WO2017185692A1 - 密钥分发、认证方法,装置及系统 - Google Patents
密钥分发、认证方法,装置及系统 Download PDFInfo
- Publication number
- WO2017185692A1 WO2017185692A1 PCT/CN2016/103334 CN2016103334W WO2017185692A1 WO 2017185692 A1 WO2017185692 A1 WO 2017185692A1 CN 2016103334 W CN2016103334 W CN 2016103334W WO 2017185692 A1 WO2017185692 A1 WO 2017185692A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- random number
- terminal device
- management server
- user management
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
- H04L63/064—Hierarchical key distribution, e.g. by multi-tier trusted parties
Definitions
- the present invention relates to the field of communications, and in particular, to a key distribution and authentication method, apparatus, and system.
- the smart device and the network usually authenticate each other based on the root key to establish a secure channel.
- the root key used in the mutual authentication process is configured or deployed by the network operator in advance in the smart device and the network.
- the existing authentication methods are based on the Authentication and Key Agreement (AKA) proposed by the International Mobile Telecommunications Organization, but the authentication method based on the AKA protocol depends on the Universal Subscriber Identity Module (Universal Subscriber Identity Module).
- AKA Authentication and Key Agreement
- the root key in the USIM card is called the USIM card.
- the embodiment of the invention provides a key distribution and authentication method, a device and a system, which are used to solve the problem that the existing root key deployment and the authentication method cannot be applied to a smart device that does not support the USIM card.
- an embodiment of the present invention provides a key distribution method, including:
- the user management server sends a first key request message to the service center server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, where the first key request message includes the user of the user management server Identifying; receiving a first layer key of the user management server sent by the service center server; generating a second layer key of the terminal device according to the first layer key, and transmitting the second layer key to the terminal device, so that the terminal device
- the second layer key is used to perform mutual authentication with the network authentication server to obtain a communication key of the terminal device and the function network element.
- the user management server generates and distributes different Layer 2 keys for different terminal devices according to the received first layer key.
- the existing root key deployment and authentication methods cannot be applied to smart devices that do not support the USIM card.
- the problem in this also alleviates the burden of generating a different Layer 2 key directly for the different terminal devices by the service center server.
- the process of generating the second layer key includes: the user management server adopts a key generation function according to the first layer key and the first parameter set. Generating a second layer key of the terminal device;
- the method further includes: the user management server transmitting the first parameter set to the terminal device;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the first layer key is a private key of the user management server, and the process of generating the second layer key includes:
- the user management server generates a second layer key of the terminal device and a public key of the terminal device according to the private key of the user management server and the first parameter set, and the second layer key is the private device of the terminal device corresponding to the public key of the terminal device. key;
- the method also includes:
- the user management server generates a first digital signature according to the first layer key, the public key of the terminal device, and the first parameter set; and sends the public key of the terminal device, the first digital signature, and the second parameter set to the terminal device;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server, and the process of generating the second layer key includes:
- the user management server generates a second layer key of the terminal device based on the device identity generation algorithm according to the private key of the user management server and the device identifier of the terminal device, and the second layer key is the private key of the terminal device;
- the method also includes:
- the user management server sends the second parameter set and the public key of the terminal device corresponding to the private key of the terminal device to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server, and the process of generating the second layer key includes:
- the user management server generates a layer 2 key of the terminal device by using a privacy-enhanced key technology generation algorithm according to the private key of the user management server, and the second layer key is a private key of the terminal device;
- the method also includes:
- the user management server receives the public key of the user management server sent by the service center server, and sends the public key of the user management server and the second parameter set to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- an embodiment of the present invention provides a key distribution method, including:
- the service center server receives a first key request message sent by the user management server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, where the first key request message includes the user management server. Generating a first layer key of the user management server corresponding to the user identifier according to the first key request message, and sending the first layer key to the user management server.
- the service center server can generate the first layer key for different user management servers.
- the existing root key deployment and authentication methods cannot be applied to smart devices that do not support USIM cards.
- the process of generating the first layer key includes: the service center server generates the user management server by using a key generation function according to the third parameter set.
- the process of generating the first layer key includes: the service center server generates the user management server by using a key generation function according to the third parameter set.
- the third parameter set includes at least one of a key random number of the first layer key, a fresh parameter of the first layer key, a time parameter of the first layer key, and a shared key, and the shared key is the user.
- the service center server determines the service random number and uses it as the first layer key of the user management server.
- the first key request message further includes at least one of a network identifier and a service parameter of the user management server, and generates a first layer key.
- the process specifically includes: the service center server generates a first layer key of the user management server by using a key generation function according to the fourth parameter set;
- the fourth parameter set includes a user identifier of the user management server, a network identifier of the user management server, a service parameter, a key random number of the first layer key, a fresh parameter of the first layer key, and a first layer key.
- a time parameter and a shared key the shared key is a shared key of the user management server and the service center server.
- the process of generating the first layer key includes: the key generation algorithm based on the identity cryptosystem of the service center server according to the user identifier of the user management server Generate the first layer key of the user management server.
- the first layer key is the private key of the user management server.
- the process of generating the first layer key includes: the service center server is based on the user identifier of the user management server and the fifth parameter set, based on the identity cryptosystem
- the key generation algorithm generates a first layer key of the user management server, and the first layer key is a private key of the user management server;
- the fifth parameter set includes at least one of the following:
- the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key is the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key.
- the process of generating the first layer key includes: the service center server generates the private key of the user management server and the user management by using a privacy enhanced key technology.
- the method also includes:
- the business center server sends the public key of the user management server to the user management server.
- the method further includes: the service center server receives the second key request message sent by the network authentication server, and the second key request message includes the user identifier of the user management server; and the user identifier of the user management server in the second key request message is retrieved. a layer of the key, or generate a first layer key, and send the first layer key to the network authentication server, so that the network authentication server generates the second layer key of the terminal device according to the first layer key, and according to the first The Layer 2 key and the terminal device perform mutual authentication.
- the method further includes: receiving, by the service center server, a second key request message sent by the network authentication server, where the second key request message includes a first parameter set; and generating, by using a key generation function, according to the first layer key and the first parameter set a second layer key of the terminal device, and sending the second layer key to the network authentication server, so that the network authentication server performs mutual authentication with the terminal device according to the second layer key;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- an embodiment of the present invention provides a key authentication method, including:
- the terminal device receives the second layer key of the terminal device sent by the user management server; performs mutual authentication with the network authentication server according to the second layer key to obtain the communication key of the terminal device and the function network element.
- the terminal device further Receiving a first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, encrypts the first random number by using the second layer key, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes the first parameter set. And the first random number after the encryption process;
- the terminal device receives the encrypted second random number and the second message verification code sent by the network authentication server, and decrypts the encrypted second random number according to the second layer key to obtain a second random number, and after the encryption process
- the second random number is obtained by the network authentication server using the second layer key to encrypt the second random number
- the terminal device After the terminal device verifies the verification of the second message, the terminal device generates the communication of the terminal device by using the key generation function according to at least one of the second layer key, the first random number, and the second random number, and the second parameter set. Key, according to any one of the communication key and the second layer key, and the first random number, the second random number, the second parameter set, generates a first message verification code, and sends the first message verification code to a network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, and sends an authentication request message to the network authentication server, where the authentication request message includes the first parameter set and the first random number;
- the terminal device After the terminal device verifies the verification of the second message, the terminal device generates the terminal device by using the key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the second layer key. a communication key, according to any one of the communication key and the second layer key, and the first random number, the second random number, the second parameter set, and the first message verification code, and the first message verification code, Sending to the network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, and sends an authentication request message to the network authentication server, where the authentication request message includes the first parameter set and the first random number;
- the terminal device receives the second random number, the second message verification code, and the encrypted communication key sent by the network authentication server, decrypts the encrypted communication key according to the second layer key, obtains a communication key, and encrypts The processed communication key is obtained by the network authentication server using the second layer key to encrypt the communication key;
- the terminal device After verifying that the second message verification code is passed, the terminal device generates the first message verification according to any one of the communication key and the second layer key, and the first random number, the second random number, and the second parameter set. And sending the first message verification code to the network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and sends an authentication request message to the network authentication server, where the authentication request message includes a first random number, a first transmission parameter, and a first parameter set;
- the terminal device After verifying that the second message verification code is passed, the terminal device generates a communication of the terminal device by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter. Key, according to any one of the communication key and the second layer key, and the first random number, the second random number, and the second parameter set, generate a first message verification code by using a message verification code generating function, and Sending the first message verification code to the network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, performs encryption processing on the first random number by using the second layer key, and obtains the first random number after the encryption process, according to at least one of the second parameter set and the first random number, and
- the second layer key generates a first message verification code by using a message verification code generating function, and sends an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set. ;
- the terminal device receives the second message verification code sent by the network authentication server and the second random number after the encryption process, and decrypts the encrypted second random number according to the second layer key to obtain a second random number, and after the encryption process
- the second random number is obtained by the network authentication server using the second layer key to encrypt the second random number
- the terminal device After the terminal device verifies the second message verification code, the terminal device generates the terminal device by using the key generation function according to at least one of the second layer key, the first random number, the second random number, and the second parameter set. Communication key
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines a first random number, generates a first message verification code according to at least one of the second parameter set, the first random number, and the second layer key by using a message verification code generating function, and sends an authentication request to the network authentication server.
- the message, the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the terminal device After the terminal device verifies the verification of the second message, the terminal device generates the communication of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the second layer key by using a key generation function. Key
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines a first random number, generates a first message verification code according to at least one of the second parameter set, the first random number, and the second layer key by using a message verification code generating function, and sends an authentication request to the network authentication server.
- the message, the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the terminal device After verifying that the second message verification code is verified according to the second random number, the terminal device decrypts the encrypted communication key according to the second layer key to obtain a communication key;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, and performs encryption processing on the first random number by using the second layer key to obtain the first random number after the encryption process, according to at least one of the second layer key and the first random number.
- the second parameter set generates a communication key of the terminal device by using a key generation function, according to any one of the second layer key and the communication key, and at least one of the second parameter set and the first random number.
- Generating a first message verification code by using a message verification code generating function, and sending an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set;
- the terminal device receives the second message verification code sent by the network authentication server and the second random number after the encryption process, and decrypts the encrypted second random number according to the second layer key to obtain a second random number, and after the encryption process
- the second random number is obtained by the network authentication server using the second layer key to encrypt the second random number, and the second message verification code is verified according to the second random number and determined to pass;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the first message verification code, the first random number, and the first parameter set are included;
- the first parameter set includes a user identifier of the user management server and a setting of the terminal device. At least one of a backup identifier, a network identifier of the user management server, a service parameter, a key random number of the second layer key, a fresh parameter of the second layer key, and a time parameter of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the first parameter set sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and generates a first message verification code by using a message verification code generating function according to the second layer key, the first random number, and the second parameter set, to the network authentication server.
- Sending an authentication request message where the authentication request message includes a first random number, a first transmission parameter, a first message verification code, and a first parameter set;
- the terminal device After the terminal device verifies the verification of the second message verification code, the terminal device generates the communication confidentiality of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter by using a key generation function. key;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives a public key, a first digital signature, and a second parameter set of the terminal device that are sent by the user management server; include:
- the terminal device determines the first random number, encrypts the first random number by using the public key of the network authentication server, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes the terminal device.
- the authentication request message includes the terminal device.
- the terminal device After the terminal device verifies the second digital signature, the terminal device generates a communication key of the terminal device according to at least one of the first random number and the second random number, and the second parameter set, according to the communication key. And generating, by the first random number, the second random number, and the second parameter set, a first message verification code, or generating a third digital signature according to the second layer key, the first random number, the second random number, and the second parameter set, Sending the first message verification code or the third digital signature to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further receives the public key and the second parameter set of the terminal device that are sent by the user management server; the mutual authentication process specifically includes:
- the terminal device determines the first random number, encrypts the first random number by using the public key of the network authentication server, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes the terminal device. a public key, a first random number after encryption processing, and a second parameter set;
- the terminal device After the terminal device verifies the second digital signature, the terminal device generates a communication key of the terminal device according to at least one of the first random number and the second random number, and the second parameter set, according to the communication key. And generating, by the first random number, the second random number, and the second parameter set, a first message verification code, or generating a third digital signature according to the second layer key, the first random number, the second random number, and the second parameter set, Sending the first message verification code or the third digital signature to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes a user identifier of the user management server and a setting of the terminal device. At least one of a backup identifier, a network identifier of the user management server, and a service parameter.
- the terminal device further receives a public key and a second parameter set of the user management server that are sent by the user management server, where the public key of the user management server is the terminal.
- the public key of the terminal device is the terminal
- the public key of the terminal device corresponding to the second layer key of the device; the mutual authentication process specifically includes:
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first random number, a first transmission parameter, and a second parameter set;
- the terminal device receives the second transmission parameter, the second random number, and the second digital signature sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter.
- the terminal device After the terminal device verifies the second digital signature, the terminal device generates a communication key of the terminal device by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter. And generating, according to at least one of the first random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, using the message verification code generating function to generate the first message verification code, Or generating a third digital signature according to at least one of the first random number, the second random number, and the second parameter set, and the second layer key, the first transmission parameter, and the second transmission parameter, and verifying the first message.
- the code or the third digital signature is sent to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device is further configured to the network authentication server Sending a public key request message; receiving the public key of the network authentication server sent by the network authentication server.
- the method further includes: performing a network authentication server Mutual authentication, using key generation according to any one of a communication key, a second parameter set, a session key random number, a session key fresh parameter, and a session key preset time parameter The function generates a session key for the terminal device.
- the following fourth aspect and the fifth aspect provide a key authentication method, which interacts with the key authentication method provided by the foregoing third aspect, and is a symmetric side method, which has corresponding technical features and technical effects, and is applicable to the embodiment of the present invention. This will not be repeated here.
- an embodiment of the present invention provides a key authentication method, including:
- the network authentication server receives the authentication request message sent by the terminal device, where the authentication request message includes a first parameter set, and sends a second key request message to the service center server, and receives the second layer key sent by the service center server, and the second key request
- the message includes a first parameter set; or the network authentication server receives an authentication request message sent by the terminal device, where the authentication request message includes a first parameter set, and sends a second key request message to the service center server, and receives the first layer sent by the service center server.
- a key the network authentication server generates a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set;
- the network authentication server performs mutual authentication with the terminal device according to the second layer key to obtain a communication key of the terminal device and the function network element;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the authentication request message further includes the first random number after the encryption process, where the mutual authentication process specifically includes:
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key to obtain encryption.
- the processed second random number, the first random number after the encryption process is obtained by the terminal device using the second layer key to encrypt the first random number;
- the network authentication server generates a communication key of the network authentication server by using a key generation function according to at least one of the second layer key, the first random number, the second random number, and the second parameter set, according to the communication key, Any one of the second layer key, and the first random number, the second random number, the second parameter set generates a second message verification code, and sends the encrypted second random number and the second message verification code.
- the network authentication server receives the first message verification code sent by the terminal device, and is in the first message. After the verification code is verified, the communication key is sent to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the mutual authentication process specifically includes:
- the network authentication server determines a second random number, and generates a communication key of the network authentication server by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the second layer key And generating, according to any one of the communication key and the second layer key, the first random number, the second random number, the second parameter set, the second message verification code, and verifying the second random number and the second message Code, sent to the terminal device;
- the network authentication server receives the first message verification code sent by the terminal device, and sends a communication key to the function network element after the verification of the first message verification code is passed;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the mutual authentication process specifically includes:
- the network authentication server determines the second random number, generates a communication key of the network authentication server according to the key random number, encrypts the communication key by using the second layer key, and obtains the encrypted communication key, according to the communication key. And any one of the second layer keys, and the first random number, the second random number, the second parameter set generates a second message verification code, and the second random number, the encrypted communication key, and the Two message verification codes are sent to the terminal device;
- the network authentication server receives the first message verification code sent by the terminal device, and sends a communication key to the function network element after the verification of the first message verification code is passed;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first transmission parameter and a first random number, where the mutual authentication process specifically includes:
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter;
- the network authentication server is based on the first random number, the second random number, and the second parameter set a lesser one, and a third transmission parameter, using a key generation function to generate a communication key of the network authentication server, according to any one of the communication key and the second layer key, and the first transmission parameter, the second transmission a parameter, the second parameter set generates a second message verification code, and sends the second random number and the second message verification code to the terminal device;
- the network authentication server receives the first message verification code sent by the terminal device, and sends a communication key to the function network element after the verification of the first message verification code is passed;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process, where the mutual authentication process specifically includes:
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key to obtain encryption.
- the processed second random number, the first random number after the encryption process is obtained by the terminal device using the second layer key to encrypt the first random number;
- the network authentication function is generated by using the key generation function according to at least one of the second layer key, the first random number, the second random number, and the second parameter set.
- the communication key of the server generates a second message verification code according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set. Sending the encrypted second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number, where the mutual authentication process specifically includes:
- the network authentication server determines the second random number, and after the first message verification code is verified, according to the first random number, the second random number, the second parameter set, and the second layer key, adopting the secret
- the key generation function generates a communication key of the network authentication server, and generates a communication key according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set.
- the second message verification code, the second random number after the encryption process, the second cancellation The verification code is sent to the terminal device, and the communication key is sent to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the mutual authentication process specifically includes:
- the network authentication server determines the second random number, generates a communication key of the network authentication server according to the key random number after verifying the verification of the first message verification code, and encrypts the communication key by using the second layer key to obtain encryption. Processing the communication key, generating a second message verification code according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set Transmitting the second random number, the encrypted communication key, and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process, where the mutual authentication process specifically includes:
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key to obtain encryption.
- the processed second random number, the first random number after the encryption process is obtained by the terminal device using the second layer key to encrypt the first random number;
- the network authentication server After the first authentication code is verified, the network authentication server generates a communication key of the terminal device by using a key generation function according to at least one of the second layer key, the first random number, and the second parameter set. Generating a second message verification code according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set, and the encrypted processing Sending the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the mutual authentication process specifically includes:
- the network authentication server determines a second random number, and after the first message verification code is verified, generates a terminal device according to at least one of the first random number and the second parameter set, and the second layer key adopts a key generation function
- the communication key generates a second message verification code according to any one of the communication key and the layer 2 key, and at least one of the first random number, the second random number, and the second parameter set. Transmitting the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code, a first transmission parameter, and a first random number, where the mutual authentication process specifically includes:
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter;
- the network authentication server After the network authentication server passes the verification of the first message verification code, the network authentication server generates the network authentication server according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter by using a key generation function.
- a communication key according to any one of a communication key, a second layer key, and any one of a first random number, a second random number, a first transmission parameter, a second transmission parameter, and a second parameter set Generating a second message verification code, transmitting the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the method further includes: a network authentication server and a terminal
- the device performs mutual authentication, and generates a network authentication server by using a key generation function according to any one of a communication key, a second parameter set, a session key random number, a session key fresh parameter, and a session key preset time parameter. Session key and send the session key to the functional network element.
- an embodiment of the present invention provides a key authentication method, including:
- the network authentication server receives the authentication request message sent by the terminal device, and the authentication request message packet
- the public key of the terminal device is mutually authenticated with the terminal device according to the public key of the terminal device, the public key of the network authentication server, and the private key of the network authentication server to obtain a communication key of the terminal device and the function network element.
- the authentication request message further includes: a first digital signature, a first random number after the encryption process, and a second parameter set; the mutual authentication process specifically includes:
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device to obtain the second random number. Encrypting the second random number, the first random number after the encryption process is obtained by the terminal device using the public key of the network authentication server to encrypt the first random number;
- the key generation function is used to generate a communication key of the network authentication server, according to The private key, the first random number, the second random number, and the second parameter set of the network authentication server generate a second digital signature, and send the second digital signature and the encrypted second random number to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes the first random number and the second parameter set after the encryption process; the mutual authentication process specifically includes:
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device to obtain the second random number. Encrypting the second random number, the first random number after the encryption process is obtained by the terminal device using the public key of the network authentication server to encrypt the first random number;
- the network authentication server is based on at least one of the first random number and the second random number, and
- the second parameter set generates a communication key of the network authentication server by using a key generation function, and generates a second digital signature according to the private key of the network authentication server, the first random number, the second random number, and the second parameter set, and the encryption process is performed.
- the second random number and the second digital signature are sent to the device terminal;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number, a first transmission parameter, and a second parameter set; the mutual authentication process specifically includes:
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter;
- the network authentication server generates a communication key of the network authentication server according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first random number, the first At least one of a second random number and a second parameter set, and a private key of the network authentication server, a first transmission parameter, a second transmission parameter, a second digital signature, a second random number, a second transmission parameter, and a second Two digital signatures, which are sent to the terminal device;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and after verifying that the first message verification code is passed, or after verifying the third digital signature according to the public key of the terminal device, the function is performed on the function network element. Send a communication key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the network authentication server further receives the terminal The public key request message sent by the device; the public key of the network authentication server is sent to the terminal device.
- the method further includes: a network authentication server and a terminal device Perform mutual authentication based on the communication key, the second parameter set, and the session key.
- the session key is generated by using a key generation function and the session key is sent to the function network element by using any one of a random number, a session key fresh parameter, and a preset time parameter of the session key.
- the following describes the key distribution and authentication device provided by the embodiment of the present invention.
- the device has a one-to-one correspondence with the foregoing method, and is used to implement the key distribution and authentication method in the foregoing embodiment, and has the same technical features and technical effects. This embodiment of the present invention will not be described again.
- an embodiment of the present invention provides a user management server, including:
- a request sending module configured to send a first key request message to the service center server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, where the first key request message includes user management User ID of the server;
- a key receiving module configured to receive a first layer key of the user management server sent by the service center server
- a key generation distribution module configured to generate a second layer key of the terminal device according to the first layer key, and send the second layer key to the terminal device, so that the terminal device passes the second layer key and the network authentication
- the server performs mutual authentication to obtain a communication key of the terminal device and the function network element.
- the key generation and distribution module is specifically configured to:
- Generating a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set, and sending the second layer key and the first parameter set to the terminal device, so that the terminal device passes the
- the second layer key is mutually authenticated with the network authentication server to obtain the communication key of the terminal device and the function network element;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the first layer key is a private key of the user management server
- the key generation distribution module is specifically configured to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server
- the key generation distribution module is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server, and the key receiving module is further configured to receive the user management server sent by the service center server. Key; the key generation distribution module is specifically used to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- a seventh aspect of the present invention provides a service center server, including:
- the key request receiving module is configured to receive a first key request message sent by the user management server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, and the first key request message Contains the user ID of the user management server;
- the key generation distribution module is configured to generate a first layer key of the user management server corresponding to the user identifier according to the first key request message, and send the first layer key to the user management server.
- the key generation and distribution module is specifically configured to:
- the first layer key of the user management server is generated by using the key generation function, and the first layer key is sent to the user management server;
- the third parameter set includes at least one of a key random number of the first layer key, a fresh parameter of the first layer key, a time parameter of the first layer key, and a shared key, and the shared key is the user.
- the service random number is determined and used as the first layer key of the user management server, and the first layer key is sent to the user management server.
- the first key request message further includes at least one of a network identifier and a service parameter of the user management server, where the key generation and distribution module is specifically used.
- the first layer key of the user management server is generated by using a key generation function, and the first layer key is sent to the user management server;
- the fourth parameter set includes a user identifier of the user management server, a network identifier of the user management server, a service parameter, a key random number of the first layer key, a fresh parameter of the first layer key, and a first layer key.
- a time parameter and a shared key the shared key is a shared key of the user management server and the service center server.
- the key generation and distribution module is specifically configured to:
- the key generation algorithm based on the identity cryptosystem generates a first layer key of the user management server, and sends the first layer key to the user management server, where the first layer key is the user management server. Private key.
- the key generation The sending module is specifically configured to generate a first layer key of the user management server according to the user identification and the fifth parameter set of the user management server, and generate a first layer key of the user management server, and send the first layer key to the user management.
- the first layer key is the private key of the user management server;
- the fifth parameter set includes at least one of the following:
- the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key is the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key.
- the key generation and distribution module is specifically configured to:
- the private key of the user management server and the public key of the user management server are generated by using a privacy-enhanced key technology, wherein the private key of the user management server is the first layer key of the user management server, and the first layer key and user management are performed.
- the server's public key is sent to the user management server.
- the key request receiving module further uses Receiving a second key request message sent by the network authentication server, where the second key request message includes a user identifier of the user management server;
- the key generation distribution module is further configured to: retrieve, according to the user identifier of the user management server in the second key request message, the first layer key, or generate the first layer key, and send the first layer key to the network authentication.
- the server is configured to enable the network authentication server to generate the second layer key of the terminal device according to the first layer key, and perform mutual authentication with the terminal device according to the second layer key.
- the key request receiving module further uses Receiving a second key request message sent by the network authentication server, where the second key request message includes a first parameter set;
- the key generation distribution module is further configured to generate a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set, and send the second layer key to the network authentication server to enable The network authentication server performs mutual authentication with the terminal device according to the second layer key;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the eighth aspect of the present invention provides a terminal device, including:
- a key receiving module configured to receive a second layer key of the terminal device sent by the user management server
- the authentication module is configured to perform mutual authentication with the network authentication server according to the second layer key to obtain a communication key between the terminal device and the function network element.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- Determining the first random number encrypting the first random number by using the second layer key, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes the first parameter set and the encryption The first random number after processing;
- the verification of the second message verification code After the verification of the second message verification code is passed, generating a communication key of the terminal device by using a key generation function according to at least one of the second layer key, the first random number, and the second random number, and the second parameter set And generating, according to any one of the communication key and the second layer key, the first random number, the second random number, the second parameter set, the first message verification code, and sending the first message verification code to the network authentication a server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- Determining a first random number and sending an authentication request message to the network authentication server, where the authentication request message includes a first parameter set and a first random number;
- the second parameter set After verifying that the second message verification code is passed, according to the first random number, the second random number, and the first At least one of the two parameter sets, and the second layer key, generating a communication key of the terminal device by using a key generation function, according to any one of the communication key, the second layer key, and the first random number a second random number, the second parameter set generates a first message verification code, and sends the first message verification code to the network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- Determining a first random number and sending an authentication request message to the network authentication server, where the authentication request message includes a first parameter set and a first random number;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive the first parameter set sent by the user management server; the authentication module is specifically configured to:
- the network authentication server Determining the first random number, the first transmission parameter of the DH protocol, and sending the signal to the network authentication server An authentication request message, where the authentication request message includes a first random number, a first transmission parameter, and a first parameter set;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- the layer key Determining the first random number, encrypting the first random number by using the second layer key, and obtaining the first random number after the encryption process, according to the second parameter set, at least one of the first random number, and the second
- the layer key generates a first message verification code by using a message verification code generating function, and sends an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set;
- the second random number is obtained by the network authentication server using the second layer key to encrypt the second random number
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the encrypted communication key is decrypted according to the second layer key to obtain a communication key
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive the first parameter set sent by the user management server; the authentication module is specifically configured to:
- the two parameter set generates a communication key of the terminal device by using a key generation function, and adopts a message according to any one of the second layer key and the communication key, and at least one of the second parameter set and the first random number.
- the verification code generation function generates a first message verification code, and sends an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a first parameter set sent by the user management server; the authentication module is specifically configured to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a public key of the terminal device sent by the user management server, the first digital signature, and the second parameter set
- the authentication module is specifically used to:
- Determining the first random number encrypting the first random number by using the public key of the network authentication server Processing, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a first random number after the encryption process, and a second parameter set ;
- the communication key of the terminal device is generated according to the communication key by using at least one of the first random number and the second random number, and the second parameter set by using a key generation function.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to: receive a public key and a second parameter set of the terminal device that are sent by the user management server; :
- Determining the first random number encrypting the first random number by using the public key of the network authentication server, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes the public key of the terminal device And a first random number after the encryption process, and a second parameter set;
- the communication key of the terminal device is generated according to the communication key by using at least one of the first random number and the second random number, and the second parameter set by using a key generation function.
- generating a third digital signature sending the first message verification code or the third digital signature to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module is further configured to receive a public key and a second parameter set of the user management server sent by the user management server, where the user management server
- the public key is a public key of the terminal device corresponding to the second layer key of the terminal device
- the authentication module is specifically configured to:
- the second digital signature verification After the second digital signature verification is passed, generating a communication key of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the key generation function, according to At least one of the first random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, generate a first message verification code by using a message verification code generating function, or according to At least one of the first random number, the second random number, and the second parameter set, and the second layer key, the first transmission parameter, the second transmission parameter, generating a third digital signature, and the first message verification code or
- the third digital signature is sent to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the server further includes a public key request
- the module is configured to send a public key request message to the network authentication server, where the key receiving module is further configured to receive a public key of the network authentication server sent by the network authentication server.
- the authentication module is specifically used for:
- the network authentication server performs mutual authentication, and generates a terminal by using a key generation function according to any one of a communication key, a second parameter set, a session key random number, a session key fresh parameter, and a session time preset time parameter.
- the session key for the device.
- a ninth aspect, the embodiment of the present invention provides a network authentication server, including:
- the key acquisition module is configured to receive an authentication request message sent by the terminal device, where the authentication request message includes a first parameter set, and sends a second key request message to the service center server, and receives a second layer key sent by the service center server.
- the second key request message includes a first parameter set; or is configured to receive an authentication request message sent by the terminal device, where the authentication request message includes a first parameter set, and sends a second key request message to the service center server, and receives the second key request message sent by the service center server.
- a first layer key and generating a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set;
- An authentication module configured to perform mutual authentication with the terminal device according to the second layer key to obtain a communication key of the terminal device and the function network element;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the authentication request message further includes the first random number after the encryption process, where the authentication module is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the authentication module is specifically configured to:
- Determining a second random number generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number, the second random number, the second parameter set, and the second layer key, according to the communication a key, a second layer key, and a first random number, a second random number, a second parameter set generates a second message verification code, and sends the second random number and the second message verification code To the terminal equipment;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the authentication module is specifically configured to:
- Determining a second random number generating a communication key of the network authentication server according to the key random number, encrypting the communication key by using the second layer key, and obtaining the encrypted communication key, according to the communication key, the second Any one of the layer keys, and the first random number, the second random number, the second parameter set generates a second message verification code, and the second random number, the encrypted processed communication key, and the second message verification Code, sent to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first transmission parameter and a first random number
- the authentication module is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process, where the authentication module is specifically configured to:
- the key generation function is used to generate the communication of the network authentication server.
- the key generates a second message verification code according to any one of the communication key and the layer 2 key, and at least one of the first random number, the second random number, and the second parameter set, and the encryption process is performed.
- the second random number and the second message verification code are sent to the terminal device, and the communication key is sent to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module is specifically configured to:
- Determining a second random number after verifying that the first message verification code is passed, using a key generation function according to at least one of the first random number, the second random number, the second parameter set, and the second layer key Generating a communication key of the network authentication server, and generating a second message according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set a verification code, sending the encrypted second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module is specifically configured to:
- Determining a second random number after verifying that the first message verification code is passed, generating a communication key of the network authentication server according to the key random number, and encrypting the communication key by using the second layer key to obtain an encrypted process
- the communication key generates a second message verification code according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set.
- the second random number, the encrypted communication key and the second message verification code are sent to the terminal device, and the communication key is sent to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process, where the authentication module is specifically configured to:
- the key generation function is used to generate the communication key of the terminal device, according to the communication secret Any one of a key, a second layer key, and at least one of the first random number, the second random number, and the second parameter set to generate a second message verification code, and the second random number after the encryption process And sending a second message verification code to the terminal device, and sending a communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module is specifically configured to:
- At least one of the second parameter set, and the second layer key generates a communication key of the terminal device by using a key generation function, according to any one of the communication key and the second layer key, and the first random Generating, by the at least one of the second random number and the second parameter set, a second message verification code, sending the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code, a first transmission parameter, and a first random number
- the authentication module is specifically configured to:
- the communication key of the network authentication server is generated by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter. And generating, according to any one of the communication key and the second layer key, and the first random number, the second random number, the first transmission parameter, the second transmission parameter, and the second parameter set a message verification code, sending the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication module is specifically configured to: perform with the terminal device Mutual authentication, generating a session of the network authentication server by using a key generation function according to any one of a communication key, a second parameter set, a session key random number, a session key fresh parameter, and a session key preset time parameter Key and send the session key to the functional network element.
- the tenth aspect of the present invention provides a network authentication server, including:
- a public key obtaining module configured to receive an authentication request message sent by the terminal device, where the authentication request message includes a public key of the terminal device;
- the private key of the authentication server is mutually authenticated with the terminal device to obtain a communication key of the terminal device and the function network element.
- the authentication request message further includes a first digital signature, a first random number after the encryption process, and a second parameter set; the authentication module is specifically configured to:
- the first digital signature After verifying the first digital signature, according to at least one of the first random number, the second random number, and the second parameter set, generating a communication key of the network authentication server by using a key generation function, according to the network authentication server
- the private key, the first random number, the second random number, and the second parameter set generate a second digital signature, and send the second digital signature and the encrypted second random number to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes the first random number and the second parameter set after the encryption process; the authentication module is specifically configured to:
- Generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number and the second random number, and the second parameter set, according to the private key of the network authentication server, the first random number, and the first Generating a second digital signature by the second random number and the second parameter set, and transmitting the encrypted second random number and the second digital signature to the device terminal;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number, a first transmission parameter, and a second parameter set; and the authentication module is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the server further includes a public key request receiving module, Receiving a public key request message sent by the terminal device;
- the public key sending module is configured to send the public key of the network authentication server to the terminal device.
- the authentication module is specifically configured to: interact with the terminal device Authentication, according to any one of the communication key, the second parameter set, the session key random number, the session key fresh parameter, and the preset time parameter of the session key, the key generation function is used to generate the session secret of the network authentication server. Key and send the session key to the functional network element.
- an embodiment of the present invention provides a storage medium, where the storage medium is a computer readable storage medium, and one or more programs are stored, and one or more programs include instructions, when the instructions are electronic including multiple applications.
- the electronic device is caused to perform the above-mentioned first aspect, the key distributor in any one of the first to fourth possible implementations of the first aspect law.
- an embodiment of the present invention provides a storage medium, where the storage medium is a computer readable storage medium, and one or more programs are stored, and one or more programs include instructions, when the instruction is an electronic component that includes multiple applications.
- the electronic device is caused to perform the key distribution method in any one of the first to seventh possible implementations of the second aspect and the second aspect.
- an embodiment of the present invention provides a storage medium, where the storage medium is a computer readable storage medium, and one or more programs are stored, and the one or more programs include instructions, and the instructions are when the electronic component includes multiple applications.
- the electronic device is executed, the electronic device is caused to perform the key authentication method in any one of the first to fifteenth possible implementation manners of the third aspect and the third aspect.
- an embodiment of the present invention provides a storage medium, where the storage medium is a computer readable storage medium, and one or more programs are stored, and the one or more programs include instructions, and the instructions are when the electronic device includes multiple applications.
- the electronic device is configured to perform the above-mentioned fourth aspect, the first to the eleventh, the fifth aspect of the fourth aspect, and any one of the first to fifth aspects of the fifth aspect. Key authentication method.
- the embodiment of the present invention provides a key distribution and authentication system, including: the service center in any one of the first to seventh possible implementation manners of the sixth aspect, the sixth aspect, a server; a user management server in a possible implementation manner of any of the seventh aspect, the first aspect of the seventh aspect, and the second aspect of the seventh aspect; the eighth aspect, the first aspect of the eighth aspect a terminal device in any one of fifteen possible implementation manners; the ninth aspect, the first to eleventh aspects of the ninth aspect, the tenth aspect, and the first to fifth aspects of the tenth aspect A network authentication server in any of the possible implementations.
- FIG. 1 is a schematic diagram of a system architecture of a first embodiment of a key distribution and authentication method according to the present invention
- Embodiment 1 of a key distribution and authentication method according to the present invention
- Embodiment 3 is a signaling flowchart of Embodiment 1 of a key authentication method according to the present invention.
- Embodiment 4 is a signaling flowchart of Embodiment 2 of a key authentication method according to the present invention.
- FIG. 5 is a signaling flowchart of Embodiment 3 of a key authentication method according to the present invention.
- Embodiment 6 is a signaling flowchart of Embodiment 4 of a key authentication method according to the present invention.
- Embodiment 7 is a signaling flowchart of Embodiment 5 of a key authentication method according to the present invention.
- Embodiment 8 is a signaling flowchart of Embodiment 6 of a key authentication method according to the present invention.
- Embodiment 9 is a signaling flowchart of Embodiment 7 of a key authentication method according to the present invention.
- Embodiment 8 is a signaling flowchart of Embodiment 8 of a key authentication method according to the present invention.
- FIG. 11 is a signaling flowchart of Embodiment 9 of a key authentication method according to the present invention.
- Embodiment 12 is a signaling flowchart of Embodiment 10 of a key authentication method according to the present invention.
- FIG. 13 is a signaling flowchart of Embodiment 11 of a key authentication method according to the present invention.
- Embodiment 16 is a schematic structural diagram of Embodiment 1 of a user management server according to the present invention.
- Embodiment 17 is a schematic structural diagram of Embodiment 1 of a service center server according to the present invention.
- Embodiment 1 of a terminal device according to the present invention is a schematic structural diagram of Embodiment 1 of a terminal device according to the present invention.
- Embodiment 19 is a schematic structural diagram of Embodiment 1 of a network authentication server according to the present invention.
- FIG. 20 is a schematic structural diagram of Embodiment 2 of a network authentication server according to the present invention.
- An embodiment of the present invention provides a key distribution and authentication method, and a device for distributing a key for a terminal device, and causing the terminal device to obtain a communication key after mutual authentication with the network authentication server according to the distributed key, so that the terminal device It is possible to connect to a communication network based on a communication key and perform secure communication.
- the system architecture for performing key distribution and authentication in the embodiment of the present invention will be described in detail below with reference to specific embodiments.
- FIG. 1 is a schematic diagram of a system architecture of a first embodiment of a key distribution and authentication method according to the present invention.
- the system architecture includes a service center server 101, a user management server 102, a terminal device 103, a network authentication server 104, and a function network element 105.
- the service center server 101 is configured to securely generate and allocate a first layer key for the user management server 102.
- the user management server 102 sends the first key request message, it is different according to the user identifier of the user management server 102.
- the user management server 102 assigns different first layer keys, and the service center server 101 can also distribute keys of different types or different security levels by different algorithms for different service types of the user management server 102.
- the service center server 101 can be controlled by the network operator or by a third party independent of the network operator and the user management server.
- the service center server 101 may specifically be a server, a base station, a workstation, a computer, a gateway, and the like.
- the embodiment of the present invention uses only a server as an example, and is not limited thereto.
- the user management server 102 can be a company, an enterprise, or an end user or a terminal, and one or more terminal devices 103 are deployed. In FIG. 1, one user management server 102 manages two terminal devices 103 as an example. It should be understood by those skilled in the art that this is not a limitation of the embodiments of the present invention.
- the user management server 102 is configured to securely generate and allocate a layer 2 key for the terminal device 103 managed by the user, and after receiving the layer 1 key sent by the service center server 101, according to the device identifier of the terminal device 103, Different Layer 2 keys are generated, and the User Management Server 102 can also distribute Layer 2 keys of different types or different security levels using different algorithms for different service types of the terminal device 103.
- the terminal device 103 can be a smart device such as a mobile phone, a tablet computer, a smart terminal, or a communication device such as a server, or an Internet of Things device such as a sensor, an electric meter, or a water meter.
- the network authentication server 104 and the function network element 105 are controlled by the network operator, and the network authentication server 104 is configured to perform mutual authentication with the terminal device 103 according to the distributed layer 2 key and obtain a communication key, and the network authentication server 104 may specifically be a mobile Management node (Mobility Management Entity, MME for short), attribution Home Subscriber Server (HSS), controller, control node, gateway, server, etc.
- MME Mobile Management Entity
- HSS Home Subscriber Server
- the function network element 105 is configured to implement secure communication with the terminal device 103 according to the communication key obtained in the authentication process.
- the function network element 105 may specifically be the data plane anchor point, the core network server, and the control node of the terminal device 103 accessing the communication network.
- User data plane gateways such as PDH equipment, SDH-ADM, DACS, TEM, REG, PCM, etc.
- the service center server 101 includes a service authentication server and a key management server.
- the service authentication server communicates with the user management server 102
- the key management server communicates with the network authentication server 104
- the service authentication server receives the first key request message sent by the user management server 102, and requests the first key.
- the message is forwarded to the key management server.
- the key management server When the key management server generates the first layer key, the key management server sends the first layer key to the user management server 102 through the service authentication server, and the user management server 102 is based on the first layer.
- the key generates a second layer key and sends it to the terminal device 103.
- the key management server can directly send the first layer secret to the network authentication server 104.
- the key is such that the network authentication server 104 generates a second layer key based on the first layer key.
- the service authentication server can also communicate with the network authentication server 104, the key management server directly communicates with the user management server 102, and the key management server directly receives the first key request message sent by the user management server 102, and The generated first layer key is directly sent to the user management server 102, and when the terminal device 103 and the network authentication server 104 perform mutual authentication based on the symmetric key technology, the key management server transmits the first to the network authentication server 104 through the service authentication server.
- the service authentication server can also communicate with the user management server 102 and the network authentication server 104, the key management server only communicates with the service authentication server, the service authentication server directly communicates with the user management server 102, and the service authentication server directly receives
- the first key request message sent by the user management server 102, and the first layer key generated by the key management server is directly sent to the user management server 102, and the terminal device 103 and the network authentication server 104 perform mutual mutual based on the symmetric key technology.
- the service authentication server transmits the first layer key to the network authentication server 104.
- FIG. 2 is a signaling flowchart of Embodiment 1 of a key distribution and authentication method according to the present invention. As shown in Figure 2, the method includes:
- the user management server sends a first key request message to the service center server.
- the first key request message is used to instruct the service center server to generate a first layer key of the user management server, and the first key request message includes a user identifier of the user management server.
- the user management server and the service center server have mutually authenticated and established a secure communication channel.
- the authentication mode may be based on a user name password, a certificate, a symmetric key, an AKA protocol, and the like. .
- the service center server receives the first key request message sent by the user management server, generates a first layer key of the user management server, and sends the first layer key to the user management server.
- the service center server when the service center server receives the first key request message sent by the user management server, the first layer key is generated and sent to the user management server, so that the user management server is configured according to the first
- the layer 1 key generates a layer 2 key of the terminal device.
- the first key request message sent by the different user management server to the service center server includes the user identifier of the user management server, and the service center server according to the user identifier included in each first key request message.
- the indicated user management server generates a first layer key.
- the service center server when the service center server generates the first layer key of the user management server, the following feasible implementation manners are included:
- the first feasible implementation based on the key generation process of symmetric key technology:
- the service center server generates a first layer key of the user management server by using a key generation function according to the third parameter set;
- the service center server determines the service random number and uses it as the first layer key of the user management server;
- the service center server When the first key request message further includes at least one of a network identifier and a service parameter of the user management server, the service center server generates a first layer key of the user management server by using a key generation function according to the fourth parameter set. ;
- the third parameter set includes a key random number of the first layer key, and a new layer first key At least one of a fresh parameter, a time parameter of the first layer key, and a shared key, and the shared key is a shared key of the user management server and the service center server;
- the fourth parameter set includes a user identifier of the user management server, a network identifier of the user management server, a service parameter, a key random number of the first layer key, a fresh parameter of the first layer key, and a time parameter of the first layer key. And at least one of the shared keys, where the shared key is a shared key of the user management server and the service center server.
- the service center server sends the first layer key to the user management server, and the user management server generates the second layer key according to the first layer key and sends the key to the terminal device.
- the service center server may send the first layer key to the network authentication server, so that the network authentication server generates and the terminal device according to the first layer key.
- the second layer key of the same second layer key may be sent to the network authentication server, so that the network authentication server generates and the terminal device according to the first layer key.
- the service center server receives the second key request message sent by the network authentication server, where the second key request message includes the user identifier of the user management server; and the service center server according to the user identifier of the user management server in the second key request message Retrieving the first layer key, or generating the first layer key, and sending the first layer key to the network authentication server, so that the network authentication server generates the second layer key of the terminal device according to the first layer key. And mutual authentication is performed with the terminal device according to the second layer key.
- the service center server may store the user identifier of the user management server and the first layer key correspondingly, and may regenerate the user management server corresponding to the current user identifier according to the user identifier after receiving the key request message including the user identifier.
- the first layer of the key may be stored in the service center server.
- the second layer key corresponding to the second layer key of the terminal device may be generated for the network authentication server according to the first layer key, and the second layer key is sent to the network authentication server.
- the service center server receives the second key request message sent by the network authentication server, where the second key request message includes the first parameter set; the service center server adopts the key according to the first layer key and the first parameter set. Generating a function to generate a second layer key of the terminal device, and sending the second layer key to the network authentication server, so that the network authentication server performs mutual authentication with the terminal device according to the second layer key;
- the first parameter set is a parameter used by the user management server to generate a second layer key of the terminal device for different terminal devices, and is used to ensure the second layer of the terminal device and the network authentication server.
- the keys are the same. According to the server that generates the Layer 2 key, the first parameter set needs to be sent to the network authentication server or the service center server.
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the terminal device After receiving the Layer 2 key sent by the user management server, the terminal device can perform mutual authentication with the network authentication server based on the symmetric key technology. Since the second layer key only has the terminal device and the network authentication server, it is not disclosed. Therefore, the terminal device and the network authentication server can perform data encryption and decryption according to the second layer key, thereby ensuring the confidentiality of the authentication process.
- the Key Derivation Function derives the key according to the input parameters, and the content, number, and order of the input parameters are different, and different keys are obtained.
- the algorithm used by KDF may be an algorithm such as HMAC algorithm (such as HMAC-sha256), OMAC, CBC-MAC, PMAC, UMAC, and VMAC.
- the shared key of the user management server and the service center server may be preset in advance, or may be a key negotiated by the user and the key management center after performing protocols such as IPsec and TLS. It can be the key obtained by the user and the key management center after AKA authentication (such as Kasme, CK, IK, etc.).
- the second feasible implementation is based on an identity cryptosystem or a key generation process based on a hierarchical identity cryptosystem:
- the service center server generates a first layer key of the user management server based on the user identification of the user management server and the key generation algorithm based on the identity cryptosystem;
- the service center server generates a first layer key of the user management server based on the user identifier of the user management server and the fifth parameter set, based on the key generation algorithm of the identity cryptosystem;
- the first layer key is the private key of the user management server, and the user identifier of the user management server is the public key of the user management server.
- the public key generated by the user ID of the user management server may also be selected as the public key of the user management server.
- the user ID of the user management server is taken as the public key of the user management server, instead of being limited thereto. set.
- the fifth parameter set includes at least one of the following: a key random number of the first layer key, a fresh parameter of the first layer key, and a time parameter of the first layer key.
- the key generation algorithm of the identity cryptosystem generates different private management keys of the user management server for different user management servers based on user identifiers of different user management servers, corresponding to the private key of the user management server. There is also the public key of the user management server.
- the user management server When the user management server generates a second layer key for the terminal device according to the private key of the user management server, the private key of the terminal device and the public key of the terminal device are also obtained, and the network authentication server also has an identity based password system.
- the key and the private key wherein the public key is public data, and the private key of the terminal device is only owned by the terminal device and is not disclosed.
- the terminal device After a device encrypts data by using the public key of the terminal device and sends the data to the terminal device, the terminal device can decrypt the encrypted data by using the private key of the terminal device to obtain data. Other devices, even if they acquire encrypted data, cannot correctly decrypt or verify because they do not have the private key of the terminal device. Therefore, this type of identity-based cryptosystem-based key is suitable for the mutual authentication process based on identity key technology.
- the network authentication server may also preset the public key and the private key by the identity-based cryptosystem.
- a third feasible implementation based on a privacy-enhanced key generation process
- the service center server generates a private key of the user management server and a public key of the user management server by using a privacy-enhanced key technology
- the private key of the user management server is the first layer key of the user management server, and the service center server also sends the public key of the user management server to the user management server.
- the privacy-enhanced key technology generates a private key of a different user management server for different user management servers based on user identifiers of different user management servers, and a public key of the user management server corresponding to the private key of the user management server.
- the terminal device may generate a digital signature according to the second layer key; and the receiver only uses the user management server.
- the public key can be used to verify the digital signature of the terminal device.
- the difference from the second method is that the terminal device does not have its own public key and only has the public key of the user management server.
- the first key fresh parameter (eg, sequence parameter, fresh parameter, nonce, etc.) is used to indicate the freshness of the first key, against replay attacks, different
- the fresh parameters of the first key of the moment should be different, and if they are the same, they can be considered to be subjected to a replay attack.
- the preset time parameter of the first key is used to indicate the validity period of the first key, and includes at least one of a time when the first key is valid, an invalid time, and an expiration date.
- the fresh parameters of any key in the following embodiments have the same meanings and will not be described again.
- the identifier of the user management server includes, but is not limited to, at least one of the following: an industry user ID, a company ID, a service ID, and an ID of an individual user (eg, IMEI, IMSI, IMPI, TMSI, IMPU, user's App ID, MAC address, IP address, mobile number and GUTI, etc.).
- an industry user ID e.g., IMEI, IMSI, IMPI, TMSI, IMPU, user's App ID, MAC address, IP address, mobile number and GUTI, etc.
- the network identifier includes, but is not limited to, at least one of the following: a carrier ID (PLMN ID), an access network ID (Access Network ID), a service network ID (Serving Network ID), a local area network ID, and the like.
- PLMN ID carrier ID
- Access Network ID Access Network ID
- Server Network ID service network ID
- local area network ID a local area network ID
- the service parameters include, but are not limited to, at least one of the following: a sequence number SN in the service, a timestamp, a related ID in the service, a service fresh parameter, a service random number (nonce'/random number1), a service level, and a delay a parameter, where the related ID in the service may be a name of the service, including at least one of an ID of a key management center, an ID of a service authentication center, a service center ID, a session ID, a link ID, an application ID, and a server ID.
- the timestamp may be the system time of the user when sending the request message.
- the device identifier of the terminal device includes, but is not limited to, at least one of the following: a number of the device, a serial number, an IMEI, an IMSI, an IMPI, a TMSI, an IMPU, an App ID of the device, a MAC address, an IP address, a mobile phone number, and a GUTI.
- a number of the device includes, but is not limited to, at least one of the following: a number of the device, a serial number, an IMEI, an IMSI, an IMPI, a TMSI, an IMPU, an App ID of the device, a MAC address, an IP address, a mobile phone number, and a GUTI.
- it may also be another identifier that uniquely identifies the device.
- different parameters are typically employed to generate different first layer keys for different user management servers.
- the network identifier and the service parameter of the user management server are added to generate different first-level keys with different complexity, that is, the service center, for different users to manage different services of the server.
- the server can set a first layer key with different complexity for different user management servers according to different user management servers.
- the service center server may set multiple first-layer keys for the same user management server, thereby implementing different services on the user management server by using different keys. The purpose of protection.
- the user management server generates a second layer key of the terminal device according to the first layer key, and sends the second layer key to the terminal device.
- the user management server receives the first layer key sent by the service center server, generates a second layer key of the terminal device according to the first layer key, and sends the second layer key to the terminal device, so that the terminal device
- the second layer key is used to perform mutual authentication with the network authentication server to obtain the communication key of the terminal device and the function network element.
- the user management server when the user management server manages multiple terminal devices, the user management server generates different second layer keys for different terminal devices according to the device identifier of the terminal device. Further, the second layer key can be made more confidential and have different security levels by increasing the parameters used in generating the second layer key. By generating a Layer 2 key for different terminal devices by the user management server, the load of the key generated by the service center server can be greatly reduced.
- the service center server sends the first layer key to the user management server, and the user management server sends the time information of each key to limit the time when the second layer key is sent to the terminal device. The valid time available for this key.
- the first feasible implementation based on the key generation process of symmetric key technology:
- the user management server generates a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set.
- This method is applied when the first layer key is generated based on symmetric key technology. Specifically, the user management server sends the second layer key and the first parameter set to the terminal device.
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the user management server generates a second layer key of the terminal device and a public key of the terminal device according to the private key of the user management server and the first parameter set.
- the first layer key is a private key of the user management server
- the second layer key is a private key of the terminal device corresponding to the public key of the terminal device
- the user management server is further configured according to the first layer key and the terminal device.
- the public key, and the first set of parameters generate a first digital signature; and the terminal device
- the public key, the second layer key, the first digital signature, and the second set of parameters are sent to the terminal device.
- the public key of the terminal device may be the device identifier of the terminal device.
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the user management server generates a second layer key of the terminal device based on the device identity generation algorithm according to the first layer key and the device identifier of the terminal device.
- the first layer key is a private key of the user management server
- the second layer key is a private key of the terminal device.
- the user management server transmits the second parameter set, the second layer key, and the public key of the terminal device corresponding to the private key of the terminal device to the terminal device.
- the public key of the terminal device may be the device identifier of the terminal device.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the user management server generates a second layer key of the terminal device by using a privacy enhanced key technology generation algorithm according to the private key of the user management server.
- the first layer key is a private key of the user management server
- the second layer key is a private key of the terminal device.
- the user management server sends the public key of the user management server, the second layer key, and the second parameter set to the terminal device.
- the public key of the user management server is a public key corresponding to the private key of the terminal device.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device performs mutual authentication with the network authentication server to obtain a communication key.
- the terminal device receives the second layer key sent by the user management server, and performs mutual authentication with the network authentication server to obtain a communication key of the terminal device and the function network element.
- the embodiment of the present invention further includes:
- the network authentication server sends a communication key to the function network element, so that the terminal device and the function network element can perform secure communication based on the communication key.
- the network authentication center and the terminal device in the embodiment of the present invention may further use the shared communication key, the second parameter set, the session key random number, the session key fresh parameter, and the session secret.
- the key generation function is used to generate the session key
- the session key is sent to the function network element
- the session key is used instead of the communication key to realize the security of the function network element and the terminal device.
- step 204 mainly describes the key authentication process.
- mutual authentication between the terminal device and the network authentication center includes the following feasible implementation manners:
- the terminal device and the network authentication server perform mutual authentication based on the symmetric key technology.
- the service center server sends the first layer key of the user management server to the user management server, and the user management server generates the second layer key according to the first layer key, and at the same time, the network authentication The server receives the first layer key or the second layer key sent by the service center server.
- the network authentication service When the first layer key is used, the network authentication service generates the second layer key according to the first layer key, and the specific generation method and user The management server generates the Layer 2 key in the same way, and does not go into details. Finally, the network authentication server performs mutual authentication with the terminal device according to the Layer 2 key.
- the service center server may transmit the first layer key or the second layer key to the network authentication server while or after transmitting the first layer key to the user management server.
- the service center server may transmit the first layer key or the second layer key to the network authentication server while or after transmitting the first layer key to the user management server.
- the first layer key or the second layer key is sent to the network authentication server.
- the network authentication server may also send the second key to the service center server after receiving the authentication request message sent by the terminal device in the mutual authentication process with the terminal device.
- the request message, the service center server sends the first layer key to the network authentication server after receiving the second key request message.
- the terminal device and the network authentication server perform mutual authentication based on the asymmetric key technology.
- the second layer key of the terminal device is the private key of the terminal device
- the device identifier of the terminal device is the public key of the terminal device.
- the public key generated by the device identifier of the terminal device may also be selected as the public key of the terminal device. The details are not described in the following embodiments.
- the network authentication server acquires the public key of the terminal device, that is, the network authentication server stores the public key of the terminal device and the public key and the private key of the network authentication server.
- the terminal device stores the public key of the network authentication server, and the network authentication server can encrypt the data to be transmitted according to the public key of the terminal device, and the terminal device can encrypt the transmission data according to the public key of the network authentication server, thereby enabling the terminal device and the network.
- the authentication server can perform mutual authentication to obtain a communication key in case of confidentiality.
- the public key and the private key of the network authentication server are generated based on the identity cryptosystem, and the public key of the network authentication server may be the ID of the network authentication server, or the public key generated according to the ID of the network authentication server is used as the network authentication server. Public key.
- the public key of the network authentication server may be pre-stored in the terminal device.
- the obtaining of the public key of the network authentication server may be: before the network authentication server and the terminal device authenticate each other, the network authentication server receives the public key request message or the certificate request message sent by the terminal device; the network authentication server sends the terminal information to the terminal device.
- the public key of the network authentication server or the certificate of the network authentication server which contains the public key of the network authentication server.
- the network authentication server sends the public key of the network authentication server to the terminal device.
- the network authentication server may also generate a third public key and a third private key of the network authentication server based on a public key infrastructure (PKI) cryptosystem, instead of the public key generated by the network authentication server based on the identity cryptosystem. And private key.
- PKI public key infrastructure
- the terminal device and the network authentication server may perform mutual authentication according to protocols such as IPsec and TLS.
- the terminal device and the network authentication server may directly adopt the second layer key as a secure communication key of the terminal device and the function network element.
- the embodiment of the present invention is applicable to key distribution and authentication when an enterprise or a company manages multiple terminal devices based on multiple services at the same time, so that multiple terminal devices do not preset the root key or support the USIM card in advance.
- different keys distributed by the service center server are obtained, thereby implementing secure communication, and at the same time, implementing enterprise- or company-led service-based key distribution and authentication, reducing the operator.
- the operational complexity is applicable to key distribution and authentication when an enterprise or a company manages multiple terminal devices based on multiple services at the same time, so that multiple terminal devices do not preset the root key or support the USIM card in advance.
- the service center server distributes different keys for each user management server, and each user management server distributes different keys for each terminal device, and then each terminal device is based on the respective key and network.
- the authentication center performs mutual authentication, and finally obtains the communication key of the terminal device and the function network element.
- the embodiment of the invention provides a method for establishing a secure communication channel for a terminal device, which has a wide application range and reduces the complexity of the operator network.
- the mutual authentication mode includes at least an authentication method based on a symmetric key technology and an authentication method based on an asymmetric key technology.
- the terminal device further receives the first parameter set sent by the user management server.
- the mutual authentication process includes the following possible implementations:
- the first possible authentication implementation is a first possible authentication implementation:
- FIG. 3 is a signaling flowchart of Embodiment 1 of a key authentication method according to the present invention. As shown in Figure 3, it includes:
- the terminal device sends an authentication request message to the network authentication server.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the second layer key, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes a parameter set and a first random number after the encryption process;
- the network authentication server sends a second random number and a second message verification code to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key.
- the second parameter set is sent to the terminal device by using the encrypted second random number and the second message verification code.
- the terminal device sends a first message verification code to the network authentication server.
- the terminal device receives the encrypted second random number and the second message verification code sent by the network authentication server, and decrypts the encrypted second random number according to the second layer key to obtain a second random number. After verifying the verification of the second message verification code, the terminal device generates at least one of the second layer key K_dev, the first random number nonce1, the second random number nonce2, and the second parameter set by using the key generation function KDF.
- the network authentication server receives the first message verification code sent by the terminal device, and sends a communication key to the function network element after the verification of the first message verification code is passed.
- the confidentiality may be improved, and the correlation between the communication key and the terminal device is increased.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the second parameter set may not be used in the process of generating the communication key and the message verification code to simplify the communication key.
- the first parameter set and the second parameter set in the embodiments of the present application are the same, and therefore are not described herein again.
- the key parameter of the communication key may be used instead of the second parameter set, or the key parameter of the communication key and the second parameter set may be simultaneously used.
- the key parameters of the communication key include at least one of the following: communication key random number, communication Key fresh parameter, preset time parameter of communication key. It will be apparent to those skilled in the art that it is also within the scope of the present application to add other similar parameters, delete some of the parameters, or replace the parameters in the present application with other similar parameters.
- the network authentication server needs to send the key parameter of the communication key to the terminal device, when When the network authentication server does not use the key parameter of the communication key in the process of generating the communication key, the network authentication server does not need to transmit the key parameter of the communication key to the terminal device.
- the first message verification code and the second message verification code may be encrypted according to the second layer key to improve the confidentiality of the authentication process.
- the first random number or the second random number may not be used. The number is encrypted.
- the terminal device and the network authentication server use the same key generation function and the communication key of the parameter generation terminal device.
- the terminal device and the network authentication server may adopt different parameters or different parameters in different orders to obtain different message verification codes.
- the communication key in the foregoing step S302 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the second layer key to perform the communication key.
- the encryption is sent to the terminal device, so that the terminal device can obtain the communication key after decrypting the encrypted communication key.
- the first random number and the second random number may be selected to be not encrypted.
- the second possible authentication implementation is a first possible authentication implementation.
- FIG. 4 is a signaling flowchart of Embodiment 2 of a key authentication method according to the present invention. As shown in Figure 4, it includes:
- the terminal device sends an authentication request message to the network authentication server.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol.
- a first transmission parameter of the DH protocol may first determine a first parameter x, g x according to a first transmission parameter of the first protocol parameter x DH obtained, the first parameter of the first transmission parameter g x to the power generating element g DH protocol is a preset, Sending an authentication request message to the network authentication server, where the authentication request message includes a first random number, a first transmission parameter, and a first parameter set;
- the DH protocol in the embodiments of the present invention is a Diffie-Hellman protocol.
- the network authentication server sends a second random number, a second transmission parameter, and a second message verification code to the terminal device.
- the network authentication server receives the first random number, the first transmission parameter, the first parameter set, and determines the second random number, the second transmission parameter of the DH protocol.
- the second parameter y may be determined first, according to the first The second parameter y obtains the second transmission parameter g y , and the second transmission parameter g y is the second parameter power of the generating element g of the preset DH protocol, and performs DH density according to the first transmission parameter g x and the second transmission parameter g y .
- the key negotiation algorithm obtains a third transmission parameter g xy , and generates a communication secret of the network authentication server by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter.
- Key according to any one of the communication key and the second layer key, and the first transmission parameter, the second transmission parameter, and the second parameter set, generate a second message verification code, and the second random number and the second message
- the verification code is sent to the terminal device;
- the terminal device sends a first message verification code to the network authentication server.
- the terminal device receives the second random number, the second transmission parameter, and the second message verification code sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where After the second message verification code is verified, the communication key of the terminal device is generated by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter. And generating, according to any one of the communication key and the second layer key, the first random number, the second random number, and the second parameter set, using the message verification code generating function to generate the first message verification code, and The message verification code is sent to the network authentication server;
- the network authentication server receives the first message verification code sent by the terminal device, and sends a communication key to the function network element after the verification of the first message verification code is passed.
- the first random number and the second random number may also be encrypted and transmitted.
- at least one of the first transmission parameter and the second transmission parameter may also be selected for encryption.
- the authentication request message further includes a DH protocol identifier and/or a DH group identifier of the preset DH protocol selected by the terminal device, and the network authentication server Determine which DH association to use based on the received DH protocol identifier
- a group of preset DH protocols used in the generation of transmission parameters, such as a generator g, is determined according to the DH group identifier.
- the confidentiality of key negotiation in the authentication process is increased by adding the first transmission parameter and the second transmission parameter.
- the third possible authentication implementation is a third possible authentication implementation.
- FIG. 5 is a signaling flowchart of Embodiment 3 of a key authentication method according to the present invention. As shown in Figure 5, it includes:
- the terminal device sends an authentication request message to the network authentication center.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the second layer key, and obtains the first random number after the encryption process, according to at least one of the second parameter set and the first random number.
- the second layer key generates a first message verification code by using a message verification code generating function, and sends an authentication request message to the network authentication server, where the authentication request message includes the first message verification code, the first random number after the encryption process, and the first a set of parameters;
- the network authentication server sends a second random number and a second message verification code to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key.
- the item generates a second message verification code, and sends the encrypted second random number and the second message verification code to the terminal device, and sends the communication key to the function network element.
- the terminal device generates a communication key.
- the terminal device receives the second message verification code sent by the network authentication server and the second random number after the encryption process, and decrypts the encrypted second random number according to the second layer key to obtain a second random number. After verifying that the second message verification code is passed, generating a communication secret of the terminal device by using a key generation function according to at least one of the second layer key, the first random number, the second random number, and the second parameter set key.
- the first random number may be selected instead of Encrypted with the second random number.
- the communication key in the foregoing step S502 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the second layer key to perform the communication key.
- the encryption is sent to the terminal device, so that the terminal device can obtain the communication key after decrypting the encrypted communication key.
- the first random number and the second random number are not encrypted.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- the fourth possible authentication implementation is a
- FIG. 6 is a signaling flowchart of Embodiment 4 of a key authentication method according to the present invention. As shown in Figure 6, it includes:
- the terminal device sends an authentication request message to the network authentication server.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the second layer key, and obtains the first random number after the encryption process, according to at least the second layer key and the first random number.
- the second parameter set generates a communication key of the terminal device by using a key generation function, according to any one of the second layer key and the communication key, and at least one of the second parameter set and the first random number.
- the method of generating a first message verification code by using a message verification code generating function, and sending an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set;
- the network authentication server sends a second random number and a second message verification code to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the second layer key, obtains the first random number, determines the second random number, and encrypts the second random number by using the second layer key.
- Obtaining a second random number after the encryption process after the network authentication server verifies the first message verification code, according to the second layer key, at least one of the first random number, and the second parameter set, adopting the secret
- the key generation function generates a communication key of the terminal device, and generates a first according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set a message verification code, sending the encrypted second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the terminal device verifies the second message verification code.
- the terminal device receives the encrypted second random number and the second message verification code sent by the network authentication server, and decrypts the encrypted second random number according to the second layer key to obtain a second random number, and the terminal device The second message verification code is verified and the verification is determined to pass.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- the terminal device first generates a communication key according to the first random number, and no longer depends on the second random number sent by the network authentication center server.
- the first random number and the second random number may be selected to be not encrypted.
- the fifth possible authentication method is a fifth possible authentication method.
- FIG. 7 is a signaling flowchart of Embodiment 5 of a key authentication method according to the present invention. As shown in Figure 7, it includes:
- the terminal device sends an authentication request message to the network authentication server.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, generates a first message verification code by using a message verification code generating function, and sends an authentication request to the network authentication server according to the first key and the first random number.
- a message the authentication request message includes a first message verification code, a first random number, a first transmission parameter, and a device identifier of the terminal device;
- the network authentication server sends a second random number, a second transmission parameter, and a second message verification code to the terminal device.
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where the network authentication server is in the first message.
- the verification code verification is passed, generating a communication key of the network authentication server according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the communication key
- any one of the second layer key, and the first random number, the second random number, the first transmission parameter, the second transmission parameter, and the second parameter set generate a second message verification code, Transmitting the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the terminal device verifies the second message verification code.
- the terminal device receives the second random number, the second transmission parameter, and the second message verification code sent by the network authentication server, and executes the DH key according to the first transmission parameter and the second transmission parameter.
- the negotiation algorithm obtains a third transmission parameter; according to at least one of the first random number and the second random number, and the third transmission parameter, the key generation function is used to generate a communication key of the terminal device, and the second message verification code is performed. Verify and confirm pass verification.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- the first random number, the second random number, the first transmission parameter, and the second transmission parameter may also be encrypted and transmitted to improve confidentiality.
- the authentication request message further includes a DH protocol identifier and/or a DH group identifier of the preset DH protocol selected by the terminal device, and the network authentication server Determining which DH protocol to use according to the received DH protocol identifier; determining a group of the preset DH protocol used in the generation of the transmission parameter according to the DH group identifier, such as the generating element g.
- the confidentiality of the authentication process is increased by increasing the first transmission parameter and the second transmission parameter as compared to the first possible authentication implementation.
- the sixth possible authentication implementation is a sixth possible authentication implementation.
- FIG. 8 is a signaling flowchart of Embodiment 6 of a key authentication method according to the present invention. As shown in Figure 8, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a first random number, and a second parameter set.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the public key of the network authentication server, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a first random number after the encryption process, and a second parameter set;
- the network authentication server sends the second random number and the second digital signature to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device. Processing, obtaining a second random number after the encryption process, after verifying the first digital signature, according to at least one of the first random number and the second random number, And the second parameter set, the key generation function is used to generate a communication key of the network authentication server, and the second digital signature is generated according to the private key of the network authentication server, the first random number, the second random number, and the second parameter set, The second digital signature and the second random number after the encryption process are sent to the terminal device;
- the terminal device sends a first message verification code or a third digital signature to the network authentication server.
- the terminal device receives the encrypted second random number and the second digital signature sent by the network authentication server, and decrypts the encrypted second random number according to the second layer key of the terminal device to obtain a second random number. And generating, after the verification of the second digital signature, the communication key of the terminal device by using the key generation function according to at least one of the first random number and the second random number, according to the communication key And generating, by the first random number, the second random number, and the second parameter set, a first message verification code, or generating a third digital signature according to the second layer key, the first random number, the second random number, and the second parameter set, Sending the first message verification code or the third digital signature to the network authentication server;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and sends a communication key to the function network element after the first message verification code or the third digital signature is verified.
- the terminal device receives the public key of the terminal device sent by the user management server, the first digital signature, and the second parameter set.
- the first digital signature, the second digital signature, and the third digital signature may also be encrypted to improve the confidentiality of the authentication process.
- the communication key in the foregoing step S802 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the public key of the terminal device to perform the communication key.
- the encryption is sent to the terminal device, so that the terminal device decrypts the encrypted communication key according to the private key of the terminal device, that is, the second layer key, to obtain the communication key.
- the first random number and the second random number may be selected to be not encrypted.
- the seventh possible authentication implementation is a sixth possible authentication implementation:
- FIG. 9 is a signaling flowchart of Embodiment 7 of a key authentication method according to the present invention. As shown in Figure 9, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a first random number, a first transmission parameter, and a second parameter set.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a first random number, and a first a transmission parameter and a second parameter set;
- the network authentication server sends the second random number, the second transmission parameter, and the second digital signature to the terminal device.
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter, and obtains a third transmission parameter, and passes the verification on the first digital signature. Afterwards, the network authentication server generates a communication key of the network authentication server according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first random number. And at least one of the second random number and the second parameter set, and the private key of the network authentication server, the first transmission parameter, the second transmission parameter, generating a second digital signature, and the second random number and the second transmission parameter And transmitting a second digital signature to the terminal device;
- the terminal device sends a first message verification code or a third digital signature to the network authentication server.
- the terminal device receives the second transmission parameter, the second random number, and the second digital signature sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where After the second digital signature verification is passed, generating a communication key of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first And at least one of the random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, generate a first message verification code by using a message verification code generating function, or according to the first At least one of a random number, a second random number, and a second parameter set, and a second layer key, a first transmission parameter, a second transmission parameter, a third digital signature, a first message verification code, or a third Digital signature, sent to the network authentication server;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and sends a verification message to the function network element after verifying the first message verification code or the third digital signature. Send the communication key.
- FIG. 10 is a signaling flowchart of Embodiment 8 of a key authentication method according to the present invention. As shown in Figure 10, it includes:
- the terminal device sends an authentication request message to the network authentication center, where the authentication request message includes a public key of the terminal device, a first digital signature, a third digital signature, a first random number, and a second parameter set.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the public key of the network authentication server, and obtains the first random number after the encryption process, according to the second layer key, the first random number, and the first
- the second parameter set generates a third digital signature, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first digital signature, a third digital signature, a first random number after the encryption process, and a second Parameter set
- the network authentication server sends a second random number and a second digital signature to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device. Processing, obtaining a second random number after the encryption process, after verifying the first digital signature and the third digital signature, according to at least one of the first random number, the second random number, and the second parameter set,
- the key generation function generates a communication key of the network authentication server, generates a second digital signature according to the private key of the network authentication server, the first random number, the second random number, and the second parameter set, and performs the second digital signature and the encryption process.
- the second random number is sent to the terminal device and sends a communication key to the functional network element.
- the terminal device generates a communication key.
- the terminal device receives the second digital signature sent by the network authentication server and the second random number after the encryption process, and decrypts the encrypted second random number according to the second layer key of the terminal device to obtain a second random number. And generating, after the verification of the second digital signature, the communication key of the terminal device by using the key generation function according to at least one of the first random number and the second random number, and the second parameter set.
- the communication key in the foregoing step S1002 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the public key of the terminal device to perform the communication key. Encrypted and sent to the terminal device to make the terminal device root According to the private key of the terminal device, that is, the second layer key decrypts the encrypted communication key, the communication key can be obtained.
- the first random number and the second random number may be selected to be not encrypted.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- FIG. 11 is a signaling flowchart of Embodiment 9 of a key authentication method according to the present invention. As shown in Figure 11, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first random number, and a second parameter set.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the public key of the network authentication server, obtains the first random number after the encryption process, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first random number after the encryption process, and a second parameter set;
- the network authentication server sends the second random number and the second digital signature to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device. Processing, obtaining a second random number after the encryption process, generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number and the second random number, and the second parameter set, according to the network
- the private key, the first random number, the second random number, and the second parameter set of the authentication server generate a second digital signature, and send the encrypted second random number and the second digital signature to the device terminal.
- the terminal device sends a first message verification code or a third digital signature to the network authentication server.
- the terminal device receives the encrypted second random number and the second digital signature sent by the network authentication server, and decrypts the encrypted second random number according to the second layer key of the terminal device to obtain a second random number.
- the key generation function is adopted according to at least one of the first random number and the second random number, and the second parameter set Generating a communication key of the terminal device, generating a first message verification code according to the communication key, the first random number, the second random number, and the second parameter set, or according to the second layer key, the first random number, and the second random
- the second parameter set generates a third digital signature, and sends the first message verification code or the third digital signature to the network authentication server;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and sends a communication key to the function network element after the first message verification code or the third digital signature is verified.
- the communication key in the foregoing step S1102 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the public key of the terminal device to perform the communication key.
- the encryption is sent to the terminal device, so that the terminal device decrypts the encrypted communication key according to the private key of the terminal device, that is, the second layer key, to obtain the communication key.
- the first random number and the second random number may be selected to be not encrypted.
- FIG. 12 is a signaling flowchart of Embodiment 10 of a key authentication method according to the present invention. As shown in Figure 12, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first random number, a first transmission parameter, and a second parameter set.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a first random number, a first transmission parameter, and a second Parameter set
- the network authentication server sends a second random number, a second transmission parameter, and a second digital signature to the terminal device.
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, according to the first random number, the second Generating at least one of the random number and the second parameter set, and the third transmission parameter generates a communication key of the network authentication server by using a key generation function, according to at least one of the first random number, the second random number, and the second parameter set And a private key of the network authentication server, the first transmission parameter, the second transmission parameter, generating a second digital signature, and transmitting the second random number, the second transmission parameter, and the second digital signature to the terminal device;
- the terminal device sends a first message verification code or a third digital signature to the network authentication server.
- the terminal device receives the second transmission parameter, the second random number, and the second digital signature sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where After the second digital signature verification is passed, generating a communication key of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first And at least one of the random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, generate a first message verification code by using a message verification code generating function, or according to the first At least one of a random number, a second random number, and a second parameter set, and a second layer key, a first transmission parameter, a second transmission parameter, a third digital signature, a first message verification code, or a third Digital signature, sent to the network authentication server;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and sends a communication key to the function network element after the first message verification code or the third digital signature is verified.
- the eleventh possible possible authentication implementation is the eleventh possible possible authentication implementation:
- FIG. 13 is a signaling flowchart of Embodiment 11 of a key authentication method according to the present invention. As shown in Figure 13, it includes:
- the terminal device sends an authentication request message to the network authentication center, where the authentication request message includes a public key of the terminal device, a third digital signature, a first random number, and a second parameter set.
- the terminal device determines the first random number, performs encryption processing on the first random number by using the public key of the network authentication server, and obtains the first random number after the encryption process, according to the second layer key, the first random number, and the first
- the second parameter set generates a third digital signature, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the terminal device, a third digital signature, a first random number after the encryption process, and a second parameter set;
- the network authentication server sends the second random number and the second digital signature to the terminal device.
- the network authentication server decrypts the encrypted first random number according to the private key of the network authentication server, obtains the first random number, determines the second random number, and encrypts the second random number by using the public key of the terminal device. Processing, obtaining the second random number after the encryption process, in the pair After the third digital signature verification is passed, generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, according to the private network authentication server
- the second digital signature is generated by the key, the first random number, the second random number, and the second parameter set, and the second digital signature and the encrypted second random number are sent to the terminal device, and the communication secret is sent to the function network element. key.
- the terminal device generates a communication key.
- the terminal device receives the second digital signature sent by the network authentication server and the second random number after the encryption process, and decrypts the encrypted second random number according to the second layer key of the terminal device to obtain a second random number. And generating, after the verification of the second digital signature, the communication key of the terminal device by using the key generation function according to at least one of the first random number and the second random number, and the second parameter set.
- the communication key in the foregoing step S1302 can be obtained by the network authentication server according to the third random number.
- the network authentication server uses the public key of the terminal device to perform the communication key.
- the encryption is sent to the terminal device, so that the terminal device decrypts the encrypted communication key according to the private key of the terminal device, that is, the second layer key, to obtain the communication key.
- the first random number and the second random number may be selected to be not encrypted.
- the terminal device may perform the action of generating the communication key in step S1303 in step S1301.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- the public key of the user management server is the public key of the terminal device corresponding to the second layer key of the terminal device, and the authentication mode includes the following possible implementation manners:
- FIG. 14 is a signaling flowchart of Embodiment 12 of a key authentication method according to the present invention. As shown in Figure 14, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the user management server, a first random number, a first transmission parameter, and a second parameter set.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the user management server, a first random number, a first transmission parameter, and a first Two parameter set;
- the network authentication server sends a second random number, a second transmission parameter, and a second digital signature to the terminal device.
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, and the network authentication server is configured according to the first random number. And at least one of the second random number and the second parameter set, and the third transmission parameter generates a communication key of the network authentication server by using a key generation function, according to the first random number, the second random number, and the second parameter set And at least one of the private key of the network authentication server, the first transmission parameter, the second transmission parameter, generating a second digital signature, and transmitting the second random number, the second transmission parameter, and the second digital signature to the terminal device ;
- the terminal device sends a first message verification code or a third digital signature to the network authentication server.
- the terminal device receives the second transmission parameter, the second random number, and the second digital signature sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where After the second digital signature verification is passed, generating a communication key of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first And at least one of the random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, generate a first message verification code by using a message verification code generating function, or according to the first At least one of a random number, a second random number, and a second parameter set, and a second layer key, a first transmission parameter, a second transmission parameter, a third digital signature, a first message verification code, or a third Digital signature, sent to the network authentication server;
- the network authentication server receives the first message verification code or the third digital signature sent by the terminal device, and sends a communication key to the function network element after the first message verification code or the third digital signature is verified.
- the thirteenth possible authentication implementation is the thirteenth possible authentication implementation.
- FIG. 15 is a signaling flowchart of Embodiment 13 of a key authentication method according to the present invention. As shown in Figure 15, it includes:
- the terminal device sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the user management server, a third digital signature, a first random number, a first transmission parameter, and a second parameter set.
- the terminal device determines a first random number, a first transmission parameter of the DH protocol, and generates a third according to at least one of the first random number and the second parameter set, and the second layer key, the first transmission parameter.
- the digital signature sends an authentication request message to the network authentication server, where the authentication request message includes a public key of the user management server, a third digital signature, a first random number, a first transmission parameter, and a second parameter set;
- the network authentication server sends the second random number and the second digital signature to the terminal device.
- the network authentication server determines a second random number, a second transmission parameter of the DH protocol, performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter, and obtains a third transmission parameter, and performs verification on the third digital signature. Afterwards, the network authentication server generates a communication key of the network authentication server according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the first random number.
- the terminal device generates a communication key.
- the terminal device receives the second transmission parameter, the second random number, and the second digital signature sent by the network authentication server, and performs a DH key negotiation algorithm according to the first transmission parameter and the second transmission parameter to obtain a third transmission parameter, where After the second digital signature verification is passed, the communication key of the terminal device is generated by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter.
- the network authentication server may further generate a message verification code according to the communication key, and send the message verification code to the terminal device, where the terminal device may become a communication key, and then The received message verification code is verified.
- the terminal device may perform the action of generating the communication key in step S1503 in step S1501.
- the implementation manner of the authentication reduces the number of signaling interactions and improves the authentication efficiency.
- the authentication request message further includes the terminal device.
- the DH protocol identifier and/or the DH group identifier of the preset DH protocol are selected, and the network authentication server determines which DH protocol is adopted according to the received DH protocol identifier; and determines the pre-taken used in the transmission parameter generation according to the DH group identifier.
- Set the group of the DH protocol such as generating the element g.
- the network authentication server further receives the public key request message sent by the terminal device, and sends the public key of the network authentication server to the terminal device.
- Another aspect of the embodiment of the present invention provides a service center server for performing the key distribution method in the foregoing embodiment, which has the same technical features and technical effects.
- FIG. 16 is a schematic structural diagram of Embodiment 1 of a user management server according to the present invention. As shown in Figure 16, the server includes:
- the request sending module 1601 is configured to send a first key request message to the service center server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, where the first key request message includes the user The user ID of the management server;
- the key receiving module 1602 is configured to receive a first layer key of the user management server sent by the service center server;
- the key generation distribution module 1603 is configured to generate a second layer key of the terminal device according to the first layer key, and send the second layer key to the terminal device, so that the terminal device passes the second layer key and the network
- the authentication server performs mutual authentication to obtain a communication key between the terminal device and the function network element.
- the key generation distribution module 1602 is specifically configured to:
- Generating a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set, and sending the second layer key and the first parameter set to the terminal device, so that the terminal device passes the
- the second layer key is mutually authenticated with the network authentication server to obtain the communication key of the terminal device and the function network element;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the first layer key is a user management service.
- the private key of the device, the key generation distribution module 1602 is specifically used to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server
- the key generation distribution module 1602 is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the first layer key is a private key of the user management server
- the key receiving module is further configured to receive a public key of the user management server sent by the service center server
- the key The generating distribution module 1602 is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- a further embodiment of the present invention provides a service center server for performing the key distribution method in the foregoing embodiment, which has the same technical features and technical effects.
- FIG. 17 is a schematic structural diagram of Embodiment 1 of a service center server according to the present invention. As shown in Figure 17, the server includes:
- the key request receiving module 1701 is configured to receive a first key request message sent by the user management server, where the first key request message is used to instruct the service center server to generate a first layer key of the user management server, and the first key request The message contains the user ID of the user management server;
- the key generation distribution module 1702 is configured to generate a first layer key of the user management server corresponding to the user identifier according to the first key request message, and send the first layer key to the user management server.
- the key generation distribution module 1702 is specifically configured to:
- the first layer key of the user management server is generated by using the key generation function, and the first layer key is sent to the user management server;
- the third parameter set includes at least one of a key random number of the first layer key, a fresh parameter of the first layer key, a time parameter of the first layer key, and a shared key, and the shared key is the user.
- the service random number is determined and used as the first layer key of the user management server, and the first layer key is sent to the user management server.
- the first key request message further includes at least one of a network identifier and a service parameter of the user management server, where the key generation and distribution module 1702 is specifically configured to:
- the first layer key of the user management server is generated by using a key generation function, and the first layer key is sent to the user management server;
- the fourth parameter set includes a user identifier of the user management server, and a user management service. At least one of a network identifier of the device, a service parameter, a key random number of the first layer key, a fresh parameter of the first layer key, a time parameter of the first layer key, and a shared key, and the shared key is The shared key of the user management server and the business center server.
- the key generation distribution module 1702 is specifically configured to:
- the key generation algorithm based on the identity cryptosystem generates a first layer key of the user management server, and sends the first layer key to the user management server, where the first layer key is the user management server. Private key.
- the key generation distribution module 1702 is specifically configured to:
- the key generation algorithm based on the identity cryptosystem generates a first layer key of the user management server, and sends the first layer key to the user management server, the first layer of the secret
- the key is the private key of the user management server
- the fifth parameter set includes at least one of the following:
- the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key is the key random number of the first layer key, the fresh parameter of the first layer key, and the time parameter of the first layer key.
- the key generation distribution module 1702 is specifically configured to:
- the private key of the user management server and the public key of the user management server are generated by using a privacy-enhanced key technology, wherein the private key of the user management server is the first layer key of the user management server, and the first layer key and user management are performed.
- the server's public key is sent to the user management server.
- the key request receiving module 1701 is further configured to receive the second key request message sent by the network authentication server.
- the second key request message includes a user identifier of the user management server;
- the key generation distribution module 1202 is further configured to: retrieve, according to the user identifier of the user management server in the second key request message, the first layer key, or generate the first layer key, and send the first layer key to the network.
- the authentication server is configured to enable the network authentication server to generate a second layer key of the terminal device according to the first layer key, and perform mutual authentication with the terminal device according to the second layer key.
- the key request receiving module 1701 is further configured to receive a second key request message sent by the network authentication server, where the second key request message includes a first parameter set;
- the key generation distribution module 1702 is further configured to generate a second layer key of the terminal device by using a key generation function according to the first layer key and the first parameter set, and send the second layer key to the network authentication server. Enabling the network authentication server to perform mutual authentication with the terminal device according to the second layer key;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- a further aspect of the embodiments of the present invention provides a terminal device for performing the key authentication method in the foregoing embodiment, which has the same technical features and technical effects.
- FIG. 18 is a schematic structural diagram of Embodiment 1 of a terminal device according to the present invention. As shown in FIG. 18, the terminal device includes:
- a key receiving module 1801 configured to receive a second layer key of the terminal device sent by the user management server;
- the authentication module 1802 is configured to perform mutual authentication with the network authentication server according to the second layer key to obtain a communication key between the terminal device and the function network element.
- the mutual authentication mode includes at least an authentication method based on a symmetric key technology and an authentication method based on an identity key technology.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- Determining the first random number encrypting the first random number by using the second layer key, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes the first parameter set and the encryption The first random number after processing;
- the second random number is the network authentication server adopts the second layer key pair second Random number encryption processing
- the verification of the second message verification code After the verification of the second message verification code is passed, generating a communication key of the terminal device by using a key generation function according to at least one of the second layer key, the first random number, and the second random number, and the second parameter set And generating, according to any one of the communication key and the second layer key, the first random number, the second random number, the second parameter set, the first message verification code, and sending the first message verification code to the network authentication a server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- Determining a first random number and sending an authentication request message to the network authentication server, where the authentication request message includes a first parameter set and a first random number;
- the second message verification code After verifying that the second message verification code is passed, generating a communication secret of the terminal device by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the second layer key Key, according to any one of the communication key and the second layer key, and the first random number, the second random number, the second parameter set, generates a first message verification code, and sends the first message verification code to a network authentication server, so that the network authentication server verifies the first message verification code;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the information includes a first parameter set and a first random number
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, and a key of the second layer key is random. At least one of a number, a fresh parameter of the second layer key, and a time parameter of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the layer key Determining the first random number, encrypting the first random number by using the second layer key, and obtaining the first random number after the encryption process, according to the second parameter set, at least one of the first random number, and the second
- the layer key generates a first message verification code by using a message verification code generating function, and sends an authentication request message to the network authentication server, where the authentication request message includes a first message verification code, a first random number after encryption processing, and a first parameter set;
- the second random number is obtained by the network authentication server using the second layer key to encrypt the second random number
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the second layer key After verifying that the second message verification code is passed, according to the first random number, the second random number, and the first At least one of the two parameter sets, and the second layer key generates a communication key of the terminal device by using a key generation function;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the authentication request message includes a first message verification code, a first random number, and a first parameter set;
- the encrypted communication key is decrypted according to the second layer key to obtain a communication key
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the two parameter set generates a communication key of the terminal device by using a key generation function, and adopts a message according to any one of the second layer key and the communication key, and at least one of the second parameter set and the first random number.
- the verification code generating function generates a first message verification code, and sends an authentication request message to the network authentication server, where the authentication request message includes the first message verification code and the encrypted processing a random number, a first parameter set;
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a first parameter set sent by the user management server; the authentication module 1802 is specifically configured to:
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of time parameters of the second layer key;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the second layer key is the private key of the terminal device, and the public key of the terminal device corresponds to the second layer key.
- the key receiving module 1801 is further configured to: receive a public key, a first digital signature, and a second parameter set of the terminal device that are sent by the user management server; and the authentication module 1802 is specifically configured to:
- Determining the first random number encrypting the first random number by using the public key of the network authentication server, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes the public key of the terminal device a first digital signature, a first random number after the encryption process, and a second parameter set;
- the communication key of the terminal device is generated according to the communication key by using at least one of the first random number and the second random number, and the second parameter set by using a key generation function.
- generating a third digital signature sending the first message verification code or the third digital signature to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a public key and a second parameter set of the terminal device that are sent by the user management server; the authentication module 1802 is specifically configured to:
- Determining the first random number encrypting the first random number by using the public key of the network authentication server, obtaining the first random number after the encryption process, and sending an authentication request message to the network authentication server, where the authentication request message includes the public key of the terminal device And a first random number after the encryption process, and a second parameter set;
- the communication key of the terminal device is generated according to the communication key by using at least one of the first random number and the second random number, and the second parameter set by using a key generation function.
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the key receiving module 1801 is further configured to receive a public key and a second parameter set of the user management server sent by the user management server, where the public key of the user management server is the same as the terminal device The public key of the terminal device corresponding to the second layer key; the authentication module 1802 is specifically configured to:
- the second digital signature verification After the second digital signature verification is passed, generating a communication key of the terminal device according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter, according to the key generation function, according to At least one of the first random number, the second random number, and the second parameter set, and the communication key, the first transmission parameter, and the second transmission parameter, generate a first message verification code by using a message verification code generating function, or according to At least one of the first random number, the second random number, and the second parameter set, and the second layer key, the first transmission parameter, the second transmission parameter, generating a third digital signature, and the first message verification code or
- the third digital signature is sent to the network authentication server, so that the network authentication server verifies the first message verification code or the third digital signature;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the terminal device further includes a public key requesting module, configured to send a public key request message to the network authentication server, and the key receiving module is further configured to receive the network authentication server sent by the network authentication server.
- Public key configured to send a public key request message to the network authentication server
- the key receiving module is further configured to receive the network authentication server sent by the network authentication server. Public key.
- the authentication module 1802 is specifically configured to: perform mutual authentication with the network authentication server, according to the communication key, the second parameter set, the session key random number, the session key fresh parameter, and the preset time parameter of the session key. Any one of them uses a key generation function to generate a session key of the terminal device.
- a further aspect of the embodiments of the present invention provides a network authentication server, which is used to perform the key authentication method in the foregoing embodiment, to implement mutual authentication with the signaling interaction of the terminal device, and has the same technical features as the foregoing method embodiments. And technical effects.
- the mutual authentication process of the network authentication server includes at least an authentication method based on a symmetric key technology and an authentication method based on an identity key technology.
- FIG. 19 is a schematic structural diagram of Embodiment 1 of a network authentication server according to the present invention. As shown in Figure 19, the server includes:
- the key acquisition module 1901 is configured to receive an authentication request message sent by the terminal device, and apply for authentication.
- the request message includes a first parameter set, and sends a second key request message to the service center server, and receives a second layer key sent by the service center server, where the second key request message includes the first parameter set; or is used to receive the terminal device.
- the authentication request message is sent, the authentication request message includes a first parameter set, and sends a second key request message to the service center server, and receives the first layer key sent by the service center server, and according to the first layer key and the first parameter a set, using a key generation function to generate a second layer key of the terminal device;
- the authentication module 1902 is configured to perform mutual authentication with the terminal device according to the second layer key to obtain a communication key of the terminal device and the function network element.
- the first parameter set includes a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, a service parameter, a key random number of the second layer key, and a fresh parameter of the second layer key. At least one of the time parameters of the second layer key.
- the authentication mode of the authentication module 1902 includes the following possible implementation manners:
- the authentication request message further includes the first random number after the encryption process, and the authentication module 1902 is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the authentication module 1902 is specifically configured to:
- Determining a second random number generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number, the second random number, the second parameter set, and the second layer key, according to the communication a key, a second layer key, and a first random number, a second random number, a second parameter set generates a second message verification code, and sends the second random number and the second message verification code To the terminal equipment;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number
- the authentication module 1902 is specifically configured to:
- Determining a second random number generating a communication key of the network authentication server according to the key random number, encrypting the communication key by using the second layer key, and obtaining the encrypted communication key, according to the communication key, the second Any one of the layer keys, and the first random number, the second random number, the second parameter set generates a second message verification code, and the second random number, the encrypted processed communication key, and the second message verification Code, sent to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first transmission parameter and a first random number
- the authentication module 1902 is specifically configured to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process
- the authentication module 1902 is specifically configured to:
- the key generation function is used to generate the communication of the network authentication server.
- the key generates a second message verification code according to any one of the communication key and the layer 2 key, and at least one of the first random number, the second random number, and the second parameter set, and the encryption process is performed.
- the second random number and the second message verification code are sent to the terminal device, and the communication key is sent to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module 1902 is specifically configured to:
- Determining a second random number after verifying that the first message verification code is passed, using a key generation function according to at least one of the first random number, the second random number, the second parameter set, and the second layer key Generating a communication key of the network authentication server, and generating a second message according to any one of the communication key and the second layer key, and at least one of the first random number, the second random number, and the second parameter set a verification code, sending the encrypted second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module 1902 is specifically configured to:
- Determining a second random number after verifying that the first message verification code is passed, according to the key random number Generating a communication key of the network authentication server, encrypting the communication key by using the second layer key, and obtaining the encrypted communication key, according to any one of the communication key and the second layer key, and Generating, by the at least one of the first random number, the second random number, and the second parameter set, a second message verification code, and transmitting the second random number, the encrypted communication key, and the second message verification code to the terminal device And sending a communication key to the functional network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number after the encryption process
- the authentication module 1902 is specifically configured to:
- the key generation function is used to generate the communication key of the terminal device, according to the communication secret Any one of a key, a second layer key, and at least one of the first random number, the second random number, and the second parameter set to generate a second message verification code, and the second random number after the encryption process And sending a second message verification code to the terminal device, and sending a communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code and a first random number
- the authentication module 1902 is specifically configured to:
- Determining a second random number after verifying that the first message verification code is passed, generating a communication density of the terminal device according to at least one of the first random number and the second parameter set, and using the key generation function by the second layer key Key, generating a second message verification code according to any one of a communication key, a second layer key, and at least one of the first random number, the second random number, and the second parameter set, and the second random And the second message verification code is sent to the terminal device, and sends a communication key to the function network element;
- the second parameter set includes a user identifier of the user management server and a setting of the terminal device. At least one of a backup identifier, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first message verification code, a first transmission parameter, and a first random number
- the authentication module 1902 is specifically configured to:
- the communication key of the network authentication server is generated by using a key generation function according to at least one of the first random number, the second random number, and the second parameter set, and the third transmission parameter. And generating, according to any one of the communication key and the second layer key, and the first random number, the second random number, the first transmission parameter, the second transmission parameter, and the second parameter set a message verification code, sending the second random number and the second message verification code to the terminal device, and sending the communication key to the function network element;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- FIG. 20 is a schematic structural diagram of Embodiment 2 of a network authentication server according to the present invention. As shown in FIG. 20, the network authentication server includes:
- the public key obtaining module 2001 is configured to receive an authentication request message sent by the terminal device, where the authentication request message includes a public key of the terminal device;
- the authentication module 2002 is configured to perform mutual authentication with the terminal device according to the public key of the terminal device, the public key of the network authentication server, and the private key of the network authentication server to obtain a communication key of the terminal device and the function network element.
- the authentication mode of the authentication module 2002 includes the following possible implementation manners:
- the authentication request message further includes a first digital signature, a first random number after the encryption process, and a second parameter set; the authentication module 2002 is specifically configured to:
- the first digital signature After verifying the first digital signature, according to at least one of the first random number, the second random number, and the second parameter set, generating a communication key of the network authentication server by using a key generation function, according to the network authentication server
- the private key, the first random number, the second random number, and the second parameter set generate a second digital signature, and send the second digital signature and the encrypted second random number to the terminal device;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number and a second parameter set after the encryption process; the authentication module 2002 is specifically configured to:
- Generating a communication key of the network authentication server by using a key generation function according to at least one of the first random number and the second random number, and the second parameter set, according to the private key of the network authentication server, the first random number, and the first Generating a second digital signature by the second random number and the second parameter set, and transmitting the encrypted second random number and the second digital signature to the device terminal;
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the authentication request message further includes a first random number, a first transmission parameter, and a second parameter set;
- the public key of the user management server is a terminal device corresponding to the second layer key of the terminal device.
- Public key; the authentication module 2002 is specifically used to:
- the second parameter set includes at least one of a user identifier of the user management server, a device identifier of the terminal device, a network identifier of the user management server, and a service parameter.
- the server further includes a public key request receiving module, configured to receive a public key request message sent by the terminal device, and a public key sending module, configured to send the network authentication server to the terminal device.
- Public key configured to send the network authentication server to the terminal device.
- the authentication module 1902 or the authentication module 2002 is further configured to perform mutual authentication with the terminal device according to the symmetric key technology and the identity key technology-based authentication mode, according to the communication key, the second parameter set, Any one of a session key random number, a session key fresh parameter, and a session key preset time parameter, the key generation function is used to generate a session key of the network authentication server, and the session key is sent to the function network element. .
- the terminal device shown in FIG. 18 and the network authentication server shown in FIG. 20 may also be used to perform the sixth to thirteenth possible authentication implementations as shown in FIGS. 8 to 15.
- a still further aspect of the embodiments of the present invention provides a storage medium, which is a computer readable storage medium, storing one or more programs, and the one or more programs include instructions that are executed by an electronic device that includes a plurality of applications. The method of causing the electronic device to perform the key distribution method embodiment of any of the above-described service center servers.
- a still further aspect of the embodiments of the present invention provides a storage medium, which is a computer readable storage medium, storing one or more programs, and the one or more programs include instructions that are executed by an electronic device that includes a plurality of applications.
- the electronic device is caused to perform the method described in the embodiment of the key distribution method of any of the user management servers described above.
- a still further aspect of the embodiments of the present invention provides a storage medium, which is a computer readable storage medium, storing one or more programs, and the one or more programs include instructions that are executed by an electronic device that includes a plurality of applications. Enabling the electronic device to perform any of the above terminal settings The method described in the embodiment of the key authentication method.
- a still further aspect of the embodiments of the present invention provides a storage medium, which is a computer readable storage medium, storing one or more programs, and the one or more programs include instructions that are executed by an electronic device that includes a plurality of applications. In time, the electronic device is caused to execute the method described in the embodiment of the key authentication method of any of the above network authentication servers.
- a further aspect of the present invention provides a key distribution and authentication system for performing the key distribution and authentication method in the foregoing embodiments, which has the same technical features and technical effects.
- the system includes the service center server according to any one of the preceding embodiments, the user management server according to any one of the foregoing embodiments, the terminal device according to any one of the foregoing embodiments, or any one of the foregoing embodiments.
- Network authentication server The system includes the service center server according to any one of the preceding embodiments, the user management server according to any one of the foregoing embodiments, the terminal device according to any one of the foregoing embodiments, or any one of the foregoing embodiments.
- Network authentication server includes the service center server according to any one of the preceding embodiments, the user management server according to any one of the foregoing embodiments, the terminal device according to any one of the foregoing embodiments, or any one of the foregoing embodiments.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
- the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
- the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (89)
- 一种密钥分发方法,其特征在于,包括:用户管理服务器向业务中心服务器发送第一密钥请求消息,所述第一密钥请求消息用于指示所述业务中心服务器生成所述用户管理服务器的第一层密钥,所述第一密钥请求消息包含所述用户管理服务器的用户标识;所述用户管理服务器接收所述业务中心服务器发送的所述用户管理服务器的第一层密钥;所述用户管理服务器根据所述第一层密钥生成终端设备的第二层密钥,并将所述第二层密钥发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥。
- 根据权利要求1所述的方法,其特征在于,所述用户管理服务器根据所述第一层密钥生成终端设备的第二层密钥,包括:所述用户管理服务器根据所述第一层密钥和第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥;所述方法还包括:所述用户管理服务器将所述第一参数集合发送给所述终端设备;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 根据权利要求1所述的方法,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述用户管理服务器根据所述第一层密钥生成终端设备的第二层密钥,包括:所述用户管理服务器根据所述用户管理服务器的私钥和第一参数集合,生成所述终端设备的第二层密钥和所述终端设备的公钥,所述第二层密钥为与所述终端设备的公钥对应的所述终端设备的私钥;所述方法还包括:所述用户管理服务器根据所述第一层密钥、所述终端设备的公钥,以 及所述第一参数集合生成第一数字签名;所述用户管理服务器将所述终端设备的公钥、所述第一数字签名,以及第二参数集合发送给所述终端设备;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求1所述的方法,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述用户管理服务器根据所述第一层密钥生成终端设备的第二层密钥,包括:所述用户管理服务器根据所述用户管理服务器的私钥和所述终端设备的设备标识,基于设备身份生成算法生成终端设备的第二层密钥,所述第二层密钥为所述终端设备的私钥;所述方法还包括:所述用户管理服务器将第二参数集合,以及与所述终端设备的私钥对应的所述终端设备的公钥发送给所述终端设备;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求1所述的方法,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述用户管理服务器根据所述第一层密钥生成终端设备的第二层密钥,包括:所述用户管理服务器根据所述用户管理服务器的私钥,采用隐私增强的密钥技术的生成算法生成终端设备的第二层密钥,所述第二层密钥为所述终端设备的私钥;所述方法还包括:所述用户管理服务器接收所述业务中心服务器发送的所述用户管理服务器的公钥,并将所述用户管理服务器的公钥和第二参数集合发送给所 述终端设备;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 一种密钥分发方法,其特征在于,包括:业务中心服务器接收用户管理服务器发送的第一密钥请求消息,所述第一密钥请求消息用于指示所述业务中心服务器生成所述用户管理服务器的第一层密钥,所述第一密钥请求消息包含所述用户管理服务器的用户标识;所述业务中心服务器根据所述第一密钥请求消息生成所述用户标识对应的用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器。
- 根据权利要求6所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥,包括:所述业务中心服务器根据第三参数集合,采用密钥生成函数生成所述用户管理服务器的第一层密钥;其中,所述第三参数集合包括所述第一层密钥的密钥随机数、所述第一层密钥的新鲜参数、所述第一层密钥的时间参数、共享密钥中的至少一种,所述共享密钥为所述用户管理服务器与所述业务中心服务器的共享密钥;或者所述业务中心服务器确定业务随机数,并将其作为所述用户管理服务器的第一层密钥。
- 根据权利要求6所述的方法,其特征在于,所述第一密钥请求消息中还包括所述用户管理服务器的网络标识、业务参数中的至少一种,所述业务中心服务器生成所述用户管理服务器的第一层密钥,包括:所述业务中心服务器根据第四参数集合,采用密钥生成函数生成所述用户管理服务器的第一层密钥;其中,所述第四参数集合包括所述用户管理服务器的用户标识、所述用户管理服务器的网络标识、业务参数、所述第一层密钥的密钥随机数、 所述第一层密钥的新鲜参数、所述第一层密钥的时间参数、共享密钥中的至少一种,所述共享密钥为所述用户管理服务器与所述业务中心服务器的共享密钥。
- 根据权利要求6所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥,包括:所述业务中心服务器根据所述用户管理服务器的用户标识,基于身份密码系统的密钥生成算法生成所述用户管理服务器的第一层密钥,所述第一层密钥为所述用户管理服务器的私钥。
- 根据权利要求6所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥,包括:所述业务中心服务器根据所述用户管理服务器的用户标识和第五参数集合,基于身份密码系统的密钥生成算法生成所述用户管理服务器的第一层密钥,所述第一层密钥为所述用户管理服务器的私钥;其中,所述第五参数集合包括如下中的至少一种:所述第一层密钥的密钥随机数、所述第一层密钥的新鲜参数、所述第一层密钥的时间参数。
- 根据权利要求6所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥,包括:所述业务中心服务器采用隐私增强的密钥技术生成所述用户管理服务器的私钥和所述用户管理服务器的公钥,其中所述用户管理服务器的私钥为所述用户管理服务器的第一层密钥;所述方法还包括:所述业务中心服务器将所述用户管理服务器的公钥发送给所述用户管理服务器。
- 根据权利要求6至8任一项所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥之后,还包括:所述业务中心服务器接收所述网络认证服务器发送的第二密钥请求消息,所述第二密钥请求消息包含所述用户管理服务器的用户标识;所述业务中心服务器根据所述第二密钥请求消息中所述用户管理服务器的用户标识检索得到所述第一层密钥,或生成所述第一层密钥,并将 所述第一层密钥发送给所述网络认证服务器,以使所述网络认证服务器根据所述第一层密钥生成所述终端设备的第二层密钥,并根据所述第二层密钥与所述终端设备进行相互认证。
- 根据权利要求6至8任一项所述的方法,其特征在于,所述业务中心服务器生成所述用户管理服务器的第一层密钥之后,还包括:所述业务中心服务器接收所述网络认证服务器发送的第二密钥请求消息,所述第二密钥请求消息中包括第一参数集合;所述业务中心服务器根据所述第一层密钥和所述第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥,并将所述第二层密钥发送给所述网络认证服务器以使得所述网络认证服务器根据所述第二层密钥与所述终端设备进行相互认证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 一种密钥认证方法,其特征在于,包括:终端设备接收用户管理服务器发送的所述终端设备的第二层密钥;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述加密处理后的第一随机数;所述终端设备接收所述网络认证服务器发送的加密处理后的第二随机数和第二消息验证码,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网 络认证服务器采用所述第二层密钥对第二随机数加密处理得到;所述终端设备在对所述第二消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,所述第二参数集合生成第一消息验证码,并将所述第一消息验证码发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述第一随机数;所述终端设备接收所述网络认证服务器发送第二随机数和第二消息验证码;所述终端设备在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述 终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述第一随机数;所述终端设备接收所述网络认证服务器发送的第二随机数、第二消息验证码和加密处理后的通信密钥,根据所述第二层密钥对所述加密处理后的通信密钥进行解密,得到通信密钥,所述加密处理后的通信密钥为所述网络认证服务器采用所述第二层密钥对所述通信密钥加密处理得到;所述终端设备在对所述第二消息验证码验证通过后,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,以及所述第二参数集合生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数、DH协议的第一传输参数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一随机数、所述第一传输参数和所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二传输参数、第二随机数和第二消息验证码,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;所述终端设备在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、第二层密钥中的任一项,以及,所述第一随机数,所述第二随机数,第二参数集合,采用消息验证码生成函数生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述加密处理后的第一随机数、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二消息验证码和加 密处理后的第二随机数,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述第二层密钥对第二随机数加密处理得到;所述终端设备在对所述第二消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述第一随机数、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二随机数和第二消息验证码;所述终端设备在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设 备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述第一随机数、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二随机数、第二消息验证码和加密处理后的通信密钥;所述终端设备在根据所述第二随机数对所述第二消息验证码验证通过后,根据所述第二层密钥对所述加密处理后的通信密钥进行解密,得到通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,根据所述第二层密钥、所述第一随机数中的至少一项,以及第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述第二层密钥、所述通信密钥中的任一项,以及所述第二参数集合、所述第一随机数中的至少一项,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所 述认证请求消息包括所述第一消息验证码、所述加密处理后的第一随机数、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二消息验证码和加密处理后的第二随机数,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述第二层密钥对第二随机数加密处理得到,根据所述第二随机数对所述第二消息验证码进行验证并确定通过;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,根据所述第一随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥,根据所述第二层密钥、所述通信密钥中的任一项,以及所述第二参数集合、所述第一随机数中的至少一项,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述第一随机数、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二随机数和第二消息验证码,对所述第二消息验证码进行验证并确定通过;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设 备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收用户管理服务器发送的第一参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数、DH协议的第一传输参数,根据所述第二层密钥、所述第一随机数和第二参数集合,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一随机数、所述第一传输参数、所述第一消息验证码、所述第一参数集合;所述终端设备接收所述网络认证服务器发送的第二传输参数、第二随机数和第二消息验证码,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;所述终端设备在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收所述用户管理服务器发送的所述终端设备的公钥、第一数字签名,以及第二参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,采用网络认证服务器的公钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、 所述第一数字签名、所述加密处理后的第一随机数,以及所述第二参数集合;所述终端设备接收所述网络认证服务器发送的加密处理后的第二随机数和第二数字签名,根据所述终端设备的第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述终端设备的公钥对第二随机数加密处理得到;所述终端设备在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第一消息验证码,或者根据所述第二层密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第三数字签名,将所述第一消息验证码或所述第三数字签名发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收所述用户管理服务器发送的所述终端设备的公钥和第二参数集合;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数,采用网络认证服务器的公钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、所述加密处理后的第一随机数,以及所述第二参数集合;所述终端设备接收所述网络认证服务器发送的加密处理后的第二随机数和第二数字签名,根据所述终端设备的所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随 机数为所述网络认证服务器采用所述终端设备的公钥对第二随机数加密处理得到;所述终端设备在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第一消息验证码,或者根据所述第二层密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第三数字签名,将所述第一消息验证码或所述第三数字签名发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述终端设备接收所述用户管理服务器发送的所述用户管理服务器的公钥和第二参数集合,所述用户管理服务器的公钥为与所述终端设备的第二层密钥对应的所述终端设备的公钥;所述终端设备根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥,包括:所述终端设备确定第一随机数、DH协议的第一传输参数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、所述第一随机数、所述第一传输参数和所述第二参数集合;所述终端设备接收所述网络认证服务器发送的第二传输参数、第二随机数和第二数字签名,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;所述终端设备在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述终端设备的通信密钥,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述通信密钥,所述第一传输参数,所述第二传输参数,采用消息验证码生成函数 生成第一消息验证码,或者根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第二层密钥,所述第一传输参数,所述第二传输参数,生成第三数字签名,将所述第一消息验证码或所述第三数字签名,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求25至27任一项所述的方法,其特征在于,所述终端设备确定第一随机数之前,还包括:所述终端设备向所述网络认证服务器发送公钥请求消息;所述终端设备接收所述网络认证服务器发送的所述网络认证服务器的公钥。
- 一种密钥认证方法,其特征在于,包括:网络认证服务器接收终端设备发送的认证请求消息,所述认证请求消息包括第一参数集合,向业务中心服务器发送第二密钥请求消息,接收业务中心服务器发送的第二层密钥,所述第二密钥请求消息包括第一参数集合;或者网络认证服务器接收终端设备发送的认证请求消息,所述认证请求消息包括第一参数集合,向业务中心服务器发送第二密钥请求消息,接收业务中心服务器发送的第一层密钥,所述网络认证服务器根据所述第一层密钥和第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥;所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括加密处理后的第一随机数,所述网络认证服务器根据所述第二层密 钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;所述网络认证服务器根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,所述第二参数集合生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第二消息验证码,并将所述第二随机数、所述第二消息验证码,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述 终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数,根据密钥随机数生成所述网络认证服务器的通信密钥,采用所述第二层密钥对所述通信密钥进行加密处理,得到加密处理后的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第二消息验证码,并将所述第二随机数、所述加密处理后的通信密钥和所述第二消息验证码,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一传输参数和第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;所述网络认证服务器根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、第二层密钥中的任一项,以及,所述第一传输参数,所述第二传输参数,第二参数集合生成第二消息验证码,将所述第二随机数和所述第二消息验证码,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码,在对 所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码和加密处理后的第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;所述网络认证服务器在对所述第一消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数,在对所述第一消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述网络认证服务器 的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数,在对所述第一消息验证码验证通过后,根据密钥随机数生成所述网络认证服务器的通信密钥,采用所述第二层密钥对所述通信密钥进行加密处理,得到加密处理后的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、第二参数集合中的至少一项生成第二消息验证码,将所述第二随机数、所述加密处理后的通信密钥和所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码和加密处理后的第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;所述网络认证服务器在对所述第一消息验证码验证通过后,根据所述第二层密钥、所述第一随机数中的至少一项,以及第二参数集合,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数,在对所述第一消息验证码验证通过后,根据所述第一随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求29所述的方法,其特征在于,所述认证请求消息还包括第一消息验证码、第一传输参数和第一随机数,所述网络认证服务器根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三 传输参数;所述网络认证服务器在对所述第一消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第一传输参数、所述第二传输参数、所述第二参数集合中的任一项生成第二消息验证码,将所述第二随机数和所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 一种密钥认证方法,其特征在于,包括:网络认证服务器接收终端设备发送的认证请求消息,所述认证请求消息包括所述终端设备的公钥;所述网络认证服务器根据所述终端设备的公钥、所述网络认证服务器的公钥和所述网络认证服务器的私钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥。
- 根据权利要求40所述的方法,其特征在于,所述认证请求消息还包括第一数字签名、加密处理后的第一随机数和第二参数集合;所述网络认证服务器根据所述终端设备的公钥、所述网络认证服务器的公钥和所述网络认证服务器的私钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器根据所述网络认证服务器的私钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述终端设备的公钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述网络认证服务器的公钥对第一随机数加密处理得到;所述网络认证服务器在对所述第一数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述网络认证服 务器的私钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第二数字签名,将所述第二数字签名和所述加密处理后的第二随机数,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码或所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求40所述的方法,其特征在于,所述认证请求消息还包括加密处理后的第一随机数和第二参数集合;所述网络认证服务器根据所述终端设备的公钥、所述网络认证服务器的公钥和所述网络认证服务器的私钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器根据所述网络认证服务器的私钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述终端设备的公钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述网络认证服务器的公钥对第一随机数加密处理得到;所述网络认证服务器根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述网络认证服务器的私钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第二数字签名,将所述加密处理后的第二随机数、所述第二数字签名,发送给所述设备终端;所述网络认证服务器接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码或所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求40所述的方法,其特征在于,所述认证请求消息还包括第一随机数、第一传输参数和第二参数集合;所述网络认证服务器根据所述终端设备的公钥、所述网络认证服务器的公钥和所述网络认证服务器的私钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥,包括:所述网络认证服务器确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;所述网络认证服务器根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述网络认证服务器的私钥,所述第一传输参数,所述第二传输参数,生成第二数字签名,将所述第二随机数、所述第二传输参数和所述第二数字签名,发送给所述终端设备;所述网络认证服务器接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码验证通过后,或根据所述终端设备的公钥对所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求40至43任一项所述的方法,其特征在于,所述方法还包括:网络认证服务器接收所述终端设备发送的公钥请求消息;所述网络认证服务器向所述终端设备发送所述网络认证服务器的公钥。
- 一种用户管理服务器,其特征在于,包括:请求发送模块,用于向业务中心服务器发送第一密钥请求消息,所述第一密钥请求消息用于指示所述业务中心服务器生成用户管理服务器的第一层密钥,所述第一密钥请求消息包含所述用户管理服务器的用户标 识;密钥接收模块,用于接收所述业务中心服务器发送的所述用户管理服务器的第一层密钥;密钥生成分发模块,用于根据所述第一层密钥生成终端设备的第二层密钥,并将所述第二层密钥发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥。
- 根据权利要求45所述的服务器,其特征在于,所述密钥生成分发模块具体用于:根据所述第一层密钥和第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥,并将所述第二层密钥和所述第一参数集合发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证获取所述终端设备与功能网元的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 根据权利要求45所述的服务器,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述密钥生成分发模块具体用于:根据所述用户管理服务器的私钥和第一参数集合,生成所述终端设备的第二层密钥和所述终端设备的公钥,所述第二层密钥为与所述终端设备的公钥对应的所述终端设备的私钥;根据所述第一层密钥、所述终端设备的公钥,以及所述第一参数集合生成第一数字签名;将所述终端设备的公钥、所述第二层密钥、所述第一数字签名,以及所述第二参数集合发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证获取所述终端设备与功能网元的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述 第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求45所述的服务器,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述密钥生成分发模块具体用于:根据所述用户管理服务器的私钥和所述终端设备的设备标识,基于设备身份生成算法生成终端设备的第二层密钥,所述第二层密钥为所述终端设备的私钥;将第二参数集合、所述第二层密钥以及与所述终端设备的私钥对应的所述终端设备的公钥发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证获取所述终端设备与功能网元的通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求45所述的服务器,其特征在于,所述第一层密钥为所述用户管理服务器的私钥,所述密钥接收模块还用于接收所述业务中心服务器发送的所述用户管理服务器的公钥;所述密钥生成分发模块具体用于:根据所述用户管理服务器的私钥,采用隐私增强的密钥技术的生成算法生成终端设备的第二层密钥,所述第二层密钥为所述终端设备的私钥;将所述用户管理服务器的公钥、所述第二层密钥和第二参数集合发送给所述终端设备,以使所述终端设备通过所述第二层密钥,与网络认证服务器进行相互认证获取所述终端设备与功能网元的通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 一种业务中心服务器,其特征在于,包括:密钥请求接收模块,用于接收用户管理服务器发送的第一密钥请求消 息,所述第一密钥请求消息用于指示所述业务中心服务器生成所述用户管理服务器的第一层密钥,所述第一密钥请求消息包含所述用户管理服务器的用户标识;密钥生成分发模块,用于根据所述第一密钥请求消息生成所述用户标识对应的用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器。
- 根据权利要求50所述的服务器,其特征在于,所述密钥生成分发模块具体用于:根据第三参数集合,采用密钥生成函数生成所述用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器;其中,所述第三参数集合包括所述第一层密钥的密钥随机数、所述第一层密钥的新鲜参数、所述第一层密钥的时间参数、共享密钥中的至少一种,所述共享密钥为所述用户管理服务器与所述业务中心服务器的共享密钥;或者确定业务随机数,并将其作为所述用户管理服务器的第一层密钥,将所述第一层密钥发送给所述用户管理服务器。
- 根据权利要求50所述的服务器,其特征在于,所述第一密钥请求消息中还包括所述用户管理服务器的网络标识、业务参数中的至少一种,所述密钥生成分发模块具体用于:根据第四参数集合,采用密钥生成函数生成所述用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器;其中,所述第四参数集合包括所述用户管理服务器的用户标识、所述用户管理服务器的网络标识、业务参数、所述第一层密钥的密钥随机数、所述第一层密钥的新鲜参数、所述第一层密钥的时间参数、共享密钥中的至少一种,所述共享密钥为所述用户管理服务器与所述业务中心服务器的共享密钥。
- 根据权利要求50所述的服务器,其特征在于,所述密钥生成分发模块具体用于:根据所述用户管理服务器的用户标识,基于身份密码系统的密钥生成 算法生成所述用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器,所述第一层密钥为所述用户管理服务器的私钥。
- 根据权利要求50所述的服务器,其特征在于,所述密钥生成分发模块具体用于:根据所述用户管理服务器的用户标识和第五参数集合,基于身份密码系统的密钥生成算法生成所述用户管理服务器的第一层密钥,并将所述第一层密钥发送给所述用户管理服务器,所述第一层密钥为所述用户管理服务器的私钥;其中,所述第五参数集合包括如下中的至少一种:所述第一层密钥的密钥随机数、所述第一层密钥的新鲜参数、所述第一层密钥的时间参数。
- 根据权利要求50所述的服务器,其特征在于,所述密钥生成分发模块具体用于:采用隐私增强的密钥技术生成所述用户管理服务器的私钥和所述用户管理服务器的公钥,其中所述用户管理服务器的私钥为所述用户管理服务器的第一层密钥,并将所述第一层密钥和所述用户管理服务器的公钥发送给所述用户管理服务器。
- 根据权利要求50至52任一项所述的服务器,其特征在于,所述密钥请求接收模块还用于,接收所述网络认证服务器发送的第二密钥请求消息,所述第二密钥请求消息包含所述用户管理服务器的用户标识;所述密钥生成分发模块还用于,根据所述第二密钥请求消息中所述用户管理服务器的用户标识检索得到第一层密钥,或生成第一层密钥,并将所述第一层密钥发送给所述网络认证服务器,以使所述网络认证服务器根据所述第一层密钥生成所述终端设备的第二层密钥,并根据所述第二层密钥与所述终端设备进行相互认证。
- 根据权利要求50至52任一项所述的服务器,其特征在于,所述密钥请求接收模块还用于,接收所述网络认证服务器发送的第二密钥请求消息,所述第二密钥请求消息中包括第一参数集合;所述密钥生成分发模块还用于,根据所述第一层密钥和所述第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥,并将所述第二 层密钥发送给所述网络认证服务器以使得所述网络认证服务器根据所述第二层密钥与所述终端设备进行相互认证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 一种终端设备,其特征在于,包括:密钥接收模块,用于接收用户管理服务器发送的所述终端设备的第二层密钥;认证模块,用于根据所述第二层密钥,与网络认证服务器进行相互认证以获取所述终端设备与功能网元的通信密钥。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述加密处理后的第一随机数;接收所述网络认证服务器发送的加密处理后的第二随机数和第二消息验证码,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述第二层密钥对第二随机数加密处理得到;在对所述第二消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,所述第二参数集合生成第一消息验证码,并将所述第一消息验证码发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥 的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述第一随机数;接收所述网络认证服务器发送第二随机数和第二消息验证码;在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一参数集合和所述第一随机数;接收所述网络认证服务器发送的第二随机数、第二消息验证码和加密处理后的通信密钥,根据所述第二层密钥对所述加密处理后的通信密钥进行解密,得到通信密钥,所述加密处理后的通信密钥为所述网络认证服务器采用所述第二层密钥对所述通信密钥加密处理得到;在对所述第二消息验证码验证通过后,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,以及所述第二参数集合生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数、DH协议的第一传输参数,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一随机数、所述第一传输参数和所述第一参数集合;接收所述网络认证服务器发送的第二传输参数、第二随机数和第二消息验证码,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、第二层密钥中的任一项,以及,所述第一随机数,所述第二随机数,第二参数集合,采用消息验证码生成函数生成第一消息验证码,并将所述第一消息验证码,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码进行验证;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥 的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述加密处理后的第一随机数、所述第一参数集合;接收所述网络认证服务器发送的第二消息验证码和加密处理后的第二随机数,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述第二层密钥对第二随机数加密处理得到;在对所述第二消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验 证码、所述第一随机数、所述第一参数集合;备接收所述网络认证服务器发送的第二随机数和第二消息验证码;在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,根据第二参数集合、所述第一随机数中的至少一项,以及所述第二层密钥采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述第一随机数、所述第一参数集合;接收所述网络认证服务器发送的第二随机数、第二消息验证码和加密处理后的通信密钥;在根据所述第二随机数对所述第二消息验证码验证通过后,根据所述第二层密钥对所述加密处理后的通信密钥进行解密,得到通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,采用第二层密钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,根据所述第二层密钥、所述第一随机数中的至少一项,以及第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述第二层密钥、所述通信密钥中的任一项,以及所述第二参数集合、所述第一随机数中的至少一项,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述加密处理后的第一随机数、所述第一参数集合;接收所述网络认证服务器发送的第二消息验证码和加密处理后的第二随机数,根据所述第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述第二层密钥对第二随机数加密处理得到,根据所述第二随机数对所述第二消息验证码进行验证并确定通过;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数,根据所述第一随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥,根据所述第二层密钥、所述通信密钥中的任一项,以及所述第二参数集合、所述第一随机数中的至少一项,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一消息验证码、所述第一随机数、所述第一参数集合;接收所述网络认证服务器发送的第二随机数和第二消息验证码,对所 述第二消息验证码进行验证并确定通过;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收用户管理服务器发送的第一参数集合;所述认证模块具体用于:确定第一随机数、DH协议的第一传输参数,根据所述第二层密钥、所述第一随机数和第二参数集合,采用消息验证码生成函数生成第一消息验证码,向网络认证服务器发送认证请求消息,所述认证请求消息包括所述第一随机数、所述第一传输参数、所述第一消息验证码、所述第一参数集合;接收所述网络认证服务器发送的第二传输参数、第二随机数和第二消息验证码,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;在对所述第二消息验证码验证通过后,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述终端设备的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种;所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收所述用户管理服务器发送的所述终端设备的公钥、第一数字签名,以及第二参数集合;所述认证模块具体用于:确定第一随机数,采用网络认证服务器的公钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、所述第一数字签名、所述加密处理后的第一随机数,以及所述第二参数集合;接收所述网络认证服务器发送的加密处理后的第二随机数和第二数字签名,根据所述终端设备的第二层密钥对所述加密处理后的第二随机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述终端设备的公钥对第二随机数加密处理得到;在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第一消息验证码,或者根据所述第二层密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第三数字签名,将所述第一消息验证码或所述第三数字签名发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收所述用户管理服务器发送的所述终端设备的公钥和第二参数集合;所述认证模块具体用于:确定第一随机数,采用网络认证服务器的公钥对所述第一随机数进行加密处理,得到加密处理后的第一随机数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、所述加密处理后的第一随机数,以及所述第二参数集合;接收所述网络认证服务器发送的加密处理后的第二随机数和第二数字签名,根据所述终端设备的所述第二层密钥对所述加密处理后的第二随 机数进行解密,得到第二随机数,所述加密处理后的第二随机数为所述网络认证服务器采用所述终端设备的公钥对第二随机数加密处理得到;在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第一消息验证码,或者根据所述第二层密钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第三数字签名,将所述第一消息验证码或所述第三数字签名发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求58所述的终端设备,其特征在于,所述密钥接收模块还用于,接收所述用户管理服务器发送的所述用户管理服务器的公钥和第二参数集合,所述用户管理服务器的公钥为与所述终端设备的第二层密钥对应的所述终端设备的公钥;所述认证模块具体用于:确定第一随机数、DH协议的第一传输参数,向所述网络认证服务器发送认证请求消息,所述认证请求消息包括所述终端设备的公钥、所述第一随机数、所述第一传输参数和所述第二参数集合;接收所述网络认证服务器发送的第二传输参数、第二随机数和第二数字签名,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;在对所述第二数字签名验证通过后,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述终端设备的通信密钥,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述通信密钥,所述第一传输参数,所述第二传输参数,采用消息验证码生成函数生成第一消息验证码,或者根据所述第一随机数、所述第二随机数、所述第二参数集合 中的至少一项,以及所述第二层密钥,所述第一传输参数,所述第二传输参数,生成第三数字签名,将所述第一消息验证码或所述第三数字签名,发送给所述网络认证服务器,以使所述网络认证服务器对所述第一消息验证码或所述第三数字签名进行验证;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求69至71任一项所述的终端设备,其特征在于,还包括公钥请求模块,用于向所述网络认证服务器发送公钥请求消息;所述密钥接收模块,还用于接收所述网络认证服务器发送的所述网络认证服务器的公钥。
- 一种网络认证服务器,其特征在于,包括:密钥获取模块,用于接收终端设备发送的认证请求消息,所述认证请求消息包括第一参数集合,向业务中心服务器发送第二密钥请求消息,接收业务中心服务器发送的第二层密钥,所述第二密钥请求消息包括第一参数集合;或者用于接收终端设备发送的认证请求消息,所述认证请求消息包括第一参数集合,向业务中心服务器发送第二密钥请求消息,接收业务中心服务器发送的第一层密钥,并根据所述第一层密钥和所述第一参数集合,采用密钥生成函数生成所述终端设备的第二层密钥;认证模块,用于根据所述第二层密钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥;其中,所述第一参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数、所述第二层密钥的密钥随机数、所述第二层密钥的新鲜参数、所述第二层密钥的时间参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括加密处理后的第一随机数,所述认证模块具体用于:根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机 数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,所述第二参数集合生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备;接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一随机数,所述认证模块具体用于:确定第二随机数,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第二消息验证码,并将所述第二随机数、所述第二消息验证码,发送给所述终端设备;接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一随机数,所述认证模块具体用于:确定第二随机数,根据密钥随机数生成所述网络认证服务器的通信密钥,采用所述第二层密钥对所述通信密钥进行加密处理,得到加密处理后的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及所述第一随机数,所述第二随机数,第二参数集合生成第二消息验证码,并将 所述第二随机数、所述加密处理后的通信密钥和所述第二消息验证码,发送给所述终端设备;接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一传输参数和第一随机数,所述认证模块具体用于:确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、第二层密钥中的任一项,以及,所述第一传输参数,所述第二传输参数,第二参数集合生成第二消息验证码,将所述第二随机数和所述第二消息验证码,发送给所述终端设备;接收所述终端设备发送的第一消息验证码,在对所述第一消息验证码验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一消息验证码和加密处理后的第一随机数,所述认证模块具体用于:根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;在对所述第一消息验证码验证通过后,根据所述第二层密钥、所述第一随机数、所述第二随机数中的至少一项,以及第二参数集合,采用密钥 生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述认证模块具体用于:确定第二随机数,在对所述第一消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第二层密钥,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述认证模块具体用于:确定第二随机数,在对所述第一消息验证码验证通过后,根据密钥随机数生成所述网络认证服务器的通信密钥,采用所述第二层密钥对所述通信密钥进行加密处理,得到加密处理后的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、第二参数集合中的至少一项生成第二消息验证码,将所述第二随机数、所述加密处理后的通信密钥和所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述 终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一消息验证码和加密处理后的第一随机数,所述认证模块具体用于:根据所述第二层密钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述第二层密钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述第二层密钥对第一随机数加密处理得到;在对所述第一消息验证码验证通过后,根据所述第二层密钥、所述第一随机数中的至少一项,以及第二参数集合,采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述加密处理后的第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消息还包括第一消息验证码和第一随机数,所述认证模块具体用于:确定第二随机数,在对所述第一消息验证码验证通过后,根据所述第一随机数、第二参数集合中的至少一项,以及所述第二层密钥采用密钥生成函数生成所述终端设备的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项生成第二消息验证码,将所述第二随机数、所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求73所述的服务器,其特征在于,所述认证请求消 息还包括第一消息验证码、第一传输参数和第一随机数,所述认证模块具体用于:确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;在对所述第一消息验证码验证通过后,根据所述第一随机数、所述第二随机数、第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述通信密钥、所述第二层密钥中的任一项,以及,所述第一随机数、所述第二随机数、所述第一传输参数、所述第二传输参数、所述第二参数集合中的任一项生成第二消息验证码,将所述第二随机数和所述第二消息验证码,发送给所述终端设备,并向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 一种网络认证服务器,其特征在于,包括:公钥获取模块,用于接收终端设备发送的认证请求消息,所述认证请求消息包括所述终端设备的公钥;认证模块,用于根据所述终端设备的公钥、所述网络认证服务器的公钥和所述网络认证服务器的私钥,与所述终端设备进行相互认证以获得所述终端设备与功能网元的通信密钥。
- 根据权利要求84所述的服务器,其特征在于,所述认证请求消息还包括第一数字签名、加密处理后的第一随机数和第二参数集合;所述认证模块具体用于:根据所述网络认证服务器的私钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述终端设备的公钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述网络认证服务器的公钥对第一随机数加密处理得到;在对所述第一数字签名验证通过后,根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所 述网络认证服务器的通信密钥,根据所述网络认证服务器的私钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第二数字签名,将所述第二数字签名和所述加密处理后的第二随机数,发送给所述终端设备;接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码或所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求84所述的服务器,其特征在于,所述认证请求消息还包括加密处理后的第一随机数和第二参数集合;所述认证模块具体用于:根据所述网络认证服务器的私钥对所述加密处理后的第一随机数进行解密,得到第一随机数,确定第二随机数,采用所述终端设备的公钥对所述第二随机数进行加密处理,得到加密处理后的第二随机数,所述加密处理后的第一随机数为所述终端设备采用所述网络认证服务器的公钥对第一随机数加密处理得到;根据所述第一随机数、所述第二随机数中的至少一项,以及所述第二参数集合,采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述网络认证服务器的私钥、所述第一随机数、所述第二随机数和所述第二参数集合生成第二数字签名,将所述加密处理后的第二随机数、所述第二数字签名,发送给所述设备终端;接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码或所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求84所述的服务器,其特征在于,所述认证请求消息还包括第一随机数、第一传输参数和第二参数集合;所述认证模块具体 用于:确定第二随机数、DH协议的第二传输参数,根据所述第一传输参数和所述第二传输参数执行DH密钥协商算法得到第三传输参数;根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述第三传输参数采用密钥生成函数生成所述网络认证服务器的通信密钥,根据所述第一随机数、所述第二随机数、所述第二参数集合中的至少一项,以及所述网络认证服务器的私钥,所述第一传输参数,所述第二传输参数,生成第二数字签名,将所述第二随机数、所述第二传输参数和所述第二数字签名,发送给所述终端设备;接收所述终端设备发送的第一消息验证码或第三数字签名,在对所述第一消息验证码验证通过后,或根据所述终端设备的公钥对所述第三数字签名验证通过后,向所述功能网元发送所述通信密钥;其中,所述第二参数集合包括所述用户管理服务器的用户标识、所述终端设备的设备标识、所述用户管理服务器的网络标识、业务参数中的至少一种。
- 根据权利要求84至87任一项所述的服务器,其特征在于,还包括公钥请求接收模块,用于接收所述终端设备发送的公钥请求消息;公钥发送模块,用于向所述终端设备发送所述网络认证服务器的公钥。
- 一种密钥分发、认证系统,其特征在于,包括:如权利要求45至49中任一项所述的用户管理服务器、如权利要求50至57中任一项所述的业务中心服务器、如权利要求58至72中任一项所述的终端设备、如权利要求73至88中任一项所述的网络认证服务器。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2018556317A JP6641029B2 (ja) | 2016-04-27 | 2016-10-26 | キー配信および認証方法およびシステム、ならびに装置 |
EP16900200.3A EP3432532B1 (en) | 2016-04-27 | 2016-10-26 | Key distribution and authentication method, apparatus and system |
US16/171,235 US20190068591A1 (en) | 2016-04-27 | 2018-10-25 | Key Distribution And Authentication Method And System, And Apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610268327.6 | 2016-04-27 | ||
CN201610268327.6A CN107317789B (zh) | 2016-04-27 | 2016-04-27 | 密钥分发、认证方法,装置及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/171,235 Continuation US20190068591A1 (en) | 2016-04-27 | 2018-10-25 | Key Distribution And Authentication Method And System, And Apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017185692A1 true WO2017185692A1 (zh) | 2017-11-02 |
Family
ID=60160692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/103334 WO2017185692A1 (zh) | 2016-04-27 | 2016-10-26 | 密钥分发、认证方法,装置及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20190068591A1 (zh) |
EP (1) | EP3432532B1 (zh) |
JP (1) | JP6641029B2 (zh) |
CN (1) | CN107317789B (zh) |
WO (1) | WO2017185692A1 (zh) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108062107A (zh) * | 2017-11-30 | 2018-05-22 | 中国航空工业集团公司沈阳飞机设计研究所 | 一种无人机控制权变更方法 |
CN109862560B (zh) * | 2017-11-30 | 2022-06-14 | 阿里巴巴集团控股有限公司 | 一种蓝牙认证方法、装置、设备和介质 |
CN107948183B (zh) * | 2017-12-06 | 2021-02-02 | 深圳数字电视国家工程实验室股份有限公司 | 一种适用于物联网的密钥分配方法及系统 |
CN110035033B (zh) | 2018-01-11 | 2022-11-25 | 华为技术有限公司 | 密钥分发方法、装置及系统 |
CN110120927B (zh) * | 2018-02-05 | 2022-03-25 | 华为技术有限公司 | 私钥生成的方法和设备 |
CN108537548B (zh) * | 2018-04-16 | 2020-11-27 | 北京知道创宇信息技术股份有限公司 | Nfc密钥卡配置方法、装置及nfc密钥卡配置设备 |
CN108616533B (zh) * | 2018-04-27 | 2021-02-19 | 正方软件股份有限公司 | 敏感数据加密方法及装置 |
CN108616354B (zh) * | 2018-04-27 | 2021-10-26 | 北京信息科技大学 | 一种移动通信中密钥协商方法和设备 |
CN108737431B (zh) * | 2018-05-28 | 2020-09-15 | 深圳职业技术学院 | IoT场景下基于混淆的分等级分布式认证方法、装置及系统 |
CN108718313A (zh) * | 2018-05-31 | 2018-10-30 | 深圳市文鼎创数据科技有限公司 | 应用软件数据安全使用方法、终端设备及服务器 |
US11005971B2 (en) * | 2018-08-02 | 2021-05-11 | Paul Swengler | System and method for user device authentication or identity validation without passwords or matching tokens |
CN109410396B (zh) * | 2018-10-14 | 2021-01-01 | 浙江鸿利锁业有限公司 | 一种智能锁数据加密传输方法以及应用其的租赁设备 |
CN111435913B (zh) * | 2019-01-14 | 2022-04-08 | 海信集团有限公司 | 一种物联网终端的身份认证方法、装置和存储介质 |
US11477182B2 (en) * | 2019-05-07 | 2022-10-18 | International Business Machines Corporation | Creating a credential dynamically for a key management protocol |
CN110266478B (zh) * | 2019-05-31 | 2021-05-18 | 联想(北京)有限公司 | 一种信息处理方法、电子设备 |
US11539510B2 (en) * | 2019-08-02 | 2022-12-27 | Zengo Ltd | System and method of cryptographic key management in a plurality of blockchain based computer networks |
US20210056053A1 (en) * | 2019-08-19 | 2021-02-25 | Cryptography Research, Inc. | Application authentication and data encryption without stored pre-shared keys |
CN110519708B (zh) * | 2019-08-27 | 2021-08-10 | 深圳成谷科技有限公司 | 一种基于pc5接口点到多点的通信方法和装置 |
CN110690966B (zh) * | 2019-11-08 | 2020-10-09 | 北京金茂绿建科技有限公司 | 终端与业务服务器连接的方法、系统、设备及存储介质 |
CN111163107B (zh) * | 2020-01-03 | 2022-08-30 | 杭州涂鸦信息技术有限公司 | 一种zigbee的安全通信方法及系统 |
CN111586007B (zh) * | 2020-04-29 | 2022-09-09 | 国家电网公司华中分部 | 一种数据传输的安全认证系统和方法 |
CN112953725B (zh) * | 2021-02-23 | 2022-12-06 | 浙江大华技术股份有限公司 | 设备私钥的确定方法及装置、存储介质、电子装置 |
CN115460579A (zh) * | 2021-06-09 | 2022-12-09 | 维沃移动通信有限公司 | 密钥材料的处理方法、获取方法、信息传输方法及设备 |
CN115460580A (zh) * | 2021-06-09 | 2022-12-09 | 维沃移动通信有限公司 | 密钥材料的发送方法、获取方法、信息传输方法及设备 |
CN115460586A (zh) * | 2021-06-09 | 2022-12-09 | 维沃移动通信有限公司 | 信息处理方法、密钥材料的获取方法及设备 |
US20230078954A1 (en) * | 2021-09-10 | 2023-03-16 | Assa Abloy Ab | Fast bilateral key confirmation |
CN114168928B (zh) * | 2022-02-14 | 2022-05-06 | 阿里云计算有限公司 | 获取身份认证信息的方法、装置、存储介质及系统 |
CN115051814A (zh) * | 2022-08-15 | 2022-09-13 | 南方电网数字电网研究院有限公司 | 一种风电场安全通信认证方法和系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005359A (zh) * | 2006-01-18 | 2007-07-25 | 华为技术有限公司 | 一种实现终端设备间安全通信的方法及装置 |
CN101388770A (zh) * | 2008-10-20 | 2009-03-18 | 华为技术有限公司 | 获取动态主机配置协议密钥的方法、服务器及客户端装置 |
CN102082665A (zh) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团公司 | 一种eap认证中的标识认证方法、系统和设备 |
US20130142328A1 (en) * | 2010-08-24 | 2013-06-06 | Mitsubishi Electric Corporation | Encryption device, encryption system, encryption method, and encryption program |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
JP4617763B2 (ja) * | 2003-09-03 | 2011-01-26 | ソニー株式会社 | 機器認証システム、機器認証サーバ、端末機器、機器認証方法、および機器認証プログラム |
CN100452697C (zh) * | 2005-10-14 | 2009-01-14 | 西安电子科技大学 | 无线环境下的会话密钥安全分发方法 |
CN107317674B (zh) * | 2016-04-27 | 2021-08-31 | 华为技术有限公司 | 密钥分发、认证方法,装置及系统 |
-
2016
- 2016-04-27 CN CN201610268327.6A patent/CN107317789B/zh active Active
- 2016-10-26 JP JP2018556317A patent/JP6641029B2/ja not_active Expired - Fee Related
- 2016-10-26 WO PCT/CN2016/103334 patent/WO2017185692A1/zh active Application Filing
- 2016-10-26 EP EP16900200.3A patent/EP3432532B1/en active Active
-
2018
- 2018-10-25 US US16/171,235 patent/US20190068591A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005359A (zh) * | 2006-01-18 | 2007-07-25 | 华为技术有限公司 | 一种实现终端设备间安全通信的方法及装置 |
CN101388770A (zh) * | 2008-10-20 | 2009-03-18 | 华为技术有限公司 | 获取动态主机配置协议密钥的方法、服务器及客户端装置 |
CN102082665A (zh) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团公司 | 一种eap认证中的标识认证方法、系统和设备 |
US20130142328A1 (en) * | 2010-08-24 | 2013-06-06 | Mitsubishi Electric Corporation | Encryption device, encryption system, encryption method, and encryption program |
Non-Patent Citations (1)
Title |
---|
See also references of EP3432532A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3432532A4 (en) | 2019-04-24 |
JP2019517187A (ja) | 2019-06-20 |
CN107317789B (zh) | 2020-07-21 |
EP3432532A1 (en) | 2019-01-23 |
JP6641029B2 (ja) | 2020-02-05 |
US20190068591A1 (en) | 2019-02-28 |
EP3432532B1 (en) | 2021-12-01 |
CN107317789A (zh) | 2017-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017185692A1 (zh) | 密钥分发、认证方法,装置及系统 | |
WO2017185999A1 (zh) | 密钥分发、认证方法,装置及系统 | |
US11228442B2 (en) | Authentication method, authentication apparatus, and authentication system | |
US11588626B2 (en) | Key distribution method and system, and apparatus | |
KR102021213B1 (ko) | 엔드 투 엔드 서비스 계층 인증 | |
KR102134302B1 (ko) | 무선 네트워크 접속 방법 및 장치, 및 저장 매체 | |
CN111052672B (zh) | 无证书或预共享对称密钥的安全密钥传输协议 | |
WO2017114123A1 (zh) | 一种密钥配置方法及密钥管理中心、网元 | |
US20170201382A1 (en) | Secure Endpoint Devices | |
US11044084B2 (en) | Method for unified network and service authentication based on ID-based cryptography | |
JP2011508991A (ja) | セキュアな通信のための鍵管理 | |
CN110087240B (zh) | 基于wpa2-psk模式的无线网络安全数据传输方法及系统 | |
US20170126623A1 (en) | Protected Subnet Interconnect | |
WO2011041962A1 (zh) | 一种支持合法监听的端到端会话密钥协商方法和系统 | |
CN110493367B (zh) | 无地址的IPv6非公开服务器、客户机与通信方法 | |
CN111756530B (zh) | 量子服务移动引擎系统、网络架构及相关设备 | |
CN115567210A (zh) | 采用量子密钥分发实现零信任访问的方法及系统 | |
CN108353279A (zh) | 一种认证方法和认证系统 | |
Anggorojati et al. | Securing communication in inter domains Internet of Things using identity-based cryptography | |
CN109995723B (zh) | 一种域名解析系统dns信息交互的方法、装置及系统 | |
JP5746774B2 (ja) | セキュアな通信のための鍵管理 | |
JP2023138927A (ja) | データファイル送信及びデータファイルへのアクセス権を管理するためのシステム及び方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2016900200 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2018556317 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2016900200 Country of ref document: EP Effective date: 20181019 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16900200 Country of ref document: EP Kind code of ref document: A1 |