WO2018227638A1 - 通信方法和装置 - Google Patents
通信方法和装置 Download PDFInfo
- Publication number
- WO2018227638A1 WO2018227638A1 PCT/CN2017/088841 CN2017088841W WO2018227638A1 WO 2018227638 A1 WO2018227638 A1 WO 2018227638A1 CN 2017088841 W CN2017088841 W CN 2017088841W WO 2018227638 A1 WO2018227638 A1 WO 2018227638A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- terminal
- base station
- message
- wireless configuration
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0205—Traffic management, e.g. flow control or congestion control at the air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/08—Reselecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Definitions
- the present application relates to communication technologies, and more particularly to a communication method and apparatus.
- the state of a terminal can be divided into a connected state and an idle state.
- the connection state can be represented by RRC_CONNECTED, and the idle state can be represented by using RRC_IDLE.
- RRC_CONNECTED a state of the third terminal
- the third state can also be referred to as an inactive state.
- the third state or the inactive state can be represented using RRC_INACTIVE or INACTIVE.
- the terminal in the third state can perform cell reselection.
- the request may be sent to the base station.
- the base station receives the request, it can provide air interface resources to the terminal.
- a base station that provides air interface resources for the terminal may be referred to as a serving base station.
- the serving base station and the anchor base station may be different base stations.
- the communication method and apparatus provided by the embodiments of the present application are to ensure the air interface security between the terminal in the third state and the serving base station, and save the overhead of the air interface signaling.
- an embodiment of the present application provides a communication method, including:
- the service device receives the first terminal identifier from the terminal; the first terminal identifier is used to identify the terminal and the anchor device; and the service device sends the first terminal identifier and the wireless configuration parameter to the anchor device Receiving, by the service device, the wireless configuration parameter encrypted using a first key from the anchor device; wherein the first key is a key used by the terminal to communicate with the anchor device; The serving device transmits the wireless configuration parameter encrypted using the first key to the terminal.
- the method utilizes a key cryptographic service device that the terminal communicates with the anchor device to allocate wireless configuration parameters to the terminal, so that the terminal does not need to negotiate a new key with the service device, and then the service device uses the new key to encrypt the wireless configuration parameter for transmission, in the communication.
- the process saves the air interface signaling overhead of the new key negotiation, and ensures that the wireless configuration parameters are encrypted when the air interface is transmitted, thereby ensuring security.
- the identifying, by the first terminal identifier, the anchor device may be that the first terminal identifier is associated with the anchor device.
- the service device sends the wireless configuration parameter that is encrypted by using the first key to the terminal, where the service device sends the first key to the terminal by using the first key.
- Encrypted first message the first message includes the wireless configuration parameter; the service device receives the wireless configuration parameter encrypted by using a first key from the anchor device, including: the service device The anchor device receives the first message encrypted using the first key.
- the design encrypts the wireless configuration parameters by using the encryption mechanism of the message, and is compatible with the original encryption mechanism, and the scheme is simple and efficient.
- the method further includes: the service device receiving a key derivation parameter and a second key from the anchor device; the key derivation parameter is used to derive the second key, The second key is used by the terminal to communicate with the service device The key, the first message further including the key derivation parameter.
- the method further includes: the service device receiving a security algorithm associated with the second key from the anchor device; the first message further comprising the security algorithm;
- the security algorithm is at least one of: an encryption algorithm associated with the second key, and an integrity protection algorithm associated with the second key.
- the method further includes: the service device sending the security algorithm supported by the service device to the anchor device; wherein the security algorithm supported by the service device includes the second secret The security algorithm associated with the key.
- the service device receives, from the anchor device, the first message encrypted by using the first key: the service device receives the use from the anchor device.
- the first message of a key encryption and integrity protection.
- the first message is used to indicate that the third state is maintained.
- the serving device receives the first terminal identifier from the terminal, including: the service device receives a second message from the terminal, where the second message includes the first terminal identifier and the The authentication information of the terminal, the authentication information is generated based on the first key; the service device sends the wireless configuration parameter and the first terminal identifier to the anchor device, including: the service device Transmitting the wireless configuration parameter, the first terminal identifier, and the identity verification information to the anchor device.
- the method further comprises: the service device receiving a context of the terminal from the anchor device.
- the service device can obtain the terminal context, so as to facilitate subsequent service to the terminal.
- the embodiment of the present application provides a communication method, including: an anchor device receiving a first terminal identifier from a service device, and a wireless configuration parameter; wherein the first terminal identifier is used to identify the terminal and the anchor point a device, the anchor device transmitting, to the service device, the wireless configuration parameter encrypted using a first key; wherein the first key is a key used by the terminal to communicate with the anchor device .
- the method utilizes a key cryptographic service device that the terminal communicates with the anchor device to allocate wireless configuration parameters to the terminal, so that the terminal does not need to negotiate a new key with the service device, and then the service device uses the new key to encrypt the wireless configuration parameter for transmission, in the communication.
- the process saves the air interface signaling overhead of the new key negotiation, and ensures that the wireless configuration parameters are encrypted when the air interface is transmitted, thereby ensuring security.
- the anchor device sends the wireless configuration parameter encrypted by using the first key to the service device, including: sending, by the anchor device, the first The first message encrypted by the key, the first message including the wireless configuration parameter.
- the method further includes: the anchor device transmitting a key derivation parameter and a second key to the service device; the key derivation parameter is used to derive the second key, The second key is a key used by the terminal to communicate with the service device, and the first message further includes the key derivation parameter.
- the method further includes: the anchor device transmitting a security algorithm associated with the second key to the service device; the first message further includes the security algorithm;
- the security algorithm associated with the second key is at least one of: an encryption algorithm associated with the second key, and an integrity protection algorithm associated with the second key.
- the method further includes: the anchor device receiving, from the service device, a security algorithm supported by the service device; wherein the security algorithm supported by the service device includes the second secret Key related security algorithm.
- the anchor device sends, to the service device, a first message encrypted by using the first key: the anchor device sends the use of the first key to the service device The first message of encryption and integrity protection.
- the first message is used to indicate that the third state is maintained.
- the anchor device receives, from the serving device, the first terminal identifier associated with the anchor device, and the wireless configuration parameter, including: the anchor device receiving the a first terminal identifier, identity verification information of the terminal, and the wireless configuration parameter, the identity verification information being generated based on the first key.
- the method further includes the anchor device verifying the authentication information using the first key.
- the method further includes: the anchor device transmitting a context of the terminal to the service device.
- the embodiment of the present application further provides a communication method, including: a terminal sending a first terminal identifier to a service device, where the first terminal identifier is used to identify the terminal and the anchor device;
- the service device receives a wireless configuration parameter encrypted using a first key, the first key being a key used by the terminal to communicate with the anchor device.
- the method utilizes a key cryptographic service device that the terminal communicates with the anchor device to allocate wireless configuration parameters to the terminal, so that the terminal does not need to negotiate a new key with the service device, and then the service device uses the new key to encrypt the wireless configuration parameter for transmission, in the communication.
- the process saves the air interface signaling overhead of the new key negotiation, and ensures that the wireless configuration parameters are encrypted when the air interface is transmitted, thereby ensuring security.
- the terminal receives the wireless configuration parameter encrypted by using the first key from the service device, including: receiving, by the terminal from the service device, the first encrypted using the first key The message, the first message includes the wireless configuration parameter.
- the first message further includes at least one of: a key derivation parameter, an encryption algorithm associated with the second key, and an integrity protection algorithm associated with the second key;
- the key derivation parameter is used to derive the second key, and the second key is a key used by the terminal to communicate with the service device.
- the terminal receives, from the service device, a first message encrypted by using the first key, that is, the terminal receives from the service device, encrypts and completes using the first key.
- the first message of sexual protection is not limited to, sexual protection, but rather to, sexual protection, or to, sexual protection.
- the first message is used to indicate that the third state is maintained.
- the method further includes: the terminal maintaining the third state.
- the terminal sends the first terminal identifier to the service device, where the terminal sends a second message to the service device, where the second message includes the first terminal identifier and the Authentication information of the terminal, the authentication information being generated based on the first key.
- the embodiment of the present application provides a communication method, including: a service device receives a first terminal identifier from a terminal, where the first terminal identifier is used to identify the terminal and an anchor device; and the service device sends the anchor device to the anchor device.
- the first terminal identifier and the wireless configuration parameter the service device receives, from the anchor device, a wireless configuration parameter, a second key, and a key derivation parameter encrypted by using the second key, where the second key is the service device and the terminal a key used for communication, the key derivation parameter being used to derive the second key; the service device transmitting a key derivation parameter and a wireless configuration parameter encrypted using the second key to the terminal.
- the anchor device assists the key used between the service device and the terminal and encrypts the wireless configuration parameters with the key.
- the method not only ensures the secure transmission of the wireless configuration parameters but also saves the signaling overhead of the key negotiation.
- Various designs of the fourth aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, including: an anchor device receives a first terminal identifier and a wireless configuration parameter from a service device; and the anchor device sends a second key, a new key derivation parameter, to the service device, And a wireless configuration parameter encrypted using the second key; wherein the second key is a key used by the serving device to communicate with the terminal, and the key derivation parameter is used to derive the second key.
- the anchor device assists the key used between the service device and the terminal and encrypts the wireless configuration parameters with the key.
- the method not only ensures the secure transmission of the wireless configuration parameters but also saves the signaling overhead of the key negotiation.
- Various designs of the fifth aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, including: a terminal sending a first terminal identifier to a service device, where the first terminal identifier is used to identify the terminal and an anchor device; and the terminal receives the second secret from the service device. a key, a key derivation parameter, and a wireless configuration parameter encrypted using the second key; wherein the second key is a key used by the service device to communicate with the terminal, and the key derivation parameter is used to derive the Two keys.
- the anchor device assists the key used between the service device and the terminal and encrypts the wireless configuration parameters with the key.
- the method not only ensures the secure transmission of the wireless configuration parameters but also saves the signaling overhead of the key negotiation.
- Various designs of the sixth aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, including: a service device receives a first terminal identifier from a terminal, where the first terminal identifier is used to identify the terminal and an anchor device; and the service device sends the first device to the anchor device. a terminal identifier; the service device receives a new key derivation parameter from the anchor device, and the second key; the service device sends the wireless configuration parameter encrypted by the second key to the terminal, and the key derivation parameter; wherein the second key is a service A key used by the device to communicate with the terminal, and a key derivation parameter is used to derive the second key.
- the anchor device assists the key used between the service device and the terminal, and the anchor device encrypts the wireless configuration parameters with the key.
- the method not only ensures the secure transmission of the wireless configuration parameters but also saves the signaling overhead of the key negotiation.
- Various designs of the seventh aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, including: an anchor device receives a first terminal identifier from a service device, where the first terminal identifier is used to identify a terminal; and the anchor device sends a second key to the service device, Key derivation parameters; wherein the second key is a key used by the service device to communicate with the terminal, and the key derivation parameter is used to derive the second key.
- the anchor device assists the key used between the service device and the terminal, and the anchor device encrypts the wireless configuration parameters with the key.
- the method not only ensures the secure transmission of the wireless configuration parameters but also saves the signaling overhead of the key negotiation.
- Various designs of the eighth aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, where the method includes:
- the service device receives the first terminal identifier from the terminal, the first terminal identifier is used to identify the terminal and the anchor device; the service device sends the first terminal identifier to the anchor device; the service device receives the first key from the anchor device The service device transmits to the terminal a wireless configuration parameter encrypted using the first key; wherein the first key is a key used between the anchor device and the terminal communication.
- the first key used by the anchor device to communicate the anchor device with the terminal device is sent to the service device, and the service device uses the first key to encrypt the wireless configuration parameter, so that the terminal does not need to negotiate with the service device.
- the service device uses the new key to encrypt the wireless configuration parameters for transmission, which saves the air interface signaling overhead of the new key negotiation in the communication process, and ensures that the wireless configuration parameters are encrypted during the air interface transmission, ensuring security. Sex.
- Various designs of the ninth aspect can refer to various designs of the first to third aspects.
- the embodiment of the present application provides a communication method, where the method includes: an anchor device receives a first terminal identifier from a service device, where the first terminal identifier is used to identify the terminal; and the anchor device sends the first password to the service device.
- the first key is a key used for communication between the anchor device and the terminal.
- the first key used by the anchor device to communicate the anchor device with the terminal device is sent to the service device, and the service device uses the first key to encrypt the wireless configuration parameter, so that the terminal does not need to negotiate with the service device.
- the service device uses the new key to encrypt the wireless configuration parameters for transmission, which saves the air interface signaling overhead of the new key negotiation in the communication process, and ensures that the wireless configuration parameters are encrypted during the air interface transmission, ensuring security. Sex.
- Various designs of the tenth aspect can refer to various designs of the first to third aspects.
- an embodiment of the present application provides a communication apparatus.
- the communication device can be used to implement the method of any of the first, fourth, seventh, and ninth aspects above.
- the communication device can be a base station, a chip, or a baseband single board.
- the communication device includes a processor.
- the processor is operative to perform the functions of the various parts of any of the first, fourth, seventh, and ninth aspects above.
- the device includes a processor and a memory.
- the memory is for storing a program implementing the method of any of the above first, fourth, seventh, and ninth aspects, and the processor is operative to run the above program to implement the method of any of the above first, fourth, seventh, and ninth aspects.
- the device includes one or more chips, such as a chip containing a processor or a chip containing transceiver circuitry.
- the apparatus can be used to perform the functions of the various parts of any of the first, fourth, seventh, and ninth aspects above.
- the communication device may include a transceiver component.
- an embodiment of the present application provides a communication apparatus.
- the communication device can be used to implement the method of any of the above second, fifth, eighth, and ten aspects.
- the communication device can be a base station, a chip, or a baseband single board.
- the communication device includes a processor.
- the processor is operative to perform the functions of the various parts of any of the second, fifth, eighth, and ten aspects above.
- the device includes a processor and a memory.
- the memory is for storing a program implementing the method of any of the above second, fifth, eighth, and ten aspects, the processor being operative to run the above program to implement the method of any of the above second, fifth, eighth, and tenth aspects.
- the device includes one or more chips, such as a chip containing a processor or a chip containing transceiver circuitry.
- the apparatus can be used to perform the functions of the various parts of any of the second, fifth, eighth, and ten aspects above.
- the communication device may include a transceiver component.
- the embodiment of the present application provides a communication apparatus.
- the communication device can be used to implement the method of any of the above third and sixth aspects.
- the communication device can be a terminal, or a chip.
- the communication device includes a processor.
- the processor is operative to perform the functions of the various parts of any of the third and sixth aspects above.
- the device includes a processor and a memory.
- the memory is for storing a program implementing the method of any of the above third and sixth aspects, the processor being operative to run the above program to implement the method of any of the above third or sixth aspect.
- the device includes one or more chips, such as a chip containing a processor or a chip containing transceiver circuitry.
- the apparatus can be used to perform the functions of the various parts of any of the third and sixth aspects above.
- the communication device may include a transceiver component.
- the embodiment of the present application further provides a computer program product, the program product comprising the program for implementing the method of any of the above first to ten aspects.
- the embodiment of the present application further provides a computer readable storage medium, where the medium stores the program of the fourteenth aspect.
- the wireless configuration parameter can be encrypted by using the first key or the second key, which ensures the security of the transmission and saves the signaling caused by the key negotiation. Overhead.
- FIG. 1 is a simplified schematic diagram of a wireless communication system
- FIG. 2 is a schematic flowchart of communication between a terminal and a serving base station
- FIG. 3 is a schematic flowchart of another terminal and a service base station communicating
- FIG. 4 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 5 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 6 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 7 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 8 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 9 is a schematic flowchart of communication between another terminal and a serving base station.
- 10 is a schematic flowchart of communication between another terminal and a serving base station
- 11 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 12 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 13 is a schematic flowchart of communication between another terminal and a serving base station
- FIG. 14 is a schematic flowchart of communication between another terminal and a serving base station
- 15 is a schematic flowchart of communication between another terminal and a serving base station
- 16 is a schematic flowchart of communication between another terminal and a serving base station
- 17 is a schematic structural diagram of a terminal
- 18 is a schematic structural diagram of an access network device.
- the identifier may refer to an index, a number, and the like.
- the term “comprises” and variations thereof may mean non-limiting inclusion; the term “or” and its variants may mean “and/or”; the terms “associated”, “associated”, “corresponding” And their variants can refer to “bound”, “bound to”, “mapped”, “configured”, “allocated”, “based on”, or “according to...
- the term “pass” and its variants may mean “utilizing", “using", or “on”, etc.; the terms “acquiring”, “determining” and their variants may mean “selecting", “query” “,” “calculation”, etc.; the term “when” can mean “if", "under” conditions, and the like.
- the content in parentheses "()" may be an example, or may be another expression, which may be a description that may be omitted, or may be further explained and explained.
- the wireless communication system includes a core network device (for example, user plane gateway A) and a plurality of access network devices (only base station A, base station B, and base station C are shown in the figure, but may include more connections. Network access equipment).
- the plurality of access network devices are connected to the core network device.
- the wireless communication system may be a fourth generation (4G) communication system, such as a long term evolution (LTE) system, or may be a fifth generation (5G) communication system, such as a new radio (NR) system, Or it may be a communication system in which a plurality of wireless technologies are integrated, such as a communication system in which LTE technology and NR technology are integrated.
- the access network device can perform wireless communication with the terminal A through the air interface resource.
- terminal A can establish an air interface connection with base station A for data transmission.
- terminal A is in a connected state, and connection between base station A and user plane gateway A is established for terminal A.
- a and user plane gateway A have the context of terminal A.
- the terminal A can enter the third state.
- the air interface connection between the terminal A and the base station A is released, and the connection established between the base station A and the user plane gateway A for the terminal A is maintained, and the base station A and the base station A are connected.
- the user plane gateway A continues to save the context of the terminal A, and the base station A can be referred to as the anchor base station of the terminal A.
- the terminal A may send a message to the base station C to request the base station C to provide a service for it.
- the base station C may be referred to as the serving base station of the terminal A.
- the anchor base station refers to the terminal being in the third In the state, the base station retaining the terminal context;
- the serving base station refers to the base station that provides the terminal with the air interface resource of the base station.
- FIG. 2 is a schematic flow chart of communication between a terminal and a serving base station.
- terminal A is in the third state
- base station A is the anchor base station of terminal A
- terminal A selects base station C as its serving base station.
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier of the terminal A, and the first terminal identifier is associated with the base station A.
- the base station C sends a second message to the base station A.
- the second message includes the first terminal identifier described above.
- the base station A sends a second response message to the base station C.
- the second response message includes a key X and a next hop chaining count (NCC) for deriving the key X.
- This key X is a key used for communication between the base station C and the terminal A.
- the base station C sends a first response message to the terminal A.
- the first response message includes the above NCC.
- the first response message can be integrity protected using the key X.
- Terminal A derives the above key X through the NCC.
- S106 The terminal A sends a third message to the base station C.
- the third message can be used to inform the base station C that the key update has been completed.
- This third message can be encrypted and integrity protected with the key X.
- the base station C sends a third response message to the terminal A.
- the third response message includes a wireless configuration parameter assigned to terminal A.
- the third response message uses the key X for encryption and integrity protection.
- the serving base station first performs key agreement with the terminal, and then uses the negotiated key to encrypt and integrity protect the wireless configuration parameters.
- the above process ensures the security of the wireless configuration parameters, the air interface signaling overhead is large and the delay is long.
- FIG. 3 is a schematic flowchart of another terminal and a serving base station communicating. As shown in FIG. 2, terminal A is in the third state, base station A is the anchor base station of terminal A, and terminal A selects base station C as its serving base station.
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier of the terminal A, and the first terminal identifier is associated with the base station A.
- the base station C sends a second message to the base station A.
- the second message includes the first terminal identifier described above.
- the base station A sends a second response message to the base station C.
- the second response message includes a key X and an NCC for deriving the key X.
- This key X is a key used for communication between the base station C and the terminal A.
- the base station C sends a first response message to the terminal A.
- the first response message includes the above NCC and wireless configuration parameters assigned to terminal A.
- the first response message uses the key X for integrity protection.
- the serving base station sends the NCC for deriving the key X and the wireless configuration parameter with only integrity protection but not encrypted to the terminal in the process of performing key agreement with the terminal, although
- the air interface signaling overhead of the terminal A obtaining the wireless configuration parameter is small, but since the wireless configuration parameter is not encrypted, there is a security risk.
- the present application provides the following two solutions, which are designed to ensure air interface security while saving air interface signaling overhead.
- the key used by the following terminal and anchor base station communication is called the old key
- the key derivation parameter used to derive the old key is called the old key derivation parameter
- the key is used by the terminal and the serving base station for communication.
- the key derivation parameter used to derive the new key is called the new key derivation parameter.
- Solution 1 The serving base station sends the wireless configuration parameter to be sent to the terminal to the anchor base station, and the anchor base station encrypts the wireless configuration parameter by using the old secret, and the serving base station sends the wireless configuration parameter encrypted by using the old key to the terminal.
- the terminal does not need to negotiate a new key with the serving base station, and the serving base station uses the new key to encrypt the wireless configuration parameter for transmission.
- the transmission saves the air interface signaling overhead of the new key negotiation in the communication process, and ensures that the wireless configuration parameters are encrypted when the air interface is transmitted, thereby ensuring security.
- Solution 2 The anchor base station assists the serving base station and the terminal to complete key negotiation, and the serving base station or the anchor base station encrypts the wireless configuration parameter by using the new key and sends the wireless configuration parameter to the terminal.
- the anchor base station assists the terminal and the serving base station in key negotiation, which saves signaling, and the wireless configuration parameter uses a new key for transmission, thereby ensuring security.
- Option 1 has a variety of alternative implementations.
- Figure 4 is a first embodiment of the first scheme. As shown in FIG. 4, terminal A is in the third state, base station A is the anchor base station of terminal A, and terminal A selects base station C as its serving base station.
- the terminal A sends the first terminal identifier to the base station C.
- the first terminal identifier is used to identify the terminal A and the base station A.
- the first terminal identifier is used to identify that the base station A can be understood as the first terminal identifier is associated with the base station A.
- the base station C sends the first terminal identifier and the wireless configuration parameter to the base station A.
- the base station C can determine the base station A according to the first terminal identifier.
- the above wireless configuration parameter may be a wireless configuration parameter that the base station C needs to send to the terminal A.
- the base station C may allocate a packet data convergence protocol (PDCP) sequence number (SN) for the wireless configuration parameter, and send the PDCP SN to the base station A.
- PDCP packet data convergence protocol
- SN packet data convergence protocol sequence number
- the base station A sends the foregoing wireless configuration parameter encrypted by using the old key to the base station C.
- the base station A After receiving the first terminal identifier, the base station A can learn the old key used for communication with the terminal A, and encrypt the wireless configuration parameter by using the old key.
- the base station C sends the foregoing wireless configuration parameter encrypted by the old key to the terminal A.
- Terminal A receives the above wireless configuration parameters encrypted using the old key, and can decrypt the encrypted wireless configuration parameters using the old key. Terminal A does not need to complete the negotiation of the new key with the base station C, and then encrypts the wireless configuration parameters with the new key, thereby saving the overhead of air interface signaling. At the same time, the wireless configuration parameters transmitted on the air interface are encrypted, and security is guaranteed.
- the association of the first terminal identifier of the S301 part with the base station A means that the base station A can be determined by the first terminal identifier.
- the first optional design is to store a mapping table in which the mapping relationship between the first terminal identifier and the base station A is recorded. The mapping table may be stored on the base station C or stored on other devices, and the base station C acquires the mapping table from other devices.
- the second optional design is that the first terminal identifier includes at least two parts, one part is the identifier of the base station A, and the other part is the identifier of the terminal A in the base station A.
- the second optional design does not need to maintain the mapping relationship between each terminal identifier and the anchor base station on multiple base stations or devices, and the implementation is relatively simple.
- the wireless configuration parameter in the above part S302 is a configuration parameter to be sent by the serving base station to the terminal. Which wireless configuration parameters are sent by the serving base station to the terminal can be determined according to different communication needs. For example, if the serving base station wants the terminal to enter the connected state, the foregoing wireless configuration parameters may include: radio resource configuration specific information, compression indication information, antenna configuration information, measurement configuration information, and the like. For example, if the serving base station wants the terminal to enter the idle state, the foregoing wireless configuration parameters may include: redirecting carrier information, reselecting the priority information of the cell list, releasing the cause value, and the like.
- the serving base station is required to be the anchor base station of the terminal, and the wireless configuration parameter may include: a second terminal identifier associated with the serving base station, where the second terminal identifier is used to identify the terminal.
- the design of the second terminal identifier associated with the serving base station may refer to the design of the first terminal identifier associated with the base station A.
- the wireless configuration parameters sent by the serving base station to the terminal may also change, which is not limited in this embodiment of the present application.
- the foregoing wireless configuration parameter may include at least one of the following: a second terminal identifier associated with the serving base station, and radio resource configuration specific information, Compressing indication information, antenna configuration information, redirection carrier information, priority information of the reselected cell list, release cause value, measurement configuration information, cell radio network temporary identifier (C-RNTI) allocated by the serving cell ), and radio resource control (RRC) status indication.
- the second terminal identifier associated with the serving base station may be the same as the first terminal identifier.
- the old key in the above part S303 is generated by the terminal A and the base station A through key agreement, and can be used for encryption and integrity protection of the communication between the terminal A and the base station A.
- the old key may be a base station key (for example, KeNB), and encryption using the old key means that an encryption key (for example, KRRCenc) is derived by the old key, and is encrypted by the derived encryption key.
- the old key may be a key used by terminal A and base station A when terminal A is in the connected state.
- the old key may be a key derived by the terminal A according to the key derivation parameter carried in the message indicating the entry into the third state and the identifier of the serving cell of the base station A where the terminal A is located.
- Integrity protection with the old key means that the integrity protection key (for example: KRRCint) is derived from the old key and integrity protection is performed using the integrity protection key.
- the integrity protection key for example: KRRCint
- the old key of the above S303 part can also be used for identity verification protection.
- Using the old key for authentication protection means deriving the integrity protection key (for example: KRRCint) through the old key, and using the integrity protection key to generate a message authentication code for integrity (message authentication code for integrity) , MAC-I).
- MAC-I can sometimes also be called a token.
- KRRCenc and KRRCint are keys belonging to the control plane, and the key of the user plane can also be derived by the base station key, such as KUPenc.
- the base station key such as KUPenc.
- Appendix A related content of the key derivation function.
- Appendix B for algorithms that use encryption keys for encryption and integrity protection using integrity protection keys, reference may be made, for example, to Appendix B of the 3GPP TS 33.401 v14.2.0: Encryption and Integrity Protection algorithms.
- Figure 5 is a second embodiment based on the first embodiment. As shown in Figure 5:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier, the identity verification information, and the wireless configuration parameter to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S302A may be: base station C sends a first message and a wireless configuration parameter to base station A.
- S300A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, you can execute S300B.
- S300B The base station A generates a second message, where the second message includes the foregoing wireless configuration parameter.
- S303A The base station A sends the second message to the base station C for encryption and integrity protection using the old key.
- the base station A can obtain the first terminal identifier from the first message, and then learn the old key used for communication with the terminal A, and use the old key to encrypt and protect the second message.
- S304A The base station C sends the second message using the old key encryption and integrity protection to the terminal A.
- the terminal A After receiving the above second message using the old key encryption and integrity protection, the terminal A can decrypt and perform integrity verification using the old key.
- the terminal A does not need to complete the negotiation of the new key with the base station C to transmit the wireless configuration parameters, thereby saving the overhead of the air interface signaling interaction.
- the wireless configuration parameters transmitted on the air interface are encrypted and integrity protected, and the security is improved.
- the S300A may not execute.
- the second embodiment shown in FIG. 5 is based on the first embodiment shown in FIG. 4, and the integrity protection of the interaction between the terminal and the serving base station is increased, so that the security is further guaranteed.
- the identity verification information in the above S301A is information for verifying the identity of the terminal.
- the authentication information may be a message authentication code for integrity (MAC-I).
- MAC-I message authentication code for integrity
- MAC-I message authentication code for integrity
- the first message in the foregoing S301A may be an RRC message.
- the first message may be an RRC Connection Reestablishment Request (RRCConnectionReestablishmentRequest) message, or may be an RRC Connection Resume Request (RRCConnectionResumeRequest) message.
- RRCConnectionReestablishmentRequest RRC Connection Reestablishment Request
- RRCConnectionResumeRequest RRC Connection Resume Request
- the foregoing second message may be an RRC message.
- the second message may be an RRC Connection Reestablishment (RRCConnectionReestablishment) message, or may be an RRC Connection Reestablishment Reject message, or may be an RRC Connection Resume message, or may be an RRC Connection Setup message.
- RRCConnectionReject RRC Connection Reject
- RRCConnectionRelease RRC Connection Release
- the RRC connection re-establishment message, the RRC connection re-establishment rejection, the RRC connection recovery message, the RRC connection setup message, the RRC connection reject message, and the related content of the RRC connection release message may refer to, for example, section 6.2.2 of TS 36.331 v14.2.2 of 3GPP. Related content.
- the second message may be used to indicate that the terminal maintains the third state, enters the connected state, or enters the idle state.
- the second message is generated by the anchor base station.
- the second message can be generated by the serving base station.
- the third embodiment shown in FIG. 6 is modified on the basis of the second embodiment shown in FIG. 5, and the second message is generated by the serving base station. As shown in Figure 6:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the base station C sends the first terminal identifier, the identity verification information, and the second message to the base station A.
- the second message includes wireless configuration parameters.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S302B may be: the base station C sends the first message and the second message to the base station A.
- the base station C may allocate a PDCP SN for the second message, and send the PDCP SN to the base station A.
- S300A Base station A performs identity verification.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the integrity verification is successful, S303A can be executed.
- S303A The base station A sends the second message to the base station C for encryption and integrity protection using the old key.
- the base station A may modify the second message according to actual needs of the communication. For example, an encryption algorithm selected by the base station A, an integrity protection algorithm, and the like are added to the second message.
- S304A The base station C sends the second message using the old key encryption and integrity protection to the terminal A.
- the terminal A After receiving the above second message using the old key encryption and integrity protection, the terminal A can decrypt and perform integrity verification using the old key.
- the terminal A does not need to complete the negotiation of the new key with the base station C to transmit the wireless configuration parameters, thereby saving the overhead of the air interface signaling interaction.
- the wireless configuration parameters transmitted on the air interface are encrypted and integrity protected, and the security is improved.
- FIG. 6 is marked with the same reference numerals as those in FIG. 5, and the description of the same technical features in the embodiment shown in FIG. 6 and FIG. 5 can be referred to the description in the embodiment shown in FIG. 5.
- the serving base station may send the wireless configuration parameter to the anchor base station after the first message integrity verification succeeds.
- the fourth embodiment shown in Fig. 7 is another variation of the second embodiment. As shown in Figure 7:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the base station C sends the first terminal identifier and the identity verification information to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S302A-1 may be: base station C sends a first message to base station A.
- S300A Base station A performs identity verification.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, the base station A may notify the base station C of the result of the successful verification to execute S302A-2.
- the base station C transmits the wireless configuration parameter to the base station A.
- the base station C may allocate a PDCP SN for the wireless configuration parameter, and send the PDCP SN to the base station A.
- S300B The base station A generates a second message, where the second message includes the foregoing wireless configuration parameter.
- S303A The base station A sends the second message to the base station C for encryption and integrity protection using the old key.
- S304A The base station C sends the second message using the old key encryption and integrity protection to the terminal A.
- the serving base station may send the second message to the anchor base station after the first message integrity verification is successful.
- the fifth embodiment shown in Fig. 8 is a modification of the third embodiment. As shown in Figure 8:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the base station C sends the first terminal identifier and the identity verification information to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S302B-1 may be: base station C sends a first message to base station A.
- S300A Base station A performs identity verification.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, the base station A can notify the base station C that the verification is successful, so that the base station C can execute S302B-2.
- the base station C sends a second message to the base station A; the second message includes a wireless configuration parameter.
- the base station C may allocate a PDCP SN for the second message, and send the PDCP SN to the base station A.
- S303A The base station A sends the second message to the base station C for encryption and integrity protection using the old key.
- the base station A may modify the second message according to actual needs of the communication. For example, an encryption algorithm, an integrity protection algorithm, and the like are added to the second message.
- S304A The base station C sends the second message using the old key encryption and integrity protection to the terminal A.
- FIG. 8 is marked with the same reference numerals as those in FIG. 6, and the same technical features in the embodiment shown in FIG. 8 and FIG. 6, reference may be made to the description in the embodiment shown in FIG. 6.
- the parameter of the base station C such as the identifier of the serving cell, may be used in the process of performing identity verification by the base station A.
- the base station C can transmit the parameters of the base station C required for identity verification to the base station A.
- the new key negotiation between the terminal and the serving base station may be assisted by the anchor base station to save signaling.
- the anchor base station can derive the new key according to the old key and the new key derivation parameter, and send the new key and the new key derivation parameter to the service.
- the base station and notifies the terminal of the new key derivation parameters.
- the terminal can derive the same new key based on the new key derivation parameters and the old key. In this way, the new key can be used for communication between the terminal and the serving base station.
- both the terminal and the serving base station have new key and new key derivation parameters, which facilitates the terminal and the serving base station to push the next key based on the new key.
- the terminal may be notified of the new key derivation parameter by means of display, or the terminal may be notified of the new key derivation parameter in an implicit manner.
- the new key derivation parameter can be sent to the terminal.
- the anchor base station may use the old key to encrypt the new key derivation parameter, and send the encrypted new key derivation parameter to the serving base station, and the serving base station forwards the parameter to the terminal, so as to ensure the transmission of the new key derivation parameter. Security.
- a new key derivation parameter generation rule may be preset, and the new key derivation parameter need not be sent to the terminal, and the anchor base station and the terminal respectively generate the same new according to the new key derivation parameter generation rule.
- the key derivation parameter is sent by the anchor base station to the serving base station.
- the new key derivation parameter generation rule may be to add 1 to the value of the old key derivation parameter as a new key derivation parameter, or the new key derivation parameter generation rule may be to use the old key derivation parameter as a new key derivation parameter.
- the preset new key derivation parameter generation rule may be specified by the communication standard, or the terminal negotiates with the anchor point base station in advance, or is configured in advance.
- the first to fifth embodiments described above further include that the base station A derives a new key based on the old key and the new key derivation parameter.
- the base station A when the display mode is adopted, in the S303 part, the base station A also transmits 1) a new key derivation parameter and 2) a new key to the base station C, and in the S304 part, the base station C also goes to the terminal.
- A transmits the above 1) new key derivation parameter; or in S303, base station A also transmits 1) new key derivation parameters, 2) new key, and 3) new key deduction using old key encryption to base station C.
- the parameter, in part S304, the base station C also transmits to the terminal A the above 3) new key derivation parameters encrypted using the old key.
- the base station A when in an implicit manner, in the S303 part, the base station A also sends 1) a new key derivation parameter and 2) a new key to the base station C, and the S304 part remains unchanged or Part S304 of the base station C also sends an indication to the terminal that the new key derivation parameter is equal to a null value (NULL).
- the base station A generates the 1) new key derivation parameter according to the new key derivation parameter generation rule.
- the terminal A does not receive the new key derivation parameter or the new key derivation parameter encrypted by the old key in the S304 part, the terminal A generates the 1) new key derivation parameter according to the new key derivation parameter generation rule.
- the above 2) new key can be derived according to the above 1) new key derivation parameters.
- the base station A when the display mode is adopted, in the S303A part, the base station A also transmits 1) a new key derivation parameter and 2) a new key to the base station C, and the part of the S303A part
- the second message also includes the above 1) new key derivation parameters. Therefore, the second message sent to terminal A in part S304A also includes the above 1) new key derivation parameters. Carrying the new key derivation parameter in the second message, and encrypting and integrity protection of the second message can better ensure the security of the transmission of the new key derivation parameter.
- the base station A may transmit 1) a new key derivation parameter and 2) a new key to the base station C, and the base station C generates a second message including 1) a new key derivation parameter. And sending the generated second message to the base station A.
- the above 1) new key derivation parameters and 2) the new key may be carried by the base station A to the base station C in a message notifying that the base station C is successful.
- the base station A when the implicit mode is adopted, in the S303A part, the base station A also transmits 1) a new key derivation parameter and 2) a new key to the base station C, and the part of the S303A part
- the second message remains unchanged or the second message also includes an indication that the new key derivation parameter is equal to NULL.
- the terminal A may generate the new key derivation parameter according to the new key derivation parameter generation rule, and derive the new key according to the old key and the new key derivation parameter.
- the implicit mode can be used to avoid the transmission of new key derivation parameters in the air interface, which guarantees the security and saves the signaling overhead of the air interface.
- both the terminal A and the serving base station have the same new key and new key derivation parameters, and the new key negotiation is completed. At the same time, the signaling overhead of the air interface is saved.
- the above new key can be used for encryption and integrity protection of communication between the terminal and the serving base station, such as encryption and integrity protection of communication between the terminal A and the base station C.
- the new key derivation parameter is used to derive the new key.
- the new key derivation parameter can be NCC.
- the new key may be a base station key (for example, KeNB), and the encryption using the new key refers to deriving an encryption key (for example, KRRCenc) by using a new key, and using the derived encryption key.
- Encrypt. Integrity protection with a new key means that the integrity protection key (eg KRRCint) is derived with the new key and integrity protection is done using the integrity protection key.
- a method for deciphering an encryption key and an integrity protection key for a base station key, and an algorithm for performing encryption using an encryption key and integrity protection using an integrity protection key may refer to the correlation in the first implementation described above. content.
- a method of using the NCC to derive a base station key reference may be made, for example, to the related content of Appendix A.5 of TS33.401 of 3GPP.
- the parameters of the base station C may be used in the process of deriving the new key by the base station A.
- the base station C can transmit to the base station A the parameters of the base station C required to derive the new key.
- the security algorithm between the terminal and the serving base station may be selected by the anchor base station to save signaling.
- the security algorithm includes an encryption algorithm, or an integrity protection algorithm, that is, an algorithm for encrypting using a new key or an algorithm for performing integrity protection. This security algorithm can be referred to as a security algorithm associated with the new key.
- the anchor base station can select an appropriate security algorithm and notify the serving base station and the terminal of the security algorithm. In this way, the same security algorithm can be used between the terminal and the serving base station to implement encryption or integrity protection of the communication.
- the terminal security algorithm may be notified in a display manner, or the terminal security algorithm may be notified in an implicit manner.
- the security algorithm can be sent to the terminal.
- the anchor base station may use the old key to encrypt the security algorithm, and send the encrypted security algorithm to the serving base station, and the serving base station forwards the terminal to the terminal, so as to ensure the security of the security algorithm transmission.
- the serving base station may send the security algorithm it supports to the anchor base station, and the anchor base station may select an appropriate security algorithm among the security algorithms supported by the serving base station.
- the security algorithm selection rule may be preset, and the security algorithm does not need to be sent to the terminal.
- the anchor base station and the terminal respectively select the same security algorithm according to the security algorithm selection rule, and the anchor base station sends the selected security algorithm to the serving base station.
- the security algorithm selection rule may be an encryption algorithm with a selection index of 0, or the security algorithm selection rule may be an integrity protection algorithm with a selection index of 1, or the security algorithm selection rule may be an encryption algorithm with a selection index of 0. And an integrity protection algorithm with an index of 2.
- the pre-set security algorithm selection rule may be specified by the communication standard or configured in advance. With this design, the security algorithm used between the terminal and the serving base station does not need to negotiate through air interface signaling, which saves the overhead of air interface resources.
- the base station A when the display mode is adopted, in the S303 part, the base station A also sends 1) security to the base station C.
- the algorithm, in part S304, the base station C also sends the above 1) security algorithm to the terminal A; or, in the S303 part, the base station A also sends 1) the security algorithm and 2) the security algorithm encrypted with the old key to the base station C, in S304
- the base station C also transmits to the terminal A the above 2) security algorithm encrypted using the old key.
- the first implementation manner may further include: the base station C sends the security algorithm supported by the base station C to the base station A.
- the base station A when the implicit mode is adopted, in the S303 part, the base station A also sends 1) the security algorithm to the base station C, the S304 part remains unchanged or the base station C also sends the security to the terminal in S304.
- the algorithm is equal to the indication of NULL.
- the base station A selects the above 1) security algorithm according to the security algorithm selection rule.
- terminal A does not receive the security algorithm in part S304, terminal A selects the above 1) security algorithm according to the above security algorithm selection rule.
- the base station A when the display mode is adopted, in the S303A part, the base station A also sends 1) the security algorithm to the base station C, and the second message of the S303A part further includes the above 1) security algorithm. . Therefore, the second message sent to terminal A in part S304A also includes the above 1) security algorithm. Carrying the security algorithm in the second message and encrypting and protecting the second message can better ensure the security of the security algorithm transmission.
- the second to fifth embodiments may further include: the base station C sends the security algorithm supported by the base station C to the base station A.
- the base station A may send the 1) security algorithm to the base station C, and the base station C generates a second message including 1) the security algorithm, and generates the generated second message.
- the foregoing 1) security algorithm may be carried by the base station A to the base station C in a message that informs the base station C that the verification is successful.
- the base station A when the implicit mode is adopted, in the S303A part, the base station A also sends 1) the security algorithm to the base station C, and the second message of the S303A part remains unchanged or the second The message also includes an indication that the security algorithm is equal to NULL.
- the base station A selects the above 1) security algorithm according to the security algorithm selection rule.
- the terminal A After receiving the second message, the terminal A may select the 1) security algorithm according to the foregoing security algorithm selection rule.
- the implicit transmission can avoid the transmission of security algorithms on the air interface, which guarantees the security and saves the signaling overhead of the air interface.
- the same security algorithm is used on both the terminal A and the serving base station (base station C) with the assistance of the anchor base station to complete the negotiation of the security algorithm and save the signaling overhead of the air interface.
- a third alternative design is a variant of the second alternative design.
- the anchor base station assists the security algorithm negotiation between the serving base station and the terminal to save signaling.
- the anchor base station may send the security algorithm supported by the terminal to the serving base station, and the serving base station selects an appropriate security algorithm in the security algorithm supported by the terminal, and notifies the terminal. In this way, there is no need to notify the respective supported security algorithms through the air interface between the terminal and the serving base station, and the air interface resources are saved.
- the base station A in the S303 part, the base station A also transmits 1) the security algorithm supported by the terminal A to the base station C, and in the portion S304, the base station C also transmits 2) the security algorithm to the terminal A.
- the base station A in part S303A, also transmits 1) a security algorithm supported by the terminal A to the base station C, and in the portion S304A, the base station C also transmits 2) the security algorithm to the terminal A.
- the above 2) security algorithm is selected from 1) security algorithms supported by terminal A.
- the security algorithm selection rule may be set in advance, and the terminal and the serving base station may each select the same security algorithm according to the security algorithm selection rule.
- the security algorithm used between the terminal and the serving base station does not need to negotiate through air interface signaling, which saves the overhead of air interface resources.
- the anchor base station may send the context of the terminal to the serving base station, so that the serving base station can provide the terminal with the communication service.
- the method further includes: the base station A transmitting the context of the terminal A to the base station C.
- whether the terminal wireless configuration parameter or the second message is encrypted may be indicated to simplify the implementation of the terminal.
- information indicating whether to encrypt may be carried in a header of a packet data convergence protocol (PDCP) packet encapsulated with a wireless configuration parameter or a second message.
- PDCP packet data convergence protocol
- Option 2 has a variety of alternative implementations.
- Figure 9 is a first embodiment of the second embodiment. As shown in FIG. 9, terminal A is in the third state, base station A is the anchor base station of terminal A, and terminal A selects base station C as its serving base station.
- the terminal A sends a first terminal identifier to the base station C.
- the first terminal identifier is associated with the base station A, where the first terminal identifier is used to identify the terminal A and the base station A.
- the base station C sends the first terminal identifier to the base station A.
- the base station C can determine the base station A according to the first terminal identifier.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- the base station A sends a new key and a new key derivation parameter to the base station C.
- the base station A may obtain a new key derivation parameter based on the old key derivation parameter.
- the old key derivation parameter is used as a new key derivation parameter, or the value of the old key derivation parameter is incremented by 1 as a new key derivation parameter.
- the old key derivation parameter can be an NCC.
- the base station A can derive the new key based on the old key and the new key derivation parameters.
- the base station C sends the new key derivation parameter and the wireless configuration parameter encrypted by the new key to the terminal A.
- base station A can encrypt the wireless configuration parameters using the new key and transmit the wireless configuration parameters encrypted with the new key to base station C, and will be encrypted by base station C using the new key.
- the wireless configuration parameters are sent to terminal A.
- S402 may send the first terminal identifier and the wireless configuration parameter to the base station A to the base station A; the S404 may be: the base station A sends the new key, the new key derivation parameter, and the wireless configuration parameter encrypted by using the new key to the base station C.
- base station C can encrypt the wireless configuration parameters with the new key and send the wireless configuration parameters encrypted with the new key to terminal A.
- terminal A After receiving the new key derivation parameter, terminal A can derive the new key by using the new key derivation parameter and the old key, and decrypt the encrypted wireless configuration parameter with the new key to obtain the wireless configuration parameter.
- the terminal A does not need to complete the negotiation of the new key with the base station C, and then uses the new key to encrypt the wireless configuration parameters, thereby saving the overhead of the air interface signaling.
- the wireless configuration parameters transmitted on the air interface are encrypted, and security is guaranteed.
- the first terminal identifier in the S401 part may refer to the related description in the S301 part;
- the new key and the new key derivation parameter in the S403 and S404 parts may refer to a related description in the first optional design;
- the wireless configuration parameters of the above part S405 reference may be made to the related description in section S302.
- FIG 10 is a second embodiment of a base station in a first embodiment. As shown in Figure 10:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier and the identity verification information to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- Base station A may be: base station C sends a first message to base station A.
- S400A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, S403 can be performed.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- the base station A sends a new key and a new key derivation parameter to the base station C.
- the base station C generates a second message; the second message includes the above new key derivation parameter and a wireless configuration parameter encrypted using a new key.
- base station C After receiving the new key, base station C can encrypt the wireless configuration parameters with the new key.
- S405A-1 The base station C sends a second message to the terminal A for integrity protection using the new key.
- terminal A may obtain a new key derivation parameter from the second message. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can perform integrity verification on the second message and decrypt the encrypted wireless configuration parameters to obtain wireless configuration parameters.
- the new key derivation parameter may also be sent to the terminal A without using the second message.
- S400B-1 and S405A-1 can be replaced with S400B-2 and S405A-2.
- the base station C generates a second message; the second message includes a wireless configuration parameter.
- the base station C transmits a new key derivation parameter and a second message using the new key encryption and integrity protection to the terminal A.
- the new key derivation parameter may be carried in a MAC control element (MAC CE) of a media access control (MAC) packet including the second message.
- the new key derivation parameter may be carried in the header or trailer of the PDCP packet including the second message.
- Terminal A can obtain new key derivation parameters from the MAC data packet or the PDCP data packet. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can decrypt and verify the second message to obtain wireless configuration parameters.
- the terminal A does not need to complete the negotiation of the new key with the base station C, and then uses the new key to encrypt the wireless configuration parameters, thereby saving the overhead of the air interface signaling.
- the wireless configuration parameters transmitted on the air interface are encrypted, and security is guaranteed.
- the above S401A part is authenticated and protected, and the S405A-1 and S405-2 parts are integrity protected, so that the security of air interface transmission is further enhanced.
- the S400A may not execute.
- the description of the old key and the authentication based on the old key may refer to the related content of the S303 part; the first terminal identifier may refer to the related content of the S301 part; the authentication information may refer to the related content of the S301A part; the first message Refer to the relevant content of S301A; the authentication can refer to the description of S300A; the new key and the new key derivation parameters can refer to the related description in the first optional design; the second message can refer to the first one.
- the second embodiment introduces the second message; the new key encryption can refer to the relevant content of the S303A part; the integrity protection can refer to the relevant content of the S303A part.
- the encryption of the wireless configuration parameters may be implemented by a packet data convergence protocol (PDCP) layer or may be implemented by a MAC layer.
- PDCP packet data convergence protocol
- MAC media access control
- the encryption is performed by the serving base station.
- the encryption can be performed by the anchor base station using the new key.
- the third embodiment shown in FIG. 11 is modified on the basis of the second embodiment shown in FIG. 10, and the second message is generated by the anchor base station. As shown in Figure 11:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier, the identity verification information, and the wireless configuration parameter to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S402B may be: the base station C sends the first message and the wireless configuration parameter to the base station A.
- the base station C may allocate a PDCP SN for the wireless configuration parameter, and send the PDCP SN to the base station A.
- S400A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, S403 can be performed.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- S400C-1 The base station A generates a second message including the new key derivation parameter and the wireless configuration parameter encrypted using the new key.
- S404A-1 The base station A transmits to the base station C a second message, a new key, and a new key derivation parameter for integrity protection using the new key.
- the base station C may obtain the new key derivation parameter from the second message, and then S404A-1 is: the base station A sends the second message and the new key that use the new key for integrity protection to the base station C.
- S405A-1 The base station C sends a second message to the terminal A for integrity protection using the new key.
- terminal A may obtain a new key derivation parameter from the second message. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can perform integrity verification on the second message and decrypt the encrypted wireless configuration parameters to obtain wireless configuration parameters.
- the new key derivation parameter may also be sent to the terminal A without using the second message.
- S400C-1, S404A-1, and S405A-1 can be replaced with S400C-2, S404A-2, and S405A-2.
- S400C-2 The base station A generates a second message, where the second message includes a wireless configuration parameter.
- S404A-2 The base station A transmits a new key, a new key derivation parameter, and a second message using the new key encryption and integrity protection to the base station C.
- the base station C transmits a new key derivation parameter and a second message using the new key encryption and integrity protection to the terminal A.
- the new key derivation parameter may be carried in the MAC CE of the MAC data packet including the second message.
- the new key derivation parameter may be carried in the header or trailer of the PDCP packet including the second message.
- Terminal A can obtain new key derivation parameters from the above MAC data packet or PDCP data packet. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can decrypt and verify the second message to obtain wireless configuration parameters.
- the second message is generated by the anchor base station, as a variant of the third embodiment, may be served by the serving base station Generate a second message.
- the fourth embodiment shown in Fig. 12 is modified on the basis of the third embodiment shown in Fig. 11. As shown in Figure 12:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier, the identity verification information, and the second message to the base station A; the second message includes a wireless configuration parameter.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S402C may be: the base station C sends the first message and the second message to the base station A.
- the base station C may allocate a PDCP SN for the second message, and send the PDCP SN to the base station A.
- S400A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, S403 can be performed.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- S400D The base station A modifies the second message, where the modified second message includes the new key derivation parameter and the wireless configuration parameter encrypted by using the new key.
- S404A-1 The base station A transmits to the base station C a second message, a new key, and a new key derivation parameter for integrity protection using the new key.
- the base station C may obtain the new key derivation parameter from the second message, and then S404A-1 is: the base station A sends the second message and the new key that use the new key for integrity protection to the base station C.
- S405A-1 The base station C sends a second message to the terminal A for integrity protection using the new key.
- terminal A may obtain a new key derivation parameter from the second message. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can perform integrity verification on the second message and decrypt the encrypted wireless configuration parameters to obtain wireless configuration parameters.
- the new key derivation parameter may also be sent to the terminal A without using the second message.
- S400D, S404A-1, and S405A-1 can be replaced with S404A-2 and S405A-2.
- S404A-2 The base station A transmits a new key derivation parameter, a new key, and a second message using the new key encryption and integrity protection to the base station C.
- the base station C transmits a new key derivation parameter and a second message using the new key encryption and integrity protection to the terminal A.
- the new key derivation parameter may be carried in the MAC CE of the MAC data packet including the second message.
- the new key derivation parameter may be carried in the header or trailer of the PDCP packet including the second message.
- Terminal A can obtain new key derivation parameters from the above MAC data packet or PDCP data packet. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can decrypt and verify the second message to obtain wireless configuration parameters.
- the serving base station may send the wireless configuration parameter to the anchor base station after the first message integrity verification succeeds.
- the fifth embodiment shown in Fig. 13 is a modification of the third embodiment shown in Fig. 11. As shown in Figure 13:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier and the identity verification information to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S402B-1 may be: base station C sends a first message to base station A.
- S400A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, the base station A can notify the base station C that the verification is successful, and the base station C can execute S402B-2.
- the base station C transmits the wireless configuration parameter to the base station A.
- the base station C may allocate a PDCP SN for the wireless configuration parameter, and send the PDCP SN to the base station A.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- S400C-1 The base station A generates a second message including the new key derivation parameter and the wireless configuration parameter encrypted using the new key.
- S404A-1 The base station A transmits to the base station C a second message, a new key, and a new key derivation parameter for integrity protection using the new key.
- S405A-1 The base station C sends a second message to the terminal A for integrity protection using the new key.
- terminal A may obtain a new key derivation parameter from the second message. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can perform integrity verification on the second message and decrypt the encrypted wireless configuration parameters to obtain wireless configuration parameters.
- the new key derivation parameter may also be sent to the terminal A without using the second message.
- S400C-1, S404A-1, and S405A-1 can be replaced with S400C-2, S404A-2, and S405A-2.
- S400C-2 The base station A generates a second message, where the second message includes a wireless configuration parameter.
- S404A-2 The base station A transmits a new key derivation parameter, a new key, and a second message using the new key encryption and integrity protection to the base station C.
- the base station C transmits a new key derivation parameter and a second message using the new key encryption and integrity protection to the terminal A.
- the new key derivation parameter may be carried in the MAC CE of the MAC data packet including the second message.
- the new key derivation parameter may be carried in the header or trailer of the PDCP packet including the second message.
- Terminal A can obtain new key derivation parameters from the above MAC data packet or PDCP data packet. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can decrypt and verify the second message to obtain wireless configuration parameters.
- the serving base station may send the second message to the anchor base station after the first message integrity verification succeeds.
- the sixth embodiment shown in Fig. 14 is a modification of the fourth embodiment shown in Fig. 12. As shown in Figure 14:
- the terminal A sends a first message to the base station C.
- the first message includes a first terminal identifier and identity verification information.
- the authentication information is generated based on the old key, that is, the terminal A is authenticated and protected based on the old key.
- the authentication information can be generated using an integrity protection algorithm.
- the base station C sends the first terminal identifier and the identity verification information to the base station A.
- the base station C may also send the first terminal identifier and the identity verification information to the base station A by sending the first message to the base station A.
- S402C-1 may be: base station C sends a first message to base station A.
- S400A Base station A performs identity verification.
- the base station A can authenticate the terminal A based on the old key and the authentication information.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the verification is successful, the base station A can notify the base station C that the verification is successful, and the base station C can execute S402C-2.
- the base station C sends a second message to the base station A; the second message includes a wireless configuration parameter.
- the base station C may allocate a PDCP SN for the second message, and send the PDCP SN to the base station A.
- S403 The base station A derives a new key according to the old key and the new key derivation parameter.
- S400D The base station A modifies the second message, where the second message includes the new key derivation parameter and the wireless configuration parameter encrypted by using the new key.
- the base station A can encrypt the second configuration message by using the new key to encrypt the wireless configuration parameter, and the modified second message includes the new key derivation parameter and the wireless configuration parameter encrypted by using the new key.
- S404A-1 The base station A transmits to the base station C a second message, a new key, and a new key derivation parameter for integrity protection using the new key.
- S405A-1 The base station C sends a second message to the terminal A for integrity protection using the new key.
- terminal A may obtain a new key derivation parameter from the second message. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can perform integrity verification on the second message and decrypt the encrypted wireless configuration parameters to obtain wireless configuration parameters.
- the new key derivation parameter may also be sent to the terminal A without using the second message.
- S400D, S404A-1, and S405A-1 can be replaced with S404A-2 and S405A-2.
- S404A-2 The base station A transmits a new key derivation parameter, a new key, and a second message using the new key encryption and integrity protection to the base station C.
- the base station C transmits a new key derivation parameter and a second message using the new key encryption and integrity protection to the terminal A.
- the new key derivation parameter may be carried in the MAC CE of the MAC data packet including the second message.
- the new key derivation parameter may be carried in the header or trailer of the PDCP packet including the second message.
- Terminal A can obtain new key derivation parameters from the above MAC data packet or PDCP data packet. After terminal A obtains the new key derivation parameter, the new key can be derived by using the new key derivation parameter and the old key. After obtaining the new key, terminal A can decrypt and verify the second message to obtain wireless configuration parameters.
- the parameter of the base station C such as the identifier of the serving cell, may be used in the process of deriving the new key by the base station A.
- the base station C can transmit the parameters of the above-mentioned base station C to the base station A.
- the security algorithm between the terminal and the serving base station may be selected by the anchor base station to save signaling.
- the security algorithm includes an encryption algorithm, or an integrity protection algorithm, that is, an algorithm for encrypting using a new key or an algorithm for performing integrity protection.
- the terminal security algorithm may be notified in a display manner, or the terminal security algorithm may be notified in an implicit manner.
- the serving base station may send the security algorithm it supports to the anchor base station, so that the anchor base station supports the security supported by the base station. Select the appropriate security algorithm in the whole algorithm.
- the base station A when the display mode is adopted, in the S404 part, the base station A also transmits 1) a security algorithm to the base station C, and in the S405 part, the base station C also transmits the above 1) security algorithm to the terminal A.
- the base station A when the implicit mode is adopted, in the S404 part, the base station A also sends 1) the security algorithm to the base station C, the S405 remains unchanged or the base station C also sends the security algorithm to the terminal in S405. An indication equal to NULL.
- the base station A selects the above 1) security algorithm according to the security algorithm selection rule.
- the terminal 1 selects the above 1) security algorithm according to the above security algorithm selection rule.
- the base station A when the display mode is adopted, in the S404 part, the base station A further sends a 1) security algorithm to the base station C; the second message generated in the S400B-1 part further includes 1) a security algorithm, Or the second message generated in the S400B-2 part further includes 1) a security algorithm, or in S405A-2, the base station C also sends 1) a security algorithm to the terminal A, optionally the 1) security algorithm can be carried in the The MAC CE of the MAC packet of the second message or the header or trailer of the PDCP packet including the second message.
- the base station A when the implicit mode is adopted, in the S404 part, the base station A further sends an indication that the security algorithm is equal to NULL to the base station C; the S400B-1 part remains unchanged or is generated in the S400B-1 part.
- the second message further includes an indication that the security algorithm is equal to NULL, or the S400B-2 portion remains unchanged or the second message generated in the S400B-1 portion further includes an indication that the security algorithm is equal to NULL, or the S405A-2 portion remains unchanged or An indication that the security algorithm is equal to NULL is sent in the S400B-1 portion.
- the second message generated by the base station A further includes 1) a security algorithm; or, in the S404A-2 part of the base station A Also transmitting to the base station C 1) a security algorithm, in part S405A-2, the base station C also sends 1) a security algorithm to the terminal A, optionally 1) the security algorithm can be carried in the MAC CE of the MAC packet including the second message or The header or trailer of the PDCP packet including the second message.
- the S400C-1 when the implicit manner is adopted, the S400C-1 remains unchanged or the second message of the S400C-1 part further includes an indication that the security algorithm is equal to NULL; or
- part of the base station A transmits 1) the security algorithm to the base station C, the S405A-2 part remains unchanged or the base station C also sends an indication to the terminal A that the security algorithm is equal to NULL in S405A-2.
- the second message when the display mode is adopted, in the S400D part, the second message further includes 1) a security algorithm; or, in the S404A-2 part, the base station A also sends to the base station C.
- 1) Security algorithm in part S405A-2, base station C also sends 1) a security algorithm to terminal A.
- An optional 1) security algorithm may be carried in the MAC CE of the MAC packet including the second message or in the header or trailer of the PDCP packet including the second message.
- base station A when in an implicit manner, S400D remains unchanged or an indication that the security algorithm is equal to NULL is included in the second message of the S400D portion; or, at S404A-2 In part, base station A also sends 1) a security algorithm to base station C, the S405A-2 part remains unchanged or in S405A-2, base station C also sends an indication to the terminal A that the security algorithm is equal to NULL.
- the same security algorithm is used on both the terminal A and the serving base station (base station C) with the assistance of the anchor base station, which saves the signaling overhead of the air interface while completing the negotiation of the security algorithm.
- the second alternative design is a variant of the first alternative design.
- the anchor base station assists the security algorithm negotiation between the serving base station and the terminal to save signaling.
- the anchor base station may send the security algorithm supported by the terminal to the serving base station, and the serving base station selects an appropriate security algorithm in the security algorithm supported by the terminal, and notifies the terminal. In this way, there is no need to notify the respective supported security algorithms through the air interface between the terminal and the serving base station, and the air interface resources are saved.
- the base station A may transmit 1) a security algorithm to the base station C, for example, S404, S404A-1, and S404A-2, and the base station C may be, for example, S405A-1, and S405A-2. Partially sends 2) a security algorithm to terminal A.
- the above 2) security algorithm belongs to 1) the security algorithm supported by terminal A.
- the specific design idea can refer to the third optional design of the first scheme.
- the security algorithm selection rule may be set in advance, and the terminal and the serving base station may each select the same security algorithm according to the security algorithm selection rule.
- the security algorithm used between the terminal and the serving base station does not need to negotiate through air interface signaling, which saves the overhead of air interface resources.
- the anchor base station may send the context of the terminal to the serving base station, so that the serving base station provides the terminal with the communication service.
- the method further includes: the base station A transmitting the context of the terminal A to the base station C.
- whether the terminal wireless configuration parameter or the second message is encrypted may be indicated to simplify the implementation of the terminal.
- information indicating whether or not to encrypt may be carried in the header of a PDCP packet encapsulating a wireless configuration parameter.
- the present application also provides a third scheme, and the third scheme is a variant of the scheme 1.
- the anchor base station sends the old key to the serving base station, and the serving base station encrypts the wireless configuration parameters using the old key, and sends the encrypted wireless configuration parameters to the terminal.
- the scheme can be applied to a scenario of a central unit-distributed unit (CU-DU), that is, splitting a base station into a CU and one or more DUs.
- the CU may have the processing functions of the RRC layer and the PDCP layer
- the DU may have the functions of a radio link control (RLC) layer, a MAC layer, and a physical layer.
- RLC radio link control
- MAC media access control
- the terminal does not need to negotiate a new key with the serving base station, and then the serving base station uses the new key to encrypt the wireless configuration parameter for transmission, which saves the air interface signaling overhead of the new key negotiation and ensures the wireless configuration in the communication process.
- the parameters are encrypted when the air interface is transmitted, which ensures security.
- Figure 15 is an embodiment of the third embodiment. As shown in FIG. 15, terminal A is in the third state, base station A is the anchor base station of terminal A, and terminal A selects base station C as its serving base station.
- the terminal A sends the first terminal identifier to the base station C.
- the first terminal identifier may be carried in the first message, and the S501 may be: the terminal A sends the first message to the base station C, where the first message includes the first terminal identifier;
- the first message further includes authentication information. Carrying the identity verification information of the terminal A in the first message can enhance the security of the air interface transmission.
- the base station C sends the first terminal identifier to the base station A.
- the base station C may further send the foregoing identity verification information to the base station A;
- the first terminal identifier and the authentication information may be carried in the first message, and the S502 may be: the base station C sends the first message to the base station A, where the first message includes the first terminal identifier and the identity verification information.
- the base station A may perform the identity verification using the old key and the identity verification information to ensure that the first message is sent by the terminal A. If the verification fails, the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the integrity verification is successful, S503 can be performed.
- S503 The base station A sends the old key to the base station C.
- S504 The base station C sends the wireless configuration parameter encrypted by the old key to the terminal A.
- the base station C may carry the wireless configuration parameter in the second message to send to the terminal A, where the S504 may be: the base station C sends the second message encrypted by using the old key to the terminal A, where the second message includes the wireless Configuration parameters.
- the anchor base station can assist in security negotiation between the serving base station and the terminal.
- the method further includes:
- Base station A derives a new key based on the old key and the new key derivation parameter.
- the base station A sends a new key to the base station C, and the new key derivation parameter.
- the base station C transmits a new key derivation parameter encrypted by the old key to the terminal A.
- Terminal A receives the new key derivation parameter encrypted using the old key to obtain a new key derivation parameter, and derives the new key based on the old key and the new key derivation parameter.
- the base station C may carry the new key derivation parameter in the second message for sending to the terminal A.
- the base station A may also send a security algorithm to the base station C, and the base station C may also send the foregoing security algorithm to the terminal A.
- the security algorithm sent by base station A to base station C is a security algorithm supported by terminal A.
- the base station C may also send a security algorithm supported by the base station C to the base station A, so that the base station A can select a security algorithm supported by both the base station C and the terminal A.
- the base station C may carry the security algorithm in the second message for sending to the terminal A.
- Air interface signaling can be saved by the security negotiation between the serving base station and the terminal by the anchor base station.
- Figure 16 is an embodiment of the solution. As shown in Figure 16:
- the terminal A receives the first message from the base station A, where the first message includes a new key derivation parameter.
- Terminal A enters a third state.
- the new key derivation parameter is obtained.
- the cell can be used as the serving cell to initiate communication with the network.
- S603 The terminal A derives a new key according to the old key, the new key derivation parameter, and the serving cell identifier.
- the terminal A sends a second message to the base station C.
- the second message includes a first terminal identifier and identity verification information.
- the authentication information can be generated based on an integrity protection algorithm of the new key and the old key.
- the base station C sends the first terminal identifier, the identity verification information, and the serving cell identifier to the base station A.
- the base station C may send the second message to the base station A to send the first terminal identifier and the identity verification information to the base station A, where S605 is: the base station C sends the second message and the serving cell identifier to the base station A.
- the base station A derives a new key according to the old key, the new key derivation parameter, and the serving cell identifier.
- S607 The base station A performs identity verification.
- the base station A can notify the base station C that the verification fails, and the base station C can notify the terminal A to establish a connection, for example, establish an RRC connection. If the integrity verification is successful, S608 can be performed.
- the base station A sends the context of the terminal A, the new key, the new key derivation parameter, and the security algorithm supported by the terminal A to the base station C.
- the base station C generates a third message.
- the third message includes wireless configuration parameters.
- the base station C encrypts and integrity protects the third message by using a new key and a new security algorithm.
- the new security algorithm is selected in the security algorithm supported by terminal A.
- the new security algorithm can be the same as the security algorithm associated with the old key.
- the base station C sends the encrypted and integrity protected third message and the new security algorithm to the terminal A.
- the header or the tail of the PDCP packet encapsulating the MAC packet of the third message or the PDCP packet encapsulating the third message carries a new security algorithm.
- the old key is saved until the terminal A successfully receives the third message and the integrity check passes. In this way, it is possible to prevent the network side key from being out of step.
- the base station C can send the encrypted wireless configuration parameters to the terminal A while performing security algorithm negotiation with the terminal A, which can save air interface signaling.
- FIG. 16 can refer to the contents of the first, second and third aspects.
- the anchor base station encrypts the new key derivation parameters with the old key and sends them to the serving base station.
- the serving base station encrypts the wireless configuration parameters with the new key
- the serving base station encrypts the wireless configuration parameters encrypted with the new key and the old key.
- the new key derivation parameters are sent to the terminal.
- the anchor base station encrypts the new key derivation parameters with the old key, encrypts the wireless configuration parameters with the new key, and sends the new key derivation parameters encrypted with the old key and the wireless configuration parameters encrypted with the new key.
- the serving base station transmits the new key derivation parameters encrypted with the old key and the wireless configuration parameters encrypted with the new key to the terminal.
- the anchor base station sends the new key, the old key, and the new key derivation parameter to the serving base station, the serving base station encrypts the wireless configuration parameter with the new key, encrypts the new key derivation parameter with the old key, and uses The wireless configuration parameters of the new key encryption and the new key derivation parameters encrypted with the old key are sent to the terminal.
- the wireless configuration parameter encrypted with the new key and the new key derivation parameter encrypted with the old key may be carried in the same message and sent to the terminal; optionally, the new key is encrypted with the old key.
- the parameter can be sent to the terminal first, and the wireless configuration parameter encrypted with the new key can be sent after the terminal successfully receives the new key derivation parameter encrypted with the old key; this can ensure that the terminal can obtain the new key derivation parameter, so as to facilitate Successfully decrypted wireless configuration parameters.
- the communication between the serving base station and the anchor base station may follow an interface protocol between the base stations.
- the embodiment of the present application provides a communication device.
- the communication device can be a terminal.
- the terminal is a wireless transceiver device that can be deployed on land, indoors or outdoors, handheld or on-board; it can also be deployed on the water (such as ships); it can also be deployed in the air (such as airplanes, balloons, and Satellite, etc.).
- the terminal device may be a mobile phone, a tablet, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, and industrial control ( Wireless terminal in industrial control, wireless terminal in self driving, wireless terminal in remote medical, wireless terminal in smart grid, transportation safety A wireless terminal, a wireless terminal in a smart city, a wireless terminal in a smart home, and the like.
- FIG. 17 shows only the main components of the terminal.
- the terminal T100 includes a processor, a memory, a radio frequency circuit, an antenna, and an input/output device.
- the processor is mainly used for processing communication protocols and communication data, and controlling terminals, executing software programs, processing data of software programs, and the like.
- Memory is primarily used to store software programs and data.
- the RF circuit is mainly used for the conversion of the baseband signal and the RF signal and the processing of the RF signal.
- the antenna is mainly used to transmit and receive RF signals in the form of electromagnetic waves.
- Input and output devices such as touch screens, display screens, keyboards, etc., are primarily used to receive user input data and output data to the user. Some types of terminals do not have input and output devices.
- the processor can read the software program (instruction) in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program.
- the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
- the radio frequency circuit performs radio frequency processing on the baseband signal, and then sends the radio frequency signal to the outside through the antenna in the form of electromagnetic waves.
- the RF circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
- Figure 17 shows only one memory and processor. In an actual user device, there may be multiple processors and memories.
- the memory may also be referred to as a storage medium or a storage device, and the like.
- the processor may include a baseband processor and/or a central processing unit.
- the baseband processor is mainly used to process a communication protocol and communication data
- the central processing unit is mainly used to control the entire terminal. Execute a software program that processes the data of the software program.
- the processor in FIG. 17 integrates the functions of the baseband processor and the central processing unit.
- the baseband processor and the central processing unit can also be independent processors and interconnected by technologies such as a bus.
- the terminal may include multiple baseband processors to adapt to different network standards.
- the terminal may include multiple central processors to enhance its processing capabilities.
- the functions of the baseband processor and the central processing unit can be integrated on one processor.
- the various components of the terminal can be connected via various buses.
- the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
- the central processing unit can also be expressed as a central processing circuit or a central processing chip.
- the function of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
- the antenna and the radio frequency circuit having the transceiving function can be regarded as the transceiving unit of the terminal, and the processor having the processing function can be regarded as the processing unit of the terminal.
- the terminal T100 includes a transceiver unit 101 and a processing unit 102.
- the transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like.
- the processing unit may also be referred to as a processor, a processing board, a processing module, a processing device, and the like.
- the device for implementing the receiving function in the transceiver unit 101 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 101 is regarded as a sending unit, that is, the transceiver unit 101 includes a receiving unit and a sending unit.
- the receiving unit may also be referred to as a receiver, a receiver, a receiving circuit, etc.
- the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit or the like.
- the communication device may be a chip, and the chip includes a processing unit 102 and a transceiver component.
- the transceiver component processing unit 102 can exchange data with the memory or the radio frequency unit.
- the transceiver assembly can be implemented in the form of a circuit, an electric shock or a pin.
- the chip can include a memory.
- the communication device can be used to implement the function of the terminal A in any of the processes in FIG. 4-16.
- the processing unit 102 can be used to implement the function of the terminal A in any of the processes in FIG. 4-16.
- the processor 102 can read the program from the memory to enable the communication device to implement the related functions of the terminal A in any of the processes of FIGS. 4-16.
- the embodiment of the present application further provides a computer program product, where the program product includes a program, and the program is used to implement the function of the terminal A in any of the processes in FIG. 4-16.
- the embodiment of the present application further provides a computer readable storage medium, where the program product is stored.
- the embodiment of the present application provides a communication apparatus.
- the communication device can be a base station.
- a base station is a device deployed in a wireless access network to provide wireless communication functions.
- a base station in an LTE network is called an evolved Node B (eNB or eNodeB)
- a base station in an NR network is called a TRP (transmission reception point) or a gNB (generation node B, next generation Node B).
- the structure of the base station can be as shown in FIG.
- the base station B200 shown in FIG. 18 may be a split base station.
- FIG. 18 shows a left-hand base station including antennas, a remote radio unit (RRU), and a baseband unit (BBU).
- RRU remote radio unit
- BBU baseband unit
- the base station 18 may also be an integrated base station, such as a small cell shown on the right in FIG. 18; the base station B200 shown in FIG. 18 may be a distributed base station.
- the base station has a structure of a central unit-distributed unit (CU-DU), which splits the base station into CUs and one or more DUs.
- the CU may have the processing functions of the RRC layer and the PDCP layer, and the DU may have the functions of a radio link control (RLC) layer, a MAC layer, and a physical layer.
- RLC radio link control
- a base station includes a 201 portion and a 202 portion.
- Part 201 is mainly used for the transmission and reception of radio frequency signals and the conversion of radio frequency signals and baseband signals; the 202 part is mainly used for baseband processing and base station control.
- Section 201 can be generally referred to as a transceiver unit, a transceiver, a transceiver circuit, a transceiver, and the like.
- Section 202 can generally be referred to as a processing unit.
- part 202 is the control center of the base station.
- part 201 may include an antenna and a radio frequency unit, wherein the radio frequency unit is mainly used for radio frequency processing.
- the device for implementing the receiving function in part 201 may be regarded as a receiving unit, and the device for implementing the transmitting function may be regarded as a transmitting unit, that is, the part 201 includes a receiving unit and a transmitting unit.
- the receiving unit may also be referred to as a receiver, a receiver, a receiving circuit, etc.
- the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit or the like.
- the 202 part may include one or more boards, each of the boards may include a processor and a memory, and the processor is configured to read and execute a program in the memory to implement a baseband processing function and a base station. control. If multiple boards exist, the boards can be interconnected to increase processing power.
- the functions of the 202 part and the 201 part can be implemented by the SoC technology, that is, by a base station function.
- the chip realizes that the base station function chip integrates a processor, a memory (optional), an antenna interface and the like, and the program of the base station related function is stored in the memory, and the program is executed by the processor to implement the related functions of the base station.
- the communication device may be a chip, where the chip includes a processor (to facilitate the unified description with the processing unit of the base station, the processor of the chip is also referred to as a processing unit below) and the transceiver component, and the transceiver component can be Data exchange with memory or RF unit.
- the transceiver assembly can be implemented in the form of a circuit, a contact, an antenna interface, or a pin.
- the chip can include a memory.
- the communication device can be used to implement the function of the base station C in any of the processes in FIG. 4-16.
- the processing unit may be used to implement the function of the base station C in any of the processes in FIG. 4-16.
- the processing unit can read the program from the memory to enable the communication device to implement the related functions of the base station C in any of the processes of FIGS. 4-16.
- the embodiment of the present application further provides a computer program product, where the program product includes a program, and the program is used to implement the function of the base station C in any of the processes in FIG. 4-16.
- the embodiment of the present application further provides a computer readable storage medium, where the program product is stored.
- the communication device can be a base station, or a chip.
- the structure of the base station can be as shown in FIG.
- the chip includes a processor (to facilitate the description with the processing unit of the base station, the processor of the chip is also referred to as a processing unit below) and a transceiver component, and the transceiver module can exchange data with the memory or the radio unit.
- the transceiver assembly can be implemented in the form of a circuit, a contact, an antenna interface, or a pin.
- the chip can include a memory.
- the communication device can be used to implement the functions of the base station A in any of the processes in FIG. 4-16.
- the processing unit may be used to implement the function of the base station A in any of the processes in FIG. 4-16.
- the processing unit may read the program from the memory to enable the communication device to implement the related functions of the base station A in any of the processes of FIGS. 4-16.
- the embodiment of the present application further provides a computer program product, where the program product includes a program, and the program is used to implement the function of the base station A in any of the processes in FIG. 4-16.
- the embodiment of the present application further provides a computer readable storage medium, where the program product is stored.
- the base station may have different names.
- the serving base station in the present application may also be replaced by the serving device, and the anchor base station may be replaced by the anchor device.
- the data processing method, the communication device, the computer program product, and the computer readable storage medium provided by the embodiments of the present application can make the length and the number of different code blocks closer to each other by introducing a non-standard length during the segmentation, and can maintain the code block.
- the sum of the code rates is stable and the code rates of different code blocks are close.
- the code rates of different code blocks can be made close to or the same.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above software function parts can be stored in the storage unit.
- the storage unit includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform some of the steps of the methods described in various embodiments of the present application.
- the storage unit includes: one or more memories, such as a read-only memory (ROM), a random access memory (RAM), and an electrically erasable programmable read only memory (EEPROM). and many more.
- the storage unit may exist independently or may be integrated with the processor.
- the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
- the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
- the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (eg, a solid state disk (SSD)) or the like.
- a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
- an optical medium eg, a DVD
- a semiconductor medium eg, a solid state disk (SSD)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (55)
- 一种通信方法,其特征在于,包括:服务设备从终端接收第一终端标识;所述第一终端标识用于识别所述终端和锚点设备;所述服务设备向所述锚点设备发送所述第一终端标识和无线配置参数;所述服务设备从所述锚点设备接收使用第一密钥加密的所述无线配置参数;其中,所述第一密钥为所述终端与所述锚点设备通信所使用的密钥;所述服务设备向所述终端发送使用所述第一密钥加密的所述无线配置参数。
- 如权1所述的方法,其特征在于,所述服务设备向所述终端发送所述使用第一密钥加密的所述无线配置参数,包括:所述服务设备向所述终端发送使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数;所述服务设备从所述锚点设备接收使用第一密钥加密的所述无线配置参数,包括:所述服务设备从所述锚点设备接收使用所述第一密钥加密的所述第一消息。
- 如权2所述的方法,其特征在于,还包括:所述服务设备从所述锚点设备接收密钥推演参数和第二密钥;所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述终端与所述服务设备通信所使用的密钥,所述第一消息还包括所述密钥推演参数。
- 如权3所述的方法,其特征在于,还包括:所述服务设备从所述锚点设备接收与所述第二密钥关联的安全算法;所述第一消息还包括所述安全算法;所述安全算法为以下至少一项:与所述第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法。
- 如权4所述的方法,其特征在于,还包括:所述服务设备向所述锚点设备发送所述服务设备支持的安全算法;其中,所述服务设备支持的安全算法包括与所述第二密钥关联的安全算法。
- 如权2-5任一所述的方法,其特征在于,所述服务设备从所述锚点设备接收使用所述第一密钥加密的所述第一消息为:所述服务设备从所述锚点设备接收使用所述第一密钥加密和完整性保护的所述第一消息。
- 如权2-6任一所述的方法,其特征在于,所述第一消息用于指示维持第三态。
- 如权1-7任一所述的方法,其特征在于,所述服务设备从终端接收第一终端标识,包括:所述服务设备从所述终端接收第二消息,所述第二消息包括所述第一终端标识和所述终端的身份验证信息,所述身份验证信息是基于所述第一密钥生成的;所述服务设备向所述锚点设备发送无线配置参数和所述第一终端标识,包括:所述服务设备向所述锚点设备发送所述无线配置参数、所述第一终端标识、和所述身份验证信息。
- 如权1-8任一所述的方法,其特征在于,还包括:所述服务设备从所述锚点设备接收所述终端的上下文。
- 一种通信方法,其特征在于,包括:锚点设备从服务设备接收第一终端标识,以及无线配置参数;其中,所述第一终端标识用于识别终端和锚点设备;所述锚点设备向所述服务设备发送使用第一密钥加密的所述无线配置参数;其中,所述第一密钥为所述终端与所述锚点设备通信所使用的密钥。
- 如权10所述的方法,其特征在于,所述锚点设备向所述服务设备发送使用第一密钥加密的所述无线配置参数,包括:所述锚点设备向所述服务设备发送使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数。
- 如权11所述的方法,其特征在于,还包括:所述锚点设备向所述服务设备发送密钥推演参数和第二密钥;所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述终端与所述服务设备通信所使用的密钥,所述第一消息还包括所述密钥推演参数。
- 如权12所述的方法,其特征在于,还包括:所述锚点设备向所述服务设备发送与所述第二密钥关联的安全算法;所述第一消息还包括所述安全算法;与所述第二密钥关联的安全算法为以下至少一项:与所述第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法。
- 如权13所述的方法,其特征在于,还包括:所述锚点设备从所述服务设备接收所述服务设备支持的安全算法;其中,所述服务设备支持的安全算法包括与所述第二密钥相关的安全算法。
- 如权11-14任一所述的方法,其特征在于,所述锚点设备向所述服务设备发送使用所述第一密钥加密的第一消息为:所述锚点设备向所述服务设备发送使用所述第一密钥加密和完整性保护的所述第一消息。
- 如权11-15任一所述的方法,其特征在于,所述第一消息用于指示维持第三态。
- 如权10-16任一所述的方法,其特征在于,所述锚点设备从服务设备接收第一终端标识,以及无线配置参数,包括:所述锚点设备从所述服务设备接收所述第一终端标识,所述终端的身份验证信息,以及所述无线配置参数,所述身份验证信息是基于所述第一密钥生成的。
- 如权17所述的方法,其特征在于,还包括:所述锚点设备使用所述第一密钥验证所述身份验证信息。
- 如权10-18任一所述的方法,其特征在于,还包括:所述锚点设备向所述服务设备发送所述终端的上下文。
- 一种通信方法,其特征在于,包括:终端向服务设备发送第一终端标识,所述第一终端标识用于识别所述终端和锚点设备;所述终端从所述服务设备接收使用第一密钥加密的无线配置参数,所述第一密钥为所述终端与所述锚点设备通信所使用的密钥。
- 如权20所述的方法,其特征在于,所述终端从所述服务设备接收使用第一密钥加密的无线配置参数,包括:所述终端从所述服务设备接收使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数。
- 如权21所述的方法,其特征在于,所述第一消息还包括以下至少一项:密钥推演参数,与第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法;所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述终端与所述服务设备通信所使用的密钥。
- 如权21或22所述的方法,其特征在于,所述终端从所述服务设备接收使用所述第一密钥加密的第一消息为:所述终端从所述服务设备接收使用所述第一密钥加密和完整性保护的第一消息。
- 如权21-23任一所述的方法,其特征在于,所述第一消息用于指示维持第三态。
- 如权24所述的方法,其特征在于,还包括:所述终端维持第三态。
- 如权20-25任一所述的方法,其特征在于,所述终端向服务设备发送第一终端标识,包括:所述终端向所述服务设备发送第二消息,所述第二消息包括所述第一终端标识和所述终端的身份验证信息,所述身份验证信息是基于所述第一密钥生成的。
- 一种通信装置,其特征在于,包括:处理单元和收发单元;所述处理单元用于:通过所述收发单元从终端接收第一终端标识;所述第一终端标识用于识别所述终端和锚点设备;通过所述收发单元向所述锚点设备发送所述第一终端标识和无线配置参数;通过所述收发单元从所述锚点设备接收使用第一密钥加密的所述无线配置参数;其中,所述第一密钥为所述终端与所述锚点设备通信所使用的密钥;通过所述收发单元向所述终端发送使用所述第一密钥加密的所述无线配置参数。
- 如权27所述的装置,其特征在于,所述处理单元用于:通过所述收发单元向所述终端发送使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数;通过所述收发单元从所述锚点设备接收使用所述第一密钥加密的所述第一消息。
- 如权28所述的装置,其特征在于,所述处理单元还用于通过所述收发单元从所述锚点设备接收密钥推演参数和第二密钥;其中,所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述终端与所述装置通信所使用的密钥,所述第一消息还包括所述密钥推演参数。
- 如权29所述的装置,其特征在于,所述处理单元还用于通过所述收发单元从所述锚点设备接收与所述第二密钥关联的安全算法;其中,所述第一消息还包括所述安全算法,所述安全算法为以下至少一项:与所述第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法。
- 如权30所述的装置,其特征在于,所述处理单元还用于通过所述收发单元向所述锚点设备发送所述装置支持的安全算法;其中,所述装置支持的安全算法包括与所述第二密钥关联的安全算法。
- 如权28-31任一所述的装置,其特征在于,所述处理单元用于通过所述收发单元从所述锚点设备接收使用所述第一密钥加密和完整性保护的所述第一消息。
- 如权28-32任一所述的装置,其特征在于,所述第一消息用于指示维持第三态。
- 如权27-33任一所述的装置,其特征在于,所述处理单元用于:通过所述收发单元从所述终端接收第二消息,所述第二消息包括所述第一终端标识和所述终端的身份验证信息,所述身份验证信息是基于所述第一密钥生成的;通过所述收发单元向所述锚点设备发送所述无线配置参数、所述第一终端标识、和所述身份验证信息。
- 如权27-34任一所述的装置,其特征在于,所述处理单元还用于通过所述收发单元从所述锚点设备接收所述终端的上下文。
- 如权27-35任一所述的装置,其特征在于,所述装置包括一个或多个芯片,所述处理单元为包括处理器的芯片,所述收发单元为包含收发电路的芯片;或者,所述装置为基站,所述处理单元为基站的处理器,所述收发单元为基站的收发机。
- 一种通信装置,其特征在于,包括:处理单元和收发单元;所述处理单元用于:通过所述收发单元从服务设备接收第一终端标识,以及无线配置参数;其中,所述第一终端标识用于识别终端;通过所述收发单元向所述服务设备发送使用第一密钥加密的所述无线配置参数;其中,所述第一密钥为所述终端与所述装置通信所使用的密钥。
- 如权37所述的装置,其特征在于,所述处理单元用于通过所述收发单元向所述服务设备发送使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数。
- 如权38所述的装置,其特征在于,所述处理单元还用于通过所述收发单元向所述服务设备发送密钥推演参数和第二密钥;所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述终端与所述服务设备通信所使用的密钥,所述第一消息还包括所述密钥推演参数。
- 如权39所述的装置,其特征在于,所述处理单元还用于通过所述收发单元向所述服务设备发送与所述第二密钥关联的安全算法;其中,所述第一消息还包括所述安全算法,与所述第二密钥关联的安全算法为以下至少一项:与所述第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法。
- 如权40所述的装置,其特征在于,还包括:所述处理单元还用于通过所述收发单元从所述服务设备接收所述服务设备支持的安全算法;其中,所述服务设备支持的安全算法包括与所述第二密钥相关的安全算法。
- 如权38-41任一所述的装置,其特征在于,所述处理单元用于通过所述收发单元向所述服务设备发送使用所述第一密钥加密和完整性保护的所述第一消息。
- 如权38-42任一所述的装置,其特征在于,所述第一消息用于指示维持第三态。
- 如权37-43任一所述的装置,其特征在于,所述处理单元用于通过所述收发单元从所述服务设备接收所述第一终端标识,所述终端的身份验证信息,以及所述无线配置参数,所述身份验证信息是基于所述第一密钥生成的。
- 如权44所述的装置,其特征在于,所述处理单元还用于使用所述第一密钥验证所述身份验证信息。
- 如权37-45任一所述的装置,其特征在于,所述处理单元还用于通过所述收发单元向所述服务设备发送所述终端的上下文。
- 如权37-46任一所述的装置,其特征在于,所述装置包含一个或多个芯片,所述处理单元为包含处理器的芯片,所述收发单元为包含收发电路的芯片;或者,所述装置为基站,所述处理单元为基站的处理器,所述收发单元为基站的收发机。
- 一种通信装置,其特征在于,包括:处理单元和收发单元;所述处理单元用于:通过所述收发单元向服务设备发送第一终端标识,所述第一终端标识用于识别所述装置和锚点设备;通过所述收发单元从所述服务设备接收使用第一密钥加密的无线配置参数,所述第一密钥为所述装置与所述锚点设备通信所使用的密钥。
- 如权48所述的装置,其特征在于,所述处理单元用于通过所述收发单元从所述服务设备接收使用所述第一密钥加密的第一消息,所述第一消息包括所述无线配置参数。
- 如权49所述的装置,其特征在于,所述第一消息还包括以下至少一项:密钥推演参数,与第二密钥关联的加密算法,以及与所述第二密钥关联的完整性保护算法;所述密钥推演参数用于推演所述第二密钥,所述第二密钥为所述装置与所述服务设备通信所使用的密钥。
- 如权49或50所述的装置,其特征在于,所述处理单元用于通过所述收发单元从所述服务设备接收使用所述第一密钥加密和完整性保护的第一消息。
- 如权49-51任一所述的装置,其特征在于,所述第一消息用于指示维持第三态。
- 如权52所述的装置,其特征在于,所述处理器还用于维持第三态。
- 如权48-53任一所述的装置,其特征在于,所述处理单元用于通过所述收发单元向所述服务设备发送第二消息,所述第二消息包括所述第一终端标识和所述装置的身份验证信息,所述身份验证信息是基于所述第一密钥生成的。
- 如权48-54任一所述的装置,其特征在于,所述装置包含一个或多个芯片,所述处理单元包含处理器的芯片,所述收发单元为包含收发电路的芯片;或者,所述装置为终端,所述处理单元为终端的处理器,所述收发单元为终端的收发机。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112019026822-7A BR112019026822A2 (pt) | 2017-06-16 | 2017-06-16 | método e aparelho de comunicação |
CN201780092083.3A CN111052701B (zh) | 2017-06-16 | 2017-06-16 | 通信方法、装置、系统和计算机可读存储介质 |
EP17913582.7A EP3629538B1 (en) | 2017-06-16 | 2017-06-16 | Communication method and apparatus |
KR1020207000834A KR102264356B1 (ko) | 2017-06-16 | 2017-06-16 | 통신 방법 및 장치 |
PCT/CN2017/088841 WO2018227638A1 (zh) | 2017-06-16 | 2017-06-16 | 通信方法和装置 |
JP2019569340A JP7255949B2 (ja) | 2017-06-16 | 2017-06-16 | 通信方法および装置 |
US16/712,712 US11589220B2 (en) | 2017-06-16 | 2019-12-12 | Communications method and apparatus for secure communication when a terminal is in a radio resource control inactive state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/088841 WO2018227638A1 (zh) | 2017-06-16 | 2017-06-16 | 通信方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/712,712 Continuation US11589220B2 (en) | 2017-06-16 | 2019-12-12 | Communications method and apparatus for secure communication when a terminal is in a radio resource control inactive state |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018227638A1 true WO2018227638A1 (zh) | 2018-12-20 |
Family
ID=64660272
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/088841 WO2018227638A1 (zh) | 2017-06-16 | 2017-06-16 | 通信方法和装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US11589220B2 (zh) |
EP (1) | EP3629538B1 (zh) |
JP (1) | JP7255949B2 (zh) |
KR (1) | KR102264356B1 (zh) |
CN (1) | CN111052701B (zh) |
BR (1) | BR112019026822A2 (zh) |
WO (1) | WO2018227638A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3087769A1 (en) * | 2013-12-24 | 2016-11-02 | Nec Corporation | Apparatus, system and method for sce |
CN109863731B (zh) * | 2017-08-03 | 2020-11-10 | 华为技术有限公司 | 数据传输方法、相关设备及通信系统 |
KR102500134B1 (ko) * | 2017-11-01 | 2023-02-15 | 삼성전자주식회사 | 무선 통신 시스템에서 패킷 데이터 정보를 송수신하기 위한 장치 및 방법 |
CN111510924B (zh) * | 2018-02-23 | 2021-10-01 | Oppo广东移动通信有限公司 | 一种安全算法的确定方法及装置、计算机存储介质 |
EP3818751A1 (en) * | 2018-08-20 | 2021-05-12 | Sony Corporation | Communications with non-terrestrial networks |
JP2023515428A (ja) * | 2020-02-20 | 2023-04-13 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | アプリケーションのための認証および鍵管理のための鍵材料生成最適化 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102625300A (zh) * | 2011-01-28 | 2012-08-01 | 华为技术有限公司 | 密钥生成方法和设备 |
CN104956644A (zh) * | 2013-01-30 | 2015-09-30 | 瑞典爱立信有限公司 | 用于双连接的安全密钥生成 |
CN105916218A (zh) * | 2016-04-19 | 2016-08-31 | 国网浙江省电力公司信息通信分公司 | 一体化基站系统以及基于一体化基站系统的通信方法 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090028084A1 (en) * | 2007-07-25 | 2009-01-29 | High Tech Computer, Corp. | Method for reducing user equipment power consumption under a communication network |
US20090209259A1 (en) * | 2008-02-15 | 2009-08-20 | Alec Brusilovsky | System and method for performing handovers, or key management while performing handovers in a wireless communication system |
US8179860B2 (en) * | 2008-02-15 | 2012-05-15 | Alcatel Lucent | Systems and method for performing handovers, or key management while performing handovers in a wireless communication system |
EP2109278B1 (en) * | 2008-04-07 | 2011-09-14 | NTT DoCoMo, Inc. | Method and apparatus for generating a new key |
WO2012134218A2 (ko) | 2011-03-31 | 2012-10-04 | 엘지전자 주식회사 | 무선 통신 시스템에서 단말이 네트워크와의 보안 설정 방법 및 이를 위한 장치 |
CN102858026B (zh) * | 2011-06-30 | 2017-04-05 | 中兴通讯股份有限公司 | 一种触发特定位置终端的方法、系统和终端 |
US9210632B2 (en) * | 2012-03-30 | 2015-12-08 | Samsung Electronics Co., Ltd. | Method and apparatus for setting up call in mobile communication system |
CN103517271A (zh) * | 2012-06-28 | 2014-01-15 | 中国移动通信集团公司 | 数据传输方法及装置、终端 |
CN103906049B (zh) * | 2012-12-28 | 2019-09-24 | 北京三星通信技术研究有限公司 | 一种同步辅小区和ue之间加密信息的方法 |
US9913136B2 (en) * | 2013-01-11 | 2018-03-06 | Lg Electronics Inc. | Method and apparatus for applying security information in wireless communication system |
WO2014182339A1 (en) * | 2013-05-09 | 2014-11-13 | Intel IP Corporation | Small data communications |
WO2016119442A1 (zh) * | 2015-01-27 | 2016-08-04 | 中兴通讯股份有限公司 | 寻呼方法、装置、mme、基站及用户设备 |
RU2668071C1 (ru) * | 2015-02-06 | 2018-09-26 | Хуавей Текнолоджиз Ко., Лтд. | Способ и устройство оптимизации сигнализации |
EP3373653B1 (en) | 2015-11-26 | 2021-12-22 | Huawei Technologies Co., Ltd. | Rrc connection management method, terminal and access network node |
-
2017
- 2017-06-16 JP JP2019569340A patent/JP7255949B2/ja active Active
- 2017-06-16 KR KR1020207000834A patent/KR102264356B1/ko active IP Right Grant
- 2017-06-16 WO PCT/CN2017/088841 patent/WO2018227638A1/zh unknown
- 2017-06-16 EP EP17913582.7A patent/EP3629538B1/en active Active
- 2017-06-16 BR BR112019026822-7A patent/BR112019026822A2/pt unknown
- 2017-06-16 CN CN201780092083.3A patent/CN111052701B/zh active Active
-
2019
- 2019-12-12 US US16/712,712 patent/US11589220B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102625300A (zh) * | 2011-01-28 | 2012-08-01 | 华为技术有限公司 | 密钥生成方法和设备 |
CN104956644A (zh) * | 2013-01-30 | 2015-09-30 | 瑞典爱立信有限公司 | 用于双连接的安全密钥生成 |
CN105916218A (zh) * | 2016-04-19 | 2016-08-31 | 国网浙江省电力公司信息通信分公司 | 一体化基站系统以及基于一体化基站系统的通信方法 |
Non-Patent Citations (3)
Title |
---|
NOKIA: "Discussion on LS R2-1700656 on Small Data Transmission", 3GPPTSG SA WG3 (SECURITY) MEETING #86, S 3-170113, 10 February 2017 (2017-02-10), XP051228638 * |
See also references of EP3629538A4 * |
ZTE: "S 3-170075 . Discussion on Security Method of UE Transmitting Data in RRCJNACTIVE", 3GPPTSG SA WG3 (SECURITY) MEETING #86, 10 February 2017 (2017-02-10), XP051228836 * |
Also Published As
Publication number | Publication date |
---|---|
EP3629538A4 (en) | 2020-05-20 |
EP3629538B1 (en) | 2022-09-07 |
CN111052701A (zh) | 2020-04-21 |
CN111052701B (zh) | 2021-09-14 |
KR102264356B1 (ko) | 2021-06-11 |
US11589220B2 (en) | 2023-02-21 |
JP2020523891A (ja) | 2020-08-06 |
JP7255949B2 (ja) | 2023-04-11 |
KR20200013053A (ko) | 2020-02-05 |
EP3629538A1 (en) | 2020-04-01 |
BR112019026822A2 (pt) | 2020-06-30 |
US20200120492A1 (en) | 2020-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2746179C1 (ru) | Система радиостанций, терминал радиосвязи и способы их работы | |
WO2018227638A1 (zh) | 通信方法和装置 | |
EP3735018B1 (en) | Security negotiation method and apparatus | |
WO2019062920A1 (zh) | 数据安全处理方法及装置 | |
CN104737570A (zh) | 生成用于第一用户设备和第二用户设备之间的设备对设备通信的密钥的方法和设备 | |
CN111148245A (zh) | 通信方法、网络设备、用户设备和通信系统 | |
US11445365B2 (en) | Communication method and communications apparatus | |
CN110831258A (zh) | 一种数据传输的方法及装置 | |
US20220174761A1 (en) | Communications method and apparatus | |
CN112019489B (zh) | 验证方法及装置 | |
US20240098830A1 (en) | Communication method and apparatus | |
WO2019157930A1 (zh) | 通信方法及装置 | |
US20230092744A1 (en) | Ckey obtaining method and apparatus | |
WO2022082691A1 (zh) | Iab网络的rlf恢复方法、装置以及相关设备 | |
WO2022227919A1 (zh) | 切换场景下的安全配置方法和通信装置 | |
CN114208240B (zh) | 数据传输方法、装置及系统 | |
WO2023213191A1 (zh) | 安全保护方法及通信装置 | |
WO2023098209A1 (zh) | 一种数据传输保护方法、设备及系统 | |
WO2023213209A1 (zh) | 密钥管理方法及通信装置 | |
EP4351192A1 (en) | Relay communication method, apparatus and system | |
US20230422106A1 (en) | Method for authenticating access layer on basis of public key infrastructure in consideration of handover in next-generation wireless communication system | |
WO2024032207A1 (zh) | 通信方法、装置和系统 | |
WO2020042040A1 (zh) | 一种下行数据早传方法及装置 | |
CN115707046A (zh) | 接入小区的方法、通信装置及网络设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17913582 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019569340 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112019026822 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20207000834 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017913582 Country of ref document: EP Effective date: 20191227 |
|
ENP | Entry into the national phase |
Ref document number: 112019026822 Country of ref document: BR Kind code of ref document: A2 Effective date: 20191216 |