WO2021164291A1 - Communication method and apparatus - Google Patents

Communication method and apparatus Download PDF

Info

Publication number
WO2021164291A1
WO2021164291A1 PCT/CN2020/122866 CN2020122866W WO2021164291A1 WO 2021164291 A1 WO2021164291 A1 WO 2021164291A1 CN 2020122866 W CN2020122866 W CN 2020122866W WO 2021164291 A1 WO2021164291 A1 WO 2021164291A1
Authority
WO
WIPO (PCT)
Prior art keywords
auts
terminal device
indication information
algorithm
network element
Prior art date
Application number
PCT/CN2020/122866
Other languages
French (fr)
Chinese (zh)
Inventor
赵绪文
张博
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021164291A1 publication Critical patent/WO2021164291A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This application relates to the field of wireless communication technology, and in particular to a communication method and device.
  • the terminal device After receiving the authentication request message from the access and mobility management function (AMF), the terminal device will verify the sequence number (SQN) carried in the authentication request message If the verified SQN is not within the correct value range, the terminal device will further calculate the resynchronization authentication token (authentication token for synchronisation, AUTS), and send AUTS to unified data management (UDM). After the UDM receives the AUTS, it will verify the AUTS, and execute the resynchronization process after the verification is passed.
  • SQN sequence number
  • AUTS authentication token for synchronisation
  • UDM unified data management
  • the embodiments of the present application provide a communication method and device for identifying the AUTS algorithm adopted by the terminal equipment, so that the correct AUTS algorithm is used to verify the AUTS, and the authentication efficiency of the terminal equipment is improved.
  • an embodiment of the present application provides a communication method that can be executed by a unified data management network element UDM.
  • the method includes: the unified data management network element receives an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the unified data management network element obtains the instruction information corresponding to the terminal device, and the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data management network element uses the first AUTS algorithm to calibrate the AUTS Test.
  • the unified data management network element can identify the AUTS algorithm used by the terminal device to calculate AUTS according to the instruction information corresponding to the terminal device, and then use the AUTS algorithm consistent with the terminal device to calibrate the AUTS calculated by the terminal device. In this way, the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm adopted by the unified data management network element and the terminal device can be effectively avoided, so that the resynchronization process and the subsequent authentication process of the terminal device can be performed normally.
  • the unified data management network element may obtain the indication information corresponding to the terminal device for the unified data management network element to obtain the indication information from the local configuration, or obtain the indication information from the unified data storage network element.
  • the indication information corresponding to the terminal device may be pre-configured locally in the unified data management network element, or may be configured in the unified data storage network element. In this way, the applicability of the technical solutions in the embodiments of the present application can be enhanced.
  • the indication information of the terminal device may be included in the contract data of the terminal device, and the contract data of the terminal device may be stored in the unified data management network element or stored in the unified data storage network. Yuanzhong.
  • the unified data management network element determines the first AUTS algorithm according to the indication information corresponding to the terminal device, which may include: the unified data management network element determines the first AUTS algorithm according to the identification of the terminal device in the authentication service request and the terminal The indication information corresponding to the device determines the first AUTS algorithm.
  • the embodiments of the present application provide a communication method that can be executed by a unified data storage network element UDR.
  • the method includes: the unified data storage network element receives a service invocation request from the unified data management network element, and the service invocation request is used for To request the instruction information corresponding to the terminal device, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data storage network element sends a service response message to the unified data management network element, and the service response message Include instruction information corresponding to the terminal device.
  • the indication information corresponding to the terminal device may be pre-configured in the unified data storage network element.
  • the unified data management network element may be based on the unified data management network element.
  • the service call request sent by the element sends the instruction information corresponding to the terminal device to the unified data management network element, so that the unified data management can verify the AUTS according to the AUTS algorithm indicated by the instruction information, so that the resynchronization process can proceed normally .
  • the embodiments of the present application provide another communication method, which can be executed by the unified data management network element UDM, and the method includes: the unified data management network element receives an authentication service request, and the authentication service request includes encryption resynchronization authentication Token AUTS*; the unified data management network element decrypts AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device.
  • the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm:
  • the unified data management network element verifies the AUTS according to the first AUTS algorithm.
  • the unified data management network element can decrypt the instruction information corresponding to the terminal device and the AUTS generated with the terminal device according to the received encrypted resynchronization authentication token AUTS*. In this way, the unified data management network element can determine the AUTS algorithm used by the terminal device according to the instruction information corresponding to the terminal device, and then use the AUTS algorithm consistent with the terminal device to verify the AUTS sent by the terminal device, thereby avoiding the unified data management network.
  • the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the meta and the terminal device enables the resynchronization process and the subsequent authentication process of the terminal device to proceed normally, and at the same time, the security of the authentication process can be improved.
  • the unified data management network element determines the first AUTS algorithm according to the indication information corresponding to the terminal device, which may include: the unified data management network element determines the first AUTS algorithm according to the identification of the terminal device in the authentication service request and The indication information corresponding to the terminal device determines the first AUTS algorithm.
  • the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device calculates a resynchronization authentication token AUTS, and encrypts the AUTS and the corresponding indication information of the terminal device, To obtain the encrypted resynchronization authentication token AUTS*, the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the terminal device sends the AUTS* to the access management network element.
  • the terminal device may encrypt and protect the corresponding indication information together with the generated AUTS, and send it to the unified data management network element.
  • the unified data management network element can determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to verify the AUTS sent by the terminal device, thereby avoiding the unified data management network.
  • the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the meta and the terminal device enables the resynchronization process and the subsequent authentication process of the terminal device to proceed normally, and at the same time, the security of the authentication process can be improved.
  • the method further includes: the terminal device generates the indication information corresponding to the terminal device according to the first AUTS algorithm used to calculate the AUTS.
  • the embodiments of the present application provide another communication method, which can be executed by the unified data management network element UDM, and the method includes: the unified data management network element receives an authentication service request, and the authentication service request includes a resynchronization authentication order Brand AUTS, the unified data management network element obtains the instruction information corresponding to the terminal device from the AUTS.
  • the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data management network element is based on the first The AUTS algorithm checks AUTS.
  • the indication information corresponding to the terminal device can also be directly carried in the AUTS, and integrity protection is performed.
  • the unified data management network element can directly obtain the instruction information corresponding to the terminal device from the received AUTS, determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to control the terminal.
  • the AUTS sent by the device is checked, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the unified data management network element and the terminal device, so that the resynchronization process and the subsequent terminal device authentication process can proceed normally, and at the same time improve the authentication Security of the process.
  • the unified data management network element checks AUTS according to the first AUTS algorithm, which may include: the unified data management network element obtains the mobile terminal sequence from the AUTS according to the first AUTS algorithm Number SQN MS , and calculate the MAC based on the SQN MS ; if the calculated MAC is consistent with the MAC-S obtained from AUTS, the unified data management network element can determine that the AUTS verification is successful.
  • the first AUTS algorithm may include: the unified data management network element obtains the mobile terminal sequence from the AUTS according to the first AUTS algorithm Number SQN MS , and calculate the MAC based on the SQN MS ; if the calculated MAC is consistent with the MAC-S obtained from AUTS, the unified data management network element can determine that the AUTS verification is successful.
  • the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device calculates the resynchronization authentication token AUTS according to the instruction information corresponding to the terminal device, and the instruction information is used to indicate The terminal equipment calculates the first AUTS algorithm used by the AUTS; the terminal equipment sends the AUTS to the access management network element.
  • the terminal device may carry the corresponding indication information when calculating the AUTS, and then send the integrity protection of the AUTS to the unified data management network element.
  • the unified data management network element can obtain the instruction information corresponding to the terminal device from the received AUTS, and then determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to check
  • the AUTS sent by the terminal equipment is verified, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the unified data management network element and the terminal equipment, so that the resynchronization process and the subsequent terminal equipment authentication process can be carried out normally, and at the same time improve Security of the certification process.
  • the AUTS includes indication information corresponding to the terminal device and/or MAC-S calculated according to the indication information.
  • the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device receives a resynchronization authentication token AUTS from a global subscriber identity module USIM card and configuration information of the USIM card; The terminal device determines the indication information according to the configuration information of the USIM card, the indication information is used to indicate the first AUTS algorithm used by the USIM card to calculate AUTS; the terminal device encrypts the AUTS and the indication information to obtain the encrypted resynchronization authentication token AUTS *; The terminal device sends the AUTS* to the access management network element.
  • the terminal device can determine the AUTS algorithm used by the USIM card according to the configuration information of the USIM card, and then encrypt the indication information used to indicate the AUTS algorithm used by the USIM card and the AUTS calculated by the USIM card. Send it to the unified data management network element.
  • the resynchronization process can be performed normally, and at the same time, the problem of inability to generate instruction information or encryption processing that may be caused by the limitation or incompatibility of the USIM card is avoided, thereby enhancing the Applicability of the method.
  • the configuration information includes one or more of the following information: the AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and Version information of the USIM card.
  • the embodiments of the present application provide another communication method, which can be executed by a USIM card, and the USIM card can be installed in a terminal device.
  • the method includes: the global user identity module USIM card calculates the resynchronization authentication token AUTS, The USIM card sends the calculated AUTS and the configuration information of the USIM card to the terminal device.
  • the terminal device since the USIM card can send the calculated AUTS and the configuration information of the USIM card to the terminal device, the terminal device itself generates the instruction information for indicating the AUTS algorithm according to the configuration information of the USIM card, and sends the instruction
  • the information is encrypted with the AUTS calculated by the USIM card and then sent to the unified data management network element. In this way, the resynchronization process can be carried out normally, and at the same time, it can avoid the failure to generate due to the limitation or incompatibility of the USIM card. Indicates the problem of information or encryption processing, thereby enhancing the applicability of the method.
  • the configuration information includes one or more of the following information: the AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and Version information of the USIM card.
  • an embodiment of the present application provides a communication device, which has the function of realizing the unified data management network element in the first aspect or any one of the possible designs of the first aspect, or may also have the function of realizing the third
  • the function of the unified data management network element in any possible design of the aspect or the third aspect or may also have the function of implementing the unified data management network element in any possible design of the fifth aspect or the fifth aspect, Or, it may also have the function of realizing the unified data storage network element in any possible design of the second aspect or the second aspect described above.
  • the device may be a network device, or a device included in the network device, such as a chip.
  • the device may also have the function of realizing the terminal device in any possible design of the foregoing fourth aspect or the fourth aspect, or have the function of realizing the terminal device in any possible design of the foregoing sixth aspect or the sixth aspect , Or have the function of a terminal device in any possible design of the seventh aspect or the seventh aspect described above.
  • the device can be a terminal device, such as a handheld terminal device, a vehicle-mounted terminal device, a vehicle user device, a roadside unit, etc., a device included in a terminal device, such as a chip, or a device containing terminal devices, such as a vehicle, etc. .
  • the device may also have the function of realizing the USIM card in the eighth aspect or any one of the possible designs of the eighth aspect.
  • the USIM card may be a device included in a terminal device, such as a chip.
  • the functions of the above-mentioned communication device may be realized by hardware, or may be realized by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the structure of the device includes a processing module and a transceiver module, wherein the processing module is configured to support the device to execute the first aspect or the unified data management network element in any one of the first aspects of the design.
  • Corresponding function or perform the corresponding function of the unified data storage network element in the design of the second aspect or the second aspect, or perform the unified data management network element in the design of the third aspect or the third aspect
  • Corresponding function or perform the corresponding function of the terminal device in the design of the fourth aspect or the fourth aspect, or perform the corresponding function of the unified data management network element in the design of the fifth aspect or the fifth aspect
  • the transceiver module is used to support communication between the device and other communication devices. For example, when the device is a unified data management network element, it obtains the indication information corresponding to the terminal device from the unified data storage network element.
  • the communication device may also include a storage module, which is coupled with the processing module, which stores program instructions and data necessary for the device.
  • the processing module may be a processor
  • the communication module may be a transceiver
  • the storage module may be a memory.
  • the memory may be integrated with the processor or may be provided separately from the processor, which is not limited in this application.
  • the structure of the device includes a processor and may also include a memory.
  • the processor is coupled with the memory, and can be used to execute the computer program instructions stored in the memory, so that the device executes the above-mentioned first aspect or any one of the possible design methods of the first aspect, or executes the above-mentioned second aspect or the second aspect.
  • the device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication interface may be a transceiver or an input/output interface; when the device is a chip included in the network device or terminal device, the communication interface may be an input/output interface of the chip.
  • the transceiver may be a transceiver circuit, and the input/output interface may be an input/output circuit.
  • an embodiment of the present application provides a chip system, including: a processor, the processor is coupled with a memory, the memory is used to store a program or an instruction, when the program or an instruction is executed by the processor , Enabling the chip system to implement the method in any possible design of the first aspect or the first aspect, or implement the method in any possible design of the second aspect or the second aspect, or implement the method in the foregoing first aspect
  • the method in any possible design of the third aspect or the third aspect, or the method in any possible design of the foregoing fourth aspect or the fourth aspect, or the realization of any of the foregoing fifth aspect or the fifth aspect A method in a possible design, or a method in a possible design that implements the sixth aspect or the sixth aspect, or a method in a possible design that implements the seventh aspect or the seventh aspect , Or implement the eighth aspect or any one of the possible design methods of the eighth aspect.
  • the chip system further includes an interface circuit, which is used to exchange code instructions to the processor.
  • processors in the chip system, and the processors may be implemented by hardware or software.
  • the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
  • the memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application.
  • the memory may be a non-transitory processor, such as a read-only memory ROM, which may be integrated with the processor on the same chip, or may be set on different chips.
  • the setting method of the processor is not specifically limited.
  • an embodiment of the present application provides a computer-readable storage medium on which a computer program or instruction is stored.
  • the computer executes any of the above-mentioned first aspect or the first aspect.
  • a method in a possible design, or a method in any possible design of the second aspect or the second aspect, or a method in any possible design of the third aspect or the third aspect Or implement the method in any possible design of the foregoing fourth aspect or the fourth aspect, or implement the method in any possible design of the foregoing fifth aspect or the fifth aspect, or implement the foregoing sixth aspect or
  • the method in any possible design of the sixth aspect, or the method in any possible design of the seventh aspect or the seventh aspect above, or the method in any one of the eighth aspect or the eighth aspect described above The method in the design.
  • the embodiments of the present application provide a computer program product.
  • the computer reads and executes the computer program product, the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the first aspect or any one of the possible design methods in the first aspect.
  • the computer executes the
  • an embodiment of the present application provides a communication system, which includes a unified data management network element and terminal equipment.
  • a USIM card is provided in the terminal device.
  • the communication system may also include one or more of an access network device, an access management network element, an authentication service function network element, and a unified data storage network element.
  • FIG. 1 is a schematic diagram of a network architecture of a communication system to which an embodiment of this application is applicable;
  • FIG. 2 is a schematic flowchart of a communication method provided by an embodiment of this application.
  • FIG. 3 is a schematic diagram of verifying AUTN provided by an embodiment of the application.
  • 4a and 4b are schematic diagrams of the AUTS algorithm provided by an embodiment of this application.
  • FIG. 5 is a specific example of the communication method provided by the embodiment of this application.
  • FIG. 6 is a schematic flowchart of another communication method provided by an embodiment of this application.
  • FIG. 7 is a schematic flowchart of another communication method provided by an embodiment of this application.
  • FIG. 9 is a schematic flowchart of another communication method provided by an embodiment of this application.
  • FIG. 10 is another specific example of the communication method provided by the embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 12 is another schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 13 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 14 is a schematic diagram of another structure of another communication device provided by an embodiment of this application.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • WCDMA broadband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • LTE frequency division duplex FDD
  • TDD LTE Time division duplex
  • UMTS universal mobile telecommunication system
  • WIMAX worldwide interoperability for microwave access
  • 5G fifth generation
  • NR new radio
  • FIG. 1 is a schematic diagram of a network architecture of a communication system to which an embodiment of this application is applicable.
  • the network architecture includes terminal equipment, access network equipment, access management network elements, session management network elements, user plane network elements, Policy control network element, network slicing selection network element, network warehouse function network element, network data analysis network element, unified data management network element, unified data storage network element, authentication service function network element, network capability opening network element, application function network Yuan, and the data network (DN) connected to the operator’s network.
  • the terminal device can send service data to and receive service data from the data network through the access network device and the user plane network element.
  • the terminal device is a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; it can also be deployed on the water (such as ships, etc.); it can also be deployed in the air (such as Airplanes, balloons, satellites, etc.
  • the terminal device can communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN.
  • the terminal device can be a mobile phone (mobile phone).
  • Access network equipment is a device used to connect terminal equipment to the wireless network in the network.
  • the access network device may be a node in a radio access network, may also be called a base station, or may be called a radio access network (RAN) node (or device).
  • RAN radio access network
  • the network equipment may include the evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the long term evolution (LTE) system or the evolved LTE system (LTE-Advanced, LTE-A), such as the traditional
  • the macro base station eNB and the micro base station eNB in the heterogeneous network scenario may also include the next generation node B (next generation node B) in the new radio (NR) system of the fifth generation mobile communication technology (5th generation, 5G) , GNB), or may also include radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS) , Transmission reception point (TRP), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), baseband pool BBU pool, or WiFi access point ( access point, AP), etc., or may also include the centralized unit (CU) and distributed unit (DU
  • CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (packet data convergence protocol, PDCP), and service data adaptation protocol (service data adaptation). Protocol, SDAP) and other protocols; DU mainly supports radio link control (RLC), media access control (MAC) and physical layer protocols.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • service data adaptation protocol service data adaptation protocol
  • SDAP radio link control
  • MAC media access control
  • the access management network element is mainly used for terminal attachment, mobility management, and tracking area update procedures in the mobile network.
  • the access management network element terminates non-access stratum (NAS) messages, completes registration management, Connection management and reachability management, allocation of tracking area list (track area list, TA list), mobility management, etc., and transparent routing of session management (session management, SM) messages to the session management network element.
  • NAS non-access stratum
  • the access management network element can be the access and mobility management function (AMF).
  • AMF access and mobility management function
  • future communication systems such as 6G communication systems
  • the mobility management network element may still be an AMF network element, or may also have other names, which is not limited in this application.
  • the session management network element is mainly used for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning Internet Protocol (IP) addresses to terminals and selecting user plane network elements that provide message forwarding functions.
  • IP Internet Protocol
  • the session management network element can be a session management function (session management function, SMF).
  • SMF session management function
  • the session management network element can still be an SMF network element, or it can be With other names, this application is not limited.
  • User plane network elements are mainly used to process user messages, such as forwarding, charging, and lawful monitoring.
  • the user plane network element may also be referred to as a protocol data unit (PDU) session anchor (PDU) session anchor (PSA).
  • PDU protocol data unit
  • PDU session anchor
  • PSA protocol data unit
  • the user plane network element can be a user plane function (UPF).
  • UPF user plane function
  • the user plane network element can still be a UPF network element, or it can be With other names, this application is not limited.
  • Policy control network elements include user subscription data management functions, policy control functions, charging policy control functions, quality of service (QoS) control, etc.
  • the policy control network element can be a policy control function (PCF).
  • PCF policy control function
  • the policy control network element can still be a PCF network element, or it can be With other names, this application is not limited.
  • the authentication service function network element is mainly used for security authentication of terminal equipment.
  • the authentication service function network element may be an authentication server function (authentication server function, AUSF).
  • the authentication service function network element may still be an AUSF network element, or It can also have other names, and this application is not limited.
  • the unified data storage network element is mainly used to store structured data information, including contract information, policy information, and network data or business data defined in a standard format.
  • the unified data storage network element can be a unified data repository (UDR).
  • UDR unified data repository
  • future communication systems such as 6G communication systems
  • the unified data storage network element can still be a UDR network element, or It can also have other names, and this application is not limited.
  • the network slice selection function network element is mainly used to select a suitable network slice for the service of the terminal device.
  • the network slice selection network element can be a network slice selection function (NSSF) network element.
  • the network slice selection network element can still be NSSF
  • the network element may also have other names, which is not limited in this application.
  • the network element of the network warehouse function is mainly used to provide the registration and discovery functions of the network element or the service provided by the network element.
  • the network warehouse function network element can be a network repository function (NRF).
  • NRF network repository function
  • the network warehouse function network element can still be an NRF network element, or It can also have other names, and this application is not limited.
  • the network capability opening network element can expose part of the network functions to the application in a controlled manner.
  • the network capability opening network element may be a network exposure function (NEF).
  • NEF network exposure function
  • the network capability opening network element may still be a NEF network element. Or it may have other names, which is not limited in this application.
  • the application function network element can provide service data of various applications to the control plane network element of the communication network of the operator, or obtain network data information and control information from the control plane network element of the communication network.
  • the application function network element may be an application function (AF).
  • AF application function
  • the application function network element may still be an AF network element, or may also have other functions. The name is not limited in this application.
  • Data network is mainly used to provide data transmission services for terminal equipment.
  • the data network can be a private network, such as a local area network, or a public data network (PDN) network, such as the Internet (Internet), or a private network jointly deployed by operators, such as a configured IP multimedia network.
  • PDN public data network
  • IMS IP multimedia core network subsystem
  • network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the unified data management network element is the UDM network element
  • the authentication service function network element is the AUSF network element
  • the access management network element is the AMF network element.
  • UDM the UDM network element
  • AUSF the AUSF
  • AMF the AMF network element
  • ordinal numbers such as “first” and “second” mentioned in the embodiments of this application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
  • the descriptions of “first” and “second” do not limit the objects to be different.
  • FIG. 2 is a schematic flowchart of a communication method provided by an embodiment of this application. The method specifically includes the following steps:
  • Step S201 UDM receives an authentication service request
  • the authentication service request includes a resynchronization authentication token AUTS, and the AUTS is used to instruct the terminal device to determine that the serial number SQN in the authentication token (authentication token, AUTN) is not within the correct range.
  • UDM may also receive authentication service requests from other network functions NF, which is not limited in this application.
  • the embodiments of the present application can be applied to the authentication process of the terminal device.
  • the terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range may mean that the terminal device determines that the authentication token AUTN is in the correct range.
  • the serial number of is less than or equal to the serial number SQN MS stored in the terminal device.
  • the terminal device may receive an authentication request message from AMF.
  • the authentication request message includes a random number RAND and an authentication token AUTN.
  • the authentication token AUTN specifically includes a serial number SQN and an anonymous key. (anonymity key, AK), authentication management domain (authentication and key agreement, AMF), message authentication code (message authentication code, MAC) and other parameters.
  • the terminal device can verify the authentication token AUTN included in the authentication request message. If the terminal device verifies that the serial number SQN in the authentication token AUTN is not within the correct range, the terminal device can generate a resynchronization authentication token AUTS, It also sends an authentication failure message to the AMF.
  • the authentication failure message carries the calculated resynchronization authentication token AUTS, which is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range. Subsequently, after the AMF receives the authentication failure message from the terminal device, it can send an authentication service request to the UDM or AUSF.
  • the authentication service request includes the resynchronization authentication token AUTS calculated by the terminal device.
  • the USIM card can further verify the serial number SQN in the authentication token AUTN.
  • the USIM card can compare the serial number SQN in the authentication token AUTN with the serial number SQN MS stored in the USIM card.
  • the USIM card can calculate AUTS, and then the terminal device can send an authentication failure message to the AMF, and the authentication failure message indicates that the specific failure reason is synchronization failure (synch failure), the authentication failure message also includes the resynchronization authentication token AUTS calculated by the USIM card after the SQN verification fails, and the AUTS is used to instruct the USIM card to determine that the serial number SQN in the AUTN is not within the correct range.
  • the authentication failure message may also include a random number RAND.
  • the terminal device can use multiple possible AUTS algorithms to calculate AUTS.
  • FIG. 4a is a schematic diagram of an AUTS algorithm provided in this embodiment of the application.
  • AUTS satisfies the following relationship:
  • AUTS is equal to the exclusive OR of SQN MS and AK, and then the MAC-S is spliced.
  • SQN MS is the serial number of the terminal device, or it can also be understood as the highest serial number accepted by the USIM card.
  • Or xor means exclusive OR
  • AK is an anonymous key
  • AK f5*(RAND, K)
  • f5*() means a function
  • RAND and K are the parameters of the function
  • RAND is a random number
  • K is the root key
  • means splicing
  • MAC-S is the message authentication code calculated by the USIM card, used to realize the encryption and integrity protection of SQN MS
  • MAC-S f1*(SQN MS , K, RAND, AMF)
  • f1* () is another function
  • AMF is the authentication management domain.
  • Fig. 4b is a schematic diagram of another AUTS algorithm provided by an embodiment of this application.
  • AUTS also satisfies the relationship in Formula 1:
  • Step S202 The UDM obtains indication information corresponding to the terminal device, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS.
  • the indication information may be combined with the identification of the terminal device or the identification of the USIM card or the user identification (such as subscription permanent identifier (SUPI), international mobile subscriber identification number, IMSI). ), a generic public subscription identifier (GPSI, etc.) is associated, and is used to directly or indirectly instruct the terminal device (or USIM card) to calculate the first AUTS algorithm used by the resynchronization authentication token AUTS.
  • the indication information may be the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information may include the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS.
  • the indication information can also be used to indicate the terminal equipment (or USIM card) Whether to support the new AUTS algorithm, or the indication information may also be used to indicate whether the USIM card is a new card, or the indication information may also be information such as the type or batch or release of the USIM card.
  • the first AUTS algorithm may be one of the two AUTS algorithms described above, or may be another AUTS algorithm, which is not limited in this application.
  • the indication information corresponding to the terminal device may be included in the subscription data of the terminal device, and the subscription data may also be referred to as user subscription data. That is to say, the user subscription data of the terminal device is stored in the UDM, and the operator can set the above-mentioned indication information in the user subscription data of the terminal device in advance, thereby directly or indirectly instructing the terminal device (or USIM card) to calculate the AUTS used The first AUTS algorithm.
  • a user-granular subscription feature list can also be maintained in UDM, which is used to indicate which features the terminal device (or USIM card) supports or does not support, for example, whether to support the new AUTS algorithm, or the type and batch of the USIM card Or version information, etc.
  • the UDM may also determine the first AUTS algorithm used by the terminal device (or USIM card) when calculating AUTS according to the features supported by the terminal device listed in the subscription feature list corresponding to the terminal device. That is, the subscription feature list corresponding to the terminal device can also be understood as a specific implementation manner of the foregoing indication information.
  • the indication information corresponding to the terminal device may also be configured in the UDR. After the UDM receives the authentication service request, the indication information corresponding to the terminal device may be obtained from the UDR.
  • the user subscription data of the terminal device may be stored in the UDR, and the operator may set the above-mentioned indication information in the user subscription data of the terminal device in advance.
  • the UDM receives the authentication service request, it can send a service invocation request to the UDR according to the terminal device's identity or the USIM card's identity or the user's identity.
  • the service invocation request is used to request user subscription data of the terminal device.
  • the service invocation request may include the identification of the terminal device or the identification of the USIM card or the user identification.
  • the service invocation request may also be called a service request or a service request message or a service invocation request message, etc., which is not limited in this application .
  • UDR may receive the service invocation request and send a service response to UDM, where the service response is in response to the service invocation request sent by UDM, and the service response includes indication information corresponding to the terminal device, and the indication information may be included in the
  • the user subscription data of the terminal device in the service response may also be included in other information elements or newly added information elements of the service response message, which is not limited by this application.
  • the service response may also include a list of subscription characteristics corresponding to the terminal device.
  • the indication information corresponding to the terminal device may also be independently configured in the UDR and not included in the user subscription data of the terminal device.
  • the service invocation request sent by the UDM to the UDR can be used to request the indication information corresponding to the terminal device.
  • the service response returned by the UDR to the UDM may include the indication information corresponding to the terminal device, excluding the user subscription data of the terminal device.
  • the service response may also include a list of subscription characteristics corresponding to the terminal device.
  • Step S203 The UDM checks the AUTS according to the first AUTS algorithm.
  • the UDM may determine the first AUTS algorithm according to the identification of the terminal device included in the authentication service request and the indication information corresponding to the terminal device obtained in step S202.
  • the UDM using the first AUTS algorithm to verify the AUTS may include: using the first AUTS algorithm to obtain the mobile terminal serial number SQN MS from the AUTS, and then calculate the MAC, if the calculated MAC and the MAC-S included in the AUTS Consistent, it means that the AUTS verification is successful.
  • UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
  • UDM can identify the AUTS algorithm used by the terminal device (or USIM card) when calculating AUTS, and use the AUTS consistent with the terminal device (or USIM card)
  • the algorithm is used to verify the AUTS calculated by the terminal device, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm adopted by the UDM and the terminal device, so that the resynchronization process and the subsequent terminal device authentication process can be performed normally.
  • Step S5001 configure indication information in the user subscription data of the terminal device stored in the UDM, the indication The information is used to instruct the terminal equipment (or USIM card) to calculate the first AUTS algorithm used by AUTS.
  • the indication information may be the identification of the first AUTS algorithm used by the terminal equipment (USIM card), or the indication information may include the terminal The device (or USIM card) calculates the identity of the first AUTS algorithm used by the AUTS, or there is a certain mapping relationship between the indication information and the identity of the first AUTS algorithm used by the terminal device (or USIM card) to calculate the AUTS, Or the indication information may also be information indicating whether the terminal device (or USIM card) supports the new AUTS algorithm, or the indication information may also be information indicating whether the USIM card is a new card, or the indication information may also It can be information such as the type or batch or version of the USIM card, or the indication information can also be a list of subscription features of the terminal device (or the USIM card). It should be understood that this step S5001 corresponds to a specific implementation in the first embodiment, that is, the indication information corresponding to the terminal device is configured in the UDM.
  • the indication information is configured in the user subscription data of the terminal device stored in the UDR, or the indication information is configured in other information in the UDR, or the indication information is configured independently in the UDR.
  • the indication information is used to indicate the first AUTS algorithm adopted by the terminal device (or USIM card). For the specific implementation manner of the indication information, reference may be made to the description in step S5001.
  • step S501 the UDM obtains user subscription data of the terminal device from the UDR, and the user subscription data includes the above-mentioned indication information corresponding to the terminal device.
  • This step S501 may specifically include the steps of UDM sending a service invocation request to UDR, and UDR in response to the service invocation request, sending a service response message to UDM, etc., which will not be described in detail here.
  • the "acquisition” can also be understood as actions such as querying, invoking, and receiving.
  • step S5002 and step S501 correspond to another specific implementation manner in the first embodiment, that is, the instruction information of the terminal device is configured in the UDR. It can be seen that the methods shown in step S5001, step S5002 and step S501 are two parallel specific implementations. In practical applications, one of the two paths can be executed.
  • step S502 an authentication procedure (authentication procedure) between the terminal device and the UDM is executed.
  • Step S503 The terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not within the correct range, the terminal device calculates the resynchronization authentication token AUTS and initiates the resynchronization process. Optionally, the terminal device may also verify the message authentication code MAC in the authentication token AUTN, and the verification of the message authentication code MAC may be performed before the verification of the serial number SQN. Optionally, the actions of verifying the message authentication code MAC and the serial number SQN and calculating the resynchronization authentication token AUTS can also be performed by the USIM card in the terminal device.
  • Step S504 The terminal device sends an authentication failure message to the AMF.
  • the authentication failure message includes the resynchronization authentication token AUTS and the random number RAND.
  • the AMF sends an authentication service request to AUSF.
  • the authentication service request includes the resynchronization authentication token AUTS and the random number RAND.
  • the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
  • SUPI the authentication service request described in this step is a service invocation message between network elements, which may also be called a service request message or a service invocation request message, etc., or may also have other names, such as Nauf_UEAuthentication_Authenticate request. This application Not limited.
  • Step S506 AUSF sends an authentication service request to UDM, and the authentication service request includes the resynchronization authentication token AUTS and the random number RAND.
  • the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
  • SUPI the authentication service request described in this step is also a service invocation message between network elements. It may also be called a service request message or a service invocation request message, etc., or may have other names, such as Nudm_UEAuthentication_GET. This application does not Not limited.
  • the expression form and content of the authentication service request mentioned in step S505 and step S506 may be the same or different, and this application is not limited.
  • the UDM receives the authentication service request, and according to the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI, queries the user subscription data, determines the instruction information corresponding to the terminal device, and then determines the terminal device (or USIM card) the first AUTS algorithm used to calculate AUTS.
  • step S508 the UDM checks the AUTS according to the first AUTS algorithm, and after the check succeeds, resynchronizes the SQN.
  • Step S509 re-execute the authentication process between the terminal device and the UDM.
  • FIG. 6 is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
  • Step S601 The terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range.
  • the terminal device may receive an authentication request message from the AMF.
  • the authentication request message includes the random number RAND and the authentication token AUTN.
  • the authentication token AUTN may specifically include the serial number SQN, Anonymous key AK, authentication management domain AMF, message authentication code MAC and other parameters.
  • the terminal device (or the USIM card in the terminal device) can verify the authentication token AUTN in the authentication request message. If the serial number SQN in the verification token AUTN is not in the correct range, for example, the authentication token AUTN If the serial number SQN in is less than or equal to the serial number SQN MS stored in the terminal device (or USIM card), it can be considered that the SQN verification has failed.
  • the terminal device may first verify the MAC in the authentication token AUTN, and after the MAC verification fails, then verify the serial number SQN in the authentication token AUTN.
  • verifying the MAC in the authentication token AUTN refers to calculating the XMAC according to the authentication token AUTN, the random number RAND and the root key K, and then comparing the obtained XMAC with the MAC in the authentication token AUTN. If they are consistent, the verification is considered successful, and if they are inconsistent, the verification is considered failed.
  • verifying the MAC in the authentication token AUTN refers to calculating the XMAC according to the authentication token AUTN, the random number RAND and the root key K, and then comparing the obtained XMAC with the MAC in the authentication token AUTN. If they are consistent, the verification is considered successful, and if they are inconsistent, the verification is considered failed.
  • other MAC verification methods can also be used, which is not limited in this application.
  • Step S602 The terminal device calculates the resynchronization authentication token AUTS, and encrypts the AUTS and the indication information corresponding to the terminal device to obtain the encrypted resynchronization authentication token AUTS*.
  • the AUTS is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not in the correct range.
  • the terminal device can use the algorithm shown in Figure 4a or Figure 4b to calculate the AUTS, or it can use Other algorithms to calculate AUTS are not limited in this application.
  • the terminal device can also generate indication information corresponding to the terminal device according to the first AUTS algorithm used to calculate AUTS, and the indication information is associated with the identification of the terminal device, the identification of the USIM card or the user identification (such as SUPI), Used to instruct the terminal equipment to calculate the AUTS algorithm used by the AUTS.
  • the terminal device may generate the indication information according to the identifier of the first AUTS algorithm used to calculate the AUTS.
  • the indication information may be the identifier of the first AUTS algorithm used by the terminal device, or include the first AUTS algorithm used by the terminal device to calculate the AUTS.
  • the indication information can also be a flag bit to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm, or to indicate whether the USIM card is a new card. If the flag is set to 1, it indicates support. 0 means not supported.
  • the indication information may also be information such as the type or batch or version of the USIM card, and there is a certain correlation between the type or batch or version of the USIM card and the AUTS algorithm adopted by the terminal device.
  • the indication information may also be a list of subscription features of the terminal device (or USIM card), and there is also a certain association relationship between the subscription features supported by the terminal device and the first AUTS algorithm adopted by the terminal device.
  • the terminal device encrypts the indication information corresponding to the AUTS and the terminal device, which can be expressed as:
  • K is the encryption key
  • AUTS* is the encrypted resynchronization authentication token
  • Enc() is the encryption function
  • AUTS is the resynchronization authentication token
  • indication refers to the indication information corresponding to the terminal device.
  • the indication information corresponding to the AUTS and the terminal equipment can be protected, thereby facilitating the normal progress of the resynchronization process, and Improve the security of the authentication process.
  • the terminal device can use the root key K to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, or use the public key of the home network to encrypt the resynchronization authentication token AUTS and
  • the indication information corresponding to the terminal device is encrypted, and SUPI encryption can also be used to obtain a subscription concealed identifier (SUCI) to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, which is not limited by this application.
  • the encryption key K in formula 2 can be the root key K or the public key of the home network.
  • the terminal device may also use other encryption algorithms for encryption, which is also not limited in this application.
  • steps S601 and S602 may also be specifically executed by the USIM card in the terminal device.
  • Step S603 The terminal device sends an authentication failure message to the AMF, and the authentication failure message includes the encrypted resynchronization authentication token AUTS*.
  • Step S604 AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends the received authentication service request to UDM.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS*.
  • Step S605 The UDM receives an authentication service request from AMF or AUSF.
  • the authentication service request includes an encrypted resynchronization authentication token AUTS*.
  • the AUTS* is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range. .
  • Step S606 UDM decrypts the encrypted resynchronization authentication token AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device.
  • the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS used by the terminal device.
  • UDM can use the root key K to decrypt the encrypted resynchronization authentication token AUTS*, or UDM can also use the private key of the home network to decrypt the encrypted resynchronization authentication token AUTS*, or UDM can also decrypt the encrypted resynchronization authentication token AUTS*.
  • the encrypted resynchronization authentication token AUTS* can be decrypted based on SUCI decryption to obtain SUPI.
  • UDM can also use other decryption algorithms for decryption, which is not limited in this application.
  • the decryption algorithm adopted by UDM matches the encryption algorithm adopted by the terminal device (or USIM card). Specifically, when the terminal device uses the root key K to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, correspondingly, UDM can use the root key K to encrypt the resynchronization authentication token AUTS*.
  • Step S607 The UDM checks the AUTS according to the first AUTS algorithm.
  • the UDM may determine the first AUTS algorithm according to the identifier of the terminal device included in the authentication service request and the indication information corresponding to the terminal device.
  • the integrity of the resynchronization authentication token AUTS can also be verified.
  • UDM can obtain the terminal device serial number SQN MS (that is, the highest serial number SQN MS accepted by the USIM card) from AUTS according to the first AUTS algorithm, and then calculate the message authentication code MAC according to the SQN MS; If the MAC is consistent with the MAC-S obtained from the resynchronization authentication token AUTS, it can be determined that the integrity check of the AUTS is successful.
  • SQN MS that is, the highest serial number SQN MS accepted by the USIM card
  • UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
  • the terminal device can encrypt and protect the corresponding indication information together with the generated AUTS, and send it to the UDM.
  • UDM can determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and then use the AUTS algorithm consistent with the terminal device (or USIM card) to verify the AUTS sent by the terminal device, thereby avoiding UDM and the terminal.
  • the problem of resynchronization failure caused by the inconsistent AUTS algorithm adopted by the device allows the resynchronization process and subsequent terminal device authentication process to proceed normally, and at the same time can improve the security of the authentication process.
  • FIG. 7 is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
  • Step S701 The terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range.
  • step S701 For a specific implementation manner of step S701, reference may be made to the description of step S201 in the first embodiment or step S601 in the second embodiment, which will not be repeated here.
  • Step S702 The terminal device calculates the resynchronization authentication token AUTS according to the instruction information corresponding to the terminal device.
  • the indication information is used to directly or indirectly instruct the terminal equipment to calculate the first AUTS algorithm used by the AUTS, and the indication information is related to the identification of the terminal equipment or the identification of the USIM card or the user identification (such as SUPI) United.
  • the indication information may be the identifier of the first AUTS algorithm used by the terminal device (USIM card), or the indication information may include the identifier of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the There is a certain mapping relationship between the indication information and the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information can also be used to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm information, or the indication information may also be information for indicating whether the USIM card is a new card, or the indication information may also be information such as the type or batch or version of the USIM card, or the indication information may also be It is a list of subscription features of terminal equipment (or USIM card).
  • the terminal device may calculate the resynchronization authentication token AUTS in the following manner:
  • AUTS is the resynchronization authentication token, which can be used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range
  • SQN MS is the terminal device serial number, which is the highest serial number accepted in the USIM card
  • AK is an anonymous key
  • f5*() represents a function
  • RAND is a random number
  • K is a root key
  • Indication is the indication information corresponding to the terminal device
  • MAC-S' is the message authentication code calculated according to the parameters in AUTN
  • f1*() represents another function
  • AMF is the authentication management domain
  • Means exclusive OR
  • means splicing.
  • the AUTS calculated by the above formula 3 is different from the AUTS calculated in the foregoing first and second embodiments.
  • the AUTS in the third embodiment can also be recorded as AUTS'.
  • MAC-S can also be recorded as MAC-S’.
  • the terminal device can carry the indication information corresponding to the terminal device when calculating the AUTS', and then use the MAC-S' to perform integrity protection on the AUTS'.
  • the AUTS' and corresponding instruction information sent by the terminal device to the UDM can also be protected from being tampered with, thereby facilitating the normal progress of the resynchronization process and improving the security of the authentication process.
  • the indication information corresponding to the terminal device is carried. It can also be understood as embedding the indication information corresponding to the terminal device into the AUTS', or taking the indication information corresponding to the terminal device as a new version of the AUTS algorithm.
  • the increased input parameters that is, the method shown in formula 3 can also be understood as a new AUTS algorithm.
  • steps S701 and S702 may also be specifically executed by the USIM card in the terminal device.
  • Step S703 The terminal device sends an authentication failure message to the AMF, and the authentication failure message includes the resynchronization authentication token AUTS.
  • Step S704 AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends an authentication service request to UDM.
  • the authentication service request includes the resynchronization authentication token AUTS'.
  • Step S705 The UDM receives an authentication service request from the AMF or AUSF.
  • the authentication service request includes the resynchronization authentication token AUTS', which is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range.
  • Step S706 The UDM obtains the indication information corresponding to the terminal device from the resynchronization authentication token AUTS'.
  • the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS.
  • the UDM can directly obtain the indication information corresponding to the terminal device from the AUTS.
  • Step S707 UDM checks AUTS' according to the first AUTS algorithm.
  • UDM after UDM obtains the re-synchronization authentication token AUTS', it can verify the integrity of the re-synchronization authentication token AUTS'. Specifically, UDM determines the first AUTS algorithm according to the indication information corresponding to the terminal equipment obtained from AUTS', then calculates AK according to the corresponding algorithm, and then restores SQN MS , and then according to AMF, RAND, K, SQN MS , indication Wait for the parameters, calculate the message authentication code MAC'; if the calculated MAC' is consistent with the MAC-S' obtained from the resynchronization authentication token AUTS', it is determined that the integrity check of the AUTS' is successful.
  • UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
  • the terminal device can carry the corresponding indication information when calculating the AUTS', and then send it to UDM after integrity protection of the AUTS'.
  • UDM can obtain the instruction information corresponding to the terminal device from the received AUTS', and then determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and adopt the AUTS algorithm consistent with the terminal device (or USIM card)
  • the terminal device or USIM card
  • FIG. 8 is a specific example of the communication method provided in Embodiments 2 and 3 of this application.
  • the example specifically includes the following steps:
  • an authentication procedure (authentication procedure) between the terminal device and the UDM is executed.
  • the authentication process may include: the AMF sends an authentication request message to the terminal device, and the authentication request message includes the random number RAND and the authentication token AUTN.
  • step S802 the terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not within the correct range, the terminal device calculates the resynchronization authentication token AUTS and initiates the resynchronization process. Optionally, the terminal device may also check the message authentication code MAC in the authentication token AUTN, and the check message authentication code MAC may be before the check sequence number SQN.
  • the terminal device may also generate indication information, and encrypt the indication information with the calculated resynchronization authentication token AUTS to obtain the encrypted AUTS*.
  • the specific encryption method can refer to the description in step S602, which will not be repeated here.
  • the terminal device may also generate indication information, and when calculating the resynchronization authentication token AUTS, use the indication information as one of the input parameters for calculating AUTS. That is, the AUTS is calculated according to the instruction information corresponding to the terminal device.
  • the specific calculation method of AUTS please refer to the description in step S702, which will not be repeated here.
  • Step S803 The terminal device sends an authentication failure message to the AMF.
  • the authentication failure message includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
  • the authentication failure message includes an encrypted resynchronization authentication token AUTS*, which is obtained by the terminal device encrypting the calculated AUTS and the corresponding indication information .
  • the authentication failure message includes the resynchronization authentication token AUTS, which is generated by the terminal device according to the indication information corresponding to the terminal device, that is, the terminal device is calculating When AUTS, the corresponding indication information is also used as one of the input parameters.
  • step S804 the AMF sends an authentication service request to AUSF.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
  • the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
  • Step S805 AUSF sends the received authentication service request to UDM.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
  • the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
  • step S806 the UDM receives the authentication service request, and determines the first AUTS algorithm according to the indication information corresponding to the terminal device.
  • step S806 UDM decrypts the encrypted resynchronization authentication token AUTS* in the received authentication service request to obtain the corresponding indication of the resynchronization authentication token AUTS and the terminal device Information, and then determine the first AUTS algorithm according to the instruction information corresponding to the terminal device.
  • step S806 UDM obtains the indication information corresponding to the terminal device from the resynchronization authentication token AUTS in the received authentication service request, and verifies the AUTS according to MAC-S' Completeness, and then determine the first AUTS algorithm according to the indication information corresponding to the terminal device.
  • step S807 the UDM checks the AUTS according to the first AUTS algorithm. After the check succeeds, it resynchronizes the SQN, and then re-initiates the authentication process according to the synchronized SQN.
  • step S607 or S707 For the specific process of verifying the AUTS, please refer to the description in step S607 or S707, which will not be repeated here.
  • Step S808 re-execute the authentication process between the terminal device and the UDM.
  • the technical solution in the fourth embodiment is similar to the technical solution shown in the second embodiment, but the difference is that in the second embodiment, the terminal device and the actions performed by the USIM card installed in the terminal device are not clearly distinguished. Some actions performed by the terminal device can also be performed by the USIM card installed in the terminal device. For example, verify the authentication token AUTN received by the terminal device, and verify that the serial number SQN in the authentication token AUTN is not present. After it is within the correct range, calculate the resynchronization authentication token AUTS, encrypt the resynchronization authentication token AUTS and the indication information to obtain AUTS*, and then send the encrypted AUTS* to UDM via the terminal device through the AMF.
  • the USIM card installed in the terminal device can verify the authentication token AUTN received by the terminal device. After verifying that the serial number SQN in the authentication token AUTN is not in the correct range, calculate the resynchronization authentication token AUTS, and send the resynchronization authentication token AUTS to the terminal device, which is determined by the terminal device according to the configuration information of the USIM card. The corresponding instruction information is then encrypted with the AUTS received from the USIM card, and finally sent to UDM by the terminal device via AMF.
  • FIG. 9 is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
  • the terminal device may receive an authentication request message from the AMF, and send parameters such as the authentication token AUTN and the random number RAND included in the authentication request message to the USIM card installed in the terminal device ,
  • the USIM card verifies the authentication token AUTN.
  • Step S902 The USIM card calculates the resynchronization authentication token AUTS.
  • the USIM card can use the algorithm shown in FIG. 4a or 4b to calculate the resynchronization authentication token AUTS, and other algorithms can also be used to calculate the resynchronization authentication token AUTS, which is not limited by this application.
  • Step S903 The USIM card sends the resynchronization authentication token AUTS and the configuration information of the USIM card to the terminal device.
  • the configuration information may include information used to indicate the AUTS algorithm used when the USIM card calculates AUTS, for example, may include one or more of the following information: the identifier of the first AUTS algorithm used by the USIM card, which is used to indicate the USIM card Information about whether the new AUTS algorithm is supported, information used to indicate whether the USIM card is a new card, the type or batch or release of the USIM card, and other information.
  • the configuration information may also include other information that can be used to distinguish the AUTS algorithm, which is not limited in this application.
  • the USIM may also send the random number RAND to the terminal device.
  • Step S904 The terminal device receives the resynchronization authentication token AUTS from the USIM card and the configuration information of the USIM card.
  • the terminal device receiving the configuration information of the USIM card from the USIM card can also be understood as the terminal device reading the configuration information of the USIM card, or the terminal device acquiring the configuration information of the USIM card, etc.
  • Step S905 The terminal device determines the indication information according to the configuration information of the USIM card, and the indication information is used to instruct the first AUTS algorithm used by the USIM card to calculate the AUTS.
  • the indication information is associated with the identification of the terminal device, or the identification of the USIM card or the user identification (such as SUPI).
  • the indication information may be the identifier of the first AUTS algorithm used by the terminal device (USIM card), or the indication information may include the identifier of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the There is a certain mapping relationship between the indication information and the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information can also be used to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm information, or the indication information may also be information for indicating whether the USIM card is a new card, or the indication information may also be information such as the type or batch or version of the USIM card, or the indication information may also be It is a list of subscription features of terminal equipment (or USIM card).
  • the indication information may be part or all of the configuration information of the USIM card, or may be information derived and calculated based on the configuration information of the USIM card, which is not limited in this application.
  • Step S906 The terminal device encrypts the resynchronization authentication token AUTS and the indication information to obtain an encrypted resynchronization authentication token AUTS*.
  • step S906 reference may be made to the description of step S602 in the second embodiment, which will not be repeated here.
  • Step S907 The terminal device sends an authentication failure message to the AMF.
  • the authentication failure message includes the encrypted resynchronization authentication token AUTS*.
  • the encrypted resynchronization authentication token AUTS* can be used to instruct the terminal device or the USIM card to determine the authentication token AUTN.
  • the serial number SQN is not in the correct range.
  • the authentication failure message is used to trigger the UDM to resynchronize the SQN.
  • Step S908 AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends the received authentication service request to UDM.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS*.
  • Step S909 The UDM receives the authentication service request from the AMF or AUSF, and obtains the encrypted resynchronization authentication token AUTS* in the authentication service request.
  • Step S910 UDM decrypts the encrypted resynchronization authentication token AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device.
  • steps S907 to S911 For the specific implementation of steps S907 to S911 described above, reference may be made to steps S604 to S607 in the second embodiment, which will not be repeated here.
  • the terminal device can determine the AUTS algorithm used by the USIM card according to the configuration information of the USIM card, and then combine the indication information used to indicate the AUTS algorithm used by the USIM card and the AUTS calculated by the USIM card. After being encrypted, it is sent to UDM. In this way, the resynchronization process can be carried out normally, and at the same time, the problem of inability to generate instruction information or encryption processing that may be caused due to the limitation or incompatibility of the USIM card is avoided, thereby enhancing the method Applicability.
  • FIG. 10 is another specific example of the communication method provided in the fourth embodiment of this application.
  • the example specifically includes the following steps:
  • step S1001 an authentication procedure (authentication procedure) between the terminal device and the UDM is executed.
  • the authentication process may include: the AMF sends an authentication request message to the terminal device, and the authentication request message includes the random number RAND and the authentication token AUTN.
  • the terminal device can send the random number RAND and the authentication token AUTN included in the authentication request message to the USIM card installed in the terminal device.
  • step S1002 the USIM card in the terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not in the correct range, the USIM card can calculate the resynchronization authentication token AUTS.
  • the terminal device may also check the message authentication code MAC in the authentication token AUTN, and the check message authentication code MAC may be before the check sequence number SQN.
  • the USIM card may send the calculated resynchronization authentication token AUTS and the configuration information of the USIM card to the terminal device.
  • step S903 For the specific implementation of the configuration information of the USIM card, reference may be made to the description in step S903, which will not be repeated here.
  • Step S1004 The terminal device generates indication information according to the received USIM card configuration information, and then encrypts the received resynchronization authentication token AUTS and the generated indication information to obtain an encrypted resynchronization authentication token AUTS*.
  • the specific encryption method can refer to the description in step S602, which will not be repeated here.
  • Step S1005 The terminal device sends an authentication failure message to the AMF.
  • the authentication failure message includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
  • step S1006 the AMF sends an authentication service request to AUSF.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
  • Step S1007 AUSF sends the received authentication service request to UDM.
  • the authentication service request includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
  • the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
  • step S1008 the UDM receives the authentication service request, decrypts the encrypted resynchronization authentication token AUTS* in the received authentication service request, and obtains the resynchronization authentication token AUTS and the corresponding indication information of the terminal device.
  • the UDM determines the first AUTS algorithm according to the indication information corresponding to the terminal device.
  • step S1009 the UDM checks the AUTS according to the first AUTS algorithm. After the check succeeds, it resynchronizes the SQN, and then re-initiates the authentication process according to the synchronized SQN.
  • step S607 or S707 For the specific process of verifying the AUTS, please refer to the description in step S607 or S707, which will not be repeated here.
  • Step S1010 re-execute the authentication process between the terminal device and the UDM.
  • FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • the communication device 1100 includes a transceiver module 1110 and a processing module 1120.
  • the communication device can be used to implement the function of the unified data management network element in any of the foregoing method embodiments, or be used to implement the function of the unified data storage network element in any of the foregoing method embodiments.
  • the communication device may be a UDM network element or a UDR network element in the core network
  • the network element or network function may be a network element in a hardware device, or a software function running on dedicated hardware, or Virtualization functions instantiated on the platform (for example, cloud platform).
  • the communication device may be a network device or a chip included in the network device.
  • the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the processing module 1120 uses To obtain the instruction information corresponding to the terminal device, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the processing module 1120 is also used to verify the AUTS according to the first AUTS algorithm.
  • the processing module 1120 is specifically configured to obtain the indication information from a local configuration or obtain the indication information from a unified data storage network element.
  • the indication information corresponding to the terminal device is included in the subscription data of the terminal device.
  • the transceiver module 1110 is used to receive a service call request from the unified data management network element, and the service call request is used to request the terminal device to correspond to
  • the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
  • the processing module 1120 is used to send a service response message to the unified data management network element through the transceiver module 1110, the service response message Include instruction information corresponding to the terminal device.
  • the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes an encrypted resynchronization authentication token AUTS*; processing module 1120 is used to decrypt the AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device.
  • the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; processing module 1120 is also used to verify the AUTS according to the first AUTS algorithm.
  • the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the processing module 1120 uses To obtain the instruction information corresponding to the terminal device from the AUTS, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the processing module 1120 is also used to calibrate the AUTS according to the first AUTS algorithm Test.
  • the processing module 1120 is specifically configured to obtain the mobile terminal serial number SQN MS from the AUTS according to the first AUTS algorithm, and calculate the MAC according to the SQN MS ; if the MAC is the same as the MAC obtained from the AUTS- If S is consistent, it is determined that the AUTS verification is successful.
  • processing module 1120 involved in the communication device may be implemented by a processor or processor-related circuit components
  • transceiver module 1110 may be implemented by a transceiver or transceiver-related circuit components.
  • the operation and/or function of each module in the communication device is to implement the corresponding process of the method shown in FIG. 2, FIG. 5, FIG. 6 or FIG.
  • FIG. 12 is another schematic structural diagram of a communication device according to an embodiment of this application.
  • the communication device 1200 can be used to implement the methods described in the foregoing method embodiments.
  • the communication device 1200 may be a chip or a network device.
  • the communication device 1200 includes one or more processors 1201, and the one or more processors 1201 can support the communication device 1200 to implement the unified data management network element or unified data storage network in FIG. 2, FIG. 5, FIG. 6 or FIG. Yuan method.
  • the processor 1201 may be a general-purpose processor or a special-purpose processor.
  • the processor 1201 may be a central processing unit (CPU) or a baseband processor.
  • the baseband processor may be used to process communication data, and the CPU may be used to control a communication device (for example, a network device, a terminal device, or a chip), execute a software program, and process data of the software program.
  • the communication device 1200 may further include a transceiving unit 1205 to implement signal input (reception) and output (transmission).
  • the communication device 1200 may be a chip, and the transceiver unit 1205 may be an input and/or output circuit of the chip, or the transceiver unit 1205 may be a communication interface of the chip, and the chip may be used as a terminal device or a network device or other wireless communication. Components of equipment.
  • the communication device 1200 may include one or more memories 1202 with a program 1204 stored thereon.
  • the program 1204 can be run by the processor 1201 to generate an instruction 1203 so that the processor 1201 executes the method described in the foregoing method embodiment according to the instruction 1203.
  • the memory 1202 may also store data.
  • the processor 1201 may also read data stored in the memory 1202. The data may be stored at the same storage address as the program 1204, or the data may be stored at a different storage address from the program 1204.
  • the processor 1201 and the memory 1202 may be provided separately or integrated together, for example, integrated on a single board or a system-on-chip (SOC).
  • SOC system-on-chip
  • the communication device 1200 may further include a transceiver unit 1205 and an antenna 1206.
  • the transceiver unit 1205 may be called a transceiver, a transceiver circuit, or a transceiver, and is used to implement the transceiver function of the communication device through the antenna 1206.
  • each step of the foregoing method embodiment may be completed by a logic circuit in the form of hardware or instructions in the form of software in the processor 1201.
  • the processor 1201 may be a CPU, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices , For example, discrete gates, transistor logic devices, or discrete hardware components.
  • FIG. 13 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • the communication device 1300 includes a transceiver module 1310 and a processing module 1320.
  • the communication device can be used to implement the function of the terminal device in any of the foregoing method embodiments.
  • the communication device may be a terminal device, such as a handheld terminal device or a vehicle-mounted terminal device; the communication device may also be a chip included in the terminal device, such as a USIM card installed in the terminal device, or a device including terminal devices, such as various Various types of vehicles, etc.
  • the processing module 1320 is used to calculate the resynchronization authentication token AUTS, and encrypt the AUTS and the instruction information corresponding to the communication device to Obtain the encrypted resynchronization authentication token AUTS*, the indication information corresponding to the communication device is used to instruct the communication device to calculate the first AUTS algorithm used by the AUTS; the transceiver module 1310 is used to send the AUTS* to the access management network element.
  • the processing module 1320 is further configured to generate the indication information corresponding to the device according to the first AUTS algorithm used to calculate the AUTS.
  • the processing module 1320 is configured to calculate the resynchronization authentication token AUTS according to the instruction information corresponding to the communication device, and the instruction information corresponding to the communication device It is used to instruct the communication device to calculate the first AUTS algorithm used by the AUTS; the transceiver module 1310 is used to send the AUTS to the access management network element.
  • the AUTS includes the indication information corresponding to the communication device and/or the MAC-S calculated according to the indication information corresponding to the communication device.
  • the transceiver module 1310 is used to receive the resynchronization authentication token AUTS and the configuration information of the USIM card from the global user identity module USIM card; the processing module 1320 uses According to the configuration information of the USIM card, the indication information is determined, and the indication information is used to indicate the first AUTS algorithm used by the USIM card to calculate AUTS; the processing module 1320 is also used to encrypt the AUTS and the indication information to obtain encryption resynchronization Authentication token AUTS*; the transceiver module 1310 is also used to send the AUTS* to the access management network element.
  • the configuration information includes one or more of the following information:
  • the AUTS algorithm supported by the USIM card whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
  • the processing module 1320 is used to calculate the resynchronization authentication token AUTS; the transceiver module 1310 is used to calculate the AUTS and the USIM card
  • the configuration information is sent to the terminal device.
  • the configuration information includes one or more of the following information:
  • the AUTS algorithm supported by the USIM card whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
  • the processing module 1320 involved in the communication device may be implemented by a processor or processor-related circuit components, and the transceiver module 1310 may be implemented by a transceiver or transceiver-related circuit components.
  • the operation and/or function of each module in the communication device is to implement the corresponding process of the method shown in FIG. 6 to FIG. 10, and is not repeated here for brevity.
  • FIG. 14 is a schematic diagram of another structure of another communication device provided in an embodiment of this application.
  • the communication device may specifically be a terminal device. It is easy to understand and easy to illustrate.
  • the terminal device uses a mobile phone as an example.
  • the terminal device includes a processor, and may also include a memory. Of course, it may also include a radio frequency circuit, an antenna, and an input/output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the terminal device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 14 only one memory and processor are shown in FIG. 14. In an actual terminal device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with the transceiving function can be regarded as the transceiving unit of the terminal device
  • the processor with the processing function can be regarded as the processing unit of the terminal device.
  • the terminal device includes a transceiving unit 1410 and a processing unit 1420.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiving unit 1410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1410 as the sending unit, that is, the transceiving unit 1410 includes a receiving unit and a sending unit.
  • the transceiver unit may sometimes be referred to as a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 1410 is used to perform sending and receiving operations on the terminal device side in the foregoing method embodiment
  • processing unit 1420 is used to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
  • An embodiment of the present application also provides a chip system, including: a processor, the processor is coupled with a memory, the memory is used to store a program or instruction, when the program or instruction is executed by the processor, the The chip system implements the method in any of the foregoing method embodiments.
  • processors in the chip system there may be one or more processors in the chip system.
  • the processor can be implemented by hardware or software.
  • the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
  • the memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application.
  • the memory may be a non-transitory processor, such as a read-only memory ROM, which may be integrated with the processor on the same chip, or may be set on different chips.
  • the setting method of the processor is not specifically limited.
  • the chip system may be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (SoC). It can also be a central processor unit (CPU), a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller).
  • the controller unit, MCU may also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • each step in the foregoing method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the embodiment of the present application also provides a computer-readable storage medium, which stores computer-readable instructions, and when the computer reads and executes the computer-readable instructions, the computer is caused to execute any of the above-mentioned method embodiments In the method.
  • the embodiments of the present application also provide a computer program product.
  • the computer reads and executes the computer program product, the computer is caused to execute the method in any of the foregoing method embodiments.
  • the embodiment of the present application also provides a communication system, which includes a unified data management network element and terminal equipment.
  • a USIM card is provided in the terminal device.
  • the communication system may also include one or more of an access network device, an access management network element, an authentication service function network element, and a unified data storage network element.
  • processors mentioned in the embodiments of this application may be a central processing unit (central processing unit, CPU), or other general-purpose processors, digital signal processors (digital signal processors, DSP), and application-specific integrated circuits ( application specific integrated circuit (ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • CPU central processing unit
  • DSP digital signal processors
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence numbers of the above-mentioned processes does not mean the order of execution.
  • the execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed in embodiments of the present invention are a communication method and apparatus. The method comprises: after receiving an authentication resynchronization token (AUTS), a unified data management network element acquires indication information corresponding to a terminal device, recognizes, according to the indication information corresponding to the terminal device, an AUTS algorithm adopted when the terminal device calculates the AUTS, and thus verifies the AUTS by adopting the AUTS algorithm consistent with that of the terminal device. Therefore, the problem of resynchronization failure caused by inconsistent AUTS algorithm adopted by the unified data management network element and the terminal device can be effectively avoided, so that a resynchronization flow and subsequent authentication flows of the terminal device can be normally performed.

Description

一种通信方法及装置Communication method and device
相关申请的交叉引用Cross-references to related applications
本申请要求在2020年02月20日提交中国国家知识产权局、申请号为202010103830.2、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the State Intellectual Property Office of China, the application number is 202010103830.2, and the application name is "a communication method and device" on February 20, 2020, the entire content of which is incorporated into this application by reference middle.
技术领域Technical field
本申请涉及无线通信技术领域,尤其涉及一种通信方法及装置。This application relates to the field of wireless communication technology, and in particular to a communication method and device.
背景技术Background technique
在目前的认证流程中,终端设备从接入与移动性管理功能(access and mobility management function,AMF)接收到认证请求消息后,会校验认证请求消息中携带的序列号(sequence number,SQN),如果校验SQN不在正确的取值范围内,那么终端设备会进一步计算重同步认证令牌(authentication token for synchronisation,AUTS),并将AUTS发送给统一数据管理(unified data management,UDM)。UDM接收到AUTS之后,会对AUTS进行校验,校验通过后执行重同步流程。In the current authentication process, after receiving the authentication request message from the access and mobility management function (AMF), the terminal device will verify the sequence number (SQN) carried in the authentication request message If the verified SQN is not within the correct value range, the terminal device will further calculate the resynchronization authentication token (authentication token for synchronisation, AUTS), and send AUTS to unified data management (UDM). After the UDM receives the AUTS, it will verify the AUTS, and execute the resynchronization process after the verification is passed.
然而,现有技术中,终端设备计算AUTS的算法可能有多种,但是UDM却无法识别终端设备具体使用哪种AUTS算法计算得到的AUTS,当终端设备使用的AUTS算法与UDM使用的AUTS算法不一致时,则可能会导致UDM对AUTS校验出错,进而造成重同步失败。However, in the prior art, there may be multiple algorithms for calculating AUTS by terminal equipment, but UDM cannot identify which AUTS algorithm is used by the terminal equipment to calculate the AUTS. When the AUTS algorithm used by the terminal equipment is inconsistent with the AUTS algorithm used by UDM , It may cause UDM to check AUTS incorrectly, and cause resynchronization to fail.
发明内容Summary of the invention
本申请实施例提供一种通信方法及装置,用以识别终端设备采用的AUTS算法,从而使用正确的AUTS算法对AUTS进行校验,提高终端设备的认证效率。The embodiments of the present application provide a communication method and device for identifying the AUTS algorithm adopted by the terminal equipment, so that the correct AUTS algorithm is used to verify the AUTS, and the authentication efficiency of the terminal equipment is improved.
第一方面,本申请实施例提供一种通信方法,该方法可由统一数据管理网元UDM执行,该方法包括:统一数据管理网元接收认证服务请求,该认证服务请求中包括重同步认证令牌AUTS;统一数据管理网元获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;统一数据管理网元采用第一AUTS算法对AUTS进行校验。In the first aspect, an embodiment of the present application provides a communication method that can be executed by a unified data management network element UDM. The method includes: the unified data management network element receives an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the unified data management network element obtains the instruction information corresponding to the terminal device, and the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data management network element uses the first AUTS algorithm to calibrate the AUTS Test.
本申请实施例中,统一数据管理网元可根据终端设备对应的指示信息,识别终端设备计算AUTS时所采用的AUTS算法,进而采用与终端设备一致的AUTS算法来对终端设备计算的AUTS进行校验,如此,可有效避免统一数据管理网元与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行。In the embodiment of this application, the unified data management network element can identify the AUTS algorithm used by the terminal device to calculate AUTS according to the instruction information corresponding to the terminal device, and then use the AUTS algorithm consistent with the terminal device to calibrate the AUTS calculated by the terminal device. In this way, the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm adopted by the unified data management network element and the terminal device can be effectively avoided, so that the resynchronization process and the subsequent authentication process of the terminal device can be performed normally.
在第一方面的一种可能的设计中,统一数据管理网元获取终端设备对应的指示信息可以为统一数据管理网元从本地配置中获取该指示信息,或者从统一数据存储网元中获取该指示信息。也就是说,终端设备对应的指示信息可以预先配置在统一数据管理网元本地, 也可以配置在统一数据存储网元中,如此,可增强本申请实施例中技术方案的适用性。In a possible design of the first aspect, the unified data management network element may obtain the indication information corresponding to the terminal device for the unified data management network element to obtain the indication information from the local configuration, or obtain the indication information from the unified data storage network element. Instructions. That is, the indication information corresponding to the terminal device may be pre-configured locally in the unified data management network element, or may be configured in the unified data storage network element. In this way, the applicability of the technical solutions in the embodiments of the present application can be enhanced.
在第一方面的一种可能的设计中,终端设备的指示信息可包含在终端设备的签约数据中,且该终端设备的签约数据可保存在统一数据管理网元中或保存在统一数据存储网元中。In a possible design of the first aspect, the indication information of the terminal device may be included in the contract data of the terminal device, and the contract data of the terminal device may be stored in the unified data management network element or stored in the unified data storage network. Yuanzhong.
在第一方面的一种可能的设计中,统一数据管理网元根据终端设备对应的指示信息确定第一AUTS算法,可包括:统一数据管理网元根据认证服务请求中的终端设备的标识和终端设备对应的指示信息,确定第一AUTS算法。In a possible design of the first aspect, the unified data management network element determines the first AUTS algorithm according to the indication information corresponding to the terminal device, which may include: the unified data management network element determines the first AUTS algorithm according to the identification of the terminal device in the authentication service request and the terminal The indication information corresponding to the device determines the first AUTS algorithm.
第二方面,本申请实施例提供一种通信方法,该方法可由统一数据存储网元UDR执行,该方法包括:统一数据存储网元从统一数据管理网元接收服务调用请求,该服务调用请求用于请求终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;统一数据存储网元向统一数据管理网元发送服务响应消息,该服务响应消息中包括终端设备对应的指示信息。In a second aspect, the embodiments of the present application provide a communication method that can be executed by a unified data storage network element UDR. The method includes: the unified data storage network element receives a service invocation request from the unified data management network element, and the service invocation request is used for To request the instruction information corresponding to the terminal device, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data storage network element sends a service response message to the unified data management network element, and the service response message Include instruction information corresponding to the terminal device.
本申请实施例中,终端设备对应的指示信息可预先配置在统一数据存储网元中,当统一数据管理网元需要获取终端设备对应的指示信息时,统一数据存储网元可根据统一数据管理网元发送的服务调用请求,将终端设备对应的指示信息发送给统一数据管理网元,以使统一数据管理可根据该指示信息所指示的AUTS算法对AUTS进行验证,从而使得重同步流程可以正常进行。In the embodiment of this application, the indication information corresponding to the terminal device may be pre-configured in the unified data storage network element. When the unified data management network element needs to obtain the indication information corresponding to the terminal device, the unified data storage network element may be based on the unified data management network element. The service call request sent by the element sends the instruction information corresponding to the terminal device to the unified data management network element, so that the unified data management can verify the AUTS according to the AUTS algorithm indicated by the instruction information, so that the resynchronization process can proceed normally .
第三方面,本申请实施例提供另一种通信方法,该方法可由统一数据管理网元UDM执行,该方法包括:统一数据管理网元接收认证服务请求,该认证服务请求中包括加密重同步认证令牌AUTS*;统一数据管理网元对AUTS*进行解密,以得到重同步认证令牌AUTS和终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;统一数据管理网元根据第一AUTS算法对AUTS进行校验。In the third aspect, the embodiments of the present application provide another communication method, which can be executed by the unified data management network element UDM, and the method includes: the unified data management network element receives an authentication service request, and the authentication service request includes encryption resynchronization authentication Token AUTS*; the unified data management network element decrypts AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device. The indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm: The unified data management network element verifies the AUTS according to the first AUTS algorithm.
本申请实施例中,统一数据管理网元可根据接收到的加密重同步认证令牌AUTS*,解密得到终端设备对应的指示信息以及与终端设备生成的AUTS。如此,统一数据管理网元可根据终端设备对应的指示信息,确定终端设备采用的AUTS算法,然后采用与终端设备一致的AUTS算法来对终端设备发送的AUTS进行校验,从而避免统一数据管理网元与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时又可提高认证过程的安全性。In the embodiment of the present application, the unified data management network element can decrypt the instruction information corresponding to the terminal device and the AUTS generated with the terminal device according to the received encrypted resynchronization authentication token AUTS*. In this way, the unified data management network element can determine the AUTS algorithm used by the terminal device according to the instruction information corresponding to the terminal device, and then use the AUTS algorithm consistent with the terminal device to verify the AUTS sent by the terminal device, thereby avoiding the unified data management network. The problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the meta and the terminal device enables the resynchronization process and the subsequent authentication process of the terminal device to proceed normally, and at the same time, the security of the authentication process can be improved.
在第三方面的一种可能的设计中,统一数据管理网元根据终端设备对应的指示信息,确定第一AUTS算法,可包括:统一数据管理网元根据认证服务请求中的终端设备的标识和终端设备对应的指示信息,确定第一AUTS算法。In a possible design of the third aspect, the unified data management network element determines the first AUTS algorithm according to the indication information corresponding to the terminal device, which may include: the unified data management network element determines the first AUTS algorithm according to the identification of the terminal device in the authentication service request and The indication information corresponding to the terminal device determines the first AUTS algorithm.
第四方面,本申请实施例提供另一种通信方法,该方法可由终端设备执行,该方法包括:终端设备计算重同步认证令牌AUTS,并对该AUTS和终端设备对应的指示信息进行加密,以得到加密重同步认证令牌AUTS*,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;终端设备向接入管理网元发送所述AUTS*。In a fourth aspect, the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device calculates a resynchronization authentication token AUTS, and encrypts the AUTS and the corresponding indication information of the terminal device, To obtain the encrypted resynchronization authentication token AUTS*, the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the terminal device sends the AUTS* to the access management network element.
本申请实施例中,终端设备可将对应的指示信息与生成的AUTS在一起进行加密保护,并发送给统一数据管理网元。如此,统一数据管理网元可根据终端设备发送的指示信息,确定终端设备采用的AUTS算法,并采用与终端设备一致的AUTS算法来对终端设备发送的AUTS进行校验,从而避免统一数据管理网元与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时又可提高认证过程的安全性。In the embodiment of the present application, the terminal device may encrypt and protect the corresponding indication information together with the generated AUTS, and send it to the unified data management network element. In this way, the unified data management network element can determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to verify the AUTS sent by the terminal device, thereby avoiding the unified data management network. The problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the meta and the terminal device enables the resynchronization process and the subsequent authentication process of the terminal device to proceed normally, and at the same time, the security of the authentication process can be improved.
在第四方面的一种可能的设计中,该方法还包括:终端设备根据计算AUTS采用的第一AUTS算法,生成终端设备对应的指示信息。In a possible design of the fourth aspect, the method further includes: the terminal device generates the indication information corresponding to the terminal device according to the first AUTS algorithm used to calculate the AUTS.
第五方面,本申请实施例提供另一种通信方法,该方法可由统一数据管理网元UDM执行,该方法包括:统一数据管理网元接收认证服务请求,该认证服务请求中包括重同步认证令牌AUTS,统一数据管理网元从AUTS中获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS所采用的第一AUTS算法;统一数据管理网元根据该第一AUTS算法对AUTS进行校验。In a fifth aspect, the embodiments of the present application provide another communication method, which can be executed by the unified data management network element UDM, and the method includes: the unified data management network element receives an authentication service request, and the authentication service request includes a resynchronization authentication order Brand AUTS, the unified data management network element obtains the instruction information corresponding to the terminal device from the AUTS. The instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the unified data management network element is based on the first The AUTS algorithm checks AUTS.
本申请实施例中,终端设备对应的指示信息也可直接携带在AUTS中,并进行完整性保护。如此,统一数据管理网元可直接从接收的AUTS中获取终端设备对应的指示信息,根据终端设备发送的指示信息,确定终端设备采用的AUTS算法,并采用与终端设备一致的AUTS算法来对终端设备发送的AUTS进行校验,从而避免统一数据管理网元与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时提高认证过程的安全性。In the embodiment of the present application, the indication information corresponding to the terminal device can also be directly carried in the AUTS, and integrity protection is performed. In this way, the unified data management network element can directly obtain the instruction information corresponding to the terminal device from the received AUTS, determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to control the terminal The AUTS sent by the device is checked, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the unified data management network element and the terminal device, so that the resynchronization process and the subsequent terminal device authentication process can proceed normally, and at the same time improve the authentication Security of the process.
在第五方面的一种可能的设计中,统一数据管理网元根据第一AUTS算法对AUTS进行校验,可包括:统一数据管理网元根据第一AUTS算法,从AUTS中获取的移动终端序列号SQN MS,并根据该SQN MS计算得到MAC;若计算得到的MAC与从AUTS中获取的MAC-S一致,则统一数据管理网元可确定AUTS校验成功。 In a possible design of the fifth aspect, the unified data management network element checks AUTS according to the first AUTS algorithm, which may include: the unified data management network element obtains the mobile terminal sequence from the AUTS according to the first AUTS algorithm Number SQN MS , and calculate the MAC based on the SQN MS ; if the calculated MAC is consistent with the MAC-S obtained from AUTS, the unified data management network element can determine that the AUTS verification is successful.
第六方面,本申请实施例提供另一种通信方法,该方法可由终端设备执行,该方法包括:终端设备根据终端设备对应的指示信息,计算重同步认证令牌AUTS,该指示信息用于指示终端设备计算AUTS所采用的第一AUTS算法;终端设备向接入管理网元所述AUTS。In a sixth aspect, the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device calculates the resynchronization authentication token AUTS according to the instruction information corresponding to the terminal device, and the instruction information is used to indicate The terminal equipment calculates the first AUTS algorithm used by the AUTS; the terminal equipment sends the AUTS to the access management network element.
本申请实施例中,终端设备可在计算AUTS时携带对应的指示信息,然后对该AUTS进行完整性保护后发送给统一数据管理网元。如此,统一数据管理网元可从接收到的AUTS中得到终端设备对应的指示信息,然后根据终端设备发送的指示信息,确定终端设备采用的AUTS算法,并采用与终端设备一致的AUTS算法来对终端设备发送的AUTS进行校验,从而避免统一数据管理网元与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时提高认证过程的安全性。In the embodiment of the present application, the terminal device may carry the corresponding indication information when calculating the AUTS, and then send the integrity protection of the AUTS to the unified data management network element. In this way, the unified data management network element can obtain the instruction information corresponding to the terminal device from the received AUTS, and then determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and use the AUTS algorithm consistent with the terminal device to check The AUTS sent by the terminal equipment is verified, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the unified data management network element and the terminal equipment, so that the resynchronization process and the subsequent terminal equipment authentication process can be carried out normally, and at the same time improve Security of the certification process.
在第六方面的一种可能的设计中,该AUTS中包括终端设备对应的指示信息和/或根据该指示信息计算得到的MAC-S。In a possible design of the sixth aspect, the AUTS includes indication information corresponding to the terminal device and/or MAC-S calculated according to the indication information.
第七方面,本申请实施例提供另一种通信方法,该方法可由终端设备执行,该方法包括:终端设备从全球用户标识模块USIM卡接收重同步认证令牌AUTS和USIM卡的配置信息;该终端设备根据USIM卡的配置信息,确定指示信息,该指示信息用于指示USIM卡计算AUTS所采用的第一AUTS算法;终端设备对AUTS和指示信息进行加密,以得到加密重同步认证令牌AUTS*;终端设备向接入管理网元发送所述AUTS*。In a seventh aspect, the embodiments of the present application provide another communication method, which can be executed by a terminal device, and the method includes: the terminal device receives a resynchronization authentication token AUTS from a global subscriber identity module USIM card and configuration information of the USIM card; The terminal device determines the indication information according to the configuration information of the USIM card, the indication information is used to indicate the first AUTS algorithm used by the USIM card to calculate AUTS; the terminal device encrypts the AUTS and the indication information to obtain the encrypted resynchronization authentication token AUTS *; The terminal device sends the AUTS* to the access management network element.
本申请实施例中,终端设备可根据USIM卡的配置信息确定USIM卡所采用的AUTS算法,进而将用于指示USIM卡采用的AUTS算法的指示信息和USIM卡计算得到的AUTS一起进行加密后,发送给统一数据管理网元,如此,可使得重同步过程可以正常进行,同时又避免由于USIM卡的限定或不适配,而可能导致的无法生成指示信息或进行加密处理的问题,从而增强该方法的适用性。In the embodiment of this application, the terminal device can determine the AUTS algorithm used by the USIM card according to the configuration information of the USIM card, and then encrypt the indication information used to indicate the AUTS algorithm used by the USIM card and the AUTS calculated by the USIM card. Send it to the unified data management network element. In this way, the resynchronization process can be performed normally, and at the same time, the problem of inability to generate instruction information or encryption processing that may be caused by the limitation or incompatibility of the USIM card is avoided, thereby enhancing the Applicability of the method.
在第七方面的一种可能的设计中,所述配置信息包括下列信息中的一项或多项:USIM 卡支持的AUTS算法、USIM卡是否支持特定类型的AUTS算法、USIM卡的类型信息和USIM卡的版本信息。In a possible design of the seventh aspect, the configuration information includes one or more of the following information: the AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and Version information of the USIM card.
第八方面,本申请实施例提供另一种通信方法,该方法可由USIM卡执行,该USIM卡可以安装于终端设备中,该方法包括:全球用户标识模块USIM卡计算重同步认证令牌AUTS,该USIM卡将计算的AUTS和该USIM卡的配置信息发送至终端设备。In an eighth aspect, the embodiments of the present application provide another communication method, which can be executed by a USIM card, and the USIM card can be installed in a terminal device. The method includes: the global user identity module USIM card calculates the resynchronization authentication token AUTS, The USIM card sends the calculated AUTS and the configuration information of the USIM card to the terminal device.
本申请实施例中,由于USIM卡可将计算的AUTS和该USIM卡的配置信息发送给终端设备,由终端设备自行根据USIM卡的配置信息生成用于指示AUTS算法的指示信息,并将该指示信息和USIM卡计算得到的AUTS一起进行加密后发送给统一数据管理网元,如此,可使得重同步过程可以正常进行,同时又避免由于USIM卡的限定或不适配,而可能导致的无法生成指示信息或进行加密处理的问题,从而增强该方法的适用性。In the embodiment of this application, since the USIM card can send the calculated AUTS and the configuration information of the USIM card to the terminal device, the terminal device itself generates the instruction information for indicating the AUTS algorithm according to the configuration information of the USIM card, and sends the instruction The information is encrypted with the AUTS calculated by the USIM card and then sent to the unified data management network element. In this way, the resynchronization process can be carried out normally, and at the same time, it can avoid the failure to generate due to the limitation or incompatibility of the USIM card. Indicates the problem of information or encryption processing, thereby enhancing the applicability of the method.
在第八方面的一种可能的设计中,所述配置信息包括下列信息中的一项或多项:USIM卡支持的AUTS算法、USIM卡是否支持特定类型的AUTS算法、USIM卡的类型信息和USIM卡的版本信息。In a possible design of the eighth aspect, the configuration information includes one or more of the following information: the AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and Version information of the USIM card.
第九方面,本申请实施例提供一种通信装置,该装置具有实现上述第一方面或第一方面的任一种可能的设计中统一数据管理网元的功能,或者也可以具有实现上述第三方面或第三方面的任一种可能的设计中统一数据管理网元的功能,或者也可以具有实现上述第五方面或第五方面的任一种可能的设计中统一数据管理网元的功能,或者也可以具有实现上述第二方面或第二方面的任一种可能的设计中统一数据存储网元的功能。该装置可以为网络设备,也可以为网络设备中包含的装置,例如芯片。In a ninth aspect, an embodiment of the present application provides a communication device, which has the function of realizing the unified data management network element in the first aspect or any one of the possible designs of the first aspect, or may also have the function of realizing the third The function of the unified data management network element in any possible design of the aspect or the third aspect, or may also have the function of implementing the unified data management network element in any possible design of the fifth aspect or the fifth aspect, Or, it may also have the function of realizing the unified data storage network element in any possible design of the second aspect or the second aspect described above. The device may be a network device, or a device included in the network device, such as a chip.
该装置也可以具有实现上述第四方面或第四方面的任一种可能的设计中终端设备的功能,或者具有实现上述第六方面或第六方面的任一种可能的设计中终端设备的功能,或者具有实现上述第七方面或第七方面的任一种可能的设计中终端设备的功能。该装置可以为终端设备,例如手持终端设备、车载终端设备、车辆用户设备、路侧单元等,也可以为终端设备中包含的装置,例如芯片,也可以为包含终端设备的装置,例如车辆等。The device may also have the function of realizing the terminal device in any possible design of the foregoing fourth aspect or the fourth aspect, or have the function of realizing the terminal device in any possible design of the foregoing sixth aspect or the sixth aspect , Or have the function of a terminal device in any possible design of the seventh aspect or the seventh aspect described above. The device can be a terminal device, such as a handheld terminal device, a vehicle-mounted terminal device, a vehicle user device, a roadside unit, etc., a device included in a terminal device, such as a chip, or a device containing terminal devices, such as a vehicle, etc. .
该装置也可以具有实现上述第八方面或第八方面的任一种可能的设计中USIM卡的功能,该USIM卡可以为终端设备中包括的装置,例如芯片。The device may also have the function of realizing the USIM card in the eighth aspect or any one of the possible designs of the eighth aspect. The USIM card may be a device included in a terminal device, such as a chip.
上述通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现,所述硬件或软件包括一个或多个与上述功能相对应的模块。The functions of the above-mentioned communication device may be realized by hardware, or may be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-mentioned functions.
在一种可能的设计中,该装置的结构中包括处理模块和收发模块,其中,处理模块被配置为支持该装置执行上述第一方面或第一方面的任一种设计中统一数据管理网元相应的功能,或者执行上述第二方面或第二方面的任一种设计中统一数据存储网元相应的功能,或者执行上述第三方面或第三方面的任一种设计中统一数据管理网元相应的功能,或者执行上述第四方面或第四方面的任一种设计中终端设备相应的功能,或者执行上述第五方面或第五方面的任一种设计中统一数据管理网元相应的功能,或者执行上述第六方面或第六方面的任一种设计中终端设备相应的功能,或者执行上述第七方面或第七方面的任一种设计中终端设备相应的功能,或者执行上述第八方面或第八方面的任一种设计中USIM卡相应的功能。收发模块用于支持该装置与其他通信设备之间的通信,例如该装置为统一数据管理网元时,从统一数据存储网元获取终端设备对应的指示信息。该通信装置还可以包括存储模块,存储模块与处理模块耦合,其保存有装置必要的程序指令和数据。作为一种示例,处理模块可以为处理器,通信模块可以为收发器,存储模块可以为存储器,存储器可 以和处理器集成在一起,也可以和处理器分离设置,本申请并不限定。In a possible design, the structure of the device includes a processing module and a transceiver module, wherein the processing module is configured to support the device to execute the first aspect or the unified data management network element in any one of the first aspects of the design. Corresponding function, or perform the corresponding function of the unified data storage network element in the design of the second aspect or the second aspect, or perform the unified data management network element in the design of the third aspect or the third aspect Corresponding function, or perform the corresponding function of the terminal device in the design of the fourth aspect or the fourth aspect, or perform the corresponding function of the unified data management network element in the design of the fifth aspect or the fifth aspect , Or perform the corresponding function of the terminal device in the design of the sixth aspect or the sixth aspect, or perform the corresponding function of the terminal device in the design of the seventh aspect or the seventh aspect, or perform the eighth The corresponding function of the USIM card in any design of the aspect or the eighth aspect. The transceiver module is used to support communication between the device and other communication devices. For example, when the device is a unified data management network element, it obtains the indication information corresponding to the terminal device from the unified data storage network element. The communication device may also include a storage module, which is coupled with the processing module, which stores program instructions and data necessary for the device. As an example, the processing module may be a processor, the communication module may be a transceiver, and the storage module may be a memory. The memory may be integrated with the processor or may be provided separately from the processor, which is not limited in this application.
在另一种可能的设计中,该装置的结构中包括处理器,还可以包括存储器。处理器与存储器耦合,可用于执行存储器中存储的计算机程序指令,以使装置执行上述第一方面、或第一方面的任一种可能的设计中的方法,或者执行上述第二方面或第二方面的任一种设计中的方法,或者执行上述第三方面或第三方面的任一种设计中的方法,或者执行上述第四方面或第四方面的任一种设计中的方法,或者执行上述第五方面或第五方面的任一种设计中的方法,或者执行上述第六方面或第六方面的任一种设计中的方法,或者执行上述第七方面或第七方面的任一种设计中的方法,或者执行上述第八方面或第八方面的任一种设计中的方法。可选的,该装置还包括通信接口,处理器与通信接口耦合。当装置为网络设备或终端设备时,该通信接口可以是收发器或输入/输出接口;当该装置为网络设备或终端设备中包含的芯片时,该通信接口可以是芯片的输入/输出接口。可选的,收发器可以为收发电路,输入/输出接口可以是输入/输出电路。In another possible design, the structure of the device includes a processor and may also include a memory. The processor is coupled with the memory, and can be used to execute the computer program instructions stored in the memory, so that the device executes the above-mentioned first aspect or any one of the possible design methods of the first aspect, or executes the above-mentioned second aspect or the second aspect. The method in any design of the aspect, or the method in the design of the third aspect or the third aspect, or the method in the design of the fourth aspect or the fourth aspect, or the method in the design of the fourth aspect or the fourth aspect The method in the design of the fifth aspect or the fifth aspect, or the method in the design of the sixth aspect or the sixth aspect, or the method in the design of the seventh aspect or the seventh aspect The method in the design, or the method in the design of the eighth aspect or the eighth aspect described above. Optionally, the device further includes a communication interface, and the processor is coupled with the communication interface. When the device is a network device or terminal device, the communication interface may be a transceiver or an input/output interface; when the device is a chip included in the network device or terminal device, the communication interface may be an input/output interface of the chip. Optionally, the transceiver may be a transceiver circuit, and the input/output interface may be an input/output circuit.
第十方面,本申请实施例提供一种芯片系统,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得该芯片系统实现上述第一方面或第一方面的任一种可能的设计中的方法,或实现上述第二方面或第二方面的任一种可能的设计中的方法,或实现上述第三方面或第三方面的任一种可能的设计中的方法,或实现上述第四方面或第四方面的任一种可能的设计中的方法,或实现上述第五方面或第五方面的任一种可能的设计中的方法,或实现上述第六方面或第六方面的任一种可能的设计中的方法,或实现上述第七方面或第七方面的任一种可能的设计中的方法,或实现上述第八方面或第八方面的任一种可能的设计中的方法。In a tenth aspect, an embodiment of the present application provides a chip system, including: a processor, the processor is coupled with a memory, the memory is used to store a program or an instruction, when the program or an instruction is executed by the processor , Enabling the chip system to implement the method in any possible design of the first aspect or the first aspect, or implement the method in any possible design of the second aspect or the second aspect, or implement the method in the foregoing first aspect The method in any possible design of the third aspect or the third aspect, or the method in any possible design of the foregoing fourth aspect or the fourth aspect, or the realization of any of the foregoing fifth aspect or the fifth aspect A method in a possible design, or a method in a possible design that implements the sixth aspect or the sixth aspect, or a method in a possible design that implements the seventh aspect or the seventh aspect , Or implement the eighth aspect or any one of the possible design methods of the eighth aspect.
可选的,该芯片系统还包括接口电路,该接口电路用于交互代码指令至所述处理器。Optionally, the chip system further includes an interface circuit, which is used to exchange code instructions to the processor.
可选的,该芯片系统中的处理器可以为一个或多个,该处理器可以通过硬件实现也可以通过软件实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现。Optionally, there may be one or more processors in the chip system, and the processors may be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
可选的,该芯片系统中的存储器也可以为一个或多个。该存储器可以与处理器集成在一起,也可以和处理器分离设置,本申请并不限定。示例性的,存储器可以是非瞬时性处理器,例如只读存储器ROM,其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请对存储器的类型,以及存储器与处理器的设置方式不作具体限定。Optionally, there may be one or more memories in the chip system. The memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application. Exemplarily, the memory may be a non-transitory processor, such as a read-only memory ROM, which may be integrated with the processor on the same chip, or may be set on different chips. The setting method of the processor is not specifically limited.
第十一方面,本申请实施例提供一种计算机可读存储介质,其上存储有计算机程序或指令,当该计算机程序或指令被执行时,使得计算机执行上述第一方面或第一方面的任一种可能的设计中的方法,或执行上述第二方面或第二方面的任一种可能的设计中的方法,或执行上述第三方面或第三方面的任一种可能的设计中的方法,或执行上述第四方面或第四方面的任一种可能的设计中的方法,或执行上述第五方面或第五方面的任一种可能的设计中的方法,或执行上述第六方面或第六方面的任一种可能的设计中的方法,或执行上述第七方面或第七方面的任一种可能的设计中的方法,或执行上述第八方面或第八方面的任一种可能的设计中的方法。In an eleventh aspect, an embodiment of the present application provides a computer-readable storage medium on which a computer program or instruction is stored. When the computer program or instruction is executed, the computer executes any of the above-mentioned first aspect or the first aspect. A method in a possible design, or a method in any possible design of the second aspect or the second aspect, or a method in any possible design of the third aspect or the third aspect , Or implement the method in any possible design of the foregoing fourth aspect or the fourth aspect, or implement the method in any possible design of the foregoing fifth aspect or the fifth aspect, or implement the foregoing sixth aspect or The method in any possible design of the sixth aspect, or the method in any possible design of the seventh aspect or the seventh aspect above, or the method in any one of the eighth aspect or the eighth aspect described above The method in the design.
第十二方面,本申请实施例提供一种计算机程序产品,当计算机读取并执行所述计算机程序产品时,使得计算机执行上述第一方面或第一方面的任一种可能的设计中的方法,或执行上述第二方面或第二方面的任一种可能的设计中的方法,或执行上述第三方面或第三方面的任一种可能的设计中的方法,或执行上述第四方面或第四方面的任一种可能的设 计中的方法,或执行上述第五方面或第五方面的任一种可能的设计中的方法,或执行上述第六方面或第六方面的任一种可能的设计中的方法,或执行上述第七方面或第七方面的任一种可能的设计中的方法,或执行上述第八方面或第八方面的任一种可能的设计中的方法。In a twelfth aspect, the embodiments of the present application provide a computer program product. When the computer reads and executes the computer program product, the computer executes the first aspect or any one of the possible design methods in the first aspect. , Or implement the method in any possible design of the foregoing second aspect or the second aspect, or implement the method in any of the foregoing third aspect or any possible design of the third aspect, or implement the foregoing fourth aspect or The method in any possible design of the fourth aspect, or the method in any possible design of the fifth aspect or the fifth aspect described above, or the method in any possible design of the sixth aspect or the sixth aspect described above The method in the design, or the method in any possible design of the seventh aspect or the seventh aspect, or the method in any possible design of the eighth aspect or the eighth aspect.
第十三方面,本申请实施例提供一种通信系统,该通信系统包括统一数据管理网元和终端设备。可选的,该终端设备中设置有USIM卡。可选的,通信系统中还可包括接入网设备、接入管理网元、认证服务功能网元、统一数据存储网元中的一项或多项。In a thirteenth aspect, an embodiment of the present application provides a communication system, which includes a unified data management network element and terminal equipment. Optionally, a USIM card is provided in the terminal device. Optionally, the communication system may also include one or more of an access network device, an access management network element, an authentication service function network element, and a unified data storage network element.
附图说明Description of the drawings
图1为本申请实施例适用的一种通信系统的网络架构示意图;FIG. 1 is a schematic diagram of a network architecture of a communication system to which an embodiment of this application is applicable;
图2为本申请实施例提供的一种通信方法的流程示意图;FIG. 2 is a schematic flowchart of a communication method provided by an embodiment of this application;
图3为本申请实施例提供的对AUTN进行校验的示意图;FIG. 3 is a schematic diagram of verifying AUTN provided by an embodiment of the application;
图4a和图4b为本申请实施例提供的AUTS算法的示意图;4a and 4b are schematic diagrams of the AUTS algorithm provided by an embodiment of this application;
图5为本申请实施例提供的通信方法的一个具体示例;FIG. 5 is a specific example of the communication method provided by the embodiment of this application;
图6为本申请实施例提供的另一种通信方法的流程示意图;FIG. 6 is a schematic flowchart of another communication method provided by an embodiment of this application;
图7为本申请实施例提供的又一种通信方法的流程示意图;FIG. 7 is a schematic flowchart of another communication method provided by an embodiment of this application;
图8为本申请实施例提供的通信方法的另一个具体示例;FIG. 8 is another specific example of the communication method provided by the embodiment of this application;
图9为本申请实施例提供的又一种通信方法的流程示意图;FIG. 9 is a schematic flowchart of another communication method provided by an embodiment of this application;
图10为本申请实施例提供的通信方法的又一个具体示例;FIG. 10 is another specific example of the communication method provided by the embodiment of this application;
图11为本申请实施例提供的一种通信装置的结构示意图;FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of this application;
图12为本申请实施例提供的一种通信装置的另一结构示意图;FIG. 12 is another schematic structural diagram of a communication device provided by an embodiment of this application;
图13为本申请实施例提供的另一种通信装置的结构示意图;FIG. 13 is a schematic structural diagram of another communication device provided by an embodiment of this application;
图14为本申请实施例提供的另一种通信装置的另一结构示意图。FIG. 14 is a schematic diagram of another structure of another communication device provided by an embodiment of this application.
具体实施方式Detailed ways
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通信(global system for mobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WIMAX)通信系统、第五代(5th generation,5G)系统或新无线(new radio,NR),或者应用于未来的通信系统或其它类似的通信系统等。The technical solutions of the embodiments of this application can be applied to various communication systems, such as: global system for mobile communications (GSM) system, code division multiple access (CDMA) system, broadband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (GPRS), long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE Time division duplex (TDD), universal mobile telecommunication system (UMTS), worldwide interoperability for microwave access (WIMAX) communication system, fifth generation (5G) The system or new radio (NR), or applied to future communication systems or other similar communication systems, etc.
请参考图1,为本申请实施例适用的一种通信系统的网络架构示意图,该网络架构中包括终端设备、接入网设备、接入管理网元、会话管理网元、用户面网元、策略控制网元、网络切片选择网元、网络仓库功能网元、网络数据分析网元、统一数据管理网元、统一数据存储网元、认证服务功能网元、网络能力开放网元、应用功能网元,以及连接运营商网 络的数据网络(data network,DN)。终端设备可通过接入网设备、用户面网元向数据网络发送业务数据,以及从数据网络接收业务数据。Please refer to FIG. 1, which is a schematic diagram of a network architecture of a communication system to which an embodiment of this application is applicable. The network architecture includes terminal equipment, access network equipment, access management network elements, session management network elements, user plane network elements, Policy control network element, network slicing selection network element, network warehouse function network element, network data analysis network element, unified data management network element, unified data storage network element, authentication service function network element, network capability opening network element, application function network Yuan, and the data network (DN) connected to the operator’s network. The terminal device can send service data to and receive service data from the data network through the access network device and the user plane network element.
其中,终端设备是一种具有无线收发功能的设备,可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等。所述终端设备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音和/或数据。所述终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。本申请的实施例对应用场景不做限定。终端设备有时也可以称为用户设备(user equipment,UE)、移动台和远方站等,本申请的实施例对终端设备所采用的具体技术、设备形态以及名称不做限定。Among them, the terminal device is a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; it can also be deployed on the water (such as ships, etc.); it can also be deployed in the air (such as Airplanes, balloons, satellites, etc. The terminal device can communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN. The terminal device can be a mobile phone (mobile phone). ), tablet computers (Pad), computers with wireless transceiver functions, mobile Internet devices (MID), wearable devices, virtual reality (VR) terminal devices, augmented reality (AR) terminals Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety ( The wireless terminal in transportation safety, the wireless terminal in the smart city, the wireless terminal in the smart home, etc. The embodiments of this application do not limit the application scenarios. Terminal equipment may also be called sometimes For user equipment (UE), mobile stations, remote stations, etc., the embodiments of the present application do not limit the specific technology, device form, and name adopted by the terminal device.
接入网设备,是网络中用于将终端设备接入到无线网络的设备。所述接入网设备可以为无线接入网中的节点,又可以称为基站,还可以称为无线接入网(radio access network,RAN)节点(或设备)。网络设备可以包括长期演进(long term evolution,LTE)系统或演进的LTE系统(LTE-Advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),如传统的宏基站eNB和异构网络场景下的微基站eNB,或者也可以包括第五代移动通信技术(5th generation,5G)新无线(new radio,NR)系统中的下一代节点B(next generation node B,gNB),或者还可以包括无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、传输接收点(transmission reception point,TRP)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU)、基带池BBU pool,或WiFi接入点(access point,AP)等,再或者还可以包括云接入网(cloud radio access network,CloudRAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。在接入网设备包括CU和DU的分离部署场景中,CU支持无线资源控制(radio resource control,RRC)、分组数据汇聚协议(packet data convergence protocol,PDCP)、业务数据适配协议(service data adaptation protocol,SDAP)等协议;DU主要支持无线链路控制层(radio link control,RLC)、媒体接入控制层(media access control,MAC)和物理层协议。Access network equipment is a device used to connect terminal equipment to the wireless network in the network. The access network device may be a node in a radio access network, may also be called a base station, or may be called a radio access network (RAN) node (or device). The network equipment may include the evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the long term evolution (LTE) system or the evolved LTE system (LTE-Advanced, LTE-A), such as the traditional The macro base station eNB and the micro base station eNB in the heterogeneous network scenario may also include the next generation node B (next generation node B) in the new radio (NR) system of the fifth generation mobile communication technology (5th generation, 5G) , GNB), or may also include radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS) , Transmission reception point (TRP), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), baseband pool BBU pool, or WiFi access point ( access point, AP), etc., or may also include the centralized unit (CU) and distributed unit (DU) in the cloud radio access network (CloudRAN) system. This application is implemented The examples are not limited. In a separate deployment scenario where access network equipment includes CU and DU, CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (packet data convergence protocol, PDCP), and service data adaptation protocol (service data adaptation). Protocol, SDAP) and other protocols; DU mainly supports radio link control (RLC), media access control (MAC) and physical layer protocols.
接入管理网元,主要用于移动网络中的终端的附着、移动性管理、跟踪区更新流程,接入管理网元终结了非接入层(non access stratum,NAS)消息、完成注册管理、连接管理以及可达性管理、分配跟踪区域列表(track area list,TA list)以及移动性管理等,并且透明路由会话管理(session management,SM)消息到会话管理网元。在第五代(5th generation,5G)通信系统中,接入管理网元可以是接入与移动性管理功能(access and mobility management function,AMF),在未来的通信系统(如6G通信系统)中,移动性管理网元可以仍是AMF网元,或者也可以具有其它名称,本申请并不限定。The access management network element is mainly used for terminal attachment, mobility management, and tracking area update procedures in the mobile network. The access management network element terminates non-access stratum (NAS) messages, completes registration management, Connection management and reachability management, allocation of tracking area list (track area list, TA list), mobility management, etc., and transparent routing of session management (session management, SM) messages to the session management network element. In the 5th generation (5G) communication system, the access management network element can be the access and mobility management function (AMF). In future communication systems (such as 6G communication systems) , The mobility management network element may still be an AMF network element, or may also have other names, which is not limited in this application.
会话管理网元,主要用于移动网络中的会话管理,如会话建立、修改、释放。具体功能如为终端分配互联网协议(internet protocol,IP)地址、选择提供报文转发功能的用户 面网元等。在5G通信系统中,会话管理网元可以是会话管理功能(session management function,SMF),在未来的通信系统(如6G通信系统)中,会话管理网元可以仍是SMF网元,或者也可以具有其它名称,本申请并不限定。The session management network element is mainly used for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning Internet Protocol (IP) addresses to terminals and selecting user plane network elements that provide message forwarding functions. In a 5G communication system, the session management network element can be a session management function (session management function, SMF). In a future communication system (such as a 6G communication system), the session management network element can still be an SMF network element, or it can be With other names, this application is not limited.
用户面网元,主要用于对用户报文进行处理,如转发、计费、合法监听等。用户面网元也可以称为协议数据单元(protocol data unit,PDU)会话锚点(PDU session anchor,PSA)。在5G通信系统中,用户面网元可以是用户面功能(user plane function,UPF),在未来的通信系统(如6G通信系统)中,用户面网元可以仍是UPF网元,或者也可以具有其它名称,本申请并不限定。User plane network elements are mainly used to process user messages, such as forwarding, charging, and lawful monitoring. The user plane network element may also be referred to as a protocol data unit (PDU) session anchor (PDU) session anchor (PSA). In a 5G communication system, the user plane network element can be a user plane function (UPF). In a future communication system (such as a 6G communication system), the user plane network element can still be a UPF network element, or it can be With other names, this application is not limited.
策略控制网元,包含用户签约数据管理功能、策略控制功能、计费策略控制功能、服务质量(quality of service,QoS)控制等。在5G通信系统中,策略控制网元可以是策略控制功能(policy control function,PCF),在未来的通信系统(如6G通信系统)中,策略控制网元可以仍是PCF网元,或者也可以具有其它名称,本申请并不限定。Policy control network elements include user subscription data management functions, policy control functions, charging policy control functions, quality of service (QoS) control, etc. In a 5G communication system, the policy control network element can be a policy control function (PCF). In a future communication system (such as a 6G communication system), the policy control network element can still be a PCF network element, or it can be With other names, this application is not limited.
认证服务功能网元,主要用于对终端设备进行安全认证。在5G通信系统中,认证服务功能网元可以是认证服务器功能(authentication server function,AUSF),在未来的通信系统(如6G通信系统)中,认证服务功能网元可以仍是AUSF网元,或者也可以具有其它名称,本申请并不限定。The authentication service function network element is mainly used for security authentication of terminal equipment. In a 5G communication system, the authentication service function network element may be an authentication server function (authentication server function, AUSF). In future communication systems (such as 6G communication systems), the authentication service function network element may still be an AUSF network element, or It can also have other names, and this application is not limited.
统一数据管理网元,主要用于管理终端设备的签约信息。例如,在认证过程中,执行认证向量的计算、密钥推演、用户标识解密等,在重同步流程中,根据相应的算法校验AUTS,发起重新认证流程。在5G通信系统中,统一数据管理网元可以是统一数据管理(unified data management,UDM),在未来的通信系统(如6G通信系统)中,统一数据管理网元可以仍是UDM网元,或者也可以具有其它名称,本申请并不限定。The unified data management network element is mainly used to manage the contract information of the terminal equipment. For example, in the authentication process, the calculation of the authentication vector, key deduction, user identification decryption, etc. are performed. In the resynchronization process, the AUTS is checked according to the corresponding algorithm, and the re-authentication process is initiated. In the 5G communication system, the unified data management network element may be unified data management (UDM). In the future communication system (such as 6G communication system), the unified data management network element may still be a UDM network element, or It can also have other names, and this application is not limited.
统一数据存储网元,主要用于存储结构化的数据信息,其中包括签约信息、策略信息,以及有标准格式定义的网络数据或业务数据。在5G通信系统中,统一数据存储网元可以是统一数据存储(unified data repository,UDR),在未来的通信系统(如6G通信系统)中,统一数据存储网元可以仍是UDR网元,或者也可以具有其它名称,本申请并不限定。The unified data storage network element is mainly used to store structured data information, including contract information, policy information, and network data or business data defined in a standard format. In a 5G communication system, the unified data storage network element can be a unified data repository (UDR). In future communication systems (such as 6G communication systems), the unified data storage network element can still be a UDR network element, or It can also have other names, and this application is not limited.
网络切片选择功能网元,主要用于为终端设备的业务选择合适的网络切片。在5G通信系统中,网络切片选择网元可以是网络切片选择功能(network slice selection function,NSSF)网元,在未来的通信系统(如6G通信系统)中,网络切片选择网元可以仍是NSSF网元,或者也可以具有其它名称,本申请并不限定。The network slice selection function network element is mainly used to select a suitable network slice for the service of the terminal device. In a 5G communication system, the network slice selection network element can be a network slice selection function (NSSF) network element. In future communication systems (such as 6G communication systems), the network slice selection network element can still be NSSF The network element may also have other names, which is not limited in this application.
网络仓库功能网元,主要用于提供网元或网元所提供服务的注册和发现功能。在5G通信系统中,网络仓库功能网元可以是网络仓库功能(network repository function,NRF),在未来的通信系统(如6G通信系统)中,网络仓库功能网元可以仍是NRF网元,或者也可以具有其它名称,本申请并不限定。The network element of the network warehouse function is mainly used to provide the registration and discovery functions of the network element or the service provided by the network element. In a 5G communication system, the network warehouse function network element can be a network repository function (NRF). In a future communication system (such as a 6G communication system), the network warehouse function network element can still be an NRF network element, or It can also have other names, and this application is not limited.
网络数据分析网元,可以从各个网络功能(network function,NF),例如策略控制网元、会话管理网元、用户面网元、接入管理网元、应用功能网元(通过网络能力开放功能网元)收集数据,并进行分析和预测。在5G通信系统中,网络数据分析网元可以是网络数据分析功能(network data analytics function,NWDAF),在未来的通信系统(如6G通信系统)中,网络数据分析网元可以仍是NWDAF网元,或者也可以具有其它名称,本申请并不限定。Network data analysis network elements can be based on various network functions (network functions, NF), such as policy control network elements, session management network elements, user plane network elements, access management network elements, application function network elements (through network capability opening functions) Network element) collect data, and analyze and predict. In the 5G communication system, the network data analysis network element can be the network data analysis function (NWDAF). In the future communication system (such as 6G communication system), the network data analysis network element can still be the NWDAF network element , Or may have other names, and this application is not limited.
网络能力开放网元,可以将网络的部分功能有控制地暴露给应用。在5G通信系统中, 网络能力开放网元可以是网络能力开放功能(network exposure function,NEF),在未来的通信系统(如6G通信系统)中,网络能力开放网元可以仍是NEF网元,或者也可以具有其它名称,本申请并不限定。The network capability opening network element can expose part of the network functions to the application in a controlled manner. In a 5G communication system, the network capability opening network element may be a network exposure function (NEF). In a future communication system (such as a 6G communication system), the network capability opening network element may still be a NEF network element. Or it may have other names, which is not limited in this application.
应用功能网元,可以向运营商的通信网络的控制面网元提供各类应用的服务数据,或者从通信网络的控制面网元获得网络的数据信息和控制信息。在5G通信系统中,应用功能网元可以是应用功能(application function,AF),在未来的通信系统(如6G通信系统)中,应用功能网元可以仍是AF网元,或者也可以具有其它名称,本申请并不限定。The application function network element can provide service data of various applications to the control plane network element of the communication network of the operator, or obtain network data information and control information from the control plane network element of the communication network. In a 5G communication system, the application function network element may be an application function (AF). In a future communication system (such as a 6G communication system), the application function network element may still be an AF network element, or may also have other functions. The name is not limited in this application.
数据网络,主要用于为终端设备提供数据传输服务。数据网络可以是私有网络,如局域网,也可以是公用数据网(public data network,PDN)网络,如因特网(Internet),还可以是运营商共同部署的专有网络,如配置的IP多媒体网络子系统(IP multimedia core network subsystem,IMS)服务。Data network is mainly used to provide data transmission services for terminal equipment. The data network can be a private network, such as a local area network, or a public data network (PDN) network, such as the Internet (Internet), or a private network jointly deployed by operators, such as a configured IP multimedia network. System (IP multimedia core network subsystem, IMS) service.
应理解,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。It should be understood that the foregoing network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
为方便说明,本申请后续,以统一数据管理网元为UDM网元,认证服务功能网元为AUSF网元,接入管理网元为AMF网元,为例进行说明。进一步地,将UDM网元简称为UDM,AUSF网元简称为AUSF,AMF网元简称为AMF。即本申请后续所描述的UDM均可替换为统一数据管理网元,AUSF均可替换为认证服务功能网元,AMF均可替换为接入管理网元。For the convenience of explanation, in the follow-up of this application, the unified data management network element is the UDM network element, the authentication service function network element is the AUSF network element, and the access management network element is the AMF network element. Further, the UDM network element is abbreviated as UDM, the AUSF network element is abbreviated as AUSF, and the AMF network element is abbreviated as AMF. That is, the UDM described later in this application can be replaced with a unified data management network element, AUSF can be replaced with an authentication service function network element, and AMF can be replaced with an access management network element.
需要说明的是,本申请实施例中的术语“系统”和“网络”可被互换使用。“多个”是指两个或两个以上,鉴于此,本申请实施例中也可以将“多个”理解为“至少两个”。“至少一个”,可理解为一个或多个,例如理解为一个、两个或更多个。例如,包括至少一个,是指包括一个、两个或更多个,而且不限制包括的是哪几个。例如,包括A、B和C中的至少一个,那么包括的可以是A、B、C,A和B,A和C,B和C,或A和B和C。同理,对于“至少一种”等描述的理解,也是类似的。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,字符“/”,如无特殊说明,一般表示前后关联对象是一种“或”的关系。It should be noted that the terms "system" and "network" in the embodiments of the present application can be used interchangeably. "Multiple" refers to two or more than two. In view of this, "multiple" may also be understood as "at least two" in the embodiments of the present application. "At least one" can be understood as one or more, for example, one, two or more. For example, including at least one means including one, two or more, and it does not limit which ones are included. For example, if at least one of A, B, and C is included, then A, B, C, A and B, A and C, B and C, or A and B and C are included. In the same way, the understanding of "at least one" and other descriptions is similar. "And/or" describes the association relationship of the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. In addition, the character "/", unless otherwise specified, generally indicates that the associated objects before and after are in an "or" relationship.
除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度,并且“第一”、“第二”的描述也并不限定对象一定不同。Unless otherwise stated, ordinal numbers such as "first" and "second" mentioned in the embodiments of this application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects. In addition, the descriptions of "first" and "second" do not limit the objects to be different.
实施例一Example one
请参考图2,为本申请实施例提供的一种通信方法的流程示意图,该方法具体包括如下步骤:Please refer to FIG. 2, which is a schematic flowchart of a communication method provided by an embodiment of this application. The method specifically includes the following steps:
步骤S201、UDM接收认证服务请求;Step S201: UDM receives an authentication service request;
可选的,该认证服务请求中包括重同步认证令牌AUTS,该AUTS用于指示终端设备确定认证令牌(authentication token,AUTN)中的序列号SQN不在正确范围内。Optionally, the authentication service request includes a resynchronization authentication token AUTS, and the AUTS is used to instruct the terminal device to determine that the serial number SQN in the authentication token (authentication token, AUTN) is not within the correct range.
本申请实施例中,在一种实施方式中,UDM可从AMF或AUSF接收认证服务请求。也就是说,AMF可以直接向UDM发送认证服务请求,也可以将认证服务请求先发送给AUSF,然后由AUSF将该认证服务请求再转发给终端设备。In the embodiment of the present application, in an implementation manner, the UDM may receive the authentication service request from the AMF or AUSF. In other words, the AMF can directly send the authentication service request to the UDM, or it can first send the authentication service request to the AUSF, and then the AUSF forwards the authentication service request to the terminal device.
可选的,UDM也可从其他网络功能NF接收认证服务请求,本申请并不限定。Optionally, UDM may also receive authentication service requests from other network functions NF, which is not limited in this application.
进一步地,本申请实施例可应用在终端设备的认证鉴权的过程中,所述终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内可以是指,终端设备确定认证令牌AUTN中的序列号小于或等于终端设备中保存的序列号SQN MSFurther, the embodiments of the present application can be applied to the authentication process of the terminal device. The terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range may mean that the terminal device determines that the authentication token AUTN is in the correct range. The serial number of is less than or equal to the serial number SQN MS stored in the terminal device.
具体的,在执行步骤S201之前,终端设备可从AMF接收认证请求消息,该认证请求消息中包括随机数RAND和认证令牌AUTN,该认证令牌AUTN中又具体包括序列号SQN、匿名密钥(anonymity key,AK)、认证管理域(authentication and key agreement,AMF)、消息认证码(message authentication code,MAC)等参数。终端设备可对该认证请求消息中包括的认证令牌AUTN进行校验,若终端设备校验认证令牌AUTN中的序列号SQN不在正确范围内,那么终端设备可生成重同步认证令牌AUTS,并向AMF发送认证失败消息,在该认证失败消息中携带计算的重同步认证令牌AUTS,该AUTS用于指示终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内。随后,AMF从终端设备接收认证失败消息后,可向UDM或AUSF发送认证服务请求,该认证服务请求中包括终端设备计算的重同步认证令牌AUTS。Specifically, before step S201 is performed, the terminal device may receive an authentication request message from AMF. The authentication request message includes a random number RAND and an authentication token AUTN. The authentication token AUTN specifically includes a serial number SQN and an anonymous key. (anonymity key, AK), authentication management domain (authentication and key agreement, AMF), message authentication code (message authentication code, MAC) and other parameters. The terminal device can verify the authentication token AUTN included in the authentication request message. If the terminal device verifies that the serial number SQN in the authentication token AUTN is not within the correct range, the terminal device can generate a resynchronization authentication token AUTS, It also sends an authentication failure message to the AMF. The authentication failure message carries the calculated resynchronization authentication token AUTS, which is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range. Subsequently, after the AMF receives the authentication failure message from the terminal device, it can send an authentication service request to the UDM or AUSF. The authentication service request includes the resynchronization authentication token AUTS calculated by the terminal device.
可选的,终端设备中可安装有全球用户标识模块(universal subscriber identity module,USIM)卡,该USIM卡是指运营商发给用户的电话卡,其中保存有与归属网络侧一致的根密钥K和一系列签约配置信息等。终端设备从AMF接收认证请求消息后,可将其中的随机数RAND和认证令牌AUTN发送给终端设备中的USIM卡,由该USIM卡对认证令牌AUTN进行校验。Optionally, a universal subscriber identity module (USIM) card may be installed in the terminal device. The USIM card refers to a phone card issued by the operator to the user, and the root key K that is consistent with the home network side is stored in it. And a series of contract configuration information, etc. After receiving the authentication request message from the AMF, the terminal device can send the random number RAND and the authentication token AUTN therein to the USIM card in the terminal device, and the USIM card verifies the authentication token AUTN.
如图3所示,USIM卡可首先根据认证令牌AUTN、随机数RAND和根密钥K计算期望的消息认证码(expected message authentication code,XMAC),然后将得到的XMAC与认证令牌AUTN中的MAC进行对比。若XMAC与MAC不一致,则表示MAC校验失败,终端设备可向AMF发送认证失败消息,并在该认证失败消息中指示具体的失败原因为MAC失败(MAC failure),然后由AMF根据该认证失败消息发起重认证过程。As shown in Figure 3, the USIM card can first calculate the expected message authentication code (XMAC) based on the authentication token AUTN, the random number RAND, and the root key K, and then combine the obtained XMAC with the authentication token AUTN MAC for comparison. If the XMAC and MAC are inconsistent, it means that the MAC verification has failed. The terminal device can send an authentication failure message to AMF, and indicate the specific failure reason as MAC failure (MAC failure) in the authentication failure message, and then AMF based on the authentication failure The message initiates the re-authentication process.
若XMAC与MAC一致,则表示MAC校验成功,USIM卡可进一步校验认证令牌AUTN中的序列号SQN。USIM卡可将认证令牌AUTN中的序列号SQN与USIM卡中保存的序列号SQN MS进行对比,若认证令牌AUTN中的SQN超出正确范围,即认证令牌AUTN中的序列号SQN小于或等于USIM卡中保存的序列号SQN MS,那么可认为SQN校验失败,USIM卡可计算AUTS,随后终端设备可向AMF发送认证失败消息,在该认证失败消息中指示具体的失败原因为同步失败(synch failure),该认证失败消息中还包括USIM卡在校验SQN失败后计算的重同步认证令牌AUTS,该AUTS用于指示USIM卡确定AUTN中的序列号SQN不在正确范围内。可选的,该认证失败消息中还可包括随机数RAND。 If the XMAC is consistent with the MAC, it means that the MAC verification is successful, and the USIM card can further verify the serial number SQN in the authentication token AUTN. The USIM card can compare the serial number SQN in the authentication token AUTN with the serial number SQN MS stored in the USIM card. If the SQN in the authentication token AUTN is out of the correct range, that is, the serial number SQN in the authentication token AUTN is less than or Equal to the serial number SQN MS stored in the USIM card, then it can be considered that the SQN verification failed, the USIM card can calculate AUTS, and then the terminal device can send an authentication failure message to the AMF, and the authentication failure message indicates that the specific failure reason is synchronization failure (synch failure), the authentication failure message also includes the resynchronization authentication token AUTS calculated by the USIM card after the SQN verification fails, and the AUTS is used to instruct the USIM card to determine that the serial number SQN in the AUTN is not within the correct range. Optionally, the authentication failure message may also include a random number RAND.
本申请实施例中,终端设备(或USIM卡)可采用多种可能的AUTS算法来计算AUTS,请参考图4a,为本申请实施例提供的一种AUTS算法的示意图,在该AUTS算法中,AUTS满足如下关系:In the embodiment of this application, the terminal device (or USIM card) can use multiple possible AUTS algorithms to calculate AUTS. Please refer to FIG. 4a, which is a schematic diagram of an AUTS algorithm provided in this embodiment of the application. In the AUTS algorithm, AUTS satisfies the following relationship:
Figure PCTCN2020122866-appb-000001
Figure PCTCN2020122866-appb-000001
由公式一可知,AUTS等于SQN MS与AK的异或,然后再拼接上MAC-S。其中,SQN MS为终端设备序列号,或者也可以理解为USIM卡已接受的最高序列号,
Figure PCTCN2020122866-appb-000002
或xor表示异或,AK为匿名密钥,且AK=f5*(RAND,K),f5*()表示一函数,RAND和K为该函数的参数,RAND为随机数,K为根密钥,∥表示拼接,MAC-S为USIM卡计算的消息认证 码,用于实现对SQN MS的加密和完整性保护,且MAC-S=f1*(SQN MS,K,RAND,AMF),f1*()为另一函数,AMF为认证管理域。
It can be seen from formula one that AUTS is equal to the exclusive OR of SQN MS and AK, and then the MAC-S is spliced. Among them, SQN MS is the serial number of the terminal device, or it can also be understood as the highest serial number accepted by the USIM card.
Figure PCTCN2020122866-appb-000002
Or xor means exclusive OR, AK is an anonymous key, and AK=f5*(RAND, K), f5*() means a function, RAND and K are the parameters of the function, RAND is a random number, and K is the root key , ∥ means splicing, MAC-S is the message authentication code calculated by the USIM card, used to realize the encryption and integrity protection of SQN MS , and MAC-S=f1*(SQN MS , K, RAND, AMF), f1* () is another function, and AMF is the authentication management domain.
请参考图4b,为本申请实施例提供的另一种AUTS算法的示意图,在该AUTS算法中,AUTS同样满足公式一中的关系:
Figure PCTCN2020122866-appb-000003
Please refer to Fig. 4b, which is a schematic diagram of another AUTS algorithm provided by an embodiment of this application. In the AUTS algorithm, AUTS also satisfies the relationship in Formula 1:
Figure PCTCN2020122866-appb-000003
但应注意,图4b中所示的AUTS算法与图4a中所示的AUTS算法的区别在于,计算匿名密钥AK时还将MAC-S作为输入,即AK=f5*(RAND,K,MAC-S),对应于图4b中所示的虚线连接,因此,该AUTS算法可有效防止针对SQN的猜测攻击。However, it should be noted that the difference between the AUTS algorithm shown in Figure 4b and the AUTS algorithm shown in Figure 4a is that MAC-S is also used as input when calculating the anonymous key AK, that is, AK=f5*(RAND, K, MAC -S), corresponding to the dashed connection shown in Figure 4b, therefore, the AUTS algorithm can effectively prevent guessing attacks against SQN.
步骤S202、UDM获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法。Step S202: The UDM obtains indication information corresponding to the terminal device, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS.
本申请实施例中,所述指示信息可与终端设备的标识或USIM卡的标识或用户标识(例如签约永久标识(subscription permanent identifier,SUPI)、国际移动用户识别码(international mobile subscriber identification number,IMSI)、通用公共签约标识(generic public subscription identifier,GPSI)等)相关联,用于直接或间接的指示终端设备(或USIM卡)计算重同步认证令牌AUTS所采用的第一AUTS算法。例如,该指示信息可以为终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识,或者该指示信息中可以包括终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识,或者该指示信息与终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识之间存在着某种映射关系,或者该指示信息也可以用于指示终端设备(或USIM卡)是否支持新的AUTS算法,或者该指示信息还可以用于指示USIM卡是否为新卡,再或者该指示信息还可以为USIM卡的类型或批次或版本(release)等信息。应理解,所述第一AUTS算法可以是上文中所描述的两种AUTS算法中的一种,也可以是其他的AUTS算法,本申请并不限定。In the embodiment of this application, the indication information may be combined with the identification of the terminal device or the identification of the USIM card or the user identification (such as subscription permanent identifier (SUPI), international mobile subscriber identification number, IMSI). ), a generic public subscription identifier (GPSI, etc.) is associated, and is used to directly or indirectly instruct the terminal device (or USIM card) to calculate the first AUTS algorithm used by the resynchronization authentication token AUTS. For example, the indication information may be the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information may include the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS. Identification, or there is a certain mapping relationship between the indication information and the identification of the first AUTS algorithm used by the terminal equipment (or USIM card) to calculate AUTS, or the indication information can also be used to indicate the terminal equipment (or USIM card) Whether to support the new AUTS algorithm, or the indication information may also be used to indicate whether the USIM card is a new card, or the indication information may also be information such as the type or batch or release of the USIM card. It should be understood that the first AUTS algorithm may be one of the two AUTS algorithms described above, or may be another AUTS algorithm, which is not limited in this application.
在一种可能的设计中,终端设备对应的指示信息可预先配置在UDM中。如此,UDM接收认证失败消息后,可根据终端设备的标识或USIM卡的标识或用户标识,例如SUPI,从本地配置中获取或查询终端设备对应的指示信息,然后根据该指示信息确定终端设备(或USIM卡)计算AUTS采用的第一AUTS算法。In a possible design, the indication information corresponding to the terminal device may be pre-configured in the UDM. In this way, after UDM receives the authentication failure message, it can obtain or query the indication information corresponding to the terminal equipment from the local configuration according to the identification of the terminal equipment or the identification of the USIM card or the user identification, such as SUPI, and then determine the terminal equipment ( Or USIM card) the first AUTS algorithm used to calculate AUTS.
可选的,终端设备对应的指示信息可包含在终端设备的签约数据中,该签约数据也可以称为用户签约数据。也就是说,UDM中保存有终端设备的用户签约数据,运营商可预先在终端设备的用户签约数据中设置上述指示信息,从而直接或间接的指示出终端设备(或USIM卡)计算AUTS采用的第一AUTS算法。Optionally, the indication information corresponding to the terminal device may be included in the subscription data of the terminal device, and the subscription data may also be referred to as user subscription data. That is to say, the user subscription data of the terminal device is stored in the UDM, and the operator can set the above-mentioned indication information in the user subscription data of the terminal device in advance, thereby directly or indirectly instructing the terminal device (or USIM card) to calculate the AUTS used The first AUTS algorithm.
可选的,UDM中也可以维护用户粒度的签约特性列表,用于指示终端设备(或USIM卡)支持或不支持哪些特性,例如,是否支持新的AUTS算法,或USIM卡的类型、批次或版本信息等。UDM也可以根据该终端设备对应的签约特性列表中列出的该终端设备支持的特性,确定该终端设备(或USIM卡)计算AUTS时采用的第一AUTS算法。即,终端设备对应的签约特性列表也可以理解为上述指示信息的一种具体实施方式。Optionally, a user-granular subscription feature list can also be maintained in UDM, which is used to indicate which features the terminal device (or USIM card) supports or does not support, for example, whether to support the new AUTS algorithm, or the type and batch of the USIM card Or version information, etc. The UDM may also determine the first AUTS algorithm used by the terminal device (or USIM card) when calculating AUTS according to the features supported by the terminal device listed in the subscription feature list corresponding to the terminal device. That is, the subscription feature list corresponding to the terminal device can also be understood as a specific implementation manner of the foregoing indication information.
在另一种可能的设计中,终端设备对应的指示信息也可以配置在UDR中,UDM接收到认证服务请求后,可从UDR获取该终端设备对应的指示信息。In another possible design, the indication information corresponding to the terminal device may also be configured in the UDR. After the UDM receives the authentication service request, the indication information corresponding to the terminal device may be obtained from the UDR.
例如,UDR中可保存有终端设备的用户签约数据,运营商可预先在终端设备的用户签约数据中设置上述指示信息。如此,UDM接收认证服务请求后,可根据终端设备的标识或USIM卡的标识或用户标识,向UDR发送服务调用请求,该服务调用请求用于请求终端设备的用户签约数据。可选的,该服务调用请求中可包括终端设备的标识或USIM卡的 标识或用户标识,该服务调用请求也可以称为服务请求或服务请求消息或服务调用请求消息等,本申请并不限定。For example, the user subscription data of the terminal device may be stored in the UDR, and the operator may set the above-mentioned indication information in the user subscription data of the terminal device in advance. In this way, after the UDM receives the authentication service request, it can send a service invocation request to the UDR according to the terminal device's identity or the USIM card's identity or the user's identity. The service invocation request is used to request user subscription data of the terminal device. Optionally, the service invocation request may include the identification of the terminal device or the identification of the USIM card or the user identification. The service invocation request may also be called a service request or a service request message or a service invocation request message, etc., which is not limited in this application .
UDR可接收该服务调用请求,并向UDM发送服务响应,其中,该服务响应是响应于UDM发送的服务调用请求,且该服务响应中包括终端设备对应的指示信息,该指示信息可以包含在该服务响应中的终端设备的用户签约数据中,也可以包含在服务响应消息的其他信元或新增信元中,本申请并不限定。可选的,服务响应中还可以包含终端设备对应的签约特性列表。UDR may receive the service invocation request and send a service response to UDM, where the service response is in response to the service invocation request sent by UDM, and the service response includes indication information corresponding to the terminal device, and the indication information may be included in the The user subscription data of the terminal device in the service response may also be included in other information elements or newly added information elements of the service response message, which is not limited by this application. Optionally, the service response may also include a list of subscription characteristics corresponding to the terminal device.
应理解,终端设备对应的指示信息也可以独立配置在UDR中,而不包含在终端设备的用户签约数据中。如此,UDM向UDR发送的服务调用请求可用于请求终端设备对应的指示信息,相应的,UDR向UDM返回的服务响应中可包括终端设备对应的指示信息,不包括终端设备的用户签约数据。可选的,该服务响应中还可以包含终端设备对应的签约特性列表。It should be understood that the indication information corresponding to the terminal device may also be independently configured in the UDR and not included in the user subscription data of the terminal device. In this way, the service invocation request sent by the UDM to the UDR can be used to request the indication information corresponding to the terminal device. Accordingly, the service response returned by the UDR to the UDM may include the indication information corresponding to the terminal device, excluding the user subscription data of the terminal device. Optionally, the service response may also include a list of subscription characteristics corresponding to the terminal device.
步骤S203、UDM根据第一AUTS算法对AUTS进行校验。Step S203: The UDM checks the AUTS according to the first AUTS algorithm.
可选的,UDM可根据认证服务请求中包括的终端设备的标识和在步骤S202中获取的终端设备对应的指示信息,确定第一AUTS算法。Optionally, the UDM may determine the first AUTS algorithm according to the identification of the terminal device included in the authentication service request and the indication information corresponding to the terminal device obtained in step S202.
具体的,UDM采用第一AUTS算法对AUTS进行校验可包括:采用第一AUTS算法从AUTS中获取移动终端序列号SQN MS,然后计算MAC,若计算的该MAC与AUTS中包括的MAC-S一致,则表示AUTS校验成功。 Specifically, the UDM using the first AUTS algorithm to verify the AUTS may include: using the first AUTS algorithm to obtain the mobile terminal serial number SQN MS from the AUTS, and then calculate the MAC, if the calculated MAC and the MAC-S included in the AUTS Consistent, it means that the AUTS verification is successful.
若对AUTS校验成功,UDM可对网络侧保存的SQN进行重同步,然后使用重同步后的SQN重新发起针对终端设备的认证流程。If the AUTS verification is successful, UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
由此可知,通过在UDM或UDR中设置终端设备对应的指示信息,UDM可识别终端设备(或USIM卡)计算AUTS时所采用的AUTS算法,并采用与终端设备(或USIM卡)一致的AUTS算法来对终端设备计算的AUTS进行校验,从而避免UDM与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行。It can be seen that by setting the instruction information corresponding to the terminal device in the UDM or UDR, UDM can identify the AUTS algorithm used by the terminal device (or USIM card) when calculating AUTS, and use the AUTS consistent with the terminal device (or USIM card) The algorithm is used to verify the AUTS calculated by the terminal device, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm adopted by the UDM and the terminal device, so that the resynchronization process and the subsequent terminal device authentication process can be performed normally.
请参考图5,为本申请实施例一中提供的通信方法的一个具体示例,该示例中具体包括如下步骤:步骤S5001,在UDM中保存的终端设备的用户签约数据中配置指示信息,该指示信息用于指示终端设备(或USIM卡)计算AUTS采用的第一AUTS算法,例如,该指示信息可以为终端设备(USIM卡)采用的第一AUTS算法的标识,或者该指示信息中可以包括终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识,或者该指示信息与终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识之间存在着某种映射关系,或者该指示信息也可以为用于指示终端设备(或USIM卡)是否支持新的AUTS算法的信息,或者该指示信息也可以为用于指示USIM卡是否为新卡的信息,或者该指示信息还可以为USIM卡的类型或批次或版本等信息,或者该指示信息还可以为终端设备(或USIM卡)的签约特性列表。应理解,该步骤S5001对应于实施例一中的一种具体实施方式,即在UDM中配置终端设备对应的指示信息。Please refer to FIG. 5, which is a specific example of the communication method provided in the first embodiment of this application. The example specifically includes the following steps: Step S5001, configure indication information in the user subscription data of the terminal device stored in the UDM, the indication The information is used to instruct the terminal equipment (or USIM card) to calculate the first AUTS algorithm used by AUTS. For example, the indication information may be the identification of the first AUTS algorithm used by the terminal equipment (USIM card), or the indication information may include the terminal The device (or USIM card) calculates the identity of the first AUTS algorithm used by the AUTS, or there is a certain mapping relationship between the indication information and the identity of the first AUTS algorithm used by the terminal device (or USIM card) to calculate the AUTS, Or the indication information may also be information indicating whether the terminal device (or USIM card) supports the new AUTS algorithm, or the indication information may also be information indicating whether the USIM card is a new card, or the indication information may also It can be information such as the type or batch or version of the USIM card, or the indication information can also be a list of subscription features of the terminal device (or the USIM card). It should be understood that this step S5001 corresponds to a specific implementation in the first embodiment, that is, the indication information corresponding to the terminal device is configured in the UDM.
步骤S5002,在UDR中保存的终端设备的用户签约数据中配置指示信息,或者,在UDR中的其他信息中配置指示信息,或者,在UDR中独立地配置指示信息。同样的,该指示信息用于指示终端设备(或USIM卡)采用的第一AUTS算法。该指示信息的具体实施方式可参考步骤S5001中的描述。In step S5002, the indication information is configured in the user subscription data of the terminal device stored in the UDR, or the indication information is configured in other information in the UDR, or the indication information is configured independently in the UDR. Similarly, the indication information is used to indicate the first AUTS algorithm adopted by the terminal device (or USIM card). For the specific implementation manner of the indication information, reference may be made to the description in step S5001.
步骤S501,UDM从UDR获取终端设备的用户签约数据,该用户签约数据中包括上述终端设备对应的指示信息。该步骤S501又可具体包括UDM向UDR发送服务调用请求,UDR响应于该服务调用请求,向UDM发送服务响应消息等步骤,在此不再详细描述。所述“获取”也可以理解为查询、调用、接收等动作。In step S501, the UDM obtains user subscription data of the terminal device from the UDR, and the user subscription data includes the above-mentioned indication information corresponding to the terminal device. This step S501 may specifically include the steps of UDM sending a service invocation request to UDR, and UDR in response to the service invocation request, sending a service response message to UDM, etc., which will not be described in detail here. The "acquisition" can also be understood as actions such as querying, invoking, and receiving.
应理解,步骤S5002和步骤S501对应于实施例一中的另一种具体实施方式,即在UDR中配置终端设备的指示信息。如此可见,步骤S5001与步骤S5002、步骤S501中所示的方法是两种并列的具体实施方式,在实际应用中,两条路径中有一条路径被执行即可。It should be understood that step S5002 and step S501 correspond to another specific implementation manner in the first embodiment, that is, the instruction information of the terminal device is configured in the UDR. It can be seen that the methods shown in step S5001, step S5002 and step S501 are two parallel specific implementations. In practical applications, one of the two paths can be executed.
步骤S502,执行终端设备与UDM之间的认证过程(authentication procedure)。其中包括:AMF向终端设备发送认证请求消息,该认证请求消息中包括随机数RAND和认证令牌AUTN。In step S502, an authentication procedure (authentication procedure) between the terminal device and the UDM is executed. This includes: the AMF sends an authentication request message to the terminal device, and the authentication request message includes the random number RAND and the authentication token AUTN.
步骤S503,终端设备校验认证令牌AUTN中序列号SQN,若校验SQN不在正确范围内,那么终端设备计算重同步认证令牌AUTS,并发起重同步流程。可选的,终端设备还可校验认证令牌AUTN中的消息认证码MAC,且校验消息认证码MAC可以在校验序列号SQN之前进行。可选的,校验消息认证码MAC和序列号SQN,以及计算重同步认证令牌AUTS的动作,也可以由终端设备中的USIM卡执行。Step S503: The terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not within the correct range, the terminal device calculates the resynchronization authentication token AUTS and initiates the resynchronization process. Optionally, the terminal device may also verify the message authentication code MAC in the authentication token AUTN, and the verification of the message authentication code MAC may be performed before the verification of the serial number SQN. Optionally, the actions of verifying the message authentication code MAC and the serial number SQN and calculating the resynchronization authentication token AUTS can also be performed by the USIM card in the terminal device.
步骤S504,终端设备向AMF发送认证失败消息(authentication failure),该认证失败消息中包括重同步认证令牌AUTS和随机数RAND。Step S504: The terminal device sends an authentication failure message to the AMF. The authentication failure message includes the resynchronization authentication token AUTS and the random number RAND.
步骤S505,AMF向AUSF发送认证服务请求,该认证服务请求中包括重同步认证令牌AUTS和随机数RAND。可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。应理解,此步骤中所述的认证服务请求为网元之间的服务调用消息,还可以被称为服务请求消息或服务调用请求消息等,或者还可以具有其他名称,例如Nauf_UEAuthentication_Authenticate request,本申请并不限定。In step S505, the AMF sends an authentication service request to AUSF. The authentication service request includes the resynchronization authentication token AUTS and the random number RAND. Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI. It should be understood that the authentication service request described in this step is a service invocation message between network elements, which may also be called a service request message or a service invocation request message, etc., or may also have other names, such as Nauf_UEAuthentication_Authenticate request. This application Not limited.
步骤S506,AUSF向UDM发送认证服务请求,该认证服务请求中包括重同步认证令牌AUTS和随机数RAND。可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。应理解,该步骤中所述的认证服务请求也是网元之间的服务调用消息,还可以被称为服务请求消息或服务调用请求消息等,或者也可以具有其他名称,例如Nudm_UEAuthentication_GET,本申请并不限定。步骤S505与步骤S506中所提及的认证服务请求表述形式和内容可以相同或不同,本申请并不限定。Step S506: AUSF sends an authentication service request to UDM, and the authentication service request includes the resynchronization authentication token AUTS and the random number RAND. Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI. It should be understood that the authentication service request described in this step is also a service invocation message between network elements. It may also be called a service request message or a service invocation request message, etc., or may have other names, such as Nudm_UEAuthentication_GET. This application does not Not limited. The expression form and content of the authentication service request mentioned in step S505 and step S506 may be the same or different, and this application is not limited.
步骤S507,UDM接收认证服务请求,根据终端设备的标识或USIM卡的标识或用户标识,例如SUPI,查询用户签约数据,确定终端设备对应的指示信息,进而根据该指示信息,确定终端设备(或USIM卡)计算AUTS采用的第一AUTS算法。In step S507, the UDM receives the authentication service request, and according to the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI, queries the user subscription data, determines the instruction information corresponding to the terminal device, and then determines the terminal device (or USIM card) the first AUTS algorithm used to calculate AUTS.
步骤S508,UDM根据第一AUTS算法对AUTS进行校验,校验成功后,重同步SQN。In step S508, the UDM checks the AUTS according to the first AUTS algorithm, and after the check succeeds, resynchronizes the SQN.
步骤S509,重新执行终端设备与UDM之间的认证过程。Step S509: re-execute the authentication process between the terminal device and the UDM.
实施例二Example two
请参考图6,为本申请实施例提供的另一种通信方法的流程示意图,该方法具体包括如下步骤:Please refer to FIG. 6, which is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
步骤S601、终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内。Step S601: The terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range.
本申请实施例中,在执行步骤S601之前,终端设备可从AMF接收认证请求消息,该认证请求消息中包括随机数RAND和认证令牌AUTN,该认证令牌AUTN中可具体包括 序列号SQN、匿名密钥AK、认证管理域AMF、消息认证码MAC等参数。如此,终端设备(或终端设备中的USIM卡)可对认证请求消息中的认证令牌AUTN进行校验,若校验认证令牌AUTN中的序列号SQN不在正确范围内,例如认证令牌AUTN中的序列号SQN小于或等于终端设备(或USIM卡)中保存的序列号SQN MS,则可认为SQN校验失败。 In the embodiment of the present application, before step S601 is performed, the terminal device may receive an authentication request message from the AMF. The authentication request message includes the random number RAND and the authentication token AUTN. The authentication token AUTN may specifically include the serial number SQN, Anonymous key AK, authentication management domain AMF, message authentication code MAC and other parameters. In this way, the terminal device (or the USIM card in the terminal device) can verify the authentication token AUTN in the authentication request message. If the serial number SQN in the verification token AUTN is not in the correct range, for example, the authentication token AUTN If the serial number SQN in is less than or equal to the serial number SQN MS stored in the terminal device (or USIM card), it can be considered that the SQN verification has failed.
可选的,终端设备(或USIM卡)可先对认证令牌AUTN中的MAC进行校验,在校验MAC失败后,再对认证令牌AUTN中的序列号SQN进行校验。此处,对认证令牌AUTN中的MAC进行校验是指,根据认证令牌AUTN、随机数RAND和根密钥K计算XMAC,然后将得到的XMAC与认证令牌AUTN中的MAC进行对比,若一致,则认为校验成功,若不一致,则认为校验失败。当然,也可以为采用其他的MAC的校验方式,本申请并不限定。Optionally, the terminal device (or USIM card) may first verify the MAC in the authentication token AUTN, and after the MAC verification fails, then verify the serial number SQN in the authentication token AUTN. Here, verifying the MAC in the authentication token AUTN refers to calculating the XMAC according to the authentication token AUTN, the random number RAND and the root key K, and then comparing the obtained XMAC with the MAC in the authentication token AUTN. If they are consistent, the verification is considered successful, and if they are inconsistent, the verification is considered failed. Of course, other MAC verification methods can also be used, which is not limited in this application.
步骤S602、终端设备计算重同步认证令牌AUTS,并对AUTS和终端设备对应的指示信息进行加密,以得到加密重同步认证令牌AUTS*。Step S602: The terminal device calculates the resynchronization authentication token AUTS, and encrypts the AUTS and the indication information corresponding to the terminal device to obtain the encrypted resynchronization authentication token AUTS*.
在步骤S602中,所述AUTS用于指示终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内,终端设备可采用如图4a或图4b中所示的算法来计算AUTS,也可以采用其他算法来计算AUTS,本申请并不限定。In step S602, the AUTS is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not in the correct range. The terminal device can use the algorithm shown in Figure 4a or Figure 4b to calculate the AUTS, or it can use Other algorithms to calculate AUTS are not limited in this application.
此外,终端设备还可根据计算AUTS所采用的第一AUTS算法,来生成终端设备对应的指示信息,该指示信息与终端设备的标识、或USIM卡的标识或用户标识(如SUPI)相关联,用于指示终端设备计算AUTS所采用的AUTS算法。例如,终端设备可根据计算AUTS所采用的第一AUTS算法的标识来生成该指示信息,该指示信息可以为终端设备采用的第一AUTS算法的标识,或者包括终端设备计算AUTS所采用的第一AUTS算法的标识,或者与终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识之间存在着某种映射关系。再例如,指示信息也可以为一个标志位,用于指示终端设备(或USIM卡)是否支持新的AUTS算法,或者用于指示USIM卡是否为新卡,如该标志位置1时表示支持,置0时表示不支持。再例如,该指示信息还可以为USIM卡的类型或批次或版本等信息,USIM卡的类型或批次或版本等信息与终端设备所采用的AUTS算法之间存在着某种关联关系。再例如,该指示信息还可以为终端设备(或USIM卡)的签约特性列表,终端设备支持的签约特性与终端设备采用的第一AUTS算法之间也存在着某种关联关系。In addition, the terminal device can also generate indication information corresponding to the terminal device according to the first AUTS algorithm used to calculate AUTS, and the indication information is associated with the identification of the terminal device, the identification of the USIM card or the user identification (such as SUPI), Used to instruct the terminal equipment to calculate the AUTS algorithm used by the AUTS. For example, the terminal device may generate the indication information according to the identifier of the first AUTS algorithm used to calculate the AUTS. The indication information may be the identifier of the first AUTS algorithm used by the terminal device, or include the first AUTS algorithm used by the terminal device to calculate the AUTS. There is a certain mapping relationship between the identification of the AUTS algorithm or the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate the AUTS. For another example, the indication information can also be a flag bit to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm, or to indicate whether the USIM card is a new card. If the flag is set to 1, it indicates support. 0 means not supported. For another example, the indication information may also be information such as the type or batch or version of the USIM card, and there is a certain correlation between the type or batch or version of the USIM card and the AUTS algorithm adopted by the terminal device. For another example, the indication information may also be a list of subscription features of the terminal device (or USIM card), and there is also a certain association relationship between the subscription features supported by the terminal device and the first AUTS algorithm adopted by the terminal device.
进一步地,终端设备对AUTS和终端设备对应的指示信息进行加密,可以表示为:Further, the terminal device encrypts the indication information corresponding to the AUTS and the terminal device, which can be expressed as:
AUTS*=Enc(K,AUTS,indication)公式二AUTS*=Enc(K, AUTS, indication) formula two
其中,K为加密密钥,AUTS*为加密重同步认证令牌,Enc()表示加密函数,AUTS为重同步认证令牌,indication是指终端设备对应的指示信息。Among them, K is the encryption key, AUTS* is the encrypted resynchronization authentication token, Enc() is the encryption function, AUTS is the resynchronization authentication token, and indication refers to the indication information corresponding to the terminal device.
可以理解,通过对AUTS和终端设备对应的指示信息进行加密,并向UDM发送加密后的AUTS*,可以使得AUTS和终端设备对应的指示信息能够得到保护,从而便于重同步过程的正常进行,并提高认证过程的安全性。It can be understood that by encrypting the indication information corresponding to the AUTS and the terminal equipment, and sending the encrypted AUTS* to the UDM, the indication information corresponding to the AUTS and the terminal equipment can be protected, thereby facilitating the normal progress of the resynchronization process, and Improve the security of the authentication process.
应注意,本申请实施例中,终端设备可采用根密钥K对重同步认证令牌AUTS和终端设备对应的指示信息进行加密,也可以使用归属网络的公钥对重同步认证令牌AUTS和终端设备对应的指示信息进行加密,还可以使用SUPI加密得到签约隐藏标识(subscription concealed identifier,SUCI)的方式对重同步认证令牌AUTS和终端设备对应的指示信息进行加密,本申请并不限定。即公式二中的加密密钥K可以为根密钥K或归属网络的公钥。当然,终端设备也可以采用其他的加密算法进行加密,本申请同样不做限定。It should be noted that in this embodiment of the application, the terminal device can use the root key K to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, or use the public key of the home network to encrypt the resynchronization authentication token AUTS and The indication information corresponding to the terminal device is encrypted, and SUPI encryption can also be used to obtain a subscription concealed identifier (SUCI) to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, which is not limited by this application. That is, the encryption key K in formula 2 can be the root key K or the public key of the home network. Of course, the terminal device may also use other encryption algorithms for encryption, which is also not limited in this application.
可选的,上述步骤S601和步骤S602也可以具体由终端设备中的USIM卡来执行。Optionally, the above steps S601 and S602 may also be specifically executed by the USIM card in the terminal device.
步骤S603、终端设备向AMF发送认证失败消息,该认证失败消息中包括加密重同步认证令牌AUTS*。Step S603: The terminal device sends an authentication failure message to the AMF, and the authentication failure message includes the encrypted resynchronization authentication token AUTS*.
步骤S604、AMF向UDM发送认证服务请求,或者AMF向AUSF发送认证服务请求,然后AUSF将接收的认证服务请求发送给UDM,该认证服务请求中包括加密重同步认证令牌AUTS*。Step S604: AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends the received authentication service request to UDM. The authentication service request includes the encrypted resynchronization authentication token AUTS*.
步骤S605、UDM从AMF或AUSF接收认证服务请求,该认证服务请求中包括加密重同步认证令牌AUTS*,该AUTS*用于指示终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内。Step S605: The UDM receives an authentication service request from AMF or AUSF. The authentication service request includes an encrypted resynchronization authentication token AUTS*. The AUTS* is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range. .
步骤S606、UDM对加密重同步认证令牌AUTS*进行解密,以得到重同步认证令牌AUTS和终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS所采用的第一AUTS算法。Step S606: UDM decrypts the encrypted resynchronization authentication token AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device. The indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS used by the terminal device. An AUTS algorithm.
在步骤S606中,UDM可以使用根密钥K对加密重同步认证令牌AUTS*进行解密,或者,UDM也可以使用归属网络的私钥对加密重同步认证令牌AUTS*进行解密,或者UDM还可以基于SUCI解密得到SUPI的方式对加密重同步认证令牌AUTS*进行解密。当然,UDM也可以采用其他解密算法进行解密,本申请并不限定。In step S606, UDM can use the root key K to decrypt the encrypted resynchronization authentication token AUTS*, or UDM can also use the private key of the home network to decrypt the encrypted resynchronization authentication token AUTS*, or UDM can also decrypt the encrypted resynchronization authentication token AUTS*. The encrypted resynchronization authentication token AUTS* can be decrypted based on SUCI decryption to obtain SUPI. Of course, UDM can also use other decryption algorithms for decryption, which is not limited in this application.
需要注意的是,UDM采用的解密算法与终端设备(或USIM卡)采用的加密算法是相匹配的。具体是指,当终端设备使用根密钥K对重同步认证令牌AUTS和终端设备对应的指示信息进行加密时,相应的,UDM可使用根密钥K对加密重同步认证令牌AUTS*进行解密;当终端设备使用归属网络的公钥对重同步认证令牌AUTS和终端设备对应的指示信息进行加密时,相应的,UDM可使用归属网络的私钥对加密重同步认证令牌AUTS*进行解密;当终端设备基于SUPI加密得到SUCI的方式对重同步认证令牌AUTS和终端设备对应的指示信息进行加密时,相应的,UDM也基于SUCI解密得到SUPI的方式对加密重同步认证令牌AUTS*进行解密。It should be noted that the decryption algorithm adopted by UDM matches the encryption algorithm adopted by the terminal device (or USIM card). Specifically, when the terminal device uses the root key K to encrypt the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, correspondingly, UDM can use the root key K to encrypt the resynchronization authentication token AUTS*. Decryption; when the terminal device uses the public key of the home network to encrypt the resynchronization authentication token AUTS and the corresponding indication information of the terminal device, correspondingly, UDM can use the private key of the home network to encrypt the resynchronization authentication token AUTS* Decryption; when the terminal device encrypts the resynchronization authentication token AUTS and the indication information corresponding to the terminal device based on SUPI encryption to obtain SUCI, correspondingly, UDM also encrypts the resynchronization authentication token AUTS based on SUCI decryption to obtain SUPI. * Decrypt.
步骤S607、UDM根据第一AUTS算法对AUTS进行校验。Step S607: The UDM checks the AUTS according to the first AUTS algorithm.
可选的,UDM可根据认证服务请求中包括的终端设备的标识和终端设备对应的指示信息,确定第一AUTS算法。Optionally, the UDM may determine the first AUTS algorithm according to the identifier of the terminal device included in the authentication service request and the indication information corresponding to the terminal device.
本申请实施例中,UDM解密得到重同步认证令牌AUTS后,还可校验该重同步认证令牌AUTS的完整性。具体的,UDM可根据第一AUTS算法从AUTS中获取终端设备序列号SQN MS(即USIM卡已接受的最高序列号SQN MS),然后根据该SQN MS计算得到消息认证码MAC;若计算得到的MAC与从重同步认证令牌AUTS中获取的MAC-S一致,则可确定AUTS的完整性校验成功。 In the embodiment of the present application, after UDM decrypts to obtain the resynchronization authentication token AUTS, the integrity of the resynchronization authentication token AUTS can also be verified. Specifically, UDM can obtain the terminal device serial number SQN MS (that is, the highest serial number SQN MS accepted by the USIM card) from AUTS according to the first AUTS algorithm, and then calculate the message authentication code MAC according to the SQN MS; If the MAC is consistent with the MAC-S obtained from the resynchronization authentication token AUTS, it can be determined that the integrity check of the AUTS is successful.
若对AUTS校验成功,UDM可对网络侧保存的SQN进行重同步,然后使用重同步后的SQN重新发起针对终端设备的认证流程。If the AUTS verification is successful, UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
由此可知,采用上述技术方案,终端设备可将对应的指示信息与生成的AUTS在一起进行加密保护,并发送给UDM。如此,UDM可根据终端设备发送的指示信息,确定终端设备采用的AUTS算法,然后采用与终端设备(或USIM卡)一致的AUTS算法来对终端设备发送的AUTS进行校验,从而避免UDM与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时又可提高认证过程的安全性。It can be seen that, by adopting the above technical solution, the terminal device can encrypt and protect the corresponding indication information together with the generated AUTS, and send it to the UDM. In this way, UDM can determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and then use the AUTS algorithm consistent with the terminal device (or USIM card) to verify the AUTS sent by the terminal device, thereby avoiding UDM and the terminal The problem of resynchronization failure caused by the inconsistent AUTS algorithm adopted by the device allows the resynchronization process and subsequent terminal device authentication process to proceed normally, and at the same time can improve the security of the authentication process.
实施例三Example three
请参考图7,为本申请实施例提供的另一种通信方法的流程示意图,该方法具体包括如下步骤:Please refer to FIG. 7, which is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
步骤S701、终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内。Step S701: The terminal device determines that the serial number SQN in the authentication token AUTN is not within the correct range.
该步骤S701的具体实施方式可参考实施例一中的步骤S201或实施例二中的步骤S601中的描述,在此不再赘述。For a specific implementation manner of step S701, reference may be made to the description of step S201 in the first embodiment or step S601 in the second embodiment, which will not be repeated here.
步骤S702、终端设备根据终端设备对应的指示信息,计算重同步认证令牌AUTS。Step S702: The terminal device calculates the resynchronization authentication token AUTS according to the instruction information corresponding to the terminal device.
本申请实施例中,所述指示信息用于直接或间接地指示终端设备计算AUTS采用的第一AUTS算法,该指示信息与终端设备的标识、或USIM卡的标识或用户标识(如SUPI)相关联。例如,该指示信息可以为终端设备(USIM卡)采用的第一AUTS算法的标识,或者该指示信息中可以包括终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识,或者该指示信息与终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识之间存在着某种映射关系,或者该指示信息也可以为用于指示终端设备(或USIM卡)是否支持新的AUTS算法的信息,或者该指示信息也可以为用于指示USIM卡是否为新卡的信息,或者该指示信息还可以为USIM卡的类型或批次或版本等信息,或者该指示信息还可以为终端设备(或USIM卡)的签约特性列表。In the embodiment of this application, the indication information is used to directly or indirectly instruct the terminal equipment to calculate the first AUTS algorithm used by the AUTS, and the indication information is related to the identification of the terminal equipment or the identification of the USIM card or the user identification (such as SUPI) United. For example, the indication information may be the identifier of the first AUTS algorithm used by the terminal device (USIM card), or the indication information may include the identifier of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the There is a certain mapping relationship between the indication information and the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information can also be used to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm information, or the indication information may also be information for indicating whether the USIM card is a new card, or the indication information may also be information such as the type or batch or version of the USIM card, or the indication information may also be It is a list of subscription features of terminal equipment (or USIM card).
具体的,在步骤S702中,终端设备可采用如下方式,计算重同步认证令牌AUTS:Specifically, in step S702, the terminal device may calculate the resynchronization authentication token AUTS in the following manner:
Figure PCTCN2020122866-appb-000004
Figure PCTCN2020122866-appb-000004
其中,AUTS为重同步认证令牌,该AUTS可用于指示终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内,SQN MS为终端设备序列号,即USIM卡中已接受的最高序列号,AK为匿名密钥,且AK=f5*(RAND,K)或者AK=f5*(RAND,K,MAC-S’),f5*()表示函数,RAND为随机数,K为根密钥,indication为终端设备对应的指示信息,MAC-S’为根据AUTN中的参数计算得到的消息认证码,且MAC-S′=f1*(AMF,RAND,K,SQN MS,indication),用于实现对SQN MS的加密和完整性保护,f1*()表示另一函数,AMF为认证管理域,
Figure PCTCN2020122866-appb-000005
表示异或,∥表示拼接。
Among them, AUTS is the resynchronization authentication token, which can be used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range, and SQN MS is the terminal device serial number, which is the highest serial number accepted in the USIM card , AK is an anonymous key, and AK=f5*(RAND, K) or AK=f5*(RAND, K, MAC-S'), f5*() represents a function, RAND is a random number, and K is a root key , Indication is the indication information corresponding to the terminal device, MAC-S' is the message authentication code calculated according to the parameters in AUTN, and MAC-S'=f1*(AMF,RAND,K,SQN MS ,indication), used for Realize the encryption and integrity protection of SQN MS , f1*() represents another function, AMF is the authentication management domain,
Figure PCTCN2020122866-appb-000005
Means exclusive OR, ∥ means splicing.
应注意,通过上述公式三计算得到的AUTS与前述实施例一、实施例二中计算的AUTS不同,为了以示区别,实施例三中的AUTS还可以记做AUTS’。同理,MAC-S也可以记做MAC-S’。It should be noted that the AUTS calculated by the above formula 3 is different from the AUTS calculated in the foregoing first and second embodiments. To illustrate the difference, the AUTS in the third embodiment can also be recorded as AUTS'. Similarly, MAC-S can also be recorded as MAC-S’.
通过上述公式三可知,在该实施例三中终端设备可在计算AUTS’时携带终端设备对应的指示信息,然后利用MAC-S′对AUTS’进行完整性保护。如此,也可以使得终端设备发送给UDM的AUTS’和对应的指示信息能够得到保护,而不会被篡改,从而便于重同步流程的正常进行,同时提高认证过程的安全性。应注意,此处,在计算AUTS’时携带终端设备对应的指示信息,也可以理解为将终端设备对应的指示信息嵌入到AUTS’中,或者将终端设备对应的指示信息作为AUTS算法的一个新增的输入参数,即公式三中所示的方法也可以理解为一种新的AUTS算法。It can be known from the above formula 3 that in the third embodiment, the terminal device can carry the indication information corresponding to the terminal device when calculating the AUTS', and then use the MAC-S' to perform integrity protection on the AUTS'. In this way, the AUTS' and corresponding instruction information sent by the terminal device to the UDM can also be protected from being tampered with, thereby facilitating the normal progress of the resynchronization process and improving the security of the authentication process. It should be noted that here, when calculating AUTS', the indication information corresponding to the terminal device is carried. It can also be understood as embedding the indication information corresponding to the terminal device into the AUTS', or taking the indication information corresponding to the terminal device as a new version of the AUTS algorithm. The increased input parameters, that is, the method shown in formula 3 can also be understood as a new AUTS algorithm.
可选的,上述步骤S701和步骤S702也可以具体由终端设备中的USIM卡来执行。Optionally, the above steps S701 and S702 may also be specifically executed by the USIM card in the terminal device.
步骤S703、终端设备向AMF发送认证失败消息,该认证失败消息中包括重同步认证令牌AUTS。Step S703: The terminal device sends an authentication failure message to the AMF, and the authentication failure message includes the resynchronization authentication token AUTS.
步骤S704、AMF向UDM发送认证服务请求,或者AMF向AUSF发送认证服务请求, 然后AUSF向UDM发送认证服务请求,该认证服务请求中包括重同步认证令牌AUTS’。Step S704: AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends an authentication service request to UDM. The authentication service request includes the resynchronization authentication token AUTS'.
步骤S705、UDM从AMF或AUSF接收认证服务请求,该认证服务请求中包括重同步认证令牌AUTS’,该AUTS’用于指示终端设备确定认证令牌AUTN中的序列号SQN不在正确范围内。Step S705: The UDM receives an authentication service request from the AMF or AUSF. The authentication service request includes the resynchronization authentication token AUTS', which is used to instruct the terminal device to determine that the serial number SQN in the authentication token AUTN is not within the correct range.
步骤S706、UDM从重同步认证令牌AUTS’中获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS所采用的第一AUTS算法。Step S706: The UDM obtains the indication information corresponding to the terminal device from the resynchronization authentication token AUTS'. The indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS.
此处,由于终端设备对应的指示信息直接拼接在AUTS’中,UDM可直接从AUTS中获取终端设备对应的指示信息。Here, since the indication information corresponding to the terminal device is directly spliced in the AUTS', the UDM can directly obtain the indication information corresponding to the terminal device from the AUTS.
步骤S707、UDM根据第一AUTS算法对AUTS’进行校验。Step S707: UDM checks AUTS' according to the first AUTS algorithm.
本申请实施例中,UDM得到该重同步认证令牌AUTS’后,可校验该重同步认证令牌AUTS’的完整性。具体的,UDM根据从AUTS’中获取的终端设备对应的指示信息确定第一AUTS算法后,然后根据相应的算法计算AK,然后还原出SQN MS,再根据AMF、RAND,K,SQN MS,indication等参数,计算得到消息认证码MAC’;若计算得到的该MAC’与从重同步认证令牌AUTS’中获取的MAC-S’一致,则确定AUTS’的完整性校验成功。 In the embodiment of the present application, after UDM obtains the re-synchronization authentication token AUTS', it can verify the integrity of the re-synchronization authentication token AUTS'. Specifically, UDM determines the first AUTS algorithm according to the indication information corresponding to the terminal equipment obtained from AUTS', then calculates AK according to the corresponding algorithm, and then restores SQN MS , and then according to AMF, RAND, K, SQN MS , indication Wait for the parameters, calculate the message authentication code MAC'; if the calculated MAC' is consistent with the MAC-S' obtained from the resynchronization authentication token AUTS', it is determined that the integrity check of the AUTS' is successful.
若对AUTS’校验成功,UDM可对网络侧保存的SQN进行重同步,然后使用重同步后的SQN重新发起针对终端设备的认证流程。If the verification of AUTS’ is successful, UDM can resynchronize the SQN stored on the network side, and then use the resynchronized SQN to re-initiate the authentication process for the terminal device.
由此可知,采用上述技术方案,终端设备可在计算AUTS’时携带对应的指示信息,然后对该AUTS’进行完整性保护后发送给UDM。如此,UDM可从接收到的AUTS’中得到终端设备对应的指示信息,然后根据终端设备发送的指示信息,确定终端设备采用的AUTS算法,并采用与终端设备(或USIM卡)一致的AUTS算法来对终端设备发送的AUTS’进行校验,从而避免UDM与终端设备采用的AUTS算法不一致而导致的重同步失败的问题,使得重同步流程以及后续终端设备的认证流程可以正常进行,同时提高认证过程的安全性。It can be seen from this that with the above technical solution, the terminal device can carry the corresponding indication information when calculating the AUTS', and then send it to UDM after integrity protection of the AUTS'. In this way, UDM can obtain the instruction information corresponding to the terminal device from the received AUTS', and then determine the AUTS algorithm used by the terminal device according to the instruction information sent by the terminal device, and adopt the AUTS algorithm consistent with the terminal device (or USIM card) To verify the AUTS' sent by the terminal device, so as to avoid the problem of resynchronization failure caused by the inconsistency of the AUTS algorithm used by the UDM and the terminal device, so that the resynchronization process and the subsequent terminal device authentication process can proceed normally, and at the same time improve the authentication Security of the process.
请参考图8,为本申请实施例二和三中提供的通信方法的一个具体示例,该示例中具体包括如下步骤:Please refer to FIG. 8, which is a specific example of the communication method provided in Embodiments 2 and 3 of this application. The example specifically includes the following steps:
步骤S801,执行终端设备与UDM之间的认证过程(authentication procedure)。该认证过程可包括:AMF向终端设备发送认证请求消息,该认证请求消息中包括随机数RAND和认证令牌AUTN。In step S801, an authentication procedure (authentication procedure) between the terminal device and the UDM is executed. The authentication process may include: the AMF sends an authentication request message to the terminal device, and the authentication request message includes the random number RAND and the authentication token AUTN.
步骤S802,终端设备校验认证令牌AUTN中的序列号SQN,若校验SQN不在正确范围内,那么终端设备计算重同步认证令牌AUTS,并发起重同步流程。可选的,终端设备还可校验认证令牌AUTN中的消息认证码MAC,且校验消息认证码MAC可以在校验序列号SQN之前。In step S802, the terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not within the correct range, the terminal device calculates the resynchronization authentication token AUTS and initiates the resynchronization process. Optionally, the terminal device may also check the message authentication code MAC in the authentication token AUTN, and the check message authentication code MAC may be before the check sequence number SQN.
对应于实施例二,在步骤S802的一种实现方式中,终端设备还可生成指示信息,并将该指示信息与计算的重同步认证令牌AUTS进行加密,得到加密后的AUTS*。具体的加密方式可参考步骤S602中的描述,在此不再重复。Corresponding to the second embodiment, in an implementation of step S802, the terminal device may also generate indication information, and encrypt the indication information with the calculated resynchronization authentication token AUTS to obtain the encrypted AUTS*. The specific encryption method can refer to the description in step S602, which will not be repeated here.
对应于实施例三,在步骤S802的另一种实现方式中,终端设备还可生成指示信息,并在计算重同步认证令牌AUTS时,还将该指示信息作为计算AUTS的其中一个输入参数,即根据终端设备对应的指示信息,计算AUTS。具体的AUTS的计算方式可参考步骤S702中的描述,在此不再重复。Corresponding to the third embodiment, in another implementation of step S802, the terminal device may also generate indication information, and when calculating the resynchronization authentication token AUTS, use the indication information as one of the input parameters for calculating AUTS. That is, the AUTS is calculated according to the instruction information corresponding to the terminal device. For the specific calculation method of AUTS, please refer to the description in step S702, which will not be repeated here.
步骤S803,终端设备向AMF发送认证失败消息(authentication failure),该认证失败 消息中包括加密重同步认证令牌AUTS*或重同步认证令牌AUTS,以及随机数RAND。Step S803: The terminal device sends an authentication failure message to the AMF. The authentication failure message includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
对应于实施例二,在步骤S803的一种实现方式中,该认证失败消息中包括加密重同步认证令牌AUTS*,该AUTS*是终端设备对计算的AUTS和对应的指示信息进行加密得到的。Corresponding to the second embodiment, in an implementation of step S803, the authentication failure message includes an encrypted resynchronization authentication token AUTS*, which is obtained by the terminal device encrypting the calculated AUTS and the corresponding indication information .
对应于实施例三,在步骤S803的另一种实现方式中,该认证失败消息中包括重同步认证令牌AUTS,该AUTS是终端设备根据终端设备对应的指示信息生成的,即终端设备在计算AUTS时,还将对应的指示信息作为其中一个输入参数。Corresponding to the third embodiment, in another implementation of step S803, the authentication failure message includes the resynchronization authentication token AUTS, which is generated by the terminal device according to the indication information corresponding to the terminal device, that is, the terminal device is calculating When AUTS, the corresponding indication information is also used as one of the input parameters.
步骤S804,AMF向AUSF发送认证服务请求,该认证服务请求中包括加密重同步认证令牌AUTS*或重同步认证令牌AUTS,以及随机数RAND。In step S804, the AMF sends an authentication service request to AUSF. The authentication service request includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
步骤S805,AUSF将接收的认证服务请求发送给UDM,该认证服务请求中包括加密重同步认证令牌AUTS*或重同步认证令牌AUTS,以及随机数RAND。Step S805: AUSF sends the received authentication service request to UDM. The authentication service request includes the encrypted resynchronization authentication token AUTS* or the resynchronization authentication token AUTS, and the random number RAND.
可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
步骤S806,UDM接收认证服务请求,根据终端设备对应的指示信息,确定第一AUTS算法。In step S806, the UDM receives the authentication service request, and determines the first AUTS algorithm according to the indication information corresponding to the terminal device.
对应于实施例二,在步骤S806的一种实现方式中,UDM对接收的认证服务请求中的加密重同步认证令牌AUTS*进行解密,以得到重同步认证令牌AUTS和终端设备对应的指示信息,然后根据终端设备对应的指示信息,确定第一AUTS算法。Corresponding to the second embodiment, in an implementation of step S806, UDM decrypts the encrypted resynchronization authentication token AUTS* in the received authentication service request to obtain the corresponding indication of the resynchronization authentication token AUTS and the terminal device Information, and then determine the first AUTS algorithm according to the instruction information corresponding to the terminal device.
对应于实施例三,在步骤S806的一种实现方式中,UDM从接收的认证服务请求中的重同步认证令牌AUTS中获取终端设备对应的指示信息,并根据MAC-S’校验AUTS的完整性,然后根据终端设备对应的指示信息,确定第一AUTS算法。Corresponding to the third embodiment, in an implementation of step S806, UDM obtains the indication information corresponding to the terminal device from the resynchronization authentication token AUTS in the received authentication service request, and verifies the AUTS according to MAC-S' Completeness, and then determine the first AUTS algorithm according to the indication information corresponding to the terminal device.
步骤S807,UDM根据第一AUTS算法对AUTS进行校验,校验成功后,重同步SQN,然后根据同步后的SQN重新发起认证过程。In step S807, the UDM checks the AUTS according to the first AUTS algorithm. After the check succeeds, it resynchronizes the SQN, and then re-initiates the authentication process according to the synchronized SQN.
具体的对AUTS进行校验的过程可参考上述步骤S607或S707中的描述,在此不再重复。For the specific process of verifying the AUTS, please refer to the description in step S607 or S707, which will not be repeated here.
步骤S808,重新执行终端设备与UDM之间的认证过程。Step S808: re-execute the authentication process between the terminal device and the UDM.
实施例四Example four
该实施例四中的技术方案与实施例二中所示的技术方案类似,但是区别在于,在实施例二中,并不对终端设备和安装在终端设备中的USIM卡执行的动作做明确区分,终端设备执行的某些动作也可以具体由安装在终端设备中的USIM卡来执行,例如,对终端设备接收的认证令牌AUTN进行校验,在校验认证令牌AUTN中的序列号SQN不在正确范围内后,计算重同步认证令牌AUTS,对重同步认证令牌AUTS和指示信息进行加密处理,得到AUTS*,然后通过终端设备将加密后的AUTS*经AMF最后发送至UDM。The technical solution in the fourth embodiment is similar to the technical solution shown in the second embodiment, but the difference is that in the second embodiment, the terminal device and the actions performed by the USIM card installed in the terminal device are not clearly distinguished. Some actions performed by the terminal device can also be performed by the USIM card installed in the terminal device. For example, verify the authentication token AUTN received by the terminal device, and verify that the serial number SQN in the authentication token AUTN is not present. After it is within the correct range, calculate the resynchronization authentication token AUTS, encrypt the resynchronization authentication token AUTS and the indication information to obtain AUTS*, and then send the encrypted AUTS* to UDM via the terminal device through the AMF.
而在实施例四中,对终端设备和终端设备中安装的USIM卡的分别执行的动作进行了详细描述,可以由终端设备中安装的USIM卡对终端设备接收的认证令牌AUTN进行校验,在校验认证令牌AUTN中的序列号SQN不在正确范围内后,计算重同步认证令牌AUTS,并将该重同步认证令牌AUTS发送给终端设备,由终端设备根据USIM卡的配置信息确定 对应的指示信息,然后和从USIM卡接收到的AUTS在一起进行加密处理,最后由终端设备经AMF发送至UDM。In the fourth embodiment, the actions performed by the terminal device and the USIM card installed in the terminal device are described in detail. The USIM card installed in the terminal device can verify the authentication token AUTN received by the terminal device. After verifying that the serial number SQN in the authentication token AUTN is not in the correct range, calculate the resynchronization authentication token AUTS, and send the resynchronization authentication token AUTS to the terminal device, which is determined by the terminal device according to the configuration information of the USIM card The corresponding instruction information is then encrypted with the AUTS received from the USIM card, and finally sent to UDM by the terminal device via AMF.
请参考图9,为本申请实施例提供的又一种通信方法的流程示意图,该方法具体包括如下步骤:Please refer to FIG. 9, which is a schematic flowchart of another communication method provided by an embodiment of this application. The method specifically includes the following steps:
步骤S901、USIM卡确定认证令牌AUTN中的序列号SQN不在正确范围内。Step S901: The USIM card determines that the serial number SQN in the authentication token AUTN is not within the correct range.
本申请实施例中,在执行步骤S901之前,终端设备可从AMF接收认证请求消息,并将该认证请求消息包括的认证令牌AUTN和随机数RAND等参数发送给安装在终端设备中的USIM卡,由该USIM卡对认证令牌AUTN进行校验。具体的校验过程可参考前面各实施例中的描述,在此不再赘述。In this embodiment of the application, before step S901 is performed, the terminal device may receive an authentication request message from the AMF, and send parameters such as the authentication token AUTN and the random number RAND included in the authentication request message to the USIM card installed in the terminal device , The USIM card verifies the authentication token AUTN. For the specific verification process, reference may be made to the descriptions in the previous embodiments, which will not be repeated here.
类似的,所述认证令牌AUTN中的序列号SQN不在正确范围内可以是指,USIM卡确定认证令牌AUTN中的序列号小于或等于USIM卡中保存的序列号SQN。Similarly, that the serial number SQN in the authentication token AUTN is not within the correct range may mean that the USIM card determines that the serial number in the authentication token AUTN is less than or equal to the serial number SQN stored in the USIM card.
步骤S902、USIM卡计算重同步认证令牌AUTS。Step S902: The USIM card calculates the resynchronization authentication token AUTS.
在该步骤S902中,USIM卡可采用如图4a或4b中所示的算法来计算重同步认证令牌AUTS,也可以采用其他算法来计算重同步认证令牌AUTS,本申请并不限定。In this step S902, the USIM card can use the algorithm shown in FIG. 4a or 4b to calculate the resynchronization authentication token AUTS, and other algorithms can also be used to calculate the resynchronization authentication token AUTS, which is not limited by this application.
步骤S903、USIM卡将重同步认证令牌AUTS和USIM卡的配置信息发送给终端设备。Step S903: The USIM card sends the resynchronization authentication token AUTS and the configuration information of the USIM card to the terminal device.
所述配置信息可包括用于指示USIM卡计算AUTS时采用的AUTS算法的信息,例如可包括如下信息中的一项或多项:USIM卡采用的第一AUTS算法的标识、用于指示USIM卡是否支持新的AUTS算法的信息、用于指示USIM卡是否为新卡的信息、USIM卡的类型或批次或版本(release)等信息。或者,该配置信息中还可以包含其他可以用于区分AUTS算法的信息,本申请并不限定。The configuration information may include information used to indicate the AUTS algorithm used when the USIM card calculates AUTS, for example, may include one or more of the following information: the identifier of the first AUTS algorithm used by the USIM card, which is used to indicate the USIM card Information about whether the new AUTS algorithm is supported, information used to indicate whether the USIM card is a new card, the type or batch or release of the USIM card, and other information. Alternatively, the configuration information may also include other information that can be used to distinguish the AUTS algorithm, which is not limited in this application.
可选的,USIM还可将随机数RAND发送给终端设备。Optionally, the USIM may also send the random number RAND to the terminal device.
步骤S904、终端设备从USIM卡接收重同步认证令牌AUTS和USIM卡的配置信息。Step S904: The terminal device receives the resynchronization authentication token AUTS from the USIM card and the configuration information of the USIM card.
应注意,终端设备从USIM卡接收USIM卡的配置信息也可以理解为,终端设备读取USIM卡的配置信息,或终端设备获取USIM卡的配置信息等。It should be noted that the terminal device receiving the configuration information of the USIM card from the USIM card can also be understood as the terminal device reading the configuration information of the USIM card, or the terminal device acquiring the configuration information of the USIM card, etc.
步骤S905、终端设备根据USIM卡的配置信息,确定指示信息,该指示信息用于指示USIM卡计算AUTS采用的第一AUTS算法。Step S905: The terminal device determines the indication information according to the configuration information of the USIM card, and the indication information is used to instruct the first AUTS algorithm used by the USIM card to calculate the AUTS.
该指示信息与终端设备的标识、或USIM卡的标识或用户标识(如SUPI)相关联。例如,该指示信息可以为终端设备(USIM卡)采用的第一AUTS算法的标识,或者该指示信息中可以包括终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识,或者该指示信息与终端设备(或USIM卡)计算AUTS所采用的第一AUTS算法的标识之间存在着某种映射关系,或者该指示信息也可以为用于指示终端设备(或USIM卡)是否支持新的AUTS算法的信息,或者该指示信息也可以为用于指示USIM卡是否为新卡的信息,或者该指示信息还可以为USIM卡的类型或批次或版本等信息,或者该指示信息还可以为终端设备(或USIM卡)的签约特性列表。The indication information is associated with the identification of the terminal device, or the identification of the USIM card or the user identification (such as SUPI). For example, the indication information may be the identifier of the first AUTS algorithm used by the terminal device (USIM card), or the indication information may include the identifier of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the There is a certain mapping relationship between the indication information and the identification of the first AUTS algorithm used by the terminal device (or USIM card) to calculate AUTS, or the indication information can also be used to indicate whether the terminal device (or USIM card) supports the new AUTS algorithm information, or the indication information may also be information for indicating whether the USIM card is a new card, or the indication information may also be information such as the type or batch or version of the USIM card, or the indication information may also be It is a list of subscription features of terminal equipment (or USIM card).
应理解,所述指示信息可以为USIM卡的配置信息中的部分或全部信息,也可以为根据USIM卡的配置信息经推导、计算得出的信息,本申请并不限定。It should be understood that the indication information may be part or all of the configuration information of the USIM card, or may be information derived and calculated based on the configuration information of the USIM card, which is not limited in this application.
步骤S906、终端设备对重同步认证令牌AUTS和指示信息进行加密,以得到加密重同步认证令牌AUTS*。Step S906: The terminal device encrypts the resynchronization authentication token AUTS and the indication information to obtain an encrypted resynchronization authentication token AUTS*.
该步骤S906的具体实施方式可参考实施例二中步骤S602中的描述,在此不再重复。For the specific implementation manner of step S906, reference may be made to the description of step S602 in the second embodiment, which will not be repeated here.
步骤S907、终端设备向AMF发送认证失败消息,该认证失败消息中包括加密重同步 认证令牌AUTS*,该加密重同步认证令牌AUTS*可用于指示终端设备或USIM卡确定认证令牌AUTN中的序列号SQN不在正确范围内。该认证失败消息用于触发UDM对SQN进行重同步。Step S907: The terminal device sends an authentication failure message to the AMF. The authentication failure message includes the encrypted resynchronization authentication token AUTS*. The encrypted resynchronization authentication token AUTS* can be used to instruct the terminal device or the USIM card to determine the authentication token AUTN. The serial number SQN is not in the correct range. The authentication failure message is used to trigger the UDM to resynchronize the SQN.
步骤S908、AMF向UDM发送认证服务请求,或者AMF向AUSF发送认证服务请求,然后AUSF将接收的认证服务请求发送给UDM,该认证服务请求中包括加密重同步认证令牌AUTS*。Step S908: AMF sends an authentication service request to UDM, or AMF sends an authentication service request to AUSF, and then AUSF sends the received authentication service request to UDM. The authentication service request includes the encrypted resynchronization authentication token AUTS*.
步骤S909、UDM从AMF或AUSF接收认证服务请求,得到认证服务请求中的加密重同步认证令牌AUTS*。Step S909: The UDM receives the authentication service request from the AMF or AUSF, and obtains the encrypted resynchronization authentication token AUTS* in the authentication service request.
步骤S910、UDM对加密重同步认证令牌AUTS*进行解密,以得到重同步认证令牌AUTS和终端设备对应的指示信息。Step S910: UDM decrypts the encrypted resynchronization authentication token AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device.
步骤S911、UDM根据第一AUTS算法对AUTS进行校验。Step S911: The UDM checks the AUTS according to the first AUTS algorithm.
上述步骤S907至步骤S911的具体实施方式可参考实施例二中的步骤S604至步骤S607,在此不再重复。For the specific implementation of steps S907 to S911 described above, reference may be made to steps S604 to S607 in the second embodiment, which will not be repeated here.
由此可知,采用上述技术方案,终端设备可根据USIM卡的配置信息确定USIM卡所采用的AUTS算法,进而将用于指示USIM卡采用的AUTS算法的指示信息和USIM卡计算得到的AUTS一起进行加密后,发送给UDM,如此,可使得重同步过程可以正常进行,同时又避免由于USIM卡的限定或不适配,而可能导致的无法生成指示信息或进行加密处理的问题,从而增强该方法的适用性。It can be seen that using the above technical solution, the terminal device can determine the AUTS algorithm used by the USIM card according to the configuration information of the USIM card, and then combine the indication information used to indicate the AUTS algorithm used by the USIM card and the AUTS calculated by the USIM card. After being encrypted, it is sent to UDM. In this way, the resynchronization process can be carried out normally, and at the same time, the problem of inability to generate instruction information or encryption processing that may be caused due to the limitation or incompatibility of the USIM card is avoided, thereby enhancing the method Applicability.
请参考图10,为本申请实施例四中提供的通信方法的又一具体示例,该示例中具体包括如下步骤:Please refer to FIG. 10, which is another specific example of the communication method provided in the fourth embodiment of this application. The example specifically includes the following steps:
步骤S1001,执行终端设备与UDM之间的认证过程(authentication procedure)。该认证过程可包括:AMF向终端设备发送认证请求消息,该认证请求消息中包括随机数RAND和认证令牌AUTN。In step S1001, an authentication procedure (authentication procedure) between the terminal device and the UDM is executed. The authentication process may include: the AMF sends an authentication request message to the terminal device, and the authentication request message includes the random number RAND and the authentication token AUTN.
在该步骤中,终端设备可将认证请求消息中包括的随机数RAND和认证令牌AUTN发送给安装在终端设备中的USIM卡。In this step, the terminal device can send the random number RAND and the authentication token AUTN included in the authentication request message to the USIM card installed in the terminal device.
步骤S1002,终端设备中的USIM卡校验认证令牌AUTN中序列号SQN,若校验SQN不在正确范围内,那么USIM卡可计算重同步认证令牌AUTS。可选的,终端设备还可校验认证令牌AUTN中的消息认证码MAC,且校验消息认证码MAC可以在校验序列号SQN之前。In step S1002, the USIM card in the terminal device verifies the serial number SQN in the authentication token AUTN. If the verified SQN is not in the correct range, the USIM card can calculate the resynchronization authentication token AUTS. Optionally, the terminal device may also check the message authentication code MAC in the authentication token AUTN, and the check message authentication code MAC may be before the check sequence number SQN.
在该步骤中,USIM卡可采用如图4a或图4b中所示的算法来计算AUTS,也可以采用其他算法来计算AUTS,本申请并不限定。In this step, the USIM card can use the algorithm shown in Figure 4a or Figure 4b to calculate AUTS, or other algorithms can be used to calculate AUTS, which is not limited in this application.
步骤S1003,USIM卡可将计算得到的重同步认证令牌AUTS和USIM卡的配置信息发送给终端设备。In step S1003, the USIM card may send the calculated resynchronization authentication token AUTS and the configuration information of the USIM card to the terminal device.
USIM卡的配置信息的具体实施方式可参考步骤S903中的描述,在此不再重复。For the specific implementation of the configuration information of the USIM card, reference may be made to the description in step S903, which will not be repeated here.
步骤S1004,终端设备根据接收到的USIM卡配置信息生成指示信息,然后对接收到的重同步认证令牌AUTS和生成的指示信息进行加密,得到加密重同步认证令牌AUTS*。Step S1004: The terminal device generates indication information according to the received USIM card configuration information, and then encrypts the received resynchronization authentication token AUTS and the generated indication information to obtain an encrypted resynchronization authentication token AUTS*.
具体的加密方式可参考步骤S602中的描述,在此不再重复。The specific encryption method can refer to the description in step S602, which will not be repeated here.
步骤S1005,终端设备向AMF发送认证失败消息(authentication failure),该认证失败消息中包括加密重同步认证令牌AUTS*和随机数RAND。Step S1005: The terminal device sends an authentication failure message to the AMF. The authentication failure message includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
步骤S1006,AMF向AUSF发送认证服务请求,该认证服务请求中包括加密重同步认 证令牌AUTS*和随机数RAND。In step S1006, the AMF sends an authentication service request to AUSF. The authentication service request includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
步骤S1007,AUSF将接收的认证服务请求发送给UDM,该认证服务请求中包括加密重同步认证令牌AUTS*和随机数RAND。Step S1007: AUSF sends the received authentication service request to UDM. The authentication service request includes the encrypted resynchronization authentication token AUTS* and the random number RAND.
可选的,该认证服务请求中还可包括终端设备的标识或USIM卡的标识或用户标识,例如SUPI。Optionally, the authentication service request may also include the identification of the terminal device or the identification of the USIM card or the user identification, such as SUPI.
步骤S1008,UDM接收认证服务请求,对接收的认证服务请求中的加密重同步认证令牌AUTS*进行解密,得到重同步认证令牌AUTS和终端设备对应的指示信息。In step S1008, the UDM receives the authentication service request, decrypts the encrypted resynchronization authentication token AUTS* in the received authentication service request, and obtains the resynchronization authentication token AUTS and the corresponding indication information of the terminal device.
如此,UDM根据终端设备对应的指示信息,确定第一AUTS算法。In this way, the UDM determines the first AUTS algorithm according to the indication information corresponding to the terminal device.
步骤S1009,UDM根据第一AUTS算法对AUTS进行校验,校验成功后,重同步SQN,然后根据同步后的SQN重新发起认证过程。In step S1009, the UDM checks the AUTS according to the first AUTS algorithm. After the check succeeds, it resynchronizes the SQN, and then re-initiates the authentication process according to the synchronized SQN.
具体的对AUTS进行校验的过程可参考步骤S607或S707中的描述,在此不再重复。For the specific process of verifying the AUTS, please refer to the description in step S607 or S707, which will not be repeated here.
步骤S1010,重新执行终端设备与UDM之间的认证过程。Step S1010: re-execute the authentication process between the terminal device and the UDM.
本申请实施例还提供一种通信装置,请参阅图11,为本申请实施例提供的一种通信装置的结构示意图,该通信装置1100包括:收发模块1110和处理模块1120。该通信装置可用于实现上述任一方法实施例中涉及统一数据管理网元的功能、或用于实现上述任一方法实施例中涉及统一数据存储网元的功能。例如,该通信装置可以是核心网中的UDM网元或者UDR网元,且该网元或者网络功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。再例如,该通信装置可以是网络设备或网络设备中包括的芯片。An embodiment of the present application also provides a communication device. Please refer to FIG. 11, which is a schematic structural diagram of a communication device provided by an embodiment of this application. The communication device 1100 includes a transceiver module 1110 and a processing module 1120. The communication device can be used to implement the function of the unified data management network element in any of the foregoing method embodiments, or be used to implement the function of the unified data storage network element in any of the foregoing method embodiments. For example, the communication device may be a UDM network element or a UDR network element in the core network, and the network element or network function may be a network element in a hardware device, or a software function running on dedicated hardware, or Virtualization functions instantiated on the platform (for example, cloud platform). For another example, the communication device may be a network device or a chip included in the network device.
当该通信装置作为统一数据管理网元,执行图2中所示的方法实施例时,收发模块1110用于接收认证服务请求,该认证服务请求中包括重同步认证令牌AUTS;处理模块1120用于获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;处理模块1120还用于,根据该第一AUTS算法对AUTS进行校验。When the communication device is used as a unified data management network element to perform the method embodiment shown in FIG. 2, the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the processing module 1120 uses To obtain the instruction information corresponding to the terminal device, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the processing module 1120 is also used to verify the AUTS according to the first AUTS algorithm.
在一种可能的设计中,处理模块1120具体用于,从本地配置中获取所述指示信息,或从统一数据存储网元中获取所述指示信息。In a possible design, the processing module 1120 is specifically configured to obtain the indication information from a local configuration or obtain the indication information from a unified data storage network element.
在一种可能的设计中,终端设备对应的指示信息包含在终端设备的签约数据中。In a possible design, the indication information corresponding to the terminal device is included in the subscription data of the terminal device.
当该通信装置作为统一数据存储网元,执行与图5中所示的方法实施例时,收发模块1110用于从统一数据管理网元接收服务调用请求,该服务调用请求用于请求终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;处理模块1120,用于通过收发模块1110向统一数据管理网元发送服务响应消息,该服务响应消息中包括终端设备对应的指示信息。When the communication device is used as a unified data storage network element to execute the method embodiment shown in FIG. 5, the transceiver module 1110 is used to receive a service call request from the unified data management network element, and the service call request is used to request the terminal device to correspond to The instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the processing module 1120 is used to send a service response message to the unified data management network element through the transceiver module 1110, the service response message Include instruction information corresponding to the terminal device.
当该通信装置作为统一数据管理网元,执行图6中所示的方法实施例时,收发模块1110用于接收认证服务请求,该认证服务请求中包括加密重同步认证令牌AUTS*;处理模块1120用于对所述AUTS*进行解密,以得到重同步认证令牌AUTS和终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;处理模块1120还用于,根据该第一AUTS算法对AUTS进行校验。When the communication device is used as a unified data management network element to execute the method embodiment shown in FIG. 6, the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes an encrypted resynchronization authentication token AUTS*; processing module 1120 is used to decrypt the AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device. The indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; processing module 1120 is also used to verify the AUTS according to the first AUTS algorithm.
当该通信装置作为统一数据管理网元,执行图7中所示的方法实施例时,收发模块1110用于接收认证服务请求,该认证服务请求中包括重同步认证令牌AUTS;处理模块1120用于从AUTS中获取终端设备对应的指示信息,该终端设备对应的指示信息用于指示终端设备计算AUTS采用的第一AUTS算法;处理模块1120还用于,根据该第一AUTS算法对AUTS进行校验。When the communication device is used as a unified data management network element to perform the method embodiment shown in FIG. 7, the transceiver module 1110 is used to receive an authentication service request, and the authentication service request includes a resynchronization authentication token AUTS; the processing module 1120 uses To obtain the instruction information corresponding to the terminal device from the AUTS, the instruction information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS; the processing module 1120 is also used to calibrate the AUTS according to the first AUTS algorithm Test.
在一种可能的设计中,处理模块1120具体用于,根据第一AUTS算法从AUTS中获取移动终端序列号SQN MS,根据该SQN MS计算得到MAC;若该MAC与从AUTS中获取的MAC-S一致,则确定AUTS校验成功。 In a possible design, the processing module 1120 is specifically configured to obtain the mobile terminal serial number SQN MS from the AUTS according to the first AUTS algorithm, and calculate the MAC according to the SQN MS ; if the MAC is the same as the MAC obtained from the AUTS- If S is consistent, it is determined that the AUTS verification is successful.
应理解,该通信装置中涉及的处理模块1120可以由处理器或处理器相关电路组件实现,收发模块1110可以由收发器或收发器相关电路组件实现。该通信装置中的各个模块的操作和/或功能分别为了实现图2、图5、图6或图7中所示方法的相应流程,为了简洁,在此不再赘述。It should be understood that the processing module 1120 involved in the communication device may be implemented by a processor or processor-related circuit components, and the transceiver module 1110 may be implemented by a transceiver or transceiver-related circuit components. The operation and/or function of each module in the communication device is to implement the corresponding process of the method shown in FIG. 2, FIG. 5, FIG. 6 or FIG.
请参考图12,为本申请实施例提供的一种通信装置的另一结构示意图。该通信装置1200可用于实现上述方法实施例中描述的方法。该通信装置1200可以是芯片或网络设备。Please refer to FIG. 12, which is another schematic structural diagram of a communication device according to an embodiment of this application. The communication device 1200 can be used to implement the methods described in the foregoing method embodiments. The communication device 1200 may be a chip or a network device.
该通信装置1200包括一个或多个处理器1201,该一个或多个处理器1201可支持通信装置1200实现图2、图5、图6或图7中的统一数据管理网元或统一数据存储网元的方法。处理器1201可以是通用处理器或者专用处理器。例如,处理器1201可以是中央处理器(central processing unit,CPU)或基带处理器。基带处理器可以用于处理通信数据,CPU可以用于对通信装置(例如,网络设备、终端设备或芯片)进行控制,执行软件程序,处理软件程序的数据。通信装置1200还可以包括收发单元1205,用以实现信号的输入(接收)和输出(发送)。The communication device 1200 includes one or more processors 1201, and the one or more processors 1201 can support the communication device 1200 to implement the unified data management network element or unified data storage network in FIG. 2, FIG. 5, FIG. 6 or FIG. Yuan method. The processor 1201 may be a general-purpose processor or a special-purpose processor. For example, the processor 1201 may be a central processing unit (CPU) or a baseband processor. The baseband processor may be used to process communication data, and the CPU may be used to control a communication device (for example, a network device, a terminal device, or a chip), execute a software program, and process data of the software program. The communication device 1200 may further include a transceiving unit 1205 to implement signal input (reception) and output (transmission).
例如,通信装置1200可以是芯片,收发单元1205可以是该芯片的输入和/或输出电路,或者,收发单元1205可以是该芯片的通信接口,该芯片可以作为终端设备或网络设备或其它无线通信设备的组成部分。For example, the communication device 1200 may be a chip, and the transceiver unit 1205 may be an input and/or output circuit of the chip, or the transceiver unit 1205 may be a communication interface of the chip, and the chip may be used as a terminal device or a network device or other wireless communication. Components of equipment.
通信装置1200中可以包括一个或多个存储器1202,其上存有程序1204,程序1204可被处理器1201运行,生成指令1203,使得处理器1201根据指令1203执行上述方法实施例中描述的方法。可选地,存储器1202中还可以存储有数据。可选地,处理器1201还可以读取存储器1202中存储的数据,该数据可以与程序1204存储在相同的存储地址,该数据也可以与程序1204存储在不同的存储地址。The communication device 1200 may include one or more memories 1202 with a program 1204 stored thereon. The program 1204 can be run by the processor 1201 to generate an instruction 1203 so that the processor 1201 executes the method described in the foregoing method embodiment according to the instruction 1203. Optionally, the memory 1202 may also store data. Optionally, the processor 1201 may also read data stored in the memory 1202. The data may be stored at the same storage address as the program 1204, or the data may be stored at a different storage address from the program 1204.
处理器1201和存储器1202可以单独设置,也可以集成在一起,例如,集成在单板或者系统级芯片(system on chip,SOC)上。The processor 1201 and the memory 1202 may be provided separately or integrated together, for example, integrated on a single board or a system-on-chip (SOC).
该通信装置1200还可以包括收发单元1205以及天线1206。收发单元1205可以称为收发机、收发电路或者收发器,用于通过天线1206实现通信装置的收发功能。The communication device 1200 may further include a transceiver unit 1205 and an antenna 1206. The transceiver unit 1205 may be called a transceiver, a transceiver circuit, or a transceiver, and is used to implement the transceiver function of the communication device through the antenna 1206.
应理解,上述方法实施例的各步骤可以通过处理器1201中的硬件形式的逻辑电路或者软件形式的指令完成。处理器1201可以是CPU、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件,例如,分立门、晶体管逻辑器件或分立硬件组件。It should be understood that each step of the foregoing method embodiment may be completed by a logic circuit in the form of hardware or instructions in the form of software in the processor 1201. The processor 1201 may be a CPU, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices , For example, discrete gates, transistor logic devices, or discrete hardware components.
本申请实施例还提供另一种通信装置,请参阅图13,为本申请实施例提供的另一种通信装置的结构示意图,该通信装置1300包括:收发模块1310和处理模块1320。该通信装 置可用于实现上述任一方法实施例中涉及终端设备的功能。例如,该通信装置可以是终端设备,例如手持终端设备或车载终端设备;该通信装置还可以是终端设备中包括的芯片,如终端设备中安装的USIM卡,或者包括终端设备的装置,如各种类型的车辆等。An embodiment of the present application also provides another communication device. Please refer to FIG. 13, which is a schematic structural diagram of another communication device provided by an embodiment of the present application. The communication device 1300 includes a transceiver module 1310 and a processing module 1320. The communication device can be used to implement the function of the terminal device in any of the foregoing method embodiments. For example, the communication device may be a terminal device, such as a handheld terminal device or a vehicle-mounted terminal device; the communication device may also be a chip included in the terminal device, such as a USIM card installed in the terminal device, or a device including terminal devices, such as various Various types of vehicles, etc.
当该通信装置作为终端设备,执行图6中所示的方法实施例时,处理模块1320用于,计算重同步认证令牌AUTS,并对该AUTS和该通信装置对应的指示信息进行加密,以得到加密重同步认证令牌AUTS*,该通信装置对应的指示信息用于指示该通信装置计算AUTS采用的第一AUTS算法;收发模块1310,用于向接入管理网元发送该AUTS*。When the communication device is used as a terminal device to execute the method embodiment shown in FIG. 6, the processing module 1320 is used to calculate the resynchronization authentication token AUTS, and encrypt the AUTS and the instruction information corresponding to the communication device to Obtain the encrypted resynchronization authentication token AUTS*, the indication information corresponding to the communication device is used to instruct the communication device to calculate the first AUTS algorithm used by the AUTS; the transceiver module 1310 is used to send the AUTS* to the access management network element.
在一种可能的设计中,处理模块1320还用于,根据计算AUTS采用的第一AUTS算法,生成所述装置对应的指示信息。In a possible design, the processing module 1320 is further configured to generate the indication information corresponding to the device according to the first AUTS algorithm used to calculate the AUTS.
当该通信装置作为终端设备,执行图7中所示的方法实施例时,处理模块1320用于,根据该通信装置对应的指示信息,计算重同步认证令牌AUTS,该通信装置对应的指示信息用于指示该通信装置计算AUTS采用的第一AUTS算法;收发模块1310用于,向接入管理网元发送该所述AUTS。When the communication device is used as a terminal device to execute the method embodiment shown in FIG. 7, the processing module 1320 is configured to calculate the resynchronization authentication token AUTS according to the instruction information corresponding to the communication device, and the instruction information corresponding to the communication device It is used to instruct the communication device to calculate the first AUTS algorithm used by the AUTS; the transceiver module 1310 is used to send the AUTS to the access management network element.
在一种可能的设计中,AUTS中包括该通信装置对应的指示信息和/或根据该通信装置对应的指示信息计算得到的MAC-S。In a possible design, the AUTS includes the indication information corresponding to the communication device and/or the MAC-S calculated according to the indication information corresponding to the communication device.
当该通信装置作为终端设备,执行图9中所示的方法实施例时,收发模块1310用于从全球用户标识模块USIM卡接收重同步认证令牌AUTS和USIM卡的配置信息;处理模块1320用于根据所述USIM卡的配置信息,确定指示信息,该指示信息用于指示USIM卡计算AUTS采用的第一AUTS算法;处理模块1320还用于,对AUTS和指示信息进行加密,得到加密重同步认证令牌AUTS*;收发模块1310还用于,向接入管理网元发送该AUTS*。When the communication device is used as a terminal device to perform the method embodiment shown in FIG. 9, the transceiver module 1310 is used to receive the resynchronization authentication token AUTS and the configuration information of the USIM card from the global user identity module USIM card; the processing module 1320 uses According to the configuration information of the USIM card, the indication information is determined, and the indication information is used to indicate the first AUTS algorithm used by the USIM card to calculate AUTS; the processing module 1320 is also used to encrypt the AUTS and the indication information to obtain encryption resynchronization Authentication token AUTS*; the transceiver module 1310 is also used to send the AUTS* to the access management network element.
在一种可能的设计中,所述配置信息包括下列信息中的一项或多项:In a possible design, the configuration information includes one or more of the following information:
USIM卡支持的AUTS算法、USIM卡是否支持特定类型的AUTS算法、USIM卡的类型信息和USIM卡的版本信息。The AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
当该通信装置作为终端设备中安装的USIM卡,执行图9中所示的方法实施例时,处理模块1320用于计算重同步认证令牌AUTS;收发模块1310用于将该AUTS和该USIM卡的配置信息发送至终端设备。When the communication device is used as the USIM card installed in the terminal device and the method embodiment shown in FIG. 9 is executed, the processing module 1320 is used to calculate the resynchronization authentication token AUTS; the transceiver module 1310 is used to calculate the AUTS and the USIM card The configuration information is sent to the terminal device.
在一种可能的设计中,所述配置信息包括下列信息中的一项或多项:In a possible design, the configuration information includes one or more of the following information:
USIM卡支持的AUTS算法、USIM卡是否支持特定类型的AUTS算法、USIM卡的类型信息和USIM卡的版本信息。The AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
该通信装置中涉及的处理模块1320可以由处理器或处理器相关电路组件实现,收发模块1310可以由收发器或收发器相关电路组件实现。该通信装置中的各个模块的操作和/或功能分别为了实现图6至图10中所示方法的相应流程,为了简洁,在此不再赘述。The processing module 1320 involved in the communication device may be implemented by a processor or processor-related circuit components, and the transceiver module 1310 may be implemented by a transceiver or transceiver-related circuit components. The operation and/or function of each module in the communication device is to implement the corresponding process of the method shown in FIG. 6 to FIG. 10, and is not repeated here for brevity.
请参阅图14,为本申请实施例中提供的另一种通信装置的另一结构示意图。该通信装置具体可为一种终端设备。便于理解和图示方便,在图14中,终端设备以手机作为例子。如图14所示,终端设备包括处理器,还可以包括存储器,当然,也还可以包括射频电路、天线以及输入输出装置等。处理器主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于 接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。Please refer to FIG. 14, which is a schematic diagram of another structure of another communication device provided in an embodiment of this application. The communication device may specifically be a terminal device. It is easy to understand and easy to illustrate. In FIG. 14, the terminal device uses a mobile phone as an example. As shown in FIG. 14, the terminal device includes a processor, and may also include a memory. Of course, it may also include a radio frequency circuit, an antenna, and an input/output device. The processor is mainly used to process the communication protocol and communication data, and to control the terminal device, execute the software program, and process the data of the software program. The memory is mainly used to store software programs and data. The radio frequency circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals. The antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal devices may not have input and output devices.
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图14中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit. The radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna. When data is sent to the terminal device, the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data. For ease of description, only one memory and processor are shown in FIG. 14. In an actual terminal device product, there may be one or more processors and one or more memories. The memory may also be referred to as a storage medium or storage device. The memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的收发单元,将具有处理功能的处理器视为终端设备的处理单元。如图14所示,终端设备包括收发单元1410和处理单元1420。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元1410中用于实现接收功能的器件视为接收单元,将收发单元1410中用于实现发送功能的器件视为发送单元,即收发单元1410包括接收单元和发送单元。收发单元有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。应理解,收发单元1410用于执行上述方法实施例中终端设备侧的发送操作和接收操作,处理单元1420用于执行上述方法实施例中终端设备上除了收发操作之外的其他操作。In the embodiments of the present application, the antenna and radio frequency circuit with the transceiving function can be regarded as the transceiving unit of the terminal device, and the processor with the processing function can be regarded as the processing unit of the terminal device. As shown in FIG. 14, the terminal device includes a transceiving unit 1410 and a processing unit 1420. The transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on. The processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on. Optionally, the device for implementing the receiving function in the transceiving unit 1410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1410 as the sending unit, that is, the transceiving unit 1410 includes a receiving unit and a sending unit. The transceiver unit may sometimes be referred to as a transceiver, a transceiver, or a transceiver circuit. The receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit. The transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit. It should be understood that the transceiving unit 1410 is used to perform sending and receiving operations on the terminal device side in the foregoing method embodiment, and the processing unit 1420 is used to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
本申请实施例还提供一种芯片系统,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得该芯片系统实现上述任一方法实施例中的方法。An embodiment of the present application also provides a chip system, including: a processor, the processor is coupled with a memory, the memory is used to store a program or instruction, when the program or instruction is executed by the processor, the The chip system implements the method in any of the foregoing method embodiments.
可选地,该芯片系统中的处理器可以为一个或多个。该处理器可以通过硬件实现也可以通过软件实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现。Optionally, there may be one or more processors in the chip system. The processor can be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
可选地,该芯片系统中的存储器也可以为一个或多个。该存储器可以与处理器集成在一起,也可以和处理器分离设置,本申请并不限定。示例性的,存储器可以是非瞬时性处理器,例如只读存储器ROM,其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请对存储器的类型,以及存储器与处理器的设置方式不作具体限定。Optionally, there may be one or more memories in the chip system. The memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application. Exemplarily, the memory may be a non-transitory processor, such as a read-only memory ROM, which may be integrated with the processor on the same chip, or may be set on different chips. The setting method of the processor is not specifically limited.
示例性的,该芯片系统可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。Exemplarily, the chip system may be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (SoC). It can also be a central processor unit (CPU), a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller). The controller unit, MCU), may also be a programmable controller (programmable logic device, PLD) or other integrated chips.
应理解,上述方法实施例中的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。It should be understood that each step in the foregoing method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software. The steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
本申请实施例还提供一种计算机可读存储介质,所述计算机存储介质中存储有计算机 可读指令,当计算机读取并执行所述计算机可读指令时,使得计算机执行上述任一方法实施例中的方法。The embodiment of the present application also provides a computer-readable storage medium, which stores computer-readable instructions, and when the computer reads and executes the computer-readable instructions, the computer is caused to execute any of the above-mentioned method embodiments In the method.
本申请实施例还提供一种计算机程序产品,当计算机读取并执行所述计算机程序产品时,使得计算机执行上述任一方法实施例中的方法。The embodiments of the present application also provide a computer program product. When the computer reads and executes the computer program product, the computer is caused to execute the method in any of the foregoing method embodiments.
本申请实施例还提供一种通信系统,该通信系统包括统一数据管理网元和终端设备。可选的,该终端设备中设置有USIM卡。可选的,通信系统中还可包括接入网设备、接入管理网元、认证服务功能网元、统一数据存储网元中的一项或多项。The embodiment of the present application also provides a communication system, which includes a unified data management network element and terminal equipment. Optionally, a USIM card is provided in the terminal device. Optionally, the communication system may also include one or more of an access network device, an access management network element, an authentication service function network element, and a unified data storage network element.
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor mentioned in the embodiments of this application may be a central processing unit (central processing unit, CPU), or other general-purpose processors, digital signal processors (digital signal processors, DSP), and application-specific integrated circuits ( application specific integrated circuit (ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM).
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component, the memory (storage module) is integrated in the processor.
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be noted that the memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that in the various embodiments of the present application, the size of the sequence numbers of the above-mentioned processes does not mean the order of execution. The execution order of the processes should be determined by their functions and internal logic, and should not be used in the embodiments of the present invention. The implementation process constitutes any limitation.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may realize that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the system, device and unit described above can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显 示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes. .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims (34)

  1. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    统一数据管理网元接收认证服务请求,所述认证服务请求中包括重同步认证令牌AUTS;The unified data management network element receives an authentication service request, and the authentication service request includes the resynchronization authentication token AUTS;
    所述统一数据管理网元获取终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The unified data management network element obtains the indication information corresponding to the terminal device, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
    所述统一数据管理网元根据所述第一AUTS算法对所述AUTS进行校验。The unified data management network element verifies the AUTS according to the first AUTS algorithm.
  2. 根据权利要求1所述的方法,其特征在于,所述统一数据管理网元获取所述终端设备对应的指示信息,包括:The method according to claim 1, wherein said unified data management network element acquiring indication information corresponding to said terminal device comprises:
    所述统一数据管理网元从本地配置中获取所述指示信息,或从统一数据存储网元中获取所述指示信息。The unified data management network element obtains the indication information from a local configuration or obtains the indication information from a unified data storage network element.
  3. 根据权利要求1或2所述的方法,其特征在于,所述指示信息包含在所述终端设备的签约数据中。The method according to claim 1 or 2, wherein the indication information is included in the subscription data of the terminal device.
  4. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    统一数据存储网元从统一数据管理网元接收服务调用请求,所述服务调用请求用于请求终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The unified data storage network element receives a service call request from the unified data management network element. The service call request is used to request indication information corresponding to the terminal device, and the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS used The first AUTS algorithm;
    所述统一数据存储网元向所述统一数据管理网元发送服务响应消息,所述服务响应消息中包括所述终端设备对应的指示信息。The unified data storage network element sends a service response message to the unified data management network element, and the service response message includes indication information corresponding to the terminal device.
  5. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    统一数据管理网元接收认证服务请求,所述认证服务请求中包括加密重同步认证令牌AUTS*;The unified data management network element receives an authentication service request, and the authentication service request includes an encrypted resynchronization authentication token AUTS*;
    所述统一数据管理网元对所述AUTS*进行解密,以得到重同步认证令牌AUTS和所述终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The unified data management network element decrypts the AUTS* to obtain the resynchronization authentication token AUTS and the indication information corresponding to the terminal device, and the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS The first AUTS algorithm used;
    所述统一数据管理网元根据所述第一AUTS算法对所述AUTS进行校验。The unified data management network element verifies the AUTS according to the first AUTS algorithm.
  6. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    终端设备计算重同步认证令牌AUTS,并对所述AUTS和所述终端设备对应的指示信息进行加密,以得到加密重同步认证令牌AUTS*,所述终端设备对应的指示信息用于指示所述终端设备计算所述AUTS采用的第一AUTS算法;The terminal equipment calculates the resynchronization authentication token AUTS, and encrypts the AUTS and the indication information corresponding to the terminal equipment to obtain the encrypted resynchronization authentication token AUTS*, and the indication information corresponding to the terminal equipment is used to indicate all The first AUTS algorithm used by the terminal device to calculate the AUTS;
    所述终端设备向接入管理网元发送所述AUTS*。The terminal device sends the AUTS* to the access management network element.
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:The method according to claim 6, wherein the method further comprises:
    所述终端设备根据计算所述AUTS采用的第一AUTS算法,生成所述终端设备对应的指示信息。The terminal device generates the indication information corresponding to the terminal device according to the first AUTS algorithm used to calculate the AUTS.
  8. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    统一数据管理网元接收认证服务请求,所述认证服务请求中包括重同步认证令牌AUTS;The unified data management network element receives an authentication service request, and the authentication service request includes the resynchronization authentication token AUTS;
    所述统一数据管理网元从所述AUTS中获取所述终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The unified data management network element obtains the indication information corresponding to the terminal device from the AUTS, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
    所述统一数据管理网元根据所述第一AUTS算法对所述AUTS进行校验。The unified data management network element verifies the AUTS according to the first AUTS algorithm.
  9. 根据权利要求8所述的方法,其特征在于,所述统一数据管理网元根据所述第一AUTS算法对所述AUTS进行校验,包括:The method according to claim 8, wherein the unified data management network element checking the AUTS according to the first AUTS algorithm comprises:
    所述统一数据管理网元根据所述第一AUTS算法,从所述AUTS中获取移动终端序列号SQN MSThe unified data management network element obtains the mobile terminal serial number SQN MS from the AUTS according to the first AUTS algorithm;
    根据所述SQN MS计算得到MAC,若所述MAC与从所述AUTS中获取的MAC-S一致,则所述统一数据管理网元确定所述AUTS校验成功。 The MAC is calculated according to the SQN MS , and if the MAC is consistent with the MAC-S obtained from the AUTS, the unified data management network element determines that the AUTS check succeeds.
  10. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    终端设备根据所述终端设备对应的指示信息,计算重同步认证令牌AUTS,所述指示信息用于指示所述终端设备计算所述AUTS采用的第一AUTS算法;The terminal device calculates the resynchronization authentication token AUTS according to the instruction information corresponding to the terminal device, where the instruction information is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
    所述终端设备向接入管理网元发送所述AUTS。The terminal device sends the AUTS to the access management network element.
  11. 根据权利要求10所述的方法,其特征在于,所述AUTS中包括所述终端设备对应的指示信息和/或根据所述指示信息计算得到的MAC-S。The method according to claim 10, wherein the AUTS includes indication information corresponding to the terminal device and/or MAC-S calculated according to the indication information.
  12. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    终端设备从全球用户标识模块USIM卡接收重同步认证令牌AUTS和USIM卡的配置信息;The terminal device receives the resynchronization authentication token AUTS and the configuration information of the USIM card from the global user identity module USIM card;
    所述终端设备根据所述USIM卡的配置信息,确定指示信息,所述指示信息用于指示所述USIM卡计算所述AUTS采用的第一AUTS算法;The terminal device determines indication information according to the configuration information of the USIM card, where the indication information is used to instruct the USIM card to calculate the first AUTS algorithm used by the AUTS;
    所述终端设备对所述AUTS和所述指示信息进行加密,以得到加密重同步认证令牌AUTS*;The terminal device encrypts the AUTS and the indication information to obtain an encrypted resynchronization authentication token AUTS*;
    所述终端设备发送所述AUTS*。The terminal device sends the AUTS*.
  13. 根据权利要求12所述的方法,其特征在于,所述配置信息包括下列信息中的一项或多项:The method according to claim 12, wherein the configuration information includes one or more of the following information:
    所述USIM卡支持的AUTS算法、所述USIM卡是否支持特定类型的AUTS算法、所述USIM卡的类型信息和所述USIM卡的版本信息。The AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
  14. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method includes:
    全球用户标识模块USIM卡计算重同步认证令牌AUTS;The global user identification module USIM card calculates the resynchronization authentication token AUTS;
    所述USIM卡将所述AUTS和所述USIM卡的配置信息发送至终端设备。The USIM card sends the AUTS and the configuration information of the USIM card to the terminal device.
  15. 根据权利要求14所述的方法,其特征在于,所述配置信息包括下列信息中的一项或多项:The method according to claim 14, wherein the configuration information includes one or more of the following information:
    所述USIM卡支持的AUTS算法、所述USIM卡是否支持特定类型的AUTS算法、所述USIM卡的类型信息和所述USIM卡的版本信息。The AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
  16. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发模块,用于接收认证服务请求,所述认证服务请求中包括重同步认证令牌AUTS;The transceiver module is configured to receive an authentication service request, where the authentication service request includes the resynchronization authentication token AUTS;
    处理模块,用于获取终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;A processing module, configured to obtain indication information corresponding to the terminal device, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
    所述处理模块还用于,采用所述第一AUTS算法对所述AUTS进行校验。The processing module is further configured to use the first AUTS algorithm to verify the AUTS.
  17. 根据权利要求16所述的装置,其特征在于,所述处理模块具体用于:The device according to claim 16, wherein the processing module is specifically configured to:
    从本地配置中获取所述指示信息,或从统一数据存储网元中获取所述指示信息。Obtain the indication information from the local configuration, or obtain the indication information from the unified data storage network element.
  18. 根据权利要求16或17所述的装置,其特征在于,所述指示信息包含在所述终端 设备的签约数据中。The apparatus according to claim 16 or 17, wherein the instruction information is included in the subscription data of the terminal device.
  19. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发模块,用于从统一数据管理网元接收服务调用请求,所述服务调用请求用于请求终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The transceiver module is configured to receive a service invocation request from the unified data management network element, the service invocation request is used to request indication information corresponding to the terminal device, and the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS used The first AUTS algorithm;
    处理模块,用于通过所述收发模块向所述统一数据管理网元发送服务响应消息,所述服务响应消息中包括所述终端设备对应的指示信息。The processing module is configured to send a service response message to the unified data management network element through the transceiver module, and the service response message includes indication information corresponding to the terminal device.
  20. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发模块,用于接收认证服务请求,所述认证服务请求中包括加密重同步认证令牌AUTS*;The transceiver module is configured to receive an authentication service request, where the authentication service request includes an encrypted resynchronization authentication token AUTS*;
    处理模块,用于对所述AUTS*进行解密,以得到重同步认证令牌AUTS和所述终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;The processing module is used to decrypt the AUTS* to obtain the indication information corresponding to the resynchronization authentication token AUTS and the terminal device. The indication information corresponding to the terminal device is used to instruct the terminal device to calculate the AUTS used The first AUTS algorithm;
    所述处理模块还用于,采用所述第一AUTS算法对所述AUTS进行校验。The processing module is further configured to use the first AUTS algorithm to verify the AUTS.
  21. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    处理模块,用于计算重同步认证令牌AUTS,并对所述AUTS和所述装置对应的指示信息进行加密,以得到加密重同步认证令牌AUTS*,所述装置对应的指示信息用于指示所述装置计算AUTS采用的第一AUTS算法;The processing module is used to calculate the resynchronization authentication token AUTS, and encrypt the AUTS and the indication information corresponding to the device to obtain the encrypted resynchronization authentication token AUTS*, and the indication information corresponding to the device is used to indicate The first AUTS algorithm used by the device to calculate AUTS;
    收发模块,用于向接入管理网元发送所述AUTS*。The transceiver module is used to send the AUTS* to the access management network element.
  22. 根据权利要求21所述的装置,其特征在于,所述处理模块还用于:The device according to claim 21, wherein the processing module is further configured to:
    根据计算AUTS采用的第一AUTS算法,生成所述装置对应的指示信息。According to the first AUTS algorithm used to calculate the AUTS, the indication information corresponding to the device is generated.
  23. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发模块,用于接收认证服务请求,所述认证服务请求中包括重同步认证令牌AUTS;The transceiver module is configured to receive an authentication service request, where the authentication service request includes the resynchronization authentication token AUTS;
    处理模块,用于从所述AUTS中获取所述终端设备对应的指示信息,所述终端设备对应的指示信息用于指示所述终端设备计算AUTS采用的第一AUTS算法;A processing module, configured to obtain indication information corresponding to the terminal device from the AUTS, where the indication information corresponding to the terminal device is used to instruct the terminal device to calculate the first AUTS algorithm used by the AUTS;
    所述处理模块还用于,采用所述第一AUTS算法对所述AUTS进行校验。The processing module is further configured to use the first AUTS algorithm to verify the AUTS.
  24. 根据权利要求23所述的装置,其特征在于,所述处理模块具体用于:The device according to claim 23, wherein the processing module is specifically configured to:
    根据所述第一AUTS算法从所述AUTS中获取的移动终端序列号SQN MS,计算得到MAC; Calculate the MAC according to the mobile terminal serial number SQN MS obtained from the AUTS by the first AUTS algorithm;
    若所述MAC与从所述AUTS中获取的MAC-S一致,则确定所述AUTS校验成功。If the MAC is consistent with the MAC-S obtained from the AUTS, it is determined that the AUTS check succeeds.
  25. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    处理模块,用于根据所述装置对应的指示信息,计算重同步认证令牌AUTS,所述指示信息用于指示所述装置计算AUTS采用的第一AUTS算法;A processing module, configured to calculate the resynchronization authentication token AUTS according to the instruction information corresponding to the device, where the instruction information is used to indicate the first AUTS algorithm used by the device to calculate the AUTS;
    收发模块,用于向接入管理网元发送所述AUTS。The transceiver module is used to send the AUTS to the access management network element.
  26. 根据权利要求25所述的装置,其特征在于,所述AUTS中包括所述装置对应的指示信息和/或根据所述指示信息计算得到的MAC-S。The apparatus according to claim 25, wherein the AUTS includes indication information corresponding to the apparatus and/or MAC-S calculated according to the indication information.
  27. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    收发模块,用于从全球用户标识模块USIM卡接收重同步认证令牌AUTS和USIM卡的配置信息;The transceiver module is used to receive the resynchronization authentication token AUTS and the configuration information of the USIM card from the global user identity module USIM card;
    处理模块,用于根据所述USIM卡的配置信息,确定指示信息,所述指示信息用于指 示所述USIM卡计算所述AUTS采用的第一AUTS算法;A processing module, configured to determine indication information according to the configuration information of the USIM card, where the indication information is used to indicate the first AUTS algorithm used by the USIM card to calculate the AUTS;
    所述处理模块还用于,对所述AUTS和所述指示信息进行加密,以得到加密重同步认证令牌AUTS*;The processing module is further configured to encrypt the AUTS and the indication information to obtain an encrypted resynchronization authentication token AUTS*;
    所述收发模块还用于,向接入管理网元发送所述AUTS*。The transceiver module is further configured to send the AUTS* to the access management network element.
  28. 根据权利要求27所述的装置,其特征在于,所述配置信息包括下列信息中的一项或多项:The device according to claim 27, wherein the configuration information includes one or more of the following information:
    所述USIM卡支持的AUTS算法、所述USIM卡是否支持特定类型的AUTS算法、所述USIM卡的类型信息和所述USIM卡的版本信息。The AUTS algorithm supported by the USIM card, whether the USIM card supports a specific type of AUTS algorithm, the type information of the USIM card, and the version information of the USIM card.
  29. 一种通信装置,其特征在于,所述装置包括:A communication device, characterized in that the device comprises:
    处理模块,用于计算重同步认证令牌AUTS;Processing module, used to calculate the resynchronization authentication token AUTS;
    收发模块,用于将所述AUTS和所述装置的配置信息发送至终端设备。The transceiver module is used to send the AUTS and the configuration information of the device to the terminal equipment.
  30. 根据权利要求29所述的装置,其特征在于,所述配置信息包括下列信息中的一项或多项:The device according to claim 29, wherein the configuration information includes one or more of the following information:
    所述装置支持的AUTS算法、所述装置是否支持特定类型的AUTS算法、所述装置的类型信息和所述装置的版本信息。The AUTS algorithm supported by the device, whether the device supports a specific type of AUTS algorithm, the type information of the device, and the version information of the device.
  31. 一种通信装置,其特征在于,所述装置包括至少一个处理器,所述至少一个处理器与至少一个存储器耦合:A communication device, characterized in that the device includes at least one processor, and the at least one processor is coupled with at least one memory:
    所述至少一个处理器,用于执行所述至少一个存储器中存储的计算机程序或指令,以使得所述装置执行如权利要求1至3中任一项所述的方法,或者使得所述装置执行如权利要求4所述的方法,或者使得所述装置执行如权利要求5所述的方法,或者使得所述装置执行如权利要求6至7中任一项所述的方法,或者使得所述装置执行如权利要求8至9中任一项所述的方法,或者使得所述装置执行如权利要求10至11中任一项所述的方法,或者使得所述装置执行如权利要求12至13中任一项所述的方法,或者使得所述装置执行如权利要求14至15中任一项所述的方法。The at least one processor is configured to execute a computer program or instruction stored in the at least one memory, so that the apparatus executes the method according to any one of claims 1 to 3, or causes the apparatus to execute The method according to claim 4, or the apparatus is caused to perform the method according to claim 5, or the apparatus is caused to perform the method according to any one of claims 6 to 7, or the apparatus is caused Execute the method according to any one of claims 8 to 9, or cause the device to execute the method according to any one of claims 10 to 11, or cause the device to execute the method according to any one of claims 12 to 13 The method according to any one, or the device is caused to execute the method according to any one of claims 14-15.
  32. 一种计算机可读存储介质,其特征在于,用于存储指令,当所述指令被执行时,使如权利要求1至3中任一项所述的方法被实现,或者使如权利要求4所述的方法被实现,或者使如权利要求5所述的方法被实现,或者使如权利要求6至7所述的方法被实现,或者使如权利要求8至9中任一项所述的方法被实现,或者使如权利要求10至11中任一项所述的方法被实现,或者使如权利要求12至13中任一项所述的方法被实现,或者使如权利要求14至15中任一项所述的方法被实现。A computer-readable storage medium, characterized in that it is used to store instructions. When the instructions are executed, the method according to any one of claims 1 to 3 is realized, or the method according to claim 4 is realized. The method described is implemented, or the method according to claim 5 is implemented, or the method according to claims 6 to 7 is implemented, or the method according to any one of claims 8 to 9 is implemented. Is realized, or the method according to any one of claims 10 to 11 is realized, or the method according to any one of claims 12 to 13 is realized, or the method according to any one of claims 14 to 15 is realized. Any one of the methods described is implemented.
  33. 一种通信装置,其特征在于,包括处理器和接口电路;A communication device, characterized in that it comprises a processor and an interface circuit;
    所述接口电路,用于交互代码指令至所述处理器;The interface circuit is used to exchange code instructions to the processor;
    所述处理器用于运行所述代码指令以执行如权利要求1至3中任一项所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求4所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求5所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求6至7中任一项所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求8至9中任一项所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求10至11中任一项所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求12至13中任一项所述的方法,或者所述处理器用于运行所述代码指令以执行如权利要求14至15中任一项所述的方法。The processor is configured to run the code instructions to perform the method according to any one of claims 1 to 3, or the processor is configured to run the code instructions to perform the method according to claim 4, or The processor is configured to run the code instructions to perform the method according to claim 5, or the processor is configured to run the code instructions to perform the method according to any one of claims 6 to 7, or The processor is used to run the code instructions to perform the method according to any one of claims 8 to 9, or the processor is used to run the code instructions to perform any one of claims 10 to 11 The method, or the processor is used to run the code instructions to execute the method according to any one of claims 12 to 13, or the processor is used to run the code instructions to execute the method as claimed in claim 14. The method of any one of to 15.
  34. 一种计算机程序产品,其特征在于,当计算机读取并执行所述计算机程序产品时,使得计算机执行如权利要求1至3中任一项所述的方法,或者执行如权利要求4所述的方法,或者执行如权利要求5所述的方法,或者执行如权利要求6至7中任一项所述的方法,或者执行如权利要求8至9中任一项所述的方法,或者执行如权利要求10至11中任一项所述的方法,或者执行如权利要求12至13中任一项所述的方法,或者执行如权利要求14至15中任一项所述的方法。A computer program product, characterized in that, when the computer reads and executes the computer program product, the computer is caused to execute the method according to any one of claims 1 to 3, or execute the method according to claim 4 Method, or execute the method as claimed in claim 5, or execute the method as claimed in any one of claims 6 to 7, or execute the method as claimed in any one of claims 8 to 9, or execute as The method according to any one of claims 10 to 11, or the method according to any one of claims 12 to 13, or the method according to any one of claims 14 to 15.
PCT/CN2020/122866 2020-02-20 2020-10-22 Communication method and apparatus WO2021164291A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010103830.2A CN113285805B (en) 2020-02-20 2020-02-20 Communication method and device
CN202010103830.2 2020-02-20

Publications (1)

Publication Number Publication Date
WO2021164291A1 true WO2021164291A1 (en) 2021-08-26

Family

ID=77274991

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/122866 WO2021164291A1 (en) 2020-02-20 2020-10-22 Communication method and apparatus

Country Status (2)

Country Link
CN (1) CN113285805B (en)
WO (1) WO2021164291A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101448263A (en) * 2008-12-16 2009-06-03 华为技术有限公司 Method for implementing authentication resynchronization and network device
US20130331063A1 (en) * 2012-06-11 2013-12-12 Research In Motion Limited Enabling multiple authentication applications

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7574599B1 (en) * 2002-10-11 2009-08-11 Verizon Laboratories Inc. Robust authentication and key agreement protocol for next-generation wireless networks
CN101123778A (en) * 2007-09-29 2008-02-13 大唐微电子技术有限公司 Network access authentication method and its USIM card
JP6101088B2 (en) * 2012-10-31 2017-03-22 株式会社Nttドコモ Status change notification method, subscriber authentication device, status change detection device, and mobile communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101448263A (en) * 2008-12-16 2009-06-03 华为技术有限公司 Method for implementing authentication resynchronization and network device
US20130331063A1 (en) * 2012-06-11 2013-12-12 Research In Motion Limited Enabling multiple authentication applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on authentication enhancements in 5G System; (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.846, vol. SA WG3, no. V0.5.0, 2 January 2020 (2020-01-02), pages 1 - 25, XP051841106 *

Also Published As

Publication number Publication date
CN113285805B (en) 2022-08-26
CN113285805A (en) 2021-08-20

Similar Documents

Publication Publication Date Title
US11909870B2 (en) ECDHE key exchange for mutual authentication using a key server
CN109587688B (en) Security in inter-system mobility
JP6759232B2 (en) Authentication and key sharing with complete forward secrecy
US20220385445A1 (en) EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT
JP7443541B2 (en) Key acquisition method and device
WO2022057736A1 (en) Authorization method and device
WO2019153994A1 (en) Security negotiation method and apparatus
WO2019029531A1 (en) Method for triggering network authentication, and related device
WO2020216338A1 (en) Parameter sending method and apparatus
WO2021244509A1 (en) Data transmission method and system, electronic device, and computer readable storage medium
WO2019095990A1 (en) Communication method and device
WO2021120924A1 (en) Method and device for certificate application
WO2018205148A1 (en) Data packet checking method and device
WO2018233726A1 (en) Network slice authentication method, corresponding apparatus and system, and medium
WO2021218978A1 (en) Key management method, device and system
WO2021244569A1 (en) Data transmission method and system, electronic device, and storage medium
JP2022501973A (en) How and equipment to handle security contexts during system-to-system changes
CN111836260B (en) Authentication information processing method, terminal and network equipment
WO2017152360A1 (en) Method and device for radio bearer security configuration
WO2021164291A1 (en) Communication method and apparatus
WO2020147602A1 (en) Authentication method, apparatus and system
WO2022088106A1 (en) Message transmission method and apparatus
WO2021134364A1 (en) Online subscription method and apparatus
CN115515130A (en) Method and device for generating session key
WO2016176902A1 (en) Terminal authentication method, management terminal and application terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20920032

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20920032

Country of ref document: EP

Kind code of ref document: A1