WO2021196818A1 - Key generation method and apparatus, and device and computer readable storage medium - Google Patents

Key generation method and apparatus, and device and computer readable storage medium Download PDF

Info

Publication number
WO2021196818A1
WO2021196818A1 PCT/CN2021/070544 CN2021070544W WO2021196818A1 WO 2021196818 A1 WO2021196818 A1 WO 2021196818A1 CN 2021070544 W CN2021070544 W CN 2021070544W WO 2021196818 A1 WO2021196818 A1 WO 2021196818A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
network element
information
key
akma
Prior art date
Application number
PCT/CN2021/070544
Other languages
French (fr)
Chinese (zh)
Inventor
毕晓宇
Original Assignee
大唐移动通信设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大唐移动通信设备有限公司 filed Critical 大唐移动通信设备有限公司
Publication of WO2021196818A1 publication Critical patent/WO2021196818A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to a method and device for generating a key, equipment, and a computer-readable storage medium.
  • the 5G network provides the session security protection function between the user and the access application, and proposes an application-based key management method, referred to as AKMA (Authentication and Key Management for Applications, application layer authentication and key management).
  • AKMA Authentication and Key Management for Applications, application layer authentication and key management
  • NEF Network Exposure Function
  • the AKMA service requires logical entities, such as AAnF (AKMA Anchor Function) in Figure 1.
  • AAnF AKMA Anchor Function
  • the AAnF anchor point function is used to generate the application key K AF that protects the UE application data based on the anchor key K AKMA between the UE (User Equipment) and the AF (Application Function, application function).
  • AUSF Authentication Server Function
  • AAnF Authentication Server Function
  • the embodiments of the present disclosure provide a key generation method and device, equipment, and computer-readable storage medium to save network resources.
  • the embodiments of the present disclosure provide a key generation method applied to a first network element, which includes:
  • a key is generated.
  • the application service security capability includes the capability of supporting application layer authentication and key management AKMA service
  • the method further includes:
  • the generating a key according to the first information includes:
  • an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
  • the method further includes:
  • the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service is pre-stored.
  • said obtaining the first information of the terminal includes:
  • the authentication request message carrying the SUPI (Subscription Permanent Identifier) of the terminal, or the authentication request message carrying the SUCI (Subscription Concealed Identifier) of the terminal, Signed encryption mark);
  • the authentication request message carries the SUPI
  • query the correspondence relationship according to the SUPI to obtain the first information
  • the authentication request message When the authentication request message carries the SUCI, send the SUCI to the UDM and obtain the SUPI from the UDM; query the correspondence relationship according to the SUPI obtained from the UDM to obtain the first information.
  • the request for the unified data management entity UDM to confirm whether the terminal supports the AKMA service includes:
  • the method before the sending the first indication information to the UDM, the method further includes:
  • the sending first indication information to the UDM includes:
  • first indication information is sent to the UDM.
  • the obtaining of the first information of the terminal includes:
  • the authentication request message carries the first information
  • the application service security capability includes at least the capability of supporting AKMA services, and supporting GBA (Generic Bootstrapping Architecture) services Ability.
  • said method further includes:
  • the generating a key according to the first information includes:
  • the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, an AKMA key or a GBA key is generated;
  • the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the key is generated according to the preset policy.
  • the method further includes:
  • the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service, sending the information of the security capability of the target application service to a third network element;
  • the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service
  • the preset policy and the key generated according to the preset policy are sent to a third network element.
  • said obtaining the first information of the terminal includes:
  • the generating a key according to the first information includes:
  • the embodiments of the present disclosure provide a key generation method applied to a third network element, including:
  • the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application
  • the service security capability is one or more of the application service security capabilities supported by the terminal;
  • the determination of the application service security capabilities supported by the terminal and the information of the fourth network element includes:
  • the generating the key of the application service security capability supported by the terminal includes:
  • the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  • the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
  • the generating the key of the application service security capability supported by the terminal includes:
  • the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
  • the determination of the application service security capabilities supported by the terminal and the information of the fourth network element includes:
  • the generating the key of the application service security capability supported by the terminal includes:
  • the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  • embodiments of the present disclosure provide a method for generating a key, which is applied to a second network element, and includes:
  • the sending the first information to the first network element includes:
  • the sending the first information to the first network element includes:
  • the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the embodiments of the present disclosure provide a key generation method applied to UDM, including:
  • the target application service security capability supported by the terminal is confirmed.
  • the confirming the target application service security capability supported by the terminal according to the subscription information includes:
  • a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  • the receiving the first request of the first network element includes:
  • the first request of the first network element is received.
  • the confirming the target application service security capability supported by the terminal according to the subscription information includes:
  • a second response is sent to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
  • the confirming the target application service security capability supported by the terminal according to the subscription information includes:
  • a third response is sent to the first network element, where the third response is used to indicate that the target application service security capability is the capability of supporting AKMA service or the capability of supporting GBA service.
  • the target application service security capability is at least the capability of AKMA to support services and the capability of supporting GBA services.
  • the contract information further includes:
  • the identification information of the fourth network element that has enabled the AKMA service with the terminal is the identification information of the fourth network element that has enabled the AKMA service with the terminal.
  • the embodiments of the present disclosure also provide a key generation method applied to a second network element, including:
  • the indication information is used to indicate the ability of the terminal to support the AKMA service
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the embodiments of the present disclosure also provide a key generation method, which is applied to UDM, including:
  • said acquiring the contract information of the terminal includes:
  • the method further includes:
  • the method further includes:
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the embodiments of the present disclosure also provide a method for generating a key, which is applied to a terminal, and includes:
  • the sending the first information to the second network element includes:
  • the sending the first information to the second network element includes:
  • the N1 message is sent to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the method further includes:
  • the AKMA key is generated according to the key derivation parameter.
  • embodiments of the present disclosure provide a key generation device applied to a first network element, including:
  • the first obtaining module is configured to obtain first information of the terminal, where the first information is used to indicate the application service security capabilities supported by the terminal;
  • the first generating module is configured to generate a key according to the first information.
  • embodiments of the present disclosure provide a key generation device applied to a third network element, including:
  • the first receiving module is configured to receive the key request of the target fourth network element
  • the first determining module is configured to determine, according to the key request, the application service security capability supported by the terminal and the information of the fourth network element, and the fourth network element is the fourth network element that enables the terminal to enable the target application service security capability Network element, the target application service security capability is one or more of the application service security capabilities supported by the terminal;
  • the first generating module is used to generate the key of the application service security capability supported by the terminal.
  • an embodiment of the present disclosure provides a key generation device applied to a second network element, including:
  • the first sending module is configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first information is used to make the first network element according to the first information To generate a key.
  • an embodiment of the present disclosure provides a key generation device applied to UDM, including:
  • the first storage module is configured to store subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
  • the first confirmation module is configured to confirm the target application service security capability supported by the terminal according to the subscription information.
  • embodiments of the present disclosure provide a key generation device applied to a second network element, including:
  • the first sending module is configured to send indication information and the identification of the fourth network element to the UDM, where the indication information is used to indicate the application service security capabilities supported by the terminal;
  • the first receiving module is configured to receive the key derivation parameter sent by the UDM;
  • the second sending module is configured to send the key derivation parameter to the terminal.
  • embodiments of the present disclosure provide a key generation device applied to UDM, including:
  • the first obtaining module is configured to obtain contract information of the terminal, where the contract information includes the application service security capabilities supported by the terminal;
  • the first sending module is configured to send a first instruction to the first network element when it is determined that the terminal is to derive the application service security key according to the subscription information, and the first instruction is used to instruct the first network Yuan derives the application service security key of the terminal.
  • embodiments of the present disclosure provide a key generation device applied to a terminal, including:
  • the first sending module is configured to send first information to a second network element, where the first information is used to indicate an application service security capability supported by the terminal.
  • the embodiments of the present disclosure provide a key generation device, which is applied to a first network element, and includes: a transceiver, a memory, a processor, and is stored in the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
  • a key is generated.
  • the application service security capability includes the capability to support the AKMA service, and the processor is also used to read the program in the memory and execute the following process:
  • an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
  • the embodiments of the present disclosure provide a key generation device, which is applied to a third network element, and includes: a transceiver, a memory, a processor, and is stored on the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
  • the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application
  • the service security capability is one or more of the application service security capabilities supported by the terminal
  • the processor is used to read the program in the memory and execute the following process:
  • the generating the key of the application service security capability supported by the terminal includes:
  • the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  • the embodiments of the present disclosure provide a key generation device, which is applied to a second network element, and includes: a transceiver, a memory, a processor, and is stored in the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
  • the embodiments of the present disclosure provide a key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor;
  • the processor is used to read the program in the memory and execute the following process:
  • the target application service security capability supported by the terminal is confirmed.
  • the processor is used to read the program in the memory and execute the following process:
  • a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  • the embodiments of the present disclosure provide a key generation device, which is applied to a second network element, and includes: a transceiver, a memory, a processor, and is stored on the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
  • the embodiments of the present disclosure provide a key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor;
  • the processor is used to read the program in the memory and execute the following process:
  • a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key.
  • Application service security key is used to instruct the first network element to derive the terminal's security key.
  • the processor is used to read the program in the memory and execute the following process:
  • embodiments of the present disclosure provide a key generation device applied to a terminal, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor
  • the processor is used to read the program in the memory and execute the following process:
  • the embodiments of the present disclosure provide a computer-readable storage medium for storing a computer program, wherein the computer program is executed by a processor to implement the key generation method described in the first aspect Or, implement the steps in the key generation method as described in the second aspect; or implement the steps in the key generation method as described in the third aspect; or, implement the encryption as described in the fourth aspect Or, implement the steps in the key generation method as described in the fifth aspect; or implement the steps in the key generation method as described in the sixth aspect; or, implement the steps in the key generation method as described in the seventh aspect; The steps in the key generation method.
  • Figure 1 is a diagram of the AKMA architecture in related technologies
  • FIG. 2 is one of the flowcharts of the key generation method provided by the embodiment of the present disclosure
  • FIG. 3 is the second flowchart of the key generation method provided by the embodiment of the present disclosure.
  • FIG. 4 is the third flowchart of the key generation method provided by the embodiment of the present disclosure.
  • FIG. 5 is the fourth flow chart of the key generation method provided by the embodiment of the present disclosure.
  • FIG. 6 is the fifth flowchart of the key generation method provided by an embodiment of the present disclosure.
  • FIG. 7 is the sixth flowchart of the key generation method provided by an embodiment of the present disclosure.
  • FIG. 8 is the seventh flowchart of the key generation method provided by the embodiments of the present disclosure.
  • FIG. 9 is the eighth flowchart of the key generation method provided by an embodiment of the present disclosure.
  • FIG. 10 is the ninth flowchart of the key generation method provided by an embodiment of the present disclosure.
  • FIG. 11 is a tenth flowchart of a key generation method provided by an embodiment of the present disclosure.
  • Figure 12 is the eleventh flowchart of the key generation method provided by the embodiments of the present disclosure.
  • FIG. 13 is the twelfth of the flowchart of the key generation method provided by the embodiment of the present disclosure.
  • FIG. 14 is one of the structural diagrams of a key generation device provided by an embodiment of the present disclosure.
  • FIG. 15 is the second structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • FIG. 16 is the third structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • FIG. 17 is the fourth structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • FIG. 18 is the fifth structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • FIG. 19 is a sixth structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • FIG. 20 is the seventh structural diagram of the key generation device provided by an embodiment of the present disclosure.
  • Figure 21 is one of the structural diagrams of a key generation device provided by an embodiment of the present disclosure.
  • Fig. 22 is a second structural diagram of a key generation device provided by an embodiment of the present disclosure.
  • FIG. 2 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to the first network element.
  • the first network element may be AUSF (Authentication Server Function), as shown in FIG. 2, including the following steps 201 and 202.
  • AUSF Authentication Server Function
  • Step 201 Acquire first information of a terminal, where the first information is used to indicate an application service security capability supported by the terminal.
  • the application security service capability supported by the terminal may be, for example, the capability of supporting AKMA service, the capability of supporting GBA service, and so on.
  • Step 202 Generate a key according to the first information.
  • the first network element may generate an AKMA key for the terminal.
  • the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service may be pre-stored in the first network element.
  • the first network element may receive the authentication request sent by the second network element (AMF (Access and Mobility Management Function, access and mobility management function) or SEAF (Security Anchor Function, security anchor function)) Message, the authentication request message carries the SUPI of the terminal, or the authentication request message carries the SUCI of the terminal.
  • AMF Access and Mobility Management Function, access and mobility management function
  • SEAF Security Anchor Function, security anchor function
  • the first network element may query the correspondence relationship according to the SUPI to obtain the first information.
  • the first network element may send the SUCI to the UDM and obtain the SUPI from the UDM, and then the first network element may query according to the SUPI obtained from the UDM According to the corresponding relationship, the first information is acquired.
  • the first network element can confirm to the UDM whether the terminal supports the AKMA service.
  • step 201 specifically includes receiving an authentication request message sent by a second network element, where the authentication request message carries the first information.
  • Step 202 specifically includes generating an AKMA key when receiving a first response, where the first response indicates that the UDM confirms that the terminal supports the AKMA service.
  • the first network element may send first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service, and to receive the UDM sent A first confirmation instruction, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
  • the process of requesting UDM confirmation can occur during the main authentication process or after the main authentication process.
  • the first network element receives the first request of the terminal, and the first request is used to request the generation of an AKMA key, and then sends to the UDM according to the first request The first instruction information.
  • the first network element may receive an authentication request message sent by a second network element, the authentication request message carries the first information, and the application service security capability includes at least an AKMA service Ability, the ability to support GBA services.
  • the first network element may also request UDM to confirm the target application service security capabilities supported by the terminal.
  • step 202 is specifically that if the target application service security capability is one of the capability to support AKMA service or the capability to support GBA service, generate an AKMA key or GBA key; if the target application service is secure
  • the ability is at least the ability to support the AKMA service and the ability to support the GBA service, and the key is generated according to a preset strategy.
  • the preset strategy may be preset, for example, it may be generating an AKMA key, generating a GBA key, generating other keys, etc., or determining which form of key to generate according to the processing capability of the first network element itself.
  • the first network element sends the target application service security capability information to the third network element (such as AAnF); if the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, and the first network element sends the preset policy and the key generated according to the preset policy to the third network element.
  • the third network element such as AAnF
  • the first network element may also generate an AKMA key according to the UDM instruction.
  • the first network element receives instruction information sent by UDM, where the instruction information is used to instruct to select the AKMA service for the terminal.
  • step 202 is specifically: generating a key according to the instruction information, and sending the AKMA key derivation parameter to the UDM.
  • the key derivation parameters may include, for example, random numbers, counters, terminal identifications, and so on.
  • the key is generated according to the first information. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 3 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a third network element.
  • the third network element may be AAnF, as shown in FIG. 3, including the following steps 301 to 303.
  • Step 301 Receive a key request from the target fourth network element.
  • the fourth network element may be AF (Application Function).
  • Step 302 According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element, where the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and The target application service security capability is one or more of the application service security capabilities supported by the terminal.
  • the application service security capabilities supported by the terminal may include the ability to support AKMA services, the ability to support GBA services, and so on.
  • the information of the fourth network element may be the identification of the fourth network element or the like.
  • Step 303 Generate a key for the application service security capability supported by the terminal.
  • the third network element requests UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element. Then, in this step, if the application service security capability supported by the terminal is the capability to support AKMA services and it is determined based on the information of the fourth network element that the connection between the terminal and the target fourth network element is enabled AKMA service, then generate AF key.
  • the third network element obtains the first application service security capability supported by the terminal sent by the first network element, and obtains the identifier of the target fourth network element. If the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
  • the third network element obtains the preset policy sent by the first network element and the key generated according to the preset policy, and obtains the identity of the fourth network element. If the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
  • the third network element may receive the indication information sent by UDM and the identification of the fourth network element, and the indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element It is the fourth network element that has enabled the AKMA service between the terminals. Then, in this step, if the application service security capability supported by the terminal is the capability to support AKMA services and it is determined based on the information of the fourth network element that the connection between the terminal and the target fourth network element is enabled AKMA service, then generate AF key.
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 4 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a second network element.
  • the second network element may be SEAF or AMF, as shown in Figure 4, including the following steps:
  • Step 401 Send first information to a first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information .
  • the second network element may send an authentication request message to the first network element, and the authentication request message carries the first information.
  • the second network element may send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 5 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to UDM. As shown in Figure 5, the following steps 501 and 502 are included.
  • Step 501 Store the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal.
  • the subscription information may also include identification information of the fourth network element that has enabled the AKMA service with the terminal.
  • Step 502 According to the subscription information, confirm the target application service security capability supported by the terminal.
  • UDM may receive a first request from a first network element, the first request is used to confirm whether the terminal supports AKMA service, and then, according to the subscription information and the first request Send a first response to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  • the above process may be during the main authentication process or after the main authentication process.
  • the UDM may receive a second request from a third network element, the second request is used to confirm whether the terminal supports the AKMA service, and then, according to the subscription information and the second request Send a second response to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
  • UDM may receive the third request of the first network element. After that, UDM sends a third response to the first network element according to the subscription information and the third request.
  • the third response is used to indicate that the target application service security capability is one of the capability to support AKMA services or the capability to support GBA services, or the target application service security capability is at least the capability of AKMA to support services and the capability to support GBA services .
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 6 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a second network element.
  • the second network element may be SEAF or AMF, as shown in FIG. 6, including the following steps 601 to 603.
  • Step 601 Send indication information and the identifier of the fourth network element to the UDM, where the indication information is used to indicate the application service security capabilities supported by the terminal.
  • the indication information is used to indicate the ability of the terminal to support the AKMA service
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • Step 602 Receive the key derivation parameter sent by the UDM.
  • Step 603 Send the key derivation parameter to the terminal.
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 7 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to UDM. As shown in Fig. 7, the following steps 701 to 702 are included.
  • Step 701 Acquire subscription information of a terminal, where the subscription information includes application service security capabilities supported by the terminal.
  • UDM may receive the indication information sent by the second network element and the identification of the fourth network element, where the indication information is used to indicate the application service security capabilities supported by the terminal and to communicate with the terminal The identification information of the AF that enables the AKMA service.
  • Step 702 When it is determined that the terminal derives the application service security key according to the subscription information, send a first instruction to the first network element, where the first instruction is used to instruct the first network element to derive the security key.
  • the application service security key of the terminal When it is determined that the terminal derives the application service security key according to the subscription information, send a first instruction to the first network element, where the first instruction is used to instruct the first network element to derive the security key.
  • the method may further include: receiving the key derivation parameter sent by the first network element, and sending the key derivation parameter to the second network element. Derivation parameters.
  • the method may further include: UDM sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate where the terminal is located.
  • UDM sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate where the terminal is located.
  • Supported application service security capabilities where the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • FIG. 8 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a terminal. As shown in Figure 8, it includes the following steps:
  • Step 801 Send first information to a second network element, where the first information is used to indicate an application service security capability supported by the terminal.
  • the terminal may send an N1 message to the second network element, and the first information indicates that the terminal supports the AKMA service.
  • the terminal may send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the terminal may also receive the key derivation parameter sent by the second network element, and generate an AKMA key according to the key derivation parameter.
  • the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
  • the subscription information of the UE can be pre-stored in the AUSF (Authentication Server Function), and the subscription information is a list of the UE’s identity and the corresponding information of the AKMA service. It can identify whether the UE has enabled or supported the AKMA service.
  • AUSF Authentication Server Function
  • the method may include the following steps:
  • Step 900 The AKMA subscription information of the UE is pre-stored in the AUSF.
  • Step 901 The UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI (5G Globally Unique Temporary Identifier).
  • N1 message N1 message
  • SEAF Security Anchor Function
  • 5G GUTI 5G Globally Unique Temporary Identifier
  • Step 902 The SEAF sends an authentication request message (Nausf_UE Authentication_Authenticate Request) to AUSF, and the request carries SUPI or 5G GUTI.
  • Nrf_UE Authentication_Authenticate Request an authentication request message
  • Step 903 This step can be divided into two different processing methods according to the content carried in the authentication request message.
  • the first way includes steps 903a-903c.
  • Step 903a After the AUSF receives the authentication request message NAUSF_UE Authentication Authenticate Request sent by the AMF (Access and Mobility Management Function) (SEAF), if it carries the SUPI, the AUSF can directly follow the pre-stored The list confirms whether K AKMA can be generated by Kausf.
  • AMF Access and Mobility Management Function
  • Step 903b AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM.
  • Step 903c UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF.
  • the AUSF compares the service network name with the expected service network name to check whether the requested SEAF in the service network is authorized to use the received service network name.
  • the second way includes steps 903b-903d.
  • Step 903b AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM.
  • Step 903c UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF.
  • Step 903d Since the SEAF sends SUCI, the AUSF confirms whether K AKMA can be generated by Kausf according to the SUPI obtained from UDM and the pre-stored list.
  • the main authentication process is performed between the AUSF and the UE, including steps 904-908.
  • Step 904 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
  • Step 905 The SEAF sends an Authenticate Request to the UE.
  • Step 906 The UE sends an Authenticate Response to the SEAF.
  • Step 907 SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
  • Step 908 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
  • Step 909 The UE sends an Application session Establishment Request (K AKMA ID) to the AF.
  • K AKMA ID Application session Establishment Request
  • Step 910 The AF sends a Key Request to AAnF.
  • Step 911 AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
  • the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
  • the AAnF when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
  • Step 912 UDM sends a response Inquire the UE subscription to AAnF.
  • the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
  • the AAnF determines whether to generate the key K af for protecting the application data for the AF according to the query result, and sends the Key Response to the AF.
  • Step 913 AAnF sends a query response to the AF.
  • the N1 request reported by the UE includes the ability to support the AKMA service
  • the AMF receives the ability of the AKMA of the UE, and the AMF informs the AUSF that the AKMA service capability indication is carried in the NAUSF_UE Authentication Request request.
  • the method may include the following steps:
  • Step 1001 the UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI and the capability of supporting the AKMA service (UE AKMA service capability).
  • N1 message N1 message
  • SEAF Security Anchor Function
  • Step 1002 the SEAF sends an authentication request message Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI, AKMA service capability indication] to AUSF, and the request carries the SUPI or 5G GUTI and the ability to support the AKMA service.
  • Step 1003 AUSF queries UDM for UE's support for AKMA service.
  • AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM, and can carry an inquiry indication (inquire indication for AKMA).
  • Step 1004 UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF, and may carry a confirmation indication (confirm indication).
  • the AUSF should compare the service network name with the expected service network name to check whether the requested SEAF in the service network has the right to use the received service network name.
  • the main authentication process is performed between the AUSF and the UE, including steps 1005-step 1009.
  • Step 1005 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
  • Step 1006 The SEAF sends an Authenticate Request to the UE.
  • Step 1007 The UE sends an Authenticate Response to the SEAF.
  • Step 1008 SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
  • Step 1009 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
  • Step 1010 The UE sends an Application session Establishment Request (K AKMA ID) to the AF.
  • K AKMA ID Application session Establishment Request
  • Step 1011 The AF sends a Key Request to AAnF.
  • Step 1012 AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
  • the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
  • the AAnF when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
  • Step 1013 UDM sends a response Inquire the UE subscription to AAnF.
  • the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
  • AAnF determines whether to generate a key K af for protecting application data for the AF according to the query result, and sends a key response Key Response to the AF.
  • Step 1014 AAnF sends a response Key Response to the AF.
  • FIG. 11 is a flowchart of a key generation method provided by an embodiment of the present disclosure.
  • the difference from the embodiment shown in FIG. 10 is that the challenge of the UDM for the UEAKMA capability by the AUSF occurs after the master authentication. It is possible that AUSF has received the UE's request for KAKMA key derivation, and AUSF immediately initiates the AKMA key derivation.
  • the method may include the following steps:
  • Step 1101 the UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI and the capability of supporting the AKMA service (UE AKMA service capability).
  • N1 message N1 message
  • SEAF Security Anchor Function
  • Step 1102 SEAF sends an authentication request message Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI, AKMA service capability indication] to AUSF, and the request carries SUPI or 5G GUTI and the ability to support the AKMA service.
  • Step 1103 AUSF sends Nudm_UEAuthentication_Get Request[SUCI or SUPI, SN name] to UDM.
  • Step 1104 UDM replies Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI]] to AUSF.
  • the main authentication process is performed between the AUSF and the UE, including steps 1105-step 1109.
  • Step 1105 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
  • Step 1106 The SEAF sends an Authenticate Request to the UE.
  • Step 1107 The UE sends an Authenticate Response to the SEAF.
  • Step 1108 SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
  • Step 1109 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
  • Step 1110 AUSF queries UDM whether the UE supports AKMA service.
  • Step 1111 UDM performs a query according to the pre-stored subscription information, and returns the query result.
  • AUSF If the query result indicates that the UE supports the AKMA service, AUSF generates the key K AKMA .
  • Step 1112 the UE sends an Application session Establishment Request (K AKMA ID) to the AF.
  • K AKMA ID Application session Establishment Request
  • Step 1113 The AF sends a Key Request to AAnF.
  • Step 1114 AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
  • the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
  • the AAnF when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
  • Step 1115 UDM sends a response Inquire the UE subscription to AAnF.
  • the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
  • the AAnF decides whether to generate the key K af for protecting the application data for the AF according to the query result.
  • Step 1116 AAnF sends a response Key Response to the AF.
  • the network side selects whether to use the AKMA architecture as a mechanism for protecting user application data according to the support of the service capabilities reported by the UE and the service support information reported by the AF.
  • the method may include:
  • Step 1201 The UE sends a registration request, and the registration request carries the user's application service security capabilities (AKMA service capability, GBA service capability, and others). Other service capabilities may be empty.
  • AKMA service capability the registration request carries the user's application service security capabilities (AKMA service capability, GBA service capability, and others).
  • Other service capabilities may be empty.
  • the UE can send N1 message [SUPI or 5G GUTI, Application protection information indication, UE AKMA service capability].
  • Step 1202 the AMF (SEAF) includes these service capabilities in the NAUSF_UE Authentication Authentication Request message, and sends it to the AUSF together with the user identity.
  • SEAF AMF
  • AMF can send Nausf_UEAuthentication_Authenticate Request [SUPI or 5G GUTI, Application protection information indication (application protection information indication), such as AKMA service capability indication (such as AKMA service capability indication)] to AUSF.
  • Application protection information indication application protection information indication
  • AKMA service capability indication such as AKMA service capability indication
  • Step 1203 If the AUSF does not include the message, when the AUSF receives the Nausf_UEAuthentication_Authenticate Request message, it will send the authentication acquisition request message to the UDM to carry the UE service capability challenge indication.
  • AUSF sends Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name] to UDM.
  • Step 1204 After receiving the authentication acquisition instruction sent by AUSF, the UDM will feed back the protection capability information of the UE for application data.
  • UDM sends Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI,Application protection information indication]] to AUSF.
  • Step 1205 AUSF determines which form of key to generate.
  • AUSF chooses which method to use to protect application data according to the received authentication acquisition response message. If UDM clearly indicates that a certain method is selected, such as AKMA service capability, AUSF will generate an AKMA key for the UE. If the UE supports multiple types, the AUSF will choose to derive the key according to the network policy. Among them, the strategy can be preset.
  • Step 1206 AUSF sends the policy together with the derived key to AAnF.
  • AUSF For example, if AUSF generates an AKMA key, AUSF sends the AKMA key to AAnF; if AUSF generates the AKMA key according to the network policy, AUSF sends the policy and the AKMA key to AAnF.
  • Step 1207 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
  • Step 1208 The SEAF sends an Authenticate Request to the UE.
  • Step 1209 The UE sends an Authenticate Response to the SEAF.
  • Step 1210 SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
  • Step 1211 AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
  • Step 1212 The UE sends an application key session request Application session Establishment Request (KAKMA ID) to the AF.
  • KAKMA ID Application session Establishment Request
  • Step 1213 The AF sends a Key Request to AAnF.
  • AAnF receives the application key request sent by AF, and the request information contains information about whether it supports AKMA service to protect application data.
  • Step 1214 AAnF decides to derive the K AF key according to the UE capability and the AF capability sent by AUSF. If both support the AKMA service capability, AAnF decides to derive the K AF key.
  • Step 1215 AAnF sends a response Key Response to the AF.
  • FIG. 13 is a flowchart of a key generation method provided by an embodiment of the present disclosure. As shown in Figure 13, the method may include:
  • Step 1301 UE sends UL NAS message (SUPI, AF ID, AKMA capability) to AMF, carrying AKMA capability, AF ID, etc., where the AKMA capability may be an updated capability.
  • SUPI SUPI
  • AF ID AF ID
  • AKMA capability may be an updated capability.
  • Step 1302 AMF sends Nudm_APProtectionUPdate_Notification(SUPI, AF ID, AKMA capability)) to UDM to update the AKMA capability information.
  • Step 1303 After receiving the UDM, it decides to provide protection for the UE to open the AKMA application.
  • Step 1304 UDM informs AUSF of the information, and then it needs to derive the indication information of the AKMA key for the UE.
  • UDM sends Nausf_APProtection (SUPI, AKMA capability, [Key derivate Indication]) to AUSF.
  • Nausf_APProtection SUPI, AKMA capability, [Key derivate Indication]
  • Step 1305 After receiving it, AUSF sends a response to UDM and sends the required key derivation parameters to UDM.
  • AUSF sends Nausf_APProtection Response (Key derivate parameters) to UDM.
  • AUSF After that, AUSF generates a key.
  • Step 1306 UDM sends a response to AMF after receiving the confirmation from AUSF, and sends AKMA key derivation parameters to AMF.
  • UDM sends Nudm_APProtectionupdate_Notification Response ((AKMA Key derivate parameters)) to AMF.
  • Nudm_APProtectionupdate_Notification Response ((AKMA Key derivate parameters)
  • Step 1307 The AMF sends the necessary key derivation parameters to the UE through a downlink NAS (Non-Access Stratum, non-access stratum) message.
  • NAS Non-Access Stratum, non-access stratum
  • AMF sends DL NAS message (AKMA Key derivate parameters) to UE.
  • DL NAS message AKMA Key derivate parameters
  • Step 1308 The UDM sends the user identification, the user's AKMA capability, the AF ID, and an instruction to derive the key to AAnF.
  • UDM sends Nausf_APProtection (SUPI, AKMA Application capability, AF ID, [Key derivate Indication]) to AANF.
  • Nausf_APProtection SUPI, AKMA Application capability, AF ID, [Key derivate Indication]
  • Step 1309 AAnF responds to the confirmation message.
  • AANF sends Nausf_APProtection Response (Ack) to UDM.
  • Ack Nausf_APProtection Response
  • Step 1310 The UE sends an application key session request Application session Establishment Request (KAKMA ID) to the AF.
  • KAKMA ID Application session Establishment Request
  • Step 1311. The AF sends a Key Request to AAnF.
  • AAnF After AAnF receives the request of AF, it needs to derive the AF key according to UDM's instructions.
  • Step 1312 AAnF sends a response Key Response to the AF.
  • the embodiment of the present disclosure also provides a key generation device, which is applied to the first network element.
  • a key generation device which is applied to the first network element.
  • FIG. 14 which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1400 includes:
  • the first obtaining module 1401 is configured to obtain first information of the terminal, and the first information is used to indicate the security capability of the application service supported by the terminal; the first generating module 1402 is configured to generate Key.
  • the application service security capability includes the capability to support AKMA service
  • the device may further include: a first request module, configured to request UDM to confirm whether the terminal supports AKMA service; the first model generation module 1402 is specifically configured to generate an AKMA key when receiving the first response, The first response indicates that the UDM confirms that the terminal supports the AKMA service.
  • a first request module configured to request UDM to confirm whether the terminal supports AKMA service
  • the first model generation module 1402 is specifically configured to generate an AKMA key when receiving the first response, The first response indicates that the UDM confirms that the terminal supports the AKMA service.
  • the device may further include: a first storage module configured to pre-store the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service.
  • a first storage module configured to pre-store the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service.
  • the first obtaining module 1401 may include: a first receiving submodule, configured to receive an authentication request message sent by a second network element, the authentication request message carrying the terminal's contract permanent identity SUPI, or, The authentication request message carries the subscription encryption identifier SUCI of the terminal; the first obtaining sub-module is configured to query the corresponding relationship according to the SUPI in the case that the authentication request message carries the SUPI, and obtain the The first information; the second acquisition sub-module is used to send the SUCI to the UDM and obtain the SUPI from the UDM when the authentication request message carries the SUCI; query according to the SUPI obtained from the UDM According to the corresponding relationship, the first information is acquired.
  • a first receiving submodule configured to receive an authentication request message sent by a second network element, the authentication request message carrying the terminal's contract permanent identity SUPI, or, The authentication request message carries the subscription encryption identifier SUCI of the terminal
  • the first obtaining sub-module is configured to query the corresponding relationship according to
  • the first obtaining module 1401 may be specifically configured to receive an authentication request message sent by a second network element, where the authentication request message carries the first information.
  • the first request module includes:
  • the first sending submodule is used to send first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service; the first receiving submodule is used to receive the A first confirmation instruction sent by the UDM, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
  • the device may further include: a first receiving module, configured to receive a first request from the terminal, where the first request is used to request to generate an AKMA key; and a first sending module, configured to receive the AKMA key according to the The first request is to send first indication information to the UDM.
  • a first receiving module configured to receive a first request from the terminal, where the first request is used to request to generate an AKMA key
  • a first sending module configured to receive the AKMA key according to the The first request is to send first indication information to the UDM.
  • the first acquisition module is specifically configured to receive an authentication request message sent by a second network element, where the authentication request message carries the first information, and the application service security capability includes at least one supporting AKMA service Ability, the ability to support the GBA service of the universal guidance architecture.
  • the device may further include: a second request module for requesting UDM to confirm the target application service security capability supported by the terminal.
  • the first generating module is specifically configured to generate an AKMA key or a GBA key if the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service; if The target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, and the key is generated according to a preset policy.
  • the device may further include: a second sending module, configured to send the target application service security capability to one of the capability of supporting AKMA service or the capability of supporting GBA service to the third network element.
  • a second sending module configured to send the target application service security capability to one of the capability of supporting AKMA service or the capability of supporting GBA service to the third network element.
  • Information about the security capability of the target application service if the security capability of the target application service is at least the ability to support AKMA services and the ability to support GBA services, send the preset policy to the third network element and generate it according to the preset policy Key.
  • the first acquisition module is configured to receive instruction information sent by UDM, where the instruction information is used to instruct to select an AKMA service for the terminal; the first generation module is specifically configured to: Information, generate a key; send AKMA key derivation parameters to the UDM.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • the embodiment of the present disclosure also provides a key generation device, which is applied to a third network element.
  • FIG. 15 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1500 includes:
  • the first receiving module 1501 is used to receive the key request of the target fourth network element; the first determining module 1502 is used to determine the application service security capability supported by the terminal and the information of the fourth network element according to the key request ,
  • the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application service security capability is one or more of the application service security capabilities supported by the terminal;
  • a generating module 1503 is used to generate the key of the application service security capability supported by the terminal.
  • the first determining module 1502 may be used to request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element; the first generating module 1503 may be used to, if the terminal is The supported application service security capability is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated.
  • the first generating module 1503 may include:
  • the first obtaining submodule is used to obtain the first application service security capability supported by the terminal sent by the first network element; the second obtaining submodule is used to obtain the identification of the target fourth network element; first generation A sub-module, configured to: if the first application service security capability is the capability to support AKMA services, and according to the identifier of the target fourth network element, it is determined that the AKMA service is enabled between the terminal and the target fourth network element, Then the AF key is generated.
  • the first generating module 1503 may include:
  • the third obtaining submodule is used to obtain the preset policy sent by the first network element and the key generated according to the preset policy; the fourth obtaining submodule is used to obtain the identity of the fourth network element; second A generation sub-module is used to determine if the preset policy indicates that the key is generated due to the ability of the terminal to support AKMA services, and determine the relationship between the terminal and the target according to the identity of the target fourth network element If the AKMA service is enabled between the fourth network element, the AF key is generated.
  • the first determining module 1502 may be configured to receive indication information sent by UDM and the identification of the fourth network element, where the indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element Is the fourth network element that has AKMA service enabled between the terminals; the first generation module 1503 can be used if the application service security capability supported by the terminal is the capability to support AKMA services and is based on the fourth network If the information of the element determines that the AKMA service is enabled between the terminal and the target fourth network element, an AF key is generated.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • the embodiment of the present disclosure also provides a key generation device, which is applied to the second network element.
  • a key generation device which is applied to the second network element.
  • FIG. 16 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1600 includes: a first sending module 1601, configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first The information is used to enable the first network element to generate a key according to the first information.
  • a first sending module 1601 configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first The information is used to enable the first network element to generate a key according to the first information.
  • the first sending module 1601 is specifically configured to send an authentication request message to the first network element, where the authentication request message carries the first information.
  • the first sending module 1601 is specifically configured to send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least AKMA service Capacity, GBA service capacity.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • the embodiment of the present disclosure also provides a key generation device, which is applied to UDM.
  • a key generation device which is applied to UDM.
  • FIG. 17 which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1700 includes: a first storage module 1701 for storing subscription information of a terminal, the subscription information includes the security capabilities of application services supported by the terminal; a first confirmation module 1702, According to the subscription information, confirm the target application service security capability supported by the terminal.
  • the first confirmation module 1702 may include: a first receiving submodule, configured to receive a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
  • the sending submodule is configured to send a first response to the first network element according to the subscription information and the first request, where the first response is used to indicate whether the terminal supports the AKMA service.
  • the first receiving submodule is specifically configured to receive the first request of the first network element during the main authentication process; or after the main authentication process is completed, receive the first request of the first network element .
  • the first confirmation module 1702 may include: a second receiving submodule, configured to receive a second request from a third network element, the second request being used to confirm whether the terminal supports AKMA service; second The sending submodule is configured to send a second response to the third network element according to the subscription information and the second request, where the second response is used to indicate whether the terminal supports the AKMA service.
  • the first confirmation module 1702 may include: a third receiving submodule, configured to receive a third request from the first network element; and a third sending submodule, configured to receive the subscription information and the third request Request, send a third response to the first network element, where the third response is used to indicate that the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, or the target application
  • the service security capability is at least the capability of AKMA to support services and the capability to support GBA services.
  • the subscription information further includes: identification information of the fourth network element that has enabled the AKMA service with the terminal.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • FIG. 18 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1800 includes: a first sending module 1801, configured to send indication information and an identifier of a fourth network element to UDM, where the indication information is used to indicate application service security capabilities supported by the terminal;
  • the first receiving module 1802 is configured to receive the key derivation parameter sent by the UDM;
  • the second sending module 1803 is configured to send the key derivation parameter to the terminal.
  • the indication information is used to indicate the ability of the terminal to support the AKMA service
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • the embodiment of the present disclosure also provides a key generation device, which is applied to UDM.
  • a key generation device which is applied to UDM.
  • FIG. 19 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 1900 includes: a first acquisition module 1901, configured to acquire subscription information of a terminal, the subscription information includes the application service security capabilities supported by the terminal; a first sending module 1902, When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal The security key for the application service.
  • the first obtaining module 1901 is specifically configured to receive the indication information sent by the second network element and the identification of the fourth network element, where the indication information is used to indicate the application service security capabilities supported by the terminal, And the identification information of the AF that starts the AKMA service with the terminal.
  • the device may further include: a first receiving module, configured to receive key derivation parameters sent by the first network element; a first sending module, configured to send the second network element to the Key derivation parameters.
  • the device may further include: a second sending module, configured to send instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate the security of the application service supported by the terminal Capability;
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • FIG. 20 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
  • the key generation device 2000 includes: a first sending module 2001, configured to send first information to a second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
  • the first sending module 2001 is specifically configured to send an N1 message to the second network element, and the first information indicates that the terminal supports the AKMA service.
  • the first sending module 2001 is specifically configured to send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the device may further include: a first receiving module, configured to receive key derivation parameters sent by the second network element; a first generation module, configured to generate AKMA according to the key derivation parameters Key.
  • a first receiving module configured to receive key derivation parameters sent by the second network element
  • a first generation module configured to generate AKMA according to the key derivation parameters Key.
  • the device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
  • the key generation device of the embodiment of the present disclosure applied to a terminal, includes a processor 2100, configured to read a program in a memory 2120, and execute the following process:
  • the transceiver 2110 is used to receive and send data under the control of the processor 2100.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2100 and various circuits of the memory represented by the memory 2120 are linked together.
  • the bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2110 may be a plurality of elements, that is, including a transmitter and a receiver, and provide a unit for communicating with various other devices on a transmission medium.
  • the user interface 2130 may also be an interface that can externally and internally connect the required equipment.
  • the connected equipment includes, but is not limited to, a keypad, a display, a speaker, a microphone, a joystick, and the like.
  • the processor 2100 is responsible for managing the bus architecture and general processing, and the memory 2120 can store data used by the processor 2100 when performing operations.
  • the processor 2100 is further configured to read the program and perform the following steps: send an N1 message to the second network element, where the first information indicates that the terminal supports the AKMA service.
  • the processor 2100 is further configured to read the program and perform the following steps: send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the processor 2100 is further configured to read the program and execute the following steps:
  • the key generation device of the embodiment of the present disclosure applied to the first network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • a key is generated.
  • the transceiver 2210 is configured to receive and send data under the control of the processor 2200.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the application service security capability includes the capability to support AKMA service; the processor 2200 is also used to read the program and perform the following steps: request UDM to confirm whether the terminal supports AKMA service; when receiving the first response, generate AKMA Key, the first response indicates that the UDM confirms that the terminal supports the AKMA service.
  • the processor 2200 is further configured to read the program and perform the following steps: pre-store the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the authentication request message carrying the terminal's subscription permanent identification SUPI, or the authentication request message carrying the terminal's subscription encryption identification SUCI;
  • the authentication request message carries the SUPI
  • query the correspondence relationship according to the SUPI to obtain the first information
  • the authentication request message When the authentication request message carries the SUCI, send the SUCI to the UDM and obtain the SUPI from the UDM; query the correspondence relationship according to the SUPI obtained from the UDM to obtain the first information.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the sending first indication information to the UDM includes:
  • first indication information is sent to the UDM.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • An authentication request message sent by a second network element is received, the authentication request message carries the first information, and the application service security capability includes at least the capability of supporting the AKMA service and the capability of supporting the GBA service of the universal guidance architecture.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, an AKMA key or a GBA key is generated;
  • the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the key is generated according to the preset policy.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service, sending the information of the security capability of the target application service to a third network element;
  • the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service
  • the preset policy and the key generated according to the preset policy are sent to a third network element.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the key generation device of the embodiment of the present disclosure applied to a third network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application
  • the service security capability is one or more of the application service security capabilities supported by the terminal;
  • the transceiver 2210 is configured to receive and send data under the control of the processor 2200.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the generating the key of the application service security capability supported by the terminal includes:
  • the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the generating the key of the application service security capability supported by the terminal includes:
  • the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  • the key generation device of the embodiment of the present disclosure applied to the second network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • the transceiver 2210 is configured to receive and send data under the control of the processor 2200.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the application service security capability includes at least an AKMA service capability and a GBA service capability.
  • the key generation device of the embodiment of the present disclosure applied to UDM, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • the target application service security capability supported by the terminal is confirmed.
  • the transceiver 2210 is configured to receive and send data under the control of the processor 2200.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the first request of the first network element is received.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • a second response is sent to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • a third response is sent to the first network element, where the third response is used to indicate that the target application service security capability is the capability of supporting AKMA service or the capability of supporting GBA service.
  • the target application service security capability is at least the capability of AKMA to support services and the capability of supporting GBA services.
  • the subscription information further includes: identification information of the fourth network element that has enabled the AKMA service with the terminal.
  • the key generation device of the embodiment of the present disclosure applied to the second network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the indication information is used to indicate the ability of the terminal to support the AKMA service
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the key generation device of the embodiment of the present disclosure applied to UDM, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
  • a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key.
  • Application service security key is used to instruct the first network element to derive the terminal's security key.
  • the transceiver 2210 is configured to receive and send data under the control of the processor 2200.
  • the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together.
  • the bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein.
  • the bus interface provides the interface.
  • the transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the processor 2200 is further configured to read the program and execute the following steps:
  • the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  • the embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored.
  • a computer program is stored.
  • the computer program is executed by a processor, each process of the above-mentioned key generation method embodiment is realized, and the same The technical effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or a part that contributes to the related technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk). ) Includes several instructions to make a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present disclosure.
  • each module, unit, sub-unit or sub-module can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing equipment (DSP Device, DSPD), Programmable Logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, In other electronic units or combinations thereof that perform the functions described in the present disclosure.
  • ASICs application specific integrated circuits
  • DSP digital signal processors
  • DSP Device digital signal processing equipment
  • PLD Programmable Logic Device
  • Field-Programmable Gate Array Field-Programmable Gate Array
  • FPGA Field-Programmable Gate Array
  • the technology described in the embodiments of the present disclosure can be implemented by modules (for example, procedures, functions, etc.) that perform the functions described in the embodiments of the present disclosure.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed are a key generation method and apparatus, and a device and a computer readable storage medium. The method comprises: obtaining first information of a terminal, the first information being used for representing application service security capability supported by the terminal; and generating a key according to the first information.

Description

密钥生成方法和装置、设备及计算机可读存储介质Key generation method and device, equipment and computer readable storage medium
相关申请的交叉引用Cross-references to related applications
本申请主张在2020年3月31日在中国提交的中国专利申请No.202010249052.8的优先权,其全部内容通过引用包含于此。This application claims the priority of Chinese Patent Application No. 202010249052.8 filed in China on March 31, 2020, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开涉及通信技术领域,尤其涉及一种密钥生成方法和装置、设备及计算机可读存储介质。The present disclosure relates to the field of communication technologies, and in particular, to a method and device for generating a key, equipment, and a computer-readable storage medium.
背景技术Background technique
5G网络中提供用户与接入应用之间的会话安全保护功能,并且提出了基于应用的密钥管理方法,简称为AKMA(Authentication and Key Management for Applications,应用层认证和密钥管理)。The 5G network provides the session security protection function between the user and the access application, and proposes an application-based key management method, referred to as AKMA (Authentication and Key Management for Applications, application layer authentication and key management).
如图1所示,在现有AKMA的架构中,NEF(Network Exposure Function,网络开放功能)提供安全地将3GPP网络提供的业务和能力暴露给外部网络相关的功能。AKMA服务需要逻辑实体,如图1中的AAnF(AKMA Anchor Function,AKMA锚点功能)。AAnF锚点功能用于产生在UE(User Equipment,用户设备)和AF(Application Function,应用功能)之间基于锚点密钥K AKMA计算保护UE应用数据的应用密钥K AFAs shown in Figure 1, in the existing AKMA architecture, NEF (Network Exposure Function) provides functions that safely expose services and capabilities provided by the 3GPP network to external networks. The AKMA service requires logical entities, such as AAnF (AKMA Anchor Function) in Figure 1. The AAnF anchor point function is used to generate the application key K AF that protects the UE application data based on the anchor key K AKMA between the UE (User Equipment) and the AF (Application Function, application function).
相关技术中,一旦UE向网络请求密钥,则AUSF(Authentication Server Function,鉴权服务功能)或者AAnF就会产生密钥。然而,在5G的用户中并非所有的用户都会开启AKMA功能。因此,这就造成了网络资源的浪费。In related technologies, once the UE requests a key from the network, AUSF (Authentication Server Function) or AAnF will generate the key. However, not all users of 5G will turn on the AKMA function. Therefore, this causes a waste of network resources.
发明内容Summary of the invention
本公开实施例提供一种密钥生成方法和装置、设备及计算机可读存储介质,以节约网络资源。The embodiments of the present disclosure provide a key generation method and device, equipment, and computer-readable storage medium to save network resources.
第一方面,本公开实施例提供了一种密钥生成方法,应用于第一网元,其中,包括:In the first aspect, the embodiments of the present disclosure provide a key generation method applied to a first network element, which includes:
获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;Acquiring first information of the terminal, where the first information is used to indicate an application service security capability supported by the terminal;
根据所述第一信息,生成密钥。According to the first information, a key is generated.
其中,所述应用服务安全能力包括支持应用层认证和密钥管理AKMA服务的能力;Wherein, the application service security capability includes the capability of supporting application layer authentication and key management AKMA service;
在所述根据所述第一信息,生成密钥之前,所述方法还包括:Before the generating a key according to the first information, the method further includes:
请求UDM(Unified Data Management,统一数据管理实体)确认所述终端是否支持AKMA服务;Request UDM (Unified Data Management, unified data management entity) to confirm whether the terminal supports AKMA service;
所述根据所述第一信息,生成密钥,包括:The generating a key according to the first information includes:
在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。Upon receiving the first response, an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
其中,所述方法还包括:Wherein, the method further includes:
预先存储终端的标识信息与终端是否支持AKMA服务的对应关系。The corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service is pre-stored.
其中,所述获取终端的第一信息,包括:Wherein, said obtaining the first information of the terminal includes:
接收第二网元发送的认证请求消息,所述认证请求消息携带所述终端的SUPI(Subscription Permanent Identifier,签约永久标识),或者,所述认证请求消息携带所述终端的SUCI(Subscription Concealed Identifier,签约加密标识);Receiving an authentication request message sent by the second network element, the authentication request message carrying the SUPI (Subscription Permanent Identifier) of the terminal, or the authentication request message carrying the SUCI (Subscription Concealed Identifier) of the terminal, Signed encryption mark);
在所述认证请求消息携带所述SUPI的情况下,根据所述SUPI查询所述对应关系,获取所述第一信息;In the case where the authentication request message carries the SUPI, query the correspondence relationship according to the SUPI to obtain the first information;
在所述认证请求消息携带所述SUCI的情况下,向UDM发送所述SUCI,并从所述UDM获得SUPI;根据从所述UDM获得的SUPI查询所述对应关系,获取所述第一信息。When the authentication request message carries the SUCI, send the SUCI to the UDM and obtain the SUPI from the UDM; query the correspondence relationship according to the SUPI obtained from the UDM to obtain the first information.
其中,所述获取终端的第一信息,包括:Wherein, said obtaining the first information of the terminal includes:
接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息。Receiving an authentication request message sent by a second network element, where the authentication request message carries the first information.
其中,所述请求统一数据管理实体UDM确认所述终端是否支持AKMA服务,包括:Wherein, the request for the unified data management entity UDM to confirm whether the terminal supports the AKMA service includes:
向所述UDM发送第一指示信息,所述第一指示信息用于指示所述UDM 确认所述终端是否支持AKMA服务;Sending first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service;
接收所述UDM发送的第一确认指示,所述第一确认指示用于指示所述终端是否支持AKMA服务。Receiving a first confirmation instruction sent by the UDM, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
其中,在所述向所述UDM发送第一指示信息之前,所述方法还包括:Wherein, before the sending the first indication information to the UDM, the method further includes:
接收所述终端的第一请求,所述第一请求用于请求生成AKMA密钥;Receiving a first request from the terminal, where the first request is used to request the generation of an AKMA key;
所述向所述UDM发送第一指示信息,包括:The sending first indication information to the UDM includes:
根据所述第一请求,向所述UDM发送第一指示信息。According to the first request, first indication information is sent to the UDM.
其中,所述获取终端的第一信息包括:Wherein, the obtaining of the first information of the terminal includes:
接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括支持AKMA服务的能力,支持GBA(Generic Bootstrapping Architecture,通用引导架构)服务的能力。Receive an authentication request message sent by a second network element, the authentication request message carries the first information, the application service security capability includes at least the capability of supporting AKMA services, and supporting GBA (Generic Bootstrapping Architecture) services Ability.
其中,在所述根据所述第一信息,生成密钥之前,所述方法还包括:Wherein, before said generating a key according to said first information, said method further includes:
请求UDM确认所述终端所支持的目标应用服务安全能力。Request UDM to confirm the target application service security capabilities supported by the terminal.
其中,所述根据所述第一信息,生成密钥,包括:Wherein, the generating a key according to the first information includes:
如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,则生成AKMA密钥或者GBA密钥;If the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, an AKMA key or a GBA key is generated;
如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,则根据预设策略生成密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the key is generated according to the preset policy.
其中,所述方法还包括:Wherein, the method further includes:
如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,向第三网元发送所述目标应用服务安全能力的信息;If the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service, sending the information of the security capability of the target application service to a third network element;
如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,向第三网元发送所述预设策略以及根据所述预设策略生成的密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the preset policy and the key generated according to the preset policy are sent to a third network element.
其中,所述获取终端的第一信息,包括:Wherein, said obtaining the first information of the terminal includes:
接收UDM发送的指示信息,所述指示信息用于指示为所述终端选择AKMA服务;Receiving instruction information sent by UDM, where the instruction information is used to instruct to select an AKMA service for the terminal;
所述根据所述第一信息,生成密钥,包括:The generating a key according to the first information includes:
根据所述指示信息,生成密钥;Generate a key according to the instruction information;
向所述UDM发送AKMA密钥推衍参数。Send the AKMA key derivation parameter to the UDM.
第二方面,本公开实施例提供了一种密钥生成方法,应用于第三网元,包括:In the second aspect, the embodiments of the present disclosure provide a key generation method applied to a third network element, including:
接收目标第四网元的密钥请求;Receive the key request of the target fourth network element;
根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element. The fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application The service security capability is one or more of the application service security capabilities supported by the terminal;
生成所述终端所支持的应用服务安全能力的密钥。Generate a key for the application service security capability supported by the terminal.
其中,所述确定终端所支持的应用服务安全能力以及第四网元的信息,包括:Wherein, the determination of the application service security capabilities supported by the terminal and the information of the fourth network element includes:
请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;Request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element;
所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
其中,所述生成所述终端所支持的应用服务安全能力的密钥,包括:Wherein, the generating the key of the application service security capability supported by the terminal includes:
获取第一网元发送的所述终端所支持的第一应用服务安全能力;Acquiring the first application service security capability supported by the terminal and sent by the first network element;
获取所述目标第四网元的标识;Acquiring the identifier of the target fourth network element;
如果所述第一应用服务安全能力为支持AKMA服务的能力且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
其中,所述生成所述终端所支持的应用服务安全能力的密钥,包括:Wherein, the generating the key of the application service security capability supported by the terminal includes:
获取第一网元发送的预设策略以及根据所述预设策略生成的密钥;Acquiring a preset policy sent by the first network element and a key generated according to the preset policy;
获取所述第四网元的标识;Acquiring the identifier of the fourth network element;
如果所述预设策略表示所述密钥是由于所述终端支持AKMA服务的能力而生成的,且根据所述目标第四网元的标识确定所述终端与所述目标第四 网元之间开启了AKMA服务,则生成AF密钥。If the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
其中,所述确定终端所支持的应用服务安全能力以及第四网元的信息,包括:Wherein, the determination of the application service security capabilities supported by the terminal and the information of the fourth network element includes:
接收UDM发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元;Receive the indication information sent by UDM and the identification of the fourth network element, where the indication information is used to indicate the capability of the terminal to support the AKMA service, and the fourth network element is the fourth network with the AKMA service enabled between the terminals Yuan;
所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
第三方面,本公开实施例提供了一种密钥生成方法,应用于第二网元,包括:In a third aspect, embodiments of the present disclosure provide a method for generating a key, which is applied to a second network element, and includes:
向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Send first information to the first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information.
其中,所述向第一网元发送第一信息,包括:Wherein, the sending the first information to the first network element includes:
向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息。Sending an authentication request message to the first network element, where the authentication request message carries the first information.
其中,所述向第一网元发送第一信息,包括:Wherein, the sending the first information to the first network element includes:
向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
第四方面,本公开实施例提供了一种密钥生成方法,应用于UDM,包括:In a fourth aspect, the embodiments of the present disclosure provide a key generation method applied to UDM, including:
存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Storing the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
根据所述签约信息,确认所述终端支持的目标应用服务安全能力。According to the subscription information, the target application service security capability supported by the terminal is confirmed.
其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:Wherein, the confirming the target application service security capability supported by the terminal according to the subscription information includes:
接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务;Receiving a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应, 所述第一响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the first request, a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
其中,所述接收第一网元的第一请求,包括:Wherein, the receiving the first request of the first network element includes:
在主认证的过程之中,接收第一网元的第一请求;或者During the master authentication process, receive the first request of the first network element; or
在主认证过程完成之后,接收第一网元的第一请求。After the master authentication process is completed, the first request of the first network element is received.
其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:Wherein, the confirming the target application service security capability supported by the terminal according to the subscription information includes:
接收第三网元的第二请求,所述第二请求用于确认所述终端是否支持AKMA服务;Receiving a second request from a third network element, where the second request is used to confirm whether the terminal supports the AKMA service;
根据所述签约信息以及所述第二请求,向所述第三网元发送第二响应,所述第二响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the second request, a second response is sent to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:Wherein, the confirming the target application service security capability supported by the terminal according to the subscription information includes:
接收第一网元的第三请求;Receiving the third request of the first network element;
根据所述签约信息以及所述第三请求,向所述第一网元发送第三响应,所述第三响应用于指示目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,或者,所述目标应用服务安全能力至少为AKMA支持服务的能力和支持GBA服务的能力。According to the subscription information and the third request, a third response is sent to the first network element, where the third response is used to indicate that the target application service security capability is the capability of supporting AKMA service or the capability of supporting GBA service. Or, the target application service security capability is at least the capability of AKMA to support services and the capability of supporting GBA services.
其中,所述签约信息还包括:Wherein, the contract information further includes:
与所述终端之间开启了AKMA服务的第四网元的标识信息。The identification information of the fourth network element that has enabled the AKMA service with the terminal.
第五方面,本公开实施例还提供了一种密钥生成方法,应用于第二网元,包括:In a fifth aspect, the embodiments of the present disclosure also provide a key generation method applied to a second network element, including:
向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the UDM, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
接收所述UDM发送的密钥推衍参数;Receiving the key derivation parameter sent by the UDM;
向所述终端发送所述密钥推衍参数。Sending the key derivation parameter to the terminal.
其中,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。The indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
第六方面,本公开实施例还提供了一种密钥生成方法,应用于UDM,包括:In the sixth aspect, the embodiments of the present disclosure also provide a key generation method, which is applied to UDM, including:
获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Acquiring subscription information of the terminal, where the subscription information includes application service security capabilities supported by the terminal;
当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key. Application service security key.
其中,所述获取终端的签约信息,包括:Wherein, said acquiring the contract information of the terminal includes:
接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Receive instruction information sent by the second network element and the identification of the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal and the identification information of the AF that enables the AKMA service with the terminal.
其中,所述向第一网元发送第一指示之后,所述方法还包括:Wherein, after the sending the first instruction to the first network element, the method further includes:
接收所述第一网元发送的密钥推衍参数;Receiving the key derivation parameter sent by the first network element;
向所述第二网元发送所述密钥推衍参数。Sending the key derivation parameter to the second network element.
其中,所述方法还包括:Wherein, the method further includes:
向第四网元发送指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
所述第四网元为所述终端之间开启了AKMA服务的第四网元。The fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
第七方面,本公开实施例还提供了一种密钥生成方法,应用于终端,包括:In a seventh aspect, the embodiments of the present disclosure also provide a method for generating a key, which is applied to a terminal, and includes:
向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Send first information to the second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
其中,所述向第二网元发送第一信息,包括:Wherein, the sending the first information to the second network element includes:
向所述第二网元发送N1消息,所述第一信息表示所述终端支持AKMA服务。Sending an N1 message to the second network element, where the first information indicates that the terminal supports the AKMA service.
其中,所述向第二网元发送第一信息,包括:Wherein, the sending the first information to the second network element includes:
向所述第二网元发送N1消息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。The N1 message is sent to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
其中,所述方法还包括:Wherein, the method further includes:
接收所述第二网元发送的密钥推衍参数;Receiving the key derivation parameter sent by the second network element;
根据所述密钥推衍参数生成AKMA密钥。The AKMA key is generated according to the key derivation parameter.
第八方面,本公开实施例提供了一种密钥生成装置,应用于第一网元,包括:In an eighth aspect, embodiments of the present disclosure provide a key generation device applied to a first network element, including:
第一获取模块,用于获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;The first obtaining module is configured to obtain first information of the terminal, where the first information is used to indicate the application service security capabilities supported by the terminal;
第一生成模块,用于根据所述第一信息,生成密钥。The first generating module is configured to generate a key according to the first information.
第九方面,本公开实施例提供了一种密钥生成装置,应用于第三网元,包括:In a ninth aspect, embodiments of the present disclosure provide a key generation device applied to a third network element, including:
第一接收模块,用于接收目标第四网元的密钥请求;The first receiving module is configured to receive the key request of the target fourth network element;
第一确定模块,用于根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;The first determining module is configured to determine, according to the key request, the application service security capability supported by the terminal and the information of the fourth network element, and the fourth network element is the fourth network element that enables the terminal to enable the target application service security capability Network element, the target application service security capability is one or more of the application service security capabilities supported by the terminal;
第一生成模块,用于生成所述终端所支持的应用服务安全能力的密钥。The first generating module is used to generate the key of the application service security capability supported by the terminal.
第十方面,本公开实施例提供了一种密钥生成装置,应用于第二网元,包括:In a tenth aspect, an embodiment of the present disclosure provides a key generation device applied to a second network element, including:
第一发送模块,用于向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。The first sending module is configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first information is used to make the first network element according to the first information To generate a key.
第十一方面,本公开实施例提供了一种密钥生成装置,应用于UDM,包括:In an eleventh aspect, an embodiment of the present disclosure provides a key generation device applied to UDM, including:
第一存储模块,用于存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;The first storage module is configured to store subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
第一确认模块,用于根据所述签约信息,确认所述终端支持的目标应用服务安全能力。The first confirmation module is configured to confirm the target application service security capability supported by the terminal according to the subscription information.
第十二方面,本公开实施例提供了一种密钥生成装置,应用于第二网元,包括:In a twelfth aspect, embodiments of the present disclosure provide a key generation device applied to a second network element, including:
第一发送模块,用于向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;The first sending module is configured to send indication information and the identification of the fourth network element to the UDM, where the indication information is used to indicate the application service security capabilities supported by the terminal;
第一接收模块,用于接收所述UDM发送的密钥推衍参数;The first receiving module is configured to receive the key derivation parameter sent by the UDM;
第二发送模块,用于向所述终端发送所述密钥推衍参数。The second sending module is configured to send the key derivation parameter to the terminal.
第十三方面,本公开实施例提供了一种密钥生成装置,应用于UDM,包括:In a thirteenth aspect, embodiments of the present disclosure provide a key generation device applied to UDM, including:
第一获取模块,用于获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;The first obtaining module is configured to obtain contract information of the terminal, where the contract information includes the application service security capabilities supported by the terminal;
第一发送模块,用于当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。The first sending module is configured to send a first instruction to the first network element when it is determined that the terminal is to derive the application service security key according to the subscription information, and the first instruction is used to instruct the first network Yuan derives the application service security key of the terminal.
第十四方面,本公开实施例提供了一种密钥生成装置,应用于终端,包括:In a fourteenth aspect, embodiments of the present disclosure provide a key generation device applied to a terminal, including:
第一发送模块,用于向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。The first sending module is configured to send first information to a second network element, where the first information is used to indicate an application service security capability supported by the terminal.
第十五方面,本公开实施例提供了一种密钥生成设备,应用于第一网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In a fifteenth aspect, the embodiments of the present disclosure provide a key generation device, which is applied to a first network element, and includes: a transceiver, a memory, a processor, and is stored in the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;Acquiring first information of the terminal, where the first information is used to indicate an application service security capability supported by the terminal;
根据所述第一信息,生成密钥。According to the first information, a key is generated.
其中,所述应用服务安全能力包括支持AKMA服务的能力,所述处理器还用于读取存储器中的程序,执行下列过程:Wherein, the application service security capability includes the capability to support the AKMA service, and the processor is also used to read the program in the memory and execute the following process:
请求UDM确认所述终端是否支持AKMA服务;Request UDM to confirm whether the terminal supports AKMA service;
在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。Upon receiving the first response, an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
第十六方面,本公开实施例提供了一种密钥生成设备,应用于第三网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In a sixteenth aspect, the embodiments of the present disclosure provide a key generation device, which is applied to a third network element, and includes: a transceiver, a memory, a processor, and is stored on the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
接收目标第四网元的密钥请求;Receive the key request of the target fourth network element;
根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元, 所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element, where the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application The service security capability is one or more of the application service security capabilities supported by the terminal;
生成所述终端所支持的应用服务安全能力的密钥。Generate a key for the application service security capability supported by the terminal.
其中,所述处理器,用于读取存储器中的程序,执行下列过程:Wherein, the processor is used to read the program in the memory and execute the following process:
请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;Request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element;
所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
第十七方面,本公开实施例提供了一种密钥生成设备,应用于第二网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In a seventeenth aspect, the embodiments of the present disclosure provide a key generation device, which is applied to a second network element, and includes: a transceiver, a memory, a processor, and is stored in the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Send first information to the first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information.
第十八方面,本公开实施例提供了一种密钥生成设备,应用于UDM,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In an eighteenth aspect, the embodiments of the present disclosure provide a key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; The processor is used to read the program in the memory and execute the following process:
存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Storing the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
根据所述签约信息,确认所述终端支持的目标应用服务安全能力。According to the subscription information, the target application service security capability supported by the terminal is confirmed.
其中,所述处理器,用于读取存储器中的程序,执行下列过程:Wherein, the processor is used to read the program in the memory and execute the following process:
接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务;Receiving a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the first request, a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
第十九方面,本公开实施例提供了一种密钥生成设备,应用于第二网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In a nineteenth aspect, the embodiments of the present disclosure provide a key generation device, which is applied to a second network element, and includes: a transceiver, a memory, a processor, and is stored on the memory and can run on the processor The program; the processor is used to read the program in the memory and execute the following process:
向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the UDM, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
接收所述UDM发送的密钥推衍参数;Receiving the key derivation parameter sent by the UDM;
向所述终端发送所述密钥推衍参数。Sending the key derivation parameter to the terminal.
第二十方面,本公开实施例提供了一种密钥生成设备,应用于UDM,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In a twentieth aspect, the embodiments of the present disclosure provide a key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; The processor is used to read the program in the memory and execute the following process:
获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Acquiring subscription information of the terminal, where the subscription information includes application service security capabilities supported by the terminal;
当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key. Application service security key.
其中,所述处理器,用于读取存储器中的程序,执行下列过程:Wherein, the processor is used to read the program in the memory and execute the following process:
接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Receive instruction information sent by the second network element and the identification of the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal and the identification information of the AF that enables the AKMA service with the terminal.
第二十一方面,本公开实施例提供了一种密钥生成设备,应用于终端,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;所述处理器,用于读取存储器中的程序,执行下列过程:In the twenty-first aspect, embodiments of the present disclosure provide a key generation device applied to a terminal, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor The processor is used to read the program in the memory and execute the following process:
向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Send first information to the second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
第二十二方面,本公开实施例提供了一种计算机可读存储介质,用于存储计算机程序,其中,所述计算机程序被处理器执行时实现如第一方面所述的密钥生成方法中的步骤;或者,实现如第二方面所述的密钥生成方法中的步骤;或者,实现如第三方面所述的密钥生成方法中的步骤;或者,实现如第四方面所述的密钥生成方法中的步骤;或者,实现如第五方面所述的密钥生成方法中的步骤;或者,实现如第六方面所述的密钥生成方法中的步骤;或者,实现如第七方面所述的密钥生成方法中的步骤。In the twenty-second aspect, the embodiments of the present disclosure provide a computer-readable storage medium for storing a computer program, wherein the computer program is executed by a processor to implement the key generation method described in the first aspect Or, implement the steps in the key generation method as described in the second aspect; or implement the steps in the key generation method as described in the third aspect; or, implement the encryption as described in the fourth aspect Or, implement the steps in the key generation method as described in the fifth aspect; or implement the steps in the key generation method as described in the sixth aspect; or, implement the steps in the key generation method as described in the seventh aspect; The steps in the key generation method.
附图说明Description of the drawings
为了更清楚地说明本公开实施例的技术方案,下面将对本公开实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present disclosure more clearly, the following will briefly introduce the accompanying drawings used in the description of the embodiments of the present disclosure. Obviously, the accompanying drawings in the following description are only some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can be obtained from these drawings without creative labor.
图1是相关技术中AKMA架构图;Figure 1 is a diagram of the AKMA architecture in related technologies;
图2是本公开实施例提供的密钥生成方法的流程图之一;FIG. 2 is one of the flowcharts of the key generation method provided by the embodiment of the present disclosure;
图3是本公开实施例提供的密钥生成方法的流程图之二;FIG. 3 is the second flowchart of the key generation method provided by the embodiment of the present disclosure;
图4是本公开实施例提供的密钥生成方法的流程图之三;FIG. 4 is the third flowchart of the key generation method provided by the embodiment of the present disclosure;
图5是本公开实施例提供的密钥生成方法的流程图之四;FIG. 5 is the fourth flow chart of the key generation method provided by the embodiment of the present disclosure;
图6是本公开实施例提供的密钥生成方法的流程图之五;FIG. 6 is the fifth flowchart of the key generation method provided by an embodiment of the present disclosure;
图7是本公开实施例提供的密钥生成方法的流程图之六;FIG. 7 is the sixth flowchart of the key generation method provided by an embodiment of the present disclosure;
图8是本公开实施例提供的密钥生成方法的流程图之七;FIG. 8 is the seventh flowchart of the key generation method provided by the embodiments of the present disclosure;
图9是本公开实施例提供的密钥生成方法的流程图之八;FIG. 9 is the eighth flowchart of the key generation method provided by an embodiment of the present disclosure;
图10是本公开实施例提供的密钥生成方法的流程图之九;FIG. 10 is the ninth flowchart of the key generation method provided by an embodiment of the present disclosure;
图11是本公开实施例提供的密钥生成方法的流程图之十;FIG. 11 is a tenth flowchart of a key generation method provided by an embodiment of the present disclosure;
图12是本公开实施例提供的密钥生成方法的流程图之十一;Figure 12 is the eleventh flowchart of the key generation method provided by the embodiments of the present disclosure;
图13是本公开实施例提供的密钥生成方法的流程图之十二;FIG. 13 is the twelfth of the flowchart of the key generation method provided by the embodiment of the present disclosure;
图14是本公开实施例提供的密钥生成装置的结构图之一;FIG. 14 is one of the structural diagrams of a key generation device provided by an embodiment of the present disclosure;
图15是本公开实施例提供的密钥生成装置的结构图之二;FIG. 15 is the second structural diagram of the key generation device provided by an embodiment of the present disclosure;
图16是本公开实施例提供的密钥生成装置的结构图之三;FIG. 16 is the third structural diagram of the key generation device provided by an embodiment of the present disclosure;
图17是本公开实施例提供的密钥生成装置的结构图之四;FIG. 17 is the fourth structural diagram of the key generation device provided by an embodiment of the present disclosure;
图18是本公开实施例提供的密钥生成装置的结构图之五;FIG. 18 is the fifth structural diagram of the key generation device provided by an embodiment of the present disclosure;
图19是本公开实施例提供的密钥生成装置的结构图之六;FIG. 19 is a sixth structural diagram of the key generation device provided by an embodiment of the present disclosure;
图20是本公开实施例提供的密钥生成装置的结构图之七;FIG. 20 is the seventh structural diagram of the key generation device provided by an embodiment of the present disclosure;
图21是本公开实施例提供的密钥生成设备的结构图之一;Figure 21 is one of the structural diagrams of a key generation device provided by an embodiment of the present disclosure;
图22是本公开实施例提供的密钥生成设备的结构图之二。Fig. 22 is a second structural diagram of a key generation device provided by an embodiment of the present disclosure.
具体实施方式Detailed ways
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。The technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, rather than all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present disclosure.
参见图2,图2是本公开实施例提供的密钥生成方法的流程图,应用于第一网元。其中,第一网元可以是AUSF(Authentication Server Function,鉴权服务功能),如图2所示,包括以下步骤201和202。Referring to FIG. 2, FIG. 2 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to the first network element. Among them, the first network element may be AUSF (Authentication Server Function), as shown in FIG. 2, including the following steps 201 and 202.
步骤201、获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Step 201: Acquire first information of a terminal, where the first information is used to indicate an application service security capability supported by the terminal.
其中,所述终端所支持的应用安全服务能力例如可以是支持AKMA服务的能力,支持GBA服务的能力等等。Wherein, the application security service capability supported by the terminal may be, for example, the capability of supporting AKMA service, the capability of supporting GBA service, and so on.
步骤202、根据所述第一信息,生成密钥。Step 202: Generate a key according to the first information.
在此步骤中,例如,如果第一信息表示终端支持AKMA服务的能力,那么,第一网元可为终端生成AKMA密钥。In this step, for example, if the first information indicates the capability of the terminal to support the AKMA service, then the first network element may generate an AKMA key for the terminal.
在本公开的一个实施例中,在第一网元中可预先存储终端的标识信息与终端是否支持AKMA服务的对应关系。In an embodiment of the present disclosure, the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service may be pre-stored in the first network element.
此时,对于步骤201,第一网元可接收第二网元(AMF(Access and Mobility Management Function,接入和移动管理功能)或者SEAF(Security Anchor Function,安全锚点功能))发送的认证请求消息,所述认证请求消息携带所述终端的SUPI,或者,所述认证请求消息携带所述终端的SUCI。At this time, for step 201, the first network element may receive the authentication request sent by the second network element (AMF (Access and Mobility Management Function, access and mobility management function) or SEAF (Security Anchor Function, security anchor function)) Message, the authentication request message carries the SUPI of the terminal, or the authentication request message carries the SUCI of the terminal.
在所述认证请求消息携带所述SUPI的情况下,第一网元可根据所述SUPI查询所述对应关系,获取所述第一信息。在所述认证请求消息携带所述SUCI的情况下,第一网元可向UDM发送所述SUCI,并从所述UDM获得SUPI,然后,第一网元可根据从所述UDM获得的SUPI查询所述对应关系,获取所述第一信息。In the case where the authentication request message carries the SUPI, the first network element may query the correspondence relationship according to the SUPI to obtain the first information. In the case that the authentication request message carries the SUCI, the first network element may send the SUCI to the UDM and obtain the SUPI from the UDM, and then the first network element may query according to the SUPI obtained from the UDM According to the corresponding relationship, the first information is acquired.
在本公开的一个实施例中,如果终端支持AKMA服务,那么,第一网元可向UDM确认终端是否支持AKMA服务。在这种情况下,步骤201具体为,接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息。步骤202具体为,在接收到第一响应时,生成AKMA密钥,所述第一响应表 示所述UDM确认所述终端支持AKMA服务。In an embodiment of the present disclosure, if the terminal supports the AKMA service, the first network element can confirm to the UDM whether the terminal supports the AKMA service. In this case, step 201 specifically includes receiving an authentication request message sent by a second network element, where the authentication request message carries the first information. Step 202 specifically includes generating an AKMA key when receiving a first response, where the first response indicates that the UDM confirms that the terminal supports the AKMA service.
在本公开实施例中,第一网元可向所述UDM发送第一指示信息,所述第一指示信息用于指示所述UDM确认所述终端是否支持AKMA服务,并接收所述UDM发送的第一确认指示,所述第一确认指示用于指示所述终端是否支持AKMA服务。其中,请求UDM确认的过程可以发生在主认证过程之中,也可以发生在主认证过程之后。In the embodiment of the present disclosure, the first network element may send first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service, and to receive the UDM sent A first confirmation instruction, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service. Among them, the process of requesting UDM confirmation can occur during the main authentication process or after the main authentication process.
如果是发生在主认证过程之后,那么,第一网元接收所述终端的第一请求,所述第一请求用于请求生成AKMA密钥,然后根据所述第一请求,向所述UDM发送第一指示信息。If it occurs after the main authentication process, the first network element receives the first request of the terminal, and the first request is used to request the generation of an AKMA key, and then sends to the UDM according to the first request The first instruction information.
在本公开的一个实施例中,第一网元可接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括支持AKMA服务的能力,支持GBA服务的能力。在这种情况下,第一网元也可请求UDM确认所述终端所支持的目标应用服务安全能力。此时,步骤202具体为,如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,则生成AKMA密钥或者GBA密钥;如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,则根据预设策略生成密钥。In an embodiment of the present disclosure, the first network element may receive an authentication request message sent by a second network element, the authentication request message carries the first information, and the application service security capability includes at least an AKMA service Ability, the ability to support GBA services. In this case, the first network element may also request UDM to confirm the target application service security capabilities supported by the terminal. At this time, step 202 is specifically that if the target application service security capability is one of the capability to support AKMA service or the capability to support GBA service, generate an AKMA key or GBA key; if the target application service is secure The ability is at least the ability to support the AKMA service and the ability to support the GBA service, and the key is generated according to a preset strategy.
其中,预设策略可以预先设置,例如可以是生成AKMA密钥,生成GBA密钥,生成其他密钥等,还可以是根据第一网元自身的处理能力确定生成哪种形式的密钥。The preset strategy may be preset, for example, it may be generating an AKMA key, generating a GBA key, generating other keys, etc., or determining which form of key to generate according to the processing capability of the first network element itself.
如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,第一网元向第三网元(如AAnF)发送所述目标应用服务安全能力的信息;如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,第一网元向第三网元发送所述预设策略以及根据所述预设策略生成的密钥。If the target application service security capability is one of the capability to support the AKMA service or the GBA service capability, the first network element sends the target application service security capability information to the third network element (such as AAnF); if The target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, and the first network element sends the preset policy and the key generated according to the preset policy to the third network element.
在本公开的一个实施例中,第一网元还可根据UDM的指示生成AKMA密钥。具体的,第一网元接收UDM发送的指示信息,所述指示信息用于指示为所述终端选择AKMA服务。那么,步骤202具体为:根据所述指示信息,生成密钥,并向所述UDM发送AKMA密钥推衍参数。其中,密钥推衍参数 例如可以包括随机数、计数器、终端的标识等等。In an embodiment of the present disclosure, the first network element may also generate an AKMA key according to the UDM instruction. Specifically, the first network element receives instruction information sent by UDM, where the instruction information is used to instruct to select the AKMA service for the terminal. Then, step 202 is specifically: generating a key according to the instruction information, and sending the AKMA key derivation parameter to the UDM. Among them, the key derivation parameters may include, for example, random numbers, counters, terminal identifications, and so on.
在本公开实施例中,在终端的第一信息表示终端支持的应用服务安全能力的时候,根据该第一信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, when the first information of the terminal indicates the security capability of the application service supported by the terminal, the key is generated according to the first information. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图3,图3是本公开实施例提供的密钥生成方法的流程图,应用于第三网元。其中,第三网元可以是AAnF,如图3所示,包括以下步骤301至303。Referring to FIG. 3, FIG. 3 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a third network element. Wherein, the third network element may be AAnF, as shown in FIG. 3, including the following steps 301 to 303.
步骤301、接收目标第四网元的密钥请求。Step 301: Receive a key request from the target fourth network element.
其中,第四网元可以是AF(Application Function,应用功能)。Among them, the fourth network element may be AF (Application Function).
步骤302、根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种。Step 302: According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element, where the fourth network element is the fourth network element that enables the target application service security capability of the terminal, and The target application service security capability is one or more of the application service security capabilities supported by the terminal.
终端所支持的应用服务安全能力可以包括支持AKMA服务的能力,支持GBA服务的能力等等。第四网元的信息可以是第四网元的标识等。The application service security capabilities supported by the terminal may include the ability to support AKMA services, the ability to support GBA services, and so on. The information of the fourth network element may be the identification of the fourth network element or the like.
步骤303、生成所述终端所支持的应用服务安全能力的密钥。Step 303: Generate a key for the application service security capability supported by the terminal.
在本公开的一个实施例中,第三网元请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息。那么,在此步骤中,如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。In an embodiment of the present disclosure, the third network element requests UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element. Then, in this step, if the application service security capability supported by the terminal is the capability to support AKMA services and it is determined based on the information of the fourth network element that the connection between the terminal and the target fourth network element is enabled AKMA service, then generate AF key.
在本公开的一个实施例中,第三网元获取第一网元发送的所述终端所支持的第一应用服务安全能力,以及获取所述目标第四网元的标识。如果所述第一应用服务安全能力为支持AKMA服务的能力且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。In an embodiment of the present disclosure, the third network element obtains the first application service security capability supported by the terminal sent by the first network element, and obtains the identifier of the target fourth network element. If the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
在本公开的一个实施例中,第三网元获取第一网元发送的预设策略以及根据所述预设策略生成的密钥,以及,获取所述第四网元的标识。如果所述预设策略表示所述密钥是由于所述终端支持AKMA服务的能力而生成的,且 根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。In an embodiment of the present disclosure, the third network element obtains the preset policy sent by the first network element and the key generated according to the preset policy, and obtains the identity of the fourth network element. If the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
在本公开的一个实施例中,第三网元可接收UDM发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。那么,在此步骤中,如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。In an embodiment of the present disclosure, the third network element may receive the indication information sent by UDM and the identification of the fourth network element, and the indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element It is the fourth network element that has enabled the AKMA service between the terminals. Then, in this step, if the application service security capability supported by the terminal is the capability to support AKMA services and it is determined based on the information of the fourth network element that the connection between the terminal and the target fourth network element is enabled AKMA service, then generate AF key.
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图4,图4是本公开实施例提供的密钥生成方法的流程图,应用于第二网元。其中,第二网元可以是SEAF或者AMF,如图4所示,包括以下步骤:Referring to FIG. 4, FIG. 4 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a second network element. Wherein, the second network element may be SEAF or AMF, as shown in Figure 4, including the following steps:
步骤401、向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Step 401: Send first information to a first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information .
具体的,第二网元可向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息。Specifically, the second network element may send an authentication request message to the first network element, and the authentication request message carries the first information.
或者,第二网元可向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Alternatively, the second network element may send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图5,图5是本公开实施例提供的密钥生成方法的流程图,应用于UDM。如图5所示,包括以下步骤501和502。Referring to FIG. 5, FIG. 5 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to UDM. As shown in Figure 5, the following steps 501 and 502 are included.
步骤501、存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力。Step 501: Store the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal.
其中,所述签约信息还可以包括与所述终端之间开启了AKMA服务的第四网元的标识信息。Wherein, the subscription information may also include identification information of the fourth network element that has enabled the AKMA service with the terminal.
步骤502、根据所述签约信息,确认所述终端支持的目标应用服务安全能力。Step 502: According to the subscription information, confirm the target application service security capability supported by the terminal.
在本公开的一个实施例中,UDM可接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务,然后,根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。其中,上述过程可以是在主认证过程中,还可以是在主认证过程之后。In an embodiment of the present disclosure, UDM may receive a first request from a first network element, the first request is used to confirm whether the terminal supports AKMA service, and then, according to the subscription information and the first request Send a first response to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service. Wherein, the above process may be during the main authentication process or after the main authentication process.
在本公开的一个实施例中,UDM可接收第三网元的第二请求,所述第二请求用于确认所述终端是否支持AKMA服务,然后,根据所述签约信息以及所述第二请求,向所述第三网元发送第二响应,所述第二响应用于指示所述终端是否支持AKMA服务。In an embodiment of the present disclosure, the UDM may receive a second request from a third network element, the second request is used to confirm whether the terminal supports the AKMA service, and then, according to the subscription information and the second request Send a second response to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
在本公开的一个实施例中,UDM可接收第一网元的第三请求,之后,UDM根据所述签约信息以及所述第三请求,向所述第一网元发送第三响应,所述第三响应用于指示目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,或者,所述目标应用服务安全能力至少为AKMA支持服务的能力和支持GBA服务的能力。In an embodiment of the present disclosure, UDM may receive the third request of the first network element. After that, UDM sends a third response to the first network element according to the subscription information and the third request. The third response is used to indicate that the target application service security capability is one of the capability to support AKMA services or the capability to support GBA services, or the target application service security capability is at least the capability of AKMA to support services and the capability to support GBA services .
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图6,图6是本公开实施例提供的密钥生成方法的流程图,应用于第二网元。其中,第二网元可以是SEAF或者AMF,如图6所示,包括以下步骤601至603。Referring to FIG. 6, FIG. 6 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a second network element. Wherein, the second network element may be SEAF or AMF, as shown in FIG. 6, including the following steps 601 to 603.
步骤601、向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力。Step 601: Send indication information and the identifier of the fourth network element to the UDM, where the indication information is used to indicate the application service security capabilities supported by the terminal.
其中,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。The indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
步骤602、接收所述UDM发送的密钥推衍参数。Step 602: Receive the key derivation parameter sent by the UDM.
步骤603、向所述终端发送所述密钥推衍参数。Step 603: Send the key derivation parameter to the terminal.
所述密钥推衍参数的含义可参照前述实施例的描述。For the meaning of the key derivation parameter, refer to the description of the foregoing embodiment.
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图7,图7是本公开实施例提供的密钥生成方法的流程图,应用于UDM。如图7所示,包括以下步骤701至702。Refer to FIG. 7, which is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to UDM. As shown in Fig. 7, the following steps 701 to 702 are included.
步骤701、获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力。Step 701: Acquire subscription information of a terminal, where the subscription information includes application service security capabilities supported by the terminal.
具体的,在此步骤中,UDM可接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Specifically, in this step, UDM may receive the indication information sent by the second network element and the identification of the fourth network element, where the indication information is used to indicate the application service security capabilities supported by the terminal and to communicate with the terminal The identification information of the AF that enables the AKMA service.
步骤702、当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。Step 702: When it is determined that the terminal derives the application service security key according to the subscription information, send a first instruction to the first network element, where the first instruction is used to instruct the first network element to derive the security key. The application service security key of the terminal.
可选地,在一个实施例中,在步骤702之后,所述方法还可包括:接收所述第一网元发送的密钥推衍参数,向所述第二网元发送所述密钥推衍参数。Optionally, in one embodiment, after step 702, the method may further include: receiving the key derivation parameter sent by the first network element, and sending the key derivation parameter to the second network element. Derivation parameters.
此外,为便于产生AF密钥,在一个实施例中,所述方法还可包括:UDM向第四网元发送指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,其中,所述第四网元为所述终端之间开启了AKMA服务的第四网元。In addition, to facilitate the generation of the AF key, in one embodiment, the method may further include: UDM sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate where the terminal is located. Supported application service security capabilities, where the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图8,图8是本公开实施例提供的密钥生成方法的流程图,应用于终端。如图8所示,包括以下步骤:Referring to FIG. 8, FIG. 8 is a flowchart of a key generation method provided by an embodiment of the present disclosure, which is applied to a terminal. As shown in Figure 8, it includes the following steps:
步骤801、向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Step 801: Send first information to a second network element, where the first information is used to indicate an application service security capability supported by the terminal.
具体的,终端可向所述第二网元发送N1消息,所述第一信息表示所述 终端支持AKMA服务。或者,终端可向所述第二网元发送N1消息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Specifically, the terminal may send an N1 message to the second network element, and the first information indicates that the terminal supports the AKMA service. Alternatively, the terminal may send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
可选地,在一个实施例中,所述终端还可接收所述第二网元发送的密钥推衍参数,并根据所述密钥推衍参数生成AKMA密钥。Optionally, in one embodiment, the terminal may also receive the key derivation parameter sent by the second network element, and generate an AKMA key according to the key derivation parameter.
在本公开实施例中,根据终端所支持的应用服务安全能力以及第四网元的信息生成密钥。因此,利用本公开实施例的方案,避免了相关技术中总是为终端生成密钥的问题,从而节约了网络资源。In the embodiment of the present disclosure, the key is generated according to the security capability of the application service supported by the terminal and the information of the fourth network element. Therefore, the solution of the embodiment of the present disclosure avoids the problem of always generating keys for the terminal in the related art, thereby saving network resources.
参见图9,图9是本公开实施例提供的密钥生成方法的流程图。在本公开实施例中,在AUSF(Authentication Server Function,鉴权服务功能)中可预先存储中UE的签约信息,所述签约信息为UE的身份标识与AKMA服务的对应信息的列表,通过该列表可以识别UE是否开启或支持了AKMA服务。Refer to FIG. 9, which is a flowchart of a key generation method provided by an embodiment of the present disclosure. In the embodiment of the present disclosure, the subscription information of the UE can be pre-stored in the AUSF (Authentication Server Function), and the subscription information is a list of the UE’s identity and the corresponding information of the AKMA service. It can identify whether the UE has enabled or supported the AKMA service.
如图9所示,该方法可包括以下步骤:As shown in Figure 9, the method may include the following steps:
步骤900、AUSF中预存储UE的AKMA签约信息。Step 900: The AKMA subscription information of the UE is pre-stored in the AUSF.
步骤901、UE向SEAF(Security Anchor Function,安全锚功能)发送N1消息(N1 message),在该消息中可携带SUPI或者5G GUTI(5G Globally Unique Temporary Identifier,5G全球唯一临时标识)。Step 901: The UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI (5G Globally Unique Temporary Identifier).
步骤902、SEAF向AUSF发送认证请求消息(Nausf_UE Authentication_Authenticate Request),在该请求中携带SUPI或者5G GUTI。Step 902: The SEAF sends an authentication request message (Nausf_UE Authentication_Authenticate Request) to AUSF, and the request carries SUPI or 5G GUTI.
步骤903、此步骤可根据认证请求消息中携带的内容分为两种不同的处理方式。Step 903: This step can be divided into two different processing methods according to the content carried in the authentication request message.
第一种方式,包括步骤903a-903c。The first way includes steps 903a-903c.
步骤903a、当AUSF在接收到AMF(Access and Mobility Management Function,接入和移动管理功能)(SEAF)发送的认证请求消息NAUSF_UE Authentication Authenticate Request后,如果携带了SUPI,则AUSF可以直接根据预存储的列表确认是否可通过Kausf产生K AKMAStep 903a. After the AUSF receives the authentication request message NAUSF_UE Authentication Authenticate Request sent by the AMF (Access and Mobility Management Function) (SEAF), if it carries the SUPI, the AUSF can directly follow the pre-stored The list confirms whether K AKMA can be generated by Kausf.
步骤903b、AUSF向UDM发送Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name]。 Step 903b: AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM.
步骤903c、UDM向AUSF回复Nudm_UEAuthentication_Get Response[AV,[SUPI]]。Step 903c: UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF.
AUSF把服务网名称和预期服务网名称作比较,来检查服务网中的请求SEAF是否有权使用接收的服务网络名称。The AUSF compares the service network name with the expected service network name to check whether the requested SEAF in the service network is authorized to use the received service network name.
第二种方式,包括步骤903b-903d。The second way includes steps 903b-903d.
步骤903b、AUSF向UDM发送Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name]。 Step 903b: AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM.
步骤903c、UDM向AUSF回复Nudm_UEAuthentication_Get Response[AV,[SUPI]]。Step 903c: UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF.
步骤903d、由于SEAF发送的是SUCI,那么,AUSF根据从UDM获得的SUPI以及预存储的列表确认是否可通过Kausf产生K AKMA Step 903d: Since the SEAF sends SUCI, the AUSF confirms whether K AKMA can be generated by Kausf according to the SUPI obtained from UDM and the pre-stored list.
AUSF和UE之间执行主认证过程,包括步骤904-步骤908。The main authentication process is performed between the AUSF and the UE, including steps 904-908.
步骤904、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[AV]。Step 904: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
步骤905、SEAF向UE发送认证请求Authenticate Request。Step 905: The SEAF sends an Authenticate Request to the UE.
步骤906、UE向SEAF发送认证响应Authenticate Response。Step 906: The UE sends an Authenticate Response to the SEAF.
步骤907、SEAF向AUSF发送认证请求Nausf_UEAuthentication_Authenticate Request[RES*]。Step 907: SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
步骤908、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[Result]。Step 908: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
步骤909、UE向AF发送应用密钥会话请求Application session Establishment Request(K AKMAID)。 Step 909: The UE sends an Application session Establishment Request (K AKMA ID) to the AF.
步骤910、AF向AAnF发送密钥请求Key Request。Step 910: The AF sends a Key Request to AAnF.
步骤911、AAnF向UDM查询UE是否签约了与该AF之间的AKMA服务。Step 911: AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
在本公开实施例中,UDM中存储有UE和哪些AF之间签约了AKMA服务,可包括:UE的标识(如SUPI),是否支持AKMA,以及UE与哪些AF开启了AKMA,开启的有效期,UE的AKMA设置是否可以修改等。In the embodiment of the present disclosure, the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
具体的,AAnF在查询时,需携带UE的标识(如SUPI)以及该AF的标识。Specifically, when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
步骤912、UDM向AAnF发送响应Inquire the UE subscription。Step 912: UDM sends a response Inquire the UE subscription to AAnF.
例如,UDM根据本地存储的UE签约信息反馈给AAnF UE与该AF之间的AKMA服务。若允许,则UDM会向AAnF反馈确认,可携带UE的SUPI,AF ID,是否开启了AKMA service[enabled/disabled],AKMA服务的有效期。否则反馈未签约。For example, the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
AAnF根据查询结果决定是否为该AF产生用于保护应用数据的密钥K af,向AF发送Key Response。 The AAnF determines whether to generate the key K af for protecting the application data for the AF according to the query result, and sends the Key Response to the AF.
步骤913、AAnF向AF发送查询响应。Step 913: AAnF sends a query response to the AF.
参见图10,图10是本公开实施例提供的密钥生成方法的流程图。在本公开实施例中,UE在上报的N1请求中包含了对AKMA服务支持的能力,AMF收到UE的AKMA的能力,AMF通过在NAUSF_UE Authentication Authenticate Request请求中携带AKMA service能力指示告知AUSF UE支持AKMA服务的能力。Refer to FIG. 10, which is a flowchart of a key generation method provided by an embodiment of the present disclosure. In the embodiment of the present disclosure, the N1 request reported by the UE includes the ability to support the AKMA service, and the AMF receives the ability of the AKMA of the UE, and the AMF informs the AUSF that the AKMA service capability indication is carried in the NAUSF_UE Authentication Request request. The ability of AKMA to serve.
如图10所示,该方法可包括以下步骤:As shown in Figure 10, the method may include the following steps:
步骤1001、UE向SEAF(Security Anchor Function,安全锚功能)发送N1消息(N1 message),在该消息中可携带SUPI或者5G GUTI,以及对AKMA服务支持的能力(UE AKMA service capability)。 Step 1001, the UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI and the capability of supporting the AKMA service (UE AKMA service capability).
步骤1002、SEAF向AUSF发送认证请求消息Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI,AKMA service capability indication],在该请求中携带SUPI或者5G GUTI,以及对AKMA服务支持的能力。Step 1002, the SEAF sends an authentication request message Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI, AKMA service capability indication] to AUSF, and the request carries the SUPI or 5G GUTI and the ability to support the AKMA service.
步骤1003、AUSF向UDM质询UE对AKMA服务的支持。Step 1003: AUSF queries UDM for UE's support for AKMA service.
例如,AUSF向UDM发送Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name],并可携带查询指示(inquire indication for AKMA)。For example, AUSF sends Nudm_UEAuthentication_Get Request [SUCI or SUPI, SN name] to UDM, and can carry an inquiry indication (inquire indication for AKMA).
步骤1004、UDM向AUSF回复Nudm_UEAuthentication_Get Response[AV,[SUPI]],并可携带确认指示(confirm indication)。Step 1004: UDM replies Nudm_UEAuthentication_Get Response[AV,[SUPI]] to AUSF, and may carry a confirmation indication (confirm indication).
AUSF应把服务网名称和预期服务网名称作比较,来检查服务网中的请求SEAF是否有权使用接收的服务网络名称。The AUSF should compare the service network name with the expected service network name to check whether the requested SEAF in the service network has the right to use the received service network name.
之后,AUSF生成密钥KAKMA。After that, AUSF generates the key KAKMA.
AUSF和UE之间执行主认证过程,包括步骤1005-步骤1009。The main authentication process is performed between the AUSF and the UE, including steps 1005-step 1009.
步骤1005、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[AV]。Step 1005: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
步骤1006、SEAF向UE发送认证请求Authenticate Request。Step 1006: The SEAF sends an Authenticate Request to the UE.
步骤1007、UE向SEAF发送认证响应Authenticate Response。Step 1007: The UE sends an Authenticate Response to the SEAF.
步骤1008、SEAF向AUSF发送认证请求Nausf_UEAuthentication_Authenticate Request[RES*]。Step 1008: SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
步骤1009、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[Result]。Step 1009: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
步骤1010、UE向AF发送应用密钥会话请求Application session Establishment Request(K AKMA ID)。 Step 1010: The UE sends an Application session Establishment Request (K AKMA ID) to the AF.
步骤1011、AF向AAnF发送密钥请求Key Request。Step 1011. The AF sends a Key Request to AAnF.
步骤1012、AAnF向UDM查询UE是否签约了与该AF之间的AKMA服务。Step 1012: AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
在本公开实施例中,UDM中存储有UE和哪些AF之间签约了AKMA服务,可包括:UE的标识(如SUPI),是否支持AKMA,以及UE与哪些AF开启了AKMA,开启的有效期,UE的AKMA设置是否可以修改等。In the embodiment of the present disclosure, the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
具体的,AAnF在查询时,需携带UE的标识(如SUPI)以及该AF的标识。Specifically, when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
步骤1013、UDM向AAnF发送响应Inquire the UE subscription。Step 1013: UDM sends a response Inquire the UE subscription to AAnF.
例如,UDM根据本地存储的UE签约信息反馈给AAnF UE与该AF之间的AKMA服务。若允许,则UDM会向AAnF反馈确认,可携带UE的SUPI,AF ID,是否开启了AKMA service[enabled/disabled],AKMA服务的有效期。否则反馈未签约。For example, the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
AAnF根据查询结果决定是否为该AF产生用于保护应用数据的密钥K af,向AF发送密钥响应Key Response。 AAnF determines whether to generate a key K af for protecting application data for the AF according to the query result, and sends a key response Key Response to the AF.
步骤1014、AAnF向AF发送响应Key Response。Step 1014: AAnF sends a response Key Response to the AF.
参见图11,图11是本公开实施例提供的密钥生成方法的流程图。在本公开实施例中,与图10所示实施例不同的是,AUSF对UDM针对UEAKMA能力的质询发生在主认证之后。可能的是AUSF收到了UE对KAKMA密钥 推衍的请求,AUSF随即发起AKMA密钥的推衍。Refer to FIG. 11, which is a flowchart of a key generation method provided by an embodiment of the present disclosure. In the embodiment of the present disclosure, the difference from the embodiment shown in FIG. 10 is that the challenge of the UDM for the UEAKMA capability by the AUSF occurs after the master authentication. It is possible that AUSF has received the UE's request for KAKMA key derivation, and AUSF immediately initiates the AKMA key derivation.
如图11所示,该方法可包括以下步骤:As shown in Figure 11, the method may include the following steps:
步骤1101、UE向SEAF(Security Anchor Function,安全锚功能)发送N1消息(N1 message),在该消息中可携带SUPI或者5G GUTI,以及对AKMA服务支持的能力(UE AKMA service capability)。 Step 1101, the UE sends an N1 message (N1 message) to a SEAF (Security Anchor Function), and the message may carry SUPI or 5G GUTI and the capability of supporting the AKMA service (UE AKMA service capability).
步骤1102、SEAF向AUSF发送认证请求消息Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI,AKMA service capability indication],在该请求中携带SUPI或者5G GUTI,以及对AKMA服务支持的能力。Step 1102, SEAF sends an authentication request message Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI, AKMA service capability indication] to AUSF, and the request carries SUPI or 5G GUTI and the ability to support the AKMA service.
步骤1103、AUSF向UDM发送Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name]。Step 1103: AUSF sends Nudm_UEAuthentication_Get Request[SUCI or SUPI, SN name] to UDM.
步骤1104、UDM向AUSF回复Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI]]。Step 1104: UDM replies Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI]] to AUSF.
AUSF和UE之间执行主认证过程,包括步骤1105-步骤1109。The main authentication process is performed between the AUSF and the UE, including steps 1105-step 1109.
步骤1105、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[AV]。Step 1105: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
步骤1106、SEAF向UE发送认证请求Authenticate Request。Step 1106: The SEAF sends an Authenticate Request to the UE.
步骤1107、UE向SEAF发送认证响应Authenticate Response。Step 1107: The UE sends an Authenticate Response to the SEAF.
步骤1108、SEAF向AUSF发送认证请求Nausf_UEAuthentication_Authenticate Request[RES*]。Step 1108: SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
步骤1109、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[Result]。Step 1109: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
步骤1110、AUSF向UDM查询UE是否支持AKMA服务。Step 1110: AUSF queries UDM whether the UE supports AKMA service.
步骤1111、UDM根据预先存储的签约信息进行查询,返回查询结果。Step 1111, UDM performs a query according to the pre-stored subscription information, and returns the query result.
若查询结果表示UE支持AKMA服务,则AUSF生成密钥K AKMAIf the query result indicates that the UE supports the AKMA service, AUSF generates the key K AKMA .
步骤1112、UE向AF发送应用密钥会话请求Application session Establishment Request(K AKMA ID)。 Step 1112, the UE sends an Application session Establishment Request (K AKMA ID) to the AF.
步骤1113、AF向AAnF发送密钥请求Key Request。Step 1113: The AF sends a Key Request to AAnF.
步骤1114、AAnF向UDM查询UE是否签约了与该AF之间的AKMA 服务。Step 1114: AAnF queries UDM whether the UE has subscribed to the AKMA service with the AF.
在本公开实施例中,UDM中存储有UE和哪些AF之间签约了AKMA服务,可包括:UE的标识(如SUPI),是否支持AKMA,以及UE与哪些AF开启了AKMA,开启的有效期,UE的AKMA设置是否可以修改等。In the embodiment of the present disclosure, the UDM stores the AKMA service between the UE and which AF has been subscribed, which may include: the identity of the UE (such as SUPI), whether AKMA is supported, and which AF the UE has activated AKMA with, and the validity period of the activation, Whether the AKMA settings of the UE can be modified, etc.
具体的,AAnF在查询时,需携带UE的标识(如SUPI)以及该AF的标识。Specifically, when the AAnF queries, it needs to carry the identity of the UE (such as SUPI) and the identity of the AF.
步骤1115、UDM向AAnF发送响应Inquire the UE subscription。Step 1115: UDM sends a response Inquire the UE subscription to AAnF.
例如,UDM根据本地存储的UE签约信息反馈给AAnF UE与该AF之间的AKMA服务。若允许,则UDM会向AAnF反馈确认,可携带UE的SUPI,AF ID,是否开启了AKMA service[enabled/disabled],AKMA服务的有效期。否则反馈未签约。For example, the UDM feeds back the AKMA service between the UE and the AF according to the UE subscription information stored locally. If allowed, UDM will feedback to AAnF to confirm that it can carry the UE's SUPI, AF ID, whether AKMA service [enabled/disabled] is enabled, and the validity period of the AKMA service. Otherwise, the feedback is not signed.
AAnF根据查询结果决定是否为该AF产生用于保护应用数据的密钥K af The AAnF decides whether to generate the key K af for protecting the application data for the AF according to the query result.
步骤1116、AAnF向AF发送响应Key Response。Step 1116: AAnF sends a response Key Response to the AF.
参见图12,图12是本公开实施例提供的密钥生成方法的流程图。在本公开实施例中,网络侧根据UE上报的服务能力的支持以及AF上报的服务支持信息,选择是否使用AKMA架构作为保护用户应用数据保护的机制。如图12所示,所述方法可包括:Refer to FIG. 12, which is a flowchart of a key generation method provided by an embodiment of the present disclosure. In the embodiments of the present disclosure, the network side selects whether to use the AKMA architecture as a mechanism for protecting user application data according to the support of the service capabilities reported by the UE and the service support information reported by the AF. As shown in FIG. 12, the method may include:
步骤1201、UE发送注册请求,在注册请求中携带用户的应用服务安全能力(AKMA服务能力、GBA服务能力、其他),其他服务能力可能为空。Step 1201: The UE sends a registration request, and the registration request carries the user's application service security capabilities (AKMA service capability, GBA service capability, and others). Other service capabilities may be empty.
例如,UE可发送N1 message[SUPI or 5G GUTI,Application protection information indication,UE AKMA service capability]。For example, the UE can send N1 message [SUPI or 5G GUTI, Application protection information indication, UE AKMA service capability].
步骤1202、AMF(SEAF)将这些服务能力包含在NAUSF_UE Authentication Authenticate Request消息中,同用户身份一同发给AUSF。Step 1202, the AMF (SEAF) includes these service capabilities in the NAUSF_UE Authentication Authentication Request message, and sends it to the AUSF together with the user identity.
例如AMF可向AUSF发送Nausf_UEAuthentication_Authenticate Request[SUPI or 5G GUTI,Application protection information indication(应用保护信息指示),such as AKMA service capability indication(如AKMA服务能力指示)]。For example, AMF can send Nausf_UEAuthentication_Authenticate Request [SUPI or 5G GUTI, Application protection information indication (application protection information indication), such as AKMA service capability indication (such as AKMA service capability indication)] to AUSF.
步骤1203、如果AUSF没有包含该消息,则当AUSF收到Nausf_UEAuthentication_Authenticate Request请求消息时,会向UDM发送认 证获取请求消息中携带UE服务能力质询指示。Step 1203: If the AUSF does not include the message, when the AUSF receives the Nausf_UEAuthentication_Authenticate Request message, it will send the authentication acquisition request message to the UDM to carry the UE service capability challenge indication.
例如,AUSF向UDM发送Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name]。For example, AUSF sends Nudm_UEAuthentication_Get Request[SUCI or SUPI,SN name] to UDM.
步骤1204、UDM收到AUSF发送的认证获取指示,则会反馈UE对应用数据的保护能力信息。Step 1204: After receiving the authentication acquisition instruction sent by AUSF, the UDM will feed back the protection capability information of the UE for application data.
例如,UDM向AUSF发送Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI,Application protection information indication]]。For example, UDM sends Nudm_UEAuthentication_Get ResponseResponse[AV,[SUPI,Application protection information indication]] to AUSF.
步骤1205、AUSF确定生成哪种形式的密钥。Step 1205: AUSF determines which form of key to generate.
AUSF根据收到的认证获取响应消息,选择使用哪一种方式进行保护应用数据的保护。如果UDM明确指示选择了某种方式,如AKMA服务能力,则AUSF会为该UE产生AKMA密钥。若UE支持多种,则AUSF会根据网络策略选择进行密钥的推衍。其中,该策略可以预先设置。AUSF chooses which method to use to protect application data according to the received authentication acquisition response message. If UDM clearly indicates that a certain method is selected, such as AKMA service capability, AUSF will generate an AKMA key for the UE. If the UE supports multiple types, the AUSF will choose to derive the key according to the network policy. Among them, the strategy can be preset.
步骤1206、AUSF将该策略连同推衍的密钥发给AAnF。Step 1206: AUSF sends the policy together with the derived key to AAnF.
例如,AUSF生成了AKMA密钥,则AUSF向AAnF发送AKMA密钥;如果,AUSF根据网络策略生成了AKMA密钥,则AUSF向AAnF发送该策略以及AKMA密钥。For example, if AUSF generates an AKMA key, AUSF sends the AKMA key to AAnF; if AUSF generates the AKMA key according to the network policy, AUSF sends the policy and the AKMA key to AAnF.
步骤1207、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[AV]。Step 1207: AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[AV] to SEAF.
步骤1208、SEAF向UE发送认证请求Authenticate Request。Step 1208: The SEAF sends an Authenticate Request to the UE.
步骤1209、UE向SEAF发送认证响应Authenticate Response。Step 1209: The UE sends an Authenticate Response to the SEAF.
步骤1210、SEAF向AUSF发送认证请求Nausf_UEAuthentication_Authenticate Request[RES*]。Step 1210: SEAF sends an authentication request Nausf_UEAuthentication_Authenticate Request[RES*] to AUSF.
步骤1211、AUSF向SEAF发送认证响应Nausf_UEAuthentication_Authenticate Response[Result]。 Step 1211, AUSF sends an authentication response Nausf_UEAuthentication_Authenticate Response[Result] to SEAF.
步骤1212、UE向AF发送应用密钥会话请求Application session Establishment Request(KAKMA ID)。Step 1212: The UE sends an application key session request Application session Establishment Request (KAKMA ID) to the AF.
步骤1213、AF向AAnF发送密钥请求Key Request。Step 1213: The AF sends a Key Request to AAnF.
AAnF收到AF发的应用密钥请求,该请求信息中包含是否支持AKMA服务保护应用数据的信息。AAnF receives the application key request sent by AF, and the request information contains information about whether it supports AKMA service to protect application data.
步骤1214、AAnF根据AUSF发送的UE的能力以及AF的能力,若两者都支持AKMA服务能力,则AAnF决定推衍K AF密钥。 Step 1214: AAnF decides to derive the K AF key according to the UE capability and the AF capability sent by AUSF. If both support the AKMA service capability, AAnF decides to derive the K AF key.
步骤1215、AAnF向AF发送响应Key Response。Step 1215: AAnF sends a response Key Response to the AF.
参见图13,图13是本公开实施例提供的密钥生成方法的流程图。如图13所示,所述方法可包括:Refer to FIG. 13, which is a flowchart of a key generation method provided by an embodiment of the present disclosure. As shown in Figure 13, the method may include:
步骤1301、UE向AMF发送UL NAS message(SUPI,AF ID,AKMA capability),携带AKMA能力、AF ID等,其中,AKMA能力可以是更新的能力。 Step 1301, UE sends UL NAS message (SUPI, AF ID, AKMA capability) to AMF, carrying AKMA capability, AF ID, etc., where the AKMA capability may be an updated capability.
步骤1302、AMF向UDM发送Nudm_APProtectionUPdate_Notification(SUPI,AF ID,AKMA capability)),更新AKMA能力信息。 Step 1302, AMF sends Nudm_APProtectionUPdate_Notification(SUPI, AF ID, AKMA capability)) to UDM to update the AKMA capability information.
步骤1303、UDM收到后决定为该UE开启AKMA的应用提供保护。Step 1303: After receiving the UDM, it decides to provide protection for the UE to open the AKMA application.
步骤1304、UDM将该信息告知AUSF,后续需要为UE推衍AKMA密钥的指示信息。Step 1304: UDM informs AUSF of the information, and then it needs to derive the indication information of the AKMA key for the UE.
例如,UDM向AUSF发送Nausf_APProtection(SUPI,AKMA capability,[Key derivate Indication])。For example, UDM sends Nausf_APProtection (SUPI, AKMA capability, [Key derivate Indication]) to AUSF.
步骤1305、AUSF收到后向UDM发送响应并将需要的密钥推衍参数发给UDM。Step 1305: After receiving it, AUSF sends a response to UDM and sends the required key derivation parameters to UDM.
例如,AUSF向UDM发送Nausf_APProtection Response(Key derivate parameters(密钥推衍参数))。For example, AUSF sends Nausf_APProtection Response (Key derivate parameters) to UDM.
之后,AUSF生成密钥。After that, AUSF generates a key.
步骤1306、UDM收到AUSF的确认后向AMF发送响应,并将AKMA密钥推衍参数发给AMF。Step 1306: UDM sends a response to AMF after receiving the confirmation from AUSF, and sends AKMA key derivation parameters to AMF.
例如,UDM向AMF发送Nudm_APProtectionupdate_Notification Response((AKMA Key derivate parameters))。For example, UDM sends Nudm_APProtectionupdate_Notification Response ((AKMA Key derivate parameters)) to AMF.
步骤1307、AMF通过下行的NAS(Non-Access Stratum,非接入层)消息将必须的密钥推衍参数发送给UE。Step 1307: The AMF sends the necessary key derivation parameters to the UE through a downlink NAS (Non-Access Stratum, non-access stratum) message.
例如,AMF向UE发送DL NAS message(AKMA Key derivate parameters)。For example, AMF sends DL NAS message (AKMA Key derivate parameters) to UE.
步骤1308、UDM向AAnF发送用户标识、用户的AKMA能力、AF ID、 推衍密钥的指示。Step 1308: The UDM sends the user identification, the user's AKMA capability, the AF ID, and an instruction to derive the key to AAnF.
例如,UDM向AANF发送Nausf_APProtection(SUPI,AKMA Application capability,AF ID,[Key derivate Indication])。For example, UDM sends Nausf_APProtection (SUPI, AKMA Application capability, AF ID, [Key derivate Indication]) to AANF.
步骤1309、AAnF响应确认消息。Step 1309: AAnF responds to the confirmation message.
例如,AANF向UDM发送Nausf_APProtection Response(Ack)。For example, AANF sends Nausf_APProtection Response (Ack) to UDM.
步骤1310、UE向AF发送应用密钥会话请求Application session Establishment Request(KAKMA ID)。Step 1310: The UE sends an application key session request Application session Establishment Request (KAKMA ID) to the AF.
步骤1311、AF向AAnF发送密钥请求Key Request。Step 1311. The AF sends a Key Request to AAnF.
AAnF当收到AF的请求后,需要根据UDM的指示是否推衍AF密钥。After AAnF receives the request of AF, it needs to derive the AF key according to UDM's instructions.
步骤1312、AAnF向AF发送响应Key Response。Step 1312, AAnF sends a response Key Response to the AF.
本公开实施例还提供了一种密钥生成装置,应用于第一网元。参见图14,图14是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to the first network element. Refer to FIG. 14, which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图14所示,密钥生成装置1400包括:As shown in FIG. 14, the key generation device 1400 includes:
第一获取模块1401,用于获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;第一生成模块1402,用于根据所述第一信息,生成密钥。The first obtaining module 1401 is configured to obtain first information of the terminal, and the first information is used to indicate the security capability of the application service supported by the terminal; the first generating module 1402 is configured to generate Key.
可选地,所述应用服务安全能力包括支持AKMA服务的能力;Optionally, the application service security capability includes the capability to support AKMA service;
所述装置还可包括:第一请求模块,用于请求UDM确认所述终端是否支持AKMA服务;所述第一生模模块1402具体用于,在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。The device may further include: a first request module, configured to request UDM to confirm whether the terminal supports AKMA service; the first model generation module 1402 is specifically configured to generate an AKMA key when receiving the first response, The first response indicates that the UDM confirms that the terminal supports the AKMA service.
可选地,所述装置还可包括:第一存储模块,用于预先存储终端的标识信息与终端是否支持AKMA服务的对应关系。Optionally, the device may further include: a first storage module configured to pre-store the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service.
可选地,所述第一获取模块1401可包括:第一接收子模块,用于接收第二网元发送的认证请求消息,所述认证请求消息携带所述终端的签约永久标识SUPI,或者,所述认证请求消息携带所述终端的签约加密标识SUCI;第一获取子模块,用于在所述认证请求消息携带所述SUPI的情况下,根据所述 SUPI查询所述对应关系,获取所述第一信息;第二获取子模块,用于在所述认证请求消息携带所述SUCI的情况下,向UDM发送所述SUCI,并从所述UDM获得SUPI;根据从所述UDM获得的SUPI查询所述对应关系,获取所述第一信息。Optionally, the first obtaining module 1401 may include: a first receiving submodule, configured to receive an authentication request message sent by a second network element, the authentication request message carrying the terminal's contract permanent identity SUPI, or, The authentication request message carries the subscription encryption identifier SUCI of the terminal; the first obtaining sub-module is configured to query the corresponding relationship according to the SUPI in the case that the authentication request message carries the SUPI, and obtain the The first information; the second acquisition sub-module is used to send the SUCI to the UDM and obtain the SUPI from the UDM when the authentication request message carries the SUCI; query according to the SUPI obtained from the UDM According to the corresponding relationship, the first information is acquired.
可选地,所述第一获取模块1401可具体用于,接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息。Optionally, the first obtaining module 1401 may be specifically configured to receive an authentication request message sent by a second network element, where the authentication request message carries the first information.
可选地,所述第一请求模块包括:Optionally, the first request module includes:
第一发送子模块,用于向所述UDM发送第一指示信息,所述第一指示信息用于指示所述UDM确认所述终端是否支持AKMA服务;第一接收子模块,用于接收所述UDM发送的第一确认指示,所述第一确认指示用于指示所述终端是否支持AKMA服务。The first sending submodule is used to send first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service; the first receiving submodule is used to receive the A first confirmation instruction sent by the UDM, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
可选地,所述装置还可包括:第一接收模块,用于接收所述终端的第一请求,所述第一请求用于请求生成AKMA密钥;第一发送模块,用于根据所述第一请求,向所述UDM发送第一指示信息。Optionally, the device may further include: a first receiving module, configured to receive a first request from the terminal, where the first request is used to request to generate an AKMA key; and a first sending module, configured to receive the AKMA key according to the The first request is to send first indication information to the UDM.
可选地,所述第一获取模块具体用于,接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括支持AKMA服务的能力,支持通用引导架构GBA服务的能力。Optionally, the first acquisition module is specifically configured to receive an authentication request message sent by a second network element, where the authentication request message carries the first information, and the application service security capability includes at least one supporting AKMA service Ability, the ability to support the GBA service of the universal guidance architecture.
可选地,所述装置还可包括:第二请求模块用于请求UDM确认所述终端所支持的目标应用服务安全能力。Optionally, the device may further include: a second request module for requesting UDM to confirm the target application service security capability supported by the terminal.
可选地,所述第一生成模块具体用于,如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,则生成AKMA密钥或者GBA密钥;如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,则根据预设策略生成密钥。Optionally, the first generating module is specifically configured to generate an AKMA key or a GBA key if the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service; if The target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, and the key is generated according to a preset policy.
可选地,所述装置还可包括:第二发送模块,用于如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,向第三网元发送所述目标应用服务安全能力的信息;如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,向第三网元发送所述预设策略以及根据所述预设策略生成的密钥。Optionally, the device may further include: a second sending module, configured to send the target application service security capability to one of the capability of supporting AKMA service or the capability of supporting GBA service to the third network element. Information about the security capability of the target application service; if the security capability of the target application service is at least the ability to support AKMA services and the ability to support GBA services, send the preset policy to the third network element and generate it according to the preset policy Key.
可选地,所述第一获取模块,用于接收UDM发送的指示信息,所述指 示信息用于指示为所述终端选择AKMA服务;所述第一生成模块,具体用于,根据所述指示信息,生成密钥;向所述UDM发送AKMA密钥推衍参数。Optionally, the first acquisition module is configured to receive instruction information sent by UDM, where the instruction information is used to instruct to select an AKMA service for the terminal; the first generation module is specifically configured to: Information, generate a key; send AKMA key derivation parameters to the UDM.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于第三网元。参见图15,图15是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to a third network element. Refer to FIG. 15, which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图15所示,密钥生成装置1500包括:As shown in FIG. 15, the key generation device 1500 includes:
第一接收模块1501,用于接收目标第四网元的密钥请求;第一确定模块1502,用于根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;第一生成模块1503,用于生成所述终端所支持的应用服务安全能力的密钥。The first receiving module 1501 is used to receive the key request of the target fourth network element; the first determining module 1502 is used to determine the application service security capability supported by the terminal and the information of the fourth network element according to the key request , The fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application service security capability is one or more of the application service security capabilities supported by the terminal; A generating module 1503 is used to generate the key of the application service security capability supported by the terminal.
可选地,所述第一确定模块1502可用于,请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;所述第一生成模块1503可用于,如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。Optionally, the first determining module 1502 may be used to request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element; the first generating module 1503 may be used to, if the terminal is The supported application service security capability is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated.
可选地,所述第一生成模块1503可包括:Optionally, the first generating module 1503 may include:
第一获取子模块,用于获取第一网元发送的所述终端所支持的第一应用服务安全能力;第二获取子模块,用于获取所述目标第四网元的标识;第一生成子模块,用于如果所述第一应用服务安全能力为支持AKMA服务的能力且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。The first obtaining submodule is used to obtain the first application service security capability supported by the terminal sent by the first network element; the second obtaining submodule is used to obtain the identification of the target fourth network element; first generation A sub-module, configured to: if the first application service security capability is the capability to support AKMA services, and according to the identifier of the target fourth network element, it is determined that the AKMA service is enabled between the terminal and the target fourth network element, Then the AF key is generated.
可选地,所述第一生成模块1503可包括:Optionally, the first generating module 1503 may include:
第三获取子模块,用于获取第一网元发送的预设策略以及根据所述预设策略生成的密钥;第四获取子模块,用于获取所述第四网元的标识;第二生 成子模块,用于如果所述预设策略表示所述密钥是由于所述终端支持AKMA服务的能力而生成的,且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。The third obtaining submodule is used to obtain the preset policy sent by the first network element and the key generated according to the preset policy; the fourth obtaining submodule is used to obtain the identity of the fourth network element; second A generation sub-module is used to determine if the preset policy indicates that the key is generated due to the ability of the terminal to support AKMA services, and determine the relationship between the terminal and the target according to the identity of the target fourth network element If the AKMA service is enabled between the fourth network element, the AF key is generated.
可选地,所述第一确定模块1502可用于,接收UDM发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元;所述第一生成模块1503可用于,如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。Optionally, the first determining module 1502 may be configured to receive indication information sent by UDM and the identification of the fourth network element, where the indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element Is the fourth network element that has AKMA service enabled between the terminals; the first generation module 1503 can be used if the application service security capability supported by the terminal is the capability to support AKMA services and is based on the fourth network If the information of the element determines that the AKMA service is enabled between the terminal and the target fourth network element, an AF key is generated.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于第二网元。参见图16,图16是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to the second network element. Refer to FIG. 16, which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图16所示,密钥生成装置1600包括:第一发送模块1601,用于向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。As shown in FIG. 16, the key generation device 1600 includes: a first sending module 1601, configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first The information is used to enable the first network element to generate a key according to the first information.
可选地,所述第一发送模块1601具体用于,向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息。Optionally, the first sending module 1601 is specifically configured to send an authentication request message to the first network element, where the authentication request message carries the first information.
可选地,所述第一发送模块1601具体用于,向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Optionally, the first sending module 1601 is specifically configured to send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least AKMA service Capacity, GBA service capacity.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于UDM。参见图17,图17是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to UDM. Refer to FIG. 17, which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图17所示,密钥生成装置1700包括:第一存储模块1701,用于存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;第一确认模块1702,用于根据所述签约信息,确认所述终端支持的目标应用服务安全能力。As shown in FIG. 17, the key generation device 1700 includes: a first storage module 1701 for storing subscription information of a terminal, the subscription information includes the security capabilities of application services supported by the terminal; a first confirmation module 1702, According to the subscription information, confirm the target application service security capability supported by the terminal.
可选地,所述第一确认模块1702可包括:第一接收子模块,用于接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务;第一发送子模块,用于根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。Optionally, the first confirmation module 1702 may include: a first receiving submodule, configured to receive a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service; The sending submodule is configured to send a first response to the first network element according to the subscription information and the first request, where the first response is used to indicate whether the terminal supports the AKMA service.
可选地,所述第一接收子模块具体用于,在主认证的过程之中,接收第一网元的第一请求;或者在主认证过程完成之后,接收第一网元的第一请求。Optionally, the first receiving submodule is specifically configured to receive the first request of the first network element during the main authentication process; or after the main authentication process is completed, receive the first request of the first network element .
可选地,所述第一确认模块1702可包括:第二接收子模块,用于接收第三网元的第二请求,所述第二请求用于确认所述终端是否支持AKMA服务;第二发送子模块,用于根据所述签约信息以及所述第二请求,向所述第三网元发送第二响应,所述第二响应用于指示所述终端是否支持AKMA服务。Optionally, the first confirmation module 1702 may include: a second receiving submodule, configured to receive a second request from a third network element, the second request being used to confirm whether the terminal supports AKMA service; second The sending submodule is configured to send a second response to the third network element according to the subscription information and the second request, where the second response is used to indicate whether the terminal supports the AKMA service.
可选地,所述第一确认模块1702可包括:第三接收子模块,用于接收第一网元的第三请求;第三发送子模块,用于根据所述签约信息以及所述第三请求,向所述第一网元发送第三响应,所述第三响应用于指示目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,或者,所述目标应用服务安全能力至少为AKMA支持服务的能力和支持GBA服务的能力。Optionally, the first confirmation module 1702 may include: a third receiving submodule, configured to receive a third request from the first network element; and a third sending submodule, configured to receive the subscription information and the third request Request, send a third response to the first network element, where the third response is used to indicate that the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, or the target application The service security capability is at least the capability of AKMA to support services and the capability to support GBA services.
可选地,所述签约信息还包括:与所述终端之间开启了AKMA服务的第四网元的标识信息。Optionally, the subscription information further includes: identification information of the fourth network element that has enabled the AKMA service with the terminal.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于第二网元。参见图18,图18是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to the second network element. Referring to FIG. 18, FIG. 18 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图18所示,密钥生成装置1800包括:第一发送模块1801,用于向 UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;第一接收模块1802,用于接收所述UDM发送的密钥推衍参数;第二发送模块1803,用于向所述终端发送所述密钥推衍参数。As shown in FIG. 18, the key generation device 1800 includes: a first sending module 1801, configured to send indication information and an identifier of a fourth network element to UDM, where the indication information is used to indicate application service security capabilities supported by the terminal; The first receiving module 1802 is configured to receive the key derivation parameter sent by the UDM; the second sending module 1803 is configured to send the key derivation parameter to the terminal.
其中,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。The indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于UDM。参见图19,图19是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to UDM. Refer to FIG. 19, which is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图19所示,密钥生成装置1900包括:第一获取模块1901,用于获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;第一发送模块1902,用于当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。As shown in FIG. 19, the key generation device 1900 includes: a first acquisition module 1901, configured to acquire subscription information of a terminal, the subscription information includes the application service security capabilities supported by the terminal; a first sending module 1902, When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal The security key for the application service.
可选地,所述第一获取模块1901具体用于,接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Optionally, the first obtaining module 1901 is specifically configured to receive the indication information sent by the second network element and the identification of the fourth network element, where the indication information is used to indicate the application service security capabilities supported by the terminal, And the identification information of the AF that starts the AKMA service with the terminal.
可选地,所述装置还可包括:第一接收模块,用于接收所述第一网元发送的密钥推衍参数;第一发送模块,用于向所述第二网元发送所述密钥推衍参数。Optionally, the device may further include: a first receiving module, configured to receive key derivation parameters sent by the first network element; a first sending module, configured to send the second network element to the Key derivation parameters.
可选地,所述装置还可包括:第二发送模块,用于向第四网元发送指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力;所述第四网元为所述终端之间开启了AKMA服务的第四网元。Optionally, the device may further include: a second sending module, configured to send instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate the security of the application service supported by the terminal Capability; The fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
本公开实施例还提供了一种密钥生成装置,应用于终端。参见图20,图20是本公开实施例提供的密钥生成装置的结构图。由于密钥生成装置解决问 题的原理与本公开实施例中密钥生成方法相似,因此该密钥生成装置的实施可以参见方法的实施,重复之处不再赘述。The embodiment of the present disclosure also provides a key generation device, which is applied to a terminal. Referring to FIG. 20, FIG. 20 is a structural diagram of a key generation device provided by an embodiment of the present disclosure. Since the principle of the key generation device to solve the problem is similar to the key generation method in the embodiment of the present disclosure, the implementation of the key generation device can refer to the implementation of the method, and the repetition will not be repeated.
如图20所示,密钥生成装置2000包括:第一发送模块2001,用于向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。As shown in FIG. 20, the key generation device 2000 includes: a first sending module 2001, configured to send first information to a second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
可选地,所述第一发送模块2001具体用于,向所述第二网元发送N1消息,所述第一信息表示所述终端支持AKMA服务。Optionally, the first sending module 2001 is specifically configured to send an N1 message to the second network element, and the first information indicates that the terminal supports the AKMA service.
可选地,所述第一发送模块2001具体用于,向所述第二网元发送N1消息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Optionally, the first sending module 2001 is specifically configured to send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
可选地,所述装置还可包括:第一接收模块,用于接收所述第二网元发送的密钥推衍参数;第一生成模块,用于根据所述密钥推衍参数生成AKMA密钥。Optionally, the device may further include: a first receiving module, configured to receive key derivation parameters sent by the second network element; a first generation module, configured to generate AKMA according to the key derivation parameters Key.
本公开实施例提供的装置,可以执行上述方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。The device provided in the embodiment of the present disclosure can execute the foregoing method embodiment, and its implementation principles and technical effects are similar, and details are not described herein again in this embodiment.
如图21所示,本公开实施例的密钥生成设备,应用于终端,包括:处理器2100,用于读取存储器2120中的程序,执行下列过程:As shown in FIG. 21, the key generation device of the embodiment of the present disclosure, applied to a terminal, includes a processor 2100, configured to read a program in a memory 2120, and execute the following process:
向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Send first information to the second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
收发机2110,用于在处理器2100的控制下接收和发送数据。The transceiver 2110 is used to receive and send data under the control of the processor 2100.
其中,在图21中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2100代表的一个或多个处理器和存储器2120代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2110可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口2130还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。Wherein, in FIG. 21, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2100 and various circuits of the memory represented by the memory 2120 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2110 may be a plurality of elements, that is, including a transmitter and a receiver, and provide a unit for communicating with various other devices on a transmission medium. For different user equipment, the user interface 2130 may also be an interface that can externally and internally connect the required equipment. The connected equipment includes, but is not limited to, a keypad, a display, a speaker, a microphone, a joystick, and the like.
处理器2100负责管理总线架构和通常的处理,存储器2120可以存储处理器2100在执行操作时所使用的数据。The processor 2100 is responsible for managing the bus architecture and general processing, and the memory 2120 can store data used by the processor 2100 when performing operations.
处理器2100还用于读取所述程序,执行如下步骤:向所述第二网元发送N1消息,所述第一信息表示所述终端支持AKMA服务。The processor 2100 is further configured to read the program and perform the following steps: send an N1 message to the second network element, where the first information indicates that the terminal supports the AKMA service.
处理器2100还用于读取所述程序,执行如下步骤:向所述第二网元发送N1消息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。The processor 2100 is further configured to read the program and perform the following steps: send an N1 message to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
处理器2100还用于读取所述程序,执行如下步骤:The processor 2100 is further configured to read the program and execute the following steps:
接收所述第二网元发送的密钥推衍参数;根据所述密钥推衍参数生成AKMA密钥。Receiving the key derivation parameter sent by the second network element; generating an AKMA key according to the key derivation parameter.
如图22所示,本公开实施例的密钥生成设备,应用于第一网元,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:As shown in FIG. 22, the key generation device of the embodiment of the present disclosure, applied to the first network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;Acquiring first information of the terminal, where the first information is used to indicate an application service security capability supported by the terminal;
根据所述第一信息,生成密钥。According to the first information, a key is generated.
收发机2210,用于在处理器2200的控制下接收和发送数据。The transceiver 2210 is configured to receive and send data under the control of the processor 2200.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
所述应用服务安全能力包括支持AKMA服务的能力;处理器2200还用于读取所述程序,执行如下步骤:请求UDM确认所述终端是否支持AKMA服务;在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。The application service security capability includes the capability to support AKMA service; the processor 2200 is also used to read the program and perform the following steps: request UDM to confirm whether the terminal supports AKMA service; when receiving the first response, generate AKMA Key, the first response indicates that the UDM confirms that the terminal supports the AKMA service.
处理器2200还用于读取所述程序,执行如下步骤:预先存储终端的标识信息与终端是否支持AKMA服务的对应关系。The processor 2200 is further configured to read the program and perform the following steps: pre-store the corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第二网元发送的认证请求消息,所述认证请求消息携带所述终端的签约永久标识SUPI,或者,所述认证请求消息携带所述终端的签约加密标识SUCI;Receiving an authentication request message sent by the second network element, the authentication request message carrying the terminal's subscription permanent identification SUPI, or the authentication request message carrying the terminal's subscription encryption identification SUCI;
在所述认证请求消息携带所述SUPI的情况下,根据所述SUPI查询所述对应关系,获取所述第一信息;In the case where the authentication request message carries the SUPI, query the correspondence relationship according to the SUPI to obtain the first information;
在所述认证请求消息携带所述SUCI的情况下,向UDM发送所述SUCI,并从所述UDM获得SUPI;根据从所述UDM获得的SUPI查询所述对应关系,获取所述第一信息。When the authentication request message carries the SUCI, send the SUCI to the UDM and obtain the SUPI from the UDM; query the correspondence relationship according to the SUPI obtained from the UDM to obtain the first information.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息。Receiving an authentication request message sent by a second network element, where the authentication request message carries the first information.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
向所述UDM发送第一指示信息,所述第一指示信息用于指示所述UDM确认所述终端是否支持AKMA服务;Sending first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service;
接收所述UDM发送的第一确认指示,所述第一确认指示用于指示所述终端是否支持AKMA服务。Receiving a first confirmation instruction sent by the UDM, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收所述终端的第一请求,所述第一请求用于请求生成AKMA密钥;Receiving a first request from the terminal, where the first request is used to request the generation of an AKMA key;
所述向所述UDM发送第一指示信息,包括:The sending first indication information to the UDM includes:
根据所述第一请求,向所述UDM发送第一指示信息。According to the first request, first indication information is sent to the UDM.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括支持AKMA服务的能力,支持通用引导架构GBA服务的能力。An authentication request message sent by a second network element is received, the authentication request message carries the first information, and the application service security capability includes at least the capability of supporting the AKMA service and the capability of supporting the GBA service of the universal guidance architecture.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
请求UDM确认所述终端所支持的目标应用服务安全能力。Request UDM to confirm the target application service security capabilities supported by the terminal.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持 GBA服务的能力中的一种,则生成AKMA密钥或者GBA密钥;If the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, an AKMA key or a GBA key is generated;
如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,则根据预设策略生成密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the key is generated according to the preset policy.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,向第三网元发送所述目标应用服务安全能力的信息;If the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service, sending the information of the security capability of the target application service to a third network element;
如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,向第三网元发送所述预设策略以及根据所述预设策略生成的密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the preset policy and the key generated according to the preset policy are sent to a third network element.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收UDM发送的指示信息,所述指示信息用于指示为所述终端选择AKMA服务;Receiving instruction information sent by UDM, where the instruction information is used to instruct to select an AKMA service for the terminal;
根据所述指示信息,生成密钥;Generate a key according to the instruction information;
向所述UDM发送AKMA密钥推衍参数。Send the AKMA key derivation parameter to the UDM.
再参见图22,本公开实施例的密钥生成设备,应用于第三网元,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:Referring again to FIG. 22, the key generation device of the embodiment of the present disclosure, applied to a third network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
接收目标第四网元的密钥请求;Receive the key request of the target fourth network element;
根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element. The fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application The service security capability is one or more of the application service security capabilities supported by the terminal;
生成所述终端所支持的应用服务安全能力的密钥。Generate a key for the application service security capability supported by the terminal.
收发机2210,用于在处理器2200的控制下接收和发送数据。The transceiver 2210 is configured to receive and send data under the control of the processor 2200.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件, 即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;Request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element;
所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
获取第一网元发送的所述终端所支持的第一应用服务安全能力;Acquiring the first application service security capability supported by the terminal and sent by the first network element;
获取所述目标第四网元的标识;Acquiring the identifier of the target fourth network element;
如果所述第一应用服务安全能力为支持AKMA服务的能力且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
获取第一网元发送的预设策略以及根据所述预设策略生成的密钥;Acquiring a preset policy sent by the first network element and a key generated according to the preset policy;
获取所述第四网元的标识;Acquiring the identifier of the fourth network element;
如果所述预设策略表示所述密钥是由于所述终端支持AKMA服务的能力而生成的,且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收UDM发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元;Receive the indication information sent by UDM and the identification of the fourth network element, where the indication information is used to indicate the capability of the terminal to support the AKMA service, and the fourth network element is the fourth network with the AKMA service enabled between the terminals Yuan;
所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
再参见图22,本公开实施例的密钥生成设备,应用于第二网元,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:Referring again to FIG. 22, the key generation device of the embodiment of the present disclosure, applied to the second network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Send first information to the first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information.
收发机2210,用于在处理器2200的控制下接收和发送数据。The transceiver 2210 is configured to receive and send data under the control of the processor 2200.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息。Sending an authentication request message to the first network element, where the authentication request message carries the first information.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
再参见图22,本公开实施例的密钥生成设备,应用于UDM,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:Referring again to FIG. 22, the key generation device of the embodiment of the present disclosure, applied to UDM, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Storing the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
根据所述签约信息,确认所述终端支持的目标应用服务安全能力。According to the subscription information, the target application service security capability supported by the terminal is confirmed.
收发机2210,用于在处理器2200的控制下接收和发送数据。The transceiver 2210 is configured to receive and send data under the control of the processor 2200.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务;Receiving a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the first request, a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
在主认证的过程之中,接收第一网元的第一请求;或者During the master authentication process, receive the first request of the first network element; or
在主认证过程完成之后,接收第一网元的第一请求。After the master authentication process is completed, the first request of the first network element is received.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第三网元的第二请求,所述第二请求用于确认所述终端是否支持AKMA服务;Receiving a second request from a third network element, where the second request is used to confirm whether the terminal supports the AKMA service;
根据所述签约信息以及所述第二请求,向所述第三网元发送第二响应,所述第二响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the second request, a second response is sent to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第一网元的第三请求;Receiving the third request of the first network element;
根据所述签约信息以及所述第三请求,向所述第一网元发送第三响应,所述第三响应用于指示目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,或者,所述目标应用服务安全能力至少为 AKMA支持服务的能力和支持GBA服务的能力。According to the subscription information and the third request, a third response is sent to the first network element, where the third response is used to indicate that the target application service security capability is the capability of supporting AKMA service or the capability of supporting GBA service. Or, the target application service security capability is at least the capability of AKMA to support services and the capability of supporting GBA services.
其中,所述签约信息还包括:与所述终端之间开启了AKMA服务的第四网元的标识信息。Wherein, the subscription information further includes: identification information of the fourth network element that has enabled the AKMA service with the terminal.
再参见图22,本公开实施例的密钥生成设备,应用于第二网元,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:Referring again to FIG. 22, the key generation device of the embodiment of the present disclosure, applied to the second network element, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the UDM, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
接收所述UDM发送的密钥推衍参数;Receiving the key derivation parameter sent by the UDM;
向所述终端发送所述密钥推衍参数。Sending the key derivation parameter to the terminal.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。The indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
再参见图22,本公开实施例的密钥生成设备,应用于UDM,包括:处理器2200,用于读取存储器2222中的程序,执行下列过程:Referring again to FIG. 22, the key generation device of the embodiment of the present disclosure, applied to UDM, includes: a processor 2200, configured to read a program in a memory 2222, and execute the following process:
获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Acquiring subscription information of the terminal, where the subscription information includes application service security capabilities supported by the terminal;
当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key. Application service security key.
收发机2210,用于在处理器2200的控制下接收和发送数据。The transceiver 2210 is configured to receive and send data under the control of the processor 2200.
其中,在图22中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器2200代表的一个或多个处理器和存储器2222代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机2210可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。Wherein, in FIG. 22, the bus architecture may include any number of interconnected buses and bridges. Specifically, one or more processors represented by the processor 2200 and various circuits of the memory represented by the memory 2222 are linked together. The bus architecture can also link various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, will not be further described herein. The bus interface provides the interface. The transceiver 2210 may be a plurality of elements, including a transmitter and a receiver, and provide a unit for communicating with various other devices on the transmission medium. The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200负责管理总线架构和通常的处理,存储器2222可以存储处理器2200在执行操作时所使用的数据。The processor 2200 is responsible for managing the bus architecture and general processing, and the memory 2222 can store data used by the processor 2200 when performing operations.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Receive instruction information sent by the second network element and the identification of the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal and the identification information of the AF that enables the AKMA service with the terminal.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
接收所述第一网元发送的密钥推衍参数;Receiving the key derivation parameter sent by the first network element;
向所述第二网元发送所述密钥推衍参数。Sending the key derivation parameter to the second network element.
处理器2200还用于读取所述程序,执行如下步骤:The processor 2200 is further configured to read the program and execute the following steps:
向第四网元发送指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
所述第四网元为所述终端之间开启了AKMA服务的第四网元。The fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述密钥生成方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。The embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, each process of the above-mentioned key generation method embodiment is realized, and the same The technical effect, in order to avoid repetition, will not be repeated here. Wherein, the computer-readable storage medium, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意 在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that in this article, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, It also includes other elements that are not explicitly listed, or elements inherent to the process, method, article, or device. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article, or device that includes the element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。根据这样的理解,本公开的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。Through the description of the above implementation manners, those skilled in the art can clearly understand that the above-mentioned embodiment method can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is better.的实施方式。 According to this understanding, the technical solution of the present disclosure can be embodied in the form of a software product in essence or a part that contributes to the related technology. The computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk). ) Includes several instructions to make a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present disclosure.
可以理解的是,本公开实施例描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,各个模块、单元、子单元或子模块等可以实现在一个或多个专用集成电路(Application Specific Integrated Circuit,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本公开所述功能的其它电子单元或其组合中。It can be understood that the embodiments described in the embodiments of the present disclosure may be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof. For hardware implementation, each module, unit, sub-unit or sub-module can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing equipment (DSP Device, DSPD), Programmable Logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, In other electronic units or combinations thereof that perform the functions described in the present disclosure.
对于软件实现,可通过执行本公开实施例所述功能的模块(例如过程、函数等)来实现本公开实施例所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For software implementation, the technology described in the embodiments of the present disclosure can be implemented by modules (for example, procedures, functions, etc.) that perform the functions described in the embodiments of the present disclosure. The software codes can be stored in the memory and executed by the processor. The memory can be implemented in the processor or external to the processor.
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。The embodiments of the present disclosure are described above with reference to the accompanying drawings, but the present disclosure is not limited to the above-mentioned specific embodiments. The above-mentioned specific embodiments are only illustrative and not restrictive. Those of ordinary skill in the art are Under the enlightenment of the present disclosure, many forms can be made without departing from the purpose of the present disclosure and the scope of protection of the claims, all of which fall within the protection of the present disclosure.

Claims (55)

  1. 一种密钥生成方法,应用于第一网元,包括:A key generation method, applied to a first network element, includes:
    获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;Acquiring first information of the terminal, where the first information is used to indicate an application service security capability supported by the terminal;
    根据所述第一信息,生成密钥。According to the first information, a key is generated.
  2. 根据权利要求1所述的方法,其中,所述应用服务安全能力包括支持应用层认证和密钥管理AKMA服务的能力;The method according to claim 1, wherein the application service security capability includes the capability of supporting application layer authentication and key management AKMA service;
    在所述根据所述第一信息,生成密钥之前,所述方法还包括:Before the generating a key according to the first information, the method further includes:
    请求统一数据管理实体UDM确认所述终端是否支持AKMA服务;Request the unified data management entity UDM to confirm whether the terminal supports the AKMA service;
    所述根据所述第一信息,生成密钥,包括:The generating a key according to the first information includes:
    在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。Upon receiving the first response, an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
  3. 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, wherein the method further comprises:
    预先存储终端的标识信息与终端是否支持AKMA服务的对应关系。The corresponding relationship between the identification information of the terminal and whether the terminal supports the AKMA service is pre-stored.
  4. 根据权利要求3所述的方法,其中,所述获取终端的第一信息,包括:The method according to claim 3, wherein said obtaining the first information of the terminal comprises:
    接收第二网元发送的认证请求消息,所述认证请求消息携带所述终端的签约永久标识SUPI,或者,所述认证请求消息携带所述终端的签约加密标识SUCI;Receiving an authentication request message sent by the second network element, the authentication request message carrying the terminal's subscription permanent identification SUPI, or the authentication request message carrying the terminal's subscription encryption identification SUCI;
    在所述认证请求消息携带所述SUPI的情况下,根据所述SUPI查询所述对应关系,获取所述第一信息;In the case where the authentication request message carries the SUPI, query the correspondence relationship according to the SUPI to obtain the first information;
    在所述认证请求消息携带所述SUCI的情况下,向UDM发送所述SUCI,并从所述UDM获得SUPI;根据从所述UDM获得的SUPI查询所述对应关系,获取所述第一信息。When the authentication request message carries the SUCI, send the SUCI to the UDM and obtain the SUPI from the UDM; query the correspondence relationship according to the SUPI obtained from the UDM to obtain the first information.
  5. 根据权利要求2所述的方法,其中,所述获取终端的第一信息,包括:The method according to claim 2, wherein said obtaining the first information of the terminal comprises:
    接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息。Receiving an authentication request message sent by a second network element, where the authentication request message carries the first information.
  6. 根据权利要求5所述的方法,其中,所述请求统一数据管理实体UDM确认所述终端是否支持AKMA服务,包括:The method according to claim 5, wherein the requesting the unified data management entity UDM to confirm whether the terminal supports the AKMA service comprises:
    向所述UDM发送第一指示信息,所述第一指示信息用于指示所述UDM确认所述终端是否支持AKMA服务;Sending first indication information to the UDM, where the first indication information is used to instruct the UDM to confirm whether the terminal supports the AKMA service;
    接收所述UDM发送的第一确认指示,所述第一确认指示用于指示所述终端是否支持AKMA服务。Receiving a first confirmation instruction sent by the UDM, where the first confirmation instruction is used to indicate whether the terminal supports the AKMA service.
  7. 根据权利要求6所述的方法,其中,在所述向所述UDM发送第一指示信息之前,所述方法还包括:The method according to claim 6, wherein, before the sending the first indication information to the UDM, the method further comprises:
    接收所述终端的第一请求,所述第一请求用于请求生成AKMA密钥;Receiving a first request from the terminal, where the first request is used to request the generation of an AKMA key;
    所述向所述UDM发送第一指示信息,包括:The sending first indication information to the UDM includes:
    根据所述第一请求,向所述UDM发送第一指示信息。According to the first request, first indication information is sent to the UDM.
  8. 根据权利要求1所述的方法,其中,所述获取终端的第一信息包括:The method according to claim 1, wherein said obtaining the first information of the terminal comprises:
    接收第二网元发送的认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括支持AKMA服务的能力,支持通用引导架构GBA服务的能力。An authentication request message sent by a second network element is received, the authentication request message carries the first information, and the application service security capability includes at least the capability of supporting the AKMA service and the capability of supporting the GBA service of the universal guidance architecture.
  9. 根据权利要求8所述的方法,其中,在所述根据所述第一信息,生成密钥之前,所述方法还包括:The method according to claim 8, wherein, before said generating a key according to said first information, said method further comprises:
    请求UDM确认所述终端所支持的目标应用服务安全能力。Request UDM to confirm the target application service security capabilities supported by the terminal.
  10. 根据权利要求9所述的方法,其中,所述根据所述第一信息,生成密钥,包括:The method according to claim 9, wherein said generating a key according to said first information comprises:
    如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,则生成AKMA密钥或者GBA密钥;If the target application service security capability is one of the capability to support the AKMA service or the capability to support the GBA service, an AKMA key or a GBA key is generated;
    如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,则根据预设策略生成密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the key is generated according to the preset policy.
  11. 根据权利要求10所述的方法,其中,所述方法还包括:The method according to claim 10, wherein the method further comprises:
    如果所述目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,向第三网元发送所述目标应用服务安全能力的信息;If the target application service security capability is one of the capability of supporting AKMA service or the capability of supporting GBA service, sending the information of the security capability of the target application service to a third network element;
    如果所述目标应用服务安全能力至少为支持AKMA服务的能力和支持GBA服务的能力,向第三网元发送所述预设策略以及根据所述预设策略生成的密钥。If the target application service security capability is at least the capability of supporting the AKMA service and the capability of supporting the GBA service, the preset policy and the key generated according to the preset policy are sent to a third network element.
  12. 根据权利要求1所述的方法,其中,所述获取终端的第一信息,包括:The method according to claim 1, wherein said obtaining the first information of the terminal comprises:
    接收UDM发送的指示信息,所述指示信息用于指示为所述终端选择AKMA服务;Receiving instruction information sent by UDM, where the instruction information is used to instruct to select an AKMA service for the terminal;
    所述根据所述第一信息,生成密钥,包括:The generating a key according to the first information includes:
    根据所述指示信息,生成密钥;Generate a key according to the instruction information;
    向所述UDM发送AKMA密钥推衍参数。Send the AKMA key derivation parameter to the UDM.
  13. 一种密钥生成方法,应用于第三网元,包括:A key generation method, applied to a third network element, includes:
    接收目标第四网元的密钥请求;Receive the key request of the target fourth network element;
    根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element. The fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application The service security capability is one or more of the application service security capabilities supported by the terminal;
    生成所述终端所支持的应用服务安全能力的密钥。Generate a key for the application service security capability supported by the terminal.
  14. 根据权利要求13所述的方法,其中,所述确定终端所支持的应用服务安全能力以及第四网元的信息,包括:The method according to claim 13, wherein said determining the application service security capabilities supported by the terminal and the information of the fourth network element comprises:
    请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;Request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element;
    所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
    如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  15. 根据权利要求13所述的方法,其中,所述生成所述终端所支持的应用服务安全能力的密钥,包括:The method according to claim 13, wherein said generating the key of the application service security capability supported by the terminal comprises:
    获取第一网元发送的所述终端所支持的第一应用服务安全能力;Acquiring the first application service security capability supported by the terminal and sent by the first network element;
    获取所述目标第四网元的标识;Acquiring the identifier of the target fourth network element;
    如果所述第一应用服务安全能力为支持AKMA服务的能力且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the first application service security capability is the capability to support AKMA services and it is determined according to the identification of the target fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF key is generated .
  16. 根据权利要求13所述的方法,其中,所述生成所述终端所支持的应用服务安全能力的密钥,包括:The method according to claim 13, wherein said generating the key of the application service security capability supported by the terminal comprises:
    获取第一网元发送的预设策略以及根据所述预设策略生成的密钥;Acquiring a preset policy sent by the first network element and a key generated according to the preset policy;
    获取所述第四网元的标识;Acquiring the identifier of the fourth network element;
    如果所述预设策略表示所述密钥是由于所述终端支持AKMA服务的能力而生成的,且根据所述目标第四网元的标识确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the preset policy indicates that the key is generated due to the ability of the terminal to support the AKMA service, and the identification of the target fourth network element determines the connection between the terminal and the target fourth network element When the AKMA service is turned on, the AF key is generated.
  17. 根据权利要求13所述的方法,其中,所述确定终端所支持的应用服务安全能力以及第四网元的信息,包括:The method according to claim 13, wherein said determining the application service security capabilities supported by the terminal and the information of the fourth network element comprises:
    接收UDM发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元;Receive the indication information sent by UDM and the identification of the fourth network element, where the indication information is used to indicate the capability of the terminal to support the AKMA service, and the fourth network element is the fourth network with the AKMA service enabled between the terminals Yuan;
    所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
    如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  18. 一种密钥生成方法,应用于第二网元,包括:A key generation method, applied to a second network element, includes:
    向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Send first information to the first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information.
  19. 根据权利要求18所述的方法,其中,所述向第一网元发送第一信息,包括:The method according to claim 18, wherein the sending the first information to the first network element comprises:
    向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息。Sending an authentication request message to the first network element, where the authentication request message carries the first information.
  20. 根据权利要求18所述的方法,其中,所述向第一网元发送第一信息,包括:The method according to claim 18, wherein the sending the first information to the first network element comprises:
    向所述第一网元发送认证请求消息,所述认证请求消息中携带所述第一信息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。Send an authentication request message to the first network element, where the authentication request message carries the first information, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  21. 一种密钥生成方法,应用于UDM,包括:A key generation method applied to UDM, including:
    存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安 全能力;Storing subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
    根据所述签约信息,确认所述终端支持的目标应用服务安全能力。According to the subscription information, the target application service security capability supported by the terminal is confirmed.
  22. 根据权利要求21所述的方法,其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:The method according to claim 21, wherein the confirming the target application service security capability supported by the terminal according to the subscription information comprises:
    接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持AKMA服务;Receiving a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
    根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the first request, a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  23. 根据权利要求22所述的方法,其中,所述接收第一网元的第一请求,包括:The method according to claim 22, wherein said receiving the first request of the first network element comprises:
    在主认证的过程之中,接收第一网元的第一请求;或者During the master authentication process, receive the first request of the first network element; or
    在主认证过程完成之后,接收第一网元的第一请求。After the master authentication process is completed, the first request of the first network element is received.
  24. 根据权利要求21所述的方法,其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:The method according to claim 21, wherein the confirming the target application service security capability supported by the terminal according to the subscription information comprises:
    接收第三网元的第二请求,所述第二请求用于确认所述终端是否支持AKMA服务;Receiving a second request from a third network element, where the second request is used to confirm whether the terminal supports the AKMA service;
    根据所述签约信息以及所述第二请求,向所述第三网元发送第二响应,所述第二响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the second request, a second response is sent to the third network element, where the second response is used to indicate whether the terminal supports the AKMA service.
  25. 根据权利要求21所述的方法,其中,所述根据所述签约信息,确认所述终端支持的目标应用服务安全能力,包括:The method according to claim 21, wherein the confirming the target application service security capability supported by the terminal according to the subscription information comprises:
    接收第一网元的第三请求;Receiving the third request of the first network element;
    根据所述签约信息以及所述第三请求,向所述第一网元发送第三响应,所述第三响应用于指示目标应用服务安全能力为支持AKMA服务的能力或者支持GBA服务的能力中的一种,或者,所述目标应用服务安全能力至少为AKMA支持服务的能力和支持GBA服务的能力。According to the subscription information and the third request, a third response is sent to the first network element, where the third response is used to indicate that the target application service security capability is the capability of supporting AKMA service or the capability of supporting GBA service. Or, the target application service security capability is at least the capability of AKMA to support services and the capability of supporting GBA services.
  26. 根据权利要求21所述的方法,其中,所述签约信息还包括:The method according to claim 21, wherein the subscription information further comprises:
    与所述终端之间开启了AKMA服务的第四网元的标识信息。The identification information of the fourth network element that has enabled the AKMA service with the terminal.
  27. 一种密钥生成方法,应用于第二网元,包括:A key generation method, applied to a second network element, includes:
    向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终 端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to UDM, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
    接收所述UDM发送的密钥推衍参数;Receiving the key derivation parameter sent by the UDM;
    向所述终端发送所述密钥推衍参数。Sending the key derivation parameter to the terminal.
  28. 根据权利要求27所述的方法,其中,所述指示信息用于指示所述终端支持AKMA服务的能力,所述第四网元为所述终端之间开启了AKMA服务的第四网元。The method according to claim 27, wherein the indication information is used to indicate the ability of the terminal to support the AKMA service, and the fourth network element is a fourth network element that has enabled the AKMA service between the terminals.
  29. 一种密钥生成方法,应用于UDM,包括:A key generation method applied to UDM, including:
    获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Acquiring subscription information of the terminal, where the subscription information includes application service security capabilities supported by the terminal;
    当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key. Application service security key.
  30. 根据权利要求29所述的方法,其中,所述获取终端的签约信息,包括:The method according to claim 29, wherein said acquiring the subscription information of the terminal comprises:
    接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Receive instruction information sent by the second network element and the identification of the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal and the identification information of the AF that enables the AKMA service with the terminal.
  31. 根据权利要求30所述的方法,其中,所述向第一网元发送第一指示之后,所述方法还包括:The method according to claim 30, wherein after the sending the first indication to the first network element, the method further comprises:
    接收所述第一网元发送的密钥推衍参数;Receiving the key derivation parameter sent by the first network element;
    向所述第二网元发送所述密钥推衍参数。Sending the key derivation parameter to the second network element.
  32. 根据权利要求29所述的方法,其中,所述方法还包括:The method of claim 29, wherein the method further comprises:
    向第四网元发送指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
    所述第四网元为所述终端之间开启了AKMA服务的第四网元。The fourth network element is the fourth network element that has enabled the AKMA service between the terminals.
  33. 一种密钥生成方法,应用于终端,包括:A key generation method, applied to a terminal, includes:
    向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Send first information to the second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
  34. 根据权利要求33所述的方法,其中,所述向第二网元发送第一信息, 包括:The method according to claim 33, wherein the sending the first information to the second network element comprises:
    向所述第二网元发送N1消息,所述第一信息表示所述终端支持AKMA服务。Sending an N1 message to the second network element, where the first information indicates that the terminal supports the AKMA service.
  35. 根据权利要求33所述的方法,其中,所述向第二网元发送第一信息,包括:The method according to claim 33, wherein said sending the first information to the second network element comprises:
    向所述第二网元发送N1消息,所述应用服务安全能力至少包括AKMA服务能力,GBA服务能力。The N1 message is sent to the second network element, and the application service security capability includes at least an AKMA service capability and a GBA service capability.
  36. 根据权利要求33所述的方法,其中,所述方法还包括:The method according to claim 33, wherein the method further comprises:
    接收所述第二网元发送的密钥推衍参数;Receiving the key derivation parameter sent by the second network element;
    根据所述密钥推衍参数生成AKMA密钥。The AKMA key is generated according to the key derivation parameter.
  37. 一种密钥生成装置,应用于第一网元,包括:A key generation device, applied to a first network element, includes:
    第一获取模块,用于获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;The first obtaining module is configured to obtain first information of the terminal, where the first information is used to indicate the application service security capabilities supported by the terminal;
    第一生成模块,用于根据所述第一信息,生成密钥。The first generating module is configured to generate a key according to the first information.
  38. 一种密钥生成装置,应用于第三网元,包括:A key generation device, applied to a third network element, includes:
    第一接收模块,用于接收目标第四网元的密钥请求;The first receiving module is configured to receive the key request of the target fourth network element;
    第一确定模块,用于根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;The first determining module is configured to determine, according to the key request, the application service security capability supported by the terminal and the information of the fourth network element, and the fourth network element is the fourth network element that enables the terminal to enable the target application service security capability Network element, the target application service security capability is one or more of the application service security capabilities supported by the terminal;
    第一生成模块,用于生成所述终端所支持的应用服务安全能力的密钥。The first generating module is used to generate the key of the application service security capability supported by the terminal.
  39. 一种密钥生成装置,应用于第二网元,包括:A key generation device, applied to a second network element, includes:
    第一发送模块,用于向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。The first sending module is configured to send first information to a first network element, where the first information represents an application service security capability supported by the terminal, and the first information is used to make the first network element according to the first information To generate a key.
  40. 一种密钥生成装置,应用于UDM,包括:A key generation device applied to UDM, including:
    第一存储模块,用于存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;The first storage module is configured to store subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
    第一确认模块,用于根据所述签约信息,确认所述终端支持的目标应用 服务安全能力。The first confirmation module is used to confirm the target application service security capability supported by the terminal according to the subscription information.
  41. 一种密钥生成装置,应用于第二网元,包括:A key generation device, applied to a second network element, includes:
    第一发送模块,用于向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;The first sending module is configured to send indication information and the identification of the fourth network element to the UDM, where the indication information is used to indicate the application service security capabilities supported by the terminal;
    第一接收模块,用于接收所述UDM发送的密钥推衍参数;The first receiving module is configured to receive the key derivation parameter sent by the UDM;
    第二发送模块,用于向所述终端发送所述密钥推衍参数。The second sending module is configured to send the key derivation parameter to the terminal.
  42. 一种密钥生成装置,应用于UDM,包括:A key generation device applied to UDM, including:
    第一获取模块,用于获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;The first obtaining module is configured to obtain contract information of the terminal, where the contract information includes the application service security capabilities supported by the terminal;
    第一发送模块,用于当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。The first sending module is configured to send a first instruction to the first network element when it is determined that the terminal is to derive the application service security key according to the subscription information, and the first instruction is used to instruct the first network Yuan derives the application service security key of the terminal.
  43. 一种密钥生成装置,应用于终端,包括:A key generation device, applied to a terminal, includes:
    第一发送模块,用于向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。The first sending module is configured to send first information to a second network element, where the first information is used to indicate an application service security capability supported by the terminal.
  44. 一种密钥生成设备,应用于第一网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device, applied to a first network element, includes: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor uses To read the program in the memory, perform the following process:
    获取终端的第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力;Acquiring first information of the terminal, where the first information is used to indicate an application service security capability supported by the terminal;
    根据所述第一信息,生成密钥。According to the first information, a key is generated.
  45. 根据权利要求44所述的设备,其中,所述应用服务安全能力包括支持AKMA服务的能力,所述处理器还用于读取存储器中的程序,执行下列过程:The device according to claim 44, wherein the application service security capability includes the capability to support AKMA service, and the processor is further configured to read a program in the memory and execute the following process:
    请求UDM确认所述终端是否支持AKMA服务;Request UDM to confirm whether the terminal supports AKMA service;
    在接收到第一响应时,生成AKMA密钥,所述第一响应表示所述UDM确认所述终端支持AKMA服务。Upon receiving the first response, an AKMA key is generated, the first response indicating that the UDM confirms that the terminal supports the AKMA service.
  46. 一种密钥生成设备,应用于第三网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处 理器,用于读取存储器中的程序,执行下列过程:A key generation device, applied to a third network element, includes: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor uses To read the program in the memory, perform the following process:
    接收目标第四网元的密钥请求;Receive the key request of the target fourth network element;
    根据所述密钥请求,确定终端所支持的应用服务安全能力以及第四网元的信息,所述第四网元为所述终端开启目标应用服务安全能力的第四网元,所述目标应用服务安全能力为所述终端所支持的应用服务安全能力中的一种或者多种;According to the key request, determine the application service security capability supported by the terminal and the information of the fourth network element. The fourth network element is the fourth network element that enables the target application service security capability of the terminal, and the target application The service security capability is one or more of the application service security capabilities supported by the terminal;
    生成所述终端所支持的应用服务安全能力的密钥。Generate a key for the application service security capability supported by the terminal.
  47. 根据权利要求46所述的设备,其中,所述处理器,用于读取存储器中的程序,执行下列过程:The device according to claim 46, wherein the processor is configured to read the program in the memory and execute the following process:
    请求UDM确认所述终端所支持的应用服务安全能力以及第四网元的信息;Request UDM to confirm the application service security capabilities supported by the terminal and the information of the fourth network element;
    所述生成所述终端所支持的应用服务安全能力的密钥,包括:The generating the key of the application service security capability supported by the terminal includes:
    如果所述终端所支持的应用服务安全能力为支持AKMA服务的能力且根据所述第四网元的信息确定所述终端与所述目标第四网元之间开启了AKMA服务,则生成AF密钥。If the application service security capability supported by the terminal is the capability to support the AKMA service and it is determined according to the information of the fourth network element that the AKMA service is enabled between the terminal and the target fourth network element, then an AF secret is generated key.
  48. 一种密钥生成设备,应用于第二网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device applied to a second network element, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor uses To read the program in the memory, perform the following process:
    向第一网元发送第一信息,所述第一信息表示终端所支持的应用服务安全能力,所述第一信息用于使得第一网元根据所述第一信息,生成密钥。Send first information to the first network element, where the first information indicates an application service security capability supported by the terminal, and the first information is used to enable the first network element to generate a key according to the first information.
  49. 一种密钥生成设备,应用于UDM,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor is used to read The program in the memory performs the following process:
    存储终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Storing the subscription information of the terminal, where the subscription information includes the application service security capabilities supported by the terminal;
    根据所述签约信息,确认所述终端支持的目标应用服务安全能力。According to the subscription information, the target application service security capability supported by the terminal is confirmed.
  50. 根据权利要求49所述的设备,其中,所述处理器,用于读取存储器中的程序,执行下列过程:The device according to claim 49, wherein the processor is configured to read the program in the memory and execute the following process:
    接收第一网元的第一请求,所述第一请求用于确认所述终端是否支持 AKMA服务;Receiving a first request from a first network element, where the first request is used to confirm whether the terminal supports the AKMA service;
    根据所述签约信息以及所述第一请求,向所述第一网元发送第一响应,所述第一响应用于指示所述终端是否支持AKMA服务。According to the subscription information and the first request, a first response is sent to the first network element, where the first response is used to indicate whether the terminal supports the AKMA service.
  51. 一种密钥生成设备,应用于第二网元,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device applied to a second network element, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor uses To read the program in the memory, perform the following process:
    向UDM发送指示信息以及第四网元的标识,所述指示信息用于指示终端所支持的应用服务安全能力;Sending instruction information and an identifier of the fourth network element to the UDM, where the instruction information is used to indicate the application service security capabilities supported by the terminal;
    接收所述UDM发送的密钥推衍参数;Receiving the key derivation parameter sent by the UDM;
    向所述终端发送所述密钥推衍参数。Sending the key derivation parameter to the terminal.
  52. 一种密钥生成设备,应用于UDM,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device applied to UDM, including: a transceiver, a memory, a processor, and a program stored on the memory and running on the processor; wherein, the processor is used to read The program in the memory performs the following process:
    获取终端的签约信息,所述签约信息包括所述终端所支持的应用服务安全能力;Acquiring subscription information of the terminal, where the subscription information includes application service security capabilities supported by the terminal;
    当根据所述签约信息确定为所述终端推衍应用服务安全密钥时,向第一网元发送第一指示,所述第一指示用于指示所述第一网元推衍所述终端的应用服务安全密钥。When it is determined according to the subscription information that the terminal derives the application service security key, a first instruction is sent to the first network element, and the first instruction is used to instruct the first network element to derive the terminal's security key. Application service security key.
  53. 根据权利要求52所述的设备,其中,所述处理器,用于读取存储器中的程序,执行下列过程:The device according to claim 52, wherein the processor is configured to read the program in the memory and execute the following process:
    接收第二网元发送的指示信息以及第四网元的标识,所述指示信息用于指示所述终端所支持的应用服务安全能力,以及与所述终端开启AKMA服务的AF的标识信息。Receive instruction information sent by the second network element and the identification of the fourth network element, where the instruction information is used to indicate the application service security capabilities supported by the terminal and the identification information of the AF that enables the AKMA service with the terminal.
  54. 一种密钥生成设备,应用于终端,包括:收发机、存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序;其中,所述处理器,用于读取存储器中的程序,执行下列过程:A key generation device applied to a terminal, including: a transceiver, a memory, a processor, and a program stored in the memory and running on the processor; wherein the processor is used to read The program in the memory performs the following process:
    向第二网元发送第一信息,所述第一信息用于表示所述终端所支持的应用服务安全能力。Send first information to the second network element, where the first information is used to indicate the application service security capabilities supported by the terminal.
  55. 一种计算机可读存储介质,用于存储计算机程序,其中,所述计算 机程序被处理器执行时实现如权利要求1至12中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求13至17中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求18至20中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求21至26中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求27至28中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求29至32中任一项所述的密钥生成方法中的步骤;或者,实现如权利要求33至36中任一项所述的密钥生成方法中的步骤。A computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the steps in the method for generating a key according to any one of claims 1 to 12; or The steps in the key generation method according to any one of claims 13 to 17; or, to implement the steps in the key generation method according to any one of claims 18 to 20; or, to implement the steps in the key generation method according to any one of claims 18 to 20; The steps in the key generation method according to any one of claims 21 to 26; or, the steps in the key generation method according to any one of claims 27 to 28 are implemented; or, the steps in the key generation method according to any one of claims 27 to 28; or, the steps are implemented as claimed in claim 29 The steps in the key generation method according to any one of claims 33 to 32; or the steps in the key generation method according to any one of claims 33 to 36 are implemented.
PCT/CN2021/070544 2020-03-31 2021-01-07 Key generation method and apparatus, and device and computer readable storage medium WO2021196818A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010249052.8A CN113543127B (en) 2020-03-31 2020-03-31 Key generation method, device, equipment and computer readable storage medium
CN202010249052.8 2020-03-31

Publications (1)

Publication Number Publication Date
WO2021196818A1 true WO2021196818A1 (en) 2021-10-07

Family

ID=77927630

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/070544 WO2021196818A1 (en) 2020-03-31 2021-01-07 Key generation method and apparatus, and device and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN113543127B (en)
WO (1) WO2021196818A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023138349A1 (en) * 2022-01-19 2023-07-27 华为技术有限公司 Verification method, communication apparatus, and communication system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024092443A1 (en) * 2022-10-31 2024-05-10 华为技术有限公司 Communication method and apparatus
CN116506842B (en) * 2023-06-30 2023-10-03 中国电信股份有限公司 Method, terminal, system and related equipment for reporting capability information of user identification card

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811441A (en) * 2011-06-02 2012-12-05 华为技术有限公司 Method and device for managing mobile IP secret key
CN105025478A (en) * 2014-04-30 2015-11-04 中兴通讯股份有限公司 D2D communication safe configuration method, and ProSe key management function entity, terminal and system
CN108810884A (en) * 2017-05-06 2018-11-13 华为技术有限公司 Cipher key configuration method, apparatus and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068148A (en) * 2007-04-19 2007-11-07 华为技术有限公司 Tactical and charge metering control method and device
CN107566115B (en) * 2016-07-01 2022-01-14 华为技术有限公司 Secret key configuration and security policy determination method and device
CN110536293A (en) * 2019-08-15 2019-12-03 中兴通讯股份有限公司 The methods, devices and systems of access closure access group

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811441A (en) * 2011-06-02 2012-12-05 华为技术有限公司 Method and device for managing mobile IP secret key
CN105025478A (en) * 2014-04-30 2015-11-04 中兴通讯股份有限公司 D2D communication safe configuration method, and ProSe key management function entity, terminal and system
CN108810884A (en) * 2017-05-06 2018-11-13 华为技术有限公司 Cipher key configuration method, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Study on authentication and key management for applications based on 3GPP credential in 5G(Release 16), 3GPP TR 33.835 V2.0.0 (2019-12)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.835, vol. SA WG3, no. V2.0.0, 4 December 2019 (2019-12-04), pages 1 - 83, XP051840699 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023138349A1 (en) * 2022-01-19 2023-07-27 华为技术有限公司 Verification method, communication apparatus, and communication system

Also Published As

Publication number Publication date
CN113543127B (en) 2023-02-17
CN113543127A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
WO2021196818A1 (en) Key generation method and apparatus, and device and computer readable storage medium
US11310266B2 (en) Mobile communication method, apparatus, and device
CA2517800C (en) User plane-based location services (lcs) system, method and apparatus
JP6185017B2 (en) Authentication in Secure User Plane Location (SUPL) system
US11582602B2 (en) Key obtaining method and device, and communications system
CN101983517B (en) Security for a non-3gpp access to an evolved packet system
US9113332B2 (en) Method and device for managing authentication of a user
CN113541925B (en) Communication system, method and device
WO2020088026A1 (en) Authentication method employing general bootstrapping architecture (gba) and related apparatus
US20230422032A1 (en) Session request method and apparatus, terminal, and storage medium
US20230024999A1 (en) Communication system, method, and apparatus
EP4271015A1 (en) Registration method and apparatus, authentication method and apparatus, routing indicator determining method and apparatus, entity, and terminal
CN117041955A (en) Subscription data updating method, device, node and storage medium
US20230232228A1 (en) Method and apparatus for establishing secure communication
CN113498060A (en) Method, device, equipment and storage medium for controlling network slice authentication
US11134384B2 (en) Access point AP authentication method, system, and related device
WO2023216274A1 (en) Key management method and apparatus, device, and storage medium
WO2023109865A1 (en) Key generation method and apparatus, device, and readable storage medium
WO2024067993A1 (en) Pdu session modification for a subscriber entity
JP2023516782A (en) Access control method and communication equipment
CN114158028A (en) Data network authentication mode adapting method, device and readable storage medium
CN116782214A (en) Authentication method and related equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21780342

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21780342

Country of ref document: EP

Kind code of ref document: A1