WO2019137121A1 - Information processing method and device, network entity and storage medium - Google Patents

Information processing method and device, network entity and storage medium Download PDF

Info

Publication number
WO2019137121A1
WO2019137121A1 PCT/CN2018/119636 CN2018119636W WO2019137121A1 WO 2019137121 A1 WO2019137121 A1 WO 2019137121A1 CN 2018119636 W CN2018119636 W CN 2018119636W WO 2019137121 A1 WO2019137121 A1 WO 2019137121A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
user plane
derivation
algorithm
information
Prior art date
Application number
PCT/CN2018/119636
Other languages
French (fr)
Chinese (zh)
Inventor
刘亮
李刚
陈卓
杨光
Original Assignee
中国移动通信有限公司研究院
中国移动通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信有限公司研究院, 中国移动通信集团有限公司 filed Critical 中国移动通信有限公司研究院
Publication of WO2019137121A1 publication Critical patent/WO2019137121A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are an information processing method and device, a network entity and a storage medium. The information processing method, for use in a CU-CP, comprises: exchanging security information with a CU-UP.

Description

信息处理方法及装置、网络实体及存储介质Information processing method and device, network entity and storage medium
相关申请的交叉引用Cross-reference to related applications
本申请基于申请号为201810031115.5、申请日为2018年01月12日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。The present application is filed on the basis of the Chinese Patent Application No. PCT Application No. PCT Application No. No. No. No. No. No. No. No. No. No. No. No.
技术领域Technical field
本申请涉及通信技术领域但不限于通信技术领域,尤其涉及一种信息处理方法及装置、网络实体及存储介质。The present application relates to the field of communications technologies, but is not limited to the field of communications technologies, and in particular, to an information processing method and apparatus, a network entity, and a storage medium.
背景技术Background technique
第三代移动通信(Third Generation,3G)系统中接入网逻辑节点由节点(Node B,NB)和无线网络控制器(Radio Network Controller,RNC)组成。第四代移动通信(Fourth Generation,4G)逻辑架构设计更加扁平化,仅包含演进型节点(Evolved Node B,eNB)。在第五代通信(Fifth Generation,5G)系统中,提出了下一代基站(next-generation Node B,gNB)。如图1所示,5G的gNB包括分布式单元(Distributed Unit,DU)和集中单元(Central Unit,CU),且支持CU内部进一步可分为控制面(Central Unit Control Plane,CU-CP)和用户面(Central Unit User Plane,CU-UP)。CU-CP和CU-UP是不同的逻辑实体,可以位于相同的物理实体上,也可以位于不同的物理实体上,且CU-CP和CU-UP之间通过E1接口连接。DU和CU之间通过F1接口连接,DU与CU-CP之间通过F1接口的F1-C接口连接,且DU与CU-UP之间通过F1接口的F1-U接口连接。在图1中CU-CP中包括(Radio Resource Control,RRC)层及分组数据汇聚协议(Packet Data Convergence  Protocol-control,PDCP-C)。CU-UP内设置有(Packet Data Convergence Protocol-User,PDCP-U)。在DU中设置有数据链路控制层(Radio Link Control,RLC)、媒体介入控制层(Media Access Control,MAC)以及物理层(Physical,PHY)。In the third generation mobile communication (Third Generation, 3G) system, the access network logical node is composed of a node (Node B, NB) and a radio network controller (RNC). The fourth generation of mobile communication (Fourth Generation, 4G) logical architecture design is more flat, including only Evolved Node B (eNB). In the fifth generation (Fifth Generation, 5G) system, a next-generation Node B (gNB) is proposed. As shown in FIG. 1 , the 5G gNB includes a distributed unit (DU) and a central unit (CU), and the CU internal can be further divided into a Central Unit Control Plane (CU-CP) and Central Unit User Plane (CU-UP). The CU-CP and the CU-UP are different logical entities, and may be located on the same physical entity or on different physical entities, and the CU-CP and the CU-UP are connected through the E1 interface. The DU and the CU are connected through the F1 interface, and the DU and the CU-CP are connected through the F1-C interface of the F1 interface, and the DU and the CU-UP are connected through the F1-U interface of the F1 interface. The CU-CP in FIG. 1 includes a (Radio Resource Control, RRC) layer and a Packet Data Convergence Protocol-control (PDCP-C). A Packet Data Convergence Protocol-User (PDCP-U) is provided in the CU-UP. A data link control layer (Radio Link Control, RLC), a media access control layer (MAC), and a physical layer (Physical, PHY) are provided in the DU.
为了确保接入层安全,需要对请求附着的接入网络的用户设备进行鉴权,而用户设备(User Equipment,UE)也需要对其请求附着的接入网络进行鉴权,否则可能导致非法用户附着到网络,从而导致网络安全问题,或者,UE接入到了伪基站等非法基站,导致用户设备的安全问题。有鉴于此,需要对接入层进行安全控制。但是在5G网络中如何进行接入层的安全处理,以确保接入层安全,是现有技术亟待解决的问题,否则无法确保接入层安全,会导致各种安全问题或安全隐患。In order to ensure the security of the access layer, the user equipment of the access network to which the request is attached needs to be authenticated, and the user equipment (User Equipment, UE) also needs to authenticate the access network to which the request is attached. Otherwise, the user may be illegal. Attached to the network, causing network security problems, or the UE accessing an illegal base station such as a pseudo base station, resulting in security problems of the user equipment. In view of this, security control of the access layer is required. However, how to perform security processing on the access layer in the 5G network to ensure the security of the access layer is an urgent problem to be solved in the prior art. Otherwise, the security of the access layer cannot be ensured, which may cause various security problems or security risks.
发明内容Summary of the invention
有鉴于此,本申请实施例期望提供一种信息处理方法及装置、网络实体及存储介质。In view of this, embodiments of the present application are expected to provide an information processing method and apparatus, a network entity, and a storage medium.
本申请的技术方案是这样实现的:The technical solution of the present application is implemented as follows:
第一方面,本申请实施例提供一种信息处理处理方法,应用于CU-CP中,包括:In a first aspect, an embodiment of the present application provides an information processing and processing method, which is applied to a CU-CP, and includes:
与CU-UP交互安全信息。Interact security information with CU-UP.
第二方面,本申请实施例提供一种信息处理方法,应用于CU-UP中,包括:In a second aspect, an embodiment of the present application provides an information processing method, which is applied to a CU-UP, and includes:
与CU-CP交互安全信息。Interact security information with CU-CP.
第三方面,本申请实施例提供一种信息处理装置,应用于CU-CP中,包括:In a third aspect, an embodiment of the present application provides an information processing apparatus, which is applied to a CU-CP, and includes:
第一交互模块,用于与CU-UP交互安全信息。The first interaction module is configured to exchange security information with the CU-UP.
第四方面,本申请实施例提供一种信息处理装置,应用于CU-UP中, 包括:In a fourth aspect, an embodiment of the present application provides an information processing apparatus, which is applied to a CU-UP, and includes:
第二交互模块,配置为与CU-CP交互安全信息。The second interaction module is configured to exchange security information with the CU-CP.
第五方面,本申请实施例提供一种网络实体,包括:收发器、存储器、处理器及存储在存储器上并由处理器执行的计算机程序;In a fifth aspect, an embodiment of the present application provides a network entity, including: a transceiver, a memory, a processor, and a computer program stored on the memory and executed by the processor;
所述处理器,分别与收发器及存储器连接,配置为通过执行所述计算机程序实现第一方面提供的信息处理方法,或第二方面提供的信息处理方法。The processor is respectively connected to the transceiver and the memory, and configured to implement the information processing method provided by the first aspect or the information processing method provided by the second aspect by executing the computer program.
第六方面,本申请实施例提供一种计算机存储介质,所述计算机存储介质存储有计算机程序;所述计算机程序被执行后,能够实现第一方面提供的信息处理方法,或第二方面提供的信息处理方法。In a sixth aspect, the embodiment of the present application provides a computer storage medium, where the computer storage medium stores a computer program; after the computer program is executed, the information processing method provided by the first aspect, or the second aspect is provided. Information processing method.
本申请实施例提供的信息处理方法及装置、网络实体及存储介质,CU-CP和CU-UP之间交互安全信息,例如,交互控制面密钥和/或用户面控制密钥,这样根据CU的分离式架构,区分用户面和控制面分别设置了加密密钥和完整性保护密钥,这样既可以确保控制面的控制信令的安全性,也可以确保用户面的数据的安全性。The information processing method and device, the network entity and the storage medium provided by the embodiments of the present application, the security information between the CU-CP and the CU-UP, for example, the interaction control plane key and/or the user plane control key, according to the CU The separate architecture distinguishes the user plane from the control plane by setting an encryption key and an integrity protection key, so as to ensure the security of the control plane of the control plane and the security of the data of the user plane.
附图说明DRAWINGS
图1为一种gNB的结构示意图;1 is a schematic structural view of a gNB;
图2为本申请实施例提供的第一种信息处理方法的流程示意图;2 is a schematic flowchart of a first information processing method according to an embodiment of the present application;
图3为本申请实施例提供的第二种信息处理方法的流程示意图;FIG. 3 is a schematic flowchart diagram of a second information processing method according to an embodiment of the present disclosure;
图4为本申请实施例提供的第三种信息处理方法的流程示意图;4 is a schematic flowchart of a third information processing method according to an embodiment of the present application;
图5为本申请实施例提供的第四种信息处理方法的流程示意图;FIG. 5 is a schematic flowchart diagram of a fourth information processing method according to an embodiment of the present disclosure;
图6为本申请实施例提供的第五种信息处理方法的流程示意图;FIG. 6 is a schematic flowchart diagram of a fifth information processing method according to an embodiment of the present disclosure;
图7为本申请实施例提供的第一种信息处理装置的结构示意图;FIG. 7 is a schematic structural diagram of a first information processing apparatus according to an embodiment of the present disclosure;
图8为本申请实施例提供的第二种信息处理装置的结构示意图;FIG. 8 is a schematic structural diagram of a second information processing apparatus according to an embodiment of the present disclosure;
图9为本申请实施例提供的一种网络实体的结构示意图;FIG. 9 is a schematic structural diagram of a network entity according to an embodiment of the present application;
图10为本申请实施例提供的第六种信息处理方法的流程示意图;FIG. 10 is a schematic flowchart diagram of a sixth information processing method according to an embodiment of the present disclosure;
图11为本申请实施例提供的第七种信息处理方法的流程示意图;FIG. 11 is a schematic flowchart diagram of a seventh information processing method according to an embodiment of the present disclosure;
图12为本申请实施例提供的第八种信息处理方法的流程示意图。FIG. 12 is a schematic flowchart diagram of an eighth information processing method according to an embodiment of the present disclosure.
具体实施方式Detailed ways
以下结合说明书附图及具体实施例对本申请的技术方案做进一步的详细阐述。The technical solutions of the present application are further elaborated below in conjunction with the drawings and specific embodiments.
如图2所示,本实施例提供一种信息处理处理方法,应用于CU-CP中,包括:所述CU-CP与CU-UP交互安全信息。As shown in FIG. 2, this embodiment provides an information processing method, which is applied to a CU-CP, and includes: the CU-CP and the CU-UP exchange security information.
在本实施例中所述CU-CP和CU-UP之间会交互安全信息,例如,通过CU-CP与CU-UP之间的E1接口进行安全信息的交互。在本实施例中所述安全信息,用于对CU与UE之间的信息交互进行安全控制。所述安全信息,可以包括:用于控制面的控制信令的安全控制的控制面安全信息,及用于用户面的用户面数据的安全控制的用户面安全信息。In this embodiment, the security information is exchanged between the CU-CP and the CU-UP, for example, the security information is exchanged through the E1 interface between the CU-CP and the CU-UP. In the embodiment, the security information is used to perform security control on information interaction between the CU and the UE. The security information may include: control plane security information for security control of control plane of the control plane, and user plane security information for security control of user plane data of the user plane.
所述安全信息,具体可分为以下几大类,但不限于以下几大类:The security information can be specifically classified into the following categories, but is not limited to the following categories:
第一大类:密钥,例如,用户面密钥和/或控制面密钥;所述密钥包括:用于加密的加密密钥,和/或,用于完整性保护的完整性保护密钥。所述用户面密钥包括:用户面加密密钥及用户面完整性保护密钥;所述控制面密钥包括:控制面加密密钥及控制面完整性保护密钥;The first broad category: a key, such as a user plane key and/or a control plane key; the key includes: an encryption key for encryption, and/or an integrity protection secret for integrity protection key. The user plane key includes: a user plane encryption key and a user plane integrity protection key; the control plane key includes: a control plane encryption key and a control plane integrity protection key;
第二大类:安全算法的信息,例如,安全算法的版本号、序列号、名称或者算法内容等安全算法的指示信息和/或算法信息。The second category: information of the security algorithm, for example, the security algorithm's version information, the serial number, the name, or the algorithm content, and other security algorithm indication information and/or algorithm information.
第三大类:用于确定密钥的推导信息,例如,用于确定用户面密钥和/或控制面密钥的信息。The third broad category: derivation information used to determine the key, for example, information used to determine the user plane key and/or the control plane key.
在一些实施例中,所述CU-CP与CU-UP交互安全信息,包括:向所述CU-UP发送用户面密钥。此处,所述用户面密钥可以由所述CU-CP为 CU-UP推导出的密钥。In some embodiments, the CU-CP interacts with the CU-UP with security information, including: transmitting a user plane key to the CU-UP. Here, the user plane key may be a key derived by the CU-CP as a CU-UP.
在一些实施例中,所述方法还包括以下至少之一:In some embodiments, the method further comprises at least one of the following:
所述CU-CP根据统一推导密钥,确定出所述用户面密钥;Determining, by the CU-CP, the user plane key according to the unified derivation key;
所述CU-CP根据统一推导密钥,确定出控制面密钥;Determining, by the CU-CP, a control plane key according to the unified derivation key;
所述CU-CP根据用户面推导密钥,确定出所述用户面密钥;Determining, by the CU-CP, the user plane key according to the user plane derivation key;
所述CU-CP根据控制面推导密钥,确定出控制面密钥。The CU-CP derives a control key based on the control plane derivation key.
统一推导密钥,可同时用于控制面密钥推导和用户面密钥推导。The unified derivation key can be used for both control plane key derivation and user plane key derivation.
用户面推导密钥,仅用于用户面密钥推导;User plane derivation key, used only for user plane key derivation;
控制面推导密钥,仅用于控制面密钥推导。Control plane derivation key, used only for control plane key derivation.
在进行密钥推导时,CU-CP或者CU-UP将结合推导密钥和密钥导出算法计算出用户面密钥和/或控制面密钥,然后CU-CP将推导出用户面密钥发送给CU-UP或者,CU-UP将推导出的用户面密钥发送给CU-CP。When performing key derivation, the CU-CP or CU-UP will calculate the user plane key and/or the control plane key in combination with the derivation key and the key derivation algorithm, and then the CU-CP will derive the user plane key transmission. The CU-UP or CU-UP sends the derived user plane key to the CU-CP.
在本实施例中,所述统一推导密钥、用户面推导密钥及控制面推导密钥,均统称为推导密钥。推导密钥可以从由CU-CP或者CU-UP从核心网接收;也可以自行根据UE的根密钥及密钥导出算法自行导出。In this embodiment, the unified derivation key, the user plane derivation key, and the control plane derivation key are collectively referred to as a derivation key. The derivation key may be received from the core network by the CU-CP or the CU-UP; or may be derived by itself according to the UE's root key and key derivation algorithm.
在一些实施例中,所述CU-CP与CU-UP交互安全信息,包括:将推导密钥发送给所述CU-UP,其中,所述推导密钥,用于供所述CU-UP确定用户面密钥。此处,所述推导密钥为同时用于控制面密钥和用户面密钥推导的统一推导密钥;或者,所述推导密钥为用户面推导密钥。In some embodiments, the CU-CP interacts with the CU-UP with security information, including: transmitting an inferred key to the CU-UP, wherein the derivation key is used for determining by the CU-UP User face key. Here, the derivation key is a unified derivation key that is used for both the control plane key and the user plane key derivation; or the derivation key is a user plane derivation key.
在一些实施例中,所述CU-CP与CU-UP交互安全信息,包括:将选择的安全算法的信息发送给所述CU-UP。In some embodiments, the CU-CP interacts with the CU-UP for security information, including: transmitting information of the selected security algorithm to the CU-UP.
在一些实施例中,所述安全算法可为统一安全算法,一套统一安全算法同时用于控制面和用户面的安全控制。In some embodiments, the security algorithm may be a unified security algorithm, and a set of unified security algorithms is used for both security control of the control plane and the user plane.
在另一些实施例中,所述安全算法包括:用户面安全算法及控制面安全算法。In other embodiments, the security algorithm includes a user plane security algorithm and a control plane security algorithm.
所述将选择的所述安全算法的信息发送给所述CU-UP,包括:将所述用户面安全算法的信息发送给所述CU-UP;或者,将统一安全算法的信息发送给CU-UP。The sending the information of the selected security algorithm to the CU-UP includes: sending the information about the user plane security algorithm to the CU-UP; or sending the information of the unified security algorithm to the CU- UP.
在本实施例中,CU-CP会从核心网接收到UE的安全能力信息,可以根据UE的安全能力信息以及给CU配置的安全算法列表,选择安全算法,用于CU和UE之间的安全控制。在另外一些实施例中,也可以是所述CU-UP根据UE的安全能力信息以及给CU配置的安全算法列表,选择CU和UE同时支持的安全算法。In this embodiment, the CU-CP receives the security capability information of the UE from the core network, and selects a security algorithm according to the security capability information of the UE and the security algorithm list configured for the CU, and is used for security between the CU and the UE. control. In some other embodiments, the CU-UP may also select a security algorithm supported by the CU and the UE according to the security capability information of the UE and the security algorithm list configured for the CU.
在一些实施例中,所述CU-CP与集中单元用户面CU-UP交互安全信息,包括以下至少之一:In some embodiments, the CU-CP interacts with the centralized unit user plane CU-UP with security information, including at least one of the following:
满足预设密钥更新条件时,将更新后的推导密钥发送给所述CU-UP,其中,所述更新后的推导密钥,用于供所述CU-UP确定用户面密钥;When the preset key update condition is met, the updated derivation key is sent to the CU-UP, where the updated derivation key is used by the CU-UP to determine a user plane key;
满足预设密钥更新条件时,将基于更新后的推导密钥确定的用户面密钥发送给所述CU-UP;When the preset key update condition is met, the user plane key determined based on the updated derivation key is sent to the CU-UP;
接收所述CU-UP在满足密钥更新条件时发送的更新后的推导密钥及更新使用参数,其中,所述更新后的推导密钥,用于更新控制面密钥;所述更新使用参数,用于供CU-CP发送给UE以触发UE更新密钥;Receiving an updated derivation key and an update usage parameter sent by the CU-UP when the key update condition is satisfied, wherein the updated derivation key is used to update a control plane key; the update usage parameter For sending the CU-CP to the UE to trigger the UE to update the key;
接收所述CU-UP在满足密钥更新条件时发送更新使用参数,其中,更新使用参数,用于CU-CP将更新使用参数发送给UE以触发UE更新密钥。UE更新的密钥可包括:加密密钥及完整性保护密钥。Receiving the CU-UP sends an update usage parameter when the key update condition is met, wherein the usage parameter is updated, and the CU-CP sends the update usage parameter to the UE to trigger the UE to update the key. The key updated by the UE may include: an encryption key and an integrity protection key.
此处的更新使用参数为更新所述推导密钥的参数。The update here uses the parameter to update the parameters of the derived key.
在一些实施例中,所述满足密钥更新条件,可为之前推导出的用户面密钥和/或控制面密钥的至少其中之一的使用次数达到最大使用次数,可认为满足所述密钥更新条件。在另一些实施例中,所述满足密钥更新条件,可为之前推导的用户面密钥和/或控制面密钥的使用期限到期等。总之满足 密钥更新条件,不局限于上述任意一种。In some embodiments, the satisfying key update condition may be that the number of uses of at least one of the previously derived user plane key and/or the control plane key reaches a maximum number of uses, and may be considered to satisfy the secret. Key update condition. In other embodiments, the satisfying the key update condition may be the expiration of the previously derived user plane key and/or the control plane key expiration date, and the like. In short, the key update condition is satisfied, and is not limited to any of the above.
如图2所示,本实施例提供一种信息处理方法,应用于CU-UP中,包括:As shown in FIG. 2, this embodiment provides an information processing method, which is applied to a CU-UP, and includes:
与CU-CP交互安全信息。Interact security information with CU-CP.
在一些实施例中,所述与集中单元控制面CU-CP交互安全信息,包括以下至少之一:In some embodiments, the interacting with the centralized unit control plane CU-CP security information includes at least one of the following:
接收所述CU-CP发送的用户面密钥;该用户面密钥包括:用户面加密密钥和/或用户面完整性保护密钥。Receiving a user plane key sent by the CU-CP; the user plane key comprises: a user plane encryption key and/or a user plane integrity protection key.
接收所述CU-CP发送的推导密钥,其中,所述推导密钥,用于所述CU-CP确定用户面密钥。Receiving, by the CU-CP, a derivation key, wherein the derivation key is used by the CU-CP to determine a user plane key.
该推导密钥可为前述的统一推导密钥或用户面推导密钥。The derivation key may be the aforementioned unified derivation key or user plane derivation key.
在一些实施例中,所述与集中单元控制面CU-CP交互安全信息,还包括:接收所述CU-CP发送的安全算法的信息。这里的安全算法的信息,可为安全算法的指示信息和/或算法内容等算法信息。In some embodiments, the interacting with the centralized unit control plane CU-CP security information further includes: receiving information of a security algorithm sent by the CU-CP. The information of the security algorithm herein may be algorithm information such as indication information of the security algorithm and/or algorithm content.
在一些实施例中,所述与集中单元控制面CU-CP交互安全信息,还包括以下至少之一:In some embodiments, the interacting with the centralized unit control plane CU-CP security information further includes at least one of the following:
接收所述CU-CP发送的更新后的用户面密钥;Receiving an updated user plane key sent by the CU-CP;
接收所述CU-CP发送的更新后的推导密钥,其中,更新后的推导密钥,用于供CU-UP更新用户面密钥;Receiving, by the CU-CP, an updated derivation key, where the updated derivation key is used for the CU-UP to update the user plane key;
在满足密钥更新条件时,向所述CU-CP发送更新后的推导密钥及更新使用参数,其中,更新后的推导密钥用于所述CU-UP更新控制面密钥;此时,该推导密钥可为统一推导密钥;其中,所述更新使用参数,用于供所述CU-CP发送给UE以触发UE更新密钥;Sending the updated derivation key and updating the usage parameter to the CU-CP when the key update condition is met, wherein the updated derivation key is used for the CU-UP to update the control plane key; The derivation key may be a unified derivation key; wherein the update uses a parameter, where the CU-CP is sent to the UE to trigger the UE to update the key;
在满足密钥更新条件时,向所述CU-CP发送更新使用参数,所述更新使用参数用于供所述CU-CP将更新使用参数传输给UE以触发UE更新密 钥。When the key update condition is met, an update usage parameter is sent to the CU-CP, the update usage parameter being used by the CU-CP to transmit an update usage parameter to the UE to trigger the UE to update the key.
所述更新使用参数可为:进行推导密钥更新的计数值,但是不限于计数值。在一些实施例中,也可以是由CU-CP基于UE的安全能力信息,选择安全方法,为CU-CP确定控制面密钥等,将控制面密钥、统一推导密钥、控制面密钥、推导密钥、更新后的推导密钥及更新使用参数等至少其中之一发送给CU-CP。The update usage parameter may be: performing a count value of the derived key update, but is not limited to the count value. In some embodiments, the security method may be selected by the CU-CP based on the security capability information of the UE, the control plane key is determined for the CU-CP, and the control plane key, the unified derivation key, and the control plane key may be used. And transmitting at least one of a derivation key, an updated derivation key, and an update usage parameter to the CU-CP.
本实施例提供一种信息处理装置,应用于集中单元控制面CU-CP中,包括:The embodiment provides an information processing device, which is applied to the centralized unit control plane CU-CP, and includes:
第一交互模块,配置为与集中单元用户面CU-UP交互安全信息。The first interaction module is configured to exchange security information with the centralized unit user plane CU-UP.
在一些实施例中,所述第一交互模块,具体用于向所述CU-UP发送用户面密钥。In some embodiments, the first interaction module is specifically configured to send a user plane key to the CU-UP.
在一些实施例中,所述装置还包括以下至少之一:In some embodiments, the apparatus further comprises at least one of the following:
第一确定模块,配置为所述CU-CP根据统一推导密钥,确定出所述用户面密钥;a first determining module, configured to determine, by the CU-CP, the user plane key according to the unified derivation key;
第二确定模块,配置为所述CU-CP根据统一推导密钥,确定出控制面密钥;a second determining module, configured to determine, by the CU-CP, a control plane key according to the unified derivation key;
第三确定模块,配置为所述CU-CP根据用户面推导密钥,确定出所述用户面密钥;a third determining module, configured to determine, by the CU-CP, the user plane key according to the user plane derivation key;
第四确定模块,配置为所述CU-CP根据控制面推导密钥,确定出控制面密钥。And a fourth determining module, configured to: the CU-CP derives a key according to the control plane, and determines a control plane key.
所述第一交互模块,还配置为将推导密钥发送给所述CU-UP,其中,所述推导密钥,用于供所述CU-UP确定用户面密钥。The first interaction module is further configured to send the derivation key to the CU-UP, where the derivation key is used by the CU-UP to determine a user plane key.
在一些实施例中,所述推导密钥为同时用于控制面密钥和用户面密钥推导的统一推导密钥;或者,所述推导密钥为用户面推导密钥。In some embodiments, the derivation key is a unified derivation key that is used for both control plane key and user plane key derivation; or the derivation key is a user plane derivation key.
在一些实施例中,所述第一交互模块,还用于将选择的安全算法的信 息发送给所述CU-UP。In some embodiments, the first interaction module is further configured to send information of the selected security algorithm to the CU-UP.
在一些实施例中,所述安全算法包括:用户面安全算法及控制面安全算法;所述第一交互模块,配置为将所述用户面安全算法的信息发送给所述CU-UP。In some embodiments, the security algorithm includes: a user plane security algorithm and a control plane security algorithm; the first interaction module is configured to send information of the user plane security algorithm to the CU-UP.
在一些实施例中,所述第一交互模块,还配置为执行以下至少之一In some embodiments, the first interaction module is further configured to perform at least one of the following
满足预设密钥更新条件时,将更新后的推导密钥发送给所述CU-UP,其中,所述更新后的推导密钥,用于供所述CU-UP确定用户面密钥;When the preset key update condition is met, the updated derivation key is sent to the CU-UP, where the updated derivation key is used by the CU-UP to determine a user plane key;
满足预设密钥更新条件时,将基于更新后的推导密钥确定的用户面密钥发送给所述CU-UP;When the preset key update condition is met, the user plane key determined based on the updated derivation key is sent to the CU-UP;
接收所述CU-UP在满足密钥更新条件时发送的更新后的推导密钥及更新使用参数,其中所述更新后的推导密钥,用于更新控制面密钥,所述更新使用参数,用于供所述CU-CP发送给用户设备UE以触发所述UE更新密钥;Receiving an updated derivation key and an update usage parameter sent by the CU-UP when the key update condition is satisfied, wherein the updated derivation key is used to update a control plane key, and the update uses a parameter, Used for the CU-CP to send to the user equipment UE to trigger the UE to update the key;
接收所述CU-UP在满足密钥更新条件时发送更新使用参数,其中,所述更新使用参数,用于供所述CU-CP发送给UE以触发所述UE更新密钥。Receiving, by the CU-UP, an update usage parameter is sent when the key update condition is met, wherein the update usage parameter is used by the CU-CP to send to the UE to trigger the UE to update the key.
本实施例还提供一种信息处理装置,应用于CU-UP中,包括:The embodiment further provides an information processing apparatus, which is applied to the CU-UP, and includes:
第二交互模块,用于与集中单元用户面CU-CP交互安全信息。The second interaction module is configured to exchange security information with the centralized unit user plane CU-CP.
在一些实施例中,所述第二交互模块,配置为执行以下至少之一:In some embodiments, the second interaction module is configured to perform at least one of the following:
接收所述CU-CP发送的用户面密钥;Receiving a user plane key sent by the CU-CP;
接收所述CU-CP发送的推导密钥,其中,所述推导密钥,用于所述CU-CP确定用户面密钥。Receiving, by the CU-CP, a derivation key, wherein the derivation key is used by the CU-CP to determine a user plane key.
所述第二交互模块还用于,接收所述CU-CP发送的安全算法的信息。The second interaction module is further configured to receive information about a security algorithm sent by the CU-CP.
在一些实施例中,所述第二交互模块,还配置为执行以下至少之一:In some embodiments, the second interaction module is further configured to perform at least one of the following:
接收所述CU-CP发送的更新后的用户面密钥;Receiving an updated user plane key sent by the CU-CP;
接收所述CU-CP发送的更新后的推导密钥,其中,更新后的推导密钥, 用于供CU-UP更新用户面密钥;Receiving, by the CU-CP, an updated derivation key, where the updated derivation key is used to update the user plane key for the CU-UP;
在满足密钥更新条件时,向所述CU-CP发送更新后的推导密钥及更新使用参数,其中,更新后的推导密钥,用于所述CU-CP更新控制面密钥;所述更新使用参数,用于供CU-CP发送给用户设备UE以触发所述UE更新密钥;Sending the updated derivation key and updating the usage parameter to the CU-CP when the key update condition is met, wherein the updated derivation key is used for the CU-CP to update the control plane key; Updating the usage parameter, used by the CU-CP to send to the user equipment UE to trigger the UE to update the key;
在满足密钥更新条件时,向所述CU-CP发送更新使用参数,其中,更新使用参数,用于供所述CU-CP发送给UE以触发所述UE更新密钥。When the key update condition is met, an update usage parameter is sent to the CU-CP, wherein the usage parameter is updated for the CU-CP to send to the UE to trigger the UE to update the key.
如图3所示,本实施例提供一种信息处理处理,应用于CU-CP中,包括:As shown in FIG. 3, this embodiment provides an information processing process, which is applied to a CU-CP, and includes:
步骤S110:接收用户设备UE的安全能力信息;Step S110: Receive security capability information of the user equipment UE.
步骤S120:根据所述UE的安全能力信息,选择集中单元CU及所述UE支持的安全算法;Step S120: Select, according to the security capability information of the UE, a central unit CU and a security algorithm supported by the UE;
步骤S130:将选择的所述安全算法发送给所述UE;Step S130: Send the selected security algorithm to the UE;
步骤S140:确定出控制面加密密钥及控制面完整性保护密钥;Step S140: determining a control plane encryption key and a control plane integrity protection key;
步骤S150:向集中单元用户面CU-UP发送第一预定信息,其中,所述第一预定信息,用于供所述CU-UP确定所述安全算法、用户面加密密钥和用户面完整性保护密钥。Step S150: Send first predetermined information to the central unit user plane CU-UP, wherein the first predetermined information is used by the CU-UP to determine the security algorithm, the user plane encryption key, and the user plane integrity. Protect the key.
在一些实施例中,所述CU-CP可以从核心网的网元接收所述UE的根密钥及UE的安全能力信息。核心网可能给不同的UE分配了不同的根密钥。所述UE的安全能力信息,可包括:UE支持的安全算法的指示信息,例如,UE支持的安全算法的版本号、序列号等UE支持的安全算法的各种标识信息,可以用于CU-CP唯一确定出UE支持的安全算法。In some embodiments, the CU-CP may receive the root key of the UE and security capability information of the UE from a network element of the core network. The core network may assign different root keys to different UEs. The security capability information of the UE may include: indication information of a security algorithm supported by the UE, for example, a version number of the security algorithm supported by the UE, a sequence number, and other identifier information of a security algorithm supported by the UE, and may be used for the CU- The CP uniquely determines the security algorithm supported by the UE.
在另一些实施例中,所述CU-CP还可以从核心网的网元接收所述UE的推导密钥及UE的安全能力信息,这里的推导密钥可为核心网的网元基于所述UE的根密钥及密钥导出算法计算或推导得到的。In other embodiments, the CU-CP may further receive the derivation key of the UE and the security capability information of the UE from a network element of the core network, where the derivation key may be based on the network element of the core network. The UE's root key and key derivation algorithm are calculated or derived.
所述安全算法按照执行的安全功能可包括:加密算法及完整性保护算法。所述加密算法,可以利用加密密钥进行信息加密和信息解密。所述完整性保护算法,可以利用完整性保护密钥进行完整性保护的相关处理,还可用于生成完整性保护密钥。The security algorithm may include an encryption algorithm and an integrity protection algorithm according to the executed security function. The encryption algorithm can use an encryption key for information encryption and information decryption. The integrity protection algorithm may use an integrity protection key for related processing of integrity protection, and may also be used to generate an integrity protection key.
所述CU-CP具体可以从核心网的接入移动性管理功能实体(Access and Mobility Management Function,AMF)或鉴权服务器(Authentication Server Function,AUSF)或统一的数据管理实体(Unified Data Management,UDM)等网元接收所述UE的根密钥及UE支持的安全算法的信息。The CU-CP may specifically access an Access and Mobility Management Function (AMF) or an Authentication Server Function (AUSF) or a Unified Data Management (UDM) from a core network. The network element receives information about the root key of the UE and the security algorithm supported by the UE.
在本实施例中所述CU也有其所支持的安全算法,在本实施例中所述CU-CP会选择出所述CU及所述UE均支持的安全算法。In this embodiment, the CU also has a security algorithm supported by the CU. In this embodiment, the CU-CP selects a security algorithm supported by the CU and the UE.
在一些实施例中,所述安全算法按照应用的主体可分为:供CU-CP使用的控制面安全算法及供CU-UP使用的用户面安全算法。在另一些实施例中,所述安全算法不区分用户面和控制面,选择出的安全算法同时用于用户面和控制面的加密保护和完整性保护。若所述安全算法区分用户面安全算法及控制面安全算法,则所述CU-CP需要分别选择,执行两次安全算法的选择。若所述安全算法不区分用户面安全算法和控制面安全算法,则CU-CP仅需选择一套安全算法。In some embodiments, the security algorithm may be divided into a control plane security algorithm for CU-CP and a user plane security algorithm for CU-UP according to the main body of the application. In other embodiments, the security algorithm does not distinguish between the user plane and the control plane, and the selected security algorithm is used for both encryption protection and integrity protection of the user plane and the control plane. If the security algorithm distinguishes between the user plane security algorithm and the control plane security algorithm, the CU-CP needs to separately select and perform the selection of the security algorithm twice. If the security algorithm does not distinguish between the user plane security algorithm and the control plane security algorithm, the CU-CP only needs to select a set of security algorithms.
所述用户面安全算法包括:用户面加密算法和用户面完整性保护算法;所述控制面安全算法包括:控制面加密算法及控制面完整性保护算法。The user plane security algorithm includes: a user plane encryption algorithm and a user plane integrity protection algorithm; the control plane security algorithm includes: a control plane encryption algorithm and a control plane integrity protection algorithm.
在一些实施例中,还可用于确定出用户面加密算法及用户面完整性保护算法。在一些实施例中,所述用户面加密算法和控制面加密算法是两个独立的算法,但是这两个独立的算法可以相同,也可以不同。所述用户面完整性保护算法和所述控制面完整性保护算法,可以是两个独立的算法,这两个独立的算法可以相同也可以不同。In some embodiments, it can also be used to determine a user plane encryption algorithm and a user plane integrity protection algorithm. In some embodiments, the user plane encryption algorithm and the control plane encryption algorithm are two independent algorithms, but the two independent algorithms may be the same or different. The user plane integrity protection algorithm and the control plane integrity protection algorithm may be two independent algorithms, and the two independent algorithms may be the same or different.
在本实施例中所述安全算法的选择由所述CU-CP来选择。The selection of the security algorithm in this embodiment is selected by the CU-CP.
一方面,在步骤S130中将所述安全算法的信息发送给UE,例如,将选择的安全算法的标识信息发送给UE,例如,安全算法的版本号、编号和/或名称等信息发送给UE,可以供UE自行推导出与CU进行信息交互的加密密钥及完整性保护密钥,例如,控制面加密密钥及完整性保护密钥,用于CU-UP与UE之间数据交互的用户面加密密钥及用户面完整性保护密钥。In one aspect, the information of the security algorithm is sent to the UE in step S130, for example, the identifier information of the selected security algorithm is sent to the UE, for example, information such as the version number, number, and/or name of the security algorithm is sent to the UE. The UE may separately derive an encryption key and an integrity protection key for interacting with the CU, for example, a control plane encryption key and an integrity protection key, and a user for data interaction between the CU-UP and the UE. Face encryption key and user plane integrity protection key.
另一方面,在步骤S140中就可以根据选择的安全算法,计算出或推导出所述CU-CP自身使用的控制面加密密钥及控制面完整性保护密钥。控制面加密密钥及控制面完整性保护密钥可用于所述CU-CP与UE之间的控制面信令的加密保护和完整性保护。所述控制信令为CU-CP发送或从UE接收的各种信令,例如,无线资源控制(Radio Resource Control,RRC)信令的加密密钥或RRC的完整性保护密钥。控制面加密密钥,至少可以用于CU-CP与UE之间的RRC信令的加密保护;控制面完整性保护密钥,至少可以用于CU-CP与UE之间的RRC信令的完整性保护。On the other hand, in step S140, the control plane encryption key and the control plane integrity protection key used by the CU-CP itself can be calculated or derived according to the selected security algorithm. The control plane encryption key and the control plane integrity protection key may be used for encryption protection and integrity protection of control plane signaling between the CU-CP and the UE. The control signaling is various signaling that the CU-CP sends or receives from the UE, for example, an encryption key of Radio Resource Control (RRC) signaling or an integrity protection key of the RRC. The control plane encryption key can be used for at least cryptographic protection of RRC signaling between the CU-CP and the UE; the control plane integrity protection key can be used at least for the complete RRC signaling between the CU-CP and the UE. Sexual protection.
在本实施例中,所述步骤S130、步骤S140及步骤S150没有固定的先后顺序,可以任意一个先执行,也可以同步执行步骤S130及步骤S140,以加快CU和UE确定出各自所需密钥的速率。In this embodiment, the step S130, the step S140, and the step S150 are not in a fixed sequence, and may be performed first, or may be performed in steps S130 and S140 to speed up the CU and the UE to determine the respective required keys. s speed.
在本实施例中所述安全算法,还可以用于用户面加密密钥及用户面完整性保护密钥的推导或计算。在本实施例中,所述用户面加密密钥用于CU-UP与UE之间的数据加密保护,所述用户面完整性保护密钥,用于CU-UP与UE之间的数据完整性保护。In the embodiment, the security algorithm may also be used for deriving or calculating a user plane encryption key and a user plane integrity protection key. In this embodiment, the user plane encryption key is used for data encryption protection between the CU-UP and the UE, and the user plane integrity protection key is used for data integrity between the CU-UP and the UE. protection.
在本实施例中,一方面,由于基于CU的分离式架构,分别为CU-CP与UE之间的控制面信令的交互及CU-UP之间数据的交互,分别设置了控制面加密密钥、控制面完整性保护密钥、用户面加密密钥及用户面完整性保护密钥,进行控制信令及数据的加密保护和完整性保护,可以利用选择的安全算法及确定的密钥,确保接入层的安全。另一方面,针对CU的分离 式架构,提出了如何推导出控制面加密密钥、控制信令的完整性保护密钥、用户面加密密钥及用户面完整性保护密钥的具体方式,具有实现简便的特点。In this embodiment, on the one hand, because of the CU-based split architecture, the control plane signaling interaction between the CU-CP and the UE and the data interaction between the CU-UP are respectively set, and the control plane encryption key is respectively set. The key, the control plane integrity protection key, the user plane encryption key, and the user plane integrity protection key, perform control signaling and data encryption protection and integrity protection, and can utilize the selected security algorithm and the determined key. Ensure the security of the access layer. On the other hand, for the separate architecture of CU, how to derive the control plane encryption key, control signaling integrity protection key, user plane encryption key and user plane integrity protection key is proposed. Simple to implement.
所述方法还包括:The method further includes:
获取推导密钥,其中,所述推导密钥与密钥导出算法,共同用于确定所述控制面加密密钥、控制面完整性保护密钥、所述用户面加密密钥及所述用户面完整性保护密钥。Obtaining a derivation key, wherein the derivation key and the key derivation algorithm are jointly used to determine the control plane encryption key, the control plane integrity protection key, the user plane encryption key, and the user plane Integrity protection key.
所述导出密钥的类型有多种,以下提供两种方式:There are various types of the derived keys, and the following two methods are provided:
第一种:The first:
所述获取推导密钥可包括:根据根密钥及密钥导出算法,确定出控制面推导密钥及用户面推导密钥。其中,所述控制面推导密钥与密钥导出算法,共同用于确定所述控制面加密密钥和所述控制面完整性保护密钥;所述用户面推导密钥与密钥导出算法,共同用于确定所述用户面加密密钥和所述用户面完整性保护密钥。The obtaining the derivation key may include: determining a control plane derivation key and a user plane derivation key according to the root key and the key derivation algorithm. The control plane derivation key and the key derivation algorithm are jointly used to determine the control plane encryption key and the control plane integrity protection key; the user plane derivation key and a key derivation algorithm, Commonly used to determine the user plane encryption key and the user plane integrity protection key.
在本实施例中所述推导密钥分为控制面推导密钥和用户面推导密钥,控制面推导密钥可以用于控制面加密密钥及控制面完整性保护密钥的推导或计算。而用户面推导密钥,用于用户面加密密钥及用户面完整性保护密钥的推导或计算。推导密钥分为了控制面推导密钥和用户面推导密钥,如此,即便控制面加密密钥及控制面完整性保护密钥,及,所述用户面加密密钥和用户面完整性保护密钥其中一组密钥被窃取,但是由于采用不同的推导密钥进行推导,另一组密钥被非法者推导来的风险,从而可以进一步提升接入层的安全性。In the embodiment, the derivation key is divided into a control plane derivation key and a user plane derivation key, and the control plane derivation key can be used for deriving or calculating the control plane encryption key and the control plane integrity protection key. The user plane derivation key is used for derivation or calculation of the user plane encryption key and the user plane integrity protection key. The derivation key is divided into a control plane derivation key and a user plane derivation key, such that even the control plane encryption key and the control plane integrity protection key, and the user plane encryption key and the user plane integrity protection secret One of the keys of the key is stolen, but because of the derivation of different derivation keys, the risk of another set of keys being deduced by the illegal person can further improve the security of the access layer.
第二种:Second:
所述获取推导密钥可包括:The obtaining the derivation key may include:
根据根密钥及密钥导出算法,确定出统一推导密钥。According to the root key and the key derivation algorithm, a unified derivation key is determined.
在一些实施例中,为了简化密钥的确定过程,一个推导密钥既可以用于控制面加密密钥及控制面完整性保护密钥的确定,也可以用于计算或推导出用户面加密密钥和完整性保护密钥。故在一些实施例中,所述步骤S141可包括:根据根密钥及密钥导出算法,确定出统一推导密钥,其中,所述统一推导密钥与所述密钥导出算法,共同用于确定所述控制面加密密钥和所述控制面完整性保护密钥,及确定所述用户面加密密钥和所述用户面完整性保护密钥。In some embodiments, in order to simplify the key determination process, a derivation key can be used for both the control plane encryption key and the control plane integrity protection key, or can be used to calculate or derive the user plane encryption key. Key and integrity protection keys. Therefore, in some embodiments, the step S141 may include: determining a unified derivation key according to the root key and the key derivation algorithm, wherein the unified derivation key and the key derivation algorithm are used together Determining the control plane encryption key and the control plane integrity protection key, and determining the user plane encryption key and the user plane integrity protection key.
第三种:The third type:
所述获取推导密钥可包括:The obtaining the derivation key may include:
接收UE的推导密钥,例如,从核心网接收所述UE的推导密钥,该推导密钥是基于UE的根密钥及密钥导出算法密钥导出算法计算的。该推导密钥可包括:用户面推导密钥和控制面推导密钥,或者,该推导密钥可为统一推导密钥。Receiving the derivation key of the UE, for example, receiving the derivation key of the UE from the core network, the derivation key being calculated based on the UE's root key and a key derivation algorithm key derivation algorithm. The derivation key may include: a user plane derivation key and a control plane derivation key, or the derivation key may be a unified derivation key.
如图4所示,所述步骤S140可包括:As shown in FIG. 4, the step S140 may include:
步骤S141:根据所述推导密钥及密钥导出算法,确定出所述控制面加密密钥;Step S141: Determine the control plane encryption key according to the derivation key and the key derivation algorithm;
步骤S142:根据所述推导密钥及所述密钥导出算法,确定出所述控制面完整性保护密钥。Step S142: Determine the control plane integrity protection key according to the derivation key and the key derivation algorithm.
在一些实施例中,所述用户面加密密钥及用户面完整性保护密钥是由CU-CP确定的,故所述方法还包括:根据所述推导密钥及密钥导出算法,确定出所述用户面加密密钥;根据所述推导密钥及密钥导出算法,确定出所述用户面完整性保护密钥。所述步骤S150可包括:将所述用户面加密密钥、所述用户面完整性保护密钥、所述用户面加密密钥的信息及所述用户面完整性保护算法的信息发送给所述CU-UP。In some embodiments, the user plane encryption key and the user plane integrity protection key are determined by the CU-CP, and the method further includes: determining, according to the derivation key and the key derivation algorithm, The user plane encryption key; determining the user plane integrity protection key according to the derivation key and a key derivation algorithm. The step S150 may include: sending the user plane encryption key, the user plane integrity protection key, the information of the user plane encryption key, and the information of the user plane integrity protection algorithm to the CU-UP.
在一些实施例中,所述步骤S150可包括:将所述推导密钥及所述安全 算法中的用户面加密算法的信息及用户面完整性保护算法的信息发送给所述CU-UP,其中,所述推导密钥及所述密钥导出算法,用于所述CU-UP确定出所述用户面加密密钥;所述推导密钥及用户面完整性保护算法,用于所述CU-UP确定出所述用户面完整性保护密钥。In some embodiments, the step S150 may include: sending the information of the derivation key and the user plane encryption algorithm in the security algorithm and the information of the user plane integrity protection algorithm to the CU-UP, where Deriving a key and the key derivation algorithm, the CU-UP determining the user plane encryption key; the derivation key and a user plane integrity protection algorithm, for the CU- The UP determines the user plane integrity protection key.
在本实施例中,可以将推导密钥及用户安全算法的信息(例如,所述用户面加密算法的信息及所述用户面完整性保护算法的信息)发送给CU-UP,由CU-UP自行推导出用户面加密密钥及用户面完整性保护密钥。In this embodiment, the information of the derivation key and the user security algorithm (for example, the information of the user plane encryption algorithm and the information of the user plane integrity protection algorithm) may be sent to the CU-UP by the CU-UP. The user plane encryption key and the user plane integrity protection key are derived by themselves.
在一些实施例中,所述推导密钥可为统一推导密钥。该统一推导密钥,既可以用于控制面加密密钥及控制面完整性保护密钥的确定,也可以用于用户面加密密钥和用户面完整性保护密钥的确定。In some embodiments, the derived key can be a unified derived key. The unified derivation key can be used for determining the control plane encryption key and the control plane integrity protection key, and can also be used for determining the user plane encryption key and the user plane integrity protection key.
在一些实施例中,所述推导密钥可为由核心网的网元直接发送给CU-CP的,核心网发送的推导密钥同样可为所述统一推导密钥,或用户面推导密钥和控制面推导密钥。即,所述推导密钥包括:用户面推导密钥和控制面推导密钥,所述控制面推导密钥与密钥导出算法,共同用于确定所述控制面加密密钥和所述控制面完整性保护密钥;所述用户面推导密钥与密钥导出算法,共同用于确定所述用户面加密密钥和所述用户面完整性保护密钥;或者,所述推导密钥为:用于所述用户面密钥及所述控制面加密密钥及所述控制面密钥确定的统一推导密钥。在一些实施例中,所述方法还包括:In some embodiments, the derivation key may be directly sent by the network element of the core network to the CU-CP, and the derivation key sent by the core network may also be the unified derivation key or the user plane derivation key. And the control plane derivation key. That is, the derivation key includes: a user plane derivation key and a control plane derivation key, and the control plane derivation key and the key derivation algorithm are jointly used to determine the control plane encryption key and the control plane An integrity protection key; the user plane derivation key and the key derivation algorithm are jointly used to determine the user plane encryption key and the user plane integrity protection key; or the derivation key is: A unified derivation key for the user plane key and the control plane encryption key and the control plane key determination. In some embodiments, the method further includes:
当满足密钥更新条件时,更新所述控制面加密密钥及控制面完整性保护密钥;Updating the control plane encryption key and the control plane integrity protection key when the key update condition is met;
向所述CU-UP发送第二预定信息,其中,所述第二预定信息,用于触发所述CU-UP获取更新的用户面加密密钥和用户面完整性保护密钥。Sending second predetermined information to the CU-UP, wherein the second predetermined information is used to trigger the CU-UP to acquire an updated user plane encryption key and a user plane integrity protection key.
所述满足密钥更新条件可为,例如,CU-CP接收到CU-UP发送的密钥更新请求。所述控制面加密密钥及控制面完整性保护密钥,用户面加密密 钥及用户面完整性保护密钥都有一定的有效使用次数,若当前的使用次数达到所述有效使用次数,就可认为满足所述密钥更新条件,更新所述用户面加密密钥和用户面完整性保护密钥,和/或,更新所述控制面加密密钥和控制面完整性保护密钥。如此,可以加密密钥及完整性保护密钥的更新,可以进一步确保接入层的安全性。The satisfying key update condition may be, for example, that the CU-CP receives the key update request sent by the CU-UP. The control plane encryption key and the control plane integrity protection key, the user plane encryption key and the user plane integrity protection key have certain effective use times. If the current usage times reach the effective use times, The key update condition may be deemed to be satisfied, the user plane encryption key and the user plane integrity protection key are updated, and/or the control plane encryption key and the control plane integrity protection key are updated. In this way, the encryption of the encryption key and the integrity protection key can be encrypted, and the security of the access layer can be further ensured.
在一些实施例中,若所述控制面加密密钥及控制面完整性保护密钥的当前使用次数达到第一有效使用次数,且所述用户面加密密钥及用户面完整性保护密钥还未达到第二有效使用次数,所述CU-CP确定出满足所述密钥更新条件,可以仅更新所述控制面加密密钥及完整性保护密钥,或者,同时更新所述控制面加密密钥及完整性保护密钥及所述用户面加密密钥及用户面完整性保护密钥。所述第一有效使用次数可以相等,也可以不相等。若仅更新所述控制面加密密钥及完整性保护密钥,可以减少密钥更新所产生的计算量及信息交互量;若同时更新,可以同时实现CU内与UE进行CP和UP的使用的密钥的均更新,确保高安全性。In some embodiments, if the current usage count of the control plane encryption key and the control plane integrity protection key reaches the first effective usage count, and the user plane encryption key and the user plane integrity protection key are further If the second valid usage count is not reached, the CU-CP determines that the key update condition is met, and may only update the control plane encryption key and the integrity protection key, or simultaneously update the control plane encryption key. The key and integrity protection key and the user plane encryption key and the user plane integrity protection key. The first effective usage times may or may not be equal. If only the control plane encryption key and the integrity protection key are updated, the calculation amount and the information interaction amount generated by the key update can be reduced; if the update is performed at the same time, the use of the CP and the UP in the CU and the UE can be simultaneously implemented. The keys are updated to ensure high security.
在还有一些实施例中,若所述控制面加密密钥及完整性保护密钥的当前使用次数未达到第一有效使用次数,且所述用户面加密密钥及用户面完整性保护密钥达到第二有效使用次数,所述CU-CP会接收到CU-UP发送的更新请求,确认出满足所述密钥更新条件,可以仅更新用户面加密密钥及用户面完整性保护密钥,也可以同时更新所述控制面加密密钥及完整性保护密钥及所述用户面加密密钥及用户面完整性保护密钥。In still another embodiment, if the current usage count of the control plane encryption key and the integrity protection key does not reach the first effective usage count, and the user plane encryption key and the user plane integrity protection key After the second valid usage count is reached, the CU-CP receives the update request sent by the CU-UP, confirms that the key update condition is met, and may only update the user plane encryption key and the user plane integrity protection key. The control plane encryption key and integrity protection key and the user plane encryption key and the user plane integrity protection key may also be updated simultaneously.
在另外一些实施例中,若所述控制面加密密钥及完整性保护密钥的当前使用次数达到第一有效使用次数,且所述用户面加密密钥及用户面完整性保护密钥达到第二有效使用次数,才确定是满足所述密钥更新条件,同时更新所述控制面加密密钥及完整性保护密钥及所述用户面加密密钥及用户面完整性保护密钥;以进一步减少密钥更新产生的计算量及信息传输量。In some other embodiments, if the current usage count of the control plane encryption key and the integrity protection key reaches the first effective usage count, and the user plane encryption key and the user plane integrity protection key reach the first The number of effective uses is determined to satisfy the key update condition, and the control plane encryption key and the integrity protection key and the user plane encryption key and the user plane integrity protection key are updated simultaneously; Reduce the amount of calculations and the amount of information transmitted by key updates.
在一些实施例中,所述第二预定信息包括:更新后的所述用户面加密密钥和用户面完整性保护密钥。In some embodiments, the second predetermined information includes the updated user plane encryption key and a user plane integrity protection key.
在还有一些实施例中,所述第二预定信息包括:更新后的推导密钥,其中,更新的所述推导密钥用于供所述CU-UP获取更新的所述用户面加密密钥和用户面完整性保护密钥。此处的所述推导密钥,为所述用户面推导密钥,或,统一推导密钥。In still other embodiments, the second predetermined information includes: an updated derivation key, wherein the updated derivation key is used by the CU-UP to obtain the updated user plane encryption key And user face integrity protection keys. The derivation key here derives a key for the user plane, or uniformly derives a key.
在另外一些实施例中,所述第二预定信息,可包括:更新后的推导密钥,由所述CU-UP自行根据更新后的所述推导密钥,确定出所述用户面加密密钥和用户面完整性保护密钥。In some other embodiments, the second predetermined information may include: an updated derivation key, and the CU-UP determines the user plane encryption key according to the updated derivation key. And user face integrity protection keys.
如图5所示,本实施例提供一种信息处理方法,应用于CU-UP中,包括:As shown in FIG. 5, this embodiment provides an information processing method, which is applied to a CU-UP, and includes:
步骤S210:接收CU-CP发送的第一预定信息;Step S210: Receive first predetermined information sent by the CU-CP;
步骤S220:基于所述第一预定信息,确定用户面加密密钥、用户面完整性保护密钥及安全算法;其中,所述用户面加密密钥及所述完整性保护密钥,是根据所述安全算法确定的。Step S220: Determine a user plane encryption key, a user plane integrity protection key, and a security algorithm based on the first predetermined information, where the user plane encryption key and the integrity protection key are based on Determined by the security algorithm.
在本实施例中,所述CU-UP会从所述CU-CP接收到所述第一预定信息,然后结合所述第一预定信息,CU-UP获取到用户面加密密钥及完整性保护密钥及安全算法。在一些实施例中,所述安全算法可为整个CU-CP和CU-UP同时使用统一加密算法和统一完整性保护算法。在另外一些实施例中,所述安全算法分为用户面安全算法和控制面安全算法,在本实施例中,CU-UP接收的为用户面安全算法。In this embodiment, the CU-UP receives the first predetermined information from the CU-CP, and then combines the first predetermined information, and the CU-UP obtains a user plane encryption key and integrity protection. Key and security algorithm. In some embodiments, the security algorithm may use both a unified encryption algorithm and a unified integrity protection algorithm for the entire CU-CP and CU-UP. In other embodiments, the security algorithm is divided into a user plane security algorithm and a control plane security algorithm. In this embodiment, the CU-UP receives the user plane security algorithm.
在一些实施例中,所述步骤S210可包括:In some embodiments, the step S210 may include:
接收所述CU-CP发送的所述用户面加密密钥、所述用户面完整性保护密钥、用户面加密算法的信息及用户面完整性保护算法的信息。And receiving information about the user plane encryption key, the user plane integrity protection key, the user plane encryption algorithm, and the user plane integrity protection algorithm sent by the CU-CP.
由于第一预定信息直接就携带有CU-CP已经确定出的用户面加密密 钥、用户面完整性保护密钥、用户面加密算法的信息及用户面完整性保护算法的信息,则在步骤S220中CU-UP可以通过第一预定信息的信息解析,就获得用户面加密密钥及所述用户面完整性保护密钥。具体所述第一预定信息可包括:用户面加密密钥、用户面完整性保护密钥,所述用户面加密算法的标识信息、所述用户面完整性保护算法的标识信息等信息,总之,通过第一预定信息,CU-UP可以确定出用户面加密密钥及完整性保护密钥,同时确定出CU-CP选择的用户面加密算法及用户面完整性保护算法。The first predetermined information directly carries information of the user plane encryption key, the user plane integrity protection key, the user plane encryption algorithm, and the user plane integrity protection algorithm that have been determined by the CU-CP, in step S220. The medium CU-UP can obtain the user plane encryption key and the user plane integrity protection key by parsing the information of the first predetermined information. The first predetermined information may include: a user plane encryption key, a user plane integrity protection key, identification information of the user plane encryption algorithm, identification information of the user plane integrity protection algorithm, and the like, in short, Through the first predetermined information, the CU-UP can determine the user plane encryption key and the integrity protection key, and determine the user plane encryption algorithm and the user plane integrity protection algorithm selected by the CU-CP.
在一些实施例中,所述步骤S210可包括:接收所述CU-CP发送的推导密钥及用户面安全算法的信息。In some embodiments, the step S210 may include: receiving information of the derived key and the user plane security algorithm sent by the CU-CP.
所述步骤S220可包括:根据所述推导密钥及密钥导出算法,确定所述用户面加密密钥及所述用户面完整性保护密钥。The step S220 may include determining the user plane encryption key and the user plane integrity protection key according to the derivation key and a key derivation algorithm.
在本实施例中,由CU-UP自行推导自身需要使用的加密密钥及完整性保护密钥,这样即便是CU-CP也不知道用户面加密密钥及用户面完整性保护密钥,也无在CU-CP和CU-UP之间进行密钥传输,减少了密传输过程中的被泄露的风险,从而提升了用户面加密密钥及用户面完整性保护密钥的安全性。In this embodiment, the CU-UP itself derives the encryption key and the integrity protection key that it needs to use, so that even the CU-CP does not know the user plane encryption key and the user plane integrity protection key. No key transmission between the CU-CP and the CU-UP reduces the risk of leakage during the confidential transmission process, thereby improving the security of the user plane encryption key and the user plane integrity protection key.
此处的,所述用户面安全算法,可包括:用于用户面加密密钥推导的用户面加密算法,及用于用户面完整性保护密钥推导的用户面完整性保护算法。Here, the user plane security algorithm may include: a user plane encryption algorithm for user plane encryption key derivation, and a user plane integrity protection algorithm for user plane integrity protection key derivation.
在一些实施例中,所述推导密钥为用户面推导密钥,其中,所述用户面推导密钥,用于确定所述用户面加密密钥及所述用户面完整性保护密钥。In some embodiments, the derived key is a user plane derivation key, wherein the user plane derivation key is used to determine the user plane encryption key and the user plane integrity protection key.
在另外一些实施例中,所述推导密钥为统一推导密钥,其中,所述统一推导密钥,用于确定控制面加密密钥、控制面完整性保护密钥、所述用户面加密密钥及所述用户面完整性保护密钥。In some other embodiments, the derivation key is a unified derivation key, wherein the unified derivation key is used to determine a control plane encryption key, a control plane integrity protection key, and the user plane encryption key. The key and the user plane integrity protection key.
例如,如图6所示,所述方法还包括:For example, as shown in FIG. 6, the method further includes:
步骤S230:接收在满足密钥更新条件时所述CU-CP发送的第二预定信息;Step S230: Receive second predetermined information that is sent by the CU-CP when the key update condition is met;
步骤S240:根据所述第二预定信息,更新所述用户面加密密钥及所述用户面完整性保护密钥。Step S240: Update the user plane encryption key and the user plane integrity protection key according to the second predetermined information.
满足所述密钥更新条件,可以由CU-CP判断,也可以由CU-UP自行判断。例如,CU-UP统计出当前自身使用的CU-CP的加密密钥及所述用户面完整性保护密钥的当前使用次数达到了所述第二有效使用次数,就可认为满足所述密钥更新条件。The key update condition is satisfied, and may be determined by the CU-CP, or may be determined by the CU-UP. For example, the CU-UP counts that the encryption key of the CU-CP currently used by itself and the current usage count of the user plane integrity protection key reach the second effective usage count, and the key is considered to be satisfied. Update the conditions.
在一些实施例中,所述第二预定信息,携带有更新后的用户面加密密钥及用户面完整性保护密钥。In some embodiments, the second predetermined information carries an updated user plane encryption key and a user plane integrity protection key.
在一些实施例中,所述步骤S230可包括:接收在满足密钥更新条件时所述CU-CP发送的携带有更新后的推导密钥的所述第二预定信息;In some embodiments, the step S230 may include: receiving the second predetermined information that is sent by the CU-CP and carrying the updated derivation key when the key update condition is met;
所述步骤S240可包括:根据所述更新后的推导密钥,重新确定所述用户面加密密钥及所述用户面完整性保护密钥。此处的推导密钥可为前述的统一推导密钥或用户面推导密钥。The step S240 may include: re-determining the user plane encryption key and the user plane integrity protection key according to the updated derivation key. The derivation key here may be the aforementioned unified derivation key or user plane derivation key.
如图7所示,本实施例提供一种信息处理装置,应用于CU-CP中,包括:As shown in FIG. 7, the embodiment provides an information processing apparatus, which is applied to a CU-CP, and includes:
第一接收模块110,配置为接收用户设备UE的安全能力信息;The first receiving module 110 is configured to receive security capability information of the user equipment UE;
选择模块120,配置为根据所述UE的安全能力信息,选择集中单元CU及所述UE支持的安全算法;The selecting module 120 is configured to select a central unit CU and a security algorithm supported by the UE according to the security capability information of the UE;
第一发送模块130,配置为将选择的所述安全算法的信息发送给所述UE;The first sending module 130 is configured to send the selected information of the security algorithm to the UE;
第一确定模块140,配置为确定出控制面加密密钥及控制面完整性保护密钥;The first determining module 140 is configured to determine a control plane encryption key and a control plane integrity protection key;
第二发送模块150,配置为向集中单元用户面CU-UP发送第一预定信 息,其中,所述第一预定信息,用于所述CU-UP确定所述安全算法、用户面加密密钥和用户面完整性保护密钥。The second sending module 150 is configured to send first predetermined information to the centralized unit user plane CU-UP, where the first predetermined information is used by the CU-UP to determine the security algorithm, the user plane encryption key, and User face integrity protection key.
第一接收模块110、选择模块120、第一发送模块130、第一确定模块140及第二发送模块150,均可为有计算机程序组成的程序模块,可以通过处理器的执行实现上述各个模块的功能。所述处理器可为中央处理器、微处理器、数字信号处理器、应用处理器、可编程阵列等。The first receiving module 110, the selecting module 120, the first sending module 130, the first determining module 140, and the second sending module 150 may each be a program module composed of a computer program, and the modules may be implemented by executing the processor. Features. The processor can be a central processing unit, a microprocessor, a digital signal processor, an application processor, a programmable array, or the like.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further includes:
获取模块,配置为获取推导密钥,其中,所述推导密钥与密钥导出算法,共同用于确定所述控制面加密密钥、控制面完整性保护密钥、所述用户面加密密钥及所述用户面完整性保护密钥。An obtaining module, configured to obtain a derivation key, where the derivation key and the key derivation algorithm are used together to determine the control plane encryption key, the control plane integrity protection key, and the user plane encryption key And the user plane integrity protection key.
所述第一确定模块140,包括:The first determining module 140 includes:
第一确定子模块,配置为根据所述推导密钥及密钥导出算法,确定出所述控制面加密密钥;a first determining submodule configured to determine the control plane encryption key according to the derivation key and a key derivation algorithm;
第二确定子模块,配置为根据所述推导密钥及所述密钥导出算法,确定出所述控制面完整性保护密钥。And a second determining submodule configured to determine the control plane integrity protection key according to the derivation key and the key derivation algorithm.
在还有一些实施例中,所述获取模块,配置为根据根密钥及所述密钥导出算法,确定出控制面推导密钥及用户面推导密钥,其中,所述控制面推导密钥与密钥导出算法,共同用于确定所述控制面加密密钥和所述控制面完整性保护密钥;所述用户面推导密钥与密钥导出算法,共同用于确定所述用户面加密密钥和所述用户面完整性保护密钥。In some embodiments, the obtaining module is configured to determine a control plane derivation key and a user plane derivation key according to the root key and the key derivation algorithm, wherein the control plane deriving key And a key derivation algorithm, configured to determine the control plane encryption key and the control plane integrity protection key; the user plane derivation key and a key derivation algorithm are jointly used to determine the user plane encryption The key and the user plane integrity protection key.
在一些实施例中,所述获取模块,还可配置为根据根密钥及密钥导出算法,确定出统一推导密钥,其中,所述统一推导密钥与所述密钥导出算法,共同用于确定所述控制面加密密钥和所述控制面完整性保护密钥,及确定所述用户面加密密钥和所述用户面完整性保护密钥。In some embodiments, the obtaining module may be further configured to determine a unified derivation key according to the root key and the key derivation algorithm, wherein the unified derivation key is used together with the key derivation algorithm Determining the control plane encryption key and the control plane integrity protection key, and determining the user plane encryption key and the user plane integrity protection key.
在一些实施例中,所述获取模块,还可配置为接收所述UE的推导密钥, 这里接收的推导密钥可为前述的统一推导密钥,或者,用户面推导密钥及控制面推导密钥。In some embodiments, the obtaining module may be further configured to receive the derivation key of the UE, where the derivation key received may be the foregoing unified derivation key, or the user plane derivation key and the control plane derivation Key.
所述确定模块还包括:The determining module further includes:
第三确定子模块,配置为根据所述推导密钥及密钥导出算法,确定出所述用户面加密密钥;a third determining submodule configured to determine the user plane encryption key according to the derivation key and a key derivation algorithm;
第四确定子模块,配置为根据所述推导密钥及密钥导出算法,确定出所述用户面完整性保护密钥;a fourth determining submodule, configured to determine the user plane integrity protection key according to the derivation key and a key derivation algorithm;
所述第二发送模块150,配置为将所述用户面加密密钥、所述用户面完整性保护密钥、所述用户面加密密钥的信息及所述用户面完整性保护算法的信息发送给所述CU-UP。The second sending module 150 is configured to send information about the user plane encryption key, the user plane integrity protection key, the user plane encryption key, and the user plane integrity protection algorithm. Give the CU-UP.
在一些实施例中,所述第二发送模块150,还配置为将所述推导密钥及用户面加密算法的信息及用户面完整性保护算法的信息发送给所述CU-UP,其中,所述推导密钥及所述密钥导出算法,用于所述CU-UP确定出所述用户面加密密钥;所述推导密钥及所述用户面完整性保护算法,用于供所述CU-UP确定所述用户面完整性保护密钥。In some embodiments, the second sending module 150 is further configured to send the information of the derivation key and the user plane encryption algorithm and the information of the user plane integrity protection algorithm to the CU-UP, where Deriving a key and the key derivation algorithm, the CU-UP determining the user plane encryption key; the derivation key and the user plane integrity protection algorithm, for the CU -UP determines the user plane integrity protection key.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further includes:
第一更新模块,配置为当满足密钥更新条件时,更新所述控制面加密密钥及控制面完整性保护密钥;a first update module, configured to update the control plane encryption key and the control plane integrity protection key when the key update condition is met;
所述第二发送模块150,还配置为向所述CU-UP发送第二预定信息,其中,所述第二预定信息,用于触发所述CU-UP获取更新的用户面加密密钥和用户面完整性保护密钥。The second sending module 150 is further configured to send second predetermined information to the CU-UP, where the second predetermined information is used to trigger the CU-UP to obtain an updated user plane encryption key and a user. Face integrity protection key.
在一些实施例中,所述第二预定信息包括:更新后的所述用户面加密密钥和用户面完整性保护密钥;或者,所述第二预定信息包括:更新后的推导密钥,其中,更新后的所述推导密钥,用于供所述CU-UP获取更新的所述用户面加密密钥和用户面完整性保护密钥。In some embodiments, the second predetermined information includes: the updated user plane encryption key and a user plane integrity protection key; or the second predetermined information includes: an updated derivation key, The updated derivation key is used by the CU-UP to obtain the updated user plane encryption key and user plane integrity protection key.
如图8所示,本实施例提供一种信息处理装置,应用于集中单元用户面CU-UP中,包括:As shown in FIG. 8, the embodiment provides an information processing apparatus, which is applied to a centralized unit user plane CU-UP, and includes:
第二接收模块210,配置为接收集中单元控制面CU-CP发送的第一预定信息;The second receiving module 210 is configured to receive the first predetermined information sent by the centralized unit control plane CU-CP;
第二确定模块220,配置为基于所述第一预定信息,确定用户面加密密钥、用户面完整性保护密钥及安全算法;其中,所述用户面加密密钥及所述完整性保护密钥,是根据所述安全算法确定的。The second determining module 220 is configured to determine, according to the first predetermined information, a user plane encryption key, a user plane integrity protection key, and a security algorithm; wherein the user plane encryption key and the integrity protection secret The key is determined according to the security algorithm.
所述第二接收模块210及所述第二确定模块220,均可为程序模块,该程序模块被处理器执行后,能够实现从CU-UP的第一预定信息的接收,同时可以确定出用户面加密密钥及用户面完整性保护密钥。The second receiving module 210 and the second determining module 220 can be program modules. After being executed by the processor, the program module can receive the first predetermined information from the CU-UP, and can determine the user. Face encryption key and user plane integrity protection key.
在一些实施例中,所述第二接收模块210,配置为接收所述CU-CP发送的所述用户面加密密钥、所述用户面完整性保护密钥、用户面加密算法的信息及用户面完整性保护算法的信息。In some embodiments, the second receiving module 210 is configured to receive the user plane encryption key, the user plane integrity protection key, the information of the user plane encryption algorithm, and the user sent by the CU-CP. Information on the face integrity protection algorithm.
在一些实施例中,所述第二接收模块210,可配置为接收所述CU-CP发送的推导密钥及用户面安全算法的信息;所述第二确定模块220,具体用于根据所述推导密钥及所述用户面安全算法,确定所述用户面加密密钥及所述用户面完整性保护密钥。In some embodiments, the second receiving module 210 is configured to receive the information of the derivation key and the user plane security algorithm sent by the CU-CP, and the second determining module 220 is specifically configured to be used according to the Deriving a key and the user plane security algorithm to determine the user plane encryption key and the user plane integrity protection key.
例如,所述第二确定模块220,配置为根据所述推导密钥及用户面加密算法,确定出所述用户面加密密钥,并根据所述推导密钥及用户面完整性保护算法确定出完整性保护密钥。For example, the second determining module 220 is configured to determine the user plane encryption key according to the derivation key and the user plane encryption algorithm, and determine according to the derivation key and the user plane integrity protection algorithm. Integrity protection key.
在一些实施例中,所述推导密钥为用户面推导密钥,其中,所述用户面推导密钥,用于确定所述用户面加密密钥及所述用户面完整性保护密钥;或者,所述推导密钥为统一推导密钥,其中,所述统一推导密钥,用于确定控制面加密密钥、控制面完整性保护密钥、所述用户面加密密钥及所述用户面完整性保护密钥。In some embodiments, the derived key is a user plane derivation key, wherein the user plane derivation key is used to determine the user plane encryption key and the user plane integrity protection key; or The derivation key is a unified derivation key, where the unified derivation key is used to determine a control plane encryption key, a control plane integrity protection key, the user plane encryption key, and the user plane. Integrity protection key.
在一些实施例中,所述第二接收模块210,还配置为接收在满足密钥更新条件时所述CU-CP发送的第二预定信息。In some embodiments, the second receiving module 210 is further configured to receive second predetermined information that is sent by the CU-CP when the key update condition is met.
所述装置还包括:第二更新模块,可用于根据所述第二预定信息,更新所述用户面加密密钥及所述用户面完整性保护密钥。The device further includes: a second update module, configured to update the user plane encryption key and the user plane integrity protection key according to the second predetermined information.
在一些实施例中,所述第二接收模块210,还配置为接收所述CU-CP在满足所述密钥更新条件时发送所述第二预定信息,其中,所述第二预定信息,携带有更新后的用户面加密密钥及用户面完整性保护密钥。In some embodiments, the second receiving module 210 is further configured to receive, by the CU-CP, the second predetermined information when the key update condition is met, where the second predetermined information is carried There is an updated user plane encryption key and user plane integrity protection key.
在一些实施例中,所述第二接收模块210,配置为接收在满足密钥更新条件时所述CU-CP发送的携带有更新后的推导密钥的所述第二预定信息;所述第二更新模块,具体用于根据所述更新后的推导密钥及用户面安全算法,重新确定所述用户面加密密钥及所述用户面完整性保护密钥。In some embodiments, the second receiving module 210 is configured to receive the second predetermined information that is sent by the CU-CP and that carries the updated derivation key when the key update condition is met; The second update module is specifically configured to re-determine the user plane encryption key and the user plane integrity protection key according to the updated derivation key and the user plane security algorithm.
如图9所示,本实施例提供一种网络实体,包括:收发器310、存储器320、处理器330及存储在存储器320上并由处理器330执行的计算机程序;As shown in FIG. 9, the embodiment provides a network entity, including: a transceiver 310, a memory 320, a processor 330, and a computer program stored on the memory 320 and executed by the processor 330;
所述处理器330,分别与收发器310及存储器320连接,用于通过执行所述计算机程序实现前述一个或多个技术方案中应用于CU-CP提供的信息处理方法,或前述一个或多个技术方案中应用于CU-UP提供的信息处理方法,例如图2至图6所示的方法。The processor 330 is connected to the transceiver 310 and the memory 320, respectively, for implementing the information processing method applied to the CU-CP provided in the foregoing one or more technical solutions by executing the computer program, or one or more of the foregoing one or more The technical solution is applied to an information processing method provided by the CU-UP, such as the methods shown in FIGS. 2 to 6.
所述收发器310可为移动天线。The transceiver 310 can be a mobile antenna.
所述存储器320可为通信设备中包括存储介质的存储器件,可为随机存储器、只读存储器、存储硬盘等。The memory 320 may be a storage device including a storage medium in the communication device, and may be a random access memory, a read only memory, a storage hard disk, or the like.
所述处理器330可为各种类型的处理器,中央处理器、微处理器、应用处理器、可编程阵列或专用集成电路等。The processor 330 can be various types of processors, a central processing unit, a microprocessor, an application processor, a programmable array, or an application specific integrated circuit.
所述通信设备可为前述的终端或前述的CU-CP或CU-UP。The communication device may be the aforementioned terminal or the aforementioned CU-CP or CU-UP.
本实施例提供一种计算机存储介质,所述计算机存储介质存储有计算机程序;所述计算机程序被执行后,能够前述一个或多个技术方案中应用 于CU-CP提供的信息处理方法,或前述一个或多个技术方案中应用于CU-UP提供的信息处理方法,例如图2至图6所示的方法。The embodiment provides a computer storage medium, where the computer storage medium stores a computer program; after the computer program is executed, the information processing method provided by the CU-CP can be applied to the one or more technical solutions, or the foregoing The information processing method provided by the CU-UP is applied to one or more technical solutions, such as the methods shown in FIGS. 2 to 6.
以下结合上述任意实施例提供几个具体示例:Several specific examples are provided below in connection with any of the above embodiments:
示例1:Example 1:
本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:This example provides a key determining method for information interaction between a UE and a CU, which may include:
CU-CP根据KASME导出KgNB,在一些情况下,也可以直接从核心网接收KgNB;此处的所述KASME可为前述的根密钥;所述KgNB可为前述的推导密钥;The CU-CP derives the KgNB according to the KASME. In some cases, the KgNB may also be directly received from the core network; the KASME here may be the foregoing root key; the KgNB may be the foregoing derivation key;
CU-CP根据配置的加密算法和完整性保护算法列表从核心网接收的UE安全能力中选择加密和完整性保护算法。根据KgNB导出KRRCint、KRRCenc和KUPenc、KUPint,所述KRRCint为RRC信令的完整性保护密钥;所述KRRCenc为前述的控制面加密密钥,可用于RRC信令的加密密钥;所述KUPenc为用户面加密密钥;所述KUPint为用户面完整性保护密钥。The CU-CP selects an encryption and integrity protection algorithm from the UE security capabilities received by the core network according to the configured encryption algorithm and integrity protection algorithm list. Deriving KRRCint, KRRCenc and KUPenc, KUPint according to KgNB, the KRRCint is an integrity protection key of RRC signaling; the KRRCenc is the foregoing control plane encryption key, an encryption key usable for RRC signaling; the KUPenc The key is encrypted for the user plane; the KUPint is a user plane integrity protection key.
CU-CP将KUPenc、KUPint、用户面加密算法的信息和用户面完整性保护算法的信息发送给CU-UP;The CU-CP sends the information of the KUPenc, the KUPint, the user plane encryption algorithm, and the information of the user plane integrity protection algorithm to the CU-UP;
CU-CP与UE交互控制面加密算法、控制面完整性保护算法、用户面加密算法及用户面完整性保护算法。CU-CP and UE interactive control plane encryption algorithm, control plane integrity protection algorithm, user plane encryption algorithm and user plane integrity protection algorithm.
至此,UE和CU-CP以及CU-UP完全同步了安全机制。At this point, the UE and the CU-CP and the CU-UP are fully synchronized with the security mechanism.
示例2:Example 2:
本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:This example provides a key determining method for information interaction between a UE and a CU, which may include:
CU-CP根据KASME导出KgNB;在一些情况下,也可以直接从核心网接收KgNB;CU-CP derives KgNB according to KASME; in some cases, it can also receive KgNB directly from the core network;
CU-CP根据CU配置的加密算法和完整性保护算法列表,并结合从核心网接收的UE安全能力信息中,选择CU及UE均支持的加密算法和 完整性保护算法,并根据KgNB导出KRRCint、KRRCenc。The CU-CP selects an encryption algorithm and an integrity protection algorithm supported by the CU and the UE according to the encryption algorithm and the integrity protection algorithm list configured by the CU, and combines the UE security capability information received from the core network, and derives the KRRCint according to the KgNB. KRRCenc.
CU-CP将KgNB以及加密算法的信息和完整性保护算法的信息发送给CU-UP;The CU-CP sends the information of the KgNB and the encryption algorithm and the information of the integrity protection algorithm to the CU-UP;
CU-UP根据KgNB导出用户面密钥KUPenc、KUPintCU-UP exports user plane keys KUPenc, KUPint according to KgNB
CU-CP与UE交互控制面加密算法、控制面完整性保护算法、用户面加密算法及用户面完整性保护算法。CU-CP and UE interactive control plane encryption algorithm, control plane integrity protection algorithm, user plane encryption algorithm and user plane integrity protection algorithm.
示例3:Example 3:
考虑到CU-CP和CU-UP属于不同的逻辑节点,物理上部署可能在不同的位置,甚至在不同的传输环上,因此在CU-CP和CU-UP上如方案2直接传输用户面加密密钥安全性可能会有问题,因此CU-CP和CU-UP具有独立的KgNB也是一种可选方案。Considering that the CU-CP and the CU-UP belong to different logical nodes, the physical deployment may be in different locations or even on different transmission rings. Therefore, the user plane encryption is directly transmitted on the CU-CP and the CU-UP as in the scheme 2. Key security can be problematic, so CU-CP and CU-UP with separate KgNB are also an option.
本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:This example provides a key determining method for information interaction between a UE and a CU, which may include:
CU-CP接收核心网根据KASME导出KgNB_CP和KgNB_UP,其中,所述KgNB_CP为控制面推导密钥;所述KgNB_UP为用户面推导密钥。The CU-CP receiving core network derives KgNB_CP and KgNB_UP according to KASME, wherein the KgNB_CP is a control plane derivation key; and the KgNB_UP is a user plane derivation key.
根据CU配置的加密和完整性保护算法列表,并结合从核心网接收的UE安全能力信息,选择出UE及CU均支持加密算法和完整性保护算法;CU-CP根据KgNB_CP导出KRRCint、KRRCenc。According to the encryption and integrity protection algorithm list configured by the CU, combined with the UE security capability information received from the core network, the UE and the CU are selected to support the encryption algorithm and the integrity protection algorithm; the CU-CP derives KRRCint and KRRCenc according to the KgNB_CP.
CU-CP将KgNB_UP以及加密算法的信息及完整性保护算法的信息发送给CU-UP;The CU-CP sends the information of the KgNB_UP and the encryption algorithm and the information of the integrity protection algorithm to the CU-UP;
CU-UP根据KgNB_UP导出用户面加密密钥KUPenc及KUPint;CU-UP derives user plane encryption keys KUPenc and KUPint according to KgNB_UP;
CU-CP与UE交互控制面加密算法和完整性保护算法以及用户面加密和完整性保护算法;CU-CP and UE interaction control plane encryption algorithm and integrity protection algorithm and user plane encryption and integrity protection algorithm;
CU-CP与UE交互控制面加密算法、控制面完整性保护算法、用户面加密算法及用户面完整性保护算法。CU-CP and UE interactive control plane encryption algorithm, control plane integrity protection algorithm, user plane encryption algorithm and user plane integrity protection algorithm.
示例4:Example 4:
如图10所示,本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:As shown in FIG. 10, this example provides a key determining method for information interaction between a UE and a CU, which may include:
UE向DU发送无线资源控制连接请求(RRC connection Request);The UE sends a radio resource control connection request (RRC connection request) to the DU;
DU向CU-CP发送上行链路无线资源控制传输初始化消息(Initial Uplink RRC Transfer);The DU sends an uplink radio resource control initialization message (Initial Uplink RRC Transfer) to the CU-CP;
CU-CP向DU发送下行链路无线资源控制传输信息(Downlink RRC Transfer);The CU-CP sends downlink radio resource control transmission information (Downlink RRC Transfer) to the DU;
DU向UE发送RRC连接建立(connection Setup)消息;The DU sends an RRC connection setup message to the UE;
UE向DU发送的RRC连接建立完成消息;An RRC connection setup complete message sent by the UE to the DU;
DU向CU-CP发送UL RRC传输消息;The DU sends a UL RRC transmission message to the CU-CP;
执行非接入层(Non Access Stratrum,NAS)安全机制激活;执行所述NAS安全机制激活包括:CU接收到UE的附着请求之后,向核心网,例如,下一代核心网(Next Generation Core,NGC)发送鉴权请求(Authentication Request);在接收到核心网基于所述鉴权请求返回的鉴权响应,向用户发送用户鉴权请求,并接收用户基于用户鉴权请求返回的用户鉴权响应;Performing a non-access stratum (Non Access Stratrum, NAS) security mechanism activation; performing the NAS security mechanism activation includes: after receiving the UE attach request, the CU sends a core network, for example, a Next Generation Core (NGC) Sending an authentication request (receiving request); receiving an authentication response returned by the core network based on the authentication request, sending a user authentication request to the user, and receiving a user authentication response returned by the user based on the user authentication request;
CU-CP根据KASME导出KgNB;CU-CP derives KgNB according to KASME;
CU-CP根据CU配置的加密和完整性保护算法列表,并结合从核心网接收的UE安全能力信息中,选择CU及UE均支持的加密算法和完整性保护算法,并根据KgNB导出KRRCint、KRRCenc、KUPint及KUPenc;The CU-CP selects an encryption algorithm and an integrity protection algorithm supported by the CU and the UE according to the encryption and integrity protection algorithm list configured by the CU, and combines the UE security capability information received from the core network, and derives KRRCint and KRRCenc according to KgNB. , KUPint and KUPenc;
CU-CP向DU发送DL RRC传输消息,该消息携带有选择出的加密算法及完整性保护算法的信息。The CU-CP sends a DL RRC transmission message to the DU, the message carrying information of the selected encryption algorithm and integrity protection algorithm.
DU向发送AS SMS消息,携带有加密算法和完整性保护算法的信息,用于告知UE当前选择出的加密算法及完整性保护算法的算法信息; 该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法及控制面安全算法的信息。The DU sends an AS SMS message carrying the information of the encryption algorithm and the integrity protection algorithm, and is used to inform the UE of the currently selected encryption algorithm and the algorithm information of the integrity protection algorithm. The algorithm information may include: the version number and algorithm of the algorithm. The number or name indicates information about the user plane security algorithm and the control plane security algorithm.
CU-CP向DU发送UE上下文建立请求(Context Setup Request);The CU-CP sends a UE context setup request to the DU (Context Setup Request);
接收DU向CU-CP返回的UE上下文建立相应(Context Setup Response);Receiving a UE context corresponding to the return of the UE to the CU-CP (Context Setup Response);
CU-CP向CU-UP发送承载建立请求,该请求携带有KUPint及KUPenc及用户面安全算法的算法信息;该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法的信息;The CU-CP sends a bearer setup request to the CU-UP, where the request carries the algorithm information of the KUPint and KUPenc and the user plane security algorithm; the algorithm information may include: the version number of the algorithm, the number or name of the algorithm, and the like, and the user plane security algorithm is indicated. Information;
CU-CP接收CU-UP返回的承载建立请求回复;The CU-CP receives the bearer setup request response returned by the CU-UP;
DU接收UE发送的AS SMC完成消息;The DU receives the AS SMC complete message sent by the UE.
接收DU向CU-CP发送的UL RRC传输消息;Receiving a UL RRC transmission message sent by the DU to the CU-CP;
DU接收CU-CP发送的DL RRC传输消息;The DU receives the DL RRC transmission message sent by the CU-CP;
DU向UE发送RRC配置消息;The DU sends an RRC configuration message to the UE;
DU接收UE发送的RRC配置完整消息;Receiving, by the DU, an RRC configuration complete message sent by the UE;
DU向CU-CP发送UL RRC传输消息;The DU sends a UL RRC transmission message to the CU-CP;
进行分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)计数值翻转需要更新KgNB。在示例中,PDCP计数值翻转表示用户面加密密钥、用户面完整性保护密钥、控制面加密密钥及控制面完整性保护密钥的至少其中之一达到最大使用值(即达到有效使用次数)即达到了密钥更新条件。Performing Packet Data Convergence Protocol (PDCP) count value flipping requires updating KgNB. In an example, the PDCP count value flip indicates that at least one of the user plane encryption key, the user plane integrity protection key, the control plane encryption key, and the control plane integrity protection key reaches a maximum usage value (ie, achieves effective use) The number of times) has reached the key update condition.
CU-CP接收承载更新请求,该用户面承载更新请求可包括:用户面密钥更新请求,用户面密钥可包括:用户面加密密钥及用户面完整性保护密钥;The CU-CP receives the bearer update request, and the user plane bearer update request may include: a user plane key update request, where the user plane key may include: a user plane encryption key and a user plane integrity protection key;
CU-CP更新KgNB,基于更新的KgNB更新KRRCint、KRRCenc、KUPint及KUPenc;CU-CP updates KgNB, updates KRRCint, KRRCenc, KUPint and KUPenc based on updated KgNB;
CU-CP向CU-UP发送承载修改回复,该回复可包括更新后的用户面密钥,例如,KUPint及KUPenc;The CU-CP sends a bearer modification reply to the CU-UP, and the reply may include an updated user plane key, for example, KUPint and KUPenc;
CU-CP进行DL RRC传输;CU-CP performs DL RRC transmission;
DU向UE发送RRC重配置,包括KgNB-UP更新通知及更新使用参数,以触发UE同步进行用户面密钥和/或控制面密钥的更新。The DU sends an RRC reconfiguration to the UE, including a KgNB-UP update notification and an update usage parameter, to trigger the UE to synchronize the update of the user plane key and/or the control plane key.
示例5:Example 5:
如图11所示,本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:As shown in FIG. 11, the example provides a key determining method for information interaction between a UE and a CU, which may include:
UE向DU发送无线资源控制连接请求(RRC connection Request);The UE sends a radio resource control connection request (RRC connection request) to the DU;
DU向CU-CP发送上行链路无线资源控制传输初始化消息(Initial Uplink RRC Transfer);The DU sends an uplink radio resource control initialization message (Initial Uplink RRC Transfer) to the CU-CP;
CU-CP向DU发送下行链路无线资源控制传输信息(Downlink RRC Transfer);The CU-CP sends downlink radio resource control transmission information (Downlink RRC Transfer) to the DU;
DU向UE发送RRC连接建立(connection Setup)消息;The DU sends an RRC connection setup message to the UE;
UE向DU发送的RRC连接建立完成消息;An RRC connection setup complete message sent by the UE to the DU;
DU向CU-CP发送UL RRC传输消息;The DU sends a UL RRC transmission message to the CU-CP;
执行非接入层(Non Access Stratrum,NAS)安全机制激活;执行所述NAS安全机制激活包括:CU接收到UE的附着请求之后,向核心网,例如,下一代核心网(Next Generation Core,NGC)发送鉴权请求(Authentication Request);在接收到核心网基于所述鉴权请求返回的鉴权响应,向用户发送用户鉴权请求,并接收用户基于用户鉴权请求返回的用户鉴权响应。Performing a non-access stratum (Non Access Stratrum, NAS) security mechanism activation; performing the NAS security mechanism activation includes: after receiving the UE attach request, the CU sends a core network, for example, a Next Generation Core (NGC) Sending an authentication request (receiving request); receiving an authentication response returned by the core network based on the authentication request, sending a user authentication request to the user, and receiving a user authentication response returned by the user based on the user authentication request.
CU-CP根据KASME导出KgNB;CU-CP derives KgNB according to KASME;
CU-CP根据CU配置的加密和完整性保护算法列表,并结合从核心网接收的UE安全能力信息中,选择CU及UE均支持的加密算法和完整 性保护算法;并根据KgNB导出KRRCint、KRRCenc;The CU-CP selects an encryption algorithm and an integrity protection algorithm supported by the CU and the UE according to the encryption and integrity protection algorithm list configured by the CU, and combines the UE security capability information received from the core network, and derives KRRCint and KRRCenc according to the KgNB. ;
CU-CP向DU发送DL RRC传输消息,该消息携带有选择出的加密算法及完整性保护算法的信息;The CU-CP sends a DL RRC transmission message to the DU, where the message carries the information of the selected encryption algorithm and the integrity protection algorithm;
DU向发送AS SMS消息,携带有加密算法和完整性保护算法的信息,用于告知UE当前选择出的加密算法及完整性保护算法的算法信息;该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法及控制面安全算法的信息。The DU sends an AS SMS message, which carries the information of the encryption algorithm and the integrity protection algorithm, and is used to inform the UE of the currently selected encryption algorithm and the algorithm information of the integrity protection algorithm. The algorithm information may include: the version number and algorithm of the algorithm. The number or name indicates information about the user plane security algorithm and the control plane security algorithm.
CU-CP向DU发送UE上下文建立请求(Context Setup Request);The CU-CP sends a UE context setup request to the DU (Context Setup Request);
接收DU向CU-CP返回的UE上下文建立相应(Context Setup Response);Receiving a UE context corresponding to the return of the UE to the CU-CP (Context Setup Response);
CU-CP向CU-UP发送承载建立请求,该请求携带有KgNB及用户面安全算法的算法信息;该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法的信息。The CU-CP sends a bearer setup request to the CU-UP, where the request carries the algorithm information of the KgNB and the user plane security algorithm; the algorithm information may include: the version number of the algorithm, the number or name of the algorithm, and the like, the information indicating the user plane security algorithm. .
CU-UP根据KgNB及用户面安全算法推导出KUPint及KUPenc。CU-UP derives KUPint and KUPenc based on KgNB and user plane security algorithms.
当密钥使用达到一定条件之后,需要进行密钥更新,以下提供两种可选的密钥更新方式:After the key usage reaches certain conditions, a key update is required. Two optional key update methods are provided below:
方式一:method one:
CU-CP接收CU-UP返回的承载建立请求,该请求携带有密钥更新请求。The CU-CP receives a bearer setup request returned by the CU-UP, and the request carries a key update request.
CU-CP确定更新KgNB;CU-CP determines to update KgNB;
CU-CP向CU-UP发送承载修改回复,该回复包含更新后的KgNB。The CU-CP sends a bearer modification reply to the CU-UP, the reply containing the updated KgNB.
CU-UP根据更新后的KgNB计算新的KUPint和KUPenc。CU-UP calculates new KUPint and KUPenc based on the updated KgNB.
方式二:Method 2:
CU-UP确定更新KgNB;CU-UP determines to update KgNB;
CU-UP向CU-CP发送承载修改请求,该请求用于通知CU-CP KgNB 更新及更新使用的密钥参数;The CU-UP sends a bearer modification request to the CU-CP, where the request is used to notify the CU-CP KgNB to update and update the used key parameters;
CU-CP根据更新后的KgNB计算新的KRRCint、KRRCenc;CU-CP calculates new KRRCint, KRRCenc according to the updated KgNB;
CU-CP向CU-UP发送承载修改回复,该回复用于确认更新;The CU-CP sends a bearer modification reply to the CU-UP, and the reply is used to confirm the update;
CU-UP根据更新后的KgNB计算新的KUPint、KUPenc。CU-UP calculates new KUPint, KUPenc based on the updated KgNB.
CU-CP进行DL RRC传输;CU-CP performs DL RRC transmission;
DU向UE发送RRC重配置,包括KgNB-UP更新通知及更新使用参数,以触发UE同步进行用户面密钥和/或控制面密钥的更新。The DU sends an RRC reconfiguration to the UE, including a KgNB-UP update notification and an update usage parameter, to trigger the UE to synchronize the update of the user plane key and/or the control plane key.
示例6:Example 6:
如图12所示,本示例提供一种UE与CU之间进行信息交互的密钥确定方法,可包括:As shown in FIG. 12, this example provides a key determining method for information interaction between a UE and a CU, which may include:
UE向DU发送无线资源控制连接请求(RRC connection Request);The UE sends a radio resource control connection request (RRC connection request) to the DU;
DU向CU-CP发送上行链路无线资源控制传输初始化(Initial Uplink RRC Transfer消息);The DU sends an uplink radio resource control transmission initialization (Initial Uplink RRC Transfer message) to the CU-CP;
CU-CP向DU发送下行链路无线资源控制传输(Downlink RRC Transfer)信息;The CU-CP sends downlink radio resource control transmission (Downlink RRC Transfer) information to the DU;
DU向UE发送RRC连接建立(connection Setup)消息;The DU sends an RRC connection setup message to the UE;
UE向DU发送的RRC连接建立完成消息;An RRC connection setup complete message sent by the UE to the DU;
DU向CU-CP发送UL RRC传输消息;The DU sends a UL RRC transmission message to the CU-CP;
执行非接入层(Non Access Stratrum,NAS)安全机制激活;执行所述NAS安全机制激活包括:CU接收到UE的附着请求之后,向核心网,例如,下一代核心网(Next Generation Core,NGC)发送鉴权请求(Authentication Request);在接收到核心网基于所述鉴权请求返回的鉴权响应,向用户发送用户鉴权请求,并接收用户基于用户鉴权请求返回的用户鉴权响应。Performing a non-access stratum (Non Access Stratrum, NAS) security mechanism activation; performing the NAS security mechanism activation includes: after receiving the UE attach request, the CU sends a core network, for example, a Next Generation Core (NGC) Sending an authentication request (receiving request); receiving an authentication response returned by the core network based on the authentication request, sending a user authentication request to the user, and receiving a user authentication response returned by the user based on the user authentication request.
CU-CP接收核心网导出的KgNB_CP及KgNB_UP;The CU-CP receives the KgNB_CP and KgNB_UP derived from the core network;
CU-CP根据KgNB_CP导出KRRCint、KRRCenc;CU-CP derives KRRCint, KRRCenc according to KgNB_CP;
CU-CP根据CU配置的加密和完整性保护算法列表,并结合从核心网接收的UE安全能力信息中,选择CU及UE均支持的加密算法和完整性保护算法;The CU-CP selects an encryption algorithm and an integrity protection algorithm supported by the CU and the UE according to the encryption and integrity protection algorithm list configured by the CU, and the UE security capability information received from the core network;
CU-CP向DU发送DL RRC传输消息,该消息携带有选择出的加密算法及完整性保护算法的信息。The CU-CP sends a DL RRC transmission message to the DU, the message carrying information of the selected encryption algorithm and integrity protection algorithm.
DU向发送AS SMS消息,携带有加密算法和完整性保护算法的信息,用于告知UE当前选择出的加密算法及完整性保护算法的算法信息;该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法及控制面安全算法的信息。The DU sends an AS SMS message, which carries the information of the encryption algorithm and the integrity protection algorithm, and is used to inform the UE of the currently selected encryption algorithm and the algorithm information of the integrity protection algorithm. The algorithm information may include: the version number and algorithm of the algorithm. The number or name indicates information about the user plane security algorithm and the control plane security algorithm.
CU-CP向DU发送UE上下文建立请求(Context Setup Request);The CU-CP sends a UE context setup request to the DU (Context Setup Request);
接收DU向CU-CP返回的UE上下文建立相应(Context Setup Response);Receiving a UE context corresponding to the return of the UE to the CU-CP (Context Setup Response);
CU-CP向CU-UP发送承载建立请求,该请求携带有KgNB_UP及用户面安全算法的算法信息;该算法信息可包括:算法的版本号、算法的编号或名称等指示用户面安全算法的信息。The CU-CP sends a bearer setup request to the CU-UP, where the request carries the algorithm information of the KgNB_UP and the user plane security algorithm; the algorithm information may include: the version number of the algorithm, the number or name of the algorithm, and the like, the information indicating the user plane security algorithm. .
CU-UP根据KgNB_UP及用户面安全算法推导出KUPint及KUPenc;CU-UP derives KUPint and KUPenc according to KgNB_UP and user plane security algorithm;
CU-CP接收CU-UP返回的承载建立请求回复。The CU-CP receives the bearer setup request reply returned by the CU-UP.
DU接收UE发送的AS SMC完成消息;The DU receives the AS SMC complete message sent by the UE.
接收DU向CU-CP发送的UL RRC传输消息;Receiving a UL RRC transmission message sent by the DU to the CU-CP;
DU接收CU-CP发送的DL RRC传输消息;The DU receives the DL RRC transmission message sent by the CU-CP;
DU向UE发送RRC配置消息;The DU sends an RRC configuration message to the UE;
DU接收UE发送的RRC配置完整消息;Receiving, by the DU, an RRC configuration complete message sent by the UE;
DU向CU-CP发送UL RRC传输消息;The DU sends a UL RRC transmission message to the CU-CP;
进行PDCP计数值翻转需要更新KgNB_UP。在示例中,PDCP计数 值翻转表示用户面加密密钥、用户面完整性保护密钥、控制面加密密钥及控制面完整性保护密钥的至少其中之一达到最大使用值(即达到有效使用次数)即达到了密钥更新条件。It is necessary to update KgNB_UP to perform PDCP count value flipping. In an example, the PDCP count value flip indicates that at least one of the user plane encryption key, the user plane integrity protection key, the control plane encryption key, and the control plane integrity protection key reaches a maximum usage value (ie, achieves effective use) The number of times) has reached the key update condition.
CU-UP更新KgNB_UP,根据KgNB_UP更新KUPint和KUPenc;CU-UP updates KgNB_UP, updates KUPint and KUPenc according to KgNB_UP;
CU-CP接收承载修改请求,该用户面承载修改请求,用于通知CU-CP KgNB-UP更新及更新使用参数更新;The CU-CP receives the bearer modification request, and the user plane carries the modification request, and is used to notify the CU-CP KgNB-UP to update and update the usage parameter update;
CU-CP返回承载修改请求回复,确认更新。The CU-CP returns a bearer modification request reply and confirms the update.
U-CP进行DL RRC传输;U-CP performs DL RRC transmission;
DU向UE发送RRC重配置,包括KgNB-UP更新通知及更新使用参数,以触发UE同步进行用户面密钥和/或控制面密钥的更新。The DU sends an RRC reconfiguration to the UE, including a KgNB-UP update notification and an update usage parameter, to trigger the UE to synchronize the update of the user plane key and/or the control plane key.
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed. In addition, the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。The units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各实施例中的各功能单元可以全部集成在一个处理模块中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现, 也可以采用硬件加软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; The unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to the program instructions. The foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing storage device includes the following steps: the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk. A medium that can store program code.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The foregoing is only a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present application. It should be covered by the scope of protection of this application. Therefore, the scope of protection of the present application should be determined by the scope of the claims.

Claims (16)

  1. 一种信息处理处理方法,应用于集中单元控制面CU-CP中,包括:An information processing method is applied to a centralized unit control plane CU-CP, including:
    与集中单元用户面CU-UP交互安全信息。Interact security information with the centralized unit user plane CU-UP.
  2. 根据权利要求1所述的方法,其中,The method of claim 1 wherein
    所述CU-CP与集中单元用户面CU-UP交互安全信息,包括:The CU-CP and the centralized unit user plane CU-UP exchange security information, including:
    向所述CU-UP发送用户面密钥。A user plane key is sent to the CU-UP.
  3. 根据权利要求2所述的方法,其中,The method of claim 2, wherein
    所述方法还包括以下至少之一:The method also includes at least one of the following:
    所述CU-CP根据统一推导密钥,确定出所述用户面密钥;Determining, by the CU-CP, the user plane key according to the unified derivation key;
    所述CU-CP根据统一推导密钥,确定出控制面密钥;Determining, by the CU-CP, a control plane key according to the unified derivation key;
    所述CU-CP根据用户面推导密钥,确定出所述用户面密钥;Determining, by the CU-CP, the user plane key according to the user plane derivation key;
    所述CU-CP根据控制面推导密钥,确定出控制面密钥。The CU-CP derives a control key based on the control plane derivation key.
  4. 根据权利要求1所述的方法,其中,The method of claim 1 wherein
    所述与集中单元用户面CU-UP交互安全信息,包括:The interaction with the centralized unit user plane CU-UP security information includes:
    将推导密钥发送给所述CU-UP,其中,所述推导密钥,用于供所述CU-UP确定用户面密钥。Transmitting a derivation key to the CU-UP, wherein the derivation key is used by the CU-UP to determine a user plane key.
  5. 根据权利要求4所述的方法,其中,The method of claim 4, wherein
    所述推导密钥为统一推导密钥,其中,所述统一推导密钥同时用于控制面密钥和用户面密钥推导的确定;The derivation key is a unified derivation key, wherein the unified derivation key is used for determining the derivation of the control plane key and the user plane key simultaneously;
    或者,or,
    所述推导密钥为用户面推导密钥。The derivation key is a user plane derivation key.
  6. 根据权利要求1至5任一项所述的方法,其中,The method according to any one of claims 1 to 5, wherein
    所述与集中单元用户面CU-UP交互安全信息,包括:The interaction with the centralized unit user plane CU-UP security information includes:
    将选择的安全算法的信息发送给所述CU-UP。Information of the selected security algorithm is sent to the CU-UP.
  7. 根据权利要求6所述的方法,其中,The method of claim 6 wherein
    所述安全算法包括:用户面安全算法及控制面安全算法;The security algorithm includes: a user plane security algorithm and a control plane security algorithm;
    所述将选择的所述安全算法的信息发送给所述CU-UP,包括:And sending the information about the selected security algorithm to the CU-UP, including:
    将所述用户面安全算法的信息发送给所述CU-UP。Sending information of the user plane security algorithm to the CU-UP.
  8. 根据权利要求1至5任一项所述的方法,其中,The method according to any one of claims 1 to 5, wherein
    所述与集中单元用户面CU-UP交互安全信息,包括以下至少之一:The security information is exchanged with the centralized unit user plane CU-UP, including at least one of the following:
    满足预设密钥更新条件时,将更新后的推导密钥发送给所述CU-UP,其中,所述更新后的推导密钥,用于供所述CU-UP确定用户面密钥;When the preset key update condition is met, the updated derivation key is sent to the CU-UP, where the updated derivation key is used by the CU-UP to determine a user plane key;
    满足预设密钥更新条件时,将基于更新后的推导密钥确定的用户面密钥发送给所述CU-UP;When the preset key update condition is met, the user plane key determined based on the updated derivation key is sent to the CU-UP;
    接收所述CU-UP在满足密钥更新条件时发送的更新后的推导密钥及更新使用参数,其中所述更新后的推导密钥,用于更新控制面密钥,所述更新使用参数,用于供所述CU-CP发送给用户设备UE以触发所述UE更新密钥;Receiving an updated derivation key and an update usage parameter sent by the CU-UP when the key update condition is satisfied, wherein the updated derivation key is used to update a control plane key, and the update uses a parameter, Used for the CU-CP to send to the user equipment UE to trigger the UE to update the key;
    接收所述CU-UP在满足密钥更新条件时发送更新使用参数,其中,所述更新使用参数,并供所述CU-CP发送给UE以触发所述UE更新密钥。Receiving, by the CU-UP, an update usage parameter is sent when a key update condition is met, wherein the update uses a parameter and is sent by the CU-CP to the UE to trigger the UE to update the key.
  9. 一种信息处理方法,应用于集中单元用户面CU-UP中,包括:An information processing method is applied to a centralized unit user plane CU-UP, including:
    与集中单元控制面CU-CP交互安全信息。Interacting security information with the centralized unit control plane CU-CP.
  10. 根据权利要求9所述的方法,其中,The method of claim 9 wherein
    所述与集中单元控制面CU-CP交互安全信息,包括以下至少之一:The interaction with the centralized unit control plane CU-CP security information includes at least one of the following:
    接收所述CU-CP发送的用户面密钥;Receiving a user plane key sent by the CU-CP;
    接收所述CU-CP发送的推导密钥,其中,所述推导密钥,用于所述CU-CP确定用户面密钥。Receiving, by the CU-CP, a derivation key, wherein the derivation key is used by the CU-CP to determine a user plane key.
  11. 根据权利要求9所述的方法,其中,The method of claim 9 wherein
    所述与集中单元控制面CU-CP交互安全信息,还包括:The interaction with the centralized unit control plane CU-CP security information further includes:
    接收所述CU-CP发送的安全算法的信息。Receiving information of a security algorithm sent by the CU-CP.
  12. 根据权利要求9所述的方法,其中,The method of claim 9 wherein
    所述与集中单元控制面CU-CP交互安全信息,还包括以下至少之一:The interaction with the centralized unit control plane CU-CP security information further includes at least one of the following:
    接收所述CU-CP发送的更新后的用户面密钥;Receiving an updated user plane key sent by the CU-CP;
    接收所述CU-CP发送的更新后的推导密钥,其中,更新后的推导密钥,用于供CU-UP更新用户面密钥;Receiving, by the CU-CP, an updated derivation key, where the updated derivation key is used for the CU-UP to update the user plane key;
    在满足密钥更新条件时,向所述CU-CP发送更新后的推导密钥及更新使用参数,其中,更新后的推导密钥,用于所述CU-CP更新控制面密钥;所述更新使用参数,用于供CU-CP发送给用户设备UE以触发所述UE更新密钥;Sending the updated derivation key and updating the usage parameter to the CU-CP when the key update condition is met, wherein the updated derivation key is used for the CU-CP to update the control plane key; Updating the usage parameter, used by the CU-CP to send to the user equipment UE to trigger the UE to update the key;
    在满足密钥更新条件时,向所述CU-CP发送更新使用参数,其中,更新使用参数,并供所述CU-CP发送给UE以触发所述UE更新密钥。When the key update condition is met, an update usage parameter is sent to the CU-CP, wherein the usage parameter is updated and sent by the CU-CP to the UE to trigger the UE to update the key.
  13. 一种信息处理装置,其中,应用于集中单元控制面CU-CP中,包括:An information processing apparatus, wherein the application to the centralized unit control plane CU-CP includes:
    第一交互模块,配置为与集中单元用户面CU-UP交互安全信息。The first interaction module is configured to exchange security information with the centralized unit user plane CU-UP.
  14. 一种信息处理装置,其中,应用于集中单元用户面CU-UP中,包括:An information processing apparatus, wherein the application is applied to a centralized unit user plane CU-UP, including:
    第二交互模块,配置为与集中单元用户面CU-CP交互安全信息。The second interaction module is configured to exchange security information with the centralized unit user plane CU-CP.
  15. 一种网络实体,包括:收发器、存储器、处理器及存储在存储器上并由处理器执行的计算机程序;A network entity comprising: a transceiver, a memory, a processor, and a computer program stored on the memory and executed by the processor;
    所述处理器,分别与收发器及存储器连接,用于通过执行所述计算机程序实现权利要求1至8任一项提供的信息处理方法,或权利要求9至12任一项提供的信息处理方法。The processor is connected to a transceiver and a memory, respectively, for implementing the information processing method provided by any one of claims 1 to 8 by executing the computer program, or the information processing method provided by any one of claims 9 to 12. .
  16. 一种计算机存储介质,所述计算机存储介质存储有计算机程序;所述计算机程序被执行后,能够实现权利要求1至8任一项提供的信息处 理方法,或权利要求9至12任一项提供的信息处理方法。A computer storage medium storing a computer program; after the computer program is executed, the information processing method according to any one of claims 1 to 8 can be implemented, or the method of any one of claims 9 to 12 is provided Information processing method.
PCT/CN2018/119636 2018-01-12 2018-12-06 Information processing method and device, network entity and storage medium WO2019137121A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810031115.5A CN110035431A (en) 2018-01-12 2018-01-12 Information processing method and device, network entity and storage medium
CN201810031115.5 2018-01-12

Publications (1)

Publication Number Publication Date
WO2019137121A1 true WO2019137121A1 (en) 2019-07-18

Family

ID=67219279

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/119636 WO2019137121A1 (en) 2018-01-12 2018-12-06 Information processing method and device, network entity and storage medium

Country Status (2)

Country Link
CN (1) CN110035431A (en)
WO (1) WO2019137121A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795024A (en) * 2020-05-26 2021-12-14 华为技术有限公司 Method and device for obtaining secret key

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399422B (en) * 2019-08-16 2022-08-05 大唐移动通信设备有限公司 Security algorithm configuration method, control plane central node and terminal
WO2021127896A1 (en) * 2019-12-23 2021-07-01 华为技术有限公司 Communication method and communication apparatus
CN113381966B (en) * 2020-03-09 2023-09-26 维沃移动通信有限公司 Information reporting method, information receiving method, terminal and network side equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375989A (en) * 2015-07-20 2017-02-01 中兴通讯股份有限公司 Method for realizing access layer security, user equipment, and small radio access network node
WO2017121482A1 (en) * 2016-01-14 2017-07-20 Telefonaktiebolaget Lm Ericsson (Publ) Methods, nodes and communication device for establishing a key related to at least two network instances
CN107079023A (en) * 2014-10-29 2017-08-18 高通股份有限公司 User plane safety for next generation cellular network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079023A (en) * 2014-10-29 2017-08-18 高通股份有限公司 User plane safety for next generation cellular network
CN106375989A (en) * 2015-07-20 2017-02-01 中兴通讯股份有限公司 Method for realizing access layer security, user equipment, and small radio access network node
WO2017121482A1 (en) * 2016-01-14 2017-07-20 Telefonaktiebolaget Lm Ericsson (Publ) Methods, nodes and communication device for establishing a key related to at least two network instances

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL., R3-174971, TPS ON SECURITY HANDLING FOR CP-UP SEPARATION, 3GPP TSG- RAN3 MEETING #98, 3 December 2017 (2017-12-03), pages 1 - 2, XP051373662, Retrieved from the Internet <URL:http://www.3gpp.orglftp/tsg%5Fran/WG3%5FlufISGR3%5F98/Docsl> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795024A (en) * 2020-05-26 2021-12-14 华为技术有限公司 Method and device for obtaining secret key

Also Published As

Publication number Publication date
CN110035431A (en) 2019-07-19

Similar Documents

Publication Publication Date Title
US11075749B2 (en) Method and arrangement in a telecommunication system
JP7100115B2 (en) Security implementation methods, related devices and systems
CN108781366B (en) Authentication mechanism for 5G technology
CN109362108B (en) A kind of methods, devices and systems of safeguard protection
KR102358918B1 (en) Method and device for managing a security according to a service in a wireless communication system
EP2421292B1 (en) Method and device for establishing security mechanism of air interface link
WO2019137121A1 (en) Information processing method and device, network entity and storage medium
CN104737570B (en) The method and apparatus for generating the key communicated to equipment for the equipment between the first user equipment and second user equipment
US20170359719A1 (en) Key generation method, device, and system
WO2019004929A2 (en) Network slice allocation method, device and system
US20200228977A1 (en) Parameter Protection Method And Device, And System
JP5859956B2 (en) Key generation method and system in switching process
CN101841810B (en) The update method of air interface key, core net node and wireless access system
KR20180057665A (en) Access method, device and system for user equipment (UE)
CN113543126B (en) Key obtaining method and device
WO2009097789A1 (en) Method and communication system for establishing security association
CN102056157A (en) Method, system and device for determining keys and ciphertexts
WO2012171281A1 (en) Security parameter modification method and base station
WO2010028603A1 (en) Key generation method and system when a tracking area is updated
WO2013143387A1 (en) Method, system, and device for configuration transmission and data transmission
CN103139771A (en) Key generation method and system in switching process
WO2017128306A1 (en) Communication method and equipment
JP6167229B2 (en) Method for selecting air interface security algorithm in wireless communication system and MME
WO2022237561A1 (en) Communication method and apparatus
WO2020173451A1 (en) Method, device, and storage medium for implementing forward security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18900282

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/10/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18900282

Country of ref document: EP

Kind code of ref document: A1