WO2018137334A1 - 一种安全保护协商方法及网元 - Google Patents
一种安全保护协商方法及网元 Download PDFInfo
- Publication number
- WO2018137334A1 WO2018137334A1 PCT/CN2017/097671 CN2017097671W WO2018137334A1 WO 2018137334 A1 WO2018137334 A1 WO 2018137334A1 CN 2017097671 W CN2017097671 W CN 2017097671W WO 2018137334 A1 WO2018137334 A1 WO 2018137334A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security protection
- message
- user plane
- smf
- protection
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/18—Management of setup rejection or failure
Definitions
- the present application relates to the field of wireless communications, and in particular, to a security protection negotiation method and a network element.
- 3GPP 5G proposed new network architecture, network-based architecture and 5G proposed session establishment process.
- the security protection negotiation refers to the algorithm for negotiating and synchronizing the security protection key and security protection between the security layers. The process of protection.
- the technical solution for security protection negotiation proposed by 2G/3G/4G is not based on the session granularity, and does not consider the security requirements of the service. Therefore, the security protection negotiation proposed by 2G/3G/4G The technical solution can not meet the 5G network architecture.
- the embodiment of the present application provides a security protection negotiation method and a network element, which is used to implement security protection for the user plane of the session by negotiating between the UE and the UPF based on the 5G network architecture.
- a security protection negotiation method provided by an embodiment of the present application includes:
- the session management network element SMF determines the security protection information used by the user plane during the session, and the security protection information includes an algorithm for security protection, an index for identifying a context of security protection, and a message authentication code, where the security protection includes Encryption protection and integrity protection, the message authentication code refers to the SMF using integrity protection algorithm and the integrity protection key of the security protection context identified by the index to protect the first message integrity protection Generated authentication code;
- the SMF sends the first message including the security protection information used by the user plane to the UE, and the security protection information used by the user plane is used by the UE according to the security of the user plane.
- the protection information activates the security protection of the user plane after the integrity protection authentication of the first message is successful;
- the SMF receives a second message sent by the UE to indicate that the UE successfully authenticates the first message, and sends an algorithm to the user plane gateway UPF that includes the security protection used by the user plane during the session. And a third message for the context of the security protection, the third message is used to trigger the UPF to initiate security protection of the user plane according to the security protection algorithm and the security protection context.
- the security protection information used by the user plane during the session includes the following information: the encryption and decryption protection algorithm used by the user plane during the session, and the integrity protection used by the user plane during the session.
- the algorithm an index for identifying the context of the encryption and decryption protection used by the user plane during the session, an index for identifying the context of the integrity protection used by the user plane during the session, and a message verification code.
- the SMF determines and sends to the UE the security protection information used by the user plane during the session, including the security protection algorithm, the index for identifying the security protection context, and the message authentication code, etc., after the UE is successfully authenticated.
- the UE initiates the security protection of the user plane.
- the UPF initiates the security protection of the user plane, and the UE and the UPF negotiate to start the security protection of the respective user planes.
- the foregoing method can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the above method can satisfy the 5G network architecture for the user plane.
- the need for security protection can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the above method can satisfy the 5G network architecture for the user plane. The need for security protection.
- the SMF may determine the security protection algorithm in the following two manners:
- Manner 1 The SMF obtains the security protection algorithm determined by the SPCF negotiation from the security policy control network element SPCF.
- the SPCF is deployed on any one of the SMF, the security anchor network element SEAF, and the authentication service network element AUSF, or the SPCF is independently deployed in the network.
- the security protection algorithm is determined based on the algorithm of the security protection supported by the UE, the security protection algorithm supported by the network, and the security protection algorithm supported by the service to which the session belongs.
- the SMF can be used to determine the security protection algorithm used by the user plane during the session, including the encryption and decryption protection algorithm and the integrity protection algorithm.
- the SMF establishes the current session before the SMF determines the security protection information used by the user plane.
- the SMF receives a session establishment request message sent by the UE for requesting to establish the current session;
- the SMF receives the session establishment request message sent by the UE for requesting to establish the current session, and determines that the security endpoint of the user plane is The UPF notifies the radio access network RAN, and the SMF performs the security protection negotiation method.
- the endpoint of the user plane refers to the network element that needs to start the security protection of the user plane in addition to the UE.
- the termination point of the user plane may also be a gNB, where it can be understood that, when the gNB is a network element of the RAN, where the termination point of the user plane is UPF, the foregoing security protection negotiation method
- the SMF determines that the end point of the user plane is the gNB, and the SMF sends a notification message to the RAN, where the SMF is used to instruct the RAN to perform the UE and the gNB, after the SMF receives the session establishment request message for requesting to establish the current session.
- the security protection negotiation method of the user plane after receiving the notification message, the RAN replies with the confirmation information to the SMF, and the UE and the gNB perform the negotiation of the security protection of the user plane.
- the termination point for the user plane is the case of the gNB.
- the UE may complete the security protection negotiation of the user plane through the security protection negotiation process between the UE and the gNB during the initial access.
- the method further includes:
- the SMF determines, according to the indication of the fourth message, that the UPF does not need to trigger the security protection of the user plane.
- the SMF determines that the UE fails to authenticate the first message, and determines to end the security protection negotiation method.
- a security protection negotiation method provided by an embodiment of the present application includes:
- the user equipment UE receives the first message that is sent by the session management network element SMF, including the security protection information used by the user plane during the session, and the security protection information includes: a security protection algorithm, and a context for identifying the security protection.
- An index and a message authentication code the security protection including encryption and decryption protection and integrity protection, wherein the message authentication code refers to an algorithm for integrity protection of the SMF and an integrity protection included by the context of the security protection identified by the index
- the authentication code generated by the integrity protection of the first message by the key;
- the UE authenticates the first message according to security protection information used by the user plane
- the UE When the UE successfully authenticates the first message, the UE initiates security protection of the user plane, and sends a second message to the SMF to indicate that the UE successfully authenticates the first message.
- the UE after receiving the first message sent by the SMF, including the security protection information used by the user plane during the session, the UE authenticates the first message according to the security protection information used by the user plane during the session; When the UE successfully authenticates the first message, the UE initiates security protection of the user plane, and sends a second message to the SMF to indicate that the UE successfully authenticates the first message. Then, after receiving the second message, the SMF triggers the UPF to start the security protection of the user plane. Therefore, the foregoing method can implement the security protection of the UE and the UPF to initiate the respective user planes.
- the foregoing method can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the above method can satisfy the 5G network architecture for the user plane.
- the need for security protection can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the above method can satisfy the 5G network architecture for the user plane. The need for security protection.
- the UE initiates security protection of the user plane, and sends a second message to the SMF, which is used to indicate that the UE successfully authenticates the first message, and includes:
- the UE initiates encryption and decryption protection and integrity protection of the user plane, and then sends a second message to the SMF to indicate that the UE successfully authenticates the first message.
- the UE can start encryption and decryption protection and integrity protection at the same time.
- the UE initiates security protection of the user plane, and sends a second message to the SMF, which is used to indicate that the UE successfully authenticates the first message, and includes:
- the UE initiates downlink decryption protection and integrity protection of the user plane, and then sends a second message to the SMF to indicate that the UE successfully authenticates the first message, and finally initiates uplink encryption protection of the user plane.
- the UE can start downlink decryption protection, integrity protection, and uplink encryption protection at different times.
- the method further includes:
- the UE determines not to initiate security protection of the user plane, and sends a fourth message to the SMF to indicate that the UE fails to authenticate the first message. .
- the security protection negotiation method ends.
- a security protection negotiation method provided by an embodiment of the present application includes:
- the user plane gateway UPF receives a third message sent by the session management network element SMF, including an algorithm for security protection used by the user plane during the session, and a context for security protection, where the third message is used to indicate the UPF.
- a third message sent by the session management network element SMF, including an algorithm for security protection used by the user plane during the session, and a context for security protection, where the third message is used to indicate the UPF.
- the UPF initiates security protection of the user plane according to the indication of the third message.
- the UPF when the UPF receives the third message including the security protection used by the user plane and the context of the security protection during the session, the UPF indicates that the UE authentication succeeds, and the UE starts after the authentication succeeds. User side security protection. Therefore, after receiving the third message sent by the SMF, the UPF needs to start the security protection of the user plane according to the indication of the third message, so that the UE and the UPF negotiate to start the security protection of the respective user planes.
- the foregoing method can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the above method can satisfy the 5G network architecture for the user plane. The need for security protection.
- the UPF receives an algorithm sent by the SMF, including an algorithm for security protection used by the user plane during the session, and a third message for security protection, including:
- the UPF After the SMF determines that the UE initiates security protection of the user plane, the UPF receives the third message sent by the SMF.
- the UPF can start the security protection of the user plane at the same time, that is, after the SMF determines that the UE initiates the security protection of the user plane, the UPF receives the third message sent by the SMF and initiates the security protection of the user plane.
- Security protection includes downlink encryption protection, integrity protection, and uplink decryption protection.
- the UPF receives an algorithm sent by the SMF, including an algorithm for security protection used by the user plane during the session, and a third message for security protection, including:
- the UPF After the SMF sends the security protection information used by the user plane in the session to the UE, the UPF receives a first trigger message sent by the SMF, where the first trigger message is used to trigger the UPF to start the user.
- the UPF After the SMF determines that the UE initiates the security protection of the user plane, the UPF receives a second trigger message sent by the SMF, where the second trigger message is used to trigger the UPF to initiate uplink decryption protection of the user plane.
- the security protection of the user plane initiated by the UPF at different times can be realized. That is, after the SMF sends the security protection information used by the user plane in the session to the UE, the UPF receives the first trigger message sent by the SMF and starts downlink encryption protection and integrity protection. After the SMF determines that the UE initiates the security protection of the user plane, the UPF receives the second trigger message sent by the SMF and starts the uplink decryption protection.
- the session management network element SMF provided by the embodiment of the present application includes:
- a processing unit configured to determine security protection information used by the user plane during the session, where the security protection information includes an algorithm for security protection, an index for identifying a context of security protection, and a message authentication code, where the security protection includes Encryption protection and integrity protection, the message authentication code refers to an authentication generated by using an integrity protection algorithm and an integrity protection key included in the context of the security protection identified by the index to perform integrity protection on the first message. code;
- a sending unit configured to send, to the UE, the first message that includes the security protection information used by the user plane determined by the processing unit, where the security protection information used by the user plane is used by the UE according to the UE
- the security protection information used by the user plane initiates security protection of the user plane after performing integrity protection authentication on the first message
- a receiving unit configured to receive a second message that is sent by the UE to indicate that the UE successfully authenticates the first message
- the sending unit is further configured to send, to the user plane gateway UPF, an algorithm including a security protection used by the user plane during the current session determined by the processing unit, and a third message for a context of security protection, where The three messages are used to trigger the UPF to initiate security protection of the user plane according to the security protection algorithm and the security protection context.
- the processing unit determines the algorithm of the security protection, specifically:
- the algorithm of the security protection is determined by self-negotiation.
- the SPCF is deployed on any one of the SMF, the security anchor network element SEAF, and the authentication service network element AUSF, or the SPCF is independently deployed in the network.
- the security protection algorithm is determined based on an algorithm of the security protection supported by the UE, an algorithm supported by the network, and an algorithm for security protection supported by the service to which the session belongs.
- the processing unit is further configured to: establish the current session before determining the security protection information used by the user plane; or
- the receiving unit is further configured to: before the processing unit determines the security protection information used by the user plane, receive a session establishment request message sent by the UE for requesting to establish the current session;
- the sending unit When the sending unit sends the first message including the security protection information used by the user plane to the UE, the sending unit is specifically configured to: send a session establishment including the security protection information used by the user plane to the UE. Complete the message.
- the processing unit is further configured to: after the receiving unit receives the session establishment request message sent by the UE for requesting to establish the current session, determine that the security endpoint of the user plane is The UPF;
- the sending unit is further configured to: after the processing unit determines that the security endpoint of the user plane is the UPF, send a notification message to the radio access network RAN to instruct the SMF to perform a security protection negotiation method.
- the receiving unit is further configured to: after the sending unit sends the first message including the security protection information used by the user plane to the UE, receive the UE And sending, by the UE, a fourth message that the UE fails to authenticate the first message;
- the processing unit is further configured to: according to the indication of the fourth message received by the receiving unit, determine that the security protection of the user plane is not required to be triggered by the UPF.
- an SMF provided by an embodiment of the present application includes: a processor, a memory, and a transceiver;
- the transceiver is configured to receive and send data
- the memory is for storing instructions
- the processor is configured to execute the instructions in the memory to perform the method provided by the first aspect.
- the embodiment of the present application further provides a computer storage medium for storing computer software instructions for use in the SMF in the above aspect, which includes a program for performing the above aspects.
- the user equipment UE provided by the embodiment of the present application includes:
- the receiving unit is configured to receive, by the session management network element SMF, a first message that includes the security protection information used by the user plane during the session, where the security protection information includes: a security protection algorithm, and a security protection identifier.
- An integrity-protected key generates an authentication code generated by integrity protection of the first message;
- a processing unit configured to authenticate the first message according to security protection information used by the user plane received by the receiving unit; when the first message is successfully authenticated, start a user plane of the UE safety protection;
- a sending unit configured to send, to the SMF, a second message used to indicate that the UE successfully authenticates the first message, when the processing unit successfully authenticates the first message.
- the processing unit when the security unit of the user plane is activated, is specifically configured to: initiate encryption and decryption protection and integrity protection of the user plane, and then control the sending unit to send the SMF to the SMF. Said second message; or,
- the processing unit is specifically configured to: initiate downlink decryption protection and integrity protection of the user plane, and then control the sending unit to send the second message to the SMF, and finally start the user plane.
- Upstream encryption protection When the security unit of the user plane is activated, the processing unit is specifically configured to: initiate downlink decryption protection and integrity protection of the user plane, and then control the sending unit to send the second message to the SMF, and finally start the user plane.
- Upstream encryption protection is specifically configured to: initiate downlink decryption protection and integrity protection of the user plane, and then control the sending unit to send the second message to the SMF, and finally start the user plane.
- Upstream encryption protection When the security unit of the user plane is activated, the processing unit is specifically configured to: initiate downlink decryption protection and integrity protection of the user plane, and then control the sending unit to send the second message to the SMF, and finally start the user plane. Upstream encryption protection.
- the processing unit is further configured to: after authenticating the first message according to the security protection information used by the user plane, when the first message fails to be authenticated, Determine that the security of the user plane is not activated;
- the sending unit is further configured to: when the processing unit fails to authenticate the first message, send a fourth message to the SMF to indicate that the UE fails to authenticate the first message.
- a UE provided by the embodiment of the present application includes: a processor, a memory, and a transceiver;
- the transceiver is configured to receive and send data
- the memory is for storing instructions
- the processor is configured to execute the instructions in the memory and perform the method provided by the second aspect.
- the embodiment of the present application further provides a computer storage medium for storing computer software instructions used by the UE in the above aspect, which includes a program for performing the foregoing aspect.
- a user plane gateway UPF provided by the embodiment of the present application includes:
- a receiving unit configured to receive, by the session management network element SMF, an algorithm including a security protection used by the user plane during the session and a third message for security protection, where the third message is used to indicate the
- the UPF initiates security protection of the user plane according to the security protection algorithm and the context for security protection, the security protection including encryption and decryption protection and integrity protection;
- a processing unit configured to initiate security protection of the user plane according to the indication of the third message received by the receiving unit.
- the receiving unit when the receiving unit receives the third message that is sent by the SMF, including the security protection used by the user plane during the session and the context for security protection, the receiving unit is specifically configured to:
- the SMF After the SMF determines that the UE initiates security protection of the user plane, receiving the third message sent by the SMF; or
- the first trigger message is used to trigger the downlink of the user plane initiated by the UPF.
- the second trigger message sent by the SMF is received, where the second trigger message is used to trigger the UPF to initiate uplink decryption protection of the user plane.
- a UPF provided by the embodiment of the present application includes: a processor, a memory, and a transceiver;
- the transceiver is configured to receive and send data
- the memory is for storing instructions
- the processor is configured to execute the instructions in the memory to perform the method provided by the first aspect.
- a computer storage medium for storing the computer software instructions used by the UPF in the above aspect, including the program designed to perform the above aspects, is further provided in the embodiment of the present application.
- 1 is a schematic diagram of a 5G network architecture
- FIG. 2 is a schematic diagram of a session establishment process based on a 5G network architecture
- FIG. 3 is a schematic flowchart of a security protection negotiation method according to an embodiment of the present disclosure
- FIG. 4 to FIG. 21 are schematic diagrams showing a flow of a security protection negotiation method provided by each of the descriptions in the first embodiment of the present application;
- FIG. 22 is a schematic flowchart of another security protection negotiation method according to an embodiment of the present disclosure.
- FIG. 23 is a schematic flowchart of a security protection negotiation method provided in conjunction with FIG. 3 and FIG. 22 according to an embodiment of the present application;
- FIG. 24 is a schematic structural diagram of an SMF according to an embodiment of the present application.
- FIG. 25 is a schematic structural diagram of another SMF according to an embodiment of the present disclosure.
- FIG. 26 is a schematic structural diagram of a UE according to an embodiment of the present application.
- FIG. 27 is a schematic structural diagram of another UE according to an embodiment of the present application.
- FIG. 29 is a schematic structural diagram of another UPF according to an embodiment of the present application.
- FIG. 1 is a schematic diagram of a 5G network architecture, where the network element included in the 5G network architecture and the network elements are used in FIG. Communication interface.
- the technical solution provided by the embodiment of the present application is applicable to a session establishment process of a 5G-based network architecture
- FIG. 2 is a schematic diagram of a session establishment process proposed by a 5G-based network architecture.
- the technical solutions of all embodiments of the present application are also applicable to a 5G-based slicing network architecture.
- a user plane security protection negotiation process for implementing service-based slicing is considered. The process is consistent, except that the execution network element corresponds to the 5G slice structure.
- the SMF may be deployed in the slice, and the UPF/SPCF and the like are intra-slice network elements.
- the embodiment of the present application provides a security protection negotiation method and a network element, which is used to implement user equipment (User Equipment, UE) and user plane based on the 5G network architecture.
- User Equipment User Equipment
- UPF User Plane Function
- Security protection includes encryption and decryption protection and integrity protection.
- Encryption protection refers to the process of calculating plaintext into ciphertext using encryption-protected keys and algorithms.
- Decryption protection is the reverse process of encryption protection.
- Integrity protection refers to the use of integrity protection. The process of generating a Message Authentication Code (MAC) by the key and algorithm.
- MAC Message Authentication Code
- the security protection negotiation of the user plane refers to the process in which the UE and the UPF performing data security protection negotiate and synchronize the security protection key and security protection algorithm at each security layer, and initiate the security protection of the user plane. It should be noted that, the embodiment of the present application further provides a security protection negotiation method and a network element, which is used to implement security protection for the user plane of the session, and the gNB is implemented by the negotiation between the UE and the gNB based on the 5G network architecture. Can be understood as the next generation base station (the next generation Node Base station).
- the method and the network element are based on the same inventive concept. Since the method and the network element solve the problem are similar in principle, the implementation of the network element and the method can be referred to each other, and the repeated description is not repeated.
- the technical solution provided by the embodiment of the present application may occur after the session establishment process, or may occur during the session establishment process.
- the network elements mainly involved in the embodiments of the present application mainly include a UE, a Session Management Function (SMF), an UPF, and a Security Policy Control Function (SPCF).
- SMF Session Management Function
- UPF User Plane Function
- SPCF Security Policy Control Function
- the UE is a terminal device that can access the network.
- the UE can be a smart terminal device such as a mobile phone or a tablet computer.
- the UE can be a communication device such as a server, a gateway, a base station, a controller, etc., for example, the UE can be a sensor or an electric meter.
- IoT equipment such as water meters.
- the SMF is used to control the relevant signaling in the process during the establishment, deletion or modification of the session for the UE.
- the SMF in the embodiment of the present application may be located in the handover. In this case, one or more SMFs may exist in one slice.
- the SMF in this embodiment may also be located outside the slice, that is, between the switch and the slice.
- the UPF may also be referred to as a data plane gateway, such as an egress gateway.
- User data is accessed through the network element to a data network (DN), and the UPF may be an Internet or a third-party service server.
- DN data network
- the SPCF is used for the acquisition, negotiation, and decision making of the security policy.
- the specific selection may be the security protection algorithm. For example, according to the security capability list of the UE and the list of security algorithms on the network side acquired or stored in advance, the priority of the intersection is selected. Security algorithms used, including encryption algorithms and integrity protection algorithms.
- the embodiment of the present application provides a security protection negotiation method, and the interaction process between each network element is as follows:
- the SMF determines the security protection information used by the user plane during the session.
- the security protection information in S301 includes, but is not limited to, an algorithm for security protection, an index for identifying a context of security protection, and a message authentication code.
- the security protection includes encryption and decryption protection and integrity protection;
- the message authentication code refers to the authentication code that the SMF uses the integrity protection algorithm and the integrity protection algorithm to calculate the first message; since the security protection context includes encryption and decryption
- the context of protection context and integrity protection the context of encryption and decryption protection includes the key protected by encryption and decryption, and the context of integrity protection includes the key of integrity protection, so the index used to identify the context of security protection can be identified as complete. Sexually protected key.
- the security protection information used by the user plane during the session determined by the SMF in S301 specifically includes the following information: an encryption and decryption protection algorithm used by the user plane during the session, and during the session An algorithm for integrity protection used by the user plane, an index for identifying the context of the encryption and decryption protection used by the user plane during the session, and a context for identifying the integrity protection used by the user plane during the session Index, and message verification code.
- the index for identifying the context of the encryption and decryption protection used by the user plane during the session and the index for identifying the context of the integrity protection used by the user plane during the session may be the same index, or may be Is a different index, for example, the identifier/slice identifier of the session can be used as an index for identifying the context of the encryption and decryption protection used by the user plane during the session, and is used to identify the user plane used in the session.
- the security protection information in S301 may also include the security capability of the UE, and the security capability of the UE is used for the security capability authentication of the UE.
- the SMF determines the algorithm for security protection used by the user plane during the session in the following two ways, including an encryption and decryption protection algorithm and an integrity protection algorithm.
- Manner 1 The SMF obtains, from the SPCF, an algorithm for security protection used by the user plane during the session determined by the SPCF negotiation.
- the SPCF stores all the original security protection algorithms of the user plane.
- the SPCF determines the security protection algorithm used by the user plane during the session based on the original security protection algorithm of the user plane; the SMF obtains the SPCF from the SPCF.
- Negotiation determines the algorithm for security protection used by the user plane during this session.
- Manner 2 The SMF negotiates itself to determine the security protection algorithm used by the user plane during the session.
- the second method may include: the SPCF stores all the original security protection algorithms of the user plane, the SMF obtains the original security protection algorithm of the user plane from the SPCF, and determines the current session by itself based on the obtained original security protection algorithm of the user plane.
- the algorithm of security protection used by the user plane in the process may include: the SPCF stores all the original security protection algorithms of the user plane, the SMF obtains the original security protection algorithm of the user plane from the SPCF, and determines the current session by itself based on the obtained original security protection algorithm of the user plane.
- the algorithm of security protection used by the user plane in the process may include: the SPCF stores all the original security protection algorithms of the user plane, the SMF obtains the original security protection algorithm of the user plane from the SPCF, and determines the current session by itself based on the obtained original security protection algorithm of the user plane.
- the algorithm of security protection used by the user plane in the process may include: the SPCF stores all the original security protection algorithms of the user plane, the SMF obtains the original security protection algorithm of
- the second method may also include that the SMF has obtained the algorithm/security capability of the security protection supported by the UE, the algorithm/security capability of the network protection security protection, and the SPCF obtains the algorithm/security capability of the security protection supported by the service to which the session belongs.
- the SMF then negotiates based on all the foregoing security algorithms to determine the security protection algorithm used by the user plane during the session.
- the SPCF when the SPCF is deployed on the network, the SPCF may be an independently deployed network element, or may be deployed in a security anchor function (SEAF) or an authentication service network element (Authentication Server Function, AUSF) and any network element in the SMF.
- SEAF security anchor function
- AUSF authentication service network element
- SEAF and AUSF are both network elements with security authentication function.
- the above method 1 can be understood as an algorithm for the SMF to obtain the security protection used by the user plane during the session from the SEAF or the AUSF.
- the second mode can be understood as the SMF obtaining from the SEAF or the AUSF.
- the original security protection algorithm of the user plane, or the foregoing mode 2 is understood as the algorithm/security capability of the SMF to obtain the security protection of the service to which the session belongs from the SEAF or AUSF.
- the above method 1 can be understood as an algorithm for determining the security protection used by the user plane during the session by the SMF.
- the second method can be understood as the SMF storing all the original security of the user plane.
- the protection algorithm, or the above method 2 is understood as the algorithm/security capability that the SMF has obtained the security protection of the service supported by the session.
- the method for negotiating and determining the security protection algorithm used by the user plane in the current session is the same, that is, the algorithm/security capability based on the security protection supported by the UE, and the security protection of the network support.
- the algorithm/security capability and the algorithm/security capability negotiation of the security protection supported by the service of the session determine the security protection algorithm used by the user plane during the session. For example, determining an algorithm for security protection supported by the UE, an algorithm for security protection supported by the network, and an algorithm for security protection supported by the service to which the session belongs, and selecting the algorithm with the highest priority among the determined intersection algorithms The algorithm used as the security protection used by the user plane during this session.
- the SMF may initiate a security protection negotiation process of the user plane after obtaining or self-deriving the root key Kup of the user plane, or may generate and distribute the encryption and decryption key and integrity protection of the user plane. After the key is used, the security protection negotiation process of the user plane is initiated.
- the security protection negotiation process of the user plane refers to the security protection negotiation method provided by this embodiment. It should be noted that the SMF obtains or derives the user's root key Kup by itself, and the method of generating and distributing the user plane's encryption and decryption key and integrity protection key based on the user polygon root key Kup. See the prior art, and will not be described here.
- the SMF sends, to the UE, a first message including the security protection information used by the user plane during the session.
- the first message in S302 may refer to a Security Mode Command message of the user plane.
- the SMF establishes the current session before executing S301.
- the UE sends a session establishment request message for requesting to establish the current session to the SMF; the SMF receives the After the session establishment request message, it is necessary to determine which network element the user plane endpoint is.
- the user plane termination point refers to the network element that needs to start the user plane security protection except for the UE; the user determined by the SMF in the method shown in FIG. The endpoint is the UPF; after determining that the endpoint of the user plane is the UPF, the SMF sends a notification message to the radio access network (Radio Access NetWork, RAN), the notification message is used to indicate that the SMF will perform the user between the UE and the UPF.
- the method of security protection negotiation and then the SMF executes S301.
- the SMF sends the session establishment response message to the UE, and sends the security protection information used by the user plane during the session to the UE.
- the end point of the user plane may also be a gNB.
- the security protection negotiation method for implementing the user plane between the UE and the gNB will be under Description of the embodiments in the text.
- the UE authenticates the first message according to the security protection information used by the user plane during the session.
- the method for the UE to authenticate the first message in the S303 includes: the UE needs to calculate the first message according to the integrity protection algorithm and the integrity-protected key derived by the UE, and obtain the message verification code, and the UE calculates the message.
- the message verification code is compared with the message verification code sent by the receiving SMF. When the two message verification codes are the same, it indicates that the first message has not been tampered with, the UE successfully authenticates the first message integrity protection; when the two message verification codes are not the same, the UE determines the integrity protection of the first message. Authentication failed.
- the UE needs to perform security capability authentication before performing integrity protection authentication on the first message, that is, the security capability of the UE including the security protection information by the UE.
- the security capabilities of the storage are compared. If the two are the same, the security capability is successfully authenticated. Otherwise, the security capability fails.
- the UE performs the security capability authentication to prevent the degraded attack.
- the process of the UE performing the security capability authentication can be referred to the prior art, and details are not described herein again.
- the UE If the above-mentioned integrity protection authentication and security capability authentication are successful, the UE is considered to have successfully authenticated the first message; if there is one authentication failure in the integrity protection authentication and the security capability authentication, the UE is considered to authenticate the first message. failure.
- the security protection of the user plane initiated by the UE includes the UE starting the encryption and decryption protection and integrity protection for the user plane of the session, and the encryption and decryption protection includes uplink encryption protection and downlink decryption protection.
- the UE When the UE successfully authenticates the first message, the UE sends a second message to the SMF to indicate that the UE successfully authenticates the first message.
- the second message in S305 may refer to a Security Mode Complete message of the user plane.
- the second message may carry a message authentication code, where the message authentication code is an authentication code calculated by the UE according to the integrity protection key and the integrity protection algorithm used by the user plane during the session, and the second message is calculated.
- the second message has been encrypted and signed by the uplink cipher protected key and the upstream cipher protection algorithm used by the user plane during the session.
- the UE when the UE successfully authenticates the first message, the UE initiates encryption and decryption protection and integrity protection of the user plane, and then sends an indication to the SMF to indicate that the UE successfully authenticates the first message.
- the second message, the encryption and decryption protection includes uplink encryption protection and downlink decryption protection.
- the UE may start downlink decryption protection and integrity protection of the user plane, and then send a second message to the SMF to indicate that the UE successfully authenticates the first message; the UE sends the second After the message, the user's upstream encryption protection is activated.
- the UE when performing S304 and S305, when the UE successfully authenticates the first message, the UE first sends a second message to the SMF to indicate that the UE successfully authenticates the first message, and then starts the encryption and decryption of the user plane. Protection and integrity protection.
- the S303 UE After the S303 UE authenticates the first message according to the security protection information used by the user plane in the current session, when the UE fails to authenticate the first message, the UE determines that the user plane security protection is not activated, and A fourth message for instructing the UE to fail the authentication of the first message is sent to the SMF. That is, in the case that the UE fails to authenticate the first message, the flow of the security protection negotiation method shown in FIG. 3 ends.
- the SMF sends, to the UPF, an algorithm including a security protection used by the user plane during the session and a third message for security protection.
- the third message is used to trigger the UPF according to the user plane during the session.
- the security protection algorithm used and the security protection of the user plane for the context of security protection.
- the context for security protection includes encryption and decryption protected keys and integrity protected keys.
- the UPF initiates security protection of the user plane according to the indication of the third message.
- the security protection of the user plane initiated by the UPF includes the encryption and decryption protection and integrity protection of the user plane initiated by the UPF for the session, and the encryption and decryption protection includes downlink encryption protection and uplink decryption protection.
- the SMF can trigger the UPF to initiate the security protection of the user plane by using a message.
- the UPF in S307 can start the security protection of the user plane at the same time according to a message sent by the SMF.
- the SMF sends, to the UPF, an algorithm including the security protection used by the user plane during the session and a third message for the context of the security protection;
- the UPF starts downlink encryption protection, integrity protection, and uplink decryption protection according to the indication of the third message.
- the SMF may also trigger the UPF to initiate the security protection of the user plane by using multiple messages.
- the sending timing of the multiple messages may be different.
- the UPF in S307 may start the user plane at different times according to multiple messages sent by the SMF.
- Security protection For example, in S306, after the SMF sends the security protection information used by the user plane during the session to the UE, the SMF sends an algorithm including the security protection used by the user plane during the session to the UPF and the security protection for the user.
- the SMF sends the information to the UPF, including during the session.
- the algorithm for security protection used by the user plane and the second trigger message for the context of the security protection is used to trigger the UPF to initiate the uplink decryption protection of the user plane.
- the UPF starts downlink encryption protection and integrity protection according to the indication of the first trigger message, and starts uplink decryption protection according to the indication of the second trigger message.
- the first trigger message may include only the algorithm and key for downlink encryption used by the user plane during the session, and the algorithm and key for integrity protection.
- the second trigger message may include only the session process. The algorithm and key for the uplink decryption used by the user plane.
- the UE and the UPF can initiate the security protection of the respective user planes.
- the method shown in FIG. 3 can implement the security protection of the user plane based on the session granularity of the UE and the UPF negotiation, so the method shown in FIG. 3 can be Meet the needs of the 5G network architecture for the security protection of the user plane.
- FIG. 4 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 4 and the method shown in FIG. 3 is that the timing of the UE starting the security protection of the user plane is different.
- the UE after successfully authenticating the first message, the UE first sends a second message, that is, a Security Mode Complete message, to the SMF, indicating that the UE successfully authenticates the first message, and then the UE initiates the user plane. safety protection.
- a second message that is, a Security Mode Complete message
- FIG. 5 is a schematic flowchart of a method for negotiating a security protection according to the embodiment.
- the main difference between the method shown in FIG. 5 and the method shown in FIG. 3 is that the security of the user plane of the UPF is different.
- the SMF triggers the UPF to initiate security protection of the user plane at different times. Specifically, after the SMF sends the security protection information used by the user plane in the session to the UE, the SMF sends an algorithm including the security protection used by the user plane during the session and the context for security protection to the UPF.
- the first trigger message is used to trigger the UPF to initiate downlink encryption protection and integrity protection of the user plane, and the UPF starts the downlink encryption protection and integrity protection of the user plane after receiving the first trigger message;
- the SMF is determining
- the UE successfully authenticates the first message the UE sends an algorithm including the security protection used by the user plane and the second trigger message for the security protection to the UPF, and the second trigger message is used to trigger the UPF startup.
- the uplink decryption protection of the user plane the UPF starts the uplink decryption protection of the user plane after receiving the second trigger message.
- FIG. 6 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 6 and the method shown in FIG. 3 is that the UE and the UPF start the security protection of the user plane at different timings. .
- the UE after the UE successfully authenticates the first message, the UE initiates downlink decryption protection and integrity protection of the user plane, and then sends a second message to the SMF for indicating that the UE successfully authenticates the first message, that is, Security Mode Complete message; the UE initiates uplink encryption protection of the user plane after transmitting the second message.
- the method for starting the security protection of the user plane by the UPF refer to the method shown in FIG. 5.
- FIG. 3 For other steps of the method shown in FIG. 6, refer to the method shown in FIG. 3, and details are not described herein again.
- FIG. 7 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 6 and the method shown in FIG. 3 is that the SPCF negotiation is added to determine the user plane during the session. The process of using the algorithm of security protection.
- the SMF first triggers the SPCF negotiation to determine the security protection algorithm used by the user plane during the session, including the encryption and decryption protection algorithm and integrity protection used by the user plane during the session.
- Algorithm SPCF determines the user during the session based on the algorithm/security capability supported by the UE, the algorithm/security capability of the network-protected security protection, and the algorithm/security capability negotiation of the security protection supported by the service to which the session belongs.
- the algorithm for security protection used by the surface; the SPCF sends the algorithm for security protection used by the user plane during the session determined by the negotiation to the SMF.
- the method shown in FIG. 3 is executed.
- the method shown in FIG. 7 can be appropriately expanded and changed in this embodiment.
- the SMF after the SMF receives the security protection algorithm used by the user plane during the session sent by the SPCF, the SMF triggers the UPF to start the security protection of the user plane.
- FIG. 8 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 8 and the method shown in FIG. 3 is that the SPCF negotiation is added to determine the user plane during the session.
- the process of using the security protection algorithm and the timing of the UE launching the security protection of the user plane are different.
- the process of the SPCF negotiation in the method shown in FIG. 8 for determining the security protection algorithm used by the user plane during the session may refer to the corresponding part in the method shown in FIG. 7, and the UE is started in the method shown in FIG.
- For the timing of the security protection of the user plane refer to the corresponding part in the method shown in FIG. 4.
- the other steps of the method shown in FIG. 8 refer to the method shown in FIG. 3, and details are not described herein again.
- FIG. 9 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 9 and the method shown in FIG. 3 is that the SPCF negotiation is added to determine the user plane during the session.
- the process of using the security-protected algorithm and the timing of the security protection of the UPF-enabled user plane are different.
- the process of the SPCF negotiation in the method shown in FIG. 9 for determining the security protection algorithm used by the user plane during the session may refer to the corresponding part in the method shown in FIG. 7, and the UPF is started in the method shown in FIG.
- For the timing of the security protection of the user plane refer to the corresponding part in the method shown in FIG. 5.
- the other steps of the method shown in FIG. 9 refer to the method shown in FIG. 3, and details are not described herein again.
- FIG. 10 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 10 and the method shown in FIG. 3 is that the SPCF negotiation is added to determine the user plane during the session.
- the process of the SPCF negotiation in the method shown in FIG. 10 to determine the security protection algorithm used by the user plane during the session may refer to the corresponding part in the method shown in FIG. 7.
- the UE starts.
- the timing of the security protection of the user plane refer to the corresponding part in the method shown in FIG. 4.
- the timing of the security protection of the user plane initiated by the UPF can be referred to the corresponding part in the method shown in FIG.
- FIG. 11 is a schematic flowchart of a security protection negotiation method according to the embodiment. The main difference between the method shown in FIG. 11 and the method shown in FIG. 10 is that the user plane security protection negotiation method and signaling are performed. The security protection negotiation method is integrated.
- the SMF determines the security protection information used by the signaling plane of the current session, such as a key.
- the SMF sends the security protection information used by the signaling plane in the session to the UE by using the first message.
- the UE successfully authenticates the first message according to the security protection information used by the signaling plane in the session.
- the security protection information used by the signaling plane during the session is sent to the SMF through the second message.
- the method for negotiating the security of the signaling plane can be referred to the prior art.
- the method for negotiating the security of the user plane in the method shown in FIG. 11 is shown in the method shown in FIG. 10, and details are not described herein again.
- FIG. 12 is a schematic flowchart of a security protection negotiation method according to the embodiment. The main difference between the method shown in FIG. 12 and the method shown in FIG. 7 is that the user plane security protection negotiation during the session The method is integrated with the establishment process of this session.
- the UE before performing the security protection negotiation process of the user plane in the current session, the UE sends a session establishment request message for requesting to establish the current session to the SMF; during the execution of the session, the user During the security negotiation negotiation process, the SMF sends the security protection information of the user plane to the UE during the session.
- the SMF establishes the session and triggers the UPF after determining that the UE successfully authenticates the first message. Initiate user plane security.
- the method for negotiating the security of the user plane during the session refer to the method shown in Figure 7, and no further details are provided here.
- FIG. 13 is a schematic flowchart of a method for negotiating a security protection according to the embodiment.
- the main difference between the method shown in FIG. 13 and the method shown in FIG. 3 is that an algorithm for storing a user plane security protection in an SPCF is clarified.
- the SMF obtains the security protection algorithm of the user plane from the SPCF, the SMF negotiates itself to determine the security protection algorithm used by the user plane of the session.
- the security protection negotiation method of the user plane in the method shown in Figure 13 refer to the method shown in Figure 3, and details are not described herein.
- FIG. 14 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the SMF triggers the SEAF to perform user session during the session.
- the SEAF and the UE negotiate the security protection information used by the user plane during the session.
- the SEAF will send the security protection information used by the user plane to the SMF during the session.
- the SMF triggers the UPF to initiate the security protection of the user plane.
- the method for negotiating the user plane security of the SEAF is described in the SMF in the method shown in Figure 3, and the method for negotiating the security of the user plane is not described here.
- FIG. 15 is a schematic flowchart of a method for negotiating a security protection according to the embodiment.
- the main difference between the method shown in FIG. 15 and the method shown in FIG. 14 is that an algorithm for storing a user plane security protection in an SPCF is clarified.
- the SEAF obtains the security protection algorithm of the user plane from the SPCF, the SEAF negotiates itself to determine the security protection algorithm used by the user plane during the session.
- the security protection negotiation method of the user plane in the method shown in FIG. 13 refer to the method shown in FIG. 14, and details are not described herein again.
- FIG. 16 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 16 and the method shown in FIG. 3 is that the UPF triggers the SMF to perform a security protection negotiation process of the user plane.
- the method for performing the security negotiation of the user plane by the SMF in the method shown in FIG. 16 refers to the method shown in FIG. 3, and details are not described herein again.
- FIG. 17 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 17 and the method shown in FIG. 15 is that the UPF triggers the SMF to perform a security protection negotiation process on the user plane. Then, the SMF triggers the SEAF to perform the security protection negotiation process of the user plane.
- the method shown in FIG. 15 is not described here.
- FIG. 18 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the main difference between the method shown in FIG. 18 and the method shown in FIG. 15 is that the SMF triggers access and the mobile control network element (Access). And Mobility Function (AMF) performs the security protection negotiation process of the user plane.
- the AMF and the UE negotiate the security protection information used by the user plane during the session. After the negotiation, the AMF will negotiate the user plane during the session.
- the security protection information used is sent to the SMF, and the SMF triggers the UPF to initiate the security protection of the user plane.
- the AMF performs the user plane security protection negotiation method. Referring to the SMF in the method shown in FIG. 15, the user plane security protection negotiation method is performed, and details are not described herein again.
- AMF serves as the termination point of Network Authentication Server (NAS) signaling for processing signaling in the network.
- NAS Network Authentication Server
- FIG. 19 is a schematic flowchart of a method for negotiating a security protection according to the embodiment.
- the main difference between the method shown in FIG. 19 and the method shown in FIG. 3 is that the SMF triggers the AMF to perform a security protection negotiation process for the user plane. Then, the AMF triggers the SEAF to perform the security protection negotiation process of the user plane. The SEAF and the UE negotiate the security protection information used by the user plane during the session. After the negotiation, the SEAF will negotiate the user plane during the session. The security protection information used is sent to the SMF through the AMF, and the SMF triggers the UPF to initiate the security protection of the user plane.
- the method for negotiating the security of the user plane is performed by using the SMF in the method shown in FIG. 3, and the method for negotiating the security of the user plane is not described here.
- FIG. 20 is a schematic flowchart of a security protection negotiation method according to the embodiment.
- the SMF triggers a security gateway (SeGW).
- SeGW security gateway
- the SeGW and the UE negotiate the security protection information used by the user plane during the session.
- the SeGW will send the security protection information used by the user plane during the session.
- the SMF triggers the UPF to initiate the security protection of the user plane.
- the method for negotiating the security of the user plane is performed by the SeGW.
- the SeGW may also trigger the UPF to initiate security protection of the user plane.
- FIG. 21 is a schematic flowchart of a method for negotiating a security protection according to the present embodiment.
- the main difference between the method shown in FIG. 21 and the method shown in FIG. 3 is that the UPF triggers the SMF to perform a security protection negotiation process for the user plane.
- the SGW triggers the SeGW to perform the security protection negotiation process of the user plane.
- the SeGW and the UE negotiate the security protection information used by the user plane during the session. After the negotiation, the SeGW will negotiate the user plane during the session.
- the security protection information used is sent to the SMF, and the SMF triggers the UPF to initiate the security protection of the user plane.
- the method for negotiating the security of the user plane is performed by the SeGW.
- the method for negotiating the security of the user plane is performed, and details are not described herein again.
- the method shown in FIG. 21 may also be that the SeGW triggers the UPF to initiate security protection of the user plane of the session.
- the SMF determines and sends to the UE the security protection information used by the user plane during the session, including an algorithm for security protection, an index for identifying a context of security protection, and The message authentication code, etc., after the UE is successfully authenticated, triggers the UE and the UPF to initiate the security protection of the respective user planes respectively.
- the security protection includes encryption and decryption protection and integrity protection, thereby enabling the UE and the UPF to initiate the security protection of the respective user planes. .
- the embodiment of the present application provides The method provided by the UE and the UPF can initiate the security protection of the user plane based on the session granularity. Therefore, the method provided by the embodiment of the present application can meet the requirement of the 5G network architecture for the security protection of the user plane.
- the relevant network element such as SMF, SEAF, or SPCF may determine the endpoint of the user plane in the session, and the endpoint of the user plane refers to the security protection of the user plane in addition to the UE.
- Network element the termination point of the user plane may be UPF or gNB, and the gNB may be understood as the next generation Node Base station, where a gNB belongs to the RAN when the end point of the user plane is UPF.
- the method for implementing the security protection between the UE and the UPF to initiate the user plane has been described in detail above. The following is the case where the termination point of the user plane is the gNB, and the detailed description is used to implement the negotiation between the UE and the gNB.
- the method of security protection for the user side is described in detail above. The following is the case where the termination point of the user plane is the gNB, and the detailed description is used to implement the negotiation between the UE and the gNB.
- the embodiment of the present application further provides a security protection negotiation method, which is used to implement security protection between the UE and the gNB to initiate user plane negotiation.
- the method occurs in the session establishment process.
- the interaction process between the network elements in the method is as shown in FIG. 22.
- the main difference between the method shown in FIG. 22 and the method shown in FIG. 3 is that the SMF receives the UE for sending. After the request to establish the session establishment request message of the current session, the SMF determines that the endpoint of the user plane is the gNB, and the SMF sends a notification message to the RAN, where the notification message is used to instruct the RAN to perform security protection negotiation between the UE and the gNB.
- the RAN after receiving the notification message, the RAN returns an acknowledgement message to the SMF, and performs a negotiation method of security protection of the user plane between the UE and the gNB.
- the termination point for the user plane is the case of the gNB.
- the UE may complete the security protection negotiation of the user plane through the security protection negotiation process between the UE and the gNB during the initial access.
- the negotiation method of the user plane security protection between the UE and the gNB in the method shown in FIG. 22 refer to the method SMF shown in FIG. 3 to perform the negotiation method of the user plane security protection between the UE and the UPF, but the difference is
- the network element in which the negotiation method is implemented is gNB, and the network element that needs to start the security protection of the user plane in addition to the UE is gNB.
- the method may be appropriately extended and changed in this embodiment, and the solution for expanding and changing the method shown in FIG. 22 may be referred to above.
- the method shown in Figure 3 is a solution for expansion and variation.
- the extension and change can be made in the following aspects: the UE and the gNB initiate the security protection of the user plane, and negotiate the network element (which may be SPCF, SEAF or AUSF) of the algorithm for determining the security protection used by the user plane during the session. And a network element that triggers the RAN to perform a security protection negotiation method of the user plane between the UE and the gNB, and the like.
- the network element which may be SPCF, SEAF or AUSF
- the UE and the gNB can negotiate to start the security protection of the respective user planes.
- the method shown in FIG. 22 can implement the security protection of the user plane based on the session granularity of the UE and the gNB negotiation, so the method shown in FIG. 22 can be Meet the needs of the 5G network architecture for the security protection of the user plane.
- FIG. 23 a security protection negotiation method provided by the embodiment of the present application is shown in FIG. 23, and the specific content of the method shown in FIG. 23 can be seen in FIG. 3 and FIG. I will not repeat them here.
- the embodiment of the present application further provides a session management network element (SMF), which can perform the method on the SMF side in a security protection negotiation method provided in Embodiment 1.
- SMF session management network element
- the SMF 2400 includes a processing unit 2401, a transmitting unit 2402, and a receiving unit 2403. among them,
- the processing unit 2401 is configured to determine security protection information used by the user plane during the session, where the security protection information includes an algorithm for security protection, an index for identifying a context of security protection, and a message authentication code, and the security protection includes encryption and decryption protection.
- the message authentication code refers to an authentication code generated by using an integrity protection algorithm and an integrity protection key of the integrity protection key included in the index to perform integrity protection on the first message;
- the sending unit 2402 is configured to send, to the UE, a first message that includes the security protection information used by the user plane determined by the processing unit 2401, and the security protection information used by the user plane is used by the UE according to the security protection information used by the user plane.
- the security protection of the user plane is initiated after a message is successfully authenticated by the integrity protection;
- the receiving unit 2403 is configured to receive a second message that is sent by the UE to indicate that the UE successfully authenticates the first message.
- the sending unit 2402 is further configured to send, to the user plane gateway UPF, an algorithm including a security protection used by the user plane and a context for security protection, which is determined by the processing unit 2401, and a third message is used.
- the UPF is triggered to initiate user plane security protection according to the security protection algorithm and the context of security protection.
- processing unit 2401 determines an algorithm for security protection, specifically:
- the algorithm for security protection is determined by self-negotiation.
- the SPCF is deployed on any one of the SMF, the security anchor network element SEAF, and the authentication service network element AUSF, or the SPCF is independently deployed in the network.
- the security protection algorithm is determined based on an algorithm supported by the UE, a security protection algorithm supported by the network, and an algorithm for security protection supported by the service to which the session belongs.
- the processing unit 2401 is further configured to: establish the current session before determining the security protection information used by the user plane; or,
- the receiving unit 2403 is further configured to: before the processing unit 2401 determines the security protection information used by the user plane, receive a session establishment request message sent by the UE for requesting to establish the current session;
- the sending unit 2402 When the sending unit 2402 sends the first message including the security protection information used by the user plane to the UE, the sending unit 2402 is specifically configured to: send a session establishment complete message including the security protection information used by the user plane to the UE.
- the processing unit 2401 is further configured to: after the receiving unit 2403 receives the session establishment request message sent by the UE for requesting to establish the current session, determine that the security endpoint of the user plane is an UPF;
- the sending unit 2402 is further configured to: after the processing unit 2401 determines that the security endpoint of the user plane is the UPF, send a notification message to the radio access network RAN to instruct the SMF to perform the security protection negotiation method.
- the receiving unit 2403 is further configured to: after the sending unit 2402 sends the first message including the security protection information used by the user plane to the UE, the receiving UE sends the UE to notify the UE that the first message fails to be authenticated. Fourth message;
- the processing unit 2401 is further configured to: according to the indication of the fourth message received by the receiving unit 2403, determine that the security protection of the user plane is not required to be triggered by the UPF.
- each unit refers to a security protection negotiation method provided in Embodiment 1, and details are not described herein again.
- the division of the unit in the embodiment of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- An integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, can be stored in a computer readable storage medium.
- the technical solution of the present application in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the various embodiments of the present application.
- the foregoing storage medium includes: a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like.
- ROM read-only memory
- RAM random access memory
- magnetic disk or an optical disk and the like.
- the embodiment of the present application further provides an SMF, which may perform the method on the SMF side in the security protection negotiation method provided in the first embodiment, and may be the same network element as the SMF shown in FIG. .
- the SMF 2500 includes a processor 2501, a transceiver 2502, and a memory 2503. among them,
- the processor 2501 is configured to read a program in the memory 2503 and perform the following process:
- the processor 2501 is configured to determine security protection information used by the user plane during the session.
- the security protection information includes an algorithm for security protection, an index for identifying a context of security protection, and a message authentication code, and the security protection includes encryption and decryption protection.
- the message authentication code refers to an authentication code generated by using an integrity protection algorithm and an integrity protection key of the integrity protection key included in the index to perform integrity protection on the first message;
- the processor 2501 is further configured to control the transceiver 2502 to send a first message of the security protection information used by the user plane to the UE, where the security protection information used by the user plane is used for security protection used by the UE according to the user plane. After the information is integrity-protected and authenticated, the user initiates security protection of the user plane;
- the processor 2501 is further configured to: control the transceiver 2502 to receive a second message sent by the UE to indicate that the UE successfully authenticates the first message, and control the transceiver 2502 to send the user plane gateway UPF, including the user plane during the session.
- the security protection algorithm used and the third message for the context of the security protection, the third message is used to trigger the UPF to initiate the security protection of the user plane according to the security protection algorithm and the security protection context.
- the processor 2501 when determining the algorithm of the security protection, is specifically configured to:
- the algorithm for security protection is determined by self-negotiation.
- the SPCF is deployed on any one of the SMF, the security anchor network element SEAF, and the authentication service network element AUSF, or the SPCF is independently deployed in the network.
- the security protection algorithm is determined based on an algorithm supported by the UE, a security protection algorithm supported by the network, and an algorithm for security protection supported by the service to which the session belongs.
- the processor 2501 is further configured to: establish the current session before determining the security protection information used by the user plane; or
- the processor 2501 is further configured to: before determining the security protection information used by the user plane, the control transceiver 2502 receives a session establishment request message sent by the UE for requesting to establish the current session;
- the processor 2501 is configured to: when the control transceiver 2502 sends the first message including the security protection information used by the user plane to the UE, specifically, the control transceiver 2502 sends the session establishment completion including the security protection information used by the user plane to the UE. Message.
- the processor 2501 is further configured to: after the control transceiver 2502 receives the session establishment request message sent by the UE for requesting to establish the current session, determine that the security endpoint of the user plane is the UPF, and control the sending and receiving.
- the router 2502 sends a notification message to the radio access network RAN for instructing the SMF to perform a security negotiation method.
- the processor 2501 is further configured to: after the control transceiver 2502 sends the first message including the security protection information used by the user plane to the UE, the control transceiver 2502 receives the UE sent by the UE to indicate the UE pair.
- the fourth message that the first message fails to be authenticated; according to the indication of the fourth message, it is determined that the security protection of the user plane is not required to be triggered by the UPF.
- the memory 2503 may store data used by the processor 2501 in performing operations, and the memory 2503 may be a memory of a physical host carrying an SDN controller, such as a hard disk, a USB flash drive, a Secure Digital (SD) card, or the like.
- SDN controller such as a hard disk, a USB flash drive, a Secure Digital (SD) card, or the like.
- Also provided in this embodiment is a computer storage medium for storing computer software instructions for use in the SMF of the above embodiment, comprising programs for performing the above embodiments.
- the embodiment of the present application further provides a user equipment UE, and the UE may perform the UE side method in a security protection negotiation method provided in Embodiment 1.
- the UE 2600 includes a receiving unit 2601, a processing unit 2602, and a transmitting unit 2603. among them,
- the receiving unit 2601 is configured to receive, by the session management network element SMF, a first message that includes the security protection information used by the user plane during the session, where the security protection information includes: a security protection algorithm, and is used to identify the security protection.
- the index of the context and the message authentication code the security protection includes encryption and decryption protection and integrity protection
- the message authentication code refers to the SMF using integrity protection algorithm and the security of the index identification includes the integrity protection key
- the processing unit 2602 is configured to: according to the security protection information used by the user plane received by the receiving unit 2601, to authenticate the first message; when the first message is successfully authenticated, initiate security protection of the user plane;
- the sending unit 2603 is configured to, when the processing unit 2602 successfully authenticates the first message, send a second message to the SMF to indicate that the UE successfully authenticates the first message.
- the processing unit 2602 when the security unit of the user plane is activated, the processing unit 2602 is specifically configured to: initiate encryption and decryption protection and integrity protection of the user plane, and then control the sending unit 2603 to send a second message to the SMF; or
- the processing unit 2602 is specifically configured to: initiate downlink decryption protection and integrity protection of the user plane, and then control the sending unit 2603 to send a second message to the SMF, and finally initiate uplink encryption protection of the user plane.
- the processing unit 2602 is further configured to: after the first message is authenticated according to the security protection information used by the user plane, determine that the security protection of the user plane is not activated when the first message fails to be authenticated;
- the sending unit 2603 is further configured to: when the processing unit 2602 fails to authenticate the first message, send a fourth message to the SMF to indicate that the UE fails to authenticate the first message.
- each unit refers to a security protection negotiation method provided in Embodiment 1, and details are not described herein again.
- the division of the unit in the embodiment of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the embodiment of the present application further provides a UE, where the UE may perform the UE side method in a security protection negotiation method provided in Embodiment 1, and may be the same device as the UE shown in FIG.
- the UE 2700 includes a processor 2701, a transceiver 2702, and a memory 2703. among them,
- the processor 2701 is configured to read a program in the memory 2703 and perform the following process:
- the processor 2701 is configured to receive, by the transceiver 2702, a first message sent by the session management network element SMF, including the security protection information used by the user plane during the session, where the security protection information includes: an algorithm for security protection, For identifying the context of the security protection and the message authentication code, the security protection includes encryption and decryption protection and integrity protection, and the message authentication code refers to the integrity of the SMF using integrity protection algorithm and the security of the index identification.
- the authentication code generated by the protected key for integrity protection of the first message is configured to receive, by the transceiver 2702, a first message sent by the session management network element SMF, including the security protection information used by the user plane during the session, where the security protection information includes: an algorithm for security protection, For identifying the context of the security protection and the message authentication code, the security protection includes encryption and decryption protection and integrity protection, and the message authentication code refers to the integrity of the SMF using integrity protection algorithm and the security of the index identification.
- the processor 2701 is further configured to: authenticate the first message according to the security protection information used by the user plane; when the first message is successfully authenticated, initiate security protection of the user plane, and control the transceiver 2702 to send to the SMF. And a second message indicating that the UE successfully authenticates the first message.
- the processor 2701 when the processor 2701 is configured to initiate security protection of the user plane, and the control transceiver 2702 sends a second message to the SMF to indicate that the UE successfully authenticates the first message, specifically, the processor 2701 is configured to: initiate a user plane. Encryption protection and integrity protection, and then controlling the transceiver 2702 to send a second message to the SMF; or,
- the processor 2701 is configured to: initiate a downlink decryption protection and integrity protection of the user plane when the second layer of the user plane is activated, and the control transceiver 2702 sends a second message to the SMF to indicate that the UE successfully authenticates the first message. Then, the control transceiver 2702 sends a second message to the SMF, and finally initiates the upstream encryption protection of the user plane.
- the processor 2701 is further configured to: after the first message is authenticated according to the security protection information used by the user plane, determine that the user plane is not activated when the first message fails to be authenticated, And the control transceiver 2702 sends a fourth message to the SMF to indicate that the UE fails to authenticate the first message.
- the memory 2703 can store data used by the processor 2701 in performing operations, and the memory 2703 can be a memory of a physical host carrying an SDN controller, such as a hard disk, a USB flash drive, an SD card, and the like.
- Also provided in this embodiment is a computer storage medium for storing computer software instructions for the UE of the above embodiment, which includes a program for executing the above embodiment.
- the embodiment of the present application further provides a user plane gateway UPF, and the UPF can perform the method on the UPF side in the security protection negotiation method provided in the first embodiment.
- the UPF 2800 includes a receiving unit 2801 and a processing unit 2802. among them,
- the receiving unit 2801 is configured to receive, by the session management network element SMF, an algorithm including a security protection used by the user plane during the session and a third message for security protection, where the third message is used to indicate that the UPF is secure.
- the protected algorithm and the context for security protection initiate user-side security protection, including encryption and decryption protection and integrity protection;
- the processing unit 2802 is configured to initiate security protection of the user plane according to the indication of the third message received by the receiving unit 2801.
- the receiving unit 2801 when the receiving unit 2801 receives the third message that is sent by the SMF, including the security protection used by the user plane during the session and the context for security protection, the receiving unit 2801 is specifically configured to:
- the SMF After the SMF determines that the UE initiates security protection of the user plane, receiving a third message sent by the SMF; or
- the first trigger message is sent by the SMF, and the first trigger message is used to trigger the UPF to start the downlink encryption protection and integrity protection of the user plane.
- the second trigger message sent by the SMF is received, and the second trigger message is used to trigger the UPF to start the uplink decryption protection of the user plane.
- each unit refers to a security protection negotiation method provided in Embodiment 1, and details are not described herein again.
- the division of the unit in the embodiment of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the embodiment of the present application further provides a UPF.
- the UPF may perform the method on the UPF side in the security protection negotiation method provided in the first embodiment, and may be the same network element as the UPF shown in FIG. .
- the UPF 2900 includes a processor 2901, a transceiver 2902, and a memory 2903. among them,
- the processor 2901 is configured to read a program in the memory 2903 and perform the following process:
- the processor 2901 is configured to control the transceiver 2902 to receive the session management network element SMF and send the session process.
- the processor 2901 is further configured to start security protection of the user plane according to the indication of the third message.
- the processor 2901 controls the transceiver 2902 to receive, when the SMF sends an algorithm including an algorithm for security protection used by the user plane during the session and a third message for security protection, specifically for:
- control transceiver 2902 After the SMF determines that the UE initiates the security protection of the user plane, the control transceiver 2902 receives the third message sent by the SMF; or
- the control transceiver 2902 receives the first trigger message sent by the SMF, where the first trigger message is used to trigger the UPF to start the downlink encryption protection and completeness of the user plane.
- the control transceiver 2902 After the SMF determines that the UE initiates the security protection of the user plane, the control transceiver 2902 receives the second trigger message sent by the SMF, and the second trigger message is used to trigger the UPF to initiate the uplink decryption protection of the user plane.
- the memory 2903 can store data used by the processor 2901 in performing operations, and the memory 2903 can be a memory of a physical host that carries the SDN controller, such as a hard disk, a USB flash drive, an SD card, and the like.
- Also provided in this embodiment is a computer storage medium for storing computer software instructions for use in the UPF of the above embodiment, comprising programs for executing the above-described embodiments.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (24)
- 一种安全保护协商方法,其特征在于,包括:会话管理网元SMF确定本次会话过程中用户面所使用的安全保护信息,所述安全保护信息包括安全保护的算法、用于识别安全保护的上下文的索引以及消息认证码,所述安全保护包括加解密保护和完整性保护,所述消息认证码是指所述SMF使用完整性保护的算法和所述索引识别的安全保护的上下文包括的完整性保护的密钥对第一消息进行完整性保护生成的认证码;所述SMF向所述UE发送包括所述用户面所使用的安全保护信息的所述第一消息,所述用户面所使用的安全保护信息用于所述UE根据所述用户面所使用的安全保护信息对所述第一消息进行完整性保护认证成功后启动用户面的安全保护;所述SMF接收所述UE发送的用于指示所述UE对所述第一消息认证成功的第二消息,以及向用户面网关UPF发送包括本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息,所述第三消息用于触发所述UPF根据所述安全保护的算法和所述安全保护的上下文启动用户面的安全保护。
- 如权利要求1所述的方法,其特征在于,所述SMF确定所述安全保护的算法,包括:所述SMF从安全策略控制网元SPCF获取所述SPCF协商确定的所述安全保护的算法;或者,所述SMF自行协商确定所述安全保护的算法。
- 如权利要求2所述的方法,其特征在于,所述SPCF部署在所述SMF、安全锚点网元SEAF和认证服务网元AUSF中的任意一个网元上,或者所述SPCF独立部署于网络中。
- 如权利要求1至3任一所述的方法,其特征在于,所述安全保护的算法是基于所述UE支持的安全保护的算法、网络支持的安全保护的算法和本次会话所属业务支持的安全保护的算法协商确定的。
- 如权利要求1至4任一所述的方法,其特征在于,所述SMF确定所述用户面所使用的安全保护信息之前,还包括:所述SMF建立本次会话;或者,所述SMF确定所述用户面所使用的安全保护信息之前,还包括:所述SMF接收所述UE发送的用于请求建立本次会话的会话建立请求消息;所述SMF向所述UE发送包括所述用户面所使用的安全保护信息的第一消息,包括:所述SMF向所述UE发送包括所述用户面所使用的安全保护信息的会话建立完成消息。
- 如权利要求5所述的方法,其特征在于,所述SMF接收所述UE发送的用于请求建立本次会话的会话建立请求消息之后,还包括:所述SMF确定用户面的安全终结点为所述UPF,并通知无线接入网络RAN,所述SMF执行所述安全保护协商方法。
- 如权利要求1至6任一所述的方法,其特征在于,所述SMF向所述UE发送包括所述用户面所使用的安全保护信息的所述第一消息之后,还包括:所述SMF接收所述UE发送的用于指示所述UE对所述第一消息认证失败的第四消息;所述SMF根据所述第四消息的指示,确定不需要触发所述UPF启动用户面的安全保 护。
- 一种安全保护协商方法,其特征在于,包括:用户设备UE接收会话管理网元SMF发送的包括本次会话过程中用户面所使用的安全保护信息的第一消息,所述安全保护信息包括:安全保护的算法、用于识别安全保护的上下文的索引以及消息认证码,所述安全保护包括加解密保护和完整性保护,所述消息认证码是指所述SMF使用完整性保护的算法和所述索引识别的安全保护的上下文包括的完整性保护的密钥对所述第一消息进行完整性保护生成的认证码;所述UE根据所述用户面所使用的安全保护信息对所述第一消息进行认证;当所述UE对所述第一消息认证成功时,所述UE启动用户面的安全保护,以及向所述SMF发送用于指示所述UE对所述第一消息认证成功的第二消息。
- 如权利要求8所述的方法,其特征在于,所述UE启动用户面的安全保护,以及向所述SMF发送用于指示所述UE对所述第一消息认证成功的第二消息,包括:所述UE启动用户面的加解密保护和完整性保护,然后向所述SMF发送用于指示所述UE对所述第一消息认证成功的第二消息;或者,所述UE启动用户面的下行解密保护和完整性保护,然后向所述SMF发送用于指示所述UE对所述第一消息认证成功的第二消息,最后启动用户面的上行加密保护。
- 如权利要求8所述的方法,其特征在于,所述UE根据所述用户面所使用的安全保护信息对所述第一消息进行认证之后,还包括:当所述UE对所述第一消息认证失败时,所述UE确定不启动用户面的安全保护,以及向所述SMF发送用于指示所述UE对所述第一消息认证失败的第四消息。
- 一种安全保护协商方法,其特征在于,包括:用户面网关UPF接收会话管理网元SMF发送的包括本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息,所述第三消息用于指示所述UPF根据所述安全保护的算法和所述用于安全保护的上下文启动用户面的安全保护,所述安全保护包括加解密保护和完整性保护;所述UPF根据所述第三消息的指示,启动用户面的安全保护。
- 如权利要求11所述的方法,其特征在于,所述UPF接收SMF发送的包括本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息,包括:在所述SMF确定所述UE启动用户面的安全保护之后,所述UPF接收SMF发送的所述第三消息;或者,在所述SMF向所述UE发送本次会话过程中用户面所使用的安全保护信息之后,所述UPF接收SMF发送的第一触发消息,所述第一触发消息用于触发所述UPF启动用户面的下行加密保护和完整性保护;在所述SMF确定所述UE启动用户面的安全保护之后,所述UPF接收SMF发送的第二触发消息,所述第二触发消息用于触发所述UPF启动用户面的上行解密保护。
- 一种会话管理网元SMF,其特征在于,包括:处理单元,用于确定本次会话过程中用户面所使用的安全保护信息,所述安全保护信息包括安全保护的算法、用于识别安全保护的上下文的索引以及消息认证码,所述安全保护包括加解密保护和完整性保护,所述消息认证码是指使用完整性保护的算法和所述索引识别的安全保护的上下文包括的完整性保护的密钥对第一消息进行完整性保护生成的认 证码;发送单元,用于向所述UE发送包括所述处理单元确定的所述用户面所使用的安全保护信息的所述第一消息,所述用户面所使用的安全保护信息用于所述UE根据所述用户面所使用的安全保护信息对所述第一消息进行完整性保护认证成功后启动用户面的安全保护;接收单元,用于接收所述UE发送的用于指示所述UE对所述第一消息认证成功的第二消息;所述发送单元,还用于向用户面网关UPF发送包括所述处理单元确定的本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息,所述第三消息用于触发所述UPF根据所述安全保护的算法和所述安全保护的上下文启动用户面的安全保护。
- 如权利要求13所述的SMF,其特征在于,所述处理单元确定所述安全保护的算法时,具体用于:从安全策略控制网元SPCF获取所述SPCF协商确定的所述安全保护的算法;或者,自行协商确定所述安全保护的算法。
- 如权利要求14所述的SMF,其特征在于,所述SPCF部署在所述SMF、安全锚点网元SEAF和认证服务网元AUSF中的任意一个网元上,或者所述SPCF独立部署于网络中。
- 如权利要求13至15任一所述的SMF,其特征在于,所述安全保护的算法是基于所述UE支持的安全保护的算法、网络支持的安全保护的算法和本次会话所属业务支持的安全保护的算法协商确定的。
- 如权利要求13至16任一所述的SMF,其特征在于,所述处理单元还用于:在确定所述用户面所使用的安全保护信息之前,建立本次会话;或者,所述接收单元还用于:在所述处理单元确定所述用户面所使用的安全保护信息之前,接收所述UE发送的用于请求建立本次会话的会话建立请求消息;所述发送单元在向所述UE发送包括所述用户面所使用的安全保护信息的第一消息时,具体用于:向所述UE发送包括所述用户面所使用的安全保护信息的会话建立完成消息。
- 如权利要求17所述的SMF,其特征在于,所述处理单元还用于:在所述接收单元接收所述UE发送的用于请求建立本次会话的会话建立请求消息之后,确定用户面的安全终结点为所述UPF;所述发送单元还用于:在所述处理单元确定用户面的安全终结点为所述UPF之后,向无线接入网络RAN发送用于指示所述SMF执行安全保护协商方法的通知消息。
- 如权利要求13至18任一所述的SMF,其特征在于,所述接收单元还用于:在所述发送单元向所述UE发送包括所述用户面所使用的安全保护信息的所述第一消息之后,接收所述UE发送的用于指示所述UE对所述第一消息认证失败的第四消息;所述处理单元还用于:根据所述接收单元接收的所述第四消息的指示,确定不需要触发所述UPF启动用户面的安全保护。
- 一种用户设备UE,其特征在于,包括:接收单元,用于接收会话管理网元SMF发送的包括本次会话过程中用户面所使用的 安全保护信息的第一消息,所述安全保护信息包括:安全保护的算法、用于识别安全保护的上下文的索引以及消息认证码,所述安全保护包括加解密保护和完整性保护,所述消息认证码是指所述SMF使用完整性保护的算法和所述索引识别的安全保护的上下文包括的完整性保护的密钥对所述第一消息进行完整性保护生成的认证码;处理单元,用于根据所述接收单元接收的所述用户面所使用的安全保护信息对所述第一消息进行认证;当对所述第一消息认证成功时,启动所述UE的用户面的安全保护;发送单元,用于当所述处理单元对所述第一消息认证成功时,向所述SMF发送用于指示所述UE对所述第一消息认证成功的第二消息。
- 如权利要求20所述的UE,其特征在于,所述处理单元在启动用户面的安全保护时,具体用于:启动用户面的加解密保护和完整性保护,然后控制所述发送单元向所述SMF发送所述第二消息;或者,所述处理单元在启动用户面的安全保护时,具体用于:启动用户面的下行解密保护和完整性保护,然后控制所述发送单元向所述SMF发送所述第二消息,最后启动用户面的上行加密保护。
- 如权利要求20所述的UE,其特征在于,所述处理单元还用于:在根据所述用户面所使用的安全保护信息对所述第一消息进行认证之后,当对所述第一消息认证失败时,确定不启动用户面的安全保护;所述发送单元还用于:当所述处理单元对所述第一消息认证失败时,向所述SMF发送用于指示所述UE对所述第一消息认证失败的第四消息。
- 一种用户面网关UPF,其特征在于,包括:接收单元,用于接收会话管理网元SMF发送的包括本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息,所述第三消息用于指示所述UPF根据所述安全保护的算法和所述用于安全保护的上下文启动用户面的安全保护,所述安全保护包括加解密保护和完整性保护;处理单元,用于根据所述接收单元接收的所述第三消息的指示,启动用户面的安全保护。
- 如权利要求23所述的UPF,其特征在于,所述接收单元接收SMF发送的包括本次会话过程中用户面所使用的安全保护的算法和用于安全保护的上下文的第三消息时,具体用于:在所述SMF确定所述UE启动用户面的安全保护之后,接收SMF发送的所述第三消息;或者,在所述SMF向所述UE发送本次会话过程中用户面所使用的安全保护信息之后,接收SMF发送的第一触发消息,所述第一触发消息用于触发所述UPF启动用户面的下行加密保护和完整性保护;在所述SMF确定所述UE启动用户面的安全保护之后,接收SMF发送的第二触发消息,所述第二触发消息用于触发所述UPF启动用户面的上行解密保护。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17894273.6A EP3557836A4 (en) | 2017-01-24 | 2017-08-16 | METHOD FOR TREATING SECURITY PROTECTION AND NETWORK ELEMENT |
JP2019536226A JP6769014B2 (ja) | 2017-01-24 | 2017-08-16 | セキュリティ保護ネゴシエーション方法およびネットワークエレメント |
KR1020197022631A KR20190097278A (ko) | 2017-01-24 | 2017-08-16 | 보안 보호 협상 방법 및 네트워크 엘리먼트 |
US16/520,369 US10856141B2 (en) | 2017-01-24 | 2019-07-24 | Security protection negotiation method and network element |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710060035.8A CN108347416B (zh) | 2017-01-24 | 2017-01-24 | 一种安全保护协商方法及网元 |
CN201710060035.8 | 2017-01-24 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/520,369 Continuation US10856141B2 (en) | 2017-01-24 | 2019-07-24 | Security protection negotiation method and network element |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018137334A1 true WO2018137334A1 (zh) | 2018-08-02 |
Family
ID=62962896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/097671 WO2018137334A1 (zh) | 2017-01-24 | 2017-08-16 | 一种安全保护协商方法及网元 |
Country Status (6)
Country | Link |
---|---|
US (1) | US10856141B2 (zh) |
EP (1) | EP3557836A4 (zh) |
JP (1) | JP6769014B2 (zh) |
KR (1) | KR20190097278A (zh) |
CN (1) | CN108347416B (zh) |
WO (1) | WO2018137334A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3820181A4 (en) * | 2018-08-10 | 2021-07-21 | Huawei Technologies Co., Ltd. | PROCESS AND DEVICE ALLOWING SECURE CONVERSATIONS |
US11330475B2 (en) | 2018-12-28 | 2022-05-10 | Samsung Electronics Co., Ltd. | Method and apparatus for providing rule information in wireless communication system |
US12089045B2 (en) | 2019-09-16 | 2024-09-10 | Huawei Technologies Co., Ltd. | Air interface information security protection method and apparatus |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830993B (zh) * | 2018-08-10 | 2021-08-20 | 华为技术有限公司 | 一种数据处理的方法、装置和计算机可读存储介质 |
CN110831249B (zh) * | 2018-08-13 | 2021-10-01 | 华为技术有限公司 | 通信方法和装置 |
CN110913389B (zh) | 2018-09-15 | 2022-04-05 | 华为技术有限公司 | 获取安全上下文的方法和装置 |
CN110943964B (zh) * | 2018-09-21 | 2022-07-22 | 华为技术有限公司 | 数据校验方法、装置及存储介质 |
CN111491394B (zh) * | 2019-01-27 | 2022-06-14 | 华为技术有限公司 | 用户面安全保护的方法和装置 |
CN111669750B (zh) * | 2019-03-07 | 2021-08-03 | 华为技术有限公司 | 一种pdu会话二次验证的方法及装置 |
CN112351431B (zh) * | 2019-08-09 | 2023-06-30 | 华为技术有限公司 | 一种安全保护方式确定方法及装置 |
CN114303438B (zh) * | 2019-08-22 | 2024-01-09 | Lg电子株式会社 | 根据5g中的应用服务器的重定位的高效处理方法 |
CN112492584B (zh) * | 2019-08-23 | 2022-07-22 | 华为技术有限公司 | 终端设备和用户面网元之间的安全通信方法、装置及系统 |
KR102266409B1 (ko) * | 2019-10-30 | 2021-06-18 | 에스케이텔레콤 주식회사 | 무결성 검사의 대상이 되는 세션 관련 메시지를 생성하는 방법 및 상기 세션 관련 메시지에 대한 무결성 검사를 수행하는 방법 |
CN111224970A (zh) * | 2019-12-31 | 2020-06-02 | 中移(杭州)信息技术有限公司 | Sdn网络系统、网络攻击防御方法、设备及存储介质 |
CN112788594B (zh) * | 2020-06-03 | 2023-06-27 | 中兴通讯股份有限公司 | 数据传输方法、装置和系统、电子设备、存储介质 |
EP4184978A4 (en) * | 2020-07-30 | 2023-08-30 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD AND DEVICE |
WO2022027696A1 (zh) * | 2020-08-07 | 2022-02-10 | 华为技术有限公司 | 一种安全信息的配置方法和装置 |
CN114499821A (zh) * | 2020-11-12 | 2022-05-13 | 华为技术有限公司 | 加解密系统、光模块和相关装置、系统 |
KR102418470B1 (ko) | 2022-01-03 | 2022-07-08 | (주)유엠로직스 | 연산기법을 이용한 비대면 서비스 보안정책 협상 시스템 및 그 방법 |
CN116939588A (zh) * | 2022-03-31 | 2023-10-24 | 华为技术有限公司 | 通信方法及装置 |
CN117376900A (zh) * | 2022-06-29 | 2024-01-09 | 华为技术有限公司 | 一种通信方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101001252A (zh) * | 2006-06-25 | 2007-07-18 | 华为技术有限公司 | 一种注册方法和一种用户面安全算法的协商方法及装置 |
CN101072092A (zh) * | 2006-05-11 | 2007-11-14 | 华为技术有限公司 | 一种实现控制面和用户面密钥同步的方法 |
CN101873586A (zh) * | 2009-04-24 | 2010-10-27 | 华为技术有限公司 | 非接入层安全上下文的同步方法及相关设备 |
US20170013453A1 (en) * | 2015-07-12 | 2017-01-12 | Qualcomm Incorporated | Network architecture and security with encrypted client device contexts |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220674B (zh) * | 2007-09-03 | 2015-09-09 | 华为技术有限公司 | 一种终端移动时防止降质攻击的方法、系统及装置 |
US8429399B2 (en) * | 2007-10-02 | 2013-04-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and arrangement for security activation detection in a telecommunication system |
CN101355809B (zh) * | 2008-09-12 | 2013-03-20 | 中兴通讯股份有限公司 | 一种协商启用安全上下文的方法和系统 |
CN101505479B (zh) * | 2009-03-16 | 2014-04-30 | 中兴通讯股份有限公司 | 一种认证过程中安全上下文协商方法和系统 |
CN102006294B (zh) * | 2010-11-25 | 2014-08-20 | 中兴通讯股份有限公司 | Ims多媒体通信方法和系统、终端及ims核心网 |
CN102448058B (zh) * | 2011-01-10 | 2014-04-30 | 华为技术有限公司 | 一种Un接口上的数据保护方法与装置 |
CN104160777B (zh) * | 2013-03-13 | 2018-01-23 | 华为技术有限公司 | 数据的传输方法、装置和系统 |
US9590962B2 (en) * | 2014-07-07 | 2017-03-07 | Alcatel-Lucent Usa Inc. | Using cookies to identify security contexts for connectionless service |
CN104796887B (zh) | 2015-04-14 | 2018-08-21 | 大唐移动通信设备有限公司 | 一种安全信息交互的方法和装置 |
US10362011B2 (en) | 2015-07-12 | 2019-07-23 | Qualcomm Incorporated | Network security architecture |
JP6651613B2 (ja) * | 2015-10-05 | 2020-02-19 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | ワイヤレス通信 |
US10298549B2 (en) * | 2015-12-23 | 2019-05-21 | Qualcomm Incorporated | Stateless access stratum security for cellular internet of things |
JPWO2018079690A1 (ja) | 2016-10-26 | 2019-09-19 | 日本電気株式会社 | システム、ネットワーク装置、端末、及び方法 |
-
2017
- 2017-01-24 CN CN201710060035.8A patent/CN108347416B/zh active Active
- 2017-08-16 EP EP17894273.6A patent/EP3557836A4/en not_active Ceased
- 2017-08-16 KR KR1020197022631A patent/KR20190097278A/ko active IP Right Grant
- 2017-08-16 JP JP2019536226A patent/JP6769014B2/ja not_active Expired - Fee Related
- 2017-08-16 WO PCT/CN2017/097671 patent/WO2018137334A1/zh unknown
-
2019
- 2019-07-24 US US16/520,369 patent/US10856141B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101072092A (zh) * | 2006-05-11 | 2007-11-14 | 华为技术有限公司 | 一种实现控制面和用户面密钥同步的方法 |
CN101001252A (zh) * | 2006-06-25 | 2007-07-18 | 华为技术有限公司 | 一种注册方法和一种用户面安全算法的协商方法及装置 |
CN101873586A (zh) * | 2009-04-24 | 2010-10-27 | 华为技术有限公司 | 非接入层安全上下文的同步方法及相关设备 |
US20170013453A1 (en) * | 2015-07-12 | 2017-01-12 | Qualcomm Incorporated | Network architecture and security with encrypted client device contexts |
Non-Patent Citations (1)
Title |
---|
See also references of EP3557836A4 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3820181A4 (en) * | 2018-08-10 | 2021-07-21 | Huawei Technologies Co., Ltd. | PROCESS AND DEVICE ALLOWING SECURE CONVERSATIONS |
US11778459B2 (en) | 2018-08-10 | 2023-10-03 | Huawei Technologies Co., Ltd. | Secure session method and apparatus |
US11330475B2 (en) | 2018-12-28 | 2022-05-10 | Samsung Electronics Co., Ltd. | Method and apparatus for providing rule information in wireless communication system |
US12089045B2 (en) | 2019-09-16 | 2024-09-10 | Huawei Technologies Co., Ltd. | Air interface information security protection method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
EP3557836A1 (en) | 2019-10-23 |
CN108347416A (zh) | 2018-07-31 |
US10856141B2 (en) | 2020-12-01 |
EP3557836A4 (en) | 2019-11-20 |
US20190349763A1 (en) | 2019-11-14 |
JP6769014B2 (ja) | 2020-10-14 |
JP2020505805A (ja) | 2020-02-20 |
CN108347416B (zh) | 2021-06-29 |
KR20190097278A (ko) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018137334A1 (zh) | 一种安全保护协商方法及网元 | |
US11659393B2 (en) | Method, apparatus, and system for performing an establishment of a security context between user equipment and an access node | |
US11064356B2 (en) | Security framework for MSG3 and MSG4 in early data transmission | |
KR102024653B1 (ko) | 사용자 장비(ue)를 위한 액세스 방법, 디바이스 및 시스템 | |
US9843575B2 (en) | Wireless network authentication method and wireless network authentication apparatus | |
KR102245688B1 (ko) | 키 생성 방법, 사용자 장비, 장치, 컴퓨터 판독가능 저장 매체, 및 통신 시스템 | |
WO2012097723A1 (zh) | 数据的安全保护方法、网络侧实体和通信终端 | |
WO2016028530A1 (en) | Secure provisioning of an authentication credential | |
WO2016134536A1 (zh) | 密钥生成方法、设备及系统 | |
JP7237200B2 (ja) | パラメータ送信方法及び装置 | |
WO2015096138A1 (zh) | 分流方法、用户设备、基站和接入点 | |
CN110583036A (zh) | 网络认证方法、网络设备及核心网设备 | |
WO2015131379A1 (zh) | 一种信息保护方法、基站、用户设备和移动管理实体 | |
CN109756324A (zh) | 一种Mesh网络中的密钥协商方法、终端及网关 | |
CN113170369A (zh) | 用于在系统间改变期间的安全上下文处理的方法和装置 | |
WO2018126791A1 (zh) | 一种认证方法及装置、计算机存储介质 | |
CN108270560B (zh) | 一种密钥传输方法及装置 | |
CN109586913B (zh) | 安全认证方法、安全认证装置、通信设备及存储介质 | |
WO2020173451A1 (zh) | 一种前向安全实现方法、装置及存储介质 | |
CN118803748A (zh) | 通信网络算法协商方法、装置、设备、介质及程序产品 | |
EP3879867B1 (en) | Method, apparatus, and system for establishing security context | |
WO2012097725A1 (zh) | 认证方法和认证设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17894273 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019536226 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017894273 Country of ref document: EP Effective date: 20190715 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197022631 Country of ref document: KR Kind code of ref document: A |