WO2019095746A1 - 拒绝接入方法、装置及系统、存储介质和处理器 - Google Patents
拒绝接入方法、装置及系统、存储介质和处理器 Download PDFInfo
- Publication number
- WO2019095746A1 WO2019095746A1 PCT/CN2018/099811 CN2018099811W WO2019095746A1 WO 2019095746 A1 WO2019095746 A1 WO 2019095746A1 CN 2018099811 W CN2018099811 W CN 2018099811W WO 2019095746 A1 WO2019095746 A1 WO 2019095746A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- terminal
- access
- message
- access message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/18—Management of setup rejection or failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/20—Interfaces between hierarchically similar devices between access points
Definitions
- the present application relates to the field of communications, and in particular, to a denial access method, apparatus and system, computer storage medium and processor.
- FIG. 1 is a schematic diagram of a process for denying access in the related art according to the present invention.
- the base station system is configured to establish a wireless connection with the terminal, so that the terminal can access the mobile network, and the process of the solution includes the following steps:
- Step 101 The terminal (UE) accesses the wireless mobile network through the A base station system (such as gNB, or eNB1).
- the A base station system retains the UE-related security information, including the key, and then the UE enters an inactive state.
- the UE and the A base station system still retain the information for communication, including the security information, but release the wireless connection resources;
- Step 102 The terminal wants to resume the access to the mobile network at a certain time, but the UE may move to the coverage of the B base station system, and the UE sends a recovery access request to the B base station system, for example, sending an RRC Resume Request message;
- Step 103 The B base station system receives the recovery access request, and hopes that the terminal tries to resume the access again after waiting for a period of time, and then sends a reject access message to the UE, for example, sends a Reject message.
- the illegal base station may also send a denial of access message to the terminal, so that the terminal cannot always access the network, and even the illegal base station sends the short waiting time information to make the terminal frequent.
- the transmission resumes the access request and is rejected, causing the terminal to run out of power.
- the embodiments of the present invention provide a method, a device, and a system for refusing access, a computer storage medium, and a processor, to at least solve the technical problem that the terminal cannot perform the validity check on the denied access message in the related art.
- a method for denying access includes: receiving, by a first base station, an access request of a terminal; and sending, by the first base station, a reject access message to the terminal;
- the incoming message carries at least: a check value generated based on the key of the terminal and at least part of the content of the denied access message.
- another method for denying access including: a terminal sending an access request to a first base station; and receiving, by the terminal, a reject access message fed back by the first base station;
- the denial of access message carries at least: a check value generated based on a key of the terminal and at least part of the content of the denial of access message.
- a method for denying access including: receiving, by a second base station, a request message for a terminal from a first base station; and sending, by the second base station, a response message to the first base station;
- the request message carries part or all of the content of the denied access message for the terminal, where the response message carries a part generated based on the key and part or all of the content of the denied access message. Said check value.
- a denial access device which is applied to a first base station, and includes: a first receiving module configured to receive an access request of the terminal; and a first sending module configured to The terminal sends a reject access message, where the reject access message carries at least: a check value generated based on the key of the terminal and at least part of the content of the denied access message.
- a denial access device which is applied to a terminal, and includes: a sending module configured to send an access request to the first base station; and a receiving module configured to receive the first base station feedback Denying the access message; wherein the reject access message carries at least: a check value generated based on a key of the terminal and at least part of the content of the denied access message.
- a deny access device which is applied to a second base station, and includes: a receiving module configured to receive a request message for a terminal from a first base station; and a sending module configured to The first base station sends a response message, where the request message carries: part or all of the content of the denied access message for the terminal, wherein the response message carries the key based on the key and the denied access message The check value generated by at least part of the content.
- a denial access system including a first base station and a terminal;
- the terminal is configured to send an access request
- the first base station is configured to receive an access request, and send a reject access message based on the access request;
- the terminal is configured to receive the denied access message
- the denial of access message carries at least: a check value generated based on a key of the terminal and at least part of the content of the denial of access message.
- a first storage medium comprising a stored program, the program running to perform the aforementioned denial access method applied to the first base station.
- a second storage medium comprising a stored program that executes the aforementioned denial access method applied to the terminal while the program is running.
- a third storage medium comprising a stored program, the program running to perform the aforementioned denial access method applied to the second base station.
- a first processor for running a program, the program running to perform the aforementioned denial access method applied to the first base station.
- a second processor for running a program, the program running to perform the aforementioned denial access method applied to the terminal.
- a third processor for running a program, the program running to perform the aforementioned denial access method applied to the second base station.
- the terminal can use the check-in value generated by the terminal based on the key of the terminal and the partial content or the entire content of the denied access message in the reject access message.
- the check value is checked for validity to determine the legality of the transmitting base station, and the technical problem that the terminal cannot verify the validity of the denied access message in the related art is solved, and the security of interaction between the base station and the terminal is improved.
- FIG. 2 is a flow chart of a method for denying access according to an embodiment of the present invention
- FIG. 3 is a flow chart of another method for denying access according to an embodiment of the present invention.
- FIG. 4 is a structural block diagram of a denial access device according to an embodiment of the present invention.
- FIG. 5 is a structural block diagram of another denial access device according to an embodiment of the present invention.
- FIG. 6 is a structural block diagram of a denial access system according to an embodiment of the present invention.
- FIG. 7 is a schematic flowchart 1 of a method for denying access according to an embodiment of the present invention.
- FIG. 8 is a second schematic flowchart of a method for denying access according to an embodiment of the present invention.
- FIG. 9 is a schematic flowchart 3 of a method for denying access according to an embodiment of the present invention.
- the network architecture in the embodiment of the present application includes: a base station and a terminal; wherein the base station interacts with the terminal.
- FIG. 2 is a flowchart of a method for denying access according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps. :
- Step S202 The first base station receives an access request of the terminal.
- Step S204 The first base station sends a reject access message to the terminal, where the reject access message carries at least: a check value generated based on the terminal's key and at least part of the content of the denied access message.
- the terminal can use the check value to check the validity of the rejecting access message to determine the legitimacy of the transmitting base station, and solve the problem that the terminal cannot be related in the related art.
- the technical problem of verifying the legality of denying access messages improves the security of interaction between the base station and the terminal.
- the execution body of the foregoing steps may be a base station, such as gNB, eNB, NB, etc., but is not limited thereto.
- the deny access request may further carry: a waiting time for indicating that the terminal attempts to access next time.
- the method in this embodiment further includes acquiring the check value, which can be obtained and obtained in the following manner.
- the method further includes:
- the first base station sends a request message to the second base station, where the request message carries part or all of the content of the denied access message.
- the first base station receives a response message for the request message that is fed back by the second base station, where the response message carries a check value generated based on at least part of the content of the key and the denied access message.
- a check value generated based on at least part of the content of the key and the denied access message.
- the Hash-based Message Authentication Code-Secure Hash Algorithm-256 (Hash-based Message Authentication Code-Secure Hash Algorithm-256) is used as a parameter for the key and the waiting time.
- the value of the HMAC-SHA-256 function, or the value of the SHA-256 (Secure Hash Function) function by splicing the key and the waiting attempt time into a string.
- the method before the first base station sends the reject access message to the terminal, the method further includes:
- the first base station sends a security information request to the second base station.
- the first base station receives a security information response that is sent by the second base station, where the security information response carries the key.
- the first base station generates a check value according to at least part of the content of the key and the denied access message.
- checksums also called tokens
- This type of hash algorithm maps the input value to a fixed-length value, and the probability of collision is very low, that is, the possibility that different inputs get the same output is very low, so that by comparison The output value can determine whether the input values are the same.
- the terminal rejects the access message.
- the second base station releases the connection with the terminal before the terminal sends the access request to the first base station.
- the second base station saves related information of the terminal, such as a key.
- FIG. 3 is a flowchart of another method for denying access according to an embodiment of the present invention. As shown in FIG. 3, the process includes The following steps:
- Step S302 the terminal sends an access request to the first base station.
- Step S304 The terminal receives the reject access message fed back by the first base station, where the reject access message carries at least: a check value generated based on the terminal key and at least part of the content of the reject access message.
- the method further includes:
- the terminal calculates a check value according to at least part of a content of the key and the denied access message.
- the embodiment further provides a method for denying access, comprising: receiving, by the second base station, a request message for the terminal from the first base station; and sending, by the second base station, a response message to the first base station, where the request message carries: Rejecting part or all of the content of the access message, wherein the response message carries a check value generated based on at least part of the content of the key and the denied access message.
- the second base station releases the connection with the terminal before receiving the request message from the first base station.
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- a refusal access device and a system are provided to implement the foregoing embodiments and preferred embodiments, which are not described again.
- the term "module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 4 is a structural block diagram of a denial-access device according to an embodiment of the present invention, which is applied to a first base station, as shown in FIG. 4, the device includes:
- the first receiving module 40 is configured to receive an access request of the terminal
- the first sending module 42 is configured to send a reject access message to the terminal
- the reject access message carries: a check value generated based on the terminal's key and at least part of the content of the denied access message.
- the device further includes: a second sending module, configured to send a request message to the second base station before the first sending module 42 sends the reject access message to the terminal, where the request message carries the part that rejects the access message or all content;
- the second receiving module is configured to receive a response message fed back by the second base station, where the response message carries a check value generated based on the key and part or all of the content of the denied access message.
- the device further includes: a third sending module, configured to send a security information request to the second base station before the first sending module 42 sends the reject access message to the terminal;
- the third receiving module is configured to receive a security information response fed back by the second base station, where the security information response carries the key;
- a generating module configured to generate a check value based on part or all of the key and the denied access message.
- the first sending module is further configured to: when the first base station has at least one of the following conditions, send a reject access message to the terminal: the current congestion coefficient is greater than the first threshold, and the number of currently accessed terminals is greater than the second Threshold.
- FIG. 5 is a structural block diagram of another device for denying access according to an embodiment of the present invention, which is applied to a terminal, and includes:
- the sending module 50 is configured to send an access request to the first base station
- the receiving module 52 is configured to receive a reject access message fed back by the first base station
- the reject access message carries: a check value generated based on the terminal's key and at least part of the content (partial content or all content) of the denied access message.
- the device further includes: a calculation module, configured to: after the receiving module 52 receives the reject access message fed back by the first base station, calculate a check value according to the partial content or the entire content of the key and the denied access message;
- the processing module is configured to accept the reject access message when the calculated check value is the same as the received check value, and discard the denied access when the calculated check value is different from the received check value. Message.
- the embodiment further provides a denial access device, which is applied to the second base station, and includes:
- a receiving module configured to receive a request message for the terminal from the first base station, where the request message carries: part or all of the content of the deny access message for the terminal; and the sending module is configured to send a response message to the first base station, where The response message carries a check value generated based on the key and at least part of the content (some or all of the content) of the denied access message.
- FIG. 6 is a structural block diagram of a denial access system, including a first base station 60 and a terminal 62, according to an embodiment of the present invention.
- the terminal 62 is configured to send an access request.
- the first base station 60 is configured to receive an access request and send a reject access message
- the terminal 62 is configured to receive the reject access message fed back by the first base station 60.
- the reject access message carries at least: a check value generated based on the terminal's key and at least part of the content of the denied access message.
- the first base station 60 includes:
- the first receiving module 600 is configured to receive an access request sent by the terminal, specifically the second sending module 620.
- the first sending module 602 is configured to send a reject access message to the terminal, specifically the second receiving module 622.
- Terminal 62 includes:
- the second sending module 620 is configured to send an access request to the first base station 60, specifically the first receiving module 600.
- the second receiving module 622 is configured to receive a reject access message fed back by the first base station, specifically the first sending module 602.
- the reject access message carries: a check value generated based on the terminal's key and at least part of the content (partial content or all content) of the denied access message.
- the system further includes a second base station, where the second base station includes: a third receiving module configured to receive a request message for the terminal from the first base station; and a third sending module configured to send a response to the first base station a message; wherein the request message carries: part or all of the content of the reject access message for the terminal, wherein the response message carries a check value generated based on the key and part or all of the content of the denied access message.
- the first base station 60 and terminal 62 may also include one or more devices included in the above.
- each of the above modules may be implemented by software or hardware.
- the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
- the forms are located in different processors.
- This embodiment is an optional embodiment according to the present application, and is described in detail in conjunction with specific embodiments.
- the embodiment provides a related method for rejecting access of an inactive terminal.
- FIG. 7 is a schematic flowchart 1 of a method for denying access according to an embodiment of the present invention. As shown in FIG. 7, the process includes:
- Steps 201 to 202 the same as steps 101 to 102 of FIG. 1;
- Step 203 The B base station system receives the recovery access request. Because of congestion, etc., the terminal is expected to wait for a period of time before attempting to resume the access again, and then sends an unserviceable request to the A base station system, for example, sending a Service Deny Request message. , carrying waiting time information, such as wait timer;
- Step 204 The A base station system calculates the token based on the key associated with the UE and the waiting time, for example, calculating the value of the HMAC-SHA-256 function by using the key and the waiting attempt time as parameters, or splicing the key and the waiting attempt time. Calculate the value of its SHA-256 function for a string;
- Step 205 The A base station system sends an unserviceable response to the B base station system, for example, sending a Service Deny Response message, carrying the waiting time information and the calculated token;
- Step 206 The B base station system sends a reject access message to the UE, for example, sends a Reject message, carries the received waiting time information and the token, and the terminal calculates the token by using the same calculation method, and compares the calculated token with the received token. Whether the tokens are the same, if they are the same, the denial of access message is accepted, otherwise it is not accepted, such as discarding the message.
- FIG. 8 is a second schematic flowchart of a method for denying access according to an embodiment of the present invention. As shown in FIG. 8, the process includes:
- Steps 301 to 302 the same as steps 101 to 102 of FIG. 1;
- Step 303 The B-base station system receives the re-establishment of the access request, and the terminal is expected to re-recover the access after waiting for a period of time, and then sends a security information request to the A-base station system, for example, sending a Security Info Request message;
- Step 304 The A base station system sends a security information response to the B base station system, for example, sends a Security Info Response message, and carries security information related to the UE, including a key.
- Step 305 The B base station system calculates the token based on the key associated with the UE and the waiting time, for example, calculating the value of the HMAC-SHA-256 function by using the key and the waiting attempt time as parameters, or splicing the key and the waiting attempt time. Calculate the value of its SHA-256 function for a string;
- Step 306 The B base station system sends a reject access message to the UE, for example, sends a Reject message, carries the waiting time information and the token, and the terminal calculates the token by using the same calculation method, and compares the calculated token with the received token. Whether they are the same, if they are the same, the reject access message is accepted, otherwise it is not accepted, such as discarding the message.
- FIG. 9 is a third schematic flowchart of a method for denying access according to an embodiment of the present invention. As shown in FIG. 9, the process includes:
- Steps 401 to 402 the same as steps 101 to 102 of FIG. 1;
- Step 403 The B-base station system receives the re-establishment of the access request, and the terminal is expected to re-recover the access after waiting for a period of time, and then sends a forwarding request to the A-base station system, for example, sending a Forward Request message, carrying B. a reject access message to be sent by the base station to the UE, such as a Reject message, the reject access message carrying waiting time information, such as a wait timer;
- Step 404 The A base station system calculates a message check code based on the key associated with the UE and the reject access message, for example, calculating the value of the HMAC-SHA-256 function by using the content of the key and the reject access message as parameters;
- Step 405 The A base station system sends a forwarding response to the B base station system, for example, sends a Forward Response message, and carries the processed denied access message, that is, the rejected access message carries the message check code.
- Step 406 The B base station system sends a reject access message to the UE, and the terminal calculates the message check code by using the same calculation method of the A base station, and compares whether the calculated message check code and the received message check code are the same.
- the reject access message is accepted, otherwise it is not accepted, such as discarding the message.
- Embodiments of the present invention also provide three types of computer storage media including respective stored programs.
- the program stored in the first type of computer storage medium executes the aforementioned denial access method applied to the first base station while the program stored in the second type of computer storage medium executes the aforementioned rejection applied to the terminal The access method; the program stored in the third computer storage medium executes the aforementioned denial access method applied to the second base station while the program is running.
- the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
- ROM Read-Only Memory
- RAM Random Access Memory
- Embodiments of the present invention also provide three processors, each for each to run a program.
- the first processor performs the foregoing denial access method applied to the first base station when running the program stored in the first storage medium.
- the second processor performs the aforementioned denial access method applied to the terminal when running the program stored in the second storage medium.
- the third processor executes the aforementioned denial access method applied to the second base station while running the program stored in the third storage medium.
- modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- the terminal may receive the reject access message by using the check key generated by the terminal based on the key of the terminal and the partial or all content of the denied access message.
- the check value is checked for validity to determine the legality of the transmitting base station, and the technical problem that the terminal cannot verify the validity of the denied access message in the related art is solved, and the security of interaction between the base station and the terminal is improved.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (27)
- 一种拒绝接入方法,包括:第一基站接收终端的接入请求;所述第一基站向所述终端发送拒绝接入消息;其中,所述拒绝接入消息至少携带:基于所述终端的密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 根据权利要求1所述的方法,其中,在所述第一基站向所述终端发送拒绝接入消息之前,所述方法还包括:所述第一基站向第二基站发送请求消息,其中,所述请求消息携带所述拒绝接入消息的部分或全部内容;所述第一基站接收所述第二基站反馈的响应消息,其中,所述响应消息携带基于所述密钥和所述拒绝接入消息的至少部分内容生成的所述校验值。
- 根据权利要求1所述的方法,其中,在所述第一基站向所述终端发送拒绝接入消息之前,所述方法还包括:所述第一基站向第二基站发送安全信息请求;所述第一基站接收所述第二基站反馈的安全信息响应,其中,所述安全信息响应携带所述密钥;所述第一基站根据所述密钥和所述拒绝接入消息的至少部分内容生成所述校验值。
- 根据权利要求1所述的方法,其中,所述第一基站向所述终端发送拒绝接入消息包括:在所述第一基站具备以下条件至少之一时,向所述终端发送所述拒绝接入消息:当前拥塞系数大于第一阈值,当前已接入的终端的数量大于第二阈值。
- 根据权利要求1所述的方法,其中,所述拒绝接入消息的部分内容包含用于指示所述终端下次尝试接入的等待时间。
- 根据权利要求2或3所述的方法,其中,所述第二基站在所述终端向所述第一基站发送所述接入请求之前,释放与所述终端的连接。
- 一种拒绝接入方法,包括:终端向第一基站发送接入请求;所述终端接收所述第一基站反馈的针对所述接入请求的拒绝接入消息;其中,所述拒绝接入消息至少携带:基于所述终端的密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 根据权利要求7所述的方法,其中,在所述终端接收所述第一基站反馈的拒绝接入消息之后,所述方法还包括:所述终端根据所述密钥和所述拒绝接入消息的至少部分内容计算得到校验值;在计算得到的校验值与接收到的校验值相同时,接受所述拒绝接入消息,在计算得到的校验值与接收到的校验值不相同时,丢弃所述拒绝接入消息。
- 根据权利要求7所述的方法,其中,所述拒绝接入消息的部分内容包含用于指示所述终端下次尝试接入的等待时间。
- 一种拒绝接入方法,其中,包括:第二基站接收来自第一基站的针对终端的请求消息;所述第二基站向所述第一基站发送响应消息;其中,所述请求消息携带:针对所述终端的拒绝接入消息的部分内容或全部内容,其中,所述响应消息携带基于密钥和所述拒绝接入消息至少部分内容生成的校验值。
- 根据权利要求10所述的方法,其中,所述拒绝接入消息的部分内容包含用于指示所述终端下次尝试接入的等待时间。
- 根据权利要求10所述的方法,其中,所述第二基站在接收来自所述第一基站的所述请求消息之前,释放与所述终端的连接。
- 一种拒绝接入装置,应用在第一基站,包括:第一接收模块,配置为接收终端的接入请求;第一发送模块,配置为向所述终端发送拒绝接入消息;其中,所述拒绝接入消息至少携带:基于所述终端的密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 根据权利要求13所述的装置,其中,所述装置还包括:第二发送模块,配置为在所述第一发送模块向所述终端发送拒绝接入消息之前,向第二基站发送请求消息,其中,所述请求消息携带所述拒绝接入消息的部分或全部内容;第二接收模块,配置为接收所述第二基站反馈的响应消息,其中,所述响应消息携带基于所述密钥和所述拒绝接入消息的部分或全部内容生成的所述校验值。
- 根据权利要求13所述的装置,其中,所述装置还包括:第三发送模块,配置为在所述第一发送模块向所述终端发送拒绝接入消息之前,向第二基站发送安全信息请求;第三接收模块,配置为接收所述第二基站反馈的安全信息响应,其中,所述安全信息响应携带所述密钥;生成模块,配置为根据所述密钥和所述拒绝接入消息的部分或全部内容生成所述校验值。
- 根据权利要求13所述的装置,其中,所述第一发送模块,还配置为在所述第一基站具备以下条件至少之一时,向所述终端发送所述拒绝 接入消息:当前拥塞系数大于第一阈值,当前已接入的终端的数量大于第二阈值。
- 一种拒绝接入装置,应用在终端,包括:发送模块,配置为向第一基站发送接入请求;接收模块,配置为接收所述第一基站反馈的拒绝接入消息;其中,所述拒绝接入消息至少携带:基于所述终端的密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 根据权利要求17所述的装置,其中,所述装置还包括:计算模块,配置为在所述接收模块接收所述第一基站反馈的拒绝接入消息之后,根据所述密钥和所述拒绝接入消息的部分内容或全部内容计算得到校验值;处理模块,配置为在计算得到的校验值与接收到的校验值相同时,接受所述拒绝接入消息,在计算得到的校验值与接收到的校验值不相同时,丢弃所述拒绝接入消息。
- 一种拒绝接入装置,应用在第二基站,包括:接收模块,配置为接收来自第一基站的针对终端的请求消息;发送模块,配置为向所述第一基站发送响应消息;其中,所述请求消息至少携带:针对所述终端的拒绝接入消息的部分或全部内容,其中,所述响应消息携带基于密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 一种拒绝接入系统,包括第一基站及终端;其中,所述终端,配置为发送接入请求;所述第一基站,配置为接收接入请求,并发送基于所述接入请求的拒绝接入消息;所述终端,配置为接收所述拒绝接入消息;其中,所述拒绝接入消息至少携带:基于所述终端的密钥和所述拒绝接入消息的至少部分内容生成的校验值。
- 根据权利要求20所述的系统,其中,所述系统还包括第二基站,所述第二基站,配置为:接收来自第一基站的针对终端的请求消息;并向所述第一基站发送针对请求消息的响应消息;其中,所述请求消息携带:针对所述终端的拒绝接入消息的部分或全部内容,其中,所述响应消息携带基于所述密钥和所述拒绝接入消息的至少部分内容生成的所述校验值。
- 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行权利要求1至6中任一项所述的方法。
- 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行权利要求7至9中任一项所述的方法。
- 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行权利要求10至12中任一项所述的方法。
- 一种处理器,所述处理器用于运行程序,其中,所述程序运行时执行权利要求1至6中任一项所述的方法。
- 一种处理器,所述处理器用于运行程序,其中,所述程序运行时执行权利要求7至9中任一项所述的方法。
- 一种处理器,所述处理器用于运行程序,其中,所述程序运行时执行权利要求10至12中任一项所述的方法。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020207017196A KR102344352B1 (ko) | 2017-11-17 | 2018-08-10 | 액세스 거부 방법, 장치, 및 시스템, 및 저장 매체 및 프로세서 |
RU2020119750A RU2746890C1 (ru) | 2017-11-17 | 2018-08-10 | Способ, устройство и система отклонения доступа, носитель информации и процессор |
EP18877661.1A EP3713273A4 (en) | 2017-11-17 | 2018-08-10 | METHOD, DEVICE AND SYSTEM FOR REJECTING ACCESS, AND STORAGE MEDIUM AND PROCESSOR |
CA3082504A CA3082504C (en) | 2017-11-17 | 2018-08-10 | Access rejection method, apparatus and system, and storage medium and processor |
JP2020526952A JP7045455B2 (ja) | 2017-11-17 | 2018-08-10 | アクセス拒否方法、装置、およびシステム、ならびに記憶媒体およびプロ |
US16/874,515 US11516727B2 (en) | 2017-11-17 | 2020-05-14 | Access rejection method, apparatus and system, and storage medium and processor |
US17/994,733 US11716673B2 (en) | 2017-11-17 | 2022-11-28 | Access rejection method, apparatus and system, and storage medium and processor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711144738.5A CN109803260B (zh) | 2017-11-17 | 2017-11-17 | 拒绝接入方法、装置及系统 |
CN201711144738.5 | 2017-11-17 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/874,515 Continuation US11516727B2 (en) | 2017-11-17 | 2020-05-14 | Access rejection method, apparatus and system, and storage medium and processor |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019095746A1 true WO2019095746A1 (zh) | 2019-05-23 |
Family
ID=66540026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/099811 WO2019095746A1 (zh) | 2017-11-17 | 2018-08-10 | 拒绝接入方法、装置及系统、存储介质和处理器 |
Country Status (8)
Country | Link |
---|---|
US (2) | US11516727B2 (zh) |
EP (1) | EP3713273A4 (zh) |
JP (1) | JP7045455B2 (zh) |
KR (1) | KR102344352B1 (zh) |
CN (2) | CN109803260B (zh) |
CA (1) | CA3082504C (zh) |
RU (1) | RU2746890C1 (zh) |
WO (1) | WO2019095746A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113811022B (zh) * | 2021-08-12 | 2024-03-12 | 天翼物联科技有限公司 | 异常终端拒绝方法、系统、装置及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102804829A (zh) * | 2009-06-24 | 2012-11-28 | 诺基亚公司 | 用于避免欺骗接入点的拒绝服务攻击的方法和装置 |
CN107071775A (zh) * | 2017-05-15 | 2017-08-18 | 奇酷互联网络科技(深圳)有限公司 | 移动终端及其重定向接入基站的方法和装置 |
US20170332436A1 (en) * | 2016-05-13 | 2017-11-16 | Htc Corporation | Device and Method Handling a Radio Resource Control Connection Resume Procedure |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2340344A (en) * | 1998-07-29 | 2000-02-16 | Nokia Mobile Phones Ltd | Bilateral Data Transfer Verification for Programming a Cellular Phone |
KR100689508B1 (ko) * | 2003-09-04 | 2007-03-02 | 삼성전자주식회사 | 통신 시스템에서 핸드오버 수행 방법 |
CN101022330A (zh) * | 2006-02-13 | 2007-08-22 | 华为技术有限公司 | 提高密钥管理授权消息安全性的方法和模块 |
KR20080081753A (ko) * | 2007-03-06 | 2008-09-10 | 한국전자통신연구원 | 기지국 제어 중심의 멀티홉 릴레이 망에서 트랜스페어런트rs간 핸드오버 절차 |
KR100981965B1 (ko) * | 2007-11-06 | 2010-09-13 | 한국전자통신연구원 | 이동통신 시스템에서의 인트라 핸드오버 방법 |
US8086267B2 (en) * | 2009-02-19 | 2011-12-27 | Ford Global Technologies, Llc | System and method for provisioning a wireless networking connection |
CN102342141A (zh) * | 2009-03-05 | 2012-02-01 | 交互数字专利控股公司 | 用于H(e)NB完整性验证和确认的方法和装置 |
CN101951603B (zh) * | 2010-10-14 | 2013-05-22 | 中国电子科技集团公司第三十研究所 | 一种无线局域网接入控制方法及系统 |
US9112905B2 (en) * | 2010-10-22 | 2015-08-18 | Qualcomm Incorporated | Authentication of access terminal identities in roaming networks |
EP2557890B1 (en) * | 2011-08-12 | 2019-07-17 | BlackBerry Limited | Simplified ue + enb messaging |
CN102595561B (zh) * | 2012-03-30 | 2015-04-29 | 华为技术有限公司 | 无线资源控制连接重建的方法及终端 |
CN104685952B (zh) * | 2012-10-04 | 2018-06-08 | Lg电子株式会社 | 在无线通信系统中基于延迟容忍信息处理操作的方法和支持该方法的设备 |
JP6218166B2 (ja) * | 2013-03-04 | 2017-10-25 | 国立研究開発法人情報通信研究機構 | 基地局間ハンドオーバ方法 |
CN104302011A (zh) * | 2013-07-16 | 2015-01-21 | 中兴通讯股份有限公司 | 一种无线资源控制连接重建立的方法、系统及装置 |
CN103945358B (zh) * | 2014-04-17 | 2017-10-27 | 福建三元达网络技术有限公司 | 一种私有小区安全接入的方法、私有小区、用户终端及系统 |
EP3235293B1 (en) | 2014-12-17 | 2023-08-23 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for mobility management |
US10285060B2 (en) | 2015-10-30 | 2019-05-07 | Alcatel-Lucent Usa Inc. | Preventing attacks from false base stations |
EP3193557B1 (en) | 2016-01-12 | 2020-04-22 | HTC Corporation | Device and method of handling radio resource control connection |
US10772033B2 (en) * | 2016-01-27 | 2020-09-08 | Mediatek Singapore Pte. Ltd. | Avoiding reselection of a fake cell in a wireless communication network |
US10873464B2 (en) * | 2016-03-10 | 2020-12-22 | Futurewei Technologies, Inc. | Authentication mechanism for 5G technologies |
US10367677B2 (en) * | 2016-05-13 | 2019-07-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Network architecture, methods, and devices for a wireless communications network |
EP3908045B1 (en) * | 2016-07-13 | 2024-10-23 | Samsung Electronics Co., Ltd. | Access control method and apparatus for use in mobile communication |
EP3487258B1 (en) * | 2016-08-11 | 2021-11-10 | Samsung Electronics Co., Ltd. | Method, terminal and base station for resuming a conection |
KR20180035638A (ko) * | 2016-09-29 | 2018-04-06 | 삼성전자주식회사 | RRC Inactive 및 active 상태에서 data 전송 결정 및 방법 및 장치 |
WO2018131956A1 (en) * | 2017-01-16 | 2018-07-19 | Samsung Electronics Co., Ltd. | Method and apparatus for communication in wireless mobile communication system |
KR102222830B1 (ko) * | 2017-03-21 | 2021-03-04 | 삼성전자 주식회사 | 이동통신에서 연결 모드의 비연속 수신 모드를 지원하는 방법 및 장치 |
EP3603122A4 (en) * | 2017-03-23 | 2020-10-21 | Nokia Technologies Oy | MOBILITY SUPPORT DURING A STATE OF LOW ACTIVITY |
KR102446197B1 (ko) * | 2017-06-14 | 2022-09-22 | 삼성전자주식회사 | Pdcp pdu들의 무결성 검사 실패의 핸들링을 위한 방법 및 사용자 단말기 |
US20200214070A1 (en) * | 2017-06-14 | 2020-07-02 | Samsung Electronics Co., Ltd | Method and user equipment (ue) for reconnecting rrc connection with radio access network (ran) node |
CN113891315A (zh) * | 2017-11-16 | 2022-01-04 | 华为技术有限公司 | 一种请求恢复连接的方法及装置 |
US11153792B2 (en) * | 2018-04-18 | 2021-10-19 | Qualcomm Incorporated | Signaling for inactive mobility |
-
2017
- 2017-11-17 CN CN201711144738.5A patent/CN109803260B/zh active Active
- 2017-11-17 CN CN202210083511.9A patent/CN114501448A/zh active Pending
-
2018
- 2018-08-10 CA CA3082504A patent/CA3082504C/en active Active
- 2018-08-10 EP EP18877661.1A patent/EP3713273A4/en active Pending
- 2018-08-10 JP JP2020526952A patent/JP7045455B2/ja active Active
- 2018-08-10 WO PCT/CN2018/099811 patent/WO2019095746A1/zh unknown
- 2018-08-10 KR KR1020207017196A patent/KR102344352B1/ko active IP Right Grant
- 2018-08-10 RU RU2020119750A patent/RU2746890C1/ru active
-
2020
- 2020-05-14 US US16/874,515 patent/US11516727B2/en active Active
-
2022
- 2022-11-28 US US17/994,733 patent/US11716673B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102804829A (zh) * | 2009-06-24 | 2012-11-28 | 诺基亚公司 | 用于避免欺骗接入点的拒绝服务攻击的方法和装置 |
US20170332436A1 (en) * | 2016-05-13 | 2017-11-16 | Htc Corporation | Device and Method Handling a Radio Resource Control Connection Resume Procedure |
CN107071775A (zh) * | 2017-05-15 | 2017-08-18 | 奇酷互联网络科技(深圳)有限公司 | 移动终端及其重定向接入基站的方法和装置 |
Non-Patent Citations (3)
Title |
---|
"LS on security during Resume reject in INACTIVE state in NR", 3GPP TSG-RAN WG2 MEETING #99BIS R2-1712052, 16 October 2017 (2017-10-16), XP051356063 * |
See also references of EP3713273A4 * |
ZTE: "Security aspects of RESUME REJECT in INACTIVE state in NR", 3GPP TSG SA WG3 (SECURITY) MEETING #89 S3-173072, 20 November 2017 (2017-11-20), XP051380333 * |
Also Published As
Publication number | Publication date |
---|---|
CA3082504C (en) | 2022-09-27 |
JP2021503809A (ja) | 2021-02-12 |
KR20200087226A (ko) | 2020-07-20 |
CN109803260A (zh) | 2019-05-24 |
CN114501448A (zh) | 2022-05-13 |
US20230093723A1 (en) | 2023-03-23 |
CN109803260B (zh) | 2022-01-11 |
EP3713273A1 (en) | 2020-09-23 |
KR102344352B1 (ko) | 2021-12-28 |
RU2746890C1 (ru) | 2021-04-21 |
JP7045455B2 (ja) | 2022-03-31 |
EP3713273A4 (en) | 2021-08-04 |
US11516727B2 (en) | 2022-11-29 |
US11716673B2 (en) | 2023-08-01 |
CA3082504A1 (en) | 2019-05-23 |
US20200404575A1 (en) | 2020-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11825303B2 (en) | Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus | |
US20200214070A1 (en) | Method and user equipment (ue) for reconnecting rrc connection with radio access network (ran) node | |
US11627623B2 (en) | Connection resume request method and apparatus | |
US8594632B1 (en) | Device to-device (D2D) discovery without authenticating through cloud | |
KR101879916B1 (ko) | 3gpp lte에서 모바일 통신 디바이스 간의 근접성 발견, 인증 및 링크 설정 | |
US11706618B2 (en) | Data packet verification method and device | |
Pratas et al. | Massive machine-type communication (mMTC) access with integrated authentication | |
WO2017167102A1 (zh) | 消息完整性认证信息的生成和验证方法、装置及验证系统 | |
CN107104932A (zh) | 密钥更新方法、装置及系统 | |
CN112235799B (zh) | 终端设备入网鉴权方法及系统 | |
US11716673B2 (en) | Access rejection method, apparatus and system, and storage medium and processor | |
CN105828330A (zh) | 一种接入方法及装置 | |
CN110087338B (zh) | 一种窄带物联网进行鉴权的方法及设备 | |
WO2018126791A1 (zh) | 一种认证方法及装置、计算机存储介质 | |
CN112508482A (zh) | 基于区块链的物流快递签收管理方法、系统及存储介质 | |
WO2016180145A1 (zh) | 一种无线网络鉴权方法及核心网网元、接入网网元、终端 | |
CN111212424B (zh) | 一种从eps到5gs互操作时鉴权ue的方法及系统 | |
EP4322458A1 (en) | Post quantum integration for password-authenticated key exchange | |
EP4322457A1 (en) | Improved security establishment methods and systems | |
US20220104012A1 (en) | Authentication processing method and device, storage medium and electronic device | |
CN106612205B (zh) | 一种节点认证方法、系统及代理节点 | |
CN118828492A (zh) | 认证方法、相关设备及存储介质 | |
CN114245383A (zh) | 一种基于amf取消订阅信令的安全检测方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18877661 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3082504 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2020526952 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20207017196 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018877661 Country of ref document: EP Effective date: 20200617 |