WO2020052414A1 - 一种数据保护方法、设备及系统 - Google Patents

一种数据保护方法、设备及系统 Download PDF

Info

Publication number
WO2020052414A1
WO2020052414A1 PCT/CN2019/101905 CN2019101905W WO2020052414A1 WO 2020052414 A1 WO2020052414 A1 WO 2020052414A1 CN 2019101905 W CN2019101905 W CN 2019101905W WO 2020052414 A1 WO2020052414 A1 WO 2020052414A1
Authority
WO
WIPO (PCT)
Prior art keywords
ciphertext
terminal
qfi
upf
parameter
Prior art date
Application number
PCT/CN2019/101905
Other languages
English (en)
French (fr)
Inventor
张博
何承东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020052414A1 publication Critical patent/WO2020052414A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a data protection method, device, and system.
  • user plane data transmitted between a terminal and a base station can be securely protected.
  • the terminal performs data protection operations (such as confidentiality protection and / or integrity protection), and after receiving the protected data, the base station performs corresponding security operations (such as decryption and / Or integrity verification).
  • the base station performs data protection operations (such as confidentiality protection and / or integrity protection).
  • the terminal After receiving the protected data, the terminal performs corresponding security operations (such as decryption and / or Integrity verification).
  • the confidentiality protection may include: the sender encrypts the key (key), counts (count), bearer (such as: wireless bearer ID), direction (uplink data or Downstream data), length parameters (key stream length length) and other input to a security algorithm (such as: NEA function) to get the key stream block (keystream block); XOR the plaintext (plantext block) with the key stream block Get the ciphertext (ciphertext block) and send it out.
  • a security algorithm such as: NEA function
  • the receiving end After receiving the ciphertext, the receiving end obtains the keystream packet according to the above-mentioned series of parameters, and XORs the keystream packet with the ciphertext to obtain the plaintext.
  • the sending end may be a terminal and the receiving end may be a base station; or, the sending end may be a base station and the receiving end may be a terminal.
  • the embodiments of the present application provide a data protection method, device, and system to solve the existing problem of reducing the security of user plane data transmission when performing data protection on a terminal and a base station.
  • an embodiment of the present application provides a data protection method, which may include: a terminal determines a first parameter corresponding to a plain text to be sent, and uses the first parameter to encrypt the plain text to obtain a cipher text, which is transmitted to the access network device through The user plane network element sends the ciphertext.
  • the first parameter corresponds to the user plane transmission logical channel between the terminal and the user plane network element, that is, the user plane data is encrypted with the granularity of the user plane transmission logical channel between the terminal and the user plane network element.
  • the data transmitted between the terminal and the user-plane network element can be confidentially protected according to the first parameter corresponding to the user-plane transmission logical channel between the terminal and the user-plane network element.
  • End-to-end protection of user plane network elements to avoid data confidentiality when the access network equipment protects the confidentiality of the data when the access plane equipment interacts with the network side. Reduced problems and improved data transmission security.
  • the first parameter is a protocol data unit (PDU) session identifier (ID) or a quality of service flow ID (QoS flow ID).
  • PDU protocol data unit
  • ID session identifier
  • QoS flow ID quality of service flow ID
  • the terminal determining the first parameter corresponding to the plaintext to be sent includes: the terminal determining the first parameter according to the content information of the plaintext to be sent.
  • the plaintext content information may include an Internet protocol (IP) address or a media access control (MAC) address.
  • IP Internet protocol
  • MAC media access control
  • the first parameter is a data radio bearer (DRB) ID
  • the terminal determines the data to be transmitted
  • the first parameter corresponding to the plaintext includes: the terminal determines the QFI corresponding to the plaintext according to the content information of the plaintext to be sent, and determines the DRBID corresponding to the plaintext according to the correspondence between the QFI, QFI, and DRBID corresponding to the plaintext.
  • DRB data radio bearer
  • the correspondence between QFI and DRB ID is sent to the terminal by the access network device.
  • the first parameter corresponding to the plain text to be sent can also be determined in other ways, without limitation.
  • the method further includes: the terminal sends the first parameter to the access network device; or the terminal sends the first parameter to the access network device; The access network device sends an instruction, which is used to indicate the first parameter.
  • the first parameter used for terminal encryption can be sent to the user plane network element through the access network device, so that the user plane network element also receives the first parameter while receiving the ciphertext from the access network device. Parameters are decrypted.
  • the method further includes: the terminal receives the ciphertext sent by the access network device, and determines the received The first parameter corresponding to the ciphertext is used to decrypt the received ciphertext to obtain the plaintext.
  • the present application provides a communication device, which may be a terminal or a chip in the terminal or a system on a chip.
  • the communication device may implement the functions performed by the terminal in the above aspects or possible designs, and the functions may be implemented by hardware, or may be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the foregoing functions.
  • the communication device may include: a determining unit, an encryption / decryption unit, and a sending unit;
  • a determining unit configured to determine a first parameter corresponding to the plain text to be sent
  • An encryption / decryption unit configured to encrypt the plaintext by using the first parameter to obtain a ciphertext
  • the sending unit is configured to send the ciphertext to the user plane network element through the access network device.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element.
  • the communication device reference may be made to the data provided in the first aspect or any possible design of the first aspect.
  • the behavior function of the terminal in the protection method is not repeated here. Therefore, the provided communication device can achieve the same beneficial effects as the first aspect or any possible design of the first aspect.
  • a communication device including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the communication device is running, the processor executes the computer execution instruction stored in the memory, so that the memory
  • the communication device executes the data protection method according to the first aspect or any possible design of the first aspect.
  • a computer-readable storage medium stores instructions, and when the computer-readable storage medium runs on the computer, the computer can execute the foregoing first aspect or any one of the foregoing aspects. Design the data protection methods described.
  • a computer program product containing instructions, which, when run on a computer, enables the computer to execute the data protection method according to the first aspect or any possible design of the above aspect.
  • a chip system includes a processor and a communication interface, and is configured to support a communication device to implement the functions involved in the foregoing aspect.
  • the processor determines a first parameter corresponding to a plain text to be sent, and uses the The first parameter encrypts the plaintext to obtain a ciphertext, and sends the ciphertext to the user plane network element through an access network device.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element
  • the chip system further includes a memory, where the memory is configured to store necessary communication device Program instructions and data.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • an embodiment of the present application provides a data protection method.
  • the method may include: a user plane network element receiving a ciphertext sent by an access network device, determining a first parameter corresponding to the received ciphertext, and using the first parameter Decrypt the ciphertext to get the plaintext.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element.
  • the ciphertext received by the user plane network element can be decrypted according to the first parameter corresponding to the user plane transmission logical channel between the terminal and the user plane network element, thereby realizing the terminal to the user plane network element End-to-end protection to avoid the problem of data leakage and reduced security of user plane data transmission when the user plane data interacted by the access network apparatus with the network side is attacked by the access network equipment to protect the confidentiality of the data, Improved data transmission security.
  • the first parameter is QFI
  • the user plane network element determines the first parameter corresponding to the ciphertext, including: the user plane network element is based on The quintuple information of the ciphertext determines the QFI corresponding to the ciphertext.
  • the method further includes: a user plane network element receiving the first parameter from the access network device.
  • the user plane network element receives the first parameter while receiving the ciphertext, and decrypts it according to the received first parameter.
  • the user plane network element does not need to determine the first parameter corresponding to the ciphertext, which reduces the user plane network element's acquisition of the first parameter.
  • the complexity of a parameter is not limited to the following parameters.
  • the first parameter is the PDU session ID
  • the user plane network element determines the PDU session ID corresponding to the cipher text, including: the user plane network element determines the cipher text corresponding to the PDU
  • the QFI determines the PDU session ID corresponding to the cipher text according to the correspondence between the QFI corresponding to the cipher text, the QFI, and the PDU session ID.
  • the correspondence between QFI and PDU session ID is sent by the session management network element to the user plane network element.
  • the first parameter is a PDU session ID
  • the user plane network element receives the ciphertext, including: the user plane network element receives the ciphertext from the N3 link;
  • the user plane network element determines the PDU session ID corresponding to the ciphertext, including: according to the correspondence between the N3 link identifier and the PDU session ID, the user plane network element will identify the PDU corresponding to the N3 link identifier of the N3 link. Determine the PDU session ID corresponding to the ciphertext.
  • the first parameter is DRB ID
  • the user plane network element determines the DRB ID corresponding to the cipher text, including: the user plane network element determines the QFI corresponding to the cipher text,
  • the DRB ID corresponding to the ciphertext is determined according to the corresponding relationship between the QFI corresponding to the ciphertext, QFI, and DRB ID.
  • QFI and DRB ID are sent by the access network device to the user plane network element.
  • the method further includes: determining, by the user plane network element, the first corresponding to the plaintext to be sent to the terminal. Parameter, encrypt the plain text to be sent according to the first parameter to obtain the cipher text, and send the cipher text to the terminal through the access network device.
  • the present application provides a communication device.
  • the communication device may be a user plane network element or a chip or a system on a chip in the user plane network element.
  • the communication device may implement each of the seventh aspect or the seventh aspect.
  • the functions performed by the user plane network element in the design, the functions may be implemented by hardware, or may be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the foregoing functions.
  • the communication device may include: a receiving unit, a determining unit, and a decrypting / encrypting unit;
  • a receiving unit configured to receive a ciphertext sent by an access network device
  • a determining unit configured to determine a first parameter corresponding to the ciphertext
  • the decryption / encryption unit is configured to decrypt the received ciphertext by using the first parameter to obtain the plaintext.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element.
  • the seventh aspect or the behavior function of the user plane network element in the data protection method provided by any possible design of the seventh aspect, and details are not repeated here. Therefore, the provided communication device can achieve the same beneficial effects as the seventh aspect or any possible design of the seventh aspect.
  • a communication device including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the communication device is running, the processor executes the computer execution instruction stored in the memory so that the memory
  • the communication device executes the data protection method according to the seventh aspect or any one of the possible designs of the seventh aspect.
  • a computer-readable storage medium stores instructions, and when the computer-readable storage medium runs on the computer, the computer can execute the seventh aspect or any of the foregoing aspects. Design the data protection methods described.
  • a computer program product containing instructions which, when run on a computer, enables the computer to execute the data protection method according to the seventh aspect or any one of the foregoing possible designs.
  • a chip system includes a processor and a communication interface, and is configured to support a communication device to implement the functions involved in the foregoing aspect.
  • the processor receives a ciphertext from an access network device through a communication interface To determine a first parameter corresponding to the ciphertext, and use the first parameter to decrypt the ciphertext to obtain a plaintext.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element
  • the chip system further includes a memory, where the memory is configured to store necessary program instructions of the communication device. And data.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • the present application provides a transmission data protection system, including: the communication device according to the second aspect to the sixth aspect, an access network device, and the communication device according to the eighth aspect to the twelfth aspect. .
  • FIG. 1 is a schematic diagram of a system framework according to an embodiment of the present application.
  • 2a is a schematic diagram of confidentiality protection provided by an embodiment of the present application.
  • FIG. 2b is a schematic diagram of integrity protection provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a data protection method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another data protection method according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a communication device 11 according to an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a communication device 12 according to an embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a data protection system 13 according to an embodiment of the present application.
  • the data protection method provided in the embodiment of the present application can be applied to the network system shown in FIG. 1.
  • the network system may be a long term evolution (LTE), a fifth generation (5G) system, or It is a new radio (NR) system or other systems.
  • the network system may include a terminal, an access network device, a mobility management network element, a session management network element, a user plane network element, and a data network (DN). Connected through communications specified in the protocol.
  • FIG. 1 is only an exemplary architecture diagram.
  • the network architecture may further include a policy control network element and other network elements, which are not limited in the embodiment of the present application.
  • the terminal in FIG. 1 can be used to connect to an access network device deployed by an operator through a wireless air interface.
  • a user plane transmission logical channel is established between the access network device and a user plane network element, and the user plane transmission logical channel Enter DN.
  • the terminal can be a user equipment (UE), such as a mobile phone, a computer, or a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a smart phone, or a wireless local loop. , WLL) station, personal digital assistant (PDA), computer, laptop, handheld communication device, handheld computing device, satellite wireless device, wireless modem card, set-top box (STB) , Customer premise equipment (CPE) and / or other equipment used to communicate on the wireless system.
  • the terminal may also be a device that supports wired access.
  • Access network equipment is mainly used to implement functions such as wireless physical layer functions, resource scheduling and wireless resource management, wireless access control, and mobility management.
  • the access network device can be an access network (AN) / radio access network (RAN), which is composed of multiple 5G-AN / 5G-RAN nodes, and 5G-AN / 5G-RAN nodes can It is: an access node (AP), a next-generation base station (NR nodeB, gNB), a transmission and reception point (TRP), a transmission point (TP), or some other access node.
  • the access network device may also be a device that supports wired access.
  • the mobility management network element may be an access and mobility management function (AMF), which is mainly used to manage the mobility of the terminal.
  • AMF access and mobility management function
  • the session management network element can have a session management function (SMF), which is mainly used to implement a user-plane transmission logical channel (such as: establishment, release, and change of a protocol data unit (PDU) session). Session management functions.
  • SMF session management function
  • the session management network element can manage one or more user plane network elements.
  • the user plane network element can be a user plane function (UPF).
  • the user plane network element can be used as an anchor point on the user plane transmission logical channel. It is mainly used to perform functions such as routing and forwarding of user plane data. Establish a channel (that is, a logical channel for user plane transmission), and forward the data packets between the terminal and the DN on this channel, and be responsible for filtering the terminal's data packets, data transmission / forwarding, rate control, and generating charging information.
  • the DN may include network equipment (server or router, etc.), which is mainly used to provide a variety of data business services for the terminal.
  • end-to-end data protection is implemented between the user plane network element and the terminal.
  • the terminal may perform data protection on the data to be sent (named plain text in the embodiment of the present application), and then send it to the user plane network element through the access network device; after receiving the encrypted data, the user plane network element may The encrypted data is decrypted to obtain the plaintext.
  • the user plane network element sends data to the terminal, the user plane network element can protect the plain text to be sent and send the data to the terminal through the access network device. After receiving the encrypted data, the terminal can encrypt the encrypted data. The data is decrypted to get the plaintext.
  • the data protection described in the embodiments of the present application may include the following three ways: 1) confidentiality protection; 2) integrity protection; 3) confidentiality protection and integrity protection.
  • confidentiality protection can refer to: encrypting some data to achieve the effect of hiding data, and recovering the original data through decryption.
  • Integrity protection can refer to: performing some integrity protection operations on the data, and can check whether the data has been tampered with according to the message authentication code (MAC).
  • MAC message authentication code
  • the main difference between integrity protection and confidentiality protection is that integrity protection does not require XOR and other operations, and the plain text is directly used as the input of the NIA function.
  • the confidentiality protection provided by the embodiment of the present application may include: the sending end sends a first parameter, an encryption key (key), a count (count), a direction (uplink data or downlink data), and a length
  • the parameter (key stream length length) is input into a security algorithm (such as the NEA function) to obtain a key stream block (keystream block), and the plaintext and the key stream block are XORed to obtain a ciphertext block.
  • a security algorithm such as the NEA function
  • the receiver enters the first parameters, key, count, direction (uplink data or downlink data), and length into a security algorithm (such as the NEA function) to obtain the key stream packet, which combines the ciphertext and ciphertext.
  • the keystream packets are XORed to get the plaintext. That is, confidentiality protection is performed on the data transmitted between the terminal and the user plane network element with the first parameter as the granularity.
  • the XORing the plaintext and the keystream group to obtain the ciphertext may include: dividing the plaintext into multiple groups, and XORing each group of plaintext (which may be referred to as a plaintext grouping) with the keystream grouping to obtain multiple sets of ciphertext (Referred to as ciphertext grouping), the ciphertext grouping is combined to obtain the ciphertext.
  • XORing the ciphertext and the keystream group to obtain the plaintext may include: XORing the ciphertext group corresponding to the ciphertext and the keystream group to obtain the plaintext group, and combining the plaintext grouping to obtain the plaintext.
  • the integrity protection provided by the embodiment of this application is shown in FIG. 2b, which may include: the sender inputs a series of parameters such as key, count, first parameter, direction, and plaintext to the NIA function, and then sends the MAC address to the receiver; After the plain text and the message authentication code, the message authentication code is calculated again according to the above-mentioned series of parameters, and the received MAC is compared with the MAC calculated by itself. If they are the same, the verification is successful. That is, integrity protection is performed on the data transmitted between the terminal and the user plane network element with the first parameter as the granularity.
  • the sending end may be a terminal, and the receiving end may be a user plane network element; or, the sending end may be a user plane network element, and the receiving end may be a terminal, without limitation.
  • the first parameter is a mandatory parameter.
  • data protection may be performed according to other parameters without restriction.
  • the first parameter may correspond to a user plane transmission logical channel between the terminal and the user plane network element.
  • the user plane transmission logical channel may be an activated user plane logical channel.
  • the terminal maintains a link between the user plane network element and the inactive user plane logical channel.
  • the terminal and the user The network is disconnected.
  • the first parameter may be a PDU session identity (ID) or a quality of service flow ID (QFI) or a data radio bearer identification (DRB ID) or a slice ID or other tunnel ID. Parameters, etc.
  • PDU session ID can be used to identify PDU session
  • QFI can be used to identify QoS flow
  • DRB ID can be used to identify the DRB between the terminal and the access network device
  • DRB can also be called RB.
  • One PDU session corresponds to one PDU session ID
  • one QoS flow corresponds to one QFI
  • one DRB corresponds to one DRB ID.
  • the first parameter may also be a radio bearer identity (RB ID), and the RB ID is used to identify the radio bearer.
  • RB ID radio bearer identity
  • the names of the network elements, the names between the network elements, and the parameters in the above-mentioned architecture of FIG. 1 are only examples.
  • the specific implementation of the network elements, the names between the network elements, and the parameters may be other names.
  • This embodiment of the present application does not specifically limit this.
  • the encryption method may include multiple types.
  • the encryption method may be XORed with the plaintext after calculating the key stream to obtain the ciphertext. You can also directly enter the plain text to obtain the encryption method of the key.
  • the embodiment of the present application does not limit such an encryption method.
  • FIG. 3 is a schematic structural diagram of a communication device 300 according to an embodiment of the present application.
  • the communication device 300 includes at least one processor 301, a communication line 302, and at least one communication interface 303; further, it may further include a memory 304.
  • the processor 301, the memory 304, and the communication interface 303 may be connected through a communication line 302.
  • at least one may be one, two, three or more, and the embodiment of the present application is not limited.
  • the processor 301 may be a central processing unit (CPU), a general-purpose processor network processor (NP), a digital signal processor (DSP), and a micro-processor. Controller, microcontroller, programmable logic device (programmable logic device, PLD) or any combination thereof.
  • the processor may also be any other device having a processing function, such as a circuit, a device, or a software module. .
  • the communication line 302 may include a path for transmitting information between components included in the communication device.
  • the communication interface 303 is used to communicate with other devices or communication networks (such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc.).
  • the communication interface 303 may be a module, a circuit, a transceiver, or any device capable of implementing communication.
  • the memory 304 may be a read-only memory (ROM) or other type of static storage device that can store static information and / or instructions, or may be a random access memory (random access memory).
  • RAM random access memory
  • dynamic storage devices that can store information and / or instructions, can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory (EEPROM), read-only compact disc (compact disc-read- only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disc storage media or other magnetic storage devices, or can be used to carry or store
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc-read- only memory
  • CD-ROM compact disc-read- only memory
  • optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • the memory 304 may exist independently of the processor 301, that is, the memory 304 may be a memory external to the processor 301. At this time, the memory 304 may be connected to the processor 301 through a communication line 302 for storing instructions Or program code.
  • the processor 301 calls and executes the instructions or program codes stored in the memory 304, it can implement the data protection method provided in the following embodiments of the present application.
  • the memory 304 may also be integrated with the processor 301, that is, the memory 304 may be an internal memory of the processor 301, for example, the memory 304 is a cache and may be used to temporarily store some data and / Or instruction information.
  • the processor 301 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 3.
  • the communication device 300 may include multiple processors, such as the processor 301 and the processor 307 in FIG. 3.
  • the communication apparatus 300 may further include an output device 305 and an input device 306.
  • the input device 306 may be a device such as a keyboard, a mouse, a microphone, or a joystick
  • the output device 305 may be a device such as a display screen or a speaker.
  • the above-mentioned communication device 300 may be a general-purpose device or a special-purpose device.
  • the communication device 300 may be a desktop computer, a portable computer, a network server, a PDA, a mobile phone, a tablet computer, a wireless terminal, an embedded device, a chip system, or a device having a similar structure in FIG. 3.
  • the embodiment of the present application does not limit the type of the communication device 300.
  • the chip system may be composed of a chip, and may also include a chip and other discrete devices.
  • the user plane network element is UPF
  • the access network device is RAN
  • the session management network element is SMF
  • the mobility management network element is AMF
  • the user plane transmission logical channel between the terminal and the UPF is PDU session
  • the terminal The confidentiality protection is taken as an example with the UPF, and the data protection method provided in the embodiment of the present application is specifically described. It should be noted that when integrity protection is used between the terminal and the UPF, or confidentiality protection and integrity protection are used to protect the data transmitted between the terminal and the UPF, the related description of the first parameter and the determination of the first parameter by the terminal and the UPF The method can be referred to the following examples.
  • the names of the messages or the names of the parameters in the messages among the network elements in the following embodiments of the present application are only examples, and other names may also be used in specific implementations, which are not specifically limited in the embodiments of the present application.
  • FIG. 4 is a data protection method provided by an embodiment of the present application. This method can protect data transmitted between a terminal and a UPF based on a PDU session ID. As shown in FIG. 4, the method may include:
  • Step 401 A PDU session is established between the terminal and the UPF.
  • the establishment of a PDU session between the terminal and the UPF may include the following processes:
  • the terminal sends a session establishment request to the AMF.
  • the session establishment request can be used to request the establishment of a PDU session so that subsequent terminals can access certain business applications in the data network (DN) through the PDU session.
  • the session establishment request can be Including PDU session ID, PDU session ID can be used to identify PDU session.
  • the AMF receives a session establishment request, and sends a session establishment manager (session manager) (SM) context request to the SMF.
  • the SM establishment context request includes a PDU session ID.
  • the SMF receives an SM context establishment request, sends an SM context establishment response to the AMF, and sends a session management establishment (or modification) request to the UPF.
  • the session management establishment (or modification) request may include a PDU session ID and the PDU session bearer.
  • the UPF receives the session management establishment (or modification) request sent by the SMF, obtains the PDU session ID and QFI from the session management or establishment request, and saves the correspondence between the PDU session ID and the QFI.
  • the PDU session ID in the session management establishment (or modification) is optional.
  • the UPF sends a session management establishment (or modification) response to the SMF, where the session management establishment (or modification) response may include the N3 link identifier (or the address of the UPF).
  • the N3 link identifier can be used to identify the logical channel between the RAN and the UPF.
  • the embodiments of the present application do not limit the logical link name between the RAN and the UPF.
  • the logical link between the RAN and the UPF is N3 below The link is described as an example.
  • the N3 link identity can be determined by the SMF and sent to the UPF.
  • the N3 link identifier may also be described as an N3 tunnel identifier or an N3 interface protocol tunnel identifier or other names, without limitation.
  • the SMF receives a session management establishment (or modification) response and sends an N1N2 message to the AMF.
  • the N1N2 message includes a PDU session request.
  • the PDU session request may include a PDU session ID, a QFI, and an N3 link identifier.
  • the AMF sends a PDU session request to the RAN.
  • the RAN receives the PDU session request, saves the correspondence between the PDU session ID, QFI, and N3 link identifier, configures the DRB for QFI, and saves the correspondence between the PDU session ID, QFI, and DRB ID.
  • the correspondence between PDU session ID, QFI, and N3 link identifiers is: PDU session ID1, QFI1, N3 link 1
  • the DRB configured for QFI is DRB1
  • the correspondence between PDU session ID, QFI, and DRB ID It is: PDU session ID1, QFI1, DRB ID1.
  • the RAN sends the correspondence between the PDU, session ID, QFI, and DRB ID to the terminal, and the terminal receives and saves the correspondence between the PDU session ID, QFI, and DRB ID. Or, the RAN sends the correspondence between the PDU session ID and the DRB ID to the terminal.
  • the terminal and the UPF have completed the establishment of a PDU session.
  • the terminal can access certain applications in the DN through the PDU session.
  • the terminal can access some applications in the DN through the RAN and the UPF according to the routing information (such as the identity of the RAN and the identity of the UPF).
  • the terminal may not include the PDU session ID in the session establishment request, but the PDU session ID may be generated by the AMF or SMF and sent to the terminal or UPF.
  • Step 402 The terminal determines the PDU session ID corresponding to the plain text to be sent, and uses the PDU session ID to perform data protection on the plain text to obtain the cipher text.
  • the terminal may determine the PDU session ID of the plain text according to the content information of the plain text to be transmitted.
  • the plaintext content information may include plaintext quintuple information (such as: protocol type, source Internet Protocol (IP) address, destination IP address, source port number, destination port number, etc.) and other information used to characterize the plaintext belongs to (Or bearer) which PDU session information.
  • plaintext quintuple information such as: protocol type, source Internet Protocol (IP) address, destination IP address, source port number, destination port number, etc.
  • IP Internet Protocol
  • destination IP address IP address
  • source port number source port number
  • destination port number destination port number
  • Other information used to characterize the plaintext belongs to (Or bearer) which PDU session information.
  • the terminal may also be a plaintext-based IP address, media access control (MAC) ) At least one of the address, the port number information of the data packet, the prefix of the IP address, and other information determines the PDU session ID.
  • MAC media access control
  • the terminal uses PDU session ID to perform data protection on the plaintext to obtain the ciphertext including:
  • the terminal enters the PDU session ID, the encryption key (key), and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a keystream packet, and XORs the keystream packet and the plaintext to obtain Ciphertext.
  • the key stream packet may also be described as a key stream or another name, which is not limited.
  • the encryption key, security algorithm, and other parameters are shared by the terminal and the UPF.
  • the terminal can negotiate with the AMF or SMF to determine the encryption key, security algorithm, and other parameters, and the AMF or SMF sends the agreed encryption key, security algorithm, and other parameters to the UPF; or, the encryption key and security algorithm And other parameters are pre-configured on the terminal and UPF.
  • the embodiments of the present application do not limit the name of the security algorithm during confidentiality protection, and the security algorithm may include NEA, EEA, and the like.
  • the embodiments of the present application are described using NEA as an example.
  • Step 403 The terminal sends a ciphertext to the RAN.
  • the terminal sends a ciphertext to the RAN through the DRB between the terminal and the RAN.
  • the terminal may determine the DRB corresponding to the PDU session ID according to the correspondence between the PDU session ID and the DRB ID stored therein, and send the ciphertext to the RAN through the determined DRB.
  • the terminal determines the QFI corresponding to the plain text, and sends the cipher text to the RAN through the DRB corresponding to the QFI.
  • the embodiment of the present application does not limit the method for determining the QFI corresponding to the plaintext.
  • the terminal when the terminal sends the ciphertext to the RAN, the terminal may simultaneously send a first sending instruction, and the first sending instruction may be used to indicate that the RAN sends the ciphertext to the UPF so that After receiving the ciphertext, the RAN sends the ciphertext to the UPF through the N3 link according to the first sending instruction.
  • Step 404 The RAN receives the ciphertext and sends the ciphertext to the UPF.
  • the RAN while the RAN receives the ciphertext sent by the terminal through the DRB, the RAN also receives a first sending instruction, and the RAN learns that the ciphertext is a ciphertext sent to the UPF according to the first sending instruction, and sends the ciphertext to the UPF through the N3 link. Send the ciphertext.
  • the terminal when the terminal sends the cipher text to the RAN, it does not send the first sending instruction, but during the PDU session establishment process, when the RAN allocates the DRB ID, it is specified that the cipher text sent on the DRB corresponding to this DRB ID needs to be sent to the corresponding UPF. Subsequently, when the RAN receives the ciphertext sent by the terminal from the DRB, it knows that the ciphertext is the ciphertext sent to the UPF according to the DRB ID corresponding to the DRB, and sends the ciphertext to the UPF through the N3 link.
  • the RAN sending ciphertext to the UPF through the N3 link may include: The RAN may determine the PDU session ID corresponding to the ciphertext received from the DRB according to the correspondence between the PDU session ID and the DRB ID stored in the RAN, and then according to the PDU session The correspondence between the ID and the N3 link identifier determines the N3 link identifier corresponding to the PDU session ID, and sends a cipher text to the UPF according to the N3 link identifier.
  • the terminal when it sends the ciphertext, it also sends QFI, and the RAN determines the N3 link identifier according to the correspondence between the QFI and the N3 link identifier, and sends the ciphertext to the corresponding UPF through the N3 link identified by the N3 link identifier.
  • Step 405 The UPF receives the ciphertext, determines the PDU session ID corresponding to the ciphertext, and uses the determined PDU sessionID to decrypt the ciphertext to obtain the plaintext.
  • the UPF can receive the ciphertext from the N3 link. After the UPF receives the ciphertext, it can determine the PDU session ID corresponding to the ciphertext by the following method 1 or method 2:
  • Method 1 The UPF saves the correspondence between the PDU session ID and the QFI through the PDU session establishment process in step 401. After the UPF receives the ciphertext, the UPF determines the QFI corresponding to the ciphertext, and determines the PDU session ID according to the correspondence between the PDU session ID and the QFI.
  • the UPF may determine the QFI corresponding to the ciphertext according to the quintuple information of the ciphertext or the N3 link identifier of the N3 link that sends the ciphertext. For example, the UPF may filter the quintuple information of the received ciphertext through a filtering template. If the received ciphertext meets the filtering template, it is determined that the ciphertext belongs to the QoS flow corresponding to the filtering template. Among them, the filtering template can be sent by the SMF to the UPF during the PDU session establishment process.
  • Method 2 In step 404, the RAN can also send a PDU session ID to the UPF while sending the cipher text, and the UPF can obtain the PDU session ID corresponding to the cipher text from the RAN.
  • the RAN stores the correspondence between the PDU session ID and the DRB ID. After the RAN receives the ciphertext sent by the terminal through the DRB, it can determine the correspondence between the cipher text based on the correspondence between the PDU session ID and the DRB ID. PDU session ID, and send PDU session ID to UPF.
  • the RAN stores the correspondence between the PDU, session ID, and QFI.
  • the RAN After the RAN receives the ciphertext from the terminal, it can send the ciphertext to the service data adaptation protocol (SDAP) layer of the RAN to process and obtain this.
  • SDAP service data adaptation protocol
  • the QFI corresponding to the ciphertext is determined according to the correspondence between the PDU session ID and the QFI.
  • the terminal when it sends the ciphertext, it also sends the QFI, and the RAN determines the N3 link identifier according to the correspondence between the QFI and the N3 link identifier, and sends the ciphertext to the corresponding UPF.
  • the UPF may not save the correspondence between the PDU session ID and the QFI, or the SMF does not send the PDU session ID to the UPF during the PDU session establishment in step 401.
  • the UPF uses the determined PDU session ID to decrypt the ciphertext to obtain the plaintext including:
  • the UPF inputs the PDU session ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet and the cipher text to obtain the plain text.
  • the above steps 402 to 405 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed when the UPF sends data to the terminal.
  • the method may further include:
  • Step 406 The UPF determines the PDU session ID corresponding to the plain text to be sent, and encrypts the plain text using the PDU session ID to obtain the cipher text.
  • the UPF inputs the PDU session ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet with the plain text to obtain the cipher text.
  • the UPF can determine the QFI corresponding to the ciphertext according to the quintuple information of the plaintext, and determine the PDU sessionID corresponding to the plaintext according to the correspondence between the QFI stored in the UPF and the PDU session ID.
  • the manner in which the UPF determines the PDU session ID corresponding to the plain text may include multiple types without limitation.
  • the UPF may also determine the PDU session ID corresponding to the plaintext based on at least one of the plaintext IP address, MAC address, port number information of the data packet, and prefix of the IP address.
  • Step 407 The UPF sends a ciphertext to the RAN.
  • the UPF can send the ciphertext to the RAN through the N3 link.
  • the UPF when the UPF sends the ciphertext to the RAN, it may also send a second sending instruction, and the second sending instruction may be used to indicate that the RAN sends the ciphertext to the terminal, so that After receiving the ciphertext, the RAN sends the ciphertext to the terminal through the DRB according to the second sending instruction.
  • Step 408 The RAN receives the ciphertext and sends the ciphertext to the terminal.
  • the RAN receives the ciphertext sent by the UPF through the N3 link
  • the RAN also receives a second transmission instruction, and the RAN learns that the ciphertext is a ciphertext addressed to the terminal according to the second transmission instruction, and sends the UPF to the UPF through the DRB Send the ciphertext.
  • the terminal when the terminal sends the cipher text to the RAN, it does not send the second sending instruction. Instead, during the PDU session establishment process, after the RAN receives the N3 link identifier, it specifies that the N3 link identifier corresponding to the N3 link identifier is sent on the N3 link. The ciphertext needs to be sent to the corresponding terminal. Subsequently, when the RAN receives the ciphertext sent by the UFP from the N3 link, it knows that the ciphertext is a ciphertext addressed to the terminal according to the N3 link identifier corresponding to the N3 link, and sends the ciphertext to the terminal through the DRB.
  • Step 409 The terminal receives the cipher text, determines the PDU session ID corresponding to the cipher text, and decrypts the cipher text using the PDU session ID to obtain the plain text.
  • the terminal inputs the PDU session ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet and the cipher text to obtain the plain text.
  • the terminal may determine the QFI corresponding to the ciphertext according to the quintuple information corresponding to the ciphertext, and determine the PDU sessionID corresponding to the ciphertext according to the correspondence between the PDU session ID and the QFI stored in the terminal. Or the terminal determines the PDU session ID corresponding to the ciphertext according to the correspondence between the saved PDU session ID and the DRB.
  • the confidentiality of the data transmitted between the terminal and the UPF can be protected according to the PDU session ID, and the end-to-end protection of the terminal to the UPF is realized.
  • the confidentiality protection of the data by the RAN is avoided, the RAN and When the user-side data interacted on the network side is attacked, the data is leaked, and the security of user-side data transmission is reduced, which improves the security of data transmission.
  • FIG. 5 is a data protection method provided by an embodiment of the present application. The method can protect data transmitted between a terminal and a UPF based on QFI. As shown in FIG. 5, the method may include:
  • Step 501 A PDU session is established between the terminal and the UPF.
  • Step 501 is the same as step 401, and details are not described again.
  • Step 502 The terminal determines the QFI corresponding to the plain text to be sent, and encrypts the plain text by using the QFI to obtain the cipher text.
  • the method for determining the QFI by the terminal is not limited.
  • the terminal may determine the QFI corresponding to the plain text according to the IP quintuple information of the plain text.
  • the terminal may filter the plaintext IP quintuple information through a filtering template. If the plaintext meets the filtering template, it is determined that the plaintext belongs to the QoS flow corresponding to the filtering template.
  • the filtering template may be sent to the terminal by the SMF through the AMF and the RAN during the PDU session establishment process.
  • the terminal uses QFI to encrypt the plain text to obtain the cipher text.
  • the terminal enters the QFI, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and then encrypts the key.
  • the stream packet is XORed with the plaintext to get the ciphertext.
  • Step 503 The terminal sends a ciphertext to the RAN.
  • step 503 reference may be made to step 403, and details are not described again.
  • Step 504 The RAN receives the ciphertext and sends the ciphertext to the UPF.
  • step 504 reference may be made to step 404, and details are not described again.
  • Step 505 The UPF receives the ciphertext, determines the QFI corresponding to the ciphertext, and uses the determined QFI to decrypt the ciphertext to obtain the plaintext.
  • the UPF can determine the QFI corresponding to the ciphertext based on the quintuple information of the ciphertext or the N3 link identifier of the ciphertext. For example, the UPF can filter the quintet information of the received ciphertext through a filtering template. If the received ciphertext meets the filtering template, it is determined that the ciphertext belongs to the QoS flow corresponding to the filtering template. Among them, the filtering template can be sent by the SMF to the UPF during the PDU session establishment process.
  • the RAN when the RAN sends the ciphertext in step 504, it can also send the QFI corresponding to the ciphertext to the UPF, and the UPF can obtain the QFI corresponding to the ciphertext from the RAN.
  • the RAN can determine the QFI corresponding to the ciphertext through 1) or 2):
  • the RAN stores the correspondence between QFI and DRB ID. After receiving the ciphertext sent by the terminal through DRB, the RAN can determine the QFI corresponding to the ciphertext according to the correspondence between QFI and DRB ID, and send QFI to UPF.
  • the RAN may save the correspondence between QFI and DRB ID during the process of establishing the PDU session in step 501.
  • the RAN receives the PDU session request sent by the SMF and further includes indication information.
  • the indication information may be used to indicate that at least one of data protection is performed by UPF, or data protection is performed by QFI, or different DRBs are allocated for different QFIs.
  • the RAN assigns a different DRB ID to the QFI according to the instruction information.
  • one QFI corresponds to one DRB ID in the correspondence between the QFI and DRB ID stored in the RAN, that is, only a unique DRB is allocated for each QoS flow.
  • the terminal may also send a QFI indication to the RAN while sending the ciphertext to the RAN in step 503, and the RAN determines the QFI corresponding to the ciphertext according to the QFI indication.
  • the QFI indication may be used to indicate QFI.
  • the QFI indication may be QFI or other identifiers used to identify QFI.
  • the mapping relationship may be determined by SMF in step 501. Send to the RAN and the terminal, and the RAN and the terminal save the mapping relationship between other identifiers used to identify the QFI and the QFI.
  • the RAN can directly determine the QFI indication as the QFI corresponding to the ciphertext.
  • the QFI indication is another identifier for identifying the QFI
  • the RAN can determine the ciphertext correspondence according to the mapping relationship between the identifier and the QFI. QFI.
  • the QFI indication may be QFI1, or may be another identifier that can be used to indicate QFI1, such as the character A.
  • the character A and QFI1 have a mapping relationship.
  • the RAN can determine that the QFI identified by the character A is QFI1 according to the character A and the mapping relationship between the character A and QFI1.
  • the UPF uses the determined QFI to decrypt the ciphertext to obtain the plaintext.
  • the UPF includes the QFI, the encryption key (key), and other parameters (such as count, direction, and length parameters) into the security.
  • a keystream packet is generated in the algorithm, and the keystream packet and the ciphertext are XORed to obtain the plaintext.
  • the above steps 502 to 505 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed.
  • the method may further include:
  • Step 506 The UPF determines the QFI corresponding to the plain text to be sent, and encrypts the plain text using the QFI to obtain the cipher text.
  • the process of determining the QFI corresponding to the plaintext to be sent by the UPF is as described above.
  • the UPF may determine the QFI corresponding to the ciphertext according to the IP quintuple information of the plaintext.
  • the UPF inputs QFI, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet with the plain text to obtain the cipher text.
  • Step 507 The UPF sends a ciphertext to the RAN.
  • step 507 reference may be made to step 407, and details are not described again.
  • Step 508 The RAN sends a ciphertext to the terminal.
  • step 508 reference may be made to step 408, and details are not described again.
  • Step 509 The terminal receives the ciphertext, determines the QFI corresponding to the ciphertext, and uses the QFI to decrypt the ciphertext to obtain the plaintext.
  • the terminal may determine the QFI corresponding to the ciphertext according to the quintuple information corresponding to the ciphertext; or, the terminal obtains the QFI corresponding to the ciphertext from the RAN.
  • the UPF sends the ciphertext to the RAN through the N3 link, and the RAN receives the ciphertext.
  • the QFI corresponding to the ciphertext is determined according to the N3 link identifier corresponding to the N3 link, and the QFI is sent to the terminal; or the terminal determines the QFI according to the DRB ID.
  • the terminal inputs the QFI, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet and the cipher text to obtain the plain text.
  • the confidentiality protection of the data transmitted between the terminal and the UPF can be performed according to the QFI, and the end-to-end protection of the terminal to the UPF is realized.
  • the confidentiality protection of the data by the RAN is avoided, the RAN and the network side
  • the interactive user plane data is attacked, data is leaked, and the security of user plane data transmission is reduced, which improves the security of data transmission.
  • FIG. 6 is a data protection method provided by an embodiment of the present application. This method can protect data transmitted between a terminal and a UPF based on a DRB ID. As shown in FIG. 6, the method may include:
  • Step 601 A PDU session is established between the terminal and the UPF.
  • Step 601 is the same as step 401, and details are not described again.
  • Step 602 The terminal determines a DRB ID corresponding to the plain text to be sent, and encrypts the plain text by using the DRB ID to obtain a cipher text.
  • the terminal may first determine the QFI corresponding to the plain text according to the quintuple information of the plain text, and then determine the DRB ID corresponding to the plain text according to the correspondence between the QFI and the DRB ID.
  • the terminal determining the QFI corresponding to the plain text reference may be made to step 502, and details are not described again.
  • the terminal uses the DRB ID to encrypt the plain text to obtain the cipher text.
  • the terminal inputs the DRB ID, the encryption key, and other parameters (such as count, direction, and length parameters) into the security algorithm.
  • the key stream packet is generated in the key stream, and the key stream packet and the plain text are XORed to obtain the cipher text.
  • Step 603 The terminal sends a ciphertext to the RAN.
  • step 603 reference may be made to step 403, and details are not described again.
  • Step 604 The RAN receives the ciphertext and sends the ciphertext to the UPF.
  • step 604 reference may be made to step 404, and details are not described herein again.
  • Step 605 The UPF receives the ciphertext, determines the DRB ID corresponding to the ciphertext, and uses the determined DRB ID to decrypt the ciphertext to obtain the plaintext.
  • the UPF can determine the QFI corresponding to the ciphertext based on the quintuple information of the ciphertext or the N3 link identifier that sent the ciphertext, and then determine the ciphertext based on the correspondence between the DRB ID and QFI stored in the UPF. The corresponding DRB ID.
  • step 505 For the process of determining the QFI corresponding to the ciphertext by the UPF, reference may be made to step 505, and details are not described again.
  • the correspondence between the DRB ID and the QFI can be sent by the RAN to the UPF during the establishment of the PDU session in step 601.
  • the UPF receives the correspondence and saves it on the UPF.
  • the RAN receives the instruction information sent by the SMF. This instruction information allocates different DRB IDs for QFI, and sends the DRB ID assigned for QFI to the UPF, which is stored by the UPF.
  • This indication information For a description of the indication information, refer to step 505, and details are not described again.
  • the RAN may also send a DRB ID to the UPF while sending the ciphertext to the UPF in step 604, and the UPF determines the received DRB ID as the DRB ID corresponding to the ciphertext.
  • the terminal may send a DRB ID indication to the RAN while sending the cipher text to the RAN in step 603, and the RAN determines the DRB ID corresponding to the cipher text according to the DRB ID indication.
  • the DRB ID indication may be used to indicate DRB ID
  • the DRB ID indication may be DRB ID or other identifier used to identify DRB ID.
  • the mapping relationship The SMF may be sent to the RAN and the terminal in step 501, and the RAN and the terminal save the mapping relationship between the other identifiers used to identify the DRB ID and the DRB ID.
  • the RAN can directly determine the DRB ID indication as the DRB ID corresponding to the ciphertext.
  • the DRB ID indicates another identifier used to identify the DRB ID
  • the RAN can identify the DRB ID between the identifier and the DRB ID.
  • the mapping relationship determines the DRB ID corresponding to the ciphertext.
  • the DRB ID indication may be DRB ID1, or may be another identifier that can be used to indicate DRB ID1, such as character B.
  • the RBN can determine that the DRB ID identified by character B is DRB ID1 according to character B and the mapping relationship between character B and DRB ID1.
  • the UPF uses the determined DRB ID to decrypt the ciphertext to obtain the plain text.
  • the UPF enters the DRB ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream. Grouping, XORing the keystream grouping with the ciphertext to get the plaintext.
  • the UPF when the UPF receives the DRB ID from the RAN, the UPF can save the correspondence between the received DRB ID and the QFI or PDU corresponding to the ciphertext session ID. Subsequently, the UPF The DRB ID corresponding to the data sent or received can be determined according to the corresponding relationship between the saved DRB ID and QFI or PDU session ID, and the confidentiality protection of the data can be performed according to the determined DRB ID.
  • the above steps 602 to 605 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed when the UPF sends data to the terminal.
  • the method may further include:
  • Step 606 The UPF determines the DRB ID corresponding to the plain text to be sent, and encrypts the plain text by using the DRB ID to obtain the cipher text.
  • the UPF determines the QFI corresponding to the plain text to be sent, and determines the DRB ID corresponding to the plain text according to the correspondence between the QFI and the DRB ID.
  • the UPF determines the QFI corresponding to the plaintext to be sent, reference may be made to step 605, and details are not described again.
  • the UPF determines the PDU session ID corresponding to the plain text to be transmitted, and determines the DRB ID corresponding to the plain text according to the correspondence between the PDU session ID and the DRB ID.
  • the UPF determines the PDU session ID corresponding to the plain text to be sent, which can be referred to the previous steps and will not be described again.
  • the UPF enters the DRB ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a keystream packet, and XORs the keystream packet with the plaintext to obtain the ciphertext.
  • parameters such as count, direction, and length parameters
  • Step 607 The UPF sends a ciphertext to the RAN.
  • step 607 reference may be made to step 407, and details are not described herein again.
  • Step 608 The RAN sends a ciphertext to the terminal.
  • step 608 reference may be made to step 408, and details are not described again.
  • Step 609 The terminal receives the ciphertext, determines the DRB ID corresponding to the ciphertext, and uses the DRBID to decrypt the ciphertext to obtain the plaintext.
  • the terminal may receive the ciphertext sent by the RAN from the DRB, and use the DRB ID corresponding to the DRB as the DRB ID corresponding to the ciphertext.
  • the terminal inputs the DRB ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and XORs the key stream packet and the cipher text to obtain the plain text.
  • the confidentiality protection of the data transmitted between the terminal and the UPF can be performed according to the DRB ID, and the end-to-end protection of the terminal to the UPF is realized, avoiding the confidentiality protection of the data by the RAN, the RAN and the network
  • the confidentiality protection of the data transmitted between the terminal and the UPF can be performed according to the DRB ID, and the end-to-end protection of the terminal to the UPF is realized, avoiding the confidentiality protection of the data by the RAN, the RAN and the network
  • the disconnection between the terminal and the UPF may refer to that there is no logical channel established between the terminal and the RAN, and between the RAN and the UPF, and there is no user plane transmission logical channel established between the terminal and the UPF, or the terminal and the UPF
  • the user plane transmission logical channels (such as PDU sessions) established between them are not activated (or disconnected).
  • the PDU session can be established by the method described in step 401.
  • the session management established (or modified) by the UPF to the SMF is established.
  • the response may also include the address of the UPF.
  • the SMF sends the address of the UPF and the PDU session ID to the RAN.
  • the RAN stores the mapping relationship between the PDU session and the address of the UPF, and sends it to The terminal returns the address of the UPF and can also send the address of the RAN to the terminal.
  • FIG. 7 is another data protection method provided by an embodiment of the present application. This method can protect data transmitted between the terminal and the UPF based on the PDU session ID when the PDU session is not established between the terminal and the UPF. As shown in FIG. 7, the method may include:
  • Step 701 The terminal determines the PDU session ID corresponding to the plain text to be sent, and encrypts the plain text by using the PDU session ID to obtain the cipher text.
  • step 701 reference may be made to step 402, and details are not described again.
  • Step 702 The terminal sends a ciphertext to the RAN.
  • Step 703 The RAN receives the cipher text, determines the PDU session ID corresponding to the cipher text, and sends the cipher text and the PDU session ID to the UPF.
  • the RAN may obtain the address of the UPF according to the correspondence between the PDU session ID and the address of the UPF, and send the ciphertext and the PDU session ID to the UPF according to the address of the UPF.
  • step 702 when the terminal sends the ciphertext to the RAN, it also sends the PDU session ID corresponding to the ciphertext, that is, the RAN can obtain the PDU session ID corresponding to the ciphertext from the terminal.
  • step 702 the terminal sends the ciphertext to the RAN while also sending the terminal's identification.
  • the RAN determines the ciphertext according to the correspondence between the terminal's identification and the PDU session ID. Corresponding PDU session ID.
  • the correspondence between the identity of the terminal and the PDU session ID can be saved in advance on the RAN when the PDU session is established between the terminal and the UPF.
  • the session establishment request sent by the terminal may also include the identification of the terminal.
  • the SMF sends the UPF
  • the session management establishment (or modification) message sent may also include the identity of the terminal.
  • the SMF After receiving the session management establishment (or modification) response, the SMF sends the identity of the terminal and the PDU session ID to the RAN.
  • the RAN stores the identity of the terminal and The mapping relationship between PDU sessions and IDs.
  • the identification of the terminal may be used to identify the terminal, and may be a temporary identification or a permanent identification of the terminal.
  • the identity of the terminal sent by the terminal to the SMF may be the same as or different from the identity of the terminal sent by the SMF to the RAN.
  • the SMF can generate the identity of the terminal and then send it to the RAN, and the optional SMF re-identifies the identity of the terminal generated by itself. Send to the terminal.
  • step 702 when the terminal sends the ciphertext to the RAN, it also sends the UPF address to the RAN. After receiving the address of the UPF, the RAN sends the ciphertext to the UPF according to the address of the UPF.
  • step 702 when the terminal sends the ciphertext to the RAN, it also sends the PDU session ID and the address of the UPF to the RAN, and the RAN sends the ciphertext and the PDU session ID to the UPF according to the UPF address.
  • the RAN saves the correspondence between the PDU session ID and the identity of the terminal, and the correspondence between the PDU session ID and the identity of the terminal corresponds to a timer (or time window)
  • This timer is used to limit the limited duration of the correspondence between the PDU session ID and the identity of the terminal.
  • the timer expires, it indicates that the correspondence between the PDU session ID and the identity of the terminal is invalid, and the RAN may delete the correspondence.
  • Step 704 The UPF receives the ciphertext and the PDU session ID, and decrypts the ciphertext using the PDU session ID to obtain the plaintext.
  • the UPF after receiving the ciphertext and PDU session ID sent by the RAN, the UPF stores the correspondence between the PDU session ID and the RAN address, and the correspondence between the PDU session ID and the RAN address corresponds to a timer (or time window) This timer is used to limit the limited duration of the correspondence between the PDU session ID and the RAN address. When the timer expires, it indicates that the correspondence between the PDU session ID and the RAN address is invalid. The UPF may delete the correspondence relationship.
  • the address of the RAN can be used to identify the RAN, and the address of the RAN can be sent to the UPF when the RAN sends the ciphertext and the PDU session ID to the UPF.
  • the RAN may not send the PDU session ID to the UPF, and only send the identity and the ciphertext of the terminal to the UPF.
  • the UPF stores the correspondence between the identity of the terminal and the PDU session ID. After the UPF receives the identity of the terminal and the cipher text, it can determine the PDU session ID corresponding to the cipher text based on the correspondence.
  • the correspondence between the identity of the terminal and the PDU session ID can be sent by the SMF to the UPF during the PDU session establishment process.
  • the above steps 702 to 704 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed when the UPF sends data to the terminal.
  • the method may further include:
  • Step 705 The UPF determines the PDU session ID corresponding to the plain text to be sent, and encrypts the plain text by using the PDU session ID to obtain the cipher text.
  • the UPF can determine the QFI corresponding to the ciphertext based on the plaintext quintuple information, and determine the PDU corresponding to the plaintext based on the correspondence between the QFI stored in the UPF and the PDU session ID; or the UPF can be based on the plaintext service type, such as IP Address, etc., directly determine the PDU session ID. Then, input the PDU session ID, key, and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a keystream packet, and XOR the keystream packet with the plaintext to obtain the ciphertext.
  • the PDU session ID, key, and other parameters such as count, direction, and length parameters
  • the correspondence between the QFI and the PDU session ID can be stored in the UPF before the PDU session is established between the terminal and the UPF.
  • Step 706 The UPF sends the ciphertext to the RAN.
  • the UPF can obtain the address of the RAN according to the determined PDU session ID and the correspondence between the PDU session ID and the address of the RAN, and send the cipher text to the RAN according to the RAN address.
  • the UPF also sends a PDU session ID to the RAN.
  • Step 707 The RAN sends a ciphertext and a PDU session ID to the terminal.
  • the RAN may obtain the identity of the terminal according to the correspondence between the PDU session ID it receives, the saved PDU session ID, and the identity of the terminal, and send the cipher text and the PDU session ID to the terminal according to the identity of the terminal.
  • the RAN determines the DRB ID according to the saved correspondence between the PDU session ID and the DRB ID, or the correspondence between the UPF address and the DRB ID, and then sends a ciphertext to the terminal according to the DRB identified by the DRB ID.
  • Step 708 The terminal receives the cipher text and the PDU session ID, and decrypts the cipher text using the PDU session ID to obtain the plain text.
  • the terminal enters the PDU session ID, the encryption key (key), and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and the key stream is grouped and encrypted.
  • the text is XORed to get the plaintext.
  • the terminal may determine the QFI corresponding to the ciphertext according to the quintuple information corresponding to the ciphertext, and determine the QFI corresponding to the ciphertext according to the correspondence between the saved PDU session ID and QFI stored by the terminal.
  • the RAN may not send a PDU session ID to the terminal, and only send a ciphertext to the terminal through the DRB.
  • the terminal may determine the PDU session ID according to the correspondence between the DRB ID and the PDU session ID.
  • FIG. 8 is another data protection method provided by an embodiment of the present application. This method can protect data transmitted between the terminal and the UPF based on the QFI when no QFI is established between the terminal and the UPF. As shown in FIG. 8, the method may include:
  • Step 801 The terminal determines the QFI corresponding to the plain text to be transmitted, and encrypts the plain text by using the QFI to obtain the cipher text.
  • step 801 reference may be made to step 502, and details are not described again.
  • Step 802 The terminal sends a ciphertext to the RAN.
  • the RAN may be the default RAN, or the terminal may send a ciphertext to the RAN according to the RAN address received during the PDU session establishment process.
  • Step 803 The RAN receives the ciphertext, determines the QFI corresponding to the ciphertext, and sends the ciphertext and the QFI to the UPF.
  • step 802 the terminal sends the ciphertext to the RAN while also sending the QFI corresponding to the ciphertext, that is, the RAN can obtain the QFI corresponding to the ciphertext from the terminal.
  • step 802 the terminal sends the ciphertext to the RAN while also sending the terminal's identity.
  • the RAN receives the terminal's identity, it determines the ciphertext corresponding to the correspondence between the terminal's identity and the QFI. QFI.
  • the correspondence between the identity of the terminal and the QFI can be stored in advance on the RAN when the QFI is established between the terminal and the UPF.
  • the session establishment request sent by the terminal can also include the identity of the terminal.
  • the UPF sends a session to the SMF
  • the management establishment (or modification) response may also include the identity of the terminal.
  • the SMF sends the identity of the terminal to the RAN.
  • the RAN allocates a QFI for the DRB, the identity between the terminal and the QFI is saved. Mapping relationship.
  • the identification of the terminal may be used to identify the terminal, and may be a temporary identification or a permanent identification of the terminal.
  • the RAN may obtain the address of the UPF according to the QFI corresponding to the ciphertext and the correspondence between the QFI and the address of the UPF, and send the ciphertext and QFI to the UPF according to the address of the UPF.
  • step 802 the terminal sends the ciphertext to the RAN while also sending the UPF address to the RAN.
  • the RAN determines the corresponding ciphertext according to the correspondence between the UPF address and the QFI.
  • QFI sends ciphertext and QFI to UPF according to the address of UPF.
  • step 802 the terminal sends the ciphertext to the RAN while also sending the QFI and UPF addresses to the RAN, and the RAN sends the ciphertext and QFI to the UPF according to the UPF address.
  • the RAN stores the correspondence between QFI and the identity of the terminal, and the correspondence between QFI and the identity of the terminal corresponds to a timer (or time window), which is used to limit
  • the correspondence between the QFI and the identity of the terminal has a limited duration, and the timer expires, indicating that the correspondence between the QFI and the identity of the terminal is invalid, and the RAN may delete the correspondence.
  • Step 804 The UPF receives the ciphertext and the QFI, and decrypts the ciphertext using the QFI to obtain the plaintext.
  • the UPF after receiving the ciphertext and QFI sent by the RAN, the UPF stores the correspondence between the QFI and the RAN address, and the correspondence between the QFI and the RAN address corresponds to a timer (or time window), which is used to limit
  • the correspondence between the QFI and the RAN address has a limited duration, and the timer expires, indicating that the correspondence between the QFI and the RAN address is invalid, and the UPF may delete the correspondence.
  • the address of the RAN can be used to identify the RAN, and the address of the RAN can be sent to the UPF when the RAN sends the ciphertext to the UPF and the QFI.
  • the above steps 802 to 804 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed when the UPF sends data to the terminal.
  • the method may further include:
  • Step 805 The UPF determines the QFI corresponding to the plaintext to be sent, and encrypts the plaintext by using the QFI to obtain the ciphertext.
  • the UPF can determine the QFI corresponding to the ciphertext based on the plaintext quintuple information, and input the QFI, encryption key (key), and other parameters (such as count, direction, length parameters, etc.) into the security algorithm to generate a secret.
  • Key stream grouping XOR the key stream grouping with the plaintext to obtain the ciphertext.
  • Step 806 The UPF sends the ciphertext to the RAN.
  • the UPF may obtain the address of the RAN according to the QFI determined by the UPF and the correspondence between the QFI and the address of the RAN, and send the cipher text to the RAN according to the address of the RAN.
  • the UPF also sends a QFI to the RAN.
  • Step 807 The RAN sends the ciphertext and QFI to the terminal.
  • the RAN may obtain the identity of the terminal according to the received QFI and the correspondence between the saved QFI and the identity of the terminal, and send the ciphertext and QFI to the terminal according to the identity of the terminal.
  • the RAN determines the DRB ID based on the information about the DRB corresponding to the QFI previously saved, and sends a ciphertext to the terminal according to the DRB corresponding to this DRB ID.
  • Step 808 The terminal receives the ciphertext and the QFI, and decrypts the ciphertext using the QFI to obtain the plaintext.
  • the terminal enters the QFI, the encryption key (key), and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a key stream packet, and the key stream packet and cipher text are processed.
  • XOR gets plaintext.
  • the terminal may determine the QFI corresponding to the ciphertext according to the quintuple information corresponding to the ciphertext.
  • the confidentiality protection of the data transmitted between the terminal and the UPF can be performed according to the QFI.
  • data is confidentially protected
  • the user plane data that the RAN interacts with the network side is under attack, data is leaked, and the security of user plane data transmission is reduced, which improves the security of data transmission.
  • FIG. 9 is another data protection method provided by an embodiment of the present application. This method can protect data transmitted between the terminal and the UPF based on the DRB ID when no DRB ID is established between the terminal and the UPF. As shown in FIG. 9, the method may include:
  • Step 901 The terminal determines a DRB ID corresponding to the plain text to be sent, and encrypts the plain text by using the DRB ID to obtain a cipher text.
  • step 901 reference may be made to step 602, and details are not described herein again.
  • Step 902 The terminal sends a ciphertext to the RAN.
  • the RAN may be the default RAN, or the terminal may send a cipher text to the RAN according to the address of the RAN received during the PDU session establishment process.
  • Step 903 The RAN receives the ciphertext, determines a DRB ID corresponding to the ciphertext, and sends the ciphertext and the DRB ID to the UPF.
  • the terminal sends the ciphertext to the RAN while also sending the DRB ID corresponding to the ciphertext.
  • the RAN can obtain the DRB ID corresponding to the ciphertext from the terminal, and according to the DRB ID corresponding to the ciphertext and The correspondence between the DRB ID and the address of the UPF, obtains the address of the UPF, and sends the ciphertext and the DRB ID to the UPF according to the address of the UPF.
  • the correspondence between the address of the UPF and the DRB ID can be stored in the RAN before the PDU session is established between the terminal and the UPF.
  • the SMF sends the address of the UPF to the RAN.
  • the RAN allocates the DRB ID to the terminal, it saves the mapping relationship between the address of the UPF and the DRB ID.
  • the UPF address can be used to identify the UPF, which can be the IP address or MAC address of the UPF.
  • step 902 the terminal sends the ciphertext to the RAN while also sending the terminal's identity.
  • the RAN determines the ciphertext according to the correspondence between the terminal's identity and the address of the UPF. Corresponding UPF address.
  • the SMF sends the identity of the terminal and the address of the UPF to the RAN.
  • the RAN determines the address of the UPF according to the identity of the received terminal.
  • the identification of the terminal may be used to identify the terminal, and may be a temporary identification or a permanent identification of the terminal.
  • step 902 when the terminal sends the ciphertext to the RAN, it also sends the UPF address to the RAN.
  • the RAN After receiving the UPF address, the RAN determines the ciphertext correspondence according to the correspondence between the UPF address and the DRB ID.
  • the DRB ID based on the UPF address, sends the ciphertext and DRB ID to the UPF.
  • step 902 when the terminal sends the ciphertext to the RAN, it also sends the DRB ID and the address of the UPF to the RAN, and the RAN sends the ciphertext and the DRB ID to the UPF according to the address of the UPF.
  • the RAN saves the correspondence between the DRB ID and the identity of the terminal, and the correspondence between the DRB ID and the identity of the terminal corresponds to a timer (or time window).
  • the device is used to limit the limited duration of the correspondence between the DRB ID and the identity of the terminal, and the timer expires, indicating that the correspondence between the DRB ID and the identity of the terminal is invalid, and the RAN may delete the correspondence.
  • Step 904 The UPF receives the ciphertext and the DRB ID, and uses the DRB ID to decrypt the ciphertext to obtain the plaintext.
  • the UPF after receiving the ciphertext and the DRB ID sent by the RAN, the UPF saves the correspondence between the DRB ID and the address of the RAN, and the correspondence between the DRB ID and the RAN address corresponds to a timer (or time window).
  • the device is used to limit the limited duration of the correspondence between the DRB ID and the RAN address, and the timer expires, indicating that the correspondence between the DRB ID and the RAN address is invalid, and the UPF can delete the correspondence.
  • the address of the RAN can be used to identify the RAN, and the address of the RAN can be sent to the UPF when the RAN sends the ciphertext and the DRB ID to the UPF.
  • the above steps 902 to 904 are the encryption process of the terminal sending data to the UPF.
  • confidentiality protection may also be performed.
  • the method may further include:
  • Step 905 The UPF determines the DRB ID corresponding to the plain text to be sent, and encrypts the plain text by using the DRB ID to obtain the cipher text.
  • the UPF can determine the DRB ID corresponding to the cipher text based on the plaintext quintuple information, and enter the DRB ID, encryption key, and other parameters (such as count, direction, and length parameters) into the security.
  • a keystream packet is generated in the algorithm, and the keystream packet and the plaintext are XORed to obtain the ciphertext.
  • the UPF first determines the PDU session ID, and determines the DRB ID according to the correspondence between the DRB ID and the PDU session ID.
  • the PDU session ID For the manner of determining the PDU session ID, reference may be made to the description of the previous embodiment, and details are not described herein.
  • Step 906 The UPF sends the ciphertext to the RAN.
  • the UPF can obtain the address of the RAN according to the DRB ID and the corresponding relationship between the DRB ID and the address of the RAN, and send the cipher text to the RAN according to the address of the RAN.
  • the UPF also sends a DRB ID to the RAN.
  • the UPF also sends the identity of the terminal to the RAN.
  • Step 907 The RAN sends a ciphertext to the terminal based on the DRB corresponding to the DRB ID.
  • the RAN may send a ciphertext to the terminal using the corresponding DRB according to the DRB ID it receives.
  • the RAN stores a mapping between the DRB ID and the identity of the terminal; the RAN receives the identity and ciphertext of the terminal from the UPF, determines the DRB ID based on the identity of the terminal, and then uses the DRB corresponding to the DRB ID to send the cipher text to the terminal.
  • Step 908 The terminal receives the ciphertext and recognizes the DRB ID, and uses the DRB ID to decrypt the ciphertext to obtain the plaintext.
  • the terminal enters the DRB ID, the encryption key (key), and other parameters (such as count, direction, and length parameters) into the security algorithm to generate a keystream packet, and then groups the keystream packet and ciphertext. Perform XOR to get the plaintext.
  • the terminal may determine the DRB ID corresponding to the ciphertext according to the quintuple information corresponding to the ciphertext.
  • the above Figures 4 to 9 use PDU session ID or QFI or DRB ID as granularity to protect data.
  • the slice ID of the network slice where the UPF is located or the terminal identifier or the address of the UPF or N3 may be used.
  • the link identifier, or tunnel identifier, or bearer identifier, or other parameters are used to protect data with granularity and are not restricted.
  • the terminal can input the slice ID (or the terminal's identification or the address of the UPF), the encryption key (key), and other parameters (such as count, direction, and length parameters) of the network slice where the UPF is located into the security algorithm.
  • the UPF After receiving the ciphertext, the UPF enters the slice ID (or terminal identification or UPF address), encryption key (key), and other parameters (such as count, direction, and length parameters) of the network slice where the UPF is located.
  • a keystream packet is generated in the security algorithm, and the keystream packet and the ciphertext are XORed to obtain the plaintext.
  • the above embodiment describes the method for protecting the terminal and the UPF in the case of encryption.
  • the participation of the first parameter is also required.
  • the basic process of integrity protection is similar to the above embodiment.
  • the terminal or UPF first determines the first parameter corresponding to the plaintext, and then executes the NIA based on this first parameter and other parameters (such as key, key stream length) and the plaintext.
  • Algorithm output message verification code.
  • the other party After receiving the plaintext and message verification code, the other party first determines the first parameter, and then based on the first parameter, other parameters (such as key, key stream length), and plaintext, verifies the received message verification code. Correctness.
  • the embodiment of the present application does not limit the name of the security algorithm during integrity protection, and the security algorithm during integrity protection may include NIA, EIA, and the like. The foregoing embodiment has been described using NIA as an example.
  • the data transmitted between the terminal and the UPF can also be protected based on the IPsec protocol. Specifically, the solution is shown in the figure 10 shown.
  • FIG. 10 is another data protection method according to an embodiment of the present application.
  • the method can protect data transmitted between a terminal and a UPF based on the IPsec protocol. As shown in FIG. 10, the method may include:
  • Step 1001 The SMF determines that data protection is performed by the UPF.
  • the process of determining the data protection by the UPF by the SMF can refer to the existing technology, and will not be described again.
  • Step 1002 The SMF determines the IPsec security mode according to the user plane security policy.
  • the user plane security policy is used to specify whether to protect the confidentiality and / or integrity of the data.
  • the user plane security policy can be stored in the SMF in advance or obtained from other network elements. With a mapping relationship, a PDU session corresponds to a user plane security policy.
  • the SMF determining the IPsec security mode according to the user plane security policy may include:
  • IPsec IP Security
  • IPsec is IPSec AH mode or IPSec ESP integrity protection mode
  • the security mode of IPsec is the confidentiality and integrity protection mode of IPSec ESP, or the mode of IPsec ESP + AH;
  • Step 1003 Determine an IPsec security association (SA) between the UPF and the terminal.
  • SA IPsec security association
  • determining the IPsec SA between the UPF and the terminal includes:
  • Method 1 SMF generates UPF encryption key according to user plane security policy and sends the generated encryption key to UPF; SMF sends a session establishment response to the terminal, triggering the terminal to generate the encryption key of the terminal, and then SMF triggers the terminal and UPF
  • SMF sends a session establishment response to the terminal, triggering the terminal to generate the encryption key of the terminal, and then SMF triggers the terminal and UPF
  • the IPsec SA negotiation process is performed. After the negotiation process is completed, both the terminal and the UPF determine the IPsec SA.
  • Method 2 SMF generates a UPF encryption key according to the user plane security policy, and sends the generated encryption key to UPF; SMF sends a session establishment response to the terminal, triggering the terminal to generate the terminal's encryption key; after that, the terminal and SMF perform IPsec The negotiation process of the SA. After the negotiation process is completed, the SMF sends the determined IPsec SA to the UPF.
  • Method 3 The SMF sends a user plane security policy to the AMF.
  • the AMF generates a UPF encryption key according to the user plane security policy and sends the generated encryption key to the UPF.
  • the AMF sends a session establishment response to the terminal, triggering the terminal to generate the terminal's encryption. Key; afterwards, the terminal and the AMF execute the IPsec SA negotiation process. After the negotiation process is completed, the AMF sends the determined IPsec SA to the UPF.
  • the encryption key may also be called a root key or a protection key.
  • the SMF generates a UPF encryption key according to the user plane security policy
  • the terminal generates a terminal encryption key
  • IPsec IPsec.
  • the negotiation process of the SA can refer to the existing technology, and will not be described again.
  • Method four The SMF determines the hash type algorithm and encryption algorithm in the IPsec SA based on the user plane security policy, the security capabilities of the terminal, and the list of algorithms supported by the UPF (or the priority list of algorithms supported by the UPF). Encryption algorithm and IPsec security mode form a complete IPsec SA;
  • the SMF generates the encryption key of the UPF, sends the IPsec SA and the encryption key to the UPF, and sends the IPsec SA to the terminal, so that the terminal generates the encryption key of the terminal, and then the terminal and the UPF can perform data protection based on the encryption key and the IPsec SA.
  • the SMF can preset a list of algorithms supported by the UPF or obtain a list of algorithms supported by the UPF from the UPF.
  • Method 5 The SMF sends a user plane security policy to the AMF.
  • the AMF determines the hash type algorithm in the IPsec and SA according to the user plane security policy, the terminal's security capabilities, and the list of algorithms supported by the UPF (or the priority list of algorithms supported by the UPF).
  • Encryption algorithm which combines hash type algorithm, encryption algorithm and IPsec security mode into a complete IPsec SA;
  • the AMF sends IPsec and SA to the terminal through the RAN, and triggers the terminal to generate the encryption key of the terminal.
  • the AMF can send the IPsec and SA to the UPF through the SMF.
  • the AMF can generate the UPF's encryption key.
  • the SMF sends the UPF's encryption key to the UPF. ; Or, the SMF generates an UPF encryption key, and sends the UPF encryption key to the UPF; or, the UPF receives the IPsec SA, and generates a user plane encryption key.
  • the AMF can preset a list of algorithms supported by the UPF, can also obtain a list of algorithms supported by the UPF from the SMF, and can also obtain a list of algorithms supported by the UPF from the UPF.
  • Method 6 The SMF sends the user plane security policy to the UPF.
  • the UPF determines the hash type algorithm in the IPsec and SA according to the user plane security policy, the terminal's security capabilities, and the list of algorithms supported by the UPF (or the priority list of algorithms supported by the UPF).
  • Encryption algorithm which combines hash-type algorithms, encryption algorithms, and IPsec security modes into a complete IPsec SA.
  • UPF generates user plane encryption keys.
  • the UPF sends IPsec and SA to the terminal through the RAN, and triggers the terminal to generate the encryption key of the terminal.
  • SMF or AMF or UPF can also determine the hash type in IPsec and SA according to the security capabilities of the terminal and the list of algorithms supported by UPF (or the list of algorithm priorities supported by UPF).
  • Algorithms and encryption algorithms combine hash-type algorithms, encryption algorithms, and IPsec security modes to form a complete IPsec SA.
  • Step 1004 The terminal and the UPF perform data protection according to the IPsec, SA, and their respective protection keys.
  • the terminal encrypts the plaintext to be sent according to the IPsec SA and the protection key of the terminal to obtain the ciphertext, and sends the ciphertext to the UPF.
  • the UPF receives the ciphertext, it encrypts the key according to the IPsec SA and the UPF protection key.
  • the text is decrypted to get the plaintext.
  • the protection key of the terminal and the protection key of the UPF are the same.
  • the confidentiality protection of the data transmitted between the terminal and the UPF can be performed based on the IPsec protocol, and the end-to-end protection of the terminal to the UPF is realized.
  • the confidentiality protection of the data by the RAN is avoided, the RAN and the network
  • the security of user-side data transmission is reduced, which improves the security of data transmission.
  • the terminal and the UPF can also perform data protection based on transport layer security (TLS).
  • TLS transport layer security
  • the data protection process between the terminal and the UPF based on TLS is similar to the above-mentioned data protection process using IPsec.
  • the SMF determines whether confidentiality and / or integrity protection is required between the terminal and the UPF;
  • the TLS cipher suite (such as cipher_suite) used for data protection between the terminal and the UPF is negotiated, and the terminal and the UPF are triggered based on the determined TLS cipher Suite for data protection.
  • the TLS cipher suite is used to indicate some information required for data protection between the terminal and the UPF, such as: which key exchange algorithm is used, which encryption algorithm (and key length) is used, which integrity protection algorithm is used, and Which at least one of the random number generation algorithms.
  • the TLS cipher suite may include: a cipher exchange algorithm, an encryption algorithm (and a key length), an integrity protection algorithm, and a random number generation algorithm.
  • the SMF determines whether confidentiality protection and / or integrity protection is required between the terminal and the UPF according to the user plane security policy.
  • the terminal or the UPF may also determine whether confidentiality protection and / or integrity protection is required between the terminal and the UPF according to the user plane security policy.
  • the description of the user plane security policy and the manner in which the terminal and the UPF need to perform confidentiality protection and / or integrity protection according to the user plane security policy are as described in the method shown in FIG. 10 and will not be described again.
  • the terminal may negotiate with the SMF or the AMF to determine the TLS cipher suite.
  • the SMF or the AMF may send the negotiated TLS cipher suite to the UPF, so that the terminal and the UPF perform data protection based on the determined TLS cipher suite.
  • the terminal may negotiate with the UPF to determine a TLS cipher suite, and perform data protection based on the determined TLS cipher suite.
  • the terminal and the user plane network element include a hardware structure and / or a software module corresponding to each function.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the functional modules of the terminal and the user plane network element may be divided according to the foregoing method example.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules may be implemented in the form of hardware or software functional modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 11 shows a schematic composition diagram of a communication device 11.
  • the communication device 11 may be a terminal or a chip in the terminal or a system on a chip.
  • the communication device 11 may be used to perform functions of the terminal involved in the foregoing embodiments.
  • the communication device 11 shown in FIG. 11 includes: a determining unit 110, an encryption / decryption unit 111, and a sending unit 112;
  • the determining unit 110 is configured to determine a first parameter corresponding to the plain text to be sent.
  • the determining unit 110 may be configured to support the communication device 11 to perform an action of determining the first parameter in steps 402, 502, 602, 701, 801, and 901.
  • the encryption / decryption unit 111 is configured to encrypt the plain text by using the first parameter to obtain a cipher text.
  • the encryption / decryption unit 111 may be used to support the communication device 11 to perform the encryption actions in steps 402, 502, 602, 701, 801, and 901.
  • the sending unit 112 is configured to send a ciphertext to a user plane network element through an access network device.
  • the sending unit 112 may be configured to support the communication device 11 to perform steps 403, 503, 603, 702, 802, and 902.
  • the communication device 11 may further include:
  • the receiving unit 113 is configured to receive the ciphertext sent by the access network device; for example, the receiving unit 113 may be configured to support the communication device 11 to receive the ciphertext in steps 409, 509, 609, 708, 808, and 908. Actions.
  • the determining unit 110 may be further configured to determine a first parameter corresponding to the received ciphertext; for example, the determining unit 110 may be configured to support the communication device 11 to perform an action of determining the first parameter in steps 409, 509, and 609.
  • the encryption / decryption unit 111 may be further configured to decrypt the received cipher text by using the first parameter to obtain a plain text.
  • the encryption / decryption unit 111 may be used to support the communication device 11 to perform the decryption actions in steps 409, 509, 609, 708, 808, and 908.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element, and may be a PDU session ID, a QFI, a DRB ID, or an RB ID.
  • the communication device 11 provided in the embodiment of the present application is configured to perform a function of a terminal in the foregoing data protection method, and thus can achieve the same effect as the foregoing data protection method.
  • the communication device 11 shown in FIG. 11 may include a processing module and a communication module.
  • the determining unit 110, the encryption / decryption unit 111 are integrated in a processing module, and the transmitting unit 112 and the receiving unit 113 are integrated in a communication module.
  • the processing module is used to control and manage the actions of the communication device 11.
  • the processing module is used to support the communication device 11 to perform steps 402, 502, 602, 701, 701, 801, and 901 and execute the techniques described herein Other processes.
  • the communication module is configured to support the communication device 11 to perform steps 403, 503, 603, 702, 802, 902, and communication with other network entities, for example, through the DRB to the access network device or other networks shown in FIG. 1 Entities communicate with each other.
  • the communication device 11 may further include a storage module for storing program code and data of the communication device 11.
  • the processing module may be a processor or a controller. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure.
  • a processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the communication module may be a transceiver circuit or a communication interface.
  • the memory module may be a memory. When the processing module is a processor, the communication module is a communication interface, and the storage module is a memory, the communication device 11 shown in FIG. 11 may be a communication device shown in FIG. 3.
  • FIG. 12 shows a schematic composition diagram of a communication device 12.
  • the communication device 12 may be a user plane network element or a chip or a system on a chip in the user plane network element.
  • the communication device 12 may be configured to perform a function of a user plane network element involved in the foregoing embodiments.
  • the communication device 12 shown in FIG. 12 includes: a receiving unit 120, a determining unit 121, and a decryption / encryption unit 122;
  • the receiving unit 120 is configured to receive the ciphertext from the access network device; for example, the receiving unit 120 may be configured to support the communication device 12 to perform steps 405, 505, 605, 704, 804, and 904 to receive the first ciphertext. Text action.
  • the determining unit 121 is configured to determine a first parameter corresponding to the ciphertext.
  • the determining unit 121 may be configured to support the communication device 12 to perform an action of determining the first parameter in steps 405, 505, and 605.
  • the decryption / encryption unit 122 is configured to decrypt the ciphertext by using the first parameter to obtain the plaintext.
  • the decryption / encryption unit 122 may be used to support the communication device 12 to perform the decryption actions in steps 405, 505, 605, 704, 804, and 904.
  • the determining unit 121 may be further configured to determine a first parameter corresponding to the plain text to be sent to the terminal.
  • the determining unit 121 may be configured to support the communication device 12 to perform an action of determining the first parameter in steps 406, 506, 606, 705, 805, and 805.
  • the decryption / encryption unit 122 may be further configured to encrypt the plaintext to be sent according to the first parameter to obtain a ciphertext.
  • the decryption / encryption unit 122 may be used to support the communication device 12 to perform the encryption operations in steps 406, 506, 606, 705, 805, and 805.
  • the communication device 12 may further include:
  • the sending unit 123 is configured to send a ciphertext to the terminal through the access network device.
  • the sending unit 123 may be configured to support the communication device 12 to perform steps 407, 507, 607, 706, 806, and 906.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element, and may be a PDU session ID, a QFI, a DRB ID, or an RB ID.
  • the communication device 12 provided in the embodiment of the present application is configured to perform a function of a user plane network element in the foregoing data protection method, and thus can achieve the same effect as the foregoing data protection method.
  • the communication device 12 shown in FIG. 12 may include a processing module and a communication module.
  • the determining unit 121, the decryption / encryption unit 122 may be integrated in the communication module, and the receiving unit 120 and the sending unit 123 may be integrated in the communication module.
  • the processing module is used to control and manage the operations of the communication device 12.
  • the communication module is configured to support the communication device 12 to perform steps 403, 503, 406, and 508, and communicate with other network entities, such as the remote device or the wireless access network device or other network entities shown in FIG. Communicate with each other.
  • the communication device 12 may further include a storage module for storing program code and data of the communication device 12.
  • the processing module may be a processor or a controller. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure.
  • a processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the communication module may be a transceiver circuit or a communication interface.
  • the memory module may be a memory. When the processing module is a processor, the communication module is a communication interface, and the storage module is a memory, the communication device 12 shown in FIG. 12 may be the communication device shown in FIG. 3.
  • FIG. 13 shows a composition diagram of a data protection system 13.
  • the data protection system may include a terminal 130, an access network device 131, and a user plane network element 132.
  • a DRB may be established between the terminal 130 and the access network device 131, and a PDU session may be established between the access network device 131 and the user plane network element 132.
  • the terminal 130 has the function of the communication device 11 described above, and can be used to determine a first parameter corresponding to the plain text to be transmitted, and encrypt the plain text using the first parameter to obtain a cipher text, and send the secret to the access network device 131. Text.
  • the access network device 131 may be configured to receive the ciphertext sent by the terminal 130 and send the ciphertext to the user plane network element 132.
  • the user plane network element 132 has the functions of the communication device 12 described above, and can be used to receive a ciphertext from the access network device 131, determine a first parameter corresponding to the ciphertext, and use the first parameter to decrypt the ciphertext to The plain text is obtained; wherein the first parameter corresponds to a user plane transmission logical channel between the terminal 130 and the user plane network element 132.
  • each network element also has the following functions:
  • the user plane network element 132 may also be used to determine a first parameter corresponding to the plaintext to be sent to the terminal 130, encrypt the plaintext to be sent according to the first parameter to obtain a ciphertext, and send the ciphertext to the access network device 131.
  • the access network device 131 may be configured to receive the ciphertext sent by the user plane network element 132 and send the ciphertext to the terminal 130.
  • the terminal 130 may also be configured to receive a ciphertext sent by the access network device 131, determine a first parameter corresponding to the received ciphertext, and decrypt the received ciphertext according to the first parameter to obtain a plaintext.
  • the first parameter corresponds to a user plane transmission logical channel between the terminal and the user plane network element, and may be a PDU session ID, a QFI, a DRB ID, or an RB ID.
  • the terminal 130 and the user plane network element 132 can perform confidentiality protection according to the first parameter corresponding to the user plane transmission logical channel between the terminal 130 and the user plane network element 132, thereby realizing the terminal 130 to the user
  • the end-to-end protection of the network element 132 avoids the confidentiality protection of data by the access network device 131.
  • the user plane data that the access network device 131 interacts with the network side is attacked, the data is leaked, The problem of reduced security improves the security of data transmission.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, a computer, a server, or a data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, and the like that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种数据保护方法、设备及系统,以解决在终端和基站上执行数据保护时用户面数据传输的安全性降低的问题。该方法涉及由终端和用户面网元利用第一参数对用户面数据进行数据保护,即在终端和用户面网元上执行数据保护。第一参数为PDU session ID或QFI或DRB ID或RB ID等。以第一参数为PDU session ID为例,该方法包括:终端确定PDU session ID,利用PDU session ID对待发送的明文加密得到密文,通过接入网设备向用户面网元发送密文,用户面网元接收到密文后,确定PDU session ID,并利用PDU session ID对密文解密得到明文。

Description

一种数据保护方法、设备及系统 技术领域
本申请涉及通信技术领域,尤其涉及一种数据保护方法、设备及系统。
背景技术
在现有的移动通信安全架构中,终端与基站之间传输的用户面数据可以被安全的保护。例如,针对发往网络的用户面数据,终端执行数据保护操作(如:机密性保护和/或完整性保护),基站在接收到保护后的数据后,执行相应的安全操作(如:解密和/或完整性验证)。针对发往终端的用户面数据,基站执行数据保护操作(如:机密性保护和/或完整性保护),终端在接收到保护后的数据后,执行相应的安全操作(如:解密和/或完整性验证)。
目前,终端与基站在分组数据汇聚协议(packet data convergence protocol,PDCP)层执行数据保护操作,PDCP层的主要功能是完成数据保护,如:机密性保护和完整性保护。以机密性保护为例,所述机密性保护可以包括:发送端将加密密钥(key)、计数(count)、承载(bearer)(如:无线承载ID)、方向(direction)(上行数据或下行数据)、长度参数(密钥流长度length)等一系列输入至安全算法(如:NEA函数)得到密钥流分组(keystream block);将明文(plantext block)与密钥流分组进行异或得到密文(ciphertext block)发送出去。接收端接收到密文后,根据上述一系列参数得到密钥流分组,将密钥流分组与密文进行异或得到明文。其中,发送端可以为终端,接收端可以为基站;或者,发送端为基站,接收端为终端。
由上可知,现有数据保护在终端和基站上执行,仅实现了终端与基站间的端对端保护,此时,若基站与网络侧交互的用户面数据遭受攻击,则会造成数据泄露,降低用户面数据传输的安全性。
发明内容
本申请实施例提供一种数据保护方法、设备及系统,以解决现有在终端和基站上执行数据保护时,降低用户面数据传输的安全性的问题。
为达到上述目的,本申请实施例提供如下技术方案:
第一方面,本申请实施例提供一种数据保护方法,可以包括:终端确定待发送的明文对应的第一参数,利用第一参数对明文进行加密,以得到密文,通过接入网设备向用户面网元发送密文。
其中,第一参数与终端和用户面网元间的用户面传输逻辑通道对应,即以终端和用户面网元间的用户面传输逻辑通道为粒度对用户面数据进行加密。
基于第一方面提供的方法,可以根据与终端和用户面网元间的用户面传输逻辑通道对应的第一参数对终端和用户面网元之间传输的数据进行机密性保护,实现了终端到用户面网元的端对端保护,避免由接入网设备对数据进行机密性保护时,接入网设备与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
在第一方面的第一种可能的中,结合第一方面,第一参数为协议数据单元(protocol data unit,PDU)会话(session)标识(identity,ID)或者服务质量流标识(QoS flow ID)(简称QFI),终端确定待发送的明文对应的第一参数,包括:终端根据待发送的明文的内容信息确定第一参数。
其中,明文的内容信息可以包括因特网协议(internet protocol,IP)地址或媒体接入控制(media access control,MAC)地址等。
在第一方面的第二种可能的设计中,结合第一方面或第一方面的第一种可能的设计,第一参数为数据无线承载(data radio bearer,DRB)ID,终端确定待发送的明文对应的第一参数,包括:终端根据待发送的明文的内容信息确定明文对应的QFI,根据明文对应的QFI、QFI以及DRB ID间的对应关系确定明文对应的DRB ID。
其中,QFI以及DRB ID间的对应关系由接入网设备发送给终端。此外,还可以通过其他方式确定待发送的明文对应的第一参数,不予限制。
在第一方面的第三种可能的设计中,结合第一方面或第一方面的任一种可能的设计,所述方法还包括:终端向接入网设备发送第一参数;或者,终端向接入网设备发送指示,指示用于指示第一参数。
如此,可以通过接入网设备将终端加密用到的第一参数发送给用户面网元,以便用户面网元从接入网设备接收到密文的同时还接收到第一参数,根据第一参数进行解密。
在第一方面的第四种可能的设计中,结合第一方面或第一方面的任一种可能的设计,所述方法还包括:终端接收接入网设备发送的密文,确定接收到的密文对应的第一参数,利用第一参数对接收的密文进行解密,以得到明文。
如此,实现用户面网元向终端下发数据时的数据保护。
第二方面,本申请提供一种通信装置,该通信装置可以为终端或者终端中的芯片或者片上系统。该通信装置可以实现上述各方面或者各可能的设计中终端所执行的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个上述功能相应的模块。如:该通信装置可以包括:确定单元,加密/解密单元,发送单元;
确定单元,用于确定待发送的明文对应的第一参数;
加密/解密单元,用于利用第一参数对明文进行加密,以得到密文;
发送单元,用于通过接入网设备向用户面网元发送密文。
其中,所述第一参数与所述终端和用户面网元间的用户面传输逻辑通道对应,通信装置的具体实现方式可以参考第一方面或第一方面的任一种可能的设计提供的数据保护方法中终端的行为功能,在此不再重复赘述。因此,该提供的通信装置可以达到与第一方面或者第一方面的任一种可能的设计相同的有益效果。
第三方面,提供了一种通信装置,包括:处理器和存储器;该存储器用于存储计算机执行指令,当该通信装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该通信装置执行如上述第一方面或者第一方面的任一种可能的设计所述的数据保护方法。
第四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第一方面或者上述方面的任一种可能的 设计所述的数据保护方法。
第五方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第一方面或者上述方面的任一种可能的设计所述的数据保护方法。
第六方面,提供了一种芯片系统,该芯片系统包括处理器、通信接口,用于支持通信装置实现上述方面中所涉及的功能,例如处理器确定待发送的明文对应的第一参数,利用第一参数对所述明文进行加密,以得到密文,通过接入网设备向所述用户面网元发送所述密文。
在一种可能的设计中,所述第一参数与所述终端和用户面网元间的用户面传输逻辑通道对应,所述芯片系统还包括存储器,所述存储器,用于保存通信装置必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
其中,第三方面至第六方面中任一种设计方式所带来的技术效果可参见上述第一方面或者第一方面的任一种可能的设计所带来的技术效果,不再赘述。
第七方面,本申请实施例提供一种数据保护方法,该方法可以包括:用户面网元接收接入网设备发送的密文,确定接收到的密文对应的第一参数,利用第一参数对密文进行解密,以得到明文。
其中,第一参数与终端和所述用户面网元间的用户面传输逻辑通道对应。
基于第七方面提供的方法,可以根据与终端和用户面网元间的用户面传输逻辑通道对应的第一参数对用户面网元接收到的密文进行解密,实现了终端到用户面网元的端对端保护,避免由接入网设备对数据进行机密性保护时,接入网设备与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
在第七方面的第一种可能的设计中,结合第七方面,第一参数为QFI,所述用户面网元确定所述密文对应的第一参数,包括:所述用户面网元根据所述密文的五元组信息确定所述密文对应的QFI。
在第七方面的第二种可能的设计中,结合第七方面,所述方法还包括:用户面网元从所述接入网设备接收所述第一参数。
如此,用户面网元接收密文的同时接收到第一参数,根据接收到的第一参数进行解密,不需要用户面网元确定密文对应的第一参数,降低了用户面网元获取第一参数的复杂性。
在第七方面的第三种可能的设计中,结合第七方面,第一参数为PDU session ID,用户面网元确定密文对应的PDU session ID,包括:用户面网元确定密文对应的QFI,根据密文对应的QFI、QFI与PDU session ID间的对应关系确定密文对应的PDU session ID。
其中,QFI与PDU session ID间的对应关系由会话管理网元发送给用户面网元。
在第七方面的第四种可能的设计中,结合第七方面,第一参数为PDU session ID,用户面网元接收密文,包括:用户面网元从N3链路接收密文;
用户面网元确定密文对应的PDU session ID,包括:用户面网元根据N3链路标识与PDU session ID的对应关系,将用于标识N3链路的N3链路标识所对应的PDU session ID确定密文对应的PDU session ID。
在第七方面的第五种可能的设计中,结合第七方面,第一参数为DRB ID,用户面网元 确定密文对应的DRB ID,包括:用户面网元确定密文对应的QFI,根据密文对应的的QFI、QFI与DRB ID间的对应关系确定密文对应的DRB ID。
其中,QFI与DRB ID间的对应关系由接入网设备发送给用户面网元。
在第七方面的第五种可能的设计中,结合第二方面或第二方面的任一种可能的设计,所述方法还包括:用户面网元确定待发送给终端的明文对应的第一参数,根据第一参数对待发送的明文进行加密得到密文,通过接入网设备向终端发送密文。
如此,实现用户面网元向终端下发数据时的数据保护。
第八方面,本申请提供一种通信装置,该通信装置可以为用户面网元或者用户面网元中的芯片或者片上系统,该通信装置可以实现上述第七方面或者第七方面的各可能的设计中用户面网元所执行的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个上述功能相应的模块。如:该通信装置可以包括:接收单元,确定单元,解密/加密单元;
接收单元,用于接收接入网设备发送的密文;
确定单元,用于确定所述密文对应的第一参数;
解密/加密单元,用于利用第一参数对接收到的密文进行解密,以得到明文。
其中,;其中,所述第一参数与终端和用户面网元间的用户面传输逻辑通道对应。通信装置的具体实现方式可以参考第七方面或第七方面的任一种可能的设计提供的数据保护方法中用户面网元的行为功能,在此不再重复赘述。因此,该提供的通信装置可以达到与第七方面或者第七方面的任一种可能的设计相同的有益效果。
第九方面,提供了一种通信装置,包括:处理器和存储器;该存储器用于存储计算机执行指令,当该通信装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该通信装置执行如上述第七方面或者第七方面的任一种可能的设计所述的数据保护方法。
第十方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第七方面或者上述方面的任一种可能的设计所述的数据保护方法。
第十一方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第七方面或者上述方面的任一种可能的设计所述的数据保护方法。
第十二方面,提供了一种芯片系统,该芯片系统包括处理器、通信接口,用于支持通信装置实现上述方面中所涉及的功能,例如处理器通过通信接口从接入网设备接收密文,确定所述密文对应的第一参数,利用第一参数对密文进行解密,以得到明文。
在一种可能的设计中,所述第一参数与终端和用户面网元间的用户面传输逻辑通道对应,所述芯片系统还包括存储器,所述存储器,用于保存通信装置必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
其中,第九方面至第十二方面中任一种设计方式所带来的技术效果可参见上述第七方面或者第七方面的任一种可能的设计所带来的技术效果,不再赘述。
第十三方面,本申请提供一种发送数据保护系统,包括:如第二方面至第六方面所述的通信装置、接入网设备、如第八方面至第十二方面所述的通信装置。
附图说明
图1为本申请实施例提供的系统框架示意图;
图2a为本申请实施例提供的一种机密性保护示意图;
图2b为本申请实施例提供的一种完整性保护示意图;
图3为本申请实施例提供的一种通信装置的组成示意图;
图4为本申请实施例提供的一种数据保护方法流程示意图;
图5为本申请实施例提供的又一种数据保护方法流程示意图;
图6为本申请实施例提供的又一种数据保护方法流程示意图;
图7为本申请实施例提供的又一种数据保护方法流程示意图;
图8为本申请实施例提供的又一种数据保护方法流程示意图;
图9为本申请实施例提供的又一种数据保护方法流程示意图;
图10为本申请实施例提供的又一种数据保护方法流程示意图;
图11为本申请实施例提供的一种通信装置11的组成示意图;
图12为本申请实施例提供的一种通信装置12的组成示意图;
图13为本申请实施例提供的一种数据保护系统13的组成示意图。
具体实施方式
下面结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请实施例提供的数据保护方法可以应用于图1所示网络系统,该网络系统可以为长期演进(long term envolution,LTE),还可以为第五代(5th generation,5G)系统,也可以为新无线(new radio,NR)系统或者其他系统。如图1所示,该网络系统可以包括:终端、接入网设备、移动性管理网元、会话管理网元、用户面网元、数据网络(Data Network,DN),各个网元之间可以通过协议规定的通信连接起来。需要说明的是,图1仅为示例性架构图,除图1中所示功能单元之外,该网络架构还可以包括策略控制网元以及其他网元,本申请实施例对此不进行限定。
图1中的终端可以用于通过无线空口连接到运营商部署的接入网设备,通过接入网设备与用户面网元间建立用户面传输逻辑通道,通过该用户面传输逻辑通道网元接入DN。终端可以为用户设备(user equipment,UE),如:手机、电脑,还可以为蜂窝电话、无绳电话、会话发起协议(session initiation protocol,SIP)电话、智能电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、电脑、膝上型计算机、手持式通信设备、手持式计算设备、卫星无线设备、无线调制解调器卡、电视机顶盒(set top box,STB)、用户驻地设备(customer premise equipment,CPE)和/或用于在无线系统上进行通信的其它设备。另外,终端也可以为支持有线接入的设备。
接入网设备主要用于实现无线物理层功能、资源调度和无线资源管理、无线接入控制以及移动性管理等功能。接入网设备可以为接入网(access network,AN)/无线接入网(radio access network,RAN),由多个5G-AN/5G-RAN节点组成,5G-AN/5G-RAN节点可以为:接入节点(access point,AP)、下一代基站(NR nodeB,gNB)、收发点(transmission receive point,TRP)、传输点(transmission point,TP)或某种其它接入节点。另外,接入网设备也可以为支持有线接入的设备。
移动性管理网元可以为接入和移动性管理功能(access and mobility management  function AMF),主要用于对终端的移动进行管理。
会话管理网元可以会话管理功能(session management function,SMF),主要用于实现用户面传输逻辑通道(如:协议数据单元(protocol data unit,PDU)会话(session))的建立、释放和更改等会话管理功能。会话管理网元可以管理一个或者多个用户面网元。
用户面网元可以用户面功能(user plane function,UPF),用户面网元可以作为用户面传输逻辑通道上的锚点,主要用于完成用户面数据的路由转发等功能,如:与终端间建立通道(即用户面传输逻辑通道),在该通道上转发终端和DN之间的数据包,以及负责对终端的数据报文过滤、数据传输/转发、速率控制、生成计费信息等。
DN可包含网络设备(服务器或路由器等设备),主要用于为终端提供多种数据业务服务。
在图1所示系统中,为了保证接入网设备与网络侧设备进行用户面数据交互的安全性,实行用户面网元和终端间的端到端的数据保护。例如,终端可以将待发送的数据(本申请实施例中命名为明文)进行数据保护后,通过接入网设备发送给用户面网元;用户面网元接收到加密后的数据后,可以对加密后的数据进行解密得到明文。同理,当用户面网元向终端发送数据时,用户面网元可以将待发送的明文进行数据保护后通过接入网设备发送给终端,终端接收到加密后的数据后,可以对加密后的数据进行解密得到明文。
本申请实施例中所述数据保护可以包括下述三种方式:1)机密性保护;2)完整性保护;3)机密性保护和完整性保护。其中,机密性保护可以指:加密一些数据,达到隐藏数据的效果,可以通过解密恢复出原来的数据。完整性保护可以指:对数据执行一些完整性保护的操作,可以根据消息认证码(message authentication code,MAC)来校验数据是否被篡改。其中,完整性保护与机密性保护的主要不同点为,完整性保护不需要异或等操作,并且将明文直接作为NIA函数的输入。
本申请实施例提供的机密性保护如图2a所示,可以包括:发送端将第一参数、加密密钥(key)、计数(count)、方向(direction)(上行数据或下行数据)、长度参数(密钥流长度length)输入至安全算法(如:NEA函数)中,得到密钥流分组(keystream block),将明文与密钥流分组进行异或得到密文(ciphertext block)发送出去;接收端接收到密文后,将第一参数、key、count、direction(上行数据或下行数据)、length输入至安全算法(如:NEA函数)中,得到密钥流分组,将密文与密钥流分组进行异或得到明文。即以第一参数为粒度对终端与用户面网元之间传输的数据进行机密性保护。其中,将明文与密钥流分组进行异或得到密文可以包括:将明文分为多组,将每组明文(可称为明文分组)与密钥流分组进行异或得到多组密文(简称密文分组),将密文分组合并在一起得到密文。相对应的,将密文与密钥流分组进行异或得到明文可以包括:将密文对应的密文分组与密钥流分组进行异或得到明文分组,将明文分组合并在一起得到明文。
本申请实施例提供的完整性保护如图2b所示,可以包括:发送端将key、count、第一参数、direction、明文等一系列参数输入至NIA函数,得到消MAC发送出去;接收端接收到明文和消息认证码之后,根据上述一系列参数再次计算得到消息认证码,对比接收到的MAC与自己计算的MAC是否相同。若相同,则校验成功。即以第一参数为粒度对终端与用户面网元之间传输的数据进行完整性保护。
其中,上述发送端可以为终端,接收端可以为用户面网元;或者,发送端为用户面网元,接收端可以为终端,不予限制。
其中,在对终端与用户面网元间传输的数据进行数据保护时,第一参数为必选参数,除第一参数之外,还可以根据其他参数进行数据保护,不予限制。第一参数可以与终端和用户面网元间的用户面传输逻辑通道对应。示例性的,该用户面传输逻辑通道可以为激活的用户面逻辑通道,此时,终端与用户面网元间保持链接;也可以为未被激活的用户面逻辑通道,此时,终端与用户网间断开连接。示例性的,第一参数可以为PDU session标识(identity,ID)或服务质量流标识(QoS flow ID,QFI)或者数据无线承载标识(data radio bearer identity,DRB ID)或者切片ID或者其他隧道ID参数等,不予限制。其中,PDU session ID可以用于标识PDU session,QFI可以用于标识QoS flow,DRB ID可以用于标识终端与接入网设备之间的DRB,DRB也可称为RB。一个PDU session对应一个PDU session ID,一个QoS flow对应一个QFI,一个DRB对应一个DRB ID。具体的,本申请实施例提供的数据保护方法可以参照图4~图9所示方法。其他可能性,第一参数还可以为无线承载标识(radio bearer identity,RB ID),RB ID用于标识无线承载。
需要说明的是,上述图1架构中的网元、各个网元之间的名字、各个参数的命名只是一个示例,具体实现中网元、网元之间的名字以及各个参数可能为其他名字,本申请实施例对此不作具体限定。另外,加密方式可以包括多种,例如:可以为通过计算出密钥流之后与明文进行异或进而得到密文的加密方式。也可以为直接输入明文得到密钥的加密方式。本申请实施例对于此类加密方式不做限制。
其中,图1中的终端、用户面网元可称为通信装置或者包括用于实现本申请实施例提供的数据保护方法的通信装置(如:芯片或片上系统等),为了实现本申请实施例提供的数据保护方法,这些通信装置可以包括图3所示部件。图3为本申请实施例提供的一种通信装置300的组成示意图。如图3所示,该通信装置300包括至少一个处理器301,通信线路302,以及至少一个通信接口303;进一步的,还可以包括存储器304。其中,处理器301,存储器304以及通信接口303三者之间可以通过通信线路302连接。在本申请实施例中,至少一个可以是一个、两个、三个或者更多个,本申请实施例不做限制。
在本申请实施例中,处理器301可以是中央处理器(central processing unit,CPU),通用处理器网络处理器(network processor,NP)、数字信号处理器(digital signal processing,DSP)、微处理器、微控制器、可编程逻辑器件(programmable logic device,PLD)或它们的任意组合。处理器还可以是其它任意具有处理功能的装置,例如电路、器件或软件模块。。
在本申请实施例中,通信线路302可包括通路,用于在通信装置包括的部件之间传送信息。
在本申请实施例中,通信接口303用于与其他设备或通信网络通信(如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等)。通信接口303可以是模块、电路、收发器或者任何能够实现通信的装置。
在本申请实施例中,存储器304可以是只读存储器(read-only memory,ROM)或可存储静态信息和/或指令的其他类型的静态存储设备,也可以是随机存取存储器(random access memory,RAM)或者可存储信息和/或指令的其他类型的动态存储设备,还可以是电可擦 可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。
一种可能的设计中,存储器304可以独立于处理器301存在,即存储器304可以为处理器301外部的存储器,此时,存储器304可以通过通信线路302与处理器301相连接,用于存储指令或者程序代码。处理器301调用并执行存储器304中存储的指令或程序代码时,能够实现本申请下述实施例提供的数据保护方法。又一种可能的设计中,存储器304也可以和处理器301集成在一起,即存储器304可以为处理器301的内部存储器,例如,该存储器304为高速缓存,可以用于暂存一些数据和/或指令信息等。
作为一种可实现方式,处理器301可以包括一个或多个CPU,例如图3中的CPU0和CPU1。作为另一种可实现方式,通信装置300可以包括多个处理器,例如图3中的处理器301和处理器307。作为再一种可实现方式,通信装置300还可以包括输出设备305和输入设备306。示例性地,输入设备306可以是键盘、鼠标、麦克风或操作杆等设备,输出设备305可以是显示屏、扬声器(speaker)等设备。
需要说明的是,上述的通信装置300可以是一个通用设备或者是一个专用设备。例如,通信装置300可以是台式机、便携式电脑、网络服务器、PDA、移动手机、平板电脑、无线终端、嵌入式设备、芯片系统或有图3中类似结构的设备。本申请实施例不限定通信装置300的类型。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。
下面结合图1,以用户面网元为UPF,接入网设备为RAN,会话管理网元为SMF,移动性管理网元为AMF,终端与UPF间的用户面传输逻辑通道为PDU session,终端与UPF间采用机密性保护为例,对本申请实施例提供的数据保护方法进行具体阐述。需要说明的是,当终端与UPF间采用完整性保护,或者机密性保护和完整性保护对终端和UPF间传输的数据进行保护时,第一参数的相关描述以及终端和UPF确定第一参数的方式可参照下述实施例中所述。此外,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。
图4为本申请实施例提供的一种数据保护方法,该方法可以基于PDU session ID对终端与UPF间传输的数据进行保护。如图4所示,该方法可以包括:
步骤401:终端与UPF间建立PDU session。
其中,终端与UPF间建立PDU session可以包括如下过程:
终端向AMF发送会话建立请求;其中,该会话建立请求可以用于请求建立PDU session,以便后续终端通过该PDU session访问数据网络(data network,DN)中的某些业务应用,会话建立请求中可以包括PDU session ID,PDU session ID可以用于标识PDU session。
AMF接收会话建立请求,向SMF发送建立会话管理(session managerment,SM)上下文请求,该建立SM上下文请求中包括PDU session ID。
SMF接收建立SM上下文请求,向AMF发送建立SM上下文响应以及向UPF发送会话管理建立(或修改)请求;其中,会话管理建立(或修改)请求中可以包括PDU session  ID以及该PDU session上可以承载的一个或多个QoS flow的QFI。
UPF接收SMF发送的会话管理建立(或者修改)请求,从会话管理或建立请求中获取PDU session ID以及QFI,保存PDU session ID和QFI间的对应关系。其中会话管理建立(或修改)中的PDU session ID为可选。
UPF向SMF发送会话管理建立(或修改)响应,其中,会话管理建立(或修改)响应中可以包括N3链路标识(或者UPF的地址)。其中,N3链路标识可以用于标识RAN与UPF间的逻辑信道,本申请各实施例针对RAN与UPF之间逻辑链路名称不做限制,下面以RAN与UPF之间的逻辑链路为N3链路为例进行描述。N3链路标识可以由SMF确定并发送给UPF。其中,针对本申请所有实施例,N3链路标识还可以描述为N3隧道标识或者N3接口协议隧道标识或者其他名称,不限制。
SMF接收会话管理建立(或修改)响应,向AMF发送N1N2消息,其中,N1N2消息中包括PDU会话请求,PDU会话请求中可以包括PDU session ID、QFI以及N3链路标识。
AMF向RAN发送PDU会话请求,RAN接收PDU会话请求,保存PDU session ID、QFI与N3链路标识间的对应关系,并为QFI配置DRB,保存PDU session ID、QFI与DRB ID间的对应关系。例如,PDU session ID、QFI与N3链路标识间的对应关系为:PDU session ID1、QFI1、N3链路1,为QFI配置的DRB为DRB1,则PDU session ID、QFI与DRB ID间的对应关系为:PDU session ID1、QFI1、DRB ID1。
RAN向终端发送PDU session ID、QFI以及DRB ID间的对应关系,终端接收并保存PDU session ID、QFI以及DRB ID间的对应关系。或者,RAN发送PDU session ID与DRB ID的对应关系给终端。
至此,终端与UPF间完成PDU session建立,在该PDU session处于激活(或工作)的情况下,终端可以通过该PDU session访问DN中的某些应用。在该PDU session处于未激活(即终端与UPF间无连接)的情况下,终端可以根据路由信息(如:RAN的标识、UPF的标识等),通过RAN、UPF访问DN中的某些应用。
需要说明的是,针对本申请所有实施例,在建立PDU session的过程中,终端在会话建立请求中还可以不包括PDU session ID,而是由AMF或者SMF生成PDU session ID,并发送给终端或者UPF。
步骤402:终端确定待发送的明文对应的PDU session ID,利用PDU session ID对明文进行数据保护,以得到密文。
其中,终端可以根据待发送的明文的内容信息确定明文的PDU session ID。明文的内容信息可以包括明文的五元组信息(如:协议类型、源因特网协议(internet protocol,IP)地址、目标IP地址、源端口号、目标端口号等)以及其他用于表征该明文属于(或承载在)哪个PDU session的信息。需要说明的是,针对本申请所有实施例,终端确定明文对应的PDU session ID的方式包括多种,不做限制,终端还可以为基于明文的IP地址、媒体接入控制(media access control,MAC)地址、数据包的端口号信息、IP地址的前缀等其他信息中的至少一项确定PDU session ID。
可选的,终端利用PDU session ID对明文进行数据保护,以得到密文包括:
终端将PDU session ID、加密密钥(key)以及其他参数(如:计数(count)、方向、 长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
其中,在本申请各实施例中,密钥流分组也可以描述为密钥流或者其他名称,不予限制。加密密钥、安全算法以及其他部分参数(如计数、长度参数等)由终端和UPF共享。终端可以和AMF或者SMF协商确定加密密钥、安全算法以及其他部分参数,并由AMF或者SMF将协议好的加密密钥、安全算法以及其他部分参数发送给UPF;或者,加密密钥、安全算法以及其他部分参数预先配置在终端和UPF上。
需要说明的是,本申请各实施例对机密性保护时安全算法的名称不做限制,该安全算法可以包括NEA,EEA等。本申请各实施例以NEA为例进行了描述。
步骤403:终端向RAN发送密文。
可选的,终端通过终端与RAN之间的DRB向RAN发送密文。如:终端可以根据其保存的PDU session ID与DRB ID间的对应关系,确定PDU session ID对应的DRB,通过确定出的DRB向RAN发送密文。或者,终端确定明文对应的QFI,通过QFI对应的DRB向RAN发送密文。本申请实施例对确定明文对应的QFI的方法不予限制。
需要说明的是,针对本申请所有实施例,终端在发送密文给RAN的同时,可以同时发送第一发送指示,该第一发送指示可以用于指示RAN此密文是发往UPF的,以便RAN接收到密文后,根据该第一发送指示通过N3链路向UPF发送此密文。
步骤404:RAN接收密文,向UPF发送密文。
可选的,RAN通过DRB接收终端发送的密文的同时,RAN还接收到第一发送指示,RAN根据第一发送指示获知该密文是发往UPF的密文,并通过N3链路向UPF发送密文。
或者,终端向RAN发送密文时,不发送第一发送指示,而是在PDU session建立的过程中,RAN在分配DRB ID时,规定此DRB ID对应的DRB上发送的密文需要发送至对应UPF。后续,当RAN从DRB上接收到终端发送的密文时,根据该DRB对应的DRB ID获知该密文是发往UPF的密文,并通过N3链路向UPF发送密文。
其中,RAN通过N3链路向UPF发送密文可以包括:RAN可以根据其保存的PDU session ID与DRB ID间的对应关系,确定从DRB接收到的密文对应的PDU session ID,再根据PDU session ID与N3链路标识间的对应关系,确定PDU session ID对应的N3链路标识,根据N3链路标识向UPF发送密文。或者终端发送密文的同时,也发送了QFI,RAN根据QFI与N3链路标识对应关系,确定N3链路标识,通过N3链路标识所标识的N3链路发送密文至对应UPF。
步骤405:UPF接收密文,确定密文对应的PDU session ID,利用确定的PDU session ID对密文进行解密,以得到明文。
其中,UPF可以从N3链路接收密文,UPF接收到密文后,可以通过下述方式一或者方式二确定密文对应的PDU session ID:
方式一:UPF通过步骤401的PDU session会话建立过程,保存PDU session ID与QFI间的对应关系。当UPF接收到密文后,UPF确定密文对应的QFI,根据PDU session ID与QFI间的对应关系,确定PDU session ID。
其中,UPF可以根据密文的五元组信息或者发送密文的N3链路的N3链路标识等确定密文对应的QFI。例如,UPF可以通过过滤模板对接收到的密文的五元组信息进行过滤, 若接收到的密文满足该过滤模板,则确定密文属于该过滤模板对应的QoS flow。其中,过滤模板可以在PDU session会话建立过程中,由SMF发送给UPF。
方式二:步骤404中,RAN在发送密文的同时还可以向UPF发送PDU session ID,UPF可以从RAN获取密文对应的PDU session ID。
其中,方式二中,RAN保存有PDU session ID与DRB ID间的对应关系,当RAN接收终端通过DRB发送的密文后,可以根据PDU session ID与DRB ID间的对应关系,确定密文对应的PDU session ID,并向UPF发送PDU session ID。
或者,RAN保存有PDU session ID与QFI间的对应关系,RAN从终端接收到密文后,可以将密文发送至RAN的业务数据适配协议(service data adaptation protocol,SDAP)层进行处理得到该密文对应的QFI,再根据PDU session ID与QFI间的对应关系,确定密文对应的PDU session ID。
或者,终端发送密文的同时,也发送了QFI,RAN根据QFI与N3链路标识的对应关系,确定N3链路标识,并发送密文至对应UPF。
需要说明的是,方式二中,UPF可以不保存PDU session ID与QFI间的对应关系,或者在步骤401的PDU session建立的过程中,SMF不向UPF发送PDU session ID。
可选的,UPF利用确定的PDU session ID对密文进行解密处理,以得到明文包括:
UPF将PDU session ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
上述步骤402~步骤405为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图4所示,所述方法还可以包括:
步骤406:UPF确定待发送的明文对应的PDU session ID,利用PDU session ID对明文进行加密,以得到密文。
可选的,UPF将PDU session ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。其中,UPF可以根据明文的五元组信息确定密文对应的QFI,根据UPF保存的QFI与PDU session ID间的对应关系,确定明文对应的PDU session ID。需要说明的是,针对本申请所有实施例,UPF确定明文对应的PDU session ID的方式可以包括多种,不做限制。如:UPF还可以基于明文的IP地址、MAC地址、数据包的端口号信息、IP地址的前缀等信息中的至少一项确定明文对应的PDU session ID。
步骤407:UPF向RAN发送密文。
可选的,UPF可以通过N3链路向RAN发送密文。
需要说明的是,针对本申请所有实施例,UPF在发送密文给RAN的同时,可以同时发送第二发送指示,该第二发送指示可以用于指示RAN此密文是发往终端的,以便RAN接收到密文后,根据该第二发送指示通过DRB向终端发送密文。
步骤408:RAN接收密文,向终端发送密文。
可选的,RAN通过N3链路接收UPF发送的密文的同时,RAN还接收到第二发送指示,RAN根据第二发送指示获知该密文是发往终端的密文,并通过DRB向UPF发送密文。
或者,终端向RAN发送密文时,不发送第二发送指示,而是在PDU session建立的过程中,RAN接收到N3链路标识后,规定此N3链路标识对应的N3链路上发送的密文需要发送至对应终端。后续,当RAN从N3链路上接收到UFP发送的密文时,根据该N3链路对应的N3链路标识获知该密文是发往终端的密文,并通过DRB向终端发送密文。
步骤409:终端接收密文,确定密文对应的PDU session ID,利用PDU session ID对密文进行解密,以得到明文。
可选的,终端将PDU session ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
其中,终端可以根据密文对应的五元组信息确定密文对应的QFI,根据终端保存的PDU session ID与QFI间的对应关系,确定密文对应的PDU session ID。或者终端根据保存的PDU session ID与DRB间的对应关系,确定密文对应的PDU session ID。
基于图4所示方法,可以根据PDU session ID对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
除PDU session ID之外,本申请实施例还可以基于QFI对数据进行保护,具体的,该方式可参照图5所示。图5为本申请实施例提供的一种数据保护方法,该方法可以基于QFI对终端与UPF间传输的数据进行保护。如图5所示,该方法可以包括:
步骤501:终端与UPF间建立PDU session。
其中,步骤501与步骤401相同,不再赘述。
步骤502:终端确定待发送的明文对应的QFI,利用QFI对明文进行加密,以得到密文。
其中,终端确定QFI的方式不做限制,例如终端可以根据明文的IP五元组信息确定明文对应的QFI。例如,终端可以通过过滤模板对明文的IP五元组信息进行过滤,若明文满足该过滤模板,则确定明文属于该过滤模板对应的QoS flow。其中,过滤模板可以在PDU session会话建立过程中,由SMF通过AMF、RAN发送给终端。
可选的,终端利用QFI对明文进行加密,以得到密文包括:终端将QFI、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
步骤503:终端向RAN发送密文。
其中,步骤503可参照步骤403所述,不再赘述。
步骤504:RAN接收密文,向UPF发送密文。
其中,步骤504可参照步骤404所述,不再赘述。
步骤505:UPF接收密文,确定密文对应的QFI,利用确定的QFI对密文进行解密,以得到明文。
其中,UPF可以根据密文的五元组信息或者发送密文的N3链路标识等确定密文对应的QFI。例如,UPF可以通过过滤模板对接收到的密文的五元组信息进行过滤,若接收到的密文满足该过滤模板,则确定密文属于该过滤模板对应的QoS flow。其中,过滤模板可 以在PDU session会话建立过程中,由SMF发送给UPF。
或者,RAN在步骤504发送密文的同时还可以向UPF发送密文对应的QFI,UPF可以从RAN获取密文对应的QFI。
其中,RAN可以通过下述1)或者2)确定密文对应的QFI:
1)RAN保存有QFI与DRB ID间的对应关系,当RAN接收终端通过DRB发送的密文后,可以根据QFI与DRB ID间的对应关系,确定密文对应的QFI,并向UPF发送QFI。
其中,RAN可以在步骤501建立PDU session的过程中保存QFI与DRB ID间的对应关系。如:RAN接收到SMF发送的PDU会话请求中还包括指示信息,该指示信息可以用于指示由UPF进行数据保护,或者指示采用QFI进行数据保护,或者指示为不同QFI分配不同的DRB等至少一项,RAN根据该指示信息为QFI分配不同的DRB ID。
需要说明的是,在方法1)中,RAN保存的QFI与DRB ID间的对应关系中一个QFI对应一个DRB ID,即为每个QoS flow仅分配唯一的DRB。
2)终端在步骤503向RAN发送密文的同时还可以向RAN发送QFI指示,RAN根据QFI指示确定密文对应的QFI。
其中,QFI指示可以用于指示QFI,QFI指示可以为QFI或者用于标识QFI的其他标识符,用于标识QFI的其他标识符与QFI间存在映射关系,该映射关系可以在步骤501中由SMF发送给RAN和终端,RAN和终端保存用于标识QFI的其他标识符与QFI间的映射关系。当QFI指示为QFI时,RAN可以直接将QFI指示确定为密文对应的QFI,当QFI指示为用于标识QFI的其他标识符时,RAN可以根据标识符与QFI间的映射关系确定密文对应的QFI。
例如,若终端加密时采用的QFI为QFI1,则该QFI指示可以为QFI1,还可以为能够用于指示QFI1的其他标识符,如:字符A。其中,字符A与QFI1间具有映射关系,当RAN接收到字符A时,RAN可以根据字符A以及字符A与QFI1间的映射关系,确定字符A所标识的QFI为QFI1。
可选的,UPF利用确定的QFI对密文进行解密处理,以得到明文包括:UPF将QFI、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
上述步骤502~步骤505为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图5所示,所述方法还可以包括:
步骤506:UPF确定待发送的明文对应的QFI,利用QFI对明文进行加密,以得到密文。
其中,UPF确定待发送的明文对应的QFI的过程如上所述,如:UPF可以根据明文的IP五元组信息确定密文对应的QFI。
可选的,UPF将QFI、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
步骤507:UPF向RAN发送密文。
其中,步骤507可参照步骤407所述,不再赘述。
步骤508:RAN向终端发送密文。
其中,步骤508可参照步骤408所述,不再赘述。
步骤509:终端接收密文,确定密文对应的QFI,利用QFI对密文进行解密,以得到明文。
其中,终端可以根据密文对应的五元组信息确定密文对应的QFI;或者,终端从RAN获取密文对应的QFI,如:UPF通过N3链路向RAN发送密文,RAN接收到密文后,根据N3链路对应的N3链路标识确定密文对应的QFI,向终端发送QFI;或者终端根据DRB ID确定QFI。
可选的,终端将QFI、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
基于图5所示方法,可以根据QFI对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
除PDU session ID或QFI之外,本申请实施例还可以基于DRB ID对数据进行保护,具体的,该方式可参照图6所示。图6为本申请实施例提供的一种数据保护方法,该方法可以基于DRB ID对终端与UPF间传输的数据进行保护。如图6所示,该方法可以包括:
步骤601:终端与UPF间建立PDU session。
其中,步骤601与步骤401相同,不再赘述。
步骤602:终端确定待发送的明文对应的DRB ID,利用DRB ID对明文进行加密,以得到密文。
其中,终端可以先根据明文的五元组信息确定明文对应的QFI,再根据QFI与DRB ID间的对应关系,确定明文对应的DRB ID。其中,终端确定明文对应的QFI的过程可参照步骤502中所述,不再赘述。
可选的,终端利用DRB ID对明文进行加密,以得到密文包括:终端将DRB ID、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
步骤603:终端向RAN发送密文。
其中,步骤603可参照步骤403所述,不再赘述。
步骤604:RAN接收密文,向UPF发送密文。
其中,步骤604可参照步骤404所述,不再赘述。
步骤605:UPF接收密文,确定密文对应的DRB ID,利用确定的DRB ID对密文进行解密,以得到明文。
一种可能的设计中,UPF可以根据密文的五元组信息或者发送密文的N3链路标识等确定密文对应的QFI,再根据UPF保存的DRB ID与QFI的对应关系,确定密文对应的DRB ID。
其中,UPF确定密文对应的QFI的过程可参照步骤505中所述,不再赘述。
其中,DRB ID与QFI的对应关系可以在步骤601建立PDU session的过程中,由RAN 发送给UPF,UPF接收到该对应关系后保存在UPF上,如:RAN接收到SMF发送的指示信息,根据该指示信息为QFI分配不同的DRB ID,并将为QFI分配的DRB ID发送给UPF,由UPF保存起来。该指示信息的相关描述可参照步骤505中所述,不再赘述。
又一种可能的设计中,RAN在步骤604向UPF发送密文的同时还可以向UPF发送DRB ID,UPF将接收到的DRB ID确定为密文对应的DRB ID。
又一种可能的设计中,终端在步骤603向RAN发送密文的同时还可以向RAN发送DRB ID指示,RAN根据DRB ID指示确定密文对应的DRB ID。
其中,DRB ID指示可以用于指示DRB ID,DRB ID指示可以为DRB ID或者用于标识DRB ID的其他标识符,用于标识DRB ID的其他标识符与DRB ID间存在映射关系,该映射关系可以在步骤501中由SMF发送给RAN和终端,RAN和终端保存用于标识DRB ID的其他标识符与DRB ID间的映射关系。当DRB ID指示为DRB ID时,RAN可以直接将DRB ID指示确定为密文对应的DRB ID,当DRB ID指示为用于标识DRB ID的其他标识符时,RAN可以根据标识符与DRB ID间的映射关系确定密文对应的DRB ID。
例如,若终端加密时采用的DRB ID为DRB ID1,则该DRB ID指示可以为DRB ID1,还可以为能够用于指示DRB ID1的其他标识符,如:字符B。其中,字符B与DRB ID1间具有映射关系,当RBN接收到字符B时,RBN可以根据字符B以及字符B与DRB ID1间的映射关系,确定字符B所标识的DRB ID为DRB ID1。
可选的,UPF利用确定的DRB ID对密文进行解密处理,以得到明文包括:UPF将DRB ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
需要说明的是,在又一种可能的设计中,当UPF从RAN接收到DRB ID时,UPF可以保存接收到的DRB ID与密文对应的QFI或者PDU session ID间的对应关系,后续,UPF可以根据保存的DRB ID与QFI或者PDU session ID间的对应关系确定其发送或接收到的数据对应的DRB ID,根据确定的DRB ID对数据进行机密性保护。
上述步骤602~步骤605为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图6所示,所述方法还可以包括:
步骤606:UPF确定待发送的明文对应的DRB ID,利用DRB ID对明文进行加密,以得到密文。
其中,UPF确定待发送的明文对应的QFI,根据QFI与DRB ID间的对应关系,确定明文对应的DRB ID。UPF确定待发送的明文对应的QFI可参照步骤605中所述,不再赘述。
其中,UPF确定待发送的明文对应的PDU session ID,根据PDU session ID与DRB ID间的对应关系,确定明文对应的DRB ID。UPF确定待发送的明文对应的PDU session ID可参照之前步骤所述,不再赘述。
可选的,UPF将DRB ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
步骤607:UPF向RAN发送密文。
其中,步骤607可参照步骤407所述,不再赘述。
步骤608:RAN向终端发送密文。
其中,步骤608可参照步骤408所述,不再赘述。
步骤609:终端接收密文,确定密文对应的DRB ID,利用DRB ID对密文进行解密,以得到明文。
其中,终端可以从DRB接收RAN发送的密文,将该DRB对应的DRB ID作为密文对应的DRB ID。
可选的,终端将DRB ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
基于图6所示方法,可以根据DRB ID对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
图4~图6适用于终端与UPF间建立PDU session的情况,对于终端与UPF间未连接的情况,其数据保护过程图7~图9所示。其中,本申请实施例中,终端与UPF间未连接可以指终端与RAN之间、RAN与UPF之间没有建立逻辑通道,终端与UPF之间没有建立用户面传输逻辑通道,或者,终端与UPF之间建立的用户面传输逻辑通道(如:PDU session)未被激活(或已断开)。
下面结合图7~图9所示,以终端与UPF之间建立的用户面传输逻辑通道(如:PDU session)未被激活(或已断开)为例对数据保护过程进行描述。其中,终端与UPF之间断开PDU session之前,可以通过步骤401所述的方法建立PDU session,在建立PDU session过程中,与步骤401不同的是,UPF向SMF发送的会话管理建立(或修改)响应中还可以包括UPF的地址,SMF接收到会话管理建立(或修改)响应后,将UPF的地址和PDU session ID一起发送给RAN,RAN保存PDU session与UPF的地址间的映射关系,并向终端返回UPF的地址,还可以向终端发送RAN的地址。
图7为本申请实施例提供的又一种数据保护方法,该方法可以在终端与UPF间未建立PDU session的情况,基于PDU session ID对终端与UPF间传输的数据进行保护。如图7所示,该方法可以包括:
步骤701:终端确定待发送的明文对应的PDU session ID,利用PDU session ID对明文进行加密,以得到密文。
其中,步骤701可参照步骤402所述,不再赘述。
步骤702:终端向RAN发送密文。
步骤703:RAN接收密文,确定密文对应的PDU session ID,向UPF发送密文以及PDU session ID。
其中,RAN可以根据PDU session ID与UPF的地址间的对应关系,获取UPF的地址,根据UPF的地址向UPF发送密文以及PDU session ID。
一种可能的设计中,步骤702中终端向RAN发送密文的同时还向RAN发送密文对应的PDU session ID,即RAN可以从终端获取密文对应的PDU session ID。
又一种可能的设计中,步骤702中终端向RAN发送密文的同时还向RAN发送终端的标识,RAN接收到终端的标识后,根据终端的标识与PDU session ID的对应关系,确定密文对应的PDU session ID。
其中,终端的标识与PDU session ID的对应关系可以在终端与UPF间建立PDU session时,预先保存在RAN上,如:终端发送的会话建立请求中还可以包括终端的标识,后续,SMF向UPF发送的会话管理建立(或修改)消息中还可以包括终端的标识,SMF接收到会话管理建立(或修改)响应后,将终端的标识和PDU session ID一起发送给RAN,RAN保存终端的标识与PDU session ID间的映射关系。终端的标识可以用于标识终端,可以为终端的临时标识或者永久性标识。其中终端发送给SMF的终端的标识,与SMF发给RAN的终端的标识可以相同也可以不同,例如SMF可以自己生成终端的标识再发送给RAN,可选的SMF将自己生成的终端的标识再发送给终端。
再一种可能的设计中,步骤702中终端向RAN发送密文的同时还向RAN发送UPF的地址,RAN接收到UPF的地址后,根据UPF的地址,向UPF发送所述密文。
再一种可能的设计中,步骤702中终端向RAN发送密文的同时还向RAN发送PDU session ID以及UPF的地址,RAN根据UPF的地址向UPF发送密文以及PDU session ID。
可选的,RAN接收到终端发送的密文以及PDU session ID后,保存PDU session ID与终端的标识的对应关系,并且PDU session ID与终端的标识的对应关系对应一定时器(或时间窗),该定时器用于限定PDU session ID与终端的标识的对应关系的有限时长,定时器超时,表示PDU session ID与终端的标识的对应关系失效,RAN可以删除该对应关系。
步骤704:UPF接收密文以及PDU session ID,利用PDU session ID对密文进行解密,以得到明文。
进一步可选的,UPF接收到RAN发送的密文以及PDU session ID后,保存PDU session ID与RAN的地址的对应关系,并且PDU session ID与RAN的地址的对应关系对应一定时器(或时间窗),该定时器用于限定PDU session ID与RAN的地址的对应关系的有限时长,定时器超时,表示PDU session ID与RAN的地址的对应关系失效,UPF可以删除该对应关系。
其中,RAN的地址可以用于标识RAN,RAN的地址可以在RAN向UPF发送密文以及PDU session ID时发送给UPF。
需要说明的是,步骤703中,RAN可以不发送PDU session ID给UPF,仅发送终端的标识和密文给UPF。UPF保存有终端的标识与PDU session ID的对应关系,当UPF接收到终端的标识和密文后,可以根据该对应关系确定密文对应的PDU session ID。其中,终端的标识与PDU session ID的对应关系可以在PDU session会话建立过程中,由SMF发送给UPF。
上述步骤702~步骤704为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图7所示,所述方法还可以包括:
步骤705:UPF确定待发送的明文对应的PDU session ID,利用PDU session ID对明文进行加密,以得到密文。
其中,UPF可以根据明文的五元组信息确定密文对应的QFI,根据UPF保存的QFI与 PDU session ID间的对应关系,确定明文对应的PDU session ID;或者UPF根据明文的业务类型,例如IP地址等,直接确定PDU session ID。然后,将PDU session ID、key以及其他参数(如:count、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
其中,QFI与PDU session ID间的对应关系可以在终端与UPF间建立PDU session时预先保存在UPF中。
步骤706:UPF向RAN发送密文。
其中,UPF可以根据其确定的PDU session ID以及PDU session ID与RAN的地址间的对应关系,获取RAN的地址,根据RAN的地址向RAN发送密文。
可选的,UPF还发送PDU session ID至RAN。
步骤707:RAN向终端发送密文以及PDU session ID。
可选的,RAN可以根据其接收到的PDU session ID以及保存的PDU session ID与终端的标识间的对应关系,获取终端的标识,根据终端的标识向终端发送密文以及PDU session ID。
可选的,RAN根据保存的PDU session ID与DRB ID的对应关系,或者UPF的地址与DRB ID的对应关系,确定DRB ID,再根据此DRB ID所标识的DRB向终端发送密文。
步骤708:终端接收密文以及PDU session ID,利用PDU session ID对密文进行解密,以得到明文。
可选的,终端将PDU session ID、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。其中,终端可以根据密文对应的五元组信息确定密文对应的QFI,根据终端保存的保存PDU session ID与QFI间的对应关系,确定密文对应的QFI。
需要说明的是,步骤707中,RAN可以不发送PDU session ID给终端,仅通过DRB向终端发送密文。当步骤708中,终端通过DRB接收到密文后,可以根据DRB ID与PDU session ID间的对应关系,确定PDU session ID。
基于图7所示方法,可以在终端与UPF间未建立连接的情况下,根据PDU session ID对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
在终端与UPF间未建立连接的情况下,除PDU session ID之外,还可以基于QFI对数据进行保护,具体的,该方式可参照图8所示。图8为本申请实施例提供的又一种数据保护方法,该方法可以在终端与UPF间未建立QFI的情况,基于QFI对终端与UPF间传输的数据进行保护。如图8所示,该方法可以包括:
步骤801:终端确定待发送的明文对应的QFI,利用QFI对明文进行加密,以得到密文。
其中,步骤801可参照步骤502所述,不再赘述。
步骤802:终端向RAN发送密文。
其中,RAN可以为默认RAN,或者,终端根据PDU session建立过程中接收到的RAN 的地址向RAN发送密文。
步骤803:RAN接收密文,确定密文对应的QFI,向UPF发送密文以及QFI。
一种可能的设计中,步骤802中终端向RAN发送密文的同时还向RAN发送密文对应的QFI,即RAN可以从终端获取密文对应的QFI。
又一种可能的设计中,步骤802中终端向RAN发送密文的同时还向RAN发送终端的标识,RAN接收到终端的标识后,根据终端的标识与QFI的对应关系,确定密文对应的QFI。
其中,终端的标识与QFI的对应关系可以在终端与UPF间建立QFI时,预先保存在RAN上,如:终端发送的会话建立请求中还可以包括终端的标识,后续,UPF向SMF发送的会话管理建立(或修改)响应中还可以包括终端的标识,SMF接收到会话管理建立(或修改)响应后,将终端的标识发送给RAN,RAN为DRB分配QFI之后,保存终端的标识与QFI间的映射关系。终端的标识可以用于标识终端,可以为终端的临时标识或者永久性标识。
在上述两种可能的方式中,RAN可以根据密文对应的QFI以及QFI与UPF的地址间的对应关系,获取UPF的地址,根据UPF的地址向UPF发送密文以及QFI。
再一种可能的设计中,步骤802中终端向RAN发送密文的同时还向RAN发送UPF的地址,RAN接收到UPF的地址后,根据UPF的地址与QFI的对应关系,确定密文对应的QFI,根据UPF的地址向UPF发送密文以及QFI。
再一种可能的设计中,步骤802中终端向RAN发送密文的同时还向RAN发送QFI以及UPF的地址,RAN根据UPF的地址向UPF发送密文以及QFI。
可选的,RAN接收到终端发送的密文以及QFI后,保存QFI与终端的标识的对应关系,并且QFI与终端的标识的对应关系对应一定时器(或时间窗),该定时器用于限定QFI与终端的标识的对应关系的有限时长,定时器超时,表示QFI与终端的标识的对应关系失效,RAN可以删除该对应关系。
步骤804:UPF接收密文以及QFI,利用QFI对密文进行解密,以得到明文。
可选的,UPF接收到RAN发送的密文以及QFI后,保存QFI与RAN的地址的对应关系,并且QFI与RAN的地址的对应关系对应一定时器(或时间窗),该定时器用于限定QFI与RAN的地址的对应关系的有限时长,定时器超时,表示QFI与RAN的地址的对应关系失效,UPF可以删除该对应关系。
其中,RAN的地址可以用于标识RAN,RAN的地址可以在RAN向UPF发送密文以及QFI时发送给UPF。
上述步骤802~步骤804为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图8所示,所述方法还可以包括:
步骤805:UPF确定待发送的明文对应的QFI,利用QFI对明文进行加密,以得到密文。
其中,UPF可以根据明文的五元组信息确定密文对应的QFI,将QFI、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组, 将密钥流分组和明文进行异或得到密文。
步骤806:UPF向RAN发送密文。
其中,UPF可以根据其确定的QFI以及QFI与RAN的地址间的对应关系,获取RAN的地址,根据RAN的地址向RAN发送密文。
可选的,UPF还向RAN发送QFI。
步骤807:RAN向终端发送密文以及QFI。
可选的,RAN可以根据其接收到的QFI以及保存的QFI与终端的标识间的对应关系,获取终端的标识,根据终端的标识向终端发送密文以及QFI。
可选的,RAN根据之前保存的QFI对应的DRB的信息,确定DRB ID,根据此DRB ID对应的DRB向终端发送密文。
步骤808:终端接收密文以及QFI,利用QFI对密文进行解密,以得到明文。
可选的,终端将QFI、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。其中,终端可以根据密文对应的五元组信息确定密文对应的QFI。
基于图8所示方法,可以在终端与UPF间未建立连接的情况下,根据QFI对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
在终端与UPF间未建立连接的情况下,除PDU session ID或者QFI之外,还可以基于DRB ID对数据进行保护,具体的,该方式可参照图9所示。图9为本申请实施例提供的又一种数据保护方法,该方法可以在终端与UPF间未建立DRB ID的情况,基于DRB ID对终端与UPF间传输的数据进行保护。如图9所示,该方法可以包括:
步骤901:终端确定待发送的明文对应的DRB ID,利用DRB ID对明文进行加密,以得到密文。
其中,步骤901可参照步骤602所述,不再赘述。
步骤902:终端向RAN发送密文。
可选的,RAN可以为默认RAN,或者,终端根据PDU session建立过程中接收到的RAN的地址向RAN发送密文。
步骤903:RAN接收密文,确定密文对应的DRB ID,向UPF发送密文以及DRB ID。
一种可能的设计中,步骤902中终端向RAN发送密文的同时还向RAN发送密文对应的DRB ID,RAN可以从终端获取密文对应的DRB ID,并根据密文对应的DRB ID以及DRB ID与UPF的地址间的对应关系,获取UPF的地址,根据UPF的地址向UPF发送密文以及DRB ID。
其中,UPF的地址与DRB ID的对应关系可以在终端与UPF间建立PDU session时,预先保存在RAN上,如:PDU session建立中,SMF发送UPF的地址给RAN。RAN为终端分配DRB ID之后,保存UPF的地址与DRB ID间的映射关系。UPF的地址可以用于标识UPF,可以为UPF的IP地址或者MAC地址等。
又一种可能的设计中,步骤902中终端向RAN发送密文的同时还向RAN发送终端的 标识,RAN接收到终端的标识后,根据终端的标识与UPF的地址的对应关系,确定密文对应的UPF的地址。
其中,如:会话管理建立中,SMF发送终端的标识和UPF的地址给RAN。RAN根据接收到的终端的标识确定UPF的地址。终端的标识可以用于标识终端,可以为终端的临时标识或者永久性标识。
再一种可能的设计中,步骤902中终端向RAN发送密文的同时还向RAN发送UPF的地址,RAN接收到UPF的地址后,根据UPF的地址与DRB ID的对应关系,确定密文对应的DRB ID,根据UPF的地址向UPF发送密文以及DRB ID。
再一种可能的设计中,步骤902中终端向RAN发送密文的同时还向RAN发送DRB ID以及UPF的地址,RAN根据UPF的地址向UPF发送密文以及DRB ID。
可选的,RAN接收到终端发送的密文以及DRB ID后,保存DRB ID与终端的标识的对应关系,并且DRB ID与终端的标识的对应关系对应一定时器(或时间窗),该定时器用于限定DRB ID与终端的标识的对应关系的有限时长,定时器超时,表示DRB ID与终端的标识的对应关系失效,RAN可以删除该对应关系。
步骤904:UPF接收密文以及DRB ID,利用DRB ID对密文进行解密,以得到明文。
可选的,UPF接收到RAN发送的密文以及DRB ID后,保存DRB ID与RAN的地址的对应关系,并且DRB ID与RAN的地址的对应关系对应一定时器(或时间窗),该定时器用于限定DRB ID与RAN的地址的对应关系的有限时长,定时器超时,表示DRB ID与RAN的地址的对应关系失效,UPF可以删除该对应关系。
其中,RAN的地址可以用于标识RAN,RAN的地址可以在RAN向UPF发送密文以及DRB ID时发送给UPF。
上述步骤902~步骤904为终端向UPF发送数据的加密过程,作为终端向UPF发送数据的逆过程,UPF向终端发送数据时,也可以进行机密性保护。具体的,如图9所示,所述方法还可以包括:
步骤905:UPF确定待发送的明文对应的DRB ID,利用DRB ID对明文进行加密,以得到密文。
可选的,UPF可以根据明文的五元组信息确定密文对应的DRB ID,将DRB ID、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。
可选的,UPF首先确定PDU session ID,根据DRB ID与PDU session ID的对应关系,确定DRB ID。确定PDU session ID的方式可参考之前实施例描述,不予赘述。
步骤906:UPF向RAN发送密文。
其中,UPF可以根据其确定的DRB ID以及DRB ID与RAN的地址间的对应关系,获取RAN的地址,根据RAN的地址向RAN发送密文。
可选的,UPF向RAN还发送DRB ID。
可选的,UPF向RAN还发送终端的标识。
步骤907:RAN基于DRB ID对应的DRB,向终端发送密文。
可选的,RAN可以根据其接收到的DRB ID,采用其对应的DRB,向终端发送密文。
可选的,RAN保存有DRB ID与终端的标识的映射;RAN从UPF接收终端的标识和密文,根据终端的标识确定DRB ID,进而采用DRB ID对应的DRB,向终端发送密文。
步骤908:终端接收密文以及识别出DRB ID,利用DRB ID对密文进行解密,以得到明文。
可选的,终端将DRB ID、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
可选的,其中,终端可以根据密文对应的五元组信息确定密文对应的DRB ID。
基于图9所示方法,可以在终端与UPF间未建立连接的情况下,根据DRB ID对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
上述图4~图9以PDU session ID或者QFI或者DRB ID为粒度对数据进行保护,可替换的,本申请实施例还可以以UPF所在网络切片的切片ID或者终端的标识或者UPF的地址或者N3链路标识,或者隧道标识,或者承载标识,或者其他参数为粒度对数据进行保护,不予限制。如:终端可以将UPF所在网络切片的切片ID(或者终端的标识或者UPF的地址)、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和明文进行异或得到密文。UPF接收到密文后,将UPF所在网络切片的切片ID(或者终端的标识或者UPF的地址)、加密密钥(key)以及其他参数(如:计数(count)、方向、长度参数等)输入安全算法中生成密钥流分组,将密钥流分组和密文进行异或得到明文。
上述实施例描述了加密情况下终端与UPF的保护方法。针对完整性保护,同样需要第一参数的参与。并且完整性保护的基本流程与上述实施例类似,如:终端或UPF首先确定明文对应的第一参数,之后基于此第一参数和其他参数(如:key、密钥流长度)和明文执行NIA算法,输出消息验证码。同时,另一方在接收到明文和消息验证码之后,首先确定第一参数,之后再基于第一参数,其他参数(如:key、密钥流长度)以及明文,验证接收到的消息验证码的正确性。需要说明的是,本申请实施例针对完整性保护时安全算法的名称不做限制,完整性保护时的安全算法可以包括NIA,EIA等。上述实施例以NIA为例进行了描述。
除基于PDU session ID或者QFI或者DRB ID或者其他参数对数据进行保护之外,又一种可行方案中,还可以基于IPsec协议对终端与UPF间传输的数据进行保护,具体的,该方案如图10所示。
图10为本申请实施例提供的再一种数据保护方法,该方法可以基于IPsec协议对终端与UPF间传输的数据进行保护,如图10所示,该方法可以包括:
步骤1001:SMF确定由UPF进行数据保护。
其中,SMF确定由UPF进行数据保护的过程可参照现有技术,不再赘述。
步骤1002:SMF根据用户面安全策略确定IPsec的安全模式。
其中,用户面安全策略用于规定是否对数据进行机密性保护和/或完整性保护,用户面安全策略可以预先存储在SMF中,或者从其他网元处获得,用户面安全策略与PDU session 间具有映射关系,一个PDU session对应一个用户面安全策略。
示例性的,SMF根据用户面安全策略确定IPsec的安全模式可以包括:
若用户面安全策略规定对数据进行机密性保护,则IPsec的安全模式为IPSec ESP模式;
若用户面安全策略规定对数据进行完整性保护,则IPsec的安全模式为IPSec AH模式或者IPSec ESP的完整性保护模式;
若用户面安全策略规定对数据进行机密性保护和完整性保护,则IPsec的安全模式为IPSec ESP的机密性保护和完整性保护模式,或者IPsec ESP+AH的模式;
步骤1003:确定UPF和终端之间的IPsec安全联盟(security association,SA)。
可选的,确定UPF和终端之间的IPsec SA包括:
方式一:SMF根据用户面安全策略生成UPF的加密密钥,并将生成的加密密钥发送给UPF;SMF发送会话建立响应给终端,触发终端生成终端的加密密钥,之后SMF触发终端与UPF执行IPsec SA的协商流程,协商流程完成之后,终端与UPF均确定好IPsec SA。
方式二:SMF根据用户面安全策略生成UPF的加密密钥,并将生成的加密密钥发送给UPF;SMF发送会话建立响应给终端,触发终端生成终端的加密密钥;之后终端与SMF执行IPsec SA的协商流程,该协商流程完成之后,SMF将确定的IPsec SA发送至UPF。
方式三:SMF向AMF发送用户面安全策略,AMF根据用户面安全策略生成UPF的加密密钥,并将生成的加密密钥发送给UPF;AMF发送会话建立响应给终端,触发终端生成终端的加密密钥;之后终端与AMF执行IPsec SA的协商流程,该协商流程完成之后,AMF将确定的IPsec SA发送至UPF。
其中,方式一~方式三中,加密密钥还可以称为根密钥或者保护密钥,SMF根据用户面安全策略生成UPF的加密密钥的过程、终端生成终端的加密密钥的过程、IPsec SA的协商流程可参照现有技术,不再赘述。
方式四、SMF根据用户面安全策略、终端的安全能力以及UPF支持的算法列表(或者UPF支持的算法优先级列表),确定IPsec SA内的hash类型的算法以及加密算法,将hash类型的算法、加密算法和IPsec安全模式组成一个完整的IPsec SA;
SMF生成UPF的加密密钥,向UPF发送IPsec SA和加密密钥,向终端发送IPsec SA,以使终端生成终端的加密密钥,之后终端和UPF可以基于加密密钥、IPsec SA执行数据保护。
其中,SMF可以预置UPF支持的算法列表或者从UPF获取UPF支持的算法列表。
方式五、SMF向AMF发送用户面安全策略,AMF根据用户面安全策略、终端的安全能力以及UPF支持的算法列表(或者UPF支持的算法优先级列表),确定IPsec SA内的hash类型的算法以及加密算法,将hash类型的算法、加密算法和IPsec安全模式组成一个完整的IPsec SA;
AMF将IPsec SA通过RAN发送给终端,触发终端生成终端的加密密钥,同时,通过SMF将IPsec SA发送给UPF,AMF可以生成UPF的加密密钥,通过SMF将UPF的加密密钥发送给UPF;或者,SMF生成UPF的加密密钥,将UPF的加密密钥发送给UPF;或者,UPF收到IPsec SA,生成用户面加密密钥。
其中,AMF中可以预置UPF支持的算法列表,还可以从SMF获取UPF支持的算法列 表,也可以从UPF获取UPF支持的算法列表。
方式六:SMF向UPF发送用户面安全策略,UPF根据用户面安全策略、终端的安全能力以及UPF支持的算法列表(或者UPF支持的算法优先级列表),确定IPsec SA内的hash类型的算法以及加密算法,将hash类型的算法、加密算法和IPsec安全模式组成一个完整的IPsec SA,同时,UPF生成用户面加密密钥;
UPF将IPsec SA通过RAN发送给终端,触发终端生成终端的加密密钥。
需要说明的是,在方法四~方法六中,SMF或者AMF或者UPF还可以根据终端的安全能力以及UPF支持的算法列表(或者UPF支持的算法优先级列表),确定IPsec SA内的hash类型的算法以及加密算法,将hash类型的算法、加密算法和IPsec安全模式组成一个完整的IPsec SA。
步骤1004:终端和UPF根据IPsec SA以及各自的保护密钥进行数据保护。
如:终端根据IPsec SA以及终端的保护密钥对待发送的明文进行加密,以得到密文,并将密文发送给UPF,UPF接收到密文后,根据IPsec SA以及UPF的保护密钥对密文进行解密,以得到明文。
其中,在图10所示方法中,终端的保护密钥以及UPF的保护密钥是相同的。
基于图10所示方法,可以基于IPsec协议对终端和UPF之间传输的数据进行机密性保护,实现了终端到UPF的端对端保护,避免由RAN对数据进行机密性保护时,RAN与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低的问题,提高了数据传输的安全性。
可替换的,终端与UPF之间还可以基于传输层安全(transport layer security,TLS)进行数据保护,其中,基于TLS进行终端与UPF间的数据保护的流程与上述采用IPsec进行数据保护的流程类似,可以包括:
SMF确定终端与UPF之间是否需要进行机密性保护和/或完整性保护;
当确定终端与UPF之间需要进行机密性保护和/或完整性保护时,协商确定终端与UPF之间进行数据保护时所用的TLS密码套件(如cipher_suite),触发终端和UPF基于确定的TLS密码套件进行数据保护。
其中,TLS密码套件用于指示终端与UPF间进行数据保护时需要的一些信息,如:采用哪个密钥交换算法,采用哪个加密算法(以及密钥长度),采用哪个完整性保护算法,和采用哪个随机数生成算法的至少一项。具体的,TLS密码套件可以包括:密码交换算法、加密算法(以及密钥长度),完整性保护算法和随机数生成算法。
可选的,SMF根据用户面安全策略确定终端与UPF之间是否需要进行机密性保护和/或完整性保护。可替换的,还可以由终端或者UPF根据用户面安全策略确定终端与UPF之间是否需要进行机密性保护和/或完整性保护。其中,用户面安全策略的相关描述以及根据用户面安全策略确定终端与UPF之间是否需要进行机密性保护和/或完整性保护的方式如图10所示方法中所述,不再赘述。
可选的,终端可以与SMF或者AMF协商确定TLS密码套件,此时,SMF或者AMF可以将协商确定的TLS密码套件发送至UPF,以使终端与UPF之间基于确定的TLS密码套件进行数据保护;或者,终端可以与UPF之间协商确定TLS密码套件,并基于确定的 TLS密码套件进行数据保护。其中,协商确定TLS密码套件的过程可参照现有技术,不再赘述。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,上述终端和用户面网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对终端和用户面网元进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图11示出了的一种通信装置11的组成示意图,该通信装置11可以为终端或者终端中的芯片或者片上系统,该通信装置11可以用于执行上述实施例中涉及的终端的功能。作为一种可实现方式,图11所示通信装置11包括:确定单元110,加密/解密单元111,发送单元112;
确定单元110,用于确定待发送的明文对应的第一参数。例如,确定单元110可以用于支持通信装置11执行步骤402、步骤502、步骤602、步骤701、步骤801、步骤901中确定第一参数的动作。
加密/解密单元111,用于利用第一参数对所述明文进行加密,以得到密文。例如,加密/解密单元111可以用于支持通信装置11执行步骤402、步骤502、步骤602、步骤701、步骤801、步骤901中的加密动作。
发送单元112,用于通过接入网设备向用户面网元发送密文。例如,发送单元112可以用于支持通信装置11执行步骤403、步骤503、步骤603、步骤702、步骤802、步骤902。
进一步的,如图11所示,通信装置11还可以包括:
接收单元113:用于接收接入网设备发送的密文;例如,接收单元113可以用于支持通信装置11执行步骤409、步骤509、步骤609、步骤708、步骤808、步骤908中接收密文的动作。
确定单元110,还可以用于确定接收到的密文对应的第一参数;例如,确定单元110可以用于支持通信装置11执行步骤409、步骤509、步骤609中确定第一参数的动作。
加密/解密单元111,还可以用于利用第一参数对接收的密文进行解密,以得到明文。例如,加密/解密单元111可以用于支持通信装置11执行步骤409、步骤509、步骤609、步骤708、步骤808、步骤908中的解密动作。
其中,上述第一参数与终端和用户面网元间的用户面传输逻辑通道对应,可以为PDU session ID或者QFI或者DRB ID或者RB ID等。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能 模块的功能描述,在此不再赘述。本申请实施例提供的通信装置11,用于执行上述数据保护方法中终端的功能,因此可以达到与上述数据保护方法相同的效果。
作为又一种可实现方式,图11所示通信装置11可以包括:处理模块和通信模块。确定单元110,加密/解密单元111集成在处理模块中,发送单元112和接收单元113集成的通信模块中。处理模块用于对通信装置11的动作进行控制管理,例如,处理模块用于支持该通信装置11执行步骤402、步骤502、步骤602、步骤701、步骤801、步骤901以及执行本文所描述的技术的其它过程。通信模块用于支持通信装置11执行步骤403、步骤503、步骤603、步骤702、步骤802、步骤902以及与其他网络实体的通信,例如通过DRB与图1示出的接入网设备或其他网络实体之间相互通信。进一步的,该通信装置11还可以包括存储模块,用于存储通信装置11的程序代码和数据。
其中,处理模块可以是处理器或控制器。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块可以是收发电路或通信接口等。存储模块可以是存储器。当处理模块为处理器,通信模块为通信接口,存储模块为存储器时,图11所示通信装置11可以为图3所示通信装置。
图12示出了的一种通信装置12的组成示意图,该通信装置12可以为用户面网元或者用户面网元中的芯片或者片上系统。该通信装置12可以用于执行上述实施例中涉及的用户面网元的功能。作为一种可实现方式,图12所示通信装置12包括:接收单元120,确定单元121,解密/加密单元122;
接收单元120,用于从接入网设备接收密文;例如,接收单元120可以用于支持通信装置12执行步骤405、步骤505、步骤605、步骤704、步骤804、步骤904中接收第一密文的动作。
确定单元121,用于确定所述密文对应的第一参数;例如,确定单元121可以用于支持通信装置12执行步骤405、步骤505、步骤605中确定第一参数的动作。
解密/加密单元122,用于利用第一参数对密文进行解密,以得到明文。例如,解密/加密单元122可以用于支持通信装置12执行步骤405、步骤505、步骤605、步骤704、步骤804、步骤904中解密的动作。
进一步的,确定单元121,还可以用于确定待发送给终端的明文对应的第一参数。例如,确定单元121可以用于支持通信装置12执行步骤406、步骤506、步骤606、步骤705、步骤805、步骤805中确定第一参数的动作。
解密/加密单元122,还可以用于根据第一参数对待发送的明文进行加密得到密文。例如,解密/加密单元122可以用于支持通信装置12执行步骤406、步骤506、步骤606、步骤705、步骤805、步骤805中加密的动作。
如图12所示,通信装置12还可以包括:
发送单元123,用于通过接入网设备向终端发送密文。例如,发送单元123可以用于支持通信装置12执行步骤407、步骤507、步骤607、步骤706、步骤806、步骤906。
其中,上述第一参数与终端和用户面网元间的用户面传输逻辑通道对应,可以为PDU session ID或者QFI或者DRB ID或者RB ID等。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。本申请实施例提供的通信装置12,用于执行上述数据保护方法中用户面网元的功能,因此可以达到与上述数据保护方法相同的效果。
作为又一种可实现方式,图12所示通信装置12可以包括:处理模块和通信模块。确定单元121,解密/加密单元122可以集成在通信模块中,接收单元120、发送单元123可以集成在通信模块中。处理模块用于对通信装置12的动作进行控制管理。通信模块用于支持通信装置12执行步骤403、步骤503、步骤406、步骤508以及与其他网络实体的通信,例如与图1示出的远端设备或无线接入网设备或其他网络实体之间相互通信。进一步的,该通信装置12还可以包括存储模块,用于存储通信装置12的程序代码和数据。
其中,处理模块可以是处理器或控制器。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块可以是收发电路或通信接口等。存储模块可以是存储器。当处理模块为处理器,通信模块为通信接口,存储模块为存储器时,图12所示通信装置12可以为图3所示通信装置。
图13示出了的一种数据保护系统13的组成示意图,如图13所示,该数据保护系统中可以包括终端130、接入网设备131、用户面网元132。终端130与接入网设备131之间可以建立有DRB,接入网设备131与用户面网元132之间可以建立有PDU session。
其中,终端130具有上述通信装置11的功能,可以用于确定待发送的明文对应的第一参数,利用第一参数对所述明文进行加密,以得到密文,向接入网设备131发送密文。
接入网设备131,可以用于接收终端130发送的密文,向用户面网元132发送密文。
用户面网元132具有上述通信装置12的功能,可以用于从接入网设备131接收密文,确定所述密文对应的第一参数,利用第一参数对所述密文进行解密,以得到明文;其中,所述第一参数与终端130和用户面网元132间的用户面传输逻辑通道对应。
作为终端130向用户面网元132发送数据的逆过程,当用户面网元132向终端130下发数据时,各网元还具备下述功能:
用户面网元132,还可以用于确定待发送给终端130的明文对应的第一参数,根据第一参数对待发送的明文进行加密得到密文,向接入网设备131发送密文。
接入网设备131,可以用于接收用户面网元132发送的密文,向终端130发送密文。
终端130,还可以用于接收接入网设备131发送的密文,确定接收到的密文对应的第一参数,根据第一参数对接收的密文进行解密,以得到明文。
其中,上述第一参数与终端和用户面网元间的用户面传输逻辑通道对应,可以为PDU session ID或者QFI或者DRB ID或者RB ID等。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到该数据保护系统对应网元的功能描述,在此不再赘述。
基于该数据保护系统,终端130和用户面网元132之间可以根据与终端130和用户面网元132间的用户面传输逻辑通道对应的第一参数进行机密性保护,实现了终端130到用户面网元132的端对端保护,避免由接入网设备131对数据进行机密性保护时,接入网设备131与网络侧交互的用户面数据遭受攻击时,数据泄露,用户面数据传输的安全性降低 的问题,提高了数据传输的安全性。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (18)

  1. 一种数据保护方法,其特征在于,所述方法包括:
    终端确定待发送的明文对应的第一参数;
    所述终端利用第一参数对所述明文进行加密,以得到密文;
    所述终端通过接入网设备向所述用户面网元发送所述密文。
  2. 根据权利要求1所述的方法,其特征在于,所述第一参数为协议数据单元会话标识PDU session ID或者服务质量流标识QFI;所述终端确定待发送的明文对应的第一参数,包括:
    所述终端根据所述待发送的明文的内容信息确定所述第一参数。
  3. 根据权利要求1所述的方法,其特征在于,所述第一参数为数据无线承载标识DRB ID;所述终端确定待发送的明文对应的第一参数,包括:
    所述终端根据所述待发送的明文的内容信息确定所述明文对应的QFI,根据所述明文对应的QFI、QFI以及DRB ID间的对应关系确定所述明文对应的DRB ID。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述方法还包括:
    所述终端向所述接入网设备发送所述第一参数;或者,
    所述终端向所述接入网设备发送指示,所述指示用于指示所述第一参数。
  5. 一种数据保护方法,其特征在于,所述方法包括:
    用户面网元接收接入网设备发送的密文;
    所述用户面网元确定所述密文对应的第一参数;
    所述用户面网元利用所述第一参数对所述密文进行解密,以得到明文。
  6. 根据权利要求5所述的方法,其特征在于,所述第一参数为服务质量流标识QFI;所述用户面网元确定所述密文对应的第一参数,包括:
    所述用户面网元根据所述密文的五元组信息确定所述密文对应的QFI。
  7. 根据权利要求5所述的方法,其特征在于,所述第一参数为协议数据单元会话标识PDU session ID,所述用户面网元确定所述密文对应的第一参数,包括:
    所述用户面网元确定所述密文对应的QFI,根据所述密文对应的QFI、QFI与PDU session ID间的对应关系确定所述密文对应的PDU session ID。
  8. 根据权利要求5所述的方法,其特征在于,所述第一参数为PDU session ID,所述用户面网元接收接入网设备发送的密文,包括:
    所述用户面网元接收所述接入网设备通过N3链路发送的密文;
    所述用户面网元确定所述密文对应的第一参数,包括:
    所述用户面网元根据N3链路标识与PDU session ID的对应关系,将用于标识所述N3链路的N3链路标识所对应的PDU session ID确定所述密文对应的PDU session ID。
  9. 根据权利要求5所述的方法,其特征在于,所述第一参数为数据无线承载标识DRB ID,所述用户面网元确定所述密文对应的第一参数,包括:
    所述用户面网元确定所述密文对应的QFI,根据所述密文对应的的QFI、QFI与DRB ID间的对应关系确定所述密文对应的DRB ID。
  10. 一种通信装置,其特征在于,所述通信装置包括:
    确定单元,用于确定待发送的明文对应的第一参数;
    加密/解密单元,用于利用第一参数对所述明文进行加密,以得到密文;
    发送单元,用于通过接入网设备向所述用户面网元发送所述密文。
  11. 根据权利要求10所述的通信装置,其特征在于,所述第一参数为协议数据单元会话标识PDU session ID或者服务质量流标识QFI,所述确定单元,具体用于:
    根据所述待发送的明文的内容信息确定所述第一参数。
  12. 根据权利要求10所述的通信装置,其特征在于,所述第一参数为数据无线承载标识DRB ID,所述确定单元,具体用于:
    根据所述待发送的明文的内容信息确定所述明文对应的QFI,根据所述明文对应的QFI、QFI以及DRB ID间的对应关系确定所述明文对应的DRB ID。
  13. 根据权利要求10-12任一项所述的通信装置,其特征在于,
    所述发送单元,还用于向所述接入网设备发送所述第一参数;或者,向所述接入网设备发送指示,所述指示用于指示所述第一参数。
  14. 一种通信装置,其特征在于,所述通信装置包括:
    接收单元,用于从接入网设备接收密文;
    确定单元,用于确定所述密文对应的第一参数;
    解密/加密单元,用于利用所述第一参数对所述密文进行解密,以得到明文。
  15. 根据权利要求14所述的通信装置,其特征在于,所述第一参数为服务质量流标识QFI;所述确定单元,具体用于:
    根据所述密文的五元组信息确定所述密文对应的QFI。
  16. 根据权利要求14所述的通信装置,其特征在于,所述第一参数为协议数据单元会话标识PDU session ID,所述确定单元,具体用于:
    确定所述密文对应的QFI,根据所述密文对应的QFI、QFI与PDU session ID间的对应关系确定所述密文对应的PDU session ID。
  17. 根据权利要求14所述的通信装置,其特征在于,所述第一参数为PDU session ID,
    所述接收单元,具体用于接收接入网设备通过N3链路发送的密文;
    所述确定单元,具体用于根据N3链路标识与PDU session ID的对应关系,将用于标识所述N3链路的N3链路标识所对应的PDU session ID确定所述密文对应的PDU session ID。
  18. 根据权利要求14所述的通信装置,其特征在于,所述第一参数为数据无线承载标识DRB ID,所述确定单元,具体用于:
    确定所述密文对应的QFI,根据所述密文对应的的QFI、QFI与DRB ID间的对应关系确定所述密文对应的DRB ID。
PCT/CN2019/101905 2018-09-10 2019-08-22 一种数据保护方法、设备及系统 WO2020052414A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811051065.3 2018-09-10
CN201811051065.3A CN110891269B (zh) 2018-09-10 2018-09-10 一种数据保护方法、设备及系统

Publications (1)

Publication Number Publication Date
WO2020052414A1 true WO2020052414A1 (zh) 2020-03-19

Family

ID=69745047

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/101905 WO2020052414A1 (zh) 2018-09-10 2019-08-22 一种数据保护方法、设备及系统

Country Status (2)

Country Link
CN (1) CN110891269B (zh)
WO (1) WO2020052414A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022237699A1 (zh) * 2021-05-08 2022-11-17 华为技术有限公司 一种激活安全的方法及通信装置
WO2023016395A1 (zh) * 2021-08-10 2023-02-16 华为技术有限公司 一种安全通信的方法及通信装置

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726799B (zh) * 2020-06-19 2023-04-07 中国联合网络通信集团有限公司 一种隐私保护方法及装置
CN111741467B (zh) * 2020-06-19 2023-04-18 中国联合网络通信集团有限公司 一种鉴权方法及装置
CN111787533B (zh) * 2020-06-30 2022-08-26 中国联合网络通信集团有限公司 加密方法、切片管理方法、终端及接入和移动性管理实体
CN114760663A (zh) * 2020-12-28 2022-07-15 中国移动通信有限公司研究院 信息传输方法、装置、相关设备及存储介质
CN113115332B (zh) * 2021-03-23 2022-08-12 中国联合网络通信集团有限公司 一种upf确定方法及装置
WO2023024540A1 (zh) * 2021-08-24 2023-03-02 华为技术有限公司 处理报文、获取sa信息的方法、装置、系统及介质
CN116939588A (zh) * 2022-03-31 2023-10-24 华为技术有限公司 通信方法及装置
CN117376900A (zh) * 2022-06-29 2024-01-09 华为技术有限公司 一种通信方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101001252A (zh) * 2006-06-25 2007-07-18 华为技术有限公司 一种注册方法和一种用户面安全算法的协商方法及装置
CN101075865A (zh) * 2006-05-16 2007-11-21 华为技术有限公司 一种用户面加密的启动方法
CN101237381A (zh) * 2007-02-02 2008-08-06 华为技术有限公司 一种传送start值的方法及系统
CN107566115A (zh) * 2016-07-01 2018-01-09 华为技术有限公司 密钥配置及安全策略确定方法、装置
WO2018127108A1 (en) * 2017-01-05 2018-07-12 Huawei Technologies Co., Ltd. Network architecture having multicast and broadcast multimedia subsystem capabilities

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10142994B2 (en) * 2016-04-18 2018-11-27 Electronics And Telecommunications Research Institute Communication method and apparatus using network slicing
CN113473567A (zh) * 2016-06-23 2021-10-01 北京三星通信技术研究有限公司 支持数据传输的方法和设备
US20190349810A1 (en) * 2017-01-06 2019-11-14 Lg Electronics Inc. Method for transmitting lossless data packet based on quality of service (qos) framework in wireless communication system and a device therefor
CN107018542A (zh) * 2017-03-27 2017-08-04 中兴通讯股份有限公司 网络系统中状态信息的处理方法、装置及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075865A (zh) * 2006-05-16 2007-11-21 华为技术有限公司 一种用户面加密的启动方法
CN101001252A (zh) * 2006-06-25 2007-07-18 华为技术有限公司 一种注册方法和一种用户面安全算法的协商方法及装置
CN101237381A (zh) * 2007-02-02 2008-08-06 华为技术有限公司 一种传送start值的方法及系统
CN107566115A (zh) * 2016-07-01 2018-01-09 华为技术有限公司 密钥配置及安全策略确定方法、装置
WO2018127108A1 (en) * 2017-01-05 2018-07-12 Huawei Technologies Co., Ltd. Network architecture having multicast and broadcast multimedia subsystem capabilities

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
3GPP: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on encrypted traffic detection and verification(Release 16", 3GPP TR 23. 787, 30 June 2018 (2018-06-30), pages 6. 1. 1. 1 - 6. 1. 2 . *
NOKIA: "TR 23.724 ConnectionLess data solution", 3GPP TSG SA WG2 #127 S2-183990, 20 April 2018 (2018-04-20), XP051432439 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022237699A1 (zh) * 2021-05-08 2022-11-17 华为技术有限公司 一种激活安全的方法及通信装置
WO2023016395A1 (zh) * 2021-08-10 2023-02-16 华为技术有限公司 一种安全通信的方法及通信装置

Also Published As

Publication number Publication date
CN110891269A (zh) 2020-03-17
CN110891269B (zh) 2022-04-05

Similar Documents

Publication Publication Date Title
WO2020052414A1 (zh) 一种数据保护方法、设备及系统
US11695742B2 (en) Security implementation method, device, and system
US11647391B2 (en) Security protection method, device, and system
US20200228977A1 (en) Parameter Protection Method And Device, And System
JP5480890B2 (ja) 制御信号の暗号化方法
US20150382189A1 (en) Key exchange method and apparatus
CN110830993B (zh) 一种数据处理的方法、装置和计算机可读存储介质
WO2018201946A1 (zh) 锚密钥生成方法、设备以及系统
WO2020248624A1 (zh) 一种通信方法、网络设备、用户设备和接入网设备
CN102625995A (zh) 无线网络中的伽罗瓦/计数器模式加密
WO2017133021A1 (zh) 一种安全处理方法及相关设备
WO2020221218A1 (zh) 信息获取方法及装置
US20230013500A1 (en) Radio bearer configuration method, apparatus, and system
US11863977B2 (en) Key generation method, device, and system
EP4262257A1 (en) Secure communication method and device
WO2022134089A1 (zh) 一种安全上下文生成方法、装置及计算机可读存储介质
US20210168614A1 (en) Data Transmission Method and Device
WO2022027476A1 (zh) 密钥管理方法及通信装置
WO2011066779A1 (zh) 业务流加密处理方法及系统
WO2021208644A1 (zh) 一种节点间保密通信方法及网络节点
WO2020147602A1 (zh) 一种认证方法、装置和系统
WO2024041498A1 (zh) 一种保密通信处理方法、第一终端及存储介质
WO2023131044A1 (zh) 认证与安全方法、装置及存储介质
CN117857065A (zh) 保密通信处理方法、第一终端、第二终端及存储介质
CN116321158A (zh) 基于证书的本地ue认证

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19860040

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19860040

Country of ref document: EP

Kind code of ref document: A1