WO2018208221A1 - 网络认证方法、网络设备及终端设备 - Google Patents
网络认证方法、网络设备及终端设备 Download PDFInfo
- Publication number
- WO2018208221A1 WO2018208221A1 PCT/SG2017/050242 SG2017050242W WO2018208221A1 WO 2018208221 A1 WO2018208221 A1 WO 2018208221A1 SG 2017050242 W SG2017050242 W SG 2017050242W WO 2018208221 A1 WO2018208221 A1 WO 2018208221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- network device
- authentication
- network
- parameter
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/001—Synchronization between nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/001—Synchronization between nodes
- H04W56/0015—Synchronization between nodes one node acting as a reference for the others
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- Network authentication method Network device and terminal device
- the present application relates to the field of communications technologies, and in particular, to a network authentication method, a network device, and a terminal device. Background technique
- the Internet of Things ( ⁇ ) is an important application scenario for the fifth-generation mobile communication technology (5th-generation, 5G).
- the terminal device in the ⁇ needs to perform network authentication when accessing the 5G network.
- Figure 1 is in the prior art.
- the interaction diagram of the terminal device performing network authentication is as follows: Step S101: The terminal device sends a network access request to the Mobility Management Entity (MME).
- HSS Home Subscriber Server
- the HSS receives the incoming data request and determines a symmetric key K corresponding to the terminal device.
- the symmetric key is stored in the HSS, and then the authentication vector is calculated according to the symmetric key K, where the authentication amount includes an authentication token.
- Step S104 The HSS sends the authentication vector to the MME.
- Step S105 The MME receives and saves the authentication vector.
- Step S106 The MME initiates a user authentication request to the terminal device, where the user authentication request includes a random number RAM:), AUTNHSS, and KASME.
- Step S107 The terminal device receives the RAND and AUTNHSS, and performs an authentication and key agreement (AKA) key deduction algorithm of an Evolved Packet System (EPS) third generation mobile communication network.
- AKA authentication and key agreement
- the input parameters of the operation include the symmetric key K:, RAND, the Serving Network (SN) identifier, and the sequence number (SQN) of the terminal device.
- the output parameters of the operation include the user-side authentication. Token AUTNUE, Response (Response, RES) and KASME.
- Step S108 The terminal device generates a session key of the terminal device and the network side according to the KASME when confirming that the A TTN UE and the A TTNHSS are the same.
- Step S109 The terminal device sends the calculated RES to the MME.
- Step S ⁇ The MME receives the RES, and generates a session key between the network side and the terminal device according to the KASME on the same day that the received RES and the XRES in the authentication vector are confirmed.
- a disadvantage of the prior art is that a large number of terminal devices in the ⁇ need to perform network authentication with the HSS. Therefore, the HSS needs to store the symmetric key and the SQN corresponding to each terminal device. On the one hand, this kind of centralized storage imposes severe load pressure on the HSS. On the other hand, the network authentication process requires the interaction between the terminal device, the MME and the HSS to achieve the network authentication chain, resulting in a long network authentication chain. The problem of network authentication efficiency. Summary of the invention
- the application provides a network authentication method, a network device, and a terminal device. Therefore, the storage load of the HSS in the prior art can be reduced, and since the network authentication is not required between the terminal device and the network device in the application, the network authentication chain can be shortened, thereby improving the network authentication efficiency.
- the application provides a network authentication method, including: acquiring, by a network device, an identity of a terminal device; and generating, by the network device, a symmetric key of the network device according to the identity of the terminal device and the first key of the network device; The device generates a first serial number for the terminal device; the network device determines the correct sequence of the terminal device according to the first serial number The network device generates a first authentication token according to the symmetric key of the network device side, the correct serial number, the first random number, and the authentication management domain parameter configured by the network device for the terminal device; wherein, the authentication management domain parameter is used to limit a parameter involved in the network authentication process of the terminal device; the network device sends the first random number and the first authentication token to the terminal device, so that the terminal device authenticates the network device according to the first authentication token and the second authentication token.
- the second authentication token is generated by the terminal device according to the symmetric key of the terminal device, the first random number, the correct serial number, and the authentication management domain parameter; the network device receives the authentication response message sent by the terminal device, where The authentication response message includes a first authentication parameter; the first authentication parameter is generated according to the first random number and the symmetric key of the terminal device side; the network device generates the second authentication parameter according to the symmetric key of the network device side and the first random number; The device authenticates the terminal device according to the first authentication parameter and the second authentication parameter.
- the network device generates a symmetric key by itself, and on the other hand, the correct serial number of the terminal device is generated by the first serial number. That is to say, in the present application, the network device does not need to store the symmetric key and the correct serial number of the terminal device, but generates a symmetric key in real time, and determines the correct serial number of the terminal device generated in real time. Therefore, the storage load of the HSS in the prior art can be reduced, and since the network authentication is not required between the terminal device and the network device in the present application, the network authentication chain can be shortened, thereby improving the network authentication efficiency.
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the symmetric key of the network device side can be effectively generated or derived by the two first keys. This eliminates the need to store symmetric keys, which reduces the storage load on the HSS.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first serial number is a pseudo sequence number of the terminal device.
- the network device determines the correct serial number of the terminal device according to the first serial number, including: the symmetric key and the pseudo sequence of the network device according to the network device side Number, second random number, and authentication management domain parameter generation: third authentication token: the network device sends the second random number and the third: the authentication token to the terminal device, so that the terminal device according to the symmetric key of the terminal device side, The third-three authentication token, the second random number, and the authentication management domain parameter determine the serial number; the network device receives the re-synchronization message sent by the terminal device; the re-synchronization message includes a re-synchronization parameter and a third random number; and the network device according to the re-synchronization parameter And the third random number determines the correct serial number.
- the correct serial number of the terminal device can be effectively determined by these two methods, thereby eliminating the need to store the correct serial number of the terminal device, thereby reducing the storage load of the HSS.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter, so that the terminal device generates the terminal device according to the identity identifier of the network device and the private key of the terminal device. Symmetric key.
- the application uses the identity of the network device to replace the second random number; or carries the identity of the network device in the authentication management domain parameter, and the identity of the network device can be transmitted through the two methods. This can reduce network sales.
- the method further includes: when the network device is an access network device, the network device sends a broadcast message, where the broadcast message includes an identity of the network device, so that the terminal device according to the identity identifier of the network device and the terminal device
- the private key generates a symmetric key that the terminal device reverses.
- the application provides a network authentication method, including: sending, by a terminal device, a device identifier of a terminal device; and causing the network device to generate a symmetry of the network device according to the identity of the terminal device and the first key of the network device.
- the first device receives the first random number and the first authentication token sent by the network device, where the first authentication token is a symmetric key of the network device according to the network device side, a correct serial number of the terminal device, and a first
- the random number and the network device are generated for the authentication management domain parameter configured by the terminal device; the authentication management domain parameter is used to define parameters involved in the network authentication process of the terminal device; and the terminal device is symmetric according to the first authentication token and the terminal device side.
- the key, the first random number, and the authentication management domain parameter determine a correct serial number; the terminal device generates a second authentication token according to the symmetric key of the terminal device side, the first random number, the correct serial number, and the authentication management domain parameter; The device authenticates the network device according to the first authentication token and the second authentication token; the terminal The device generates a first authentication parameter according to the first random number and the symmetric key on the terminal device side; the terminal device sends an authentication response message to the network device, where the authentication response message includes the first authentication parameter, where the first authentication parameter is used in the network The device authenticates the terminal device.
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the correct serial number is determined by the network device by the first serial number.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first sequence number is a pseudo sequence number of the terminal device; the method further includes: the terminal device receiving the second random number and the third authentication token sent by the network device, where the third authentication token is a network device according to the network device
- the symmetric device of the network device side, the pseudo-serial number, the second random number, and the authentication management domain parameter are generated; the terminal device according to the symmetric key of the terminal device side, the third authentication token, the second random number, and the authentication management domain parameter Determining a pseudo-sequence number; the terminal device generates a re-synchronization parameter according to a correct sequence number, a third random number, an authentication management domain parameter, and a symmetric key on the terminal device side; the terminal device sends a resynchronization message to the network device; wherein, the resynchronization message
- the resynchronization parameter and the third: random number are included to enable the network device to determine the correct sequence number according to the resynchronization parameter and the third random number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter; the method further includes: the terminal device generating the terminal according to the identity identifier of the network device and the private key of the terminal device Symmetric key on the device side.
- the method further includes: when the network device is an access network device, the terminal device receives a broadcast message sent by the network device; where the broadcast message includes an identity identifier of the network device; and the terminal device according to the identity identifier and the terminal of the network device
- the private key of the device generates a symmetric key that the terminal device reverses.
- the network device is described below, and the network device can be used to perform the first aspect and the corresponding mode corresponding to the first aspect.
- the implementation principle and the technical effect are similar, and details are not described herein again.
- the application provides a network device, including: a processor, a receiver, a transmitter, and a memory; wherein: a code is stored in the memory, and when the code is run by the processor, the terminal device performs the first aspect Or the method of any of the first aspects.
- the processor is configured to acquire the identity of the terminal device: generate a symmetric key of the network device side according to the identity identifier of the terminal device and the first key of the network device; generate a first serial number for the terminal device; according to the first serial number Determining a correct serial number of the terminal device; generating a first authentication token according to the symmetric key of the network device, the correct serial number, the first random number, and the authentication management domain parameter configured by the network device for the terminal device; wherein, the authentication management The domain parameter is used to define parameters involved in the network authentication process of the terminal device; the transmitter is configured to be configured to the terminal And sending the first random number and the first authentication token: the terminal device authenticates the network device according to the first authentication token and the second authentication token, where the second authentication token is the terminal device according to the terminal device side The symmetric key, the first random number, the correct serial number, and the authentication management domain parameter are generated; the receiver is configured to receive the authentication response message sent by the terminal device, where the authentication response message includes the first authentication parameter: the
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first sequence number is a pseudo sequence number of the terminal device.
- the processor is specifically configured to generate a third according to the symmetric key, the pseudo sequence number, the second random number, and the authentication management domain parameter of the network device side.
- the authentication token is further configured to send the second random number and the first authentication token to enable the terminal device to perform the symmetric key, the third authentication token, the second random number, and the authentication management domain parameter according to the terminal device side.
- the receiver is further configured to receive a resynchronization message sent by the terminal device; the resynchronization message includes a resynchronization parameter and a third random number; and the processor is specifically configured to determine the correct according to the resynchronization parameter and the third random number Serial number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter, so that the terminal device generates the terminal device side according to the identity identifier of the network device and the private key of the terminal device. Symmetric key.
- the sender when the network device is an access network device, the sender further sends a broadcast message, where the broadcast message includes an identity of the network device, so that the terminal device according to the identity identifier of the network device and the private key of the terminal device Generate a symmetric key on the terminal device side.
- the terminal device is described below, and the terminal device can be used to perform the second aspect and the corresponding method corresponding to the second aspect.
- the implementation principle and the technical effect are similar, and details are not described herein again.
- the application provides a terminal device, including: a transmitter, a receiver, a memory, and a processor; wherein, the memory stores a code, and when the code is run by the processor, the terminal device performs the second aspect Or the method of any of the second aspects.
- the sender is configured to send the identity identifier of the terminal device to the network device, so that the network device generates a symmetric key of the network device side according to the identity identifier of the terminal device and the first key of the network device; and the receiver is configured to: Receiving a first random number and a first authentication token sent by the network device, where the first authentication token is a symmetric key of the network device according to the network device side, a correct serial number of the terminal device, a first random number, and a network device
- the authentication management domain parameter is generated for the terminal device; the authentication management domain parameter is used to define parameters involved in the network authentication process of the terminal device; and the processor is configured to: according to the first authentication token, the symmetric key of the terminal device side, a random number and an authentication management domain parameter determine a correct serial number; generate a second authentication token according to the symmetric key of the terminal device side, the first random number, the correct serial number, and the authentication management domain parameter; according to the first authentication token And authenticating the network device with the second authentication
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices including the terminal device.
- the correct serial number is determined by the network device by the first serial number.
- the first sequence number is a sequence number generated by the network device according to the current time information; wherein the first sequence number is the same as the sequence number of the positive bowl.
- the first sequence number is a pseudo sequence number of the terminal device: the receiver is further configured to receive the second random number and the third: third authentication token sent by the network device, where the third authentication token is a network device
- the processor is further configured to: generate, according to the symmetric key, the pseudo-sequence number, the second random number, and the authentication management domain parameter of the network device side, the processor according to the symmetric key, the third authentication token, and the second random
- the number and the authentication management domain parameter determine the pseudo serial number; generate a resynchronization parameter according to the correct serial number, the third-three random number, the authentication management domain parameter, and the symmetric key on the terminal device side; the transmitter is also used to send to the network device Resynchronization message; wherein the resynchronization message includes a resynchronization parameter and a second random number, so that the network device determines the correct sequence number according to the resynchronization parameter and the third random number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter; the processor is further configured to generate the terminal device according to the identity identifier of the network device and the private key of the terminal device Symmetrical dense aluminum on the side.
- the receiver is further configured to receive a broadcast message sent by the network device, where the broadcast message includes an identity of the network device, and the processor is further configured to use the identifier of the network device.
- the private key of the terminal device generates a symmetric key on the terminal device side.
- the present application provides a computer storage medium, computer software instructions for storing the network device, including a program designed to perform the first aspect described above.
- the application implementation provides a computer storage medium for storing an IT computer software instruction for the terminal device, which includes a program designed to execute the second aspect.
- the application provides a computer program product comprising instructions which, when executed by a computer, cause the computer to perform the functions performed by the network device of the first aspect and the optional method described above.
- the application provides a computer program product comprising instructions which, when executed by a computer, cause the computer to perform the functions performed by the terminal device in the second aspect and the optional method described above.
- the present application provides a network authentication method, a network device, and a terminal device, where the method includes: acquiring, by the network device, an identity of the terminal device; and generating, by the network device, the symmetry of the network device side according to the identity of the terminal device and the first key of the network device
- the network device generates a first serial number for the terminal device; the network device determines the correct serial number of the terminal device according to the first serial number; the network device according to the symmetric key of the network device side, the correct serial number, and the first random number
- the first authentication token is configured to enable the terminal device to authenticate the network device according to the first authentication token and the second authentication token: where the second authentication token is a symmetric key of the terminal device according to the terminal device side, the first random Number,
- the network device generates a symmetric key by itself, and on the other hand, the correct serial number of the terminal device is generated by the first serial number. That is to say, in the application, the network device does not need to store the symmetric key and the correct serial number of the terminal device, but generates a symmetric key in real time, and determines the correct serial number of the real-time generating terminal device. It can reduce the storage load of the HSS in the prior art, and because of the terminal equipment and There is no need for MME and other devices to perform network authentication between network devices, which can shorten the network authentication chain and improve network authentication efficiency.
- FIG. 1 is a schematic diagram of interaction between a terminal device performing network authentication in the prior art
- FIG. 2 is a schematic diagram of a network architecture of future mobile communications
- FIG. 3 is an interaction flowchart of a network authentication method according to an embodiment of the present disclosure
- FIG. 4 is an interaction flowchart of a network authentication method according to another embodiment of the present application.
- FIG. 5 is an interaction flowchart of a network authentication method according to still another embodiment of the present application.
- FIG. 6 is a flowchart of interaction of a network authentication method according to another embodiment of the present application:
- FIG. 7 is an interaction flowchart of a network authentication method according to still another embodiment of the present application.
- FIG. 8 is an interaction flowchart of a network authentication method according to still another embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a network authentication apparatus according to an implementation of the present application.
- Figure! 0 is a schematic structural diagram of a network authentication apparatus according to another embodiment of the present application:
- FIG. 11 is a schematic structural diagram of a network device according to an embodiment of the present disclosure.
- FIG. 2 is a schematic structural diagram of a terminal device according to another embodiment of the present application. detailed description
- the terminal device referred to in the present application may be referred to as an Internet of Things ( ⁇ ) device, and the terminal device may be a computer, a mobile phone, a printer, a 3 ⁇ 4 box, a robot, a sensor, an electric meter, a water meter, etc., and may be connected to the ⁇ Terminal equipment.
- ⁇ Internet of Things
- the network device involved in the present application is a device that can perform network authentication with the terminal device.
- the network device may be an access network device, for example, may be a global mobile communication (Globai System of Mobile communication, GSM for short) or a code division multiple access (CDMA) base station (Base Transceiver Station, BTS for short)
- the base station (NodeB, NB for short) in the Wideband Code Division Multiple Access (WCDMA), or the evolved base station in the Long Term Evolution (LTE) network.
- an access point (Access Poin AP) or a relay station and may be a 5G network or a base station in a new generation of radio access technology (NR), which is not limited herein.
- the network device may also be a core network device, for example, it may be an MME or an Authentication Security Facility (AUSF).
- AUSF Authentication Security Facility
- the network device may be any device having an authentication unit (Authentication Uriii, or an Authentication Function, AU or AF).
- Authentication Uriii or an Authentication Function
- AU or AF Authentication Function
- the terminal device accesses the carrier network through the access network (Access Netwo A, AN).
- A includes a base station.
- the carrier network includes:
- Mobiiity Management (MM) network element Mobiiity Management (MM) network element.
- Session Management used to perform session, slice, flow flow or bearer establishment and management.
- the authentication unit AU or AF is used to perform bidirectional network authentication with the terminal device.
- the AU can be deployed as a separate logical function entity or in the MM or SM. That is, the MM or SM plays the role of the AU. Of course, it can also be deployed on a base station in the AN, which is not limited in this application.
- the AU is deployed in the MM, the MM is the above network device.
- the SM is the above network device.
- the base station is the network device described above.
- the server node of the operator, or the home subscriber server including the operator's AAA server (Ai), authentication, authorization, accounting server, authentication, authorization, accounting, server, or home subscriber server (Home Subscriber Server, HSS), or an Authentication Centre (AuC) server, or a user registration information center (subscnber repository).
- AAA server AAA server
- AuC Authentication Centre
- Policy control NE used for policy negotiation.
- KMS Key Management System
- a gateway also known as a User Plane-Gateway (UP-GW) is used to connect to the carrier network and the Data Network (DN).
- UP-GW User Plane-Gateway
- A can also be connected to the DN via GW.
- DN server including application server or business server. It can be deployed inside the carrier network or outside the carrier network.
- the MM, the AU, and the SM can be deployed separately, or can be integrated into one entity at least two or two.
- SM and MM are deployed in one entity and deployed separately; or SM and AU are deployed in one entity, and MM is deployed separately.
- the application is not limited to the network authentication in the above-mentioned future network architecture, and it can also be applied to any of 2G, 3G, 4G, 5G, NR and Wireless Fideiity (Wi-Fi) networks.
- Application scenario of network authentication is not limited to the network authentication in the above-mentioned future network architecture, and it can also be applied to any of 2G, 3G, 4G, 5G, NR and Wireless Fideiity (Wi-Fi) networks.
- Application scenario of network authentication is not limited to the network authentication in the above-mentioned future network architecture, and it can also be applied to any of 2G, 3G, 4G, 5G, NR and Wireless Fideiity (Wi-Fi) networks.
- the application provides a network authentication method, a network device, and a terminal device.
- FIG. 3 is an interaction flowchart of a network authentication method provided by an implementation steel of the present application. As shown in FIG. 3, the method includes:
- Step S301 The network device acquires an identity (ID) of the terminal device.
- the ID of the terminal device may be a Media Access Control (MAC) address, an Internet Protocol (IP) address, a mobile phone number, an International Mobile Equipment Identity (IMEI), and an International Mobile Subscriber Identity (Intematiotia Mobile Subscriber Identity (IMSI), IP Multimedia Private Identity (IMI), Temporary Mobile Subscriber Identity (TMSI), IP Multimedia Public Identity (IMPU), Global
- MAC Media Access Control
- IP Internet Protocol
- IMEI International Mobile Equipment Identity
- IMSI International Mobile Subscriber Identity
- IMSI IP Multimedia Private Identity
- TMSI Temporary Mobile Subscriber Identity
- IMPU IP Multimedia Public Identity
- the only temporary UE identifier Globally Unique Temporary UE Identity, (31 ⁇ ), etc.
- Step S302 The network device generates a symmetric aluminum K on the network device side according to the ID of the terminal device and the first key of the network device.
- the symmetric key ⁇ on the network device side is a symmetric key between the network device and the terminal device.
- the first key is a private key of the network device.
- IBC Identity-Based Cryptography
- IBC includes Identity Based Signature (IBS) and Identity Based Encryption (IBE).
- IBS Identity Based Signature
- IBE Identity Based Encryption
- Both the terminal device and the network device have their own public and private key pairs, where the public key is a meaningful string (identity), such as an email address, a phone number, etc.; the private key is determined by the Private Key Generator (PKG) according to the device. The ID and PKG's primary private key are generated.
- the symmetric key K of the network side device is generated by its own private key and II) of the terminal device.
- the symmetric key K of the terminal device is generated by its own private key and the ID of the network device.
- the first key is a public key corresponding to multiple terminal devices including the terminal device.
- the network device can derive the symmetric key K of the network device side according to the public key and the ID of the terminal device. It should be emphasized that the network device can establish a network authentication relationship with multiple terminal devices. For each terminal device, the network device side has a unique corresponding symmetric key ⁇ :. Therefore, the network device derives a symmetric key between the terminal device A and the network device and the network device side according to the public key and the terminal device ⁇ []. How to generate a symmetric key K based on the public key and the ID of the other party can use the related algorithm of the prior art. This application does not limit this.
- Step S303 The network device generates a first sequence number (SQN) for the terminal device.
- Step S304 The network device determines the correct SQN of the terminal device according to the first SQN.
- step S303 The description is made in combination with step S303 and step S304:
- the first SQN is an SQN generated by the network device according to current time information. Among them, the time synchronization between the network device and the terminal settings. Since the time information is unique, the first SQN is the same as the correct SQN described in step S204.
- the first SQN is the pseudo SQN of the terminal device.
- the pseudo SQN may be a fixed number of digits or a randomly generated string of numbers, which is required to comply with the serial number format and length requirements in the EPS-AKA.
- step S304 includes: First, the network device generates the first according to the symmetric key K, the pseudo SQN, the second random number RAND, and the Authentication Management Field (AMF) parameter of the network device side.
- K symmetric key
- AMF Authentication Management Field
- the AMF is used to define parameters involved in the network authentication process of the terminal device. For example: A F ⁇ is limited to the fault tolerance range of SQN.
- the fault tolerance range of the SQN refers to the fault tolerance range between the first SQN and the correct SQN. When the error between the first SQN and the SQN is within the fault tolerance range, the first SQN may be considered to be the SQN of the positive bowl. Otherwise, the first SQN is not the correct SQN.
- the AMF can also define the lifetime of the encryption key and the security key.
- the network device transmits the second RAND and the second AUTN to the terminal device, so that the terminal device determines the pseudo SQN according to the symmetric key K, the third AUTN, the second RAND, and the AMF on the terminal device side.
- the network device receives the resynchronization message sent by the terminal device; the network device determines the correct SQN of the terminal device according to the resynchronization message.
- the network device may use the AKA algorithm provided by the prior art to pass the symmetric key K of the network device side, Pseudo SQN, second RAND, and AMF generate the third: AUTN.
- the AKA algorithm in this application refers to the algorithm involved in the ESP-AKA protocol.
- the terminal device can determine the pseudo SQN by using the AKA algorithm provided by the prior art by using the symmetric key K, the third AUTN, the second RAND, and the AMF of the terminal device, that is, the third algorithm can be used to calculate the third by using the prior art providing algorithm.
- the resynchronization parameters are then generated using the correct SQN, the second RAND, the AMF and the symmetric key K on the terminal side.
- the resynchronization parameter is used for synchronization between the terminal device and the network device, and for the network device to determine the correct SQN.
- the terminal device sends a resynchronization message to the network device, the resynchronization message including a third. RAND and a resynchronization parameter AUTS. Based on the third: RAND and resynchronization parameters AUTS, the network device can determine the correct SQN using the prior art AKA algorithm. This application does not limit the prior art algorithm.
- the network device sends the third AUTN to the terminal device, where the third AUTN is calculated by using the pseudo SQN, thereby triggering the terminal device to send the correct SQN to the network device.
- Step S305 The network device generates the first AUTN according to the symmetric key K, the correct SQN, the first RAND, and the AMF parameters on the network device side.
- the network device can generate the first AUTN by using the AKA algorithm provided by the prior art through the symmetric key of the network device side, the correct SQN, the first RAND, and the AMF.
- the method for generating the first AUTN is the same as the method for generating the third AUTN.
- the prior art does not limit the prior art algorithm.
- step S305 is different from the prior art EPS-AKA protocol in that the correct SQN in the prior art is stored in the HSS.
- the network device in this application needs to obtain the correct SQN in real time.
- the first Al)TN is then calculated using the same algorithm as in the prior art.
- Step S306 The network device sends the first RAND and the first AUTN to the terminal device.
- Step S307 The terminal device generates a second AUTN according to the symmetric key K, the first RAND, and the correct SQN on the terminal device side;
- Step S308 The terminal device authenticates the network device according to the first AUTN and the second AUTN.
- the method is as follows: Step S306 to step S308 are described.
- the terminal device can generate the second AUTN according to the symmetric key K, the first RAND, and the correct SQN of the terminal device according to the AKA algorithm provided by the prior art.
- the terminal device authenticates the network device according to the first AUTN and the second AUTN, and includes: when the terminal device determines that the first AUTN and the second AUTN are the same, indicating that the network device is authenticated to pass. Otherwise, the network device is not authenticated.
- the terminal device determines that the error value between the first AUTN and the second AUTN is less than a preset threshold, it indicates that the network device is authenticated to pass. Otherwise, the network device is not authenticated. This application does not limit this.
- Step S309 The network device receives an authentication response message sent by the terminal device.
- the authentication response message includes a first authentication parameter (the first authentication parameter is a response (Response, RES) in the prior art:); the RES is symmetric according to the first RAND and the terminal device side.
- the key K is generated; wherein the symmetric key on the terminal device side is a symmetric key between the network device and the terminal device.
- the AKA algorithm provided by the prior art can be used to generate the RES, which is not limited in this application.
- Step S310 The network device generates a second authentication parameter according to the symmetric key of the network device side and the first random number.
- the second authentication parameter is the Expected Response (XRES) in the prior art.
- the AKA algorithm provided by the prior art can be used to generate the XRES. This application does not limit this.
- Step S311 The network device authenticates the terminal device according to the RES and the XRES.
- step S310 and step S305 can be combined into one step execution.
- the present application provides a network authentication method, which is different from the network authentication process in the existing EPS-AKA protocol.
- the network device generates a symmetric key K by itself, and on the other hand, generates a terminal in real time through the first SQN.
- the correct SQN of the device that is to say, the network device in the present application does not need to store the symmetric key K and the correct SQN of the terminal device, but generates the symmetric key K in real time and determines the correct SQN of the real-time generating terminal device.
- the storage load of the HSS in the prior art can be reduced, and the network authentication chain can be shortened, so that the network authentication efficiency can be improved, because the device does not need to perform network authentication between the terminal device and the network device in this application.
- the present application provides the following options for how the terminal device determines the symmetric key of the terminal device:
- the terminal device acquires ro of the network device, and then generates a symmetric key K according to the ID of the network device and the private key of the terminal device based on the IBC mechanism.
- the private key of the terminal device is generated by the PKG according to the ID of the terminal set and the primary private key of the PKG.
- the ID of the network device may be a MAC address, an IP address, a Uniform Resource Locator (URL) address, a public email address, a fiber address, a registered entity name, and the like of the network device.
- URL Uniform Resource Locator
- the terminal device can store the symmetric key K.
- the subsequent terminal device needs to use the symmetric key K, it can be directly taken out from the storage space.
- the terminal device acquires the network device: the ID manner includes: the ID of the network device is the second random number; or the identifier of the network device is carried in the AMF parameter.
- the network device sends a message to the terminal device, where the message includes the ID of the network device.
- the network device is an access network device
- the network device sends a broadcast message, where the broadcast message includes an ID of the network device, so that the terminal device is configured according to the network device. And generating a symmetric key on the terminal device side with the private key of the terminal device.
- the network authentication process is illustrated by combining the foregoing optional methods:
- FIG. 4 is an interaction flowchart of a network authentication method according to another embodiment of the present application. As shown in FIG. 4, the method includes:
- Step S401 The network device sends a broadcast message.
- the broadcast message includes the ID of the network device.
- Step S402 The terminal device generates a symmetric key on the terminal device side according to the ID of the network device and the private aluminum of the terminal device.
- Step S403 The terminal device sends an access request message to the network device, where the message includes: an ID of the terminal device, a network capability of the terminal device, and a key KSIASME.
- the network capability and key of the terminal device KSIASME are parameters in the existing EPS-AKA authentication protocol, and their meanings are the same as those in the EPS-AKA authentication protocol. I will not repeat them here. It should be noted that the key KSIASME is generated according to the symmetric key K, which is used to generate the subsequent session key.
- Step S 404 the network device [) generating symmetrical encrypting device side according ⁇ network and private network equipment terminal device ⁇ /j K.
- Step S405 The network device generates a pseudo SQN.
- the pseudo SQN may be a fixed string of numbers or a randomly generated string of numbers, and the requirement is to comply with the serial number format and length requirements in the EPS-AKA.
- Step S406 The network device generates a third AUTN according to the symmetric key K, the pseudo SQN, the second RAND, and the AMF parameters on the network device side.
- Step S407 The network device sends an authentication request to the terminal device.
- the authentication request includes: a second AND, a third--AUTN, and a key KSIASM:E.
- Step S408 The terminal device determines the pseudo SQN according to the symmetric aluminum K., the AUTN, the second RAND, and the AMF on the terminal device side.
- Step S409 The terminal device generates a resynchronization parameter AUTS according to the correct SQN, the third RAND, the AMF, and the symmetric key K on the terminal device side.
- Step S410 The terminal device sends a resynchronization message to the network device, where the resynchronization message includes a third RAND and a resynchronization parameter AUTS.
- Step S411 The network device determines the correct SQN according to the third RAND and the resynchronization parameter AUTS.
- Step S412 The network device generates a first AUTN according to the symmetric key K of the network device side, the correct SQN, and the first RAND and AMF parameters.
- Step S4B The network device sends an authentication request to the terminal device again, where the authentication request includes a first RAND, a first AUTN, and a key KSIASME.
- Step S414 The terminal device generates a second AUTN according to the symmetric key of the terminal device side: 1_, the first RANI, and the correct SQN;
- Step S415 The terminal device authenticates the network device according to the first AUTN and the second AUTN.
- Step S416 The network device receives an authentication response message sent by the terminal device, where the authentication response message includes a RES.
- Step S417 The network device generates an XRES according to the symmetric key of the network device side and the first random number.
- Step S418 The network device authenticates the terminal device according to the RES and the XRES.
- step S417 and step S412 can be combined into one step execution.
- the present application provides a network authentication method.
- the network device generates a symmetric key K according to the second device of the terminal device and the private key of the network device, and on the other hand, generates the correct SQN of the terminal device in real time through the pseudo SQN.
- the network device does not need to store the symmetric key and the correct SQN of the terminal device, but generates the symmetric key K in real time, and determines the correct SQN of the real-time generating terminal device.
- the storage load of the HSS in the prior art can be reduced, and since the network authentication is not required between the terminal device and the network device in the present application, the network authentication chain can be shortened, thereby improving the network authentication efficiency.
- FIG. 5 is an interaction flowchart of a network authentication method according to another embodiment of the present application. As shown in FIG. 5, the method includes:
- Step S501 The terminal device sends an access request message to the network device, where the message format includes: ID, network capability of the terminal device and key KSIASME.
- the network capability and key of the terminal device KSiASME are parameters in the existing EPS-AKA authentication protocol, and their meanings are the same as those in the EPS-AKA authentication protocol. I will not repeat them here. It should be noted that the key KSIASME is generated according to the symmetric key K, which is used to generate the subsequent session key.
- Step S502 The network device generates a symmetric key on the network device side according to the private key of the network device and the ID of the terminal device.
- Step S503 The network device generates a pseudo SQN.
- the pseudo SQN may be a fixed string of numbers or a randomly generated string of numbers, and the requirement is to comply with the serial number format and length requirements in the EPS-AKA.
- Step S504 The network device generates a third AUTN according to the symmetric key K:, the pseudo SQN, the ID of the network device, and the AMF parameter on the network device side.
- the ID of the network device here replaces the second random number. That is, the ID of the network device can be sent to the terminal device in this manner.
- Step S505 The network device sends an authentication request to the terminal device.
- the authentication request includes: an ID of the network device, a third AUTN, and a key KSIASME.
- Step S506 The terminal device generates a symmetric key K according to the ID of the network device and the private key of the terminal device.
- Step S507 The terminal device determines the pseudo SQN according to the symmetric key of the terminal device side: 1 _, the first; the AUTN, the ID of the network device, and the AMF.
- Step S508 The terminal device generates a resynchronization parameter AUTS according to the correct SQN, the third RAND, the AMF, and the symmetric key K on the terminal device side.
- Step The terminal device sends a resynchronization message to the network device, the reciprocal message including a third RAND and a resynchronization parameter AUTS.
- Step S510 The network device determines the correct SQN according to the first: RAND and the resynchronization parameter AUTS.
- Step S511 The network device generates the first AUTN according to the symmetric key K, the correct SQN, the first RAND, and the AMF parameters on the network device side.
- Step S512 The network device sends an authentication request to the terminal device again, where the authentication request includes a first RAND, a first AUTN, and a key KSIASME.
- Step S513 The terminal device generates a second AUTN according to the symmetric key of the terminal device side: 1_, the first RANI, and the correct SQN;
- Step S514 The terminal device authenticates the network device according to the first AUTN and the second AUTN.
- Step S515 The network device receives an authentication response message sent by the terminal device, where the authentication response message includes a RES.
- Step S516 The network device generates an XRES according to the symmetric key of the network device side and the first random number.
- Step S517 The network device authenticates the terminal device according to the RES and the XRES.
- FIG. 5 corresponds to the same steps in the embodiment and the corresponding embodiment in FIG. 3, and the explanation is not repeated here.
- step S516 and step S511 can be combined into one step execution.
- the implementation steel of the present application differs from the corresponding embodiment of FIG. 5 in that the present application uses the ID of the network device instead of the second random number, by which the ID of the network device is transmitted. This can reduce network overhead.
- FIG. 6 is a flowchart of interaction of a network authentication method according to another embodiment of the present application. As shown in FIG. 6, the method includes - Step S601: The terminal device sends an access request message to the network device, where the message format includes: an ID of the terminal device, a network capability of the terminal device, and a key KSIASME.
- the network capability and key of the terminal device KSiASME are parameters in the existing EPS-AKA authentication protocol, and their meanings are the same as those in the EPS-AKA authentication protocol. I will not repeat them here. It should be noted that the key KSIASME is generated according to the symmetric key K, which is used to generate the subsequent session key.
- Step S602 The network device generates a symmetric key of the network device side according to the public key and the ID of the terminal device.
- Step S603 The network device generates a pseudo SQN.
- the pseudo SQN may be a fixed string of numbers or a randomly generated string of numbers, and the requirement is to comply with the serial number format and length requirements in the EPS-AKA.
- Step S604 The network device generates a third AUTN according to the symmetric key K, the pseudo SQN, the second random number, and the AMF parameter on the network device side.
- Step S605 The network device sends an authentication request to the terminal device.
- the authentication request includes: a second random number, a third “-UTN”, and a key KSIASME.
- Step S606 The terminal device generates a symmetric key according to the network device: and the private key of the terminal device.
- Step S607 The terminal device is based on the symmetric key of the terminal device side, the third AUTN, the ID of the network device, and
- the AMF determines the pseudo SQN.
- Step S608 The terminal device is based on the correct SQN, the third: RAN: D, the AMF, and the symmetric aluminum on the terminal device side.
- K generates the resynchronization parameter AUTS.
- Step S609 The terminal device sends a resynchronization message to the network device, where the resynchronization message includes a third AND and resynchronization parameter AUTS.
- Step S610 The network device determines the correct SQN according to the third: RAN D and the resynchronization parameter AUTS.
- Step S61 1 The network device is based on the symmetric key K of the network device side, the correct SQN, the first RAND, and
- the AMF parameter generates the first AUTN.
- Step S612 The network device sends an authentication request to the terminal device again, where the authentication request includes a first RAND, a first AUTN, and a key KSiASME.
- Step S6B The terminal device generates a second AUTN according to the symmetric key of the terminal device side, the first RAN: D, and the correct SQN;
- Step S614 The terminal device authenticates the network device according to the first AUTN and the second A TTN.
- Step S615 The network device receives an authentication response message sent by the terminal device, where the authentication response message includes a RES.
- Step S616 The network device generates an XRES according to the symmetric key of the network device side and the first random number.
- Step S617 The network device authenticates the terminal device according to the RES and the XRES.
- FIG. 6 corresponds to the same steps in the embodiment and the corresponding embodiment in FIG. 3, and the explanation is not repeated here.
- step S616 and step S61 1 may be combined into one step execution.
- the implementation of the present application is different from the foregoing embodiment in that the network device of the present application can generate a symmetric key on the network device side by using the public key and the ID of the terminal device, that is, the network device in the present application does not need to store the symmetric key. K and the correct SQN of the terminal device, but the symmetric key K is generated in real time, which can reduce the HSS in the prior art. Storage load.
- FIG. 7 is an interaction flowchart of a network authentication method according to another embodiment of the present application. As shown in FIG. 7, the method includes:
- Step S701 The network device sends a broadcast message.
- the broadcast message includes the ID of the network device.
- Step S702 The terminal device generates a symmetric key of the terminal device side according to the network device ⁇ [) and the private key of the terminal device.
- Step S703 The terminal device sends an access request message to the network device, where the message format includes: an ID of the terminal device, a network capability of the terminal device, and a key KSIASME.
- the network capability and key of the terminal device KSiASME are parameters in the existing EPS-AKA authentication protocol, and their meanings are the same as those in the EPS-AKA authentication protocol. I will not repeat them here. It should be noted that the key KSIASME is generated according to the symmetric key K, which is used to generate the subsequent session key.
- Step S704 The network device generates a symmetric key of the network device side according to the private key of the network device and the ID of the terminal device.
- Step S705 The network device generates a first SQN according to the current time information.
- the first SQN is the correct SQN.
- Step S706 The network device is based on the symmetric key K of the network device side, the correct SQN, the first RAND, and
- AMF parameter generates first AUTNo
- Step S707 The network device sends an authentication request to the terminal device again, where the authentication request includes a first RAND, a first AUTN, and a key KS: ASME.
- Step S708 The terminal device generates a second AUTN according to the symmetric aluminum K., the first RAND, and the correct SQN on the terminal device side.
- Step S709 The terminal device authenticates the network device according to the first AUTN and the second AUTN.
- Step S710 The network device receives the authentication response message sent by the terminal device, where the authentication response message includes RES.
- Step S712 The network device authenticates the terminal device according to the RES and the XRES.
- FIG. 7 corresponds to the same steps in the embodiment and the corresponding embodiment in FIG. 3, and the explanation is not repeated here.
- step S711 and step S706 can be combined into one step execution.
- the present application provides a network authentication method.
- the network device generates a symmetric key according to the ⁇ [) of the terminal device and the private key of the network device: on the other hand, generates a first SQN based on the current time information, and the first SQN That is, the correct SQN of the terminal device. That is to say, the network device in the present application does not need to store the symmetric key K and the correct SQN of the terminal device, but generates the symmetric key K in real time and determines the correct SQN of the real-time generating terminal device.
- the storage load of the HSS in the prior art can be reduced, and the network authentication chain can be shortened, so that the network authentication efficiency can be improved, because the device does not need to perform network authentication between the terminal device and the network device in this application.
- FIG. 8 is an interaction flowchart of a network authentication method according to another embodiment of the present application. As shown in FIG. 8, the method includes: Step S801: A terminal device sends an access request message to a network device, where the message is sent.
- the format includes: 11) of the terminal device, network capability of the terminal device, and key KS: IASME.
- the network capability and key of the terminal device KSIASME are parameters in the existing EPS-AKA authentication protocol, and their meanings are the same as those in the EPS-AKA authentication protocol. I will not repeat them here. It should be noted that the key KSIASME is generated according to the symmetric key K, which is used to generate the subsequent session key.
- Step S802 The network device generates a symmetric aluminum ⁇ on the network device side according to the public aluminum and the terminal device D.
- Step S803 The network device generates a first SQN according to the current time information.
- the first SQN is the correct SQN.
- Step S804 The network device generates the first AUTN according to the symmetric key K, the correct SQN, the first RAND, and the AMF parameters on the network device side.
- Step S805 The network device sends an authentication request to the terminal device, where the authentication request includes the first RAND, the first
- Step S806 The terminal device generates a second AUTN according to the symmetric key of the terminal device side: 1_, the first RANI, and the correct SQN;
- Step S807 The terminal device authenticates the network device according to the first AUTN and the second AUTN.
- Step S808 The network device receives an authentication response message sent by the terminal device, where the authentication response message includes a RES.
- Step S809 The network device generates an XRES according to the symmetric key of the network device side and the first random number.
- Step S810 The network device authenticates the terminal device according to the RES and the XRES.
- step S809 and step S804 can be combined into one step execution.
- the present application provides a network authentication method.
- the network device generates a symmetric key K according to the public key and the private key of the network device, and on the other hand, generates a first SQN based on the current inter-information, and the first SQN is the terminal.
- the correct SQN of the device That is to say, in the present application, the network device does not need to store the symmetric key K and the correct SQN of the terminal device, but generates a symmetric key in real time; and determines the correct SQN of the real generated terminal device. Therefore, the storage load of the HSS in the prior art can be reduced, and since the network authentication is not required between the terminal device and the network device in the application, the network authentication chain can be shortened, thereby improving the network authentication efficiency.
- FIG. 9 is a schematic structural diagram of a network authentication apparatus according to an embodiment of the present disclosure.
- the apparatus includes: an obtaining module 901, a first generating module 902, a second generating module 903, a determining module 904, and a first The UI generation module 905, the transmission module 906, the reception module 907, and the fourth generation module 908.
- the obtaining module 901 is configured to acquire an identity of the terminal device.
- the first generation module 902 is configured to generate a symmetric key of the network device side according to the identity of the terminal device and the first key of the network device: the second generation module 903 is configured to generate a first serial number for the terminal device; 904, wherein the correct serial number of the terminal device is determined according to the first serial number; the third generating module 905 is configured to use, according to the symmetric key of the network device side, the correct serial number, the first random number, and the network device as the terminal device.
- the configured authentication management domain parameter generates a first authentication token, where the authentication management domain parameter is used to define a parameter involved in the network authentication process of the terminal device, and the sending module 906 is configured to the terminal device.
- the receiving module 907 is configured to receive an authentication response message sent by the terminal device: where the authentication response message includes the first authentication parameter, where the first authentication parameter is generated by the first authentication parameter. And generating, according to the first random number and the symmetric key of the terminal device, a fourth generation module 908, configured to generate a second authentication parameter according to the symmetric key of the network device side and the first random number; according to the first authentication parameter and the second Authentication parameter authentication terminal equipment.
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first sequence number is a pseudo sequence number of the terminal device.
- the determining module 904 is specifically configured to generate, according to the symmetric key, the pseudo sequence number, the second random number, and the authentication management domain parameter of the network device side.
- the sending module 906 is further configured to send the second random number and the third: the third authentication token, so that the terminal device is based on the symmetric key of the terminal device side, the third authentication token, the second random number, and
- the authentication management domain parameter determines a pseudo serial number
- the receiving module 907 is further configured to receive a resynchronization message sent by the terminal device; the resynchronization message includes a resynchronization parameter and a third random number; and the determining module 904 is specifically configured to use the resynchronization parameter and The third random number determines the correct serial number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter, so that the terminal device generates the terminal device side according to the identity identifier of the network device and the private key of the terminal device. Symmetric key.
- the sending module 906 is further configured to send a broadcast message, where the broadcast message includes an identity of the network device, so that the terminal device according to the identity of the network device and the private device of the terminal device The key generates a symmetric key on the terminal device side.
- the present application provides a network authentication device, which can be used to perform the method steps performed by the foregoing network device, and the implementation principle and technical effects thereof are similar, and details are not described herein again.
- Figure! 0 is a schematic structural diagram of a network authentication apparatus according to another embodiment of the present application.
- the apparatus includes: a sending module 1001, a receiving module 1002, a first bowling module 1003, and a first generating module 1004.
- the sending module 1001 is configured to send the identity identifier of the terminal device to the network device, so that the network device generates a symmetric key of the network device according to the identity identifier of the terminal device and the first key of the network device, and the receiving module 1002 uses Receiving the first random number and the first authentication token sent by the network device: where the first authentication token is a symmetric key of the network device according to the network device side, a correct serial number of the terminal device, a first random number, and The network device is generated by the authentication management domain parameter configured by the terminal device; the authentication management domain parameter is used to define parameters involved in the network authentication process of the terminal device; the first determining module 1003 is configured to use the first authentication token and the terminal device side.
- the symmetric key, the first random number, and the authentication management domain parameter determine the correct serial number; the first generating module 1004 is configured to use the symmetric key, the first random number, the correct serial number, and the authentication management domain according to the terminal device side
- the parameter generates a second authentication token;
- the authentication module 1005 is configured to: pair the network device according to the first authentication token and the second authentication token
- the second generation module 1006 is configured to generate a first authentication parameter according to the first random number and the symmetric key of the terminal device.
- the sending module 1001 is further configured to send an authentication response message to the network device, where the authentication response message is sent. Including the first authentication parameter; wherein, the first recognition
- the certificate parameters are used by the network device to authenticate the terminal device.
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the correct serial number is determined by the network device by the first serial number.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first sequence number is a pseudo sequence number of the terminal device; the receiving module 1002 is further configured to receive a second random number and a third authentication token sent by the network device, where the third authentication token is a network device according to the network device
- the symmetrical aluminum, the pseudo-sequence number, the second random number, and the authentication management domain parameter are generated on the network device side;
- the second determining module 1007 is configured to use the symmetric key, the third authentication token, and the second random according to the terminal device side
- the number and the authentication management domain parameter determine the pseudo-sequence number;
- the third generation module 1008 is configured to generate a re-synchronization parameter according to the correct serial number, the third random number, the authentication management domain parameter, and the symmetric key of the terminal device side: the sending module 1001 And sending a resynchronization message to the network device, where the resynchronization message includes a resynchronization parameter and a third random number, so that the network device determines the correct sequence number according to the resynchronization
- the identity of the network device is a second random number; or the identity of the network device is carried in the authentication management domain parameter; the fourth generation module 1009 is configured to generate, according to the identity of the network device and the private key of the terminal device Symmetric key on the terminal device side.
- the receiving module 1002 is further configured to receive a broadcast message sent by the network device, where the broadcast message includes an identity of the network device, and the fourth generation module 1009 is configured to use the network device.
- the identity key and the private key of the terminal device generate a symmetric key on the terminal device side.
- the present application provides a network authentication device, which can be used to perform the method steps performed by the foregoing terminal device, and the implementation principle and technical effects thereof are similar, and details are not described herein again.
- the network device includes: a processor 1101, a receiver 1102, a transmitter 1 103, and a memory 1104.
- the storage code is stored in the code.
- the processor 1101 is configured to acquire an identity identifier of the terminal device, and generate a symmetric key of the network device side according to the identity identifier of the terminal device and the first key of the network device.
- the authentication management domain parameter generates a first authentication token, where the authentication management domain parameter is used to define a parameter involved in the network authentication process of the terminal device, and the sender 1103 is configured to send the first random number and the first authentication to the terminal device.
- the token is configured to enable the terminal device to authenticate the network device according to the first authentication token and the second authentication token: wherein the second authentication token is a symmetric key of the terminal device according to the terminal device side, the first random number, and the correct The serial number and the authentication management domain parameter are generated; the receiver 1 102 is configured to receive the sending by the terminal device
- the authentication response message includes: a first authentication parameter; the first authentication parameter is generated according to the first random number and the symmetric key on the terminal device side; the processor 101 is further configured to use the symmetric key and the network device side Generating a second authentication parameter by a random number; and authenticating the terminal device according to the first authentication parameter and the second authentication parameter.
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the first sequence number is a sequence number generated by the network device according to the current time information; where, the first sequence The number is the same as the correct serial number.
- the first sequence number is a pseudo sequence number of the terminal device.
- the processor 1101 is configured to generate, according to the symmetric key, the pseudo sequence number, the second random number, and the authentication management domain parameter, on the network device side. a third authentication token; the sender 1103 is further configured to send the second random number and the third authentication token, so that the terminal device performs the symmetric key according to the terminal device side, the king authentication token, the second random number, and the authentication management.
- the domain parameter determines the pseudo-sequence number; the receiver is used to receive the re-sent message sent by the terminal device; the re-synchronization message includes the re-synchronization parameter and the third random number; the processor 1101 is specifically configured to use the re-synchronization parameter And the third random number determines the correct serial number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter, so that the terminal device generates the terminal device side according to the identity identifier of the network device and the private key of the terminal device. Symmetric key.
- the sender 1103 is further configured to send a broadcast message, where the broadcast message includes an identity of the network device, so that the terminal device according to the identity of the network device and the private device of the terminal device The aluminum generates a symmetric key on the terminal side.
- the present application provides a network device, which can be used to perform the method steps performed by the network device, and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 12 is a schematic structural diagram of a terminal device according to another embodiment of the present disclosure.
- the terminal device includes: a transmitter 1201, a receiver 202, and a processor 1203 and a memory 204; wherein the memory 1204 is used.
- the code is stored, when the code is executed by the processor 1203, to implement the method flow executed by the terminal device.
- the sender 1201 is configured to send the identity identifier of the terminal device to the network device, so that the network device generates a symmetric key of the network device side according to the identity identifier of the terminal device and the first key of the network device; the receiver 1202, And a first authentication token sent by the network device, where the first authentication token is a symmetric key of the network device according to the network device side, a correct serial number of the terminal device, a first random number, and The network device is generated by the authentication management domain parameter configured by the terminal device; the authentication management domain parameter is used to define parameters involved in the network authentication process of the terminal device; and the processor 1203 is configured to: be symmetric according to the first authentication token and the terminal device side The dense aluminum, the first random number and the authentication management domain parameter determine a correct serial number; generate a second authentication token according to the symmetric key of the terminal device side, the first random number, the correct serial number, and the authentication management domain parameter; An authentication token and a second authentication token authenticate the network device; according to the first random
- the first key is a private key of the network device; or the first key is a public key corresponding to the multiple terminal devices of the terminal device.
- the correct serial number is determined by the network device by the first serial number.
- the first sequence number is a sequence number generated by the network device according to the current time information; where the first sequence number is the same as the correct sequence number.
- the first sequence number is a pseudo sequence number of the terminal device; the receiver 1202 is further configured to receive the second random number and the third: third authentication token sent by the network device, where the third authentication token is a network
- the device is generated according to the symmetric key of the network device side, the pseudo sequence number, the second random number, and the authentication management domain parameter.
- the processor 1203 is further configured to: according to the symmetric key of the terminal device side, the third authentication token, and the third The second random number and the authentication management domain parameter determine the pseudo serial number; generate a resynchronization parameter according to the correct serial number, the third: the random number, the authentication management domain parameter, and the symmetric key of the terminal device side;
- the transmitter 1201 is further configured to send a resynchronization message to the network device: where the resynchronization message includes a resynchronization parameter and a third-third random number, so that the network device determines the correct sequence number according to the resynchronization parameter and the random number.
- the identifier of the network device is a second random number; or the identifier of the network device is carried in the authentication management domain parameter; the processor 1203 is further configured to generate the terminal according to the identity identifier of the network device and the private key of the terminal device. Symmetric key on the device side.
- the receiver 1202 is further configured to receive a broadcast message sent by the network device, where the broadcast message includes an identity of the network device, and the processor 1203 is further configured to: according to the network device The identity key and the private key of the terminal device generate a symmetric key on the terminal device side.
- the present application provides a terminal device, which can be used to perform the method steps performed by the terminal device, and the implementation principle and technical effects are similar, and details are not described herein again.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
本申请提供一种网络认证方法、网络设备及终端设备,与现有EPS-AKA协议中的网络认证过程不同的是:本申请中,一方面网络设备自己生成对称密钥,另一方面通过第一序列号实时生成终端设备正确的序列号。也就是说,本申请中网络设备无需存储对称密钥以及终端设备正确的序列号,而是实时生成对称密钥,以及确定实时生成终端设备正确的序列号。从而可以降低现有技术中HSS的存储负载,并且由于本申请中终端设备和网络设备之间无需MME等设备进行网络认证,从而可以缩短网络认证链条,进而提高网络认证效率。
Description
网络认证方法、 网络设备及终端设备 技术领域
本申请涉及通信技术领域, 尤其涉及一种网络认证方法、 网络设备及终端设备。 背景技术
物联网 (Internet of Things, ΙοΤ) 是第五代移动通信技术 ( 5th- Generation, 5G) 的 重要应用场景, ΙοΤ中的终端设备接入到 5G网络需要进行网络认证, 图 1为现有技术中 终端设备进行网络认证的交互示意图, 认证过程如下- 步骤 S101 : 终端设备向移动性管理实体 (Mobility Management Entity, MME) 发送入 网请求。 步骤 S102: 该 MME向归属签约服务器 (Home Subscriber Server, HSS)发送入网 数据请求。步骤 S103:该 HSS接收该入网数据请求并确定该终端设备对应的对称密钥 K; 其中该对称密钥存储在 HSS中, 然后根据该对称密钥 K计算认证向量, 该认证 量包括 认证令牌 (Authentication Token, AUTNHSS) , 期待响应(Expected Response, XRES)和 接入安全管理密钥 (Key Access Security Management Entity, KASME) 。 步骤 S104: 该 HSS将该认证向量发送给 MME。步骤 S105:该 MME接收并保存该认证向量。步骤 S106: 该 MME向终端设备发起用户认证请求, 该用户认证请求包括随机数 RAM:)、 AUTNHSS 和 KASME。 步骤 S107: 该终端设备接收该 RAND和 AUTNHSS, 并利用演进分组系统 (Evolved Packet System, EPS) 第三代移动通讯网络的认证与密钥协商协议(Authentkation and Key Agreement, AKA)密钥推演算法进行运算, 运算的输入参数包括终端设备的对称 密钥 K:, RAND,服务网络 (Serving Network, SN)标识,终端设备的序列号 (Sequence Number, SQN),运算的输出参数包括用.户侧认证令牌 AUTNUE,响应(Response, RES)和 KASME。 步骤 S108:该终端设备在确认 A TTNUE和 A TTNHSS相同时根据 KASME生成该终端设 备与网络侧的会话密钥。步骤 S109:该终端设备向 MME发送运算得到的 RES。步骤 S 】( 该 MME接收该 RES,并在确认接收到的 RES和该认证向量中的 XRES相同日 T根据 KASME 生成网络侧与该终端设备之间的会话密钥。
现有技术的缺陷在于, ίοΤ中存在海量的终端设备需要与 HSS之间进行网络认证, 因 此 HSS中需要存储每个终端设备对应的对称密钥以及 SQN。 一方面, 这种集中式存储给 HSS造成了严重的负载压力; 另一方面, 该网络认证过程需要终端设备、 MME和 HSS三 者之间的交互才能实现, 造成网络认证链条较长, 从而导致网络认证效率的问题。 发明内容
本申请提供一种网络认证方法、 网络设备及终端设备。从而可以降低现有技术中 HSS 的存储负载,并 ϋ由于本申请中终端设备和网络设备之间无需 MME等设备进行网络认证, 从而可以缩短网络认证链条, 进而提高网络认证效率。
第一方面,本申请提供一种网络认证方法,包括:网络设备获取终端设备的身份标识; 网络设备根据终端设备的身份标识和网络设备的第一密钥生成网络设备侧的对称密钥; 网 络设备为终端设备生成第一序列号; 网络设备根据第一序列号确定终端设备的正确的序列
号; 网络设备根据网络设备侧的对称密钥、 正确的序列号、 第一随机数和网络设备为终端 设备配置的认证管理域参数生成第一认证令牌; 其中, 认证管理域参数用于限定终端设备 在网络认证过程中涉及的参数; 网络设备向终端设备发送第一隨机数和第一认证令牌; 以 使终端设备根据第一认证令牌和第二认证令牌对网络设备进行认证; 其中, 第二认证令牌 是终端设备根据终端设备侧的对称密钥、 第一随机数、 正确的序列号和认证管理域参数生 成的; 网络设备接收终端设备发送的认证响应消息; 其中, 认证响应消息包括第一认证参 数; 第一认证参数根据第一随机数和终端设备侧的对称密钥生成; 网络设备根据网络设备 侧的对称密钥和第一随机数生成第二认证参数; 网络设备根据第一认证参数和第二认证参 数认证终端设备。
本申请有益效果是: 一方面网络设备自己生成对称密钥, 另一方面通过第一序列号实 时生成终端设备正确的序列号。 也就是说, 本申请中网络设备无需存储对称密钥以及终端 设备正确的序列号, 而是实时生成对称密钥, 以及确定实时生成终端设备正确的序列号。 从而可以降低现有技术中 HSS 的存储负载, 并 ϋ由于本申请中终端设备和网络设备之间 无需 ΜΜΕ等设备进行网络认证, 从而可以缩短网络认证链条, 进而提高网络认证效率。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
即通过这两种第一密钥可以有效生成或者推演出网络设备侧的对称密钥。从而无需存 储对称密钥, 从而可以降低 HSS的存储负载。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 相应的, 网络设备根据第一序列号确定 终端设备的正确的序列号, 包括: 网络设备根据网络设备侧的对称密钥、 伪序列号、 第二 随机数和认证管理域参数生成第:三认证令牌: 网络设备向终端设备发送第二随机数和第 Ξ: 认证令牌, 以使终端设备根据终端设备侧的对称密钥、 第-三认证令牌、 第二随机数和认证 管理域参数确定 序列号; 网络设备接收终端设备发送的重同步消息; 重同步消息包括重 同步参数和第三随机数; 网络设备根据重同步参数和第三随机数确定正确的序列号。
即通过这两种方式可以有效确定终端设备的正确的序列号,从而无需存储终端设备的 正确的序列号, 进而可以降低 HSS的存储负载。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中, 以使终端设备根据网络设备的身份标识和终端设备的私钥生成终端设备倒的 对称密钥。
即本申请利用网络设备的身份标识代替第二随机数;或者将网络设备的身份标识携带 在认证管理域参数中, 通过这两种方式可传输网络设备的身份标识。从而可以降低网络幵 销。
可选地,该方法还包括:当网络设备为接入网设备时,网络设备发送广播消息;其中, 广播消息包括网络设备的身份标识, 以使终端设备根据网络设备的身份标识和终端设备的 私钥生成终端设备倒的对称密钥。
下面对终端设备执行的网络认证方法进行介绍,其实现原理和技术效果与上述原理和 技术效果类似, 此处不再赘述。
第二方面, 本申请提供一种网络认证方法, 包括: 终端设备 网络设备发送终端设备 的身份标识; 以使网络设备根据终端设备的身份标识和网络设备的第一密钥生成网络设备 侧的对称密钥; 终端设备接收网络设备发送的第一随机数和第一认证令牌; 其中, 第一认 证令牌是网络设备根据网络设备侧的对称密钥、 终端设备的正确的序列号、 第一随机数和 网络设备为终端设备配置的认证管理域参数生成的;认证管理域参数用于限定终端设备在 网络认证过程中涉及的参数; 终端设备根据第一认证令牌、 终端设备侧的对称密钥、 第一 随机数和认证管理域参数确定正确的序列号; 终端设备根据终端设备侧的对称密钥、 第一 随机数、 正确的序列号和认证管理域参数生成第二认证令牌; 终端设备根据第一认证令牌 和第二认证令牌对网络设备进行认证;终端设备根据第一随机数和终端设备侧的对称密钥 生成第一认证参数; 终端设备向网络设备发送认证响应消息; 其中, 认证响应消息包括 第一认证参数; 其中, 第一认证参数用于网络设备对终端设备进行认证。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 正确的序列号是网络设备通过第一序列号确定的。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 该方法还包括: 终端设备接收网络设备 发送的第二随机数和第三认证令牌; 其中, 第三认证令牌是网络设备根据网络设备侧的对 称密铝、 伪序列号、 第二随机数和认证管理域参数生成的; 终端设备根据终端设备侧的对 称密钥、 第三认证令牌、 第二随机数和认证管理域参数确定伪序列号; 终端设备根据正确 的序列号、 第三随机数、 认证管理域参数和终端设备侧的对称密钥生成重同步参数; 终端 设备向网络设备发送重同步消息; 其中, 重同步消息包括重同步参数和第 Ξ:随机数, 以使 网络设备根据重同步参数和第三随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中; 该方法还包括: 终端设备根据网络设备的身份标识和终端设备的私钥生成终 端设备侧的对称密钥。
可选地, 该方法还包括: 当网络设备为接入网设备时, 终端设备接收网络设备发送的 广播消息; 其中, 广播消息包括网络设备的身份标识; 终端设备根据网络设备的身份标识 和终端设备的私钥生成终端设备倒的对称密钥。
下面将介绍网络设备,该网络设备可以用于执行第一方面及第一方面对应的可选方式 其实现原理和技术效果类似, 此处不再赘述。
第三方面, 本申请提供一种网络设备, 包括: 处理器、 接收器、 发送器和存储器; 其 中, 存储器中存储有代码, 当该代码被处理器运行时, 该终端设备会执行第一方面或第一 方面任一所述的方法。 具体地, 处理器用于获取终端设备的身份标识: 根据终端设备的身 份标识和网络设备的第一密钥生成网络设备侧的对称密钥; 为终端设备生成第一序列号; 根据第一序列号确定终端设备的正确的序列号; 根据网络设备倒的对称密钥、 正确的序列 号、 第一随机数和网络设备为终端设备配置的认证管理域参数生成第一认证令牌; 其中, 认证管理域参数用于限定终端设备在网络认证过程中涉及的参数; 发送器, 用于向终端设
备发送第一随机数和第一认证令牌: 以使终端设备根据第一认证令牌和第二认证令牌对网 络设备进行认证; 其中, 第二认证令牌是终端设备根据终端设备侧的对称密钥、 第一随机 数、 正确的序列号和认证管理域参数生成的; 接收器, 用于接收终端设备发送的认证响应 消息; 其中, 认证响应消息包括第一认证参数: 第一认证参数根据第一随机数和终端设备 侧的对称密钥生成;处理器还用于根据网络设备侧的对称密钥和第一隨机数生成第二认证 参数; 根据第一认证参数和第二认证参数认证终端设备。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 相应的, 处理器, 具体用于根据网络设 备侧的对称密钥、 伪序列号、 第二随机数和认证管理域参数生成第三.认证令牌; 发送器, 还^于发送第二随机数和第 认证令牌, 以使终端设备根据终端设备侧的对称密钥、 第≡ 认证令牌、 第二随机数和认证管理域参数确定伪序列号; 接收器, 还用于接收终端设备发 送的重同步消息; 重同步消息包括重同步参数和第三随机数; 处理器, 具体用于根据重同 步参数和第三随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中, 以使终端设备根据网络设备的身份标识和终端设备的私钥生成终端设备侧的 对称密钥。
可选地, 当网络设备为接入网设备时, 发送器还^于发送广播消息; 其中, 广播消息 包括网络设备的身份标识, 以使终端设备根据网络设备的身份标识和终端设备的私钥生成 终端设备侧的对称密钥。
下面将介绍终端设备,该终端设备可以用于执行第二方面及第二方面对应的可选方式 其实现原理和技术效果类似, 此处不再赘述。
第四方面, 本申请提供一种终端设备, 包括: 发送器、 接收器、 存储器和处理器; 其 中, 存储器中存储有代码, 当该代码被处理器运行时, 该终端设备会执行第二方面或第二 方面任一所述的方法。 具体的, 发送器, 用于向网络设备发送终端设备的身份标识; 以使 网络设备根据终端设备的身份标识和网络设备的第一密钥生成网络设备侧的对称密钥;接 收器, 用于接收网络设备发送的第一随机数和第一认证令牌; 其中, 第一认证令牌是网络 设备根据网络设备侧的对称密钥、 终端设备的正确的序列号、 第一随机数和网络设备为终 端设备配置的认证管理域参数生成的; 认证管理域参数 ^于限定终端设备在网络认证过程 中涉及的参数; 处理器用于: 根据第一认证令牌、 终端设备侧的对称密钥、 第一随机数和 认证管理域参数确定正确的序列号; 根据终端设备侧的对称密钥、 第一随机数、 正确的序 列号和认证管理域参数生成第二认证令牌;根据第一认证令牌和第二认证令牌对网络设备 进行认证; 根据第一随机数和终端设备侧的对称密钥生成第一认证参数; 发送器, 还用于 向网络设备发送认证响应消息; 其中, 认证响应消息包括第一认证参数; 其中, 第一认证 参数用于网络设备对终端设备进行认证。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 正确的序列号是网络设备通过第一序列号确定的。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正碗的序列号相同。
可选地, 第一序列号为终端设备的伪序列号: 接收器, 还用于接收网络设备发送的第 二随机数和第:三认证令牌; 其中, 第:三认证令牌是网络设备根据网络设备侧的对称密钥、 伪序列号、 第二随机数和认证管理域参数生成的; 处理器还用于: 根据终端设备侧的对称 密钥、 第三认证令牌、 第二隨机数和认证管理域参数确定伪序列号; 根据正确的序列号、 第-三随机数、 认证管理域参数和终端设备侧的对称密钥生成重同步参数; 发送器, 还用于 向网络设备发送重同步消息; 其中, 重同步消息包括重同步参数和第≡随机数, 以使网络 设备根据重同步参数和第三随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中; 处理器, 还用于根据网络设备的身份标识和终端设备的私钥生成终端设备侧 的对称密铝。
可选地, 当网络设备为接入网设备时, 接收器还用于接收网络设备发送的广播消息; 其中, 广播消息包括网络设备的身份标识; 处理器, 还用于根据网络设备的身份标识和终 端设备的私钥生成终端设备侧的对称密钥。
第五方面, 本申请提供一种计算机存储介质, ^于储存为上述网络设备所用的计算机 软件指令, 其包含用于执行上述第一方面所设计的程序。
第六方面, 本申请实施^提供一种计算机存储介质, 用于储存为上述终端设备所用的 it算机软件指令, 其包含用于执行上述第二方面所设计的程序。
第七方面, 本申请提供一种计算机程序产品, 其包含指令, 当所述计算机程序被计算 机所执行时, 该指令使得计算机执行上述第一方面及可选方法中网络设备所执行的功能。
第八方面, 本申请提供一种计算机程序产品, 其包含指令, 当所述计算机程序被计算 机所执行时, 该指令使得计算机执行上述第二方面及可选方法中终端设备所执行的功能。
本申请提供一种网络认证方法、 网络设备及终端设备, 该方法包括: 网络设备获取终 端设备的身份标识; 网络设备根据终端设备的身份标识和网络设备的第一密钥生成网络设 备侧的对称密钥; 网络设备为终端设备生成第一序列号; 网络设备根据第一序列号确定终 端设备的正确的序列号; 网络设备根据网络设备侧的对称密钥、 正确的序列号、 第一随机 数和网络设备为终端设备配置的认证管理域参数生成第一认证令牌; 其中, 认证管理域参 数用于限定终端设备在网络认证过程中涉及的参数; 网络设备向终端设备发送第一随机数 和第一认证令牌; 以使终端设备根据第一认证令牌和第二认证令牌对网络设备进行认证: 其中, 第二认证令牌是终端设备根据终端设备侧的对称密钥、 第一随机数、 正确的序列号 和认证管理域参数生成的; 网络设备接收终端设备发送的认证响应消息; 其中, 认证响应 消息包括第一认证参数; 第一认证参数根据第一隨机数和终端设备侧的对称密钥生成; 网 络设备根据网络设备侧的对称密钥和第一随机数生成第二认证参数: 网络设备根据第一认 证参数和第二认证参数认证终端设备。 一方面网络设备自己生成对称密钥, 另一方面通过 第一序列号实 生成终端设备正确的序列号。 也就是说, 本申请中网络设备无需存储对称 密钥以及终端设备正确的序列号, 而是实时生成对称密钥, 以及确定实时生成终端设备正 确的序列号。 认而可以降低现有技术中 HSS 的存储负载, 并 ϋ由于本申请中终端设备和
网络设备之间无需 MME等设备进行网络认证, 从而可以缩短网络认证链条, 进而提高网 络认证效率。
^图说明
图 1为现有技术中终端设备进行网络认证的交互示意图;
图 2为未来的移动通信的网络架构的示意图;
图 3为本申请一实施例提供的一种网络认证方法的交互流程图;
图 4为本申请另一实施例提供的一种网络认证方法的交互流程图;
图 5为本申请再一实施例提供的一种网络认证方法的交互流程图;
图 6为本申请又一实施例提供的一种网络认证方法的交互流程图:
图 7为本申请再一实施例提供的一种网络认证方法的交互流程图;
图 8为本申请再一实施例提供的一种网络认证方法的交互流程图;
图 9为本申请一实施倒提供的一种网络认证装置的结构示意图;
图!0为本申请另一实施例提供的一种网络认证装置的结构示意图:
图 11为本申请一实施例提供的一种网络设备的结构示意图;
图 2为本申请另一实施例提供的一种终端设备的结构示意图。 具体实施方式
本申请涉及到的终端设备可以被称为物联网 (Internet of thing, ΙοΤ)设备, 该终端设备 可以为电脑、 手机、 打印机、 ¾箱、 机器人、 传感器、 电表、 水表等等可以接入到 ΙοΤ中 的终端设备。
本申请涉及到的网络设备是可以与终端设备进行网络认证的设备。该网络设备可以是 接入网设备,例如可以是全球移动通讯(Globai System of Mobile communication,简称 GSM) 或码分多址( Code Division Multiple Access,简称 CDMA)中的基站( Base Transceiver Station, 简称 BTS) 中, 也可以是宽带码分多址 (Wideband Code Division Multiple Access, 筒称 WCDMA) 中的基站 (NodeB, 简称 NB) , 还可以是长期演进 (Long Term Evolution, LTE) 网络中的演进型基站 (evolved NodeB, 简称 eNB ) , 接入点 (Access Poin AP) 或者中继站,也可以是 5G网络或者新一代无线接入技术(New Radio Access Technology, NR) 中的基站等, 在此不作限定。 该网络设备还可以是核心网设备, 例如: 可以是 MME 或者是认证安全单元 (Authentication Security Fimci ion, AUSF) 等。
需要说明的是, 该网络设备可以是任何具有认证单元 (Authentication Uriii ,, 或 Authentication Function, AU或 AF) 的设备。 下面以本申请应用于未来的移动通信的网络 架构为例, 对网络设备所在位置进行详细说明- 图 2为未来的移动通信的网络架构的示意图。 其中:
终端设备通过接入网 (Access Netwo A, AN) 接入运营商网络。 A 中包括基站。 运营商网络中包括:
移动性管理 (Mobiiity Management, MM) 网元。
会话管理网元 (Session Management , SM) , 用于执行会话、 切片、 流 flow或者承 载 bearer的建立和管理。
认证单元 AU或 AF,用于与终端设备之间执行双向网络认证。 AU可以作为一个独立 的逻辑功能实体单独部署, 也可以部署在 MM或者 SM的内部, 即 MM或者 SM扮演 AU 的角色。 当然, 还可以部署在 AN中的基站上, 本申请对此不做限制。 当 AU部署在 MM 中时, MM即为上述的网络设备。 当 AU部署在 SM中时, SM即为上述的网络设备。 当 AU部署在基站中 , 基站即为上述的网络设备。
运营商的服务器节点, 或者归属用户服务器, 包括运营商的 AAA 服务器 (Ai】ihentication、 Authorization, Accounting server, 验证、 授权禾口记账,服-务器) , 或者归 属用户服务器 (Home Subscriber Server, HSS) 、 或者认证中心 (Authentication Centre, AuC) 服务器、 或者用户注册信息中心 (subscnber repository) 。
策略控制 (Policy control) 网元, 用于策略的协商。
密钥管理中心 (Key Management System, KMS) , 负责密钥的生成、 管理和协商, 支持合法监听。 KMS 可以作为一个独立的逻辑功能实体单独部署, 也可以部署在 AU、 MM或者 SM的内部, 即 AU、 MM或者 扮演 KMS的角色。
网关, 又称为用户面网关 (User Plane-Gateway, UP-GW) , 用于连接运营商网络和 数据网络 (Data Network, DN) 。 A 也可通过 GW与 DN相连。
:DN服务器, 包括应用服务器或者业务服务器等。 可部署在运营商网络内部, 也可部 署在运营商网络外部。
需要说明的是, 图 2中体现的是各个网元之间的逻辑关系, 在实际中, MM、 AU以 及 SM可以单独部署 ' 也可以至少两两集成部署在一个实体中。 例如, SM和 MM部署在 一个实体中, 单独部署; 或者 SM与 AU部署在一个实体中, MM单独部署。
值得一提的是,本申请不限于上述未来网络架构中的网络认证,它还可以应用于 2G、 3G、 4G、 5G、 NR以及无线保真 (Wireless Fideiity, Wi-Fi) 网络中的任何具有网络认证 的应用场景。
为了解决现有技术存在的如下问题: 集中式存储给 HSS造成了严重的负载压力, 另 一方面, 该网络认证过程需要终端设备、 MME和 HSS三者之间的交互才能实现, 造成网 络认证链条较长, 从而导致网络认证效率的问题。 本申请提供一种网络认证方法、 网络设 备及终端设备。
具体地,图 3为本申请一实施钢提供的一种网络认证方法的交互流程图,如图 3所示, 该方法包括:
步骤 S301 : 网络设备获取终端设备的身份标识 (Identity, ID) 。
终端设备的 ID可以是媒体访问控制 (Media Access Control, MAC) 地址、 网络协议 (Internet Protocol, IP)地址、手机号码、国际移动设备标识( international Mobile Equipment Identity, IMEI)、 国际移动用户识别码(Intematiotia〖 Mobile Subscriber Identity, IMSI) 、 IP多媒体私有标识(IP Multimedia Private Identity, IMPI)、临时移动用户标识符(Temporary Mobile Subscriber Identity, TMSI)、IP多媒体公共标识(IP Multimedia Public Identity, IMPU) , 全球唯一临时 UE标识 (Globally Unique Temporary UE Identity, (31ΓΠ)等等。 只要是可以 唯一标识终端设备的标识都可以作为终端设备的 ID。 本申请对此不做限制。
步骤 S302: 网络设备根据终端设备的 ID和网络设备的第一密钥生成网络设备侧的对 称密铝 K。
其中, 网络设备侧的对称密钥 κ为网络设备和终端设备之间的对称密钥。
本申请存在两种生成网络侧设备的对称密钥的可选方式:
一种可选方式: 第一密钥为网络设备的私钥。 其中网络设备基于身份的密码机制
( Identity-Based Cryptography, IBC) 生成网络侧设备的对称密钥 K。
具体地, 基于: IBC包括基于身份的签名技术 ( Identity Based Signature, IBS) 和基于 身份的加密技术(Identity Based Encryption, IBE ) 。 终端设备和网络设备都拥有自己的公 私钥对, 其中公钥为有意义的字符串 (身份) , 例如 Email地址、 电话号码等; 私钥由私 钥生成中心 (Private Key Generator, PKG )根据设备的 ID和 PKG的主私钥生成。 而网络 侧设备的对称密钥 K通过自己的私钥和终端设备的 II)生成的。 同样的, 终端设备的对称 密钥 K通过自己的私钥和网络设备的 ID生成的。 而如何根据自己的私钥和对方的 ID生 成对称密钥 K可以采用现有技术基亍配对, 或者使用基于 RFC 6507的 IBS密码技术及其 在橢圆曲线群上进行静态的 Dffie- Heilemaii等算法。 本申请对此不做限制。
另一种可选方式: 第一密钥为包括所述终端设备的多个终端设备对应的公共密钥。 网 络设备可以根据该公共密钥以及该终端设备的 ID推演出所述网络设备侧的对称密钥 K。 需要强调的是,网络设备可以与多个终端设备建立有网络认证关系。而针对每个终端设备, 网络设备侧都具有唯一对应的对称密钥 Κ:。因此, 网络设备根据公共密钥和终端设备 Α的 ί[)推演出的是终端设备 A和网络设备之间, 网络设备侧的对称密钥 。 而如何根据公共 密钥和对方的 ID生成对称密钥 K可以采用现有技术的相关算法。 本申请对此不做限制。
步骤 S303 : 网络设备为终端设备生成第一序列号 (Sequence Number, SQN) 。
步骤 S304: 网络设备根据第一 SQN确定终端设备的正确的 SQN。
结合步骤 S303和步骤 S304进行说明:
在步骤 S303中存在两种生成第一 SQN的可选方式:
一种可选方式: 第一 SQN为网络设备根据当前的时间信息生成的 SQN。 其中, 网络 设备和终端设置之间时间同步。 由于时间信息具有唯一性, 因此该第一 SQN与歩骤 S204 中所述正确的 SQN—定相同。
另一种可选方式: 第一 SQN为终端设备的伪 SQN。 其中该伪 SQN可以是一个圏定 的一串数字, 也可以是随机产生的一串数字, 要求是符合 EPS- AKA中的序列号格式和长 度要求。
相应的, 步骤 S304包括: 首先, 网络设备根据网络设备侧的对称密钥 K、 伪 SQN、 第二随机数 RAND和认证管理域 (Authentication Management Field ' AMF) 参数生成第
:三认证令牌 AUTN。其中, AMF用于限定终端设备在网络认证过程中涉及的参数。例如: A F ^于限定 SQN的容错范围。 该 SQN的容错范围是指第一 SQN和正确的 SQN之间 的容错范围。 当第一 SQN与 SQN之间的误差在该容错范围内, 可以认为该第一 SQN是 正碗的 SQN。 否则, 该第一 SQN不是正确的 SQN。 该 AMF还可以限定加密密钥和完保 密钥的生侖周期。
其次, 网络设备向终端设备发送第二 RAND和第≡ AUTN, 以使终端设备根据终端 设备侧的对称密钥 K、 第三 AUTN、 第二 RAND和 AMF确定伪 SQN。 网络设备接收终 端设备发送的重同步消息; 网络设备根据重同步消息确定终端设备的正确的 SQN。
具体地,网络设备可以根据现有技术提供的 AKA算法通过网络设备侧的对称密钥 K、
伪 SQN、 第二 RAND和 AMF生成第 Ξ: AUTN。 本申请对此不做限制。 本申请中的 AKA 算法是指 ESP- AKA协议所涉及到的算法。 终端设备可以根据现有技术提供的 AKA算法 通过终端设备倒的对称密钥 K、 第三 AUTN、 第二 RAND和 AMF确定伪 SQN, 即通过 现有技术的提供算法可以确定出来用于计算第三 AUTN的伪 SQN。 该伪 SQN与正确的 SQN之间的误差不在 SQN容错范围之内,这种情况下,然后利用正确的 SQN,第≡ RAND, AMF和终端设备侧的对称密钥 K生成重同步参数。 该重同步参数用于终端设备和网络设 备之间的同步, 以及用于网络设备确定正确的 SQN。 终端设备向网络设备发送重同步消 息, 该重同步消息包括第三. RAND和重同步参数 AUTS。 网络设备根据该第 Ξ: RAND和 重同步参数 AUTS可以采用现有技术的 AKA算法确定正确的 SQN。本申请对该现有技术 的算法不做限制。
综上, 实际上这种可选方式的主旨是: 网络设备通过向终端设备发送第三 AUTN, 其 中该第三 AUTN是通过伪 SQN计算得到,从而触发终端设备向网络设备发送正确的 SQN。
步骤 S305: 网络设备根据网络设备侧的对称密钥 K、 正确的 SQN、 第一 RAND和 AMF参数生成第一 AUTN。
网络设备可以根据现有技术提供的 AKA算法通过网络设备侧的对称密钥正确的 SQN、 第一 RAND和 AMF生成第一 AUTN。 其中生成第一 AUTN和上述生成第三 AUTN所采 用的方法相同, 在此本申请对该现有技术算法不做限制。
需要强调的是, 步骤 S305与现有技术 EPS-AKA协议不同之处在于, 现有技术中正 确的 SQN存储在 HSS中。而本申请为了降低 HSS的存储负荷,本申请中网络设备都是要 实时获取正确的 SQN。 然后采用与现有技术相同的算法计算第一 Al)TN。
步骤 S306: 网络设备向终端设备发送第一 RAND和第一 AUTN;
步骤 S307: 终端设备根据终端设备侧的对称密钥 K、 第一 RAND、 正确的 SQN生成 第二 AUTN;
步骤 S308: 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证。
结合步骤 S306至歩骤 S308进行说明: 其中终端设备可以采用现有技术提供的 AKA 算法根据终端设备根据终端设备侧的对称密钥 K、 第一 RAND、 正确的 SQN 生成第二 AUTN。 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证, 包括: 当终端设 备确定第一 AUTN和第二 AUTN相同时, 表示网络设备被认证通过。 否则, 表示网络设 备未被认证通过。 或者, 当终端设备确定第一 AUTN和第二 AUTN之间的误差值小于预 设阈值时, 表示网络设备被认证通过。 否则, 表示网络设备未被认证通过。 本申请对此不 做限制。
步骤 S309: 网络设备接收终端设备发送的认证响应消息。
其中, 所述认证响应消息包括第一认证参数 (第一认证参数即为现有技术中的响应 (Response, RES) :) ; 所述 RES根据所述第一 RAND和所述终端设备侧的对称密钥 K 生成;其中,所述终端设备侧的对称密钥为所述网络设备和所述终端设备之间的对称密钥。 其中如何生成 RES可以采用现有技术提供的 AKA算法, 本申请对此不做限制。
步骤 S310: 网络设备根据网络设备侧的对称密钥和第一隨机数生成第二认证参数。 该第二认证参数即为现有技术中的期待响应 (Expected Response, XRES)。 其中如何生 成 XRES可以采用现有技术提供的 AKA算法, 本申请对此不做限制。
步骤 S311: 网络设备根据 RES和 XRES认证终端设备。
当 RES和 XRES相同时, 表示终端设备被认证通过, 否则, 表示终端设备未被认证 通过。
需要说明的是, 步骤 S310和步骤 S305可以合并为一个步骤执行。
本申请提供一种网络认证方法, 与现有 EPS- AKA协议中的网络认证过程不同的是: 本申请中, 一方面网络设备自己生成对称密钥 K, 另一方面通过第一 SQN实时生成终端 设备正确的 SQN。 也就是说, 本申请中网络设备无需存储对称密钥 K以及终端设备正确 的 SQN, 而是实时生成对称密钥 K, 以及确定实时生成终端设备正确的 SQN。 认而可以 降低现有技术中 HSS的存储负载,并 ϋ由于本申请中终端设备和网络设备之间无需 MME 等设备进行网络认证, 从而可以缩短网络认证链条, 进而提高网络认证效率。
进一步地, 针对终端设备如何确定终端设备倒的对称密钥 Κ, 本申请提供如下可选方 式:
终端设备获取网络设备的 ro, 然后基于 IBC机制, 根据网络设备的 ID以及终端设备 的私钥生成对称密钥 K。 其中终端设备的私钥由 PKG根据终端设别的 ID和 PKG的主私 钥生成。 在本申请实施例中, 网络设备的 ID可以该网络设备的 MAC地址、 IP地址、 统 一资源定位符 (Uniform Resource Locator, URL) 地址、 公开的电邮地址、 纖地址、 注 册的实体名字等等。
当终端设备一直处于同一个网络设备的认证范围内时。终端设备可以存储该对称密钥 K, 后续终端设备需要使用使用对称密钥 K时, 可以直接从存储空间中取出使用即可。
可选地, 终端设备获取网络设备的: ID方式包括: 网络设备的 ID为所述第二随机数; 或者网络设备的身份标识携带在 AMF参数中。 或者, 网络设备向终端设备发送消息, 该 消息中包括网络设备的 ID。 例如: 当所述网络设备为接入网设备时, 所述网络设备发送 广播消息; 其中, 所述广播消息包括所述网络设备的 ID, 以使所述终端设备根据所述网 络设备的 ί[)和所述终端设备的私钥生成所述终端设备侧的对称密钥。
具体地, 结合上述可选方式对网络认证过程进行举例说明:
假设进行网络认证的网络设备为接入网 AN中的基站或者接入点 AP或者为 AN中其 他的设备。 终端设备根据网络设备的 ID和终端设备的私钥生成终端设备侧的对称密钥。 网络设备根据终端设备的 ro和网络设备的私钥生成网络设备侧的对称密钥。 网络设备根 据伪 SQN确定终端设备正确的 SQN。 具体地, 图 4为本申请另一实施例提供的一种网络 认证方法的交互流程图, 如图 4所示, 该方法包括:
步骤 S401 : 网络设备发送广播消息。 该广播消息包括网络设备的 ID。
步骤 S402: 终端设备根据网络设备的 ID和终端设备的私铝生成终端设备侧的对称密 钥。
步骤 S403: 终端设备向网络设备发送接入请求消息, 该消息包括: 终端设备的 ID、 终端设备的网络能力以及密钥 KSIASME。
其中终端设备的网络能力和密钥 KSIASME都是现有 EPS- AKA认证协议中的参数, 其含义与 EPS- AKA认证协议中的含义相同。在此不再赘述。需要说明的是,密钥 KSIASME 是根据对称密钥 K生成的, 它用于生成之后的会话密钥。
步骤 S404: 网络设备根据网络设备的私钥和终端设备的 ί[)生成网络设备侧的对称密
τ/j K。
步骤 S405 : 网络设备生成伪 SQN。
其中该伪 SQN可以是一个固定的一串数字, 也可以是隨机产生的一串数字, 要求是 符合 EPS-AKA中的序列号格式和长度要求。
步骤 S406: 网络设备根据网络设备侧的对称密钥 K、 伪 SQN、 第二 RAND和 AMF 参数生成第三 AUTN。
步骤 S407: 网络设备向终端设备发送认证请求; 该认证请求包括: 第二 AND、 第 三―- AUTN和密钥 KSIASM:E。
步骤 S408:终端设备根据终端设备侧的对称密铝 K.、第 AUTN、第二 RAND和 AMF 确定伪 SQN。
步骤 S409: 终端设备根据正确的 SQN、 第三 RAND、 AMF和终端设备侧的对称密钥 K生成重同步参数 AUTS。
步骤 S410: 终端设备向网络设备发送重同步消息, 该重同歩消息包括第_三 RAND和 重同步参数 AUTS。
步骤 S411 : 网络设备根据该第三 RAND和重同步参数 AUTS确定正确的 SQN。 步骤 S412: 网络设备根据网络设备侧的对称密钥 K、 正确的 SQN, 第一 RAND和 AMF参数生成第一 AUTN。
步骤 S4B: 网络设备再次向终端设备发送认证请求, 该认证请求包括第一 RAND、 第一 AUTN和密钥 KSIASME。
步骤 S414: 终端设备根据终端设备侧的对称密钥:1 _、 第一 RANI)、 正确的 SQN生成 第二 AUTN ;
步骤 S415 : 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证。
步骤 S416: 网络设备接收终端设备发送的认证响应消息, 认证响应消息包括 RES。 步骤 S417: 网络设备根据网络设备侧的对称密钥和第一随机数生成 XRES。
步骤 S418: 网络设备根据 RES和 XRES认证终端设备。
其中图 4对应实施例与图 3对应实施例中相同的步骤, 在此不再赘述解释。
需要说明的是, 步骤 S417和步骤 S412可以合并为一个步骤执行。
本申请提供一种网络认证方法, 一方面网络设备根据终端设备的 II)和网络设备的私 钥生成对称密钥 K, 另一方面通过伪 SQN实时生成终端设备正确的 SQN。 [ίΐ就是说, 本 申请中网络设备无需存储对称密钥 Κ以及终端设备正确的 SQN, 而是实时生成对称密钥 K, 以及确定实时生成终端设备正确的 SQN。 ^而可以降低现有技术中 HSS的存储负载, 并且由于本申请中终端设备和网络设备之间无需 MME等设备进行网络认证, 而可以缩 短网络认证链条, 进而提高网络认证效率。
假设进行网络认证的网络设备为核心网设备, 倒如: 可以是 MME或者 AUSF等。 终 端设备根据网络设备的 ID和终端设备的私钥生成终端设备侧的对称密钥。 其中网络设备 的 :Π〕为第二随机数。网络设备根据终端设备的 ID和网络设备的私铝生成网络设备侧的对 称密钥。 网络设备根据伪 SQN确定终端设备正确的 SQN。 具体地, 图 5为本申请再一实 施例提供的一种网络认证方法的交互流程图, 如图 5所示, 该方法包括:
步骤 S501 : 终端设备向网络设备发送接入请求消息, 该消息格式包括: 终端设备的
ID、 终端设备的网络能力以及密钥 KSIASME。
其中终端设备的网络能力和密钥 KSiASME都是现有 EPS- AKA认证协议中的参数, 其含义与 EPS- AKA认证协议中的含义相同。在此不再赘述。需要说明的是,密钥 KSIASME 是根据对称密钥 K生成的, 它用于生成之后的会话密钥。
步骤 S502 : 网络设备根据网络设备的私钥和终端设备的 ID生成网络设备侧的对称密 步骤 S503 : 网络设备生成伪 SQN。
其中该伪 SQN可以是一个固定的一串数字, 也可以是随机产生的一串数字, 要求是 符合 EPS- AKA中的序列号格式和长度要求。
步骤 S504: 网络设备根据网络设备侧的对称密钥 K:、伪 SQN、网络设备的 ID和 AMF 参数生成第三 AUTN。
其中, 这里网络设备的 ID代替了第二随机数。 即通过该方式可以将网络设备的 ID发 送给终端设备。
步骤 S505 : 网络设备向终端设备发送认证请求; 该认证请求包括: 网络设备的 ID、 第三 AUTN和密钥 KSIASME。
步骤 S506: 终端设备根据网络设备的 ID和终端设备的私钥生成对称密钥 K。
步骤 S507: 终端设备根据终端设备侧的对称密钥:1 _、 第—;£ AUTN、 网络设备的 ID和 AMF确定伪 SQN。
步骤 S508 : 终端设备根据正确的 SQN、 第三 RAND、 AMF和终端设备侧的对称密钥 K生成重同步参数 AUTS。
步骤 终端设备向网络设备发送重同步消息, 该重同歩消息包括第三 RAND和 重同步参数 AUTS。
步骤 S510: 网络设备根据该第 Ξ: RAND和重同步参数 AUTS确定正确的 SQN。 步骤 S511 : 网络设备根据网络设备侧的对称密钥 K、 正确的 SQN、 第一 RAND和 AMF参数生成第一 AUTN。
步骤 S512: 网络设备再次向终端设备发送认证请求, 该认证请求包括第一 RAND、 第一 AUTN和密钥 KSIASME。
步骤 S513 : 终端设备根据终端设备侧的对称密钥:1 _、 第一 RANI)、 正确的 SQN生成 第二 AUTN ;
步骤 S514 : 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证。
步骤 S515 : 网络设备接收终端设备发送的认证响应消息, 认证响应消息包括 RES。 步骤 S516: 网络设备根据网络设备侧的对称密钥和第一随机数生成 XRES。
步骤 S517: 网络设备根据 RES和 XRES认证终端设备。
其中图 5对应实施例与图 3对应实施例中相同的步骤, 在此不再赘述解释。
需要说明的是, 步骤 S516和步骤 S511可以合并为一个步骤执行。
本申请实施钢与图 5对应实施例不同之处在于, 本申请利用网络设备的 ID代替第二 随机数, 通过该方法传输网络设备的 ID。 从而可以降低网络开销。
假设终端设备一直处于同一个网络设备的认证范围内,且该终端设备己经存储了终端 设备侧的对称密钥 K,且网络设备根据包括该终端设备的多个终端设备对应的公共密钥和
终端设备的 ID推演出网络设备侧的对称密钥1(_。 具体地, 图 6为本申请又一实施例提供 的一种网络认证方法的交互流程图, 如图 6所示, 该方法包括- 步骤 S601 : 终端设备向网络设备发送接入请求消息, 该消息格式包括: 终端设备的 ID、 终端设备的网络能力以及密钥 KSIASME。
其中终端设备的网络能力和密钥 KSiASME都是现有 EPS- AKA认证协议中的参数, 其含义与 EPS- AKA认证协议中的含义相同。在此不再赘述。需要说明的是,密钥 KSIASME 是根据对称密钥 K生成的, 它用于生成之后的会话密钥。
步骤 S602 : 网络设备根据所述公共密钥和终端设备的 ID生成网络设备侧的对称密钥 ;。
步骤 S603 : 网络设备生成伪 SQN。
其中该伪 SQN可以是一个固定的一串数字, 也可以是隨机产生的一串数字, 要求是 符合 EPS-AKA中的序列号格式和长度要求。
步骤 S604: 网络设备根据网络设备侧的对称密钥 K、 伪 SQN、 第二随机数和 AMF 参数生成第三 AUTN。
步骤 S605 : 网络设备向终端设备发送认证请求; 该认证请求包括: 第二随机数、 第 三―- AUTN和密钥 KSIASME。
步骤 S606 : 终端设备根据网络设备的 :Π〕和终端设备的私钥生成对称密钥 Κ。
步骤 S607 : 终端设备根据终端设备侧的对称密钥 、 第三 AUTN、 网络设备的 ID和
AMF确定伪 SQN。
步骤 S608 : 终端设备根据正确的 SQN、 第:三 RAN:D、 AMF和终端设备侧的对称密铝
K生成重同步参数 AUTS。
步骤 S609: 终端设备向网络设备发送重同步消息, 该重同步消息包括第三 AND和 重同步参数 AUTS。
步骤 S610 : 网络设备根据该第:三 RAN D和重同步参数 AUTS确定正确的 SQN。 步骤 S61 1 : 网络设备根据网络设备侧的对称密钥 K:、 正确的 SQN、 第一 RAND和
AMF参数生成第一 AUTN。
步骤 S612 : 网络设备再次向终端设备发送认证请求, 该认证请求包括第一 RAND、 第一 AUTN和密钥 KSiASME。
步骤 S6B : 终端设备根据终端设备侧的对称密钥 、 第一 RAN:D、 正确的 SQN生成 第二 AUTN;
步骤 S614 : 终端设备根据第一 AUTN和第二 A TTN对网络设备进行认证。
步骤 S615 : 网络设备接收终端设备发送的认证响应消息, 认证响应消息包括 RES。 步骤 S616 : 网络设备根据网络设备侧的对称密钥和第一隨机数生成 XRES。
步骤 S617 : 网络设备根据 RES和 XRES认证终端设备。
其中图 6对应实施例与图 3对应实施例中相同的步骤, 在此不再赘述解释。
需要说明的是, 步骤 S616和步骤 S61 1可以合并为一个步骤执行。
本申请实施 ^与上述实施例不同之处在于,本申请网络设备可以通过公共密钥和终端 设备的 ID生成网络设备侧的对称密钥, 也就是说, 本申请中网络设备无需存储对称密钥 K以及终端设备正确的 SQN , 而是实时生成对称密钥 K, 认而可以降低现有技术中 HSS
的存储负载。
假设进行网络认证的网络设备为接入网 AN中的基站或者接入点 AP或者为 AN中其 他的设备。 终端设备根据网络设备的 ID和终端设备的私钥生成终端设备侧的对称密钥。 网络设备根据终端设备的 ID和网络设备的私钥生成网络设备侧的对称密钥。 网络设备生 成第一 SQN, 该第一 SQN是根据当前的时间信息生成的 SQN, 即该 SQN为终端设备正 确的 SQN。 具体地, 图 7 为本申请再一实施例提供的一种网络认证方法的交互流程图, 如图 7所示, 该方法包括:
步骤 S701 : 网络设备发送广播消息。 该广播消息包括网络设备的 ID。
步骤 S702: 终端设备根据网络设备的 ί[)和终端设备的私钥生成终端设备侧的对称密 钥。
步骤 S703: 终端设备向网络设备发送接入请求消息, 该消息格式包括: 终端设备的 ID、 终端设备的网络能力以及密钥 KSIASME。
其中终端设备的网络能力和密钥 KSiASME都是现有 EPS- AKA认证协议中的参数, 其含义与 EPS- AKA认证协议中的含义相同。在此不再赘述。需要说明的是,密钥 KSIASME 是根据对称密钥 K生成的, 它用于生成之后的会话密钥。
步骤 S704: 网络设备根据网络设备的私钥和终端设备的 ID生成网络设备侧的对称密 。
步骤 S705 : 网络设备根据当前的时间信息生成第一 SQN。其中该第一 SQN为正确的 SQN。
步骤 S706: 网络设备根据网络设备侧的对称密钥 K、 正确的 SQN、 第一 RAND和
AMF参数生成第一 AUTNo
步骤 S707: 网络设备再次向终端设备发送认证请求, 该认证请求包括第一 RAND、 第一 AUTN和密钥 KS:〖ASME。
步骤 S708: 终端设备根据终端设备侧的对称密铝 K.、 第一 RAND、 正确的 SQN生成 第二 AUTN。
步骤 S709: 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证。
步骤 S710: 网络设备接收终端设备发送的认证响应消息, 认证响应消息包括 RES„ 步骤 S711 : 网络设备根据网络设备侧的对称密钥和第一隨机数生成: XRES。
步骤 S712: 网络设备根据 RES和 XRES认证终端设备。
其中图 7对应实施例与图 3对应实施例中相同的步骤, 在此不再赘述解释。
需要说明的是, 步骤 S711和步骤 S706可以合并为一个步骤执行。
本申请提供一种网络认证方法, 一方面网络设备根据终端设备的 ί[)和网络设备的私 钥生成对称密钥 Κ:, 另一方面基于当前的时间信息生成第一 SQN, 该第一 SQN即为终端 设备正确的 SQN。 也就是说, 本申请中网络设备无需存储对称密钥 K以及终端设备正确 的 SQN, 而是实时生成对称密钥 K, 以及确定实时生成终端设备正确的 SQN。 认而可以 降低现有技术中 HSS的存储负载,并 ϋ由于本申请中终端设备和网络设备之间无需 MME 等设备进行网络认证, 从而可以缩短网络认证链条, 进而提高网络认证效率。
假设终端设备一直处于同一个网络设备的认证范围内,且该终端设备己经存储了终端 设备侧的对称密钥 Κ,且网络设备根据包括该终端设备的多个终端设备对应的公共密钥和
终端设备的 ID推演出网络设备侧的对称密钥 K。并且网络设备生成第一 SQN,该第一 SQN 是根据当前的时间信息生成的 SQN, 即该 SQN为终端设备正确的 SQN。 具体地, 图 8为 本申请再一实施例提供的一种网络认证方法的交互流程图, 如图 8所示, 该方法包括: 步骤 S801 : 终端设备向网络设备发送接入请求消息, 该消息格式包括: 终端设备的 11)、 终端设备的网络能力以及密钥 KS:IASME。
其中终端设备的网络能力和密钥 KSIASME都是现有 EPS-AKA认证协议中的参数, 其含义与 EPS-AKA认证协议中的含义相同。在此不再赘述。需要说明的是,密钥 KSIASME 是根据对称密钥 K生成的, 它用于生成之后的会话密钥。
步骤 S802: 网络设备根据所述公共密铝和终端设备的】D生成网络设备侧的对称密铝 κ。
步骤 S803 : 网络设备根据当前的时间信息生成第一 SQN。其中该第一 SQN为正确的 SQN。
步骤 S804: 网络设备根据网络设备侧的对称密钥 K、 正确的 SQN、 第一 RAND和 AMF参数生成第一 AUTN。
步骤 S805: 网络设备向终端设备发送认证请求, 该认证请求包括第一 RAND、 第一
AUTN和密钥 KSIASME。
步骤 S806: 终端设备根据终端设备侧的对称密钥:1 _、 第一 RANI)、 正确的 SQN生成 第二 AUTN ;
步骤 S807: 终端设备根据第一 AUTN和第二 AUTN对网络设备进行认证。
步骤 S808: 网络设备接收终端设备发送的认证响应消息, 认证响应消息包括 RES。 步骤 S809: 网络设备根据网络设备侧的对称密钥和第一隨机数生成 XRES。
步骤 S810: 网络设备根据 RES和 XRES认证终端设备。
其中图 8对应实施例与图 3对应实施例中相同的步骤, 在此不再赘述解释。
需要说明的是, 步骤 S809和歩骤 S804可以合并为一个步骤执行。
本申请提供一种网络认证方法,一方面网络设备根据公共密钥和网络设备的私钥生成 对称密钥 K, 另一方面基亍当前的 间信息生成第一 SQN, 该第一 SQN即为终端设备正 确的 SQN。也就是说,本申请中网络设备无需存储对称密钥 K以及终端设备正确的 SQN, 而是实时生成对称密钥 ;, 以及确定实 生成终端设备正确的 SQN。从而可以降低现有技 术中 HSS的存储负载,并且由于本申请中终端设备和网络设备之间无需 MME等设备进行 网络认证, 从而可以缩短网络认证链条, 进而提高网络认证效率。
图 9为本申请一实施例提供的一种网络认证装置的结构示意图, 如图 9所示, 该装置 包括: 获取模块 901、 第一生成模块 902、 第二生成模块 903、 确定模块 904、 第≡生成模 块 905、 发送模块 906、 接收模块 907和第四生成模块 908。
其中获取模块 901, 用于获取终端设备的身份标识。 第一生成模块 902, 用于根据终 端设备的身份标识和网络设备的第一密钥生成网络设备侧的对称密钥:第二生成模块 903, 用于为终端设备生成第一序列号; 确定模块 904, ^于根据第一序列号确定终端设备的正 确的序列号; 第三生成模块 905, 用于根据网络设备侧的对称密钥、 正确的序列号、 第一 随机数和网络设备为终端设备配置的认证管理域参数生成第一认证令牌; 其中, 认证管理 域参数 ^于限定终端设备在网络认证过程中涉及的参数; 发送模块 906, 用于向终端设备
发送第一随机数和第一认证令牌; 以使终端设备根据第一认证令牌和第二认证令牌对网络 设备进行认证;其中,第二认证令牌是终端设备根据终端设备侧的对称密钥、第一随机数、 正确的序列号和认证管理域参数生成的; 接收模块 907, 用于接收终端设备发送的认证响 应消息: 其中, 认证响应消息包括第一认证参数; 第一认证参数根据第一随机数和终端设 备侧的对称密钥生成; 第四生成模块 908, 用于根据网络设备侧的对称密钥和第一随机数 生成第二认证参数; 根据第一认证参数和第二认证参数认证终端设备。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 相应的, 确定模块 904, 具体用于根据 网络设备侧的对称密钥、 伪序列号、 第二随机数和认证管理域参数生成第 Ξ:认证令牌; 发 送模块 906, 还用于发送第二随机数和第:三认证令牌, 以使终端设备根据终端设备侧的对 称密钥、 第三认证令牌、 第二随机数和认证管理域参数确定伪序列号; 接收模块 907, 还 用于接收终端设备发送的重同步消息; 重同步消息包括重同步参数和第三随机数; 确定模 块 904, 具体用于根据重同步参数和第:三随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中, 以使终端设备根据网络设备的身份标识和终端设备的私钥生成终端设备侧的 对称密钥。
可选地, 当网络设备为接入网设备时, 发送模块 906还用于发送广播消息; 其中, 广 播消息包括网络设备的身份标识, 以使终端设备根据网络设备的身份标识和终端设备的私 钥生成终端设备侧的对称密钥。
本申请提供一种网络认证装置,该网络认证装置可以用于执行上述网络设备执行的方 法步骤, 其实现原理和技术效果类似, 此处不再赘述。
图! 0为本申请另一实施例提供的一种网络认证装置的结构示意图, 如图 10所示, 该 装置包括: 发送模块 1001、 接收模块 1002、 第一碗定模块 1003、 第一生成模块 1004、 认 证模块 1005、 第二生成模块 1006、 第二确定模块 1007、 第三.生成模块 1008和第四生成 模块 1009
其中, 发送模块 1001, 用于向网络设备发送终端设备的身份标识; 以使网络设备根 据终端设备的身份标识和网络设备的第一密钥生成网络设备倒的对称密钥;接收模块 1002, 用于接收网络设备发送的第一随机数和第一认证令牌: 其中, 第一认证令牌是网络设备根 据网络设备侧的对称密钥、 终端设备的正确的序列号、 第一隨机数和网络设备为终端设备 配置的认证管理域参数生成的;认证管理域参数用于限定终端设备在网络认证过程中涉及 的参数; 第一确定模块 1003 , 用于根据第一认证令牌、 终端设备侧的对称密钥、 第一随 机数和认证管理域参数确定正确的序列号; 第一生成模块 1004, 用于根据终端设备侧的 对称密钥、 第一随机数、 正确的序列号和认证管理域参数生成第二认证令牌; 认证模块 1005,用亍根据第一认证令牌和第二认证令牌对网络设备进行认证;第二生成模块 1006, 用于根据第一随机数和终端设备侧的对称密钥生成第一认证参数; 发送模块 1001, 还用 于向网络设备发送认证响应消息; 其中, 认证响应消息包括第一认证参数; 其中, 第一认
证参数用于网络设备对终端设备进行认证。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 正确的序列号是网络设备通过第一序列号确定的。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 接收模块 1002, 还用于接收网络设备 发送的第二随机数和第三认证令牌; 其中, 第三认证令牌是网络设备根据网络设备侧的对 称密铝、 伪序列号、 第二随机数和认证管理域参数生成的; 第二确定模块 1007 , 用于根 据终端设备侧的对称密钥、 第三认证令牌、 第二随机数和认证管理域参数确定伪序列号; 第三生成模块 1008, 用于根据正确的序列号、 第三随机数、 认证管理域参数和终端设备 侧的对称密钥生成重同步参数: 发送模块 1001 , 还 ^于向网络设备发送重同步消息; 其 中, 重同步消息包括重同步参数和第三随机数, 以使网络设备根据重同步参数和第三随机 数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中; 第四生成模块 1009, 用于根据网络设备的身份标识和终端设备的私钥生成 终端设备侧的对称密钥。
可选地, 当网络设备为接入网设备时, 接收模块 1002还用于接收网络设备发送的广 播消息; 其中, 广播消息包括网络设备的身份标识; 第四生成模块 1009, 用于根据网络 设备的身份标识和终端设备的私钥生成终端设备侧的对称密钥。
本申请提供一种网络认证装置,该网络认证装置可以用于执行上述终端设备执行的方 法步骤, 其实现原理和技术效果类似, 此处不再赘述。
图 1为本申请一实施^提供的一种网络设备的结构示意图, 如图 1所示, 该网络设 备包括: 处理器 1101、 接收器 1102、 发送器 1 103和存储器 其中存储器 1104 . 于 存储代码, 当代码被处理器! 101运行时, 以实现上述网络设备执行的方法流程具体地, 处理器 1101用于获取终端设备的身份标识; 根据终端设备的身份标识和网络设备的第一 密钥生成网络设备侧的对称密钥; 为终端设备生成第一序列号; 根据第一序列号确定终端 设备的正确的序列号; 根据网络设备侧的对称密钥、 正确的序列号、 第一隨机数和网络设 备为终端设备配置的认证管理域参数生成第一认证令牌; 其中, 认证管理域参数用于限定 终端设备在网络认证过程中涉及的参数; 发送器 1103, 用于向终端设备发送第一随机数 和第一认证令牌; 以使终端设备根据第一认证令牌和第二认证令牌对网络设备进行认证: 其中, 第二认证令牌是终端设备根据终端设备侧的对称密钥、 第一随机数、 正确的序列号 和认证管理域参数生成的; 接收器 1 102, 用于接收终端设备发送的认证响应消息; 其中, 认证响应消息包括第一认证参数;第一认证参数根据第一随机数和终端设备侧的对称密钥 生成; 处理器 101还用于根据网络设备侧的对称密钥和第一随机数生成第二认证参数; 根据第一认证参数和第二认证参数认证终端设备。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列
号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 相应的, 处理器 1101, 具体用于根据 网络设备侧的对称密钥、 伪序列号、 第二随机数和认证管理域参数生成第三认证令牌; 发 送器 1103, 还用于发送第二随机数和第三认证令牌, 以使终端设备根据终端设备侧的对 称密钥、 第王认证令牌、 第二随机数和认证管理域参数确定伪序列号; 接收器 〗】02, 还 用于接收终端设备发送的重 ^步消息; 重同步消息包括重同步参数和第三随机数; 处理器 1101, 具体用于根据重同步参数和第三随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中, 以使终端设备根据网络设备的身份标识和终端设备的私钥生成终端设备侧的 对称密钥。
可选地, 当网络设备为接入网设备时, 发送器 1103还用于发送广播消息; 其中, 广 播消息包括网络设备的身份标识, 以使终端设备根据网络设备的身份标识和终端设备的私 铝生成终端设备侧的对称密钥。
本申请提供一种网络设备, 该网络设备可以用于执行上述网络设备执行的方法步骤, 其实现原理和技术效果类似, 此处不再赘述。
图 12为本申请另一实施例提供的一种终端设备的结构示意图, 如图 12所示, 终端设 备, 包括: 发送器 1201、 接收器 202和处理器 1203和存储器】204; 其中存储器 1204用 于存储代码, 当代码被处理器 1203运行时, 以实现上述终端设备执行的方法流程。 具体 地, 发送器 1201 , 用于向网络设备发送终端设备的身份标识; 以使网络设备根据终端设 备的身份标识和网络设备的第一密钥生成网络设备侧的对称密钥; 接收器 1202 , 用于接 收网络设备发送的第一随机数和第一认证令牌; 其中, 第一认证令牌是网络设备根据网络 设备侧的对称密钥、 终端设备的正确的序列号、 第一随机数和网络设备为终端设备配置的 认证管理域参数生成的;认证管理域参数用于限定终端设备在网络认证过程中涉及的参数; 处理器 1203用于: 根据第一认证令牌、 终端设备侧的对称密铝、 第一随机数和认证管理 域参数确定正确的序列号; 根据终端设备侧的对称密钥、 第一随机数、 正确的序列号和认 证管理域参数生成第二认证令牌;根据第一认证令牌和第二认证令牌对网络设备进行认证; 根据第一随机数和终端设备侧的对称密钥生成第一认证参数; 发送器 1201, 还^于向网 络设备发送认证响应消息; 其中, 认证响应消息包括第一认证参数; 其中, 第一认证参数 用于网络设备对终端设备进行认证。
可选地, 第一密钥为网络设备的私钥; 或者, 第一密钥为包括终端设备的多个终端设 备对应的公共密钥。
可选地, 正确的序列号是网络设备通过第一序列号确定的。
可选地, 第一序列号为网络设备根据当前的时间信息生成的序列号; 其中, 第一序列 号与正确的序列号相同。
可选地, 第一序列号为终端设备的伪序列号; 接收器 1202, 还用于接收网络设备发 送的第二随机数和第:三认证令牌; 其中, 第:三认证令牌是网络设备根据网络设备侧的对称 密钥、 伪序列号、 第二随机数和认证管理域参数生成的; 处理器 1203还用于: 根据终端 设备侧的对称密钥、 第:三认证令牌、 第二随机数和认证管理域参数确定伪序列号; 根据正 确的序列号、 第:三随机数、 认证管理域参数和终端设备侧的对称密钥生成重同步参数; 发
送器 1201, 还用于向网络设备发送重同步消息: 其中, 重同步消息包括重同步参数和第 ―三随机数, 以使网络设备根据重同步参数和第 随机数确定正确的序列号。
可选地, 网络设备的身份标识为第二随机数; 或者网络设备的身份标识携带在认证管 理域参数中; 处理器 1203, 还用于根据网络设备的身份标识和终端设备的私钥生成终端 设备侧的对称密钥。
可选地, 当网络设备为接入网设备时, 接收器 1202还用于接收网络设备发送的广播 消息; 其中, 广播消息包括网络设备的身份标识; 处理器 1203, 还用于根据网络设备的 身份标识和终端设备的私钥生成终端设备侧的对称密钥。
本申请提供一种终端设备, 该终端设备可以用于执行上述终端设备执行的方法步骤, 其实现原理和技术效果类似, 此处不再赘述。
Claims
1、 一种网络认证方法, 其特征在于, 包括:
网络设备获取终端设备的身份标识;
所述网络设备根据所述终端设备的身份标识和所述网络设备的第一密钥生成所述网 络设备侧的对称密钥;
所述网络设备为所述终端设备生成第一序列号;
所述网络设备根据所述第一序列号确定所述终端设备的正确的序列号;
所述网络设备根据所述网络设备侧的对称密钥、 所述正确的序列号、 第一隨机数和所 述网络设备为所述终端设备配置的认证管理域参数生成第一认证令牌; 其中, 所述认证管 理域参数用于限定所述终端设备在所述网络认证过程中涉及的参数:
所述网络设备向所述终端设备发送所述第一随机数和所述第一认证令牌; 以使所述终 端设备根据所述第一认证令牌和第二认证令牌对所述网络设备进行认证; 其中, 所述第二 认证令牌是所述终端设备根据所述终端设备侧的对称密钥、 所述第一随机数、 所述正确的 序列号和所述认证管理域参数生成的;
所述网络设备接收所述终端设备发送的认证响应消息; 其中, 所述认证响应消息包括 第一认证参数;所述第一认证参数根据所述第一随机数和所述终端设备侧的对称密钥生成; 所述网络设备根据所述网络设备倒的对称密钥和所述第一随机数生成第二认证参数; 所述网络设备根据所述第一认证参数和所述第二认证参数认证所述终端设备。
2、根据权利要求 1所述的方法,其特征在于,所述第一密钥为所述网络设备的私钥; 或者, 所述第一密钥为包括所述终端设备的多个终端设备对应的公共密钥。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述第一序列号为所述网络设备 根据当前的时间信息生成的序列号; 其中, 所述第一序列号与所述正确的序列号相同。
4、 根据权利要求 1或 2所述的方法, 其特征在于, 所述第一序列号为所述终端设备 的伪序列号;
相应的,所述网络设备根据所述第一序列号确定所述终端设备的正确的序列号,包括: 所述网络设备根据所述网络设备侧的对称密钥、 所述伪序列号、第二随机数和所述认 证管理域参数生成第三认证令牌;
所述网络设备向所述终端设备发送所述第二随机数和所述第三认证令牌, 以使所述终 端设备根据所述终端设备侧的对称密钥、 所述第三认证令牌、 所述第二随机数和所述认证 管理域参数确定所述伪序列号;
所述网络设备接收所述终端设备发送的重同步消息;所述重同步消息包括重同步参数 和第三隨机数;
所述网络设备根据所述重同步参数和所述第三.随机数确定所述正确的序列号。
5、 根据权利要求 4所述的方法, 其特征在于, 所述网络设备的身份标识为所述第二 随机数; 或者所述网络设备的身份标识携带在所述认证管理域参数中, 以使所述终端设备 根据所述网络设备的身份标识和所述终端设备的私钥生成所述终端设备侧的对称密钥。
6、 根据权利要求 -4任一项所述的方法, 其特征在于, 还包括:
当所述网络设备为接入网设备时, 所述网络设备发送广播消息; 其中, 所述广播消息 包括所述网络设备的身份标识, 以使所述终端设备根据所述网络设备的身份标识和所述终
端设备的私钥生成所述终端设备侧的对称密钥。
7、 一种网络认证方法, 其特征在于, 包括:
终端设备向网络设备发送所述终端设备的身份标识; 以使所述网络设备根据所述终端 设备的身份标识和所述网络设备的第一密钥生成所述网络设备侧的对称密钥;
所述终端设备接收所述网络设备发送的第一随机数和第一认证令牌; 其中, 所述第一 认证令牌是所述网络设备根据所述网络设备侧的对称密钥、所述终端设备的正确的序列号、 所述第一随机数和所述网络设备为所述终端设备配置的认证管理域参数生成的;所述认证 管理域参数用于限定所述终端设备在所述网络认证过程中涉及的参数- 所述终端设备根据所述第一认证令牌、 所述终端设备侧的对称密钥、 所述第一随机数 和所述认证管理域参数确定所述正确的序列号;
所述终端设备根据所述终端设备倒的对称密钥、 所述第一隨机数、 所述正碗的序列 号和所述认证管理域参数生成第二认证令牌;
所述终端设备根据所述第一认证令牌和所述第二认证令牌对所述网络设备进行认证; 所述终端设备根据所述第一随机数和所述终端设备侧的对称密钥生成第一认证参数; 所述终端设备向所述网络设备发送认证响应消息; 其中, 所述认证响应消息包括所述 第一认证参数; 其中, 所述第一认证参数用于所述网络设备对所述终端设备进行认证。
8、根据权利要求 7所述的方法,其特征在于,所述第一密钥为所述网络设备的私钥; 或者, 所述第一密钥为包括所述终端设备的多个终端设备对应的公共密钥。
9、 根据权利要求 7或 8所述的方法, 其特征在于, 所述正确的序列号是所述网络设 备通过第一序列号确定的。
10、 根据权利要求 9所述的方法, 其特征在于, 所述第一序列号为所述网络设备根据 当前的时间信息生成的序列号; 其中, 所述第一序列号与所述正确的序列号相同。
11、 根据权利要求 9所述的方法, 其特征在于, 所述第一序列号为所述终端设备的伪 序列号;
所述方法还包括- 所述终端设备接收所述网络设备发送的第二随机数和第三认证令牌; 其中, 所述第三 认证令牌是所述网络设备根据所述网络设备侧的对称密钥、 所述伪序列号、 所述第二随机 数和所述认证管理域参数生成的;
所述终端设备根据所述终端设备侧的对称密钥、 所述第三认证令牌、 所述第二隨机数 和所述认证管理域参数确定所述伪序列号;
所述终端设备根据所述正确的序列号、 第三.随机数、 所述认证管理域参数和所述终端 设备侧的对称密钥生成重同步参数;
所述终端设备向所述网络设备发送重同步消息; 其中, 所述重同步消息包括所述重同 步参数和所述第三随机数, 以使所述网络设备根据所述重同步参数和所述第三随机数确定 所述正确的序列号。
12、 根据权利要求 11所述的方法, 其特征在于, 所述网络设备的身份标识为所述第 二隨机数; 或者所述网络设备的身份标识携带在所述认证管理域参数中;
所述方法还包括:所述终端设备根据所述网络设备的身份标识和所述终端设备的私钥 生成所述终端设备侧的对称密钥。
13、 根据权利要求 7-1 任一项所述的方法, 其特征在于, 还包括- 当所述网络设备为接入网设备时, 所述终端设备接收所述网络设备发送的广播消息; 其中, 所述广播消息包括所述网络设备的身份标识;
所述终端设备根据所述网络设备的身份标识和所述终端设备的私钥生成所述终端设 备侧的对称密钥。
14、 一种网络设备, 其特征在于, 包括: 处理器、 接收器、 发送器和存储器; 所述存储器用于存储代码, 当所述代码被所述处理器运行时, 会使得所述处理器、 接 收器和发送器执行以下功能; 所述处理器用于:
获取终端设备的身份标识;
根据所述终端设备的身份标识和所述网络设备的第一密钥生成所述网络设备侧的对 称密钥;
为所述终端设备生成第一序列号;
根据所述第一序列号确定所述终端设备的正确的序列号;
根据所述网络设备侧的对称密钥、 所述正确的序列号、 第一隨机数和所述网络设备为 所述终端设备配置的认证管理域参数生成第一认证令牌; 其中, 所述认证管理域参数用于 限定所述终端设备在所述网络认证过程中涉及的参数;
所述发送器, 用于向所述终端设备发送所述第一随机数和所述第一认证令牌; 以使所 述终端设备根据所述第一认证令牌和第二认证令牌对所述网络设备进行认证; 其中, 所述 第二认证令牌是所述终端设备根据所述终端设备侧的对称密钥、 所述第一随机数、 所述正 确的序列号和所述认证管理域参数生成的;
所述接收器, 用于接收所述终端设备发送的认证响应消息; 其中, 所述认证响应消息 包括第一认证参数;所述第一认证参数根据所述第一随机数和所述终端设备倒的对称密钥 生成;
所述处理器还用于:
根据所述网络设备侧的对称密钥和所述第一随机数生成第二认证参数;
根据所述第一认证参数和所述第二认证参数认证所述终端设备。
15、 根据权利要求 4所述的网络设备, 其特征在于, 所述第一密钥为所述网络设备 的私铝; 或者, 所述第一密钥为包括所述终端设备的多个终端设备对应的公共密铝。
16、 根据权利要求 14或 15所述的网络设备, 其特征在于, 所述第一序列号为所述网 络设备根据当前的 间信息生成的序列号; 其中, 所述第一序列号与所述正确的序列号相 同。
17、 根据权利要求 14或】 5所述的网络设备, 其特征在于, 所述第一序列号为所述终 端设备的伪序列号;
相应的, 所述处理器, 具体用于根据所述网络设备侧的对称密钥、 所述伪序列号、 第 二随机数和所述认证管理域参数生成第 Ξ:认证令牌;
所述发送器, 还用于发送所述第二随机数和所述第:三认证令牌, 以使所述终端设备根 据所述终端设备侧的对称密钥、 所述第三认证令牌、 所述第二随机数和所述认证管理域参 数确定所述伪序列号:
所述接收器, 还用于接收所述终端设备发送的重同步消息; 所述重同步消息包括重同
步参数和第三.随机数;
所述处理器,具体用于根据所述重同歩参数和所述第:三隨机数确定所述正确的序列号。
18、 根据权利要求 17所述的网络设备, 其特征在于, 所述网络设备的身份标识为所 述第二随机数; 或者所述网络设备的身份标识携带在所述认证管理域参数中, 以使所述终 端设备根据所述网络设备的身份标识和所述终端设备的私钥生成所述终端设备侧的对称
19、 根据权利要求 14-17任一项所述的网络设备, 其特征在于,
当所述网络设备为接入网设备时, 所述发送器还用于发送广播消息; 其中, 所述广播 消息包括所述网络设备的身份标识, 以使所述终端设备根据所述网络设备的身份标识和所 述终端设备的私钥生成所述终端设备侧的对称密钥。
20、 一种终端设备, 其特征在于, 包括: 发送器、 接收器、 处理器和存储器; 所述存 储器用于存储代码, 当所述代码被所述处理器运行时, 会使得所述处理器、 接收器和发送 器执行以下功能;
所述发送器, 用于向网络设备发送所述终端设备的身份标识; 以使所述网络设备根据 所述终端设备的身份标识和所述网络设备的第一密钥生成所述网络设备侧的对称密钥; 所述接收器, 用于接收所述网络设备发送的第一随机数和第一认证令牌; 其中, 所述 第一认证令牌是所述网络设备根据所述网络设备侧的对称密钥、所述终端设备的正确的序 列号、 所述第一随机数和所述网络设备为所述终端设备配置的认证管理域参数生成的; 所 述认证管理域参数用于限定所述终端设备在所述网络认证过程中涉及的参数;
所述处理器用于- 根据所述第一认证令牌、 所述终端设备侧的对称密钥、 所述第一随机数和所述认证管 理域参数确定所述正确的序列号;
根据所述终端设备侧的对称密钥、 所述第一随机数、 所述正确的序列号和所述认证 管理域参数生成第二认证令牌;
根据所述第一认证令牌和所述第二认证令牌对所述网络设备进行认证;
根据所述第一随机数和所述终端设备侧的对称密钥生成第一认证参数;
所述发送器, 还用于向所述网络设备发送认证响应消息; 其中, 所述认证响应消息包 括所述第一认证参数; 其中, 所述第一认证参数用于所述网络设备对所述终端设备进行认 证。
21、 根据权利要求 20所述的终端设备, 其特征在于, 所述第一密钥为所述网络设备 的私钥: 或者, 所述第一密钥为包括所述终端设备的多个终端设备对应的公共密钥。
22、 根据权利要求 20或 21所述的终端设备, 其特征在于, 所述正确的序列号是所述 网络设备通过第一序列号确定的。
23、 根据权利要求 22所述的终端设备, 其特征在于, 所述第一序列号为所述网络设 备根据当前的时间信息生成的序列号; 其中, 所述第一序列号与所述正确的序列号相同。
24、 根据权利要求 22所述的终端设备, 其特征在于, 所述第一序列号为所述终端设 备的伪序列号;
所述接收器, 还用于接收所述网络设备发送的第二随机数和第三.认证令牌; 其中, 所 述第 认证令牌是所述网络设备根据所述网络设备侧的对称密钥、 所述伪序列号、 所述第
二随机数和所述认证管理域参数生成的;
所述处理器还用于:
根据所述终端设备倒的对称密钥、 所述第三认证令牌、 所述第二随机数和所述认证管 理域参数确定所述伪序列号;
根据所述正确的序列号、 第:三随机数、 所述认证管理域参数和所述终端设备侧的对称 密钥生成重同步参数;
所述发送器, 还用于向所述网络设备发送重同步消息; 其中, 所述重同步消息包括所 述重同步参数和所述第三随机数, 以使所述网络设备根据所述重同步参数和所述第 Ξ:随机 数确定所述正确的序列号。
25、 根据权利要求 24所述的终端设备, 其特征在于, 所述网络设备的身份标识为所 述第二隨机数; 或者所述网络设备的身份标识携带在所述认证管理域参数中;
所述处理器,还用于根据所述网络设备的身份标识和所述终端设备的私钥生成所述终 端设备侧的对称密钥。
26、 根据权利要求 20-24任一项所述的终端设备, 其特征在于,
当所述网络设备为接入网设备时,所述接收器还用于接收所述网络设备发送的广播消 息- 其中, 所述广播消息包括所述网络设备的身份标识;
所述处理器,还用于根据所述网络设备的身份标识和所述终端设备的私钥生成所述终 端设备侧的对称密钥。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2017/050242 WO2018208221A1 (zh) | 2017-05-09 | 2017-05-09 | 网络认证方法、网络设备及终端设备 |
PCT/SG2018/050069 WO2018208228A2 (zh) | 2017-05-09 | 2018-02-14 | 网络认证方法、网络设备、终端设备及存储介质 |
CN201880021182.7A CN110495198B (zh) | 2017-05-09 | 2018-02-14 | 网络认证方法、网络设备、终端设备及存储介质 |
EP18798631.0A EP3589002B1 (en) | 2017-05-09 | 2018-02-14 | Network authentication method, network device, terminal device and storage medium |
US16/673,467 US10694376B2 (en) | 2017-05-09 | 2019-11-04 | Network authentication method, network device, terminal device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2017/050242 WO2018208221A1 (zh) | 2017-05-09 | 2017-05-09 | 网络认证方法、网络设备及终端设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018208221A1 true WO2018208221A1 (zh) | 2018-11-15 |
Family
ID=64104876
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2017/050242 WO2018208221A1 (zh) | 2017-05-09 | 2017-05-09 | 网络认证方法、网络设备及终端设备 |
PCT/SG2018/050069 WO2018208228A2 (zh) | 2017-05-09 | 2018-02-14 | 网络认证方法、网络设备、终端设备及存储介质 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2018/050069 WO2018208228A2 (zh) | 2017-05-09 | 2018-02-14 | 网络认证方法、网络设备、终端设备及存储介质 |
Country Status (4)
Country | Link |
---|---|
US (1) | US10694376B2 (zh) |
EP (1) | EP3589002B1 (zh) |
CN (1) | CN110495198B (zh) |
WO (2) | WO2018208221A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110012467A (zh) * | 2019-04-18 | 2019-07-12 | 苏州博联科技有限公司 | 窄带物联网的分组认证方法 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10880291B2 (en) * | 2018-02-09 | 2020-12-29 | Cisco Technology, Inc. | Mobile identity for single sign-on (SSO) in enterprise networks |
US10887051B2 (en) * | 2019-01-03 | 2021-01-05 | Qualcomm Incorporated | Real time MIC recovery |
WO2020198991A1 (en) * | 2019-03-29 | 2020-10-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus relating to authentication of a wireless device |
US11751049B2 (en) | 2019-05-01 | 2023-09-05 | John A. Nix | Distributed EAP-TLS authentication for wireless networks with concealed user identities |
US12022287B2 (en) | 2019-07-08 | 2024-06-25 | John A. Nix | EAP-TLS authentication with concealed user identities and wireless networks |
US11659387B2 (en) * | 2020-07-30 | 2023-05-23 | Nokia Technologies Oy | User equipment authentication preventing sequence number leakage |
CN114189343A (zh) * | 2020-09-14 | 2022-03-15 | 华为技术有限公司 | 互相认证的方法和装置 |
CN112566106B (zh) * | 2020-12-11 | 2022-05-27 | 杭州叙简科技股份有限公司 | 一种基于5g多网多链设备认证方法 |
CN114980076A (zh) * | 2021-02-20 | 2022-08-30 | 华为技术有限公司 | 保护身份标识隐私的方法与通信装置 |
CN116668203B (zh) * | 2023-08-02 | 2023-10-20 | 浙江大华技术股份有限公司 | 设备认证方法、物联网设备、认证平台以及可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050271209A1 (en) * | 2004-06-07 | 2005-12-08 | Meghana Sahasrabudhe | AKA sequence number for replay protection in EAP-AKA authentication |
CN1767430A (zh) * | 2004-10-27 | 2006-05-03 | 华为技术有限公司 | 鉴权方法 |
CN104604181A (zh) * | 2012-06-28 | 2015-05-06 | 塞尔蒂卡姆公司 | 无线通信的密钥协定 |
CN106358184A (zh) * | 2016-08-31 | 2017-01-25 | 天津灵创智恒软件技术有限公司 | 一种点对点身份认证方法 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0018950D0 (en) * | 2000-08-02 | 2000-09-20 | Vodafone Ltd | Telecommunications systems and methods |
CN100488280C (zh) * | 2005-06-04 | 2009-05-13 | 华为技术有限公司 | 一种鉴权方法及相应的信息传递方法 |
CN101026863A (zh) * | 2006-02-21 | 2007-08-29 | 上海宇梦通信科技有限公司 | 基于服务网络标志的umts认证向量生成方法 |
CN101272240B (zh) * | 2007-03-21 | 2013-01-23 | 华为技术有限公司 | 一种会话密钥的生成方法、系统和通信设备 |
CN102638794B (zh) * | 2007-03-22 | 2016-03-30 | 华为技术有限公司 | 鉴权和密钥协商方法、认证方法、系统及设备 |
US8379854B2 (en) * | 2007-10-09 | 2013-02-19 | Alcatel Lucent | Secure wireless communication |
CN101729513B (zh) * | 2008-10-27 | 2014-02-19 | 华为数字技术(成都)有限公司 | 网络认证方法和装置 |
AU2011299647B2 (en) * | 2010-09-10 | 2014-09-11 | Lg Electronics Inc. | Method and apparatus of cipher communication for management frame using quality of service mechanism in wireless local area network system |
EP2730112A4 (en) * | 2011-07-08 | 2015-05-06 | Nokia Corp | METHOD AND APPARATUS FOR AUTHENTICATING SUBSCRIBERS TO LONG-TERM EVOLUTION TELECOMMUNICATION NETWORKS OR UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM |
CN102724211B (zh) * | 2012-06-29 | 2014-12-10 | 飞天诚信科技股份有限公司 | 一种密钥协商方法 |
CN104468099A (zh) * | 2013-09-12 | 2015-03-25 | 全联斯泰克科技有限公司 | 基于cpk的动态口令生成和验证方法及装置 |
-
2017
- 2017-05-09 WO PCT/SG2017/050242 patent/WO2018208221A1/zh active Application Filing
-
2018
- 2018-02-14 CN CN201880021182.7A patent/CN110495198B/zh active Active
- 2018-02-14 EP EP18798631.0A patent/EP3589002B1/en active Active
- 2018-02-14 WO PCT/SG2018/050069 patent/WO2018208228A2/zh unknown
-
2019
- 2019-11-04 US US16/673,467 patent/US10694376B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050271209A1 (en) * | 2004-06-07 | 2005-12-08 | Meghana Sahasrabudhe | AKA sequence number for replay protection in EAP-AKA authentication |
CN1767430A (zh) * | 2004-10-27 | 2006-05-03 | 华为技术有限公司 | 鉴权方法 |
CN104604181A (zh) * | 2012-06-28 | 2015-05-06 | 塞尔蒂卡姆公司 | 无线通信的密钥协定 |
CN106358184A (zh) * | 2016-08-31 | 2017-01-25 | 天津灵创智恒软件技术有限公司 | 一种点对点身份认证方法 |
Non-Patent Citations (3)
Title |
---|
ETSI: "Digital cellular telecommunications system (Phase 2+) (GSM);Universal Mobile Telecommunications System (UMTS); LTE; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses (3GPP TS 33.402 version 14.1.0 Release 14)", ETSI TS 133 402 V14.1.0, 11 April 2017 (2017-04-11), XP055547706, Retrieved from the Internet <URL:http://www.etsi.org/deliver/etsi_ts/133400_133499/133402/14.01.00_60/ts_133402v140100p.pdf> [retrieved on 20170710] * |
LI, XIEHUA ET AL.: "Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network", 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM, 25 September 2011 (2011-09-25), pages 1 - 4, XP055394176, [retrieved on 20170710] * |
SAXENA, N. ET AL.: "Authentication Protocol for IoT-Enabled LTE Network", ACM TRANSACTIONS ON INTERNET TECHNOLOGY (TOIT), vol. 16, no. 4, 9 December 2016 (2016-12-09), pages 1 - 20, XP058306359, [retrieved on 20170710] * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110012467A (zh) * | 2019-04-18 | 2019-07-12 | 苏州博联科技有限公司 | 窄带物联网的分组认证方法 |
CN110012467B (zh) * | 2019-04-18 | 2022-04-15 | 苏州博联科技有限公司 | 窄带物联网的分组认证方法 |
Also Published As
Publication number | Publication date |
---|---|
CN110495198A (zh) | 2019-11-22 |
EP3589002A4 (en) | 2020-03-18 |
EP3589002B1 (en) | 2021-07-28 |
WO2018208228A2 (zh) | 2018-11-15 |
CN110495198B (zh) | 2022-04-22 |
WO2018208228A3 (zh) | 2018-12-27 |
US20200068397A1 (en) | 2020-02-27 |
EP3589002A2 (en) | 2020-01-01 |
US10694376B2 (en) | 2020-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018208221A1 (zh) | 网络认证方法、网络设备及终端设备 | |
CN113016202B (zh) | 用于基站的装置、方法和计算机可读存储介质 | |
US8374582B2 (en) | Access method and system for cellular mobile communication network | |
CN106465111B (zh) | 使用公共安全中继在无线网络中的合法侦听报告 | |
US9769661B2 (en) | Wireless network fast authentication / association using re-association object | |
JP5364796B2 (ja) | 暗号情報送信端末 | |
US11109206B2 (en) | Security method and system for supporting discovery and communication between proximity based service terminals in mobile communication system environment | |
CN110583036B (zh) | 网络认证方法、网络设备及核心网设备 | |
CN106465101B (zh) | 无线网络接入保护和安全架构的系统和方法 | |
US20170244705A1 (en) | Method of using converged core network service, universal control entity, and converged core network system | |
CN110612729A (zh) | 锚密钥生成方法、设备以及系统 | |
KR20120091635A (ko) | 통신 시스템에서 인증 방법 및 장치 | |
WO2017197596A1 (zh) | 通信方法、网络侧设备和用户设备 | |
WO2016023198A1 (zh) | 异构网络之间的切换方法及切换系统 | |
WO2007022727A1 (fr) | Procede et systeme pour communiquer des informations contextuelles de cle d'autorisation | |
WO2012028043A1 (zh) | 认证方法、装置及系统 | |
KR20150084628A (ko) | 이동 통신에서 ProSe그룹 통신 또는 공공 안전을 지원하기 위한 보안 방안 및 시스템 | |
Ouaissa et al. | An efficient and secure authentication and key agreement protocol of LTE mobile network for an IoT system | |
WO2012083873A1 (zh) | 一种密钥生成方法、装置及系统 | |
WO2012024905A1 (zh) | 一种移动通讯网中数据加解密方法、终端和ggsn | |
US20140331303A1 (en) | Apparatus and method for authenticating access of a mobile station in a wireless communication system | |
WO2018222133A2 (zh) | 数据保护方法、装置以及系统 | |
WO2017009714A1 (en) | Establishing a temporary subscription with isolated e-utran network | |
WO2009051405A2 (en) | Method of establishing security association in inter-rat handover | |
Rastogi et al. | Secure scheme during vertical handoff in integrated heterogeneous wireless systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17909059 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17909059 Country of ref document: EP Kind code of ref document: A1 |