WO2018072150A1 - 一种机器类通信安全通信的方法、装置和系统 - Google Patents

一种机器类通信安全通信的方法、装置和系统 Download PDF

Info

Publication number
WO2018072150A1
WO2018072150A1 PCT/CN2016/102590 CN2016102590W WO2018072150A1 WO 2018072150 A1 WO2018072150 A1 WO 2018072150A1 CN 2016102590 W CN2016102590 W CN 2016102590W WO 2018072150 A1 WO2018072150 A1 WO 2018072150A1
Authority
WO
WIPO (PCT)
Prior art keywords
mtc
key
packet
communication
mtc packet
Prior art date
Application number
PCT/CN2016/102590
Other languages
English (en)
French (fr)
Inventor
余万涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to PCT/CN2016/102590 priority Critical patent/WO2018072150A1/zh
Publication of WO2018072150A1 publication Critical patent/WO2018072150A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • This document relates to, but is not limited to, the field of machine type communication technology, and in particular, to a method, device and system for machine type communication security communication.
  • Machine type communication is a general term for a series of technologies and combinations that implement wireless communication technology to realize data communication and communication between machines and machines, machines and people.
  • MTC has two meanings: the first layer is the machine itself, which is called smart device in the embedded field; the second layer means the connection between the machine and the machine, connecting the machines together through the network.
  • Machine-based communication has a wide range of applications, such as intelligent measurement, remote monitoring, etc., making human life more intelligent. Compared with the traditional communication between people, the number of MTC devices is huge, the application field is wide, and there is a huge market prospect.
  • the MTC device In the mobile communication system, after the introduction of the MTC device, due to the large number of MTC devices, in order to reduce the network load and save network resources, the MTC device needs to be managed in a group manner, so that the MTC device can be controlled in groups. , management and billing, etc., to meet the needs of operators.
  • the MTC devices can be grouped according to the same area, or whether they have the same MTC feature, or whether they belong to the same MTC user.
  • the MTC device group can be identified by a unique group identifier.
  • the number of MTC device packets is large, and the MTC device group is in dynamic change, and even one MTC device may belong to different MTC device groups, in order to ensure that different MTC devices in the MTC packet, and the MTC device and
  • the security of communication between MTC servers requires a method of designing a secure communication for MTC packet communication.
  • This paper provides a method, device and system for machine type communication security communication, which can ensure the security of communication between machine type communication equipment and server.
  • the embodiment of the invention provides a method for machine type communication security communication, which is applied to a network side node, and the method includes:
  • the device that sends the request message includes: an MTC device or an MTC server; and the device that receives the MTC packet key includes: an MTC device and an MTC server.
  • generating an MTC packet key for the MTC packet communication according to the information of the MTC packet and the locally saved root key including:
  • the key generation algorithm includes a first key generation algorithm, and using the key generation algorithm to generate an MTC packet key for the MTC packet communication, including: using the first key generation algorithm Generating an MTC packet encryption key for the MTC communication; or
  • the key generation algorithm includes a first key generation algorithm including a MTC packet encryption key and an MTC packet integrity protection key, and a second key generation algorithm, which is generated using the key generation algorithm
  • An MTC packet key for the MTC packet communication comprising: generating an MTC packet encryption key for the MTC packet communication using the first key generation algorithm, using the second key generation algorithm to generate The MTC packet integrity protection key for the MTC packet communication.
  • sending the MTC packet key to the device participating in the MTC packet communication includes:
  • the MTC packet key is encrypted by a mobile communication system access layer encryption method and then sent to a device participating in the MTC packet communication; or is pushed by a universal authentication mechanism GBA or GBA. Transmitting the MTC packet key to the device participating in the MTC packet communication;
  • the MTC packet key is sent to the MTC server through a secure link between the network side node and the MTC server.
  • the method further includes:
  • the packet key of the MTC packet is deleted.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • Application identity information includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the network side node includes: a base station eNB, a mobility management entity MME, a home subscription subscriber server HSS, a serving GPRS support node SGSN, a service capability open function node SCEF, or an MTC interworking function node MTC-IWF.
  • the dynamic parameter includes: a random number or a time-related parameter that is in communication with the MTC packet;
  • the dynamic parameter is generated by the network side node or generated by the device that sends the request message and sent to the network side node.
  • the embodiment of the present invention further provides a method for machine type communication security communication, which is applied to a device, and the method includes:
  • the request message is sent to the network side node, where the request message carries the information of the MTC packet;
  • the MTC packet key After receiving the MTC packet key sent by the network side node, the MTC packet key is used for MTC packet communication.
  • the method further includes:
  • the communication end information is fed back to the network side node.
  • the method further includes:
  • the MTC packet key corresponding to the MTC packet communication is deleted.
  • the device comprises: an MTC device or an MTC server.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • Application identity information includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the embodiment of the invention further provides a device for communication security communication of a machine type, which is applied to a network side node, and includes:
  • a root key management module configured to manage and maintain a root key
  • a packet key management module configured to: after receiving a request message sent by a device that needs to perform machine type communication MTC packet communication, acquire information of an MTC packet from the request message; according to the information of the MTC packet and locally saved The root key generates an MTC packet key for the MTC packet communication;
  • a packet key distribution module configured to send the MTC packet key to a device participating in the MTC packet communication
  • the device that sends the request message includes: an MTC device or an MTC server; receiving The device of the MTC packet key includes: an MTC device and an MTC server.
  • the packet key management module is configured to generate an MTC packet key for the MTC packet communication according to the information of the MTC packet and the locally saved root key in the following manner: using the root key as a seed key, using the information of the MTC packet as a decentralized parameter of the deployed key generation algorithm, using the key generation algorithm to generate an MTC packet key for the MTC packet communication; or using the root key As a seed key, the information of the MTC packet and the dynamic parameter for guaranteeing the novelty of the key are used as a decentralized parameter of the deployed key generation algorithm, and the key generation algorithm is used to generate the communication for the MTC packet communication. MTC packet key.
  • the packet key management module is configured to generate, when the key generation algorithm includes the first key generation algorithm, the MTC packet secret used for the MTC packet communication by using the key generation algorithm in the following manner Key: generating an MTC packet encryption key for the MTC communication using the first key generation algorithm; or the key generation algorithm includes a first key generation algorithm and a second key generation algorithm, and
  • the MTC packet key for the MTC packet communication is generated using the key generation algorithm in the following manner: using the first A key generation algorithm generates an MTC packet encryption key for the MTC packet communication, and generates an MTC packet integrity protection key for the MTC packet communication using the second key generation algorithm.
  • the packet key distribution module is configured to send the MTC packet key to the device participating in the MTC packet communication in the following manner: when the device is an MTC device, access layer encryption through the mobile communication system Transmitting the MTC packet key to a device participating in the MTC packet communication; or transmitting the MTC packet key to a device participating in the MTC packet communication by means of a universal authentication mechanism GBA or GBA; When the device is an MTC server, the MTC packet key is sent to the MTC server through a secure link between the network side node and the MTC server.
  • the packet key management module is further configured to delete the packet key of the MTC packet after receiving the communication end information fed back by the device participating in the MTC packet communication.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes the following at least One: an international mobile device identifier IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an identity information of an application on the MTC device;
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the network side node includes: a base station eNB, a mobility management entity MME, a home subscription subscriber server HSS, a serving GPRS support node SGSN, a service capability open function node SCEF, or an MTC interworking function node MTC-IWF.
  • the dynamic parameter includes: a random number or a time-related parameter that is in communication with the MTC packet;
  • the dynamic parameter is generated by the network side node or generated by the device that sends the request message and sent to the network side node.
  • the embodiment of the invention provides a device for communication security communication of a machine type, which is applied to the device, and includes:
  • a requesting module configured to send a request message to the network side node when the device type communication MTC packet communication is required, where the request message carries information of the MTC packet;
  • the packet key management module is configured to use the MTC packet key for MTC packet communication after receiving the MTC packet key sent by the network side node.
  • the packet key management module is further configured to feed back the communication end information to the network side node after the end of the MTC packet communication.
  • the packet key management module is further configured to delete the MTC packet key corresponding to the MTC packet communication after the end of the MTC packet communication.
  • the device comprises: an MTC device or an MTC server.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • Application identity information includes at least one of: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an MTC device.
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions, which are implemented when executed by a processor.
  • a method, device and system for machine type communication security communication provided by an embodiment of the present invention, when a machine type communication MTC device communicates with a server, the network side node generates information by using a root key and an MTC group information.
  • the MTC packet key is distributed and the MTC device establishes a secure communication connection with the server using the MTC packet key, thereby ensuring the security of communication between the machine type communication device and the server.
  • FIG. 1 is a flow chart (network side node) of a method for machine type communication secure communication according to an embodiment of the present invention.
  • FIG. 2 is a flow chart (device) of a method for machine type communication secure communication according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram (network side node) of an apparatus for machine type communication security communication according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram (device) of an apparatus for machine type communication security communication according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a system for machine type communication security communication according to an embodiment of the present invention.
  • 6-9 are information interaction diagrams of a method for machine type communication secure communication according to an application example of the present invention.
  • an embodiment of the present invention provides a method for machine type communication security communication, which is applied to a network side node, and the method includes:
  • the device that sends the request message includes: an MTC device or an MTC server; and the device that receives the MTC packet key includes: an MTC device and an MTC server;
  • the method may also include the following features:
  • the MTC packet includes a plurality of MTC devices and has a unified MTC packet identifier.
  • the network side node manages the MTC packet.
  • An MTC packet identifier corresponds to a group of MTC devices. Specifically, the MTC packet may be used to identify identity information of a group of MTC devices.
  • the identity information of the device includes at least one of the following: an IMEI (International Mobile Equipment Identity) information of the MTC device, and an IMSI (International Mobile Subscriber Identification Number, International) of the MTC device. Mobile subscriber identity) information, and identity information of applications on the MTC device;
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification Number, International
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message;
  • the network side node includes: a base station (such as an eNB), an MME (Mobility Management Entity), an HSS (Home Subscriber Server), and a SGSN (Serving GPRS Support Node). , SCEF (Service Capability Exposure Function) or MTC-IWF (MTC interworking function, MTC interworking function node).
  • a base station such as an eNB
  • MME Mobility Management Entity
  • HSS Home Subscriber Server
  • SGSN Serving GPRS Support Node
  • SCEF Service Capability Exposure Function
  • MTC-IWF MTC interworking function, MTC interworking function node
  • the network side node may be an eNB, an MME, an HSS, an MTC-IWF, an SCEF, or another available network node such as an SGSN.
  • the generating an MTC packet key for the MTC packet communication according to the information of the MTC packet and the locally saved root key includes:
  • the dynamic parameter includes: a random number or a parameter related to time of communication with the MTC packet.
  • the time-related parameter that communicates with the MTC packet such as the instant time at which the communication request is initiated.
  • the dynamic parameter is generated by the network side node, or generated by the device that sends the request message, and sent to the network side node;
  • the key generation algorithm includes a first key generation algorithm, and generating, by using the key generation algorithm, an MTC packet key for the MTC packet communication, including: generating, by using the first key generation algorithm The MTC packet encryption key of the MTC communication; or
  • the key generation algorithm includes a first key generation algorithm including a MTC packet encryption key and an MTC packet integrity protection key, and a second key generation algorithm, which is generated using the key generation algorithm
  • An MTC packet key for the MTC packet communication comprising: generating an MTC packet encryption key for the MTC packet communication using the first key generation algorithm, using the second key generation algorithm to generate The MTC packet integrity protection key for the MTC packet communication.
  • the network side node manages and maintains a root key K MTC for MTC communication.
  • the network side node deploys a key generation algorithm for MTC packet communication for generating a shared key between devices performing MTC packet communication.
  • the root key K MTC is used as the seed key of the MTC packet key generation algorithm, and at the same time, when generating the shared key for MTC packet communication, the MTC packet identification information, the identity information of the device (such as IMEI, IMSI, or MTC device)
  • the identity information of the application on the basis, etc. can be used as a decentralized parameter of the key generation algorithm.
  • a random number or a parameter related to time can be used as a decentralized parameter for guaranteeing the novelty of the key.
  • the device that sends the MTC packet key to the device that participates in the MTC packet communication includes:
  • the MTC packet key is encrypted by a mobile communication system access layer encryption method and then sent to a device participating in the MTC packet communication; or by a GBA (General Bootstrapping Architecture) or The manner of GBA-Push (GBA Push) sends the MTC packet key to a device participating in the MTC packet communication;
  • GBA General Bootstrapping Architecture
  • GBA-Push GBA Push
  • the MTC packet key is sent to the MTC server through a secure link between the network side node and the MTC server.
  • the method further includes:
  • the method further includes:
  • the packet key of the MTC packet is deleted.
  • the packet key of the MTC packet is deleted; wherein the device includes: an MTC device and/or an MTC server.
  • an embodiment of the present invention provides a method for secure communication, which is applied to a device, and the method includes:
  • the method may also include the following features:
  • the device includes: an MTC device or an MTC server;
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message;
  • the identity information of the device includes at least one of the following: an IMEI (International Mobile Equipment Identity) information of the MTC device, and an IMSI (International Mobile Subscriber Identification Number, International) of the MTC device. Mobile subscriber identity) information, and identity information of applications on the MTC device;
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification Number, International
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the method further includes:
  • the communication end information is fed back to the network side node;
  • the method further includes:
  • the MTC device performs MTC packet communication with the MTC server.
  • an embodiment of the present invention provides a device for communication security communication, which is applied to a network side node, and includes:
  • the root key management module 301 is configured to manage and maintain a root key
  • the packet key management module 302 is configured to: after receiving the request message sent by the device that needs to perform the machine type communication MTC packet communication, acquire the information of the MTC packet from the request message; according to the information of the MTC packet and the local save Root key generates an MTC packet key for the MTC packet communication;
  • a packet key distribution module 303 configured to send the MTC packet key to a device participating in the MTC packet communication
  • the device that sends the request message includes: an MTC device or an MTC server; and the device that receives the MTC packet key includes: an MTC device and an MTC server.
  • the device may also include the following features:
  • the packet key management module 302 is configured to generate an MTC packet key for the MTC packet communication according to the information of the MTC packet and the locally saved root key in the following manner: using the root key as a seed a key, using the information of the MTC packet as a decentralized parameter of the deployed key generation algorithm, using the key generation algorithm to generate an MTC packet key for the MTC packet communication; or using the root key as a seed key, the information of the MTC packet and a dynamic parameter for guaranteeing the novelty of the key as a decentralized parameter of the deployed key generation algorithm, using the key generation algorithm to generate an MTC for the MTC packet communication Group key.
  • the packet key management module 302 is configured to generate, when the key generation algorithm includes the first key generation algorithm, the MTC packet key used for the MTC packet communication by using the key generation algorithm in the following manner. Generating an MTC packet encryption key for the MTC communication using the first key generation algorithm; or the key generation algorithm includes a first key generation algorithm and a second key generation algorithm, and When the MTC packet key includes the MTC packet encryption key and the MTC packet integrity protection key, the MTC packet key for the MTC packet communication is generated using the key generation algorithm in the following manner: using the first secret A key generation algorithm generates an MTC packet encryption key for the MTC packet communication, and uses the second key generation algorithm to generate an MTC packet integrity protection key for the MTC packet communication.
  • the packet key distribution module 303 is configured to send the MTC packet key to the device participating in the MTC packet communication in the following manner: when the device is an MTC device, the access layer encryption method by using the mobile communication system Encrypting the MTC packet key and transmitting it to a device participating in the MTC packet communication; or transmitting the MTC packet key to a device participating in the MTC packet communication by means of a universal authentication mechanism GBA or GBA push; When the device is an MTC server, the MTC packet key is sent to the MTC server through a secure link between the network side node and the MTC server.
  • the packet key management module 302 is further configured to delete the packet key of the MTC packet after receiving the communication end information fed back by the device participating in the MTC packet communication.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes at least one of the following: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an application on the MTC device.
  • Identity Information includes at least one of the following: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an application on the MTC device.
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • the network side node includes: a base station eNB, a mobility management entity MME, a home subscription subscriber server HSS, a serving GPRS support node SGSN, a service capability open function node SCEF, or an MTC interworking function node MTC-IWF.
  • the dynamic parameter includes: a random number or a time-related parameter that is in communication with the MTC packet;
  • the dynamic parameter is generated by the network side node or generated by the device that sends the request message and sent to the network side node.
  • an embodiment of the present invention provides a device for communication security communication of a device, which is applied to a device, including:
  • the requesting module 401 is configured to send a request message to the network side node when the device type communication MTC packet communication is required, where the request message carries information of the MTC packet;
  • the packet key management module 402 is configured to use the MTC packet key for MTC packet communication after receiving the MTC packet key sent by the network side node.
  • the device may also include the following features:
  • the packet key management module 402 is further configured to feed back the communication end information to the network side node after the end of the MTC packet communication.
  • the packet key management module is further configured to delete the MTC packet key corresponding to the MTC packet communication after the end of the MTC packet communication.
  • the device includes: an MTC device or an MTC server.
  • the information of the MTC packet includes at least one of the following: MTC packet identification information and identity information of a device that sends the request message.
  • the identity information of the device includes at least one of the following: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an application on the MTC device.
  • Identity Information includes at least one of the following: an international mobile device identity IMEI information of the MTC device, an international mobile subscriber identity IMSI information of the MTC device, and an application on the MTC device.
  • the identity information of the device includes at least one of the following: identity information of the MTC server and identity information of the application.
  • an embodiment of the present invention provides a system for machine type communication secure communication, including: an MTC device, a network side node, and an MTC server.
  • the MTC packet secure communication system may include: an MTC packet including a group of MTC devices, an MTC server, and a network side node.
  • the network side node may be an eNB, an MME, an HSS, an MTC-IWF, or an SGSN, or a service capability open function node SCEF, or other available network nodes.
  • the network side node is used to save the management MTC communication root key and generate an MTC packet key.
  • the establishment process of the secure connection between the MTC device and the MTC server may be completed by the MTC packet key generation process and the MTC packet key distribution process based on the MTC communication root key. Thereby solving the problem of packet security communication between the MTC device and the MTC server.
  • the process of establishing the MTC packet security communication process may include the following steps:
  • Step S101 The MTC device in the MTC packet sends request information to the network side node, where the request information includes information of the MTC packet.
  • the information of the MTC packet may include MTC packet identification information, and may also include sending
  • the identity information of the sending MTC device may be the MTC device identity information IMEI, etc., may also be the MTC user identity information IMSI, etc., or may be the identity information of the application on the MTC device that needs to perform MTC communication, etc.);
  • the request information may further include a random number
  • Step S102 after receiving the request information, the network side node generates an MTC packet key K MTC-Group for MTC communication at the network node;
  • the generating the MTC packet key K MTC-Group is specifically: substituting the MTC packet identification information and the root key K MTC into the MTC packet key generation algorithm, and if necessary, simultaneously substituting a random number to generate the MTC packet secret.
  • Key K MTC-Group is specifically: substituting the MTC packet identification information and the root key K MTC into the MTC packet key generation algorithm, and if necessary, simultaneously substituting a random number to generate the MTC packet secret.
  • Step S103 the network side node sends the generated MTC packet key to the MTC device participating in the MTC packet communication by using a security method
  • the MTC packet key may be encrypted by the mobile communication system access layer encryption method and then sent to the MTC device; or may be sent to the MTC device by using GBA or GBA-Push.
  • the MTC packet key may be sent to the MTC server through a secure link between the network side node and the MTC server.
  • Step S104 After receiving the MTC packet key sent by the network side node, the MTC device and the MTC server participating in the MTC packet communication use the MTC packet key for the MTC packet secure communication.
  • Step S105 After the MTC packet communication ends, the MTC device feeds back information of the communication end to the network side node.
  • Step S106 the MTC device, the network side node, and the MTC server delete the MTC packet key information.
  • the process of establishing an MTC packet secure communication process between the MTC server and the MTC packet may include the following steps:
  • Step S201 The MTC server sends request information to the network side node, where the request information includes information of the MTC packet.
  • the information about the MTC packet includes MTC packet identification information, and may further include identity information of the MTC server and identity information of the application;
  • the request information may further include a random number.
  • Step S202 after receiving the request information, the network side node generates an MTC packet key K MTC-Group for MTC communication at the network node;
  • the generating the MTC packet key K MTC-Group is specifically: substituting the MTC packet identification information and the root key K MTC into the MTC packet key generation algorithm, and if necessary, simultaneously substituting a random number to generate the MTC packet secret.
  • Key K MTC-Group is specifically: substituting the MTC packet identification information and the root key K MTC into the MTC packet key generation algorithm, and if necessary, simultaneously substituting a random number to generate the MTC packet secret.
  • Step S203 the network side node sends the generated MTC packet key to the MTC device and the MTC server participating in the MTC packet communication by using a security method
  • the MTC packet key is sent to all MTC devices in the MTC packet and the MTC server;
  • the MTC packet key may be encrypted by the access layer encryption method of the mobile communication system and then sent to the MTC device; or may be sent to the MTC device by using GBA or GBA-Push;
  • the MTC packet key may be sent to the MTC server through a secure link between the network side node and the MTC server.
  • Step S204 The MTC device in the MTC packet, and the MTC server, after receiving the MTC packet key sent by the network side node, use the MTC packet key for secure communication between the MTC server and the MTC device.
  • Step S205 after the MTC packet communication ends, the MTC server feeds back the information of the communication end to the network side node.
  • Step S206 the MTC device, the network side node, and the MTC server in the MTC packet delete the MTC packet key information.
  • the process of establishing the MTC packet secure communication process may further include the following steps:
  • Step S301 the MTC device in the MTC packet sends request information to the network side node, where the request information includes information of the MTC packet;
  • the information of the MTC packet may include the MTC packet identification information, and may also include the identity information of the MTC device of the sender (which may be the MTC device identity information IMEI, or the MTC user identity information IMSI, etc., or may be the MTC device. Identity information of applications that need to perform MTC communication, etc.);
  • the request information may further include a random number
  • Step S302 after receiving the request information, the network side node generates an MTC packet key for the MTC communication at the network node: an MTC packet encryption key and an MTC packet integrity protection key.
  • the MTC packet identification information and the root key K MTC are substituted into the MTC packet key generation algorithm, and if necessary, a random number can be substituted to generate an MTC packet encryption key K MTC-Group-C and MTC packet integrity. Protection key K MTC-Group-I ;
  • Step S303 the network side node sends the generated MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I to the MTC device participating in the MTC packet communication by using a security method. And on the MTC server;
  • the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I may be encrypted by the mobile communication system access layer encryption method and then sent to the MTC device; or may pass the GBA. Or GBA-Push is sent to the MTC device;
  • the MTC packet key may be sent to the MTC server through a secure link between the network side node and the MTC server.
  • Step S304 after the MTC device in the MTC server and the MTC packet receives the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I sent by the network side node, the MTC is performed.
  • the packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I are used for secure communication of the MTC packet;
  • Step S305 after the MTC packet communication ends, the MTC device in the MTC packet feeds back the information of the communication end to the network side node.
  • Step S306 the MTC device, the network side node, and the MTC server in the MTC packet delete the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I .
  • the process of establishing an MTC packet secure communication process may further include the following steps:
  • Step S401 the MTC server sends request information to the network side node, where the request information includes information of the MTC packet;
  • the information about the MTC packet includes MTC packet identification information, and may further include identity information of the MTC server and identity information of the application;
  • the request information may further include a random number
  • Step S402 after receiving the request information, the network side node generates an MTC packet key for the MTC communication at the network node: an MTC packet encryption key and an MTC packet integrity protection key.
  • the MTC packet identification information and the root key K MTC are substituted into the MTC packet key generation algorithm, and if necessary, a random number can be substituted to generate an MTC packet encryption key K MTC-Group-C and MTC packet integrity. Protection key K MTC-Group-I ;
  • Step S403 the network side node sends the generated MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I to the MTC device participating in the MTC packet communication by using a security method.
  • the MTC server On the MTC server;
  • the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I may be sent to all MTC devices in the MTC packet;
  • the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I may be encrypted by the mobile communication system access layer encryption method and then sent to the MTC device; or may pass the GBA. Or GBA-Push is sent to the MTC device;
  • the MTC packet key may be sent to the MTC server through a secure link between the network side node and the MTC server.
  • Step S404 after receiving the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I sent by the network side node, the MTC device and the MTC server in the MTC packet, The MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I are used for secure communication between the MTC packet and the MTC server.
  • Step S405 after the MTC packet communication ends, the MTC server feeds back the information of the communication end to the network side node.
  • Step S406 the MTC device, the network side node, and the MTC server in the MTC packet both delete the MTC packet encryption key K MTC-Group-C and the MTC packet integrity protection key K MTC-Group-I information.
  • an embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions, which are implemented when executed by a processor.
  • the network side node when the machine type communication MTC device communicates with the server, the network side node generates the MTC group key and distributes it by using the root key and the MTC group information.
  • the MTC device establishes a secure communication connection with the server using the MTC packet key, thereby ensuring security of communication between the machine type communication device and the server.
  • each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. Instructions to achieve their corresponding functions. This application is not limited to any specific combination of hardware and software.
  • the network side node when the machine type communication MTC device communicates with the server, the network side node generates the MTC group key by using the root key and the MTC group information and performs the division.
  • the MTC device and the server establish a secure communication connection by using the MTC packet key, thereby ensuring the security of communication between the machine type communication device and the server.

Abstract

本文公开了一种机器类通信安全通信的方法,应用于网络侧节点,该方法包括:在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;将所述MTC分组密钥发送给参与所述MTC分组通信的设备;其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器。

Description

一种机器类通信安全通信的方法、装置和系统 技术领域
本文涉及但不限于机器类通信技术领域,尤其涉及的是一种机器类通信安全通信的方法、装置和系统。
背景技术
机器类通信(machine type communication,简称为MTC)是指应用无线通信技术,实现机器与机器、机器与人之间的数据通信和交流的一系列技术及其组合的总称。MTC包含两层含义:第一层是机器本身,在嵌入式领域称为智能设备;第二层意思是机器和机器之间的连接,通过网络把机器连接在一起。机器类通信的应用范围非常广泛,例如智能测量、远程监控等,使人类生活更加智能化。与传统的人与人之间的通信相比,MTC设备(MTC Device)数量巨大,应用领域广泛,具有巨大的市场前景。
在移动通信系统中,引入MTC设备后,由于MTC设备数量众多,为了降低网络负载,节省网络资源,需要对MTC设备以组的方式进行管理优化,这样,MTC设备就可以按组的方式进行控制、管理及计费等,从而适应运营商的需求。MTC设备可以依照所在相同区域,或是否具有相同MTC特征,或者是否属于相同的MTC用户进行分组。在MTC通信系统中,MTC设备组可以通过唯一的组标识进行标识。
在MTC系统中,MTC设备分组数量众多,且MTC设备分组处在动态变化之中,甚至一个MTC设备可能分属不同的MTC设备组,为了保证MTC分组中不同MTC设备之间,以及MTC设备与MTC服务器之间通信的安全性,需要设计一种MTC分组通信的安全通信的方法。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本文提供一种机器类通信安全通信的方法、装置和系统,能够保障机器类通信设备与服务器通信的安全性。
本发明实施例提供了一种机器类通信安全通信的方法,应用于网络侧节点,该方法包括:
在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;
根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器。
可选地,根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥,包括:
将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者
将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
可选地,所述密钥生成算法包括第一密钥生成算法,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC通信的MTC分组加密密钥;或者
所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
可选地,将所述MTC分组密钥发送给参与所述MTC分组通信的设备,包括:
当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过通用认证机制GBA或GBA推送的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
可选地,该方法还包括:
在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥。
可选地,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
可选地,当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
可选地,所述网络侧节点包括:基站eNB、移动管理实体MME、归属签约用户服务器HSS、服务GPRS支持节点SGSN、业务能力开放功能节点SCEF或MTC互通功能节点MTC-IWF。
可选地,所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数;
所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点。
本发明实施例还提供了一种机器类通信安全通信的方法,应用于设备,该方法包括:
在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信。
可选地,该方法还包括:
在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息。
可选地,该方法还包括:
在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥。
可选地,所述设备包括:MTC设备或MTC服务器。
可选地,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
可选地,当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
本发明实施例还提供了一种机器类通信安全通信的装置,应用于网络侧节点,包括:
根密钥管理模块,设置为管理和维护根密钥;
分组密钥管理模块,设置为在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
分组密钥分发模块,设置为将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收 所述MTC分组密钥的设备包括:MTC设备和MTC服务器。
可选地,分组密钥管理模块,设置为采用以下方式根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥:将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
可选地,分组密钥管理模块,设置为在所述密钥生成算法包括第一密钥生成算法时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC通信的MTC分组加密密钥;或者在所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,且所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
可选地,分组密钥分发模块,设置为采用以下方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备:当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过通用认证机制GBA或GBA推送的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
可选地,分组密钥管理模块,还设置为在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥。
可选地,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
可选地,当所述设备为MTC设备时,所述设备的身份信息包括以下至少 一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
可选地,所述网络侧节点包括:基站eNB、移动管理实体MME、归属签约用户服务器HSS、服务GPRS支持节点SGSN、业务能力开放功能节点SCEF或MTC互通功能节点MTC-IWF。
可选地,所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数;
所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点。
本发明实施例提供了一种机器类通信安全通信的装置,应用于设备,包括:
请求模块,设置为在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
分组密钥管理模块,设置为在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信。
可选地,分组密钥管理模块,还设置为在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息。
可选地,分组密钥管理模块,还设置为在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥。
可选地,所述设备包括:MTC设备或MTC服务器。
可选地,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
可选地,当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现上述方法。
与相关技术相比,本发明实施例提供的一种机器类通信安全通信的方法、装置和系统,机器类通信MTC设备与服务器通信时,由网络侧节点利用根密钥和MTC分组的信息生成MTC分组密钥并进行分发,MTC设备与服务器使用所述MTC分组密钥建立安全通信连接,从而保障机器类通信设备与服务器通信的安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例的一种机器类通信安全通信的方法的流程图(网络侧节点)。
图2为本发明实施例的一种机器类通信安全通信的方法的流程图(设备)。
图3为本发明实施例的一种机器类通信安全通信的装置的结构示意图(网络侧节点)。
图4为本发明实施例的一种机器类通信安全通信的装置的结构示意图(设备)。
图5为本发明实施例的一种机器类通信安全通信的系统的结构示意图。
图6-图9为本发明应用示例的机器类通信安全通信的方法的信息交互图。
本发明的实施方式
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
如图1所示,本发明实施例提供了一种机器类通信安全通信的方法,应用于网络侧节点,该方法包括:
S110,在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;
S120,根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
S130,将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器;
所述方法还可以包括下述特点:
其中,MTC分组包含若干MTC设备,并有统一的MTC分组标识;
其中,网络侧节点管理MTC分组。一个MTC分组标识对应一组MTC设备,具体的,可以用MTC分组标识对应一组MTC设备的身份信息。
其中,当所述设备是MTC设备时,设备的身份信息包括以下至少一种:MTC设备的IMEI(International Mobile Equipment Identity,国际移动设备标识)信息、MTC设备的IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)信息、和MTC设备上的应用的身份信息;
其中,当所述设备是MTC服务器时,设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
其中,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息;
其中,所述网络侧节点包括:基站(比如eNB)、MME(Mobility Management Entity,移动管理实体)、HSS(Home Subscriber Server,归属签约用户服务器)、SGSN(Serving GPRS Support Node,服务GPRS支持节点)、SCEF(Service Capability Exposure Function,业务能力开放功能节点)或MTC-IWF (MTC interworking function,MTC互通功能节点)。
也即,网络侧节点可以是eNB,也可以是MME,也可以是HSS,也可以是MTC-IWF,也可以是SCEF,还可以是SGSN等其他可用的网络节点。
其中,根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥,包括:
根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥,包括:
将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者
将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
其中,所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数。
其中,与所述MTC分组通信的时间相关的参数,比如:发起通信请求的即时时间。
其中,所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点;
所述密钥生成算法包括第一密钥生成算法,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC通信的MTC分组加密密钥;或者
所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
也即,网络侧节点管理并维护一个用于MTC通信的根密钥KMTC。网络侧节点部署一个用于MTC分组通信的密钥生成算法,用于生成进行MTC分组通信的设备间的共享密钥。根密钥KMTC作为MTC分组密钥生成算法的种子密钥,同时,在生成用于MTC分组通信的共享密钥时,MTC分组标识信息,设备的身份信息(如IMEI、IMSI,或者MTC设备上的应用的身份信息)等,可以作为密钥生成算法的分散参数。另外,针对每一次MTC通信,可以由一个随机数或者使用与时间相关的一个参数作为保证密钥新颖性的分散参数。
其中,将所述MTC分组密钥发送给参与所述MTC分组通信的设备,包括:
当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过GBA(General Bootstrapping Architecture,通用认证机制)或GBA-Push(GBA推送)的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
其中,所述方法还包括:
在接收到参与所述MTC分组通信的MTC设备反馈的通信结束信息后,删除所述MTC分组的分组密钥;
其中,所述方法还包括:
在接收到参与所述MTC分组通信的MTC服务器反馈的通信结束信息后,删除所述MTC分组的分组密钥。
也即,在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥;其中,所述设备包括:MTC设备和/或MTC服务器。
如图2所示,本发明实施例提供了一种安全通信的方法,应用于设备,该方法包括:
S210,在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
S220,在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信;
所述方法还可以包括下述特点:
所述设备包括:MTC设备或MTC服务器;
所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息;
其中,当所述设备是MTC设备时,设备的身份信息包括以下至少一种:MTC设备的IMEI(International Mobile Equipment Identity,国际移动设备标识)信息、MTC设备的IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)信息、和MTC设备上的应用的身份信息;
其中,当所述设备是MTC服务器时,设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
其中,所述方法还包括:
在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息;
其中,所述方法还包括:
在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥;
其中,MTC设备与MTC服务器进行MTC分组通信。
如图3所示,本发明实施例提供了一种机器类通信安全通信的装置,应用于网络侧节点,包括:
根密钥管理模块301,设置为管理和维护根密钥;
分组密钥管理模块302,设置为在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
分组密钥分发模块303,设置为将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器。
所述装置还可以包括下述特点:
其中,分组密钥管理模块302,设置为采用以下方式根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥:将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
其中,分组密钥管理模块302,设置为在所述密钥生成算法包括第一密钥生成算法时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC通信的MTC分组加密密钥;或者在所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,且所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
其中,分组密钥分发模块303,设置为采用以下方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备:当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过通用认证机制GBA或GBA推送的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
其中,分组密钥管理模块302,还设置为在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥。
其中,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
其中,当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
其中,所述网络侧节点包括:基站eNB、移动管理实体MME、归属签约用户服务器HSS、服务GPRS支持节点SGSN、业务能力开放功能节点SCEF或MTC互通功能节点MTC-IWF。
其中,所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数;
所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点。
如图4所示,本发明实施例提供了一种机器类通信安全通信的装置,应用于设备,包括:
请求模块401,设置为在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
分组密钥管理模块402,设置为在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信。
所述装置还可以包括下述特点:
其中,分组密钥管理模块402,还设置为在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息。
其中,分组密钥管理模块,还设置为在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥。
其中,所述设备包括:MTC设备或MTC服务器。
其中,所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
其中,当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
如图5所示,本发明实施例提供了一种机器类通信安全通信的系统,包括:MTC设备、网络侧节点和MTC服务器。
MTC分组安全通信系统可以包括:包含一组MTC设备的MTC分组,MTC服务器,网络侧节点。在该系统中,网络侧节点可以是eNB,也可以是MME,也可以是HSS,也可以是MTC-IWF,也可以是SGSN,也可以是业务能力开放功能节点SCEF,或者其他可用的网络节点。在该系统中,网络侧节点用于保存管理MTC通信根密钥,并生成MTC分组密钥。
进行MTC分组通信时,可以通过基于MTC通信根密钥的MTC分组密钥生成过程和MTC分组密钥分发过程完成MTC设备与MTC服务器之间安全连接的建立过程。从而解决了MTC设备与MTC服务器的分组安全通信问题。
应用示例
如图6所示,当MTC分组内的MTC设备需要与MTC服务器进行MTC分组通信时,建立MTC分组安全通信过程的流程可以包括以下步骤:
步骤S101,MTC分组内的MTC设备向网络侧节点发送请求信息,该请求信息包括MTC分组的信息;
其中,MTC分组的信息,可以包括MTC分组标识信息,还可以包括发 送方MTC设备的身份信息(可以是MTC设备身份信息IMEI等,也可以是MTC用户身份信息IMSI等,还可以是MTC设备上需要进行MTC通信的应用的身份信息等);
其中,该请求信息还可以包括一个随机数;
步骤S102,网络侧节点接收到请求信息后,在该网络节点生成用于MTC通信的MTC分组密钥KMTC-Group
其中,生成MTC分组密钥KMTC-Group具体是:将MTC分组标识信息和根密钥KMTC,代入MTC分组密钥生成算法,如果需要还可以同时代入一个随机数,用以生成MTC分组密钥KMTC-Group
步骤S103,网络侧节点将生成的MTC分组密钥通过安全方法发送到参与所述MTC分组通信的MTC设备上;
具体的,MTC分组密钥可以通过移动通信系统接入层加密方法加密后发送到MTC设备上;也可以通过GBA或GBA-Push的方式发送到MTC设备上。
具体的,MTC分组密钥可以通过网络侧节点与MTC服务器之间的安全链路发送到MTC服务器上。
步骤S104,参与MTC分组通信的MTC设备和MTC服务器收到网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组安全通信。
步骤S105,MTC分组通信结束后MTC设备向网络侧节点反馈通信结束的信息。
步骤S106,MTC设备、网络侧节点和MTC服务器删除MTC分组密钥信息。
如图7所示,当MTC服务器想与MTC分组内的MTC设备进行MTC分组通信时,MTC服务器与MTC分组之间建立MTC分组安全通信过程的流程可以包括以下步骤:
步骤S201,MTC服务器向网络侧节点发送请求信息,该请求信息包括MTC分组的信息;
其中,所述MTC分组的信息包括MTC分组标识信息,还可以包括MTC服务器的身份信息和应用的身份信息;
其中,该请求信息还可以包括一个随机数。
步骤S202,网络侧节点接收到请求信息后,在该网络节点生成用于MTC通信的MTC分组密钥KMTC-Group
其中,生成MTC分组密钥KMTC-Group具体是:将MTC分组标识信息和根密钥KMTC,代入MTC分组密钥生成算法,如果需要还可以同时代入一个随机数,用以生成MTC分组密钥KMTC-Group
步骤S203,网络侧节点将生成的MTC分组密钥通过安全方法发送到参与所述MTC分组通信的MTC设备和MTC服务器;
其中,MTC分组密钥发送至MTC分组中的所有MTC设备以及所述MTC服务器上;
具体的,MTC分组密钥可以通过移动通信系统接入层加密方法加密后发送到MTC设备上;也可以通过GBA或GBA-Push的方式发送到MTC设备上;
具体的,MTC分组密钥可以通过网络侧节点与MTC服务器之间的安全链路发送到MTC服务器上。
步骤S204,MTC分组中的MTC设备,以及MTC服务器,收到网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC服务器与MTC设备的安全通信。
步骤S205,MTC分组通信结束后,MTC服务器向网络侧节点反馈通信结束的信息。
步骤S206,MTC分组内的MTC设备、网络侧节点和MTC服务器删除MTC分组密钥信息。
如图8所示,当MTC分组内的MTC终端设备想与MTC服务器进行MTC分组通信时,建立MTC分组安全通信过程的流程还可以包括以下步骤:
步骤S301,MTC分组内的MTC设备向网络侧节点发送请求信息,该请求信息包括MTC分组的信息;
其中,MTC分组的信息,可以包括MTC分组标识信息,还可以包括发送方MTC设备的身份信息(可以是MTC设备身份信息IMEI等,也可以是MTC用户身份信息IMSI等,还可以是MTC设备上需要进行MTC通信的应用的身份信息等);
其中,该请求信息还可以包括一个随机数;
步骤S302,网络侧节点接收到请求信息后,在该网络节点生成用于MTC通信的MTC分组密钥:MTC分组加密密钥和MTC分组完整性保护密钥。
具体是:将MTC分组标识信息和根密钥KMTC,代入MTC分组密钥生成算法,如果需要还可以同时代入一个随机数,生成MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I
步骤S303,网络侧节点将生成的MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I通过安全方法发送到所述参与所述MTC分组通信的MTC设备和MTC服务器上;
具体的,MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I可以通过移动通信系统接入层加密方法加密后发送到MTC设备上;也可以通过GBA或GBA-Push的方式发送到MTC设备上;
具体的,MTC分组密钥可以通过网络侧节点与MTC服务器之间的安全链路发送到MTC服务器上。
步骤S304,MTC服务器和MTC分组中的MTC设备收到网络侧节点发送的MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I后,将所述MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I用于MTC分组的安全通信;
步骤S305,MTC分组通信结束后,MTC分组内的MTC设备向网络侧节点反馈通信结束的信息。
步骤S306,MTC分组内的MTC设备、网络侧节点和MTC服务器删除MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I
如图9所示,当MTC服务器想与MTC分组内的MTC设备进行MTC 分组通信时,建立MTC分组安全通信过程的流程还可以包括以下步骤:
步骤S401,MTC服务器向网络侧节点发送请求信息,该请求信息包括MTC分组的信息;
其中,所述MTC分组的信息包括MTC分组标识信息,还可以包括MTC服务器的身份信息和应用的身份信息;
其中,该请求信息还可以包括一个随机数;
步骤S402,网络侧节点接收到请求信息后,在该网络节点生成用于MTC通信的MTC分组密钥:MTC分组加密密钥和MTC分组完整性保护密钥。
具体是:将MTC分组标识信息和根密钥KMTC,代入MTC分组密钥生成算法,如果需要还可以同时代入一个随机数,生成MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I
步骤S403,网络侧节点将生成的MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I通过安全方法发送到参与所述MTC分组通信应的MTC设备和MTC服务器上;
其中,MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I可以发送至MTC分组中的所有MTC设备上;
具体的,MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I可以通过移动通信系统接入层加密方法加密后发送到MTC设备上;也可以通过GBA或GBA-Push的方式发送到MTC设备上;
具体的,MTC分组密钥可以通过网络侧节点与MTC服务器之间的安全链路发送到MTC服务器上。
步骤S404,MTC分组中的MTC设备以及MTC服务器,收到网络侧节点发送的MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I后,将所述MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I用于MTC分组与MTC服务器之间的安全通信。
步骤S405,MTC分组通信结束后,MTC服务器向网络侧节点反馈通信结束的信息。
步骤S406,MTC分组中的MTC设备、网络侧节点和MTC服务器都删 除MTC分组加密密钥KMTC-Group-C和MTC分组完整性保护密钥KMTC-Group-I信息。
此外,本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现上述方法。
上述实施例提供的一种机器类通信安全通信的方法、装置和系统,机器类通信MTC设备与服务器通信时,由网络侧节点利用根密钥和MTC分组的信息生成MTC分组密钥并进行分发,MTC设备与服务器使用所述MTC分组密钥建立安全通信连接,从而保障机器类通信设备与服务器通信的安全性。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,例如通过集成电路来实现其相应功能,也可以采用软件功能模块的形式实现,例如通过处理器执行存储于存储器中的程序指令来实现其相应功能。本申请不限制于任何特定形式的硬件和软件的结合。
需要说明的是,本申请还可有其他多种实施例,在不背离本申请精神及其实质的情况下,熟悉本领域的技术人员可根据本申请作出各种相应的改变和变形,但这些相应的改变和变形都应属于本申请所附的权利要求的保护范围。
工业实用性
本发明实施例提供的技术方案,机器类通信MTC设备与服务器通信时,由网络侧节点利用根密钥和MTC分组的信息生成MTC分组密钥并进行分 发,MTC设备与服务器使用所述MTC分组密钥建立安全通信连接,从而保障机器类通信设备与服务器通信的安全性。

Claims (30)

  1. 一种机器类通信安全通信的方法,应用于网络侧节点,该方法包括:
    在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;
    根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
    将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
    其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器。
  2. 如权利要求1所述的方法,其中:
    根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥,包括:
    将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者
    将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
  3. 如权利要求2所述的方法,其中:
    所述密钥生成算法包括第一密钥生成算法,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC通信的MTC分组加密密钥;或者
    所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥,包括:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密 钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
  4. 如权利要求3所述的方法,其中:
    将所述MTC分组密钥发送给参与所述MTC分组通信的设备,包括:
    当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过通用认证机制GBA或GBA推送的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
    当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
  5. 如权利要求1-4中任一项所述的方法,其中:
    所述方法还包括:
    在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥。
  6. 如权利要求1-4中任一项所述的方法,其中:
    所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
  7. 如权利要求6所述的方法,其中:
    当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
    当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
  8. 如权利要求1或2或3或4或7所述的方法,其中:
    所述网络侧节点包括:基站eNB、移动管理实体MME、归属签约用户 服务器HSS、服务GPRS支持节点SGSN、业务能力开放功能节点SCEF或MTC互通功能节点MTC-IWF。
  9. 如权利要求2或3或4或7所述的方法,其中:
    所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数;
    所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点。
  10. 一种机器类通信安全通信的方法,应用于设备,该方法包括:
    在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
    在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信。
  11. 如权利要求10所述的方法,其中:
    所述方法还包括:
    在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息。
  12. 如权利要求10或11所述的方法,其中:
    所述方法还包括:
    在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥。
  13. 如权利要求10或11所述的方法,其中:
    所述设备包括:MTC设备或MTC服务器。
  14. 如权利要求10或11所述的方法,其中:
    所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
  15. 如权利要求14所述的方法,其中:
    当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
    当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
  16. 一种机器类通信安全通信的装置,应用于网络侧节点,包括:
    根密钥管理模块,设置为管理和维护根密钥;
    分组密钥管理模块,设置为在接收到需要进行机器类通信MTC分组通信的设备发送的请求消息后,从所述请求消息中获取MTC分组的信息;根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥;
    分组密钥分发模块,设置为将所述MTC分组密钥发送给参与所述MTC分组通信的设备;
    其中,发送所述请求消息的设备包括:MTC设备或MTC服务器;接收所述MTC分组密钥的设备包括:MTC设备和MTC服务器。
  17. 如权利要求16所述的装置,其中:
    分组密钥管理模块,设置为采用以下方式根据所述MTC分组的信息以及本地保存的根密钥生成用于所述MTC分组通信的MTC分组密钥:将所述根密钥作为种子密钥,将所述MTC分组的信息作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥;或者将所述根密钥作为种子密钥,将所述MTC分组的信息以及用于保证密钥新颖性的动态参数作为部署的密钥生成算法的分散参数,使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥。
  18. 如权利要求17所述的装置,其中:
    分组密钥管理模块,设置为在所述密钥生成算法包括第一密钥生成算法时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC通信的MTC 分组加密密钥;或者在所述密钥生成算法包括第一密钥生成算法和第二密钥生成算法,且所述MTC分组密钥包括MTC分组加密密钥和MTC分组完整性保护密钥时,采用以下方式使用所述密钥生成算法生成用于所述MTC分组通信的MTC分组密钥:使用所述第一密钥生成算法生成用于所述MTC分组通信的MTC分组加密密钥,使用所述第二密钥生成算法生成用于所述MTC分组通信的MTC分组完整性保护密钥。
  19. 如权利要求18所述的装置,其中:
    分组密钥分发模块,设置为采用以下方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备:当所述设备为MTC设备时,通过移动通信系统接入层加密方法加密所述MTC分组密钥后发送给参与所述MTC分组通信的设备;或者通过通用认证机制GBA或GBA推送的方式将所述MTC分组密钥发送给参与所述MTC分组通信的设备;当所述设备为MTC服务器时,将MTC分组密钥通过网络侧节点与MTC服务器之间的安全链路发送到所述MTC服务器上。
  20. 如权利要求16-19中任一项所述的装置,其中:
    分组密钥管理模块,还设置为在接收到参与所述MTC分组通信的设备反馈的通信结束信息后,删除所述MTC分组的分组密钥。
  21. 如权利要求16-19中任一项所述的装置,其中:
    所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
  22. 如权利要求21所述的装置,其中:
    当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
    当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
  23. 如权利要求16或17或18或19或22所述的装置,其中:
    所述网络侧节点包括:基站eNB、移动管理实体MME、归属签约用户服务器HSS、服务GPRS支持节点SGSN、业务能力开放功能节点SCEF或MTC互通功能节点MTC-IWF。
  24. 如权利要求17或18或19或22所述的装置,其中:
    所述动态参数包括:随机数或与所述MTC分组通信的时间相关的参数;
    所述动态参数由所述网络侧节点生成,或者由发送所述请求消息的设备生成并发送给所述网络侧节点。
  25. 一种机器类通信安全通信的装置,应用于设备,包括:
    请求模块,设置为在需要进行机器类通信MTC分组通信时,向网络侧节点发送请求消息,所述请求消息中携带MTC分组的信息;
    分组密钥管理模块,设置为在接收到所述网络侧节点发送的MTC分组密钥后,将所述MTC分组密钥用于MTC分组通信。
  26. 如权利要求25所述的装置,其中:
    分组密钥管理模块,还设置为在所述MTC分组通信结束后,向所述网络侧节点反馈通信结束信息。
  27. 如权利要求25或26所述的装置,其中:
    分组密钥管理模块,还设置为在所述MTC分组通信结束后,删除所述MTC分组通信对应的MTC分组密钥。
  28. 如权利要求25或26所述的装置,其中:
    所述设备包括:MTC设备或MTC服务器。
  29. 如权利要求25或26所述的装置,其中:
    所述MTC分组的信息包括以下至少一种:MTC分组标识信息和发送所述请求消息的设备的身份信息。
  30. 如权利要求29所述的装置,其特征在于:
    当所述设备为MTC设备时,所述设备的身份信息包括以下至少一种:MTC设备的国际移动设备标识IMEI信息、MTC设备的国际移动用户识别码IMSI信息和MTC设备上的应用的身份信息;
    当所述设备为MTC服务器时,所述设备的身份信息包括以下至少一种:MTC服务器的身份信息和应用的身份信息。
PCT/CN2016/102590 2016-10-19 2016-10-19 一种机器类通信安全通信的方法、装置和系统 WO2018072150A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/102590 WO2018072150A1 (zh) 2016-10-19 2016-10-19 一种机器类通信安全通信的方法、装置和系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/102590 WO2018072150A1 (zh) 2016-10-19 2016-10-19 一种机器类通信安全通信的方法、装置和系统

Publications (1)

Publication Number Publication Date
WO2018072150A1 true WO2018072150A1 (zh) 2018-04-26

Family

ID=62018090

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102590 WO2018072150A1 (zh) 2016-10-19 2016-10-19 一种机器类通信安全通信的方法、装置和系统

Country Status (1)

Country Link
WO (1) WO2018072150A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112152790A (zh) * 2019-06-26 2020-12-29 联合汽车电子有限公司 一种数据加密方法、解密方法、加密装置和解密装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011152665A2 (en) * 2010-06-01 2011-12-08 Samsung Electronics Co., Ltd. Method and system of securing group communication in a machine-to-machine communication environment
CN103096309A (zh) * 2011-11-01 2013-05-08 华为技术有限公司 生成组密钥的方法和相关设备
CN105792095A (zh) * 2014-12-23 2016-07-20 中兴通讯股份有限公司 用于mtc分组通信的密钥协商方法、系统及网络实体
CN106162515A (zh) * 2015-04-14 2016-11-23 中兴通讯股份有限公司 一种机器类通信安全通信的方法、装置和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011152665A2 (en) * 2010-06-01 2011-12-08 Samsung Electronics Co., Ltd. Method and system of securing group communication in a machine-to-machine communication environment
CN103096309A (zh) * 2011-11-01 2013-05-08 华为技术有限公司 生成组密钥的方法和相关设备
CN105792095A (zh) * 2014-12-23 2016-07-20 中兴通讯股份有限公司 用于mtc分组通信的密钥协商方法、系统及网络实体
CN106162515A (zh) * 2015-04-14 2016-11-23 中兴通讯股份有限公司 一种机器类通信安全通信的方法、装置和系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112152790A (zh) * 2019-06-26 2020-12-29 联合汽车电子有限公司 一种数据加密方法、解密方法、加密装置和解密装置

Similar Documents

Publication Publication Date Title
JP5508548B2 (ja) Mtc装置認証方法、mtcゲートウェイおよび関係する装置
US9866554B2 (en) Mutual authentication method and system with network in machine type communication
KR101877733B1 (ko) 기기간 통신 환경에서 그룹 통신을 보안하는 방법 및 시스템
JP6406681B2 (ja) プレアソシエーションサービスディスカバリのためのシステムおよび方法
US8452014B2 (en) Group key management for mobile ad-hoc networks
EP2810418B1 (en) Group based bootstrapping in machine type communication
Lai et al. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions
US20130326603A1 (en) Wireless device, registration server and method for provisioning of wireless devices
JP2016220253A (ja) マシンタイプ通信におけるグループセキュリティ
CN105706390A (zh) 在无线直接通信网络中使用非对称密钥进行身份识别的方法和装置
KR20200003108A (ko) 키 생성 방법, 사용자 장비, 장치, 컴퓨터 판독가능 저장 매체, 및 통신 시스템
CN104205898A (zh) 用于m2m环境中基于群组的服务引导的方法和系统
WO2016062075A1 (zh) 一种管理设备间d2d通信分组的方法及设备
WO2014131356A1 (zh) 一种宽带集群系统的组密钥分层管理方法、系统和终端
CN106162515B (zh) 一种机器类通信安全通信的方法、装置和系统
EP3059989B1 (en) Method for realizing secure communications among machine type communication devices and network entity
CN104349311A (zh) 一种用于机器类通信小数据传输的密钥建立方法和系统
US20230396602A1 (en) Service authorization method and system, and communication apparatus
WO2018072150A1 (zh) 一种机器类通信安全通信的方法、装置和系统
CN113067838B (zh) 跨链交互方法及装置
WO2022032525A1 (zh) 一种组密钥分发方法及装置
EP4231751A1 (en) Wireless communication method, device, and system
WO2016141794A1 (zh) 一种实现分组认证的方法及系统
WO2022237671A1 (zh) 组寻呼的方法和装置
US11979743B2 (en) Systems and methods for secure access to 5G non-public networks using mobile network operator credentials

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16919300

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16919300

Country of ref document: EP

Kind code of ref document: A1