WO2020038236A1 - Routing method, apparatus and system - Google Patents

Routing method, apparatus and system Download PDF

Info

Publication number
WO2020038236A1
WO2020038236A1 PCT/CN2019/099792 CN2019099792W WO2020038236A1 WO 2020038236 A1 WO2020038236 A1 WO 2020038236A1 CN 2019099792 W CN2019099792 W CN 2019099792W WO 2020038236 A1 WO2020038236 A1 WO 2020038236A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
message
udm
ausf
request message
Prior art date
Application number
PCT/CN2019/099792
Other languages
French (fr)
Chinese (zh)
Inventor
李华
张博
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201811289488.9A external-priority patent/CN110858992A/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP19851158.6A priority Critical patent/EP3709692A4/en
Publication of WO2020038236A1 publication Critical patent/WO2020038236A1/en
Priority to US16/898,326 priority patent/US11974132B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a routing method, device, and system.
  • the network and the terminal need to perform two-way authentication, that is, the network needs to verify the legitimacy of the terminal, and the terminal also needs to verify the security of the network.
  • LTE Long Term Evolution
  • IMSI International Mobile Subscriber Identifier
  • an encrypted user concealed identifier (SUCI) is used instead of the unencrypted User Permanent Identifier (SUPI) or IMSI.
  • SUCI Unencrypted User Permanent Identifier
  • the terminal accesses the network for authentication, it needs to address the user's home unified data management (UDM) network element, and obtain the authentication vector from the UDM to which the user belongs.
  • UDM home unified data management
  • the terminal sends an authentication request to the network device, and carries the SUCI in the authentication request.
  • the SUCI includes a routing indicator (RI), which is used to address the UDM to which the user belongs.
  • the embodiments of the present application provide a routing method, device, and system that can change the RI information in SUCI to more flexibly address the UDM to which the user belongs, and adapt to the rich service requirements of 5G.
  • an embodiment of the present application provides a routing method that can be applied to AUSF or a chip in AUSF.
  • the method includes: an authentication server function AUSF network element sends a first authentication to a first unified data management UDM network element Weight vector acquisition request; if the AUSF network element receives the routing indication RI sent by the first UDM network element, it sends the RI to the access and mobility management function AMF network element.
  • the AUSF sends a first authentication vector acquisition request to the first UDM, and if the AUSF receives the RI sent by the first UDM, it sends the RI to the AMF. Subsequently, the AMF of the management terminal sends the RI to the terminal, so that the terminal can update its own RI, so that the terminal can address the correct UDM when it enters the network for authentication.
  • the AUSF network element may further perform the following steps:
  • the AUSF network element If the AUSF network element receives the redirect message sent by the first UDM network element, the AUSF network element sends a second authentication vector acquisition request to the second UDM network element according to the redirect message; the AUSF network element receives the second UDM network element and sends it. RI; and the AUSF network element sends the RI to the AMF network element.
  • the AUSF network element performs the following steps:
  • the AUSF network element determines the integrity verification code of the RI according to the integrity protection key and the RI; the AUSF network element sends the integrity verification code to the AMF network element.
  • the AUSF may generate an RI integrity verification code based on a preset policy of the AUSF.
  • the preset policy includes, but is not limited to, receiving the RI issued by the UDM network element.
  • the AUSF network element may also generate an RI integrity verification code after receiving the integrity protection request message sent by the UDM network element.
  • the AUSF network element receives the first UDM network element or the second UDM network element.
  • An integrity protection request message, and an RI integrity verification code is generated under the trigger of the integrity protection request message, where the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI.
  • an embodiment of the present application provides a routing method.
  • the method may be applied to a UDM or a chip in the UDM.
  • the method includes:
  • the first unified data management UDM network element receives a first authentication vector acquisition request sent by the authentication server function AUSF network element; in response to the first authentication vector acquisition request, the first UDM network element sends a redirect message or route to the AUSF network element Indicate RI.
  • the case where the first UDM sends the RI to the AUSF specifically refers to: when the first UDM network element is a UDM network element to which the user belongs, the first UDM network element sends the RI to the AUSF network element.
  • the case where the first UDM sends a redirect message to the AUSF specifically refers to: when the first UDM network element is not a UDM network element to which the user belongs, the first UDM network element sends the AUSF network element Send a redirect message.
  • the first UDM instructs the AUSF to generate an integrity verification code for the RI in the process of the terminal requesting user data.
  • the first UDM network element receives a user data acquisition request message sent by the AMF network element;
  • the first UDM network element sends an integrity protection request message to the AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate an integrity verification code for the RI.
  • the first UDM network element after the first UDM network element sends an integrity protection request message to the AUSF network element, the first UDM network element receives the integrity verification code sent by the AUSF network element.
  • the AUSF after receiving the integrity protection request message sent by the first UDM, the AUSF directly sends the RI integrity verification to the first UDM. Or, if after receiving the integrity protection request message sent by the first UDM, the AUSF finds that it has not yet generated an RI integrity verification code, it generates an RI integrity verification code at this time and sends it to the first UDM Generated RI integrity verification code.
  • the sending of the RI to the AUSF network element by the first UDM network element includes: sending, by the first UDM network element, the RI protected by the integrity verification code to the AUSF network element.
  • an embodiment of the present application provides a routing method, which can be applied to a terminal or a chip in the terminal.
  • the method includes:
  • the terminal receives the routing indication RI sent by the access and mobility management function AMF network element, and uses the RI to update the user's hidden identification SUCI information.
  • the terminal can receive the updated RI issued by the network side and update the SUCI information stored in itself. Subsequently, the terminal can use the RI included in the updated SUCI to address the user's home UDM.
  • the integrity verification code is used to perform integrity verification on the RI.
  • the terminal uses the RI to update the SUCI information, which can be specifically implemented as follows: if the integrity verification of the RI is successful, the terminal uses the RI to update the SUCI information.
  • the terminal receiving the RI sent by the AMF may be specifically implemented as follows:
  • the terminal receives the non-access layer security mode command NAS SMC message sent by the AMF, and the NAS SMC message carries the RI.
  • the AMF can perform integrity protection on the RI carried in the NAS SMC message based on the integrity protection mechanism of the SMC.
  • an embodiment of the present application provides a routing method, which is applied to a UDM or a UDM chip.
  • the method includes: when a unified data management UDM network element to which a user belongs changes from a first UDM to a second UDM, The first UDM network element sends a routing indication RI to the access and mobility management function AMF network element.
  • the RI sent by the first UDM to the AMF is the RI corresponding to the second UDM.
  • the first UDM can directly update the updated user to the RI corresponding to the UDM (that is, the second UDM) It is sent to the AMF, which saves the intermediate signaling process and reduces network resource overhead.
  • the first UDM may perform the following steps: the first UDM network element sends an integrity protection request message to the AUSF network element, and the integrity protection request The message is used to instruct the AUSF to generate an integrity verification code for the RI; the first UDM network element receives the integrity verification code of the RI sent by the AUSF network element; the first UDM sends the integrity verification code to the AMF network element.
  • an embodiment of the present application provides a routing method.
  • the method is applied to an AUSF or an AUSF chip.
  • the method includes:
  • Authentication server function AUSF network element receives the integrity protection request message sent by the first unified data management UDM network element, the integrity protection request message carries the routing instruction RI; the AUSF network element generates the integrity verification of the RI according to the integrity protection key and the RI Code; the AUSF network element sends an integrity verification code to the first UDM network element.
  • an embodiment of the present application provides a routing method, which is applied to a terminal or a chip of the terminal.
  • the method includes: the terminal receives a routing instruction RI sent by an access and mobility management function AMF network element; the terminal uses the RI Update the user hidden information SUCI.
  • the terminal uses the integrity verification code to perform integrity verification on the RI.
  • the terminal uses the RI to update the SUCI information.
  • the specific implementation is: if the integrity verification of the RI is successful, the terminal uses the RI to update the SUCI information.
  • the terminal can deregister the relevant information in the first UDM and re-register to the second UDM.
  • the terminal initiates re-registration. If the terminal learns its own storage, If the RI of the RI changes, the terminal registers with the second UDM indicated by the RI.
  • the AMF initiates re-registration. Specifically, the AMF sends a deregistration request message to the terminal, and the reason value carried in the deregistration request message indicates that the RI is changed. After receiving the deregistration request message, the terminal registers with the second UDM indicated by the RI.
  • an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver.
  • the transceiver is configured to send a first authentication vector acquisition request to the first unified data management UDM network element; if the AUSF network element receives the routing instruction RI sent by the first UDM network element, it sends the access and mobility management Function AMF network element sends RI.
  • the transceiver is further configured to: if a redirect message sent by the first UDM network element is received, send a second authentication vector acquisition request to the second UDM network element according to the redirect message; RIs sent by two UDM network elements; and RIs sent to AMF network elements.
  • the processor is configured to determine the integrity verification code of the RI according to the integrity protection key and the RI; the transceiver is further configured to send the integrity verification code to the AMF network element.
  • the transceiver is further configured to receive an integrity protection request message sent by the first UDM network element or the second UDM network element, and the integrity protection request message is used to instruct the AUSF to generate an integrity verification for the RI code.
  • an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver.
  • the transceiver is configured to receive a first authentication vector acquisition request sent by an authentication server function AUSF network element; and in response to the first authentication vector acquisition request, send a redirect message or a routing instruction RI to the AUSF network element.
  • the transceiver is configured to send the RI to the AUSF network element, including: when the first UDM network element is a UDM network element to which the user belongs, send the RI to the AUSF network element.
  • the transceiver is configured to send a redirection message to the AUSF network element, and includes: when the first UDM network element is not a UDM network element to which the user belongs, sending a redirection message to the AUSF network element.
  • the transceiver is further configured to receive a user data acquisition request message sent by the AMF network element; send an integrity protection request message to the AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate RI integrity verification code.
  • the transceiver is further configured to send an integrity protection request message to the AUSF network element; receive the integrity verification code sent by the AUSF network element; the transceiver is configured to send the RI to the AUSF network element, including: It is used to send the RI protected by the integrity verification code to the AUSF network element.
  • an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver.
  • the transceiver is configured to receive the routing indication RI sent by the access and mobility management function AMF network element; and the processor is configured to use the RI to update the user's hidden identification SUCI information.
  • the processor is further configured to use the integrity verification code to verify the integrity of the RI if the transceiver receives the integrity verification code corresponding to the RI; the processor is configured to use the RI to update the SUCI.
  • the information includes information for updating the SUCI by using the RI if the integrity verification of the RI is successful.
  • the transceiver is configured to receive the RI sent by the AMF, including: receiving a non-access layer security mode command NAS SMC message sent by the AMF, and the NAS SMC message carries the RI.
  • an embodiment of the present application provides a routing device.
  • the device is provided with a processor and a transceiver.
  • the transceiver is configured to send a routing indication RI to the access and mobility management function AMF network element when the unified data management UDM network element to which the user belongs changes from the first UDM to the second UDM.
  • the transceiver is further configured to send an integrity protection request message to the AUSF network element, the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI; receive the RI sent by the AUSF network element Integrity verification code; send the integrity verification code to the AMF network element.
  • an embodiment of the present application provides a routing device.
  • the device is provided with a processor and a transceiver.
  • the transceiver is configured to receive an integrity protection request message sent by the first unified data management UDM network element, the integrity protection request message carries a routing instruction RI; and the processor is configured to generate an RI according to the integrity protection key and the RI. Integrity verification code; the transceiver is further configured to send the integrity verification code to the first UDM network element.
  • an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver.
  • the transceiver is configured to receive the routing indication RI sent by the access and mobility management function AMF network element; and the processor is configured to use the RI to update the user's hidden identification SUCI information.
  • the processor is further configured to use the integrity verification code to verify the integrity of the RI if the transceiver receives the integrity verification code corresponding to the RI; the processor is configured to use the RI to update the SUCI.
  • the information includes information for updating the SUCI by using the RI if the integrity verification of the RI is successful.
  • the processor is further configured to register the terminal to a second UDM indicated by the RI if the RI stored in the terminal changes.
  • the processor is further configured to register the terminal to the second indicated by the RI if the transceiver receives the deregistration request message sent by the AMF and the reason value carried in the deregistration request message indicates that the RI is changed. UDM.
  • an embodiment of the present application provides a routing device having a routing method for implementing any of the foregoing first aspect, or second aspect, or third aspect, or fourth aspect, or fifth aspect or sixth aspect.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a routing device including: a processor and a memory; the memory is configured to store computer execution instructions, and when the routing device is running, the processor executes the computer execution instructions stored in the memory, so that the The routing device executes the routing method according to any one of the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect or the sixth aspect.
  • a routing device including: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, execute the first or second aspect or the third aspect or the first aspect according to the instructions.
  • a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute the first aspect or the second aspect or the third aspect or The routing method of any one of the fourth aspect or the fifth aspect or the sixth aspect.
  • a seventeenth aspect provides a computer program product containing instructions, which, when run on a computer, enables the computer to execute the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect, or the sixth aspect The routing method of any of the aspects.
  • a circuit system includes a processing circuit configured to execute any one of the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect, or the sixth aspect.
  • One routing method configured to execute any one of the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect, or the sixth aspect.
  • a chip in a nineteenth aspect, includes a processor, the processor is coupled to a memory, the memory stores program instructions, and the foregoing is implemented when the program instructions stored in the memory are executed by the processor.
  • the routing method according to any one of the first aspect, the second aspect, the third aspect, or the fourth aspect, or the fifth aspect or the sixth aspect.
  • a routing system in a twentieth aspect, includes the terminal (or terminal chip), AMF (or chip in AMF), AUSF (or chip in AUSF), and UDM (or chip in UDM) of the above aspect. ).
  • FIG. 1 is a schematic diagram of SUCI provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a 5G network architecture according to an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a routing system according to an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 5 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 6 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 7 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 8 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 9 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 10 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 11 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 12 is a flowchart of a routing method according to an embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a routing apparatus according to an embodiment of the present application.
  • SUPI User identification in 5G, which is used to characterize the user's true identity, and functions similar to IMSI in LTE.
  • SUCI In 5G, in order to avoid the problem that SUPI in plain text is vulnerable to theft by attackers, the public key is used to encrypt SUPI, and the encrypted cipher text forms SUCI. Subsequently, the network-side device can use the private key paired with the encrypted public key to decrypt SUCI to obtain SUPI to learn the user's true identity. As shown in Figure 1, it is the structure of SUCI defined in 3GPP 23.003. Among them, SUCI includes a 3-digit mobile country code (MCC), a 3-digit mobile network code (MNC), and an RI. The MCC is used to address the country where the user belongs to the UDM.
  • MCC 3-digit mobile country code
  • MNC 3-digit mobile network code
  • RI RI
  • the MNC is used to address the network to which the user belongs to the UDM (for example, the UDM belongs to China Telecom, or the UDM belongs to China Unicom), and the RI is used to address the UDM to which the user belongs.
  • the UDM for example, the UDM belongs to China Telecom, or the UDM belongs to China Unicom
  • the RI is used to address the UDM to which the user belongs.
  • the 5G network architecture involved in the embodiments of this application is as follows:
  • the system includes a Network Slice Selection Function (NSSF), a Network Open Function (NEF), a Network Storage Function (NRF), and a Policy Control Function (Policy Control).
  • Function PCF
  • AF Application Function
  • UDM Unified Data Management
  • AUSF Authentication Server Function
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • AN Access Network
  • RAN Radio Access Network
  • UPF user plane functions
  • DN data network
  • the terminal accesses the AN through wireless (such as Wireless-Fidelity (WiFi)) or wired, and the terminal communicates with the AMF through N1; the AN communicates with the UPF through N3, the AN communicates with the AMF through N2; and the UPF communicates with N4 through N4 SMF communication, UPF communicates with DN network elements through N6; SMF communicates with AMF through N11 (not shown in Figure 2), SMF communicates with UDM through N10 (not shown in Figure 2), and SMF communicates with N7 ( Figure 2) (Not shown in the figure) communicates with the PCF; the AMF communicates with the AUSF through N12 (not shown in FIG. 2), and the AUSF communicates with the UDM through N13 (not shown in FIG. 2).
  • WiFi Wireless-Fidelity
  • the above-mentioned network elements can communicate in a certain manner (for example, the terminal communicates with the AMF through N1).
  • the above only lists the network elements related to the technical solution in the embodiment of the present application.
  • the embodiments of this application will not repeat the communication modes between other network elements.
  • the terminals involved in the embodiments of the present application may include various handheld devices, wearable devices, computing devices, or other processing devices connected to a modem with a communication function; and may also include a personal digital assistant ( A personal digital assistant (PDA) computer, a tablet computer, a laptop computer, a machine type communication (MTC) terminal, a user equipment (UE), and the like.
  • PDA personal digital assistant
  • MTC machine type communication
  • UE user equipment
  • the names of the network elements in FIG. 2 and the names of the interfaces between the network elements are only examples.
  • the names of the network elements or the interfaces between the network elements may be other names, or network elements. It may also be called an entity, which is not specifically limited in the embodiment of the present application. All or part of the network elements of the core network may be physical physical network elements or virtualized network elements, which is not limited herein.
  • words such as “first” and “second” are used to distinguish between the same or similar items having substantially the same functions and functions. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the number and execution order, and the words “first” and “second” are not necessarily different.
  • network element A when a certain network element (for example: network element A) obtains information from another network element (for example: network element B), it can mean that network element A receives information directly from network element B, or It means that network element A receives information from network element B through other network elements (for example: network element C).
  • network element C When network element A receives information from network element B through network element C, network element C can transparently transmit the information or process the information, for example, carrying the information in different messages for transmission or filtering the information Only send the filtered information to network A.
  • the network element A sends information to the network element B, which can refer to the network element A directly sending information to the network element B, or the network element A through other network elements (for example, the C network) Yuan) to send information to network element B.
  • the network element B can refer to the network element A directly sending information to the network element B, or the network element A through other network elements (for example, the C network) Yuan) to send information to network element B.
  • the network architecture and service scenarios described in the embodiments of the present application are intended to more clearly illustrate the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided in the embodiments of the present application. With the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • an embodiment of the present application provides a routing system 300.
  • the routing system 300 includes: a terminal 301, an AMF 302, an AUSF 303, and at least one UDM 304 (only one is given as an example in FIG. 3).
  • UDM 304 is used to receive a request message for obtaining an authentication vector from AUSF, and determine whether it is a UDM to which the user belongs according to the request message. If it is a UDM to which the user belongs, it sends it to AUSF 303 according to local policies RI, if it is not the UDM to which the user belongs, it sends a redirect message to AUSF 303, so that AUSF 303 redirects the message to obtain the authentication vector to another UDM, or the UDM directly sends the authentication vector to another UDM Request message. It is also used to receive a request message for acquiring user data sent by the AMF, and carry the RI in the user data acquisition response, and send the RI to the AMF 302.
  • UDM 304 determines that the terminal RI needs to be updated, it actively sends the RI to terminal 301 through AMF 302 to facilitate terminal 301 Update RI in SUCI.
  • AUSF 303 is used to send a request message for obtaining an authentication vector to UDM 304, so as to obtain the RI issued by UDM 304 in subsequent processes, and after receiving the RI sent by UDM 304, send the RI to AMF 302.
  • a request message for obtaining an authentication vector is sent to another UDM to request the RI for addressing the user's home UDM.
  • AMF 302 is used to receive the RI issued by AUSF 303 or UDM304, and send the RI to the terminal 301.
  • the terminal 301 is configured to receive an RI from the AMF 302, and use the RI to update SUCI information.
  • FIG. 3 only shows the connection relationship between the network elements related to the technical solution in the embodiment of the present application, and there may be other connection relationships between the network elements, which will not be repeated here.
  • the routing system provided in the embodiment of the present application may be applied to a 5G system shown in FIG. 2 or a subsequent evolved system.
  • the terminals 301, AMF, 302, AUSF, 303, or UDM 304 in FIG. 3 can be used as independent devices, and the functions of the network elements described above can also be implemented in one device, for example, different function modules in one device.
  • This embodiment of the present application does not specifically limit this.
  • the foregoing function module may be a network element in a hardware device, a software function running on a hardware device, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • FIG. 4 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application.
  • the communication device 400 includes at least one processor 401, a communication line 402, a memory 403, and at least one communication interface 404.
  • the processor 401 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors for controlling the execution of the program of the solution of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 402 may include a path for transmitting information between the aforementioned components.
  • the communication interface 404 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the memory 403 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (RAM) or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM-ready-only memory (EEPROM)), compact disc (read-only memory (CD-ROM)) or other optical disk storage, optical disk storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory may exist independently, and is connected to the processor through the communication line 402. The memory can also be integrated with the processor.
  • the memory 403 is configured to store computer execution instructions for executing the solutions in the embodiments of the present application, and the execution is controlled by the processor 401.
  • the processor 401 is configured to execute computer execution instructions stored in the memory 403, so as to implement the routing method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 401 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 4.
  • the communication device 400 may include multiple processors. Each of these processors may be a single-CPU processor or a multi-CPU processor.
  • a processor herein may refer to one or more devices, circuits, and / or processing cores for processing data (such as computer program instructions).
  • FIG. 4 only shows an exemplary hardware structure diagram of a communication device.
  • the communication device 400 may further include other components. Limitation.
  • the above-mentioned communication device 400 may be a general-purpose device or a special-purpose device.
  • the communication device 400 may be a device having a similar structure as in FIG. 4.
  • the embodiment of the present application does not limit the type of the communication device 400.
  • the routing method provided in the embodiment of the present application is applied to a process in which a terminal performs two-way authentication with a network side.
  • the terminal may perform a two-way authentication process with the network side in different scenarios.
  • the terminal registers with During network, terminal location update, and terminal call processing, the following describes the routing method in the embodiment of the present application by taking bidirectional authentication with the network side in the terminal registration scenario as an example.
  • an embodiment of the present application provides a routing method, including the following steps:
  • the terminal sends a registration request message (Registration Request) to the AMF.
  • Registration Request a registration request message
  • the AMF receives a registration request message sent by the terminal.
  • the registration request message carries the user's SUCI.
  • the AMF determines the AUSF according to the SUCI.
  • the AMF determines the AUSF according to the SUCI and the first configuration policy.
  • the AMF determines the AUSF according to the SUPI. (If the correspondence between SUCI and SUPI is stored in the AMF, the SUPI corresponding to SUCI can be obtained).
  • the number of users is small, and all users belong to one or a few UDMs. Accordingly, the number of AUSFs set in the network may also be small. This is the default value.
  • RI is not used to point to AUSF, and RI is not used to point to UDM.
  • SUCI may not include RI.
  • S502 may be implemented as follows: the AMF selects an AUSF according to the MCC and MNC in the SUCI and the first configuration policy.
  • the first configuration strategy is to select the nearest AUSF (or AUSF in the preset area).
  • the AMF selects the AUSF closest to the current terminal.
  • the AMF selects the AUSF for the user in a polling manner, and balances the load between each AUSF.
  • the AMF selects an AUSF with a higher priority for the user according to the priority of the AUSF.
  • S502 can be implemented as: AMF determines AUSF according to MCC, MNC and RI in SUCI. As a possible implementation manner, the AMF queries the NRF according to the MCC, MNC, and RI in the SUCI, and then obtains the AUSF corresponding to the MCC, MNC, and RI in the NRF.
  • the AMF sends an authentication request message to the AUSF.
  • the AUSF receives the authentication request message sent by the AMF.
  • the authentication request message carries SUCI.
  • the AMF calls the Nausf_UEAuthentication_AuthenticateRequest service of the AUSF to send an authentication request message to the AUSF.
  • the AUSF network element determines the first UDM according to the SUCI or according to the SUCI and the second configuration policy.
  • S504 is implemented as: AUSF according to MNC, MCC and second configuration policy in SUCI Nearest rule) Select a first UDM.
  • AUSF if the private key stored in each UDM is different, in order to prevent that the private key used to decrypt SUCI does not exist on the randomly searched UDM, one or a set of default UDMs may be deployed, the one or more The UDM includes all the private keys used for decryption. In this way, AUSF preferentially selects the default UDM or a UDM in the default UDM group.
  • S504 is implemented as: AUSF determines the first UDM according to the MNC, MCC, and RI in SUCI.
  • the AUSF may query the NRF according to the MNC, MCC, and RI to obtain the first UDM corresponding to the MNC, MCC, and RI.
  • the AUSF sends a first authentication vector acquisition request to the first UDM network element.
  • the first UDM receives a first authentication vector acquisition request sent by the AUSF.
  • the first authentication vector acquisition request carries SUCI.
  • the first authentication vector acquisition request carries an RI delivery instruction.
  • the AUSF calls the Nudm_UEAuthentication_GetRequest service of the first UDM to send a first authentication vector acquisition request to the first UDM to request to obtain an authentication vector from the first UDM.
  • the first UDM uses the private key to decrypt the SUCI to obtain the plaintext SUPI.
  • the first UDM judges whether it is the home UDM of the user indicated by SUPI, if not, executes S508, and if so, executes S511.
  • the first UDM stores the SUPI of a managed user. After the first UDM obtains the user's SUPI, if it is found through query that it does not store the SUPI, the first UDM determines that it is not the user Of the UDM.
  • the first UDM network element sends a redirection message to the AUSF network element.
  • the AUSF receives the redirect message sent by the first UDM.
  • the first UDM returns a Nudm_UEAuthentication_GetResponse service response to send a redirect message to the AUSF.
  • the redirect message carries the plaintext SUPI obtained by decryption by the first UDM.
  • the redirection message may carry the addressing information of the home UDM of the user.
  • the addressing information of the UDM includes, but is not limited to, a Fully Qualified Domain Name (FQDN) of the UDM, an Internet Protocol (IP) address, and the like.
  • FQDN Fully Qualified Domain Name
  • IP Internet Protocol
  • the AUSF network element sends a second authentication vector acquisition request to the second UDM network element according to the redirection message.
  • the second UDM receives a second authentication vector acquisition request sent by the AUSF.
  • the AUSF determines the second UDM according to the SUPI, and sends a second authentication vector acquisition request to the second UDM.
  • the AUSF queries the NRF according to the MCC, MNC, and RI in the SUCI, and then obtains the UDM corresponding to the MCC, MNC, and RI in the NRF. If the redirection message received by the AUSF carries the addressing information of the user's home UDM indicated by SUPI, the second UDM is determined according to the addressing information of the user's home UDM, and a second authentication vector acquisition request is sent to the second UDM.
  • the second authentication vector acquisition request carries an RI delivery instruction.
  • the AUSF calls the Nudm_UEAuthentication_Get Request service of the second UDM to send a second authentication vector acquisition request to the second UDM.
  • the second UDM sends an RI to the AUSF.
  • the AUSF network element receives the RI sent by the second UDM network element.
  • S510 is implemented as follows: the second UDM returns a Nudm_UEAuthentication_GetResponse service response to send a second authentication vector acquisition response to the AUSF, and the second authentication vector acquisition response carries an RI and an authentication vector (AV).
  • the authentication vector includes parameters such as a random number (RAND) and an authentication token (AUTN).
  • the second UDM when receiving the second authentication vector acquisition request, sends the RI to the AUSF according to the RI delivery instruction carried in the second authentication vector acquisition request. Or, the second UDM may issue the RI after receiving the second authentication vector acquisition request. Or, when the second UDM receives the second vector acquisition request sent by the AUSF, the RI in the SUCI carried in the second vector acquisition request is not used to indicate the UDM, or the second UDM receives the second authentication sent by the AUSF Vector acquisition request, when it is found that the RI in the second authentication vector acquisition request does not match the RI corresponding to the second UDM, in order to facilitate subsequent terminals to quickly address the home UDM, the second UDM issues the RI.
  • the embodiment of the present application does not limit the conditions and timing of triggering the second UDM to issue the RI.
  • the first UDM network element sends an RI to the AUSF network element.
  • the AUSF network element receives the RI sent by the first UDM network element.
  • S511 is implemented as follows: the first UDM returns a Nudm_UEAuthentication_GetResponse service response to send a first authentication vector acquisition response to the AUSF network element, and the first authentication vector acquisition response carries an RI and an authentication vector.
  • the embodiment of the present application does not limit the conditions and timing of triggering the first UDM to issue the RI.
  • the AUSF network element determines an integrity verification code of the RI according to an integrity protection key and the RI.
  • AUSF in the two-way authentication process, AUSF generates a key 1 (such as Kausf) related to two-way authentication, and AUSF generates an integrity protection key (Kri) according to Kausf and key parameters, and The integrity protection key and the RI generate an RI integrity verification code (Routing Indicator-Message Authentication Code, RI-MAC).
  • the key parameter is a random number in the authentication vector and / or an incremented counter value (Counter).
  • AUSF may calculate the integrity protection key based on Kausf and random numbers in the authentication vector, or AUSF may calculate the integrity protection key based on Kausf and the counter value, or AUSF may calculate the integrity protection key based on Kausf and the randomness in the authentication vector. Number and counter value to calculate the integrity protection key.
  • the counting increment condition can be set for the counter.
  • the increment condition is that the AUSF receives the integrity protection request message sent by the UDM, that is, each time the AUSF receives the UDM integrity protection request message, the AUSF sets the The counter counts up.
  • an integrity protection key and a Counter can be used to calculate a Counter-Message Authentication Code (Counter-MAC).
  • Counter-MAC Counter-Message Authentication Code
  • AUSF uses this method of RI integrity protection to ensure that RI is not tampered with during air interface transmission, and improves the security of RI transmission.
  • the AUSF sends the RI to an AMF network element.
  • the AMF receives the RI sent by the AUSF.
  • the AUSF sends the RI integrity verification code at the same time it sends the RI to the AMF.
  • AUSF uses Kausf and counter value in S512 or uses Kausf, counter value, random number to generate the integrity protection key
  • AUSF can also send the counter value (Counter) to AMF, and, optionally, can also Send (Counter-MAC) to AMF.
  • Counter-MAC Counter-MAC
  • the AMF sends an RI to the terminal.
  • the terminal receives the RI sent by the AMF.
  • the AMF sends an RI integrity verification code while sending the RI to the terminal.
  • the AMF sends the counter value (Counter) from the AUSF to the terminal, so that the terminal can use the counter value to verify the integrity protection later, and Optionally, it can also send a Counter-MAC to the terminal.
  • the network side may take any one of the following at least three ways to specifically implement the process of sending the RI to the terminal:
  • Method 1 AUSF issues RI to the terminal through AMF during the authentication process. Specifically, as shown in FIG. 6, S513 and S514 can be replaced with S613 and S614:
  • the AUSF sends a first authentication response to the AMF.
  • the AMF receives the first authentication response sent by the AUSF.
  • the AUSF returns a Nausf_UEAuthentication_AuthenticateResponse service response and sends a first authentication response to the AMF.
  • the first authentication response carries an RI.
  • the AUSF may be included in the response message of any authentication service (such as a message of successful authentication or an authentication message of other intermediate processes). Carry the RI and deliver the RI to the AMF.
  • RI can be used in The EAP packet, which is not limited here.
  • the first authentication response carries an authentication vector, that is, when the AMF invokes the authentication service of the AUSF multiple times, the AUSF sends the first authentication response to the AMF multiple times, and the first authentication response multiple times
  • One of the first authentication responses in the one carries the authentication vector.
  • the RI may also be carried in the first authentication response.
  • the first authentication response carries the RI integrity verification code generated in S512.
  • the first authentication response carries Counter and Counter-MAC.
  • the AMF sends an authentication request message for the network to the terminal.
  • the terminal receives an authentication request message for the network sent by the AMF.
  • the authentication request message for the network carries the RI.
  • the authentication request message for the network carries part or all of the parameters in the authentication vector.
  • the authentication request message carries the RI integrity verification code generated in S512.
  • the authentication request message carries Counter and Counter-MAC.
  • the terminal may use some parameters in the received authentication vector (such as a random number in the authentication vector) to authenticate the network.
  • the terminal sends an authentication request response message for the network to the AMF. It instructs the AMF to authenticate the terminal, thereby completing the entire two-way authentication process.
  • the AUSF may also send the RI to the AMF in any other interaction between the AUSF and the AMF during the two-way authentication process, which is not limited in this application.
  • Method 2 The network side sends the RI to the terminal based on the SMC mechanism. Specifically, as shown in FIG. 7, S513 and S514 in FIG. 5 may be replaced with S713 and S714:
  • the AUSF sends a second authentication response to the AMF.
  • the AMF receives the second authentication response sent by the AUSF.
  • AUSF returns a Nausf_UEAuthentication_AuthenticateResponse service response, and sends a second authentication response to the AMF.
  • the second authentication response carries the RI.
  • the second authentication response carries the RI integrity verification code generated by the AUSF in S512.
  • the second authentication response carries Counter and Counter-MAC.
  • the AMF sends a NAS SMC message to the terminal.
  • the terminal receives the NAS SMC message sent by the AMF.
  • the NAS SMC message carries the RI.
  • the NAS SMC message carries the RI integrity verification code generated by the AUSF in S512.
  • the NAS SMC message carries Counter and Counter-MAC.
  • the RI can be integrity protected based on the SMC's own integrity protection mechanism.
  • Method 3 The UDM sends the RI to the terminal at the same time as the user subscription data is sent to the terminal, that is, the condition that triggers the UDM to send the RI is that the UDM receives the AMF user data acquisition request message.
  • S507 to S514 in FIG. 5 can be replaced with S807 to S810:
  • the first UDM determines that it is the home UDM of the user indicated by the SUPI, and sends a first authentication vector acquisition response to the AUSF.
  • the first authentication vector acquisition response carries an authentication vector.
  • AUSF AUSF
  • AMF Access Management Function
  • the terminal perform two-way authentication according to the specifications defined by 3GPP to ensure the legitimacy of the terminal and the network.
  • the AMF sends a user data acquisition request message to the first UDM.
  • the first UDM receives a user data acquisition request message sent by the AMF.
  • the AMF calls the Nudm_SDM_Get request service of the first UDM to send a user data acquisition request message to the first UDM.
  • the user data acquisition request message carries SUPI.
  • the user data acquisition request message carries an RI integrity protection identifier, which is used to indicate whether the first UDM performs integrity protection on the RI.
  • the first UDM determines that integrity protection is not performed on the RI, it sends a user data acquisition response to the AMF.
  • the AMF receives the user data acquisition response sent by the first UDM.
  • the first UDM returns a Nudm_SDM_Getresponse service response to send a user data acquisition response to the AMF.
  • the user data acquisition response carries the RI and the user's contract data.
  • the user's contract data includes, but is not limited to, the consumer package and consumer package-related services of the Universal Subscriber Identity Module (USIM) card of the terminal.
  • USIM Universal Subscriber Identity Module
  • the first UDM determines whether to protect the RI according to the RI integrity protection identifier carried in the user data acquisition request message.
  • the length of the RI integrity protection flag is 1 bit.
  • the first UDM does not perform integrity protection on the RI.
  • the first UDM may determine whether to perform integrity protection on the RI according to its own pre-configured policy, which is not limited in this embodiment of the present application.
  • only the length of the RI integrity protection identifier is taken as an example.
  • the format of the RI integrity protection identifier and the number of bits used, and the meaning of each bit are not limited in the embodiments of the present application.
  • the AMF sends a registration acceptance message (Registration Accept) to the terminal.
  • the registration acceptance message carries the RI.
  • S507 to S514 in FIG. 5 may be specifically replaced as follows: Steps S907 to S916:
  • the first UDM determines that it is not the home UDM of the user indicated by the SUPI, and sends a redirect message to the AUSF.
  • the AUSF sends a second authentication vector acquisition request to the second UDM.
  • the second UDM determines that it is the home UDM of the user indicated by the SUPI, it sends a second authentication vector acquisition response to the AUSF.
  • the second authentication vector acquisition response carries the authentication vector.
  • the second authentication vector acquisition response It also carries RI.
  • S910 and AUSF determine an RI integrity verification code according to the integrity protection key and the RI.
  • S911 and AMF send a user data acquisition request message to the second UDM.
  • the second UDM receives a user data acquisition request message sent by the AMF.
  • the AMF calls the Nudm_SDM_Get request service of the second UDM to send a user data acquisition request message to the second UDM.
  • the user data acquisition request message carries SUPI.
  • the user data acquisition request message carries an RI integrity protection identifier.
  • the AUSF receives the integrity protection request message sent by the second UDM, and the user of the message obtains the RI request RI integrity verification code.
  • the second UDM determines whether to protect the RI according to the RI integrity protection identifier carried in the user data acquisition request message. For example, when the RI integrity protection identifier is 1 bit and is 1, the second UDM determines RI protects integrity. Or the second UDM may determine whether to perform integrity protection on the RI according to its own pre-configured policy, which is not limited in the embodiment of the present application.
  • the second UDM to issue the RI to the AUSF. If the condition that triggers the second UDM to issue the RI to the AUSF is that the second UDM receives the user data acquisition request message, the first The two UDMs carry an RI in the integrity protection request message, which is used by the AUSF to generate an RI integrity verification code.
  • AUSF determines whether an RI integrity verification code has been generated. If the second authentication vector acquisition response received by AUSF carries RI and AUSF has performed S910 to generate an RI integrity verification code, it sends RI integrity to the second UDM Verification code.
  • the Counter and Counter-MAC may also be sent to the second UDM.
  • the Counter and Counter-MAC may also be sent to the second UDM.
  • the generated RI integrity verification code does not exist:
  • the second UDM does not carry the RI in the second authentication vector acquisition response.
  • the second UDM carries the RI in the second authentication vector acquisition response, and the AUSF receives the RI but does not use the RI to generate an RI integrity verification code.
  • the second UDM sends a user data acquisition response to the AMF, and the user data acquisition response carries the RI and user data.
  • the user data acquisition response carries RI-MAC, Counter, and Counter-MAC.
  • the AMF receives the user data acquisition response sent by the second UDM.
  • the second UDM returns a Nudm_SDM_Getresponse service response to send a user data acquisition response to the AMF.
  • the AMF sends a registration acceptance message (Registration Accept) to the terminal.
  • the terminal receives the registration acceptance message sent by the AMF.
  • the registration acceptance message carries the RI and the RI integrity verification code.
  • the terminal can also perform S515:
  • the terminal uses the received RI to update SUCI information.
  • Case 1 If the RI received by the terminal is not integrity-protected, the terminal directly uses the RI to update the SUCI information.
  • the terminal includes a Mobile Equipment (ME) module and a USIM card.
  • ME Mobile Equipment
  • USIM is used to provide user identification.
  • the terminal can write the updated RI to the ME or the USIM card.
  • the terminal calls the read-write interface to update the RI bit included in the SUCI in the USIM card or the ME to the received RI.
  • Case 2 If the terminal receives the integrity verification code corresponding to the RI, the terminal uses the RI integrity verification code to perform integrity verification on the RI. After the integrity verification of the RI is successful, all the The terminal uses the RI to update SUCI information. Specifically, the terminal performs the inverse operation of generating the RI integrity verification code described above, generates an integrity protection key by using Kausf and key parameters, and then calculates an X-MAC by using the generated integrity protection key and the received RI. If the X-MAC is consistent with the value of the RI-MAC received by the terminal, it means that the RI has not been tampered with by a third party, and the terminal uses the RI to update the SUCI information.
  • the key parameters used by the terminal are the same as those used when AUSF generates the RI integrity verification code. That is, if AUSF uses the random number in the authentication vector and Kausf to generate the integrity protection key, the terminal When verifying whether the RI has been tampered with by a third party, it also uses the random number in the authentication vector and Kausf in the terminal to generate the integrity protection key. If AUSF uses Kausf and the counter value to generate the integrity protection key, the terminal also uses Kausf and Receive the counter value from AUSF to calculate the integrity protection key.
  • the integrity verification is performed on the counter. If the verification succeeds, it indicates that the counter has not been tampered. At this time, if the terminal finds that the counter value is greater than the counter's locally stored counter value, the terminal receives The counter received is newly issued by the network side, and the terminal further performs integrity verification on the RI. After the RI integrity verification is passed, the terminal uses the RI to update the SUCI information. Correspondingly, the terminal updates the local Counter value.
  • the AUSF sends a first authentication vector acquisition request to the first UDM, and if the AUSF receives the RI sent by the first UDM, it sends the RI to the AMF. Subsequently, the AMF of the management terminal sends the RI to the terminal, so that the terminal can update its own RI, so that the terminal can address the correct UDM when it enters the network for authentication.
  • the embodiment of the present application also provides another routing method.
  • the first UDM may also send a second authentication to the second UDM.
  • Weight vector acquisition request Specifically, as shown in FIG. 10, the above S508 to S510 can be replaced with the following steps:
  • the first UDM sends a second authentication vector acquisition request to the second UDM.
  • the first UDM calls the Nudm_UEAuthentication_Get Request service of the second UDM to send a second authentication vector acquisition request to the second UDM.
  • the second UDM sends a second authentication vector acquisition response to the first UDM.
  • the second UDM returns a Nudm_UEAuthentication_GetResponse service response and sends a second authentication vector acquisition response to the first UDM.
  • the first UDM sends a second authentication vector acquisition response to the AUSF.
  • the first UDM returns a Nudm_UEAuthentication_GetResponse service response and sends a second authentication vector acquisition response to the AUSF.
  • the first UDM can determine a second UDM and directly send a second authentication vector acquisition request to the second UDM, without the need for intermediate forwarding and processing by other network elements, reducing the transmission time between network elements. Delay.
  • This embodiment of the present application also provides another routing method, which is applied to an Over-the-Air (OTA) platform. As shown in FIG. 11, the method includes:
  • An operation and maintenance (OM) device sends a SUPI and an RI to be modified to an OTA platform.
  • the OTA platform modifies the RI information of the corresponding SUPI.
  • the OTA platform sends an SMC message to the terminal, where the SMC message is used to instruct the terminal to update the RI.
  • S1104 The terminal sends an update result to the OTA platform.
  • This embodiment of the present application also provides a routing method. Initially, a user registers with a first UDM, and subsequently migrates to a second UDM due to service requirements. In this scenario, the first UDM actively initiates a RI update process.
  • the first UDM determines that the RI information of the terminal needs to be modified, it sends the modified RI to the AMF.
  • the modified RI may also be integrity protected.
  • the method includes the following steps:
  • the first UDM determines that the RI information of the terminal needs to be modified, such as the RI modification caused by the user's UDM adjustment.
  • the first UDM determines whether to perform integrity protection on the RI according to the local policy. If not, execute S1203, and if yes, execute S1204.
  • the first UDM sends an RI to the AMF.
  • the AMF receives the RI sent by the first UDM.
  • the first UDM sends an integrity protection request message to the AUSF.
  • the AUSF receives the integrity protection request message sent by the first UDM.
  • the integrity protection request message carries an RI corresponding to the second UDM.
  • the AUSF generates the RI-MAC according to the integrity protection key and the RI corresponding to the second UDM.
  • the counter-MAC is generated according to the Counter and the integrity protection key.
  • the AUSF sends an integrity protection response to the first UDM.
  • the first UDM receives the integrity protection response sent by the AUSF.
  • the integrity protection response carries an RI-MAC, a counter (optional), and a counter-MAC (optional).
  • the first UDM sends a notification message to the AMF.
  • the AMF receives the notification message sent by the first UDM.
  • the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
  • the notification message carries RI, RI-MAC (optional), Counter (optional), and Counter-MAC (optional).
  • the AMF sends a configuration modification request to the terminal.
  • the terminal receives the configuration modification request sent by the AMF.
  • the configuration modification request carries RI, RI-MAC (optional), Counter (optional), and Counter-MAC (optional).
  • the terminal performs integrity verification on the RI-MAC. After the verification passes, the terminal updates the RI.
  • the terminal if the terminal receives the Counter and Counter-MAC, the terminal first performs integrity verification on the Counter-MAC to confirm that the received Counter value is greater than the Counter value stored locally, and then passes the RI-MAC after the verification is passed. Integrity verification, finally confirming that the value of RI has not been tampered with.
  • the terminal sends a configuration modification response to the AMF.
  • the AMF receives a configuration modification response sent by the terminal.
  • the AMF sends a notification response to the first UDM.
  • the first UDM receives the notification response sent by the AMF.
  • the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
  • the notification response is used to notify the first UDM that the RI update of the terminal is successful.
  • the terminal After the terminal updates the RI, optionally, it actively initiates a logout process to the first UDM.
  • the first UDM may initiate a logout process. Specifically, the first UDM sends a re-registration notification message to the AMF using the Nudm_UECM_Deregistration Notification Service, and the AMF sends a Deregistration Request message deregistration request message to the terminal.
  • the reason value carried in the deregistration request message is the RI change, and the terminal receives the carry reason value as the RI change.
  • the terminal uses the updated RI to register with the second UDM to which it belongs.
  • the terminal sends a registration request message to the second UDM to request registration to the second UDM.
  • the registration request message carries the RI corresponding to the second UDM.
  • the method flow in FIG. 12 includes steps similar to those in the method flows shown in FIG. 5 to FIG. 11. For a detailed description of these steps, reference may be made to the foregoing, and details are not described herein again.
  • a method for updating parameters in a terminal is provided.
  • the terminals include ME (Mobile Equipment) and USIM.
  • the update parameters mainly include two types: USIM parameters (that is, parameters that need to be updated in the USIM) and ME parameters (that is, parameters that need to be updated in the ME).
  • the USIM parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters;
  • ME parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
  • NSSAI Network Slice Selection Assistant Information
  • S-NSSAI Single-Network Slice Selection Assistant Information
  • single Slice selection assistance information Configured NSSAI (Configured Network Selection Selection Assistant Information)
  • Requested NSSAI Requested Network Selection Selection Assistant Information
  • closed access group identification closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
  • the reason for updating the parameters in the terminal may be: the user's UDM adjustment causes the parameters in the USIM card and / or ME to be modified.
  • the method for updating parameters in the terminal includes:
  • the first UDM sends a first notification message to the AMF.
  • the AMF receives the notification message sent by the first UDM.
  • the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
  • the first notification message includes update parameters (USIM parameters and / or ME parameters).
  • the first notification message includes a USIM parameter and a first security parameter.
  • the first security parameter is calculated by the first UDM according to the shared key between the first UDM and the USIM and the USIM parameter.
  • the shared key may be an initially configured key or a key generated during authentication, such as an OTA (Over The Air) key, an authentication root key, a CK (Cipher Key, encryption key), and IK (Integrity Key (integrity key), MSK (Master Session Key, Master Session Key), EMSK (Extended Master Session Key, Extended Master Session Key) and so on.
  • the first security parameter may include a USIM parameter and a USIM verification parameter.
  • the USIM verification parameter is used by the USIM to verify the correctness of the USIM parameter in the first security parameter.
  • the AMF sends a second notification message to the terminal.
  • the second notification message may be a downlink NAS message.
  • the second notification message carries an update parameter, a first security parameter, an Update-MAC (optional), and a Counter (optional).
  • the terminal receives the second notification message.
  • the terminal updates parameters in the terminal according to the second notification message.
  • the method further includes: the first UDM interacts with the AUSF to obtain an Update MAC.
  • the Update MAC is used to perform integrity protection on USIM parameters.
  • the first UDM interacts with AUSF to obtain Update MAC, including S1305-1307.
  • the first UDM sends a protection request message to the AUSF.
  • the AUSF receives the protection request message sent by the first UDM.
  • the protection request message carries USIM parameters.
  • the protection request message carries a USIM parameter and a first security parameter.
  • the protection request message carries a first security parameter.
  • the protection request message may further include a desired USIM card response
  • the protection request message may further include a desired UE response.
  • the AUSF generates an Update-MAC according to the protection request message.
  • the AUSF generates an Update-MAC according to a USIM parameter and a first security parameter.
  • the AUSF generates an Update-MAC according to the first security parameter.
  • the AUSF generates an Update-MAC according to a Counter (a counter value stored in the AUSF), a USIM parameter, and a first security parameter.
  • a Counter a counter value stored in the AUSF
  • USIM a USIM parameter
  • a first security parameter a counter value stored in the AUSF
  • the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), a USIM parameter, and a first security parameter.
  • the AUSF generates an Update-MAC according to the Counter (the count value stored by the AUSF) and the first security parameter.
  • the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), and a first security parameter.
  • the protection key is a key shared by the UE and the AUSF.
  • the protection key here may be an initially configured key, or a key generated during authentication, such as a Kausf key.
  • the AUSF generates a Counter-MAC according to the Counter and the protection key.
  • the Counter-MAC is used to perform integrity protection on the Counter.
  • the input of the calculation parameters of the Counter-MAC may also include the expected USIM response.
  • Counter-MAC calculation parameter input may also include expected UE response
  • the AUSF sends a protection response to the first UDM.
  • the first UDM receives the protection response sent by the AUSF.
  • the protection response carries the Update-MAC.
  • the protection response may further include Counter and / or Counter-MAC.
  • the first notification message sent to the AMF includes Update-MAC.
  • Update-MAC the Counter received from AUSF. It can be understood that if the first notification message received by the AMF includes Update-MAC and / or Counter, the AMF will add these parameters to the second notification message and send it to the terminal through the second notification message; of course It is also possible to send the received parameters to the terminal through other messages.
  • the terminal receives the Update-MAC
  • the terminal performs integrity verification on the Update-MAC.
  • the USIM parameters are updated.
  • the USIM parameter update includes: the terminal sends the received USIM parameter to the USIM card, so that the USIM updates the internal parameters according to the USIM parameter.
  • the USIM parameter update includes: the terminal sends the first security parameter to the USIM card, and the USIM card verifies the first security parameter. After the authentication is successful, it sends a response message USIM card response to the ME. Of course, after the USIM card successfully verifies the first security parameter, the parameters in the USIM card will be updated.
  • the integrity verification method may be: if the terminal receives the counter, the terminal first checks the counter to confirm that the received counter value is greater than the counter value stored locally. After the verification is passed, the UE-Update-MAC on the terminal side is calculated according to the same calculation method as AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
  • the integrity verification method may be: the terminal calculates the UE-Update-MAC on the terminal side according to the same calculation method as the AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
  • the terminal feedbacks to the first UDM.
  • the feedback method specifically includes steps S1308-1310.
  • S1308 The terminal sends a first feedback message to the AMF.
  • the first feedback message may be an uplink NAS message.
  • the AMF receives an uplink NAS message sent by the terminal.
  • the message includes a UE-Counter-MAC; wherein the UE-Counter-MAC is an integrity protection for the count value received by the UE side.
  • a USIM response is also included; optionally, a response from the UE is also included.
  • the UE-Counter-MAC is generated according to the protection key and the received Counter.
  • the response of the USIM card and / or the response of the UE is also a UE-Counter-MAC optional parameter.
  • the AMF sends a second feedback message to the first UDM.
  • the first UDM receives the notification response sent by the AMF.
  • the message includes a UE-Counter-MAC; optionally, it also includes a USIM response; optionally, it also includes a response from the UE.
  • the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
  • the first UDM receives a notification message sent by the AMF.
  • the first UDM checks whether the UE-Counter-MAC received is the same as the Counter-MAC received from the AUSF. If they are the same, it means that the UE has finished updating the update parameters and the first security parameter.
  • Update-MAC UE-Update-MAC
  • Counter-MAC Counter-MAC
  • UE-Counter-MAC message verification code function
  • a method for updating parameters in a terminal is provided.
  • the terminals include ME (Mobile Equipment) and USIM.
  • the update parameters mainly include two types: USIM parameters (that is, parameters that need to be updated in the USIM) and ME parameters (that is, parameters that need to be updated in the ME).
  • the USIM parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters;
  • the ME parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
  • NSSAI Network Slice Selection Assistant Information
  • S-NSSAI Single-Network Slice Selection Assistant Information
  • single Slice selection assistance information single Slice selection assistance information
  • Configured NSSAI Configured Network Selection Selection Assistant Information
  • Requested NSSAI Requested Network Selection Selection Assistant Information
  • closed access group identification closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
  • the reason for updating the parameters in the terminal may be: the user's UDM adjustment causes the parameters in the USIM card and / or ME to be modified.
  • the method for updating parameters in the terminal includes:
  • the first UDM sends a first notification message to the AMF.
  • the AMF receives the notification message sent by the first UDM.
  • the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
  • the first notification message includes update parameters (USIM parameters and / or ME parameters).
  • the first notification message includes an update parameter and a first security parameter.
  • the first security parameter is calculated by the first UDM according to the shared key between the first UDM and the USIM and the USIM parameter.
  • the shared key may be an initially configured key or a key generated during authentication, for example, at least one of an OTA key, an authentication root key, CK, IK, MSK, and EMSK.
  • the first security parameter may include a USIM parameter and a USIM verification parameter.
  • the USIM verification parameter is used by the USIM to verify the correctness of the USIM parameter in the first security parameter.
  • the AMF sends a second notification message to the terminal.
  • the second notification message may be a downlink NAS message.
  • the second notification message carries an update parameter, a first security parameter (optional), an Update-MAC (optional), and a Counter (optional).
  • the terminal receives the second notification message.
  • the terminal updates parameters in the terminal according to the second notification message.
  • the method further includes: the first UDM interacts with the AUSF to obtain an Update MAC.
  • the Update MAC is used to perform integrity protection on update parameters.
  • the first UDM interacts with AUSF to obtain Update MAC, including S1405-1407.
  • the first UDM sends a protection request message to the AUSF.
  • the AUSF receives the protection request message sent by the first UDM.
  • the first UDM first calculates the first security parameter according to the shared key of the first UDM and the USIM and the USIM parameter.
  • the security parameter 1 may include USIM parameters and USIM verification parameters.
  • the USIM verification parameter is used for correctness of the USIM parameter in the USIM verification security parameter.
  • the protection request message carries an update parameter and a first security parameter.
  • the protection request message carries update parameters.
  • the protection request message may further include a desired USIM card response
  • the protection request message may further include a desired UE response.
  • the AUSF generates an Update-MAC according to the protection request message.
  • the AUSF generates an Update-MAC according to an update parameter and / or a first security parameter.
  • the AUSF generates an Update-MAC by updating parameters according to a protection key and a Counter (a counter value stored by the AUSF).
  • the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), an update parameter, and a first security parameter.
  • the protection key is a key shared by the UE and the AUSF.
  • the protection key here may be an initially configured key, or a key generated during authentication, such as a Kausf key.
  • the AUSF generates a Counter-MAC according to the Counter and the protection key.
  • the Counter-MAC is used to perform integrity protection on the Counter.
  • the input of the calculation parameters of the Counter-MAC may also include the expected USIM response.
  • Counter-MAC calculation parameter input may also include expected UE response
  • the AUSF sends a protection response to the first UDM.
  • the first UDM receives the protection response sent by the AUSF.
  • the protection response carries the Update-MAC.
  • the protection response may further include Counter and / or Counter-MAC.
  • the first notification message sent to the AMF includes Update-MAC.
  • Update-MAC the Counter received from AUSF. It can be understood that if the first notification message received by the AMF includes Update-MAC and / or Counter, the AMF will add these parameters to the second notification message and send it to the terminal through the second notification message; of course It is also possible to send the received parameters to the terminal through other messages.
  • the terminal if the terminal receives the Update-MAC, the terminal performs integrity verification on the Update-MAC. After the authentication is passed, the update parameters are updated.
  • the terminal Upon receiving the ME parameters in the update parameters, the terminal updates the corresponding parameters stored in the ME. If the second notification message further includes the first security parameter, the first security parameter is sent to the USIM in the terminal.
  • the USIM parameter update includes: the terminal sends the received USIM parameter to the USIM card, so that the USIM updates the internal parameters according to the USIM parameter.
  • the USIM card will then send a response message to the ME to respond to the USIM card.
  • the USIM parameter update includes: the terminal sends the first security parameter to the USIM card, and the USIM card verifies the first security parameter. After the authentication is successful, it sends a response message USIM card response to the ME. Of course, after the USIM card successfully verifies the first security parameter, the parameters in the USIM card will be updated.
  • the integrity verification method may be: if the terminal receives the counter, the terminal first checks the counter to confirm that the received counter value is greater than the counter value stored locally. After the verification is passed, the UE-Update-MAC on the terminal side is calculated according to the same calculation method as AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
  • the integrity verification method may be: the terminal calculates the UE-Update-MAC on the terminal side according to the same calculation method as the AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
  • the terminal feedbacks to the first UDM.
  • the feedback method specifically includes steps S1408-1410.
  • S1408 The terminal sends a first feedback message to the AMF.
  • the first feedback message may be an uplink NAS message.
  • the AMF receives an uplink NAS message sent by the terminal.
  • the message includes a UE-Counter-MAC; wherein the UE-Counter-MAC is an integrity protection for the count value received by the UE side.
  • a USIM response is also included; optionally, a response from the UE is also included.
  • the UE-Counter-MAC is generated according to the protection key and the received Counter.
  • the USIM-Response and / or the response of the UE is also a UE-Counter-MAC optional parameter.
  • the AMF sends a second feedback message to the first UDM.
  • the first UDM receives the notification response sent by the AMF.
  • the message includes a UE-Counter-MAC; optionally, it also includes a USIM response; and optionally, it also includes a response from the UE.
  • the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
  • the first UDM receives a notification message sent by the AMF.
  • the first UDM checks whether the UE-Counter-MAC received is the same as the Counter-MAC received from the AUSF. If they are the same, it means that the UE has completed updating the update parameters and / or the first security parameter.
  • Update-MAC UE-Update-MAC
  • Counter-MAC Counter-MAC
  • UE-Counter-MAC message verification code function
  • the update parameters may include only ME parameters or only USIM parameters.
  • the update parameters may also include parameters that both the USIM and the ME need to update.
  • the UDM can use the parameters that both the USIM and the ME need to update as input parameters for the calculation of the first safety parameter to obtain the first safety parameter; meanwhile, send this parameter to the AUSF so that the AUSF can use the parameters that both the USIM and the ME need to update as Update-MAC calculation input.
  • the UDM also sends this parameter to the UE, so that the UE uses the parameters that both the USIM and the ME need to update as input for the UE-Update-MAC calculation to obtain the UE-Update-MAC.
  • the UE-Update-MAC is compared with the Update-MAC to verify the correctness of the Update-MAC. If the verification is successful, the related parameters in the ME are updated; in addition, the first security parameter is sent to the USIM.
  • the update parameters may also include parameters that both the USIM and the ME need to update.
  • the UDM can use this parameter as the input parameter for the calculation of the second security parameter to obtain the second security parameter; at the same time, send this parameter and the second security parameter to the AUSF, so that the AUSF calculates this parameter and the second security parameter as Update-MAC input of.
  • the UDM also sends the parameters that the USIM and the ME need to update and the second security parameter to the UE.
  • the UE uses the parameters that both the USIM and the ME need to update and the second security parameter as inputs for the UE-Update-MAC calculation to obtain the UE-Update-MAC.
  • the UE-Update-MAC is compared with the Update-MAC to verify the correctness of the Update-MAC. If the verification is successful, the related parameters in the ME are updated; in addition, the first security parameter and the second security parameter are sent to the USIM.
  • the security parameters may include corresponding parameters and information of security verification. If the security parameters include only the information of security verification, the UE needs to send the corresponding parameters and security parameters to the USIM; in addition, updating the parameters also needs to retain the USIM parameters.
  • the safety parameters may include corresponding parameters and information of safety verification.
  • the USIM parameters can also be removed from the update parameters, and only the ME parameters and / or the parameters that both the USIM and the ME need to be updated are included.
  • the UDM may not calculate the first security parameter and / or the second security parameter, and only sends the update parameter to the AUSF, so that the AUSF calculates the Update-MAC according to the update parameter. After that, other processes do not need to reflect the first safety parameter and / or the second safety parameter.
  • the UDM may also send an indication of whether the UE is required to send a response message to the AUSF.
  • the AUSF uses this indication of whether the UE needs to send a response message as an input to the Update-MAC calculation.
  • the UDM also sends an indication of whether the UE is required to send a response message to the UE.
  • the UE uses the indication of whether the UE needs to send a response message as an input of the UE-Update-MAC calculation, and checks whether the calculated UE-Update-MAC is consistent with the received Update-MAC. If they are consistent, the UE sends a response message to the UDM.
  • the UDM may also send an indication to the AUSF whether the UE needs to re-register.
  • the AUSF uses this indication of whether UE re-registration is required as input for the Update-MAC calculation.
  • the UDM also sends an indication of whether the UE needs to re-register to the UE.
  • the UE uses the indication of whether the UE needs to re-register as an input of the UE-Update-MAC calculation, and checks whether the calculated UE-Update-MAC is consistent with the received Update-MAC. If they are consistent, the UE will then initiate a re-registration process to the UDM.
  • the network element in the embodiment of the present application includes a hardware structure and / or a software module corresponding to each function.
  • the embodiments of this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the technical solutions of the embodiments of the present application.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit. It should be noted that the division of the units in the embodiments of the present application is schematic, and is only a logical function division. There may be another division manner in actual implementation.
  • FIG. 13 shows a schematic block diagram of a routing device provided in an embodiment of the present application, where the routing device may be the foregoing terminal or AMF, AUSF, or UDM.
  • the routing device 1300 may exist in the form of software, or may be a chip that can be used in a device.
  • the routing device 1300 includes a processing unit 1302 and a communication unit 1303.
  • the processing unit 1302 may be used to support the terminal to perform S515 in FIG. 5 to FIG. 9, two-way authentication in FIG. 7, FIG. 8, and FIG. 9, S1103 in FIG. 11, and S1209 in FIG. , S1212, S1213, etc., and / or other processes for the schemes described herein.
  • the communication unit 1303 is used to support communication between the terminal and other network elements (such as AMF, etc.), for example, to support the terminal to execute S501 in FIG. 5 to FIG. 9, S514 in FIG. 4, S614 in FIG. 6, and S714, S810 in FIG. 8, S916 in FIG. 9, S514 in FIG. 10, S1102, S1104 in FIG. 11, S1208, S1210 in FIG. 12, and the like.
  • the processing unit 1302 may be used to support the AMF to perform S502 in FIGS. 5 to 9, FIG. 6, FIG. 7, FIG. 8, and FIG. , And / or other processes for the schemes described herein.
  • the communication unit 1303 is configured to support communication between the AMF and other network elements, for example, to support the AMF to perform S501 and S503 in FIGS. 5 to 9 and S513 in FIG. 5.
  • the processing unit 1302 may be used by the AUSF network element to perform S504 as shown in FIG. 5 to FIG. 9 and / or other processes used in the scheme described herein.
  • the communication unit 1303 is, for example, used to support AUSF to perform S503 and S505 in FIG. 5 to FIG. 8 and S613 in FIG. 6.
  • the processing unit 1302 may be used for the UDM network element to perform S506 and the like as shown in FIG. 5 to FIG. 10 and / or other processes for the scheme described herein.
  • the communication unit 1303 is, for example, used to support the UDM to perform S505 in FIG. 5 to FIG. 10, S508 in FIG. 5 to FIG. 7, and the like.
  • the routing device 1300 may further include a storage unit 1301 for storing program code and data of the routing device 1300.
  • the data may include, but is not limited to, original data or intermediate data.
  • the processing unit 1302 may be a controller or the processor 401 or the processor 405 shown in FIG. 4, for example, it may be a central processing unit (Central Processing Unit, CPU), a general-purpose processor, and digital signal processing ( Digital Signal Processing (DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any of them combination. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure.
  • the processor may also be a combination that implements computing functions, such as a combination including one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the communication unit 1303 may be a transceiver, a transceiver circuit, or the communication interface 404 shown in FIG. 4 and the like.
  • the storage unit 1301 may be a memory 403 shown in FIG. 4.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server, or data center Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, and the like including one or more available medium integration.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a Digital Video Disc (DVD)), or a semiconductor medium (for example, a solid state disk (Solid State Disk, SSD)) )Wait.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a Digital Video Disc (DVD)
  • DVD Digital Video Disc
  • semiconductor medium for example, a solid state disk (Solid State Disk, SSD)
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, which may be located in one place, or may be distributed to multiple network devices (for example, Terminal device). Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each functional unit may exist independently, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware, or in the form of hardware plus software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application relates to the technical field of communications, and provides a routing method, apparatus and system, capable of solving the problem of updating, if a routing indicator (RI) in a subscription concealed identifier changes when a user migrates to a new user unified data management (UDM) network element, the routing indicator in the subscription concealed identifier. The method comprises: an authentication server function (AUSF) network element sends a first authentication vector acquisition request to a first UDM network element, and if the AUSF network element receives an RI sent by the first UDM network element, the AUSF network element sends the RI to an access and mobility management function (AMF) network element. The method is applied to an RI updating process of a terminal.

Description

路由方法、装置及系统Routing method, device and system
本申请要求了2018年8月23日提交的、申请号为201810970120.2、发明名称为“路由方法、装置及系统”的中国申请的优先权,以及2018年10月31日提交的、申请号为201811289488.9、发明名称为“路由方法、装置及系统”的中国申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese application filed on August 23, 2018 with the application number 201810970120.2 and the invention name "routing method, device and system", and the application number 201811289488.9, filed on October 31, 2018 The priority of the Chinese application whose invention name is "routing method, device and system", the entire contents of which are incorporated herein by reference.
技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种路由方法、装置及系统。The present application relates to the field of communication technologies, and in particular, to a routing method, device, and system.
背景技术Background technique
通常,为了确保网络和终端的安全,终端在接入网络时,网络和终端之间需进行双向鉴权,即网络需验证终端的合法性,终端也需验证网络的安全性。在长期演进(Long Term Evolution,LTE)网络中,在双向鉴权完成前,终端和网络侧还没有建立安全上下文时,用户的国际移动用户标识符(International Mobile Subscriber Identifier,IMSI)在空口中是明文传输,导致攻击者可从空口获取IMSI,以进行一系列攻击。Generally, to ensure the security of the network and the terminal, when the terminal accesses the network, the network and the terminal need to perform two-way authentication, that is, the network needs to verify the legitimacy of the terminal, and the terminal also needs to verify the security of the network. In a Long Term Evolution (LTE) network, before the terminal and the network have not established a security context before the two-way authentication is completed, the user ’s International Mobile Subscriber Identifier (IMSI) is in the air interface. Clear text transmission, causing the attacker to obtain the IMSI from the air interface for a series of attacks.
第五代(5th-Generation,5G)移动通信技术为了缓解攻击者利用空口获取的IMSI进行攻击,在双向鉴权完成前,使用加密的用户隐藏标识(Subscription Concealed Identifier,SUCI)来代替未加密的用户永久标识(Subscriber Permanent Identifier,SUPI)或者IMSI。终端在接入网络进行鉴权时,需要寻址到用户的归属统一数据管理(unified data management,UDM)网元,并从用户归属的UDM中获取鉴权向量。具体的,在5G网络中,终端在接入网络进行鉴权时,向网络设备发送鉴权请求,并在鉴权请求中携带SUCI。其中,SUCI包含路由指示(Routing Indicator,RI),用以寻址到用户归属的UDM。Fifth-generation (5th-Generation, 5G) mobile communication technology In order to mitigate the attackers using the IMSI obtained through the air interface to attack, before the two-way authentication is completed, an encrypted user concealed identifier (SUCI) is used instead of the unencrypted User Permanent Identifier (SUPI) or IMSI. When the terminal accesses the network for authentication, it needs to address the user's home unified data management (UDM) network element, and obtain the authentication vector from the UDM to which the user belongs. Specifically, in a 5G network, when the terminal accesses the network for authentication, the terminal sends an authentication request to the network device, and carries the SUCI in the authentication request. Among them, the SUCI includes a routing indicator (RI), which is used to address the UDM to which the user belongs.
目前,通常采用静态配置RI与UDM的对应关系来确保RI寻址到对应的UDM。但是,这种静态配置的方式缺乏灵活性,在5G网络的许多场景中,无法适应5G丰富的业务需求。Currently, a static configuration of the correspondence between RI and UDM is usually used to ensure that RI is addressed to the corresponding UDM. However, this static configuration method lacks flexibility, and in many scenarios of 5G networks, it cannot adapt to the rich service requirements of 5G.
发明内容Summary of the Invention
本申请实施例提供一种路由方法、装置及系统,可以更改SUCI中的RI信息,以更加灵活的寻址到用户归属的UDM,适应5G丰富的业务需求。The embodiments of the present application provide a routing method, device, and system that can change the RI information in SUCI to more flexibly address the UDM to which the user belongs, and adapt to the rich service requirements of 5G.
为达到上述目的,本申请实施例采用如下技术方案:To achieve the above purpose, the embodiments of the present application adopt the following technical solutions:
第一方面,本申请实施例提供一种路由方法,该方法可以应用于AUSF或者AUSF中的芯片中,该方法包括:认证服务器功能AUSF网元向第一统一数据管理UDM网元发送第一鉴权向量获取请求;若AUSF网元接收到第一UDM网元发送的路由指示RI,则向接入和移动性管理功能AMF网元发送RI。In a first aspect, an embodiment of the present application provides a routing method that can be applied to AUSF or a chip in AUSF. The method includes: an authentication server function AUSF network element sends a first authentication to a first unified data management UDM network element Weight vector acquisition request; if the AUSF network element receives the routing indication RI sent by the first UDM network element, it sends the RI to the access and mobility management function AMF network element.
本申请实施例提供的路由方法,AUSF向第一UDM发送第一鉴权向量获取请求,若AUSF接收到第一UDM发送的RI,则向AMF发送RI。后续,由管理终端的AMF向终端下发RI,使得终端能够更新自身的RI,以便于终端在入网进行鉴权时能够寻址到正确的UDM。In the routing method provided in the embodiment of the present application, the AUSF sends a first authentication vector acquisition request to the first UDM, and if the AUSF receives the RI sent by the first UDM, it sends the RI to the AMF. Subsequently, the AMF of the management terminal sends the RI to the terminal, so that the terminal can update its own RI, so that the terminal can address the correct UDM when it enters the network for authentication.
在一种可能的设计中,在AUSF网元向第一UDM网元发送第一鉴权向量获取请求之后,AUSF网元还可以执行如下步骤:In a possible design, after the AUSF network element sends a first authentication vector acquisition request to the first UDM network element, the AUSF network element may further perform the following steps:
若AUSF网元接收到第一UDM网元发送的重定向消息,则AUSF网元根据重定向消息向第二UDM网元发送第二鉴权向量获取请求;AUSF网元接收第二UDM网元发送的RI;以及AUSF网元向AMF网元发送RI。If the AUSF network element receives the redirect message sent by the first UDM network element, the AUSF network element sends a second authentication vector acquisition request to the second UDM network element according to the redirect message; the AUSF network element receives the second UDM network element and sends it. RI; and the AUSF network element sends the RI to the AMF network element.
可见,采用上述路由方法,即使AUSF将用户的第一鉴权向量获取请求路由到一个非归属UDM(第一UDM)上,由于该第一UDM向AUSF发送重定向消息,AUSF仍能够根据该重定向消息为用户执行下一次寻址归属UDM的操作,提升了寻址成功的概率。It can be seen that with the above routing method, even if AUSF routes the user's first authentication vector acquisition request to a non-home UDM (first UDM), since the first UDM sends a redirect message to AUSF, AUSF can still The directional message performs the next operation of addressing the home UDM for the user, which improves the probability of successful addressing.
在一种可能的设计中,为了对RI进行完整性保护,AUSF网元执行如下步骤:In a possible design, in order to protect the integrity of the RI, the AUSF network element performs the following steps:
AUSF网元根据完整性保护密钥以及RI确定RI的完整性验证码;AUSF网元向AMF网元发送完整性验证码。The AUSF network element determines the integrity verification code of the RI according to the integrity protection key and the RI; the AUSF network element sends the integrity verification code to the AMF network element.
可选的,AUSF可基于自身的预设策略生成RI的完整性验证码,预设策略例如包括但不限于接收到UDM网元下发的RI。当然,AUSF网元还可以在接收到UDM网元发送的完整性保护请求消息后,生成RI的完整性验证码,具体的,AUSF网元接收第一UDM网元或第二UDM网元发送的完整性保护请求消息,并在该完整性保护请求消息的触发下生成RI的完整性验证码,其中,完整性保护请求消息用于指示AUSF生成针对RI的完整性验证码。Optionally, the AUSF may generate an RI integrity verification code based on a preset policy of the AUSF. The preset policy includes, but is not limited to, receiving the RI issued by the UDM network element. Of course, the AUSF network element may also generate an RI integrity verification code after receiving the integrity protection request message sent by the UDM network element. Specifically, the AUSF network element receives the first UDM network element or the second UDM network element. An integrity protection request message, and an RI integrity verification code is generated under the trigger of the integrity protection request message, where the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI.
第二方面,本申请实施例提供一种路由方法,该方法可以应用于UDM或者UDM中的芯片中,该方法包括:In a second aspect, an embodiment of the present application provides a routing method. The method may be applied to a UDM or a chip in the UDM. The method includes:
第一统一数据管理UDM网元接收认证服务器功能AUSF网元发送的第一鉴权向量获取请求;响应于第一鉴权向量获取请求,第一UDM网元向AUSF网元发送重定向消息或路由指示RI。The first unified data management UDM network element receives a first authentication vector acquisition request sent by the authentication server function AUSF network element; in response to the first authentication vector acquisition request, the first UDM network element sends a redirect message or route to the AUSF network element Indicate RI.
在一种可能的设计中,上述第一UDM向AUSF发送RI的情况具体指的是:当第一UDM网元为用户归属的UDM网元时,第一UDM网元向AUSF网元发送RI。In a possible design, the case where the first UDM sends the RI to the AUSF specifically refers to: when the first UDM network element is a UDM network element to which the user belongs, the first UDM network element sends the RI to the AUSF network element.
在一种可能的设计中,上述第一UDM向AUSF发送重定向消息的情况具体指的是:当第一UDM网元不是用户归属的UDM网元时,则第一UDM网元向AUSF网元发送重定向消息。In a possible design, the case where the first UDM sends a redirect message to the AUSF specifically refers to: when the first UDM network element is not a UDM network element to which the user belongs, the first UDM network element sends the AUSF network element Send a redirect message.
在一种可能的设计中,第一UDM在终端请求用户数据的过程中指示AUSF生成针对RI的完整性验证码,具体的,第一UDM网元接收AMF网元发送的用户数据获取请求消息;第一UDM网元向AUSF网元发送完整性保护请求消息,完整性保护请求消息用于指示AUSF网元生成针对RI的完整性验证码。In a possible design, the first UDM instructs the AUSF to generate an integrity verification code for the RI in the process of the terminal requesting user data. Specifically, the first UDM network element receives a user data acquisition request message sent by the AMF network element; The first UDM network element sends an integrity protection request message to the AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate an integrity verification code for the RI.
在一种可能的设计中,在第一UDM网元向AUSF网元发送完整性保护请求消息之后,第一UDM网元接收AUSF网元发送的完整性验证码。In a possible design, after the first UDM network element sends an integrity protection request message to the AUSF network element, the first UDM network element receives the integrity verification code sent by the AUSF network element.
可以理解的是,若AUSF在双向鉴权过程中已经生成针对RI的完整性验证码,则在接收到第一UDM发送的完整性保护请求消息后,AUSF直接向第一UDM发送RI完整性验证码,或者,若在接收到第一UDM发送的完整性保护请求消息后,AUSF发现自身还未生成RI的完整性验证码,则此时生成RI的完整性验证码,并向第一UDM发送生成的RI完整性验证码。It can be understood that if the AUSF has generated an integrity verification code for the RI during the two-way authentication process, after receiving the integrity protection request message sent by the first UDM, the AUSF directly sends the RI integrity verification to the first UDM. Or, if after receiving the integrity protection request message sent by the first UDM, the AUSF finds that it has not yet generated an RI integrity verification code, it generates an RI integrity verification code at this time and sends it to the first UDM Generated RI integrity verification code.
其中,上述第一UDM网元向AUSF网元发送RI,包括:第一UDM网元向AUSF网元发送经过完整性验证码保护的RI。The sending of the RI to the AUSF network element by the first UDM network element includes: sending, by the first UDM network element, the RI protected by the integrity verification code to the AUSF network element.
第三方面,本申请实施例提供一种路由方法,该方法可以应用于终端或者终端中的 芯片中,该方法包括:In a third aspect, an embodiment of the present application provides a routing method, which can be applied to a terminal or a chip in the terminal. The method includes:
终端接收接入和移动性管理功能AMF网元发送的路由指示RI,并利用RI更新用户隐藏标识SUCI的信息。The terminal receives the routing indication RI sent by the access and mobility management function AMF network element, and uses the RI to update the user's hidden identification SUCI information.
采用上述路由方法,终端可以接收网络侧下发的更新后的RI,并更新自身存储的SUCI信息,后续,终端可利用更新后SUCI中包含的RI寻址到用户的归属UDM。With the above routing method, the terminal can receive the updated RI issued by the network side and update the SUCI information stored in itself. Subsequently, the terminal can use the RI included in the updated SUCI to address the user's home UDM.
在一种可能的设计中,在对RI进行完整性保护的情况下,若终端接收到RI对应的完整性验证码,则利用完整性验证码对RI进行完整性验证。In a possible design, in the case of performing integrity protection on the RI, if the terminal receives the integrity verification code corresponding to the RI, the integrity verification code is used to perform integrity verification on the RI.
其中,终端利用RI更新SUCI的信息,具体可以实现为:若对RI的完整性验证成功,则终端利用RI更新SUCI的信息。Wherein, the terminal uses the RI to update the SUCI information, which can be specifically implemented as follows: if the integrity verification of the RI is successful, the terminal uses the RI to update the SUCI information.
在一种可能的设计中,终端接收AMF发送的RI,具体可以实现为如下步骤:In a possible design, the terminal receiving the RI sent by the AMF may be specifically implemented as follows:
终端接收AMF发送的非接入层安全模式命令NAS SMC消息,NAS SMC消息携带RI。The terminal receives the non-access layer security mode command NAS SMC message sent by the AMF, and the NAS SMC message carries the RI.
采用该路由方法,AMF可以基于SMC的完整性保护机制,对该NAS SMC消息携带的RI进行完整性保护。Using this routing method, the AMF can perform integrity protection on the RI carried in the NAS SMC message based on the integrity protection mechanism of the SMC.
第四方面,本申请实施例提供一种路由方法,该方法应用于UDM或者UDM的芯片中,该方法包括:当用户归属的统一数据管理UDM网元由第一UDM变化为第二UDM时,第一UDM网元向接入和移动性管理功能AMF网元发送路由指示RI。In a fourth aspect, an embodiment of the present application provides a routing method, which is applied to a UDM or a UDM chip. The method includes: when a unified data management UDM network element to which a user belongs changes from a first UDM to a second UDM, The first UDM network element sends a routing indication RI to the access and mobility management function AMF network element.
这里,第一UDM向AMF发送的RI为第二UDM对应的RI。Here, the RI sent by the first UDM to the AMF is the RI corresponding to the second UDM.
可见,采用上述第一UDM主动发起更新RI的路由方法,当第一UDM获知用户的归属UDM已发生变化,第一UDM可以直接将更新后的用户归属UDM(即第二UDM)对应的RI下发给AMF,节约了中间的信令流程,降低了网络资源开销。It can be seen that with the above-mentioned first UDM actively initiating the RI update routing method, when the first UDM learns that the user's home UDM has changed, the first UDM can directly update the updated user to the RI corresponding to the UDM (that is, the second UDM) It is sent to the AMF, which saves the intermediate signaling process and reduces network resource overhead.
在一种可能的设计中,若第一UDM确定需对RI进行完整性保护,则第一UDM可以执行如下步骤:第一UDM网元向AUSF网元发送完整性保护请求消息,完整性保护请求消息用于指示AUSF生成针对RI的完整性验证码;第一UDM网元接收AUSF网元发送的RI的完整性验证码;第一UDM向AMF网元发送完整性验证码。In a possible design, if the first UDM determines that integrity protection is required for the RI, the first UDM may perform the following steps: the first UDM network element sends an integrity protection request message to the AUSF network element, and the integrity protection request The message is used to instruct the AUSF to generate an integrity verification code for the RI; the first UDM network element receives the integrity verification code of the RI sent by the AUSF network element; the first UDM sends the integrity verification code to the AMF network element.
第五方面,本申请实施例提供一种路由方法,该方法应用于AUSF或者AUSF芯片中,该方法包括:In a fifth aspect, an embodiment of the present application provides a routing method. The method is applied to an AUSF or an AUSF chip. The method includes:
认证服务器功能AUSF网元接收第一统一数据管理UDM网元发送的完整性保护请求消息,完整性保护请求消息携带路由指示RI;AUSF网元根据完整性保护密钥和RI生成RI的完整性验证码;AUSF网元向第一UDM网元发送完整性验证码。Authentication server function AUSF network element receives the integrity protection request message sent by the first unified data management UDM network element, the integrity protection request message carries the routing instruction RI; the AUSF network element generates the integrity verification of the RI according to the integrity protection key and the RI Code; the AUSF network element sends an integrity verification code to the first UDM network element.
第六方面,本申请实施例提供一种路由方法,该方法应用于终端或者终端的芯片中,该方法包括:终端接收接入和移动性管理功能AMF网元发送的路由指示RI;终端利用RI更新用户隐藏标识SUCI的信息。In a sixth aspect, an embodiment of the present application provides a routing method, which is applied to a terminal or a chip of the terminal. The method includes: the terminal receives a routing instruction RI sent by an access and mobility management function AMF network element; the terminal uses the RI Update the user hidden information SUCI.
在一种可能的设计中,若终端接收到RI对应的完整性验证码,也就是对RI进行了完整性保护,则终端利用完整性验证码对RI进行完整性验证。In a possible design, if the terminal receives an integrity verification code corresponding to the RI, that is, integrity protection is performed on the RI, the terminal uses the integrity verification code to perform integrity verification on the RI.
终端利用RI更新SUCI的信息,具体实现为:若对RI的完整性验证成功,则终端利用RI更新SUCI的信息。The terminal uses the RI to update the SUCI information. The specific implementation is: if the integrity verification of the RI is successful, the terminal uses the RI to update the SUCI information.
在用户的归属UDM由第一UDM变化为第二UDM时,终端可注销在第一UDM中的相关信息,并重注册到第二UDM上,可选的,终端发起重注册,若终端获知自身存储的RI发生变化,则终端注册到RI所指示的第二UDM。或者,AMF发起重注册,具体的,AMF向终端发送注销请求消息,且注销请求消息携带的原因值指示RI变更,终端在接收该注销 请求消息后,注册到RI所指示的第二UDM。When the user's home UDM changes from the first UDM to the second UDM, the terminal can deregister the relevant information in the first UDM and re-register to the second UDM. Optionally, the terminal initiates re-registration. If the terminal learns its own storage, If the RI of the RI changes, the terminal registers with the second UDM indicated by the RI. Alternatively, the AMF initiates re-registration. Specifically, the AMF sends a deregistration request message to the terminal, and the reason value carried in the deregistration request message indicates that the RI is changed. After receiving the deregistration request message, the terminal registers with the second UDM indicated by the RI.
第七方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于向第一统一数据管理UDM网元发送第一鉴权向量获取请求;若AUSF网元接收到第一UDM网元发送的路由指示RI,则向接入和移动性管理功能AMF网元发送RI。In a seventh aspect, an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver. The transceiver is configured to send a first authentication vector acquisition request to the first unified data management UDM network element; if the AUSF network element receives the routing instruction RI sent by the first UDM network element, it sends the access and mobility management Function AMF network element sends RI.
在一种可能的设计中,收发器,还用于若接收到第一UDM网元发送的重定向消息,则根据重定向消息向第二UDM网元发送第二鉴权向量获取请求;接收第二UDM网元发送的RI;以及向AMF网元发送RI。In a possible design, the transceiver is further configured to: if a redirect message sent by the first UDM network element is received, send a second authentication vector acquisition request to the second UDM network element according to the redirect message; RIs sent by two UDM network elements; and RIs sent to AMF network elements.
在一种可能的设计中,处理器,用于根据完整性保护密钥以及RI确定RI的完整性验证码;收发器,还用于向AMF网元发送完整性验证码。In a possible design, the processor is configured to determine the integrity verification code of the RI according to the integrity protection key and the RI; the transceiver is further configured to send the integrity verification code to the AMF network element.
在一种可能的设计中,收发器,还用于接收第一UDM网元或第二UDM网元发送的完整性保护请求消息,完整性保护请求消息用于指示AUSF生成针对RI的完整性验证码。In a possible design, the transceiver is further configured to receive an integrity protection request message sent by the first UDM network element or the second UDM network element, and the integrity protection request message is used to instruct the AUSF to generate an integrity verification for the RI code.
第八方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于接收认证服务器功能AUSF网元发送的第一鉴权向量获取请求;响应于第一鉴权向量获取请求,向AUSF网元发送重定向消息或路由指示RI。In an eighth aspect, an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver. The transceiver is configured to receive a first authentication vector acquisition request sent by an authentication server function AUSF network element; and in response to the first authentication vector acquisition request, send a redirect message or a routing instruction RI to the AUSF network element.
在一种可能的设计中,收发器,用于向AUSF网元发送RI,包括:用于当第一UDM网元为用户归属的UDM网元时,向AUSF网元发送RI。In a possible design, the transceiver is configured to send the RI to the AUSF network element, including: when the first UDM network element is a UDM network element to which the user belongs, send the RI to the AUSF network element.
在一种可能的设计中,收发器,用于向AUSF网元发送重定向消息,包括:用于当第一UDM网元不是用户归属的UDM网元时,向AUSF网元发送重定向消息。In a possible design, the transceiver is configured to send a redirection message to the AUSF network element, and includes: when the first UDM network element is not a UDM network element to which the user belongs, sending a redirection message to the AUSF network element.
在一种可能的设计中,收发器,还用于接收AMF网元发送的用户数据获取请求消息;向AUSF网元发送完整性保护请求消息,完整性保护请求消息用于指示AUSF网元生成针对RI的完整性验证码。In a possible design, the transceiver is further configured to receive a user data acquisition request message sent by the AMF network element; send an integrity protection request message to the AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate RI integrity verification code.
在一种可能的设计中,收发器,还用于向AUSF网元发送完整性保护请求消息;接收AUSF网元发送的完整性验证码;收发器,用于向AUSF网元发送RI,包括:用于向AUSF网元发送经过完整性验证码保护的RI。In a possible design, the transceiver is further configured to send an integrity protection request message to the AUSF network element; receive the integrity verification code sent by the AUSF network element; the transceiver is configured to send the RI to the AUSF network element, including: It is used to send the RI protected by the integrity verification code to the AUSF network element.
第九方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于接收接入和移动性管理功能AMF网元发送的路由指示RI;处理器,用于利用RI更新用户隐藏标识SUCI的信息。In a ninth aspect, an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver. The transceiver is configured to receive the routing indication RI sent by the access and mobility management function AMF network element; and the processor is configured to use the RI to update the user's hidden identification SUCI information.
在一种可能的设计中,处理器,还用于若收发器接收到RI对应的完整性验证码,则利用完整性验证码对RI进行完整性验证;处理器,用于利用RI更新SUCI的信息,包括:用于若对RI的完整性验证成功,则利用RI更新SUCI的信息。In a possible design, the processor is further configured to use the integrity verification code to verify the integrity of the RI if the transceiver receives the integrity verification code corresponding to the RI; the processor is configured to use the RI to update the SUCI. The information includes information for updating the SUCI by using the RI if the integrity verification of the RI is successful.
在一种可能的设计中,收发器,用于接收AMF发送的RI,包括:用于接收AMF发送的非接入层安全模式命令NAS SMC消息,NAS SMC消息携带RI。In a possible design, the transceiver is configured to receive the RI sent by the AMF, including: receiving a non-access layer security mode command NAS SMC message sent by the AMF, and the NAS SMC message carries the RI.
第十方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于当用户归属的统一数据管理UDM网元由第一UDM变化为第二UDM时,向接入和移动性管理功能AMF网元发送路由指示RI。According to a tenth aspect, an embodiment of the present application provides a routing device. The device is provided with a processor and a transceiver. The transceiver is configured to send a routing indication RI to the access and mobility management function AMF network element when the unified data management UDM network element to which the user belongs changes from the first UDM to the second UDM.
在一种可能的设计中,收发器,还用于向AUSF网元发送完整性保护请求消息,完整性保护请求消息用于指示AUSF生成针对RI的完整性验证码;接收AUSF网元发送的RI的完整性验证码;向AMF网元发送完整性验证码。In a possible design, the transceiver is further configured to send an integrity protection request message to the AUSF network element, the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI; receive the RI sent by the AUSF network element Integrity verification code; send the integrity verification code to the AMF network element.
第十一方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于接收第一统一数据管理UDM网元发送的完整性保护请求消息,完整性 保护请求消息携带路由指示RI;处理器,用于根据完整性保护密钥和RI生成RI的完整性验证码;收发器,还用于向第一UDM网元发送完整性验证码。According to an eleventh aspect, an embodiment of the present application provides a routing device. The device is provided with a processor and a transceiver. The transceiver is configured to receive an integrity protection request message sent by the first unified data management UDM network element, the integrity protection request message carries a routing instruction RI; and the processor is configured to generate an RI according to the integrity protection key and the RI. Integrity verification code; the transceiver is further configured to send the integrity verification code to the first UDM network element.
第十二方面,本申请实施例提供一种路由装置,该装置设置有处理器和收发器。其中,收发器,用于接收接入和移动性管理功能AMF网元发送的路由指示RI;处理器,用于利用RI更新用户隐藏标识SUCI的信息。In a twelfth aspect, an embodiment of the present application provides a routing device, where the device is provided with a processor and a transceiver. The transceiver is configured to receive the routing indication RI sent by the access and mobility management function AMF network element; and the processor is configured to use the RI to update the user's hidden identification SUCI information.
在一种可能的设计中,处理器,还用于若收发器接收到RI对应的完整性验证码,则利用完整性验证码对RI进行完整性验证;处理器,用于利用RI更新SUCI的信息,包括:用于若对RI的完整性验证成功,则利用RI更新SUCI的信息。In a possible design, the processor is further configured to use the integrity verification code to verify the integrity of the RI if the transceiver receives the integrity verification code corresponding to the RI; the processor is configured to use the RI to update the SUCI. The information includes information for updating the SUCI by using the RI if the integrity verification of the RI is successful.
在一种可能的设计中,处理器,还用于若终端中存储的RI发生变化,则将终端注册到RI所指示的第二UDM。In a possible design, the processor is further configured to register the terminal to a second UDM indicated by the RI if the RI stored in the terminal changes.
在一种可能的设计中,处理器,还用于若收发器接收到AMF发送的注销请求消息,且注销请求消息携带的原因值指示RI变更时,则将终端注册到RI所指示的第二UDM。In a possible design, the processor is further configured to register the terminal to the second indicated by the RI if the transceiver receives the deregistration request message sent by the AMF and the reason value carried in the deregistration request message indicates that the RI is changed. UDM.
第十三方面,本申请实施例提供一种路由装置,该路由装置具有实现上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面任一项的路由方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。According to a thirteenth aspect, an embodiment of the present application provides a routing device having a routing method for implementing any of the foregoing first aspect, or second aspect, or third aspect, or fourth aspect, or fifth aspect or sixth aspect. Functions. This function can be realized by hardware, and can also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第十四方面,提供一种路由装置,包括:处理器和存储器;该存储器用于存储计算机执行指令,当该路由装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该路由装置执行如上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面中任一方面中任一项的路由方法。According to a fourteenth aspect, a routing device is provided, including: a processor and a memory; the memory is configured to store computer execution instructions, and when the routing device is running, the processor executes the computer execution instructions stored in the memory, so that the The routing device executes the routing method according to any one of the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect or the sixth aspect.
第十五方面,提供一种路由装置,包括:处理器;处理器用于与存储器耦合,并读取存储器中的指令之后,根据指令执行如上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面中任一项的路由方法。According to a fifteenth aspect, a routing device is provided, including: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, execute the first or second aspect or the third aspect or the first aspect according to the instructions. The routing method of any one of the fourth aspect or the fifth aspect or the sixth aspect.
第十六方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面中任一项的路由方法。According to a sixteenth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute the first aspect or the second aspect or the third aspect or The routing method of any one of the fourth aspect or the fifth aspect or the sixth aspect.
第十七方面,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面中任一项的路由方法。A seventeenth aspect provides a computer program product containing instructions, which, when run on a computer, enables the computer to execute the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect, or the sixth aspect The routing method of any of the aspects.
第十八方面,提供一种电路系统,电路系统包括处理电路,处理电路被配置为执行如上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面中任一项的路由方法。According to an eighteenth aspect, a circuit system is provided. The circuit system includes a processing circuit configured to execute any one of the first aspect, the second aspect, or the third aspect, or the fourth aspect, or the fifth aspect, or the sixth aspect. One routing method.
第十九方面,提供一种芯片,所述芯片包括处理器,所述处理器和存储器耦合,所述存储器存储有程序指令,当所述存储器存储的程序指令被所述处理器执行时实现上述第一方面或者第二方面或者第三方面或者第四方面或者第五方面或者第六方面任意一项所述的路由方法。In a nineteenth aspect, a chip is provided. The chip includes a processor, the processor is coupled to a memory, the memory stores program instructions, and the foregoing is implemented when the program instructions stored in the memory are executed by the processor. The routing method according to any one of the first aspect, the second aspect, the third aspect, or the fourth aspect, or the fifth aspect or the sixth aspect.
第二十方面,提供一种路由系统,该路由系统包括上述方面的终端(或者终端芯片)、AMF(或者AMF中的芯片)、AUSF(或者AUSF中的芯片)以及UDM(或者UDM中的芯片)。In a twentieth aspect, a routing system is provided. The routing system includes the terminal (or terminal chip), AMF (or chip in AMF), AUSF (or chip in AUSF), and UDM (or chip in UDM) of the above aspect. ).
其中,第二方面至第二十方面中任一种设计方式所带来的技术效果可参见第一方面中不同设计方式所带来的技术效果,此处不再赘述。For the technical effects brought by any one of the design methods in the second aspect to the twentieth aspect, refer to the technical effects brought by the different design methods in the first aspect, which will not be repeated here.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本申请实施例提供的SUCI的示意图;FIG. 1 is a schematic diagram of SUCI provided by an embodiment of the present application;
图2为本申请实施例提供的5G网络架构示意图;2 is a schematic diagram of a 5G network architecture according to an embodiment of the present application;
图3为本申请实施例提供的路由系统的架构示意图;FIG. 3 is a schematic structural diagram of a routing system according to an embodiment of the present application; FIG.
图4为本申请实施例提供的通信设备的结构示意图;4 is a schematic structural diagram of a communication device according to an embodiment of the present application;
图5为本申请实施例提供的路由方法的流程图;5 is a flowchart of a routing method according to an embodiment of the present application;
图6为本申请实施例提供的路由方法的流程图;6 is a flowchart of a routing method according to an embodiment of the present application;
图7为本申请实施例提供的路由方法的流程图;7 is a flowchart of a routing method according to an embodiment of the present application;
图8为本申请实施例提供的路由方法的流程图;8 is a flowchart of a routing method according to an embodiment of the present application;
图9为本申请实施例提供的路由方法的流程图;9 is a flowchart of a routing method according to an embodiment of the present application;
图10为本申请实施例提供的路由方法的流程图;10 is a flowchart of a routing method according to an embodiment of the present application;
图11为本申请实施例提供的路由方法的流程图;11 is a flowchart of a routing method according to an embodiment of the present application;
图12为本申请实施例提供的路由方法的流程图;12 is a flowchart of a routing method according to an embodiment of the present application;
图13为本申请实施例提供的路由装置的结构示意图。FIG. 13 is a schematic structural diagram of a routing apparatus according to an embodiment of the present application.
具体实施方式detailed description
首先,给出本申请实施例涉及到的技术术语:First, the technical terms involved in the embodiments of the present application are given:
SUPI:5G中的用户标识,用于表征用户的真实身份,功能类似于LTE中的IMSI。SUPI: User identification in 5G, which is used to characterize the user's true identity, and functions similar to IMSI in LTE.
SUCI:5G中为了避免使用明文的SUPI容易遭受攻击者窃取的问题,使用公钥对SUPI进行加密,加密后的密文形成SUCI。后续,网络侧设备可利用与加密公钥成对的私钥解密SUCI,得到SUPI,以获知用户的真实身份。如图1所示,为3GPP 23.003中定义的SUCI的结构。其中,SUCI包含长度为3位的移动移动国家码(mobile country code,MCC)、3位的移动网码(mobile network code,MNC)以及RI,MCC用于寻址到用户归属UDM所在的国家,MNC用于寻址到用户归属的UDM所属于的网络(例如UDM属于中国电信,或者UDM属于中国联通),RI用于寻址用户归属的UDM。SUCI中包含的其他信息的详细描述可参见现有技术,本申请实施例对此不再赘述。SUCI: In 5G, in order to avoid the problem that SUPI in plain text is vulnerable to theft by attackers, the public key is used to encrypt SUPI, and the encrypted cipher text forms SUCI. Subsequently, the network-side device can use the private key paired with the encrypted public key to decrypt SUCI to obtain SUPI to learn the user's true identity. As shown in Figure 1, it is the structure of SUCI defined in 3GPP 23.003. Among them, SUCI includes a 3-digit mobile country code (MCC), a 3-digit mobile network code (MNC), and an RI. The MCC is used to address the country where the user belongs to the UDM. The MNC is used to address the network to which the user belongs to the UDM (for example, the UDM belongs to China Telecom, or the UDM belongs to China Unicom), and the RI is used to address the UDM to which the user belongs. For a detailed description of other information included in SUCI, refer to the prior art, which is not described in the embodiment of the present application.
本申请实施例所涉及的5G网络架构如下:The 5G network architecture involved in the embodiments of this application is as follows:
如图2所示,该系统包括网络切片选择功能(Network Slice Selection Function,NSSF)、网络开放功能(Network Exposure Function,NEF)、网络存储功能(Network Repository Function,NRF)、策略控制功能(Policy Control Function,PCF)、应用功能(Application Function,AF)、统一数据管理(Unified Data Management,UDM)、鉴权服务器功能(Authentication Server Function,AUSF)、接入和移动性管理功能(Core Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、接入网(Access Network,AN)网元,其中,AN包括有线接入网和无线接入网(Radio Access Network,RAN)、用户面功能(User Plane Function,UPF)、数据网(data network,DN)网元等网元或设备以及终端。As shown in Figure 2, the system includes a Network Slice Selection Function (NSSF), a Network Open Function (NEF), a Network Storage Function (NRF), and a Policy Control Function (Policy Control). Function (PCF), Application Function (AF), Unified Data Management (UDM), Authentication Server Function (AUSF), Access and Mobility Management Function (Core, Access, and Mobility Management) Function (AMF), Session Management Function (SMF), Access Network (AN) network element, where AN includes wired access network and Radio Access Network (RAN), user Network elements or devices such as user plane functions (UPF), data network (DN) network elements, and terminals.
其中,终端通过无线(例如无线保真(Wireless-Fidelity,WiFi))或有线方式接入AN,终端通过N1与AMF通信;AN通过N3与UPF通信,AN通过N2与AMF通信;UPF 通过N4与SMF通信,UPF通过N6与DN网元通信;SMF通过N11(图2中并未示出)与AMF通信,SMF通过N10(图2中并未示出)与UDM通信,SMF通过N7(图2中并未示出)与PCF通信;AMF通过N12(图2中并未示出)与AUSF通信,AUSF通过N13(图2中并未示出)与UDM通信。Among them, the terminal accesses the AN through wireless (such as Wireless-Fidelity (WiFi)) or wired, and the terminal communicates with the AMF through N1; the AN communicates with the UPF through N3, the AN communicates with the AMF through N2; and the UPF communicates with N4 through N4 SMF communication, UPF communicates with DN network elements through N6; SMF communicates with AMF through N11 (not shown in Figure 2), SMF communicates with UDM through N10 (not shown in Figure 2), and SMF communicates with N7 (Figure 2) (Not shown in the figure) communicates with the PCF; the AMF communicates with the AUSF through N12 (not shown in FIG. 2), and the AUSF communicates with the UDM through N13 (not shown in FIG. 2).
可以理解的是,根据5G系统部署的需求,上述网元之间可采用一定方式通信(例如,终端通过N1与AMF通信),上述仅列举了与本申请实施例的技术方案相关的网元之间通信的方式,为简化描述,本申请实施例不再对其他网元之间的通信方式进行赘述。It can be understood that according to the requirements of 5G system deployment, the above-mentioned network elements can communicate in a certain manner (for example, the terminal communicates with the AMF through N1). The above only lists the network elements related to the technical solution in the embodiment of the present application. For the purpose of simplifying the description, the embodiments of this application will not repeat the communication modes between other network elements.
可选的,本申请实施例中所涉及到的终端(terminal)可以包括各种具有通信功能的手持设备、可穿戴设备、计算设备或连接到调制解调器的其它处理设备;还可以包括个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、膝上型电脑(laptop computer)、机器类型通信(machine type communication,MTC)终端、用户设备(user equipment,UE)等。Optionally, the terminals involved in the embodiments of the present application may include various handheld devices, wearable devices, computing devices, or other processing devices connected to a modem with a communication function; and may also include a personal digital assistant ( A personal digital assistant (PDA) computer, a tablet computer, a laptop computer, a machine type communication (MTC) terminal, a user equipment (UE), and the like.
可选的,图2中的各个网元的名字以及各个网元之间的接口名字只是一个示例,具体实现中各个网元或者各个网元之间的接口的名字可能为其他名字,或者网元也可以称之为实体,本申请实施例对此不作具体限定。核心网的全部或者部分网元可以是物理上的实体网元,也可以是虚拟化的网元,在此不做限定。Optionally, the names of the network elements in FIG. 2 and the names of the interfaces between the network elements are only examples. In specific implementation, the names of the network elements or the interfaces between the network elements may be other names, or network elements. It may also be called an entity, which is not specifically limited in the embodiment of the present application. All or part of the network elements of the core network may be physical physical network elements or virtualized network elements, which is not limited herein.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Wherein, in the description of the present application, unless otherwise stated, "/" represents or means, for example, A / B may represent A or B; "and / or" herein is merely an association describing an associated object Relationship, which means that there can be three kinds of relationships, for example, A and / or B, can mean: there are three cases of A alone, A and B, and B alone. And, in the description of the present application, unless stated otherwise, "plurality" means two or more. In addition, in order to facilitate a clear description of the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as “first” and “second” are used to distinguish between the same or similar items having substantially the same functions and functions. Those skilled in the art can understand that the words "first", "second" and the like do not limit the number and execution order, and the words "first" and "second" are not necessarily different.
在本申请的实施例中,某一网元(例如:A网元)获取来自另一网元(例如:B网元)的信息,可以指A网元直接从B网元接收信息,也可以指A网元经其他网元(例如:C网元)从B网元接收信息。当A网元经C网元从B网元接收信息时,C网元可以对信息进行透传,也可以将信息进行处理,例如:将信息携带在不同的消息中进行传输或者对信息进行筛选,只发送筛选后的信息给A网元。类似的,在本申请的各实施例中,A网元向B网元发送信息,可以指A网元直接向B网元发送信息,也可以指A网元经其他网元(例如:C网元)向B网元发送信息。In the embodiment of the present application, when a certain network element (for example: network element A) obtains information from another network element (for example: network element B), it can mean that network element A receives information directly from network element B, or It means that network element A receives information from network element B through other network elements (for example: network element C). When network element A receives information from network element B through network element C, network element C can transparently transmit the information or process the information, for example, carrying the information in different messages for transmission or filtering the information Only send the filtered information to network A. Similarly, in the embodiments of the present application, the network element A sends information to the network element B, which can refer to the network element A directly sending information to the network element B, or the network element A through other network elements (for example, the C network) Yuan) to send information to network element B.
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。In addition, the network architecture and service scenarios described in the embodiments of the present application are intended to more clearly illustrate the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided in the embodiments of the present application. With the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
如图3所示,本申请实施例提供一种路由系统300,该路由系统300包括:终端301、AMF 302、AUSF 303以及至少一个UDM 304(图3中仅示例性的给出一个)。As shown in FIG. 3, an embodiment of the present application provides a routing system 300. The routing system 300 includes: a terminal 301, an AMF 302, an AUSF 303, and at least one UDM 304 (only one is given as an example in FIG. 3).
其中,UDM 304,用于接收来自AUSF的获取鉴权向量的请求消息,并根据该请求消息判断自身是否为用户归属的UDM,若自身是用户归属的UDM,则根据本地的策略向AUSF 303发送RI,若自身不是用户归属的UDM,则向AUSF 303发送重定向消息,使得AUSF 303将获取鉴权向量的消息重定向到另一UDM,或者该UDM直接向另一UDM发送获取鉴权向量的请求消息。还用于接收AMF发送的获取用户数据的请求消息,并在用户数据获取响应中携带RI,将RI下发给AMF 302。还用于在确定用户的归属UDM发生变化后,主动发起更新终端RI的流程,具体的,UDM 304在确定需更新终端RI时,主动通过AMF 302将RI下发给终端301,以便于终端301更新SUCI中的RI。Among them, UDM 304 is used to receive a request message for obtaining an authentication vector from AUSF, and determine whether it is a UDM to which the user belongs according to the request message. If it is a UDM to which the user belongs, it sends it to AUSF 303 according to local policies RI, if it is not the UDM to which the user belongs, it sends a redirect message to AUSF 303, so that AUSF 303 redirects the message to obtain the authentication vector to another UDM, or the UDM directly sends the authentication vector to another UDM Request message. It is also used to receive a request message for acquiring user data sent by the AMF, and carry the RI in the user data acquisition response, and send the RI to the AMF 302. It is also used to actively initiate the process of updating the terminal RI after determining that the user's home UDM has changed. Specifically, when UDM 304 determines that the terminal RI needs to be updated, it actively sends the RI to terminal 301 through AMF 302 to facilitate terminal 301 Update RI in SUCI.
AUSF 303,用于向UDM 304发送获取鉴权向量的请求消息,从而在后续流程中获取由UDM 304下发的RI,并在接收到该UDM 304发送的RI后,向AMF 302发送该RI。或者,当接收到图3所示的UDM 304发送的重定向消息后,根据自身的预配置策略向另一UDM发送获取鉴权向量的请求消息,以请求用以寻址用户归属UDM的RI。 AUSF 303 is used to send a request message for obtaining an authentication vector to UDM 304, so as to obtain the RI issued by UDM 304 in subsequent processes, and after receiving the RI sent by UDM 304, send the RI to AMF 302. Alternatively, after receiving the redirect message sent by UDM 304 shown in FIG. 3, according to its own pre-configured policy, a request message for obtaining an authentication vector is sent to another UDM to request the RI for addressing the user's home UDM.
AMF 302,用于接收AUSF 303或者UDM304下发的RI,并将该RI下发给终端301。 AMF 302 is used to receive the RI issued by AUSF 303 or UDM304, and send the RI to the terminal 301.
终端301,用于接收来自AMF 302的RI,并利用该RI更新SUCI的信息。The terminal 301 is configured to receive an RI from the AMF 302, and use the RI to update SUCI information.
需要说明的是,图3中仅示出了与本申请实施例技术方案相关的网元之间的连接关系,各个网元之间可能还存在其他连接关系,这里不再赘述。It should be noted that FIG. 3 only shows the connection relationship between the network elements related to the technical solution in the embodiment of the present application, and there may be other connection relationships between the network elements, which will not be repeated here.
本申请实施例提供的路由系统可以应用于如图2所示的5G系统或者后续的演进系统中。The routing system provided in the embodiment of the present application may be applied to a 5G system shown in FIG. 2 or a subsequent evolved system.
可选的,图3中的终端301、AMF 302、AUSF 303或者UDM 304可以分别作为独立设备,还可以在一个设备中实现上述网元的功能,例如可以实现为一个设备内的不同功能模块,本申请实施例对此不作具体限定。可以理解的是,上述功能模块既可以是硬件设备中的网络元件,也可以是在硬件设备上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。Optionally, the terminals 301, AMF, 302, AUSF, 303, or UDM 304 in FIG. 3 can be used as independent devices, and the functions of the network elements described above can also be implemented in one device, for example, different function modules in one device. This embodiment of the present application does not specifically limit this. It can be understood that the foregoing function module may be a network element in a hardware device, a software function running on a hardware device, or a virtualization function instantiated on a platform (for example, a cloud platform).
例如,本申请实施例中的终端、AMF、AUSF或者UDM可以通过图4中的通信设备来实现。图4所示为本申请实施例提供的通信设备的硬件结构示意图。该通信设备400包括至少一个处理器401,通信线路402,存储器403以及至少一个通信接口404。For example, the terminal, AMF, AUSF, or UDM in the embodiment of the present application may be implemented by the communication device in FIG. 4. FIG. 4 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application. The communication device 400 includes at least one processor 401, a communication line 402, a memory 403, and at least one communication interface 404.
处理器401可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。The processor 401 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors for controlling the execution of the program of the solution of the present application. integrated circuit.
通信线路402可包括一通路,在上述组件之间传送信息。The communication line 402 may include a path for transmitting information between the aforementioned components.
通信接口404,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。The communication interface 404 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
存储器403可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路402与处理器相连接。存储器也可以和处理器集成在一起。The memory 403 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (RAM) or other types that can store information and instructions The dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM-ready-only memory (EEPROM)), compact disc (read-only memory (CD-ROM)) or other optical disk storage, optical disk storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this. The memory may exist independently, and is connected to the processor through the communication line 402. The memory can also be integrated with the processor.
其中,存储器403用于存储执行本申请实施例方案的计算机执行指令,并由处理器401来控制执行。处理器401用于执行存储器403中存储的计算机执行指令,从而实现本申请下述实施例提供的路由方法。The memory 403 is configured to store computer execution instructions for executing the solutions in the embodiments of the present application, and the execution is controlled by the processor 401. The processor 401 is configured to execute computer execution instructions stored in the memory 403, so as to implement the routing method provided in the following embodiments of the present application.
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。Optionally, the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
在具体实现中,作为一种实施例,处理器401可以包括一个或多个CPU,例如图4中的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 401 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 4.
在具体实现中,作为一种实施例,通信设备400可以包括多个处理器。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the communication device 400 may include multiple processors. Each of these processors may be a single-CPU processor or a multi-CPU processor. A processor herein may refer to one or more devices, circuits, and / or processing cores for processing data (such as computer program instructions).
可以理解的是,图4仅示出了通信设备的一种示例性的硬件结构示意图,为了实现本申请实施例的技术方案,通信设备400还可能包括其他的组件,本申请实施例并不对此进行限制。It can be understood that FIG. 4 only shows an exemplary hardware structure diagram of a communication device. In order to implement the technical solution of the embodiment of the present application, the communication device 400 may further include other components. Limitation.
上述的通信设备400可以是一个通用设备或者是一个专用设备。在具体实现中,通信设备400可以是具有如图4中类似结构的设备。本申请实施例不限定通信设备400的类型。The above-mentioned communication device 400 may be a general-purpose device or a special-purpose device. In a specific implementation, the communication device 400 may be a device having a similar structure as in FIG. 4. The embodiment of the present application does not limit the type of the communication device 400.
需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,在此统一说明,以下不再赘述。It should be noted that the names of the messages or the names of the parameters in the messages between the various network elements in the following embodiments of this application are only examples, and other names may also be used in the specific implementation, which are uniformly described here and will not be described below. To repeat.
可选的,本申请实施例提供的路由方法应用于终端与网络侧进行双向鉴权相关的流程中,其中,终端可在不同的场景中与网络侧进行双向鉴权流程,例如,终端注册到网络时、终端位置更新时、终端呼叫处理过程中,下文以终端注册场景中与网络侧进行双向鉴权为例对本申请实施例的路由方法进行说明。Optionally, the routing method provided in the embodiment of the present application is applied to a process in which a terminal performs two-way authentication with a network side. The terminal may perform a two-way authentication process with the network side in different scenarios. For example, the terminal registers with During network, terminal location update, and terminal call processing, the following describes the routing method in the embodiment of the present application by taking bidirectional authentication with the network side in the terminal registration scenario as an example.
如图5所示,本申请实施例提供一种路由方法,包括如下步骤:As shown in FIG. 5, an embodiment of the present application provides a routing method, including the following steps:
S501、终端向AMF发送注册请求消息(Registration Request)。S501. The terminal sends a registration request message (Registration Request) to the AMF.
相应的,AMF接收终端发送的注册请求消息。Correspondingly, the AMF receives a registration request message sent by the terminal.
其中,注册请求消息中携带用户的SUCI。The registration request message carries the user's SUCI.
S502、AMF根据SUCI确定AUSF。S502. The AMF determines the AUSF according to the SUCI.
其中,可替换的,AMF根据SUCI和第一配置策略确定AUSF。Among them, alternatively, the AMF determines the AUSF according to the SUCI and the first configuration policy.
其中,可替换的,AMF根据SUPI确定AUSF。(如果AMF中存储有SUCI和SUPI的对应关系的话,可获取与SUCI对应的SUPI)。Among them, alternatively, the AMF determines the AUSF according to the SUPI. (If the correspondence between SUCI and SUPI is stored in the AMF, the SUPI corresponding to SUCI can be obtained).
可选的,在一些场景中,在一些国家或地区,用户数较少,全部用户归属于一个或少数几个UDM,相应的,网络中设置的AUSF的数目可能也较少,可以将RI设置为默认值,此时,RI不用于指向AUSF,RI也不用于指向UDM。或者,在未来的演进场景中,当RI不用于指示UDM时,SUCI中可以不包含RI。在这些场景中,S502可实现为:AMF根据SUCI中的MCC和MNC和第一配置策略选择一个AUSF。Optionally, in some scenarios, in some countries or regions, the number of users is small, and all users belong to one or a few UDMs. Accordingly, the number of AUSFs set in the network may also be small. This is the default value. At this time, RI is not used to point to AUSF, and RI is not used to point to UDM. Or, in the future evolution scenario, when RI is not used to indicate UDM, SUCI may not include RI. In these scenarios, S502 may be implemented as follows: the AMF selects an AUSF according to the MCC and MNC in the SUCI and the first configuration policy.
可选的,第一配置策略为选取最邻近的AUSF(或预设区域范围内的AUSF),示例性的,AMF选取距离当前终端最近的AUSF。或者,AMF按照轮询方式为用户选取AUSF,均衡各个AUSF之间的负载。或者,AMF按照AUSF的优先级为用户选取优先级较高的AUSF。Optionally, the first configuration strategy is to select the nearest AUSF (or AUSF in the preset area). For example, the AMF selects the AUSF closest to the current terminal. Alternatively, the AMF selects the AUSF for the user in a polling manner, and balances the load between each AUSF. Alternatively, the AMF selects an AUSF with a higher priority for the user according to the priority of the AUSF.
可选的,在另一些场景中,在一些国家或地区,用户数较多,用户分别归属于多个 UDM。相应的,需RI来指示AUSF,以及指示用户所归属的UDM。在这种场景中,S502可实现为:AMF根据SUCI中的MCC、MNC以及RI确定AUSF。作为一种可能的实现方式,AMF根据SUCI中的MCC、MNC和RI查询NRF,进而获取NRF中MCC、MNC和RI对应的AUSF。Optionally, in other scenarios, in some countries or regions, the number of users is large, and the users belong to multiple UDMs. Correspondingly, RI is required to indicate AUSF and the UDM to which the user belongs. In this scenario, S502 can be implemented as: AMF determines AUSF according to MCC, MNC and RI in SUCI. As a possible implementation manner, the AMF queries the NRF according to the MCC, MNC, and RI in the SUCI, and then obtains the AUSF corresponding to the MCC, MNC, and RI in the NRF.
S503、AMF向该AUSF发送鉴权请求消息。S503. The AMF sends an authentication request message to the AUSF.
相应的,AUSF接收AMF发送的鉴权请求消息。Correspondingly, the AUSF receives the authentication request message sent by the AMF.
其中,鉴权请求消息携带SUCI。The authentication request message carries SUCI.
作为一种可能的实现方式,AMF调用AUSF的Nausf_UEAuthentication_Authenticate Request服务向AUSF发送鉴权请求消息。As a possible implementation manner, the AMF calls the Nausf_UEAuthentication_AuthenticateRequest service of the AUSF to send an authentication request message to the AUSF.
S504、AUSF网元根据SUCI或者根据SUCI和第二配置策略确定第一UDM。S504. The AUSF network element determines the first UDM according to the SUCI or according to the SUCI and the second configuration policy.
与AMF确定一个AUSF的流程类似,当SUCI中的RI不用于指示UDM时,S504实现为:AUSF根据SUCI中的MNC、MCC和第二配置策略(如:根据优先级或者按照轮询方式或者按照就近规则)选择一个第一UDM。在另一些实现方式中,如果每个UDM存储的私钥不相同,为了防止随机寻找的UDM上不存在解密SUCI所用的私钥,可部署一个或者一组缺省的UDM,该一个或多个UDM上包括全部用以解密的私钥,如此,AUSF优先选择该缺省的UDM或者缺省UDM组中的一个UDM。Similar to the process of AMF determining an AUSF, when the RI in SUCI is not used to indicate UDM, S504 is implemented as: AUSF according to MNC, MCC and second configuration policy in SUCI Nearest rule) Select a first UDM. In other implementations, if the private key stored in each UDM is different, in order to prevent that the private key used to decrypt SUCI does not exist on the randomly searched UDM, one or a set of default UDMs may be deployed, the one or more The UDM includes all the private keys used for decryption. In this way, AUSF preferentially selects the default UDM or a UDM in the default UDM group.
当SUCI中的RI可以指向UDM时,S504实现为:AUSF根据SUCI中的MNC、MCC以及RI确定第一UDM。当然,AUSF可以根据MNC、MCC以及RI查询NRF,以获取MNC、MCC以及RI对应的第一UDM。When the RI in SUCI can point to the UDM, S504 is implemented as: AUSF determines the first UDM according to the MNC, MCC, and RI in SUCI. Of course, the AUSF may query the NRF according to the MNC, MCC, and RI to obtain the first UDM corresponding to the MNC, MCC, and RI.
S505、AUSF向第一UDM网元发送第一鉴权向量获取请求。S505. The AUSF sends a first authentication vector acquisition request to the first UDM network element.
相应的,第一UDM接收AUSF发送的第一鉴权向量获取请求。Correspondingly, the first UDM receives a first authentication vector acquisition request sent by the AUSF.
其中,第一鉴权向量获取请求携带SUCI。可选的,第一鉴权向量获取请求携带RI下发指示。The first authentication vector acquisition request carries SUCI. Optionally, the first authentication vector acquisition request carries an RI delivery instruction.
作为一种可能的实现方式,AUSF调用第一UDM的Nudm_UEAuthentication_Get Request服务向第一UDM发送第一鉴权向量获取请求,以请求从第一UDM获取鉴权向量。As a possible implementation manner, the AUSF calls the Nudm_UEAuthentication_GetRequest service of the first UDM to send a first authentication vector acquisition request to the first UDM to request to obtain an authentication vector from the first UDM.
S506、第一UDM使用私钥解密SUCI,得到明文SUPI。S506. The first UDM uses the private key to decrypt the SUCI to obtain the plaintext SUPI.
S507、第一UDM判断自身是否为SUPI所指示用户的归属UDM,若否,则执行S508,若是,则执行S511。S507. The first UDM judges whether it is the home UDM of the user indicated by SUPI, if not, executes S508, and if so, executes S511.
作为一种可能的实现方式,第一UDM中存储有所管理用户的SUPI,在第一UDM得到用户的SUPI后,如果经查询发现自身并未存储有该SUPI,则第一UDM确定自身并非用户的归属UDM。As a possible implementation manner, the first UDM stores the SUPI of a managed user. After the first UDM obtains the user's SUPI, if it is found through query that it does not store the SUPI, the first UDM determines that it is not the user Of the UDM.
S508、第一UDM网元向所述AUSF网元发送重定向消息。S508. The first UDM network element sends a redirection message to the AUSF network element.
相应的,AUSF接收第一UDM发送的重定向消息。Correspondingly, the AUSF receives the redirect message sent by the first UDM.
作为一种可能的实现方式,第一UDM返回Nudm_UEAuthentication_Get Response服务响应向AUSF发送重定向消息。As a possible implementation manner, the first UDM returns a Nudm_UEAuthentication_GetResponse service response to send a redirect message to the AUSF.
可选的,重定向消息携带经第一UDM解密得到的明文SUPI。或者,如果第一UDM中存储有SUPI所指示的用户的归属UDM的寻址信息,则重定向消息可携带用户归属UDM的寻址信息。UDM的寻址信息包括但不限于UDM的全限定域名(Fully Qualified Domain Name,FQDN)、互联网协议(Internet Protocol,IP)地址等。Optionally, the redirect message carries the plaintext SUPI obtained by decryption by the first UDM. Alternatively, if the addressing information of the home UDM of the user indicated by SUPI is stored in the first UDM, the redirection message may carry the addressing information of the home UDM of the user. The addressing information of the UDM includes, but is not limited to, a Fully Qualified Domain Name (FQDN) of the UDM, an Internet Protocol (IP) address, and the like.
S509、AUSF网元根据所述重定向消息向第二UDM网元发送第二鉴权向量获取请求。S509. The AUSF network element sends a second authentication vector acquisition request to the second UDM network element according to the redirection message.
相应的,第二UDM接收AUSF发送的第二鉴权向量获取请求。Correspondingly, the second UDM receives a second authentication vector acquisition request sent by the AUSF.
可选的,如上文所描述,若AUSF接收的重定向消息携带经第一UDM解密的明文SUPI,则AUSF根据SUPI确定第二UDM,并向该第二UDM发送第二鉴权向量获取请求。作为另一种可能的实现方式,AUSF根据SUCI中的MCC、MNC和RI查询NRF,进而获取NRF中MCC、MNC和RI对应的UDM。若AUSF接收的重定向消息携带SUPI所指示的用户的归属UDM的寻址信息,则根据该用户归属UDM的寻址信息确定第二UDM,并向第二UDM发送第二鉴权向量获取请求。Optionally, as described above, if the redirect message received by the AUSF carries the plaintext SUPI decrypted by the first UDM, the AUSF determines the second UDM according to the SUPI, and sends a second authentication vector acquisition request to the second UDM. As another possible implementation, the AUSF queries the NRF according to the MCC, MNC, and RI in the SUCI, and then obtains the UDM corresponding to the MCC, MNC, and RI in the NRF. If the redirection message received by the AUSF carries the addressing information of the user's home UDM indicated by SUPI, the second UDM is determined according to the addressing information of the user's home UDM, and a second authentication vector acquisition request is sent to the second UDM.
可选的,第二鉴权向量获取请求携带RI下发指示。Optionally, the second authentication vector acquisition request carries an RI delivery instruction.
作为一种可能的实现方式,AUSF调用第二UDM的Nudm_UEAuthentication_Get Request服务向第二UDM发送第二鉴权向量获取请求。As a possible implementation manner, the AUSF calls the Nudm_UEAuthentication_Get Request service of the second UDM to send a second authentication vector acquisition request to the second UDM.
可见,采用上述路由方法,即使AUSF将用户的第一鉴权向量获取请求路由到一个非归属UDM(第一UDM)上,由于该第一UDM向AUSF发送重定向消息,AUSF仍能够根据该重定向消息为用户执行下一次寻址归属UDM的操作,提升了寻址成功的概率。It can be seen that with the above routing method, even if AUSF routes the user's first authentication vector acquisition request to a non-home UDM (first UDM), since the first UDM sends a redirect message to AUSF, AUSF can still The directional message performs the next operation of addressing the home UDM for the user, which improves the probability of successful addressing.
S510、第二UDM向AUSF发送RI。S510. The second UDM sends an RI to the AUSF.
相应的,所述AUSF网元接收所述第二UDM网元发送的RI。Correspondingly, the AUSF network element receives the RI sent by the second UDM network element.
作为一种可能的实现方式,S510实现为:第二UDM返回Nudm_UEAuthentication_Get Response服务响应向AUSF发送第二鉴权向量获取响应,第二鉴权向量获取响应携带RI和鉴权向量(AV)。其中,鉴权向量包含随机数(Random Challenge,RAND)、鉴权令牌(Authentication Token,AUTN)等参数。As a possible implementation manner, S510 is implemented as follows: the second UDM returns a Nudm_UEAuthentication_GetResponse service response to send a second authentication vector acquisition response to the AUSF, and the second authentication vector acquisition response carries an RI and an authentication vector (AV). The authentication vector includes parameters such as a random number (RAND) and an authentication token (AUTN).
可选的,第二UDM在接收到第二鉴权向量获取请求时,根据第二鉴权向量获取请求携带的RI下发指示向AUSF下发RI。或者,第二UDM在接收到第二鉴权向量获取请求后即可下发RI。又或者,当第二UDM接收到AUSF发送的第二向量获取请求,该第二向量获取请求携带的SUCI中RI不用于指示UDM时,又或者,第二UDM接收到AUSF发送的第二鉴权向量获取请求,发现第二鉴权向量获取请求中的RI与第二UDM对应的RI不一致时,为了便于后续终端快速的寻址到归属UDM,第二UDM下发RI。本申请实施例对触发第二UDM下发RI的条件和时机不做限定。Optionally, when receiving the second authentication vector acquisition request, the second UDM sends the RI to the AUSF according to the RI delivery instruction carried in the second authentication vector acquisition request. Or, the second UDM may issue the RI after receiving the second authentication vector acquisition request. Or, when the second UDM receives the second vector acquisition request sent by the AUSF, the RI in the SUCI carried in the second vector acquisition request is not used to indicate the UDM, or the second UDM receives the second authentication sent by the AUSF Vector acquisition request, when it is found that the RI in the second authentication vector acquisition request does not match the RI corresponding to the second UDM, in order to facilitate subsequent terminals to quickly address the home UDM, the second UDM issues the RI. The embodiment of the present application does not limit the conditions and timing of triggering the second UDM to issue the RI.
S511、所述第一UDM网元向所述AUSF网元发送RI。S511. The first UDM network element sends an RI to the AUSF network element.
相应的,所述AUSF网元接收所述第一UDM网元发送的RI。Correspondingly, the AUSF network element receives the RI sent by the first UDM network element.
作为一种可能的实现方式,S511实现为:第一UDM返回Nudm_UEAuthentication_Get Response服务响应向所述AUSF网元发送第一鉴权向量获取响应,第一鉴权向量获取响应携带RI和鉴权向量。As a possible implementation manner, S511 is implemented as follows: the first UDM returns a Nudm_UEAuthentication_GetResponse service response to send a first authentication vector acquisition response to the AUSF network element, and the first authentication vector acquisition response carries an RI and an authentication vector.
参见上文论述,本申请实施例对触发第一UDM下发RI的条件和时机也不做限定。Referring to the discussion above, the embodiment of the present application does not limit the conditions and timing of triggering the first UDM to issue the RI.
(可选的)S512、所述AUSF网元根据完整性保护密钥以及所述RI确定所述RI的完整性验证码。(Optional) S512. The AUSF network element determines an integrity verification code of the RI according to an integrity protection key and the RI.
作为一种可能的实现方式,在双向鉴权流程中,AUSF生成与双向鉴权相关的密钥1(如Kausf)、AUSF根据Kausf和密钥参数生成完整性保护密钥(Kri),并根据完整性保护密钥和RI生成RI完整性验证码(Routing Indicator-Message Authentication Code,RI-MAC)。其中,密钥参数为鉴权向量中的随机数和/或一个递增的计数器值(Counter)。相应的,AUSF可根据Kausf和鉴权向量中的随机数计算完整性保护密钥,或者,AUSF根据Kausf和计数器值计算完整性保护密钥,又或者,AUSF根据Kausf、鉴权向量中的随机数以及计数器值计算完整性保护密钥。As a possible implementation manner, in the two-way authentication process, AUSF generates a key 1 (such as Kausf) related to two-way authentication, and AUSF generates an integrity protection key (Kri) according to Kausf and key parameters, and The integrity protection key and the RI generate an RI integrity verification code (Routing Indicator-Message Authentication Code, RI-MAC). The key parameter is a random number in the authentication vector and / or an incremented counter value (Counter). Correspondingly, AUSF may calculate the integrity protection key based on Kausf and random numbers in the authentication vector, or AUSF may calculate the integrity protection key based on Kausf and the counter value, or AUSF may calculate the integrity protection key based on Kausf and the randomness in the authentication vector. Number and counter value to calculate the integrity protection key.
其中,可为计数器设置计数递增条件,示例性的,递增条件为AUSF收到UDM发送的完整性保护请求消息,也就是,每次AUSF接收到UDM的完整性保护请求消息时,AUSF中设置的计数器的计数增1。The counting increment condition can be set for the counter. For example, the increment condition is that the AUSF receives the integrity protection request message sent by the UDM, that is, each time the AUSF receives the UDM integrity protection request message, the AUSF sets the The counter counts up.
可选的,为了保护RI更新的计数器(Counter),可以使用完整性保护密钥和Counter计算Counter完整性验证码(Counter-Message Authentication Code,Counter-MAC),其中,需要指出的是,后续实施例出现的Counter以及Counter-MAC,可参考本实施例的解释。Optionally, in order to protect the counter (Counter) updated by the RI, an integrity protection key and a Counter can be used to calculate a Counter-Message Authentication Code (Counter-MAC). Among them, it should be noted that subsequent implementation For the Counter and Counter-MAC appearing in the example, refer to the explanation in this embodiment.
采用该RI完整性保护的方法,AUSF生成RI完整性验证码,能够保证RI在空口传输中不被篡改,提升RI传输的安全性。Using this method of RI integrity protection, AUSF generates RI integrity verification codes, which can ensure that RI is not tampered with during air interface transmission, and improves the security of RI transmission.
S513、AUSF向AMF网元发送所述RI。S513. The AUSF sends the RI to an AMF network element.
相应的,AMF接收AUSF发送的RI。Accordingly, the AMF receives the RI sent by the AUSF.
可选的,AUSF向AMF发送RI的同时发送RI的完整性验证码。其中,若AUSF在S512中利用Kausf和计数器值或者利用Kausf、计数器值、随机数生成完整性保护密钥,则AUSF还可向AMF发送该计数器值(Counter),并且,可选的,还可向AMF发送(Counter-MAC)。Optionally, the AUSF sends the RI integrity verification code at the same time it sends the RI to the AMF. Among them, if AUSF uses Kausf and counter value in S512 or uses Kausf, counter value, random number to generate the integrity protection key, AUSF can also send the counter value (Counter) to AMF, and, optionally, can also Send (Counter-MAC) to AMF.
S514、AMF向终端发送RI。S514. The AMF sends an RI to the terminal.
相应的,终端接收AMF发送的RI。Correspondingly, the terminal receives the RI sent by the AMF.
可选的,AMF在向终端发送RI的同时发送RI的完整性验证码。其中,在AUSF利用Kausf和计数器值生成完整性保护密钥的情况下,AMF将来自AUSF的计数器值(Counter),下发给终端,以便终端后续利用该计数器值进行完整性保护的验证,并且,可选的,还可向终端发送Counter-MAC。Optionally, the AMF sends an RI integrity verification code while sending the RI to the terminal. In the case where the AUSF uses Kausf and the counter value to generate the integrity protection key, the AMF sends the counter value (Counter) from the AUSF to the terminal, so that the terminal can use the counter value to verify the integrity protection later, and Optionally, it can also send a Counter-MAC to the terminal.
在本申请实施例中,按照消息发送的时机,网络侧可采取如下至少3种方式中的任意一种方式来具体实现向终端发送RI的流程:In the embodiment of the present application, according to the timing of message transmission, the network side may take any one of the following at least three ways to specifically implement the process of sending the RI to the terminal:
方式1:AUSF在鉴权过程中通过AMF向终端下发RI。具体的,如图6所示,S513、S514可替换为S613和S614:Method 1: AUSF issues RI to the terminal through AMF during the authentication process. Specifically, as shown in FIG. 6, S513 and S514 can be replaced with S613 and S614:
S613、AUSF向AMF发送第一鉴权响应。S613. The AUSF sends a first authentication response to the AMF.
相应的,AMF接收AUSF发送的第一鉴权响应。Correspondingly, the AMF receives the first authentication response sent by the AUSF.
作为一种可能的实现方式,AUSF返回Nausf_UEAuthentication_Authenticate Response服务响应向AMF发送第一鉴权响应。As a possible implementation manner, the AUSF returns a Nausf_UEAuthentication_AuthenticateResponse service response and sends a first authentication response to the AMF.
其中,第一鉴权响应携带RI。The first authentication response carries an RI.
可选的,在双向鉴权过程中,如果AMF多次调用AUSF的鉴权服务,AUSF可以在任意一次鉴权服务(如鉴权成功的消息或者其他中间过程的鉴权消息)的响应消息中携带RI,并向AMF下发该RI。Optionally, in the two-way authentication process, if the AMF calls the authentication service of AUSF multiple times, the AUSF may be included in the response message of any authentication service (such as a message of successful authentication or an authentication message of other intermediate processes). Carry the RI and deliver the RI to the AMF.
可选的,当使用EAP(Extensible Authentication Protocol可扩展认证协议)鉴权时,例如使用EAP-AKA’(Extensible Authentication Protocol Method for Third Generation Authentication and Key Agreement增强认证和密匙协商机制)时,RI可以在EAP的包中,也可以在EAP的包外,此处不做限定。Optionally, when using EAP (Extensible Authentication Protocol Protocol Extensible Authentication Protocol) authentication, for example, using EAP-AKA '(Extensible Authentication Protocol Method for Third Generation Generation Authentication and Key Agreement Agreement), RI can be used in The EAP packet can also be outside the EAP packet, which is not limited here.
可选的,第一鉴权响应携带鉴权向量,也就是,在AMF多次调用AUSF的鉴权服务时,AUSF多次向AMF发送第一鉴权响应,并在多次第一鉴权响应中的某一次第一鉴权响应中携带鉴权向量,当然,如上文所描述,还可以在该次第一鉴权响应中携带RI。Optionally, the first authentication response carries an authentication vector, that is, when the AMF invokes the authentication service of the AUSF multiple times, the AUSF sends the first authentication response to the AMF multiple times, and the first authentication response multiple times One of the first authentication responses in the one carries the authentication vector. Of course, as described above, the RI may also be carried in the first authentication response.
可选的,第一鉴权响应中携带S512中生成的RI完整性验证码。可选的,第一鉴权 响应中携带Counter、Counter-MAC。Optionally, the first authentication response carries the RI integrity verification code generated in S512. Optionally, the first authentication response carries Counter and Counter-MAC.
S614、AMF向终端发送针对网络的鉴权请求消息。S614. The AMF sends an authentication request message for the network to the terminal.
相应的,终端接收AMF发送的针对网络的鉴权请求消息。Correspondingly, the terminal receives an authentication request message for the network sent by the AMF.
其中,该针对网络的鉴权请求消息携带RI。The authentication request message for the network carries the RI.
可选的,该针对网络的鉴权请求消息携带鉴权向量中的部分或者全部参数。可选的,鉴权请求消息携带S512中生成的RI完整性验证码。可选的,鉴权请求消息携带Counter、Counter-MAC。Optionally, the authentication request message for the network carries part or all of the parameters in the authentication vector. Optionally, the authentication request message carries the RI integrity verification code generated in S512. Optionally, the authentication request message carries Counter and Counter-MAC.
终端可利用接收到的鉴权向量中的部分参数(例如鉴权向量中的随机数)对网络进行鉴权,在确定网络为合法网络时,终端向AMF发送针对网络的鉴权请求响应消息,以指示AMF对终端进行鉴权,从而完成整个双向鉴权流程。The terminal may use some parameters in the received authentication vector (such as a random number in the authentication vector) to authenticate the network. When determining that the network is a legitimate network, the terminal sends an authentication request response message for the network to the AMF. It instructs the AMF to authenticate the terminal, thereby completing the entire two-way authentication process.
当然,AUSF还可以在双向鉴权过程中其他任意AUSF和AMF的交互中,将RI下发给AMF,本申请对此不进行限制。Of course, the AUSF may also send the RI to the AMF in any other interaction between the AUSF and the AMF during the two-way authentication process, which is not limited in this application.
方式2:网络侧基于SMC机制向终端发送RI。具体的,如图7所示,图5中的S513、S514可替换为S713和S714:Method 2: The network side sends the RI to the terminal based on the SMC mechanism. Specifically, as shown in FIG. 7, S513 and S514 in FIG. 5 may be replaced with S713 and S714:
S713、AUSF向AMF发送第二鉴权响应。S713. The AUSF sends a second authentication response to the AMF.
相应的,AMF接收AUSF发送的第二鉴权响应。Correspondingly, the AMF receives the second authentication response sent by the AUSF.
作为一种可能的实现方式,AUSF返回Nausf_UEAuthentication_Authenticate Response服务响应,向AMF发送第二鉴权响应。As a possible implementation manner, AUSF returns a Nausf_UEAuthentication_AuthenticateResponse service response, and sends a second authentication response to the AMF.
其中,第二鉴权响应携带RI。The second authentication response carries the RI.
可选的,第二鉴权响应携带S512中AUSF生成的RI完整性验证码。可选的,第二鉴权响应携带Counter、Counter-MAC。Optionally, the second authentication response carries the RI integrity verification code generated by the AUSF in S512. Optionally, the second authentication response carries Counter and Counter-MAC.
S714、AMF向终端发送NAS SMC消息。S714. The AMF sends a NAS SMC message to the terminal.
相应的,终端接收AMF发送的NAS SMC消息。Correspondingly, the terminal receives the NAS SMC message sent by the AMF.
其中,该NAS SMC消息携带RI。The NAS SMC message carries the RI.
可选的,该NAS SMC消息携带S512中AUSF生成的RI完整性验证码。可选的,NAS SMC消息携带Counter、Counter-MAC。Optionally, the NAS SMC message carries the RI integrity verification code generated by the AUSF in S512. Optionally, the NAS SMC message carries Counter and Counter-MAC.
采用上述在NAS SMC消息中携带RI传输的方法,能够基于SMC自身的完整性保护机制对RI进行完整性保护。By adopting the method for carrying RI transmission in the NAS SMC message, the RI can be integrity protected based on the SMC's own integrity protection mechanism.
方式3:UDM向终端发送用户签约数据的同时向终端发送RI,也就是说触发UDM下发RI的条件是UDM接收到AMF的用户数据获取请求消息。具体的,以第一UDM为用户归属UDM,且对RI不进行完整性保护为例,如图8所示,图5中的S507至S514可替换为S807至S810:Method 3: The UDM sends the RI to the terminal at the same time as the user subscription data is sent to the terminal, that is, the condition that triggers the UDM to send the RI is that the UDM receives the AMF user data acquisition request message. Specifically, taking the first UDM as the user's home UDM and not performing integrity protection on the RI as an example, as shown in FIG. 8, S507 to S514 in FIG. 5 can be replaced with S807 to S810:
S807、第一UDM确定自身为SUPI所指示用户的归属UDM,则向AUSF发送第一鉴权向量获取响应。S807. The first UDM determines that it is the home UDM of the user indicated by the SUPI, and sends a first authentication vector acquisition response to the AUSF.
该第一鉴权向量获取响应携带鉴权向量。The first authentication vector acquisition response carries an authentication vector.
之后,AUSF、AMF、终端之间按照3GPP定义的规范进行双向鉴权,以确保终端和网络的合法性。Afterwards, AUSF, AMF, and the terminal perform two-way authentication according to the specifications defined by 3GPP to ensure the legitimacy of the terminal and the network.
S808、在双向鉴权流程后,AMF向第一UDM发送用户数据获取请求消息。S808. After the two-way authentication process, the AMF sends a user data acquisition request message to the first UDM.
相应的,第一UDM接收AMF发送的用户数据获取请求消息。Correspondingly, the first UDM receives a user data acquisition request message sent by the AMF.
作为一种可能的实现方式,AMF调用第一UDM的Nudm_SDM_Get request服务向第一 UDM发送用户数据获取请求消息。As a possible implementation manner, the AMF calls the Nudm_SDM_Get request service of the first UDM to send a user data acquisition request message to the first UDM.
其中,用户数据获取请求消息携带SUPI。可选的,用户数据获取请求消息携带RI完整性保护标识,用于指示第一UDM是否对RI进行完整性保护。The user data acquisition request message carries SUPI. Optionally, the user data acquisition request message carries an RI integrity protection identifier, which is used to indicate whether the first UDM performs integrity protection on the RI.
S809、若第一UDM确定对RI不进行完整性保护,则向AMF发送用户数据获取响应。S809. If the first UDM determines that integrity protection is not performed on the RI, it sends a user data acquisition response to the AMF.
相应的,AMF接收第一UDM发送的用户数据获取响应。Correspondingly, the AMF receives the user data acquisition response sent by the first UDM.
作为一种可能的实现方式,第一UDM返回Nudm_SDM_Get response服务响应向AMF发送用户数据获取响应。As a possible implementation manner, the first UDM returns a Nudm_SDM_Getresponse service response to send a user data acquisition response to the AMF.
其中,用户数据获取响应携带RI和用户的签约数据。用户的签约数据包括但不限于终端的全球用户身份模块(universal subscriber identity module,USIM)卡的消费套餐、消费套餐相关业务。The user data acquisition response carries the RI and the user's contract data. The user's contract data includes, but is not limited to, the consumer package and consumer package-related services of the Universal Subscriber Identity Module (USIM) card of the terminal.
可选的,第一UDM根据用户数据获取请求消息携带的RI完整性保护标识判断是否对RI进行保护。示例性的,该RI完整性保护标识的长度为1位,当RI完整性保护标识设置为0时,第一UDM不对RI进行完整性保护。或者第一UDM可根据自身的预配置策略确定是否对RI进行完整性保护,本申请实施例对此不进行限制。这里仅以RI完整性保护标识的长度为1位进行举例,RI完整性保护标识具体采用的格式,以及具体使用多少位比特,每一比特的含义,本申请实施例不做限定。Optionally, the first UDM determines whether to protect the RI according to the RI integrity protection identifier carried in the user data acquisition request message. Exemplarily, the length of the RI integrity protection flag is 1 bit. When the RI integrity protection flag is set to 0, the first UDM does not perform integrity protection on the RI. Or the first UDM may determine whether to perform integrity protection on the RI according to its own pre-configured policy, which is not limited in this embodiment of the present application. Here, only the length of the RI integrity protection identifier is taken as an example. The format of the RI integrity protection identifier and the number of bits used, and the meaning of each bit are not limited in the embodiments of the present application.
S810、AMF向终端发送接受注册消息(Registration Accept)。S810. The AMF sends a registration acceptance message (Registration Accept) to the terminal.
其中,该接受注册消息携带RI。The registration acceptance message carries the RI.
或者,如图9所示,在方式3中,在第二UDM为用户归属UDM,且第二UDM对RI进行完整性保护的情况下,则图5中的S507至S514具体的可替换为如下步骤S907至S916:Alternatively, as shown in FIG. 9, in mode 3, in a case where the second UDM is a user-owned UDM and the second UDM performs integrity protection on the RI, S507 to S514 in FIG. 5 may be specifically replaced as follows: Steps S907 to S916:
S907、第一UDM确定自身不是SUPI所指示用户的归属UDM,则向AUSF发送重定向消息。S907. The first UDM determines that it is not the home UDM of the user indicated by the SUPI, and sends a redirect message to the AUSF.
S908、AUSF向第二UDM发送第二鉴权向量获取请求。S908. The AUSF sends a second authentication vector acquisition request to the second UDM.
S909、若第二UDM确定自身是SUPI所指示用户的归属UDM,则向AUSF发送第二鉴权向量获取响应。S909. If the second UDM determines that it is the home UDM of the user indicated by the SUPI, it sends a second authentication vector acquisition response to the AUSF.
第二鉴权向量获取响应携带鉴权向量,可选的,若触发第二UDM下发RI的时机和条件为接收到AUSF发送的第二鉴权向量获取请求,则第二鉴权向量获取响应还携带RI。(可选的)S910、AUSF根据完整性保护密钥和RI确定RI完整性验证码。The second authentication vector acquisition response carries the authentication vector. Optionally, if the timing and conditions for triggering the second UDM to issue the RI are to receive the second authentication vector acquisition request sent by the AUSF, the second authentication vector acquisition response It also carries RI. (Optional) S910 and AUSF determine an RI integrity verification code according to the integrity protection key and the RI.
S907至S910的详细描述可参见图5至图8流程中对应步骤的描述,这里不再赘述。For detailed descriptions of S907 to S910, reference may be made to the description of corresponding steps in the processes of FIGS. 5 to 8, and details are not described herein again.
S911、AMF向第二UDM发送用户数据获取请求消息。S911 and AMF send a user data acquisition request message to the second UDM.
相应的,第二UDM接收AMF发送的用户数据获取请求消息。Correspondingly, the second UDM receives a user data acquisition request message sent by the AMF.
作为一种可能的实现方式,AMF调用第二UDM的Nudm_SDM_Get request服务向第二UDM发送用户数据获取请求消息。As a possible implementation manner, the AMF calls the Nudm_SDM_Get request service of the second UDM to send a user data acquisition request message to the second UDM.
其中,用户数据获取请求消息携带SUPI。可选的,用户数据获取请求消息携带RI完整性保护标识。The user data acquisition request message carries SUPI. Optionally, the user data acquisition request message carries an RI integrity protection identifier.
S912、若第二UDM确定对RI进行完整性保护,则向AUSF发送完整性保护请求消息。S912. If the second UDM determines to perform integrity protection on the RI, send an integrity protection request message to the AUSF.
相应的,AUSF接收第二UDM发送的完整性保护请求消息,该消息用户获取RI的请求RI完整性验证码。Correspondingly, the AUSF receives the integrity protection request message sent by the second UDM, and the user of the message obtains the RI request RI integrity verification code.
可选的,第二UDM根据用户数据获取请求消息携带的RI完整性保护标识判断是否对RI进行保护,示例性的,RI完整性保护标识为1比特位且为1时,第二UDM确定对RI 进行完整性保护。或者第二UDM可根据自身的预配置策略确定是否对RI进行完整性保护,本申请实施例对此不进行限制。Optionally, the second UDM determines whether to protect the RI according to the RI integrity protection identifier carried in the user data acquisition request message. For example, when the RI integrity protection identifier is 1 bit and is 1, the second UDM determines RI protects integrity. Or the second UDM may determine whether to perform integrity protection on the RI according to its own pre-configured policy, which is not limited in the embodiment of the present application.
可选的,如上文描述,触发第二UDM向AUSF下发RI的条件存在多种可能,若触发第二UDM向AUSF下发RI的条件是第二UDM接收到用户数据获取请求消息,则第二UDM在完整性保护请求消息中携带RI,该RI用以AUSF生成RI完整性验证码。Optionally, as described above, there are multiple possible conditions for triggering the second UDM to issue the RI to the AUSF. If the condition that triggers the second UDM to issue the RI to the AUSF is that the second UDM receives the user data acquisition request message, the first The two UDMs carry an RI in the integrity protection request message, which is used by the AUSF to generate an RI integrity verification code.
S913、AUSF判断是否已经生成RI的完整性验证码,若AUSF接收到的第二鉴权向量获取响应携带RI,并且AUSF已执行S910生成RI完整性验证码,则向第二UDM发送RI完整性验证码。S913. AUSF determines whether an RI integrity verification code has been generated. If the second authentication vector acquisition response received by AUSF carries RI and AUSF has performed S910 to generate an RI integrity verification code, it sends RI integrity to the second UDM Verification code.
可选的,在AUSF向第二UDM发送RI完整性验证码的同时,还可向第二UDM下发Counter、Counter-MAC。Optionally, while the AUSF sends the RI integrity verification code to the second UDM, the Counter and Counter-MAC may also be sent to the second UDM.
S914、若AUSF中不存在已生成的RI完整性验证码,则生成RI完整性验证码,并向第二UDM发送新生成的RI完整性验证码。S914. If the generated RI integrity verification code does not exist in the AUSF, generate an RI integrity verification code, and send the newly generated RI integrity verification code to the second UDM.
可选的,在AUSF向第二UDM发送RI完整性验证码的同时,还可向第二UDM下发Counter、Counter-MAC。Optionally, while the AUSF sends the RI integrity verification code to the second UDM, the Counter and Counter-MAC may also be sent to the second UDM.
其中,以下两种情况下,AUSF中不存在已生成的RI完整性验证码:Among them, in the following two cases, the generated RI integrity verification code does not exist:
1、第二UDM在第二鉴权向量获取响应中并未携带RI。1. The second UDM does not carry the RI in the second authentication vector acquisition response.
2、第二UDM在第二鉴权向量获取响应中携带RI,AUSF接收到该RI,但并未利用该RI生成RI完整性验证码。2. The second UDM carries the RI in the second authentication vector acquisition response, and the AUSF receives the RI but does not use the RI to generate an RI integrity verification code.
S915、第二UDM向AMF发送用户数据获取响应,该用户数据获取响应携带RI、用户数据。可选的,该用户数据获取响应携带RI-MAC、Counter、Counter–MAC。S915. The second UDM sends a user data acquisition response to the AMF, and the user data acquisition response carries the RI and user data. Optionally, the user data acquisition response carries RI-MAC, Counter, and Counter-MAC.
相应的,AMF接收第二UDM发送的用户数据获取响应。Correspondingly, the AMF receives the user data acquisition response sent by the second UDM.
作为一种可能的实现方式,第二UDM返回Nudm_SDM_Get response服务响应向AMF发送用户数据获取响应。As a possible implementation manner, the second UDM returns a Nudm_SDM_Getresponse service response to send a user data acquisition response to the AMF.
S916、AMF向终端发送接受注册消息(Registration Accept)。S916. The AMF sends a registration acceptance message (Registration Accept) to the terminal.
相应的,终端接收AMF发送的接受注册消息。Correspondingly, the terminal receives the registration acceptance message sent by the AMF.
其中,该接受注册消息携带RI和RI完整性验证码。The registration acceptance message carries the RI and the RI integrity verification code.
需要说明的是,在网络侧通过上述3种方式中的任意一种向终端下发RI后,终端还可以执行S515:It should be noted that after the network side sends the RI to the terminal through any of the above three methods, the terminal can also perform S515:
S515、终端利用接收到的所述RI更新SUCI的信息。S515. The terminal uses the received RI to update SUCI information.
其中,S515中终端更新SUCI的信息存在两种情况:There are two cases in which the terminal updates the SUCI information in S515:
情况1:若终端接收到的RI未经过完整性保护,则终端直接利用RI更新SUCI的信息。Case 1: If the RI received by the terminal is not integrity-protected, the terminal directly uses the RI to update the SUCI information.
通常,终端包括移动设备(The Mobile Equipment,ME)模块和USIM卡。其中,ME用于提供应用和服务,USIM用于提供用户身份识别。相应的,终端可将更新的RI写入ME或者写入USIM卡。具体的,终端调用读写接口将USIM卡或ME中SUCI包含的RI位更新为所接收的RI。Generally, the terminal includes a Mobile Equipment (ME) module and a USIM card. Among them, ME is used to provide applications and services, and USIM is used to provide user identification. Correspondingly, the terminal can write the updated RI to the ME or the USIM card. Specifically, the terminal calls the read-write interface to update the RI bit included in the SUCI in the USIM card or the ME to the received RI.
情况2:若所述终端接收到所述RI对应的完整性验证码,则利用所述RI完整性验证码对所述RI进行完整性验证,当对所述RI的完整性验证成功后,所述终端利用所述RI更新SUCI的信息。具体的,终端执行上述生成RI完整性验证码的逆操作,利用Kausf和密钥参数生成完整性保护密钥,再利用生成的完整性保护密钥以及接收的RI计算一个 X-MAC。若X-MAC与终端接收的RI-MAC的值一致,则说明RI并未经过第三方篡改,终端利用该RI更新SUCI的信息。其中,终端使用的密钥参数与AUSF生成RI完整性验证码时使用的密钥参数相同,也就是说,若AUSF利用鉴权向量中的随机数和Kausf生成完整性保护密钥,则终端在验证RI是否被第三方篡改时,也利用鉴权向量中的随机数和终端中的Kausf生成完整性保护密钥,若AUSF利用Kausf和计数器值生成完整性保护密钥,则终端也利用Kausf和接收来自AUSF的计数器值计算完整性保护密钥。Case 2: If the terminal receives the integrity verification code corresponding to the RI, the terminal uses the RI integrity verification code to perform integrity verification on the RI. After the integrity verification of the RI is successful, all the The terminal uses the RI to update SUCI information. Specifically, the terminal performs the inverse operation of generating the RI integrity verification code described above, generates an integrity protection key by using Kausf and key parameters, and then calculates an X-MAC by using the generated integrity protection key and the received RI. If the X-MAC is consistent with the value of the RI-MAC received by the terminal, it means that the RI has not been tampered with by a third party, and the terminal uses the RI to update the SUCI information. The key parameters used by the terminal are the same as those used when AUSF generates the RI integrity verification code. That is, if AUSF uses the random number in the authentication vector and Kausf to generate the integrity protection key, the terminal When verifying whether the RI has been tampered with by a third party, it also uses the random number in the authentication vector and Kausf in the terminal to generate the integrity protection key. If AUSF uses Kausf and the counter value to generate the integrity protection key, the terminal also uses Kausf and Receive the counter value from AUSF to calculate the integrity protection key.
可选的,当终端接收到Counter-MAC,则对Counter进行完整性验证,若验证通过,说明Counter未受到篡改,此时,若终端发现该Counter值大于终端本地存储的Counter值,说明终端接收到的Counter是网络侧新下发的,则终端进一步对RI进行完整性验证,当RI完整性验证通过后,终端利用该RI更新SUCI的信息。相应的,终端更新本地的Counter值。Optionally, when the terminal receives the Counter-MAC, the integrity verification is performed on the counter. If the verification succeeds, it indicates that the counter has not been tampered. At this time, if the terminal finds that the counter value is greater than the counter's locally stored counter value, the terminal receives The counter received is newly issued by the network side, and the terminal further performs integrity verification on the RI. After the RI integrity verification is passed, the terminal uses the RI to update the SUCI information. Correspondingly, the terminal updates the local Counter value.
本申请实施例提供的路由方法,AUSF向第一UDM发送第一鉴权向量获取请求,若AUSF接收到第一UDM发送的RI,则向AMF发送RI。后续,由管理终端的AMF向终端下发RI,使得终端能够更新自身的RI,以便于终端在入网进行鉴权时能够寻址到正确的UDM。In the routing method provided in the embodiment of the present application, the AUSF sends a first authentication vector acquisition request to the first UDM, and if the AUSF receives the RI sent by the first UDM, it sends the RI to the AMF. Subsequently, the AMF of the management terminal sends the RI to the terminal, so that the terminal can update its own RI, so that the terminal can address the correct UDM when it enters the network for authentication.
需要说明的是,本申请实施例中,网元之间收发的多个信息可携带在一条消息中传输,也可以携带在不同的消息中传输,本申请实施例对此不进行限制。It should be noted that in the embodiment of the present application, multiple information transmitted and received between network elements may be carried in one message and transmitted in different messages, which is not limited in the embodiment of the present application.
本申请实施例还提供另一种路由方法,当第一UDM接收到第一鉴权向量获取请求,并确定自身不是用户的归属UDM时,还可以由第一UDM向第二UDM发送第二鉴权向量获取请求。具体的,如图10所示,上述S508至S510可替换为如下步骤:The embodiment of the present application also provides another routing method. When the first UDM receives the first authentication vector acquisition request and determines that it is not the user's home UDM, the first UDM may also send a second authentication to the second UDM. Weight vector acquisition request. Specifically, as shown in FIG. 10, the above S508 to S510 can be replaced with the following steps:
S1008、第一UDM向第二UDM发送第二鉴权向量获取请求。S1008. The first UDM sends a second authentication vector acquisition request to the second UDM.
作为一种可能的实现方式,第一UDM调用第二UDM的Nudm_UEAuthentication_Get Request服务向第二UDM发送第二鉴权向量获取请求。As a possible implementation manner, the first UDM calls the Nudm_UEAuthentication_Get Request service of the second UDM to send a second authentication vector acquisition request to the second UDM.
S1009、第二UDM向第一UDM发送第二鉴权向量获取响应。S1009. The second UDM sends a second authentication vector acquisition response to the first UDM.
作为一种可能的实现方式,第二UDM返回Nudm_UEAuthentication_Get Response服务响应向第一UDM发送第二鉴权向量获取响应。As a possible implementation manner, the second UDM returns a Nudm_UEAuthentication_GetResponse service response and sends a second authentication vector acquisition response to the first UDM.
S1010、第一UDM向AUSF发送第二鉴权向量获取响应。S1010. The first UDM sends a second authentication vector acquisition response to the AUSF.
作为一种可能的实现方式,第一UDM返回Nudm_UEAuthentication_Get Response服务响应向AUSF发送第二鉴权向量获取响应。As a possible implementation manner, the first UDM returns a Nudm_UEAuthentication_GetResponse service response and sends a second authentication vector acquisition response to the AUSF.
第二鉴权向量获取请求、第二鉴权向量获取响应的详细描述可参见上文,这里不再赘述。For a detailed description of the second authentication vector acquisition request and the second authentication vector acquisition response, reference may be made to the foregoing, and details are not described herein again.
采用该路由方法,第一UDM可确定一个第二UDM,并直接向该第二UDM发送第二鉴权向量获取请求,无需其他网元的中间转发、处理,降低了网元之间的传输时延。With this routing method, the first UDM can determine a second UDM and directly send a second authentication vector acquisition request to the second UDM, without the need for intermediate forwarding and processing by other network elements, reducing the transmission time between network elements. Delay.
本申请实施例还提供另一种路由方法,应用于空中下载(Over-the-Air,OTA)平台,如图11所示,该方法包括:This embodiment of the present application also provides another routing method, which is applied to an Over-the-Air (OTA) platform. As shown in FIG. 11, the method includes:
S1101、操作维护(operation&maintenance,OM)设备向OTA平台发送待修改的SUPI以及RI。S1101. An operation and maintenance (OM) device sends a SUPI and an RI to be modified to an OTA platform.
S1102、OTA平台修改相应SUPI的RI信息。S1102. The OTA platform modifies the RI information of the corresponding SUPI.
示例性的,OTA平台向终端发送SMC消息,该SMC消息用于指示终端更新RI。Exemplarily, the OTA platform sends an SMC message to the terminal, where the SMC message is used to instruct the terminal to update the RI.
S1103、终端更新RI。S1103: The terminal updates the RI.
S1104、终端向OTA平台发送更新结果。S1104: The terminal sends an update result to the OTA platform.
本申请实施例还提供一种路由方法,初始时用户注册到第一UDM,后续由于业务需求,用户迁移到第二UDM,在这种场景下,第一UDM主动发起更新RI的流程。This embodiment of the present application also provides a routing method. Initially, a user registers with a first UDM, and subsequently migrates to a second UDM due to service requirements. In this scenario, the first UDM actively initiates a RI update process.
举例来说,第一UDM确定需要修改终端的RI信息,则向AMF发送修改过的RI。可选的,再向AMF发送所述修改过的RI之前,还可以对修改过的RI进行完整性保护。For example, if the first UDM determines that the RI information of the terminal needs to be modified, it sends the modified RI to the AMF. Optionally, before sending the modified RI to the AMF, the modified RI may also be integrity protected.
具体的,如图12所示,该方法包括如下步骤:Specifically, as shown in FIG. 12, the method includes the following steps:
S1201、第一UDM因为某种原因确定需要修改终端的RI信息,如用户的UDM调整而导致的RI修改。S1201. For some reason, the first UDM determines that the RI information of the terminal needs to be modified, such as the RI modification caused by the user's UDM adjustment.
S1202、第一UDM根据本地的策略判断是否对RI进行完整性保护,若否,执行S1203,若是,执行S1204。S1202. The first UDM determines whether to perform integrity protection on the RI according to the local policy. If not, execute S1203, and if yes, execute S1204.
S1203、第一UDM向AMF发送RI。S1203. The first UDM sends an RI to the AMF.
相应的,AMF接收第一UDM发送的RI。Correspondingly, the AMF receives the RI sent by the first UDM.
S1204、第一UDM向AUSF发送完整性保护请求消息。S1204. The first UDM sends an integrity protection request message to the AUSF.
相应的,AUSF接收第一UDM发送的完整性保护请求消息。Correspondingly, the AUSF receives the integrity protection request message sent by the first UDM.
其中,该完整性保护请求消息携带第二UDM对应的RI。The integrity protection request message carries an RI corresponding to the second UDM.
S1205、AUSF根据完整性保护密钥以及第二UDM对应的RI生成RI-MAC,可选的,根据Counter和完整性保护密钥生成Counter-MAC。S1205. The AUSF generates the RI-MAC according to the integrity protection key and the RI corresponding to the second UDM. Optionally, the counter-MAC is generated according to the Counter and the integrity protection key.
S1206、AUSF向第一UDM发送完整性保护响应。S1206. The AUSF sends an integrity protection response to the first UDM.
相应的,第一UDM接收AUSF发送的完整性保护响应。Correspondingly, the first UDM receives the integrity protection response sent by the AUSF.
其中,完整性保护响应携带RI-MAC、Counter(可选的)以及Counter-MAC(可选的)。The integrity protection response carries an RI-MAC, a counter (optional), and a counter-MAC (optional).
S1207、第一UDM向AMF发送通知消息。S1207. The first UDM sends a notification message to the AMF.
相应的,AMF接收第一UDM发送的通知消息。Correspondingly, the AMF receives the notification message sent by the first UDM.
作为一种可能的实现方式,第一UDM使用Nudm_SDM_Notification request服务向AMF发送通知消息。As a possible implementation manner, the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
其中,该通知消息携带RI、RI-MAC(可选的)、Counter(可选的)以及Counter-MAC(可选的)。The notification message carries RI, RI-MAC (optional), Counter (optional), and Counter-MAC (optional).
S1208、AMF向终端发送配置修改请求。S1208. The AMF sends a configuration modification request to the terminal.
相应的,终端接收AMF发送的配置修改请求。Correspondingly, the terminal receives the configuration modification request sent by the AMF.
该配置修改请求携带RI、RI-MAC(可选的)、Counter(可选的)以及Counter-MAC(可选的)。The configuration modification request carries RI, RI-MAC (optional), Counter (optional), and Counter-MAC (optional).
S1209、终端更新RI。S1209: The terminal updates the RI.
可选的,若终端接收到RI对应的RI-MAC,则终端对RI-MAC进行完整性验证,验证通过后,终端更新RI。Optionally, if the terminal receives the RI-MAC corresponding to the RI, the terminal performs integrity verification on the RI-MAC. After the verification passes, the terminal updates the RI.
可选的,若终端接收到Counter、Counter-MAC,则终端先对Counter-MAC进行完整性验证,以确认接收到的Counter值大于本地存储的Counter值,验证通过后,再对RI-MAC进行完整性验证,最终确认RI的值未遭受篡改。Optionally, if the terminal receives the Counter and Counter-MAC, the terminal first performs integrity verification on the Counter-MAC to confirm that the received Counter value is greater than the Counter value stored locally, and then passes the RI-MAC after the verification is passed. Integrity verification, finally confirming that the value of RI has not been tampered with.
S1210、终端向AMF发送配置修改响应。S1210. The terminal sends a configuration modification response to the AMF.
相应的,AMF接收终端发送的配置修改响应。Correspondingly, the AMF receives a configuration modification response sent by the terminal.
S1211、AMF向第一UDM发送通知响应。S1211. The AMF sends a notification response to the first UDM.
相应的,第一UDM接收AMF发送的通知响应。Correspondingly, the first UDM receives the notification response sent by the AMF.
作为一种可能的实现方式,AMF返回Nudm_SDM_Notification response服务响应 向第一UDM发送通知响应。As a possible implementation manner, the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
该通知响应用于通知第一UDM上述终端的RI更新成功。The notification response is used to notify the first UDM that the RI update of the terminal is successful.
S1212、终端与第一UDM之间进行注销流程。S1212. A logout process is performed between the terminal and the first UDM.
终端更新RI后,可选的,主动向第一UDM发起注销流程。After the terminal updates the RI, optionally, it actively initiates a logout process to the first UDM.
或者,在另一种可选的实现方式中,在S1212中,可由第一UDM发起注销流程。具体的,第一UDM使用Nudm_UECM_Deregistration Notification服务向AMF发送重注册通知消息,AMF向终端发送Deregistration Request message注销请求消息,该注销请求消息携带的原因值为RI变更,终端接收该携带原因值为RI变更的注销请求消息,并完成在第一UDM中的注销。Alternatively, in another optional implementation manner, in S1212, the first UDM may initiate a logout process. Specifically, the first UDM sends a re-registration notification message to the AMF using the Nudm_UECM_Deregistration Notification Service, and the AMF sends a Deregistration Request message deregistration request message to the terminal. The reason value carried in the deregistration request message is the RI change, and the terminal receives the carry reason value as the RI change. Logout request message and complete logout in the first UDM.
S1213、终端使用更新的RI注册到所归属的第二UDM上。S1213. The terminal uses the updated RI to register with the second UDM to which it belongs.
终端向第二UDM发送注册请求消息,以请求注册到第二UDM。其中,注册请求消息携带第二UDM对应的RI。终端通过发起注册请求消息注册到UDM的具体流程可参见现有技术,本申请实施例不再进行赘述。The terminal sends a registration request message to the second UDM to request registration to the second UDM. The registration request message carries the RI corresponding to the second UDM. For a specific process of the terminal registering with the UDM by initiating a registration request message, refer to the prior art, and details are not described in the embodiment of the present application.
其中,图12的方法流程中存在与上述图5至图11所示方法流程中相似的步骤,这些步骤的详细描述可参见上文,这里不再赘述。The method flow in FIG. 12 includes steps similar to those in the method flows shown in FIG. 5 to FIG. 11. For a detailed description of these steps, reference may be made to the foregoing, and details are not described herein again.
另外,在本发明的另一个实施例中,提供了一种更新终端内参数的方法。In addition, in another embodiment of the present invention, a method for updating parameters in a terminal is provided.
可以理解的是,终端包括ME(Mobile Equipment,移动终端)和USIM。其中,更新参数主要包括两类:USIM参数(即USIM内需要更新的参数)和ME参数(即ME内需要更新的参数)。It can be understood that the terminals include ME (Mobile Equipment) and USIM. Among them, the update parameters mainly include two types: USIM parameters (that is, parameters that need to be updated in the USIM) and ME parameters (that is, parameters that need to be updated in the ME).
其中,USIM参数为RI信息,切片选择参数,切片ID,公钥标识,公钥参数,NSSAI(Network Slice Selection Assistance Information,切片选择辅助信息),S-NSSAI(Single-Network Slice Selection Assistance Information,单个切片选择辅助信息),Configured NSSAI(Configured Network Slice Selection Assistance Information,配置的切片选择辅助信息),Requested NSSAI(Requested Network Slice Selection Assistance Information,请求的切片选择辅助信息),封闭接入群组标识,封闭群组标识,封闭用户群组标识,群组标识,用户群组标识,网络群组标识等参数中的至少一种;Among them, the USIM parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters;
其中,ME参数为RI信息,切片选择参数,切片ID,公钥标识,公钥参数,NSSAI(Network Slice Selection Assistance Information,切片选择辅助信息),S-NSSAI(Single-Network Slice Selection Assistance Information,单个切片选择辅助信息),Configured NSSAI(Configured Network Slice Selection Assistance Information,配置的切片选择辅助信息),Requested NSSAI(Requested Network Slice Selection Assistance Information,请求的切片选择辅助信息),封闭接入群组标识,封闭群组标识,封闭用户群组标识,群组标识,用户群组标识,网络群组标识等参数中的至少一种。Among them, ME parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
另外,进一步需要指出的是,更新终端内参数的原因可以是:用户的UDM调整而导致USIM卡和/或ME内的参数修改。In addition, it should be further pointed out that the reason for updating the parameters in the terminal may be: the user's UDM adjustment causes the parameters in the USIM card and / or ME to be modified.
具体的,所述更新终端内参数的方法包括:Specifically, the method for updating parameters in the terminal includes:
S1301、第一UDM向AMF发送第一通知消息。S1301. The first UDM sends a first notification message to the AMF.
相应的,AMF接收第一UDM发送的通知消息。Correspondingly, the AMF receives the notification message sent by the first UDM.
作为一种可能的实现方式,第一UDM使用Nudm_SDM_Notification request服务向AMF发送通知消息。As a possible implementation manner, the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
可选的,所述第一通知消息包括更新参数(USIM参数和/或ME参数)。Optionally, the first notification message includes update parameters (USIM parameters and / or ME parameters).
可选的,所述第一通知消息包括USIM参数和第一安全参数。其中,需要指出的是,第一安全参数是第一UDM根据第一UDM与USIM之间的共享密钥和USIM参数计算得到的。所述共享密钥可以为初始配置的密钥或者认证中生成的密钥,例如OTA(Over The Air,空中)密钥,认证根密钥,CK(Cipher Key,加密密钥),IK(Integrity Key,完整性密钥),MSK(Master Session Key,主会话密钥),EMSK(Extended Master Session Key,扩展的主会话密钥)等的至少一项。所述第一安全参数可以包括USIM参数和USIM校验参数。其中USIM校验参数用于USIM校验第一安全参数中USIM参数的正确性。Optionally, the first notification message includes a USIM parameter and a first security parameter. It should be noted that the first security parameter is calculated by the first UDM according to the shared key between the first UDM and the USIM and the USIM parameter. The shared key may be an initially configured key or a key generated during authentication, such as an OTA (Over The Air) key, an authentication root key, a CK (Cipher Key, encryption key), and IK (Integrity Key (integrity key), MSK (Master Session Key, Master Session Key), EMSK (Extended Master Session Key, Extended Master Session Key) and so on. The first security parameter may include a USIM parameter and a USIM verification parameter. The USIM verification parameter is used by the USIM to verify the correctness of the USIM parameter in the first security parameter.
S1302、AMF向终端发送第二通知消息;S1302. The AMF sends a second notification message to the terminal.
其中,该第二通知消息可以是下行NAS消息。The second notification message may be a downlink NAS message.
该第二通知消息携带更新参数、第一安全参数、Update-MAC(可选的)、Counter(可选的)。The second notification message carries an update parameter, a first security parameter, an Update-MAC (optional), and a Counter (optional).
S1303、所述终端接收所述第二通知消息;S1303. The terminal receives the second notification message.
S1304、所述终端根据所述第二通知消息对所述终端内的参数进行更新。S1304. The terminal updates parameters in the terminal according to the second notification message.
另外,可选的,在步骤S1301之前,所述方法还包括:第一UDM与AUSF进行交互以获取Update MAC。所述Update MAC用于对USIM参数进行完整性保护。In addition, optionally, before step S1301, the method further includes: the first UDM interacts with the AUSF to obtain an Update MAC. The Update MAC is used to perform integrity protection on USIM parameters.
具体的所述第一UDM与AUSF进行交互以获取Update MAC,包括S1305-1307.Specifically, the first UDM interacts with AUSF to obtain Update MAC, including S1305-1307.
S1305、所述第一UDM向AUSF发送保护请求消息。S1305. The first UDM sends a protection request message to the AUSF.
相应的,AUSF接收第一UDM发送的保护请求消息。Correspondingly, the AUSF receives the protection request message sent by the first UDM.
可选的,该保护请求消息携带USIM参数。Optionally, the protection request message carries USIM parameters.
可选的,该保护请求消息携带USIM参数和第一安全参数。Optionally, the protection request message carries a USIM parameter and a first security parameter.
可选的,该保护请求消息携带第一安全参数。Optionally, the protection request message carries a first security parameter.
可选的,该保护请求消息中还可能包括期望的USIM卡响应;Optionally, the protection request message may further include a desired USIM card response;
可选的,该保护请求消息中还可能包括期望的UE响应。Optionally, the protection request message may further include a desired UE response.
S1306、所述AUSF根据所述保护请求消息生成Update-MAC。S1306. The AUSF generates an Update-MAC according to the protection request message.
可选的,所述AUSF根据USIM参数和第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to a USIM parameter and a first security parameter.
可选的,所述AUSF根据第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to the first security parameter.
可选的,所述AUSF根据Counter(AUSF存储的计数值),USIM参数和第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to a Counter (a counter value stored in the AUSF), a USIM parameter, and a first security parameter.
可选的,所述AUSF根据保护密钥,Counter(AUSF存储的计数值),USIM参数和第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), a USIM parameter, and a first security parameter.
可选的,所述AUSF根据Counter(AUSF存储的计数值),第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to the Counter (the count value stored by the AUSF) and the first security parameter.
可选的,所述AUSF根据保护密钥,Counter(AUSF存储的计数值),第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), and a first security parameter.
其中保护密钥为UE与AUSF共享的密钥,这里保护密钥可以为初始配置的密钥,或者认证中生成的密钥,例如Kausf密钥等。The protection key is a key shared by the UE and the AUSF. The protection key here may be an initially configured key, or a key generated during authentication, such as a Kausf key.
可选的,AUSF根据所述Counter和保护密钥生成Counter-MAC。所述Counter-MAC 用于对所述Counter进行完整性保护。另外,需要指出的是,Counter-MAC的计算参数输入还可能包括期望的USIM响应。Counter-MAC的计算参数输入还可能包括期望的UE响应Optionally, the AUSF generates a Counter-MAC according to the Counter and the protection key. The Counter-MAC is used to perform integrity protection on the Counter. In addition, it should be noted that the input of the calculation parameters of the Counter-MAC may also include the expected USIM response. Counter-MAC calculation parameter input may also include expected UE response
S1307、所述AUSF向第一UDM发送保护响应。S1307. The AUSF sends a protection response to the first UDM.
相应的,第一UDM接收AUSF发送的保护响应。Correspondingly, the first UDM receives the protection response sent by the AUSF.
其中,保护响应携带Update-MAC。The protection response carries the Update-MAC.
可选的,所述保护响应还可能包括Counter和/或Counter-MAC。Optionally, the protection response may further include Counter and / or Counter-MAC.
相应的,第一UDM接收到保护响应之后,在向AMF发送的第一通知消息中包括Update-MAC。当然,也有可能还会包括从AUSF接收到的Counter。可以理解的是,如果AMF接收到的第一通知消息中包括Update-MAC和/或Counter,那么AMF会将这些参数添加在第二通知消息中,通过第二通知消息发送给所述终端;当然也有可能通过其他消息将接收到的参数发送给所述终端。Correspondingly, after the first UDM receives the protection response, the first notification message sent to the AMF includes Update-MAC. Of course, it is also possible to include the Counter received from AUSF. It can be understood that if the first notification message received by the AMF includes Update-MAC and / or Counter, the AMF will add these parameters to the second notification message and send it to the terminal through the second notification message; of course It is also possible to send the received parameters to the terminal through other messages.
相应的,如果终端接收到Update-MAC,则终端对Update-MAC进行完整性验证,验证通过后,会进行USIM参数更新。Correspondingly, if the terminal receives the Update-MAC, the terminal performs integrity verification on the Update-MAC. After the authentication is passed, the USIM parameters are updated.
可选的,USIM参数更新包括:终端会把接收到的USIM参数发送给USIM卡以使得所述USIM按照所述USIM参数进行内部参数的更新。Optionally, the USIM parameter update includes: the terminal sends the received USIM parameter to the USIM card, so that the USIM updates the internal parameters according to the USIM parameter.
可选的,USIM参数更新包括:终端把第一安全参数发送给USIM卡,USIM卡对所述第一安全参数进行验证,验证成功之后,会向ME发送响应消息USIM卡响应。当然,USIM卡对所述第一安全参数验证成功后,会更新USIM卡中的参数。Optionally, the USIM parameter update includes: the terminal sends the first security parameter to the USIM card, and the USIM card verifies the first security parameter. After the authentication is successful, it sends a response message USIM card response to the ME. Of course, after the USIM card successfully verifies the first security parameter, the parameters in the USIM card will be updated.
可选的,完整性验证的方式可以为:若终端接收到Counter、则终端先对Counter进行校验,以确认接收到的Counter值大于本地存储的Counter值。验证通过后,按照与AUSF相同的计算方式,计算终端侧的UE-Update-MAC。若UE-Update-MAC与接收到的Update-MAC相同,则验证成功,最终确认更新参数和第一安全参数未遭受篡改。Optionally, the integrity verification method may be: if the terminal receives the counter, the terminal first checks the counter to confirm that the received counter value is greater than the counter value stored locally. After the verification is passed, the UE-Update-MAC on the terminal side is calculated according to the same calculation method as AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
可选的,完整性验证的方式可以为:终端按照与AUSF相同的计算方式,计算终端侧的UE-Update-MAC。若UE-Update-MAC与接收到的Update-MAC相同,则验证成功,最终确认更新参数和第一安全参数未遭受篡改。Optionally, the integrity verification method may be: the terminal calculates the UE-Update-MAC on the terminal side according to the same calculation method as the AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
进一步可选的,所述终端更新完USIM参数之后,所述终端会向所述第一UDM进行反馈。具体的,所述反馈的方法具体的包括步骤S1308-1310。Further optionally, after the terminal finishes updating the USIM parameters, the terminal feedbacks to the first UDM. Specifically, the feedback method specifically includes steps S1308-1310.
S1308、终端向AMF发送第一反馈消息。S1308: The terminal sends a first feedback message to the AMF.
其中,所述第一反馈消息可以是上行NAS消息。The first feedback message may be an uplink NAS message.
相应的,AMF接收终端发送的上行NAS消息。Correspondingly, the AMF receives an uplink NAS message sent by the terminal.
所述消息包括UE-Counter-MAC;其中,所述UE-Counter-MAC是对UE侧接收到的计数值的完整性保护。可选的,还包括USIM响应;可选的,还包括UE的响应。The message includes a UE-Counter-MAC; wherein the UE-Counter-MAC is an integrity protection for the count value received by the UE side. Optionally, a USIM response is also included; optionally, a response from the UE is also included.
其中,所述UE-Counter-MAC是根据保护密钥以及接收到的Counter生成的。可选的,USIM卡响应和/或UE的响应也是生成UE-Counter-MAC可选参数。The UE-Counter-MAC is generated according to the protection key and the received Counter. Optionally, the response of the USIM card and / or the response of the UE is also a UE-Counter-MAC optional parameter.
S1309、AMF向第一UDM发送第二反馈消息。S1309. The AMF sends a second feedback message to the first UDM.
相应的,第一UDM接收AMF发送的通知响应。Correspondingly, the first UDM receives the notification response sent by the AMF.
所述消息包括UE-Counter-MAC;可选的,还包括USIM响应;可选的,还包括UE的 响应。The message includes a UE-Counter-MAC; optionally, it also includes a USIM response; optionally, it also includes a response from the UE.
作为一种可能的实现方式,AMF返回Nudm_SDM_Notification response服务响应向第一UDM发送通知响应。As a possible implementation manner, the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
S1310、第一UDM接收AMF发送的通知消息。S1310. The first UDM receives a notification message sent by the AMF.
第一UDM校验接收到的UE-Counter-MAC与从AUSF接收到的Counter-MAC是否相同。若相同,则代表UE已完成更新参数和第一安全参数的更新。The first UDM checks whether the UE-Counter-MAC received is the same as the Counter-MAC received from the AUSF. If they are the same, it means that the UE has finished updating the update parameters and the first security parameter.
上述流程中,Update-MAC,UE-Update-MAC,Counter-MAC,UE-Counter-MAC的计算函数适用任意消息验证码函数,例如密钥相关的哈希运算消息认证码,密钥推衍函数等不做限制。上述流程以USIM进行了描述,也可以为其他UICC,不做限制。In the above process, the calculation functions of Update-MAC, UE-Update-MAC, Counter-MAC, and UE-Counter-MAC are applicable to any message verification code function, such as key-related hash operation message authentication code, and key derivation function. Wait without restrictions. The above process is described in USIM, and it can also be other UICC without limitation.
另外,在本发明的另一个实施例中,提供了一种更新终端内参数的方法。In addition, in another embodiment of the present invention, a method for updating parameters in a terminal is provided.
可以理解的是,终端包括ME(Mobile Equipment,移动终端)和USIM。其中,更新参数主要包括两类:USIM参数(即USIM内需要更新的参数)和ME参数(即ME内需要更新的参数)。It can be understood that the terminals include ME (Mobile Equipment) and USIM. Among them, the update parameters mainly include two types: USIM parameters (that is, parameters that need to be updated in the USIM) and ME parameters (that is, parameters that need to be updated in the ME).
其中,USIM参数为RI信息,切片选择参数,切片ID,公钥标识,公钥参数,NSSAI(Network Slice Selection Assistance Information,切片选择辅助信息),S-NSSAI(Single-Network Slice Selection Assistance Information,单个切片选择辅助信息),Configured NSSAI(Configured Network Slice Selection Assistance Information,配置的切片选择辅助信息),Requested NSSAI(Requested Network Slice Selection Assistance Information,请求的切片选择辅助信息),封闭接入群组标识,封闭群组标识,封闭用户群组标识,群组标识,用户群组标识,网络群组标识等参数中的至少一种;Among them, the USIM parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters;
其中,ME参数为RI信息,切片选择参数,切片ID,公钥标识,公钥参数,NSSAI(Network Slice Selection Assistance Information,切片选择辅助信息),S-NSSAI(Single-Network Slice Selection Assistance Information,单个切片选择辅助信息),Configured NSSAI(Configured Network Slice Selection Assistance Information,配置的切片选择辅助信息),Requested NSSAI(Requested Network Slice Selection Assistance Information,请求的切片选择辅助信息),封闭接入群组标识,封闭群组标识,封闭用户群组标识,群组标识,用户群组标识,网络群组标识等参数中的至少一种。Among them, the ME parameters are RI information, slice selection parameters, slice ID, public key identification, public key parameters, NSSAI (Network Slice Selection Assistant Information), S-NSSAI (Single-Network Slice Selection Assistant Information), single Slice selection assistance information), Configured NSSAI (Configured Network Selection Selection Assistant Information), Requested NSSAI (Requested Network Selection Selection Assistant Information), closed access group identification, closed Group identification, closed user group identification, group identification, user group identification, network group identification and other parameters.
另外,进一步需要指出的是,更新终端内参数的原因可以是:用户的UDM调整而导致USIM卡和/或ME内的参数修改。In addition, it should be further pointed out that the reason for updating the parameters in the terminal may be: the user's UDM adjustment causes the parameters in the USIM card and / or ME to be modified.
具体的,所述更新终端内参数的方法包括:Specifically, the method for updating parameters in the terminal includes:
S1401、第一UDM向AMF发送第一通知消息。S1401. The first UDM sends a first notification message to the AMF.
相应的,AMF接收第一UDM发送的通知消息。Correspondingly, the AMF receives the notification message sent by the first UDM.
作为一种可能的实现方式,第一UDM使用Nudm_SDM_Notification request服务向AMF发送通知消息。As a possible implementation manner, the first UDM sends a notification message to the AMF using the Nudm_SDM_Notification request service.
可选的,所述第一通知消息包括更新参数(USIM参数和/或ME参数)。Optionally, the first notification message includes update parameters (USIM parameters and / or ME parameters).
可选的,所述第一通知消息包括更新参数和第一安全参数。其中,需要指出的是,第一安全参数是第一UDM根据第一UDM与USIM之间的共享密钥和USIM参数计算得到的。所述共享密钥可以为初始配置的密钥或者认证中生成的密钥,例如OTA密钥,认证根密钥,CK,IK,MSK,EMSK等的至少一项。所述第一安全参数可以包括USIM参数和USIM 校验参数。其中USIM校验参数用于USIM校验第一安全参数中USIM参数的正确性。Optionally, the first notification message includes an update parameter and a first security parameter. It should be noted that the first security parameter is calculated by the first UDM according to the shared key between the first UDM and the USIM and the USIM parameter. The shared key may be an initially configured key or a key generated during authentication, for example, at least one of an OTA key, an authentication root key, CK, IK, MSK, and EMSK. The first security parameter may include a USIM parameter and a USIM verification parameter. The USIM verification parameter is used by the USIM to verify the correctness of the USIM parameter in the first security parameter.
S1402、AMF向终端发送第二通知消息;S1402. The AMF sends a second notification message to the terminal.
其中,该第二通知消息可以是下行NAS消息。The second notification message may be a downlink NAS message.
该第二通知消息携带更新参数、第一安全参数(可选的)、Update-MAC(可选的)、Counter(可选的)。The second notification message carries an update parameter, a first security parameter (optional), an Update-MAC (optional), and a Counter (optional).
S1403、所述终端接收所述第二通知消息;S1403. The terminal receives the second notification message.
S1404、所述终端根据所述第二通知消息对所述终端内的参数进行更新。S1404. The terminal updates parameters in the terminal according to the second notification message.
另外,可选的,在步骤S1301之前,所述方法还包括:第一UDM与AUSF进行交互以获取Update MAC。所述Update MAC用于对更新参数进行完整性保护。In addition, optionally, before step S1301, the method further includes: the first UDM interacts with the AUSF to obtain an Update MAC. The Update MAC is used to perform integrity protection on update parameters.
具体的所述第一UDM与AUSF进行交互以获取Update MAC,包括S1405-1407.Specifically, the first UDM interacts with AUSF to obtain Update MAC, including S1405-1407.
S1405、所述第一UDM向AUSF发送保护请求消息。S1405. The first UDM sends a protection request message to the AUSF.
相应的,AUSF接收第一UDM发送的保护请求消息。Correspondingly, the AUSF receives the protection request message sent by the first UDM.
可选的,若更新参数中包括USIM参数,则第一UDM首先根据第一UDM与USIM的共享密钥和USIM参数,计算得到第一安全参数。所述安全参数1可以包括USIM参数和USIM校验参数。其中USIM校验参数用于USIM校验安全参数中USIM参数的正确性。Optionally, if the USIM parameter is included in the update parameter, the first UDM first calculates the first security parameter according to the shared key of the first UDM and the USIM and the USIM parameter. The security parameter 1 may include USIM parameters and USIM verification parameters. The USIM verification parameter is used for correctness of the USIM parameter in the USIM verification security parameter.
可选的,该保护请求消息携带更新参数和第一安全参数。Optionally, the protection request message carries an update parameter and a first security parameter.
可选的,该保护请求消息携带更新参数。Optionally, the protection request message carries update parameters.
可选的,该保护请求消息中还可能包括期望的USIM卡响应;Optionally, the protection request message may further include a desired USIM card response;
可选的,该保护请求消息中还可能包括期望的UE响应。Optionally, the protection request message may further include a desired UE response.
S1406、所述AUSF根据所述保护请求消息生成Update-MAC。S1406. The AUSF generates an Update-MAC according to the protection request message.
可选的,所述AUSF根据更新参数和/或第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to an update parameter and / or a first security parameter.
可选的,所述AUSF根据保护密钥,Counter(AUSF存储的计数值),更新参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC by updating parameters according to a protection key and a Counter (a counter value stored by the AUSF).
可选的,所述AUSF根据保护密钥,Counter(AUSF存储的计数值),更新参数和第一安全参数生成Update-MAC。Optionally, the AUSF generates an Update-MAC according to a protection key, a Counter (a counter value stored by the AUSF), an update parameter, and a first security parameter.
其中保护密钥为UE与AUSF共享的密钥,这里保护密钥可以为初始配置的密钥,或者认证中生成的密钥,例如Kausf密钥等。The protection key is a key shared by the UE and the AUSF. The protection key here may be an initially configured key, or a key generated during authentication, such as a Kausf key.
可选的,AUSF根据所述Counter和保护密钥生成Counter-MAC。所述Counter-MAC用于对所述Counter进行完整性保护。另外,需要指出的是,Counter-MAC的计算参数输入还可能包括期望的USIM响应。Counter-MAC的计算参数输入还可能包括期望的UE响应Optionally, the AUSF generates a Counter-MAC according to the Counter and the protection key. The Counter-MAC is used to perform integrity protection on the Counter. In addition, it should be noted that the input of the calculation parameters of the Counter-MAC may also include the expected USIM response. Counter-MAC calculation parameter input may also include expected UE response
S1407、所述AUSF向第一UDM发送保护响应。S1407. The AUSF sends a protection response to the first UDM.
相应的,第一UDM接收AUSF发送的保护响应。Correspondingly, the first UDM receives the protection response sent by the AUSF.
其中,保护响应携带Update-MAC。The protection response carries the Update-MAC.
可选的,所述保护响应还可能包括Counter和/或Counter-MAC。Optionally, the protection response may further include Counter and / or Counter-MAC.
相应的,第一UDM接收到保护响应之后,在向AMF发送的第一通知消息中包括Update-MAC。当然,也有可能还会包括从AUSF接收到的Counter。可以理解的是,如果 AMF接收到的第一通知消息中包括Update-MAC和/或Counter,那么AMF会将这些参数添加在第二通知消息中,通过第二通知消息发送给所述终端;当然也有可能通过其他消息将接收到的参数发送给所述终端。Correspondingly, after the first UDM receives the protection response, the first notification message sent to the AMF includes Update-MAC. Of course, it is also possible to include the Counter received from AUSF. It can be understood that if the first notification message received by the AMF includes Update-MAC and / or Counter, the AMF will add these parameters to the second notification message and send it to the terminal through the second notification message; of course It is also possible to send the received parameters to the terminal through other messages.
相应的,如果终端接收到Update-MAC,则终端对Update-MAC进行完整性验证,验证通过后,会进行更新参数的更新。Correspondingly, if the terminal receives the Update-MAC, the terminal performs integrity verification on the Update-MAC. After the authentication is passed, the update parameters are updated.
根据接收到更新参数中的ME参数,终端更新ME内存储的对应参数。若第二通知消息中还包含第一安全参数,则发送第一安全参数至终端内USIM。Upon receiving the ME parameters in the update parameters, the terminal updates the corresponding parameters stored in the ME. If the second notification message further includes the first security parameter, the first security parameter is sent to the USIM in the terminal.
可选的,USIM参数更新包括:终端会把接收到的USIM参数发送给USIM卡以使得所述USIM按照所述USIM参数进行内部参数的更新。之后USIM卡会向ME发送响应消息USIM卡响应。Optionally, the USIM parameter update includes: the terminal sends the received USIM parameter to the USIM card, so that the USIM updates the internal parameters according to the USIM parameter. The USIM card will then send a response message to the ME to respond to the USIM card.
可选的,USIM参数更新包括:终端把第一安全参数发送给USIM卡,USIM卡对所述第一安全参数进行验证,验证成功之后,会向ME发送响应消息USIM卡响应。当然,USIM卡对所述第一安全参数验证成功后,会更新USIM卡中的参数。Optionally, the USIM parameter update includes: the terminal sends the first security parameter to the USIM card, and the USIM card verifies the first security parameter. After the authentication is successful, it sends a response message USIM card response to the ME. Of course, after the USIM card successfully verifies the first security parameter, the parameters in the USIM card will be updated.
可选的,完整性验证的方式可以为:若终端接收到Counter、则终端先对Counter进行校验,以确认接收到的Counter值大于本地存储的Counter值。验证通过后,按照与AUSF相同的计算方式,计算终端侧的UE-Update-MAC。若UE-Update-MAC与接收到的Update-MAC相同,则验证成功,最终确认更新参数和第一安全参数未遭受篡改。Optionally, the integrity verification method may be: if the terminal receives the counter, the terminal first checks the counter to confirm that the received counter value is greater than the counter value stored locally. After the verification is passed, the UE-Update-MAC on the terminal side is calculated according to the same calculation method as AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
可选的,完整性验证的方式可以为:终端按照与AUSF相同的计算方式,计算终端侧的UE-Update-MAC。若UE-Update-MAC与接收到的Update-MAC相同,则验证成功,最终确认更新参数和第一安全参数未遭受篡改。Optionally, the integrity verification method may be: the terminal calculates the UE-Update-MAC on the terminal side according to the same calculation method as the AUSF. If the UE-Update-MAC is the same as the received Update-MAC, the verification is successful, and finally it is confirmed that the update parameters and the first security parameter have not been tampered with.
进一步可选的,所述终端更新完USIM参数之后,所述终端会向所述第一UDM进行反馈。具体的,所述反馈的方法具体的包括步骤S1408-1410。Further optionally, after the terminal finishes updating the USIM parameters, the terminal feedbacks to the first UDM. Specifically, the feedback method specifically includes steps S1408-1410.
S1408、终端向AMF发送第一反馈消息。S1408: The terminal sends a first feedback message to the AMF.
其中,所述第一反馈消息可以是上行NAS消息。The first feedback message may be an uplink NAS message.
相应的,AMF接收终端发送的上行NAS消息。Correspondingly, the AMF receives an uplink NAS message sent by the terminal.
所述消息包括UE-Counter-MAC;其中,所述UE-Counter-MAC是对UE侧接收到的计数值的完整性保护。可选的,还包括USIM响应;可选的,还包括UE的响应。The message includes a UE-Counter-MAC; wherein the UE-Counter-MAC is an integrity protection for the count value received by the UE side. Optionally, a USIM response is also included; optionally, a response from the UE is also included.
其中,所述UE-Counter-MAC是根据保护密钥以及接收到的Counter生成的。可选的,USIM-Response和/或UE的响应也是生成UE-Counter-MAC可选参数。The UE-Counter-MAC is generated according to the protection key and the received Counter. Optionally, the USIM-Response and / or the response of the UE is also a UE-Counter-MAC optional parameter.
S1409、AMF向第一UDM发送第二反馈消息。S1409. The AMF sends a second feedback message to the first UDM.
相应的,第一UDM接收AMF发送的通知响应。Correspondingly, the first UDM receives the notification response sent by the AMF.
所述消息包括UE-Counter-MAC;可选的,还包括USIM响应;可选的,还包括UE的响应。The message includes a UE-Counter-MAC; optionally, it also includes a USIM response; and optionally, it also includes a response from the UE.
作为一种可能的实现方式,AMF返回Nudm_SDM_Notification response服务响应向第一UDM发送通知响应。As a possible implementation manner, the AMF returns a Nudm_SDM_Notification response service response and sends a notification response to the first UDM.
S1410、第一UDM接收AMF发送的通知消息。S1410. The first UDM receives a notification message sent by the AMF.
第一UDM校验接收到的UE-Counter-MAC与从AUSF接收到的Counter-MAC是否相同。若相同,则代表UE已完成更新参数和/或第一安全参数的更新。The first UDM checks whether the UE-Counter-MAC received is the same as the Counter-MAC received from the AUSF. If they are the same, it means that the UE has completed updating the update parameters and / or the first security parameter.
上述流程中,Update-MAC,UE-Update-MAC,Counter-MAC,UE-Counter-MAC的计算 函数适用任意消息验证码函数,例如密钥相关的哈希运算消息认证码,密钥推衍函数等不做限制。上述流程以USIM进行了描述,也可以为其他UICC,不做限制。In the above process, the calculation functions of Update-MAC, UE-Update-MAC, Counter-MAC, and UE-Counter-MAC are applicable to any message verification code function, such as key-related hash operation message authentication code, and key derivation function. Wait without restrictions. The above process is described in USIM, and it can also be other UICC without limitation.
另外,需要指出的是,针对上述流程,可以完成USIM参数的更新,也可以完成ME参数的更新,还可以同时完成USIM参数和ME参数的更新。In addition, it should be pointed out that, for the above process, the updating of USIM parameters, the updating of ME parameters, and the updating of USIM parameters and ME parameters may be completed at the same time.
举例来说,更新参数中可能仅包括ME参数,或者仅包括USIM参数。For example, the update parameters may include only ME parameters or only USIM parameters.
举例来说:更新参数中可能还包括USIM和ME都需要更新的参数。UDM可以将此USIM和ME都需要更新的参数作为第一安全参数计算的输入参数,得到第一安全参数;同时将此参数发送给AUSF,以使AUSF将此USIM和ME都需要更新的参数作为Update-MAC计算的输入。另外,UDM也会将此参数发送给UE,以使UE将USIM和ME都需要更新的参数作为UE-Update-MAC计算的输入,得到UE-Update-MAC。通过UE-Update-MAC和Update-MAC的比对,进而校验Update-MAC的正确性。若校验成功,则执行ME内相关参数的更新;另外将第一安全参数发送给USIM。For example: the update parameters may also include parameters that both the USIM and the ME need to update. The UDM can use the parameters that both the USIM and the ME need to update as input parameters for the calculation of the first safety parameter to obtain the first safety parameter; meanwhile, send this parameter to the AUSF so that the AUSF can use the parameters that both the USIM and the ME need to update as Update-MAC calculation input. In addition, the UDM also sends this parameter to the UE, so that the UE uses the parameters that both the USIM and the ME need to update as input for the UE-Update-MAC calculation to obtain the UE-Update-MAC. The UE-Update-MAC is compared with the Update-MAC to verify the correctness of the Update-MAC. If the verification is successful, the related parameters in the ME are updated; in addition, the first security parameter is sent to the USIM.
举例来说:更新参数中可能还包括USIM和ME都需要更新的参数。UDM可以将此参数作为第二安全参数计算的输入参数,得到第二安全参数;同时将此参数和第二安全参数发送给AUSF,以使AUSF将此参数和第二安全参数作为Update-MAC计算的输入。同时UDM也将USIM和ME都需要更新的参数和第二安全参数发送给UE。UE将USIM和ME都需要更新的参数和第二安全参数作为UE-Update-MAC计算的输入,得到UE-Update-MAC。通过UE-Update-MAC和Update-MAC的比对,进而校验Update-MAC的正确性。若校验成功,则执行ME内相关参数的更新;另外将第一安全参数和第二安全参数发送给USIM。For example: the update parameters may also include parameters that both the USIM and the ME need to update. The UDM can use this parameter as the input parameter for the calculation of the second security parameter to obtain the second security parameter; at the same time, send this parameter and the second security parameter to the AUSF, so that the AUSF calculates this parameter and the second security parameter as Update-MAC input of. At the same time, the UDM also sends the parameters that the USIM and the ME need to update and the second security parameter to the UE. The UE uses the parameters that both the USIM and the ME need to update and the second security parameter as inputs for the UE-Update-MAC calculation to obtain the UE-Update-MAC. The UE-Update-MAC is compared with the Update-MAC to verify the correctness of the Update-MAC. If the verification is successful, the related parameters in the ME are updated; in addition, the first security parameter and the second security parameter are sent to the USIM.
举例来说:安全参数(第一安全参数和/或第二安全参数)可以包括对应的参数和安全校验的信息。若安全参数仅包括安全校验的信息,则UE需将对应的参数和安全参数发送给USIM;另外更新参数也需要保留USIM参数。For example, the security parameters (the first security parameter and / or the second security parameter) may include corresponding parameters and information of security verification. If the security parameters include only the information of security verification, the UE needs to send the corresponding parameters and security parameters to the USIM; in addition, updating the parameters also needs to retain the USIM parameters.
可能性:安全参数(第一安全参数和/或第二安全参数)可以包括对应的参数和安全校验的信息。此时更新参数中也可以去掉USIM参数,仅包含ME参数和/或USIM和ME都需要更新的参数。Possibility: The safety parameters (the first safety parameter and / or the second safety parameter) may include corresponding parameters and information of safety verification. At this time, the USIM parameters can also be removed from the update parameters, and only the ME parameters and / or the parameters that both the USIM and the ME need to be updated are included.
可能性:若更新参数中包含USIM参数,UDM也可以不计算第一安全参数和/或第二安全参数,仅发送更新参数至AUSF,以使AUSF根据更新参数计算得到Update-MAC。之后其他流程,都不需要体现第一安全参数和/或第二安全参数。Possibility: If the update parameter includes the USIM parameter, the UDM may not calculate the first security parameter and / or the second security parameter, and only sends the update parameter to the AUSF, so that the AUSF calculates the Update-MAC according to the update parameter. After that, other processes do not need to reflect the first safety parameter and / or the second safety parameter.
可能性:UDM可能还会发送是否需要UE发送响应消息的指示给AUSF。AUSF将此是否需要UE发送响应消息的指示作为Update-MAC计算的输入。UDM也会将是否需要UE发送响应消息的指示发送给UE。UE将此是否需要UE发送响应消息的指示作为UE-Update-MAC计算的输入,并校验计算出的UE-Update-MAC与接收到的Update-MAC是否一致。若一致的话,UE会发送响应消息至UDM。Possibility: The UDM may also send an indication of whether the UE is required to send a response message to the AUSF. The AUSF uses this indication of whether the UE needs to send a response message as an input to the Update-MAC calculation. The UDM also sends an indication of whether the UE is required to send a response message to the UE. The UE uses the indication of whether the UE needs to send a response message as an input of the UE-Update-MAC calculation, and checks whether the calculated UE-Update-MAC is consistent with the received Update-MAC. If they are consistent, the UE sends a response message to the UDM.
可能性:UDM可能还会发送是否需要UE重注册的指示给AUSF。AUSF将此是否需要UE重注册的指示作为Update-MAC计算的输入。UDM也会将是否需要UE重注册的指示发送给UE。UE将此是否需要UE重注册的指示作为UE-Update-MAC计算的输入,并校验计算出的UE-Update-MAC与接收到的Update-MAC是否一致。若一致的话,之后UE会发起重新注册流程至UDM。Possibility: The UDM may also send an indication to the AUSF whether the UE needs to re-register. The AUSF uses this indication of whether UE re-registration is required as input for the Update-MAC calculation. The UDM also sends an indication of whether the UE needs to re-register to the UE. The UE uses the indication of whether the UE needs to re-register as an input of the UE-Update-MAC calculation, and checks whether the calculated UE-Update-MAC is consistent with the received Update-MAC. If they are consistent, the UE will then initiate a re-registration process to the UDM.
针对上述实施例,不仅仅包括RI需要更新。其他参数也可以通过上述所有实施例流 程进行更新。For the above embodiment, it is not only included that the RI needs to be updated. Other parameters can also be updated through the processes of all the above embodiments.
可以理解的是,本申请实施例中的网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。结合本申请中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以对每个特定的应用来使用不同的方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的技术方案的范围。It can be understood that, in order to implement the foregoing functions, the network element in the embodiment of the present application includes a hardware structure and / or a software module corresponding to each function. With reference to the units and algorithm steps of each example described in the embodiments disclosed in this application, the embodiments of this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the technical solutions of the embodiments of the present application.
本申请实施例可以根据上述方法示例对网元进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In the embodiment of the present application, functional unit division may be performed on the network element according to the foregoing method example. For example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The above integrated unit may be implemented in the form of hardware or in the form of software functional unit. It should be noted that the division of the units in the embodiments of the present application is schematic, and is only a logical function division. There may be another division manner in actual implementation.
图13示出了本申请实施例中提供的路由装置的一种示意性框图,其中,路由装置可以为上述的终端或者AMF或者AUSF或者UDM。该路由装置1300可以以软件的形式存在,还可以为可用于设备的芯片。路由装置1300包括:处理单元1302和通信单元1303。FIG. 13 shows a schematic block diagram of a routing device provided in an embodiment of the present application, where the routing device may be the foregoing terminal or AMF, AUSF, or UDM. The routing device 1300 may exist in the form of software, or may be a chip that can be used in a device. The routing device 1300 includes a processing unit 1302 and a communication unit 1303.
若路由装置1300为终端,处理单元1302可以用于支持终端执行图5至图9中的S515,图7、图8、图9中的双向鉴权,图11中的S1103,图12中的S1209、S1212、S1213等,和/或用于本文所描述的方案的其它过程。通信单元1303用于支持终端和其他网元(例如AMF等)之间的通信,例如支持终端执行图5至图9中的S501,图4中的S514,图6中的S614,图7中的S714,图8中的S810,图9中的S916,图10中的S514,图11中的S1102、S1104,图12中的S1208、S1210等。If the routing device 1300 is a terminal, the processing unit 1302 may be used to support the terminal to perform S515 in FIG. 5 to FIG. 9, two-way authentication in FIG. 7, FIG. 8, and FIG. 9, S1103 in FIG. 11, and S1209 in FIG. , S1212, S1213, etc., and / or other processes for the schemes described herein. The communication unit 1303 is used to support communication between the terminal and other network elements (such as AMF, etc.), for example, to support the terminal to execute S501 in FIG. 5 to FIG. 9, S514 in FIG. 4, S614 in FIG. 6, and S714, S810 in FIG. 8, S916 in FIG. 9, S514 in FIG. 10, S1102, S1104 in FIG. 11, S1208, S1210 in FIG. 12, and the like.
若路由装置1300为AMF,处理单元1302可以用于支持AMF执行图5至图9中的S502,图6、图7、图8、图9中的双向鉴权,图12中的S1212、S1213等,和/或用于本文所描述的方案的其它过程。通信单元1303用于支持AMF和其他网元之间的通信,例如支持AMF执行图5至图9中的S501、S503,图5中的S513等。If the routing device 1300 is an AMF, the processing unit 1302 may be used to support the AMF to perform S502 in FIGS. 5 to 9, FIG. 6, FIG. 7, FIG. 8, and FIG. , And / or other processes for the schemes described herein. The communication unit 1303 is configured to support communication between the AMF and other network elements, for example, to support the AMF to perform S501 and S503 in FIGS. 5 to 9 and S513 in FIG. 5.
若路由装置1300为AUSF,处理单元1302可以用于AUSF网元执行如图5至图9中的S504,和/或用于本文所描述的方案的其它过程。通信单元1303,例如用于支持AUSF执行图5至图8中的S503、S505,图6中的S613等。If the routing device 1300 is AUSF, the processing unit 1302 may be used by the AUSF network element to perform S504 as shown in FIG. 5 to FIG. 9 and / or other processes used in the scheme described herein. The communication unit 1303 is, for example, used to support AUSF to perform S503 and S505 in FIG. 5 to FIG. 8 and S613 in FIG. 6.
若路由装置1300为UDM,处理单元1302可以用于UDM网元执行如图5至图10中的S506等,和/或用于本文所描述的方案的其它过程。通信单元1303,例如用于支持UDM执行图5至图10中的S505、图5至图7中的S508等。If the routing device 1300 is a UDM, the processing unit 1302 may be used for the UDM network element to perform S506 and the like as shown in FIG. 5 to FIG. 10 and / or other processes for the scheme described herein. The communication unit 1303 is, for example, used to support the UDM to perform S505 in FIG. 5 to FIG. 10, S508 in FIG. 5 to FIG. 7, and the like.
可选的,路由装置1300还可以包括存储单元1301,用于存储路由装置1300的程序代码和数据,数据可以包括不限于原始数据或者中间数据等。Optionally, the routing device 1300 may further include a storage unit 1301 for storing program code and data of the routing device 1300. The data may include, but is not limited to, original data or intermediate data.
一种可能的方式中,处理单元1302可以是控制器或图4所示的处理器401或处理器405,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理(Digital Signal Processing,DSP),应用专用集成电路(Application Specific Integrated Circuit,ASIC),现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以 实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信单元1303可以是收发器、收发电路或图4所示的通信接口404等。存储单元1301可以是图4所示的存储器403。In a possible manner, the processing unit 1302 may be a controller or the processor 401 or the processor 405 shown in FIG. 4, for example, it may be a central processing unit (Central Processing Unit, CPU), a general-purpose processor, and digital signal processing ( Digital Signal Processing (DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any of them combination. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure. The processor may also be a combination that implements computing functions, such as a combination including one or more microprocessors, a combination of a DSP and a microprocessor, and so on. The communication unit 1303 may be a transceiver, a transceiver circuit, or the communication interface 404 shown in FIG. 4 and the like. The storage unit 1301 may be a memory 403 shown in FIG. 4.
本领域普通技术人员可以理解:在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包括一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(Digital Video Disc,DVD))、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。A person of ordinary skill in the art may understand that in the foregoing embodiments, all or part may be implemented by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions according to the embodiments of the present application are generated. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server, or data center Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, and the like including one or more available medium integration. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a Digital Video Disc (DVD)), or a semiconductor medium (for example, a solid state disk (Solid State Disk, SSD)) )Wait.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络设备(例如终端设备)上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, which may be located in one place, or may be distributed to multiple network devices (for example, Terminal device). Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个功能单元独立存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each functional unit may exist independently, or two or more units may be integrated into one unit. The above integrated unit may be implemented in the form of hardware, or in the form of hardware plus software functional units.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在可读取的存储介质中,如计算机的软盘,硬盘或光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that this application can be implemented by means of software plus necessary general hardware, and of course, also by hardware, but in many cases the former is a better implementation. . Based on such an understanding, the technical solution of this application that is essentially or contributes to the existing technology can be embodied in the form of a software product, which is stored in a readable storage medium, such as a computer's floppy disk , A hard disk or an optical disc, etc., includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments of the present application.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above description is only a specific implementation of the present application, but the scope of protection of the present application is not limited thereto, and changes or replacements within the technical scope disclosed in the present application shall be covered by the protection of the present application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims (86)

  1. 一种路由方法,其特征在于,包括:A routing method, comprising:
    认证服务器功能AUSF网元向第一统一数据管理UDM网元发送第一鉴权向量获取请求;The authentication server function AUSF network element sends a first authentication vector acquisition request to the first unified data management UDM network element;
    若所述AUSF网元接收到所述第一UDM网元发送的路由指示RI,则向接入和移动性管理功能AMF网元发送所述RI。If the AUSF network element receives the routing indication RI sent by the first UDM network element, it sends the RI to an access and mobility management function AMF network element.
  2. 根据权利要求1所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 1, further comprising:
    若所述AUSF网元接收到所述第一UDM网元发送的重定向消息,则所述AUSF网元根据所述重定向消息向第二UDM网元发送第二鉴权向量获取请求;If the AUSF network element receives a redirect message sent by the first UDM network element, the AUSF network element sends a second authentication vector acquisition request to a second UDM network element according to the redirect message;
    所述AUSF网元接收所述第二UDM网元发送的RI;以及Receiving, by the AUSF network element, an RI sent by the second UDM network element; and
    所述AUSF网元向所述AMF网元发送所述RI。Sending, by the AUSF network element, the RI to the AMF network element.
  3. 根据权利要求1或2所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 1 or 2, wherein the method further comprises:
    所述AUSF网元根据完整性保护密钥以及所述RI确定所述RI的完整性验证码;Determining, by the AUSF network element, an integrity verification code of the RI according to the integrity protection key and the RI;
    所述AUSF网元向AMF网元发送所述完整性验证码。The AUSF network element sends the integrity verification code to an AMF network element.
  4. 根据权利要求3所述的路由方法,其特征在于,所述AUSF网元根据完整性保护密钥以及所述RI确定所述RI的完整性验证码之前,所述方法还包括:The routing method according to claim 3, wherein before the AUSF network element determines the integrity verification code of the RI according to the integrity protection key and the RI, the method further comprises:
    所述AUSF网元接收所述第一UDM网元或第二UDM网元发送的完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF生成针对RI的完整性验证码。The AUSF network element receives an integrity protection request message sent by the first UDM network element or the second UDM network element, and the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI.
  5. 一种路由方法,其特征在于,包括:A routing method, comprising:
    第一统一数据管理UDM网元接收认证服务器功能AUSF网元发送的第一鉴权向量获取请求;The first unified data management UDM network element receives a first authentication vector acquisition request sent by an authentication server function AUSF network element;
    响应于所述第一鉴权向量获取请求,所述第一UDM网元向所述AUSF网元发送重定向消息或路由指示RI。In response to the first authentication vector acquisition request, the first UDM network element sends a redirect message or a route indication RI to the AUSF network element.
  6. 根据权利要求5所述的路由方法,其特征在于,所述第一UDM网元向所述AUSF网元发送RI包括:The routing method according to claim 5, wherein the sending, by the first UDM network element, the RI to the AUSF network element comprises:
    当所述第一UDM网元为用户归属的UDM网元时,所述第一UDM网元向所述AUSF网元发送RI。When the first UDM network element is a UDM network element to which a user belongs, the first UDM network element sends an RI to the AUSF network element.
  7. 根据权利要求5所述的路由方法,其特征在于,所述第一UDM网元向所述AUSF网元发送重定向消息包括:The routing method according to claim 5, wherein the sending a redirect message by the first UDM network element to the AUSF network element comprises:
    当所述第一UDM网元不是用户归属的UDM网元时,则所述第一UDM网元向所述AUSF网元发送重定向消息。When the first UDM network element is not the UDM network element to which the user belongs, the first UDM network element sends a redirect message to the AUSF network element.
  8. 根据权利要求5至7任一所述的路由方法,其特征在于,所述方法还包括:The routing method according to any one of claims 5 to 7, wherein the method further comprises:
    所述第一UDM网元接收AMF网元发送的用户数据获取请求消息;Receiving, by the first UDM network element, a user data acquisition request message sent by an AMF network element;
    所述第一UDM网元向AUSF网元发送完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF网元生成针对RI的完整性验证码。The first UDM network element sends an integrity protection request message to an AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate an integrity verification code for an RI.
  9. 根据权利要求8所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 8, wherein the method further comprises:
    所述第一UDM网元向所述AUSF网元发送完整性保护请求消息;Sending, by the first UDM network element, an integrity protection request message to the AUSF network element;
    所述第一UDM网元接收所述AUSF网元发送的完整性验证码;Receiving, by the first UDM network element, an integrity verification code sent by the AUSF network element;
    所述第一UDM网元向所述AUSF网元发送RI,包括:The sending, by the first UDM network element to the AUSF network element, an RI includes:
    所述第一UDM网元向所述AUSF网元发送经过所述完整性验证码保护的RI。Sending, by the first UDM network element, the RI protected by the integrity verification code to the AUSF network element.
  10. 一种路由方法,其特征在于,包括:A routing method, comprising:
    终端接收接入和移动性管理功能AMF网元发送的路由指示RI;The terminal receives the routing indication RI sent by the access and mobility management function AMF network element;
    所述终端利用所述RI更新用户隐藏标识SUCI的信息。The terminal uses the RI to update the user's hidden identification SUCI information.
  11. 根据权利要求10所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 10, wherein the method further comprises:
    若所述终端接收到所述RI对应的完整性验证码,则利用所述完整性验证码对所述RI进行完整性验证;If the terminal receives an integrity verification code corresponding to the RI, use the integrity verification code to perform integrity verification on the RI;
    所述终端利用所述RI更新SUCI的信息,包括:The updating, by the terminal, SUCI information using the RI includes:
    若对所述RI的完整性验证成功,则所述终端利用所述RI更新SUCI的信息。If the integrity verification of the RI is successful, the terminal uses the RI to update SUCI information.
  12. 根据权利要求10或11所述的路由方法,其特征在于,所述终端接收AMF发送的RI,包括:The routing method according to claim 10 or 11, wherein the receiving the RI sent by the AMF comprises:
    所述终端接收所述AMF发送的非接入层安全模式命令NAS SMC消息,所述NAS SMC消息携带所述RI。The terminal receives the non-access layer security mode command NAS SMC message sent by the AMF, and the NAS SMC message carries the RI.
  13. 一种路由方法,其特征在于,包括:A routing method, comprising:
    当用户归属的统一数据管理UDM网元由第一UDM变化为第二UDM时,所述第一UDM网元向接入和移动性管理功能AMF网元发送路由指示RI。When the unified data management UDM network element to which the user belongs changes from the first UDM to the second UDM, the first UDM network element sends a routing indication RI to the access and mobility management function AMF network element.
  14. 根据权利要求13所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 13, further comprising:
    第一UDM网元向AUSF网元发送完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF生成针对RI的完整性验证码;The first UDM network element sends an integrity protection request message to the AUSF network element, where the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for the RI;
    所述第一UDM网元接收所述AUSF网元发送的RI的完整性验证码;Receiving, by the first UDM network element, an integrity verification code of an RI sent by the AUSF network element;
    所述第一UDM向所述AMF网元发送所述完整性验证码。Sending, by the first UDM, the integrity verification code to the AMF network element.
  15. 一种路由方法,其特征在于,包括:A routing method, comprising:
    认证服务器功能AUSF网元接收第一统一数据管理UDM网元发送的完整性保护请求消息,所述完整性保护请求消息携带路由指示RI;The authentication server function AUSF network element receives the integrity protection request message sent by the first unified data management UDM network element, where the integrity protection request message carries a routing instruction RI;
    所述AUSF网元根据完整性保护密钥和所述RI生成RI的完整性验证码;The AUSF network element generates an RI integrity verification code according to the integrity protection key and the RI;
    所述AUSF网元向所述第一UDM网元发送所述完整性验证码。Sending, by the AUSF network element, the integrity verification code to the first UDM network element.
  16. 一种路由方法,其特征在于,包括:A routing method, comprising:
    终端接收接入和移动性管理功能AMF网元发送的路由指示RI;The terminal receives the routing indication RI sent by the access and mobility management function AMF network element;
    所述终端利用所述RI更新用户隐藏标识SUCI的信息。The terminal uses the RI to update the user's hidden identification SUCI information.
  17. 根据权利要求16所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 16, further comprising:
    若所述终端接收到所述RI对应的完整性验证码,则利用所述完整性验证码对所述RI进行完整性验证;If the terminal receives an integrity verification code corresponding to the RI, use the integrity verification code to perform integrity verification on the RI;
    所述终端利用所述RI更新SUCI的信息,包括:The updating, by the terminal, SUCI information using the RI includes:
    若对所述RI的完整性验证成功,则所述终端利用所述RI更新SUCI的信息。If the integrity verification of the RI is successful, the terminal uses the RI to update SUCI information.
  18. 根据权利要求16或17所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 16 or 17, wherein the method further comprises:
    若所述终端中存储的RI发生变化,则所述终端注册到所述RI所指示的第二UDM。If the RI stored in the terminal changes, the terminal registers with a second UDM indicated by the RI.
  19. 根据权利要求16或17所述的路由方法,其特征在于,所述方法还包括:The routing method according to claim 16 or 17, wherein the method further comprises:
    若所述终端接收到所述AMF发送的注销请求消息,且所述注销请求消息携带的原因值指示RI变更时,所述终端注册到所述RI所指示的第二UDM。If the terminal receives the deregistration request message sent by the AMF, and the reason value carried in the deregistration request message indicates that the RI is changed, the terminal registers with the second UDM indicated by the RI.
  20. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于向第一统一数据管理UDM网元发送第一鉴权向量获取请求;若所述AUSF网元接收到所述第一UDM网元发送的路由指示RI,则向接入和移动性管理功能AMF网元 发送所述RI。A transceiver, configured to send a first authentication vector acquisition request to a first unified data management UDM network element; if the AUSF network element receives a routing instruction RI sent by the first UDM network element, it sends an access and mobile The sexual management function AMF network element sends the RI.
  21. 根据权利要求20所述的路由装置,其特征在于,The routing device according to claim 20, wherein
    所述收发器,还用于若接收到所述第一UDM网元发送的重定向消息,则根据所述重定向消息向第二UDM网元发送第二鉴权向量获取请求;接收所述第二UDM网元发送的RI;以及向所述AMF网元发送所述RI。The transceiver is further configured to: if a redirect message sent by the first UDM network element is received, send a second authentication vector acquisition request to a second UDM network element according to the redirect message; and receive the first RI sent by two UDM network elements; and sending the RI to the AMF network element.
  22. 根据权利要求20或21所述的路由装置,其特征在于,The routing device according to claim 20 or 21, wherein
    处理器,用于根据完整性保护密钥以及所述RI确定所述RI的完整性验证码;A processor, configured to determine an integrity verification code of the RI according to the integrity protection key and the RI;
    所述收发器,还用于向AMF网元发送所述完整性验证码。The transceiver is further configured to send the integrity verification code to an AMF network element.
  23. 根据权利要求22所述的路由装置,其特征在于,The routing device according to claim 22, wherein
    所述收发器,还用于接收所述第一UDM网元或第二UDM网元发送的完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF生成针对RI的完整性验证码。The transceiver is further configured to receive an integrity protection request message sent by the first UDM network element or the second UDM network element, and the integrity protection request message is used to instruct the AUSF to generate an integrity verification for the RI code.
  24. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于接收认证服务器功能AUSF网元发送的第一鉴权向量获取请求;响应于所述第一鉴权向量获取请求,向所述AUSF网元发送重定向消息或路由指示RI。The transceiver is configured to receive a first authentication vector acquisition request sent by an authentication server function AUSF network element; and in response to the first authentication vector acquisition request, send a redirect message or a routing instruction RI to the AUSF network element.
  25. 根据权利要求24所述的路由装置,其特征在于,所述收发器,用于向所述AUSF网元发送RI,包括:用于当所述第一UDM网元为用户归属的UDM网元时,向所述AUSF网元发送RI。The routing device according to claim 24, wherein the transceiver is configured to send an RI to the AUSF network element, and comprises: when the first UDM network element is a UDM network element to which a user belongs And sending an RI to the AUSF network element.
  26. 根据权利要求24所述的路由装置,其特征在于,所述收发器,用于向所述AUSF网元发送重定向消息,包括:用于当所述第一UDM网元不是用户归属的UDM网元时,向所述AUSF网元发送重定向消息。The routing device according to claim 24, wherein the transceiver is configured to send a redirect message to the AUSF network element, and comprises: when the first UDM network element is not a UDM network to which a user belongs. Sending a redirect message to the AUSF network element.
  27. 根据权利要求24至26任一所述的路由装置,其特征在于,The routing device according to any one of claims 24 to 26, wherein
    所述收发器,还用于接收AMF网元发送的用户数据获取请求消息;向AUSF网元发送完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF网元生成针对RI的完整性验证码。The transceiver is further configured to receive a user data acquisition request message sent by an AMF network element; send an integrity protection request message to an AUSF network element, and the integrity protection request message is used to instruct the AUSF network element to generate Integrity verification code.
  28. 根据权利要求27所述的路由装置,其特征在于,The routing device according to claim 27, wherein
    所述收发器,还用于向所述AUSF网元发送完整性保护请求消息;接收所述AUSF网元发送的完整性验证码;The transceiver is further configured to send an integrity protection request message to the AUSF network element; receive an integrity verification code sent by the AUSF network element;
    所述收发器,用于向所述AUSF网元发送RI,包括:用于向所述AUSF网元发送经过所述完整性验证码保护的RI。The transceiver is configured to send an RI to the AUSF network element, and includes: sending the RI protected by the integrity verification code to the AUSF network element.
  29. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于接收接入和移动性管理功能AMF网元发送的路由指示RI;A transceiver for receiving a routing indication RI sent by an access and mobility management function AMF network element;
    处理器,用于利用所述RI更新用户隐藏标识SUCI的信息。A processor, configured to use the RI to update the user's hidden identification SUCI information.
  30. 根据权利要求29所述的路由装置,其特征在于,The routing device according to claim 29, wherein
    所述处理器,还用于若所述收发器接收到所述RI对应的完整性验证码,则利用所述完整性验证码对所述RI进行完整性验证;The processor is further configured to perform integrity verification on the RI by using the integrity verification code if the transceiver receives the integrity verification code corresponding to the RI;
    所述处理器,用于利用所述RI更新SUCI的信息,包括:用于若对所述RI的完整性验证成功,则利用所述RI更新SUCI的信息。The processor configured to update the SUCI information by using the RI includes: used to update the SUCI information by using the RI if the integrity verification of the RI is successful.
  31. 根据权利要求29或30所述的路由装置,其特征在于,所述收发器,用于接收AMF发送的RI,包括:用于接收所述AMF发送的非接入层安全模式命令NAS SMC消息,所述NAS SMC消息携带所述RI。The routing device according to claim 29 or 30, wherein the transceiver is configured to receive an RI sent by an AMF, and comprises: receiving a non-access layer security mode command NASSMC message sent by the AMF, The NAS SMC message carries the RI.
  32. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于当用户归属的统一数据管理UDM网元由第一UDM变化为第二UDM时,向接入和移动性管理功能AMF网元发送路由指示RI。The transceiver is configured to send a routing indication RI to the access and mobility management function AMF network element when the unified data management UDM network element to which the user belongs changes from the first UDM to the second UDM.
  33. 根据权利要求32所述的路由装置,其特征在于,The routing device according to claim 32, wherein
    所述收发器,还用于向AUSF网元发送完整性保护请求消息,所述完整性保护请求消息用于指示所述AUSF生成针对RI的完整性验证码;接收所述AUSF网元发送的RI的完整性验证码;向所述AMF网元发送所述完整性验证码。The transceiver is further configured to send an integrity protection request message to an AUSF network element, where the integrity protection request message is used to instruct the AUSF to generate an integrity verification code for an RI; receive the RI sent by the AUSF network element Sending an integrity verification code to the AMF network element.
  34. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于接收第一统一数据管理UDM网元发送的完整性保护请求消息,所述完整性保护请求消息携带路由指示RI;A transceiver, configured to receive an integrity protection request message sent by a first unified data management UDM network element, where the integrity protection request message carries a routing instruction RI;
    处理器,用于根据完整性保护密钥和所述RI生成RI的完整性验证码;A processor, configured to generate an RI integrity verification code according to the integrity protection key and the RI;
    所述收发器,还用于向所述第一UDM网元发送所述完整性验证码。The transceiver is further configured to send the integrity verification code to the first UDM network element.
  35. 一种路由装置,其特征在于,包括:A routing device, comprising:
    收发器,用于接收接入和移动性管理功能AMF网元发送的路由指示RI;A transceiver for receiving a routing indication RI sent by an access and mobility management function AMF network element;
    处理器,用于利用所述RI更新用户隐藏标识SUCI的信息。A processor, configured to use the RI to update the user's hidden identification SUCI information.
  36. 根据权利要求35所述的路由装置,其特征在于,The routing device according to claim 35, wherein
    所述处理器,还用于若所述收发器接收到所述RI对应的完整性验证码,则利用所述完整性验证码对所述RI进行完整性验证;The processor is further configured to perform integrity verification on the RI by using the integrity verification code if the transceiver receives the integrity verification code corresponding to the RI;
    所述处理器,用于利用所述RI更新SUCI的信息,包括:用于若对所述RI的完整性验证成功,则利用所述RI更新SUCI的信息。The processor configured to update the SUCI information by using the RI includes: used to update the SUCI information by using the RI if the integrity verification of the RI is successful.
  37. 根据权利要求35或36所述的路由装置,其特征在于,The routing device according to claim 35 or 36, wherein
    所述处理器,还用于若所述终端中存储的RI发生变化,则将所述终端注册到所述RI所指示的第二UDM。The processor is further configured to register the terminal to a second UDM indicated by the RI if the RI stored in the terminal changes.
  38. 根据权利要求35或36所述的路由装置,其特征在于,The routing device according to claim 35 or 36, wherein
    所述处理器,还用于若所述收发器接收到所述AMF发送的注销请求消息,且所述注销请求消息携带的原因值指示RI变更时,则将所述终端注册到所述RI所指示的第二UDM。The processor is further configured to register the terminal with the RI if the transceiver receives the logout request message sent by the AMF and the reason value carried in the logout request message indicates that the RI is changed. Indicated second UDM.
  39. 一种路由指示安全更新的方法,其特征在于,包括:A method for routing instruction security update, which comprises:
    认证服务器功能AUSF网元接收到统一数据管理UDM网元发送的完整性保护请求消息,所述完整性保护请求消息包括路由指示RI;The authentication server function AUSF network element receives an integrity protection request message sent by the unified data management UDM network element, where the integrity protection request message includes a route indication RI;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码;Generating, by the AUSF network element, an RI message verification code according to the integrity protection key and the RI;
    所述AUSF网元向所述UDM网元发送完整性保护响应消息,所述完整性保护响应包括所述RI的消息验证码。The AUSF network element sends an integrity protection response message to the UDM network element, and the integrity protection response includes a message verification code of the RI.
  40. 根据权利要求39所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要用户设备UE发送响应消息的指示;The method according to claim 39, wherein the integrity protection request message further comprises an indication of whether a user equipment UE is required to send a response message;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码,包括:The AUSF network element generating the RI message verification code according to the integrity protection key and the RI includes:
    所述AUSF网元根据完整性保护密钥、是否需要UE发送响应消息的指示以及所述RI生成所述RI的消息验证码。The AUSF network element generates a message verification code of the RI according to an integrity protection key, an indication of whether a UE is required to send a response message, and the RI.
  41. 根据权利要求39所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示;The method according to claim 39, wherein the integrity protection request message further comprises an indication of whether a UE re-registration is required;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码,包括:The AUSF network element generating the RI message verification code according to the integrity protection key and the RI includes:
    所述AUSF网元根据完整性保护密钥、是否需要UE重注册的指示以及所述RI生成所述 RI的消息验证码。The AUSF network element generates a message verification code of the RI according to an integrity protection key, an indication of whether a UE re-registration is required, and the RI.
  42. 根据权利要求39所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示以及是否需要UE重注册的指示;The method according to claim 39, wherein the integrity protection request message further comprises an indication of whether UE re-registration is required and an indication of whether UE re-registration is required;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码,包括:The AUSF network element generating the RI message verification code according to the integrity protection key and the RI includes:
    所述AUSF网元根据完整性保护密钥、是否需要UE发送响应消息的指示、是否需要UE重注册的指示以及所述RI生成所述RI的消息验证码。The AUSF network element generates an RI message verification code according to the integrity protection key, an indication of whether the UE needs to send a response message, an indication of whether the UE needs to re-register, and the RI.
  43. 根据权利要求39所述的方法,其特征在于,所述完整性保护请求消息还包括配置的切片选择辅助信息;The method according to claim 39, wherein the integrity protection request message further comprises configured slice selection assistance information;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码,包括:The AUSF network element generating the RI message verification code according to the integrity protection key and the RI includes:
    所述AUSF网元根据完整性保护密钥、所述配置的切片选择辅助信息以及所述RI生成所述RI的消息验证码。Generating, by the AUSF network element, an RI message verification code according to the integrity protection key, the configured slice selection auxiliary information, and the RI.
  44. 一种路由指示安全更新的方法,其特征在于,包括:A method for routing instruction security update, which comprises:
    统一数据管理UDM网元向认证服务器功能AUSF网元发送完整性保护请求消息,所述完整性保护请求消息路由指示RI;The unified data management UDM network element sends an integrity protection request message to the authentication server function AUSF network element, where the integrity protection request message is routed to indicate the RI;
    所述UDM网元接收所述AUSF网元发送的完整性保护响应消息,所述完整性保护响应消息包括所述RI的消息验证码;Receiving, by the UDM network element, an integrity protection response message sent by the AUSF network element, where the integrity protection response message includes a message verification code of the RI;
    所述UDM网元向AMF网元发送通知消息,所述通知消息包括所述RI以及所述RI的消息验证码。The UDM network element sends a notification message to the AMF network element, and the notification message includes the RI and a message verification code of the RI.
  45. 根据权利要求44所述的方法,其特征在于,所述方法还包括:The method according to claim 44, further comprising:
    所述UDM网元接收所述AMF网元发送通知响应。The UDM network element receives the notification response sent by the AMF network element.
  46. 根据权利要求44或45所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要UE发送响应消息的指示;所述通知消息中还包括是否需要UE发送响应消息的指示。The method according to claim 44 or 45, wherein the integrity protection request message further includes an indication of whether the UE is required to send a response message; and the notification message further includes an indication of whether the UE is required to send a response message.
  47. 根据权利要求44或45所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示;所述通知消息中还包括是否需要UE重注册的指示。The method according to claim 44 or 45, wherein the integrity protection request message further includes an indication of whether UE re-registration is required; and the notification message further includes an indication of whether UE re-registration is required.
  48. 根据权利要求44或45所述的方法,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示以及是否需要UE发送响应消息的指示;所述通知消息中还包括是否需要UE重注册的指示以及是否需要UE发送响应消息的指示。The method according to claim 44 or 45, wherein the integrity protection request message further includes an indication of whether the UE needs to re-register and an indication of whether the UE needs to send a response message; and the notification message further includes whether or not it is required An indication of UE re-registration and an indication of whether the UE is required to send a response message.
  49. 根据权利要求44或45所述的方法,其特征在于,所述完整性保护请求消息中包括配置的切片选择辅助信息;所述通知消息中包括所述配置的切片选择辅助信息。The method according to claim 44 or 45, wherein the integrity protection request message includes configured slice selection assistance information; and the notification message includes the configured slice selection assistance information.
  50. 一种路由指示安全更新的方法,其特征在于,包括:A method for routing instruction security update, which comprises:
    终端接收接入与管理功能AMF网元发送的配置修改请求消息,所述配置修改请求消息包括路由指示RI和所述RI的消息验证码;The terminal receives a configuration modification request message sent by an access and management function AMF network element, where the configuration modification request message includes a routing instruction RI and a message verification code of the RI;
    所述终端对所述RI的消息验证码进行完整性验证;The terminal performs integrity verification on the message verification code of the RI;
    验证通过后,所述终端利用接收到的RI更新所述终端存储的RI。After the verification is passed, the terminal updates the RI stored by the terminal by using the received RI.
  51. 根据权利要求50所述的方法,其特征在于,所述配置修改请求消息还包括:The method according to claim 50, wherein the configuration modification request message further comprises:
    是否需要UE发送响应消息的指示;Indication of whether the UE needs to send a response message;
    所述终端对所述RI的消息验证码进行完整性验证,包括:The terminal performing integrity verification on the message verification code of the RI includes:
    所述终端利用所述是否需要UE发送响应消息的指示对所述RI的消息验证码进行完整性验证。The terminal performs integrity verification on the message verification code of the RI by using the indication of whether the UE is required to send a response message.
  52. 根据权利要求50所述的方法,其特征在于,所述配置修改请求消息还包括:The method according to claim 50, wherein the configuration modification request message further comprises:
    是否需要UE重注册的指示;Whether the UE needs to be re-registered;
    所述终端对所述RI的消息验证码进行完整性验证,包括:The terminal performing integrity verification on the message verification code of the RI includes:
    所述终端利用所述是否需要UE重注册的指示对所述RI的消息验证码进行完整性验证。The terminal performs integrity verification on the message verification code of the RI by using the indication of whether UE re-registration is required.
  53. 根据权利要求50所述的方法,其特征在于,所述配置修改请求消息还包括:The method according to claim 50, wherein the configuration modification request message further comprises:
    是否需要UE发送响应消息的指示,以及是否需要UE重注册的指示;An indication of whether the UE needs to send a response message, and an indication of whether the UE needs to re-register;
    所述终端对所述RI的消息验证码进行完整性验证,包括:The terminal performing integrity verification on the message verification code of the RI includes:
    所述终端利用所述是否需要UE重注册的指示以及所述是否需要UE发送响应消息的指示对所述RI的消息验证码进行完整性验证。The terminal performs integrity verification on the message verification code of the RI by using the indication of whether the UE needs to re-register and the indication of whether the UE needs to send a response message.
  54. 根据权利要求50所述的方法,其特征在于,所述配置修改请求消息还包括:配置的切片选择辅助信息;The method according to claim 50, wherein the configuration modification request message further comprises: configured slice selection assistance information;
    所述终端对所述RI的消息验证码进行完整性验证,包括:The terminal performing integrity verification on the message verification code of the RI includes:
    所述终端利用所述配置的切片选择辅助信息对所述RI的消息验证码进行完整性验证。The terminal performs integrity verification on the message verification code of the RI by using the configured slice selection auxiliary information.
  55. 根据权利要求54所述的方法,其特征在于,所述还包括:验证通过后,所述终端利用所述配置的切片选择辅助信息更新所述终端存储的切片选择辅助信息。The method according to claim 54, further comprising: after the verification is passed, the terminal uses the configured slice selection assistance information to update the slice selection assistance information stored by the terminal.
  56. 根据权利要求50所述的方法,其特征在于,所述方法还包括:The method according to claim 50, further comprising:
    所述终端向所述AMF网元发送配置修改响应消息。The terminal sends a configuration modification response message to the AMF network element.
  57. 一种路由指示安全更新的方法,其特征在于,包括:A method for routing instruction security update, which comprises:
    AMF网元接收统一数据管理UDM网元发送的通知消息,所述通知消息包括路由指示RI和RI的消息验证码;The AMF network element receives a notification message sent by the unified data management UDM network element, where the notification message includes a routing instruction RI and a message verification code of the RI;
    所述AMF网元向终端发送配置修改请求消息,所述配置修改请求消息包括所述RI以及所述RI的消息验证码;Sending, by the AMF network element, a configuration modification request message to a terminal, where the configuration modification request message includes the RI and a message verification code of the RI;
    所述AMF网元接收所述终端发送的配置修改响应消息。The AMF network element receives a configuration modification response message sent by the terminal.
  58. 根据权利要求57所述的方法,其特征在于,所述通知消息还包括是否需要UE发送响应消息的指示;所述配置修改请求消息中包括是否需要UE发送响应消息的指示The method according to claim 57, wherein the notification message further includes an indication of whether the UE is required to send a response message; and the configuration modification request message includes an indication of whether the UE is required to send a response message
  59. 根据权利要求57所述所述的方法,其特征在于,所述配置修改请求消息还包括是否需要UE发送响应消息的指示;所述配置修改请求消息中包括是否需要UE重注册的指示。The method according to claim 57, wherein the configuration modification request message further includes an indication of whether the UE needs to send a response message; and the configuration modification request message includes an indication of whether the UE needs to re-register.
  60. 根据权利要求57所述所述的方法,其特征在于,所述配置修改请求消息还包括配置的切片选择辅助信息;所述配置修改请求消息中还包括所述配置的切片选择辅助信息。The method according to claim 57, wherein the configuration modification request message further includes configured slice selection assistance information; the configuration modification request message further includes the configured slice selection assistance information.
  61. 一种路由装置,其特征在于,包括:A routing device, comprising:
    通信单元,用于接收到统一数据管理UDM网元发送的完整性保护请求消息,所述完整性保护请求消息包括路由指示RI;A communication unit configured to receive an integrity protection request message sent by a unified data management UDM network element, where the integrity protection request message includes a routing indication RI;
    处理单元,用于根据完整性保护密钥以及所述RI生成RI的消息验证码;A processing unit, configured to generate an RI message verification code according to the integrity protection key and the RI;
    所述通信单元,用于向所述UDM发送完整性保护响应消息,所述完整性保护响应包括所述RI的消息验证码。The communication unit is configured to send an integrity protection response message to the UDM, where the integrity protection response includes a message verification code of the RI.
  62. 根据权利要求61所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要用户设备UE发送响应消息的指示;The routing device according to claim 61, wherein the integrity protection request message further includes an indication of whether a user equipment UE is required to send a response message;
    所述处理单元,具体用于根据完整性保护密钥、是否需要UE发送响应消息的指示以及所述RI生成所述RI的消息验证码。The processing unit is specifically configured to generate a message verification code of the RI according to an integrity protection key, an indication of whether a UE is required to send a response message, and the RI.
  63. 根据权利要求61所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示;The routing device according to claim 61, wherein the integrity protection request message further includes an indication of whether UE re-registration is required;
    所述处理单元,具体用于根据完整性保护密钥、是否需要UE重注册的指示以及所述RI 生成所述RI的消息验证码。The processing unit is specifically configured to generate a message verification code of the RI according to an integrity protection key, an indication of whether the UE needs to re-register, and the RI.
  64. 根据权利要求61所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示以及是否需要UE重注册的指示;The routing device according to claim 61, wherein the integrity protection request message further includes an indication of whether UE re-registration is required and an indication of whether UE re-registration is required;
    所述处理单元,具体用于根据完整性保护密钥、是否需要UE发送响应消息的指示、是否需要UE重注册的指示以及所述RI生成所述RI的消息验证码。The processing unit is specifically configured to generate a message verification code of the RI according to the integrity protection key, an indication of whether the UE needs to send a response message, an indication of whether the UE needs to reregister, and the RI.
  65. 根据权利要求61所述的路由装置,其特征在于,所述完整性保护请求消息还包括配置的切片选择辅助信息;The routing device according to claim 61, wherein the integrity protection request message further comprises configured slice selection assistance information;
    所述处理单元,具体用于根据完整性保护密钥、所述配置的切片选择辅助信息以及所述RI生成所述RI的消息验证码。The processing unit is specifically configured to generate a message verification code of the RI according to the integrity protection key, the configured slice selection auxiliary information, and the RI.
  66. 一种路由装置,其特征在于,包括:A routing device, comprising:
    通信单元,用于向认证服务器功能AUSF网元发送完整性保护请求消息,所述完整性保护请求消息包括路由指示RI;A communication unit, configured to send an integrity protection request message to an authentication server function AUSF network element, where the integrity protection request message includes a routing indication RI;
    所述通信单元,用于接收所述认证服务器功能AUSF网元发送的完整性保护响应消息,所述完整性保护响应包括RI的消息验证码;The communication unit is configured to receive an integrity protection response message sent by the authentication server function AUSF network element, where the integrity protection response includes a message verification code of RI;
    所述通信单元,还用于向AMF网元发送通知消息,所述通知消息包括所述RI以及所述RI的消息验证码。The communication unit is further configured to send a notification message to an AMF network element, where the notification message includes the RI and a message verification code of the RI.
  67. 根据权利要求66所述的路由装置,其特征在于,所述方法还包括:The routing device according to claim 66, wherein the method further comprises:
    所述通信单元,还用于接收所述AMF网元发送通知响应。The communication unit is further configured to receive a notification response sent by the AMF network element.
  68. 根据权利要求66或67所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要UE发送响应消息的指示;所述通知消息中还包括是否需要UE发送响应消息的指示。The routing device according to claim 66 or 67, wherein the integrity protection request message further includes an indication of whether the UE needs to send a response message; and the notification message further includes an indication of whether the UE needs to send a response message.
  69. 根据权利要求66或67所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示;所述通知消息中还包括是否需要UE重注册的指示。The routing device according to claim 66 or 67, wherein the integrity protection request message further includes an indication of whether UE re-registration is required; and the notification message further includes an indication of whether UE re-registration is required.
  70. 根据权利要求66或67所述的路由装置,其特征在于,所述完整性保护请求消息还包括是否需要UE重注册的指示以及是否需要UE发送响应消息的指示;所述通知消息中还包括是否需要UE重注册的指示以及是否需要UE发送响应消息的指示。The routing device according to claim 66 or 67, wherein the integrity protection request message further includes an indication of whether the UE needs to re-register and an indication of whether the UE needs to send a response message; and the notification message further includes whether or not An indication that the UE needs to re-register and an indication whether the UE needs to send a response message.
  71. 根据权利要求66或67所述的路由装置,其特征在于,所述完整性保护请求消息中包括配置的切片选择辅助信息;所述通知消息中包括所述配置的切片选择辅助信息。The routing device according to claim 66 or 67, wherein the integrity protection request message includes configured slice selection assistance information; and the notification message includes the configured slice selection assistance information.
  72. 一种终端,其特征在于,包括:A terminal, comprising:
    通信单元,用于接收接入与管理功能AMF网元发送的配置修改请求消息,所述配置修改请求消息包括路由指示RI和所述RI的消息验证码;A communication unit, configured to receive a configuration modification request message sent by an access and management function AMF network element, where the configuration modification request message includes a routing instruction RI and a message verification code of the RI;
    处理单元,用于对所述消息验证码进行完整性验证;A processing unit, configured to perform integrity verification on the message verification code;
    所述处理单元,还用于在验证通过后,利用接收到的RI更新所述终端存储的RI。The processing unit is further configured to update the RI stored in the terminal by using the received RI after the verification is passed.
  73. 根据权利要求72所述的终端,其特征在于,所述配置修改请求消息还包括:The terminal according to claim 72, wherein the configuration modification request message further comprises:
    是否需要UE发送响应消息的指示;Indication of whether the UE needs to send a response message;
    所述处理单元,具体用于利用所述是否需要UE发送响应消息的指示对所述RI的消息验证码进行完整性验证。The processing unit is specifically configured to perform integrity verification on the message verification code of the RI by using the indication of whether the UE is required to send a response message.
  74. 根据权利要求72所述的终端,其特征在于,所述配置修改请求消息还包括:The terminal according to claim 72, wherein the configuration modification request message further comprises:
    是否需要UE重注册的指示;Whether the UE needs to be re-registered;
    所述处理单元,具体用于利用所述是否需要UE重注册的指示对所述RI的消息验证码进行完整性验证。The processing unit is specifically configured to perform integrity verification on the message verification code of the RI by using the indication of whether UE re-registration is required.
  75. 根据权利要求72所述的终端,其特征在于,所述配置修改请求消息还包括:The terminal according to claim 72, wherein the configuration modification request message further comprises:
    是否需要UE发送响应消息的指示,以及是否需要UE重注册的指示;An indication of whether the UE needs to send a response message, and an indication of whether the UE needs to re-register;
    所述处理单元,具体用于利用所述是否需要UE重注册的指示以及所述是否需要UE发送响应消息的指示对所述RI的消息验证码进行完整性验证。The processing unit is specifically configured to perform integrity verification on the message verification code of the RI by using the indication of whether the UE needs to re-register and the indication of whether the UE needs to send a response message.
  76. 根据权利要求72所述的终端,其特征在于,所述配置修改请求消息还包括:配置的切片选择辅助信息;The terminal according to claim 72, wherein the configuration modification request message further comprises: configured slice selection auxiliary information;
    所述处理单元,具体用于利用所述配置的切片选择辅助信息对所述RI的消息验证码进行完整性验证。The processing unit is specifically configured to perform integrity verification on the message verification code of the RI by using the configured slice selection auxiliary information.
  77. 根据权利要求76所述的终端,其特征在于,The terminal according to claim 76, wherein:
    所述处理单元,还用于在验证通过后,利用所述配置的切片选择辅助信息更新所述终端存储的切片选择辅助信息。The processing unit is further configured to update the slice selection assistance information stored in the terminal by using the configured slice selection assistance information after the verification is passed.
  78. 根据权利要求72至77任一所述的终端,其特征在于,所述处理单元,还用于向所述AMF发送配置修改响应消息。The terminal according to any one of claims 72 to 77, wherein the processing unit is further configured to send a configuration modification response message to the AMF.
  79. 一种路由装置,其特征在于,包括:A routing device, comprising:
    通信单元,用于接收统一数据管理UDM网元发送的通知消息,所述通知消息包括路由指示RI和所述RI的消息验证码;A communication unit, configured to receive a notification message sent by a unified data management UDM network element, where the notification message includes a routing instruction RI and a message verification code of the RI;
    所述通信单元,还用于向终端发送配置修改请求消息,所述配置修改请求消息包括所述RI以及所述所述RI的消息验证码;The communication unit is further configured to send a configuration modification request message to the terminal, where the configuration modification request message includes the RI and a message verification code of the RI;
    所述通信单元,还用于接收所述终端发送的配置修改响应消息。The communication unit is further configured to receive a configuration modification response message sent by the terminal.
  80. 根据权利要求79所述的路由装置,其特征在于,所述通知消息还包括是否需要UE发送响应消息的指示;所述配置修改请求消息中包括是否需要UE发送响应消息的指示The routing device according to claim 79, wherein the notification message further includes an indication of whether the UE needs to send a response message; and the configuration modification request message includes an indication of whether the UE needs to send a response message
  81. 根据权利要求79所述所述的路由装置,其特征在于,所述配置修改请求消息还包括是否需要UE发送响应消息的指示;所述配置修改请求消息中包括是否需要UE重注册的指示。The routing device according to claim 79, wherein the configuration modification request message further includes an indication of whether the UE needs to send a response message; and the configuration modification request message includes an indication of whether the UE needs to reregister.
  82. 根据权利要求79所述所述的路由装置,其特征在于,所述配置修改请求消息还包括配置的切片选择辅助信息;所述配置修改请求消息中还包括所述配置的切片选择辅助信息。The routing device according to claim 79, wherein the configuration modification request message further includes configured slice selection assistance information; the configuration modification request message further includes the configured slice selection assistance information.
  83. 一种路由系统,其特征在于,所述系统包括:A routing system, characterized in that the system includes:
    统一数据管理UDM网元向认证服务器功能AUSF网元发送完整性保护请求消息;The unified data management UDM network element sends an integrity protection request message to the authentication server function AUSF network element;
    所述认证服务器功能AUSF网元接收所述UDM网元发送的所述完整性保护请求消息,所述完整性保护请求消息包括路由指示RI;Receiving, by the authentication server function, an AUSF network element, the integrity protection request message sent by the UDM network element, where the integrity protection request message includes a routing indication RI;
    所述AUSF网元根据完整性保护密钥以及所述RI生成所述RI的消息验证码;Generating, by the AUSF network element, an RI message verification code according to the integrity protection key and the RI;
    所述AUSF网元向所述UDM网元发送完整性保护响应消息;所述完整性保护响应包括所述RI的消息验证码;Sending, by the AUSF network element, an integrity protection response message to the UDM network element; the integrity protection response includes a message verification code of the RI;
    所述UDM网元接收所述AUSF网元发送的完整性保护响应消息;Receiving, by the UDM network element, an integrity protection response message sent by the AUSF network element;
    所述UDM网元向AMF网元发送通知消息,所述通知消息包括所述RI以及所述RI的消息验证码;The UDM network element sends a notification message to the AMF network element, where the notification message includes the RI and a message verification code of the RI;
    所述AMF网元接收所述UDM网元发送的通知消息;Receiving, by the AMF network element, a notification message sent by the UDM network element;
    所述AMF网元向终端发送配置修改请求消息,所述配置修改请求消息包括所述RI以及所述RI的消息验证码;Sending, by the AMF network element, a configuration modification request message to a terminal, where the configuration modification request message includes the RI and a message verification code of the RI;
    所述AMF网元接收所述终端发送的配置修改响应消息。The AMF network element receives a configuration modification response message sent by the terminal.
  84. 一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被 运行时,权利要求50至56任一所述的方法会被执行。A computer-readable storage medium stores instructions in the computer-readable storage medium. When the instructions are executed, the method according to any one of claims 50 to 56 will be executed.
  85. 一种芯片,所述芯片包括处理器,所述处理器和存储器耦合,所述存储器存储有程序指令,当所述程序指令被运行时,权利要求50至56任一所述的方法会被执行。A chip comprising a processor, the processor being coupled to a memory, the memory storing program instructions, and when the program instructions are executed, the method according to any one of claims 50 to 56 will be executed .
  86. 一种电路系统,所述电路系统包括处理电路,所述处理电路被配置为执行上述权利要求50-56任一所述的方法。A circuit system includes a processing circuit configured to perform the method of any one of claims 50-56.
PCT/CN2019/099792 2018-08-23 2019-08-08 Routing method, apparatus and system WO2020038236A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19851158.6A EP3709692A4 (en) 2018-08-23 2019-08-08 Routing method, apparatus and system
US16/898,326 US11974132B2 (en) 2018-08-23 2020-06-10 Routing method, apparatus, and system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201810970120 2018-08-23
CN201810970120.2 2018-08-23
CN201811289488.9 2018-10-31
CN201811289488.9A CN110858992A (en) 2018-08-23 2018-10-31 Routing method, device and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/898,326 Continuation US11974132B2 (en) 2018-08-23 2020-06-10 Routing method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2020038236A1 true WO2020038236A1 (en) 2020-02-27

Family

ID=66911956

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/099792 WO2020038236A1 (en) 2018-08-23 2019-08-08 Routing method, apparatus and system

Country Status (2)

Country Link
CN (1) CN109842880B (en)
WO (1) WO2020038236A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112040486A (en) * 2020-08-19 2020-12-04 广东以诺通讯有限公司 Safe direct connection communication method and terminal based on 5GD2D service
WO2021109436A1 (en) * 2020-04-28 2021-06-10 Zte Corporation Authentication server function selection in an authentication and key agreement

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858992A (en) 2018-08-23 2020-03-03 华为技术有限公司 Routing method, device and system
CN109842880B (en) * 2018-08-23 2020-04-03 华为技术有限公司 Routing method, device and system
CN112073176B (en) * 2019-06-11 2022-03-11 大唐移动通信设备有限公司 Key updating method and device
US20200413253A1 (en) * 2019-06-26 2020-12-31 Qualcomm Incorporated Method and apparatus for enabling 5g services with pre-5g universal integrated circuit card (uicc)
CN112291784B (en) * 2019-07-09 2022-04-05 华为技术有限公司 Communication method and network element
CN110536293A (en) * 2019-08-15 2019-12-03 中兴通讯股份有限公司 The methods, devices and systems of access closure access group
WO2021031053A1 (en) * 2019-08-18 2021-02-25 华为技术有限公司 Communication method, device, and system
CN112584380A (en) * 2019-09-29 2021-03-30 中兴通讯股份有限公司 Verification method, data synchronization method, device, network element and medium
CN112672336B (en) * 2019-09-30 2024-04-30 华为技术有限公司 Method, communication device and communication system for realizing external authentication
CN113141327B (en) * 2020-01-02 2023-05-09 中国移动通信有限公司研究院 Information processing method, device and equipment
WO2022000129A1 (en) * 2020-06-28 2022-01-06 Qualcomm Incorporated Multi-network slicing routing for dual plmns of dual subscriber identity module user equipments
CN116114282A (en) * 2020-08-07 2023-05-12 华为技术有限公司 Registration method and device
CA3197006A1 (en) * 2020-10-30 2022-05-05 Huawei Technologies Co., Ltd. Key obtaining method and communication apparatus
CN112867005A (en) * 2020-12-31 2021-05-28 乐鑫信息科技(上海)股份有限公司 Control frame processing and generating method, station, access point and storage medium
CN115396868A (en) * 2021-05-08 2022-11-25 华为技术有限公司 Wireless communication method, communication device and communication system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883339A (en) * 2014-02-27 2015-09-02 华为技术有限公司 User privacy protecting method, equipment and system thereof
WO2018085784A1 (en) * 2016-11-07 2018-05-11 Intel IP Corporation Systems, methods, and devices for handling stickiness of ue-specific ran-cn association
CN109842880A (en) * 2018-08-23 2019-06-04 华为技术有限公司 Method for routing, apparatus and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222356B (en) * 2007-12-27 2010-07-07 华为技术有限公司 User data updating method and system
US10581831B2 (en) * 2016-06-30 2020-03-03 Facebook, Inc. Authenticating devices to a network
CN108012267B (en) * 2016-10-31 2022-05-24 华为技术有限公司 Network authentication method, related equipment and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883339A (en) * 2014-02-27 2015-09-02 华为技术有限公司 User privacy protecting method, equipment and system thereof
WO2018085784A1 (en) * 2016-11-07 2018-05-11 Intel IP Corporation Systems, methods, and devices for handling stickiness of ue-specific ran-cn association
CN109842880A (en) * 2018-08-23 2019-06-04 华为技术有限公司 Method for routing, apparatus and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
3GPP: "3GPP Technical Specification Group Services and System Aspects; Secu- rity architecture and procedures for 5G system(Release 15", 3GPP TS 33. 501, 30 June 2018 (2018-06-30), XP055688116 *
See also references of EP3709692A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021109436A1 (en) * 2020-04-28 2021-06-10 Zte Corporation Authentication server function selection in an authentication and key agreement
US20220295272A1 (en) * 2020-04-28 2022-09-15 Zte Corporation Authentication server function selection in an authentication and key agreement
CN112040486A (en) * 2020-08-19 2020-12-04 广东以诺通讯有限公司 Safe direct connection communication method and terminal based on 5GD2D service

Also Published As

Publication number Publication date
CN109842880B (en) 2020-04-03
CN109842880A (en) 2019-06-04

Similar Documents

Publication Publication Date Title
WO2020038236A1 (en) Routing method, apparatus and system
US11178543B2 (en) Apparatus and method for mobility procedure involving mobility management entity relocation
US11974132B2 (en) Routing method, apparatus, and system
JP6877524B2 (en) Devices and methods for wireless communication
RU2722508C1 (en) Subscriber subscription concealed identifier
US12021966B2 (en) Embedded universal integrated circuit card (eUICC) profile content management
JP6903006B2 (en) User plane security for next-generation cellular networks
US10785653B2 (en) Secure short message service over non-access stratum
JP6996824B2 (en) Key acquisition methods and devices, as well as communication systems
WO2018201946A1 (en) Anchor key generation method, device and system
US11909869B2 (en) Communication method and related product based on key agreement and authentication
WO2019214351A1 (en) Message processing method and device
WO2022078214A1 (en) Subscription data update method and apparatus, node, and storage medium
WO2023082161A1 (en) Secure information pushing by service applications in communication networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19851158

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019851158

Country of ref document: EP

Effective date: 20200610

NENP Non-entry into the national phase

Ref country code: DE