WO2018196705A1 - Network security protection method, device and system - Google Patents

Network security protection method, device and system Download PDF

Info

Publication number
WO2018196705A1
WO2018196705A1 PCT/CN2018/084025 CN2018084025W WO2018196705A1 WO 2018196705 A1 WO2018196705 A1 WO 2018196705A1 CN 2018084025 W CN2018084025 W CN 2018084025W WO 2018196705 A1 WO2018196705 A1 WO 2018196705A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
terminal
security context
nas
message
Prior art date
Application number
PCT/CN2018/084025
Other languages
French (fr)
Chinese (zh)
Inventor
舒林
贝隆克里斯蒂安 埃雷罗
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018196705A1 publication Critical patent/WO2018196705A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a network security protection method, device, and system.
  • the mobile communication network defined by the 3rd Generation Partnership Project (3GPP) introduces a security protection mechanism to ensure the security of mobile communications, including: confidentiality, integrity and availability of communications.
  • the current Evolved Packet System (EPS) network adopts a two-way identity authentication mechanism to implement mutual authentication between the network and the terminal, and adopts an encryption protection mechanism and an integrity protection mechanism to implement the terminal and the network. Confidentiality and integrity of communication between.
  • the EPS network introduces an independent two-layer security mechanism, including the Access Stratum (AS) security between the terminal and the access network, and the non-access layer between the terminal and the core network (Non Access Stratum, NAS). )Safety. These two layers of security exist independently in parallel and employ different security contexts.
  • AS Access Stratum
  • NAS Non Access Stratum
  • the initial NAS request message initiated by the terminal from the idle state is not encrypted, which is easily subject to the denial of service initiated by the pseudo network (or called a fake network). attack. Because when the NAS message is transmitted on the air interface, it is easily intercepted by the pseudo network. Further, the pseudo network may construct a corresponding NAS reject message and carry a reject cause value, for example, the EPS service is unavailable. Since the terminal cannot distinguish whether the received NAS reject message that is not integrity-protected is sent by the real network or sent by the pseudo-network, it adopts a consistent processing manner, and performs the action corresponding to the received reject cause value, thereby A denial of service attack is caused, which affects the normal business use of the terminal.
  • 5G fifth generation
  • 5G fifth generation
  • 3GPP is currently researching and developing an enhanced security mechanism for 5G networks. If the same security protection mechanism as in the above EPS network is still adopted in the 5G network, it will also suffer from the DoS attack.
  • the embodiments of the present application provide a network security protection method, device, and system, which can improve the security of a 5G network and other networks in the future.
  • the embodiment of the present application provides the following technical solutions:
  • a network security protection method comprising: receiving, by a first network device, a non-access stratum NAS request message from a security protection of a terminal, the secured NAS request message being a first target using the terminal
  • the security context is obtained by securing the initial NAS request message, where the header of the secured NAS request message is a first NAS message header, and the first NAS message header includes the identifier of the terminal and the first security header.
  • the first security header type information is used to indicate a type of the first target security context, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context,
  • the second security context is a security context generated by the authentication process;
  • the security protection includes encryption;
  • the first network device determines the first target security context according to the identifier of the terminal and the first security header type information;
  • the first network device Securely verifying the secured NAS request message using the first target security context
  • the security verification includes decryption;
  • the first network device uses the second target security context to secure the NAS rejection message according to the result of the security verification, and obtains a security-protected NAS rejection message, where the second target security context includes the a first security context or the second security context;
  • the first network device sends the secured NAS rejection message to the terminal, where the header of the secured NAS rejection message is a second NAS message header, the second NAS
  • the identifier includes the identifier of
  • the terminal since the terminal sends the NAS request message for securing the initial NAS request message to the first network device, the terminal cannot be authenticated by the pseudo network, and the pseudo network does not construct the corresponding NAS reject message. This can avoid some DOS attacks.
  • the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
  • the first network device uses the second target security context to secure the NAS reject message according to the result of the security verification, including: if the security verification passes, and the first network device does not store the a second security context, the first network device uses the first security context to secure the NAS reject message of the initial NAS request message; or, if the security verification passes, and the second security context is stored in the first network device The first network device uses the second security context to secure the NAS reject message of the initial NAS request message; or, if the security verification fails, and the second security context is not stored in the first network device, the first network The device uses the first security context to secure the NAS reject message; or, if the security verification fails, and the second security context is stored in the first network device, the first network device uses the second security context to the NAS Reject the message for security protection.
  • the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the NAS denial message is used for security protection. If the second security context does not exist, the NAS security message is secured using the first security context.
  • the first target security context includes the first security context; the first network device determines the first target security context according to the identifier of the terminal and the first security header type information, including: Determining whether the first security context is saved locally according to the identifier of the terminal and the first security header type information; and if the first network device determines that the first security context is not saved locally, sending the first to the second network device a message, the first message includes an identifier of the terminal, configured to request to acquire the first security context; the first network device receives the first security context from the second network device; or, if the first network device determines to save locally There is the first security context, and the first security context is obtained locally. Based on the solution, the first network device may determine a first target context for securing the initial NAS request message, and then perform security verification on the securely protected NAS request message according to the first target security context.
  • the first message further includes an identifier of a public land mobile network PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal.
  • the second network device may be configured according to the identifier of the terminal and the identifier of the PLMN currently serving the terminal carried in the first message.
  • the identifier of the network slice of the terminal service or the information of the access technology currently used by the terminal selects the first security context from the plurality of security contexts of the terminal.
  • the first network device includes an access and mobility management function AMF entity or a session management function SMF entity
  • the second network device includes a unified data management UDM entity or an authentication server function AUSF entity.
  • a second aspect provides a network security protection method, the method comprising: determining, by a terminal, a first target security context of the terminal, where the first target security context includes a first security context or a second security context, where the first security context is The configured security context, the second security context is a security context generated by the authentication process; the terminal uses the first target security context to secure the initial non-access stratum NAS request message, and obtains a securely protected NAS request message, the security The protection includes the encryption; the terminal sends the security-protected NAS request message to the first network device, where the message header of the secured NAS request message is a first NAS message header, and the first NAS message header includes the identifier of the terminal and the a security header type information, the first security header type information is used to indicate a type of the first target security context; the terminal receives a NAS denial message from the first network device security protection, the security protected NAS rejection message is used The second target security context of the terminal is secured by the NAS rejection message.
  • the message header of the security-protected NAS reject message is a second NAS message header, and the second NAS message header includes an identifier of the terminal and second security header type information, where the second security header type information is used. Determining a type of the second target security context, the second target security context including the first security context or the second security context; the terminal determining the second target security according to the identifier of the terminal and the second security header type information Context; the terminal uses the second target security context to perform security verification on the secured NAS rejection message, the security verification including decryption.
  • the terminal since the terminal sends the NAS request message for securing the initial NAS request message to the first network device, the terminal cannot be authenticated by the pseudo network, and the pseudo network does not construct the corresponding NAS reject message. This can avoid some DOS attacks.
  • the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
  • the method further includes: the terminal receiving the NAS rejection message that does not perform the security protection; and the terminal discarding the NAS that does not perform the security protection. Reject the message. That is to say, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is sent by the real network or is sent by the pseudo network according to whether security protection is performed, and then the corresponding processing can be performed, for example, discarding the pseudo network transmission.
  • the NAS that does not protect the security rejects the message so that the risk of DOS attack can be further completely prevented, and the security of the 5G network and other networks in the future can be improved.
  • the terminal determines the first target security context of the terminal, including: if the terminal determines that the second security context is locally saved, the terminal determines the second security context as the first target security context of the terminal. Or, if the terminal determines that the second security context is not saved locally, the terminal determines the first security context, and determines the first security context as the first target security context of the terminal. That is, in the embodiment of the present application, the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the initial NAS request message is secured by using the second security context. If the second security context does not exist, the initial NAS request message is secured using the first security context.
  • the first target security context includes the first security context; the terminal determining the first security context comprises: the terminal reading the first security configured on the global subscriber identity module USIM card of the terminal Context; or, the terminal acquires the first security context configured on the terminal.
  • the operator can also configure the security context on the USIM card used by the terminal and the terminal.
  • the terminal usually uses the security context configured on the USIM card.
  • the terminal may also use the security context configured on the terminal, which is not specifically limited in this embodiment.
  • the first target security context includes the first security context; the terminal determines the first security context, including: the terminal is currently serving the terminal according to the public land mobile network PLMN currently serving the terminal. a network slice or an access technology currently used by the terminal, selecting the first security context from a plurality of security contexts of the terminal, wherein the plurality of security contexts includes the first security context, the plurality of security contexts The type is the same as the type of the first security context. In this way, when the operator configures multiple security contexts for the terminal on the terminal, the terminal can select the first security context from multiple security contexts.
  • the first network device includes an access and mobility management function AMF entity or a session management function SMF entity.
  • a first network device having the functionality to implement the method described in the first aspect above.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fourth aspect provides a first network device, including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, and the processor is connected to the memory through the bus, when the first network device In operation, the processor executes the computer-executable instructions stored by the memory to cause the first network device to perform the network security protection method of any of the first aspects above.
  • the embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium stores instructions, when executed on a computer, to enable the computer to perform any one of the foregoing first aspects.
  • Network security protection method
  • an embodiment of the present application provides a computer program product comprising instructions, which when executed on a computer, enable the computer to perform the network security protection method of any one of the above first aspects.
  • a terminal having the function of implementing the method described in the second aspect above.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a terminal including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, and the processor is connected to the memory through the bus, and when the terminal is running, the processor The computer executing the memory stores instructions to cause the terminal to perform the network security protection method as described in any of the above second aspects.
  • the embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium stores instructions that, when run on a computer, enable the computer to perform any of the foregoing second aspects.
  • Network security protection method
  • the embodiment of the present application provides a computer program product comprising instructions, which when executed on a computer, enable the computer to perform the network security protection method of any one of the foregoing second aspects.
  • the embodiment of the present application provides a network security protection system, where the network security protection system includes the terminal in any of the foregoing aspects, and the first network device in any of the foregoing aspects.
  • FIG. 1 is a schematic structural diagram of a network security protection system according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a 5G network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a general hardware architecture of a mobile phone according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a computer device according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart 1 of a network security protection method according to an embodiment of the present application.
  • FIG. 6 is a second schematic flowchart of a network security protection method according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram 1 of a first network device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram 2 of a first network device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram 1 of a terminal according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram 2 of a terminal according to an embodiment of the present disclosure.
  • the words “first” and “second” are used to distinguish the same or similar items whose functions and functions are substantially the same. Those skilled in the art will understand that the words “first”, “second”, etc. do not limit the quantity and order of execution. For example, the “first” of the first security context and the “second” in the second security context in the embodiment of the present application are only used to distinguish different security contexts.
  • the network architecture and the service scenario described in the embodiments of the present application are for the purpose of more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute a limitation of the technical solutions provided by the embodiments of the present application.
  • the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
  • FIG. 1 is a schematic structural diagram of a network security protection system 10 provided by an embodiment of the present application.
  • the network security protection system 10 includes a first network device 101 and a terminal 102.
  • the terminal 102 is configured to: determine a first target security context of the terminal 102, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context, and the second security context is The security context generated by the authentication process; the NAS request message is secured by using the first target security context to obtain a secure NAS request message, the security protection includes encryption; and the NAS message requesting the security protection is sent to the first network device,
  • the header of the securely protected NAS request message is a first NAS message header, and the first NAS message header includes an identifier of the terminal 102 and first security header type information, where the first security header type information is used to indicate the first target security.
  • the type of context is a first target security context of the terminal 102, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context, and the second security context is The security context generated by the authentication process; the NAS request message is secured by using the first target security
  • the first network device 101 is configured to: receive a NAS request message from the security protection of the terminal 102; determine a first target security context according to the identifier of the terminal 102 and the first security header type information; and use the first target security context to protect the security
  • the NAS request message performs security verification, and the security verification includes decryption; according to the result of the security verification, the NAS reject message is secured by using the second target security context to obtain a security-protected NAS reject message, and the first target security context includes a security context or a second security context; sending a security-protected NAS rejection message to the terminal 102, wherein the header of the secured NAS rejection message is a second NAS message header, and the second NAS message header includes the terminal 102 And the second security header type information used to indicate the type of the second target security context.
  • the terminal 102 is further configured to: receive a NAS denial message of security protection from the first network device; determine a second target security context according to the identifier of the terminal 102 and the second security header type information; and use the second target security context to protect the security
  • the NAS rejects the message for security verification, which includes decryption.
  • first network device 101 and the terminal 102 in FIG. 1 may communicate directly, and may also perform communication through forwarding of other network devices, which is not specifically limited in this embodiment of the present application.
  • the foregoing network security protection system 10 can be applied to the 5G network and other networks in the future, which is not specifically limited in this embodiment of the present application.
  • the first network device 101 may specifically be an Access and Mobility Management Function (AMF) entity in the 5G network or A session management function (SMF) entity;
  • the terminal 102 may specifically be a terminal in a 5G network.
  • AMF Access and Mobility Management Function
  • SMF session management function
  • the main function of the AMF entity refer to the description of the first network device 101.
  • the main function of the terminal refer to the description of the terminal 102, and details are not described herein.
  • the 5G network may further include an Access Network (AN) device, a Unified Data Management (UDM) entity, and an Authentication Server Function (AUSF) entity.
  • the terminal communicates with the AMF entity through the Next Generation (N) interface 1 (N1 for short), and the AN device communicates with the AMF entity through the N interface 2 (N2 for short), and the AMF entity passes the N interface 11 (referred to as N11) and the UPF entity.
  • the AMF entity communicates with the UDM entity through the N interface 8 (N8 for short), and the AMF entity communicates with the AUSF entity through the N interface 12 (N12 for short).
  • the terminal accesses the 5G network through the AN device.
  • the AUSF entity or the UDM entity is used to store the security context configured by the operator for the terminal, that is, the first security context in the following embodiments.
  • the foregoing 5G network may further include a User Plane Function (UPF) entity, and a Policy Control Function (PCF) entity, and the like, which is not specifically limited in this embodiment of the present application.
  • UPF User Plane Function
  • PCF Policy Control Function
  • the terminal, the RAN access point, the AMF entity, the SMF entity, the AUSF entity, and the UDM entity in the above 5G network are only one name, and the name does not limit the device itself.
  • the network element or the entity corresponding to the terminal, the RAN access point, the AMF entity, the SMF entity, the AUSF entity, and the UDM entity may also be other names, which is not specifically described in this embodiment of the present application. limited.
  • the UDM entity may be replaced by a Home Subscriber Server (HSS) or a User Subscription Database (USD) or a database entity, and the like.
  • HSS Home Subscriber Server
  • USD User Subscription Database
  • the terminal involved in the present application may include various handheld devices with wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem, and various forms of terminals.
  • Mobile station MS
  • user equipment User Equipment
  • UE terminal equipment
  • Terminal Equipment soft terminal
  • the above mentioned devices are collectively referred to as terminals.
  • the first network device 101 in the embodiment of the present disclosure may be implemented by one physical device, or may be implemented by multiple physical devices, and may also be a logical functional module in a physical device. This is not specifically limited.
  • the first network device 101 and the terminal 102 in FIG. 1 can be implemented by the communication device in FIG.
  • FIG. 3 is a schematic diagram showing the hardware structure of a communication device according to an embodiment of the present application.
  • the communication device 300 includes at least one processor 301, a communication bus 302, a memory 303, and at least one communication interface 304.
  • the processor 301 can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication bus 302 can include a path for communicating information between the components described above.
  • the communication interface 304 uses a device such as any transceiver for communicating with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN), etc. .
  • a device such as any transceiver for communicating with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN), etc. .
  • RAN Radio Access Network
  • WLAN Wireless Local Area Networks
  • the memory 303 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions.
  • the dynamic storage device can also be an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical disc storage, and a disc storage device. (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be Any other media accessed, but not limited to this.
  • the memory can exist independently and be connected to the processor via a bus.
  • the memory can also be integrated with the processor.
  • the memory 303 is used to store application code for executing the solution of the present application, and is controlled by the processor 301 for execution.
  • the processor 301 is configured to execute the application code stored in the memory 303, thereby implementing the network security protection method provided by the following embodiments of the present application.
  • processor 301 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
  • communication device 300 can include multiple processors, such as processor 301 and processor 308 in FIG. Each of these processors can be a single-CPU processor or a multi-core processor.
  • processors herein may refer to one or more devices, circuits, and/or processing cores for processing data, such as computer program instructions.
  • the communication device 300 can also include an output device 305 and an input device 306.
  • Output device 305 is in communication with processor 301 and can display information in a variety of ways.
  • the output device 305 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • Input device 306 is in communication with processor 301 and can accept user input in a variety of ways.
  • input device 306 can be a mouse, keyboard, touch screen device, or sensing device, and the like.
  • the communication device 300 described above can be a general purpose computer device or a special purpose computer device.
  • the communication device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet, a terminal device, an embedded device, or a device having the similar structure in FIG. .
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 300.
  • FIG. 4 the schematic flowchart of the network security protection method provided by the embodiment of the present application is as shown in FIG. 4, and includes the following steps:
  • the terminal determines a first target security context of the terminal, where the first target security context includes a first security context or a second security context.
  • the first security context is a configured security context
  • the second security context is a security context generated by the authentication process.
  • the first target security context is a security context used by the terminal to secure the initial NAS request message sent to the first network device, and is uniformly described herein, and details are not described herein.
  • the terminal secures the initial NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption.
  • the terminal sends a security-protected NAS request message to the first network device, so that the first network device receives the NAS request message from the security protection of the terminal.
  • the header of the security-protected NAS request message is a first NAS message header, where the first NAS message header includes an identifier of the terminal and first security header type information, where the first security header type information is used to indicate the first target security.
  • the type of context is a first NAS message header, where the first NAS message header includes an identifier of the terminal and first security header type information, where the first security header type information is used to indicate the first target security.
  • the first network device determines the first target security context according to the identifier of the terminal and the first security header type information.
  • the first network device uses the first target security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
  • the first network device uses the second target security context to secure the NAS reject message, and obtains a security-protected NAS reject message, where the security protection includes encryption.
  • the second target security context includes a first security context or a second security context.
  • the second target security context is a security context used by the first network device to secure the NAS reject message sent to the terminal, and is uniformly described herein, and details are not described herein.
  • the first network device sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the first network device for security protection.
  • the header of the security-protected NAS reject message is a second NAS message header, where the second NAS header includes an identifier of the terminal and second security header type information, where the second security header type information is used to indicate the second target.
  • the type of security context is a second NAS message header, where the second NAS header includes an identifier of the terminal and second security header type information, where the second security header type information is used to indicate the second target.
  • the terminal determines a second target security context according to the identifier of the terminal and the second security header type information.
  • the terminal uses the second target security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • steps S401-S409 will be explained in detail in the embodiments shown in FIGS. 5 and 6.
  • the terminal may further include: the terminal receiving the NAS rejection message that is not secured; and the terminal discarding the NAS rejection message that is not secured.
  • the NAS refusal message of the real network in the embodiment of the present application is security protection
  • the terminal after the terminal receives the NAS refusal message without security protection, it can be considered as a pseudo network transmission, and thus can directly discard the unsecured message.
  • the protected NAS rejects the message.
  • the network security protection method provided by the embodiment of the present application, on the one hand, because the terminal sends a NAS request message for securing the initial NAS request message to the first network device, and thus cannot be verified by the pseudo network, and thus the pseudo network does not.
  • a corresponding NAS rejection message will be constructed so that some DOS attacks can be avoided.
  • the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
  • the action of the first network device in the foregoing S404, S405, S406, and S407 may be performed by the processor 301 in the communication device 300 shown in FIG. 3, by calling the application code stored in the memory 303, which is used by the embodiment of the present application. No restrictions are imposed.
  • the network security protection system 10 shown in FIG. 1 is applied to the 5G network shown in FIG. 2, and the first network device is an AMF entity as an example, and the network security protection method shown in FIG. 4 is expanded.
  • FIG. 5 it is a schematic flowchart of a network security protection method provided by an embodiment of the present application.
  • the network security protection method involves interaction between a terminal, an AMF entity, and a UDM entity, and includes the following steps:
  • the S500 and the operator simultaneously configure the same security context for the terminal on the Universal Subscriber Identity Module (USIM) card used by the terminal or the terminal and on the network side.
  • USIM Universal Subscriber Identity Module
  • the scenario in which the operator configures the security context on the USIM card used by the terminal is more common than the scenario in which the operator configures the security context on the terminal, because the USIM card is issued by the operator.
  • the operator configures the security context on the terminal, which is usually applicable to the terminal that the operator has contracted. A unified explanation is given here, and will not be described below.
  • the operator may configure the security context for the terminal on the network side, or may be configured on the UDM entity on the network side, or on the AUSF entity configured on the network side, or may be other networks configured on the network side.
  • the embodiment of the present application does not specifically limit this.
  • the operator when the security context is configured for the terminal on the terminal, the operator may be configured in a non-volatile memory of the terminal, or may be configured in another memory of the terminal.
  • the comparison of the examples is not specifically limited.
  • the operator can also configure the security context on the USIM card used by the terminal and the terminal.
  • the terminal usually uses the security context configured on the USIM card.
  • the terminal may also use the security context configured on the terminal, which is not specifically limited in this embodiment.
  • the security context configured by the operator may be referred to as a default security context, or an initial security context, or a subscribed security context. No specific limitation.
  • the security context configured by the operator includes at least the following parameters: a security protection key and a security protection algorithm.
  • the security protection key may be a root key or a NAS security key that can be directly used. This embodiment of the present application does not specifically limit this.
  • the security protection algorithm includes an encryption algorithm.
  • the security protection algorithm may further include an integrity protection algorithm. The embodiment of the present application does not limit the specific algorithm type.
  • the terminal and the AMF entity can directly use the NAS security key and the encryption algorithm to encrypt the NAS message; if the security protection key in the security context is the root
  • the key, the terminal and the AMF entity first need to use the key deduction algorithm to derive the corresponding NAS security key from the root key, and then use the NAS security key and encryption algorithm to encrypt the NAS message, and the terminal and the AMF entity use the same Key deduction algorithm.
  • the operator may combine different presets according to a different public land mobile network (PLMN) serving the terminal, or a different network slice (slice) serving the terminal, or Different access technologies adopted by the terminal configure one or more security contexts for the terminal.
  • PLMN public land mobile network
  • VPN visited public mobile mobile networks
  • VPNs visited public mobile mobile networks
  • 3GPP 3GPP
  • the wireless air interface access, the non-3GPP air interface access and the fixed network access configuration are different or the same security context, and the like is not limited in this embodiment.
  • the terminal determines whether the second security context is saved locally.
  • the second security context is a security context generated by the authentication process.
  • the second security context in step S501 is a security context generated by an authentication process initiated in a process triggered by the last terminal to initiate an initial NAS request message from an idle state.
  • the terminal determines a first security context of the terminal, and determines the first security context as the first target security context of the terminal.
  • the first security context is a configured security context.
  • the terminal determines the first security context of the terminal, and the terminal may include: the terminal reads the first security context configured on the USIM card of the terminal.
  • the terminal determines the first security context of the terminal, and the terminal may include: acquiring, by the terminal, the first security context configured on the terminal.
  • the terminal determines the first security context of the terminal, and the terminal may: read the first configuration on the USIM card of the terminal. Security context.
  • the terminal determines the first security context of the terminal, including: the terminal according to the PLMN currently serving the terminal, the network slice currently serving the terminal, or the current terminal.
  • the access technology employed selects a first security context from a plurality of security contexts of the terminal, wherein the first security context is included in the plurality of security contexts.
  • step S501 is an optional step, and the terminal may directly perform step S502, that is, the terminal determines the first security context of the terminal, and determines the first security context as the first target security context of the terminal.
  • step S502 the terminal determines the first security context of the terminal, and determines the first security context as the first target security context of the terminal. The embodiment does not specifically limit this.
  • the terminal secures the initial NAS request message by using the first security context to obtain a security-protected NAS request message, where the security protection includes encryption.
  • the initial NAS request message in the embodiment of the present application is an NAS request message initiated by the terminal from an idle state, for example, an attach request (ATTACH REQUEST) message in a fourth generation (4th generation, 4G) mobile communication system, and a tracking domain update.
  • the request (TRACKING AREA UPDATE REQUEST) message, the service request (SERVICE REQUEST) message, the registration request (REGISTRATION REQUEST) message in the 5G mobile communication system, etc., are not limited in this application. A unified explanation is given here, and will not be described below.
  • the security protection in the embodiment of the present application may also include integrity protection, which is uniformly described herein, and details are not described herein again. If the security protection also includes integrity protection, after the terminal encrypts the initial NAS request message using the NAS security key and encryption algorithm, the NAS security key and integrity protection algorithm are used to integrity protect the encrypted NAS request message.
  • the message authentication code (MAC) is generated, which is not specifically limited in this embodiment of the present application.
  • the terminal sends a security-protected NAS request message to the AMF entity, so that the AMF entity receives the NAS request message from the security protection of the terminal.
  • the first NAS header includes the identifier of the terminal and the first security header type information, where the first NAS header includes the first security header type information, where the first security header type information is used to indicate the first The type of security context.
  • the identifier of the terminal and the first security header type information in the first NAS message header may be not secured.
  • the identifier of the terminal in the embodiment of the present application may be a complete terminal permanent identity, such as an International Mobile Subscriber Identity (IMSI), or may be a partial permanent identity of the terminal, such as in the IMSI.
  • the information may be a security-protected terminal identity, such as the IMSI information protected by the hash algorithm.
  • the specific content of the identifier of the terminal is not specifically limited in this embodiment.
  • the first security header type information may include: Integrity protected and ciphered with default security context, or encrypted using a first security context (Ciphered with default security context) ). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS request message including the security protection of the first NAS message header is as shown in Table 1.
  • the first (n+5)th byte is allocated to the first NAS message header, and the remaining bytes are allocated to the secured NAS request message. If the security protection only includes encryption and does not include integrity protection, the first NAS message header does not include the message verification code and the sequence number; if the security protection includes encryption and integrity protection, the first NAS message header includes the message. Verification code and serial number.
  • the number of bytes occupied by the identifier of the terminal is variable, depending on the length of the identifier used by the terminal, for example, if the complete IMSI is used, the identifier of the terminal The number of bytes is 8.
  • the first security context may be determined according to the identifier of the terminal in the first NAS message header and the first security header type information, as shown in steps S505-S514 below. .
  • the AMF entity determines the first security context according to the identifier of the terminal and the first security header type information.
  • the AMF entity determines the first security context according to the identifier of the terminal and the first security header type information, and specifically includes:
  • the AMF entity determines whether the first security context is saved locally according to the identifier of the terminal and the first security header type information.
  • the AMF entity obtains the first security context locally; if it is determined that the first security context is not saved locally, the AMF entity sends a first message to the UDM entity, so that the UDM entity receives the first message.
  • the first message includes an identifier of the terminal, and is used to request to obtain the first security context, and the UDM entity determines, according to the identifier of the terminal carried in the first message, the first security context configured for the terminal; and further, the UDM entity sends the AMF to the AMF.
  • the entity sends a second message to cause the AMF entity to receive the second message.
  • the second message includes a first security context and an identifier of the terminal.
  • the first message in the embodiment of the present application may be a first security context acquisition request
  • the second message may be a first security context acquisition response
  • the first message in the embodiment of the present application may further include an identifier of a PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal.
  • the UDM entity may, according to the identifier of the terminal, and the identifier of the PLMN currently serving the terminal carried in the first message, and the network currently serving the terminal.
  • the identifier of the slice or the information about the access technology currently used by the terminal selects a first security context from multiple security contexts of the terminal, where the first security context is included in the multiple security contexts.
  • the AMF entity may save the first security context carried in the second message.
  • the foregoing embodiment is described by taking an example in which an operator configures a security context for a terminal on a UDM entity.
  • the operator may also configure a security context for the terminal on other devices on the network side, for example, configuring a security context for the terminal on the AUSF entity.
  • the security context is configured for the terminal on the other device on the network side
  • the implementation manner of obtaining the first security context from the other device may be implemented by referring to the implementation manner of obtaining the first security context from the UDM entity.
  • the UDM entity can be replaced with other devices, and details are not described herein.
  • the AMF entity uses the first security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
  • the security verification also includes an integrity check, which is uniformly described herein, and is not described here.
  • the AMF entity may determine that the second target security context performs subsequent operations according to the security verification result, as specifically shown in steps S507a-S510a, S507b-S510b, S507c-S510c, and S507d-S510d.
  • the second target security context includes a first security context or a second security context.
  • the AMF entity uses the second security context to secure the NAS rejection message of the initial NAS request message, and obtains a security-protected NAS rejection message.
  • the second security context in the step S507a may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggering from the idle state, that is, the network side decides to initiate the idle state from the current terminal.
  • the authentication process is not initiated in the process triggered by the initial NAS message.
  • the security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited.
  • the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
  • the security verification in the embodiment of the present application means that the decryption succeeds; if the security protection includes the encryption and the integrity protection, the security verification in the embodiment of the present application means that the decryption is successful and complete.
  • the sexual inspection is passed, and a unified explanation is given here, and the details are not described below.
  • the specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the second security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
  • the second security header type information in step S508a may include: performing integrity protected and ciphered, or performing ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS rejection message including the security protection of the second NAS message header is as shown in Table 2.
  • the first (n+5)th byte is allocated to the second NAS message header, and the remaining bytes are allocated to the secured NAS rejection message. If the security protection only includes encryption and does not include integrity protection, the second NAS message header does not include the message verification code and the sequence number; if the security protection includes encryption and integrity protection, the second NAS message header includes the message. Verification code and serial number.
  • the number of bytes occupied by the identifier of the terminal is variable, depending on the length of the identifier used by the terminal, for example, if the complete IMSI is used, the identifier of the terminal The number of bytes is 8.
  • the terminal determines the second security context according to the identifier of the terminal and the second security header type information.
  • the second security context in step S509a and the second security context in step S507a are security contexts generated by the same authentication process. That is, if the second security context in step S507a is the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, the second security context in step S509a is also the last time.
  • the security context generated by the process, the second security context in step S509a is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
  • the terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S507a-S510a may also include the reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal discards the NAS rejection message that is not secured.
  • the AMF entity uses the first security context to secure the NAS reject message of the initial NAS request message, and obtains a security-protected NAS reject message.
  • the AMF entity does not save the security context generated by the authentication process initiated by the last terminal to initiate the initial NAS message from the idle state, or the last time the terminal initiates the initial NAS message triggered by the idle state.
  • the security context generated by the rights flow is invalid or illegal, and in the process triggered by the initial NAS message initiated by the terminal from the idle state, the AMF entity rejects the initial NAS request message before initiating a new authentication process, and the AMF entity does not store at this time.
  • the second security context is invalid or illegal
  • the first security context may be stored in the AMF, or may be obtained by using the method in the step S505, which is not specifically limited in this embodiment of the present application.
  • the specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the first security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
  • the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the initial NAS request message is secured by using the second security context, or The second security context is used to secure the NAS reject message. If the second security context does not exist, the first security context is used to secure the initial NAS request message, or the first security context is used to secure the NAS rejection message, which is uniformly described herein, and is not described here.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the first security context. type.
  • the second security header type information in step S508b may include: Integrity protected and ciphered with default security context, or encrypted using the first security context (Ciphered) With default security context). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
  • the terminal determines the first security context according to the identifier of the terminal and the second security header type information.
  • S510b The terminal uses the first security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S507b-S510b may also include a reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal discards the NAS rejection message that is not secured.
  • the AMF entity uses the second security context to secure the NAS rejection message, and obtains a security-protected NAS rejection message.
  • the second security context in step S507c may be a security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggering from the idle state, that is, the network side decides to initiate the idle state from the current terminal.
  • the authentication process is not initiated in the process triggered by the initial NAS message.
  • the security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited.
  • the AMF entity may perform the NAS rejection after the initiation of the authentication process to generate a new security context. At this time, the AMF entity may obtain a new security context generated by the authentication process.
  • the NAS rejection message is sent because the security verification failed.
  • the AMF entity may implement the security protection of the initial NAS request message by using the first security context in the step S503, and details are not described herein.
  • the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S507c-S510c will not be performed, which is not specifically limited in this embodiment of the present application.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
  • the second security header type information in step S508c may include: performing integrity protected and ciphered, or performing ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
  • the terminal determines the second security context according to the identifier of the terminal and the second security header type information.
  • the second security context in step S509c and the second security context in step S507c are security contexts generated by the same authentication process. That is, if the second security context in step S507c is the security context generated by the authentication process initiated in the process triggered by the initial NAS initiated by the idle state, the second security context in step S509c is also the last time.
  • the security context generated by the process, the second security context in step S509c is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
  • S510c The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S507c-S510c may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
  • the security denied NAS rejection message in steps S507c-S510c may further include a reason for rejection. If the terminal security verification is passed, the terminal may perform a corresponding action according to the rejection reason, for example, directly discarding the NAS rejection message or re-receiving the message.
  • the step S501 is started.
  • the embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
  • the AMF entity uses the first security context to secure the NAS rejection message, and obtains the security-protected NAS rejection message.
  • the first security context may be stored in the AMF, or may be obtained by using the method in the step S505, which is not specifically limited in this embodiment of the present application.
  • the NAS rejection message is sent because the security verification failed.
  • the AMF entity may implement the security protection of the initial NAS request message by using the first security context in step S503, and details are not described herein.
  • the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S507c-S510c will not be performed, which is not specifically limited in this embodiment of the present application.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the first security context. type.
  • the second security header type information in step S508d may include: Integrity protected and ciphered with default security context, or encrypted using the first security context (Ciphered) With default security context). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
  • the terminal determines the first security context according to the identifier of the terminal and the second security header type information.
  • S510d The terminal uses the first security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S507d-S510d may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
  • the security-rejected NAS reject message in steps S507d-S510d may further include a reason for rejection. If the terminal security verification succeeds, the terminal may perform a corresponding action according to the reason for the rejection, for example, directly discarding the NAS reject message or re-receiving The step S501 is started.
  • the embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
  • the network security protection method provided by the embodiment of the present application on the one hand, because the terminal sends a NAS request message to the AMF entity for security protection of the initial NAS request message, it cannot be verified by the pseudo network, and thus the pseudo network is not constructed. The corresponding NAS rejects the message, so that some DOS attacks can be avoided.
  • the NAS reject message of the initial NAS request message sent by the AMF entity to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is true or not according to whether security protection is performed.
  • the network sends it, or it is sent by the pseudo network, and can then perform corresponding processing, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other future networks. safety.
  • the actions of the terminals in the foregoing S501, S502, S503, S504, S509a, S510a, S509b, S510b, S509c, S510c, S509d, and S510d may be stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG.
  • the application code is executed, and the embodiment of the present application does not impose any limitation on this.
  • the actions of the AMF in the above S505, S506, S507a, S508a, S507b, S508b, S507c, S508c, S507d, and S508d may be invoked by the processor 301 in the communication device 300 shown in FIG. 3 to call the application code stored in the memory 303.
  • the embodiment of the present application does not impose any limitation on this.
  • the embodiment shown in FIG. 5 is an example in which the first network device is an AMF entity.
  • the first network device may be another device on the network side, for example, the first network device may be an SMF entity.
  • the solution for performing network security protection by using other devices may refer to the embodiment shown in FIG. 5, and only need to replace the AMF entity in the embodiment shown in FIG. 5 with another device. That's it, so I won't go into details here.
  • FIG. 6 it is a schematic flowchart of another network security protection method provided by the embodiment of the present application.
  • the network security protection method involves interaction between a terminal, an AMF entity, and a UDM entity, and includes the following steps:
  • the terminal determines whether the second security context is saved locally.
  • the second security context is a security context generated by the authentication process.
  • the second security context in step S601 is the security context generated by the authentication process in the process triggered by the last terminal initiating the initial NAS request message from the idle state.
  • the terminal determines the second security context as the first target security context of the terminal.
  • the terminal uses the second security context to secure the initial NAS request message, and obtains a security-protected NAS request message, where the security protection includes encryption.
  • the terminal sends a security-protected NAS request message to the AMF entity, so that the AMF entity receives the NAS request message from the security protection of the terminal.
  • the first NAS header includes the identifier of the terminal and the first security header type information, where the first NAS header includes the first NAS header.
  • the first security header type information is used to indicate the second. The type of security context.
  • the identifier of the terminal and the first security header type information in the first NAS message header may be not secured.
  • the first security header type information may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS request message including the security protection of the first NAS message header is as shown in Table 1, and details are not described herein.
  • the AMF entity determines whether the second security context is saved locally according to the identifier of the terminal and the first security header type information.
  • the second security context in step S605 is the security context generated by the authentication process in the process triggered by the last terminal initiating the initial NAS request message from the idle state.
  • the security-protected NAS request message cannot be securely verified, and the execution ends.
  • the AMF entity uses the second security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
  • the security verification also includes an integrity check, which is uniformly described herein, and is not described here.
  • the AMF entity can perform subsequent operations using the second security context according to the security verification result, as shown in steps S607a-S610a or steps S607c-S610c below.
  • the AMF entity uses the second security context to secure the NAS reject message of the initial NAS request message, and obtains a security-protected NAS reject message.
  • the second security context in the step S607a may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, that is, the network side decides to initiate the idle state from the current terminal.
  • the authentication process is not initiated in the process triggered by the initial NAS message.
  • the security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited.
  • the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
  • the security verification in the embodiment of the present application means that the decryption succeeds; if the security protection includes the encryption and the integrity protection, the security verification in the embodiment of the present application means that the decryption is successful and complete.
  • the sexual inspection is passed, and a unified explanation is given here, and the details are not described below.
  • the specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the second security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
  • the second security header type information in step S608a may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
  • the terminal determines the second security context according to the identifier of the terminal and the second security header type information.
  • the second security context in step S609a and the second security context in step S607a are security contexts generated by the same authentication process. That is, if the second security context in step S607a is the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, the second security context in step S609a is also the last time.
  • the security context generated by the process, the second security context in step S609a is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
  • the terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S607a-S610a may also include the reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal discards the NAS rejection message that is not secured.
  • the AMF entity uses the second security context to secure the NAS rejection message, and obtains the security-protected NAS rejection message.
  • the second security context in the step S607c may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, that is, the network side decides to initiate the idle state from the current terminal.
  • the authentication process is not initiated in the process triggered by the initial NAS message.
  • the security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited.
  • the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
  • the NAS rejection message is sent because the security verification failed.
  • the AMF entity may implement the security protection of the initial NAS request message by using the first security context in the step S503, and details are not described herein.
  • the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S607c-S610c will not be performed, which is not specifically limited in this embodiment of the present application.
  • the AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
  • the message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
  • the second security header type information in step S608c may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
  • the format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
  • the terminal determines the second security context according to the identifier of the terminal and the second security header type information.
  • the second security context in step S609c and the second security context in step S607c are security contexts generated by the same authentication process. That is, if the second security context in step S607c is the security context generated by the authentication process initiated in the process triggered by the initial NAS initiated by the idle state, the second security context in step S609c is also the last time.
  • the security context generated by the process, the second security context in step S609c is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
  • S610c The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
  • the NAS message of the security protection in the steps S607c-S610c may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
  • the security denied NAS rejection message in steps S607c-S610c may further include a reason for rejection. If the terminal security verification is passed, the terminal may perform a corresponding action according to the rejection reason, for example, directly discarding the NAS rejection message or re-receiving the message. Step S601 is started.
  • the embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
  • the terminal If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
  • the network security protection method provided by the embodiment of the present application on the one hand, because the terminal sends a NAS request message to the AMF entity for security protection of the initial NAS request message, it cannot be verified by the pseudo network, and thus the pseudo network is not constructed. The corresponding NAS rejects the message, so that some DOS attacks can be avoided.
  • the NAS reject message of the initial NAS request message sent by the AMF entity to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is true or not according to whether security protection is performed.
  • the network sends it, or it is sent by the pseudo network, and can then perform corresponding processing, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other future networks. safety.
  • S601, S602, S603, S604, S609a, S610a, S609c, and S610c may be performed by the processor 301 in the communication device 300 shown in FIG. 3 calling the application code stored in the memory 303.
  • the application embodiment does not impose any limitation on this.
  • S605, S606, S607a, S608a, SS607c, and S608c may be performed by the processor 301 in the communication device 300 shown in FIG. 3, by calling the application code stored in the memory 303. This is not subject to any restrictions.
  • the embodiment shown in FIG. 6 is an example in which the first network device is an AMF entity.
  • the first network device may be another device on the network side.
  • the first network device may be an SMF entity.
  • the solution for performing network security protection by using other devices may refer to the embodiment shown in FIG. 6, and only need to replace the AMF entity in the embodiment shown in FIG. 6 with another device. That's it, so I won't go into details here.
  • the solution provided by the embodiment of the present application is introduced from the perspective of interaction between the first network device and the terminal.
  • the foregoing first network device and terminal include corresponding hardware structures and/or software modules for performing respective functions.
  • the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
  • the embodiment of the present application may divide the function modules of the first network device and the terminal according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 7 is a schematic structural diagram of the first network device involved in the foregoing embodiment.
  • the first network device 700 includes: a receiving module 701.
  • the receiving module 701 is configured to receive a NAS request message from the security protection of the terminal, where the secured NAS request message is obtained by using the first target security context of the terminal to secure the initial NAS request message, and the security protection is obtained.
  • the message header of the NAS request message is a first NAS message header, where the first NAS message header includes an identifier of the terminal and first security header type information, where the first security header type information is used to indicate a type of the first target security context.
  • the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is a security context generated by the authentication process; the security protection includes encryption.
  • the determining module 702 is configured to determine a first target security context according to the identifier of the terminal and the first security header type information.
  • the verification module 703 is configured to perform security verification on the secured NAS request message by using the first target security context, where the security verification includes decryption.
  • the security protection module 704 is configured to perform security protection on the NAS rejection message by using the second target security context according to the result of the security verification, to obtain a security-protected NAS rejection message, where the second target security context includes the first security context or the second security context. .
  • the sending module 705 is configured to send a security-protected NAS reject message to the terminal, where the header of the secured NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second Security header type information, the second security header type information is used to indicate the type of the second target security context.
  • the first network device further includes a storage module 706.
  • the security protection module 704 is specifically configured to:
  • the NAS denial message of the initial NAS request message is secured using the first security context.
  • the NAS denial message of the initial NAS request message is secured using the second security context.
  • the NAS security message is secured using the first security context.
  • the second security context is used to secure the NAS rejection message.
  • the first target security context includes a first security context.
  • the determining module 702 is specifically configured to:
  • the determining module 702 determines that the first security context is not saved locally, the first message is sent to the second network device, where the first message includes an identifier of the terminal, for requesting to acquire the first security context, and receiving the second network device.
  • a security context
  • the determining module 702 determines that the first security context is stored locally, the first security context is obtained locally.
  • the first message further includes an identifier of the PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal.
  • the first network device comprises an AMF entity or an SMF entity
  • the second network device comprises a UDM entity or an AUSF entity.
  • FIG. 8 is a schematic diagram showing a possible structure of the first network device involved in the foregoing embodiment, where the first network device 800 includes: a processing module 801 and a communication. Module 802.
  • the first network device 800 may further include a storage module 803.
  • the processing module 801 can be used to perform operations performed by the determining module 702, the verifying module 703, and the security module 704 of FIG. 7, and the communications module 802 can be used to perform the receiving module 701 and the sending module 702 of FIG.
  • the storage module 803 can be used to perform the operations that can be performed by the storage module 706 in FIG. 7.
  • FIG. 7 refer to the embodiment shown in FIG.
  • the first network device is presented in a form that divides each functional module corresponding to each function, or the first network device is presented in a form that divides each functional module in an integrated manner.
  • a “module” herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device.
  • ASIC Application-Specific Integrated Circuit
  • the first network device 700 or the first network device 800 can take the form shown in FIG.
  • the receiving module 701, the determining module 702, the verifying module 703, the security protecting module 704, and the sending module 705 can be executed by calling the application code stored in the memory 303 by the processor 301, and the embodiment of the present application does not do any limit.
  • the receiving module 701, the determining module 702, the verifying module 703, the security protection module 704, the sending module 705, and the storage module 706 in FIG. 7 may be implemented by the processor 301 and the memory 303 of FIG.
  • the receiving module 701, the determining module 702, the verifying module 703, the security protecting module 704, the sending module 705, and the storing module 706 can be executed by using the application code stored in the memory 303 by the processor 301.
  • the processing module 801 and the communication module 802 in FIG. 8 may be implemented by the processor 301 and the memory 303 of FIG. 3.
  • the processing module 801 and the communication module 802 may be called by the processor 301 in the memory 303.
  • the stored application code is executed, and the embodiment of the present application does not impose any limitation on this.
  • the processor 301 may be implemented by the processor 301 and the memory 303 of FIG. 3. Specifically, the processing module 801, the communication module 802, and the storage module 803 may pass The processor 301 is configured to execute the application code stored in the memory 303, and the embodiment of the present application does not impose any limitation thereon.
  • the first network device provided by the embodiment of the present application can be used to perform the foregoing network security protection method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
  • FIG. 9 is a schematic structural diagram of a terminal involved in the foregoing embodiment, and the terminal 900 includes: a determining module 901, a security protection module 902, The sending module 903, the receiving module 904 and the verification module 905.
  • the determining module 901 is configured to determine a first target security context of the terminal, where the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is an authentication The security context generated by the process.
  • the security protection module 902 is configured to secure the initial NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption.
  • the sending module 903 is configured to send a security-protected NAS request message to the first network device, where the message header of the secured NAS request message is a first NAS message header, where the first NAS message header includes the identifier of the terminal and the first A security header type information, the first security header type information being used to indicate a type of the first target security context.
  • the receiving module 904 is configured to receive a NAS refusal message from the first network device, where the NAS refusal message is obtained by using the second target security context of the terminal to secure the NAS refusal message;
  • the header of the security-protected NAS reject message is a second NAS message header, the second NAS message header includes the identifier of the terminal and the second security header type information, and the second security header type information is used to indicate the second target security context.
  • the type, the second target security context includes a first security context or a second security context.
  • the determining module 901 is further configured to determine the second target security context according to the identifier of the terminal and the second security header type information.
  • the verification module 905 is configured to perform security verification on the secured NAS rejection message by using the second target security context, where the security verification includes decryption.
  • the terminal 900 further includes a discarding module 906.
  • the receiving module 904 is further configured to: after the sending module 903 sends the secured NAS request message to the first network device, receive the NAS denial message that is not secured.
  • the discarding module 906 is also used to discard the NAS denial message that is not secured.
  • the determining module 901 determines the first target security context of the terminal, including: if the determining module 901 determines that the second security context is locally saved, determining the second security context as the first target security context of the terminal. Alternatively, if the determining module 901 determines that the second security context is not saved locally, determining the first security context, determining the first security context as the first target security context of the terminal.
  • the first target security context includes a first security context.
  • the determining module 901 determines the first security context, including: reading the first security context configured on the USIM card of the terminal; or acquiring the first security context configured on the terminal.
  • the first target security context includes a first security context.
  • the determining module 901 determines the first security context, including: selecting the first one of the multiple security contexts of the terminal according to the PLMN currently serving the terminal, the network slice currently serving the terminal, or the access technology currently used by the terminal.
  • a security context wherein the first security context is included in the plurality of security contexts, and the types of the plurality of security contexts are the same as the type of the first security context.
  • the first network device includes an AMF entity or an SMF entity, and all related content of each step involved in the foregoing method embodiments may be referred to a functional description of the corresponding function module, and details are not described herein again.
  • FIG. 10 shows a possible structural diagram of the terminal involved in the foregoing embodiment.
  • the terminal 1000 includes a processing module 1001 and a communication module 1002.
  • the processing module 1001 can be used to perform the operations that can be performed by the determining module 901, the security protection module 902, the verification module 905, and the discarding module 906 in FIG. 9, and the communication module 1002 can be used to execute the receiving module 904 and the sending module in FIG.
  • the 903 refer to the embodiment shown in FIG. 9 , and the embodiments of the present application are not described herein again.
  • the terminal is presented in the form of dividing each functional module corresponding to each function, or the terminal is presented in the form of dividing each functional module in an integrated manner.
  • a “module” herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device.
  • ASIC Application-Specific Integrated Circuit
  • terminal 900 or terminal 1000 can take the form shown in FIG.
  • the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, and the verifying module 905 in FIG. 9 can be implemented by the processor 301 and the memory 303 of FIG.
  • the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, and the verifying module 905 can be executed by calling the application code stored in the memory 303 by the processor 301, and the embodiment of the present application does not do any limit.
  • the determining module 901, the security protection module 902, the transmitting module 903, the receiving module 904, the verifying module 905, and the discarding module 906 in FIG. 9 may be implemented by the processor 301 and the memory 303 of FIG.
  • the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, the verifying module 905, and the discarding module 906 can be executed by calling the application code stored in the memory 303 by the processor 301. There are no restrictions on this.
  • the processing module 1001 and the communication module 1002 in FIG. 10 may be implemented by the processor 301 and the memory 303 of FIG. 3.
  • the processing module 1001 and the communication module 1002 may be called by the processor 301 in the memory 303.
  • the stored application code is executed, and the embodiment of the present application does not impose any limitation on this.
  • the terminal provided by the embodiment of the present application can be used to perform the foregoing network security protection method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • a software program it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server or data center via wired (eg coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device that includes one or more servers, data centers, etc. that can be integrated with the media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a solid state disk (SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided are a network security protection method, device and system, wherein same can improve the security of a 5G network and other future networks. The method comprises: a terminal determining a first target security context of the terminal; using the first target security context to carry out security protection on an initial NAS request message so as to obtain a security-protected NAS request message; sending the security-protected NAS request message to a first network device; receiving a security-protected NAS rejection message from the first network device, wherein the security-protected NAS rejection message is obtained by using a second target security context of the terminal to carry out security protection on an NAS rejection message, with a message header of the security-protected NAS rejection message being a second NAS message header, and the second NAS message header comprising an identifier of the terminal and second security header type information; determining the second target security context according to the identifier of the terminal and the second security header type information; and using the second target security context to carry out security verification on the security-protected NAS rejection message.

Description

网络安全保护方法、设备及系统Network security protection method, device and system
本申请要求于2017年4月25日提交中国专利局、申请号为201710279322.8、发明名称为“网络安全保护方法、设备及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese Patent Application, filed on Apr. 25, 2017, filed on Jan. 25,,,,,,,,,,,,,,,,,,,,,,,,,, in.
技术领域Technical field
本申请涉及通信技术领域,尤其涉及网络安全保护方法、设备及系统。The present application relates to the field of communications technologies, and in particular, to a network security protection method, device, and system.
背景技术Background technique
第三代合作伙伴项目(3rd Generation Partnership Project,简称3GPP)定义的移动通信网络引入了安全保护机制来保证移动通信的安全,包括:通信的保密性、完整性与可用性。比如,目前的演进分组系统(Evolved Packet System,EPS)网络采用了双向身份认证机制来实现网络与终端之间合法性的相互认证,并采用了加密保护机制与完整性保护机制来实现终端与网络之间通信的保密性与完整性。其中,EPS网络引入了独立的两层安全机制,包括终端与接入网之间的接入层(Access Stratum,AS)安全、以及终端与核心网之间非接入层(Non Access Stratum,NAS)安全。这两层安全机制并行独立存在并且采用不同的安全上下文。The mobile communication network defined by the 3rd Generation Partnership Project (3GPP) introduces a security protection mechanism to ensure the security of mobile communications, including: confidentiality, integrity and availability of communications. For example, the current Evolved Packet System (EPS) network adopts a two-way identity authentication mechanism to implement mutual authentication between the network and the terminal, and adopts an encryption protection mechanism and an integrity protection mechanism to implement the terminal and the network. Confidentiality and integrity of communication between. Among them, the EPS network introduces an independent two-layer security mechanism, including the Access Stratum (AS) security between the terminal and the access network, and the non-access layer between the terminal and the core network (Non Access Stratum, NAS). )Safety. These two layers of security exist independently in parallel and employ different security contexts.
然而,在目前的EPS网络中,对于终端从空闲态发起的初始NAS请求消息,是不进行加密保护的,这很容易遭受伪网络(或称为虚假网络)发动的拒绝服务(Denial of Service)攻击。因为当该NAS消息在空口传输时,很容易被伪网络截获。进而,伪网络可以构造对应的NAS拒绝消息,并携带一个拒绝原因值,例如EPS业务不可用。由于终端不能区分收到的未进行完整性保护的NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,它采用一致的处理方式,执行所接收的拒绝原因值所对应的动作,从而造成拒绝服务攻击,影响了终端的正常业务使用。However, in the current EPS network, the initial NAS request message initiated by the terminal from the idle state is not encrypted, which is easily subject to the denial of service initiated by the pseudo network (or called a fake network). attack. Because when the NAS message is transmitted on the air interface, it is easily intercepted by the pseudo network. Further, the pseudo network may construct a corresponding NAS reject message and carry a reject cause value, for example, the EPS service is unavailable. Since the terminal cannot distinguish whether the received NAS reject message that is not integrity-protected is sent by the real network or sent by the pseudo-network, it adopts a consistent processing manner, and performs the action corresponding to the received reject cause value, thereby A denial of service attack is caused, which affects the normal business use of the terminal.
对于第五代(5th generation,5G)移动通信网络,目前3GPP正在研究制定针对5G网络的增强安全机制。如果在5G网络中仍然采用与上述EPS网络中一样的安全保护机制,将同样会遭受DoS攻击。For the fifth generation (5th generation, 5G) mobile communication network, 3GPP is currently researching and developing an enhanced security mechanism for 5G networks. If the same security protection mechanism as in the above EPS network is still adopted in the 5G network, it will also suffer from the DoS attack.
发明内容Summary of the invention
本申请实施例提供网络安全保护方法、设备及系统,能够提升5G网络以及未来其他网络的安全性。The embodiments of the present application provide a network security protection method, device, and system, which can improve the security of a 5G network and other networks in the future.
为达到上述目的,本申请实施例提供如下技术方案:To achieve the above objective, the embodiment of the present application provides the following technical solutions:
第一方面,提供一种网络安全保护方法,该方法包括:第一网络设备接收来自终端的安全保护的非接入层NAS请求消息,该安全保护的NAS请求消息是使用该终端的第一目标安全上下文对初始NAS请求消息进行安全保护后得到的,其中,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括该终端的标识和第一安全 头类型信息,该第一安全头类型信息用于指示该第一目标安全上下文的类型,该第一目标安全上下文包括第一安全上下文或第二安全上下文,该第一安全上下文为配置的安全上下文,该第二安全上下文为鉴权流程生成的安全上下文;该安全保护包括加密;第一网络设备根据该终端的标识和该第一安全头类型信息,确定该第一目标安全上下文;第一网络设备使用该第一目标安全上下文,对该安全保护的NAS请求消息进行安全验证,其中,该安全验证包括解密;第一网络设备根据该安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,该第二目标安全上下文包括该第一安全上下文或该第二安全上下文;第一网络设备向该终端发送该安全保护的NAS拒绝消息,其中,该安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括该终端的标识和第二安全头类型信息,该第二安全头类型信息用于指示该第二目标安全上下文的类型。基于该方案,一方面,由于终端向第一网络设备发送的是对初始NAS请求消息进行安全保护的NAS请求消息,因此无法被伪网络验证通过,进而伪网络不会构造对应的NAS拒绝消息,从而可以避免一部分DOS攻击。另一方面,第一网络设备向终端发送的初始NAS请求消息的NAS拒绝消息是安全保护的NAS拒绝消息,因此终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。In a first aspect, a network security protection method is provided, the method comprising: receiving, by a first network device, a non-access stratum NAS request message from a security protection of a terminal, the secured NAS request message being a first target using the terminal The security context is obtained by securing the initial NAS request message, where the header of the secured NAS request message is a first NAS message header, and the first NAS message header includes the identifier of the terminal and the first security header. Type information, the first security header type information is used to indicate a type of the first target security context, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context, The second security context is a security context generated by the authentication process; the security protection includes encryption; the first network device determines the first target security context according to the identifier of the terminal and the first security header type information; the first network device Securely verifying the secured NAS request message using the first target security context The security verification includes decryption; the first network device uses the second target security context to secure the NAS rejection message according to the result of the security verification, and obtains a security-protected NAS rejection message, where the second target security context includes the a first security context or the second security context; the first network device sends the secured NAS rejection message to the terminal, where the header of the secured NAS rejection message is a second NAS message header, the second NAS The identifier includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the type of the second target security context. Based on the solution, on the one hand, since the terminal sends the NAS request message for securing the initial NAS request message to the first network device, the terminal cannot be authenticated by the pseudo network, and the pseudo network does not construct the corresponding NAS reject message. This can avoid some DOS attacks. On the other hand, the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
在一种可能的设计中,第一网络设备根据该安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,包括:若该安全验证通过,且第一网络设备中未存储该第二安全上下文,第一网络设备使用该第一安全上下文对该初始NAS请求消息的NAS拒绝消息进行安全保护;或者,若该安全验证通过,且第一网络设备中存储有该第二安全上下文,第一网络设备使用该第二安全上下文对该初始NAS请求消息的NAS拒绝消息进行安全保护;或者,若安全验证未通过,且第一网络设备中未存储该第二安全上下文,第一网络设备使用该第一安全上下文对NAS拒绝消息进行安全保护;或者,若该安全验证未通过,且第一网络设备中存储有该第二安全上下文,第一网络设备使用该第二安全上下文对NAS拒绝消息进行安全保护。也就是说,本申请实施例中,第二安全上下文的优先级高于第一安全上下文的优先级,在存在第二安全上下文时,使用第二安全上下文对NAS拒绝消息进行安全保护。若不存在第二安全上下文,使用第一安全上下文对NAS拒绝消息进行安全保护。In a possible design, the first network device uses the second target security context to secure the NAS reject message according to the result of the security verification, including: if the security verification passes, and the first network device does not store the a second security context, the first network device uses the first security context to secure the NAS reject message of the initial NAS request message; or, if the security verification passes, and the second security context is stored in the first network device The first network device uses the second security context to secure the NAS reject message of the initial NAS request message; or, if the security verification fails, and the second security context is not stored in the first network device, the first network The device uses the first security context to secure the NAS reject message; or, if the security verification fails, and the second security context is stored in the first network device, the first network device uses the second security context to the NAS Reject the message for security protection. That is to say, in the embodiment of the present application, the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the NAS denial message is used for security protection. If the second security context does not exist, the NAS security message is secured using the first security context.
在一种可能的设计中,该第一目标安全上下文包括该第一安全上下文;第一网络设备根据该终端的标识和该第一安全头类型信息,确定该第一目标安全上下文,包括:第一网络设备根据该终端的标识和该第一安全头类型信息,确定本地是否保存该第一安全上下文;若第一网络设备确定本地未保存该第一安全上下文,向第二网络设备发送第一消息,该第一消息包括该终端的标识,用于请求获取该第一安全上下文;第一网络设备接收来自该第二网络设备的该第一安全上下文;或者,若第一网络设备确定本地保存有该第一安全上下文,从本地获取该第一安全上下文。基于该方案,第一网络设备可以确定对初始NAS请求消息进行安全保护的第一目标上下文,进而可以根据该第一目标安全上下文对安全保 护的NAS请求消息进行安全验证。In a possible design, the first target security context includes the first security context; the first network device determines the first target security context according to the identifier of the terminal and the first security header type information, including: Determining whether the first security context is saved locally according to the identifier of the terminal and the first security header type information; and if the first network device determines that the first security context is not saved locally, sending the first to the second network device a message, the first message includes an identifier of the terminal, configured to request to acquire the first security context; the first network device receives the first security context from the second network device; or, if the first network device determines to save locally There is the first security context, and the first security context is obtained locally. Based on the solution, the first network device may determine a first target context for securing the initial NAS request message, and then perform security verification on the securely protected NAS request message according to the first target security context.
可选的,第一消息还包括当前为该终端服务的公共陆地移动网络PLMN的标识、当前为该终端服务的网络切片的标识或该终端当前采用的接入技术的信息。这样,当运营商在第二网络设备上为终端配置多个安全上下文时,第二网络设备可以根据终端的标识、以及第一消息中携带的当前为该终端服务的PLMN的标识、当前为该终端服务的网络切片的标识或该终端当前采用的接入技术的信息,从终端的多个安全上下文中选择第一安全上下文。Optionally, the first message further includes an identifier of a public land mobile network PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal. In this way, when the operator configures multiple security contexts for the terminal on the second network device, the second network device may be configured according to the identifier of the terminal and the identifier of the PLMN currently serving the terminal carried in the first message. The identifier of the network slice of the terminal service or the information of the access technology currently used by the terminal selects the first security context from the plurality of security contexts of the terminal.
可选的,该安全保护还包括完整性保护;该安全验证还包括完整性检查。Optionally, the security protection also includes integrity protection; the security verification also includes an integrity check.
可选的,该第一网络设备包括接入与移动管理功能AMF实体或会话管理功能SMF实体,该第二网络设备包括统一数据管理UDM实体或鉴权服务器功能AUSF实体。Optionally, the first network device includes an access and mobility management function AMF entity or a session management function SMF entity, and the second network device includes a unified data management UDM entity or an authentication server function AUSF entity.
第二方面,提供一种网络安全保护方法,该方法包括:终端确定该终端的第一目标安全上下文,该第一目标安全上下文包括第一安全上下文或第二安全上下文,该第一安全上下文为配置的安全上下文,该第二安全上下文为鉴权流程生成的安全上下文;终端使用该第一目标安全上下文对初始非接入层NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密;终端向第一网络设备发送该安全保护的NAS请求消息,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括该终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示该第一目标安全上下文的类型;终端接收来自该第一网络设备的安全保护的NAS拒绝消息,该安全保护的NAS拒绝消息是使用该终端的第二目标安全上下文对NAS拒绝消息进行安全保护后得到的;其中,该安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括该终端的标识和第二安全头类型信息,该第二安全头类型信息用于指示该第二目标安全上下文的类型,该第二目标安全上下文包括该第一安全上下文或者该第二安全上下文;终端根据该终端的标识和该第二安全头类型信息,确定该第二目标安全上下文;终端使用该第二目标安全上下文,对该安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。基于该方案,一方面,由于终端向第一网络设备发送的是对初始NAS请求消息进行安全保护的NAS请求消息,因此无法被伪网络验证通过,进而伪网络不会构造对应的NAS拒绝消息,从而可以避免一部分DOS攻击。另一方面,第一网络设备向终端发送的初始NAS请求消息的NAS拒绝消息是安全保护的NAS拒绝消息,因此终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。A second aspect provides a network security protection method, the method comprising: determining, by a terminal, a first target security context of the terminal, where the first target security context includes a first security context or a second security context, where the first security context is The configured security context, the second security context is a security context generated by the authentication process; the terminal uses the first target security context to secure the initial non-access stratum NAS request message, and obtains a securely protected NAS request message, the security The protection includes the encryption; the terminal sends the security-protected NAS request message to the first network device, where the message header of the secured NAS request message is a first NAS message header, and the first NAS message header includes the identifier of the terminal and the a security header type information, the first security header type information is used to indicate a type of the first target security context; the terminal receives a NAS denial message from the first network device security protection, the security protected NAS rejection message is used The second target security context of the terminal is secured by the NAS rejection message. The message header of the security-protected NAS reject message is a second NAS message header, and the second NAS message header includes an identifier of the terminal and second security header type information, where the second security header type information is used. Determining a type of the second target security context, the second target security context including the first security context or the second security context; the terminal determining the second target security according to the identifier of the terminal and the second security header type information Context; the terminal uses the second target security context to perform security verification on the secured NAS rejection message, the security verification including decryption. Based on the solution, on the one hand, since the terminal sends the NAS request message for securing the initial NAS request message to the first network device, the terminal cannot be authenticated by the pseudo network, and the pseudo network does not construct the corresponding NAS reject message. This can avoid some DOS attacks. On the other hand, the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
在一种可能的设计中,在终端向第一网络设备发送该安全保护的NAS请求消息之后,还包括:终端接收未进行该安全保护的NAS拒绝消息;终端丢弃该未进行该安全保护的NAS拒绝消息。也就是说,终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。In a possible design, after the terminal sends the security-protected NAS request message to the first network device, the method further includes: the terminal receiving the NAS rejection message that does not perform the security protection; and the terminal discarding the NAS that does not perform the security protection. Reject the message. That is to say, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is sent by the real network or is sent by the pseudo network according to whether security protection is performed, and then the corresponding processing can be performed, for example, discarding the pseudo network transmission. The NAS that does not protect the security rejects the message, so that the risk of DOS attack can be further completely prevented, and the security of the 5G network and other networks in the future can be improved.
在一种可能的设计中,终端确定该终端的第一目标安全上下文,包括:若终端确定本 地保存有该第二安全上下文,终端将该第二安全上下文确定为该终端的第一目标安全上下文;或者,若终端确定本地未保存该第二安全上下文,终端确定该第一安全上下文,将该第一安全上下文确定为该终端的第一目标安全上下文。也就是说,本申请实施例中,第二安全上下文的优先级高于第一安全上下文的优先级,在存在第二安全上下文时,使用第二安全上下文对初始NAS请求消息进行安全保护。若不存在第二安全上下文,使用第一安全上下文对初始NAS请求消息进行安全保护。In a possible design, the terminal determines the first target security context of the terminal, including: if the terminal determines that the second security context is locally saved, the terminal determines the second security context as the first target security context of the terminal. Or, if the terminal determines that the second security context is not saved locally, the terminal determines the first security context, and determines the first security context as the first target security context of the terminal. That is, in the embodiment of the present application, the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the initial NAS request message is secured by using the second security context. If the second security context does not exist, the initial NAS request message is secured using the first security context.
在一种可能的设计中,该第一目标安全上下文包括该第一安全上下文;终端确定该第一安全上下文,包括:终端读取该终端的全球用户识别模块USIM卡上配置的该第一安全上下文;或者,终端获取该终端上配置的该第一安全上下文。In a possible design, the first target security context includes the first security context; the terminal determining the first security context comprises: the terminal reading the first security configured on the global subscriber identity module USIM card of the terminal Context; or, the terminal acquires the first security context configured on the terminal.
可选的,运营商也可以同时在终端和终端使用的USIM卡上配置安全上下文。该场景下,终端通常使用USIM卡上配置的安全上下文,当然,终端也可能使用终端上配置的安全上下文,本申请实施例对此不作具体限定。Optionally, the operator can also configure the security context on the USIM card used by the terminal and the terminal. In this scenario, the terminal usually uses the security context configured on the USIM card. Of course, the terminal may also use the security context configured on the terminal, which is not specifically limited in this embodiment.
在一种可能的设计中,该第一目标安全上下文包括该第一安全上下文;终端确定该第一安全上下文,包括:终端根据当前为该终端服务的公共陆地移动网络PLMN、当前为该终端服务的网络切片或该终端当前采用的接入技术,从该终端的多个安全上下文中选择该第一安全上下文,其中,该多个安全上下文中包括该第一安全上下文,该多个安全上下文的类型与该第一安全上下文的类型相同。这样,当运营商在终端上为终端配置多个安全上下文时,终端可以从多个安全上下文中选择第一安全上下文。In a possible design, the first target security context includes the first security context; the terminal determines the first security context, including: the terminal is currently serving the terminal according to the public land mobile network PLMN currently serving the terminal. a network slice or an access technology currently used by the terminal, selecting the first security context from a plurality of security contexts of the terminal, wherein the plurality of security contexts includes the first security context, the plurality of security contexts The type is the same as the type of the first security context. In this way, when the operator configures multiple security contexts for the terminal on the terminal, the terminal can select the first security context from multiple security contexts.
可选的,该安全保护还包括完整性保护;该安全验证还包括完整性检查。Optionally, the security protection also includes integrity protection; the security verification also includes an integrity check.
可选的,该第一网络设备包括接入与移动管理功能AMF实体或会话管理功能SMF实体。Optionally, the first network device includes an access and mobility management function AMF entity or a session management function SMF entity.
第三方面,提供一种第一网络设备,该第一网络设备具有实现上述第一方面所述的方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a third aspect, a first network device is provided, the first network device having the functionality to implement the method described in the first aspect above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
第四方面,提供一种第一网络设备,包括:处理器、存储器、总线和通信接口;该存储器用于存储计算机执行指令,该处理器与该存储器通过该总线连接,当该第一网络设备运行时,该处理器执行该存储器存储的该计算机执行指令,以使该第一网络设备执行如上述第一方面中任一所述的网络安全保护方法。A fourth aspect provides a first network device, including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, and the processor is connected to the memory through the bus, when the first network device In operation, the processor executes the computer-executable instructions stored by the memory to cause the first network device to perform the network security protection method of any of the first aspects above.
第五方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第一方面中任意一项的网络安全保护方法。In a fifth aspect, the embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium stores instructions, when executed on a computer, to enable the computer to perform any one of the foregoing first aspects. Network security protection method.
第六方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第一方面中任意一项的网络安全保护方法。In a sixth aspect, an embodiment of the present application provides a computer program product comprising instructions, which when executed on a computer, enable the computer to perform the network security protection method of any one of the above first aspects.
其中,第三方面至第六方面中任一种设计方式所带来的技术效果可参见第一方面中不同设计方式所带来的技术效果,此处不再赘述。For the technical effects brought by any one of the third aspect to the sixth aspect, refer to the technical effects brought by different design modes in the first aspect, and details are not described herein again.
第七方面,提供一种终端,该终端具有实现上述第二方面所述的方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a seventh aspect, a terminal is provided, the terminal having the function of implementing the method described in the second aspect above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
第八方面,提供一种终端,包括:处理器、存储器、总线和通信接口;该存储器用于存储计算机执行指令,该处理器与该存储器通过该总线连接,当该终端运行时,该处理器执行该存储器存储的该计算机执行指令,以使该终端执行如上述第二方面中任一所述的网络安全保护方法。In an eighth aspect, a terminal is provided, including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, and the processor is connected to the memory through the bus, and when the terminal is running, the processor The computer executing the memory stores instructions to cause the terminal to perform the network security protection method as described in any of the above second aspects.
第九方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第二方面中任意一项的网络安全保护方法。In a ninth aspect, the embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium stores instructions that, when run on a computer, enable the computer to perform any of the foregoing second aspects. Network security protection method.
第十方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第二方面中任意一项的网络安全保护方法。In a tenth aspect, the embodiment of the present application provides a computer program product comprising instructions, which when executed on a computer, enable the computer to perform the network security protection method of any one of the foregoing second aspects.
其中,第七方面至第十方面中任一种设计方式所带来的技术效果可参见第二方面中不同设计方式所带来的技术效果,此处不再赘述。For the technical effects brought by any one of the seventh aspect to the tenth aspect, refer to the technical effects brought by different design modes in the second aspect, and details are not described herein again.
第十一方面,本申请实施例提供一种网络安全保护系统,该网络安全保护系统包括上述任一方面所述的终端和上述任一方面所述的第一网络设备。In an eleventh aspect, the embodiment of the present application provides a network security protection system, where the network security protection system includes the terminal in any of the foregoing aspects, and the first network device in any of the foregoing aspects.
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
附图说明DRAWINGS
图1为本申请实施例提供的网络安全保护系统的架构示意图;FIG. 1 is a schematic structural diagram of a network security protection system according to an embodiment of the present application;
图2为本申请实施例提供的5G网络架构示意图;2 is a schematic diagram of a 5G network architecture provided by an embodiment of the present application;
图3为本申请实施例提供的手机的通用硬件架构示意图;3 is a schematic diagram of a general hardware architecture of a mobile phone according to an embodiment of the present application;
图4为本申请实施例提供的计算机设备示意图;4 is a schematic diagram of a computer device according to an embodiment of the present application;
图5为本申请实施例提供的网络安全保护方法的流程示意图一;FIG. 5 is a schematic flowchart 1 of a network security protection method according to an embodiment of the present application;
图6为本申请实施例提供的网络安全保护方法的流程示意图二;FIG. 6 is a second schematic flowchart of a network security protection method according to an embodiment of the present disclosure;
图7为本申请实施例提供的第一网络设备的结构示意图一;FIG. 7 is a schematic structural diagram 1 of a first network device according to an embodiment of the present disclosure;
图8为本申请实施例提供的第一网络设备的结构示意图二;FIG. 8 is a schematic structural diagram 2 of a first network device according to an embodiment of the present disclosure;
图9为本申请实施例提供的终端的结构示意图一;FIG. 9 is a schematic structural diagram 1 of a terminal according to an embodiment of the present disclosure;
图10为本申请实施例提供的终端的结构示意图二。FIG. 10 is a schematic structural diagram 2 of a terminal according to an embodiment of the present disclosure.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分,本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定。比如,本申请实施例中的第一安全上下文的“第一”和第二安全上下文中的“第二”仅用于区分不同的安全上下文。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. In the description of the present application, unless otherwise stated, "/" means the meaning of or, for example, A/B may represent A or B; "and/or" herein is merely an association describing the associated object. The relationship indicates that there may be three kinds of relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately. Also, in the description of the present application, "a plurality" means two or more than two unless otherwise stated. In addition, in order to facilitate the clear description of the technical solutions of the embodiments of the present application, in the embodiments of the present application, the words "first" and "second" are used to distinguish the same or similar items whose functions and functions are substantially the same. Those skilled in the art will understand that the words "first", "second", etc. do not limit the quantity and order of execution. For example, the “first” of the first security context and the “second” in the second security context in the embodiment of the present application are only used to distinguish different security contexts.
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的 技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The network architecture and the service scenario described in the embodiments of the present application are for the purpose of more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute a limitation of the technical solutions provided by the embodiments of the present application. The technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
如图1所示,为本申请实施例提供的网络安全保护系统10的架构示意图。该网络安全保护系统10包括第一网络设备101和终端102。FIG. 1 is a schematic structural diagram of a network security protection system 10 provided by an embodiment of the present application. The network security protection system 10 includes a first network device 101 and a terminal 102.
其中,终端102用于:确定该终端102的第一目标安全上下文,该第一目标安全上下文包括第一安全上下文或第二安全上下文,第一安全上下文为配置的安全上下文,第二安全上下文为鉴权流程生成的安全上下文;使用第一目标安全上下文对NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密;向第一网络设备发送安全保护的NAS请求消息,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括终端102的标识和第一安全头类型信息,该第一安全头类型信息用于指示第一目标安全上下文的类型。The terminal 102 is configured to: determine a first target security context of the terminal 102, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context, and the second security context is The security context generated by the authentication process; the NAS request message is secured by using the first target security context to obtain a secure NAS request message, the security protection includes encryption; and the NAS message requesting the security protection is sent to the first network device, The header of the securely protected NAS request message is a first NAS message header, and the first NAS message header includes an identifier of the terminal 102 and first security header type information, where the first security header type information is used to indicate the first target security. The type of context.
第一网络设备101用于:接收来自终端102的安全保护的NAS请求消息;根据终端102的标识和第一安全头类型信息,确定第一目标安全上下文;使用第一目标安全上下文,对安全保护的NAS请求消息进行安全验证,该安全验证包括解密;根据安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,该第一目标安全上下文包括第一安全上下文或第二安全上下文;向所终端102发送安全保护的NAS拒绝消息,其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端102的标识和第二安全头类型信息,该第二安全头类型信息用于指示第二目标安全上下文的类型。The first network device 101 is configured to: receive a NAS request message from the security protection of the terminal 102; determine a first target security context according to the identifier of the terminal 102 and the first security header type information; and use the first target security context to protect the security The NAS request message performs security verification, and the security verification includes decryption; according to the result of the security verification, the NAS reject message is secured by using the second target security context to obtain a security-protected NAS reject message, and the first target security context includes a security context or a second security context; sending a security-protected NAS rejection message to the terminal 102, wherein the header of the secured NAS rejection message is a second NAS message header, and the second NAS message header includes the terminal 102 And the second security header type information used to indicate the type of the second target security context.
终端102还用于:接收来自第一网络设备的安全保护的NAS拒绝消息;根据终端102的标识和第二安全头类型信息,确定第二目标安全上下文;使用第二目标安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。The terminal 102 is further configured to: receive a NAS denial message of security protection from the first network device; determine a second target security context according to the identifier of the terminal 102 and the second security header type information; and use the second target security context to protect the security The NAS rejects the message for security verification, which includes decryption.
需要说明的是,图1中第一网络设备101和终端102可能直接通信,也可能通过其他网络设备的转发进行通信,本申请实施例对此不作具体限定。It should be noted that the first network device 101 and the terminal 102 in FIG. 1 may communicate directly, and may also perform communication through forwarding of other network devices, which is not specifically limited in this embodiment of the present application.
具体的,上述网络安全保护系统10可以应用于5G网络以及未来其它的网络,本申请实施例对此不作具体限定。Specifically, the foregoing network security protection system 10 can be applied to the 5G network and other networks in the future, which is not specifically limited in this embodiment of the present application.
其中,若上述网络安全保护系统10应用于5G网络,则如图2所示,第一网络设备101具体可以为5G网络中的接入与移动管理功能(Access and Mobility Management Function,AMF)实体或会话管理功能(Session Management Function,SMF)实体;终端102具体可以为5G网络中的终端。其中,AMF实体的主要功能可参考上述对第一网络设备101的描述,终端的主要功能可参考上述对终端102的描述,在此不再赘述。If the network security protection system 10 is applied to the 5G network, as shown in FIG. 2, the first network device 101 may specifically be an Access and Mobility Management Function (AMF) entity in the 5G network or A session management function (SMF) entity; the terminal 102 may specifically be a terminal in a 5G network. For the main function of the AMF entity, refer to the description of the first network device 101. For the main function of the terminal, refer to the description of the terminal 102, and details are not described herein.
此外,如图2所示,该5G网络还可以包括接入网络(Access Network,AN)设备、统一数据管理(Unified Data Management,UDM)实体和鉴权服务器功能(Authentication Server Function,AUSF)实体。终端通过下一代网络(Next generation,N)接口1(简称N1)与AMF实体通信,AN设备通过N接口2(简称N2)与AMF实体通信,AMF实体通过N接口11(简称N11)与UPF实体通信,AMF实体通过N接口8(简称N8)与UDM实体通信,AMF实体通过N接口12(简称N12)与AUSF实体通信。In addition, as shown in FIG. 2, the 5G network may further include an Access Network (AN) device, a Unified Data Management (UDM) entity, and an Authentication Server Function (AUSF) entity. The terminal communicates with the AMF entity through the Next Generation (N) interface 1 (N1 for short), and the AN device communicates with the AMF entity through the N interface 2 (N2 for short), and the AMF entity passes the N interface 11 (referred to as N11) and the UPF entity. In communication, the AMF entity communicates with the UDM entity through the N interface 8 (N8 for short), and the AMF entity communicates with the AUSF entity through the N interface 12 (N12 for short).
其中,终端通过AN设备接入5G网络。AUSF实体或者UDM实体用于保存运营商为终端配置的安全上下文,也就是下述实施例中的第一安全上下文。The terminal accesses the 5G network through the AN device. The AUSF entity or the UDM entity is used to store the security context configured by the operator for the terminal, that is, the first security context in the following embodiments.
虽然未示出,上述的5G网络还可以包括用户面功能(User Plane Function,UPF)实体、和策略控制功能(Policy Control Function,PCF)实体,等等,本申请实施例对此不作具体限定。Although not shown, the foregoing 5G network may further include a User Plane Function (UPF) entity, and a Policy Control Function (PCF) entity, and the like, which is not specifically limited in this embodiment of the present application.
需要说明的是,上述5G网络中的终端、RAN接入点、AMF实体、SMF实体、AUSF实体和UDM实体等仅是一个名字,名字对设备本身不构成限定。在5G网络以及未来其它的网络中,终端、RAN接入点、AMF实体、SMF实体、AUSF实体和UDM实体所对应的网元或实体也可以是其他的名字,本申请实施例对此不作具体限定。例如,该UDM实体还有可能被替换为用户归属服务器(Home Subscriber Server,HSS)或者用户签约数据库(User Subscription Database,USD)或者数据库实体,等等,在此进行统一说明,以下不再赘述。It should be noted that the terminal, the RAN access point, the AMF entity, the SMF entity, the AUSF entity, and the UDM entity in the above 5G network are only one name, and the name does not limit the device itself. In the 5G network and other networks in the future, the network element or the entity corresponding to the terminal, the RAN access point, the AMF entity, the SMF entity, the AUSF entity, and the UDM entity may also be other names, which is not specifically described in this embodiment of the present application. limited. For example, the UDM entity may be replaced by a Home Subscriber Server (HSS) or a User Subscription Database (USD) or a database entity, and the like.
需要说明的是,本申请所涉及到的终端可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备,以及各种形式的终端,移动台(Mobile Station,MS),用户设备(User Equipment,UE),终端设备(Terminal Equipment),软终端等等。为方便描述,本申请中,上面提到的设备统称为终端。It should be noted that the terminal involved in the present application may include various handheld devices with wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem, and various forms of terminals. Mobile station (MS), user equipment (User Equipment, UE), terminal equipment (Terminal Equipment), soft terminal, and the like. For convenience of description, in the present application, the above mentioned devices are collectively referred to as terminals.
另外,本申请实施例图1中的第一网络设备101,可能由一个实体设备实现,也可能由多个实体设备共同实现,还可能是一个实体设备内的一个逻辑功能模块,本申请实施例对此不作具体限定。In addition, the first network device 101 in the embodiment of the present disclosure may be implemented by one physical device, or may be implemented by multiple physical devices, and may also be a logical functional module in a physical device. This is not specifically limited.
如图3所示,图1中的第一网络设备101和终端102可以通过图3中的通信设备来实现。As shown in FIG. 3, the first network device 101 and the terminal 102 in FIG. 1 can be implemented by the communication device in FIG.
图3所示为本申请实施例提供的通信设备的硬件结构示意图。通信设备300包括至少一个处理器301,通信总线302,存储器303以及至少一个通信接口304。FIG. 3 is a schematic diagram showing the hardware structure of a communication device according to an embodiment of the present application. The communication device 300 includes at least one processor 301, a communication bus 302, a memory 303, and at least one communication interface 304.
处理器301可以是一个通用中央处理器(Central Processing Unit,CPU),微处理器,特定应用集成电路(Application-Specific Integrated Circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。The processor 301 can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of the present application. integrated circuit.
通信总线302可包括一通路,在上述组件之间传送信息。Communication bus 302 can include a path for communicating information between the components described above.
通信接口304,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(Radio Access Network,RAN),无线局域网(Wireless Local Area Networks,WLAN)等。The communication interface 304 uses a device such as any transceiver for communicating with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN), etc. .
存储器303可以是只读存储器(Read-Only Memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(Random Access Memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一 起。The memory 303 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions. The dynamic storage device can also be an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical disc storage, and a disc storage device. (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be Any other media accessed, but not limited to this. The memory can exist independently and be connected to the processor via a bus. The memory can also be integrated with the processor.
其中,存储器303用于存储执行本申请方案的应用程序代码,并由处理器301来控制执行。处理器301用于执行存储器303中存储的应用程序代码,从而实现本申请下述实施例提供的网络安全保护方法。The memory 303 is used to store application code for executing the solution of the present application, and is controlled by the processor 301 for execution. The processor 301 is configured to execute the application code stored in the memory 303, thereby implementing the network security protection method provided by the following embodiments of the present application.
在具体实现中,作为一种实施例,处理器301可以包括一个或多个CPU,例如图3中的CPU0和CPU1。In a particular implementation, as an embodiment, processor 301 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
在具体实现中,作为一种实施例,通信设备300可以包括多个处理器,例如图3中的处理器301和处理器308。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a particular implementation, as an embodiment, communication device 300 can include multiple processors, such as processor 301 and processor 308 in FIG. Each of these processors can be a single-CPU processor or a multi-core processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data, such as computer program instructions.
在具体实现中,作为一种实施例,通信设备300还可以包括输出设备305和输入设备306。输出设备305和处理器301通信,可以以多种方式来显示信息。例如,输出设备305可以是液晶显示器(Liquid Crystal Display,LCD),发光二级管(Light Emitting Diode,LED)显示设备,阴极射线管(Cathode Ray Tube,CRT)显示设备,或投影仪(projector)等。输入设备306和处理器301通信,可以以多种方式接受用户的输入。例如,输入设备306可以是鼠标、键盘、触摸屏设备或传感设备等。In a particular implementation, as an embodiment, the communication device 300 can also include an output device 305 and an input device 306. Output device 305 is in communication with processor 301 and can display information in a variety of ways. For example, the output device 305 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait. Input device 306 is in communication with processor 301 and can accept user input in a variety of ways. For example, input device 306 can be a mouse, keyboard, touch screen device, or sensing device, and the like.
上述的通信设备300可以是一个通用计算机设备或者是一个专用计算机设备。在具体实现中,通信设备300可以是台式机、便携式电脑、网络服务器、掌上电脑(Personal Digital Assistant,PDA)、移动手机、平板电脑、终端设备、嵌入式设备或有图3中类似结构的设备。本申请实施例不限定通信设备300的类型。The communication device 300 described above can be a general purpose computer device or a special purpose computer device. In a specific implementation, the communication device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet, a terminal device, an embedded device, or a device having the similar structure in FIG. . The embodiment of the present application does not limit the type of the communication device 300.
下面将结合图1至图3对本申请实施例提供的网络安全保护方法进行具体阐述。The network security protection method provided by the embodiment of the present application will be specifically described below with reference to FIG. 1 to FIG.
首先,结合图1所示的网络安全保护系统10,本申请实施例提供的网络安全保护方法的流程示意图如图4所示,包括如下步骤:First, in conjunction with the network security protection system 10 shown in FIG. 1, the schematic flowchart of the network security protection method provided by the embodiment of the present application is as shown in FIG. 4, and includes the following steps:
S401、终端确定该终端的第一目标安全上下文,该第一目标安全上下文包括第一安全上下文或第二安全上下文。其中,第一安全上下文为配置的安全上下文,第二安全上下文为鉴权流程生成的安全上下文。S401. The terminal determines a first target security context of the terminal, where the first target security context includes a first security context or a second security context. The first security context is a configured security context, and the second security context is a security context generated by the authentication process.
其中,本申请实施例中,第一目标安全上下文是终端用来对发送给第一网络设备的初始NAS请求消息进行安全保护的安全上下文,在此进行统一说明,以下不再赘述。In the embodiment of the present application, the first target security context is a security context used by the terminal to secure the initial NAS request message sent to the first network device, and is uniformly described herein, and details are not described herein.
S402、终端使用第一目标安全上下文对初始NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密。S402. The terminal secures the initial NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption.
S403、终端向第一网络设备发送安全保护的NAS请求消息,以使得第一网络设备接收来自终端的安全保护的NAS请求消息。S403. The terminal sends a security-protected NAS request message to the first network device, so that the first network device receives the NAS request message from the security protection of the terminal.
该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示第一目标安全上下文的类型。The header of the security-protected NAS request message is a first NAS message header, where the first NAS message header includes an identifier of the terminal and first security header type information, where the first security header type information is used to indicate the first target security. The type of context.
S404、第一网络设备根据终端的标识和第一安全头类型信息,确定第一目标安全上下文。S404. The first network device determines the first target security context according to the identifier of the terminal and the first security header type information.
S405、第一网络设备使用第一目标安全上下文,对安全保护的NAS请求消息进行安 全验证,该安全验证包括解密。S405. The first network device uses the first target security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
S406、第一网络设备使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,该安全保护包括加密。该第二目标安全上下文包括第一安全上下文或第二安全上下文。S406. The first network device uses the second target security context to secure the NAS reject message, and obtains a security-protected NAS reject message, where the security protection includes encryption. The second target security context includes a first security context or a second security context.
其中,本申请实施例中,第二目标安全上下文是第一网络设备用来对发送给终端的NAS拒绝消息进行安全保护的安全上下文,在此进行统一说明,以下不再赘述。In the embodiment of the present application, the second target security context is a security context used by the first network device to secure the NAS reject message sent to the terminal, and is uniformly described herein, and details are not described herein.
S407、第一网络设备向终端发送安全保护的NAS拒绝消息,以使得终端接收来自第一网络设备的安全保护的NAS拒绝消息。S407. The first network device sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the first network device for security protection.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,该第二安全头类型信息用于指示第二目标安全上下文的类型。The header of the security-protected NAS reject message is a second NAS message header, where the second NAS header includes an identifier of the terminal and second security header type information, where the second security header type information is used to indicate the second target. The type of security context.
S408、终端根据终端的标识和第二安全头类型信息,确定第二目标安全上下文。S408. The terminal determines a second target security context according to the identifier of the terminal and the second security header type information.
S409、终端使用第二目标安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S409. The terminal uses the second target security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
其中,步骤S401-S409的具体实现将在图5和图6所示的实施例中详细阐述。The specific implementation of steps S401-S409 will be explained in detail in the embodiments shown in FIGS. 5 and 6.
可选的,在终端向第一网络设备发送安全保护的NAS请求消息之后,还可以包括:终端接收未进行安全保护的NAS拒绝消息;终端丢弃未进行安全保护的NAS拒绝消息。Optionally, after the terminal sends the NAS request message of the security protection to the first network device, the terminal may further include: the terminal receiving the NAS rejection message that is not secured; and the terminal discarding the NAS rejection message that is not secured.
由于本申请实施例中的真实网络的NAS拒绝消息是进行安全保护的,因此在终端接收到未进行安全保护的NAS拒绝消息之后,可以认为是伪网络发送的,进而可以直接丢弃该未进行安全保护的NAS拒绝消息。Since the NAS refusal message of the real network in the embodiment of the present application is security protection, after the terminal receives the NAS refusal message without security protection, it can be considered as a pseudo network transmission, and thus can directly discard the unsecured message. The protected NAS rejects the message.
基于本申请实施例提供的网络安全保护方法,一方面,由于终端向第一网络设备发送的是对初始NAS请求消息进行安全保护的NAS请求消息,因此无法被伪网络验证通过,进而伪网络不会构造对应的NAS拒绝消息,从而可以避免一部分DOS攻击。另一方面,第一网络设备向终端发送的初始NAS请求消息的NAS拒绝消息是安全保护的NAS拒绝消息,因此终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。The network security protection method provided by the embodiment of the present application, on the one hand, because the terminal sends a NAS request message for securing the initial NAS request message to the first network device, and thus cannot be verified by the pseudo network, and thus the pseudo network does not. A corresponding NAS rejection message will be constructed so that some DOS attacks can be avoided. On the other hand, the NAS reject message of the initial NAS request message sent by the first network device to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal may distinguish the NAS reject message according to whether security protection is performed. It is sent by the real network or sent by the pseudo network. In this way, the corresponding processing can be performed, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other futures. Network security.
其中,上述S401、S402、S403、S408和S409中终端的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The actions of the terminals in the foregoing S401, S402, S403, S408, and S409 can be performed by the processor 301 in the communication device 300 shown in FIG. 3, and the application code stored in the memory 303 is called, which is not used in this embodiment of the present application. Any restrictions.
其中,上述S404、S405、S406和S407中第一网络设备的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The action of the first network device in the foregoing S404, S405, S406, and S407 may be performed by the processor 301 in the communication device 300 shown in FIG. 3, by calling the application code stored in the memory 303, which is used by the embodiment of the present application. No restrictions are imposed.
其次,以图1所示的网络安全保护系统10应用于如图2所示的5G网络,第一网络设备为AMF实体为例,对图4所示的网络安全保护方法进行展开说明。Next, the network security protection system 10 shown in FIG. 1 is applied to the 5G network shown in FIG. 2, and the first network device is an AMF entity as an example, and the network security protection method shown in FIG. 4 is expanded.
如图5所示,为本申请实施例提供的一种网络安全保护方法的流程示意图。该网络安全保护方法涉及到终端、AMF实体、以及UDM实体之间的交互,包括如下步骤:As shown in FIG. 5, it is a schematic flowchart of a network security protection method provided by an embodiment of the present application. The network security protection method involves interaction between a terminal, an AMF entity, and a UDM entity, and includes the following steps:
S500、运营商同时在终端或终端使用的全球用户识别卡(Universal Subscriber Identity Module,USIM)卡上、以及网络侧为该终端配置相同的安全上下文。The S500 and the operator simultaneously configure the same security context for the terminal on the Universal Subscriber Identity Module (USIM) card used by the terminal or the terminal and on the network side.
其中,运营商在终端使用的USIM卡上配置安全上下文的场景相对于运营商在终端上配置安全上下文的场景更加普遍,因为USIM卡是运营商发行的。运营商在终端上配置安全上下文,通常适用于运营商签约的终端。在此进行统一说明,以下不再赘述。The scenario in which the operator configures the security context on the USIM card used by the terminal is more common than the scenario in which the operator configures the security context on the terminal, because the USIM card is issued by the operator. The operator configures the security context on the terminal, which is usually applicable to the terminal that the operator has contracted. A unified explanation is given here, and will not be described below.
可选的,运营商在网络侧为终端配置安全上下文时,可以是配置在网络侧的UDM实体上,也可以是配置在网络侧的AUSF实体上,还有可能是配置在网络侧的其他网络节点上,本申请实施例对此不作具体限定。Optionally, the operator may configure the security context for the terminal on the network side, or may be configured on the UDM entity on the network side, or on the AUSF entity configured on the network side, or may be other networks configured on the network side. The embodiment of the present application does not specifically limit this.
可选的,运营商在终端上为该终端配置安全上下文时,可以是配置在终端的非易失的内存(non-volatile memory)中,也可以是配置在终端的其他内存中,本申请实施例对比不作具体限定。Optionally, when the security context is configured for the terminal on the terminal, the operator may be configured in a non-volatile memory of the terminal, or may be configured in another memory of the terminal. The comparison of the examples is not specifically limited.
可选的,运营商也可以同时在终端和终端使用的USIM卡上配置安全上下文。该场景下,终端通常使用USIM卡上配置的安全上下文,当然,终端也可能使用终端上配置的安全上下文,本申请实施例对此不作具体限定。Optionally, the operator can also configure the security context on the USIM card used by the terminal and the terminal. In this scenario, the terminal usually uses the security context configured on the USIM card. Of course, the terminal may also use the security context configured on the terminal, which is not specifically limited in this embodiment.
可选的,本申请实施例中,运营商配置的安全上下文可以称为缺省(default)安全上下文、或者初始(initial)安全上下文,或者签约(subscribed)安全上下文等,本申请实施例对此不作具体限定。Optionally, in the embodiment of the present application, the security context configured by the operator may be referred to as a default security context, or an initial security context, or a subscribed security context. No specific limitation.
可选的,本申请实施例中,运营商配置的安全上下文至少包括以下参数:安全保护密钥与安全保护算法。其中,安全保护密钥可以是根密钥,也可以是能直接使用的NAS安全密钥,本申请实施例对此不作具体限定。安全保护算法包括加密算法。可选的,安全保护算法还可以包括完整性保护算法。本申请实施例对具体算法类型,本发明不做限定。其中,若安全上下文中的安全保护密钥是NAS安全密钥,则终端和AMF实体可以直接采用该NAS安全密钥和加密算法对NAS消息进行加密;若安全上下文中的安全保护密钥是根密钥,则终端和AMF实体首先需要使用密钥推演算法从根密钥推演出对应的NAS安全密钥,进而采用该NAS安全密钥和加密算法对NAS消息进行加密,终端和AMF实体使用相同的密钥推演算法。具体的密钥推演算法可参考现有技术,在此不再赘述。Optionally, in the embodiment of the present application, the security context configured by the operator includes at least the following parameters: a security protection key and a security protection algorithm. The security protection key may be a root key or a NAS security key that can be directly used. This embodiment of the present application does not specifically limit this. The security protection algorithm includes an encryption algorithm. Optionally, the security protection algorithm may further include an integrity protection algorithm. The embodiment of the present application does not limit the specific algorithm type. If the security protection key in the security context is the NAS security key, the terminal and the AMF entity can directly use the NAS security key and the encryption algorithm to encrypt the NAS message; if the security protection key in the security context is the root The key, the terminal and the AMF entity first need to use the key deduction algorithm to derive the corresponding NAS security key from the root key, and then use the NAS security key and encryption algorithm to encrypt the NAS message, and the terminal and the AMF entity use the same Key deduction algorithm. For a specific key derivation algorithm, reference may be made to the prior art, and details are not described herein again.
可选的,本申请实施例中,运营商可以结合预设策略,根据为终端服务的不同公共陆地移动网络(Public Land Mobile Network,PLMN)、或者为终端服务的不同网络切片(slice)、或者终端采用的不同接入技术,为终端配置一个或多个安全上下文。比如,为不同的提供漫游服务的拜访公共陆地移动网络(Visited Public Land Mobile Network,VPLMN)配置不同或相同的安全上下文;或者,为不同的网络切片配置不同或相同的安全上下文;或者,为3GPP无线空口接入,非3GPP空口接入和固定网络接入配置不同或相同的安全上下文等,本申请实施例对此不作具体限定。Optionally, in the embodiment of the present application, the operator may combine different presets according to a different public land mobile network (PLMN) serving the terminal, or a different network slice (slice) serving the terminal, or Different access technologies adopted by the terminal configure one or more security contexts for the terminal. For example, configuring different or identical security contexts for different visited public mobile mobile networks (VPLMNs) providing roaming services; or configuring different or identical security contexts for different network slices; or, for 3GPP For the wireless air interface access, the non-3GPP air interface access and the fixed network access configuration are different or the same security context, and the like is not limited in this embodiment.
S501、终端确定本地是否保存第二安全上下文。其中,该第二安全上下文为鉴权流程生成的安全上下文。S501. The terminal determines whether the second security context is saved locally. The second security context is a security context generated by the authentication process.
其中,步骤S501中的第二安全上下文是在上一次终端从空闲态发起初始NAS请求消息触发的流程中发起的鉴权流程生成的安全上下文。The second security context in step S501 is a security context generated by an authentication process initiated in a process triggered by the last terminal to initiate an initial NAS request message from an idle state.
若该终端确定本地未保存第二安全上下文,则继续执行下述步骤S502-S510。If the terminal determines that the second security context is not saved locally, then the following steps S502-S510 are continued.
S502、终端确定该终端的第一安全上下文,将该第一安全上下文确定为该终端的第一目标安全上下文。其中,第一安全上下文为配置的安全上下文。S502. The terminal determines a first security context of the terminal, and determines the first security context as the first target security context of the terminal. The first security context is a configured security context.
可选的,若运营商在终端的USIM卡上为该终端配置安全上下文,则终端确定该终端的第一安全上下文,可以包括:终端读取终端的USIM卡上配置的第一安全上下文。Optionally, if the operator configures the security context for the terminal on the USIM card of the terminal, the terminal determines the first security context of the terminal, and the terminal may include: the terminal reads the first security context configured on the USIM card of the terminal.
可选的,若运营商在终端上为该终端配置安全上下文,则终端确定该终端的第一安全上下文,可以包括:终端获取终端上配置的第一安全上下文。Optionally, if the operator configures the security context for the terminal on the terminal, the terminal determines the first security context of the terminal, and the terminal may include: acquiring, by the terminal, the first security context configured on the terminal.
可选的,若运营商在终端的USIM卡上和终端上同时为该终端配置安全上下文,则终端确定该终端的第一安全上下文,可以包括:终端读取终端的USIM卡上配置的第一安全上下文。Optionally, if the operator configures the security context for the terminal on the USIM card of the terminal and the terminal, the terminal determines the first security context of the terminal, and the terminal may: read the first configuration on the USIM card of the terminal. Security context.
可选的,当运营商为终端配置多个安全上下文时,终端确定该终端的第一安全上下文,包括:终端根据当前为该终端服务的PLMN、当前为该终端服务的网络切片或该终端当前采用的接入技术,从终端的多个安全上下文中选择第一安全上下文,其中,多个安全上下文中包括第一安全上下文。Optionally, when the operator configures multiple security contexts for the terminal, the terminal determines the first security context of the terminal, including: the terminal according to the PLMN currently serving the terminal, the network slice currently serving the terminal, or the current terminal. The access technology employed selects a first security context from a plurality of security contexts of the terminal, wherein the first security context is included in the plurality of security contexts.
需要说明的是,步骤S501是个可选的步骤,终端也可以直接执行步骤S502,即终端确定该终端的第一安全上下文,将该第一安全上下文确定为终端的第一目标安全上下文,本申请实施例对此不作具体限定。It should be noted that the step S501 is an optional step, and the terminal may directly perform step S502, that is, the terminal determines the first security context of the terminal, and determines the first security context as the first target security context of the terminal. The embodiment does not specifically limit this.
S503、终端使用第一安全上下文对初始NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密。S503. The terminal secures the initial NAS request message by using the first security context to obtain a security-protected NAS request message, where the security protection includes encryption.
其中,本申请实施例中的初始NAS请求消息为终端从空闲态发起的NAS请求消息,例如:第四代(4th generation,4G)移动通信系统中的附着请求(ATTACH REQUEST)消息,跟踪域更新请求(TRACKING AREA UPDATE REQUEST)消息,业务请求(SERVICE REQUEST)消息;5G移动通信系统中的注册请求(REGISTRATION REQUEST)消息等,本申请对此不做限定。在此进行统一说明,以下不再赘述。The initial NAS request message in the embodiment of the present application is an NAS request message initiated by the terminal from an idle state, for example, an attach request (ATTACH REQUEST) message in a fourth generation (4th generation, 4G) mobile communication system, and a tracking domain update. The request (TRACKING AREA UPDATE REQUEST) message, the service request (SERVICE REQUEST) message, the registration request (REGISTRATION REQUEST) message in the 5G mobile communication system, etc., are not limited in this application. A unified explanation is given here, and will not be described below.
可选的,本申请实施例中的安全保护还可以包括完整性保护,在此进行统一说明,以下不再赘述。若安全保护还包括完整性保护,则在终端使用NAS安全密钥和加密算法对初始NAS请求消息加密之后,还使用NAS安全密钥和完整性保护算法对加密后的NAS请求消息进行完整性保护,生成消息验证码(message authentication code,MAC),本申请实施例对此不作具体限定。Optionally, the security protection in the embodiment of the present application may also include integrity protection, which is uniformly described herein, and details are not described herein again. If the security protection also includes integrity protection, after the terminal encrypts the initial NAS request message using the NAS security key and encryption algorithm, the NAS security key and integrity protection algorithm are used to integrity protect the encrypted NAS request message. The message authentication code (MAC) is generated, which is not specifically limited in this embodiment of the present application.
S504、终端向AMF实体发送安全保护的NAS请求消息,以使得AMF实体接收来自终端的安全保护的NAS请求消息。S504. The terminal sends a security-protected NAS request message to the AMF entity, so that the AMF entity receives the NAS request message from the security protection of the terminal.
其中,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示第一安全上下文的类型。The first NAS header includes the identifier of the terminal and the first security header type information, where the first NAS header includes the first security header type information, where the first security header type information is used to indicate the first The type of security context.
可选的,本申请实施例中,第一NAS消息头中的终端的标识和第一安全头类型信息可以是没有进行安全保护的。Optionally, in the embodiment of the present application, the identifier of the terminal and the first security header type information in the first NAS message header may be not secured.
可选的,本申请实施例中的终端的标识可以是完整的终端永久身份标识,比如国际移动用户标识(International Mobile Subscriber Identity,IMSI);也可以是部分的终端永久身份标识,比如IMSI中的部分信息;还可以是经过安全保护的终端身份标识,比如经过哈 希算法保护的IMSI信息,本申请实施例对终端的标识的具体内容不作具体限定。Optionally, the identifier of the terminal in the embodiment of the present application may be a complete terminal permanent identity, such as an International Mobile Subscriber Identity (IMSI), or may be a partial permanent identity of the terminal, such as in the IMSI. The information may be a security-protected terminal identity, such as the IMSI information protected by the hash algorithm. The specific content of the identifier of the terminal is not specifically limited in this embodiment.
可选的,第一安全头类型信息可以包括:使用第一安全上下文进行加密与完整性保护(Integrity protected and ciphered with default security context),或者,使用第一安全上下文进行加密(Ciphered with default security context)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the first security header type information may include: Integrity protected and ciphered with default security context, or encrypted using a first security context (Ciphered with default security context) ). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
示例性的,包含第一NAS消息头的安全保护的NAS请求消息的格式如表一所示。其中,第1-(n+5)字节分配给第一NAS消息头,其余字节分配给安全保护的NAS请求消息。其中,若安全保护仅包含加密,不包含完整性保护,则第一NAS消息头中不包含消息验证码和序列号;若安全保护包含加密和完整性保护,则第一NAS消息头中包含消息验证码和序列号。需要说明的是,在表一所示的示例中,终端的标识所占的字节数是可变的,取决于终端所使用的标识的长度,例如若使用完整的IMSI,则终端的标识所占的字节数为8。Exemplarily, the format of the NAS request message including the security protection of the first NAS message header is as shown in Table 1. The first (n+5)th byte is allocated to the first NAS message header, and the remaining bytes are allocated to the secured NAS request message. If the security protection only includes encryption and does not include integrity protection, the first NAS message header does not include the message verification code and the sequence number; if the security protection includes encryption and integrity protection, the first NAS message header includes the message. Verification code and serial number. It should be noted that, in the example shown in Table 1, the number of bytes occupied by the identifier of the terminal is variable, depending on the length of the identifier used by the terminal, for example, if the complete IMSI is used, the identifier of the terminal The number of bytes is 8.
表一Table I
Figure PCTCN2018084025-appb-000001
Figure PCTCN2018084025-appb-000001
在AMF实体接收来自终端的安全保护的NAS请求消息之后,可以根据第一NAS消息头中的终端的标识和第一安全头类型信息,确定第一安全上下文,具体如下述步骤S505-S514所示。After the AMF entity receives the NAS request message from the security protection of the terminal, the first security context may be determined according to the identifier of the terminal in the first NAS message header and the first security header type information, as shown in steps S505-S514 below. .
S505、AMF实体根据终端的标识和第一安全头类型信息,确定第一安全上下文。S505. The AMF entity determines the first security context according to the identifier of the terminal and the first security header type information.
可选的,AMF实体根据终端的标识和第一安全头类型信息,确定第一安全上下文,具体可以包括:Optionally, the AMF entity determines the first security context according to the identifier of the terminal and the first security header type information, and specifically includes:
AMF实体根据终端的标识和第一安全头类型信息,确定本地是否保存第一安全上下文;The AMF entity determines whether the first security context is saved locally according to the identifier of the terminal and the first security header type information.
若确定本地保存第一安全上下文,AMF实体从本地获取第一安全上下文;若确定本地未保存第一安全上下文,AMF实体向UDM实体发送第一消息,以使得UDM实体接收该第一消息。其中,第一消息包括终端的标识,用于请求获取第一安全上下文,进而UDM实体根据第一消息中携带的终端的标识,确定为该终端配置的第一安全上下文;进而,UDM实体向AMF实体发送第二消息,以使得AMF实体接收该第二消息。其中,第二消息中包括第一安全上下文和终端的标识。If it is determined that the first security context is saved locally, the AMF entity obtains the first security context locally; if it is determined that the first security context is not saved locally, the AMF entity sends a first message to the UDM entity, so that the UDM entity receives the first message. The first message includes an identifier of the terminal, and is used to request to obtain the first security context, and the UDM entity determines, according to the identifier of the terminal carried in the first message, the first security context configured for the terminal; and further, the UDM entity sends the AMF to the AMF. The entity sends a second message to cause the AMF entity to receive the second message. The second message includes a first security context and an identifier of the terminal.
可选的,本申请实施例中的第一消息可以是第一安全上下文获取请求,第二消息可以为第一安全上下文获取响应。Optionally, the first message in the embodiment of the present application may be a first security context acquisition request, and the second message may be a first security context acquisition response.
可选的,本申请实施例中的第一消息还可以包括当前为该终端服务的PLMN的标识、 当前为该终端服务的网络切片的标识或该终端当前采用的接入技术的信息。这样,当运营商在UDM实体上为终端配置多个安全上下文时,UDM实体可以根据终端的标识、以及第一消息中携带的当前为该终端服务的PLMN的标识、当前为该终端服务的网络切片的标识或该终端当前采用的接入技术的信息,从终端的多个安全上下文中选择第一安全上下文,其中,多个安全上下文中包括第一安全上下文。Optionally, the first message in the embodiment of the present application may further include an identifier of a PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal. In this way, when the operator configures multiple security contexts for the terminal on the UDM entity, the UDM entity may, according to the identifier of the terminal, and the identifier of the PLMN currently serving the terminal carried in the first message, and the network currently serving the terminal. The identifier of the slice or the information about the access technology currently used by the terminal, selects a first security context from multiple security contexts of the terminal, where the first security context is included in the multiple security contexts.
可选的,AMF实体在接收第二消息后,可以保存第二消息中携带的第一安全上下文。Optionally, after receiving the second message, the AMF entity may save the first security context carried in the second message.
上述实施例以运营商在UDM实体上为终端配置安全上下文为例进行说明。当然,运营商还可能在网络侧的其他设备上为终端配置安全上下文,比如,在AUSF实体上为终端配置安全上下文。当在网络侧的其他设备上为终端配置安全上下文时,从其他设备上获取第一安全上下文的实现方式可参考上述从UDM实体上获取第一安全上下文的实现方式,仅需将上述方案中的UDM实体替换为其它设备即可,在此不再赘述。The foregoing embodiment is described by taking an example in which an operator configures a security context for a terminal on a UDM entity. Of course, the operator may also configure a security context for the terminal on other devices on the network side, for example, configuring a security context for the terminal on the AUSF entity. When the security context is configured for the terminal on the other device on the network side, the implementation manner of obtaining the first security context from the other device may be implemented by referring to the implementation manner of obtaining the first security context from the UDM entity. The UDM entity can be replaced with other devices, and details are not described herein.
S506、AMF实体使用第一安全上下文,对安全保护的NAS请求消息进行安全验证,该安全验证包括解密。S506. The AMF entity uses the first security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
可选的,若安全保护包含完整性保护,则安全验证还包括完整性检查,在此进行统一说明,以下不再赘述。Optionally, if the security protection includes integrity protection, the security verification also includes an integrity check, which is uniformly described herein, and is not described here.
进而,AMF实体可以根据安全验证结果,确定第二目标安全上下文执行后续的操作,具体如下述步骤S507a-S510a、S507b-S510b、S507c-S510c、以及S507d-S510d所示。其中,第二目标安全上下文包括第一安全上下文或第二安全上下文。Further, the AMF entity may determine that the second target security context performs subsequent operations according to the security verification result, as specifically shown in steps S507a-S510a, S507b-S510b, S507c-S510c, and S507d-S510d. The second target security context includes a first security context or a second security context.
S507a、若安全验证通过,且AMF实体中存储第二安全上下文,AMF实体使用第二安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S507a. If the security verification is passed, and the second security context is stored in the AMF entity, the AMF entity uses the second security context to secure the NAS rejection message of the initial NAS request message, and obtains a security-protected NAS rejection message.
其中,步骤S507a中的第二安全上下文可以是在上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,也即网络侧决定在本次终端从空闲态发起初始NAS消息触发的流程中不发起鉴权流程;也可以是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,本申请实施例对此不作具体限定。其中,本次终端从空闲态发起初始NAS消息时,AMF实体可以在发起鉴权流程生成新的安全上下文之后拒绝初始NAS请求消息,此时AMF实体可以获取鉴权流程生成的新的安全上下文。The second security context in the step S507a may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggering from the idle state, that is, the network side decides to initiate the idle state from the current terminal. The authentication process is not initiated in the process triggered by the initial NAS message. The security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited. When the terminal initiates the initial NAS message from the idle state, the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
其中,若安全保护包括加密,则本申请实施例中的安全验证通过是指,解密成功;若安全保护包括加密和完整性保护,则本申请实施例中的安全验证是指,解密成功且完整性检查通过,在此进行统一说明,以下不再赘述。If the security protection includes the encryption, the security verification in the embodiment of the present application means that the decryption succeeds; if the security protection includes the encryption and the integrity protection, the security verification in the embodiment of the present application means that the decryption is successful and complete. The sexual inspection is passed, and a unified explanation is given here, and the details are not described below.
其中,AMF实体使用第二安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the second security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
S508a、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S508a. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第二安全上下文 的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
可选的,步骤S508a中的第二安全头类型信息可以包括:进行加密与完整性保护(Integrity protected and ciphered),或者,进行加密(Ciphered)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S508a may include: performing integrity protected and ciphered, or performing ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
示例性的,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示。其中,第1-(n+5)字节分配给第二NAS消息头,其余字节分配给安全保护的NAS拒绝消息。其中,若安全保护仅包含加密,不包含完整性保护,则第二NAS消息头中不包含消息验证码和序列号;若安全保护包含加密和完整性保护,则第二NAS消息头中包含消息验证码和序列号。需要说明的是,在表二所示的示例中,终端的标识所占的字节数是可变的,取决于终端所使用的标识的长度,例如若使用完整的IMSI,则终端的标识所占的字节数为8。Exemplarily, the format of the NAS rejection message including the security protection of the second NAS message header is as shown in Table 2. The first (n+5)th byte is allocated to the second NAS message header, and the remaining bytes are allocated to the secured NAS rejection message. If the security protection only includes encryption and does not include integrity protection, the second NAS message header does not include the message verification code and the sequence number; if the security protection includes encryption and integrity protection, the second NAS message header includes the message. Verification code and serial number. It should be noted that, in the example shown in Table 2, the number of bytes occupied by the identifier of the terminal is variable, depending on the length of the identifier used by the terminal, for example, if the complete IMSI is used, the identifier of the terminal The number of bytes is 8.
表二Table II
Figure PCTCN2018084025-appb-000002
Figure PCTCN2018084025-appb-000002
S509a、终端根据终端的标识和第二安全头类型信息,确定第二安全上下文。S509. The terminal determines the second security context according to the identifier of the terminal and the second security header type information.
其中,步骤S509a中的第二安全上下文和步骤S507a中的第二安全上下文是同一个鉴权流程生成的安全上下文。也就是说,若步骤S507a中的第二安全上下文是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S509a中的第二安全上下文也是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文;若步骤S507a中的第二安全上下文是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S509a中的第二安全上下文也是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文。The second security context in step S509a and the second security context in step S507a are security contexts generated by the same authentication process. That is, if the second security context in step S507a is the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, the second security context in step S509a is also the last time. The security context generated by the authentication process initiated by the initial NAS message triggered by the terminal from the idle state; if the second security context in step S507a is the authentication initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state The security context generated by the process, the second security context in step S509a is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
S510a、终端使用第二安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S510a. The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S507a-S510a中的安全保护的NAS拒绝消息中还可能包含拒绝初始NAS请求消息的原因,若终端安全验证通过,终端还可能根据拒绝初始NAS请求消息的原因执行相应的动作,比如将当前的位置区域加入禁止列表并尝试在其它位置区域选择合适小区驻留,本申请实施例对终端根据拒绝初始NAS请求消息的原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the NAS message of the security protection in the steps S507a-S510a may also include the reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
可选的,若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护 的NAS拒绝消息。Optionally, if the terminal receives the NAS rejection message that is not secured, the terminal discards the NAS rejection message that is not secured.
S507b、若安全验证通过,且AMF实体中未存储第二安全上下文,AMF实体使用第一安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S507b. If the security verification is passed, and the second security context is not stored in the AMF entity, the AMF entity uses the first security context to secure the NAS reject message of the initial NAS request message, and obtains a security-protected NAS reject message.
其中,若AMF实体中未保存上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,或者上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文失效或非法,且在本次终端从空闲态发起初始NAS消息触发的流程中,AMF实体在发起新的鉴权流程之前拒绝初始NAS请求消息,此时AMF实体中未存储第二安全上下文。If the AMF entity does not save the security context generated by the authentication process initiated by the last terminal to initiate the initial NAS message from the idle state, or the last time the terminal initiates the initial NAS message triggered by the idle state, The security context generated by the rights flow is invalid or illegal, and in the process triggered by the initial NAS message initiated by the terminal from the idle state, the AMF entity rejects the initial NAS request message before initiating a new authentication process, and the AMF entity does not store at this time. The second security context.
其中,该第一安全上下文可以是保存在AMF中的,也可以是通过步骤S505中的方式获取的,本申请实施例对此不作具体限定。The first security context may be stored in the AMF, or may be obtained by using the method in the step S505, which is not specifically limited in this embodiment of the present application.
其中,AMF实体使用第一安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the first security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
也就是说,本申请实施例中,第二安全上下文的优先级高于第一安全上下文的优先级,在存在第二安全上下文时,使用第二安全上下文对初始NAS请求消息进行安全保护,或者,使用第二安全上下文对NAS拒绝消息进行安全保护。若不存在第二安全上下文,使用第一安全上下文对初始NAS请求消息进行安全保护,或者,使用第一安全上下文对NAS拒绝消息进行安全保护,在此进行统一说明,以下不再赘述。That is, in the embodiment of the present application, the priority of the second security context is higher than the priority of the first security context, and when the second security context exists, the initial NAS request message is secured by using the second security context, or The second security context is used to secure the NAS reject message. If the second security context does not exist, the first security context is used to secure the initial NAS request message, or the first security context is used to secure the NAS rejection message, which is uniformly described herein, and is not described here.
S508b、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S508b. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第一安全上下文的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the first security context. type.
可选的,步骤S508b中的第二安全头类型信息可以包括:使用第一安全上下文进行加密与完整性保护(Integrity protected and ciphered with default security context),或者,使用第一安全上下文进行加密(Ciphered with default security context)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S508b may include: Integrity protected and ciphered with default security context, or encrypted using the first security context (Ciphered) With default security context). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示,在此不再赘述。The format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
S509b、终端根据终端的标识和第二安全头类型信息,确定第一安全上下文。S509b: The terminal determines the first security context according to the identifier of the terminal and the second security header type information.
S510b、终端使用第一安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S510b: The terminal uses the first security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S507b-S510b中的安全保护的NAS拒绝消息中还可能包含拒绝初始NAS请求消息的原因,若终端安全验证通过,终端还可能根据拒绝初始NAS请求消息的原因执行相应的动作,比如将当前的位置区域加入禁止列表并尝试在其它位置区域选择合适小区驻留,本申请实施例对终端根据拒绝初始NAS请求消息的原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the NAS message of the security protection in the steps S507b-S510b may also include a reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
可选的,若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护的NAS拒绝消息。Optionally, if the terminal receives the NAS rejection message that is not secured, the terminal discards the NAS rejection message that is not secured.
S507c、若安全验证未通过,且AMF实体中存储第二安全上下文,AMF实体使用第二安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S507c. If the security verification fails, and the second security context is stored in the AMF entity, the AMF entity uses the second security context to secure the NAS rejection message, and obtains a security-protected NAS rejection message.
其中,步骤S507c中的第二安全上下文可以是在上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,也即网络侧决定在本次终端从空闲态发起初始NAS消息触发的流程中不发起鉴权流程;也可以是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,本申请实施例对此不作具体限定。其中,本次终端从空闲态发起初始NAS消息时,AMF实体可以在发起鉴权流程生成新的安全上下文之后进行NAS拒绝,此时AMF实体可以获取鉴权流程生成的新的安全上下文。The second security context in step S507c may be a security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggering from the idle state, that is, the network side decides to initiate the idle state from the current terminal. The authentication process is not initiated in the process triggered by the initial NAS message. The security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited. When the terminal initiates the initial NAS message from the idle state, the AMF entity may perform the NAS rejection after the initiation of the authentication process to generate a new security context. At this time, the AMF entity may obtain a new security context generated by the authentication process.
其中,该NAS拒绝消息是因为安全验证未通过而发送的。AMF实体使用第二安全上下文对NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The NAS rejection message is sent because the security verification failed. For a specific implementation of the security protection of the NAS refusal message by using the second security context, the AMF entity may implement the security protection of the initial NAS request message by using the first security context in the step S503, and details are not described herein.
可选的,AMF在安全验证未通过时,可以直接忽略该接收的安全保护的NAS请求消息,这样,步骤S507c-S510c将不会被执行,本申请实施例对此不作具体限定。Optionally, the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S507c-S510c will not be performed, which is not specifically limited in this embodiment of the present application.
S508c、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S508c. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第二安全上下文的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
可选的,步骤S508c中的第二安全头类型信息可以包括:进行加密与完整性保护(Integrity protected and ciphered),或者,进行加密(Ciphered)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S508c may include: performing integrity protected and ciphered, or performing ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示,在此不再赘述。The format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
S509c、终端根据终端的标识和第二安全头类型信息,确定第二安全上下文。S509c: The terminal determines the second security context according to the identifier of the terminal and the second security header type information.
其中,步骤S509c中的第二安全上下文和步骤S507c中的第二安全上下文是同一个鉴权流程生成的安全上下文。也就是说,若步骤S507c中的第二安全上下文是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S509c中的第二安全上下文也是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文;若步骤S507c中的第二安全上下文是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S509c中的第二安全上下文也是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文。The second security context in step S509c and the second security context in step S507c are security contexts generated by the same authentication process. That is, if the second security context in step S507c is the security context generated by the authentication process initiated in the process triggered by the initial NAS initiated by the idle state, the second security context in step S509c is also the last time. The security context generated by the authentication process initiated by the initial NAS message triggered by the terminal from the idle state; if the second security context in step S507c is the authentication initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state The security context generated by the process, the second security context in step S509c is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
S510c、终端使用第二安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S510c: The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S507c-S510c中的安全保护的NAS拒绝消息还可以为移动管理状态 (Mobility Management Status)消息,本申请实施例对此不作具体限定。Optionally, the NAS message of the security protection in the steps S507c-S510c may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
可选的,步骤S507c-S510c中的安全保护的NAS拒绝消息中还可能包含拒绝原因,若终端安全验证通过,终端还可能根据拒绝原因执行相应的动作,比如直接丢弃该NAS拒绝消息或者重新从步骤S501开始执行,本申请实施例对终端根据拒绝原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the security denied NAS rejection message in steps S507c-S510c may further include a reason for rejection. If the terminal security verification is passed, the terminal may perform a corresponding action according to the rejection reason, for example, directly discarding the NAS rejection message or re-receiving the message. The step S501 is started. The embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护的NAS拒绝消息。If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
S507d、若安全验证未通过,且AMF实体中未存储第二安全上下文,AMF实体使用第一安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S507d. If the security verification fails, and the second security context is not stored in the AMF entity, the AMF entity uses the first security context to secure the NAS rejection message, and obtains the security-protected NAS rejection message.
其中,该第一安全上下文可以是保存在AMF中的,也可以是通过步骤S505中的方式获取的,本申请实施例对此不作具体限定。The first security context may be stored in the AMF, or may be obtained by using the method in the step S505, which is not specifically limited in this embodiment of the present application.
其中,该NAS拒绝消息是因为安全验证未通过而发送的。AMF实体使用第一安全上下文对NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The NAS rejection message is sent because the security verification failed. For a specific implementation of the security protection of the NAS refusal message by using the first security context, the AMF entity may implement the security protection of the initial NAS request message by using the first security context in step S503, and details are not described herein.
可选的,AMF在安全验证未通过时,可以直接忽略该接收的安全保护的NAS请求消息,这样,步骤S507c-S510c将不会被执行,本申请实施例对此不作具体限定。Optionally, the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S507c-S510c will not be performed, which is not specifically limited in this embodiment of the present application.
S508d、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S508d. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第一安全上下文的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the first security context. type.
可选的,步骤S508d中的第二安全头类型信息可以包括:使用第一安全上下文进行加密与完整性保护(Integrity protected and ciphered with default security context),或者,使用第一安全上下文进行加密(Ciphered with default security context)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S508d may include: Integrity protected and ciphered with default security context, or encrypted using the first security context (Ciphered) With default security context). Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示,在此不再赘述。The format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
S509d、终端根据终端的标识和第二安全头类型信息,确定第一安全上下文。S509d: The terminal determines the first security context according to the identifier of the terminal and the second security header type information.
S510d、终端使用第一安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S510d: The terminal uses the first security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S507d-S510d中的安全保护的NAS拒绝消息还可以为移动管理状态(Mobility Management Status)消息,本申请实施例对此不作具体限定。Optionally, the NAS message of the security protection in the steps S507d-S510d may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
可选的,步骤S507d-S510d中的安全保护的NAS拒绝消息中还可能包含拒绝原因,若终端安全验证通过,终端还可能根据拒绝原因执行相应的动作,比如直接丢弃该NAS拒绝消息或者重新从步骤S501开始执行,本申请实施例对终端根据拒绝原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the security-rejected NAS reject message in steps S507d-S510d may further include a reason for rejection. If the terminal security verification succeeds, the terminal may perform a corresponding action according to the reason for the rejection, for example, directly discarding the NAS reject message or re-receiving The step S501 is started. The embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护的NAS拒绝消息。If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
基于本申请实施例提供的网络安全保护方法,一方面,由于终端向AMF实体发送的是对初始NAS请求消息进行安全保护的NAS请求消息,因此无法被伪网络验证通过,进而伪网络不会构造对应的NAS拒绝消息,从而可以避免一部分DOS攻击。另一方面,AMF实体向终端发送的初始NAS请求消息的NAS拒绝消息是安全保护的NAS拒绝消息,因此终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。The network security protection method provided by the embodiment of the present application, on the one hand, because the terminal sends a NAS request message to the AMF entity for security protection of the initial NAS request message, it cannot be verified by the pseudo network, and thus the pseudo network is not constructed. The corresponding NAS rejects the message, so that some DOS attacks can be avoided. On the other hand, the NAS reject message of the initial NAS request message sent by the AMF entity to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is true or not according to whether security protection is performed. The network sends it, or it is sent by the pseudo network, and can then perform corresponding processing, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other future networks. safety.
其中,上述S501、S502、S503、S504、S509a、S510a、S509b、S510b、S509c、S510c、S509d和S510d中终端的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The actions of the terminals in the foregoing S501, S502, S503, S504, S509a, S510a, S509b, S510b, S509c, S510c, S509d, and S510d may be stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. The application code is executed, and the embodiment of the present application does not impose any limitation on this.
其中,上述S505、S506、S507a、S508a、S507b、S508b、S507c、S508c、S507d和S508d中AMF的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The actions of the AMF in the above S505, S506, S507a, S508a, S507b, S508b, S507c, S508c, S507d, and S508d may be invoked by the processor 301 in the communication device 300 shown in FIG. 3 to call the application code stored in the memory 303. To be implemented, the embodiment of the present application does not impose any limitation on this.
图5所示的实施例以第一网络设备为AMF实体为例进行说明,当然,第一网络设备还可以是网络侧的其他设备,比如第一网络设备可以为SMF实体。当第一网络设备为网络侧的其他设备时,通过其他设备进行网络安全保护的方案可参考图5所示的实施例,仅需将图5所示的实施例中的AMF实体替换为其它设备即可,在此不再赘述。The embodiment shown in FIG. 5 is an example in which the first network device is an AMF entity. For example, the first network device may be another device on the network side, for example, the first network device may be an SMF entity. When the first network device is another device on the network side, the solution for performing network security protection by using other devices may refer to the embodiment shown in FIG. 5, and only need to replace the AMF entity in the embodiment shown in FIG. 5 with another device. That's it, so I won't go into details here.
可选的,如图6所示,为本申请实施例提供的另一种网络安全保护方法的流程示意图。该网络安全保护方法涉及到终端、AMF实体、以及UDM实体之间的交互,包括如下步骤:Optionally, as shown in FIG. 6 , it is a schematic flowchart of another network security protection method provided by the embodiment of the present application. The network security protection method involves interaction between a terminal, an AMF entity, and a UDM entity, and includes the following steps:
S600、同S500,具体可参考图5所示的实施例,在此不再赘述。For the S600 and the S500, refer to the embodiment shown in FIG. 5, and details are not described herein again.
S601、终端确定本地是否保存第二安全上下文。其中,该第二安全上下文为鉴权流程生成的安全上下文。S601. The terminal determines whether the second security context is saved locally. The second security context is a security context generated by the authentication process.
其中,步骤S601中的第二安全上下文是上一次终端从空闲态发起初始NAS请求消息触发的流程中鉴权流程生成的安全上下文。The second security context in step S601 is the security context generated by the authentication process in the process triggered by the last terminal initiating the initial NAS request message from the idle state.
若该终端确定本地保存有第二安全上下文,则继续执行下述步骤S602-S610。If the terminal determines that the second security context is locally saved, then the following steps S602-S610 are continued.
S602、终端将该第二安全上下文确定为该终端的第一目标安全上下文。S602. The terminal determines the second security context as the first target security context of the terminal.
S603、终端使用第二安全上下文对初始NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密。S603. The terminal uses the second security context to secure the initial NAS request message, and obtains a security-protected NAS request message, where the security protection includes encryption.
其中,初始NAS请求消息和安全保护的相关描述可参考图5所示的实施例,在此不再赘述。For a description of the initial NAS request message and the security protection, refer to the embodiment shown in FIG. 5, and details are not described herein again.
S604、终端向AMF实体发送安全保护的NAS请求消息,以使得AMF实体接收来自终端的安全保护的NAS请求消息。S604. The terminal sends a security-protected NAS request message to the AMF entity, so that the AMF entity receives the NAS request message from the security protection of the terminal.
其中,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示第二安全上下文的类型。The first NAS header includes the identifier of the terminal and the first security header type information, where the first NAS header includes the first NAS header. The first security header type information is used to indicate the second. The type of security context.
可选的,本申请实施例中,第一NAS消息头中的终端的标识和第一安全头类型信息可以是没有进行安全保护的。Optionally, in the embodiment of the present application, the identifier of the terminal and the first security header type information in the first NAS message header may be not secured.
可选的,终端的标识的相关描述可参考图5所示的实施例,在此不再赘述。For a description of the identifier of the terminal, refer to the embodiment shown in FIG. 5, and details are not described herein again.
可选的,第一安全头类型信息可以包括:使用第二安全上下文进行加密与完整性保护(Integrity protected and ciphered),或者,使用第二安全上下文进行加密(Ciphered)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the first security header type information may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第一NAS消息头的安全保护的NAS请求消息的格式如表一所示,在此不再赘述。The format of the NAS request message including the security protection of the first NAS message header is as shown in Table 1, and details are not described herein.
S605、AMF实体根据终端的标识和第一安全头类型信息,确定本地是否保存第二安全上下文。S605. The AMF entity determines whether the second security context is saved locally according to the identifier of the terminal and the first security header type information.
其中,步骤S605中的第二安全上下文是上一次终端从空闲态发起初始NAS请求消息触发的流程中鉴权流程生成的安全上下文。The second security context in step S605 is the security context generated by the authentication process in the process triggered by the last terminal initiating the initial NAS request message from the idle state.
若本地保存第二安全上下文,执行下述步骤S606-610。If the second security context is saved locally, the following steps S606-610 are performed.
若本地未保存第二安全上下文,则无法对安全保护的NAS请求消息进行安全验证,执行结束。If the second security context is not saved locally, the security-protected NAS request message cannot be securely verified, and the execution ends.
S606、若保存,AMF实体使用第二安全上下文,对安全保护的NAS请求消息进行安全验证,该安全验证包括解密。S606. If saved, the AMF entity uses the second security context to perform security verification on the secured NAS request message, where the security verification includes decryption.
可选的,若安全保护包含完整性保护,则安全验证还包括完整性检查,在此进行统一说明,以下不再赘述。Optionally, if the security protection includes integrity protection, the security verification also includes an integrity check, which is uniformly described herein, and is not described here.
由于AMF实体中保存有第二安全上下文,因此AMF实体可以根据安全验证结果,使用第二安全上下文执行后续的操作,具体如下述步骤S607a-S610a、或者步骤S607c-S610c所示。Since the second security context is stored in the AMF entity, the AMF entity can perform subsequent operations using the second security context according to the security verification result, as shown in steps S607a-S610a or steps S607c-S610c below.
S607a、若安全验证通过,AMF实体使用第二安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S607a. If the security verification succeeds, the AMF entity uses the second security context to secure the NAS reject message of the initial NAS request message, and obtains a security-protected NAS reject message.
其中,步骤S607a中的第二安全上下文可以是在上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,也即网络侧决定在本次终端从空闲态发起初始NAS消息触发的流程中不发起鉴权流程;也可以是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,本申请实施例对此不作具体限定。其中,本次终端从空闲态发起初始NAS消息时,AMF实体可以在发起鉴权流程生成新的安全上下文之后拒绝初始NAS请求消息,此时AMF实体可以获取鉴权流程生成的新的安全上下文。The second security context in the step S607a may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, that is, the network side decides to initiate the idle state from the current terminal. The authentication process is not initiated in the process triggered by the initial NAS message. The security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited. When the terminal initiates the initial NAS message from the idle state, the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
其中,若安全保护包括加密,则本申请实施例中的安全验证通过是指,解密成功;若安全保护包括加密和完整性保护,则本申请实施例中的安全验证是指,解密成功且完整性检查通过,在此进行统一说明,以下不再赘述。If the security protection includes the encryption, the security verification in the embodiment of the present application means that the decryption succeeds; if the security protection includes the encryption and the integrity protection, the security verification in the embodiment of the present application means that the decryption is successful and complete. The sexual inspection is passed, and a unified explanation is given here, and the details are not described below.
其中,AMF实体使用第二安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The specific implementation of the security protection of the NAS refusal message of the initial NAS request message by using the second security context by the AMF entity may refer to the implementation of the security protection of the initial NAS request message by the terminal using the first security context in step S503. Narration.
S608a、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S608a. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头 中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第二安全上下文的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
可选的,步骤S608a中的第二安全头类型信息可以包括:使用第二安全上下文进行加密与完整性保护(Integrity protected and ciphered),或者,使用第二安全上下文进行加密(Ciphered)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S608a may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示,在此不再赘述。The format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
S609a、终端根据终端的标识和第二安全头类型信息,确定第二安全上下文。S609. The terminal determines the second security context according to the identifier of the terminal and the second security header type information.
其中,步骤S609a中的第二安全上下文和步骤S607a中的第二安全上下文是同一个鉴权流程生成的安全上下文。也就是说,若步骤S607a中的第二安全上下文是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S609a中的第二安全上下文也是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文;若步骤S607a中的第二安全上下文是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S609a中的第二安全上下文也是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文。The second security context in step S609a and the second security context in step S607a are security contexts generated by the same authentication process. That is, if the second security context in step S607a is the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, the second security context in step S609a is also the last time. The security context generated by the authentication process initiated by the initial NAS message triggered by the terminal from the idle state; if the second security context in step S607a is the authentication initiated by the terminal initiating the initial NAS message triggered by the idle state The security context generated by the process, the second security context in step S609a is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
S610a、终端使用第二安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S610a. The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S607a-S610a中的安全保护的NAS拒绝消息中还可能包含拒绝初始NAS请求消息的原因,若终端安全验证通过,终端还可能根据拒绝初始NAS请求消息的原因执行相应的动作,比如将当前的位置区域加入禁止列表并尝试在其它位置区域选择合适小区驻留,本申请实施例对终端根据拒绝初始NAS请求消息的原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the NAS message of the security protection in the steps S607a-S610a may also include the reason for rejecting the initial NAS request message. If the terminal security verification is passed, the terminal may perform the corresponding action according to the reason for rejecting the initial NAS request message. For example, the current location area is added to the forbidden list and an attempt is made to select a suitable cell to stay in the other location area. The action performed by the terminal according to the reason for rejecting the initial NAS request message is not specifically limited. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
可选的,若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护的NAS拒绝消息。Optionally, if the terminal receives the NAS rejection message that is not secured, the terminal discards the NAS rejection message that is not secured.
S607c、若安全验证未通过,AMF实体使用第二安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息。S607c. If the security verification fails, the AMF entity uses the second security context to secure the NAS rejection message, and obtains the security-protected NAS rejection message.
其中,步骤S607c中的第二安全上下文可以是在上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,也即网络侧决定在本次终端从空闲态发起初始NAS消息触发的流程中不发起鉴权流程;也可以是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,本申请实施例对此不作具体限定。其中,本次终端从空闲态发起初始NAS消息时,AMF实体可以在发起鉴权流程生成新的安全上下文之后拒绝初始NAS请求消息,此时AMF实体可以获取鉴权流程生成的新的安全上下文。The second security context in the step S607c may be the security context generated by the authentication process initiated by the last time the terminal initiates the initial NAS message triggered by the idle state, that is, the network side decides to initiate the idle state from the current terminal. The authentication process is not initiated in the process triggered by the initial NAS message. The security context generated by the authentication process initiated by the terminal in the process of initiating the initial NAS message from the idle state is not specifically limited. When the terminal initiates the initial NAS message from the idle state, the AMF entity may reject the initial NAS request message after the initiation of the authentication process to generate a new security context, and the AMF entity may obtain the new security context generated by the authentication process.
其中,该NAS拒绝消息是因为安全验证未通过而发送的。AMF实体使用第二安全上下文对NAS拒绝消息进行安全保护的具体实现可参考步骤S503中终端使用第一安全上下文对初始NAS请求消息进行安全保护的实现,在此不再赘述。The NAS rejection message is sent because the security verification failed. For a specific implementation of the security protection of the NAS refusal message by using the second security context, the AMF entity may implement the security protection of the initial NAS request message by using the first security context in the step S503, and details are not described herein.
可选的,AMF在安全验证未通过时,可以直接忽略该接收的安全保护的NAS请求消息,这样,步骤S607c-S610c将不会被执行,本申请实施例对此不作具体限定。Optionally, the AMF can directly ignore the received NAS request message of the security protection when the security verification fails. Therefore, the steps S607c-S610c will not be performed, which is not specifically limited in this embodiment of the present application.
S608c、AMF实体向终端发送安全保护的NAS拒绝消息,以使得终端接收来自AMF实体的安全保护的NAS拒绝消息。S608c. The AMF entity sends a security-protected NAS reject message to the terminal, so that the terminal receives the NAS denial message from the security protection of the AMF entity.
其中,安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第二安全上下文的类型。The message header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the second security context. type.
可选的,步骤S608c中的第二安全头类型信息可以包括:使用第二安全上下文进行加密与完整性保护(Integrity protected and ciphered),或者,使用第二安全上下文进行加密(Ciphered)。其中,终端与AMF约定若没有指明使用第一安全上下文,则默认使用的是第二安全上下文。Optionally, the second security header type information in step S608c may include: using a second security context for integrity protected and ciphered, or using a second security context for ciphering. Wherein, if the terminal and the AMF agreement do not specify to use the first security context, the second security context is used by default.
其中,包含第二NAS消息头的安全保护的NAS拒绝消息的格式如表二所示,在此不再赘述。The format of the NAS reject message including the security protection of the second NAS header is shown in Table 2, and details are not described herein.
S609c、终端根据终端的标识和第二安全头类型信息,确定第二安全上下文。S609c: The terminal determines the second security context according to the identifier of the terminal and the second security header type information.
其中,步骤S609c中的第二安全上下文和步骤S607c中的第二安全上下文是同一个鉴权流程生成的安全上下文。也就是说,若步骤S607c中的第二安全上下文是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S609c中的第二安全上下文也是上一次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文;若步骤S607c中的第二安全上下文是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文,则步骤S609c中的第二安全上下文也是本次终端从空闲态发起初始NAS消息触发的流程中发起的鉴权流程生成的安全上下文。The second security context in step S609c and the second security context in step S607c are security contexts generated by the same authentication process. That is, if the second security context in step S607c is the security context generated by the authentication process initiated in the process triggered by the initial NAS initiated by the idle state, the second security context in step S609c is also the last time. The security context generated by the authentication process initiated by the initial NAS message triggered by the terminal from the idle state; if the second security context in step S607c is the authentication initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state The security context generated by the process, the second security context in step S609c is also the security context generated by the authentication process initiated by the terminal in the process triggered by the initial NAS message initiated by the idle state.
S610c、终端使用第二安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。S610c: The terminal uses the second security context to perform security verification on the secured NAS rejection message, where the security verification includes decryption.
可选的,步骤S607c-S610c中的安全保护的NAS拒绝消息还可以为移动管理状态(Mobility Management Status)消息,本申请实施例对此不作具体限定。Optionally, the NAS message of the security protection in the steps S607c-S610c may also be a Mobility Management Status message, which is not specifically limited in this embodiment of the present application.
可选的,步骤S607c-S610c中的安全保护的NAS拒绝消息中还可能包含拒绝原因,若终端安全验证通过,终端还可能根据拒绝原因执行相应的动作,比如直接丢弃该NAS拒绝消息或者重新从步骤S601开始执行,本申请实施例对终端根据拒绝原因执行的动作不作具体限定。若终端安全验证未通过,终端可以直接丢弃该安全保护的NAS拒绝消息。Optionally, the security denied NAS rejection message in steps S607c-S610c may further include a reason for rejection. If the terminal security verification is passed, the terminal may perform a corresponding action according to the rejection reason, for example, directly discarding the NAS rejection message or re-receiving the message. Step S601 is started. The embodiment of the present application does not specifically limit the action performed by the terminal according to the reason for rejection. If the terminal security verification fails, the terminal can directly discard the NAS denial message of the security protection.
若终端接收到未进行安全保护的NAS拒绝消息,终端丢弃未进行安全保护的NAS拒绝消息。If the terminal receives the NAS rejection message without security protection, the terminal discards the NAS rejection message that is not secured.
基于本申请实施例提供的网络安全保护方法,一方面,由于终端向AMF实体发送的是对初始NAS请求消息进行安全保护的NAS请求消息,因此无法被伪网络验证通过,进而伪网络不会构造对应的NAS拒绝消息,从而可以避免一部分DOS攻击。另一方面,AMF实体向终端发送的初始NAS请求消息的NAS拒绝消息是安全保护的NAS拒绝消息,因此终端在接收到NAS拒绝消息之后,可以根据是否进行安全保护区分该NAS拒绝消息是由真实网络发送的,还是由伪网络发送的,进而可以进行相应处理,比如丢弃伪网络发送 的未进行安全保护的NAS拒绝消息,从而可以进一步彻底的防止DOS攻击风险,提升5G网络以及未来其他网络的安全性。The network security protection method provided by the embodiment of the present application, on the one hand, because the terminal sends a NAS request message to the AMF entity for security protection of the initial NAS request message, it cannot be verified by the pseudo network, and thus the pseudo network is not constructed. The corresponding NAS rejects the message, so that some DOS attacks can be avoided. On the other hand, the NAS reject message of the initial NAS request message sent by the AMF entity to the terminal is a security-protected NAS reject message. Therefore, after receiving the NAS reject message, the terminal can distinguish whether the NAS reject message is true or not according to whether security protection is performed. The network sends it, or it is sent by the pseudo network, and can then perform corresponding processing, such as discarding the unprotected NAS rejection message sent by the pseudo network, thereby further preventing the DOS attack risk and improving the 5G network and other future networks. safety.
其中,上述S601、S602、S603、S604、S609a、S610a、S609c和S610c中终端的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The operations of the terminals in the foregoing S601, S602, S603, S604, S609a, S610a, S609c, and S610c may be performed by the processor 301 in the communication device 300 shown in FIG. 3 calling the application code stored in the memory 303. The application embodiment does not impose any limitation on this.
其中,上述S605、S606、S607a、S608a、SS607c和S608c中AMF的动作可以由图3所示的通信设备300中的处理器301调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。The actions of the AMF in the foregoing S605, S606, S607a, S608a, SS607c, and S608c may be performed by the processor 301 in the communication device 300 shown in FIG. 3, by calling the application code stored in the memory 303. This is not subject to any restrictions.
图6所示的实施例以第一网络设备为AMF实体为例进行说明,当然,第一网络设备还可以是网络侧的其他设备,比如第一网络设备可以为SMF实体。当第一网络设备为网络侧的其他设备时,通过其他设备进行网络安全保护的方案可参考图6所示的实施例,仅需将图6所示的实施例中的AMF实体替换为其它设备即可,在此不再赘述。The embodiment shown in FIG. 6 is an example in which the first network device is an AMF entity. The first network device may be another device on the network side. For example, the first network device may be an SMF entity. When the first network device is another device on the network side, the solution for performing network security protection by using other devices may refer to the embodiment shown in FIG. 6, and only need to replace the AMF entity in the embodiment shown in FIG. 6 with another device. That's it, so I won't go into details here.
上述主要从第一网络设备和终端交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,上述第一网络设备和终端为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The solution provided by the embodiment of the present application is introduced from the perspective of interaction between the first network device and the terminal. It can be understood that, in order to implement the above functions, the foregoing first network device and terminal include corresponding hardware structures and/or software modules for performing respective functions. Those skilled in the art will readily appreciate that the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
本申请实施例可以根据上述方法示例对第一网络设备和终端进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。The embodiment of the present application may divide the function modules of the first network device and the terminal according to the foregoing method example. For example, each function module may be divided according to each function, or two or more functions may be integrated into one processing module. . The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
比如,在采用对应各个功能划分各个功能模块的情况下,图7示出了上述实施例中所涉及的第一网络设备的一种可能的结构示意图,该第一网络设备700包括:接收模块701、确定模块702、验证模块703、安全保护模块704和发送模块705。For example, in the case of dividing the functional modules by using the respective functions, FIG. 7 is a schematic structural diagram of the first network device involved in the foregoing embodiment. The first network device 700 includes: a receiving module 701. The determining module 702, the verifying module 703, the security protection module 704, and the sending module 705.
接收模块701,用于接收来自终端的安全保护的NAS请求消息,该安全保护的NAS请求消息是使用该终端的第一目标安全上下文对初始NAS请求消息进行安全保护后得到的,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括该终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示第一目标安全上下文的类型,第一目标安全上下文包括第一安全上下文或第二安全上下文,第一安全上下文为配置的安全上下文,第二安全上下文为鉴权流程生成的安全上下文;安全保护包括加密。The receiving module 701 is configured to receive a NAS request message from the security protection of the terminal, where the secured NAS request message is obtained by using the first target security context of the terminal to secure the initial NAS request message, and the security protection is obtained. The message header of the NAS request message is a first NAS message header, where the first NAS message header includes an identifier of the terminal and first security header type information, where the first security header type information is used to indicate a type of the first target security context. The first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is a security context generated by the authentication process; the security protection includes encryption.
确定模块702,用于根据该终端的标识和第一安全头类型信息,确定第一目标安全上下文。The determining module 702 is configured to determine a first target security context according to the identifier of the terminal and the first security header type information.
验证模块703,用于使用第一目标安全上下文,对安全保护的NAS请求消息进行安全验证,其中,安全验证包括解密。The verification module 703 is configured to perform security verification on the secured NAS request message by using the first target security context, where the security verification includes decryption.
安全保护模块704,用于根据安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,第二目标安全上下文包括第一安全上下文或第二安全上下文。The security protection module 704 is configured to perform security protection on the NAS rejection message by using the second target security context according to the result of the security verification, to obtain a security-protected NAS rejection message, where the second target security context includes the first security context or the second security context. .
发送模块705,用于向该终端发送安全保护的NAS拒绝消息,其中,该安全保护的NAS拒绝消息的消息头为第二NAS消息头,该第二NAS消息头中包括终端的标识和第二安全头类型信息,该第二安全头类型信息用于指示第二目标安全上下文的类型。The sending module 705 is configured to send a security-protected NAS reject message to the terminal, where the header of the secured NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second Security header type information, the second security header type information is used to indicate the type of the second target security context.
进一步的,如图7所示,第一网络设备还包括存储模块706。安全保护模块704具体用于:Further, as shown in FIG. 7, the first network device further includes a storage module 706. The security protection module 704 is specifically configured to:
若安全验证通过,且存储模块706中未存储第二安全上下文,使用第一安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护。If the security verification is passed and the second security context is not stored in the storage module 706, the NAS denial message of the initial NAS request message is secured using the first security context.
或者,若安全验证通过,且存储模块706中存储有第二安全上下文,使用第二安全上下文对初始NAS请求消息的NAS拒绝消息进行安全保护。Alternatively, if the security verification is passed and the second security context is stored in the storage module 706, the NAS denial message of the initial NAS request message is secured using the second security context.
或者,若安全验证未通过,且存储模块706中未存储第二安全上下文,使用第一安全上下文对NAS拒绝消息进行安全保护。Alternatively, if the security verification fails, and the second security context is not stored in the storage module 706, the NAS security message is secured using the first security context.
或者,若安全验证未通过,且存储模块706中存储有第二安全上下文,使用第二安全上下文对NAS拒绝消息进行安全保护。Alternatively, if the security verification fails, and the second security context is stored in the storage module 706, the second security context is used to secure the NAS rejection message.
可选的,第一目标安全上下文包括第一安全上下文。确定模块702具体用于:Optionally, the first target security context includes a first security context. The determining module 702 is specifically configured to:
根据该终端的标识和第一安全头类型信息,确定本地是否保存第一安全上下文。Determining whether the first security context is saved locally according to the identifier of the terminal and the first security header type information.
若确定模块702确定本地未保存第一安全上下文,向第二网络设备发送第一消息,该第一消息包括该终端的标识,用于请求获取第一安全上下文;接收来自第二网络设备的第一安全上下文。If the determining module 702 determines that the first security context is not saved locally, the first message is sent to the second network device, where the first message includes an identifier of the terminal, for requesting to acquire the first security context, and receiving the second network device. A security context.
或者,若确定模块702确定本地保存有第一安全上下文,从本地获取第一安全上下文。Alternatively, if the determining module 702 determines that the first security context is stored locally, the first security context is obtained locally.
可选的,该第一消息还包括当前为该终端服务的PLMN的标识、当前为该终端服务的网络切片的标识或该终端当前采用的接入技术的信息。Optionally, the first message further includes an identifier of the PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or information about an access technology currently used by the terminal.
可选的,安全保护还包括完整性保护;安全验证还包括完整性检查。Optionally, the security protection also includes integrity protection; the security verification also includes an integrity check.
可选的,第一网络设备包括AMF实体或SMF实体,第二网络设备包括UDM实体或AUSF实体。Optionally, the first network device comprises an AMF entity or an SMF entity, and the second network device comprises a UDM entity or an AUSF entity.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。All the related content of the steps involved in the foregoing method embodiments may be referred to the functional descriptions of the corresponding functional modules, and details are not described herein again.
以采用集成的方式划分各个功能模块的情况下,图8示出了上述实施例中所涉及的第一网络设备的一种可能的结构示意图,该第一网络设备800包括:处理模块801和通信模块802。可选的,该第一网络设备800还可以包括存储模块803。其中,该处理模块801可用于执行图7中确定模块702、验证模块703和安全保护模块704所能执行的操作,该通信模块802可用于执行图7中接收模块701和发送模块702所能执行的操作,该存储模块803可用于执行图7中存储模块706所能执行的操作,具体可参考图7所示的实施例,本申请实施例在此不再赘述。FIG. 8 is a schematic diagram showing a possible structure of the first network device involved in the foregoing embodiment, where the first network device 800 includes: a processing module 801 and a communication. Module 802. Optionally, the first network device 800 may further include a storage module 803. The processing module 801 can be used to perform operations performed by the determining module 702, the verifying module 703, and the security module 704 of FIG. 7, and the communications module 802 can be used to perform the receiving module 701 and the sending module 702 of FIG. For example, the storage module 803 can be used to perform the operations that can be performed by the storage module 706 in FIG. 7. For details, refer to the embodiment shown in FIG.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。All the related content of the steps involved in the foregoing method embodiments may be referred to the functional descriptions of the corresponding functional modules, and details are not described herein again.
在本实施例中,该第一网络设备以对应各个功能划分各个功能模块的形式来呈现,或者,该第一网络设备以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定应用集成电路(Application-Specific Integrated Circuit,ASIC),电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到第一网络设备700或者第一网络设备800可以采用图3所示的形式。比如,图7中的接收模块701、确定模块702、验证模块703、安全保护模块704和发送模块705可以通过图3的处理器301和存储器303来实现。具体的,接收模块701、确定模块702、验证模块703、安全保护模块704和发送模块705可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。或者,比如,图7中的接收模块701、确定模块702、验证模块703、安全保护模块704、发送模块705和存储模块706可以通过图3的处理器301和存储器303来实现。具体的,接收模块701、确定模块702、验证模块703、安全保护模块704、发送模块705和存储模块706可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。或者,比如,图8中的处理模块801和通信模块802可以通过图3的处理器301和存储器303来实现,具体的,处理模块801和通信模块802可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。或者,比如,图8中的处理模块801、通信模块802和存储模块803可以通过图3的处理器301和存储器303来实现,具体的,处理模块801、通信模块802和存储模块803可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。In this embodiment, the first network device is presented in a form that divides each functional module corresponding to each function, or the first network device is presented in a form that divides each functional module in an integrated manner. A "module" herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device. In a simple embodiment, those skilled in the art will appreciate that the first network device 700 or the first network device 800 can take the form shown in FIG. For example, the receiving module 701, the determining module 702, the verifying module 703, the security protecting module 704, and the sending module 705 in FIG. 7 can be implemented by the processor 301 and the memory 303 of FIG. Specifically, the receiving module 701, the determining module 702, the verifying module 703, the security protecting module 704, and the sending module 705 can be executed by calling the application code stored in the memory 303 by the processor 301, and the embodiment of the present application does not do any limit. Alternatively, for example, the receiving module 701, the determining module 702, the verifying module 703, the security protection module 704, the sending module 705, and the storage module 706 in FIG. 7 may be implemented by the processor 301 and the memory 303 of FIG. Specifically, the receiving module 701, the determining module 702, the verifying module 703, the security protecting module 704, the sending module 705, and the storing module 706 can be executed by using the application code stored in the memory 303 by the processor 301. There are no restrictions on this. Alternatively, for example, the processing module 801 and the communication module 802 in FIG. 8 may be implemented by the processor 301 and the memory 303 of FIG. 3. Specifically, the processing module 801 and the communication module 802 may be called by the processor 301 in the memory 303. The stored application code is executed, and the embodiment of the present application does not impose any limitation on this. Alternatively, for example, the processing module 801, the communication module 802, and the storage module 803 in FIG. 8 may be implemented by the processor 301 and the memory 303 of FIG. 3. Specifically, the processing module 801, the communication module 802, and the storage module 803 may pass The processor 301 is configured to execute the application code stored in the memory 303, and the embodiment of the present application does not impose any limitation thereon.
由于本申请实施例提供的第一网络设备可用于执行上述网络安全保护方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。The first network device provided by the embodiment of the present application can be used to perform the foregoing network security protection method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
比如,在采用对应各个功能划分各个功能模块的情况下,图9示出了上述实施例中所涉及的终端的一种可能的结构示意图,该终端900包括:确定模块901、安全保护模块902、发送模块903、接收模块904和验证模块905。For example, in the case of dividing each functional module by using corresponding functions, FIG. 9 is a schematic structural diagram of a terminal involved in the foregoing embodiment, and the terminal 900 includes: a determining module 901, a security protection module 902, The sending module 903, the receiving module 904 and the verification module 905.
确定模块901,用于确定该终端的第一目标安全上下文,该第一目标安全上下文包括第一安全上下文或第二安全上下文,第一安全上下文为配置的安全上下文,第二安全上下文为鉴权流程生成的安全上下文。The determining module 901 is configured to determine a first target security context of the terminal, where the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is an authentication The security context generated by the process.
所述安全保护模块902,用于使用第一目标安全上下文对初始NAS请求消息进行安全保护,得到安全保护的NAS请求消息,该安全保护包括加密。The security protection module 902 is configured to secure the initial NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption.
发送模块903,用于向第一网络设备发送安全保护的NAS请求消息,该安全保护的NAS请求消息的消息头为第一NAS消息头,该第一NAS消息头中包括该终端的标识和第一安全头类型信息,该第一安全头类型信息用于指示第一目标安全上下文的类型。The sending module 903 is configured to send a security-protected NAS request message to the first network device, where the message header of the secured NAS request message is a first NAS message header, where the first NAS message header includes the identifier of the terminal and the first A security header type information, the first security header type information being used to indicate a type of the first target security context.
接收模块904,用于接收来自第一网络设备的安全保护的NAS拒绝消息,该安全保护的NAS拒绝消息是使用该终端的第二目标安全上下文对NAS拒绝消息进行安全保护后得到的;其中,该安全保护的NAS拒绝消息的消息头为第二NAS消息头,第二NAS消息头中包括该终端的标识和第二安全头类型信息,第二安全头类型信息用于指示第二目标安全上下文的类型,第二目标安全上下文包括第一安全上下文或者第二安全上下文。The receiving module 904 is configured to receive a NAS refusal message from the first network device, where the NAS refusal message is obtained by using the second target security context of the terminal to secure the NAS refusal message; The header of the security-protected NAS reject message is a second NAS message header, the second NAS message header includes the identifier of the terminal and the second security header type information, and the second security header type information is used to indicate the second target security context. The type, the second target security context includes a first security context or a second security context.
确定模块901,还用于根据该终端的标识和第二安全头类型信息,确定第二目标安全上下文。The determining module 901 is further configured to determine the second target security context according to the identifier of the terminal and the second security header type information.
验证模块905,用于使用第二目标安全上下文,对安全保护的NAS拒绝消息进行安全验证,该安全验证包括解密。The verification module 905 is configured to perform security verification on the secured NAS rejection message by using the second target security context, where the security verification includes decryption.
可选的,如图9所示,该终端900还包括丢弃模块906。Optionally, as shown in FIG. 9, the terminal 900 further includes a discarding module 906.
接收模块904,还用于在发送模块903向第一网络设备发送安全保护的NAS请求消息之后,接收未进行安全保护的NAS拒绝消息。The receiving module 904 is further configured to: after the sending module 903 sends the secured NAS request message to the first network device, receive the NAS denial message that is not secured.
丢弃模块906,还用于丢弃未进行安全保护的NAS拒绝消息。The discarding module 906 is also used to discard the NAS denial message that is not secured.
可选的,确定模块901确定终端的第一目标安全上下文,包括:若确定模块901确定本地保存有第二安全上下文,将第二安全上下文确定为该终端的第一目标安全上下文。或者,若确定模块901确定本地未保存第二安全上下文,确定第一安全上下文,将第一安全上下文确定为该终端的第一目标安全上下文。Optionally, the determining module 901 determines the first target security context of the terminal, including: if the determining module 901 determines that the second security context is locally saved, determining the second security context as the first target security context of the terminal. Alternatively, if the determining module 901 determines that the second security context is not saved locally, determining the first security context, determining the first security context as the first target security context of the terminal.
可选的,第一目标安全上下文包括第一安全上下。Optionally, the first target security context includes a first security context.
确定模块901确定第一安全上下文,包括:读取该终端的USIM卡上配置的第一安全上下文;或者,获取该终端上配置的第一安全上下文。The determining module 901 determines the first security context, including: reading the first security context configured on the USIM card of the terminal; or acquiring the first security context configured on the terminal.
可选的,第一目标安全上下文包括第一安全上下文。Optionally, the first target security context includes a first security context.
确定模块901确定第一安全上下文,包括:根据当前为该终端服务的PLMN、当前为该终端服务的网络切片或该终端当前采用的接入技术,从该终端的多个安全上下文中选择第一安全上下文,其中,多个安全上下文中包括第一安全上下文,多个安全上下文的类型与第一安全上下文的类型相同。The determining module 901 determines the first security context, including: selecting the first one of the multiple security contexts of the terminal according to the PLMN currently serving the terminal, the network slice currently serving the terminal, or the access technology currently used by the terminal. A security context, wherein the first security context is included in the plurality of security contexts, and the types of the plurality of security contexts are the same as the type of the first security context.
可选的,安全保护还包括完整性保护;安全验证还包括完整性检查。Optionally, the security protection also includes integrity protection; the security verification also includes an integrity check.
可选的,第一网络设备包括AMF实体或SMF实体,其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。Optionally, the first network device includes an AMF entity or an SMF entity, and all related content of each step involved in the foregoing method embodiments may be referred to a functional description of the corresponding function module, and details are not described herein again.
以采用集成的方式划分各个功能模块的情况下,图10示出了上述实施例中所涉及的终端的一种可能的结构示意图,该终端1000包括:处理模块1001和通信模块1002。其中,该处理模块1001可用于执行图9中确定模块901、安全保护模块902、验证模块905和丢弃模块906所能执行的操作,该通信模块1002可用于执行图9中接收模块904和发送模块903所能执行的操作,具体可参考图9所示的实施例,本申请实施例在此不再赘述。In the case of dividing the functional modules in an integrated manner, FIG. 10 shows a possible structural diagram of the terminal involved in the foregoing embodiment. The terminal 1000 includes a processing module 1001 and a communication module 1002. The processing module 1001 can be used to perform the operations that can be performed by the determining module 901, the security protection module 902, the verification module 905, and the discarding module 906 in FIG. 9, and the communication module 1002 can be used to execute the receiving module 904 and the sending module in FIG. For the operations that can be performed by the 903, refer to the embodiment shown in FIG. 9 , and the embodiments of the present application are not described herein again.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。All the related content of the steps involved in the foregoing method embodiments may be referred to the functional descriptions of the corresponding functional modules, and details are not described herein again.
在本实施例中,该终端以对应各个功能划分各个功能模块的形式来呈现,或者,该终端以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定应用集成电路(Application-Specific Integrated Circuit,ASIC),电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到终端900或者终端1000可以采用图3所示的形式。比如,图9中的确定模块901、安全保护模块902、发送模块903、接收模块904和验证模块905可以通过图3的处理器301和存储器303来实现。具体的,确定模块901、安全保护模块902、发送模块903、接收模块904和验证模块905可以通过由处理器301来 调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。或者,比如,图9中的确定模块901、安全保护模块902、发送模块903、接收模块904、验证模块905和丢弃模块906可以通过图3的处理器301和存储器303来实现。具体的,确定模块901、安全保护模块902、发送模块903、接收模块904、验证模块905和丢弃模块906可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。或者,比如,图10中的处理模块1001和通信模块1002可以通过图3的处理器301和存储器303来实现,具体的,处理模块1001和通信模块1002可以通过由处理器301来调用存储器303中存储的应用程序代码来执行,本申请实施例对此不作任何限制。In this embodiment, the terminal is presented in the form of dividing each functional module corresponding to each function, or the terminal is presented in the form of dividing each functional module in an integrated manner. A "module" herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device. In a simple embodiment, those skilled in the art will appreciate that terminal 900 or terminal 1000 can take the form shown in FIG. For example, the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, and the verifying module 905 in FIG. 9 can be implemented by the processor 301 and the memory 303 of FIG. Specifically, the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, and the verifying module 905 can be executed by calling the application code stored in the memory 303 by the processor 301, and the embodiment of the present application does not do any limit. Alternatively, for example, the determining module 901, the security protection module 902, the transmitting module 903, the receiving module 904, the verifying module 905, and the discarding module 906 in FIG. 9 may be implemented by the processor 301 and the memory 303 of FIG. Specifically, the determining module 901, the security protection module 902, the sending module 903, the receiving module 904, the verifying module 905, and the discarding module 906 can be executed by calling the application code stored in the memory 303 by the processor 301. There are no restrictions on this. Alternatively, for example, the processing module 1001 and the communication module 1002 in FIG. 10 may be implemented by the processor 301 and the memory 303 of FIG. 3. Specifically, the processing module 1001 and the communication module 1002 may be called by the processor 301 in the memory 303. The stored application code is executed, and the embodiment of the present application does not impose any limitation on this.
由于本申请实施例提供的终端可用于执行上述网络安全保护方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。The terminal provided by the embodiment of the present application can be used to perform the foregoing network security protection method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server or data center via wired (eg coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device that includes one or more servers, data centers, etc. that can be integrated with the media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)) or the like.
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the present application has been described herein in connection with the various embodiments, those skilled in the art can Other variations of the disclosed embodiments are achieved. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill several of the functions recited in the claims. Certain measures are recited in mutually different dependent claims, but this does not mean that the measures are not combined to produce a good effect.
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。While the present invention has been described in connection with the specific embodiments and embodiments thereof, various modifications and combinations can be made without departing from the spirit and scope of the application. Accordingly, the description and drawings are to be regarded as It will be apparent to those skilled in the art that various modifications and changes can be made in the present application without departing from the scope of the application. Thus, it is intended that the present invention cover the modifications and variations of the present invention.

Claims (28)

  1. 一种网络安全保护方法,其特征在于,所述方法包括:A network security protection method, the method comprising:
    终端确定所述终端的第一目标安全上下文,所述第一目标安全上下文包括第一安全上下文或第二安全上下文,所述第一安全上下文为配置的安全上下文,所述第二安全上下文为鉴权流程生成的安全上下文;The terminal determines a first target security context of the terminal, the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is a reference The security context generated by the rights process;
    所述终端使用所述第一目标安全上下文对初始非接入层NAS请求消息进行安全保护,得到安全保护的NAS请求消息,所述安全保护包括加密;The terminal performs security protection on the initial non-access stratum NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption;
    所述终端向第一网络设备发送所述安全保护的NAS请求消息,所述安全保护的NAS请求消息的消息头为第一NAS消息头,所述第一NAS消息头中包括所述终端的标识和第一安全头类型信息,所述第一安全头类型信息用于指示所述第一目标安全上下文的类型;The terminal sends the security-protected NAS request message to the first network device, where the message header of the security-protected NAS request message is a first NAS message header, and the first NAS message header includes the identifier of the terminal. And first security header type information, where the first security header type information is used to indicate a type of the first target security context;
    所述终端接收来自所述第一网络设备的安全保护的NAS拒绝消息,所述安全保护的NAS拒绝消息是使用所述终端的第二目标安全上下文对NAS拒绝消息进行安全保护后得到的;其中,所述安全保护的NAS拒绝消息的消息头为第二NAS消息头,所述第二NAS消息头中包括所述终端的标识和第二安全头类型信息,所述第二安全头类型信息用于指示所述第二目标安全上下文的类型,所述第二目标安全上下文包括所述第一安全上下文或者所述第二安全上下文;Receiving, by the terminal, a NAS denial message from the security protection of the first network device, where the security-protected NAS reject message is obtained by using a second target security context of the terminal to secure a NAS reject message; The header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes the identifier of the terminal and the second security header type information, where the second security header type information is used. And indicating the type of the second target security context, where the second target security context includes the first security context or the second security context;
    所述终端根据所述终端的标识和所述第二安全头类型信息,确定所述第二目标安全上下文;Determining, by the terminal, the second target security context according to the identifier of the terminal and the second security header type information;
    所述终端使用所述第二目标安全上下文,对所述安全保护的NAS拒绝消息进行安全验证,所述安全验证包括解密。The terminal uses the second target security context to perform security verification on the secured NAS rejection message, the security verification including decryption.
  2. 根据权利要求1所述的方法,其特征在于,在所述终端向第一网络设备发送所述安全保护的NAS请求消息之后,还包括:The method according to claim 1, wherein after the terminal sends the secured NAS request message to the first network device, the method further includes:
    所述终端接收未进行所述安全保护的NAS拒绝消息;Receiving, by the terminal, a NAS reject message that does not perform the security protection;
    所述终端丢弃所述未进行所述安全保护的NAS拒绝消息。The terminal discards the NAS reject message that is not subjected to the security protection.
  3. 根据权利要求1或2所述的方法,其特征在于,所述终端确定所述终端的第一目标安全上下文,包括:The method according to claim 1 or 2, wherein the determining, by the terminal, the first target security context of the terminal comprises:
    若所述终端确定本地保存有所述第二安全上下文,所述终端将所述第二安全上下文确定为所述终端的第一目标安全上下文;If the terminal determines that the second security context is locally saved, the terminal determines the second security context as the first target security context of the terminal;
    或者,若所述终端确定本地未保存所述第二安全上下文,所述终端确定所述第一安全上下文,将所述第一安全上下文确定为所述终端的第一目标安全上下文。Or, if the terminal determines that the second security context is not saved locally, the terminal determines the first security context, and determines the first security context as a first target security context of the terminal.
  4. 根据权利要求3所述的方法,其特征在于,所述第一目标安全上下文包括所述第一安全上下文;The method of claim 3, wherein the first target security context comprises the first security context;
    所述终端确定所述第一安全上下文,包括:Determining, by the terminal, the first security context, including:
    所述终端读取所述终端的全球用户识别模块USIM卡上配置的所述第一安全上下文;或者,所述终端获取所述终端上配置的所述第一安全上下文。The terminal reads the first security context configured on the global subscriber identity module USIM card of the terminal; or the terminal acquires the first security context configured on the terminal.
  5. 根据权利要求3所述的方法,其特征在于,所述第一目标安全上下文包括所述第一安全上下文;The method of claim 3, wherein the first target security context comprises the first security context;
    所述终端确定所述第一安全上下文,包括:Determining, by the terminal, the first security context, including:
    所述终端根据当前为所述终端服务的公共陆地移动网络PLMN、当前为所述终端服务的网络切片或所述终端当前采用的接入技术,从所述终端的多个安全上下文中选择所述第一安全上下文,其中,所述多个安全上下文中包括所述第一安全上下文,所述多个安全上下文的类型与所述第一安全上下文的类型相同。The terminal selects the multiple security contexts of the terminal according to a public land mobile network PLMN currently serving the terminal, a network slice currently serving the terminal, or an access technology currently used by the terminal. a first security context, wherein the first security context is included in the plurality of security contexts, the types of the plurality of security contexts being the same as the type of the first security context.
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述安全保护还包括完整性保护;所述安全验证还包括完整性检查。The method of any of claims 1-5, wherein the security protection further comprises integrity protection; the security verification further comprising an integrity check.
  7. 一种网络安全保护方法,其特征在于,所述方法包括:A network security protection method, the method comprising:
    第一网络设备接收来自终端的安全保护的非接入层NAS请求消息,所述安全保护的NAS请求消息是使用所述终端的第一目标安全上下文对初始NAS请求消息进行安全保护后得到的,其中,所述安全保护的NAS请求消息的消息头为第一NAS消息头,所述第一NAS消息头中包括所述终端的标识和第一安全头类型信息,所述第一安全头类型信息用于指示所述第一目标安全上下文的类型,所述第一目标安全上下文包括第一安全上下文或第二安全上下文,所述第一安全上下文为配置的安全上下文,所述第二安全上下文为鉴权流程生成的安全上下文;所述安全保护包括加密;The first network device receives a non-access stratum NAS request message from the security protection of the terminal, where the secured NAS request message is obtained by using the first target security context of the terminal to secure the initial NAS request message. The header of the security-protected NAS request message is a first NAS message header, and the first NAS message header includes an identifier of the terminal and first security header type information, and the first security header type information. And indicating a type of the first target security context, where the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second security context is a security context generated by the authentication process; the security protection includes encryption;
    所述第一网络设备根据所述终端的标识和所述第一安全头类型信息,确定所述第一目标安全上下文;Determining, by the first network device, the first target security context according to the identifier of the terminal and the first security header type information;
    所述第一网络设备使用所述第一目标安全上下文,对所述安全保护的NAS请求消息进行安全验证,其中,所述安全验证包括解密;The first network device uses the first target security context to perform security verification on the secured NAS request message, where the security verification includes decryption;
    所述第一网络设备根据所述安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,所述第二目标安全上下文包括所述第一安全上下文或所述第二安全上下文;And the first network device performs security protection on the NAS reject message by using the second target security context according to the result of the security verification, to obtain a security-protected NAS reject message, where the second target security context includes the first security context Or the second security context;
    所述第一网络设备向所述终端发送所述安全保护的NAS拒绝消息,其中,所述安全保护的NAS拒绝消息的消息头为第二NAS消息头,所述第二NAS消息头中包括所述终端的标识和第二安全头类型信息,所述第二安全头类型信息用于指示所述第二目标安全上下文的类型。The first network device sends the security-protected NAS reject message to the terminal, where the header of the security-protected NAS reject message is a second NAS message header, and the second NAS message header includes The identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the type of the second target security context.
  8. 根据权利要求7所述的方法,其特征在于,所述第一网络设备根据所述安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,包括:The method according to claim 7, wherein the first network device performs security protection on the NAS reject message by using the second target security context according to the result of the security verification, including:
    若所述安全验证通过,且所述第一网络设备中未存储所述第二安全上下文,所述第一网络设备使用所述第一安全上下文对所述初始NAS请求消息的NAS拒绝消息进行安全保护;If the security verification passes, and the second security context is not stored in the first network device, the first network device uses the first security context to secure the NAS reject message of the initial NAS request message. protection;
    或者,若所述安全验证通过,且所述第一网络设备中存储有所述第二安全上下文,所述第一网络设备使用所述第二安全上下文对所述初始NAS请求消息的NAS拒绝消息进行安全保护;Or, if the security verification is passed, and the second security context is stored in the first network device, the first network device uses the second security context to perform a NAS reject message of the initial NAS request message. Carry out security protection;
    或者,若所述安全验证未通过,且所述第一网络设备中未存储所述第二安全上下文,所述第一网络设备使用所述第一安全上下文对NAS拒绝消息进行安全保护;Or, if the security verification fails, and the second security context is not stored in the first network device, the first network device uses the first security context to perform security protection on the NAS reject message;
    或者,若所述安全验证未通过,且所述第一网络设备中存储有所述第二安全上下文,所述第一网络设备使用所述第二安全上下文对NAS拒绝消息进行安全保护。Alternatively, if the security verification fails, and the second security context is stored in the first network device, the first network device uses the second security context to perform security protection on the NAS reject message.
  9. 根据权利要求7或8所述的方法,其特征在于,所述第一目标安全上下文包括所 述第一安全上下文;The method of claim 7 or 8, wherein the first target security context comprises the first security context;
    所述第一网络设备根据所述终端的标识和所述第一安全头类型信息,确定所述第一目标安全上下文,包括:Determining, by the first network device, the first target security context according to the identifier of the terminal and the first security header type information, including:
    所述第一网络设备根据所述终端的标识和所述第一安全头类型信息,确定本地是否保存所述第一安全上下文;Determining, by the first network device, whether to save the first security context locally according to the identifier of the terminal and the first security header type information;
    若所述第一网络设备确定本地未保存所述第一安全上下文,向第二网络设备发送第一消息,所述第一消息包括所述终端的标识,用于请求获取所述第一安全上下文;所述第一网络设备接收来自所述第二网络设备的所述第一安全上下文;If the first network device determines that the first security context is not saved locally, the first message is sent to the second network device, where the first message includes an identifier of the terminal, and is used to request to obtain the first security context. The first network device receives the first security context from the second network device;
    或者,若所述第一网络设备确定本地保存有所述第一安全上下文,从本地获取所述第一安全上下文。Alternatively, if the first network device determines that the first security context is locally saved, the first security context is obtained locally.
  10. 根据权利要求9所述的方法,其特征在于,所述第一消息还包括当前为所述终端服务的公共陆地移动网络PLMN的标识、当前为所述终端服务的网络切片的标识或所述终端当前采用的接入技术的信息。The method according to claim 9, wherein the first message further comprises an identifier of a public land mobile network PLMN currently serving the terminal, an identifier of a network slice currently serving the terminal, or the terminal. Information on access technologies currently in use.
  11. 根据权利要求7-10任一项所述的方法,其特征在于,所述安全保护还包括完整性保护;所述安全验证还包括完整性检查。The method of any of claims 7-10, wherein the security protection further comprises integrity protection; the security verification further comprising an integrity check.
  12. 根据权利要求7-11任一项所述的方法,其特征在于,所述第一网络设备包括接入与移动管理功能AMF实体或会话管理功能SMF实体,所述第二网络设备包括统一数据管理UDM实体或鉴权服务器功能AUSF实体。The method according to any one of claims 7 to 11, wherein the first network device comprises an access and mobility management function AMF entity or a session management function SMF entity, and the second network device comprises unified data management The UDM entity or authentication server functions the AUSF entity.
  13. 一种终端,其特征在于,所述终端包括:确定模块、安全保护模块、发送模块、接收模块和验证模块;A terminal, comprising: a determining module, a security protection module, a sending module, a receiving module, and a verification module;
    所述确定模块,用于确定所述终端的第一目标安全上下文,所述第一目标安全上下文包括第一安全上下文或第二安全上下文,所述第一安全上下文为配置的安全上下文,所述第二安全上下文为鉴权流程生成的安全上下文;The determining module is configured to determine a first target security context of the terminal, where the first target security context includes a first security context or a second security context, where the first security context is a configured security context, The second security context is a security context generated by the authentication process;
    所述安全保护模块,用于使用所述第一目标安全上下文对初始非接入层NAS请求消息进行安全保护,得到安全保护的NAS请求消息,所述安全保护包括加密;The security protection module is configured to perform security protection on the initial non-access stratum NAS request message by using the first target security context to obtain a security-protected NAS request message, where the security protection includes encryption;
    所述发送模块,用于向第一网络设备发送所述安全保护的NAS请求消息,所述安全保护的NAS请求消息的消息头为第一NAS消息头,所述第一NAS消息头中包括所述终端的标识和第一安全头类型信息,所述第一安全头类型信息用于指示所述第一目标安全上下文的类型;The sending module is configured to send the security-protected NAS request message to the first network device, where the message header of the security-protected NAS request message is a first NAS message header, where the first NAS message header includes The identifier of the terminal and the first security header type information, where the first security header type information is used to indicate a type of the first target security context;
    所述接收模块,用于接收来自所述第一网络设备的安全保护的NAS拒绝消息,所述安全保护的NAS拒绝消息是使用所述终端的第二目标安全上下文对NAS拒绝消息进行安全保护后得到的;其中,所述安全保护的NAS拒绝消息的消息头为第二NAS消息头,所述第二NAS消息头中包括所述终端的标识和第二安全头类型信息,所述第二安全头类型信息用于指示所述第二目标安全上下文的类型,所述第二目标安全上下文包括所述第一安全上下文或者所述第二安全上下文;The receiving module is configured to receive a NAS denial message from the security protection of the first network device, where the NAS message of the security protection is to secure the NAS reject message by using the second target security context of the terminal. Obtaining, wherein the header of the security-protected NAS reject message is a second NAS message header, where the second NAS message header includes an identifier of the terminal and second security header type information, where the second security The header type information is used to indicate a type of the second target security context, and the second target security context includes the first security context or the second security context;
    所述确定模块,还用于根据所述终端的标识和所述第二安全头类型信息,确定所述第二目标安全上下文;The determining module is further configured to determine the second target security context according to the identifier of the terminal and the second security header type information;
    所述验证模块,用于使用所述第二目标安全上下文,对所述安全保护的NAS拒绝消息 进行安全验证,所述安全验证包括解密。The verification module is configured to perform security verification on the secured NAS rejection message by using the second target security context, where the security verification includes decryption.
  14. 根据权利要求13所述的终端,其特征在于,所述终端还包括丢弃模块;The terminal according to claim 13, wherein the terminal further comprises a discarding module;
    所述接收模块,还用于在所述发送模块向第一网络设备发送所述安全保护的NAS请求消息之后,接收未进行所述安全保护的NAS拒绝消息;The receiving module is further configured to: after the sending module sends the security-protected NAS request message to the first network device, receive a NAS reject message that is not performed by the security protection;
    所述丢弃模块,还用于丢弃所述未进行所述安全保护的NAS拒绝消息。The discarding module is further configured to discard the NAS reject message that is not subjected to the security protection.
  15. 根据权利要求13或14所述的终端,其特征在于,所述确定模块确定所述终端的第一目标安全上下文,包括:The terminal according to claim 13 or 14, wherein the determining module determines the first target security context of the terminal, including:
    若所述确定模块确定本地保存有所述第二安全上下文,将所述第二安全上下文确定为所述终端的第一目标安全上下文;If the determining module determines that the second security context is locally saved, determining the second security context as the first target security context of the terminal;
    或者,若所述确定模块确定本地未保存所述第二安全上下文,确定所述第一安全上下文,将所述第一安全上下文确定为所述终端的第一目标安全上下文。Alternatively, if the determining module determines that the second security context is not saved locally, determining the first security context, determining the first security context as the first target security context of the terminal.
  16. 根据权利要求15所述的终端,其特征在于,所述第一目标安全上下文为所述第一安全上下文;The terminal according to claim 15, wherein the first target security context is the first security context;
    所述确定模块确定所述第一安全上下文,包括:The determining module determines the first security context, including:
    读取所述终端的全球用户识别模块USIM卡上配置的所述第一安全上下文;或者,获取所述终端上配置的所述第一安全上下文。Reading the first security context configured on the global subscriber identity module USIM card of the terminal; or acquiring the first security context configured on the terminal.
  17. 根据权利要求15所述的终端,其特征在于,所述第一目标安全上下文为所述第一安全上下文;The terminal according to claim 15, wherein the first target security context is the first security context;
    所述确定模块确定所述第一安全上下文,包括:The determining module determines the first security context, including:
    根据当前为所述终端服务的公共陆地移动网络PLMN、当前为所述终端服务的网络切片或所述终端当前采用的接入技术,从所述终端的多个安全上下文中选择所述第一安全上下文,其中,所述多个安全上下文中包括所述第一安全上下文,所述多个安全上下文的类型与所述第一安全上下文的类型相同。Selecting the first security from a plurality of security contexts of the terminal according to a public land mobile network PLMN currently serving the terminal, a network slice currently serving the terminal, or an access technology currently used by the terminal a context, wherein the first security context is included in the plurality of security contexts, the types of the plurality of security contexts being the same as the type of the first security context.
  18. 根据权利要求13-17任一项所述的终端,其特征在于,所述安全保护还包括完整性保护;所述安全验证还包括完整性检查。The terminal according to any one of claims 13-17, wherein the security protection further comprises integrity protection; the security verification further comprises an integrity check.
  19. 一种第一网络设备,其特征在于,所述第一网络设备包括:接收模块、确定模块、验证模块、安全保护模块和发送模块;A first network device, the first network device includes: a receiving module, a determining module, a verifying module, a security protection module, and a sending module;
    所述接收模块,用于接收来自终端的安全保护的非接入层NAS请求消息,所述安全保护的NAS请求消息是使用所述终端的第一目标安全上下文对初始NAS请求消息进行安全保护后得到的,其中,所述安全保护的NAS请求消息的消息头为第一NAS消息头,所述第一NAS消息头中包括所述终端的标识和第一安全头类型信息,所述第一安全头类型信息用于指示所述第一目标安全上下文的类型,所述第一目标安全上下文包括第一安全上下文或第二安全上下文,所述第一安全上下文为配置的安全上下文,所述第二安全上下文为鉴权流程生成的安全上下文;所述安全保护包括加密;The receiving module is configured to receive a non-access stratum NAS request message from the security protection of the terminal, where the security-protected NAS request message is used to secure the initial NAS request message by using the first target security context of the terminal. The first NAS header includes the identifier of the terminal and the first security header type information, where the first NAS header includes the identifier of the NAS message. The header type information is used to indicate a type of the first target security context, the first target security context includes a first security context or a second security context, the first security context is a configured security context, and the second The security context is a security context generated by the authentication process; the security protection includes encryption;
    所述确定模块,用于根据所述终端的标识和所述第一安全头类型信息,确定所述第一目标安全上下文;The determining module is configured to determine the first target security context according to the identifier of the terminal and the first security header type information;
    所述验证模块,用于使用所述第一目标安全上下文,对所述安全保护的NAS请求消息进行安全验证,其中,所述安全验证包括解密;The verification module is configured to perform security verification on the secured NAS request message by using the first target security context, where the security verification includes decryption;
    所述安全保护模块,用于根据所述安全验证的结果,使用第二目标安全上下文对NAS拒绝消息进行安全保护,得到安全保护的NAS拒绝消息,所述第二目标安全上下文包括所述第一安全上下文或所述第二安全上下文;The security protection module is configured to perform security protection on the NAS rejection message by using the second target security context according to the result of the security verification, to obtain a security-protected NAS rejection message, where the second target security context includes the first a security context or the second security context;
    所述发送模块,用于向所述终端发送所述安全保护的NAS拒绝消息,其中,所述安全保护的NAS拒绝消息的消息头为第二NAS消息头,所述第二NAS消息头中包括所述终端的标识和第二安全头类型信息,所述第二安全头类型信息用于指示所述第二目标安全上下文的类型。The sending module is configured to send the security-protected NAS reject message to the terminal, where the header of the security-protected NAS reject message is a second NAS message header, and the second NAS message header includes The identifier of the terminal and the second security header type information, where the second security header type information is used to indicate the type of the second target security context.
  20. 根据权利要求19所述的第一网络设备,其特征在于,所述第一网络设备还包括存储模块;The first network device according to claim 19, wherein the first network device further comprises a storage module;
    所述安全保护模块具体用于:The security protection module is specifically configured to:
    若所述安全验证通过,且所述存储模块中未存储所述第二安全上下文,使用所述第一安全上下文对所述初始NAS请求消息的NAS拒绝消息进行安全保护;If the security verification is passed, and the second security context is not stored in the storage module, use the first security context to secure the NAS rejection message of the initial NAS request message;
    或者,若所述安全验证通过,且所述存储模块中存储有所述第二安全上下文,使用所述第二安全上下文对所述初始NAS请求消息的NAS拒绝消息进行安全保护;Or, if the security verification is passed, and the second security context is stored in the storage module, use the second security context to secure the NAS rejection message of the initial NAS request message;
    或者,若所述安全验证未通过,且所述存储模块中未存储所述第二安全上下文,使用所述第一安全上下文对NAS拒绝消息进行安全保护;Or, if the security verification fails, and the second security context is not stored in the storage module, use the first security context to perform security protection on the NAS reject message;
    或者,若所述安全验证未通过,且所述存储模块中存储有所述第二安全上下文,使用所述第二安全上下文对NAS拒绝消息进行安全保护。Alternatively, if the security verification fails, and the second security context is stored in the storage module, the NAS security message is used to secure the NAS rejection message.
  21. 根据权利要求19或20所述的第一网络设备,其特征在于,所述第一目标安全上下文为所述第一安全上下文;The first network device according to claim 19 or 20, wherein the first target security context is the first security context;
    所述确定模块具体用于:The determining module is specifically configured to:
    根据所述终端的标识和所述第一安全头类型信息,确定本地是否保存所述第一安全上下文;Determining whether the first security context is saved locally according to the identifier of the terminal and the first security header type information;
    若所述确定模块确定本地未保存所述第一安全上下文,向第二网络设备发送第一消息,所述第一消息包括所述终端的标识,用于请求获取所述第一安全上下文;接收来自所述第二网络设备的所述第一安全上下文;If the determining module determines that the first security context is not saved locally, the first message is sent to the second network device, where the first message includes an identifier of the terminal, and is used to request to acquire the first security context; The first security context from the second network device;
    或者,若所述确定模块确定本地保存有所述第一安全上下文,从本地获取所述第一安全上下文。Alternatively, if the determining module determines that the first security context is locally saved, the first security context is obtained locally.
  22. 根据权利要求19-21任一项所述的第一网络设备,其特征在于,所述安全保护还包括完整性保护;所述安全验证还包括完整性检查。The first network device according to any one of claims 19 to 21, wherein the security protection further comprises integrity protection; the security verification further comprises an integrity check.
  23. 根据权利要求19-22任一项所述的第一网络设备,其特征在于,所述第一网络设备包括接入与移动管理功能AMF实体或会话管理功能SMF实体,所述第二网络设备包括统一数据管理UDM实体或鉴权服务器功能AUSF实体。The first network device according to any one of claims 19 to 22, wherein the first network device comprises an access and mobility management function AMF entity or a session management function SMF entity, and the second network device comprises Unified Data Management UDM Entity or Authentication Server Function AUSF Entity.
  24. 一种终端,其特征在于,包括:处理器,所述处理器用于与存储器耦合,并读取所述存储器存储的计算机执行指令并根据所述指令执行如权利要求1-6中任意一项所述的网络安全保护方法。A terminal, comprising: a processor, the processor configured to couple with a memory, and read a computer executed instruction stored in the memory and perform the method according to any one of claims 1-6 according to the instruction The network security protection method described.
  25. 一种第一网络设备,其特征在于,包括:处理器,所述处理器用于与存储器耦合,并读取所述存储器存储的计算机执行指令并根据所述指令执行如权利要求7-12中任意一 项所述的网络安全保护方法。A first network device, comprising: a processor, the processor for coupling with a memory, and reading the computer-executed instructions stored in the memory and performing any of the claims 7-12 according to the instructions A network security protection method as described.
  26. 一种网络安全保护系统,其特征在于,所述网络安全保护系统包括如权利要求13-17任一项所述的终端以及如权利要求18-23任一项所述的第一网络设备;A network security protection system, characterized in that the network security protection system comprises the terminal according to any one of claims 13-17 and the first network device according to any one of claims 18-23;
    或者,所述网络安全保护系统包括如权利要求24所述的终端以及如权利要求25所述的第一网络设备。Alternatively, the network security protection system comprises the terminal of claim 24 and the first network device of claim 25.
  27. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如权利要求1-6中任意一项所述的网络安全保护方法。A computer readable storage medium, wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform network security as claimed in any one of claims 1-6 Protection method.
  28. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如权利要求7-12中任意一项所述的网络安全保护方法。A computer readable storage medium, wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform network security as claimed in any one of claims 7-12 Protection method.
PCT/CN2018/084025 2017-04-25 2018-04-23 Network security protection method, device and system WO2018196705A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710279322.8A CN108738015B (en) 2017-04-25 2017-04-25 Network security protection method, equipment and system
CN201710279322.8 2017-04-25

Publications (1)

Publication Number Publication Date
WO2018196705A1 true WO2018196705A1 (en) 2018-11-01

Family

ID=63919426

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/084025 WO2018196705A1 (en) 2017-04-25 2018-04-23 Network security protection method, device and system

Country Status (2)

Country Link
CN (1) CN108738015B (en)
WO (1) WO2018196705A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182543B (en) * 2018-11-12 2021-10-19 华为技术有限公司 Method and device for switching network
CN112218285B (en) * 2019-07-11 2022-06-14 华为技术有限公司 Method, equipment and system for transmitting uplink user data
CN110994565A (en) * 2019-12-02 2020-04-10 中国联合网络通信集团有限公司 Relay protection method and device
CN116033541A (en) * 2020-12-30 2023-04-28 展讯通信(上海)有限公司 Network registration method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438241A (en) * 2011-12-30 2012-05-02 北京中创信测科技股份有限公司 Device and method for decrypting NAS (Network Attached Storage) signaling in LTE (Long Term Evolution) protocol monitoring analysis
CN104737516A (en) * 2012-10-19 2015-06-24 高通股份有限公司 Methods and apparatus for providing network-assisted key agreement for P2P communications
CN105532026A (en) * 2013-10-28 2016-04-27 华为技术有限公司 Method and device for providing and acquiring security context
WO2016129238A1 (en) * 2015-02-13 2016-08-18 Nec Corporation Apparatus, system and method for security management
CN106412948A (en) * 2015-07-31 2017-02-15 联芯科技有限公司 Transmission method related to NAS signaling message and transmission terminal thereof
CN106507348A (en) * 2015-09-07 2017-03-15 大唐移动通信设备有限公司 The method and apparatus of UE core network access EPC in a kind of LTE system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PT2396942E (en) * 2009-02-16 2015-04-01 Ericsson Telefon Ab L M Un-ciphered network operation solution
CN101521873B (en) * 2009-03-16 2014-12-10 中兴通讯股份有限公司 Method for enabling local security context

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438241A (en) * 2011-12-30 2012-05-02 北京中创信测科技股份有限公司 Device and method for decrypting NAS (Network Attached Storage) signaling in LTE (Long Term Evolution) protocol monitoring analysis
CN104737516A (en) * 2012-10-19 2015-06-24 高通股份有限公司 Methods and apparatus for providing network-assisted key agreement for P2P communications
CN105532026A (en) * 2013-10-28 2016-04-27 华为技术有限公司 Method and device for providing and acquiring security context
WO2016129238A1 (en) * 2015-02-13 2016-08-18 Nec Corporation Apparatus, system and method for security management
CN106412948A (en) * 2015-07-31 2017-02-15 联芯科技有限公司 Transmission method related to NAS signaling message and transmission terminal thereof
CN106507348A (en) * 2015-09-07 2017-03-15 大唐移动通信设备有限公司 The method and apparatus of UE core network access EPC in a kind of LTE system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED, HUAWEI: "Protecting Against the Modification of Attach/TAU Request Attacks", 3GPP TSG-SA3 MEETING #84 S3-161217, 15 September 2016 (2016-09-15), XP051139439, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_84_Chennai/Docs/> *

Also Published As

Publication number Publication date
CN108738015B (en) 2021-04-09
CN108738015A (en) 2018-11-02

Similar Documents

Publication Publication Date Title
US10924465B2 (en) Split authentication network systems and methods
CN109842880B (en) Routing method, device and system
ES2934600T3 (en) Network connection method, access point terminal and management terminal
US9609460B2 (en) Cloud based mobile device security and policy enforcement
US9621574B2 (en) Out of band end user notification systems and methods for security events related to non-browser mobile applications
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
US8522318B2 (en) Enabling dynamic authentication with different protocols on the same port for a switch
WO2018196705A1 (en) Network security protection method, device and system
US11974132B2 (en) Routing method, apparatus, and system
US20160066184A1 (en) Pairing Computing Devices According To A Multi-Level Security Protocol
US20130318581A1 (en) Multi-factor authentication using a unique identification header (uidh)
TW201644238A (en) Efficient policy enforcement using network tokens for services-user-plane approach
TW201644236A (en) Efficient policy enforcement using network tokens for services C-plane approach
CN112512045B (en) Communication system, method and device
WO2018120913A1 (en) Certificate acquisition method, authentication method and network device
ES2690828T3 (en) Resource protection on unreliable devices
WO2023065969A1 (en) Access control method, apparatus, and system
WO2018205148A1 (en) Data packet checking method and device
WO2019024744A1 (en) Method and device for acquiring identifier of terminal device
US20240146728A1 (en) Access control method, access control system, and related device
US9967248B1 (en) System for authenticating and processing service requests
WO2020215331A1 (en) Communication method and apparatus
WO2021082558A1 (en) Access control method for network slice, apparatus, and storage medium
US9917693B2 (en) Providing security assurance information
WO2023216082A1 (en) Subscription processing method and apparatus, and medium and chip

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18791917

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18791917

Country of ref document: EP

Kind code of ref document: A1