, so that the SGSN verifies the second message verification code.
  • the UE sends a second authentication and key agreement response message to the LLC protocol layer of the SGSN of the UE through the LLC protocol layer of the UE, where the second authentication and the key agreement response message carries the second message verification code, so that After determining that the second message verification code passes the verification, the SGSN obtains the SGSN side.
  • the second key and the second algorithm are used to perform encryption and/or integrity protection on the data to be processed on the LLC protocol layer of the SGSN.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed on the LLC protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the side enhances the interaction between the LLC protocol layer and the GMM/SM protocol layer, so as to obtain the key in the GMM/SM protocol layer of the UE, and then perform integrity verification on the message at the LLC protocol layer, thereby improving the security of the solution. Sex, to prevent attackers from attacking the algorithm.
  • the first key includes a first encryption key, and the first algorithm includes a first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes a first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes a first encryption algorithm and a first integrity protection algorithm.
  • the first key may include the first encryption key and the first integrity key, or may be only the first encryption key, or just the first integrity key.
  • the first encryption key is Ktc
  • the first integrity key is Kti
  • the first algorithm includes a first encryption algorithm and a first integrity protection algorithm, and may be only the first encryption algorithm or just the first integrity protection algorithm.
  • the integrity protection algorithm is mainly used to protect the integrity of the transmitted data at the transmitting end from being destroyed and to check whether the integrity of the received data is destroyed at the receiving end.
  • the data of the sender and the receiver are respectively calculated by the integrity protection algorithm to obtain the message verification code MAC-I and the expected message verification code XMAC-I, and the comparison between the two can confirm the integrity of the data.
  • the first key and the first algorithm are embodied to support the situation of the solution of the present invention in an actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for a specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • the UE is first on the LLC protocol layer of the UE.
  • Certification Encryption and/or integrity protection with the key agreement response message to obtain the second authentication and key agreement response message may include:
  • the UE encrypts the first authentication and the key agreement response message on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm, to obtain a second authentication and a key agreement response.
  • the UE uses the first integrity key and the first integrity protection algorithm to identify the indicated first integrity protection algorithm, and performs integrity protection on the first authentication and key agreement response messages on the LLC protocol layer of the UE. Two authentication and key agreement response messages;
  • the UE encrypts the first authentication and key agreement response message on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm, and uses the first integrity key and The first integrity protection algorithm identifies the first integrity protection algorithm, and performs integrity protection on the first authentication and key agreement response messages on the LLC protocol layer of the UE to obtain a second authentication and a key agreement response. Message.
  • the UE needs to protect the first authentication and the key agreement response message. Specifically, there are three protection methods as follows:
  • the UE encrypts the first authentication and the key agreement response message on the LLC protocol of the UE by using the first encryption key Ktc and the corresponding first encryption algorithm to obtain a second authentication and key agreement response message, which is understood as a message. Encryption, the purpose of which is to ensure the security of the message, wherein the first encryption algorithm is determined according to the identifier of the first encryption algorithm;
  • the UE may perform integrity protection on the first protocol and the key agreement response message on the LLC protocol layer of the UE by using the first integrity key Kti and the corresponding first integrity protection algorithm to obtain the second authentication and the key.
  • the first integrity protection algorithm is determined according to the identifier of the first integrity protection algorithm;
  • the UE performs both encryption protection and integrity protection on the authentication and key agreement response messages, and the implementation manner is similar to the above-mentioned implementation manner, that is, using the Ktc and the first encryption algorithm on the LLC protocol layer of the UE.
  • Authentication and key agreement response messages are encrypted and used with Kti and first
  • the integrity protection algorithm performs integrity protection on the first protocol and the key agreement response message on the LLC protocol layer of the UE to obtain a second authentication and key agreement response message.
  • a specific solution for protecting the first authentication and the key agreement response message is proposed, which not only performs encryption protection or integrity protection, but also performs encryption protection and integrity protection at the same time. It greatly increases the security, continuity and integrity of message transmission, and has a better practical effect in the specific implementation of the scheme.
  • the UE may further include: after the first authentication and the key agreement response message are generated on the GMM/SM protocol layer of the UE.
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm.
  • the UE encrypts the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm to identify the indicated first encryption algorithm, and uses the first integrity key and the first An integrity protection algorithm identifies the first integrity protection algorithm indicated, and performs integrity protection on the control plane signaling on the LLC protocol layer of the UE.
  • the UE sends the first key and the first algorithm identifier to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE, where the first algorithm identifier is used to determine the specific algorithm type, and the LLC protocol in the UE is used.
  • User plane data and control plane signaling exist simultaneously on the layer.
  • the user plane data may be a message, such as a message or a notification, and the signaling refers to a signal on the control plane, such as a voice or a data packet.
  • the UE encrypts data and signaling simultaneously on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm, and enhances security of data and signaling during transmission.
  • the first encryption algorithm is based on the first encryption.
  • the algorithm identifies the identity.
  • the UE encrypts the data on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm, and performs both encryption protection and integrity protection on the LLC protocol layer of the UE, and the first encryption.
  • the algorithm is determined according to the identifier of the first encryption algorithm
  • the first integrity protection algorithm is determined according to the identifier of the first integrity protection algorithm.
  • encryption protection can be performed on the data, and for signaling, both encryption protection and encryption protection can be used. Integrity protection.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the method for message protection in the embodiment of the present invention is described above from the perspective of the UE.
  • the method for message protection in the embodiment of the present invention is described from the perspective of the SGSN. Referring to FIG. 5, the method for message protection in the embodiment of the present invention is further described.
  • An embodiment includes:
  • the serving GPRS support node SGSN obtains the second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm.
  • the SGSN may obtain a second algorithm identifier on the GMM/SM protocol layer, where the second algorithm identifier is used to determine the type of the corresponding second algorithm, and is in the SGSN.
  • a corresponding second key is generated on the GMM/SM protocol layer.
  • the SGSN sends, by using a GMM/SM protocol layer of the SGSN, a second algorithm identifier and a second key to the logical link control LLC protocol layer of the SGSN.
  • the SGSN sends the second algorithm and the second key to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN, and the SGSN selects an encryption algorithm and a complete according to the network capability of the user equipment and the algorithm supported by the SGSN itself. Sex protection algorithms and derivation of Ktc and Kti.
  • the SGSN performs integrity protection on the first authentication and the key agreement request message on the LLC protocol layer of the SGSN, and generates a first message verification code.
  • the SGSN receives the first authentication and key agreement request message sent by the GMM/SM protocol layer of the SGSN through the LLC protocol layer of the SGSN, and performs integrity protection on the first authentication and the key agreement request message. Thereby, the first message verification code MAC-I is generated.
  • the SGSN sends a first authentication and a key agreement request message to the LLC protocol layer of the UE by using an LLC protocol layer of the SGSN, where the first authentication and the key agreement request message carry the first message verification code and Second algorithm identification;
  • the SGSN sends the first authentication and key agreement request carrying the first message verification code to the LLC protocol layer of the UE through the LLC protocol layer of the SGSN, where the first authentication and the key agreement request message are carried.
  • the first message verification code and the second algorithm identifier are used to indicate the type of the second algorithm.
  • first algorithm mentioned in the first to third alternative embodiments corresponding to the second algorithm in FIG. 4 and FIG. 4 above may be the same algorithm, and “first” is used herein. And “second” is to indicate the difference in the protocol layer.
  • the SGSN receives the second authentication and key agreement response message sent by the UE by using the LLC protocol layer of the SGSN, where the second authentication and the key are obtained.
  • the negotiation response message carries the second message verification code
  • the UE After receiving the first message verification code by the LLC protocol layer of the UE, the UE verifies the first message verification code.
  • the UE passes the UE's LLC protocol layer to the UE's GMM/.
  • the SM protocol layer sends a verification success message, so that the UE generates a first authentication and key agreement response message on the GMM/SM protocol layer, and sends the message to the LLC protocol layer of the UE, and generates on the LLC protocol layer of the UE.
  • the second authentication and key agreement response message is used to the first message verification code.
  • the specific operation may be: the UE performs integrity protection on the first authentication and the key agreement response message on the LLC protocol layer of the UE, to obtain a second key agreement response message, and adds a packet header information in the second key agreement response message. And adding the second message verification code MAC-I, and sending the second authentication and key agreement response message carrying the second message verification code MAC-I to the SGSN side, where the SGSN receives the LLC through the UE's LLC through the LLC protocol layer of the SGSN. The second authentication and key agreement response message carried by the protocol layer carrying the second message verification code.
  • the SGSN uses the second key and the second algorithm to verify the second message verification code on the LLC protocol layer of the SGSN.
  • the SGSN verifies the second message verification code in the second authentication and key agreement response message on the LLC protocol layer of the SGSN. When the verification succeeds, the SGSN uses the determined second key and the second.
  • the algorithm performs encryption and integrity protection on the data to be processed at the LLC protocol layer of the SGSN, or only performs encryption protection or only integrity protection.
  • a negotiation process for a key and an algorithm between a UE and an SGSN is provided.
  • the integrity protection implementation specifically for the authentication and key agreement request message and the authentication and key agreement response message, performs integrity protection at the LLC protocol layer, and enhances the LLC protocol layer and the GMM/SM protocol layer on the UE side.
  • the interaction between the two sides is performed on the SGSN side to obtain the key at the GMM/SM protocol layer of the UE, and then the integrity verification of the message is performed on the LLC protocol layer, thereby improving the security of the solution and preventing Attacker's degraded attack on the algorithm.
  • the second key includes a second encryption key, and the second algorithm includes a second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes a second integrity protection algorithm
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes a second encryption algorithm and a second integrity protection algorithm
  • the second key may include the second encryption key and the second integrity key, or may be only the second encryption key, or just the second integrity key.
  • the second encryption key here is Ktc and the second integrity key is Kti.
  • the second algorithm includes a second encryption algorithm and a second integrity protection algorithm, or just a second encryption algorithm, or just a second integrity protection algorithm.
  • the integrity protection algorithm is mainly used to protect the integrity of the transmitted data at the transmitting end from being destroyed and to check whether the integrity of the received data is destroyed at the receiving end.
  • the data of the sender and the receiver are respectively calculated by the integrity protection algorithm to obtain the message verification code MAC-I and the expected message verification code XMAC-I, and the comparison between the two can confirm the integrity of the data.
  • the second key and the second algorithm are embodied to support the situation of the solution of the present invention in the actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for the specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • the SGSN uses the second key and the second algorithm, based on the foregoing first embodiment of FIG. 5 or FIG.
  • the method may further include:
  • the SGSN identifies the indicated second encryption algorithm using the second encryption key and the second encryption algorithm, Encrypting data and signaling on the LLC protocol layer of the SGSN;
  • the SGSN encrypts the user plane data and the control plane signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm to identify the indicated second encryption algorithm, and uses the second integrity key and the first
  • the second integrity protection algorithm indicated by the integrity protection algorithm identifier performs integrity protection on the control plane signaling on the LLC protocol layer of the SGSN.
  • the SGSN sends a second key and a second algorithm identifier to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN, where the second algorithm identifier is used to determine the corresponding second algorithm, and the LLC protocol in the SGSN.
  • the user plane data and the control plane signaling are simultaneously existed on the layer.
  • the data and signaling may be processed by using the second key and the second algorithm.
  • the specific processing manner may be:
  • the SGSN encrypts the data and signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm, and enhances the security of the data and signaling during transmission.
  • the SGSN encrypts the data on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm, and performs both encryption protection and integrity protection on the signaling protocol layer of the SGSN.
  • encryption protection can be performed for the data, and for signaling, both encryption protection and encryption protection can be used. Integrity protection.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • FIG. 6 is a schematic flowchart of a method for message protection in an application scenario according to an embodiment of the present invention. Specifically:
  • the UE sends an attach request message to the SGSN, where the attach request message carries the identifier of the UE and the network capability of the UE;
  • the SGSN obtains an AV for authentication from the HLR or the HSS;
  • the SGSN determines, according to the attach request message sent by the UE, that the UE is a cellular IoT type UE, and selects an encryption algorithm and an integrity protection algorithm based on the network capability of the UE and the security algorithm supported by the SGSN, and derives therefrom. With the corresponding Ktc and Kti, the SGSN uses the Kti and integrity protection algorithms to integrity protect the authentication and key agreement request messages.
  • the process may be: the sender uses Kti to perform integrity protection on the authentication and key agreement request messages to generate a MAC-I, and the receiver also generates a MAC-I value in the same manner, and the two are compared, if MAC- If I is equal to the MAC-I value, it passes the verification;
  • the SGSN generates an authentication and key agreement request message in the GMM/SM protocol layer, where the authentication and key agreement request message carries the AUTN, the RAND, the encryption algorithm, the integrity protection algorithm, the network capability of the UE, and the MAC-I.
  • the SGSN sends an authentication and key agreement request message to the LLC protocol layer of the SGSN through the GMM/SM protocol layer;
  • the LLC protocol layer of the SGSN has not obtained the key and algorithm from the GMM/SM protocol layer at this time, and therefore does not perform security processing on the authentication and key agreement request messages;
  • the SGSN sends an authentication and key agreement request message directly to the LLC protocol layer of the UE through the LLC protocol layer of the SGSN;
  • the LLC protocol layer of the UE Since the LLC protocol layer of the UE has not obtained the corresponding key and algorithm from the GMM/SM protocol layer of the UE at this time, the authentication and the key agreement request message are not processed securely;
  • the UE sends the authentication and key agreement request message directly to the GMM/SM protocol layer of the UE through the LLC protocol layer;
  • the UE performs AUTN verification at the GMM/SM protocol layer according to the prior art, and generates a RES. After detecting the network capability of the UE, the Ktc and Kti are generated, the algorithm is acquired, and the MAC-I is verified by using the integrity key and the algorithm. If the verification succeeds. And generating an authentication and key agreement response message, and calculating a new MAC-I value for the authentication and key agreement response message, wherein the authentication and the key agreement response message may be encrypted;
  • the UE sends the authentication and key agreement response message carrying the new MAC-I to the underlying LLC protocol layer through the GMM/SM protocol layer of the UE;
  • the UE sends authentication and key agreement to the LLC protocol layer of the SGSN through the LLC protocol layer of the UE.
  • the response message, the authentication and key agreement response message still carries a corresponding new MAC-I value;
  • the SGSN sends an authentication and key agreement response message carrying the new MAC-I value to the GMM/SM protocol layer of the SGSN through the LLC protocol layer of the SGSN;
  • the SGSN performs integrity verification on the new MAC-I in the authentication and key agreement response message at the GMM/SM protocol layer of the SGSN;
  • the GMM/SM protocol layer of the SGSN sends the key and algorithm to the LLC protocol layer of the SGSN, and the UE sends the authentication and key agreement response at the GMM/SM protocol layer of the UE.
  • the key and algorithm are also sent to the LLC protocol layer of the UE. If the control plane does not use integrity protection, but only the encryption protection is enabled, the GMM/SN protocol layer only sends the encryption key and the encryption algorithm. For the LLC protocol layer, the integrity key and integrity protection algorithm will not be sent;
  • the LLC protocol layer of the UE and the SGSN respectively store the key and the algorithm, and open the data encryption of the user plane, and open the encryption and integrity protection of the control plane, wherein the integrity protection of the control plane may not be turned on, for example, in the LLC protocol layer.
  • the integrity key and integrity protection algorithm is not received, the corresponding integrity protection is not enabled.
  • the foregoing application scenario is to perform integrity protection on the authentication and key agreement request message and the authentication and key agreement response message in the GMM/SM protocol layer, where the UE successfully verifies the authentication and key agreement request on the GMM/SM protocol layer. After the message is sent and the authentication and key agreement response messages are sent, the Ktc, Kti and algorithm are sent to the LLC protocol layer of the UE. After the SGSN successfully verifies the authentication and key agreement response message on the GMM/SM protocol layer, the Ktc, Kti and the algorithm are sent to the LLC protocol layer of the SGSN.
  • the method is mainly performed on the LLC protocol layer.
  • the UE receives the authentication and key agreement request message through the LLC protocol layer, and directly reports the GMM/SM protocol layer to the UE.
  • the GMM/SM protocol layer completes the authentication and generates the key, and sends the Ktc, Kti and algorithm to the LLC protocol layer of the UE, and finally the UE performs integrity verification on the authentication and key agreement request message at the LLC protocol layer of the UE.
  • FIG. 7 is another method of message protection in an application scenario according to an embodiment of the present invention.
  • the schematic diagram of the process is as follows:
  • the UE sends an attach request message to the SGSN, where the attach request message carries the identifier of the UE and the network capability of the UE;
  • the SGSN obtains an AV for authentication from the HLR or the HSS;
  • the SGSN determines, according to the attach request message sent by the UE, that the UE is a cellular IoT type UE, selects an encryption algorithm and an integrity protection algorithm based on the network capability of the UE and the security algorithm supported by the SGSN, and derives corresponding Ktc and Kti;
  • the SGSN sends the Ktc, Kti, and the corresponding algorithm to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN;
  • the SGSN After receiving the Ktc, Kti, and corresponding algorithms on the LLC protocol layer, the SGSN starts corresponding integrity protection on the LLC protocol layer;
  • the SGSN sends an authentication and key agreement request message to the LLC protocol layer of the SGSN through the GMM/SM protocol layer;
  • the SGSN generates an authentication and key agreement request message in the GMM/SM protocol layer, where the authentication and key agreement request message carries the AUTN, the RAND, the encryption algorithm, the integrity protection algorithm, the network capability of the UE, and the MAC-I.
  • the SGSN performs integrity protection on the authentication and key agreement request message on the LLC protocol layer of the SGSN, and calculates and generates a corresponding MAC-I;
  • the SGSN sends an authentication and key agreement request message directly to the LLC protocol layer of the UE through the LLC protocol layer of the SGSN.
  • the UE sends an authentication and key agreement request message to the GMM/SM protocol layer of the UE through the LLC protocol layer of the UE, where the MAC-I in the authentication and key agreement request message may not be removed, and the MAC-I is taken as part of the SDU.
  • the UE performs AUTN verification at the GMM/SM protocol layer according to the prior art, and generates an RES, and generates Ktc and Kti by detecting the network capability of the UE, and acquires an algorithm;
  • the UE sends a Ktc, a Kti, an algorithm, and an authentication and a key agreement request message to the LLC protocol layer of the UE through the GMM/SM protocol layer of the UE, where the authentication and key agreement request message carries the MAC-I;
  • the UE verifies the MAC-I with the integrity key and integrity protection algorithm at the LLC protocol layer of the UE, thereby verifying the integrity of the authentication and key agreement request message;
  • the UE sends a message that the verification succeeds or the verification fails to the GMM/SM protocol layer of the UE through the LLC protocol layer of the UE;
  • the authentication and key agreement response message is returned to the LLC protocol layer of the UE;
  • the UE starts the encryption protection of the user plane on the LLC protocol layer, and starts the encryption protection and integrity protection of the control plane.
  • the UE may only need to complete the authentication and key agreement request message or the authentication and key agreement response message.
  • Sexual protection, and subsequent signaling may not require integrity protection to be turned on.
  • the UE sends an authentication and key agreement response message carrying the new MAC-I to the LLC protocol layer of the SGSN through the LLC protocol layer;
  • the SGSN verifies that the new MAC-I carried in the authentication and key agreement response message is correct on the LLC protocol layer of the SGSN. If the verification succeeds, the data encryption protection of the user plane is enabled, and the signaling encryption protection and integrity of the control plane are enabled. Protection, optionally, if only authentication and key agreement request messages and authentication and key agreement response messages need to be integrity protected, subsequent signaling may not require integrity protection to be turned on.
  • the embodiment of the present invention further provides an apparatus based on the foregoing message protection method.
  • the meaning of the noun is the same as that in the above message protection method.
  • the user equipment in the present invention includes:
  • the receiving module 601 is configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the obtaining module 602 is configured to acquire the first algorithm identifier according to the authentication and key agreement request message received by the receiving module 601 on the GMM/SM protocol layer of the UE, and generate the first Key
  • the verification module 603 is configured to verify the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm;
  • a generating module 604 configured to generate, on the GMM/SM protocol layer of the UE, according to the first key and the first algorithm, if the verification module 603 determines that the first message verification code is verified to pass An authentication and key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • a first sending module 605 configured to send, by using a GMM/SM protocol layer of the UE, the authentication and key agreement response message generated by the generating module 604 to the SGSN, so that the SGSN pairs the second The message verification code is verified.
  • the receiving module 601 receives the authentication and key agreement request message sent by the SGSN through the GMM/SM protocol layer of the UE, where the authentication and key agreement request message carries the first message verification code and the first algorithm identifier, and the first The algorithm identifier is used to indicate the first algorithm; the obtaining module 602 obtains the first algorithm identifier according to the authentication and key agreement request message received by the receiving module 601 on the GMM/SM protocol layer of the UE, and generates a first key; the verification module 603 Acquiring the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm; and if the verification module 603 determines that the first message verification code is verified, the generating module 604 Generating an authentication and key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm, where the authentication and key agreement response message carries the second message verification code; the first sending module 605 The authentication and key agreement
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed at the GMM/SM protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the function of the integrity protection of the LLC protocol layer of the UE and the SGSN in the prior art is solved.
  • the UE and the GMM/SM protocol layer of the SGSN respectively perform integrity protection on the authentication and key agreement request messages, and the authentication and key agreement response messages, which can be supported in practical applications, thereby improving the security of the solution and preventing attacks. A degraded attack on the algorithm.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the first key and the first algorithm are embodied to support the situation of the solution of the present invention in an actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for a specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • another embodiment of the user equipment in the present invention includes:
  • the receiving module 601 is configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the obtaining module 602 is configured to acquire, according to the authentication and key agreement request message received by the receiving module 601, the first algorithm identifier on the GMM/SM protocol layer of the UE, and generate a first key;
  • the verification module 603 is configured to verify the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm;
  • a generating module 604 configured to generate, on the GMM/SM protocol layer of the UE, according to the first key and the first algorithm, if the verification module 603 determines that the first message verification code is verified to pass An authentication and key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • the message processing module 606 is configured to: after the generating, the generating module 604 generates an authentication and key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm, Encrypting the authentication and key agreement response message on the GMM/SM protocol layer of the UE by using the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier;
  • the authentication and key agreement response message on the GMM/SM protocol layer of the UE Integrity protection Using the first integrity key and the first integrity protection algorithm to identify the indicated first integrity protection algorithm, the authentication and key agreement response message on the GMM/SM protocol layer of the UE Integrity protection;
  • a first sending module 605 configured to send, by using a GMM/SM protocol layer of the UE, the authentication and key agreement response message generated by the generating module 604 to the SGSN, so that the SGSN pairs the second The message verification code is verified.
  • another embodiment of the user equipment in the present invention includes:
  • the second sending module 607 is configured to send, by the GMM/SM protocol layer of the UE, the authentication and key agreement request message sent by the SGSN to the SGSN through the GMM/SM protocol layer of the UE.
  • the GMM/SM protocol layer sends an attach request message, where the attach request message carries the identifier of the UE and the network capability information of the UE, so that the SGSN is in the GMM/ of the SGSN according to the attach request message.
  • the receiving module 601 is configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the obtaining module 602 is configured to acquire, according to the authentication and key agreement request message received by the receiving module 601, the first algorithm identifier on the GMM/SM protocol layer of the UE, and generate a first secret key;
  • the verification module 603 is configured to verify the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm;
  • a generating module 604 configured to generate, on the GMM/SM protocol layer of the UE, according to the first key and the first algorithm, if the verification module 603 determines that the first message verification code is verified to pass An authentication and key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • a first sending module 605 configured to send, by using a GMM/SM protocol layer of the UE, the authentication and key agreement response message generated by the generating module 604 to the SGSN, so that the SGSN pairs the second The message verification code is verified.
  • the UE sends an attach request message to the SGSN, so that the SGSN can obtain the relevant parameters of the authentication according to the attach request message, and on the other hand, provides a specific implementation basis for the practical application of the solution of the present invention, and on the other hand, A way for the UE to interact with the network side is to complete the information interaction with the network through the attach request, thereby improving the practicability of the solution.
  • another embodiment of the user equipment in the present invention includes:
  • the receiving module 601 is configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the obtaining module 602 is configured to acquire, according to the authentication and key agreement request message received by the receiving module 601, the first algorithm identifier on the GMM/SM protocol layer of the UE, and generate a first key;
  • the verification module 603 is configured to verify the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm;
  • a generating module 604 configured to generate, on the GMM/SM protocol layer of the UE, according to the first key and the first algorithm, if the verification module 603 determines that the first message verification code is verified to pass An authentication and key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • a first sending module 605 configured to send, by using a GMM/SM protocol layer of the UE, the SGSN And sending the authentication and key agreement response message generated by the generating module 604, so that the SGSN verifies the second message verification code;
  • a third sending module 608, configured to: after the first sending module 605 sends the authentication and key agreement response message to the SGSN by using a GMM/SM protocol layer of the UE, by using a GMM/SM protocol of the UE The layer sends the first key and the first algorithm identifier to a logical link control LLC protocol layer of the UE.
  • the UE may further send the first algorithm and the first key to the LLC protocol layer of the UE, so that the UE is in the UE.
  • the LLC protocol layer data and signaling can be processed accordingly to increase the reliability of the solution and further enhance the practicability of the solution.
  • another embodiment of the user equipment in the present invention includes:
  • the receiving module 601 is configured to receive, by using the GPRS mobility management GMM/Session Management SM protocol layer of the UE, an authentication and a key agreement request message sent by the serving GPRS support node SGSN, where the authentication and key agreement request message carries a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the obtaining module 602 is configured to acquire, according to the authentication and key agreement request message received by the receiving module 601, the first algorithm identifier on the GMM/SM protocol layer of the UE, and generate a first key;
  • the verification module 603 is configured to verify the first message verification code on the GMM/SM protocol layer of the UE according to the first key acquired by the obtaining module 602 and the generated first algorithm;
  • a generating module 604 configured to generate, on the GMM/SM protocol layer of the UE, according to the first key and the first algorithm, if the verification module 603 determines that the first message verification code is verified to pass An authentication and key agreement response message, where the authentication and key agreement response message carries a second message verification code;
  • a first sending module 605, configured to send, by using a GMM/SM protocol layer of the UE, the authentication and key agreement response message generated by the generating module 604 to the SGSN, so that the SGSN pairs the second The message verification code is verified;
  • a third sending module 608, configured to send, by the first sending module 605, the authentication and key agreement response message to the SGSN by using a GMM/SM protocol layer of the UE, by using the UE Transmitting, by the GMM/SM protocol layer, the first key and the first algorithm identifier to a logical link control LLC protocol layer of the UE;
  • the cryptographic module 609 after the third sending module 608 sends the first key and the first algorithm identifier to the logical link control LLC protocol layer of the UE by using the GMM/SM protocol layer of the UE Encrypting the user plane data and the control plane signaling on the LLC protocol layer of the UE by using the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier;
  • the UE uses the first encryption key and the first encryption algorithm indicated by the first encryption algorithm to identify the user plane data and the control plane information on an LLC protocol layer of the UE. Encrypting, and using the first integrity key and the first integrity protection algorithm to identify the first integrity protection algorithm indicated, the control plane is on the LLC protocol layer of the UE Signaling for integrity protection.
  • encryption protection can be performed for the data, and for signaling, encryption protection can be used. Integrity protection is possible. The corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the serving GPRS support node in the embodiment of the present invention includes:
  • the obtaining module 701 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm ;
  • the generating module 702 is configured to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm acquired by the acquiring module 701, and The authentication and key agreement request message is sent to the user equipment UE, where the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the first receiving module 703 is configured to receive the lifetime by using a GMM/SM protocol layer of the SGSN.
  • the verification module 704 is configured to verify, by using the second key and the second algorithm, the second message verification code received by the first receiving module 703 on a GMM/SM protocol layer of the SGSN.
  • the acquiring module 701 acquires the second algorithm identifier on the GMM/SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm; and the generating module 702
  • the second key obtained by the obtaining module 701 and the second algorithm are used to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN, and send the authentication and key agreement request message to the user equipment UE.
  • the authentication and key agreement request message carries the first message verification code and the second algorithm identifier.
  • the first receiving module 703 receives the authentication and key agreement response message sent by the generating module 702 through the GMM/SM protocol layer of the SGSN, where the authentication and the authentication are performed.
  • the key agreement response message carries the second message verification code; the verification module 704 uses the second key and the second algorithm to verify the second message verification code received by the first receiving module 703 on the GMM/SM protocol layer of the SGSN. .
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes the second integrity protection algorithm;
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the second key and the second algorithm are embodied to support the situation of the solution of the present invention in the actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for the specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • another embodiment of the serving GPRS support node in the present invention includes:
  • the obtaining module 701 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm ;
  • the second receiving module 705 is configured to generate, by the generating module 702, an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN, and send the authentication and key agreement request message to the user equipment UE.
  • the generating module 702 is configured to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm acquired by the acquiring module 701, and The authentication and key agreement request message is sent to the user equipment UE, where the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the first receiving module 703 is configured to receive, by using the GMM/SM protocol layer of the SGSN, the authentication and key agreement response message sent by the generating module 702, where the authentication and the key agreement response message carry the second message. Verification code;
  • the verification module 704 is configured to verify, by using the second key and the second algorithm, the second message verification code received by the first receiving module 703 on a GMM/SM protocol layer of the SGSN;
  • the obtaining module 701 includes:
  • the obtaining unit 7011 is configured to acquire the second algorithm according to the network capability information of the UE.
  • the generating unit 7012 is configured to acquire the authentication vector information of the UE according to the identifier of the UE, and generate the second key according to the authentication vector information.
  • the SGSN receives the attach request message sent by the UE, and obtains the relevant parameters of the authentication according to the attach request message, which provides a specific implementation basis for the practical application of the solution of the present invention, and on the other hand, the UE and the SGSN. A way of interacting, through the attachment request to complete the information interaction with the network, thereby improving the practicability of the solution.
  • the SGSN When the SGSN receives the attach request information carrying the identifier of the UE and the network capability information of the UE, selecting a reasonable algorithm according to the network capability information of the UE, and confirming the authentication vector information corresponding to the UE by using the identifier of the UE, so that the scheme is It is more rationalized in practical applications, and specific algorithms and key selections are performed for specific UEs to enhance the feasibility of the entire solution.
  • another embodiment of the serving GPRS support node in the present invention includes:
  • the obtaining module 701 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to refer to Showing the second algorithm;
  • the generating module 702 is configured to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm acquired by the acquiring module 701, and The authentication and key agreement request message is sent to the user equipment UE, where the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the first receiving module 703 is configured to receive, by using the GMM/SM protocol layer of the SGSN, the authentication and key agreement response message sent by the generating module 702, where the authentication and the key agreement response message carry the second message. Verification code;
  • the verification module 704 is configured to verify, by using the second key and the second algorithm, the second message verification code received by the first receiving module 703 on a GMM/SM protocol layer of the SGSN;
  • a sending module 706, configured to send, by using a GMM/SM protocol layer of the SGSN, a logical link control LLC protocol layer of the SGSN, if the second message verification code is passed after the verification module 704 verifies The second key and the second algorithm identifier.
  • the SGSN after determining that the second message verification code is passed, the SGSN sends the second key and the second algorithm to the LLC protocol layer of the SGSN through the GMM/SM protocol layer of the SGSN, so that the SGSN is on the LLC protocol layer.
  • the data and signaling can be processed accordingly to increase the reliability of the solution and further enhance the practicability of the solution.
  • another embodiment of the serving GPRS support node in the present invention includes:
  • the obtaining module 701 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm ;
  • the generating module 702 is configured to generate an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN by using the second key and the second algorithm acquired by the acquiring module 701, and The authentication and key agreement request message is sent to the user equipment UE, where the authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the first receiving module 703 is configured to receive, by using the GMM/SM protocol layer of the SGSN, the authentication and key agreement response message sent by the generating module 702, where the authentication and the key agreement response message carry the second message. Verification code;
  • a verification module 704 configured to use the second key and the second algorithm at the SGSN Verifying, by the GMM/SM protocol layer, the second message verification code received by the first receiving module 703;
  • a sending module 706, configured to send, by using a GMM/SM protocol layer of the SGSN, a logical link control LLC protocol layer of the SGSN, if the second message verification code is passed after the verification module 704 verifies a second key and the second algorithm identifier;
  • the cryptographic module 707 is configured to send, by the sending module 706, the second key and the second algorithm identifier to the logical link control LLC protocol layer of the SGSN by using a GMM/SM protocol layer of the SGSN.
  • the SGSN encrypts the user plane data and the control plane signaling on the LLC protocol layer of the SGSN by using the second encryption key and the second encryption algorithm indicated by the second encryption algorithm identifier;
  • encryption protection can be performed for data, and for signaling, encryption protection can be used. Integrity protection is possible.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the user equipment in the present invention includes:
  • the receiving module 801 is configured to receive, by using a logical link control LLC protocol layer of the UE, a first authentication and key agreement request message sent by the serving GPRS support node SGSN, where the first authentication and key agreement request message is Carrying a first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • a processing module 802 configured to receive, by the LLC protocol layer, the receiving module 801
  • the first authentication and key agreement request message is processed to obtain a second authentication and key agreement request message, and the second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management of the UE.
  • SM protocol layer configured to receive, by the LLC protocol layer, the receiving module 801
  • the first authentication and key agreement request message is processed to obtain a second authentication and key agreement request message, and the second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management of the UE.
  • a generating module 804 configured to: if the first algorithm and the first key are used to obtain the first message verification code verification by using the acquiring module 803 on the LLC protocol layer of the UE, Generating the first authentication and key agreement response message on a GMM/SM protocol layer of the UE;
  • the message processing module 805 is configured to perform encryption and/or integrity protection on the first authentication and key agreement response message generated by the generating module 804 on the LLC protocol layer of the UE to obtain a second authentication and a key.
  • the sending module 806 is configured to send, by using the LLC protocol layer of the UE, the second authentication and key agreement response message obtained by the message processing module 805 to the SGSN, so that the SGSN pairs the The second message verification code is verified.
  • the receiving module 801 receives the first authentication and key agreement request message sent by the serving GPRS support node SGSN through the logical link control LLC protocol layer of the UE, where the first authentication and the key agreement request message carry the first a message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm; the processing module 802 processes the first authentication and key agreement request message received by the receiving module 801 at the LLC protocol layer to obtain the second authentication.
  • the processing module 802 sends the second authentication and key agreement request message to the UE
  • the obtaining module 803 acquires the first algorithm identifier according to the second authentication and key agreement request on the GMM/SM protocol layer of the UE, generates a first key, and generates the first key and the first key.
  • the algorithm identifies the LLC protocol layer that is sent to the UE; if the first algorithm and the first key are used by the obtaining module 803 on the LLC protocol layer of the UE, the first message verification code is verified.
  • the UE 804 generates the module generates the first authentication on the UE GMM / SM protocol layer And a key negotiation response message; the message processing module 805 is configured to perform encryption and/or integrity protection on the first authentication and key agreement response message generated by the generating module 804 on the LLC protocol layer of the UE. Obtaining a second authentication and key agreement response message, where the second authentication and key agreement response message carries a second message verification code, and the sending module 806 is configured to send, by using the LLC protocol layer of the UE, the SGSN The second authentication and key agreement response message obtained by the message processing module 805 is processed, so that the SGSN verifies the second message verification code.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed on the LLC protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the side enhances the interaction between the LLC protocol layer and the GMM/SM protocol layer, so as to obtain the key in the GMM/SM protocol layer of the UE, and then perform integrity verification on the message at the LLC protocol layer, thereby improving the security of the solution. Sex, to prevent attackers from attacking the algorithm.
  • the first key includes a first encryption key, and the first algorithm includes the first encryption algorithm;
  • the first key includes a first integrity key, and the first algorithm includes the first integrity protection algorithm;
  • the first key includes a first encryption key and a first integrity key
  • the first algorithm includes the first encryption algorithm and the first integrity protection algorithm
  • the first key and the first algorithm are embodied to support the situation of the solution of the present invention in an actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for a specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • another embodiment of the user equipment in the present invention includes:
  • the receiving module 801 is configured to receive, by using a logical link control LLC protocol layer of the UE, a first authentication and key agreement request message sent by the serving GPRS support node SGSN, where the first authentication and key agreement request message is Carrying a first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • a processing module 802 configured to receive, by the LLC protocol layer, the receiving module 801
  • the first authentication and key agreement request message is processed to obtain a second authentication and key agreement request message, and the second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management of the UE.
  • SM protocol layer configured to receive, by the LLC protocol layer, the receiving module 801
  • the first authentication and key agreement request message is processed to obtain a second authentication and key agreement request message, and the second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management of the UE.
  • a generating module 804 configured to: if the first algorithm and the first key are used to obtain the first message verification code verification by using the acquiring module 803 on the LLC protocol layer of the UE, Generating the first authentication and key agreement response message on a GMM/SM protocol layer of the UE;
  • the message processing module 805 is configured to perform encryption and/or integrity protection on the first authentication and key agreement response message generated by the generating module 804 on the LLC protocol layer of the UE to obtain a second authentication and a key.
  • the sending module 806 is configured to send, by using the LLC protocol layer of the UE, the second authentication and key agreement response message obtained by the message processing module 805 to the SGSN, so that the SGSN pairs the Two message verification codes are verified;
  • the message processing module 805 includes:
  • the encryption unit 8051 is configured to use the first encryption key and the first encryption algorithm indicated by the first encryption algorithm identifier to perform the first authentication and the key on an LLC protocol layer of the UE. Encrypting the negotiation response message to obtain the second authentication and key agreement response message;
  • the first authentication and key agreement on the LLC protocol layer of the UE Performing integrity protection on the response message to obtain the second authentication and key agreement response message;
  • the first integrity protection algorithm performs integrity protection on the first authentication and key agreement response message on the LLC protocol layer of the UE to obtain the second authentication and key agreement response message.
  • a specific solution for protecting the first authentication and the key agreement response message is proposed, which not only performs encryption protection or integrity protection, but also performs encryption protection and integrity protection at the same time. It greatly increases the security, continuity and integrity of message transmission, and has a better practical effect in the specific implementation of the scheme.
  • another embodiment of the user equipment in the present invention includes:
  • the receiving module 801 is configured to receive, by using a logical link control LLC protocol layer of the UE, a first authentication and key agreement request message sent by the serving GPRS support node SGSN, where the first authentication and key agreement request message is Carrying a first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm;
  • the processing module 802 is configured to process, by the LLC protocol layer, the first authentication and key agreement request message received by the receiving module 801, obtain a second authentication and key agreement request message, and The second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management SM protocol layer of the UE;
  • a generating module 804 configured to: if the first algorithm and the first key are used to obtain the first message verification code verification by using the acquiring module 803 on the LLC protocol layer of the UE, Generating the first authentication and key agreement response message on a GMM/SM protocol layer of the UE;
  • the encryption module 807 is configured to: after the generating module 804 generates the first authentication and key agreement response message on the GMM/SM protocol layer of the UE, using the first encryption key and the first encryption
  • the first encryption algorithm indicated by the algorithm identifier encrypts user plane data and control plane signaling on an LLC protocol layer of the UE;
  • the user plane data and the control plane signaling are performed on an LLC protocol layer of the UE.
  • Row encryption, and using the first integrity key and the first integrity protection algorithm identifier to indicate the first integrity protection algorithm, the control plane is on the LLC protocol layer of the UE For integrity protection;
  • the message processing module 805 is configured to perform encryption and/or integrity protection on the first authentication and key agreement response message generated by the generating module 804 on the LLC protocol layer of the UE to obtain a second authentication and a key.
  • the sending module 806 is configured to send, by using the LLC protocol layer of the UE, the second authentication and key agreement response message obtained by the message processing module 805 to the SGSN, so that the SGSN pairs the The second message verification code is verified.
  • encryption protection can be performed on the data, and for signaling, both encryption protection and encryption protection can be used. Integrity protection.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the serving GPRS support node in the embodiment of the present invention includes:
  • the obtaining module 901 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm ;
  • the first sending module 902 is configured to send, by using a GMM/SM protocol layer of the SGSN, the second algorithm identifier acquired by the acquiring module 901 and the generated first part to a logical link control LLC protocol layer of the SGSN. Second key
  • the message processing module 903 is configured to perform, by using the second algorithm and the second key sent by the first sending module 902, on the LLC protocol layer of the SGSN, to perform the first authentication and the key agreement request message. Integrity protection and generate a first message verification code;
  • the second sending module 904 is configured to send, by using an LLC protocol layer of the SGSN, the first authentication and the key agreement request that is processed by the message processing module 903 to the LLC protocol layer of the UE.
  • the first authentication and key agreement request message carries the first message verification code and the second algorithm identifier;
  • the receiving module 905 is configured to: if the UE determines, on the LLC protocol layer of the UE, that the first message verification code sent by the second sending module 904 is verified, the SGSN passes the LLC protocol of the SGSN. Receiving, by the layer, a second authentication and key agreement response message sent by the UE, where the second authentication and key agreement response message carries a second message verification code;
  • the verification module 906 is configured to verify, by the SGSN, the second message verification code received by the receiving module 905 on the LLC protocol layer of the SGSN by using the second key and the second algorithm.
  • the obtaining module 901 obtains the second algorithm identifier on the GMM/SM protocol layer of the SGSN, and generates a second key, where the second algorithm identifier is used to indicate the second algorithm; the first sending module 902 passes the GMM of the SGSN.
  • the /SM protocol layer sends the second algorithm identifier acquired by the obtaining module 901 and the generated second key to the LLC protocol layer of the SGSN; the message processing module 903 uses the second algorithm sent by the first sending module 902 on the LLC protocol layer of the SGSN.
  • the second sending module 904 sends a message to the LLC protocol layer of the UE by using an LLC protocol layer of the SGSN.
  • the first authentication and key agreement request message is processed by the processing module 903, where the first authentication and key agreement request message carries the first message verification code and the second algorithm identifier; if the UE is determined on the LLC protocol layer of the UE
  • the receiving module 905SGSN receives the second authentication and key agreement response message sent by the UE through the LLC protocol layer of the SGSN, where the second authentication and the secret are used.
  • Negotiation response message carries a second message authentication code; SGSN using the second algorithm and a second key, the verification module 906 verifies the second receiving module 905 receives the message authentication code in the SGSN LLC protocol layer.
  • an implementation scheme for integrity protection of a key and algorithm negotiation process between a UE and an SGSN is provided, specifically, an authentication and a key agreement request message, and an authentication and key agreement response message are in the LLC.
  • the protocol layer performs integrity protection, and the interaction between the LLC protocol layer and the GMM/SM protocol layer is enhanced on the UE side, and less message verification is performed on the SGSN side, thereby obtaining a key at the GMM/SM protocol layer of the UE. Then, the integrity verification of the message is performed on the LLC protocol layer, thereby improving the security of the solution and preventing the attacker from degrading the algorithm.
  • the service provided by the embodiment of the present invention is provided on the basis of the foregoing embodiment corresponding to FIG.
  • a first alternative embodiment of the GPRS support node
  • the second key includes a second encryption key, and the second algorithm includes the second encryption algorithm
  • the second key includes a second integrity key, and the second algorithm includes the second integrity protection algorithm;
  • the second key includes a second encryption key and a second integrity key
  • the second algorithm includes the second encryption algorithm and the second integrity protection algorithm
  • the second key and the second algorithm are embodied to support the situation of the solution of the present invention in the actual application scenario, and the flexibility of the solution is enhanced, and a specific algorithm is selected for the specific scenario.
  • the inclusion of data also increases the plasticity of the solution.
  • another embodiment of the serving GPRS support node in the present invention includes:
  • the obtaining module 901 is configured to obtain a second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generate a second key, where the second algorithm identifier is used to indicate the second algorithm ;
  • the first sending module 902 is configured to send, by using a GMM/SM protocol layer of the SGSN, the second algorithm identifier acquired by the acquiring module 901 and the generated first part to a logical link control LLC protocol layer of the SGSN. Second key
  • the message processing module 903 is configured to perform, by using the second algorithm and the second key sent by the first sending module 902, on the LLC protocol layer of the SGSN, to perform the first authentication and the key agreement request message. Integrity protection and generate a first message verification code;
  • the second sending module 904 is configured to send the first authentication and key agreement request message processed by the message processing module 903 to the LLC protocol layer of the UE by using an LLC protocol layer of the SGSN, where the first The first message verification code and the second algorithm identifier are carried in the authentication and key agreement request message.
  • the receiving module 905 is configured to: if the UE determines, on the LLC protocol layer of the UE, that the first message verification code sent by the second sending module 904 is verified, the SGSN passes the LLC protocol of the SGSN. Receiving, by the layer, a second authentication and key agreement response message sent by the UE, where the second authentication and key agreement response message carries a second message verification code;
  • the verification module 906 is configured to verify, by the SGSN, the second message verification code received by the receiving module 905 on the LLC protocol layer of the SGSN by using the second key and the second algorithm;
  • the encryption module 907 is configured to use, by the verification module 906, the second message and the second algorithm, after verifying the second message verification code on the LLC protocol layer of the SGSN. And using the second encryption key and the second encryption algorithm to identify the indicated second encryption algorithm, encrypting data and signaling on an LLC protocol layer of the SGSN;
  • encryption protection can be performed for the data, and for signaling, both encryption protection and encryption protection can be used. Integrity protection.
  • the corresponding protection mode can be selected according to the actual situation, thereby realizing the feasibility of the solution of the present invention in the application process.
  • the security of data and signaling can be enhanced by encryption protection, and the integrity of signaling is enhanced by integrity protection. , thus greatly ensuring the reliability of data and signaling during transmission.
  • the embodiment of the present invention further provides another user equipment.
  • the user equipment may be any terminal device including a mobile phone, a tablet computer, a personal digital assistant (English full name: Personal Digital Assistant, English abbreviation: PDA), a sales terminal (English full name: Point of Sales, English abbreviation: POS), a car computer, and the like. Take the terminal as a mobile phone as an example:
  • FIG. 22 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present invention.
  • the mobile phone includes: radio frequency (English full name: Radio Frequency, English abbreviation: RF) circuit 1010, memory 1020, input unit 1030, display unit 1040, sensor 1050, audio circuit 1060, wireless fidelity (English full name: wireless fidelity , English abbreviation: WiFi) module 1070, processor 1080, and power supply 1090 and other components.
  • radio frequency English full name: Radio Frequency, English abbreviation: RF
  • memory 1020 input unit 1030
  • display unit 1040 sensor 1050
  • audio circuit 1060 audio circuit
  • wireless fidelity English full name: wireless fidelity , English abbreviation: WiFi
  • WiFi wireless fidelity
  • processor 1080 processor 1080
  • power supply 1090 power supply
  • the RF circuit 1010 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. In particular, after receiving the downlink information of the base station, it is processed by the processor 1080. In addition, the uplink data is designed to be sent to the base station.
  • the RF circuit 1010 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (English name: Low Noise Amplifier, LNA), a duplexer, and the like.
  • RF circuit 1010 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to the global mobile communication system (English full name: Global System of Mobile communication, English abbreviation: GSM), general packet radio service (English full name: General Packet Radio Service, English Abbreviations: GPRS), code division multiple access (English full name: Code Division Multiple Access, English abbreviation: CDMA), wideband code division multiple access (English full name: Wideband Code Division Multiple Access, English abbreviation WCDMA), long-term evolution (English full name: Long Term Evolution, English abbreviation: LTE), e-mail, short message service (English full name: Short Messaging Service, English abbreviation: SMS).
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 1020 can be used to store software programs and modules, and the processor 1080 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1020.
  • the memory 1020 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1020 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1030 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1030 may include a touch panel 1031 and other input devices 1032.
  • the touch panel 1031 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1031 or near the touch panel 1031. Operation) and according to a preset schedule Drive the corresponding connecting device.
  • the touch panel 1031 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1080 is provided and can receive commands from the processor 1080 and execute them.
  • the touch panel 1031 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1030 may also include other input devices 1032.
  • other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1040 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1040 can include a display panel 1041.
  • a liquid crystal display (English name: Liquid Crystal Display, English abbreviation: LCD), an organic light emitting diode (English name: Organic Light-Emitting Diode, English abbreviation: OLED), etc.
  • the display panel 1041 is configured in a form.
  • the touch panel 1031 may cover the display panel 1041, and when the touch panel 1031 detects a touch operation thereon or nearby, the touch panel 1031 transmits to the processor 1080 to determine the type of the touch event, and then the processor 1080 according to the touch event.
  • the type provides a corresponding visual output on display panel 1041.
  • the touch panel 1031 and the display panel 1041 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1031 may be integrated with the display panel 1041. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 1050, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1041 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1041 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • Audio circuit 1060, speaker 1061, and microphone 1062 can provide audio between the user and the mobile phone interface.
  • the audio circuit 1060 can transmit the converted electrical data of the received audio data to the speaker 1061, and convert it into a sound signal output by the speaker 1061; on the other hand, the microphone 1062 converts the collected sound signal into an electrical signal, by the audio circuit 1060. After receiving, it is converted into audio data, and then processed by the audio data output processor 1080, sent to the other mobile phone via the RF circuit 1010, or outputted to the memory 1020 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1070 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 22 shows the WiFi module 1070, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1080 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1020, and invoking data stored in the memory 1020, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1080 may include one or more processing units; preferably, the processor 1080 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1080.
  • the mobile phone also includes a power source 1090 (such as a battery) that supplies power to various components.
  • a power source 1090 such as a battery
  • the power source can be logically coupled to the processor 1080 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the input unit 1030 included in the terminal has the following functions:
  • the input unit 1030 may also have the following functions:
  • the first authentication and key agreement request message sent by the serving GPRS support node SGSN is received by the logical link control LLC protocol layer of the UE, where the first authentication and key agreement request message carries the first message verification code And the first algorithm identifier, the first algorithm identifier is used to indicate the first An algorithm;
  • the processor 1080 included in the terminal further has the following functions:
  • the UE determines that the first message verification code is verified, generating an authentication and a key agreement response message on the GMM/SM protocol layer of the UE according to the first key and the first algorithm,
  • the authentication and key agreement response message carries a second message verification code.
  • processor 1080 can also have the following functions:
  • the LLC protocol layer Processing, by the LLC protocol layer, the first authentication and key agreement request message, obtaining a second authentication and key agreement request message, and sending the second authentication and key agreement request message to the UE GPRS mobility management GMM/session management SM protocol layer;
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates the first authentication and key agreement response on the GMM/SM protocol layer of the UE.
  • the UE determines that the first message verification code verification is passed on the LLC protocol layer of the UE, the UE generates the first authentication and key agreement response on the GMM/SM protocol layer of the UE.
  • the output device included in the terminal further has the following functions:
  • the output device may also have the following functions:
  • FIG. 23 is a schematic structural diagram of a serving GPRS support node according to an embodiment of the present invention.
  • the serving GPRS support node 1100 may generate a large difference due to different configurations or performances, and may include one or more central processors (English full name: Central processing units, abbreviations: CPU) 1122 (eg, one or more processors) and memory 1132, one or more storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
  • the memory 1132 and the storage medium 1130 may be short-term storage or persistent storage.
  • the program stored on storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations in a serving GPRS support node.
  • the central processor 1122 can be configured to communicate with the storage medium 1130, which performs a series of instruction operations in the storage medium 1130.
  • Serving GPRS support node 1100 may also include one or more power supplies 1126, one or more wired or wireless network interfaces 1150, one or more input and output interfaces 1158, and/or one or more operating systems 1141, such as Windows ServerTM , Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • operating systems 1141 such as Windows ServerTM , Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • the input device included in the device further has the following functions:
  • the authentication and key agreement response message sent by the UE is received by the GMM/SM protocol layer of the SGSN, where the authentication and key agreement response message carries a second message verification code.
  • the input device may further have the following functions:
  • the SGSN receives the second authentication and key agreement response sent by the UE by using an LLC protocol layer of the SGSN. a message, where the second authentication and key agreement response message carries a second message verification code
  • the processor 1122 included in the device further has the following functions:
  • the authentication and key agreement request message carries a first message verification code and a second algorithm identifier
  • the second message verification code is verified on the GMM/SM protocol layer of the SGSN using the second key and the second algorithm.
  • processor 1122 may also have the following functions:
  • the second message verification code is verified on the LLC protocol layer of the SGSN using the second key and the second algorithm.
  • the output device included in the device further has the following functions:
  • the LLC protocol layer of the SGSN Transmitting, by the LLC protocol layer of the SGSN, the first authentication and key agreement request message to the LLC protocol layer of the UE, where the first authentication and key agreement request message carries a first message verification code and a second Algorithm identification.
  • the steps performed by the serving GPRS support node in the above embodiment may be based on the server structure shown in FIG.
  • the message protection system in the embodiment of the present invention includes:
  • the user equipment UE1201 receives the authentication and key agreement request message sent by the serving GPRS support node SGSN 1202 through the GPRS mobility management GMM/session management SM protocol layer of the UE, and the first message verification code and the first message are carried in the authentication and key agreement request message.
  • An algorithm identifier, the first algorithm identifier is used to indicate the first algorithm; the UE 1201 obtains the first algorithm identifier according to the authentication and key agreement request message on the GMM/SM protocol layer of the UE, and generates a first key; the UE 1201 is configured according to the first key.
  • the first message verification code is verified on the GMM/SM protocol layer of the UE; if the UE 1201 determines that the first message verification code is verified, the first key and the first The algorithm generates an authentication and key agreement response message on the GMM/SM protocol layer of the UE, where the authentication and key agreement are performed.
  • the response message carries the second message verification code; the UE 1201 sends an authentication and key agreement response message to the SGSN 1202 through the GMM/SM protocol layer of the UE, so that the SGSN 1202 verifies the second message verification code.
  • the serving GPRS support node SGSN 1202 obtains the second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key, the second algorithm identifier is used to indicate the second algorithm; the SGSN 1202 uses the second key.
  • the second algorithm generating an authentication and key agreement request message on the GMM/SM protocol layer of the SGSN, and sending the authentication and key agreement request message to the user equipment UE1201, where the authentication and key agreement request message carries the first message verification
  • the SGSN 1202 receives the authentication and key agreement response message sent by the UE 1201 through the GMM/SM protocol layer of the SGSN, where the authentication and key agreement response message carries the second message verification code; the SGSN 1202 uses the second secret.
  • the key and the second algorithm verify the second message verification code on the GMM/SM protocol layer of the SGSN.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed at the GMM/SM protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the function of the integrity protection of the LLC protocol layer of the UE and the SGSN in the prior art is solved.
  • the UE and the GMM/SM protocol layer of the SGSN respectively perform integrity protection on the authentication and key agreement request messages, and the authentication and key agreement response messages, which can be supported in practical applications, thereby improving the security of the solution and preventing attacks. A degraded attack on the algorithm.
  • the user equipment UE1201 receives the first authentication and key agreement request message sent by the serving GPRS support node SGSN 1202 through the logical link control LLC protocol layer of the UE, where the first authentication and key agreement request message carries the first message verification code and a first algorithm identifier, where the first algorithm identifier is used to indicate the first algorithm; the UE 1201 processes the first authentication and key agreement request message at the LLC protocol layer, obtains a second authentication and key agreement request message, and The second authentication and key agreement request message is sent to the GPRS mobility management GMM/session management SM protocol layer of the UE; the UE 1201 acquires the first algorithm identifier according to the second authentication and key agreement request on the GMM/SM protocol layer of the UE, and generates a first key, and sending the first key and the first algorithm identifier to the LLC protocol layer of the UE; if the UE 1201 determines that the first message verification code is verified on the LLC protocol layer of the UE, the UE 1201 is Generating a first
  • the serving GPRS support node SGSN 1202 obtains the second algorithm identifier on the GPRS mobility management GMM/session management SM protocol layer of the SGSN, and generates a second key.
  • the second algorithm identifier is used to indicate the second algorithm; the SGSN 1202 passes the GMM of the SGSN.
  • the SM protocol layer sends a second algorithm identifier and the second key to the logical link control LLC protocol layer of the SGSN; the SGSN 1202 performs integrity protection on the first authentication and key agreement request message on the LLC protocol layer of the SGSN, and Generating a first message verification code; the SGSN 1202 sends a first authentication and a key agreement request message to the LLC protocol layer of the UE through the LLC protocol layer of the SGSN, where the first authentication and key agreement request message carries the first message verification code and the second If the UE 1201 determines that the first message verification code is verified on the LLC protocol layer of the UE, the SGSN 1202 receives the second authentication and key agreement response message sent by the UE 1201 through the LLC protocol layer of the SGSN, where the second authentication and the secret are used.
  • the key negotiation response message carries a second message verification code; the SGSN 1202 uses the second key and the second algorithm to verify the second message verification code on the LLC protocol layer of the SGSN.
  • an implementation scheme for message protection between a UE and an SGSN where the integrity protection is performed at the GMM/SM protocol layer for the authentication and key agreement request message and the authentication and key agreement response message.
  • the function of the integrity protection of the LLC protocol layer of the UE and the SGSN in the prior art is solved.
  • the UE and the GMM/SM protocol layer of the SGSN respectively perform integrity protection on the authentication and key agreement request messages, and the authentication and key agreement response messages, which can be supported in practical applications, thereby improving the security of the solution and preventing attacks. A degraded attack on the algorithm.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or Some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (English full name: Read-Only Memory, English abbreviation: ROM), a random access memory (English full name: Random Access Memory, English abbreviation: RAM), magnetic A variety of media that can store program code, such as a disc or a disc.

Abstract

本发明实施例公开了一种消息保护的方法,包括:UE通过UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息;UE在UE的GMM/SM协议层上根据认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;UE根据第一密钥和第一算法,在UE的GMM/SM协议层上验证第一消息验证码;若UE确定第一消息验证码验证通过,则根据第一密钥和第一算法,在UE的GMM/SM协议层上生成认证和密钥协商响应消息;UE通过UE的GMM/SM协议层向SGSN发送认证和密钥协商响应消息,以使SGSN对第二消息验证码进行验证。本发明实施例还提供了消息保护的相关设备以及系统。可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。

Description

一种消息保护的方法、相关设备以及系统 技术领域
本发明涉及通信领域,尤其涉及一种消息保护的方法、相关设备以及系统。
背景技术
蜂窝式物联网(英文全称:Internet of Things,英文缩写:IoT)中的用户设备(英文全称:User Equipment,英文缩写:UE)通信具有数据量小,发送数据频率低的特性。于此同时,由于在移动通信系统中信息是通过无线信道进行传递的,容易被攻击者窃听、截获或者篡改,针对蜂窝式IOT的数据而言,会涉及到很多高敏感度、高隐私及高安全等级需求的数据,因此,人们正寻求更好的方式保证蜂窝式IOT通信的安全。
在现有技术中,考虑增强通用分组无线服务技术(英文全称:General Packet Radio Service,英文缩写:GPRS)的安全性来保证蜂窝式IoT通信的安全。具体包括:将UE和网络侧之间的单向鉴权算法协商(英文全称:Authentication Key Agreement,英文缩写:AKA)增强为双向认证;生成完整性保护密钥来保护UE和服务GPRS支持节点(英文全称:Serving GPRS Support Node,英文缩写:SGSN)之间信令的安全。
请参阅图1,图1是现有技术中一种基于GPRS的完整性信令保护流程示意图,其中,认证和密钥协商是在一个流程中实现的,根据安全需求,要对认证和密钥协商请求消息用物联网完整性保护密钥(英文全称:Session key of Gb based cellular IOT for integrity protection,英文缩写:Kti)和完整性保护算法进行保护。UE收到认证和密钥协商请求消息并对该消息进行完整性验证,验证成功后,UE和SGSN分别开启数据面的加密保护以及信令面的加密和完整性保护。
然而在上述现有技术中,并未具体定义如何实现对整个密钥及算法协商信令流程的保护。UE与SGSN之间信令面的保护需要在逻辑链路控制(英文全称:Logical Link Control,英文缩写:LLC)协议层实现,而密钥和算法则是需要在GRPS移动性管理(英文全称:GPRS Mobility Management,英文缩写:GMM)协议层/会话管理(英文全称:Session Management,英文缩写:SM)协议层进行协商。当UE在LLC协议层上接收到SGSN发送的认证和密钥协 商请求消息时,UE还未从GMM/SM协议层上获取到密钥和算法,也就无法实现对认证和密钥协商请求消息的完整性进行验证,使得现有技术缺乏可支持的实现方案,导致在实际应用中出现操作上的困难。
发明内容
本发明实施例提供了一种消息保护的方法、相关设备以及系统,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
有鉴于此,本发明第一方面提供一种消息保护的方法,包括:
用户设备UE通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
所述UE在所述UE的GMM/SM协议层上根据所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
所述UE根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
若所述UE确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
所述UE通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
结合本发明实施例的第一方面,在第一种可能的实现方式中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
结合本发明实施例的第一方面的第一种可能的实现方式,在第二种可能的 实现方式中,所述根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,所述方法还包括:
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密;
或,
所述UE使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护。
结合本发明实施例的第一方面以及第一方面第一至第二种中任一实现方式,在第三种可能的实现方式中,所述UE通过所述UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,所述方法还包括:
所述UE通过所述UE的GMM/SM协议层向所述SGSN的GMM/SM协议层发送附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息,以使所述SGSN根据所述附着请求消息在所述SGSN的GMM/SM协议层上生成所述认证和密钥协商请求消息。
结合本发明实施例的第一方面以及第一方面的第一至第三种任一可能的实现方式,在第四种可能的实现方式中,所述UE通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,所述方法还包括:
所述UE通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识。
结合本发明实施例的第一方面的第四种可能的实现方式,在第五种可能的 实现方式中,所述UE通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识之后,所述方法还包括:
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
本发明第二方面提供一种消息保护的方法,包括:
服务GPRS支持节点SGSN在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
所述SGSN通过所述SGSN的GMM/SM协议层接收所述UE发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码。
结合本发明实施例的第二方面,在第一种可能的实现方式中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保 护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
结合本发明实施例的第二方面或第二方面第一种可能实现方式,在第二种可能的实现方式中,所述在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE之前,所述方法还包括:
所述SGSN通过所述SGSN的GMM/SM协议层接收所述UE发送的附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息;
所述SGSN在所述SGSN的GMM/SM协议层上获取第二算法标识,并生成第二密钥,包括:
所述SGSN根据所述UE的网络能力信息,获取所述第二算法;
所述SGSN根据所述UE的标识获取所述UE的认证向量信息,并根据所述认证向量信息生成所述第二密钥。
结合本发明实施例的第二方面以及第二方面第一至第二种任一可能实现方式,在第三种可能的实现方式中,所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码之后,所述方法还包括:
若所述SGSN确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识。
结合本发明实施例的第二方面第三中可能实现方式,在第四种可能的实现方式中,所述若所述SGSN确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识之后,所述方法还包括:
所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对用户面数据以及控制面信 令进行加密;
或,
所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
本发明第三方面提供一种消息保护的方法,包括:
用户设备UE通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
所述UE在所述LLC协议层对所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
所述UE在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
所述UE在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
所述UE通过所述UE的LLC协议层向所述SGSN发送所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
结合本发明实施例的第三方面,在第一种可能的实现方式中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
结合本发明实施例的第三方面的第一种可能实现方式,在第二种可能的实现方式中,所述UE在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,包括:
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,得到所述第二认证和密钥协商响应消息;
或,
所述UE使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息。
结合本发明实施例的第三方面的第一种可能实现方式,在第三种可能的实现方式中,所述若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息之后,所述方法还包括:
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
本发明第四方面提供一种消息保护的方法,包括:
服务GPRS支持节点SGSN在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
所述SGSN通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二算法标识和所述第二密钥;
所述SGSN在所述SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
所述SGSN通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码。
结合本发明实施例的第四方面,在第一种可能的实现方式中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
结合本发明实施例的第四方面或第四方面的第一种可能实现方式,在第二种可能的实现方式中,所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码之后,所述方法还包括:
所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对数据以及信令进行加密;
或,
所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
本发明第五方面提供一种用户设备,包括:
接收模块,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块,用于在所述UE的GMM/SM协议层上根据所述接收模块接收的所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
验证模块,用于根据所述获取模块获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块,用于若所述验证模块确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
第一发送模块,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
结合本发明实施例的第五方面,在第一种可能的实现方式中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
结合本发明实施例的第五方面的第一种可能的实现方式,在第二种可能的实现方式中,所述用户设备还包括:
消息处理模块,用于所述生成模块根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密;
或,
使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护。
结合本发明实施例的第五方面以及第五方面第一至第二种任一实现方式,在第三种可能的实现方式中,所述用户设备还包括:
第二发送模块,用于所述接收模块通过所述UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,通过所述UE的GMM/SM协议层向所述SGSN的GMM/SM协议层发送附着请求消息,所述附着请求消息中 携带所述UE的标识和所述UE的网络能力信息,以使所述SGSN根据所述附着请求消息在所述SGSN的GMM/SM协议层上生成所述认证和密钥协商请求消息。
结合本发明实施例的第五方面以及第五方面的第一至第三种任一可能的实现方式,在第四种可能的实现方式中,所述用户设备还包括:
第三发送模块,用于所述第一发送模块通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识。
结合本发明实施例的第五方面的第四种可能的实现方式,在第五种可能的实现方式中,所述用户设备还包括:
加密模块,用于所述第三发送模块通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
本发明第六方面提供一种服务GPRS支持节点,包括:
获取模块,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
生成模块,用于使用所述获取模块获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
第一接收模块,用于通过所述SGSN的GMM/SM协议层接收所述生成模块发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
验证模块,用于使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第一接收模块接收的所述第二消息验证码。
结合本发明实施例的第六方面,在第一种可能的实现方式中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
结合本发明实施例的第六方面或第六方面第一种可能实现方式,在第二种可能的实现方式中,所述设备还包括:
第二接收模块,用于所述生成模块在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE之前,通过所述SGSN的GMM/SM协议层接收所述UE发送的附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息;
其中,所述获取模块包括:
获取单元,用于根据所述UE的网络能力信息,获取所述第二算法;
生成单元,用于根据所述UE的标识获取所述UE的认证向量信息,并根据所述认证向量信息生成所述第二密钥。
结合本发明实施例的第六方面以及第六方面第一至第二种任一可能实现方式,在第三种可能的实现方式中,所述设备还包括:
发送模块,用于若所述验证模块验证后确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识。
结合本发明实施例的第六方面第三中可能实现方式,在第四种可能的实现 方式中,所述设备还包括:
加密模块,用于所述发送模块通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法后,所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
本发明第七方面提供一种用户设备方法,包括:
接收模块,用于通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
处理模块,用于在所述LLC协议层对所述接收模块接收的所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
获取模块,用于所述处理模块将所述第二认证和密钥协商请求消息发送给所述UE的GMM/SM协议层后,在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
生成模块,用于若在所述UE的LLC协议层上使用所述获取模块获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
消息处理模块,用于在所述UE的LLC协议层上对所述生成模块生成的 所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
发送模块,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
结合本发明实施例的第七方面,在第一种可能的实现方式中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
结合本发明实施例的第七方面的第一种可能实现方式,在第二种可能的实现方式中,所述消息处理模块包括:
加密单元,用于使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,得到所述第二认证和密钥协商响应消息;
或,
使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息。
结合本发明实施例的第七方面的第一种可能实现方式,在第三种可能的实现方式中,所述用户设备还包括:
加密模块,用于所述生成模块在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
本发明第八方面提供一种服务GPRS支持节点,包括:
获取模块,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
第一发送模块,用于通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述获取模块获取的所述第二算法标识和生成的所述第二密钥;
消息处理模块,用于在所述SGSN的LLC协议层上使用所述第一发送模块发送的所述第二算法和所述第二密钥,对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
第二发送模块,用于通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述消息处理模块处理后的所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
接收模块,用于若所述UE在所述UE的LLC协议层上确定所述第二发送模块发送的所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
验证模块,用于所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述接收模块接收的所述第二消息验证码。
结合本发明实施例的第八方面,在第一种可能的实现方式中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
结合本发明实施例的第八方面或第八方面的第一种可能实现方式,在第二种可能的实现方式中,所述设备还包括:
加密模块,用于所述验证模块使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码之后。使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对数据以及信令进行加密;
或,
使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
本发明第九方面提供一种用户设备,包括:
输入设备、输出设备、处理器以及存储器;
所述输入设备执行如下流程:
通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
所述处理器执行如下流程:
在所述UE的GMM/SM协议层上根据所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
若所述UE确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
所述输出设备执行如下流程:
通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
本发明第十方面提供一种服务GPRS支持节点,包括:
输入设备、输出设备、处理器以及存储器;
所述输入设备执行如下流程:
通过所述SGSN的GMM/SM协议层接收所述UE发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
所述处理器执行如下流程:
在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码。
本发明第十一方面提供一种用户设备,包括:
输入设备、输出设备、处理器以及存储器;
所述输入设备执行如下流程:
通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消 息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
所述处理器执行如下流程:
在所述LLC协议层对所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
所述输出设备执行如下流程:
通过所述UE的LLC协议层向所述SGSN发送所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
本发明第十二方面提供一种服务GPRS支持节点,包括:
输入设备、输出设备、处理器以及存储器;
所述输入设备执行如下流程:
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
所述处理器执行如下流程:
在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
在所述SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码;
所述输出设备执行如下流程:
通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二算法标识和所述第二密钥;
通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识。
本发明第十三方面提供一种消息保护的系统,包括:用户终端以及服务GPRS支持节点;
所述用户终端为上述第五方面,第五方面第一种至第五种可能的实现方式中的所述用户终端;
所述服务GPRS支持节点上述第六方面,第六方面第一种至第四种可能的实现方式中的所述服务GPRS支持节点。
本发明第十四方面提供一种消息保护的系统,包括:用户终端以及服务GPRS支持节点;
所述用户终端为上述第七方面,第七方面第一种至第三种可能的实现方式中的所述用户终端;
所述服务GPRS支持节点上述第八方面,第八方面第一种至第二种可能的实现方式中的所述服务GPRS支持节点。
从以上技术方案可以看出,本发明实施例具有以下优点:
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和 密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是现有技术中一种基于GPRS的完整性信令保护流程示意图;
图2是本发明实施例中消息保护的方法一个实施例示意图;
图3是本发明实施例中消息保护的方法另一个实施例示意图;
图4是本发明实施例中另一种消息保护的方法一个实施例示意图;
图5是本发明实施例中另一种消息保护的方法另一个实施例示意图;
图6是本发明实施例的应用场景中消息保护的方法的一个流程示意图;
图7是本发明实施例的应用场景中消息保护的方法的另一个流程示意图;
图8为本发明实施例中用户终端一个实施例示意图;
图9为本发明实施例中用户终端另一个实施例示意图;
图10为本发明实施例中用户终端另一个实施例示意图;
图11为本发明实施例中用户终端另一个实施例示意图;
图12为本发明实施例中用户终端另一个实施例示意图;
图13为本发明实施例中服务GPRS支持节点一个实施例示意图;
图14为本发明实施例中服务GPRS支持节点另一个实施例示意图;
图15为本发明实施例中服务GPRS支持节点另一个实施例示意图;
图16为本发明实施例中服务GPRS支持节点另一个实施例示意图;
图17为本发明实施例中另一种用户终端一个实施例示意图;
图18为本发明实施例中另一种用户终端另一个实施例示意图;
图19为本发明实施例中另一种用户终端另一个实施例示意图;
图20为本发明实施例中另一种服务GPRS支持节点一个实施例示意图;
图21为本发明实施例中另一种服务GPRS支持节点另一个实施例示意图;
图22为本发明实施例中用户终端一个结构示意图;
图23为本发明实施例中服务GPRS支持节点一个结构示意图;
图24为本发明实施例中消息保护系统一个实施例示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
本发明实施例提供了一种消息保护的方法,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击,此外,还提供了相应的消息保护的系统,以及相关装置,请参阅图2至图24,下面通过具体实施例,分别进行详细的说明。
本发明实施例提供的消息保护的方法可适用于无线通信系统,本发明实施例以应用于长期演进(英文全称:Long Term Evolution,英文缩写:LTE)/升级的长期演进技术(英文全称:LTE-Advanced,英文缩写:LTE-A)无线通信系统为例对所述方法进行分析说明,不构成对本发明的限定。
本发明实施例中消息保护的方法主要应用于对GMM/SM协议层上的信息进行保护,或者对LLC协议层上的信息进行保护,本说明书将分别对这两种方案进行详细地介绍。
一、在GMM/SM协议层上对消息进行保护:
本发明实施例提供了一种消息保护的方法,其中,为了描述方便,将以UE的角度进行描述。
请参阅图2,图2为本发明实施例中消息保护的方法一个实施例示意图,其中,所述消息保护的方法可包括:
201、用户设备UE通过UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示第一算法;
本实施例中,UE通过UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息,该认证和密钥协商请求消息中携带有第一消息验证码,第一消息验证码可以是消息验证码-完整性(英文全称:message authentication code-Integrity,英文缩写:MAC-I)。认证和密钥协商请求消息中还携带第一算法标识,第一算法标识是用于指示第一算法的类型,可以根据第一算法标识来确定具体的第一算法。
其中,GMM协议层所使用的GMM协议主要用于支持移动性管理功能,比如GPRS附着、去附着、安全性、位置区(英文全称:Location Area,英文缩写:LA)更新以及路由区(英文全称:Routing Area,英文缩写:RA)更新等。SM协议层所使用的SM协议主要用于支持分组数据协议(英文全称:Packet Data Protocol,英文缩写:PDP)、去激活和PDP上下文修改等。
202、UE在UE的GMM/SM协议层上根据认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;
本实施例中,UE在UE的GMM/SM协议层上接收到认证和密钥协商请求消息,并从认证和密钥协商请求消息中获取到携带的第一算法标识,从而根据该标识来确定第一算法,同时生成第一密钥。
需要说明的是,生成第一密钥方式有多种,当全球用户识别卡(英文全称:Universal Subscriber Identity Module,英文缩写:USIM)接入第三代移动通信技术(英语全称:3rd-Generation,英文缩写:3G)网络时,将USIM卡中的根密钥与一个随机数进行函数计算后得到第一密钥;或者,将USIM卡中的根密钥与一个随机数进行函数计算后得到中间密钥,将中间密钥与第一算法标识作为输入,通过密钥生成函数生成第一密钥,密钥生成函数可以为哈希算法(英文全称:hash message authentication code-Secure Hash Algorith-256,英文缩写: HMAC-SHA-256),此处生成第一密钥的具体方式不做不进具体限定。
203、UE根据第一密钥和第一算法,在UE的GMM/SM协议层上验证第一消息验证码;
本实施例中,UE使用获取的第一算法和生成的第一密钥在UE的GMM/SM协议层上对第一消息验证码MAC-I进行验证。
204、若UE确定第一消息验证码验证通过,则根据第一密钥和第一算法,在UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带第二消息验证码;
本实施例中,当UE确定第一消息验证码通过验证时,则在UE的GMM/SM协议层上生成与认证和密钥协商请求消息对应的认证和密钥协商响应消息,并且使用第一密钥和第一算法为认证和密钥协商响应消息生成第二消息验证码MAC-I。
其中,对第一消息验证码进行的验证的方法具体可以为,UE在GMM/SM协议层上根据现有技术对五元鉴权组中网络对终端的认证令牌(英文全称:Authentication Token,英文缩写:AUTN)进行验证,并生成终端对网络的鉴权参数(英文全称:response,英文缩写:RES)。例如:USIM卡根据存储的根密钥K和SGSN侧发送过来的AUTN以及随机数(英文全称:Random,英文缩写:RAND),计算出期望的MAC-I值XMAC-I,并与从认证和密钥协商请求消息中携带的第一消息验证码MAC-I进行验证,如果MAC-I=XMAC-I,归属签约用户服务器(英文全称:Home Subscriber Server,英文缩写:HSS)同步的序列号(英文全称:sequence number,英文缩写:SQN)在正确的值域内时,USIM卡则返回RES至SGSN侧,SGSN将判断RES是否等于期望的RES(英文全称:Expect RES,英文缩写:XRES),以此实现网络侧对USIM卡的鉴权,如果RES=XRES,USIM卡和SGSN将用加密密钥(英文全称:Ciphering Key,英文缩写:CK)与完整性密钥(英文全称:Integrity Key,英文缩写:IK)进行数据的传输。至此完成了USIM卡与网络侧间的双向认证。
205、UE通过UE的GMM/SM协议层向SGSN发送认证和密钥协商响应消息,以使SGSN对第二消息验证码进行验证。
本实施例中,UE通过UE的GMM/SM协议层向SGSN的GMM/SM协议 层发送认证和密钥协商响应消息,SGSN在接收到认证和密钥协商响应消息后,会对其中的第二消息验证码MAC-I进行验证。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图2对应的实施例的基础上,本发明实施例提供的消息保护的第一个可选实施例中,
第一密钥包括第一加密密钥,第一算法包括第一加密算法;
或,
第一密钥包括第一完整性密钥,第一算法包括第一完整性保护算法;
或,
第一密钥包括第一加密密钥和第一完整性密钥,第一算法包括第一加密算法和第一完整性保护算法。
本实施例中,第一密钥可以包括第一加密密钥和第一完整性密钥,也可以只是第一加密密钥,或者只是第一完整性密钥。
这里的第一加密密钥为物联网加密密钥(英文全称:Session key of Gb based cellular IoT for confidentiality protection,英文缩写:Ktc),第一完整性密钥为物联网完整性保护密钥(英文全称:Session key of Gb based cellular IoT for integrity protection,英文缩写:Kti)。
第一算法包括第一加密算法和第一完整性保护算法,也可以只是第一加密算法,或者只是第一完整性保护算法。
完整性保护算法主要用于在发送端保护发送数据的完整性不被破坏及在接收端检验接收数据的完整性是否被破坏。通过完整性保护算法分别对发送端和接收端的数据进行运算得到消息验证码MAC-I和期望的消息验证码XMAC-I,两者进行比对可以确认数据的完整性。
其次,本发明实施例中,将第一密钥和第一算法具体化,以此来支持本发 明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
可选地,在上述图2对应的第一个实施例的基础上,本发明实施例提供的消息保护的第二个可选实施例中,根据第一密钥和第一算法,在UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,还可以包括:
UE使用第一加密密钥和第一加密算法标识所指示的所述第一加密算法,在UE的GMM/SM协议层上对认证和密钥协商响应消息进行加密;
或,
UE使用第一完整性密钥和第一完整性保护算法标识所指示的第一完整性保护算法,在UE的GMM/SM协议层上对认证和密钥协商响应消息进行完整性保护;
或,
UE使用第一加密密钥和第一加密算法标识所指示的所述第一加密算法,在UE的GMM/SM协议层上对认证和密钥协商响应消息进行加密,并使用第一完整性密钥和第一完整性保护算法标识所指示的所述第一完整性保护算法,在UE的GMM/SM协议层上对认证和密钥协商响应消息进行完整性保护。
本实施例中,UE根据第一密钥和第一算法在UE的GMM/SM协议层上生成认证和密钥协商响应消息后,还需要对该认证和密钥协商响应消息进行保护。具体地,可以由如下三种保护方式:
UE使用第一加密密钥Ktc和对应的第一加密算法在UE的GMM/SM协议上对认证和密钥协商响应消息进行加密,即理解为对消息的加密,其目的为保证消息的安全性,其中,第一加密算法是根据第一加密算法标识确定的,第一加密算法标识可以是加密算法的序列号;
或者,UE可以使用第一完整性密钥Kti和对应的第一完整性保护算法在UE的GMM/SM协议层上对认证和密钥协商响应消息进行完整性保护,其目的为保证空中接口上传输消息的连续性和完整性,其中,第一完整性保护算法是根据第一完整性保护算法标识确定的,第一完整性保护算法标识可以是完整性保护算法的序列号;
或者,UE对认证和密钥协商响应消息既进行加密保护又进行完整性保护, 实现方式与上述提及的实施方式类似,即使用Ktc和第一加密算法在UE的GMM/SM协议层上对认证和密钥协商请求进行加密,并使用Kti和第一完整性保护算法在UE的GMM/SM协议层上对认证和密钥协商响应消息进行完整性保护。
再次,本发明实施例中,提出了对认证和密钥协商响应消息进行保护的具体方案,不但可以进行加密保护或进行完整性保护,还可以同时进行加密保护和完整性保护,如此,大大增加了消息传输的安全性,连续性以及完整性,在方案的具体实现中起到了更好的实用效果。
可选地,在上述图2对应的实施例的基础上,本发明实施例提供的消息保护的第三个可选实施例中,UE通过UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,还可以包括:
UE通过UE的GMM/SM协议层向SGSN的GMM/SM协议层发送附着请求消息,附着请求消息中携带UE的标识和UE的网络能力信息,以使SGSN根据附着请求消息在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息。
本实施例中,UE通过UE的GMM/SM协议层向SGSN的GMM/SM协议层发送附着请求消息,其中,附着请求消息中携带UE的标识,比如UE的临时逻辑链路标识(英文全称:Temporary Logical Link Identifier,英文缩写:TLLI),或者国际移动用户识别码(英文全称:International Mobile Subscriber Identification Number,英文缩写:IMSI),附着请求消息中同时也携带有UE的网络能力信息,SGSN根据附着请求消息中的UE的标识和UE的网络能力信息,在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息。
在通常情况下,SGSN向UE发送认证和密钥协商请求消息时,会启动定时器T3360,超时后未收到响应,SGSN会重新发送鉴权请求消息,重发次数为N次,N为大于等于1的正整数。
需要说明的是,定时器T3360配置的时间可以为6秒,也可以为其它的时间值,而重发次数N可以为4次,也可以根据实际情况做其他的配置,故此处不做限定。
进一步地,本发明实施例中,UE向SGSN发送附着请求消息,使得SGSN 可以根据附着请求消息获取认证的相关参数,一方面为本发明方案的实际应用提供了具体实现依据,另一方面,也是UE与网络侧进行交互的一种方式,通过附着请求来完成与网络之间的信息交互,进而提升方案的实用性。
可选地,在上述图2以及图2对应的第一至第三个实施例的基础上,本发明实施例提供的消息保护的第四个可选实施例中,UE通过UE的GMM/SM协议层向SGSN发送认证和密钥协商响应消息之后,还可以包括:
所述UE通过所述UE的GMM/SM协议层向UE的逻辑链路控制LLC协议层发送第一密钥和第一算法标识。
本实施例中,UE通过UE的GMM/SM协议层向SGSN发送认证和密钥协商响应消息后,UE还会通过UE的GMM/SM协议层向UE的LLC协议层发送第一密钥和第一算法标识,该第一算法标识用于指示需要采用的具体算法,使得UE在LLC协议层上可以使用第一密钥和第一算法来对用户面数据和控制面信令进行处理。
更进一步地,本发明实施例中,UE通过GMM/SM协议层向SGSN发送认证和密钥协商响应消息之后,还可以向UE的LLC协议层发送第一算法和第一密钥,使得UE在LLC协议层上可以对数据和信令做相应的处理,以此来增加方案的可靠性,同时,进一步增强了方案的实用性。
可选地,在上述图2对应的第四个实施例的基础上,本发明实施例提供的消息保护的第五个可选实施例中,UE通过UE的GMM/SM协议层向UE的逻辑链路控制LLC协议层发送第一密钥和所述第一算法标识之后,还可以包括:
UE使用第一加密密钥和第一加密算法标识所指示的所述第一加密算法,在UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
UE使用第一加密密钥和第一加密算法标识所指示的所述第一加密算法,在UE的LLC协议层上对用户面数据以及控制面信令进行加密,并使用第一完整性密钥和第一完整性保护算法标识所指示的所述第一完整性保护算法,在UE的LLC协议层上对控制面信令进行完整性保护。
本实施例中,UE通过UE的GMM/SM协议层向UE的LLC协议层发送第一密钥和第一算法标识,该第一算法标识同样用于指示需要采用的算法类 型。而在UE的LLC协议层上同时存在用户面的数据与控制面的信令。其中,用户面数据可以是消息,例如一则消息或者一个通知,信令则是指控制面上的信号,例如语音或者数据包。
UE使用第一加密密钥和第一加密算法在UE的LLC协议层上同时对数据以及信令进行加密,增强数据和信令在传输过程中的安全性。
或者,UE使用第一加密密钥和第一加密算法在UE的LLC协议层上对数据进行加密,同时在UE的LLC协议层上对信令既进行加密保护又进行完整性保护。
在通常情况下,数据不进行完整性保护,信令则不单独进行完整性保护,但是并不排除这种实现方式,此处不应理解为对本方面方案的限定。
再进一步地,本发明实施例中,由于在UE的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
上面从UE的角度对本发明实施例中消息保护的方法进行了描述,下面从待测SGSN的角度对本发明实施例中消息保护的方法进行描述,请参阅图3,本发明实施例中消息保护的方法另一实施例包括:
301、服务GPRS支持节点SGSN在SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,第二算法标识用于指示第二算法;
本实施例中,SGSN确定UE为蜂窝式IoT的UE时,SGSN可以在GMM/SM协议层上获取第二算法标识,第二算法标识用于指示第二算法的类型,并在SGSN的GMM/SM协议层上生成第二密钥。
其中,生成第二密钥的方式与上述实施例中提及的生成第一密钥的方式类似,此处不做赘述。
302、SGSN使用第二密钥和第二算法,在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将认证和密钥协商请求消息发送至用户设备 UE,认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
本实施例中,SGSN使用第二算法和第二算法在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,其中,认证和密钥协商请求消息中携带第一消息验证码和第二算法标识,第一消息验证码是SGSN在SGSN的GMM/SM协议层上对认证和密钥协商请求消息进行完整性保护后生成的,而第二算法标识用于指示第二算法的类型。SGSN在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息后,先将该消息发送至SGSN的LLC协议层上,再由SGSN在SGSN的LLC协议层向UE的LLC协议层发送认证和密钥协商请求消息。
可以理解的是,这里的第二算法类型与上述图2以及图2对应的第一至第五个实施例中提及的第一算法,实为同一种算法,这里的“第一”和“第二”主要用于区分所在的协议层的区别。
303、SGSN通过SGSN的GMM/SM协议层接收UE发送的认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带第二消息验证码;
本实施例中,若UE确定第一消息验证码验证通过,则UE在UE的GMM/SM协议层上生成与认证和密钥协商请求消息对应的认证和密钥协商响应消息。SGSN通过SGSN的GMM/SM协议层接收UE发送的认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带有该第二消息验证码。
304、SGSN使用第二密钥和第二算法,在SGSN的GMM/SM协议层上验证第二消息验证码。
本实施例中,SGSN使用生成的第二密钥,以及获取的第二算法,在SGSN的GMM/SM协议层上验证第二消息验证码是否准确。
本发明实施例中,提供一种对UE与SGSN之间密钥和算法协商流程进行完整性保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图3对应的实施例的基础上,本发明实施例提供的消息保护的第一个可选实施例中,
第二密钥包括第二加密密钥,第二算法包括第二加密算法;
或,
第二密钥包括第二完整性密钥,第二算法包括第二完整性保护算法;
或,
第二密钥包括第二加密密钥和第二完整性密钥,第二算法包括第二加密算法和第二完整性保护算法。
本实施例中,第二密钥可以包括第二加密密钥和第二完整性密钥,也可以只是第二加密密钥,或者只是第二完整性密钥。
这里的第二加密密钥为Ktc,第二完整性密钥为Kti。
第二算法包括第二加密算法和第二完整性保护算法,也可以只是第二加密算法,或者只是第二完整性保护算法。
完整性保护算法主要用于在发送端保护发送数据的完整性不被破坏及在接收端检验接收数据的完整性是否被破坏。通过完整性保护算法分别对发送端和接收端的数据进行运算得到消息验证码MAC-I和期望的消息验证码XMAC-I,两者进行比对可以确认数据的完整性。
其次,本发明实施例中,将第二密钥和第二算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
可选地,在上述图3或图3对应的第一个实施例的基础上,本发明实施例提供的消息保护的第二个可选实施例中,在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将认证和密钥协商请求消息发送至用户设备UE之前,还可以包括:
SGSN通过SGSN的GMM/SM协议层接收UE发送的附着请求消息,附着请求消息中携带UE的标识和UE的网络能力信息;
SGSN在SGSN的GMM/SM协议层上获取第二算法标识,并生成第二密钥,可以包括:
SGSN根据UE的网络能力信息,获取第二算法;
SGSN根据UE的标识获取UE的认证向量信息,并根据认证向量信息生成所述第二密钥。
本实施例中,SGSN通过SGSN的GMM/SM协议层向UE发送认证和密钥协商请求消息之前,接收UE通过GMM/SM协议发送的附着请求消息,其中,附着请求消息中携带UE的标识和UE的网络能力信息。
具体地,UE向SGSN发送GPRS的附着请求消息,SGSN收到UE发送的附着请求消息后,将从归属位置寄存器(英文全称:Home Location Register,英文缩写:HLR)或归属签约用户服务器(英文全称:Home Subscriber Server,英文缩写:HSS)中获取鉴权向量(英文全称:Authentication Vectors,英文缩写:AV),其中,AV可以包括RAND、XRES、AUTN、CK和IK。
SGSN在SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法,并根据第二算法生成第二密钥,具体可以是,SGSN接收到UE发送的附着请求消息后,根据附着请求消息中携带的UE的标识从HLR或HSS获取AV,并根据UE的网络能力信息和SGSN自身支持的算法来获取第二算法,SGSN根据AV在GMM/SM协议层上生成第二密钥。
需要说明的是,UE的网络能力信息是指UE的网络性能,比如,重传率、吞吐量或者信号强度等指标,也可以是多项网络能力的综合性能信息,此处不做限定。
再次,本发明实施例中,SGSN接收UE发送的附着请求消息,根据附着请求消息获取认证的相关参数,一方面为本发明方案的实际应用提供了具体实现依据,另一方面,也是UE与SGSN进行交互的一种方式,通过附着请求来完成与网络之间的信息交互,进而提升方案的实用性。当SGSN接收到携带有UE的标识和UE的网络能力信息的附着请求信息时,根据UE的网络能力信息来选择合理的算法,同时通过UE的标识来确认UE对应的认证向量信息,使得方案在实际应用中更合理化,针对具体的UE进行具体的算法和密钥选择,增强整个方案的可行性。
可选地,在上述图3或图3对应的第一至二个实施例的基础上,本发明实施例提供的消息保护的第三个可选实施例中,SGSN使用第二密钥和第二算法,在SGSN的GMM/SM协议层上验证第二消息验证码之后,还可以包括:
若SGSN确定第二消息验证码通过,则通过SGSN的GMM/SM协议层向SGSN的逻辑链路控制LLC协议层发送第二密钥和第二算法标识。
本实施例中,SGSN使用第二密钥和第二算法在SGSN的GMM/SM协议层上验证认证和密钥协商响应消息中的第二消息验证码,当SGSN确定第二消息验证码通过,则通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二密钥和第二算法标识,第二算法标识可以用于确定对应的第二算法,使得SGSN在LLC协议层上使用第二密钥和第二算法来对数据和信令进行处理。
进一步地,本发明实施例中,SGSN确定第二消息验证码通过后,通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二密钥和第二算法,使得SGSN在LLC协议层上可以对数据和信令做相应的处理,以此来增加方案的可靠性,同时,进一步增强了方案的实用性。
可选地,在上述图2对应的第三个实施例的基础上,本发明实施例提供的消息保护的第四个可选实施例中,若SGSN确定第二消息验证码通过,则通过SGSN的GMM/SM协议层向SGSN的逻辑链路控制LLC协议层发送第二密钥和第二算法标识之后,还可以包括:
SGSN使用第二加密密钥和第二加密算法标识所指示的第二加密算法,在SGSN的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
SGSN使用第二加密密钥和第二加密算法标识所指示的第二加密算法,在SGSN的LLC协议层上对用户面数据以及控制面信令进行加密,并使用第二完整性密钥和第二完整性保护算法标识所指示的所述第二完整性保护算法,在SGSN的LLC协议层上对控制面信令进行完整性保护。
本实施例中,SGSN通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二密钥和第二算法标识,在SGSN的LLC协议层上同时存在用户面的数据与控制面的信令,此时,可以通过第二密钥和第二算法来对数据和信令进行处理,具体处理方式可以为:
SGSN使用第二加密密钥和第二加密算法在SGSN的LLC协议层上对数据以及信令进行加密,增强数据和信令在传输过程中的安全性。
或者,SGSN使用第二加密密钥和第二加密算法在SGSN的LLC协议层 上对数据进行加密,同时在SGSN的LLC协议层上对信令既进行加密保护又进行完整性保护。
在通常情况下,数据不进行完整性保护,信令则不单独进行完整性保护,但是并不排除这种实现方式,此处不应理解为对本方面方案的限定。
更进一步地,本发明实施例中,由于在SGSN的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
二、在LLC协议层上对信息进行保护:
本发明实施例提供了一种消息保护的方法,其中,为了描述方便,将以UE的角度进行描述。
401、用户设备UE通过UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示第一算法;
本实施例中,当SGSN在SGSN的GMM/SM协议层上生成第一认证和密钥协商请求消息后,SGSN的GMM/SM协议层将第一认证和密钥协商请求消息发送至SGSN的LLC协议层,在LLC协议层进行完整性保护并通过SGSN的LLC协议层再向UE的LLC协议层发送该第一认证和密钥协商请求消息。
其中,该第一认证和密钥协商请求消息在进行完整性保护后会生成第一消息验证码MAC-I,第一认证和密钥协商请求消息中可以携带第一消息验证码,同时,还在该消息中携带有第一算法标识,第一算法标识是用于指示第一算法类型的,根据第一算法标识来获取具体的第一算法。
402、UE在LLC协议层对第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将第二认证和密钥协商请求消息发送给UE的GPRS移动性管理GMM/会话管理SM协议层;
本实施例中,UE通过UE的LLC协议层向UE的GMM/SM协议层发送 第二认证和密钥协商请求消息,其中,第二认证和密钥协商请求消息是UE在LLC协议层对第一认证和密钥协商请求消息经过处理后得到的,具体处理方式对第一认证和密钥协商请求中的第一消息验证码MAC-I进行去除,或者不做任何改动。
第一消息验证码可以位于第一认证和密钥协商请求消息的最后部分,如果需要去除第一消息验证码,则直接将第一认证和密钥协商请求消息中的包头部分进行处理即可。
如果不对第一认证和密钥协商请求消息进行处理,则在第二认证和密钥协商请求消息中仍然包括第一消息验证码。当保留第一消息验证码的情况下,可以将第一消息验证码作为服务数据单元(英文全称:Service Data Unit,英文缩写:SDU)的一部分发送至UE的GMM/SM协议层。其中,SDU是指定层的用户服务的数据集,传送到接收方的时候数据没有发生变化。
如果对第一认证和密钥协商请求消息进行处理,则在第二认证和密钥协商请求消息中不包括第一消息验证码。在SGSN将携带有第一消息验证码的第一认证和密钥协商请求消息发送至UE时,UE即可将该第一认证和密钥协商请求消息保存在UE的LLC协议层,也可理解为UE的LLC协议层保存了当前收到的协议数据单元(英文全称:Protocol Data Unit,英文缩写:PDU),PDU是指对等层次之间传递的数据单位,比如,物理层传输的PDU为数据位,数据链路层传输的PDU为数据帧,网络层传输的PDU是数据包,数据层传输的PDU是数据段,其他更高层次之间传输的PDU是报文。
403、UE在UE的GMM/SM协议层上根据第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将第一密钥和第一算法标识发送给UE的LLC协议层;
本实施例中,UE在UE的GMM/SM协议层上根据现有技术对AUTN进行验证,并生成RES。
UE在GMM/SM协议层上进行AUTN验证,如果AUTN验证成功,网络侧就被认证通过,即确认数据是从归属网络中发送来的,UE在GMM/SM协议层计算RES,以此验证用户的认证是否通过。
当上述鉴权过程均通过时,UE根据UE的网络能力生成对应的第一密钥, 根据第一算法标识确定对应的第一算法,第一算法标识则是从第二认证和密钥协商请求消息中获取的,需要注意的是,在对第一认证和密钥协商请求消息进行处理的时候,并不会去除其中的第一算法标识。UE通过UE的GMM/SM协议层向UE的LLC协议层发送第一密钥和第一算法。
404、若UE在UE的LLC协议层上确定第一消息验证码验证通过,则UE在UE的GMM/SM协议层上生成第一认证和密钥协商响应消息;
本实施例中,UE使用第一消息验证码与计算得到的期望消息验证码进行比对,当第一消息验证码与计算得到的期望消息验证码一致时,说明第一消息验证码通过验证,此时,UE在UE的GMM/SM协议层上生成对应的第一认证和密钥响应消息。
相反地,如果对第一消息验证码验证失败时,则UE会通过UE的LLC协议层向UE的GMM/SM协议层发送对第一消息验证码的验证失败结果,根据验证失败的结果可以对第一消息验证码重新进行验证,或者停止后续操作,重新接收新生成的第一消息验证码。
405、UE在UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,第二认证和密钥协商响应消息中携带第二消息验证码;
本实施例中,第一认证和密钥协商响应消息是UE在UE的GMM/SM协议层上生成的,UE通过UE的GMM/SM协议层向UE的LLC协议层发送第一认证和密钥协商响应消息,UE在UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护后,得到第二认证和密钥协商响应消息。
与对第一认证和密钥协商请求消息进行完整性保护的过程类似,UE在LLC协议层对第一认证和密钥协商响应消息进行完整性保护后,生成第二消息验证码MAC-I。
406、UE通过UE的LLC协议层向SGSN发送第二认证和密钥协商响应消息,以使SGSN对第二消息验证码进行验证。
本实施例中,UE通过UE的LLC协议层向UE的SGSN的LLC协议层发送第二认证和密钥协商响应消息,第二认证和密钥协商响应消息中携带第二消息验证码,以使得SGSN在确定第二消息验证码通过验证后,使用SGSN侧获 取的第二密钥和第二算法,在SGSN的LLC协议层上对待处理数据进行加密和/或完整性保护。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在LLC协议层进行完整性保护,在UE侧增强了LLC协议层和GMM/SM协议层之间的交互,以此实现在UE的GMM/SM协议层获取密钥,再在LLC协议层上对消息进行完整性验证,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图4对应的实施例的基础上,本发明实施例提供的消息保护的第一个可选实施例中,
第一密钥包括第一加密密钥,第一算法包括第一加密算法;
或,
第一密钥包括第一完整性密钥,第一算法包括第一完整性保护算法;
或,
第一密钥包括第一加密密钥和第一完整性密钥,第一算法包括第一加密算法和第一完整性保护算法。
本实施例中,第一密钥可以包括第一加密密钥和第一完整性密钥,也可以只是第一加密密钥,或者只是第一完整性密钥。
这里的第一加密密钥为Ktc,第一完整性密钥为Kti。
第一算法包括第一加密算法和第一完整性保护算法,也可以只是第一加密算法,或者只是第一完整性保护算法。
完整性保护算法主要用于在发送端保护发送数据的完整性不被破坏及在接收端检验接收数据的完整性是否被破坏。通过完整性保护算法分别对发送端和接收端的数据进行运算得到消息验证码MAC-I和期望的消息验证码XMAC-I,两者进行比对可以确认数据的完整性。
其次,本发明实施例中,将第一密钥和第一算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
可选地,在上述图4对应的第一个可选实施例的基础上,本发明实施例提供的消息保护的第二个可选实施例中,UE在UE的LLC协议层上对第一认证 和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,可以包括:
UE使用第一加密密钥和第一加密算法标识所指示的第一加密算法,在UE的LLC协议层上对第一认证和密钥协商响应消息进行加密,得到第二认证和密钥协商响应消息;
或,
UE使用第一完整性密钥和第一完整性保护算法标识所指示的第一完整性保护算法,在UE的LLC协议层上对第一认证和密钥协商响应消息进行完整性保护,得到第二认证和密钥协商响应消息;
或,
UE使用第一加密密钥和第一加密算法标识所指示的第一加密算法,在UE的LLC协议层上对第一认证和密钥协商响应消息进行加密,并使用第一完整性密钥和第一完整性保护算法标识所指示的所述第一完整性保护算法,在UE的LLC协议层上对第一认证和密钥协商响应消息进行完整性保护,得到第二认证和密钥协商响应消息。
本实施例中,UE根据第一密钥和第一算法在UE的LLC协议层上生成第一认证和密钥协商响应消息后,还需要对该第一认证和密钥协商响应消息进行保护。具体地,可以有如下三种保护方式:
UE使用第一加密密钥Ktc和对应的第一加密算法在UE的LLC协议上对第一认证和密钥协商响应消息进行加密,得到第二认证和密钥协商响应消息,即理解为对消息的加密,其目的为保证消息的安全性,其中,第一加密算法是根据第一加密算法标识来确定的;
或者,UE可以使用第一完整性密钥Kti和对应的第一完整性保护算法在UE的LLC协议层上对第一认证和密钥协商响应消息进行完整性保护,得到第二认证和密钥协商响应消息,其目的为保证空中接口上传输消息的连续性和完整性,其中,第一完整性保护算法是根据第一完整性保护算法标识来确定的;
或者,UE对认证和密钥协商响应消息既进行加密保护又进行完整性保护,实现方式与上述提及的实施方式类似,即使用Ktc和第一加密算法在UE的LLC协议层上对第一认证和密钥协商响应消息求进行加密,并使用Kti和第一 完整性保护算法在UE的LLC协议层上对第一认证和密钥协商响应消息进行完整性保护,得到第二认证和密钥协商响应消息。
再次,本发明实施例中,提出了对第一认证和密钥协商响应消息进行保护的具体方案,不但可以进行加密保护或进行完整性保护,还可以同时进行加密保护和完整性保护,如此,大大增加了消息传输的安全性,连续性以及完整性,在方案的具体实现中起到了更好的实用效果。
可选地,在上述图4对应的第一个可选实施例的基础上,本发明实施例提供的消息保护的第三个可选实施例中,若UE在UE的LLC协议层上确定第一消息验证码验证通过,则UE在UE的GMM/SM协议层上生成第一认证和密钥协商响应消息之后,还可以包括:
UE使用第一加密密钥和第一加密算法标识所指示的第一加密算法,在UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
UE使用第一加密密钥和第一加密算法标识所指示的第一加密算法,在UE的LLC协议层上对用户面数据以及控制面信令进行加密,并使用第一完整性密钥和第一完整性保护算法标识所指示的所述第一完整性保护算法,在UE的LLC协议层上对控制面信令进行完整性保护。
本实施例中,UE通过UE的GMM/SM协议层向UE的LLC协议层发送第一密钥和第一算法标识,第一算法标识用于确定具体采用的算法类型,而在UE的LLC协议层上同时存在用户面数据与控制面信令。其中,用户面数据可以是消息,例如一则消息或者一个通知,信令则是指控制面上的信号,例如语音或者数据包。
UE使用第一加密密钥和第一加密算法在UE的LLC协议层上同时对数据以及信令进行加密,增强数据和信令在传输过程中的安全性,第一加密算法是根据第一加密算法标识确定的。
或者,UE使用第一加密密钥和第一加密算法在UE的LLC协议层上对数据进行加密,同时在UE的LLC协议层上对信令既进行加密保护又进行完整性保护,第一加密算法是根据第一加密算法标识确定的,第一完整性保护算法是根据第一完整性保护算法标识确定的。
在通常情况下,数据不进行完整性保护,信令则不单独进行完整性保护,但是并不排除这种实现方式,此处不应理解为对本方面方案的限定。
进一步地,本发明实施例中,由于在UE的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
上面从UE的角度对本发明实施例中消息保护的方法进行了描述,下面从SGSN的角度对本发明实施例中消息保护的方法进行描述,请参阅图5,本发明实施例中消息保护的方法另一实施例包括:
501、服务GPRS支持节点SGSN在SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,第二算法标识用于指示第二算法;
本实施例中SGSN确定UE为蜂窝式IoT的UE时,SGSN可以在GMM/SM协议层上获取第二算法标识,该第二算法标识用于确定对应的第二算法的类型,并在SGSN的GMM/SM协议层上生成对应的第二密钥。
502、SGSN通过SGSN的GMM/SM协议层向SGSN的逻辑链路控制LLC协议层发送第二算法标识和第二密钥;
本实施例中,SGSN通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二算法和第二密钥,SGSN根据用户设备网络能力和SGSN自身支持的算法来选择一个加密算法和一个完整性保护算法,并推导出Ktc与Kti。
503、SGSN在SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
本实施例中,SGSN通过SGSN的LLC协议层接收从SGSN的GMM/SM协议层发送的第一认证和密钥协商请求消息,并对该第一认证和密钥协商请求消息进行完整性保护,由此生成第一消息验证码MAC-I。
504、SGSN通过SGSN的LLC协议层向UE的LLC协议层发送第一认证和密钥协商请求消息,第一认证和密钥协商请求消息中携带第一消息验证码和 第二算法标识;
本实施例中,SGSN通过SGSN的LLC协议层再向UE的LLC协议层发送携带有第一消息验证码的第一认证和密钥协商请求,其中,第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识,第二算法标识用于指示第二算法的类型。
需要说明的是,这里的第二算法与上述图4以及图4对应的第一至第三个可选实施例中提及的第一算法,实则可以为同一种算法,这里使用“第一”和“第二”是为了表示所在协议层的不同。
505、若UE在UE的LLC协议层上确定第一消息验证码验证通过,则SGSN通过SGSN的LLC协议层接收UE发送的第二认证和密钥协商响应消息,其中,第二认证和密钥协商响应消息中携带第二消息验证码;
本实施例中,UE通过UE的LLC协议层收到第一消息验证码后,将对该第一消息验证码进行验证,在确定验证成功时,UE通过UE的LLC协议层向UE的GMM/SM协议层发送验证成功消息,以使得UE在GMM/SM协议层上生成第一认证和密钥协商响应消息,且将该消息发送至UE的LLC协议层,并在UE的LLC协议层上生成第二认证和密钥协商响应消息。具体操作可以为,UE在UE的LLC协议层上对第一认证和密钥协商响应消息进行完整性保护,以得到第二密钥协商响应消息,在第二密钥协商响应消息中增加包头信息以及增加第二消息验证码MAC-I,再将携带第二消息验证码MAC-I的第二认证和密钥协商响应消息发送至SGSN侧,SGSN通过SGSN的LLC协议层接收UE通过UE的LLC协议层发送的携带有第二消息验证码的第二认证和密钥协商响应消息。
506、SGSN使用第二密钥和第二算法,在SGSN的LLC协议层上验证第二消息验证码。
本实施例中,SGSN在SGSN的LLC协议层上对第二认证和密钥协商响应消息中的第二消息验证码进行验证,当验证成功时,SGSN使用已确定的第二密钥和第二算法,在SGSN的LLC协议层对待处理数据进行加密和完整性保护,或者只进行加密保护,或者只进行完整性保护。
本发明实施例中,提供了一种对于UE与SGSN之间密钥和算法协商流程 进行完整性保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在LLC协议层进行完整性保护,在UE侧增强了LLC协议层和GMM/SM协议层之间的交互,在SGSN侧进行较少的消息验证,以此实现在UE的GMM/SM协议层获取密钥,再在LLC协议层上对消息进行完整性验证,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图5对应的实施例的基础上,本发明实施例提供的消息保护的第一个可选实施例中,
第二密钥包括第二加密密钥,第二算法包括第二加密算法;
或,
第二密钥包括第二完整性密钥,第二算法包括第二完整性保护算法;
或,
第二密钥包括第二加密密钥和第二完整性密钥,第二算法包括第二加密算法和第二完整性保护算法。
本实施例中,第二密钥可以包括第二加密密钥和第二完整性密钥,也可以只是第二加密密钥,或者只是第二完整性密钥。
这里的第二加密密钥为Ktc,第二完整性密钥为Kti。
第二算法包括第二加密算法和第二完整性保护算法,也可以只是第二加密算法,或者只是第二完整性保护算法。
完整性保护算法主要用于在发送端保护发送数据的完整性不被破坏及在接收端检验接收数据的完整性是否被破坏。通过完整性保护算法分别对发送端和接收端的数据进行运算得到消息验证码MAC-I和期望的消息验证码XMAC-I,两者进行比对可以确认数据的完整性。
其次,本发明实施例中,将第二密钥和第二算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
可选地,在上述图5或图5对应的第一个实施例的基础上,本发明实施例提供的消息保护的第二个可选实施例中,SGSN使用第二密钥和第二算法,在SGSN的LLC协议层上验证第二消息验证码之后,还可以包括:
SGSN使用第二加密密钥和第二加密算法标识所指示的第二加密算法,在 SGSN的LLC协议层上对数据以及信令进行加密;
或,
SGSN使用第二加密密钥和第二加密算法标识所指示的第二加密算法,在SGSN的LLC协议层上对用户面数据以及控制面信令进行加密,并使用第二完整性密钥和第二完整性保护算法标识所指示的第二完整性保护算法在SGSN的LLC协议层上对控制面信令进行完整性保护。
本实施例中,SGSN通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二密钥和第二算法标识,该第二算法标识用于确定对应的第二算法,在SGSN的LLC协议层上同时存在用户面数据与控制面信令,此时,可以通过第二密钥和第二算法来对数据和信令进行处理,具体处理方式可以为:
SGSN使用第二加密密钥和第二加密算法在SGSN的LLC协议层上对数据以及信令进行加密,增强数据和信令在传输过程中的安全性。
或者,SGSN使用第二加密密钥和第二加密算法在SGSN的LLC协议层上对数据进行加密,同时在SGSN的LLC协议层上对信令既进行加密保护又进行完整性保护。
在通常情况下,数据不进行完整性保护,信令则不单独进行完整性保护,但是并不排除这种实现方式,此处不应理解为对本方面方案的限定。
再次地,本发明实施例中,由于在SGSN的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
为便于理解,下面以一个具体应用场景对本发明中一种消息保护的方法进行详细描述,请参阅图6,图6是本发明实施例的应用场景中消息保护的方法的一个流程示意图,其过程具体为:
UE向SGSN发送附着请求消息,其中附着请求消息中携带有UE的标识以及UE的网络能力;
SGSN从HLR或者HSS获取用于认证的AV;
SGSN根据UE发送的附着请求消息,确定该UE为蜂窝式IoT类型的UE后,基于UE的网络能力和SGSN自身支持的安全算法来选择一个加密算法和一个完整性保护算法,并由此推导出相应的Ktc以及Kti,SGSN使用Kti和完整性保护算法对认证和密钥协商请求消息进行完整性保护。其过程可以是,发送端使用Kti对认证和密钥协商请求消息做完整性保护后生成一个MAC-I,接收端也使用同样的方式生成一个MAC-I值,两者进行对比,若MAC-I等于MAC-I值,则通过验证;
SGSN在GMM/SM协议层生成认证和密钥协商请求消息,其中,该认证和密钥协商请求消息中携带有AUTN、RAND、加密算法、完整性保护算法、UE的网络能力以及MAC-I,SGSN通过GMM/SM协议层将认证和密钥协商请求消息发送至SGSN的LLC协议层;
SGSN的LLC协议层此时还未从GMM/SM协议层中获取到密钥和算法,因此不对认证和密钥协商请求消息进行安全处理;
SGSN通过SGSN的LLC协议层直接向UE的LLC协议层发送认证和密钥协商请求消息;
由于UE的LLC协议层此时还没有从UE的GMM/SM协议层中获取到对应的密钥和算法,因此也不对认证和密钥协商请求消息进行安全处理;
UE通过LLC协议层将认证和密钥协商请求消息直接发送给UE的GMM/SM协议层;
UE根据现有技术在GMM/SM协议层进行AUTN验证,并生成RES,通过检测UE的网络能力后生成Ktc与Kti,获取算法,使用完整性密钥和算法来验证MAC-I,若验证成功,则生成认证和密钥协商响应消息,并为该认证和密钥协商响应消息计算得到一个新MAC-I值,其中,可能会对认证和密钥协商响应消息进行加密操作;
UE通过UE的GMM/SM协议层将携带有新MAC-I的认证和密钥协商响应消息发送给底层的LLC协议层;
由于此时UE仍未从GMM/SM协议层中获取密钥和算法,因此不对认证和密钥协商响应消息进行安全处理;
UE通过UE的LLC协议层向SGSN的LLC协议层发送认证和密钥协商 响应消息,该认证和密钥协商响应消息中依旧携带有对应的新MAC-I值;
由于此时SGSN的LLC协议层也没有从SGSN的GMM/SM协议层中获取密钥和算法,因此也不对认证和密钥协商响应消息进行安全处理;
SGSN通过SGSN的LLC协议层向SGSN的GMM/SM协议层发送携带有新MAC-I值的认证和密钥协商响应消息;
SGSN在SGSN的GMM/SM协议层上对认证和密钥协商响应消息中的新MAC-I进行完整性验证;
当新MAC-I通过完整性验证后,则SGSN的GMM/SM协议层将密钥和算法发送至SGSN的LLC协议层,同时,UE在UE的GMM/SM协议层发送认证和密钥协商响应消息后,也将密钥和算法发送至UE的LLC协议层,其中,如果控制面不使用完整性保护,而是只开启加密保护时,则GMM/SN协议层只发送加密密钥和加密算法给LLC协议层,不会发送完整性密钥和完整性保护算法;
UE和SGSN的LLC协议层分别存储密钥和算法,并开启用户面的数据加密,以及开启控制面的加密和完整性保护,其中,控制面的完整性保护可能不开启,例如在LLC协议层上没有收到完整性密钥和完整性保护算法时,则不开启相应的完整性保护。
上述应用场景主要是在GMM/SM协议层对认证和密钥协商请求消息以及认证和密钥协商响应消息进行完整性保护,其中,UE在GMM/SM协议层上成功验证认证和密钥协商请求消息,并发送认证和密钥协商响应消息后,才将Ktc、Kti和算法发送给UE的LLC协议层。而SGSN在GMM/SM协议层上成功验证认证和密钥协商响应消息后,才将Ktc、Kti和算法发送给SGSN的LLC协议层。
下面将提供另一种数据处理方法的流程,其方法主要是在LLC协议层上进行处理,UE通过LLC协议层接收认证和密钥协商请求消息,直接上报给UE的GMM/SM协议层,UE的GMM/SM协议层完成认证和生成密钥,并将Ktc、Kti和算法发送至UE的LLC协议层,最后UE才在UE的LLC协议层对认证和密钥协商请求消息进行完整性验证。
请参阅图7,图7是本发明实施例的应用场景中消息保护的方法的另一个 流程示意图,其过程具体为:
UE向SGSN发送附着请求消息,其中附着请求消息中携带有UE的标识以及UE的网络能力;
SGSN从HLR或者HSS获取用于认证的AV;
SGSN根据UE发送的附着请求消息,确定该UE为蜂窝式IoT类型的UE后,基于UE的网络能力和SGSN自身支持的安全算法选择一个加密算法和一个完整性保护算法,并由此推导出相应的Ktc以及Kti;
SGSN通过SGSN的GMM/SM协议层将Ktc、Kti以及对应的算法发送至SGSN的LLC协议层;
SGSN在LLC协议层上收到Ktc、Kti以及对应的算法后,在LLC协议层上开启相应的完整性保护;
SGSN通过GMM/SM协议层将认证和密钥协商请求消息发送至SGSN的LLC协议层;
SGSN在GMM/SM协议层生成认证和密钥协商请求消息,其中,该认证和密钥协商请求消息中携带有AUTN、RAND、加密算法、完整性保护算法、UE的网络能力以及MAC-I,SGSN在SGSN的LLC协议层上对认证和密钥协商请求消息进行完整性保护,并计算生成对应的MAC-I;
SGSN通过SGSN的LLC协议层直接向UE的LLC协议层发送认证和密钥协商请求消息,
由于此时UE仍未从GMM/SM协议层中获取密钥和算法,因此不对认证和密钥协商请求消息进行安全处理;
UE通过UE的LLC协议层向UE的GMM/SM协议层发送认证和密钥协商请求消息,这里可以不去除认证和密钥协商请求消息中的MAC-I,将MAC-I作为SDU的一部分一起发送给UE的GMM/SM协议层;
UE根据现有技术在GMM/SM协议层进行AUTN验证,并生成RES,通过检测UE的网络能力后生成Ktc与Kti,获取算法;
UE通过UE的GMM/SM协议层向UE的LLC协议层发送Ktc、Kti、算法以及认证和密钥协商请求消息,其中该认证和密钥协商请求消息中携带有MAC-I;
UE在UE的LLC协议层用完整性密钥和完整性保护算法对MAC-I进行验证,以此来验证认证和密钥协商请求消息的完整性;
UE通过UE的LLC协议层向UE的GMM/SM协议层发送验证成功或者验证失败的消息;
如果验证成功时,则将认证和密钥协商响应消息返回至UE的LLC协议层;
UE在LLC协议层上开启用户面的加密保护,并开启控制面的加密保护和完整性保护,可选地,可能只需要对认证和密钥协商请求消息或者认证和密钥协商响应消息进行完整性保护,而对后续的信令可能不要求开启完整性保护。对认证和密钥协商响应消息进行完整性保护和加密保护后生成新MAC-I;
UE通过LLC协议层将携带有新MAC-I的认证和密钥协商响应消息发送至SGSN的LLC协议层;
SGSN在SGSN的LLC协议层上验证认证和密钥协商响应消息中携带的新MAC-I是否正确,如果验证成功时,则开启用户面的数据加密保护,控制面的信令加密保护和完整性保护,可选地,如果只需要对认证和密钥协商请求消息以及认证和密钥协商响应消息进行完整性保护,则后续的信令可能不要求开启完整性保护。
为便于更好的实施本发明实施例提供的消息保护方法,本发明实施例还提供一种基于上述消息保护的方法的设备。其中名词的含义与上述消息保护的方法中相同,具体实现细节可以参考方法实施例中的说明。
一、在GMM/SM协议层上对信息进行保护:
下面对本发明中的用户设备进行详细描述,请参阅图8,本发明实施例中的用户设备包括:
接收模块601,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块602,用于在所述UE的GMM/SM协议层上根据所述接收模块601接收的所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一 密钥;
验证模块603,用于根据所述获取模块602获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块604,用于若所述验证模块603确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
第一发送模块605,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块604生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
本实施例中,接收模块601通过UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息,认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示第一算法;获取模块602在UE的GMM/SM协议层上根据接收模块601接收的认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;验证模块603根据获取模块602获取的第一密钥和生成的第一算法,在UE的GMM/SM协议层上验证第一消息验证码;若验证模块603确定第一消息验证码验证通过,则生成模块604根据第一密钥和第一算法,在UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带第二消息验证码;第一发送模块605通过UE的GMM/SM协议层向SGSN发送生成模块604生成的认证和密钥协商响应消息,以使SGSN对所述第二消息验证码进行验证。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图8对应的实施例的基础上,本发明实施例提供的用户设备第一个可选实施例中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
其次,本发明实施例中,将第一密钥和第一算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
请参阅图9,本发明中用户设备的另一个实施例包括:
接收模块601,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块602,用于在所述UE的GMM/SM协议层上根据所述接收模块601接收的所述认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;
验证模块603,用于根据所述获取模块602获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块604,用于若所述验证模块603确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
消息处理模块606,用于所述生成模块604根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密;
或,
使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
第一发送模块605,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块604生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
再次,本发明实施例中,提出了对认证和密钥协商响应消息进行保护的具体方案,不但可以进行加密保护或进行完整性保护,还可以同时进行加密保护和完整性保护,如此,大大增加了消息传输的安全性,连续性以及完整性,在方案的具体实现中起到了更好的实用效果。
请参阅图10,本发明中用户设备的另一个实施例包括:
第二发送模块607,用于所述接收模块601通过所述UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,通过所述UE的GMM/SM协议层向所述SGSN的GMM/SM协议层发送附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息,以使所述SGSN根据所述附着请求消息在所述SGSN的GMM/SM协议层上生成所述认证和密钥协商请求消息;
接收模块601,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块602,用于在所述UE的GMM/SM协议层上根据所述接收模块601接收的所述认证和密钥协商请求消息获取第一算法标识,并生成第一密 钥;
验证模块603,用于根据所述获取模块602获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块604,用于若所述验证模块603确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
第一发送模块605,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块604生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
进一步地,本发明实施例中,UE向SGSN发送附着请求消息,使得SGSN可以根据附着请求消息获取认证的相关参数,一方面为本发明方案的实际应用提供了具体实现依据,另一方面,也是UE与网络侧进行交互的一种方式,通过附着请求来完成与网络之间的信息交互,进而提升方案的实用性。
请参阅图11,本发明中用户设备的另一个实施例包括:
接收模块601,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块602,用于在所述UE的GMM/SM协议层上根据所述接收模块601接收的所述认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;
验证模块603,用于根据所述获取模块602获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块604,用于若所述验证模块603确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
第一发送模块605,用于通过所述UE的GMM/SM协议层向所述SGSN 发送所述生成模块604生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证;
第三发送模块608,用于所述第一发送模块605通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识。
更进一步地,本发明实施例中,UE通过GMM/SM协议层向SGSN发送认证和密钥协商响应消息之后,还可以向UE的LLC协议层发送第一算法和第一密钥,使得UE在LLC协议层上可以对数据和信令做相应的处理,以此来增加方案的可靠性,同时,进一步增强了方案的实用性。
请参阅图12,本发明中用户设备的另一个实施例包括:
接收模块601,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
获取模块602,用于在所述UE的GMM/SM协议层上根据所述接收模块601接收的所述认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;
验证模块603,用于根据所述获取模块602获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
生成模块604,用于若所述验证模块603确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
第一发送模块605,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块604生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证;
第三发送模块608,用于所述第一发送模块605通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,通过所述UE的 GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识;
加密模块609,用于所述第三发送模块608通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
再进一步地,本发明实施例中,由于在UE的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
下面对本发明中的服务GPRS支持节点进行详细描述,请参阅图13,本发明实施例中的服务GPRS支持节点包括:
获取模块701,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
生成模块702,用于使用所述获取模块701获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
第一接收模块703,用于通过所述SGSN的GMM/SM协议层接收所述生 成模块702发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
验证模块704,用于使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第一接收模块703接收的所述第二消息验证码。
本实施例中,获取模块701在所述SGSN的GMM/SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;生成模块702使用获取模块701获取的第二密钥和所述第二算法,在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将认证和密钥协商请求消息发送至用户设备UE,认证和密钥协商请求消息携带第一消息验证码和第二算法标识;第一接收模块703通过SGSN的GMM/SM协议层接收生成模块702发送的认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带第二消息验证码;验证模块704使用第二密钥和所述第二算法,在SGSN的GMM/SM协议层上验证第一接收模块703接收的第二消息验证码。
可选地,在上述图13对应的实施例的基础上,本发明实施例提供的服务GPRS支持节点第一个可选实施例中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
其次,本发明实施例中,将第二密钥和第二算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
请参阅图14,本发明中服务GPRS支持节点的另一个实施例包括:
获取模块701,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
第二接收模块705,用于所述生成模块702在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE之前,通过所述SGSN的GMM/SM协议层接收所述UE发送的附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息;
生成模块702,用于使用所述获取模块701获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
第一接收模块703,用于通过所述SGSN的GMM/SM协议层接收所述生成模块702发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
验证模块704,用于使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第一接收模块703接收的所述第二消息验证码;
其中,所述获取模块701包括:
获取单元7011,用于根据所述UE的网络能力信息,获取所述第二算法;
生成单元7012,用于根据所述UE的标识获取所述UE的认证向量信息,并根据所述认证向量信息生成所述第二密钥。
再次,本发明实施例中,SGSN接收UE发送的附着请求消息,根据附着请求消息获取认证的相关参数,一方面为本发明方案的实际应用提供了具体实现依据,另一方面,也是UE与SGSN进行交互的一种方式,通过附着请求来完成与网络之间的信息交互,进而提升方案的实用性。当SGSN接收到携带有UE的标识和UE的网络能力信息的附着请求信息时,根据UE的网络能力信息来选择合理的算法,同时通过UE的标识来确认UE对应的认证向量信息,使得方案在实际应用中更合理化,针对具体的UE进行具体的算法和密钥选择,增强整个方案的可行性。
请参阅图15,本发明中服务GPRS支持节点的另一个实施例包括:
获取模块701,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指 示所述第二算法;
生成模块702,用于使用所述获取模块701获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
第一接收模块703,用于通过所述SGSN的GMM/SM协议层接收所述生成模块702发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
验证模块704,用于使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第一接收模块703接收的所述第二消息验证码;
发送模块706,用于若所述验证模块704验证后确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识。
进一步地,本发明实施例中,SGSN确定第二消息验证码通过后,通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送第二密钥和第二算法,使得SGSN在LLC协议层上可以对数据和信令做相应的处理,以此来增加方案的可靠性,同时,进一步增强了方案的实用性。
请参阅图16,本发明中服务GPRS支持节点的另一个实施例包括:
获取模块701,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
生成模块702,用于使用所述获取模块701获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
第一接收模块703,用于通过所述SGSN的GMM/SM协议层接收所述生成模块702发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
验证模块704,用于使用所述第二密钥和所述第二算法,在所述SGSN的 GMM/SM协议层上验证所述第一接收模块703接收的所述第二消息验证码;
发送模块706,用于若所述验证模块704验证后确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识;
加密模块707,用于所述发送模块706通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识后,所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
更进一步地,本发明实施例中,由于在SGSN的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
二、在LLC协议层上对信息进行保护:
下面对本发明中的用户设备进行详细描述,请参阅图17,本发明实施例中的用户设备包括:
接收模块801,用于通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
处理模块802,用于在所述LLC协议层对所述接收模块801接收的所述 第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
获取模块803,用于所述处理模块802将所述第二认证和密钥协商请求消息发送给所述UE的GMM/SM协议层后,在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
生成模块804,用于若在所述UE的LLC协议层上使用所述获取模块803获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
消息处理模块805,用于在所述UE的LLC协议层上对所述生成模块804生成的所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
发送模块806,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块805处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
本实施例中,接收模块801通过UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示第一算法;处理模块802在LLC协议层对接收模块801接收的第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将第二认证和密钥协商请求消息发送给UE的GPRS移动性管理GMM/会话管理SM协议层;处理模块802将第二认证和密钥协商请求消息发送给UE的GMM/SM协议层后,获取模块803在UE的GMM/SM协议层上根据第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将第一密钥和第一算法标识发送给UE的LLC协议层;若在UE的LLC协议层上使用所述获取模块803获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则生成模块804所述UE在所述UE的GMM/SM协议层上生成所述第一认证 和密钥协商响应消息;消息处理模块805,用于在所述UE的LLC协议层上对所述生成模块804生成的所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;发送模块806,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块805处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在LLC协议层进行完整性保护,在UE侧增强了LLC协议层和GMM/SM协议层之间的交互,以此实现在UE的GMM/SM协议层获取密钥,再在LLC协议层上对消息进行完整性验证,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图17对应的实施例的基础上,本发明实施例提供的用户设备第一个可选实施例中,
所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
或,
所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
或,
所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
其次,本发明实施例中,将第一密钥和第一算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
请参阅图18,本发明中用户设备的另一个实施例包括:
接收模块801,用于通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
处理模块802,用于在所述LLC协议层对所述接收模块801接收的所述 第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
获取模块803,用于所述处理模块802将所述第二认证和密钥协商请求消息发送给所述UE的GMM/SM协议层后,在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
生成模块804,用于若在所述UE的LLC协议层上使用所述获取模块803获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
消息处理模块805,用于在所述UE的LLC协议层上对所述生成模块804生成的所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
发送模块806,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块805处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证;
其中,所述消息处理模块805包括:
加密单元8051,用于使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,得到所述第二认证和密钥协商响应消息;
或,
使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所 述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息。
再次,本发明实施例中,提出了对第一认证和密钥协商响应消息进行保护的具体方案,不但可以进行加密保护或进行完整性保护,还可以同时进行加密保护和完整性保护,如此,大大增加了消息传输的安全性,连续性以及完整性,在方案的具体实现中起到了更好的实用效果。
请参阅图19,本发明中用户设备的另一个实施例包括:
接收模块801,用于通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
处理模块802,用于在所述LLC协议层对所述接收模块801接收的所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
获取模块803,用于所述处理模块802将所述第二认证和密钥协商请求消息发送给所述UE的GMM/SM协议层后,在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
生成模块804,用于若在所述UE的LLC协议层上使用所述获取模块803获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
加密模块807,用于所述生成模块804在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
或,
使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进 行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护;
消息处理模块805,用于在所述UE的LLC协议层上对所述生成模块804生成的所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
发送模块806,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块805处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
进一步地,本发明实施例中,由于在UE的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
下面对本发明中的服务GPRS支持节点进行详细描述,请参阅图20,本发明实施例中的服务GPRS支持节点包括:
获取模块901,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
第一发送模块902,用于通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述获取模块901获取的所述第二算法标识和生成的所述第二密钥;
消息处理模块903,用于在所述SGSN的LLC协议层上使用所述第一发送模块902发送的所述第二算法和所述第二密钥,对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
第二发送模块904,用于通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述消息处理模块903处理后的所述第一认证和密钥协商请求消 息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
接收模块905,用于若所述UE在所述UE的LLC协议层上确定所述第二发送模块904发送的所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
验证模块906,用于所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述接收模块905接收的所述第二消息验证码。
本实施例中,获取模块901在SGSN的GMM/SM协议层上获取第二算法标识,并生成第二密钥,第二算法标识用于指示第二算法;第一发送模块902通过SGSN的GMM/SM协议层向SGSN的LLC协议层发送获取模块901获取的第二算法标识和生成的第二密钥;消息处理模块903在SGSN的LLC协议层上使用第一发送模块902发送的第二算法和所述第二密钥,对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;第二发送模块904通过SGSN的LLC协议层向UE的LLC协议层发送消息处理模块903处理后的第一认证和密钥协商请求消息,第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;若所述UE在UE的LLC协议层上确定第二发送模块904发送的第一消息验证码验证通过,则接收模块905SGSN通过SGSN的LLC协议层接收UE发送的第二认证和密钥协商响应消息,其中,第二认证和密钥协商响应消息中携带第二消息验证码;SGSN使用第二密钥和第二算法,验证模块906在SGSN的LLC协议层上验证接收模块905接收的第二消息验证码。
本发明实施例中,提供了一种对于UE与SGSN之间密钥和算法协商流程进行完整性保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在LLC协议层进行完整性保护,在UE侧增强了LLC协议层和GMM/SM协议层之间的交互,在SGSN侧进行较少的消息验证,以此实现在UE的GMM/SM协议层获取密钥,再在LLC协议层上对消息进行完整性验证,从而提升方案的安全性,防止攻击者对算法的降质攻击。
可选地,在上述图20对应的实施例的基础上,本发明实施例提供的服务 GPRS支持节点第一个可选实施例中,
所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
或,
所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
或,
所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
其次,本发明实施例中,将第二密钥和第二算法具体化,以此来支持本发明方案在实际应用场景中的情况,增强方案的灵活性,针对具体场景选择具体的算法来进行数据的包含,也增加了方案的可塑性。
请参阅图21,本发明中服务GPRS支持节点的另一个实施例包括:
获取模块901,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
第一发送模块902,用于通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述获取模块901获取的所述第二算法标识和生成的所述第二密钥;
消息处理模块903,用于在所述SGSN的LLC协议层上使用所述第一发送模块902发送的所述第二算法和所述第二密钥,对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
第二发送模块904,用于通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述消息处理模块903处理后的所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
接收模块905,用于若所述UE在所述UE的LLC协议层上确定所述第二发送模块904发送的所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
验证模块906,用于所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述接收模块905接收的所述第二消息验证码;
加密模块907,用于所述验证模块906使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码之后。使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对数据以及信令进行加密;
或,
使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
再次地,本发明实施例中,由于在SGSN的LLC协议层上数据与信令一直处于并存的状态,对于数据而言可以进行加密保护,而对于信令而言,既可以使用加密保护又可以进行完整性保护。可以根据实际情况选择相应的保护方式,进而实现本发明方案在应用过程中可行性,同时,通过加密保护可以增强数据和信令的安全性,通过完整性保护则是增强了信令的完整性,从而极大地保证了数据和信令在传输过程中的可靠性。
本发明实施例还提供了另一种用户设备,如图22所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该用户设备可以为包括手机、平板电脑、个人数字助理(英文全称:Personal Digital Assistant,英文缩写:PDA)、销售终端(英文全称:Point of Sales,英文缩写:POS)、车载电脑等任意终端设备,以终端为手机为例:
图22示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。参考图22,手机包括:射频(英文全称:Radio Frequency,英文缩写:RF)电路1010、存储器1020、输入单元1030、显示单元1040、传感器1050、音频电路1060、无线保真(英文全称:wireless fidelity,英文缩写:WiFi)模块1070、处理器1080、以及电源1090等部件。本领域技术人员可以理解,图 22中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图22对手机的各个构成部件进行具体的介绍:
RF电路1010可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1080处理;另外,将设计上行的数据发送给基站。通常,RF电路1010包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(英文全称:Low Noise Amplifier,英文缩写:LNA)、双工器等。此外,RF电路1010还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(英文全称:Global System of Mobile communication,英文缩写:GSM)、通用分组无线服务(英文全称:General Packet Radio Service,英文缩写:GPRS)、码分多址(英文全称:Code Division Multiple Access,英文缩写:CDMA)、宽带码分多址(英文全称:Wideband Code Division Multiple Access,英文缩写WCDMA)、长期演进(英文全称:Long Term Evolution,英文缩写:LTE)、电子邮件、短消息服务(英文全称:Short Messaging Service,英文缩写:SMS)等。
存储器1020可用于存储软件程序以及模块,处理器1080通过运行存储在存储器1020的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1020可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1020可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1030可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1030可包括触控面板1031以及其他输入设备1032。触控面板1031,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1031上或在触控面板1031附近的操作),并根据预先设定的程 式驱动相应的连接装置。可选的,触控面板1031可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1080,并能接收处理器1080发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1031。除了触控面板1031,输入单元1030还可以包括其他输入设备1032。具体地,其他输入设备1032可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1040可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1040可包括显示面板1041,可选的,可以采用液晶显示器(英文全称:Liquid Crystal Display,英文缩写:LCD)、有机发光二极管(英文全称:Organic Light-Emitting Diode,英文缩写:OLED)等形式来配置显示面板1041。进一步的,触控面板1031可覆盖显示面板1041,当触控面板1031检测到在其上或附近的触摸操作后,传送给处理器1080以确定触摸事件的类型,随后处理器1080根据触摸事件的类型在显示面板1041上提供相应的视觉输出。虽然在图22中,触控面板1031与显示面板1041是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1031与显示面板1041集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器1050,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1041的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1041和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1060、扬声器1061,传声器1062可提供用户与手机之间的音频 接口。音频电路1060可将接收到的音频数据转换后的电信号,传输到扬声器1061,由扬声器1061转换为声音信号输出;另一方面,传声器1062将收集的声音信号转换为电信号,由音频电路1060接收后转换为音频数据,再将音频数据输出处理器1080处理后,经RF电路1010以发送给比如另一手机,或者将音频数据输出至存储器1020以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块1070可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图22示出了WiFi模块1070,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器1080是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1020内的软件程序和/或模块,以及调用存储在存储器1020内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1080可包括一个或多个处理单元;优选的,处理器1080可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1080中。
手机还包括给各个部件供电的电源1090(比如电池),优选的,电源可以通过电源管理系统与处理器1080逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
在本发明实施例中,该终端所包括的输入单元1030具有以下功能:
通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法。
可选地,所述输入单元1030还可以具有以下功能:
通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第 一算法;
在本发明实施例中,该终端所包括的处理器1080还具有以下功能:
在所述UE的GMM/SM协议层上根据所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
若所述UE确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码。
可选地,所述处理器1080还可以具有以下功能:
在所述LLC协议层对所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码。
在本发明实施例中,该终端所包括的输出设备还具有以下功能:
通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
可选地,所述输出设备还可以具有以下功能:
通过所述UE的LLC协议层向所述SGSN发送所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
图23是本发明实施例提供的一种服务GPRS支持节点结构示意图,该服务GPRS支持节点1100可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(英文全称:central processing units,英文缩写:CPU)1122(例如,一个或一个以上处理器)和存储器1132,一个或一个以上存储应用程序1142或数据1144的存储介质1130(例如一个或一个以上海量存储设备)。其中,存储器1132和存储介质1130可以是短暂存储或持久存储。存储在存储介质1130的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务GPRS支持节点中的一系列指令操作。更进一步地,中央处理器1122可以设置为与存储介质1130通信,服务GPRS支持节点1100上执行存储介质1130中的一系列指令操作。
服务GPRS支持节点1100还可以包括一个或一个以上电源1126,一个或一个以上有线或无线网络接口1150,一个或一个以上输入输出接口1158,和/或,一个或一个以上操作系统1141,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。
在本发明实施例中,该设备所包括的输入设备还具有以下功能:
通过所述SGSN的GMM/SM协议层接收所述UE发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码。
可选地,所述输入设备还可以具有以下功能:
若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码
在本发明实施例中,该设备所包括的处理器1122还具有以下功能:
在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户 设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码。
可选地,所述处理器1122还可以具有以下功能:
在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
在所述SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码。
在本发明实施例中,该设备所包括的输出设备还具有以下功能:
通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二算法标识和所述第二密钥;
通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识。
上述实施例中由服务GPRS支持节点所执行的步骤可以基于该图23所示的服务器结构。
下面对本发明实施例中的消息保护系统进行描述,请参阅图24,本发明实施例中的消息保护系统包括:
用户设备1201以及服务GPRS支持节点1202;
用户设备UE1201通过UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN1202发送的认证和密钥协商请求消息,认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示第一算法;UE1201在UE的GMM/SM协议层上根据认证和密钥协商请求消息获取第一算法标识,并生成第一密钥;UE1201根据第一密钥和所述第一算法,在UE的GMM/SM协议层上验证所述第一消息验证码;若UE1201确定所述第一消息验证码验证通过,则根据第一密钥和所述第一算法,在UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,认证和密钥协商 响应消息中携带第二消息验证码;UE1201通过UE的GMM/SM协议层向SGSN1202发送认证和密钥协商响应消息,以使SGSN1202对第二消息验证码进行验证。
服务GPRS支持节点SGSN1202在SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,第二算法标识用于指示第二算法;SGSN1202使用第二密钥和第二算法,在SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将认证和密钥协商请求消息发送至用户设备UE1201,认证和密钥协商请求消息携带第一消息验证码和第二算法标识;SGSN1202通过SGSN的GMM/SM协议层接收UE1201发送的认证和密钥协商响应消息,其中,认证和密钥协商响应消息中携带第二消息验证码;SGSN1202使用第二密钥和第二算法,在SGSN的GMM/SM协议层上验证第二消息验证码。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
上述为一种实现消息保护的系统,下面将再介绍另一种实现消息保护的系统。
用户设备UE1201通过UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN1202发送的第一认证和密钥协商请求消息,其中,第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,第一算法标识用于指示所述第一算法;UE1201在LLC协议层对第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将第二认证和密钥协商请求消息发送给UE的GPRS移动性管理GMM/会话管理SM协议层;UE1201在UE的GMM/SM协议层上根据第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将第一密钥和所述第一算法标识发送给UE的LLC协议层;若UE1201在UE的LLC协议层上确定第一消息验证码验证通过,则UE1201在 UE的GMM/SM协议层上生成第一认证和密钥协商响应消息;UE1201在UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,第二认证和密钥协商响应消息中携带第二消息验证码;UE1201通过UE的LLC协议层向SGSN1202发送第二认证和密钥协商响应消息,以使SGSN1202对第二消息验证码进行验证。
服务GPRS支持节点SGSN1202在SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,第二算法标识用于指示第二算法;SGSN1202通过SGSN的GMM/SM协议层向SGSN的逻辑链路控制LLC协议层发送第二算法标识和所述第二密钥;SGSN1202在SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;SGSN1202通过SGSN的LLC协议层向UE的LLC协议层发送第一认证和密钥协商请求消息,第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;若UE1201在UE的LLC协议层上确定第一消息验证码验证通过,则SGSN1202通过SGSN的LLC协议层接收UE1201发送的第二认证和密钥协商响应消息,其中,第二认证和密钥协商响应消息中携带第二消息验证码;SGSN1202使用第二密钥和所述第二算法,在SGSN的LLC协议层上验证第二消息验证码。
本发明实施例中,提供一种对UE与SGSN之间消息保护的实现方案,具体是针对认证和密钥协商请求消息以及认证和密钥协商响应消息在GMM/SM协议层进行完整性保护,解决了现有技术中在UE和SGSN的LLC协议层无法实现完整性保护的功能。在UE与SGSN的GMM/SM协议层分别对认证和密钥协商请求消息,以及认证和密钥协商响应消息进行完整性保护,可以在实际应用中得到支持,从而提升方案的安全性,防止攻击者对算法的降质攻击。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或 一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(英文全称:Read-Only Memory,英文缩写:ROM)、随机存取存储器(英文全称:Random Access Memory,英文缩写:RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上对本发明所提供的一种……进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的技术人员,依据本发明实施例的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims (42)

  1. 一种消息保护的方法,其特征在于,包括:
    用户设备UE通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    所述UE在所述UE的GMM/SM协议层上根据所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
    所述UE根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
    若所述UE确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    所述UE通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  2. 根据权利要求1所述的方法,其特征在于,
    所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
    或,
    所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
    或,
    所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,所述方法还包括:
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密;
    或,
    所述UE使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
    或,
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述UE通过所述UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,所述方法还包括:
    所述UE通过所述UE的GMM/SM协议层向所述SGSN的GMM/SM协议层发送附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息,以使所述SGSN根据所述附着请求消息在所述SGSN的GMM/SM协议层上生成所述认证和密钥协商请求消息。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述UE通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,所述方法还包括:
    所述UE通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识。
  6. 根据权利要求5所述的方法,其特征在于,所述UE通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识之后,所述方法还包括:
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
  7. 一种消息保护的方法,其特征在于,包括:
    服务GPRS支持节点SGSN在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
    所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
    所述SGSN通过所述SGSN的GMM/SM协议层接收所述UE发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码。
  8. 根据权利要求7所述的方法,其特征在于,
    所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
    或,
    所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
    或,
    所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
  9. 根据权利要求7或8所述的方法,其特征在于,所述在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE之前,所述方法还包括:
    所述SGSN通过所述SGSN的GMM/SM协议层接收所述UE发送的附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息;
    所述SGSN在所述SGSN的GMM/SM协议层上获取第二算法标识,并生成第二密钥,包括:
    所述SGSN根据所述UE的网络能力信息,获取所述第二算法;
    所述SGSN根据所述UE的标识获取所述UE的认证向量信息,并根据所述认证向量信息生成所述第二密钥。
  10. 根据权利要求7至9中任一项所述的方法,其特征在于,所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码之后,所述方法还包括:
    若所述SGSN确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识。
  11. 根据权利要求10所述的方法,其特征在于,所述若所述SGSN确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识之后,所述方法还包括:
    所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
  12. 一种消息保护的方法,其特征在于,包括:
    用户设备UE通过所述UE的逻辑链路控制LLC协议层接收服务GPRS 支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    所述UE在所述LLC协议层对所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
    所述UE在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
    若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
    所述UE在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    所述UE通过所述UE的LLC协议层向所述SGSN发送所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  13. 根据权利要求12所述的方法,其特征在于,
    所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
    或,
    所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
    或,
    所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
  14. 根据权利要求13所述的方法,其特征在于,所述UE在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,包括:
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第 一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,得到所述第二认证和密钥协商响应消息;
    或,
    所述UE使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息;
    或,
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息。
  15. 根据权利要求13所述的方法,其特征在于,所述若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息之后,所述方法还包括:
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
  16. 一种消息保护的方法,其特征在于,包括:
    服务GPRS支持节点SGSN在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识 用于指示所述第二算法;
    所述SGSN通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二算法标识和所述第二密钥;
    所述SGSN在所述SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
    所述SGSN通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
    若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码。
  17. 根据权利要求16所述的方法,其特征在于,
    所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
    或,
    所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
    或,
    所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
  18. 根据权利要求16或17所述的方法,其特征在于,所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码之后,所述方法还包括:
    所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对数据以及信令进行加密;
    或,
    所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所 述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
  19. 一种用户设备,其特征在于,包括:
    接收模块,用于通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    获取模块,用于在所述UE的GMM/SM协议层上根据所述接收模块接收的所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
    验证模块,用于根据所述获取模块获取的所述第一密钥和生成的所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
    生成模块,用于若所述验证模块确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    第一发送模块,用于通过所述UE的GMM/SM协议层向所述SGSN发送所述生成模块生成的所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  20. 根据权利要求19所述的用户设备,其特征在于,
    所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
    或,
    所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
    或,
    所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
  21. 根据权利要求20所述的用户设备,其特征在于,所述用户设备还包 括:
    消息处理模块,用于所述生成模块根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密;
    或,
    使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护;
    或,
    使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的GMM/SM协议层上对所述认证和密钥协商响应消息进行完整性保护。
  22. 根据权利要求19至21中任一项所述的用户设备,其特征在于,所述用户设备还包括:
    第二发送模块,用于所述接收模块通过所述UE的GMM/SM协议层接收SGSN发送的认证和密钥协商请求消息之前,通过所述UE的GMM/SM协议层向所述SGSN的GMM/SM协议层发送附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息,以使所述SGSN根据所述附着请求消息在所述SGSN的GMM/SM协议层上生成所述认证和密钥协商请求消息。
  23. 根据权利要求19至22中任一项所述的用户设备,其特征在于,所述用户设备还包括:
    第三发送模块,用于所述第一发送模块通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息之后,通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法标识。
  24. 根据权利要求23所述的用户设备,其特征在于,所述用户设备还包括:
    加密模块,用于所述第三发送模块通过所述UE的GMM/SM协议层向所述UE的逻辑链路控制LLC协议层发送所述第一密钥和所述第一算法之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    所述UE使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进行完整性保护。
  25. 一种服务GPRS支持节点,其特征在于,包括:
    获取模块,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
    生成模块,用于使用所述获取模块获取的所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
    第一接收模块,用于通过所述SGSN的GMM/SM协议层接收所述生成模块发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    验证模块,用于使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第一接收模块接收的所述第二消息验证码。
  26. 根据权利要求25所述的设备,其特征在于,
    所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
    或,
    所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保 护算法;
    或,
    所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
  27. 根据权利要求25或26所述的设备,其特征在于,所述设备还包括:
    第二接收模块,用于所述生成模块在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE之前,通过所述SGSN的GMM/SM协议层接收所述UE发送的附着请求消息,所述附着请求消息中携带所述UE的标识和所述UE的网络能力信息;
    其中,所述获取模块包括:
    获取单元,用于根据所述UE的网络能力信息,获取所述第二算法;
    生成单元,用于根据所述UE的标识获取所述UE的认证向量信息,并根据所述认证向量信息生成所述第二密钥。
  28. 根据权利要求25至27中任一项所述的设备,其特征在于,所述设备还包括:
    发送模块,用于若所述验证模块验证后确定所述第二消息验证码通过,则通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法标识。
  29. 根据权利要求28所述的设备,其特征在于,所述设备还包括:
    加密模块,用于所述发送模块通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二密钥和所述第二算法后,所述SGSN使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信 令进行完整性保护。
  30. 一种用户设备,其特征在于,包括:
    接收模块,用于通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    处理模块,用于在所述LLC协议层对所述接收模块接收的所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
    获取模块,用于所述处理模块将所述第二认证和密钥协商请求消息发送给所述UE的GMM/SM协议层后,在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
    生成模块,用于若在所述UE的LLC协议层上使用所述获取模块获取所述第一算法和所述第一密钥确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
    消息处理模块,用于在所述UE的LLC协议层上对所述生成模块生成的所述第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    发送模块,用于通过所述UE的LLC协议层向所述SGSN发送所述消息处理模块处理后得到的所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  31. 根据权利要求30所述的用户设备,其特征在于,
    所述第一密钥包括第一加密密钥,所述第一算法包括所述第一加密算法;
    或,
    所述第一密钥包括第一完整性密钥,所述第一算法包括所述第一完整性保护算法;
    或,
    所述第一密钥包括第一加密密钥和第一完整性密钥,所述第一算法包括所述第一加密算法和所述第一完整性保护算法。
  32. 根据权利要求31所述的用户设备,其特征在于,所述消息处理模块包括:
    加密单元,用于使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,得到所述第二认证和密钥协商响应消息;
    或,
    使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息;
    或,
    使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述第一认证和密钥协商响应消息进行完整性保护,得到所述第二认证和密钥协商响应消息。
  33. 根据权利要求31所述的用户设备,其特征在于,所述用户设备还包括:
    加密模块,用于所述生成模块在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息之后,使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对用户面数据以及控制面信令进行加密;
    或,
    使用所述第一加密密钥和所述第一加密算法标识所指示的所述第一加密算法,在所述UE的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第一完整性密钥和所述第一完整性保护算法标识所指示的所述第一完整性保护算法,在所述UE的LLC协议层上对所述控制面信令进 行完整性保护。
  34. 一种服务GPRS支持节点,其特征在于,包括:
    获取模块,用于在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
    第一发送模块,用于通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述获取模块获取的所述第二算法标识和生成的所述第二密钥;
    消息处理模块,用于在所述SGSN的LLC协议层上使用所述第一发送模块发送的所述第二算法和所述第二密钥,对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
    第二发送模块,用于通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述消息处理模块处理后的所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识;
    接收模块,用于若所述UE在所述UE的LLC协议层上确定所述第二发送模块发送的所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    验证模块,用于所述SGSN使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述接收模块接收的所述第二消息验证码。
  35. 根据权利要求34所述的设备,其特征在于,
    所述第二密钥包括第二加密密钥,所述第二算法包括所述第二加密算法;
    或,
    所述第二密钥包括第二完整性密钥,所述第二算法包括所述第二完整性保护算法;
    或,
    所述第二密钥包括第二加密密钥和第二完整性密钥,所述第二算法包括所述第二加密算法和所述第二完整性保护算法。
  36. 根据权利要求34或35所述的方法,其特征在于,所述设备还包括:
    加密模块,用于所述验证模块使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码之后。使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对数据以及信令进行加密;
    或,
    使用所述第二加密密钥和所述第二加密算法标识所指示的所述第二加密算法,在所述SGSN的LLC协议层上对所述用户面数据以及所述控制面信令进行加密,并使用所述第二完整性密钥和所述第二完整性保护算法标识所指示的所述第二完整性保护算法,在所述SGSN的LLC协议层上对所述控制面信令进行完整性保护。
  37. 一种用户设备,其特征在于,包括:
    输入设备、输出设备、处理器以及存储器;
    所述输入设备执行如下流程:
    通过所述UE的GPRS移动性管理GMM/会话管理SM协议层接收服务GPRS支持节点SGSN发送的认证和密钥协商请求消息,所述认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    所述处理器执行如下流程:
    在所述UE的GMM/SM协议层上根据所述认证和密钥协商请求消息获取所述第一算法标识,并生成第一密钥;
    根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上验证所述第一消息验证码;
    若所述UE确定所述第一消息验证码验证通过,则根据所述第一密钥和所述第一算法,在所述UE的GMM/SM协议层上生成认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    所述输出设备执行如下流程:
    通过所述UE的GMM/SM协议层向所述SGSN发送所述认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  38. 一种服务GPRS支持节点,其特征在于,包括:
    输入设备、输出设备、处理器以及存储器;
    所述输入设备执行如下流程:
    通过所述SGSN的GMM/SM协议层接收所述UE发送的认证和密钥协商响应消息,其中,所述认证和密钥协商响应消息中携带第二消息验证码;
    所述处理器执行如下流程:
    在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
    使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上生成认证和密钥协商请求消息,并将所述认证和密钥协商请求消息发送至用户设备UE,所述认证和密钥协商请求消息携带第一消息验证码和第二算法标识;
    使用所述第二密钥和所述第二算法,在所述SGSN的GMM/SM协议层上验证所述第二消息验证码。
  39. 一种用户设备,其特征在于,包括:
    输入设备、输出设备、处理器以及存储器;
    所述输入设备执行如下流程:
    通过所述UE的逻辑链路控制LLC协议层接收服务GPRS支持节点SGSN发送的第一认证和密钥协商请求消息,其中,所述第一认证和密钥协商请求消息中携带第一消息验证码与第一算法标识,所述第一算法标识用于指示所述第一算法;
    所述处理器执行如下流程:
    在所述LLC协议层对所述第一认证和密钥协商请求消息进行处理,获得第二认证和密钥协商请求消息,并将所述第二认证和密钥协商请求消息发送给所述UE的GPRS移动性管理GMM/会话管理SM协议层;
    在所述UE的GMM/SM协议层上根据所述第二认证和密钥协商请求获取第一算法标识,生成第一密钥,并将所述第一密钥和所述第一算法标识发送给所述UE的LLC协议层;
    若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
    若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述UE在所述UE的GMM/SM协议层上生成所述第一认证和密钥协商响应消息;
    在所述UE的LLC协议层上对第一认证和密钥协商响应消息进行加密和/或完整性保护得到第二认证和密钥协商响应消息,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    所述输出设备执行如下流程:
    通过所述UE的LLC协议层向所述SGSN发送所述第二认证和密钥协商响应消息,以使所述SGSN对所述第二消息验证码进行验证。
  40. 一种服务GPRS支持节点,其特征在于,包括:
    输入设备、输出设备、处理器以及存储器;
    所述输入设备执行如下流程:
    若所述UE在所述UE的LLC协议层上确定所述第一消息验证码验证通过,则所述SGSN通过所述SGSN的LLC协议层接收所述UE发送的第二认证和密钥协商响应消息,其中,所述第二认证和密钥协商响应消息中携带第二消息验证码;
    所述处理器执行如下流程:
    在所述SGSN的GPRS移动性管理GMM/会话管理SM协议层上获取第二算法标识,并生成第二密钥,所述第二算法标识用于指示所述第二算法;
    在所述SGSN的LLC协议层上对第一认证和密钥协商请求消息进行完整性保护,并生成第一消息验证码;
    使用所述第二密钥和所述第二算法,在所述SGSN的LLC协议层上验证所述第二消息验证码;
    所述输出设备执行如下流程:
    通过所述SGSN的GMM/SM协议层向所述SGSN的逻辑链路控制LLC协议层发送所述第二算法标识和所述第二密钥;
    通过所述SGSN的LLC协议层向所述UE的LLC协议层发送所述第一认证和密钥协商请求消息,所述第一认证和密钥协商请求消息中携带第一消息验证码和第二算法标识。
  41. 一种消息保护的系统,其特征在于,包括:用户设备以及服务GPRS支持节点;
    所述用户设备为上述权利要求19至24中任一项所述的用户设备;
    所述服务GPRS支持节点为上述权利要求25至29任一项所述的服务GPRS支持节点。
  42. 一种消息保护的系统,其特征在于,包括:用户设备以及服务GPRS支持节点;
    所述用户设备为上述权利要求30至33中任一项所述的用户设备;
    所述服务GPRS支持节点为上述权利要求34至36任一项所述的服务GPRS支持节点。
PCT/CN2015/086836 2015-08-13 2015-08-13 一种消息保护的方法、相关设备以及系统 WO2017024579A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
PCT/CN2015/086836 WO2017024579A1 (zh) 2015-08-13 2015-08-13 一种消息保护的方法、相关设备以及系统
CA2995514A CA2995514C (en) 2015-08-13 2015-08-13 Message protection method, and related device, and system
CN201580024607.6A CN106797562B (zh) 2015-08-13 2015-08-13 一种消息保护的方法、相关设备以及系统
RU2018108240A RU2697645C1 (ru) 2015-08-13 2015-08-13 Способ защиты сообщений и соответствующее устройство и система
KR1020187006884A KR102024331B1 (ko) 2015-08-13 2015-08-13 메시지 보호 방법, 관련 장치 및 시스템
JP2018506905A JP6548348B2 (ja) 2015-08-13 2015-08-13 メッセージ保護方法、ならびに関連デバイスおよびシステム
EP15900777.2A EP3328107B1 (en) 2015-08-13 2015-08-13 Method, relevant device and system for message protection
US15/892,488 US20180167807A1 (en) 2015-08-13 2018-02-09 Message protection method, and related device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/086836 WO2017024579A1 (zh) 2015-08-13 2015-08-13 一种消息保护的方法、相关设备以及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/892,488 Continuation US20180167807A1 (en) 2015-08-13 2018-02-09 Message protection method, and related device, and system

Publications (1)

Publication Number Publication Date
WO2017024579A1 true WO2017024579A1 (zh) 2017-02-16

Family

ID=57984023

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/086836 WO2017024579A1 (zh) 2015-08-13 2015-08-13 一种消息保护的方法、相关设备以及系统

Country Status (8)

Country Link
US (1) US20180167807A1 (zh)
EP (1) EP3328107B1 (zh)
JP (1) JP6548348B2 (zh)
KR (1) KR102024331B1 (zh)
CN (1) CN106797562B (zh)
CA (1) CA2995514C (zh)
RU (1) RU2697645C1 (zh)
WO (1) WO2017024579A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110249589A (zh) * 2017-03-31 2019-09-17 华为技术有限公司 一种通信方法及设备
EP3664404A4 (en) * 2017-08-21 2020-09-09 Huawei Technologies Co., Ltd. COMMUNICATION PROCEDURE AND RELATED DEVICE
US11765578B2 (en) 2018-02-06 2023-09-19 Huawei Technologies Co., Ltd. Security negotiation method and apparatus

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3371950B1 (en) * 2015-11-02 2021-03-03 Telefonaktiebolaget LM Ericsson (PUBL) Wireless communications
US11206538B2 (en) * 2016-09-30 2021-12-21 Huawei Technologies Co., Ltd. Control signaling processing method, device, and system
US11538031B2 (en) 2017-03-31 2022-12-27 Vijay Madisetti Method and system for identity and access management for blockchain interoperability
WO2018201506A1 (zh) 2017-05-05 2018-11-08 华为技术有限公司 一种通信方法及相关装置
CN109391603B (zh) 2017-08-11 2021-07-09 华为技术有限公司 数据完整性保护方法和装置
KR102412719B1 (ko) 2018-09-19 2022-06-24 한국전자통신연구원 무선 통신 시스템에서 물리 계층 보안 통신을 위한 장치 및 방법
CN111064673B (zh) * 2018-10-16 2022-04-01 中国移动通信有限公司研究院 一种用户面数据完整性保护方法、装置、电子设备及介质
CN110266498B (zh) * 2019-06-28 2022-04-08 恒宝股份有限公司 一种不停车汽车安全支付系统及方法
CN110349427B (zh) * 2019-07-01 2020-10-13 福建睿思特科技股份有限公司 一种基于大数据的智慧交通管理系统
CN111143247B (zh) * 2019-12-31 2023-06-30 海光信息技术股份有限公司 存储装置数据完整性保护方法及其控制器、片上系统
CN111628985A (zh) * 2020-05-22 2020-09-04 深圳市有方科技股份有限公司 安全访问控制方法、装置、计算机设备和存储介质
CN112073410B (zh) * 2020-09-07 2022-08-30 中国人民解放军63880部队 一种基于时效的云数据安全传输控制方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1762127A (zh) * 2003-03-18 2006-04-19 汤姆森特许公司 使用通用分组无线服务/通用移动电信系统基础设施的无线局域网连接的验证
WO2007138430A1 (en) * 2006-05-31 2007-12-06 Nokia Corporation Managing user profile information
CN101588579A (zh) * 2008-05-20 2009-11-25 华为技术有限公司 一种对用户设备鉴权的系统、方法及其基站子系统
US20130165077A1 (en) * 2011-12-23 2013-06-27 Samsung Electronics Co., Ltd. Method and apparatus for identifying fake networks

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2003242524A1 (en) * 2003-04-25 2004-11-23 Telefonaktiebolaget L M Ericsson (Publ) An arrangement and a method relating to secure communication
US8122240B2 (en) * 2005-10-13 2012-02-21 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for establishing a security association
JP5636050B2 (ja) * 2009-08-17 2014-12-03 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 移動局において暗号鍵を処理する方法
US9084110B2 (en) * 2010-04-15 2015-07-14 Qualcomm Incorporated Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network
CN102137401B (zh) * 2010-12-09 2018-07-20 华为技术有限公司 无线局域网集中式802.1x认证方法及装置和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1762127A (zh) * 2003-03-18 2006-04-19 汤姆森特许公司 使用通用分组无线服务/通用移动电信系统基础设施的无线局域网连接的验证
WO2007138430A1 (en) * 2006-05-31 2007-12-06 Nokia Corporation Managing user profile information
CN101588579A (zh) * 2008-05-20 2009-11-25 华为技术有限公司 一种对用户设备鉴权的系统、方法及其基站子系统
US20130165077A1 (en) * 2011-12-23 2013-06-27 Samsung Electronics Co., Ltd. Method and apparatus for identifying fake networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3RD GENERATION PARTNERSHIP PROJECT; TECHNICAL SPECIFICATION GROUP SERVICES AND SYSTEM ASPECTS; ''General Packet Radio Service (GPRS); Service Description", 3GPPTS 23.060 V13.3.0, 30 June 2015 (2015-06-30), pages 102 - 121, XP055363623 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110249589A (zh) * 2017-03-31 2019-09-17 华为技术有限公司 一种通信方法及设备
US10805793B2 (en) 2017-03-31 2020-10-13 Huawei Technologies Co., Ltd. Communication method and device
US11259185B2 (en) 2017-03-31 2022-02-22 Huawei Technologies Co., Ltd. Communication method and device
EP3664404A4 (en) * 2017-08-21 2020-09-09 Huawei Technologies Co., Ltd. COMMUNICATION PROCEDURE AND RELATED DEVICE
US10999736B2 (en) 2017-08-21 2021-05-04 Huawei Technologies Co., Ltd. Communication method and related device
US11765578B2 (en) 2018-02-06 2023-09-19 Huawei Technologies Co., Ltd. Security negotiation method and apparatus

Also Published As

Publication number Publication date
RU2697645C1 (ru) 2019-08-15
KR20180039145A (ko) 2018-04-17
CN106797562B (zh) 2019-04-26
EP3328107B1 (en) 2019-10-09
CA2995514A1 (en) 2017-02-16
EP3328107A4 (en) 2018-08-08
JP2018526905A (ja) 2018-09-13
US20180167807A1 (en) 2018-06-14
EP3328107A1 (en) 2018-05-30
JP6548348B2 (ja) 2019-07-24
KR102024331B1 (ko) 2019-09-23
CN106797562A (zh) 2017-05-31
CA2995514C (en) 2020-04-28

Similar Documents

Publication Publication Date Title
WO2017024579A1 (zh) 一种消息保护的方法、相关设备以及系统
CN109257740B (zh) Profile下载方法、移动终端及可读存储介质
US20220159471A1 (en) Information sharing method, terminal device, storage medium, and computer program product
EP3308519B1 (en) System, apparatus and method for transferring ownership of a device from manufacturer to user using an embedded resource
WO2019128982A1 (zh) 一种设备引导的方法、终端以及服务器
WO2015062425A1 (en) User identity verification method and system, password protection apparatus and storage medium
CN109033801B (zh) 应用程序验证用户身份的方法、移动终端以及存储介质
CN110677851B (zh) 一种终端网络接入方法及网络接入设备的接入方法
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
WO2017113353A1 (zh) 数据传输方法、装置和设备
WO2020164526A1 (zh) 一种分布式系统中的节点控制方法和相关装置
US9525667B2 (en) Method and system for roaming website account and password
CN107317680B (zh) 安全账号的标记方法、系统及计算机可读存储介质
CN109768977A (zh) 流媒体数据处理方法、装置以及相关设备和介质
WO2016192511A1 (zh) 远程删除信息的方法和装置
WO2020020029A1 (zh) 密钥更新方法、终端及网络侧设备
WO2010023506A1 (en) Methods, apparatuses, computer program products, and systems for providing secure pairing and association for wireless devices
CN109743696A (zh) 验证码加密方法、系统及可读存储介质
CN111713122B (zh) 用于提高数据传输安全性的方法、用户设备和网络节点
CN110830988B (zh) 一种安全更新方法、网络设备及终端
WO2017117775A1 (zh) 一种通信安全处理方法、系统及相关设备
WO2017000237A1 (zh) 算法更新方法、待更新设备及服务器
CN111800372A (zh) 数据传输方法及设备
WO2022188538A1 (zh) 认证Wi-Fi连接的方法、无线终端、接入节点及存储介质
EP4231681A1 (en) Trusted relay communication method and apparatus, terminal, and network side device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15900777

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018506905

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2995514

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2015900777

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20187006884

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2018108240

Country of ref document: RU

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112018002864

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112018002864

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20180210