WO2021238280A1 - Communication method, apparatus and system - Google Patents

Communication method, apparatus and system Download PDF

Info

Publication number
WO2021238280A1
WO2021238280A1 PCT/CN2021/073668 CN2021073668W WO2021238280A1 WO 2021238280 A1 WO2021238280 A1 WO 2021238280A1 CN 2021073668 W CN2021073668 W CN 2021073668W WO 2021238280 A1 WO2021238280 A1 WO 2021238280A1
Authority
WO
WIPO (PCT)
Prior art keywords
amf
key
terminal device
abba
old
Prior art date
Application number
PCT/CN2021/073668
Other languages
French (fr)
Chinese (zh)
Inventor
邓娟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021238280A1 publication Critical patent/WO2021238280A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a communication method, device, and system.
  • the security features supported by terminal devices and network functions are constantly evolving.
  • the high-end version of the terminal device will also support the new and low-level version of the terminal device that does not support the security features.
  • the high-level version of the network function will also support the new and low-level version of the network function that does not support the security features.
  • the high-level version of the terminal device supports both 256-bit key encryption and 128-bit key encryption
  • the low-level version of the network function only supports 128-bit key encryption, so the communication between the terminal device and the network function is only A 128-bit key supported by both parties can be used for encryption.
  • the third generation partnership protection (3GPP) standard 33.501 which is the 5G system security architecture and process, defines the security requirements of the 5G system in version 15 (release 15, Rel-15), including Preventing dimensionality reduction attacks (bidding down attacks), also known as anti-dimensionality reduction attacks.
  • a dimensionality reduction attack means that an attacker makes the terminal device or network function each think that the opposite end does not support the security features of the high-end version, but in fact both the terminal device and network function support the security features of the high-end version. After the attack is successful, the terminal device and the network function can only communicate with the low-level version of the security features, which leads to the reduction of the security features and degrades the communication security between the terminal device and the network function.
  • the network function of the serving terminal device changes, for example, the first access and mobile management function (Access and Mobile Management Function, AMF) function is changed to the second AMF function. Since the security features supported by the first AMF function and the second AMF function may be different, how to update the AMF key at this time is a problem to be solved currently.
  • AMF Access and Mobile Management Function
  • the embodiments of the present application provide a communication method, device, and system to realize the update of the access and mobility management function AMF key.
  • a communication method is provided.
  • the first AMF in the method may also be a component (such as a chip, a circuit, or others) configured in the first AMF.
  • the method includes: the first AMF determines the terminal device The first AMF determines the anti-dimensionality reduction ABBA parameters between the first architectures according to the security characteristics of the terminal device and the security characteristics of the first AMF; the first AMF obtains the key of the second AMF; the first AMF Determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  • the first AMF may be a Target AMF
  • the second AMF may be an Old AMF
  • the terminal device may be a UE.
  • the Target AMF can generate the ABBA_New parameter according to the security features supported between the UE and the Target AMF, and use ABBA_New as the input parameter to generate a new K AMF key, It is used by UE and Target AMF to ensure the safety of communication between UE and Target AMF.
  • the first AMF determining the security feature of the terminal device includes: the first AMF sends a request message for requesting the context of the terminal device to the second AMF; the first AMF receives In the terminal device context sent by the second AMF, the terminal device context carries the security feature of the terminal device.
  • the first AMF can negotiate security features with the second AMF and the terminal device to resist dimensionality reduction attacks.
  • obtaining the key of the second AMF by the first AMF includes: the first AMF sends a request message for requesting the context of the terminal device to the second AMF; the first AMF receives the key sent by the second AMF The terminal device context, the terminal device context carries the key of the second AMF.
  • the method before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the method further includes: the first AMF The security feature of the second AMF is determined; the first AMF determines that the security feature of the first AMF is different from the security feature of the second AMF.
  • the AMF key is updated, otherwise the AMF key is no longer updated, so as to avoid the overhead waste of updating the AMF key .
  • the method further includes: the first AMF Send the first ABBA parameter and first indication information to the terminal device, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
  • the foregoing first indication information is optional. That is, the first AMF may only send the first ABBA parameter to the terminal device.
  • the terminal device can update the AMF key according to the first ABBA parameter. Furthermore, according to the AMF key, the communication between the two is protected to resist dimensionality reduction attacks.
  • a communication method is provided.
  • the terminal device in the method may also be a component in the terminal device (for example, a chip, a circuit, or other components).
  • the method includes: the terminal device receives the first AMF sent by the first AMF.
  • ABBA parameters and optional first indication information where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; the terminal device according to the first ABBA parameter and the second
  • the key of the AMF determines the key of the first AMF.
  • the terminal device when the registered AMF of the terminal device is changed, or the AMF serving the terminal device is changed, the terminal device can update the AMF key according to the security characteristics of the changed AMF to meet the communication requirements and resist degradation. Dimensional attack.
  • the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
  • the method further includes: the terminal device sends a registration request to the first AMF, and the registration request carries the security feature of the terminal device or the second ABBA parameter.
  • both the first AMF and the second AMF can be components of the AMF (for example, a chip, a circuit, or other components), including: the second AMF communicates with the first AMF The security feature of the terminal device and the key of the second AMF are sent.
  • the second ABBA parameter includes the security feature of the terminal device and the security feature of the second AMF; the first AMF is based on the The security feature of the terminal device and the security feature of the first AMF determine the first ABBA parameter; the first AMF determines the first AMF parameter according to the first ABBA parameter and the key of the second AMF Key.
  • the second AMF sending the security feature of the terminal device and the key of the second AMF to the first AMF includes: sending the first AMF to the second AMF for A request message for requesting a terminal device context; the second AMF sends a terminal device context to the first AMF, and the terminal device context carries the security feature of the terminal device and the key of the second AMF.
  • the method before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the key of the first AMF, the method further includes: the first AMF The security feature of the second AMF is determined; the first AMF determines that the security features of the first AMF and the second AMF are different.
  • a device is provided.
  • the communication device has the function of realizing the behavior in the method embodiment of the first aspect described above.
  • the functions can be implemented by corresponding hardware or software.
  • the piece or software includes one or more units corresponding to the above-mentioned functions.
  • a device in the fifth aspect, and the beneficial effects can be referred to the description of the second aspect.
  • the communication device has the function of realizing the behavior in the method embodiment of the second aspect described above.
  • the functions can be implemented by corresponding hardware or software.
  • the piece or software includes one or more units corresponding to the above-mentioned functions.
  • a device in a sixth aspect, is provided, and the device may be the first AMF in the foregoing method embodiment, or a chip set in the first AMF.
  • the device includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store a computer program or instruction
  • the processor is coupled with the memory and a communication interface.
  • the communication device executes the method executed by the first AMF in the above aspects.
  • a device in a seventh aspect, is provided, and the device may be the terminal device in the foregoing method embodiment, or a chip set in the terminal device.
  • the device includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store a computer program or instruction
  • the processor is coupled with the memory and a communication interface.
  • the communication device executes the method executed by the terminal device in the foregoing aspects.
  • a computer program product comprising: computer program code, when the computer program code is running, causes the method executed by the first AMF or the terminal device in the above aspects to be executed .
  • the present application provides a chip system, which includes a processor, configured to implement the functions of the first AMF or terminal device in the methods of the foregoing aspects.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • the present application provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method executed by the first AMF or the terminal device in the above aspects is implemented .
  • this application provides a system including at least one of the first AMF, the second AMF, or the terminal device described in the foregoing aspects.
  • FIG. 1 is a flowchart of using ABBA to resist dimensionality reduction attacks according to an embodiment of this application;
  • FIG. 2a is a flowchart of the security processing of the UE moving in an idle state according to an embodiment of this application;
  • FIG. 3 is a flowchart of the security processing of N2 handover provided by an embodiment of this application.
  • FIG. 4 is a flowchart of the security processing of the N2 handover of the UE from EPS handover to 5GS provided by an embodiment of the application;
  • FIG. 5 is a flowchart of the security processing of UE moving from EPS idle state to 5GS according to an embodiment of this application;
  • FIG. 6 is a schematic diagram of a network architecture provided by an embodiment of this application.
  • FIGS 7a and 7b are flowcharts of communication methods provided by embodiments of this application.
  • FIG. 8a is a flowchart of a communication method provided in Embodiment 1 of this application.
  • FIG. 8b is a flowchart of the security feature negotiation and key update process in the idle state mobile registration of the UE in 5GS according to an embodiment of the application;
  • FIG. 9 is a flowchart of the security feature negotiation and key update of the UE in the N2 handover provided by the embodiment of this application.
  • FIG. 10 is a flowchart of security feature negotiation and key update in UE handover from EPS to 5GS according to an embodiment of this application;
  • FIG. 11 is a flowchart of security feature negotiation and key update of UE moving from EPS to 5GS in idle state according to an embodiment of this application;
  • FIG. 12 is a flowchart of the communication method provided in the second embodiment of this application.
  • FIG. 13 is a flowchart of a UE moving from Old AMF to Target AMF in an idle state in 5GS according to an embodiment of the application;
  • FIG. 14 is a flowchart of the communication method provided in the third embodiment of this application.
  • FIG. 15 is a flowchart of a UE moving in an idle state of 5G according to an embodiment of this application.
  • FIG. 16 is a flowchart of the communication method provided by the fourth embodiment of this application.
  • FIG. 17 is a flowchart of a UE moving in an idle state of 5G according to an embodiment of this application.
  • FIG. 20 is a flowchart of a communication method provided by an embodiment of this application.
  • FIG. 21 is a flowchart of UE mobile registration in 5GS idle state according to an embodiment of the application.
  • FIG. 22 is a flowchart of a UE's N2 handover process provided by an embodiment of this application.
  • FIG. 23 and FIG. 24 are a flowchart of the communication method provided in the seventh embodiment of this application.
  • FIG. 25 is a flowchart of the N2 handover of the UE according to an embodiment of this application.
  • FIG. 26 is a schematic diagram of a communication device provided by an embodiment of this application.
  • FIG. 27 is another schematic diagram of a communication device provided by an embodiment of this application.
  • ABSBA Anti-bidding down between architectures
  • Rel-15 release 15, Rel-15 of 3GPP standard 33.501 is the first version of 5G communication system architecture and process security. With the continuous evolution of 5G communication system architecture and process security, it will evolve to a high-end version in the future. For example, version 16 (release 16, Rel-16) and version 17 (release 17, Rel-17), etc.
  • the ABBA parameters are defined in version 15 of 33.501. ABBA parameters can include:
  • 16 bits in the ABBA parameter can be used to indicate the security features supported by the UE, and 16 bits indicate the security features supported or selected by the network device.
  • the ABBA set on the network side is called ABBA_Old.
  • the ABBA_Old may include the security features supported or selected by Old AMF and the security features supported by the UE.
  • the ABBA set on the network side is called ABBA_New.
  • the ABBA_New may include the security features supported or selected by the Target AMF and the security features supported by the UE.
  • Old AMF is the AMF that serves the UE before the UE moves in the idle state or before the N2 handover
  • Target AMF is the AMF that serves the UE after the UE moves in the idle state or after the N2 handover; that is, the AMF that serves the UE changes , Change from Old AMF to Target AMF.
  • Target AMF also serves the AMF of the UE after the UE moves from the EPS idle state to 5GS or after switching from the EPS to 5GS.
  • Rel-15 was released due to the current standard 33.501. Therefore, in the 5G communication system, both the UE and network functions support the Rel-15 version. In the future 5G communication system, multiple versions may coexist. For example, some UEs support Rel-15, and some UEs support post Rel-15 (that is, versions after Rel-15). Some base stations support Rel-15, and some base stations support post Rel-15. In the future 5G communication system, before the UE is registered, neither the UE nor the network device knows the version of the other party, that is, they do not know the security features supported by the other party. Therefore, the security feature needs to be negotiated between the UE and the network equipment. In the embodiments of the present application, Rel-16, Rel-17, etc., are collectively referred to as post Rel-15.
  • a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • words such as “first” and “second” are used to distinguish the same items or similar items with substantially the same function and effect. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the quantity and order of execution, and the words “first” and “second” do not limit the difference.
  • Figure 1 shows the specific process of using ABBA to resist dimensionality reduction attacks in standard 33.501, including:
  • Step 101 The UE sends a registration request (registration request, RR) message to the AMF, where the RR message carries security features supported by the UE.
  • the RR message may be unprotected, so the attacker may tamper with the security features supported by the UE, so that the network side thinks that the UE supports low-version security features, causing a dimensionality reduction attack.
  • Step 102 SEAF (Security Anchor Function) decides to initiate a master authentication.
  • AMF and SEAF are co-located, which can be regarded as a network function (network fuction, NF).
  • Step 103 The SEAF sends an authentication service request to an authentication service function (AUthentication Server Function, AUSF).
  • the authentication service request may be Nausf_UEAuthentication_Authenticate Request.
  • AUSF returns an authentication service response to SEAF.
  • the authentication service response may be Nausf_UEAuthentication_AuthenticateResponse.
  • the SEAF may set the inter-architecture anti-bidding down between architectures (ABBA) parameters according to the security features supported by the UE and the security features supported or selected by the AMF sent in step 101.
  • ABBA architecture anti-bidding down between architectures
  • Step 105 The SEAF sends an authentication request to the UE through the AMF.
  • the authentication request may be an authentication request.
  • the authentication request includes ABBA parameters.
  • the UE After the UE receives the authentication request in step 105, it can obtain ABBA parameters. According to ABBA parameters, the security features supported or selected by AMF can be determined. However, since the authentication request in step 105 is not protected, the attacker may still tamper with the ABBA parameters. Therefore, a follow-up authentication process is required to check whether the ABBA parameters have been tampered with.
  • Step 106 The UE returns an authentication response to the SEAF through AMF.
  • the authentication response may be authentication response.
  • Step 107 SEAF sends an authentication service request to AUSF.
  • the authentication service request may be Nausf_UEAuthentication_Authenticate request.
  • Step 108 AUSF returns an authentication service response to SEAF.
  • the authentication service response may be Nausf_UE Authentication_Authenticage response.
  • the authentication service response may include the SEAF key, that is, K SEAF .
  • the SEAF may generate K AMF according to the ABBA parameters set in the above step 104 and the K SEAF carried in the above step 108. And SEAF sends K AMF to AMF.
  • the AMF generates a non-access-stratum (non-access-stratum, NAS) integrity key K NASint and a NAS encryption key K NASenc according to the received K AMF .
  • NAS non-access-stratum
  • the AMF sends a NAS security mode command (SMC) to the UE.
  • SMC NAS security mode command
  • the NAS SMC carries the ABBA parameter, and the NAS SMC uses K NASint for integrity protection.
  • Step 1012 since the above-mentioned NAS SMC only performs integrity protection, it does not perform encryption protection. Therefore, it can be considered that the above ABBA parameters are transmitted in plain text.
  • the UE After receiving the NAS SMC, the UE can obtain ABBA parameters.
  • the UE can generate the K AMF key according to the above ABBA and K SEAF. Further, according to the K AMF key, K NASint and K NASenc are generated. And use K NASint to verify the integrity of the above-mentioned NAS SMC. If the verification is successful, the ABBA has not been tampered with.
  • the UE can determine that the security features supported by the UE sent by the UE to the network side have not been tampered with; the security features supported or selected by the network side sent by the network side to the UE have not been tampered with either.
  • the method may further include: UE generating K SEAF .
  • the UE can generate the K SEAF at any time after the UE receives the authentication request (that is, step 105).
  • Step 1013 After successfully verifying the NAS SMC, the UE may send a NAS security mode complete (SMP) message to the AMF.
  • SMP NAS security mode complete
  • the above-mentioned NAS SMP message is encrypted by K NASenc , and K NASint is used for integrity protection.
  • the AMF after the AMF receives the NAS SMP, it can use K NASint to verify the integrity of the NAS SMF, and use K NASenc to decrypt the NAS SMP.
  • the order of the two is not limited. If the verification is successful, the network side can confirm that the security features supported by the UE received by the network side have not been tampered with, and the ABBA parameters received by the UE have not been tampered with.
  • step 1013 can be replaced by: the UE sends a NAS security mode rejection message to the AMF. After the AMF receives the NAS security mode rejection message, the AMF terminates the registration process.
  • the UE and the network side have negotiated security features, and use ABBA as one of the parameters to generate the K AMF key, and further generate the NAS integrity key and the encryption key according to the K AMF key. If a dimensionality reduction attack occurs (the security feature sent by the UE and/or the network device is tampered with), the UE and the network device can detect the tampering and terminate the process.
  • the UE and the SEAF respectively generate the K AMF key according to the ABBA parameters. Further, according to the K AMF key, a NAS integrity key and an encryption key are generated. After that, the UE uses the NAS integrity key to verify the NAS SMC. If the verification is successful, the UE can determine that the security features supported by the UE sent by the UE to the network side have not been tampered with. The security features supported or selected by the network side sent to the UE by the network side have not been tampered with either. SEAF can use the integrity key and/or encryption key to verify the NAS SMP.
  • the SEAF can determine that the security features supported by the network side sent by the network side to the UE have not been tampered with, and the security features supported by the UE sent by the UE to the network side have not been tampered with either.
  • an AMF change for example, the UE moves in an idle state
  • the AMF serving the UE changes from the old AMF (Old AMF) to the target AMF (Target AMF), or N2 handover occurs
  • the UE serving the UE AMF changes from Old AMF to Target AMF, and there may be differences between the security features of Old AMF and Target AMF.
  • K AMF key is a problem to be solved in the embodiment of this application.
  • Figure 2a shows the specific flow of the security processing of the UE's 5GS idle state mobility defined in the standard 33.501, and the flow includes:
  • Step 201 The UE registers with Old AMF. Among them, a security context is established between the Old AMF and the UE. Old AMF can assign a 5G global unique temporary UE identity (5G-GUTI) to the UE.
  • 5G-GUTI 5G global unique temporary UE identity
  • step 202 the UE moves in an idle state. For example, the UE moves to the registration area (reregistration area, RA) of Target AMF.
  • the registration area registration area, RA
  • Step 203 The UE sends a registration request (registration request, RR) message to the Target AMF, and the RR message may carry the 5G-GUTI of the UE.
  • registration request registration request, RR
  • RR registration request
  • Step 204 If there is a 5G-GUTI in the RR, the Target AMF determines the Old AMF according to the 5G-GUTI, and requests the UE's security context from the Old AMF. For example, the Target AMF may send the UE's Security Context Transfer Request (Namf_communication_UEContextTransfer Request) message to the Old AMF.
  • the Target AMF may send the UE's Security Context Transfer Request (Namf_communication_UEContextTransfer Request) message to the Old AMF.
  • Step 205 The Old AMF sends the security context of the UE to the target AMF, and the security context of the UE includes the AMF key, that is, K AMF .
  • the Old AMF may send a UE context transfer response (Namf_Communication_UEContextTransfer Response) message to the Target AMF, and the UE context transfer response message may carry the security context of the UE.
  • UE context transfer response Namf_Communication_UEContextTransfer Response
  • Target AMF can choose to use the received UE’s security context according to the local policy, that is, use the received AMF key (ie K AMF ), and generate NAS encryption and integrity keys based on the received AMF key. , To protect the communication between the UE and the target AMF. Alternatively, Target AMF may choose not to use the received security context according to local policies and initiate the authentication process.
  • the received AMF key ie K AMF
  • Target AMF may choose not to use the received security context according to local policies and initiate the authentication process.
  • the security features used by the UE and the Old AMF can only be Rel-15.
  • the ABBA parameters include: UE security features (post Rel-15 security features), Old AMF security features (rel-15 security features).
  • the UE moves in an idle state and is registered with Target AMF.
  • the UE and Target AMF support the security features of post Rel-15 at the same time. According to the existing process, if the Target AMF decides to use the security context sent by the Old AMF, the Target AMF will not negotiate the security features with the UE.
  • Target AMF and UE do not know the security features supported by each other.
  • the UE and Target AMF use the security features of Rel-15.
  • the UE and Target AMF support the post Rel-15 feature at the same time, so that security feature reduction occurs.
  • the ABBA at this time should also be updated to include: the security features supported by the UE (the security features of post Rel-15) and the security features supported by the Target AMF (the security features of Post Rel-15). Further, it is necessary to use the updated ABBA (called ABBA_new) as a new parameter to generate the K AMF key. However, in the above process of Figure 2a, when Target AMF decides to use the security context sent by Old AMF, the AMF key in it is still generated by ABBA_Old.
  • the Old AMF and the UE use the post Rel-15 security feature.
  • the Target AMF and the UE do not know the security features supported by each other.
  • the UE still uses the security features of post Rel-15, and Target AMF does not support the security features of post Rel-15, which will cause the communication between the UE and the Target AMF to fail.
  • Figure 3 shows the specific flow of the security processing of N2 handover defined in the standard 33.501, which includes:
  • step 301 the UE registers with the Old AMF, and a security context is established between the UE and the Old AMF.
  • Step 302 Old AMF initiates N2 handover.
  • Step 303 The Old AMF sends a context creation request to the Target AMF.
  • the context creation request carries the UE security context, and the UE security context includes the AMF key.
  • the context creation request may be Namf_Communication_CreateUEContext Request.
  • Step 304 other processes in N2 handover.
  • Step 305 The UE initiates a registration request. For example, the UE may send an RR message to Target AMF.
  • Target AMF can choose to use the received UE security context according to the current policy; or, according to the local policy, it can also choose not to use the received UE security context and initiate an authentication process.
  • the UE and Target AMF support the post Rel-15 security feature, and the Old AMF supports the Rel-15 security feature.
  • the Target AMF and the UE do not know the security features supported by the other party, which may lead to a reduction in the security features. It is also necessary to solve the technical problem of scenario 1 above.
  • UE and Old AMF support post Rel-15 security feature
  • Target AMF supports Rel-15 security feature.
  • UE switches from Old AMF to Target AMF Target AMF does not negotiate security features with UE, Target AMF and UE do not know the security features supported by each other, UE uses Post Rel-15 security features, Target AMF uses Rel-15 security features , Causing the communication between the UE and the Target AMF to fail. It is also necessary to solve the technical problems in Scenario 2 above.
  • Figure 4 shows the security processing flow of the N26 handover of UE from an evolved packet system (evolved packet system, EPS) (ie 4G system) to a 5G system (5G system, 5GS) defined in the standard 33.501, which includes:
  • EPS evolved packet system
  • 5G system, 5GS 5G system
  • Step 400 The UE registers with a mobility management entity (MME).
  • MME mobility management entity
  • Step 401 MME decides to initiate N26 handover.
  • Step 402 The MME sends a forwarding relocation request to the Target AMF.
  • the forwarding relocation request may be Forward Relocation Request.
  • the forwarding relocation request includes the EPS security context of the UE, and the EPS security context of the UE includes the MME key K ASME .
  • Step 403 Target AMF creates a 5G security context according to the received EPS security context of the UE.
  • the AMF key in the 5G security context namely K AMF, is generated according to the key K ASME.
  • Target AMF can generate a NAS encryption key and an integrity key according to the generated AMF key K AMF and the selected 5G security algorithm.
  • Step 404 The Target AMF sends a forwarding relocation response to the MME.
  • the forwarding relocation response may be Forward Relocation Response.
  • the forwarding relocation response includes a NAS container (NASC).
  • the NASC includes the security parameters required to create a 5G security context, such as 5G security algorithms.
  • Step 405 The MME sends a handover command to the UE, and the handover command carries NASC.
  • Step 406 The UE creates a 5G security context according to the received security parameters included in the NASC and the EPS security context of the UE.
  • Step 407 The UE sends a registration request RR message to the Target AMF.
  • the Target AMF receives the registration request RR message, it can choose not to perform the primary authentication or perform the primary authentication according to the local policy.
  • a dimensionality reduction attack may occur. Because both the Target AMF and the UE create a 5G security context based on the EPS security context of the UE, the UE and the Target AMF do not negotiate security features. The UE and the Target AMF do not know the security capabilities supported by the other party, and both the UE and the Target AMF adopt the security capabilities of Rel-15. In fact, both UE and Target AMF may support post Rel-15 security features. In addition, the ABBA_New parameter is not used in the AMF keys used by the UE and Target AMF. The issues that need to be resolved include the following:
  • Figure 5 shows the specific flow of the security processing of UE moving from EPS idle state to 5GS defined in the standard 33.501.
  • the flow includes:
  • step 500 the UE registers with the MME.
  • step 501 the UE moves to 5GS in the idle state.
  • Step 502 The UE sends an RR message to Target AMF.
  • the RR message may include 5G-GUTI.
  • Step 503 After the Target AMF receives the RR message sent by the UE, it sends a context request to the MME that previously served the UE.
  • the context request may be Context Request.
  • Step 504 The MME sends a context response to the Target AMF.
  • the context response may be Context Response.
  • the context response includes the EPS security context of the UE.
  • the EPS security context of the UE includes the key K ASME of the MME.
  • Step 505 Target AMF creates a 5G security context according to the received EPS security context of the UE.
  • the 5G security context includes the AMF key K AMF derived from the above K ASME .
  • Step 506 if the Target AMF receives the 5G-GUTI in the RR message. Then the Target AMF can find the Old AMF to which the 5G-GUTI is allocated according to the received 5G-GUTI. And send a UE context request message to Old AMF.
  • the UE context request message may be Namf_Communication_UEContextTransfer Request.
  • Step 507 The Old AMF finds the 5G security context of the UE according to the 5G-GUTI, and returns it to the Target AMF.
  • the Old AMF may send a UE context response to the Target AMF, and the UE context response includes the 5G security context.
  • the UE context response may be Namf_Communication_UEContextTransfer Response.
  • Target AMF receives the 5G security context from the Old AMF
  • the Target AMF discards the 5G security context generated according to the EPS security context in step 505, and instead uses the 5G security context received from the Old AMF.
  • the Target AMF may choose to use the 5G security context generated in step 505 according to the local policy, or initiate a master authentication to generate a new 5G security context.
  • Step 509 The Target AMF sends a NAS SMC to the UE, which is used to negotiate the security context to be used and establish a security association with the UE.
  • Step 510 The UE replies to the NAS SMP to the Target AMF. The establishment of the security association between the UE and the Target AMF is complete.
  • the security context used by the Target AMF and UE to communicate can have any of the following situations:
  • Target AMF generates a 5G security context (called a mapped 5G security context, that is, a mapped 5G security context) based on the EPS security context obtained from the MME;
  • Target AMF obtains 5G security context from Old AMF.
  • Target AMF and UE perform master authentication to generate a new 5G security context.
  • the UE and the Target AMF do not know the security features of each other, and Rel-15 is used by default. In fact, both the UE and Target AMF may support the Post Rel-15 security feature, so dimensionality reduction attacks have occurred.
  • the UE and Target AMF are based on the key obtained from the MME or Old AMF and do not use the ABBA_New parameter.
  • the problems that need to be resolved include:
  • the ABBA_New parameter is generated. And use the ABBA_New parameter as the input parameter to generate a new key.
  • Target AMF determines the security features of the UE; Target AMF determines the security features of the UE in any of the following ways: Target AMF can communicate with the UE The security feature of the UE is negotiated to obtain the security feature of the UE; or the Target AMF can obtain the security feature of the UE from the Old AMF; or the Target AMF is obtained according to the local storage and configuration.
  • Target AMF determines the ABBA_New parameter according to the security features of the UE and Target AMF.
  • Target AMF uses ABBA_New to derive a new AMF key; specifically, Target AMF obtains the AMF key used by Old AMF, and generates a new AMF key based on the AMF key of Old AMF and ABBA_New.
  • the communication method of the embodiment of the present application can be applied to a network architecture.
  • a schematic diagram of the network architecture is provided, including the access network and the core network.
  • the access network is used to implement functions related to wireless access
  • the access network device is a device that provides access for terminal devices.
  • Access network equipment includes radio access network (RAN) equipment and/or access network (access network, AN) equipment.
  • the RAN device may be an access network device defined in the 3rd generation partnership project (3GPP).
  • the AN device may be an access network device defined by non-3GPP (non-3GPP).
  • the RAN equipment is mainly responsible for radio resource management, quality of service (QoS) management, data compression, and security processing on the air interface side.
  • the RAN equipment may include various forms of base stations. For example, a macro base station, a micro base station (small station), a relay station, or an access point, etc.
  • RAN equipment includes, but is not limited to: next-generation base stations (gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (RNC), node B (node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (BBU) , Transmitting and receiving point (TRP), transmitting point (TP), mobile switching center, etc.
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-generation base stations
  • gNB next-
  • the RAN device may also be a wireless controller, a centralized unit (CU), and/or a distributed unit (DU) in a cloud radio access network (cloud radio access network, CRAN) scenario, or the RAN device may It is relay station, access point, in-vehicle equipment, terminal equipment, wearable equipment, and access network equipment in the future 6G network or access network equipment in the public land mobile network (PLMN) network that will evolve in the future Wait.
  • PLMN public land mobile network
  • AN equipment is used to enable non-3GPP technology to be used for interconnection and intercommunication between terminal equipment and the 3GPP core network.
  • the non-3GPP technologies include but are not limited to: wireless fidelity (WIFI), worldwide interoperability for microwave access (WiMAX), code division multiple access (CDMA) network technologies, etc. .
  • the core network equipment may include one or more of the following network elements: access and mobility management function (AMF) network elements, session management function (session management function, SMF network elements) network elements, User plane function (UPF network element) network element, policy control function (PCF) network element, application function (AF) network element, unified data management (UDM) network Element, authentication server function (authentication server function, AUSF) network element, network slice selection function (network slice selection function, NSSF) network element.
  • AMF access and mobility management function
  • SMF Session management function
  • UPF User plane function
  • PCF policy control function
  • AF application function
  • UDM unified data management
  • authentication server function authentication server function
  • AUSF authentication server function
  • NSSF network slice selection function
  • AMF network element Mainly responsible for the mobility management in the mobile network, such as user location update, user registration network, user handover, etc.
  • SMF network element Mainly responsible for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning IP addresses to users and selecting UPF network elements that provide message forwarding functions.
  • UPF network element Mainly responsible for the forwarding and receiving of user data.
  • the UPF network element can receive user data from the data network (DN) and transmit it to the terminal device through the access network device; in the uplink transmission, the UPF network element can receive the user data from the terminal device through the access network device User data, forward the user data to the DN.
  • DN data network
  • the transmission resources and scheduling functions in the UPF network element that provide services for the terminal device can be managed and controlled by the SMF network element.
  • PCF network element It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for obtaining user subscription information related to policy decisions.
  • AF network element It mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing third-party services to the network side.
  • UDM network elements are mainly used to generate authentication credential, user identification processing (such as storage and management of user permanent identities, etc.), access authorization control and contract data management, etc.
  • the AUSF network element is mainly used to perform authentication when the terminal device accesses the network, including receiving authentication requests sent by the security anchor function (SEAF), selecting the authentication method, and sending the authentication storage and processing function ( authentication repository and processing function (ARPF) request authentication vector, etc.
  • NSSF network elements are mainly used to select network slice instances for terminal devices, determine allowed network slice selection assistance information (NSSAI), configure NSSAI, and determine the AMF set that serves the UE.
  • the network architecture shown in FIG. 6 may further include: terminal equipment.
  • a terminal device can be referred to as a terminal for short. It is a device with a wireless transceiver function.
  • the terminal device can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on the water (such as ships, etc.); it can also be deployed on In the air (for example, airplanes, balloons, satellites, etc.).
  • the terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiver function, virtual reality (VR) terminal equipment, augmented reality (AR) terminal equipment, industrial control ( Wireless terminal equipment in industrial control, wireless terminal equipment in self-driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid, transportation safety (transportation) Wireless terminal equipment in safety), wireless terminal equipment in a smart city (smart city), wireless terminal equipment in a smart home (smart home), and may also include user equipment (UE), etc.
  • UE user equipment
  • the terminal device can also be a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (personal digital assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the 5th generation (5G) network in the future, or public land mobile communication networks that will evolve in the future ( Public land mobile network (PLMN) terminal equipment, etc.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • Terminal equipment can sometimes be called terminal equipment, user equipment (UE), access terminal equipment, vehicle terminal equipment, industrial control terminal equipment, UE unit, UE station, mobile station, mobile station, remote station, remote terminal Equipment, mobile equipment, UE terminal equipment, terminal equipment, wireless communication equipment, UE agent or UE device, etc.
  • the terminal device can also be fixed or mobile.
  • the embodiments of the present application are not limited thereto.
  • the terminal device may be a wearable device. Wearable devices can also be called wearable smart devices. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories.
  • a wearable device is not only a hardware device, but also a device that achieves powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which need to cooperate with other devices such as smart phones.
  • the terminal device can be a terminal in the Internet of Things (IoT) system. IoT is an important part of the development of information technology in the future.
  • IoT Internet of Things
  • the terminal device in this application may be a terminal device in machine type communication (MTC).
  • MTC machine type communication
  • the terminal device of the present application may be an in-vehicle module, an in-vehicle module, an in-vehicle component, an in-vehicle chip, or an in-vehicle unit that is built into a vehicle as one or more components or units. Components, on-board chips or on-board units can implement the method of the present application. Therefore, the embodiments of the present application can be applied to the Internet of Vehicles, such as vehicle to everything (V2X), long term evolution vehicle (LTE-V), and vehicle to vehicle (V2V). Wait.
  • V2X vehicle to everything
  • LTE-V long term evolution vehicle
  • V2V vehicle to vehicle
  • the network architecture shown in FIG. 6 may further include: DN.
  • DN can be a service network that provides users with data service services.
  • the DN may be an IP multi-media service (IP multi-media service) network or the Internet (Internet), etc.
  • IP multi-media service IP multi-media service
  • Internet Internet
  • the terminal device can establish a protocol data unit (protocol data unit, PDU) session from the terminal device to the DN to access the DN.
  • PDU protocol data unit
  • the network elements in the above-mentioned core network may have different names.
  • the fifth generation mobile communication system is taken as an example for description, and it is not intended to limit the application.
  • the core network element in FIG. 6 is only a schematic illustration, and is not intended as a limitation to the embodiment of the present application.
  • the core network elements may also include: network exposure function (NEF), network storage function (network repository function, NRF), or service control point (service control point) , SCP), etc., one or more network elements, etc.
  • the first AMF is Target AMF
  • the second AMF is Old AMF
  • the terminal device is UE
  • the ABBA_New parameter is the first ABBA parameter
  • the ABBA_Old parameter is the second ABBA parameter as an example.
  • the security feature of the UE may specifically be a security feature supported by the UE or a security feature selected by the UE.
  • the security features of the Target AMF may be specifically the security features supported by the Target AMF, or the security features selected by the Target AMF.
  • the security features of Old AMF may specifically be security features supported by Old AMF, or security features selected by Old AMF.
  • ABBA_Old and ABBA_old can be substituted for each other.
  • ABBA_New and ABBA_new can replace each other.
  • the AMF key can be K AMF
  • the MME key can be K ASME .
  • ABBA_New includes the security features of the UE and the security features of Target AMF; or ABBA_New includes the indication of the security features of the UE and the indication of the security features of the Target AMF.
  • ABBA_Old includes the security features of the UE and the security features of Old AMF; or ABBA_Old includes the indication of the security features of the UE and the indication of the security features of Old AMF.
  • the Old AMF AMF key or Old AMF key refers to the AMF key used by the UE and Old AMF when the UE is registered with the Old AMF (or the Old AMF serving UE).
  • the UE generates the AMF key during the authentication process.
  • Old AMF is the AMF key sent by SEAF to Old AMF.
  • the Old AMF key, Old AMF AMF key, Old AMF sent AMF key to Target AMF, and Target AMF received Old AMF sent AMF key are all the same, and can be used interchangeably .
  • FIG. 7a is a flowchart of a communication method provided by an embodiment of this application. Including but not limited to the following steps:
  • Step 701a Target AMF determines the security features of the UE.
  • Step 701a Target AMF determines the AMF key of Old AMF.
  • the UE and Target AMF can support one or more security features.
  • the UE and Target AMF may only support the security features of Rel-15.
  • UE and Target AMF can support security features such as Rel-16 and Rel-17.
  • Target AMF can obtain the security features supported by the UE in any of the following ways: Old AMF sends the security features supported by the UE to the Target AMF; Target AMF obtains the security supported by the UE from the local storage Features: Old AMF sends the ABBA_Old parameter to Target AMF.
  • the AABA_Old parameter includes the UE’s security feature or the UE’s security feature indication, and the Old AMF’s security feature or Old AMF’s security feature indication.
  • the Target AMF can obtain the AMF key of the Old AMF in the following manner: Old AMF sends the AMF key of the Old AMF to the Target AMF.
  • the Target AMF can send a request message for requesting the context of the terminal device to the Old AMF.
  • the Old AMF receives the above request, it sends the UE context to the Target AMF, and the UE context carries the AMF key of the Old AMF.
  • the Old AMF sends a context creation request to the Target AMF, and the request includes the AMF key of the Old AMF.
  • the AMF key sent by the Old AMF to the Target AMF may be the current AMF key of the Old AMF, or the old AMF derived from the current AMF key by horizontal K AMF.
  • Step 702a The Target AMF determines the ABBA_New parameter according to the security features of the UE and the security features of the Target AMF.
  • the Target AMF determines the AMF key of the Target AMF according to the ABBA_New parameter and the AMF key of the Old AMF, which also becomes the new AMF key. Afterwards, the Target AMF can derive the NAS integrity key and encryption key based on the AMF key of the Target AMF. And according to the NAS integrity key and encryption key, integrity protection and encryption protection are performed on the communication between the UE and the network device. Ensure communication security.
  • the Target AMF sends the ABBA_New parameter and optional first indication information to the UE.
  • the first indication information is used to instruct the UE to update the AMF key according to the ABBA_New parameter or to instruct the UE to update the AMF key.
  • the UE When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side.
  • the method further includes that the Target AMF determines the security features of the Old AMF; when the security features of the Target AMF and the Old AMF are different, Re-execute the steps in the above steps 702a-704a, otherwise, do not execute it again.
  • FIG. 7b is another flowchart of the communication method provided in this embodiment of the application, including but not limited to the following steps:
  • Step 701b Target AMF determines the security features of the UE. Refer to the description of 701a for the method for Target AMF to determine the security features of the UE.
  • Step 701b Target AMF determines the MME key K ASME of the MME.
  • the Target AMF may obtain the MME key of the MME in the following manner: the MME sends the MME key to the Target AMF.
  • the Target AMF sends a context request to the MME, and the MME replies with a context response, and includes the MME key K ASME of the MME in the response.
  • the MME sends a Forward Relocation Request (Forward Relocation Request) to the Target AMF, and the request includes the MME key K ASME of the MME, etc., which is not limited.
  • Forward Relocation Request Forward Relocation Request
  • Step 702b The Target AMF determines the ABBA_New parameter according to the security features of the UE and the security features of the Target AMF.
  • Step 703b The Target AMF determines the AMF key of the Target AMF according to the ABBA_New parameter and the MME key.
  • the Target AMF may send the ABBA_New parameter and optional first indication information to the UE.
  • the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information.
  • the UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New and MME key.
  • AMF and SEAF are co-located and regarded as the same network function (network fuction, NF), that is, Target AMF and SEAF are the same NF and can be used interchangeably.
  • Target AMF can obtain the security features supported by the UE.
  • the Target AMF can receive the security features supported by the UE sent by the Old AMF, or the Target AMF can obtain the security features supported by the UE from the local storage, or the Target AMF can receive the ABBA_Old parameter sent by the Old AMF.
  • Target AMF sets ABBA_New according to the security features supported by UE and Target AMF.
  • Target AMF derives a new AMF key, namely K AMF .
  • the Target AMF sends the ABBA_New parameter to the UE.
  • Target AMF may also send Indicator1 to the UE.
  • Indicator1 is used to instruct the UE to update the AMF key or use ABBA_New to generate the key.
  • the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side.
  • Figure 8b shows a specific process of the first embodiment.
  • the process may be a schematic diagram of the security feature negotiation and key update process in the idle state mobile registration of the UE in 5GS, including but not limited to the following steps:
  • step 801 the UE registers with Old AMF.
  • Step 802 the UE moves in an idle state.
  • Step 803 The UE sends a registration request RR message to the Target AMF.
  • the RR message may carry the 5G-GUTI of the UE.
  • Step 804 If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF.
  • the UE context request message may be Namf_Communication_UEContextTransfer Request.
  • Step 805 OldAMF sends a UE context response message to Target AMF.
  • the UE context response message may be Namf_Communication_UEContextTransfer Response.
  • the UE context response message carries the security features supported by the UE, or the ABBA_Old parameter.
  • the UE context response message also includes the AMF key of Old AMF.
  • the AMF key may be an AMF key used by Old AMF, or a new key generated by Old AMF performing horizontal K AMF derivation on the used AMF key.
  • Old AMF AMF keys sent by Old AMF to Target AMF are collectively referred to as Old AMF AMF keys, which can be any of the above two types (ie, the AMF key used by Old AMF, or the AMF key used by the Old AMF).
  • the key is a new key generated after horizontal K AMF deduction), which will not be explained one by one later.
  • Step 806 The Target AMF generates an ABBA_New parameter according to the security features supported by the UE and the security features supported by the Target AMF.
  • Target AMF can obtain the security features of the UE in the following ways: UE security features sent by Old AMF; ABBA_Old sent by Old AMF; Target AMF is obtained from local configuration and storage.
  • Target AMF generates a new AMF key.
  • the parameters used to generate a new AMF key include: the AMF key received from Old AMF and ABBA_New.
  • Target AMF uses the generated new AMF key to generate NAS encryption key and integrity key.
  • Step 807 The Target AMF sends the NAS SMC to the UE, and the NAS SMC carries the ABBA_New parameter.
  • the NAS SMC may also include a first indication.
  • the first indication may be called indicator1, which is used to instruct the UE to derive the AMF key or use ABBA_News to generate the AMF key.
  • step 808 when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the generated new AMF key.
  • Figure 9 shows another specific process of the first embodiment.
  • the process may be the process of UE security feature negotiation and key update in N2 handover.
  • the process includes but is not limited to:
  • Step 901 the UE registers with Old AMF.
  • Step 902 Old AMF initiates handover.
  • the Old AMF requests the Target AMF to create a UE context.
  • Old AMF may send a UE context creation request message to Target AMF.
  • the UE context creation request message may be Namf_Communication_CreateUEContext Request.
  • the UE context creation request message may carry security features supported by the UE, or the ABBA_Old parameter.
  • Step 904 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Set ABBA_New.
  • Target AMF generates a new AMF key.
  • the parameters used to generate the new AMF key include: the Old AMF AMF key and ABBA_New received from the Old AMF.
  • Target AMF uses the derived new key as the AMF key, and generates the NAS encryption key and the integrity key according to the new AMF key.
  • Step 905 The Target AMF returns a response message for creating a UE context to the Old AMF.
  • the response message for creating the UE context may be Namf_Communication_CreateUEContext Response.
  • the response message for creating the UE context includes ABBA_New.
  • the response message for creating the UE context may also include Indicator1.
  • the Indicator1 is used to instruct the UE to derive the AMF key, or use ABBA_New to generate the AMF key.
  • Step 906 The Old AMF sends ABBA_New and optional Indicator1 to the UE through the access network. If Old AMF receives Indicator1 from Target AMF, it will forward the Indicator1 to the UE.
  • step 907 when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • Figure 10 is another specific process of the first embodiment.
  • the process can be a security feature negotiation and key update process in the UE handover from EPS to 5GS.
  • the process includes but is not limited to:
  • Step 1000 UE registers with MME.
  • Step 1001 MME decides to initiate N26 handover.
  • Step 1002 The MME sends a forwarding relocation request message to the Target AMF.
  • the forwarding relocation request message may be Forward Relocation Request.
  • Step 1003 Target AMF creates a 5G security context.
  • Step 1004 The Target AMF sends a forwarding relocation response message to the MME.
  • the forwarding relocation response message may be Forward Relocation Response.
  • the forwarding relocation response message carries NASC.
  • Step 1005 The MME sends a handover command to the UE.
  • the handover command may be Handover Command.
  • Step 1006 The UE creates a 5G security context.
  • Step 1007 The UE sends an RR message to Old AMF, and the RR message may include 5G-GUTI.
  • Step 1008 If the RR includes 5G-GUTI, the Target AMF sends a UE context request message to the Old AMF, and the context request message may be Namf_Communication_UEContextTransfer Request.
  • Step 1009 The Old AMF sends a UE context request response message to the Target AMF.
  • the context request response message may be Namf_Communication_UEContextTransfer Response.
  • the context request response message may include the security features supported by the UE, or the ABBA_Old parameter.
  • the context request response message includes the AMF key of Old AMF.
  • Step 10010 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Generate the ABBA_New parameter. Furthermore, Target AMF derives a new AMF key according to the ABBA_New parameter. Target AMF generates NAS encryption key and integrity key according to the new AMF key.
  • Step 10011 The Target AMF sends the NAS SMC to the UE.
  • the NAS SMC carries the ABBA_New parameter and optional Indicator1.
  • the Indicator1 is used to instruct the UE to use the ABBA_New parameter to derive a new AMF key; or to instruct the UE to perform AMF key deduction.
  • Step 10012 If the UE receives Indicator1, the UE derives a new AMF key in the same manner as the network side according to the received Indicator1. If the UE receives ABBA_New but not indicator1, the UE uses ABBA_New to derive the new AMF key in the same manner as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • Figure 11 is another specific process of the first embodiment.
  • the process may be a process of security feature negotiation and key update when the UE moves from EPS to 5GS in an idle state.
  • This process includes but is not limited to:
  • Step 1100 UE registers with MME.
  • Step 1101 The UE moves in an idle state.
  • Step 1102 The UE sends an RR message to the Target AMF.
  • the RR may carry 5G-GUTI.
  • Step 1103 The Target AMF sends a context request message to the MME, and the context request message may be Context Request.
  • Step 1104 The MME sends a context response message to the Target AMF, and the context response message may be Context Response.
  • the context response message may include the EPS security context.
  • Step 1105 Target AMF creates a 5G security context.
  • Step 1106 If the RR carries 5G-GUTI, the Target AMF sends a UE context request to the Old AMF, and the UE context request may be Namf_Communication_UEContextTransfer Request.
  • Step 1107 The Old AMF sends a UE context response to the Target AMF, and the UE context response may be Namf_Communication_UEContextTransfer Response.
  • the UE context response includes the security features supported by the UE, or the ABBA_Old parameter.
  • the UE context response includes the AMF key of Old AMF.
  • Step 1108 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Determine the ABBA_New parameter. And according to the ABBA_New parameter, a new AMF key is generated. Target AMF generates NAS encryption key and integrity key according to the new AMF key. The parameters used by Target AMF to generate new AMF keys include ABBA_New and Old AMF AMF keys.
  • Step 1109 The Target AMF sends the NAS SMC to the UE.
  • the NAS SMC carries the ABBA_New parameter and optional Inicator1.
  • the Indicator1 is used to instruct the UE to use the ABBA_New parameter to update the AMF key; or to instruct the UE to perform AMF key derivation.
  • Step 11010 When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same manner as the network side, and the parameters used include ABBA_New and Old AMF AMF keys. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key for deriving the AMF.
  • the second embodiment is different from the first embodiment.
  • the Target AMF obtains the security features supported by the UE
  • the Target AMF initiates the main authentication process.
  • the UE and Target AMF will negotiate security features, generate the ABBA_New parameter, and derive the new AMF key according to the ABBA_New parameter.
  • the Target AMF obtains the security features supported by the UE from the Old AMF.
  • the Old AMF may send the security features supported by the UE or the ABBA_Old parameter to the Target AMF.
  • Target AMF can obtain the security features supported by the UE from local storage.
  • the Target AMF sets ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF, initiates the main authentication process, and sends the set ABBA_New to the UE.
  • the Target AMF may send an authentication request (authentication request) to the UE, and the authentication request carries the aforementioned ABBA_New.
  • the process may be a process in which the UE moves in an idle state in 5GS.
  • This process includes but is not limited to:
  • Step 1301 UE registers with Old AMF.
  • Step 1302 the UE moves in an idle state.
  • Step 1303 The UE sends a registration request (registration requst, RR) message to the Target AMF, and the RR message may optionally carry 5G-GUTI.
  • Step 1304 If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF.
  • the UE context request message may be Namf_Communication_UEContextTransfer Request.
  • Step 1305 The Old AMF sends a UE context response message to the Target AMF.
  • the UE context response message may be Namf_Communication_UEContextTransfer Response.
  • the UE context response message may include security features supported by the UE or ABBA_Old.
  • Step 1306 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Set ABBA_New.
  • Step 1307 The Target AMF sends an authentication request (authentication request) to the UE, and the authentication request carries the aforementioned ABBA_New.
  • the UE uses the received ABBA_New to generate the AMF key.
  • Step 303 The Old AMF requests the Target AMF to create a UE context.
  • Old AMF may send a UE context creation request message to Target AMF.
  • the UE context creation request message may be Namf_Communication_CreateUEContext Request.
  • the UE context creation request message may carry security features supported by the UE, or the ABBA_Old parameter.
  • the Target AMF generates ABBA_New according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features of the Target AMF.
  • the Target AMF generating ABBA_New can occur at any time between steps 303 and 306.
  • Step 306 Target AMF sends an authentication request to the UE, and carries ABBA_New in the authentication request.
  • the UE uses ABBA_New to generate the AMF key.
  • Step 10010 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Generate the ABBA_New parameter.
  • Step 10011 Target AMF initiates an authentication request to the UE, and the authentication request carries ABBA_New.
  • Step 10012 The UE uses the received ABBA_New to generate an AMF key.
  • Step 1108 Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Determine the ABBA_New parameter.
  • Step 1109 Target AMF sends an authentication request to the UE, and includes ABBA_New in the authentication request.
  • Step 11010 The UE uses the received ABBA_New to generate an AMF key.
  • the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key derivation parameter to derive the AMF key.
  • the Target AMF obtains the security features supported by the Old AMF and the security features supported by the UE.
  • the Target AMF can receive the security features supported by the UE sent by the Old AMF and the security features supported by the Old AMF.
  • the Target AMF may receive ABBA_Old sent by the Old AMF, and the ABBA_Old includes the security features supported by the UE and the security features supported by the Old AMF.
  • the Target AMF may obtain the security features supported by the UE and/or the security features supported by the Old AMF based on local storage. Afterwards, the Target AMF can determine whether the security features supported by the Target AMF and the Old AMF are the same.
  • Target AMF can set ABBA_New according to the security features supported by UE and Target AMF.
  • Target AMF derives a new AMF key according to the set ABBA_New, and notifies the UE to derive the AMF key.
  • the Target AMF may send a NAS SMC to the UE.
  • the NAS SMC carries ABBA_New and optional Indicator1, which is used to instruct the UE to update the AMF key or generate a new AMF key according to ABBA_New.
  • Target AMF needs to obtain the security features supported by Old AMF.
  • Target AMF judges whether the security features supported by Target AMF and Old AMF are the same. If they are different, then Target AMF sets ABBA_New and derives the key. Otherwise, ABBA_New is no longer set.
  • FIG. 15 shows a process of the third embodiment.
  • the process may be a specific process of the UE moving in the idle state of 5G, including but not limited to:
  • step 1501 the UE registers with Old AMF.
  • step 1502 the UE moves in an idle state.
  • Step 1503 The UE sends a registration request (registration request, RR) message to the Target AMF.
  • the RR message may optionally include 5G-GUTI.
  • Step 1504 The Target AMF sends a UE context request to the Old AMF.
  • the UE context request may be Namf_Communicaiton_UEContextTransfer Request.
  • Step 1505 The Old AMF sends a UE context response to the Target AMF.
  • the UE context response may be Namf_Communicaiton_UEContextTransfer Request.
  • the UE context response carries the security features supported by the UE and/or the security features supported by Old AMF, and/or ABBA_Old.
  • ABBA_Old includes the security features of UE and the security features of Old AMF.
  • the UE context response also carries the AMF key of Old AMF.
  • Step 1506 If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. The AMF key derived by Target AMF can also use the AMF key of Old AMF. In other words, Target AMF can derive the AMF key based on the AMF keys of ABBA_New and Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 1507 The Target AMF sends a NAS SMC to the UE, and the NAS SMC carries ABBA_New and optional Indicator1.
  • the Indicator1 is used to instruct the UE to perform AMF key derivation, or to generate a new AMF key according to ABBA_New.
  • Step 1508 When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same manner as the network side, and the parameters used include ABBA_New and Old AMF AMF keys. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the UE idle state moves from EPS to 5GS, and the UE switches from EPS to 5GS, the procedure is similar to the above.
  • the Old AMF requests the Target AMF to create a UE context.
  • Old AMF may send a UE context creation request message to Target AMF.
  • the UE context creation request message may be Namf_Communication_CreateUEContext Request.
  • the UE context creation request message may carry the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
  • Step 904 If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 1009 The Old AMF sends a UE context request response message to the Target AMF.
  • the context request response message may be Namf_Communication_UEContextTransfer Response.
  • the context request response message may include the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
  • Step 10010 If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 1107 The Old AMF sends a UE context response to the Target AMF, and the UE context response may be Namf_Communication_UEContextTransfer Response.
  • the UE context response includes the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
  • Step 1108 If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key derivation parameter and used as the AMF key.
  • the Target AMF obtains the security features supported by the UE and the security features supported by the Old AMF. If the security features supported by Old AMF are different from those supported by Target AMF, Target AMF sets the ABBA_New parameter according to the acquired security features supported by the UE and the security features supported by Target AMF, initiates the main authentication process, and sets the ABBA_New The parameters are sent to the UE through the main authentication process. For example, the Target AMF may send an authentication request (authentication request) to the UE, and the authentication request carries the ABBA_New parameter.
  • authentication request authentication request
  • Target AMF can obtain the security features supported by the UE and/or the security features supported by the Old AMF in any of the following ways:
  • the Old AMF sends the security features supported by the UE and/or the security features supported by the Old AMF to the Target AMF.
  • Old AMF sends ABBA_Old to Target AMF.
  • the Target AMF obtains the security features supported by the UE and/or the security features supported by the Old AMF according to local storage or configuration.
  • Target AMF needs to obtain the security features supported by Old AMF.
  • Target AMF judges whether the security features supported by Target AMF and Old AMF are the same. If they are different, Target AMF sets the ABBA_New parameter and initiates the master authentication.
  • the process may be a specific process of the UE moving in the idle state of 5G, and the process includes but is not limited to:
  • Step 1701 The UE registers with Old AMF.
  • Step 1702 the UE moves in an idle state.
  • Step 1703 The UE sends a registration request (reqistration request, RR) to the Target AMF.
  • the registration request optionally carries 5G-GUTI.
  • Step 1704 If 5G-GUTI is in the RR, the Target AMF sends a UE context request message to the Old AMF.
  • the UE context request message may be Namf_Communicaiton_UEContextTransfer Request.
  • Step 1705 The Old AMF sends a UE context response message to the Target AMF.
  • the UE context response message may be Namf_Communicaiton_UEContextTransfer Response.
  • the UE context response message includes UE security security features, and/or security features supported by Old AMF, and/or ABBA_Old.
  • Step 1706 If the security features supported by the Old AMF and the Target AMF are different, the Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF.
  • Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 1707 The Target AMF sends an authentication request (authentication request) to the UE, and the authentication request includes ABBA_New.
  • the idle state of the UE moves from EPS to 5GS, and the UE switches from EPS to 5GS, similar to the above process.
  • Step 303 The Old AMF requests the Target AMF to create a UE context.
  • Old AMF may send a UE context creation request message to Target AMF.
  • the UE context creation request message may be Namf_Communication_CreateUEContext Request.
  • the UE context creation request message may carry the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
  • Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by Target AMF.
  • Target AMF setting ABBA_New can occur at any time between steps 303 and 306.
  • Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 306 Target AMF sends an authentication request to the UE, and carries ABBA_New in the authentication request.
  • the UE uses ABBA_New to generate the AMF key.
  • Step 1009 The Old AMF sends a UE context request response message to the Target AMF.
  • the context request response message may be Namf_Communication_UEContextTransfer Response.
  • the context request response message may include the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
  • Step 10010 If the security features supported by the Old AMF and the Target AMF are different, the Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF.
  • Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 10011 Target AMF initiates an authentication request to the UE, and the authentication request carries ABBA_New.
  • Step 10012 The UE uses the received ABBA_New to generate an AMF key.
  • Step 1107 Old AMF sends a UE context response to Target AMF, and the UE context response may be Namf_Communication_UEContextTransferResponse.
  • the UE context response includes the security features supported by the UE, and/or the ABBA_Old parameter, and/or the security features of Old AMF.
  • Step 1108 If the security features supported by Old AMF and Target AMF are different, Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by Target AMF.
  • Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
  • Step 1109 Target AMF sends an authentication request to the UE, and includes ABBA_New in the authentication request.
  • Step 11010 The UE uses the received ABBA_New to generate an AMF key.
  • the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the parameter to derive the AMF.
  • the fifth embodiment is different from the foregoing embodiments 1 to 4 in that the Target AMF obtains the UE security features and/or ABBA_Old from the UE, and ABBA_Old includes the security features supported by the UE and the security features supported by the Old AMF.
  • Target can also obtain UE security features and/or Old AMF security features from local configuration or storage. After the Target AMF obtains the security features supported by the UE and/or the security features supported by the Old AMF, it can perform any one of the following four operations. This can be seen in Figure 18.
  • Operation 1 Determine ABBA_New according to the acquired security features of the UE and the security features supported by the Target AMF;
  • Target AMF acquires the security features of the UE, which can be the security features of the UE received from the RR or the security features received from the RR The security features of the UE in ABBA_Old, or the security features of the UE configured or stored locally.
  • Target AMF generates an AMF key according to ABBA_New.
  • the parameters used to generate the AMF key include the set ABBA_New.
  • the Target AMF sends the set ABBA_New and optional Indicator1 to the UE.
  • the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New.
  • the UE If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information.
  • the UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the newly generated AMF key.
  • the difference from the first embodiment is that the target AMF obtains the security feature in a different way.
  • Operation 2 Determine ABBA_New according to the acquired UE's security features and Target AMF's security features.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF uses ABBA_New when generating a new AMF key later.
  • the Target AMF initiates the authentication process and sends ABBA_New to the UE; referring to the second embodiment, the difference from the second embodiment is that the target AMF obtains the security feature in a different way.
  • Operation 3 If the acquired security features supported by the Old AMF are different from those supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored.
  • Target AMF generates an AMF key according to ABBA_New.
  • the parameters used to generate the AMF key include the set ABBA_New.
  • the Target AMF sends ABBA_New and an optional indication Indicator1 to the UE.
  • the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New.
  • the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information.
  • the UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New.
  • the parameters used by the UE to generate the AMF key include the received ABBA_New.
  • the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the difference lies in the way in which the Target AMF obtains the security feature.
  • Operation 4 If the acquired security features supported by the Old AMF are different from those supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored.
  • Target AMF initiates the authentication process and sends the set ABBA_New to the UE.
  • the difference lies in the way in which the Target AMF obtains the security feature.
  • Embodiment 5 As shown in Figure 19, a specific process of Embodiment 5 is provided, and the process includes but is not limited to:
  • Step 1901 The UE sends a registration request (reqistration request, RR) message to the Target AMF, and ABBA_Old and/or the security feature of the UE in the RR message.
  • the RR may carry 5G-GUTI.
  • Step 1902 If the RR carries 5G-GUTI, the Target AMF sends a UE context request message to the Old AMF.
  • the request message of the UE context may be Namf_Communication_UEContextTransfer Request.
  • Step 1903 The Old AMF receives the UE context response message sent by the Target AMF, where the UE context response message includes the AMF key of the Old AMF.
  • the response message of the UE context may be Namf_Communication_UEContextTransfer Response.
  • the UE context response message includes the AMF key of Old AMF.
  • the Target AMF determines ABBA_New according to the acquired security features of the UE and the security features of the Target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF generates a new AMF key.
  • To generate a new AMF key use ABBA_New.
  • the new AMF key is derived, and the Old AMF AMF key is also used.
  • the Target AMF sends the NAS SMC to the Old AMF, and the NAS SMC includes the ABBA_New parameter and the optional Indicator1.
  • Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key.
  • step 1906a when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the Target AMF determines ABBA_New according to the acquired security features of the UE and the security features of the Target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF uses ABBA_New when deriving a new AMF key later.
  • Step 1905b Target AAMF initiates the main authentication process, and sends an authentication request (authentication request) to the UE.
  • the authentication request includes the ABBA_New parameter.
  • the UE uses the ABBA_New to generate the AMF key.
  • Step 1904c if the acquired security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored.
  • Target AMF uses ABBA_New to generate a new AMF key.
  • the Target AMF sends a NAS message to the UE.
  • the NAS message includes the ABBA_New parameter and optional Indicator1.
  • Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key.
  • step 1906c when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the Target AMF determines ABBA_New according to the acquired security features of the UE and the target AMF.
  • the Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored.
  • Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored.
  • Target AMF uses ABBA_New when deriving a new AMF key later.
  • Step 1905d Target AMF initiates the main authentication process, and sends an authentication request (authentication request) to the UE.
  • the authentication request includes the ABBA_New parameter.
  • the UE After that, the UE generates a new AMF key according to ABBA_New.
  • the security feature negotiation between the Target AMF and the UE is implemented, and ABBA_New is used as an input parameter to generate a new AMF key.
  • Target AMF acquires security features, sets ABBA_New, and derives the AMF key.
  • Old AMF obtains the security feature and sets ABBA_New. Old AMF can also derive the key based on ABBA_New. For example, see Figure 20.
  • Old AMF acquires the security features of Target AMF.
  • Old AMF obtains Old AMF to obtain the security features of Target AMF through: Target AMF can send Target AMF security features to Old AMF; or Old AMF obtains Target AMF security features based on local storage or configuration.
  • Old AMF determines ABBA_New according to the security features of UE and Target AMF.
  • the parameters used to derive the new AMF key include ABBA_New.
  • the parameters used to derive the new AMF key can also include any of the following:
  • the current AMF key that is, the key of Old AMF.
  • Old AMF determines whether the security features of Target AMF are the same as those supported by Old AMF; if they are different, Old AMF determines ABBA_New according to UE security features and Target AMF security features, and generates a new one.
  • the AMF key is the security features of Target AMF.
  • Old AMF sends the parameters ABBA_New and optional Indicator1 required to derive the new AMF key to the UE.
  • Old AMF can also send ABBA_New and optional Indicator2 to Target AMF. Then it is sent to the UE by Target AMF.
  • the Target AMF sends the received ABBA_New to the UE. If the Target AMF receives Indicator2, the Target AMF sends Indicator1 to the UE.
  • the Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key.
  • the meaning of Indicator2 indication is the same as Indicator1.
  • Indicator2 and Indicator1 can be the same indicator or different indicators.
  • the UE When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
  • the procedure may be a mobile registration procedure of the UE in the 5GS idle state.
  • This procedure is also applicable to the registration procedure after the UE switches from EPS to 5GS, and the registration procedure when UE moves from EPS idle state to 5GS.
  • This process includes but is not limited to:
  • Step 2103 The UE sends a registration request RR message to the Target AMF, where the registration request RR message may optionally carry 5G-GUTI.
  • Step 2104 If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request to the Old AMF, and the UE context request carries the security features supported by the Target AMF.
  • the UE context request may be Namf_Communication_UEContextTransfer Request.
  • Step 2105 The Old AMF determines ABBA_New according to the security features of the UE and the security features of the Target AMF.
  • the Old AMF can obtain the security features of the Target AMF by: receiving the security features of the Target AMF sent by the Target AMF, or obtaining it from local storage or configuration.
  • Old AMF generates a new AMF key.
  • the key used to generate the new AMF key includes the set ABBA_New.
  • the parameters used to derive the new AMF key can also use the current AMF key of Old AMF, or the key generated by horizontal K AMF derivation based on the current AMF key.
  • Old AMF compares the security features supported by Target AMF with the security features supported by Old AMF. If the two are different, Old AMF determines ABBA_New according to the security features supported by the UE and Target AMF. Target AMF generates a new AMF key.
  • Step 2106 The Old AMF sends a response message for the UE context request to the Target AMF.
  • the UE context request message may be Namf_Communication_UEContextTransfer Response message.
  • the message includes ABBA_New, and optional indication Indicator2.
  • Step 2107 The Target AMF sends the received ABBA_New and optional Indicator1 to the UE.
  • Target AMF sends NAS SMC to UE.
  • the NAS SMC includes ABBA_New and optional Indicator1. If the Target AMF receives Indicator2, the Target AMF sends Indicator1 to the UE.
  • Step 2108 When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. The UE generates a NAS encryption key and an integrity key according to the generated new AMF key.
  • Fig. 22 shows another process of the sixth embodiment.
  • the procedure may be the procedure of the N2 handover procedure of the UE. This process includes but is not limited to:
  • step 2201 the UE registers with Old AMF.
  • Step 2202 Old AMF initiates handover.
  • Step 2203 The Old AMF sends a UE context request message to the Target AMF.
  • the UE context request message may be Namf_Communication_CreateUEContextRequest.
  • Step 2204 The Target AMF sends a UE context request response to the Old AMF.
  • the UE context request response may be Namf_Communication_CreateUEContext Response.
  • the UE context request response includes the security features supported by Target AMF.
  • Step 2205 is the same as step 2105.
  • Step 2206 The Old AMF sends the generated ABBA_New and optional Indicator1 to the UE.
  • Old AMF sends a NAS SMC message to the UE, and the NAS SMC includes the set ABBA_New and optional Indicator1.
  • Step 2207 is the same as step 2108.
  • the security feature negotiation between the Target AMF and the UE is implemented, and ABBA_New is used as an input parameter to derive the new AMF key.
  • AMF and SEAF are not co-located, and are two independent network functions.
  • the AMF requests the key from SEAF.
  • SEAF generates ABBA_New based on the security features of the UE and the target AMF.
  • SEAF generates the AMF key and uses ABBA_New.
  • SEAF generates AMF keys, you can also use K SEAF or K AMF .
  • SEAF sends the generated AMF key and optional Indicator3 to Target AMF.
  • the Target AMF sends ABBA_New and optional Indicator1 to the UE. If the Target AMF receives Indicator3, the Target AMF sends Indicator1 to the UE.
  • Indicator3 has the same meaning as Indicator1.
  • Indicator3 and Indicator1 can be the same indicator or different indicators.
  • the UE security features and Target AMF security features used by SEAF to generate ABBA_New can be obtained in the following ways.
  • SEAF obtains UE security features from local storage or configuration, or Target AMF sends UE security features to SEAF.
  • SEAF obtains Target AMF security features from local storage or configuration, or Target AMF sends Target AMF security features to SEAF.
  • SEAF can also directly obtain ABBA_New from Target AMF without generating ABBA_New, that is, Target AMF sends ABBA_New to SEAF.
  • Fig. 24 shows a specific process provided in the seventh embodiment.
  • the process may specifically be the idle state mobile registration process of the UE in 5G, the registration process of the UE moving from the EPS idle state to the 5GS, or the registration process of the UE switching from the EPS to the 5GS, etc.
  • This process includes but is not limited to:
  • Step 2403 The UE sends an RR message to the Target AMF.
  • the RR message carries optional 5G-GUTI, optional ABBA_Old, and optional UE security features.
  • Step 2404 If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF.
  • the UE context request message may be Namf_Communication_UEContextTransfer Request.
  • Step 2405 The Old AMF sends a UE context response message to the Target AMF.
  • the UE context response message may be Namf_Communication_UEContextTransfer Response.
  • the message may optionally include security features supported by the UE, and/or security features supported by Old AMF, and/or ABBA_Old.
  • the Target AMF obtains the UE security feature or the Old AMF security feature through: the UE sends it to the TargetAMF, or stores or configures it locally, or sends it to the Old AMF.
  • Target AMF obtains ABBA_Old, which can be sent by UE or Old AMF.
  • Step 2406 The Target AMF sends a key request message to the SEAF, which is used to request the SEAF to generate an AMF key.
  • the key request message carries the identity of the UE, for example, the UE's subscription permanent identifier (SUPI) or 5G-GUTI.
  • the key request message may also include any one or more of the following: acquired security features supported by the UE, security features supported by Old AMF, security features supported by Target AMF, ABBA_Old.
  • the Target AMF may determine whether the acquired security features supported by the Old AMF are the same as the security features supported by the Target AMF; if they are different, the above Target AMF sends a key request message to the SEAF.
  • the Target AMF determines ABBA_New according to the security features supported by the UE and the Target AMF.
  • Target AMF sends a key request message to SEAF, which carries ABBA_New.
  • Step 2407 SEAF generates an AMF key.
  • the parameters used by SEAF to generate the AMF key include the SEAF key or the AMF key, and ABBA_New.
  • the ABBA_New used by SEAF to generate the AMF key can be obtained in any of the following ways:
  • Target AMF sends ABBA_New to SEAF.
  • the SEAF obtains the security features supported by the UE and Target AMF, and the SEAF generates ABBA_New.
  • SEAF obtains the security features supported by Old AMF and Target AMF. If the security features supported by Old AMF and Target AMF are different, SEAF generates ABBA_New.
  • the SEAF obtains the security features supported by the UE or Target AMF or Old AMF through any of the following methods:
  • SEAF is obtained from local storage or configuration.
  • the Target AMF sends the security features supported by the UE or Target AMF or Old AMF to the SEAF.
  • the SEAF may also make a judgment first: if the security features supported by the Old AMF are different from those supported by the Target AMF, the SEAF generates the AMF key or ABBA_New.
  • Step 2408 SEAF sends the AMF key, optional ABBA_New, and optional Indicator3 to Target AMF.
  • Step 2409 The Target AMF sends ABBA_New and optional Indicator1 to the UE.
  • Target AMF sends NAS SMC to UE, and NAS SMC includes ABBA_New and optional Indicator1.
  • Target AMF sends Indicator1, which can be based on any one or more of the following: Target AMF receives Indicator3 sent by SEAF; Target AMF receives the AMF key sent by SEAF; Target AMF receives ABBA_New sent by SEAF.
  • Step 2410 When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
  • FIG. 25 shows another process of the seventh embodiment. This process is the N2 handover process of the UE.
  • the process includes but is not limited to:
  • step 2501 the UE registers with Old AMF.
  • Step 2502 Old AMF initiates handover.
  • Step 2503 The Old AMF sends a UE context creation request message to the Target AMF.
  • the UE context request message may be Namf_Communication_CreateUEContext Request message.
  • the message may optionally include any one or more of the following: security features supported by the UE; security features supported by Old AMF, ABBA_Old.
  • Target AMF may also obtain the security features supported by the UE and/or the security features supported by Old AMF, and/or ABBA_Old from the UE or local storage.
  • Step 2507 The Target AMF sends a UE context response message to the Old AMF.
  • the UE context response message may be Namf_Communication_CreatUEContext Response.
  • the message carries ABBA_new and optional Indicator4.
  • Indicator4 has the same meaning as Indicator3.
  • Indicator4 and Indicator3 can be the same indicator or different indicators.
  • Step 2508 The Old AMF sends ABBA_new and optional Indicator1 to the UE. If Old AMF receives Indicator4, Old AMF sends Indicator1 to the UE.
  • Indicator4 and Indicator1 may be the same indication or different indications, which is not limited.
  • Step 2509 When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
  • the process includes but is not limited to:
  • the UE is registered with Old AMF.
  • Old AMF sends a UE context creation request message to Target AMF.
  • the UE context request message may be Namf_Communication_CreateUEContext Request message.
  • the Target AMF sends the morning and afternoon response messages of creating the UE to the Old AMF.
  • the UE context request message may be Namf_Communication_CreateUEContext Response message.
  • the Response message includes the security features of Target AMF.
  • the Old AMF sends a key request message to the SEAF to request the SEAF to generate an AMF key.
  • the key request message carries the identity of the UE, for example, the UE's subscription permanent identifier (SUPI) or 5G-GUTI.
  • the key request message may also include any one or more of the following: security features supported by the UE, security features supported by Old AMF, security features supported by Target AMF, ABBA_Old.
  • the Old AMF may determine whether the acquired security features supported by the Target AMF are the same as those supported by the Old AMF; if they are different, the Old AMF sends a key request message to the SEAF. Or, Old AMF determines ABBA_New according to the security features supported by the UE and Target AMF. Old AMF sends a key request message to SEAF, which carries ABBA_New.
  • SEAF generates an AMF key.
  • the parameters used by SEAF to generate the AMF key include the SEAF key or the AMF key, and ABBA_New.
  • the ABBA_New used by SEAF to generate the AMF key can be obtained in any of the following ways:
  • the SEAF obtains the security features supported by the UE and Target AMF, and the SEAF generates ABBA_New.
  • SEAF obtains the security features supported by Old AMF and Target AMF. If the security features supported by Old AMF and Target AMF are different, SEAF generates ABBA_New.
  • the SEAF obtains the security features supported by the UE or Target AMF or Old AMF through any of the following methods:
  • SEAF is obtained from local storage or configuration.
  • the Old AMF sends the security features supported by the UE or Target AMF or Old AMF to the SEAF.
  • the SEAF may also make a judgment first: if the security features supported by the Old AMF are different from those supported by the Target AMF, the SEAF generates the AMF key or ABBA_New.
  • SEAF sends the AMF key, optional ABBA_New, and optional Indicator5 to Old AMF.
  • Old AMF sends ABBA_new and optional Indicator1 to the UE. If Old AMF receives Indicator5, Old AMF sends Indicator1 to the UE.
  • Indicator5 and Indicator1 may be the same indication or different indications, which is not limited.
  • the UE When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
  • the indicators Indicator1, Indicator2, Indicator3, Indicator4, and Indicator5 all indicate the same content. They are not described one by one in this application.
  • the security feature negotiation between the Target AMF and the UE is implemented, and ABBA has been used as the key derivation parameter.
  • ABBA has been used as the key derivation parameter.
  • FIG. 26 is a schematic block diagram of an apparatus 2600 provided by an embodiment of the present application.
  • the device may be a software unit or a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the device includes a communication unit 2601 and may also include a processing unit 2602.
  • the communication unit 2601 may communicate with the department, and the communication unit 2601 may include a sending unit and/or a receiving unit, and so on.
  • the processing unit 2602 is used for processing.
  • the device 2600 can implement the steps performed by the first AMF in the above method embodiment, and the device 2600 can be the first AMF, or a chip or circuit configured in the first AMF.
  • the processing unit 2602 is configured to perform processing operations on the first AMF side in the foregoing method embodiment, and the communication unit 2601 is configured to perform transceiving related operations on the first AMF side in the foregoing method embodiment.
  • the processing unit 2602 is used to determine the security features of the terminal device; the processing unit 2602 is also used to determine the first inter-architecture anti-dimensionality reduction ABBA parameters based on the security features of the terminal device and the security features of the first AMF; The unit 2602 is further configured to obtain the key of the second AMF; the processing unit 2602 is further configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  • the processing unit 2602 determines the security features of the terminal device, including: controlling the communication unit 2601 to send a request message for requesting the terminal device context to the second AMF; controlling the communication unit 2601 to receive the terminal device context sent by the second AMF, so The terminal device context carries the security features of the terminal device.
  • the processing unit 2602 determining the security feature of the terminal device includes: controlling the communication unit 2601 to receive a registration request sent by the terminal device, and the registration request carries the security feature of the terminal device.
  • the processing unit 2602 acquiring the key of the second AMF includes: controlling the communication unit 2601 to send a request message for requesting the terminal device context to the second AMF, and controlling the communication unit 2601 to receive the terminal device context sent by the second AMF,
  • the terminal device context carries the key of the second AMF.
  • the processing unit 2602 determines the first ABBA parameter according to the security characteristics of the terminal device and the security characteristics of the first AMF
  • the processing unit 2602 is further configured to: determine the security characteristics of the second AMF; determine the first AMF The security feature of is different from the security feature of the second AMF.
  • the communication unit 2601 is further configured to: send the first ABBA parameter to the terminal device and First indication information, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
  • the apparatus 2600 may implement the steps performed by the terminal device in the above method embodiment, and the apparatus 2600 may be a terminal device, or a chip or circuit configured in the terminal device.
  • the communication unit 2601 performs the transceiving operations of the terminal device in the above method embodiment, and the processing unit 2602 is configured to perform the processing related operations of the terminal device in the above method embodiment.
  • the communication unit 2601 is configured to receive the first ABBA parameter and first indication information sent by the first AMF, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; processing The unit 2602 is configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  • the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
  • the communication unit 2601 is further configured to send a registration request to the first AMF, where the registration request carries the security feature of the terminal device.
  • the division of units in the embodiments of this application is illustrative, and is only a logical function division. In actual implementation, there may be other division methods.
  • the functional units in each embodiment of this application can be integrated into one processing unit. In the device, it can also exist alone physically, or two or more units can be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the functions of the communication unit in the foregoing embodiments may be implemented by a transceiver, and the functions of the processing unit may be implemented by a processor.
  • the transceiver may include a transmitter and/or a receiver, etc., which are used to implement the functions of the transmitting unit and/or the receiving unit, respectively.
  • FIG. 27 The following description will be given with reference to FIG. 27 as an example.
  • FIG. 2700 is a schematic block diagram of a device 2700 provided in an embodiment of the present application.
  • the device 2700 shown in FIG. 2700 may be a hardware circuit implementation of the device shown in FIG. 2600.
  • FIG. 27 only shows the main components of the communication device.
  • the communication device 2700 shown in FIG. 2700 includes at least one processor 2701.
  • the communication device 2700 may also include at least one memory 2702 for storing program instructions and/or data.
  • the memory 2702 and the processor 2701 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units, or modules, which can be electrical, mechanical, or other forms, and is used for information exchange between devices, units, or modules.
  • the processor 2701 may cooperate with the memory 2702, the processor 2701 may execute program instructions stored in the memory 2702, and at least one of the at least one memory 2702 may be included in the processor 2701.
  • the apparatus 2700 may further include a communication interface 2703 for communicating with other devices through a transmission medium, so that the communication apparatus 2700 can communicate with other devices.
  • the communication interface may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces.
  • the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver with integrated transceiver functions, or an interface circuit.
  • connection medium between the processor 2701, the memory 2702, and the communication interface 2703 is not limited in the embodiment of the present application.
  • the memory 2702, the processor 2701, and the communication interface 2703 are connected by a communication bus 2704.
  • the bus is represented by a thick line in FIG. 27.
  • the connection mode between other components is only a schematic illustration. , Not as a limitation.
  • the bus may include an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used to represent in FIG. 27, but it does not mean that there is only one bus or one type of bus.
  • the device 2700 is used to implement the steps performed by the first AMF in the above method embodiment.
  • the communication interface 2703 is used to perform the transceiving-related operations of the first AMF in the above method embodiment
  • the processor 2701 is used to perform the processing related operations of the first AMF in the above method embodiment.
  • the processor 2701 is configured to determine the security feature of the terminal device; the processor 2701 is also configured to determine the first inter-architecture anti-dimensionality reduction ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF; The processor 2701 is further configured to obtain the key of the second AMF; the processor 2701 is further configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  • the processor 2701 determining the security feature of the terminal device includes: controlling the communication interface 2703 to send a request message for requesting the terminal device context to the second AMF, and controlling the communication interface 2703 to receive the terminal device context sent by the second AMF,
  • the terminal device context carries the security features of the terminal device.
  • the processor 2701 determining the security feature of the terminal device includes: controlling the communication interface 2703 to receive a registration request sent by the terminal device, and the registration request carries the security feature of the terminal device.
  • the processor 2701 obtaining the key of the second AMF includes: controlling the communication interface 2703 to send a request message for requesting the context of the terminal device to the second AMF; controlling the communication interface 2703 to receive the key sent by the second AMF
  • the terminal device context, the terminal device context carries the key of the second AMF.
  • the processor 2701 is further configured to: determine the security feature of the second AMF; It is determined that the security feature of the first AMF is different from the security feature of the second AMF.
  • the communication interface 2703 is further configured to: send the terminal device The first ABBA parameter and first indication information, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
  • the apparatus 2700 is used to implement the steps of the terminal device in the above method embodiment.
  • the communication interface 2703 is used to perform the transceiving-related operations of the terminal device in the above embodiment
  • the processor 2701 is used to perform the processing related operations of the terminal device in the above method embodiment.
  • the communication interface 2703 is configured to receive the first ABBA parameter and first indication information sent by the first AMF, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; processing The device 2701 is configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  • the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
  • the communication interface 2703 is further configured to send a registration request to the first AMF, where the registration request carries the security feature of the terminal device.
  • an embodiment of the present application also provides a system, which includes at least one of the first AMF, the second AMF, or the UE in the above method embodiment.
  • a device for executing the method in the above method embodiment includes a program, and when the program is executed by a processor, the method in the above method embodiment is executed.
  • a computer program product, the computer program product includes computer program code, when the computer program code runs on a computer, the computer realizes the method in the above method embodiment.
  • a chip includes: a processor, the processor is coupled with a memory, the memory is used to store a program or an instruction, when the program or an instruction is executed by the processor, the device executes the above method embodiment Methods.
  • the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, which can implement or execute The methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory), for example Random-access memory (random-access memory, RAM).
  • the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
  • the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
  • the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital video disc (digital video disc, DVD for short)), or a semiconductor medium (for example, SSD).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present application provide a communication method, apparatus and system, for use in solving the problem of updating an access and mobility management function (AMF) key when an AMF change occurs. The method comprises: a first AMF determines a security characteristic of a terminal device and a key of a second AMF; an AMF determines a first ABBA parameter according to the security characteristic of the terminal device and a security characteristic of the first AMF; the first AMF determines a key of the first AMF according to the first ABBA parameter and the key of the second AMF.

Description

一种通信方法、装置及系统Communication method, device and system
相关申请的交叉引用Cross-references to related applications
本申请要求在2020年05月29日提交中国专利局、申请号为202010479818.1、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on May 29, 2020, with an application number of 202010479818.1, and the application title is "a communication method and device", the entire content of which is incorporated into this application by reference.
技术领域Technical field
本申请实施例涉及通信技术领域,尤其涉及一种通信方法、装置及系统。The embodiments of the present application relate to the field of communication technologies, and in particular, to a communication method, device, and system.
背景技术Background technique
在第五代(5th generation,5G)通信系统中,终端设备和网络功能所支持的安全特性在不断演进。高阶版本的终端设备,除了支持低阶版本的终端设备所支持的安全特性之外,还会支持新的、低阶版本终端设备不支持的安全特性。同理,高阶版本的网络功能,除了支持低阶版本的网络功能所支持的安全特性之外,还会支持新的、低阶版本网络功能不支持的安全特性。终端设备和网络功能在采用某个安全特性进行通信之前,双方需要进行安全特性协商,确保对方都支持该安全特性。如果一方不支持,则通信双方不能使用该安全特性。例如,高阶版本的终端设备同时支持使用256位密钥加密和128位密钥加密,而低阶版本的网络功能仅支持使用128位密钥加密,则终端设备和网络功能之间的通信仅能采用双方都支持的128位密钥进行加密。In the 5th generation (5G) communication system, the security features supported by terminal devices and network functions are constantly evolving. In addition to supporting the security features supported by the low-level version of the terminal device, the high-end version of the terminal device will also support the new and low-level version of the terminal device that does not support the security features. In the same way, in addition to supporting the security features supported by the low-level version of the network function, the high-level version of the network function will also support the new and low-level version of the network function that does not support the security features. Before terminal equipment and network functions use a certain security feature for communication, both parties need to negotiate security features to ensure that the other party supports the security feature. If one party does not support it, the two communicating parties cannot use the security feature. For example, the high-level version of the terminal device supports both 256-bit key encryption and 128-bit key encryption, while the low-level version of the network function only supports 128-bit key encryption, so the communication between the terminal device and the network function is only A 128-bit key supported by both parties can be used for encryption.
其中,第三代合作伙伴计划(the third generation partnership protect,3GPP)标准33.501,即5G系统安全架构和流程,在版本15(release 15,Rel-15)中定义了5G系统的安全需求,其中包括阻止降维攻击(bidding down attacks),又称为抗降维攻击。降维攻击是指一个攻击者使得终端设备或者网络功能各自认为对端不支持高阶版本的安全特性,而实际上终端设备和网络功能均支持高阶版本的安全特性。攻击成功后,终端设备和网络功能仅能采用低阶版本的安全特性进行通信,导致安全特性的降维,使得终端设备和网络功能之间的通信安全降级。Among them, the third generation partnership protection (3GPP) standard 33.501, which is the 5G system security architecture and process, defines the security requirements of the 5G system in version 15 (release 15, Rel-15), including Preventing dimensionality reduction attacks (bidding down attacks), also known as anti-dimensionality reduction attacks. A dimensionality reduction attack means that an attacker makes the terminal device or network function each think that the opposite end does not support the security features of the high-end version, but in fact both the terminal device and network function support the security features of the high-end version. After the attack is successful, the terminal device and the network function can only communicate with the low-level version of the security features, which leads to the reduction of the security features and degrades the communication security between the terminal device and the network function.
目前在一种场景中,当服务终端设备的网络功能发生变更,例如,由第一接入和移动管理功能(Access and Mobile Management Function,AMF)功能变更为第二AMF功能。由于第一AMF功能和第二AMF功能所支持的安全特性可能不同,此时如何对AMF密钥进行更新,是当前待解决的问题。At present, in a scenario, when the network function of the serving terminal device changes, for example, the first access and mobile management function (Access and Mobile Management Function, AMF) function is changed to the second AMF function. Since the security features supported by the first AMF function and the second AMF function may be different, how to update the AMF key at this time is a problem to be solved currently.
发明内容Summary of the invention
本申请实施例提供一种通信方法、装置及系统,以实现对接入和移动管理功能AMF密钥的更新。The embodiments of the present application provide a communication method, device, and system to realize the update of the access and mobility management function AMF key.
第一方面,提供一种通信方法,该方法中的第一AMF,还可以为配置于第一AMF中的部件(比如,芯片、电路或其它等),该方法包括:第一AMF确定终端设备的安全特性;第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一架构间 抗降维ABBA参数;第一AMF获取第二AMF的密钥;第一AMF根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。In a first aspect, a communication method is provided. The first AMF in the method may also be a component (such as a chip, a circuit, or others) configured in the first AMF. The method includes: the first AMF determines the terminal device The first AMF determines the anti-dimensionality reduction ABBA parameters between the first architectures according to the security characteristics of the terminal device and the security characteristics of the first AMF; the first AMF obtains the key of the second AMF; the first AMF Determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
在上述方法中,第一AMF可为Target AMF,第二AMF可为Old AMF,终端设备可以为UE。当UE注册的AMF,或者,服务于UE的AMF发生变更时,Target AMF可根据UE和Target AMF之间支持的安全特性,生成ABBA_New参数,并将ABBA_New作为输入参数生成新的K AMF密钥,供UE和Target AMF使用,从而保证UE和Target AMF之间的通信安全。 In the foregoing method, the first AMF may be a Target AMF, the second AMF may be an Old AMF, and the terminal device may be a UE. When the AMF registered by the UE or the AMF serving the UE is changed, the Target AMF can generate the ABBA_New parameter according to the security features supported between the UE and the Target AMF, and use ABBA_New as the input parameter to generate a new K AMF key, It is used by UE and Target AMF to ensure the safety of communication between UE and Target AMF.
在一种可能的设计中,所述第一AMF确定终端设备的安全特性,包括:所述第一AMF向所述第二AMF发送用于请求终端设备上下文的请求消息;所述第一AMF接收所述第二AMF发送的终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性。In a possible design, the first AMF determining the security feature of the terminal device includes: the first AMF sends a request message for requesting the context of the terminal device to the second AMF; the first AMF receives In the terminal device context sent by the second AMF, the terminal device context carries the security feature of the terminal device.
在上述方法中,第一AMF可与通过第二AMF与终端设备之间进行安全特性的协商,抗降维攻击。In the above method, the first AMF can negotiate security features with the second AMF and the terminal device to resist dimensionality reduction attacks.
在一种可能的设计中,所述第一AMF获取第二AMF的密钥,包括:第一AMF向第二AMF发送用于请求终端设备上下文的请求消息;第一AMF接收第二AMF发送的终端设备上下文,所述终端设备上下文中携带有第二AMF的密钥。In a possible design, obtaining the key of the second AMF by the first AMF includes: the first AMF sends a request message for requesting the context of the terminal device to the second AMF; the first AMF receives the key sent by the second AMF The terminal device context, the terminal device context carries the key of the second AMF.
在一种可能的设计中,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之前,所述方法还包括:所述第一AMF确定第二AMF的安全特性;所述第一AMF确定所述第一AMF的安全特性与所述第二AMF的安全特性不同。In a possible design, before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the method further includes: the first AMF The security feature of the second AMF is determined; the first AMF determines that the security feature of the first AMF is different from the security feature of the second AMF.
在上述方法中,当UE注册的两个AMF,或者服务于UE的两个AMF的安全特性不一致时,再更新AMF的密钥,否则不再更新AMF密钥,避免更新AMF密钥的开销浪费。In the above method, when the security features of the two AMFs registered by the UE or the two AMFs serving the UE are inconsistent, the AMF key is updated, otherwise the AMF key is no longer updated, so as to avoid the overhead waste of updating the AMF key .
在一种可能的设计中,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之后,所述方法还包括:所述第一AMF向所述终端设备发送所述第一ABBA参数以及第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥。In a possible design, after the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the method further includes: the first AMF Send the first ABBA parameter and first indication information to the terminal device, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
在上述方法中,上述第一指示信息是可选的。即第一AMF可只向终端设备发送第一ABBA参数。终端设备可根据第一ABBA参数,更新AMF密钥。进而根据AMF密钥,对两者间的通信进行保护,抗降维攻击。In the foregoing method, the foregoing first indication information is optional. That is, the first AMF may only send the first ABBA parameter to the terminal device. The terminal device can update the AMF key according to the first ABBA parameter. Furthermore, according to the AMF key, the communication between the two is protected to resist dimensionality reduction attacks.
第二方面,提供一种通信方法,该方法中的终端设备,还可以是终端设备中的部件(例如,芯片、电路或其它等),该方法包括:终端设备接收第一AMF发送的第一ABBA参数和可选的第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥;所述终端设备根据所述第一ABBA参数和第二AMF的密钥,确定所述第一AMF的密钥。In a second aspect, a communication method is provided. The terminal device in the method may also be a component in the terminal device (for example, a chip, a circuit, or other components). The method includes: the terminal device receives the first AMF sent by the first AMF. ABBA parameters and optional first indication information, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; the terminal device according to the first ABBA parameter and the second The key of the AMF determines the key of the first AMF.
在上述方法中,当终端设备的注册的AMF发生变更,或者,服务于终端设备的AMF发生变更时,终端设备可根据变更后AMF的安全特性,更新AMF的密钥,满足通信要求,抗降维攻击。In the above method, when the registered AMF of the terminal device is changed, or the AMF serving the terminal device is changed, the terminal device can update the AMF key according to the security characteristics of the changed AMF to meet the communication requirements and resist degradation. Dimensional attack.
在一种可能的设计中,所述第一ABBA参数包括所述终端设备的安全特性和所述第一AMF的安全特性。In a possible design, the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
在一种可能的设计中,所述方法还包括:所述终端设备向所述第一AMF发送注册请求,所述注册请求中携带有所述终端设备的安全特性或者第二ABBA参数。In a possible design, the method further includes: the terminal device sends a registration request to the first AMF, and the registration request carries the security feature of the terminal device or the second ABBA parameter.
第三方面,提供一种通信方法,该方法中的第一AMF和第二AMF,均可还是为AMF中的部件(例如,芯片,电路或其它等),包括:第二AMF向第一AMF发送终端设备的安全特性,以及所述第二AMF的密钥,所述第二ABBA参数中包括所述终端设备的安全特性以及所述第二AMF的安全特性;所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数;所述第一AMF根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。In a third aspect, a communication method is provided. In the method, both the first AMF and the second AMF can be components of the AMF (for example, a chip, a circuit, or other components), including: the second AMF communicates with the first AMF The security feature of the terminal device and the key of the second AMF are sent. The second ABBA parameter includes the security feature of the terminal device and the security feature of the second AMF; the first AMF is based on the The security feature of the terminal device and the security feature of the first AMF determine the first ABBA parameter; the first AMF determines the first AMF parameter according to the first ABBA parameter and the key of the second AMF Key.
在一种可能的设计中,所述第二AMF向第一AMF发送终端设备的安全特性,以及所述第二AMF的密钥,包括:所述第一AMF向所述第二AMF发送用于请求终端设备上下文的请求消息;所述第二AMF向所述第一AMF发送终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性以及所述第二AMF的密钥。In a possible design, the second AMF sending the security feature of the terminal device and the key of the second AMF to the first AMF includes: sending the first AMF to the second AMF for A request message for requesting a terminal device context; the second AMF sends a terminal device context to the first AMF, and the terminal device context carries the security feature of the terminal device and the key of the second AMF.
在一种可能的设计中,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的密钥,确定第一ABBA参数之前,所述方法还包括:所述第一AMF确定所述第二AMF的安全特性;所述第一AMF确定所述第一AMF与所述第二AMF的安全特性不同。In a possible design, before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the key of the first AMF, the method further includes: the first AMF The security feature of the second AMF is determined; the first AMF determines that the security features of the first AMF and the second AMF are different.
第四方面,提供一种装置,有益效果可参见第一方面的描述。所述通信装置具有实现上述第一方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述件或软件包括一个或多个与上述功能相对应的单元。In a fourth aspect, a device is provided. For beneficial effects, please refer to the description of the first aspect. The communication device has the function of realizing the behavior in the method embodiment of the first aspect described above. The functions can be implemented by corresponding hardware or software. The piece or software includes one or more units corresponding to the above-mentioned functions.
第五方面,提供一种装置,有益效果可参见第二方面的描述。所述通信装置具有实现上述第二方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述件或软件包括一个或多个与上述功能相对应的单元。In the fifth aspect, a device is provided, and the beneficial effects can be referred to the description of the second aspect. The communication device has the function of realizing the behavior in the method embodiment of the second aspect described above. The functions can be implemented by corresponding hardware or software. The piece or software includes one or more units corresponding to the above-mentioned functions.
第六方面,提供了一种装置,该装置可以为上述方法实施例中的第一AMF,或者为设置在第一AMF中的芯片。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使通信装置执行上述各方面中由第一AMF所执行的方法。In a sixth aspect, a device is provided, and the device may be the first AMF in the foregoing method embodiment, or a chip set in the first AMF. The device includes a communication interface, a processor, and optionally, a memory. The memory is used to store a computer program or instruction, and the processor is coupled with the memory and a communication interface. When the processor executes the computer program or instruction, the communication device executes the method executed by the first AMF in the above aspects.
第七方面,提供了一种装置,该装置可以为上述方法实施例中的终端设备,或者为设置在终端设备中的芯片。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使通信装置执行上述各方面中由终端设备所执行的方法。In a seventh aspect, a device is provided, and the device may be the terminal device in the foregoing method embodiment, or a chip set in the terminal device. The device includes a communication interface, a processor, and optionally, a memory. Wherein, the memory is used to store a computer program or instruction, and the processor is coupled with the memory and a communication interface. When the processor executes the computer program or instruction, the communication device executes the method executed by the terminal device in the foregoing aspects.
第八方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述各方面中由第一AMF或终端设备执行的方法被执行。In an eighth aspect, a computer program product is provided, the computer program product comprising: computer program code, when the computer program code is running, causes the method executed by the first AMF or the terminal device in the above aspects to be executed .
第九方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述各方面的方法中第一AMF或终端设备的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。In a ninth aspect, the present application provides a chip system, which includes a processor, configured to implement the functions of the first AMF or terminal device in the methods of the foregoing aspects. In a possible design, the chip system further includes a memory for storing program instructions and/or data. The chip system can be composed of chips, and can also include chips and other discrete devices.
第十方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述各方面中由第一AMF或终端设备执行的方法。In a tenth aspect, the present application provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method executed by the first AMF or the terminal device in the above aspects is implemented .
第十一方面,本申请提供了一种系统,包括上述各方面所述的第一AMF、第二AMF或终端设备中的至少一个。In an eleventh aspect, this application provides a system including at least one of the first AMF, the second AMF, or the terminal device described in the foregoing aspects.
附图说明Description of the drawings
图1为本申请实施例提供的使用ABBA抗降维攻击的一流程图;FIG. 1 is a flowchart of using ABBA to resist dimensionality reduction attacks according to an embodiment of this application;
图2a为本申请实施例提供的UE空闲态移动的安全处理的一流程图;FIG. 2a is a flowchart of the security processing of the UE moving in an idle state according to an embodiment of this application;
图2b和图2c为本申请实施例提供的不同场景的示意图;2b and 2c are schematic diagrams of different scenarios provided by an embodiment of the application;
图3为本申请实施例提供的N2切换的安全处理的一流程图;FIG. 3 is a flowchart of the security processing of N2 handover provided by an embodiment of this application;
图4为本申请实施例提供的UE从EPS切换到5GS的N2切换的安全处理的一流程图;FIG. 4 is a flowchart of the security processing of the N2 handover of the UE from EPS handover to 5GS provided by an embodiment of the application;
图5为本申请实施例提供的UE从EPS空闲态移动到5GS的安全处理的一流程图;FIG. 5 is a flowchart of the security processing of UE moving from EPS idle state to 5GS according to an embodiment of this application;
图6为本申请实施例提供的网络架构的一示意图;FIG. 6 is a schematic diagram of a network architecture provided by an embodiment of this application;
图7a和图7b为本申请实施例提供的通信方法的流程图;Figures 7a and 7b are flowcharts of communication methods provided by embodiments of this application;
图8a为本申请实施例一提供的通信方法的一流程图;FIG. 8a is a flowchart of a communication method provided in Embodiment 1 of this application;
图8b为本申请实施例提供的UE在5GS中空闲态移动注册中的安全特性协商和密钥更新流程的一流程图;FIG. 8b is a flowchart of the security feature negotiation and key update process in the idle state mobile registration of the UE in 5GS according to an embodiment of the application;
图9为本申请实施例提供的UE在N2切换中的安全特性协商和密钥更新的一流程图;FIG. 9 is a flowchart of the security feature negotiation and key update of the UE in the N2 handover provided by the embodiment of this application;
图10为本申请实施例提供的UE从EPS切换到5GS中的安全特性协商和密钥更新的一流程图;10 is a flowchart of security feature negotiation and key update in UE handover from EPS to 5GS according to an embodiment of this application;
图11为本申请实施例提供的UE空闲态从EPS移动到5GS中的安全特性协商和密钥更新的一流程图;FIG. 11 is a flowchart of security feature negotiation and key update of UE moving from EPS to 5GS in idle state according to an embodiment of this application;
图12为本申请实施例二提供的通信方法的一流程图;FIG. 12 is a flowchart of the communication method provided in the second embodiment of this application;
图13为本申请实施例提供的UE在5GS中空闲态从Old AMF移动到Target AMF的一流程图;FIG. 13 is a flowchart of a UE moving from Old AMF to Target AMF in an idle state in 5GS according to an embodiment of the application;
图14为本申请实施例三提供的通信方法的一流程图;FIG. 14 is a flowchart of the communication method provided in the third embodiment of this application;
图15为本申请实施例提供的UE在5G的空闲态移动的一流程图;FIG. 15 is a flowchart of a UE moving in an idle state of 5G according to an embodiment of this application;
图16为本申请实施例四提供的通信方法的一流程图;FIG. 16 is a flowchart of the communication method provided by the fourth embodiment of this application;
图17为本申请实施例提供的UE在5G的空闲态移动的一流程图;FIG. 17 is a flowchart of a UE moving in an idle state of 5G according to an embodiment of this application;
图18和图19为本申请实施例四提供的通信方法的一流程图;18 and 19 are a flowchart of the communication method provided by the fourth embodiment of this application;
图20为本申请实施例提供的通信方法的一流程图;FIG. 20 is a flowchart of a communication method provided by an embodiment of this application;
图21为本申请实施例提供的UE在5GS的空闲态移动注册的流程图;FIG. 21 is a flowchart of UE mobile registration in 5GS idle state according to an embodiment of the application;
图22为本申请实施例提供的UE的N2切换流程的一流程图;FIG. 22 is a flowchart of a UE's N2 handover process provided by an embodiment of this application;
图23和图24为本申请实施例七提供的通信方法的一流程图;FIG. 23 and FIG. 24 are a flowchart of the communication method provided in the seventh embodiment of this application;
图25为本申请实施例提供的UE的N2切换的一流程图;FIG. 25 is a flowchart of the N2 handover of the UE according to an embodiment of this application;
图26为本申请实施例提供的通信装置的一示意图;FIG. 26 is a schematic diagram of a communication device provided by an embodiment of this application;
图27为本申请实施例提供的通信装置的另一示意图。FIG. 27 is another schematic diagram of a communication device provided by an embodiment of this application.
具体实施方式Detailed ways
为了便于理解,首先对本申请实施例中涉及的通信名词或术语进行解释说明,该通信名词或术词也作为发明内容的一部分。In order to facilitate understanding, the communication terms or terms involved in the embodiments of the present application are explained first, and the communication terms or terms are also part of the content of the invention.
1、架构间抗降维(anti-bidding down between architectures,ABBA)参数。1. Anti-bidding down between architectures (ABBA) parameters.
3GPP标准33.501的版本15(release 15,Rel-15)是5G通信系统架构和流程安全的第一个版本。随着5G通信系统架构和流程安全的不断演进,未来会演进到高阶版本。例 如,版本16(release 16,Rel-16)和版本17(release 17,Rel-17)等。为了阻止未来出现降维攻击,33.501的版本15中定义了ABBA参数,ABBA参数可包括:Rel-15 (release 15, Rel-15) of 3GPP standard 33.501 is the first version of 5G communication system architecture and process security. With the continuous evolution of 5G communication system architecture and process security, it will evolve to a high-end version in the future. For example, version 16 (release 16, Rel-16) and version 17 (release 17, Rel-17), etc. In order to prevent dimensionality reduction attacks in the future, the ABBA parameters are defined in version 15 of 33.501. ABBA parameters can include:
(1)UE支持的安全特性;(1) Security features supported by UE;
(2)网络功能支持的安全特性,或者,网络功能所选择的安全特性;(2) The security features supported by the network function, or the security features selected by the network function;
(3)可选的,其它;(3) Optional, others;
在一种可能的实现方式中,ABBA参数中有16位可用于表示UE支持的安全特性,有16位表示网络设备所支持或选择的安全特性。In a possible implementation, 16 bits in the ABBA parameter can be used to indicate the security features supported by the UE, and 16 bits indicate the security features supported or selected by the network device.
在本申请实施例中,为了便于区分,可将UE注册到Old AMF(Access and Mobile Management Function,接入和移动管理功能)时,网络侧设置的ABBA,称为ABBA_Old。该ABBA_Old中可包括Old AMF所支持或选择的安全特性,以及UE所支持的安全特性。可将UE注册到Target AMF时,网络侧设置的ABBA,称为ABBA_New。该ABBA_New中可包括Target AMF所支持或选择的安全特性,以及UE所支持的安全特性。在本申请中,Old AMF为UE在空闲态移动之前或者N2切换之前,服务UE的AMF,Target AMF为UE在空闲态移动之后或者N2切换后,服务UE的AMF;即服务UE的AMF发生变更,从Old AMF变更到Target AMF。In the embodiments of the present application, in order to facilitate the distinction, when the UE is registered with Old AMF (Access and Mobile Management Function, access and mobility management function), the ABBA set on the network side is called ABBA_Old. The ABBA_Old may include the security features supported or selected by Old AMF and the security features supported by the UE. When the UE can be registered to Target AMF, the ABBA set on the network side is called ABBA_New. The ABBA_New may include the security features supported or selected by the Target AMF and the security features supported by the UE. In this application, Old AMF is the AMF that serves the UE before the UE moves in the idle state or before the N2 handover, and Target AMF is the AMF that serves the UE after the UE moves in the idle state or after the N2 handover; that is, the AMF that serves the UE changes , Change from Old AMF to Target AMF.
在本申请中,Target AMF还为UE从EPS空闲态移动到5GS之后或者从EPS切换到5GS之后,服务UE的AMF。In this application, Target AMF also serves the AMF of the UE after the UE moves from the EPS idle state to 5GS or after switching from the EPS to 5GS.
2、安全特性2. Security features
由于当前标准33.501发布了Rel-15。因此,在5G通信系统中,UE和网络功能都是支持Rel-15版本。未来的5G通信系统,可能存在多个版本并存的情况。比如,部分UE支持Rel-15,部分UE支持post Rel-15(即Rel-15之后的版本)。部分基站支持Rel-15,部分基站支持post Rel-15等。在未来的5G通信系统中,UE在注册前,UE和网络设备都不知道对方的版本,也即不知道对方支持的安全特性。因此,UE和网络设备间需要进行安全特性的协商。在本申请实施例中,将Rel-16、Rel-17等,统称为post Rel-15。Rel-15 was released due to the current standard 33.501. Therefore, in the 5G communication system, both the UE and network functions support the Rel-15 version. In the future 5G communication system, multiple versions may coexist. For example, some UEs support Rel-15, and some UEs support post Rel-15 (that is, versions after Rel-15). Some base stations support Rel-15, and some base stations support post Rel-15. In the future 5G communication system, before the UE is registered, neither the UE nor the network device knows the version of the other party, that is, they do not know the security features supported by the other party. Therefore, the security feature needs to be negotiated between the UE and the network equipment. In the embodiments of the present application, Rel-16, Rel-17, etc., are collectively referred to as post Rel-15.
需要说明的是,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。It should be noted that in the description of this application, unless otherwise specified, "/" means that the associated objects before and after are in an "or" relationship, for example, A/B can mean A or B; in this application, " "And/or" is just an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. , Where A and B can be singular or plural. Also, in the description of this application, unless otherwise specified, "plurality" means two or more than two. "The following at least one item (a)" or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a). For example, at least one of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple . In addition, in order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same items or similar items with substantially the same function and effect. Those skilled in the art can understand that the words "first", "second" and the like do not limit the quantity and order of execution, and the words "first" and "second" do not limit the difference.
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。In addition, the network architecture and business scenarios described in the embodiments of this application are intended to illustrate the technical solutions of the embodiments of this application more clearly, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. Those of ordinary skill in the art will know that With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
图1示出了标准33.501中使用ABBA抗降维攻击的具体流程,包括:Figure 1 shows the specific process of using ABBA to resist dimensionality reduction attacks in standard 33.501, including:
步骤101,UE向AMF发送注册请求(registration request,RR)消息,所述RR消息中携带有UE支持的安全特性。可选的,所述RR消息有可能是没有保护的,所以攻击者可能篡改UE支持的安全特性,使得网络侧认为UE支持低版本的安全特性,造成降维攻击。Step 101: The UE sends a registration request (registration request, RR) message to the AMF, where the RR message carries security features supported by the UE. Optionally, the RR message may be unprotected, so the attacker may tamper with the security features supported by the UE, so that the network side thinks that the UE supports low-version security features, causing a dimensionality reduction attack.
步骤102,SEAF(Security Anchor Function,安全锚点功能)决定发起主认证。其中,AMF与SEAF是合设的,可看做一个网络功能(network fuction,NF)。Step 102: SEAF (Security Anchor Function) decides to initiate a master authentication. Among them, AMF and SEAF are co-located, which can be regarded as a network function (network fuction, NF).
步骤103,SEAF向认证服务功能(AUthentication Server Function,AUSF)发送认证服务请求。例如,认证服务请求可以为Nausf_UE Authentication_Authenticate Request。AUSF向SEAF返回认证服务响应。例如,认证服务响应可以为Nausf_UE Authentication_Authenticate Response。Step 103: The SEAF sends an authentication service request to an authentication service function (AUthentication Server Function, AUSF). For example, the authentication service request may be Nausf_UEAuthentication_Authenticate Request. AUSF returns an authentication service response to SEAF. For example, the authentication service response may be Nausf_UEAuthentication_AuthenticateResponse.
步骤104,SEAF可根据上述步骤101发送的UE支持的安全特性以及AMF所支持或选择的安全特性,设置架构间抗降维(anti-bidding down between architectures,ABBA)参数。In step 104, the SEAF may set the inter-architecture anti-bidding down between architectures (ABBA) parameters according to the security features supported by the UE and the security features supported or selected by the AMF sent in step 101.
步骤105,SEAF通过AMF向UE发送认证请求。例如,该认证请求可以为authentication request。该认证请求中包括ABBA参数。Step 105: The SEAF sends an authentication request to the UE through the AMF. For example, the authentication request may be an authentication request. The authentication request includes ABBA parameters.
其中,UE在上述步骤105中接收到认证请求之后,可获取ABBA参数。根据ABBA参数,可确定AMF所支持或选择的安全特性。但是由于上述步骤105中的认证请求没有被保护,攻击者仍然可能篡改ABBA参数。因此,需要后续的认证流程检查ABBA参数是否被篡改。Wherein, after the UE receives the authentication request in step 105, it can obtain ABBA parameters. According to ABBA parameters, the security features supported or selected by AMF can be determined. However, since the authentication request in step 105 is not protected, the attacker may still tamper with the ABBA parameters. Therefore, a follow-up authentication process is required to check whether the ABBA parameters have been tampered with.
步骤106,UE通过AMF向SEAF返回认证响应。例如,认证响应可以为authentication response。Step 106: The UE returns an authentication response to the SEAF through AMF. For example, the authentication response may be authentication response.
步骤107,SEAF向AUSF发送认证服务请求。例如,该认证服务请求可以是Nausf_UE Authentication_Authenticate request。Step 107: SEAF sends an authentication service request to AUSF. For example, the authentication service request may be Nausf_UEAuthentication_Authenticate request.
步骤108,AUSF向SEAF返回认证服务响应。例如,该认证服务响应可以为Nausf_UE Authentication_Authenticage response。该认证服务响应中可包括SEAF密钥,即K SEAFStep 108, AUSF returns an authentication service response to SEAF. For example, the authentication service response may be Nausf_UE Authentication_Authenticage response. The authentication service response may include the SEAF key, that is, K SEAF .
步骤109,SEAF可根据上述步骤104所设置的ABBA参数以及上述步骤108中携带的K SEAF,生成K AMF。且SEAF将K AMF发送给AMF。 In step 109, the SEAF may generate K AMF according to the ABBA parameters set in the above step 104 and the K SEAF carried in the above step 108. And SEAF sends K AMF to AMF.
步骤1010,AMF根据收到的K AMF,生成非接入层(non-access-stratum,NAS)完整性密钥K NASint和NAS加密密钥K NASencIn step 1010, the AMF generates a non-access-stratum (non-access-stratum, NAS) integrity key K NASint and a NAS encryption key K NASenc according to the received K AMF .
步骤1011,AMF向UE发送NAS安全模式命令(security mode command,SMC),NAS SMC中携带有ABBA参数,NAS SMC采用K NASint进行完整性保护。 In step 1011, the AMF sends a NAS security mode command (SMC) to the UE. The NAS SMC carries the ABBA parameter, and the NAS SMC uses K NASint for integrity protection.
步骤1012,由于上述NAS SMC仅进行完整性保护,并没有进行加密保护。因此可认为上述ABBA参数是明文传输的。UE在接收到NAS SMC之后,可获取ABBA参数。UE可根据上述ABBA和K SEAF,生成K AMF密钥。进一步,根据K AMF密钥,生成K NASint和K NASenc。并使用K NASint验证上述NAS SMC的完整性。如果验证成功,说明ABBA没有被篡改。UE根据ABBA未被篡改可确定:UE发送给网络侧的UE支持的安全特性未被篡改;网络侧发送给UE的网络侧支持的或者选择的安全特性也未被篡改。在上述步骤1012之前,还可包括:UE生成K SEAF。UE生成K SEAF可在UE接收到认证请求(即步骤105)之后的任意时刻。 Step 1012, since the above-mentioned NAS SMC only performs integrity protection, it does not perform encryption protection. Therefore, it can be considered that the above ABBA parameters are transmitted in plain text. After receiving the NAS SMC, the UE can obtain ABBA parameters. The UE can generate the K AMF key according to the above ABBA and K SEAF. Further, according to the K AMF key, K NASint and K NASenc are generated. And use K NASint to verify the integrity of the above-mentioned NAS SMC. If the verification is successful, the ABBA has not been tampered with. According to the fact that the ABBA has not been tampered with, the UE can determine that the security features supported by the UE sent by the UE to the network side have not been tampered with; the security features supported or selected by the network side sent by the network side to the UE have not been tampered with either. Before step 1012, the method may further include: UE generating K SEAF . The UE can generate the K SEAF at any time after the UE receives the authentication request (that is, step 105).
步骤1013,UE验证NAS SMC成功之后,可向AMF发送NAS安全模式完成(security  mode complete,SMP)消息。上述NAS SMP消息采用K NASenc进行加密,采用K NASint进行完整性保护。 Step 1013: After successfully verifying the NAS SMC, the UE may send a NAS security mode complete (SMP) message to the AMF. The above-mentioned NAS SMP message is encrypted by K NASenc , and K NASint is used for integrity protection.
其中,AMF在接收到NAS SMP之后,可采用K NASint对NAS SMF进行完整性验证,采用K NASenc对NAS SMP进行解密。两者的先后顺序,不作限定。如果验证成功,则网络侧可以确认:网络侧接收到的UE支持的安全特性没有被篡改,UE接收到的ABBA参数没有被篡改。 Among them, after the AMF receives the NAS SMP, it can use K NASint to verify the integrity of the NAS SMF, and use K NASenc to decrypt the NAS SMP. The order of the two is not limited. If the verification is successful, the network side can confirm that the security features supported by the UE received by the network side have not been tampered with, and the ABBA parameters received by the UE have not been tampered with.
可选的,如果UE在上述步骤1012中对NAS SMC的完整性验证失败,则说明ABBA参数可能被篡改。因此,上述步骤1013可替换为:UE向AMF发送NAS安全模式拒绝消息。AMF在接收到NAS安全模式拒绝消息之后,AMF终止注册流程。Optionally, if the UE fails to verify the integrity of the NAS SMC in step 1012, it means that the ABBA parameters may be tampered with. Therefore, the above step 1013 can be replaced by: the UE sends a NAS security mode rejection message to the AMF. After the AMF receives the NAS security mode rejection message, the AMF terminates the registration process.
通过上述流程:UE和网络侧之间进行了安全特性的协商,并将ABBA作为参数之一生成K AMF密钥,进一步根据K AMF密钥,生成NAS完整性密钥和加密密钥。如果发生降维攻击(UE和/或网络设备侧发送的安全特性被篡改),则UE和网络设备能检测到该篡改,并终止流程。 Through the above process: the UE and the network side have negotiated security features, and use ABBA as one of the parameters to generate the K AMF key, and further generate the NAS integrity key and the encryption key according to the K AMF key. If a dimensionality reduction attack occurs (the security feature sent by the UE and/or the network device is tampered with), the UE and the network device can detect the tampering and terminate the process.
进一步,通过上述图1的流程可以看出,在上述抗降维攻击的过程中,UE和SEAF分别根据ABBA参数,生成K AMF密钥。进一步,根据K AMF密钥,生成NAS完整性密钥和加密密钥。之后,UE利用完NAS整性密钥对NAS SMC进行验证。如果验证成功,UE可确定UE发送给网络侧的UE支持的安全特性未被篡改。网络侧发送给UE的网络侧支持或选择的安全特性也未被篡改。SEAF可利用完整性密钥和/加密密钥对NAS SMP进行验证。如果验证成功,SEAF可确定网络侧发送给UE的网络侧支持的安全特性未被篡改,UE发送给网络侧的UE支持的安全特性也未被篡改。 Furthermore, it can be seen from the above-mentioned process of FIG. 1 that in the above-mentioned anti-dimensionality reduction attack process, the UE and the SEAF respectively generate the K AMF key according to the ABBA parameters. Further, according to the K AMF key, a NAS integrity key and an encryption key are generated. After that, the UE uses the NAS integrity key to verify the NAS SMC. If the verification is successful, the UE can determine that the security features supported by the UE sent by the UE to the network side have not been tampered with. The security features supported or selected by the network side sent to the UE by the network side have not been tampered with either. SEAF can use the integrity key and/or encryption key to verify the NAS SMP. If the verification is successful, the SEAF can determine that the security features supported by the network side sent by the network side to the UE have not been tampered with, and the security features supported by the UE sent by the UE to the network side have not been tampered with either.
针对上述提供一种场景,当发生AMF变化时,比如,UE空闲态移动,服务UE的AMF从老的AMF(Old AMF)变成目标AMF(Target AMF),或者,发生N2切换,服务UE的AMF从Old AMF变成Target AMF,可能会存在Old AMF的安全特性与Target AMF的安全特性不同。此时,如何对上述K AMF密钥进行更新,是本申请实施例待解决的问题。 To provide a scenario for the above, when an AMF change occurs, for example, the UE moves in an idle state, the AMF serving the UE changes from the old AMF (Old AMF) to the target AMF (Target AMF), or N2 handover occurs, and the UE serving the UE AMF changes from Old AMF to Target AMF, and there may be differences between the security features of Old AMF and Target AMF. At this time, how to update the above-mentioned K AMF key is a problem to be solved in the embodiment of this application.
如图2a至图5所示,提供服务UE的AMF由Old AMF变到Target AMF、或者服务UE的网络功能从MME变成Target AMF的几种可能情形,以及每种情形下可能出现的问题。As shown in Figures 2a to 5, there are several possible scenarios in which the AMF serving UE changes from Old AMF to Target AMF, or the network function serving UE changes from MME to Target AMF, and the problems that may arise in each scenario.
图2a示出了标准33.501中定义的UE的5GS空闲态移动的安全处理的具体流程,该流程包括:Figure 2a shows the specific flow of the security processing of the UE's 5GS idle state mobility defined in the standard 33.501, and the flow includes:
步骤201,UE注册到Old AMF。其中,Old AMF和UE之间建立安全上下文。Old AMF可为UE分配一个5G全球唯一临时身份(globally unique temporary UE identity,5G-GUTI)。Step 201: The UE registers with Old AMF. Among them, a security context is established between the Old AMF and the UE. Old AMF can assign a 5G global unique temporary UE identity (5G-GUTI) to the UE.
步骤202,UE在空闲态发生移动。例如,UE移动到Target AMF的注册域(reregistration area,RA)。In step 202, the UE moves in an idle state. For example, the UE moves to the registration area (reregistration area, RA) of Target AMF.
步骤203,UE向Target AMF发送注册请求(registration request,RR)消息,所述RR消息中可能携带有UE的5G-GUTI。Step 203: The UE sends a registration request (registration request, RR) message to the Target AMF, and the RR message may carry the 5G-GUTI of the UE.
步骤204,如果RR中有5G-GUTI,则Target AMF根据5G-GUTI,确定Old AMF,并向Old AMF请求UE的安全上下文。例如,Target AMF可向Old AMF发送UE的安全上下文转移请求(Namf_communication_UEContextTransfer Request)消息。Step 204: If there is a 5G-GUTI in the RR, the Target AMF determines the Old AMF according to the 5G-GUTI, and requests the UE's security context from the Old AMF. For example, the Target AMF may send the UE's Security Context Transfer Request (Namf_communication_UEContextTransfer Request) message to the Old AMF.
步骤205,Old AMF向目标AMF发送UE的安全上下文,UE的安全上下文中包括AMF密钥,即K AMF。例如,Old AMF可向Target AMF发送UE上下文转移响应 (Namf_Communication_UEContextTransfer Response)消息,该UE上下文转移响应消息中可携带有UE的安全上下文。 Step 205: The Old AMF sends the security context of the UE to the target AMF, and the security context of the UE includes the AMF key, that is, K AMF . For example, the Old AMF may send a UE context transfer response (Namf_Communication_UEContextTransfer Response) message to the Target AMF, and the UE context transfer response message may carry the security context of the UE.
步骤206,Target AMF根据本地策略,可以选择使用接收到的UE的安全上下文,即使用接收到的AMF密钥(即K AMF),根据接收到的AMF密钥,生成NAS加密和完整性密钥,对UE和目标AMF之间的通信进行保护。或者,Target AMF可根据本地策略,选择不使用接收到的安全上下文,发起认证流程。 Step 206, Target AMF can choose to use the received UE’s security context according to the local policy, that is, use the received AMF key (ie K AMF ), and generate NAS encryption and integrity keys based on the received AMF key. , To protect the communication between the UE and the target AMF. Alternatively, Target AMF may choose not to use the received security context according to local policies and initiate the authentication process.
在UE空闲态移动注册的过程中,可能会发生降维攻击。如图2b所示,考虑以下场景1:UE支持post Rel-15的安全特性,Old AMF支持Rel-15的安全特性,Target AMF支持post Rel-15的安全特性。In the process of UE mobile registration in idle state, dimensionality reduction attacks may occur. As shown in Figure 2b, consider the following scenario 1: UE supports post Rel-15 security features, Old AMF supports Rel-15 security features, Target AMF supports post Rel-15 security features.
当UE注册到Old AMF,Old AMF服务UE的期间,UE和Old AMF使用的安全特性,只能是Rel-15的。在AMF密钥推导时,使用的ABBA参数(称为ABBA_Old)中包括:UE的安全特性(为post Rel-15的安全特性)、Old AMF的安全特性(为Rel-15的安全特性)。When the UE is registered with the Old AMF and the Old AMF serves the UE, the security features used by the UE and the Old AMF can only be Rel-15. In the derivation of the AMF key, the ABBA parameters (called ABBA_Old) used include: UE security features (post Rel-15 security features), Old AMF security features (rel-15 security features).
UE空闲态移动,并注册到Target AMF。UE和Target AMF同时支持post Rel-15的安全特性。按照现有流程,如果Target AMF决定使用Old AMF发送的安全上下文,则Target AMF不会与UE协商安全特性。存在以下问题:The UE moves in an idle state and is registered with Target AMF. The UE and Target AMF support the security features of post Rel-15 at the same time. According to the existing process, if the Target AMF decides to use the security context sent by the Old AMF, the Target AMF will not negotiate the security features with the UE. The following problems exist:
1)Target AMF和UE不知道对方支持的安全特性。UE和Target AMF使用Rel-15的安全特性。而实际上,UE和Target AMF同时支持post Rel-15的特性,这样就发生了安全特性降维。1) Target AMF and UE do not know the security features supported by each other. The UE and Target AMF use the security features of Rel-15. In fact, the UE and Target AMF support the post Rel-15 feature at the same time, so that security feature reduction occurs.
2)此时的ABBA也应该更新为,包括:UE支持的安全特性(为post Rel-15的安全特性)、Target AMF支持的安全特性(为Post Rel-15的安全特性)。进一步,需要采用更新后的ABBA(称为ABBA_new)作为新的参数生成K AMF密钥。然而在上核述图2a的流程中,当Target AMF决定使用Old AMF发送的安全上下文时,其中的AMF密钥仍然是由ABBA_Old生成的。 2) The ABBA at this time should also be updated to include: the security features supported by the UE (the security features of post Rel-15) and the security features supported by the Target AMF (the security features of Post Rel-15). Further, it is necessary to use the updated ABBA (called ABBA_new) as a new parameter to generate the K AMF key. However, in the above process of Figure 2a, when Target AMF decides to use the security context sent by Old AMF, the AMF key in it is still generated by ABBA_Old.
因此,在上述场景1中,需要解决以下问题:当UE在空闲态移动中,UE和网络侧如何进行安全特性协商,生成新的ABBA(称为ABBA_New),并采用ABBA_New生成AMF密钥。Therefore, in the above scenario 1, the following problem needs to be solved: when the UE is moving in an idle state, how the UE and the network side negotiate security features, generate a new ABBA (referred to as ABBA_New), and use ABBA_New to generate the AMF key.
如图2c所示,考虑以下场景2c:Old AMF和UE同时支持post Rel-15安全特性,Target AMF支持Rel-15安全特性,如下图所示。As shown in Figure 2c, consider the following scenario 2c: Old AMF and UE support post Rel-15 security features at the same time, Target AMF supports Rel-15 security features, as shown in the following figure.
UE在注册到Old AMF,Old AMF服务UE期间,Old AMF和UE使用post Rel-15安全特性。当UE空闲态移动注册到Target AMF之后,Target AMF和UE之间没有进行安全特性协商,Target AMF和UE不知道对方所支持的安全特性。UE仍然采用post Rel-15的安全特性,而Target AMF并不支持post Rel-15的安全特性,会导致UE和Target AMF之间的通信失败。在该场景下,同样需要解决:在UE的空闲态移动时,UE和网络侧如何进行安全特性协商,生成新的ABBA(称为ABBA_new),并采用ABBA_new生成密钥等问题。When the UE is registered with Old AMF, and the Old AMF serves the UE, the Old AMF and the UE use the post Rel-15 security feature. After the UE is registered to the Target AMF in the idle state, there is no security feature negotiation between the Target AMF and the UE, and the Target AMF and the UE do not know the security features supported by each other. The UE still uses the security features of post Rel-15, and Target AMF does not support the security features of post Rel-15, which will cause the communication between the UE and the Target AMF to fail. In this scenario, the same needs to be solved: when the UE is moving in an idle state, how the UE and the network side negotiate security features, generate a new ABBA (referred to as ABBA_new), and use ABBA_new to generate a key.
图3示出了标准33.501中定义的N2切换的安全处理的具体流程,该流程包括:Figure 3 shows the specific flow of the security processing of N2 handover defined in the standard 33.501, which includes:
步骤301,UE注册到Old AMF,UE和Old AMF之间建立安全上下文。In step 301, the UE registers with the Old AMF, and a security context is established between the UE and the Old AMF.
步骤302,Old AMF发起N2切换。Step 302: Old AMF initiates N2 handover.
步骤303,Old AMF向Target AMF发送创建上下文请求,所述创建上下文请求中携带 有UE安全上下文,UE安全上下文中包括AMF密钥。例如,该创建上下文请求可以为Namf_Communication_CreateUEContext Request。Step 303: The Old AMF sends a context creation request to the Target AMF. The context creation request carries the UE security context, and the UE security context includes the AMF key. For example, the context creation request may be Namf_Communication_CreateUEContext Request.
步骤304,其它N2切换中的流程。Step 304, other processes in N2 handover.
步骤305,UE发起注册请求。例如,UE可以向Target AMF发送RR消息。Step 305: The UE initiates a registration request. For example, the UE may send an RR message to Target AMF.
步骤306,Target AMF,根据本次策略,可以选择使用接收到的UE安全上下文;或者,根据本地策略,也可以选择不使用接收到的UE安全上下文,而是发起认证流程。In step 306, Target AMF can choose to use the received UE security context according to the current policy; or, according to the local policy, it can also choose not to use the received UE security context and initiate an authentication process.
同样考虑上述场景1,UE和Target AMF支持post Rel-15安全特性,Old AMF支持Rel-15安全特性。当UE从Old AMF切换到Target AMF时,Target AMF和UE并不知道对方支持的安全特性,可能会导致安全特性降维。同样需要解决上述场景1的技术问题。Also considering the above scenario 1, the UE and Target AMF support the post Rel-15 security feature, and the Old AMF supports the Rel-15 security feature. When the UE switches from the Old AMF to the Target AMF, the Target AMF and the UE do not know the security features supported by the other party, which may lead to a reduction in the security features. It is also necessary to solve the technical problem of scenario 1 above.
同样考虑上述场景2,UE和Old AMF支持post Rel-15安全特性,Target AMF支持Rel-15安全特性。当UE从Old AMF切换到Target AMF时,Target AMF没有跟UE进行安全特性协商,Target AMF和UE不知道对方支持的安全特征,UE用Post Rel-15安全特性,Target AMF使用Rel-15安全特性,导致UE和Target AMF的通信失败。同样需要解决上述场景2中的技术问题。Also consider the above scenario 2, UE and Old AMF support post Rel-15 security feature, Target AMF supports Rel-15 security feature. When the UE switches from Old AMF to Target AMF, Target AMF does not negotiate security features with UE, Target AMF and UE do not know the security features supported by each other, UE uses Post Rel-15 security features, Target AMF uses Rel-15 security features , Causing the communication between the UE and the Target AMF to fail. It is also necessary to solve the technical problems in Scenario 2 above.
图4示出了标准33.501中定义的UE从演进分组系统(evolved packet system,EPS)(即4G系统)切换到5G系统(5G system,5GS)的N26切换的安全处理流程,该流程包括:Figure 4 shows the security processing flow of the N26 handover of UE from an evolved packet system (evolved packet system, EPS) (ie 4G system) to a 5G system (5G system, 5GS) defined in the standard 33.501, which includes:
步骤400,UE注册到移动管理实体(mobility management entity,MME)。Step 400: The UE registers with a mobility management entity (MME).
步骤401,MME决定发起N26切换。Step 401: MME decides to initiate N26 handover.
步骤402,MME向Target AMF发送转发重定位请求。例如,该转发重定位请求可以为Forward Relocation Request。该转发重定位请求中包括UE的EPS安全上下文,该UE的EPS安全上下文中包括MME密钥K ASMEStep 402: The MME sends a forwarding relocation request to the Target AMF. For example, the forwarding relocation request may be Forward Relocation Request. The forwarding relocation request includes the EPS security context of the UE, and the EPS security context of the UE includes the MME key K ASME .
步骤403,Target AMF根据接收到的UE的EPS安全上下文,创建5G安全上下文。所述5G安全上下文中的AMF密钥即K AMF是根据密钥K ASME所生成的。可选的,Target AMF可根据生成的AMF密钥K AMF以及选择的5G安全算法,生成NAS加密密钥和完整性密钥。 Step 403: Target AMF creates a 5G security context according to the received EPS security context of the UE. The AMF key in the 5G security context, namely K AMF, is generated according to the key K ASME. Optionally, Target AMF can generate a NAS encryption key and an integrity key according to the generated AMF key K AMF and the selected 5G security algorithm.
步骤404,Target AMF向MME发送转发重定位响应。例如,转发重定位响应可以为Forward Relocation Response。该转发重定位响应中包括NAS容器(NAS container,NASC)。该NASC中包括生成创建5G安全上下文所需的安全参数,例如,5G安全算法等。Step 404: The Target AMF sends a forwarding relocation response to the MME. For example, the forwarding relocation response may be Forward Relocation Response. The forwarding relocation response includes a NAS container (NASC). The NASC includes the security parameters required to create a 5G security context, such as 5G security algorithms.
步骤405,MME向UE发送切换命令(handover command),该切换命令中携带有NASC。Step 405: The MME sends a handover command to the UE, and the handover command carries NASC.
步骤406,UE根据接收到的NASC中包括的安全参数,和UE的EPS安全上下文,创建5G安全上下文。Step 406: The UE creates a 5G security context according to the received security parameters included in the NASC and the EPS security context of the UE.
步骤407,UE向Target AMF发送注册请求RR消息。可选的,Target AMF接收到该注册请求RR消息之后,可根据本地策略,选择不进行主认证,或者,进行主认证。Step 407: The UE sends a registration request RR message to the Target AMF. Optionally, after the Target AMF receives the registration request RR message, it can choose not to perform the primary authentication or perform the primary authentication according to the local policy.
在上述图4的流程中,Target AMF在接收到UE的RR消息之后,当Target AMF决定不进行认证时,有可能发生降维攻击。因为Target AMF和UE均根据UE的EPS安全上下文创建5G安全上下文,UE和Target AMF没有进行安全特性协商。UE和Target AMF不知道对方所支持的安全能力,UE和Target AMF均采用Rel-15的安全能力。而实际上,UE和Target AMF可能都是支持post Rel-15安全特性的。并且,UE和Target AMF使用的AMF密钥中,没有采用ABBA_New参数。需要解决的问题包括以下:In the above process in Figure 4, after the Target AMF receives the RR message of the UE, when the Target AMF decides not to perform authentication, a dimensionality reduction attack may occur. Because both the Target AMF and the UE create a 5G security context based on the EPS security context of the UE, the UE and the Target AMF do not negotiate security features. The UE and the Target AMF do not know the security capabilities supported by the other party, and both the UE and the Target AMF adopt the security capabilities of Rel-15. In fact, both UE and Target AMF may support post Rel-15 security features. In addition, the ABBA_New parameter is not used in the AMF keys used by the UE and Target AMF. The issues that need to be resolved include the following:
1、UE从EPS切换到5GS之后,需要和Target AMF进行安全特性协商。1. After the UE switches from EPS to 5GS, it needs to negotiate security features with Target AMF.
2、根据UE和Target AMF所支持的安全特性,生成ABBA_New参数,将ABBA_New作为密钥的输入参数,生成新的密钥。2. According to the security features supported by the UE and Target AMF, generate the ABBA_New parameter, and use ABBA_New as the key input parameter to generate a new key.
图5示出了标准33.501中定义的UE从EPS空闲态移动到5GS的安全处理的具体流程,该流程包括:Figure 5 shows the specific flow of the security processing of UE moving from EPS idle state to 5GS defined in the standard 33.501. The flow includes:
步骤500,UE注册到MME。In step 500, the UE registers with the MME.
步骤501,UE空闲态移动到5GS。In step 501, the UE moves to 5GS in the idle state.
步骤502,UE向Target AMF发送RR消息。可选的,该RR消息中可包括5G-GUTI。Step 502: The UE sends an RR message to Target AMF. Optionally, the RR message may include 5G-GUTI.
步骤503,Target AMF在接收到UE发送的RR消息之后,向之前服务UE的MME发送上下文请求。例如,该上下文请求可以是Context Request。Step 503: After the Target AMF receives the RR message sent by the UE, it sends a context request to the MME that previously served the UE. For example, the context request may be Context Request.
步骤504,MME向Target AMF发送上下文响应。例如,该上下文响应可以是Context Response。该上下文响应中包括UE的EPS安全上下文。UE的EPS安全上下文中包括MME的密钥K ASMEStep 504: The MME sends a context response to the Target AMF. For example, the context response may be Context Response. The context response includes the EPS security context of the UE. The EPS security context of the UE includes the key K ASME of the MME.
步骤505,Target AMF根据接收到的UE的EPS安全上下文创建5G安全上下文。5G安全上下文中包括根据上述K ASME推衍的AMF密钥K AMFStep 505: Target AMF creates a 5G security context according to the received EPS security context of the UE. The 5G security context includes the AMF key K AMF derived from the above K ASME .
步骤506,如果Target AMF在RR消息中接收到5G-GUTI。则Target AMF可根据接收到的5G-GUTI,找到分配该5G-GUTI的Old AMF。并向Old AMF发送UE上下文请求消息。例如,该UE上下文请求消息可以是Namf_Communication_UEContextTransfer Request。Step 506, if the Target AMF receives the 5G-GUTI in the RR message. Then the Target AMF can find the Old AMF to which the 5G-GUTI is allocated according to the received 5G-GUTI. And send a UE context request message to Old AMF. For example, the UE context request message may be Namf_Communication_UEContextTransfer Request.
步骤507,Old AMF根据5G-GUTI,找到UE的5G安全上下文,并返回给Target AMF。例如,Old AMF可向Target AMF发送UE上下文响应,该UE上下文响应中包括5G安全上下文。例如,UE上下文响应可以为Namf_Communication_UEContextTransfer Response。Step 507: The Old AMF finds the 5G security context of the UE according to the 5G-GUTI, and returns it to the Target AMF. For example, the Old AMF may send a UE context response to the Target AMF, and the UE context response includes the 5G security context. For example, the UE context response may be Namf_Communication_UEContextTransfer Response.
需要说明的是,如果Target AMF从Old AMF接收到5G安全上下文,则Target AMF丢弃上述步骤505中根据EPS安全上下文生成的5G安全上下文,而是使用从Old AMF处接收到的5G安全上下文。It should be noted that if the Target AMF receives the 5G security context from the Old AMF, the Target AMF discards the 5G security context generated according to the EPS security context in step 505, and instead uses the 5G security context received from the Old AMF.
步骤508,Target AMF如果从Old AMF处获取5G安全上下文失败,则Target AMF可根据本地策略,选择使用上述步骤505生成的5G安全上下文,或者发起主认证生成新的5G安全上下文。In step 508, if the Target AMF fails to obtain the 5G security context from the Old AMF, the Target AMF may choose to use the 5G security context generated in step 505 according to the local policy, or initiate a master authentication to generate a new 5G security context.
步骤509,Target AMF向UE发送NAS SMC,用于和UE协商要使用的安全上下文和建立安全关联。Step 509: The Target AMF sends a NAS SMC to the UE, which is used to negotiate the security context to be used and establish a security association with the UE.
步骤510,UE向Target AMF回复NAS SMP。UE和Target AMF之间的安全关联建立完成。Step 510: The UE replies to the NAS SMP to the Target AMF. The establishment of the security association between the UE and the Target AMF is complete.
在上述图5所示的流程中,可以看出:Target AMF和UE通信使用的安全上下文,可以有以下几种情况的任一种:In the process shown in Figure 5 above, it can be seen that the security context used by the Target AMF and UE to communicate can have any of the following situations:
1、Target AMF根据从MME处获取的EPS安全上下文,生成5G的安全上下文(称为映射的5G安全上下文,即mapped 5G security context);1. Target AMF generates a 5G security context (called a mapped 5G security context, that is, a mapped 5G security context) based on the EPS security context obtained from the MME;
2、Target AMF从Old AMF处获取5G安全上下文。2. Target AMF obtains 5G security context from Old AMF.
3、Target AMF和UE进行主认证,生成新的5G安全上下文。3. Target AMF and UE perform master authentication to generate a new 5G security context.
针对上述前两种情况,UE和Target AMF之间没有进行安全特性协商,UE和Target AMF不知道各自对方的安全特性,默认使用Rel-15。而实际上,UE和Target AMF可能都 支持Post Rel-15安全特性,这样发生了降维攻击。并且,根据UE和Target AMF支持的安全特性,可能生成新的ABBA参数,即ABBA_New参数,应该将ABBA_New作为参数,生成密钥供UE和AMF使用。但在现有的流程中,UE和Target AMF基于从MME或者Old AMF获取的密钥,没有使用ABBA_New参数,需要解决的问题,包括:In the first two cases mentioned above, there is no security feature negotiation between the UE and the Target AMF. The UE and the Target AMF do not know the security features of each other, and Rel-15 is used by default. In fact, both the UE and Target AMF may support the Post Rel-15 security feature, so dimensionality reduction attacks have occurred. In addition, according to the security features supported by the UE and Target AMF, it is possible to generate a new ABBA parameter, namely the ABBA_New parameter, and ABBA_New should be used as the parameter to generate a key for the UE and AMF to use. However, in the existing process, the UE and Target AMF are based on the key obtained from the MME or Old AMF and do not use the ABBA_New parameter. The problems that need to be resolved include:
1、UE和Target AMF之间的安全特性协商。1. Security feature negotiation between UE and Target AMF.
2、根据UE和Target AMF支持的安全特性,生成ABBA_New参数。并将ABBA_New参数作为输入参数,生成新的密钥。2. According to the security features supported by the UE and Target AMF, the ABBA_New parameter is generated. And use the ABBA_New parameter as the input parameter to generate a new key.
通过上述图2a至图5所示场景的描述,当UE注册或切换到一个Target AMF时,需要解决以下两个问题:Based on the description of the scenarios shown in Figures 2a to 5 above, when the UE registers or switches to a Target AMF, the following two problems need to be solved:
1、UE和Target AMF之间安全特性的协商。1. Negotiation of security features between UE and Target AMF.
2、根据UE和Target AMF之间支持的安全特性,生成ABBA_New参数,并将ABBA_New作为输入参数生成新的K AMF密钥,供UE和Target AMF使用。 2. According to the security features supported between the UE and the Target AMF, generate the ABBA_New parameter, and use ABBA_New as the input parameter to generate a new K AMF key for the UE and the Target AMF to use.
基于上述,本申请实施例提供一种通信方法、装置及系统,该方法包括:Target AMF确定UE的安全特性;Target AMF确定UE的安全特性,可以通过以下任一方式:Target AMF可通过与UE的安全特性协商,获取UE的安全特性;或者Target AMF可以从Old AMF处获取UE的安全特性;或者Target AMF根据本地存储和配置获取。Target AMF根据UE的安全特性和Target AMF的安全特性,确定ABBA_New参数。Target AMF使用ABBA_New,推演新的AMF密钥;具体地,Target AMF获取Old AMF使用的AMF密钥,并根据Old AMF的AMF密钥和ABBA_New生成新的AMF密钥。Based on the foregoing, embodiments of the present application provide a communication method, device, and system. The method includes: Target AMF determines the security features of the UE; Target AMF determines the security features of the UE in any of the following ways: Target AMF can communicate with the UE The security feature of the UE is negotiated to obtain the security feature of the UE; or the Target AMF can obtain the security feature of the UE from the Old AMF; or the Target AMF is obtained according to the local storage and configuration. Target AMF determines the ABBA_New parameter according to the security features of the UE and Target AMF. Target AMF uses ABBA_New to derive a new AMF key; specifically, Target AMF obtains the AMF key used by Old AMF, and generates a new AMF key based on the AMF key of Old AMF and ABBA_New.
本申请实施例的通信方法,可应用于网络架构中。如图6所示,提供网络架构的示意图,包括接入网和核心网。The communication method of the embodiment of the present application can be applied to a network architecture. As shown in Figure 6, a schematic diagram of the network architecture is provided, including the access network and the core network.
其中,接入网用于实现无线接入有关的功能,接入网设备是为终端设备提供接入的设备。接入网设备包括无线接入网(radio access network,RAN)设备和/或接入网(access network,AN)设备。RAN设备可以是第三代合作伙伴计划(3rd generation partnership project,3GPP)中定义的接入网设备。AN设备可以是非3GPP(non-3GPP)定义的接入网设备。Among them, the access network is used to implement functions related to wireless access, and the access network device is a device that provides access for terminal devices. Access network equipment includes radio access network (RAN) equipment and/or access network (access network, AN) equipment. The RAN device may be an access network device defined in the 3rd generation partnership project (3GPP). The AN device may be an access network device defined by non-3GPP (non-3GPP).
RAN设备,主要负责空口侧的无线资源管理、服务质量(quality of service,QoS)管理、数据压缩和安全处理等。所述RAN设备可以包括各种形式的基站。例如,宏基站、微基站(小站)、中继站或接入点等。RAN设备包括但不限于:5G中的下一代基站(generation nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseband unit,BBU)、收发点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。RAN设备还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器、集中单元(centralized unit,CU),和/或分布单元(distributed unit,DU),或者RAN设备可以为中继站、接入点、车载设备、终端设备、可穿戴设备以及未来6G网络中的接入网设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)网络中的接入网设备等。RAN equipment is mainly responsible for radio resource management, quality of service (QoS) management, data compression, and security processing on the air interface side. The RAN equipment may include various forms of base stations. For example, a macro base station, a micro base station (small station), a relay station, or an access point, etc. RAN equipment includes, but is not limited to: next-generation base stations (gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (RNC), node B (node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (BBU) , Transmitting and receiving point (TRP), transmitting point (TP), mobile switching center, etc. The RAN device may also be a wireless controller, a centralized unit (CU), and/or a distributed unit (DU) in a cloud radio access network (cloud radio access network, CRAN) scenario, or the RAN device may It is relay station, access point, in-vehicle equipment, terminal equipment, wearable equipment, and access network equipment in the future 6G network or access network equipment in the public land mobile network (PLMN) network that will evolve in the future Wait.
AN设备,用于使得终端设备与3GPP核心网之间可采用非3GPP技术互联互通。所述非3GPP技术包括但不限于:无线保真(wireless fidelity,WIFI)、全球微波互联接入(worldwide interoperability for microwave access,WiMAX)、码分多址(code division  multiple access,CDMA)网络技术等。AN equipment is used to enable non-3GPP technology to be used for interconnection and intercommunication between terminal equipment and the 3GPP core network. The non-3GPP technologies include but are not limited to: wireless fidelity (WIFI), worldwide interoperability for microwave access (WiMAX), code division multiple access (CDMA) network technologies, etc. .
其中,核心网设备可包括以下中的一个或多个网元:接入和移动管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF网元)网元、用户面功能(user plane function,UPF网元)网元、策略控制功能(policy control function,PCF)网元、应用功能(application function,AF)网元、统一数据管理(unified data management,UDM)网元、认证服务器功能(authentication server function,AUSF)网元、网络切片选择功能(network slice selection function,NSSF)网元。Among them, the core network equipment may include one or more of the following network elements: access and mobility management function (AMF) network elements, session management function (session management function, SMF network elements) network elements, User plane function (UPF network element) network element, policy control function (PCF) network element, application function (AF) network element, unified data management (UDM) network Element, authentication server function (authentication server function, AUSF) network element, network slice selection function (network slice selection function, NSSF) network element.
AMF网元:主要负责移动网络中的移动性管理,如用户位置更新、用户注册网络、用户切换等。SMF网元:主要负责移动网络中的会话管理,如会话建立、修改、释放。具体功能如为用户分配IP地址、选择提供报文转发功能的UPF网元等。UPF网元:主要负责用户数据的转发和接收。在下行传输中,UPF网元可以从数据网络(data network,DN)接收用户数据,通过接入网设备传输给终端设备;在上行传输中,UPF网元可以通过接入网设备从终端设备接收用户数据,向DN转发该用户数据。可选的,UPF网元中为终端设备提供服务的传输资源和调度功能可以由SMF网元管理控制。PCF网元:主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。AF网元:主要支持与3GPP核心网交互来提供服务,例如影响数据路由决策,策略控制功能或者向网络侧提供第三方的一些服务。UDM网元,主要用于生成认证信任状,用户标识处理(如存储和管理用户永久身份等),接入授权控制和签约数据管理等。AUSF网元,主要用于在终端设备接入网络时执行认证,包括接收安全锚点功能(security anchor function,SEAF)发送的鉴权请求,选择鉴权方法,以及向鉴权存储和处理功能(authentication repository and processing function,ARPF)请求鉴权向量等。NSSF网元,主要用于为终端设备选择网络切片实例,确定允许的网络切片选择辅助信息(network slice selection assistance information,NSSAI)、配置NSSAI和确定服务UE的AMF集。AMF network element: Mainly responsible for the mobility management in the mobile network, such as user location update, user registration network, user handover, etc. SMF network element: Mainly responsible for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning IP addresses to users and selecting UPF network elements that provide message forwarding functions. UPF network element: Mainly responsible for the forwarding and receiving of user data. In the downlink transmission, the UPF network element can receive user data from the data network (DN) and transmit it to the terminal device through the access network device; in the uplink transmission, the UPF network element can receive the user data from the terminal device through the access network device User data, forward the user data to the DN. Optionally, the transmission resources and scheduling functions in the UPF network element that provide services for the terminal device can be managed and controlled by the SMF network element. PCF network element: It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for obtaining user subscription information related to policy decisions. AF network element: It mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing third-party services to the network side. UDM network elements are mainly used to generate authentication credential, user identification processing (such as storage and management of user permanent identities, etc.), access authorization control and contract data management, etc. The AUSF network element is mainly used to perform authentication when the terminal device accesses the network, including receiving authentication requests sent by the security anchor function (SEAF), selecting the authentication method, and sending the authentication storage and processing function ( authentication repository and processing function (ARPF) request authentication vector, etc. NSSF network elements are mainly used to select network slice instances for terminal devices, determine allowed network slice selection assistance information (NSSAI), configure NSSAI, and determine the AMF set that serves the UE.
可选的,图6所示的网络架构中,还可包括:终端设备。终端设备可以简称为终端,是一种具有无线收发功能的设备,终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述终端设备可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备,以及还可以包括用户设备(user equipment,UE)等。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来第五代(the 5th generation,5G)网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等。终端设备有时也可以称为终端设备、用户设备(user equipment,UE)、接入终端设备、车载终端设备、工业控制终端设备、UE单元、UE站、移动站、移动台、 远方站、远程终端设备、移动设备、UE终端设备、终端设备、无线通信设备、UE代理或UE装置等。终端设备也可以是固定的或者移动的。本申请实施例对此并不限定。作为示例而非限定,在本申请实施例中,终端设备可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大功能的设备。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。在本申请中,终端设备可以是物联网(internet of things,IoT)系统中的终端,IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。本申请中的终端设备可以是机器类型通信(machine type communication,MTC)中的终端设备。本申请的终端设备可以是作为一个或多个部件或者单元而内置于车辆的车载模块、车载模组、车载部件、车载芯片或者车载单元,车辆通过内置的所述车载模块、车载模组、车载部件、车载芯片或者车载单元可以实施本申请的方法。因此,本申请实施例可以应用于车联网,例如车辆外联(vehicle to everything,V2X)、车间通信长期演进技术(long term evolution vehicle,LTE-V)、车到车(vehicle to vehicle,V2V)等。Optionally, the network architecture shown in FIG. 6 may further include: terminal equipment. A terminal device can be referred to as a terminal for short. It is a device with a wireless transceiver function. The terminal device can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on the water (such as ships, etc.); it can also be deployed on In the air (for example, airplanes, balloons, satellites, etc.). The terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiver function, virtual reality (VR) terminal equipment, augmented reality (AR) terminal equipment, industrial control ( Wireless terminal equipment in industrial control, wireless terminal equipment in self-driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid, transportation safety (transportation) Wireless terminal equipment in safety), wireless terminal equipment in a smart city (smart city), wireless terminal equipment in a smart home (smart home), and may also include user equipment (UE), etc. The terminal device can also be a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (personal digital assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the 5th generation (5G) network in the future, or public land mobile communication networks that will evolve in the future ( Public land mobile network (PLMN) terminal equipment, etc. Terminal equipment can sometimes be called terminal equipment, user equipment (UE), access terminal equipment, vehicle terminal equipment, industrial control terminal equipment, UE unit, UE station, mobile station, mobile station, remote station, remote terminal Equipment, mobile equipment, UE terminal equipment, terminal equipment, wireless communication equipment, UE agent or UE device, etc. The terminal device can also be fixed or mobile. The embodiments of the present application are not limited thereto. As an example and not a limitation, in the embodiment of the present application, the terminal device may be a wearable device. Wearable devices can also be called wearable smart devices. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. A wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. A wearable device is not only a hardware device, but also a device that achieves powerful functions through software support, data interaction, and cloud interaction. In a broad sense, wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which need to cooperate with other devices such as smart phones. Use, such as all kinds of smart bracelets and smart jewelry for physical sign monitoring. In this application, the terminal device can be a terminal in the Internet of Things (IoT) system. IoT is an important part of the development of information technology in the future. Its main technical feature is to connect objects to the network through communication technology to achieve An intelligent network of interconnection of humans and machines, and interconnection of things. The terminal device in this application may be a terminal device in machine type communication (MTC). The terminal device of the present application may be an in-vehicle module, an in-vehicle module, an in-vehicle component, an in-vehicle chip, or an in-vehicle unit that is built into a vehicle as one or more components or units. Components, on-board chips or on-board units can implement the method of the present application. Therefore, the embodiments of the present application can be applied to the Internet of Vehicles, such as vehicle to everything (V2X), long term evolution vehicle (LTE-V), and vehicle to vehicle (V2V). Wait.
可选的,在图6所示的网络架构中,还可包括:DN。DN可以是为用户提供数据业务服务的服务网络。例如,DN可以是IP多媒体业务(IP multi-media service)网络或互联网(internet)等。其中,终端设备可以建立从终端设备到DN的协议数据单元(protocol data unit,PDU)会话,来访问DN。Optionally, the network architecture shown in FIG. 6 may further include: DN. DN can be a service network that provides users with data service services. For example, the DN may be an IP multi-media service (IP multi-media service) network or the Internet (Internet), etc. Among them, the terminal device can establish a protocol data unit (protocol data unit, PDU) session from the terminal device to the DN to access the DN.
需要说明的是,在不同的通信系统中,上述核心网中的网元可以有不同的名称。在上述图6所示的示意图中,是以第五代移动通信系统为例进行说明的,并不作为对本申请的限定。进一步,上述图6中的核心网网元仅为示意性说明,并不作为对本申请实施例的限定。比如,在图6所示的网络架构中,核心网网元还可包括:网络开放功能(network exposure function,NEF)、网络存储器功能(network repository function,NRF)、或业务控制点(service control point,SCP)等中的一个或多个网元等。It should be noted that in different communication systems, the network elements in the above-mentioned core network may have different names. In the schematic diagram shown in FIG. 6 above, the fifth generation mobile communication system is taken as an example for description, and it is not intended to limit the application. Further, the core network element in FIG. 6 is only a schematic illustration, and is not intended as a limitation to the embodiment of the present application. For example, in the network architecture shown in Figure 6, the core network elements may also include: network exposure function (NEF), network storage function (network repository function, NRF), or service control point (service control point) , SCP), etc., one or more network elements, etc.
在本申请的描述中,以第一AMF为Target AMF,第二AMF为Old AMF,终端设备为UE,ABBA_New参数为第一ABBA参数,ABBA_Old参数为第二ABBA参数为例进行介绍。In the description of this application, the first AMF is Target AMF, the second AMF is Old AMF, the terminal device is UE, the ABBA_New parameter is the first ABBA parameter, and the ABBA_Old parameter is the second ABBA parameter as an example.
在本申请的描述中,UE的安全特性,可具体为UE支持的安全特性,或者,UE选择的安全特性。Target AMF的安全特性,可具体为Target AMF支持的安全特性,或者,Target AMF选择的安全特性。Old AMF的安全特性,可具体为Old AMF支持的安全特性,或者,Old AMF选择的安全特性。In the description of this application, the security feature of the UE may specifically be a security feature supported by the UE or a security feature selected by the UE. The security features of the Target AMF may be specifically the security features supported by the Target AMF, or the security features selected by the Target AMF. The security features of Old AMF may specifically be security features supported by Old AMF, or security features selected by Old AMF.
在本申请的描述中,“安全特性”与“支持的安全特性”和“选择的安全特性”,三者间可相互替代,不作区分。除此之外,在本申请的描述中,ABBA_Old和ABBA_old可相互替代。ABBA_New和ABBA_new可相互替代。AMF密钥可为K AMF,MME密钥可为K ASME。ABBA_New包括UE的安全特性以及Target AMF的安全特性;或者ABBA_New包括UE安全特性的指示以及Target AMF的安全特性的指示。ABBA_Old包括UE的安全特性以及 Old AMF的安全特性;或者ABBA_Old包括UE安全特性的指示以及Old AMF的安全特性的指示。 In the description of this application, "security features", "supported security features" and "selected security features" can be substituted for each other without distinction. In addition, in the description of this application, ABBA_Old and ABBA_old can be substituted for each other. ABBA_New and ABBA_new can replace each other. The AMF key can be K AMF , and the MME key can be K ASME . ABBA_New includes the security features of the UE and the security features of Target AMF; or ABBA_New includes the indication of the security features of the UE and the indication of the security features of the Target AMF. ABBA_Old includes the security features of the UE and the security features of Old AMF; or ABBA_Old includes the indication of the security features of the UE and the indication of the security features of Old AMF.
在本申请的描述中,Old AMF的AMF密钥或者Old AMF的密钥,是指UE注册到Old AMF(或者Old AMF服务UE)时,UE和Old AMF使用的AMF密钥。UE是在认证过程中,生成该AMF密钥。Old AMF则是由SEAF向Old AMF发送的该AMF密钥。In the description of this application, the Old AMF AMF key or Old AMF key refers to the AMF key used by the UE and Old AMF when the UE is registered with the Old AMF (or the Old AMF serving UE). The UE generates the AMF key during the authentication process. Old AMF is the AMF key sent by SEAF to Old AMF.
在本申请中,Old AMF的密钥,Old AMF的AMF密钥,Old AMF向Target AMF发送的AMF密钥,以及Target AMF接收到Old AMF发送的AMF密钥,都是同一个,可交替使用。In this application, the Old AMF key, Old AMF AMF key, Old AMF sent AMF key to Target AMF, and Target AMF received Old AMF sent AMF key are all the same, and can be used interchangeably .
请参见图7a所示,为本申请实施例提供的通信方法的一流程图。包括但不限于以下步骤:Please refer to FIG. 7a, which is a flowchart of a communication method provided by an embodiment of this application. Including but not limited to the following steps:
步骤701a,Target AMF确定UE的安全特性。Step 701a: Target AMF determines the security features of the UE.
步骤701a,Target AMF确定Old AMF的AMF密钥。Step 701a: Target AMF determines the AMF key of Old AMF.
可选的,通过上述描述可知,UE和Target AMF可支持一种或多种安全特性。例如,在当前标准33.501中,UE和Target AMF可仅支持Rel-15的安全特性。在未来的演进中,UE和Target AMF可支持Rel-16和Rel-17等安全特性。Optionally, it can be seen from the above description that the UE and Target AMF can support one or more security features. For example, in the current standard 33.501, the UE and Target AMF may only support the security features of Rel-15. In the future evolution, UE and Target AMF can support security features such as Rel-16 and Rel-17.
在一种可能的实现方式中,Target AMF可通过以下的任一种方式,获取UE支持的安全特性:Old AMF向Target AMF发送UE支持的安全特性;Target AMF从本地存储中获取UE支持的安全特性;Old AMF向Target AMF发送ABBA_Old参数,所述AABA_Old参数中包括UE的安全特性或UE的安全特性的指示,以及Old AMF的安全特性或Old AMF的安全特性的指示。In a possible implementation, Target AMF can obtain the security features supported by the UE in any of the following ways: Old AMF sends the security features supported by the UE to the Target AMF; Target AMF obtains the security supported by the UE from the local storage Features: Old AMF sends the ABBA_Old parameter to Target AMF. The AABA_Old parameter includes the UE’s security feature or the UE’s security feature indication, and the Old AMF’s security feature or Old AMF’s security feature indication.
在一种可能的实现方式中,Target AMF可通过以下方式,获取Old AMF的AMF密钥:Old AMF向Target AMF发送Old AMF的AMF密钥。例如,Target AMF可向Old AMF发送用于请求终端设备上下文的请求消息。Old AMF在接收到上述请求时,向Target AMF发送UE上下文,所述UE上下文中携带有Old AMF的AMF密钥。又例如,Old AMF向Target AMF发送创建上下文请求,在该请求中,包括Old AMF的AMF密钥。在本申请中年,Old AMF发送给Target AMF的AMF密钥,可以是Old AMF当前的AMF密钥,或者Old AMF将当前AMF密钥进行水平K AMF推衍生成的密钥。 In a possible implementation manner, the Target AMF can obtain the AMF key of the Old AMF in the following manner: Old AMF sends the AMF key of the Old AMF to the Target AMF. For example, the Target AMF can send a request message for requesting the context of the terminal device to the Old AMF. When the Old AMF receives the above request, it sends the UE context to the Target AMF, and the UE context carries the AMF key of the Old AMF. For another example, the Old AMF sends a context creation request to the Target AMF, and the request includes the AMF key of the Old AMF. In the middle of this application, the AMF key sent by the Old AMF to the Target AMF may be the current AMF key of the Old AMF, or the old AMF derived from the current AMF key by horizontal K AMF.
步骤702a,Target AMF根据UE的安全特性和Target AMF的安全特性,确定ABBA_New参数。Step 702a: The Target AMF determines the ABBA_New parameter according to the security features of the UE and the security features of the Target AMF.
步骤703a,Target AMF根据ABBA_New参数和Old AMF的AMF密钥,确定Target AMF的AMF密钥,也成为新的AMF密钥。之后,Target AMF可根据Target AMF的AMF密钥,推衍NAS完整性密钥和加密密钥。并根据NAS完整性密钥和加密密钥,对UE和网络设备之间的通信进行完整性保护和加密保护。保证通信安全。In step 703a, the Target AMF determines the AMF key of the Target AMF according to the ABBA_New parameter and the AMF key of the Old AMF, which also becomes the new AMF key. Afterwards, the Target AMF can derive the NAS integrity key and encryption key based on the AMF key of the Target AMF. And according to the NAS integrity key and encryption key, integrity protection and encryption protection are performed on the communication between the UE and the network device. Ensure communication security.
可选的,步骤704a,Target AMF向UE发送ABBA_New参数和可选的第一指示信息。在本申请中,第一指示信息用于指示UE根据ABBA_New参数更新AMF密钥或者用于指示UE更新AMF密钥。Optionally, in step 704a, the Target AMF sends the ABBA_New parameter and optional first indication information to the UE. In this application, the first indication information is used to instruct the UE to update the AMF key according to the ABBA_New parameter or to instruct the UE to update the AMF key.
UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE在接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用ABBA_New和Old AMF的AMF密钥。When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side.
可选的,在Target AMF根据UE的安全特性以及Target AMF的安全特性,确定 ABBA_New参数之前,所述方法还包括Target AMF确定Old AMF的安全特性;当Target AMF与Old AMF的安全特性不同时,再执行上述步骤702a-704a中的步骤,否则不再执行。Optionally, before the Target AMF determines the ABBA_New parameter according to the security features of the UE and the security features of the Target AMF, the method further includes that the Target AMF determines the security features of the Old AMF; when the security features of the Target AMF and the Old AMF are different, Re-execute the steps in the above steps 702a-704a, otherwise, do not execute it again.
请参见图7b所示,为本申请实施例提供的通信方法的另一流程图,包括但不限于以下步骤:Please refer to FIG. 7b, which is another flowchart of the communication method provided in this embodiment of the application, including but not limited to the following steps:
步骤701b,Target AMF确定UE的安全特性。Target AMF确定UE安全特性的方式,见701a描述。Step 701b: Target AMF determines the security features of the UE. Refer to the description of 701a for the method for Target AMF to determine the security features of the UE.
步骤701b,Target AMF确定MME的MME密钥K ASMEStep 701b, Target AMF determines the MME key K ASME of the MME.
在一种可能的实现方式中,Target AMF可通过以下方式,获取MME的MME密钥:MME向Target AMF发送MME密钥。例如,Target AMF向MME发送上下文请求,MME回复上下文响应,并在该响应中包括MME的MME密钥K ASME。又例如,MME向Target AMF发送转发重定位请求(Forward Relocation Request),并在该请求中包括MME的MME密钥K ASME等,不作限定。关于上述Target AMF确定UE的安全特性的方式,可参见上述图7a中的记载,在此不再说明。 In a possible implementation manner, the Target AMF may obtain the MME key of the MME in the following manner: the MME sends the MME key to the Target AMF. For example, the Target AMF sends a context request to the MME, and the MME replies with a context response, and includes the MME key K ASME of the MME in the response. For another example, the MME sends a Forward Relocation Request (Forward Relocation Request) to the Target AMF, and the request includes the MME key K ASME of the MME, etc., which is not limited. Regarding the manner in which the Target AMF determines the security feature of the UE, refer to the record in FIG. 7a above, which will not be described here.
步骤702b,Target AMF根据UE的安全特性和Target AMF的安全特性,确定ABBA_New参数。Step 702b: The Target AMF determines the ABBA_New parameter according to the security features of the UE and the security features of the Target AMF.
步骤703b,Target AMF根据ABBA_New参数和MME密钥,确定Target AMF的AMF密钥。Step 703b: The Target AMF determines the AMF key of the Target AMF according to the ABBA_New parameter and the MME key.
可选的,步骤704b,Target AMF可向UE发送ABBA_New参数和可选的第一指示信息。UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE在接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New和MME密钥。Optionally, in step 704b, the Target AMF may send the ABBA_New parameter and optional first indication information to the UE. When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New and MME key.
实施例一Example one
在以下实施例中,如无特别说明,AMF和SEAF合设,视为同一个网络功能(network fuction,NF),即Target AMF和SEAF是同一个NF,可交替使用。In the following embodiments, unless otherwise specified, AMF and SEAF are co-located and regarded as the same network function (network fuction, NF), that is, Target AMF and SEAF are the same NF and can be used interchangeably.
参见图8a,在一种可能的实现方式中,Target AMF可获取UE支持的安全特性。例如,Target AMF可接收Old AMF发送的UE支持的安全特性,或者,Target AMF可从本地存储中获取UE支持的安全特性,或者,Target AMF可接收Old AMF发送的ABBA_Old参数。之后,Target AMF根据UE和Target AMF支持的安全特性,设置ABBA_New。Target AMF推衍新的AMF密钥,即K AMF。Target AMF向UE发送ABBA_New参数。可选的,Target AMF还可向UE发送Indicator1。Indicator1用于指示UE更新AMF密钥或者使用ABBA_New生成密钥。UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE在接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。 Referring to Figure 8a, in a possible implementation manner, Target AMF can obtain the security features supported by the UE. For example, the Target AMF can receive the security features supported by the UE sent by the Old AMF, or the Target AMF can obtain the security features supported by the UE from the local storage, or the Target AMF can receive the ABBA_Old parameter sent by the Old AMF. After that, Target AMF sets ABBA_New according to the security features supported by UE and Target AMF. Target AMF derives a new AMF key, namely K AMF . The Target AMF sends the ABBA_New parameter to the UE. Optionally, Target AMF may also send Indicator1 to the UE. Indicator1 is used to instruct the UE to update the AMF key or use ABBA_New to generate the key. When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side.
图8b示出了实施例一的一具体流程,例如,该流程可以为UE在5GS中空闲态移动注册中的安全特性协商和密钥更新流程的示意图,包括但不限于以下步骤:Figure 8b shows a specific process of the first embodiment. For example, the process may be a schematic diagram of the security feature negotiation and key update process in the idle state mobile registration of the UE in 5GS, including but not limited to the following steps:
步骤801,UE注册到Old AMF。In step 801, the UE registers with Old AMF.
步骤802,UE空闲态移动。Step 802, the UE moves in an idle state.
步骤803,UE向Target AMF发送注册请求RR消息,RR消息中可能携带有UE的 5G-GUTI。Step 803: The UE sends a registration request RR message to the Target AMF. The RR message may carry the 5G-GUTI of the UE.
步骤804,如果RR中有5G-GUTI,则Target AMF向Old AMF发送UE上下文请求消息。例如,UE上下文请求消息可以为Namf_Communication_UEContextTransfer Request。Step 804: If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF. For example, the UE context request message may be Namf_Communication_UEContextTransfer Request.
步骤805,OldAMF向Target AMF发送UE上下文响应消息。例如,UE上下文响应消息可以是Namf_Communication_UEContextTransfer Response。所述UE上下文响应消息中携带有UE支持的安全特性,或者,ABBA_Old参数。所述UE上下文响应消息中还包括Old AMF的AMF密钥。该AMF密钥可以是Old AMF使用的AMF密钥,或者Old AMF对该使用的AMF密钥进行水平K AMF推演而生成的新的密钥。在本申请中,Old AMF发送给Target AMF的AMF密钥,统称为Old AMF的AMF密钥,可以为上述两种的任何一种(即Old AMF使用的AMF密钥,或者对该使用的AMF密钥进行水平K AMF推演后生成的新的密钥),后面不再一一说明。 Step 805: OldAMF sends a UE context response message to Target AMF. For example, the UE context response message may be Namf_Communication_UEContextTransfer Response. The UE context response message carries the security features supported by the UE, or the ABBA_Old parameter. The UE context response message also includes the AMF key of Old AMF. The AMF key may be an AMF key used by Old AMF, or a new key generated by Old AMF performing horizontal K AMF derivation on the used AMF key. In this application, the AMF keys sent by Old AMF to Target AMF are collectively referred to as Old AMF AMF keys, which can be any of the above two types (ie, the AMF key used by Old AMF, or the AMF key used by the Old AMF). The key is a new key generated after horizontal K AMF deduction), which will not be explained one by one later.
步骤806,Target AMF根据UE支持的安全特性以及Target AMF所支持的安全特性,生成ABBA_New参数。Target AMF获取UE的安全特性,可以通过以下方式:Old AMF发送的UE安全特性;Old AMF发送的ABBA_Old;Target AMF从本地配置和存储中获取。Target AMF生成新的AMF密钥。生成新的AMF密钥使用的参数包括:从Old AMF处接收到的AMF密钥和ABBA_New。Target AMF使用生成的新的AMF密钥,生成NAS加密密钥和完整性密钥。Step 806: The Target AMF generates an ABBA_New parameter according to the security features supported by the UE and the security features supported by the Target AMF. Target AMF can obtain the security features of the UE in the following ways: UE security features sent by Old AMF; ABBA_Old sent by Old AMF; Target AMF is obtained from local configuration and storage. Target AMF generates a new AMF key. The parameters used to generate a new AMF key include: the AMF key received from Old AMF and ABBA_New. Target AMF uses the generated new AMF key to generate NAS encryption key and integrity key.
步骤807,Target AMF向UE发送NAS SMC,所述NAS SMC中携带有ABBA_New参数。可选的,NAS SMC中还可包括第一指示。第一指示可称为indicatior1,用于指示UE进行AMF密钥推衍或使用ABBA_News生成AMF密钥。Step 807: The Target AMF sends the NAS SMC to the UE, and the NAS SMC carries the ABBA_New parameter. Optionally, the NAS SMC may also include a first indication. The first indication may be called indicator1, which is used to instruct the UE to derive the AMF key or use ABBA_News to generate the AMF key.
步骤808,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE在接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用ABBA_New和Old AMF的AMF密钥。然后UE根据生成的新的AMF密钥,生成NAS加密密钥和完整性密钥。In step 808, when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE is receiving the first indication information, it may generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the generated new AMF key.
图9示出了实施例一的另一具体流程。例如,该流程可为UE在N2切换中的安全特性协商和密钥更新流程,该流程包括但不限于:Figure 9 shows another specific process of the first embodiment. For example, the process may be the process of UE security feature negotiation and key update in N2 handover. The process includes but is not limited to:
步骤901,UE注册到Old AMF。Step 901, the UE registers with Old AMF.
步骤902,Old AMF发起切换。Step 902: Old AMF initiates handover.
步骤903,Old AMF向Target AMF请求创建UE上下文。例如,Old AMF可向Target AMF发送创建UE上下文请求消息。例如,该创建UE上下文请求消息可以为Namf_Communication_CreateUEContext Request。所述创建UE上下文请求消息中可携带有UE支持的安全特性,或者,ABBA_Old参数。In step 903, the Old AMF requests the Target AMF to create a UE context. For example, Old AMF may send a UE context creation request message to Target AMF. For example, the UE context creation request message may be Namf_Communication_CreateUEContext Request. The UE context creation request message may carry security features supported by the UE, or the ABBA_Old parameter.
步骤904,Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,设置ABBA_New。Target AMF生成新的AMF密钥。生成新的AMF密钥使用的参数包括:从Old AMF处接收到的Old AMF的AMF密钥和ABBA_New。Target AMF将推衍的新的密钥作为AMF密钥,根据该新的AMF密钥生成NAS加密密钥和完整性密钥。Step 904: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Set ABBA_New. Target AMF generates a new AMF key. The parameters used to generate the new AMF key include: the Old AMF AMF key and ABBA_New received from the Old AMF. Target AMF uses the derived new key as the AMF key, and generates the NAS encryption key and the integrity key according to the new AMF key.
步骤905,Target AMF向Old AMF返回创建UE上下文的响应消息。所述创建UE上下文的响应消息可以是Namf_Communication_CreateUEContext Response。该创建UE上下 文的响应消息中包括ABBA_New。可选的,该创建UE上下文的响应消息中还可包括Indicator1。该Indicator1用于指示UE进行AMF密钥推衍,或使用ABBA_New生成AMF密钥。Step 905: The Target AMF returns a response message for creating a UE context to the Old AMF. The response message for creating the UE context may be Namf_Communication_CreateUEContext Response. The response message for creating the UE context includes ABBA_New. Optionally, the response message for creating the UE context may also include Indicator1. The Indicator1 is used to instruct the UE to derive the AMF key, or use ABBA_New to generate the AMF key.
步骤906,Old AMF通过接入网向UE发送ABBA_New和可选的Indicator1。Old AMF如果从Target AMF处接收到Indicator1,则向UE转发该Indicator1。Step 906: The Old AMF sends ABBA_New and optional Indicator1 to the UE through the access network. If Old AMF receives Indicator1 from Target AMF, it will forward the Indicator1 to the UE.
步骤907,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用ABBA_New和Old AMF的AMF密钥。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。In step 907, when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key, and uses the AMF keys of ABBA_New and Old AMF in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
图10为实施例一的另一具体流程。例如,该流程可以为UE从EPS切换到5GS中的安全特性协商和密钥更新流程,该流程包括但不限于:Figure 10 is another specific process of the first embodiment. For example, the process can be a security feature negotiation and key update process in the UE handover from EPS to 5GS. The process includes but is not limited to:
步骤1000:UE注册到MME。Step 1000: UE registers with MME.
步骤1001:MME决定发起N26切换。Step 1001: MME decides to initiate N26 handover.
步骤1002:MME向Target AMF发送转发重定位请求消息。例如,该转发重定位请求消息可以是Forward Relocation Request。Step 1002: The MME sends a forwarding relocation request message to the Target AMF. For example, the forwarding relocation request message may be Forward Relocation Request.
步骤1003:Target AMF创建5G安全上下文。Step 1003: Target AMF creates a 5G security context.
步骤1004:Target AMF向MME发送转发重定位响应消息。例如,该转发重定位响应消息可以是Forward Relocation Response。该转发重定位响应消息中携带有NASC。Step 1004: The Target AMF sends a forwarding relocation response message to the MME. For example, the forwarding relocation response message may be Forward Relocation Response. The forwarding relocation response message carries NASC.
步骤1005:MME向UE发送切换命令。例如,该切换命令可以是Handover Command。Step 1005: The MME sends a handover command to the UE. For example, the handover command may be Handover Command.
步骤1006:UE创建5G安全上下文。Step 1006: The UE creates a 5G security context.
步骤1007:UE向Old AMF发送RR消息,该RR消息中可能包括5G-GUTI。Step 1007: The UE sends an RR message to Old AMF, and the RR message may include 5G-GUTI.
步骤1008:如果RR中包括5G-GUTI,则Target AMF向Old AMF发送UE上下文请求消息,该上下文请求消息可以为Namf_Communication_UEContextTransfer Request。Step 1008: If the RR includes 5G-GUTI, the Target AMF sends a UE context request message to the Old AMF, and the context request message may be Namf_Communication_UEContextTransfer Request.
步骤1009:Old AMF向Target AMF发送UE上下文请求响应消息,该上下文请求响应消息可以为Namf_Communication_UEContextTransfer Response。该上下文请求响应消息中可包括UE支持的安全特性,或者ABBA_Old参数。该上下文请求响应消息中包括Old AMF的AMF密钥。Step 1009: The Old AMF sends a UE context request response message to the Target AMF. The context request response message may be Namf_Communication_UEContextTransfer Response. The context request response message may include the security features supported by the UE, or the ABBA_Old parameter. The context request response message includes the AMF key of Old AMF.
步骤10010:Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,生成ABBA_New参数。进一步,Target AMF根据ABBA_New参数,推演新的AMF密钥。Target AMF根据新的AMF密钥,生成NAS加密密钥和完整性密钥。Step 10010: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Generate the ABBA_New parameter. Furthermore, Target AMF derives a new AMF key according to the ABBA_New parameter. Target AMF generates NAS encryption key and integrity key according to the new AMF key.
步骤10011:Target AMF向UE发送NAS SMC,该NAS SMC中携带有上述ABBA_New参数,以及可选的Indicator1,所述Indicator1用于指示UE使用ABBA_New参数推演新的AMF密钥;或者用于指示UE进行AMF密钥推演。Step 10011: The Target AMF sends the NAS SMC to the UE. The NAS SMC carries the ABBA_New parameter and optional Indicator1. The Indicator1 is used to instruct the UE to use the ABBA_New parameter to derive a new AMF key; or to instruct the UE to perform AMF key deduction.
步骤10012:如果UE接收到Indicator1,则UE根据接收到的Indicator1,采用与网络侧相同的方式推衍新的AMF密钥。如果UE接收到ABBA_New,没有接收到indicator1,则UE根据ABBA_New,采用与网络侧相同的方式推演新的AMF密钥。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。Step 10012: If the UE receives Indicator1, the UE derives a new AMF key in the same manner as the network side according to the received Indicator1. If the UE receives ABBA_New but not indicator1, the UE uses ABBA_New to derive the new AMF key in the same manner as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
图11为实施例一的另一具体流程。例如,该流程可以为UE空闲态从EPS移动到5GS中的安全特性协商和密钥更新流程。该流程包括但不限于:Figure 11 is another specific process of the first embodiment. For example, the process may be a process of security feature negotiation and key update when the UE moves from EPS to 5GS in an idle state. This process includes but is not limited to:
步骤1100:UE注册到MME。Step 1100: UE registers with MME.
步骤1101:UE空闲态移动。Step 1101: The UE moves in an idle state.
步骤1102:UE向Target AMF发送RR消息。RR中可能携带5G-GUTI。Step 1102: The UE sends an RR message to the Target AMF. The RR may carry 5G-GUTI.
步骤1103:Target AMF向MME发送上下文请求消息,上下文请求消息可以为Context Request。Step 1103: The Target AMF sends a context request message to the MME, and the context request message may be Context Request.
步骤1104:MME向Target AMF发送上下文响应消息,上下文响应消息可以为Context Response。该上下文响应消息中可包括EPS安全上下文。Step 1104: The MME sends a context response message to the Target AMF, and the context response message may be Context Response. The context response message may include the EPS security context.
步骤1105:Target AMF创建5G安全上下文。Step 1105: Target AMF creates a 5G security context.
步骤1106:如果RR中携带5G-GUTI,则Target AMF向Old AMF发送UE上下文请求,UE上下文请求可以为Namf_Communication_UEContextTransfer Request。Step 1106: If the RR carries 5G-GUTI, the Target AMF sends a UE context request to the Old AMF, and the UE context request may be Namf_Communication_UEContextTransfer Request.
步骤1107:Old AMF向Target AMF发送UE上下文响应,UE上下文响应可以为Namf_Communication_UEContextTransfer Response。该UE上下文响应中包括UE支持的安全特性,或者,ABBA_Old参数。该UE上下文响应中包括Old AMF的AMF密钥。Step 1107: The Old AMF sends a UE context response to the Target AMF, and the UE context response may be Namf_Communication_UEContextTransfer Response. The UE context response includes the security features supported by the UE, or the ABBA_Old parameter. The UE context response includes the AMF key of Old AMF.
步骤1108:Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,确定ABBA_New参数。且根据ABBA_New参数,生成新的AMF密钥。Target AMF根据新的AMF密钥,生成NAS加密密钥和完整性密钥。Target AMF生成新的AMF密钥使用的参数包括ABBA_New和Old AMF的AMF密钥。Step 1108: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Determine the ABBA_New parameter. And according to the ABBA_New parameter, a new AMF key is generated. Target AMF generates NAS encryption key and integrity key according to the new AMF key. The parameters used by Target AMF to generate new AMF keys include ABBA_New and Old AMF AMF keys.
步骤1109:Target AMF向UE发送NAS SMC,该NAS SMC中携带有ABBA_New参数和可选的Inicator1,Indicator1用于指示UE使用ABBA_New参数,更新AMF密钥;或者用于指示UE进行AMF密钥推演。Step 1109: The Target AMF sends the NAS SMC to the UE. The NAS SMC carries the ABBA_New parameter and optional Inicator1. The Indicator1 is used to instruct the UE to use the ABBA_New parameter to update the AMF key; or to instruct the UE to perform AMF key derivation.
步骤11010:UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New和Old AMF的AMF密钥。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。Step 11010: When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same manner as the network side, and the parameters used include ABBA_New and Old AMF AMF keys. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
在上述实施例一中,实现了Target AMF和UE之间进行安全特性协商,且将ABBA_New作为推演AMF的密钥。In the first embodiment above, the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key for deriving the AMF.
实施例二Example two
实施例二与实施例一不同的是,Target AMF获取UE支持的安全特性之后,Target AMF发起主认证流程。通过主认证流程,UE和Target AMF会进行安全特性协商,生成ABBA_New参数,并根据ABBA_New参数推演新的AMF密钥。The second embodiment is different from the first embodiment. After the Target AMF obtains the security features supported by the UE, the Target AMF initiates the main authentication process. Through the main authentication process, the UE and Target AMF will negotiate security features, generate the ABBA_New parameter, and derive the new AMF key according to the ABBA_New parameter.
如图12所示,在一种可能的实现方式中,Target AMF从Old AMF处获取UE支持的安全特性。例如,Old AMF可向Target AMF发送UE支持的安全特性,或者,ABBA_Old参数。或者,Target AMF可从本地存储中获取UE支持的安全特性。之后,Target AMF根据UE支持的安全特性以及Target AMF支持的安全特性,设置ABBA_New,发起主认证流程,并将设置的ABBA_New发送给UE。例如,Target AMF可以向UE发送认证请求(authentication request),所述认证请求中携带上述ABBA_New。As shown in Figure 12, in a possible implementation, the Target AMF obtains the security features supported by the UE from the Old AMF. For example, the Old AMF may send the security features supported by the UE or the ABBA_Old parameter to the Target AMF. Alternatively, Target AMF can obtain the security features supported by the UE from local storage. After that, the Target AMF sets ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF, initiates the main authentication process, and sends the set ABBA_New to the UE. For example, the Target AMF may send an authentication request (authentication request) to the UE, and the authentication request carries the aforementioned ABBA_New.
如图13所示,提供实施例二的一具体流程。例如,该流程可以是UE在5GS中空闲态移动的流程。该流程包括但不限于:As shown in FIG. 13, a specific process of the second embodiment is provided. For example, the process may be a process in which the UE moves in an idle state in 5GS. This process includes but is not limited to:
步骤1301:UE注册到Old AMF。Step 1301: UE registers with Old AMF.
步骤1302,UE空闲态移动。Step 1302, the UE moves in an idle state.
步骤1303,UE向Target AMF发送注册请求(registration requst,RR)消息,该RR消息中可选的携带有5G-GUTI。Step 1303: The UE sends a registration request (registration requst, RR) message to the Target AMF, and the RR message may optionally carry 5G-GUTI.
步骤1304,如果RR中有5G-GUTI,则Target AMF向Old AMF发送UE上下文请求消息。例如,该UE上下文请求消息可以是Namf_Communication_UEContextTransfer Request。Step 1304: If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF. For example, the UE context request message may be Namf_Communication_UEContextTransfer Request.
步骤1305,Old AMF向Target AMF发送UE上下文响应消息。例如,该UE上下文响应消息可以是Namf_Communication_UEContextTransfer Response。该UE上下文响应消息中可包括UE支持的安全特性或者ABBA_Old。Step 1305: The Old AMF sends a UE context response message to the Target AMF. For example, the UE context response message may be Namf_Communication_UEContextTransfer Response. The UE context response message may include security features supported by the UE or ABBA_Old.
步骤1306,Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,设置ABBA_New。Step 1306: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Set ABBA_New.
步骤1307,Target AMF向UE发送认证请求(authentication request),所述认证请求中携带上述ABBA_New。UE使用接收到的ABBA_New生成AMF密钥。Step 1307: The Target AMF sends an authentication request (authentication request) to the UE, and the authentication request carries the aforementioned ABBA_New. The UE uses the received ABBA_New to generate the AMF key.
需要说明的是,在本申请实施例中,对UE的N2切换、从EPS至5GS切换、从EPS到5GS的空闲态移动的过程,与上述相似。It should be noted that in the embodiment of the present application, the process of N2 handover, handover from EPS to 5GS, and idle state movement from EPS to 5GS for the UE are similar to the above.
针对UE的N2切换(从Old AMF切换到Target AMF)场景,除了以下步骤,与图3所示流程的描述相同,不同的步骤为:For the UE N2 handover (switch from Old AMF to Target AMF) scenario, except for the following steps, it is the same as the description of the process shown in Figure 3, and the different steps are:
步骤303:Old AMF向Target AMF请求创建UE上下文。例如,Old AMF可向Target AMF发送创建UE上下文请求消息。例如,该创建UE上下文请求消息可以为Namf_Communication_CreateUEContext Request。所述创建UE上下文请求消息中可携带有UE支持的安全特性,或者,ABBA_Old参数。Step 303: The Old AMF requests the Target AMF to create a UE context. For example, Old AMF may send a UE context creation request message to Target AMF. For example, the UE context creation request message may be Namf_Communication_CreateUEContext Request. The UE context creation request message may carry security features supported by the UE, or the ABBA_Old parameter.
Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF的安全特性,生成ABBA_New。Target AMF生成ABBA_New可发生在步骤303和306之间的任意时刻。The Target AMF generates ABBA_New according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features of the Target AMF. The Target AMF generating ABBA_New can occur at any time between steps 303 and 306.
步骤306:Target AMF向UE发送认证请求,并在认证请求中携带ABBA_New。Step 306: Target AMF sends an authentication request to the UE, and carries ABBA_New in the authentication request.
UE使用ABBA_New生成AMF密钥。The UE uses ABBA_New to generate the AMF key.
针对UE从EPS到5GS的切换场景,除了以下步骤,与图10所示的流程相同,不同步骤为:For the UE handover scenario from EPS to 5GS, except for the following steps, it is the same as the process shown in Figure 10, with the different steps as follows:
步骤10010:Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,生成ABBA_New参数。Step 10010: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Generate the ABBA_New parameter.
步骤10011:Target AMF向UE发起认证请求,认证请求中携带ABBA_New。Step 10011: Target AMF initiates an authentication request to the UE, and the authentication request carries ABBA_New.
步骤10012:UE使用接收到的ABBA_New,生成AMF密钥。Step 10012: The UE uses the received ABBA_New to generate an AMF key.
针对UE空闲态从EPS移动到5GS的场景,除了以下步骤与图11所示的流程相同,不同步骤为:For the scenario where the UE moves from EPS to 5GS in idle state, except for the following steps are the same as the process shown in Figure 11, the different steps are:
步骤1108:Target AMF根据接收到的UE支持的安全特性(或者,接收到的ABBA_Old 中指示的UE支持的安全特性,或者,本地存储的UE支持的安全特性),以及Target AMF支持的安全特性,确定ABBA_New参数。Step 1108: Target AMF according to the received security features supported by the UE (or the security features supported by the UE indicated in the received ABBA_Old, or the security features supported by the UE stored locally) and the security features supported by the Target AMF, Determine the ABBA_New parameter.
步骤1109:Target AMF向UE发送认证请求,并在该认证请求中包括ABBA_New。Step 1109: Target AMF sends an authentication request to the UE, and includes ABBA_New in the authentication request.
步骤11010:UE使用接收到的ABBA_New生成AMF密钥。Step 11010: The UE uses the received ABBA_New to generate an AMF key.
在上述实施例二中,实现了Target AMF和UE之间进行安全特性协商,且将ABBA_New作为密钥推演的参数,推演AMF密钥。In the second embodiment above, the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key derivation parameter to derive the AMF key.
实施例三Example three
如图14所示,在一种可能的实现方式中,Target AMF获取Old AMF支持的安全特性,以及UE支持的安全特性。例如,Target AMF可以接收Old AMF发送的UE支持的安全特性,以及Old AMF支持的安全特性。或者,Target AMF可以接收Old AMF发送的ABBA_Old,该ABBA_Old中包括UE支持的安全特性和Old AMF支持的安全特性。或者,Target AMF可根据本地存储,获取UE支持的安全特性和/或Old AMF支持的安全特性。之后,Target AMF可判断Target AMF与Old AMF所支持的安全特性是否相同。如果Old AMF支持的安全特性,与Target AMF所支持的安全特性不同,则Target AMF可根据UE和Target AMF支持的安全特性,设置ABBA_New。Target AMF根据设置的ABBA_New,推衍新的AMF密钥,并通知UE进行AMF密钥推衍。例如,Target AMF可向UE发送NAS SMC,该NAS SMC中携带有ABBA_New以及可选的Indicator1,该Indicator1用于指示UE进行AMF密钥更新或者根据ABBA_New生成新的AMF密钥。As shown in Figure 14, in a possible implementation, the Target AMF obtains the security features supported by the Old AMF and the security features supported by the UE. For example, the Target AMF can receive the security features supported by the UE sent by the Old AMF and the security features supported by the Old AMF. Alternatively, the Target AMF may receive ABBA_Old sent by the Old AMF, and the ABBA_Old includes the security features supported by the UE and the security features supported by the Old AMF. Alternatively, the Target AMF may obtain the security features supported by the UE and/or the security features supported by the Old AMF based on local storage. Afterwards, the Target AMF can determine whether the security features supported by the Target AMF and the Old AMF are the same. If the security features supported by Old AMF are different from those supported by Target AMF, Target AMF can set ABBA_New according to the security features supported by UE and Target AMF. Target AMF derives a new AMF key according to the set ABBA_New, and notifies the UE to derive the AMF key. For example, the Target AMF may send a NAS SMC to the UE. The NAS SMC carries ABBA_New and optional Indicator1, which is used to instruct the UE to update the AMF key or generate a new AMF key according to ABBA_New.
实施例三与上述实施例一的不同之处在于:The third embodiment is different from the above-mentioned first embodiment in:
1、Target AMF需要获取Old AMF支持的安全特性。1. Target AMF needs to obtain the security features supported by Old AMF.
2、Target AMF判断Target AMF和Old AMF支持的安全特性是否相同。如果不同,则Target AMF才设置ABBA_New,并推演密钥。否则,不再设置ABBA_New。2. Target AMF judges whether the security features supported by Target AMF and Old AMF are the same. If they are different, then Target AMF sets ABBA_New and derives the key. Otherwise, ABBA_New is no longer set.
图15示出了实施例三的一种流程,该流程可以为UE在5G的空闲态移动的具体流程,包括但不限于:FIG. 15 shows a process of the third embodiment. The process may be a specific process of the UE moving in the idle state of 5G, including but not limited to:
步骤1501,UE注册到Old AMF。In step 1501, the UE registers with Old AMF.
步骤1502,UE空闲态移动。In step 1502, the UE moves in an idle state.
步骤1503,UE向Target AMF发送注册请求(registration request,RR)消息。该RR消息中可选的包括5G-GUTI。Step 1503: The UE sends a registration request (registration request, RR) message to the Target AMF. The RR message may optionally include 5G-GUTI.
步骤1504,Target AMF向Old AMF发送UE上下文请求。例如UE上下文请求可以是Namf_Communicaiton_UEContextTransfer Request。Step 1504: The Target AMF sends a UE context request to the Old AMF. For example, the UE context request may be Namf_Communicaiton_UEContextTransfer Request.
步骤1505,Old AMF向Target AMF发送UE上下文响应。例如UE上下文响应可以是Namf_Communicaiton_UEContextTransfer Request。该UE上下文响应中携带有UE支持的安全特性和/或,Old AMF支持的安全特性,和/或ABBA_Old。ABBA_Old中包括UE的安全特性,以及Old AMF的安全特性。进一步,该UE上下文响应中还携带有Old AMF的AMF密钥。Step 1505: The Old AMF sends a UE context response to the Target AMF. For example, the UE context response may be Namf_Communicaiton_UEContextTransfer Request. The UE context response carries the security features supported by the UE and/or the security features supported by Old AMF, and/or ABBA_Old. ABBA_Old includes the security features of UE and the security features of Old AMF. Further, the UE context response also carries the AMF key of Old AMF.
步骤1506,如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据UE和Target AMF的安全特性,确定ABBA_New。Target AMF使用ABBA_New推衍AMF密钥。Target AMF推衍AMF密钥还可使用Old AMF的AMF密钥。 也就是说,Target AMF可根据ABBA_New以及Old AMF的AMF密钥,推衍AMF密钥。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 1506: If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. The AMF key derived by Target AMF can also use the AMF key of Old AMF. In other words, Target AMF can derive the AMF key based on the AMF keys of ABBA_New and Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
步骤1507,Target AMF向UE发送NAS SMC,该NAS SMC中携带有ABBA_New,以及可选的Indicator1。该Indicator1用于指示UE进行AMF密钥推演,或者根据ABBA_New生成新的AMF密钥。Step 1507: The Target AMF sends a NAS SMC to the UE, and the NAS SMC carries ABBA_New and optional Indicator1. The Indicator1 is used to instruct the UE to perform AMF key derivation, or to generate a new AMF key according to ABBA_New.
步骤1508,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New和Old AMF的AMF密钥。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。Step 1508: When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same manner as the network side, and the parameters used include ABBA_New and Old AMF AMF keys. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
关于UE的N2切换、UE空闲态从EPS移动到5GS,UE从EPS切换到5GS的流程,与上述相似。Regarding the UE's N2 handover, the UE idle state moves from EPS to 5GS, and the UE switches from EPS to 5GS, the procedure is similar to the above.
针对UE的N2切换(从Old AMF切换到Target AMF)场景,除了以下步骤与图9所示的流程和描述相同,不同的步骤为:For the UE N2 handover (switch from Old AMF to Target AMF) scenario, except that the following steps are the same as the process and description shown in Figure 9, the different steps are:
步骤903,Old AMF向Target AMF请求创建UE上下文。例如,Old AMF可向Target AMF发送创建UE上下文请求消息。例如,该创建UE上下文请求消息可以为Namf_Communication_CreateUEContext Request。所述创建UE上下文请求消息中可携带有UE支持的安全特性,和/或,Old AMF的安全特性,和/或,ABBA_Old参数。In step 903, the Old AMF requests the Target AMF to create a UE context. For example, Old AMF may send a UE context creation request message to Target AMF. For example, the UE context creation request message may be Namf_Communication_CreateUEContext Request. The UE context creation request message may carry the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
步骤904,如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据UE和Target AMF的安全特性,确定ABBA_New。Target AMF使用ABBA_New推衍AMF密钥。Target AMF推衍AMF密钥还使用Old AMF的AMF密钥。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 904: If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
针对UE从EPS到5GS的切换场景,除了以下步骤与图10所示的流程相同,不同的步骤为:For the UE handover scenario from EPS to 5GS, except that the following steps are the same as the process shown in Figure 10, the different steps are:
步骤1009:Old AMF向Target AMF发送UE上下文请求响应消息,该上下文请求响应消息可以为Namf_Communication_UEContextTransfer Response。该上下文请求响应消息中可包括UE支持的安全特性,和/或,Old AMF的安全特性,和/或,ABBA_Old参数。Step 1009: The Old AMF sends a UE context request response message to the Target AMF. The context request response message may be Namf_Communication_UEContextTransfer Response. The context request response message may include the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
步骤10010:如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据UE和Target AMF的安全特性,确定ABBA_New。Target AMF使用ABBA_New推衍AMF密钥。Target AMF推衍AMF密钥还使用Old AMF的AMF密钥。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 10010: If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
针对UE空闲态从EPS移动到5GS的场景,除以下步骤与图11所示的流程相同,不 同步骤为:For the scenario where the UE moves from EPS to 5GS in the idle state, except for the following steps are the same as the process shown in Figure 11, the different steps are:
步骤1107:Old AMF向Target AMF发送UE上下文响应,UE上下文响应可以为Namf_Communication_UEContextTransfer Response。该UE上下文响应中包括UE支持的安全特性,和/或,Old AMF的安全特性,和/或,ABBA_Old参数。Step 1107: The Old AMF sends a UE context response to the Target AMF, and the UE context response may be Namf_Communication_UEContextTransfer Response. The UE context response includes the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
步骤1108:如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据UE和Target AMF的安全特性,确定ABBA_New。Target AMF使用ABBA_New推衍AMF密钥。Target AMF推衍AMF密钥还使用Old AMF的AMF密钥。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 1108: If the security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF determines ABBA_New according to the security features of the UE and the Target AMF. Target AMF uses ABBA_New to derive the AMF key. Target AMF derives the AMF key and also uses the AMF key of Old AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
在上述实施例三中,实现了Target AMF和UE之间进行安全特性协商,且将ABBA_New作为密钥推衍的参数,作为AMF密钥。In the third embodiment above, the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the key derivation parameter and used as the AMF key.
实施例四Embodiment four
如图16所示,在实施例四中,Target AMF获取UE支持的安全特性和Old AMF支持的安全特性。如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据获取到的UE支持的安全特性和Target AMF支持的安全特性,设置ABBA_New参数,发起主认证流程,并将设置的ABBA_New参数通过主认证流程发送给UE。例如,Target AMF可向UE发送认证请求(authentication request),该认证请求中携带有ABBA_New参数。As shown in FIG. 16, in the fourth embodiment, the Target AMF obtains the security features supported by the UE and the security features supported by the Old AMF. If the security features supported by Old AMF are different from those supported by Target AMF, Target AMF sets the ABBA_New parameter according to the acquired security features supported by the UE and the security features supported by Target AMF, initiates the main authentication process, and sets the ABBA_New The parameters are sent to the UE through the main authentication process. For example, the Target AMF may send an authentication request (authentication request) to the UE, and the authentication request carries the ABBA_New parameter.
Target AMF获取UE支持的安全特性和/或Old AMF支持的安全特性,可以通过以下方式中的任一种:Target AMF can obtain the security features supported by the UE and/or the security features supported by the Old AMF in any of the following ways:
1、Old AMF向Target AMF发送UE支持的安全特性和/或Old AMF支持的安全特性。1. The Old AMF sends the security features supported by the UE and/or the security features supported by the Old AMF to the Target AMF.
2、Old AMF向Target AMF发送ABBA_Old。2. Old AMF sends ABBA_Old to Target AMF.
3、Target AMF根据本地存储或者配置,获取UE支持的安全特性和/或Old AMF支持的安全特性。3. The Target AMF obtains the security features supported by the UE and/or the security features supported by the Old AMF according to local storage or configuration.
实施例四与实施例二的不同之处,在于:The difference between the fourth embodiment and the second embodiment is:
1、Target AMF要获取Old AMF支持的安全特性。1. Target AMF needs to obtain the security features supported by Old AMF.
2、Target AMF判断Target AMF和Old AMF支持的安全特性是否相同。如果不同,Target AMF才设置ABBA_New参数,发起主认证。2. Target AMF judges whether the security features supported by Target AMF and Old AMF are the same. If they are different, Target AMF sets the ABBA_New parameter and initiates the master authentication.
如图17所示,提供实施例四的一种流程。该流程可以为UE在5G的空闲态移动的具体流程,该流程包括但不限于:As shown in FIG. 17, a process of the fourth embodiment is provided. The process may be a specific process of the UE moving in the idle state of 5G, and the process includes but is not limited to:
步骤1701,UE注册到Old AMF。Step 1701: The UE registers with Old AMF.
步骤1702,UE空闲态移动。Step 1702, the UE moves in an idle state.
步骤1703,UE向Target AMF发送注册请求(reqistration request,RR)。该注册请求中可选的携带有5G-GUTI。Step 1703: The UE sends a registration request (reqistration request, RR) to the Target AMF. The registration request optionally carries 5G-GUTI.
步骤1704,如果RR中5G-GUTI,Target AMF向Old AMF发送UE上下文请求消息。例如,该UE上下文请求消息可以是Namf_Communicaiton_UEContextTransfer Request。Step 1704: If 5G-GUTI is in the RR, the Target AMF sends a UE context request message to the Old AMF. For example, the UE context request message may be Namf_Communicaiton_UEContextTransfer Request.
步骤1705,Old AMF向Target AMF发送UE上下文响应消息。例如,该UE上下文响应消息可以是Namf_Communicaiton_UEContextTransfer Response。该UE上下文响应消息 中包括UE安全的安全特性,和/或,Old AMF支持的安全特性,和/或,ABBA_Old。Step 1705: The Old AMF sends a UE context response message to the Target AMF. For example, the UE context response message may be Namf_Communicaiton_UEContextTransfer Response. The UE context response message includes UE security security features, and/or security features supported by Old AMF, and/or ABBA_Old.
步骤1706,如果Old AMF与Target AMF所支持的安全特性不同,则Target AMF根据UE支持的安全特性以及Target AMF支持的安全特性,确定ABBA_New。Step 1706: If the security features supported by the Old AMF and the Target AMF are different, the Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF.
Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
步骤1707,Target AMF向UE发送认证请求(authentication request),该认证请求中包括ABBA_New。Step 1707: The Target AMF sends an authentication request (authentication request) to the UE, and the authentication request includes ABBA_New.
关于UE的N2切换、UE空闲态从EPS移动到5GS,UE从EPS切换到5GS,与上述过程相似。Regarding the N2 handover of the UE, the idle state of the UE moves from EPS to 5GS, and the UE switches from EPS to 5GS, similar to the above process.
针对UE的N2切换(从Old AMF切换到Target AMF)场景,除了以下步骤与图3所示的流程和描述相同,该不同步骤为:For the UE N2 handover (switch from Old AMF to Target AMF) scenario, except that the following steps are the same as the process and description shown in Figure 3, the different steps are:
步骤303:Old AMF向Target AMF请求创建UE上下文。例如,Old AMF可向Target AMF发送创建UE上下文请求消息。例如,该创建UE上下文请求消息可以为Namf_Communication_CreateUEContext Request。所述创建UE上下文请求消息中可携带有UE支持的安全特性,和/或,Old AMF的安全特性,和/或,ABBA_Old参数。Step 303: The Old AMF requests the Target AMF to create a UE context. For example, Old AMF may send a UE context creation request message to Target AMF. For example, the UE context creation request message may be Namf_Communication_CreateUEContext Request. The UE context creation request message may carry the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
如果Old AMF与Target AMF所支持的安全特性不同,则Target AMF根据UE支持的安全特性以及Target AMF支持的安全特性,确定ABBA_New。Target AMF设置ABBA_New可发生在步骤303和306之间的任意时刻。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。If the security features supported by Old AMF and Target AMF are different, Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by Target AMF. Target AMF setting ABBA_New can occur at any time between steps 303 and 306. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
步骤306:Target AMF向UE发送认证请求,并在认证请求中携带ABBA_New。Step 306: Target AMF sends an authentication request to the UE, and carries ABBA_New in the authentication request.
UE使用ABBA_New生成AMF密钥。The UE uses ABBA_New to generate the AMF key.
针对UE从EPS到5GS的切换场景,除了以下步骤与图10所示的流程相同,该不同步骤为:For the UE handover scenario from EPS to 5GS, except that the following steps are the same as the process shown in Figure 10, the different steps are:
步骤1009:Old AMF向Target AMF发送UE上下文请求响应消息,该上下文请求响应消息可以为Namf_Communication_UEContextTransfer Response。该上下文请求响应消息中可包括UE支持的安全特性,和/或Old AMF的安全特性,和/或ABBA_Old参数。Step 1009: The Old AMF sends a UE context request response message to the Target AMF. The context request response message may be Namf_Communication_UEContextTransfer Response. The context request response message may include the security features supported by the UE, and/or the security features of Old AMF, and/or the ABBA_Old parameter.
步骤10010:如果Old AMF与Target AMF所支持的安全特性不同,则Target AMF根据UE支持的安全特性以及Target AMF支持的安全特性,确定ABBA_New。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 10010: If the security features supported by the Old AMF and the Target AMF are different, the Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by the Target AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
步骤10011:Target AMF向UE发起认证请求,认证请求中携带ABBA_New。Step 10011: Target AMF initiates an authentication request to the UE, and the authentication request carries ABBA_New.
步骤10012:UE使用接收到的ABBA_New生成AMF密钥。Step 10012: The UE uses the received ABBA_New to generate an AMF key.
针对UE空闲态从EPS移动到5GS的场景,除了以下步骤与图11所示的流程相同,该不同步骤为:For the scenario where the UE moves from EPS to 5GS in the idle state, except that the following steps are the same as the process shown in Figure 11, the different steps are:
步骤1107:Old AMF向Target AMF发送UE上下文响应,UE上下文响应可以为Namf_Communication_UE ContextTransferResponse。该UE上下文响应中包括UE支持的安全特性,和/或,ABBA_Old参数,和/或,Old AMF的安全特性。Step 1107: Old AMF sends a UE context response to Target AMF, and the UE context response may be Namf_Communication_UEContextTransferResponse. The UE context response includes the security features supported by the UE, and/or the ABBA_Old parameter, and/or the security features of Old AMF.
步骤1108:如果Old AMF与Target AMF所支持的安全特性不同,则Target AMF根据UE支持的安全特性以及Target AMF支持的安全特性,确定ABBA_New。Target AMF获取UE安全特性或Old AMF安全特性,可以通过以下任意一种方式:根据Old AMF发送的UE安全特性或Old AMF安全特性;根据Old AMF发送的ABBA_Old;根据本次配置或存储。Step 1108: If the security features supported by Old AMF and Target AMF are different, Target AMF determines ABBA_New according to the security features supported by the UE and the security features supported by Target AMF. Target AMF can obtain UE security features or Old AMF security features in any of the following ways: according to the UE security features or Old AMF security features sent by Old AMF; according to ABBA_Old sent by Old AMF; according to this configuration or storage.
步骤1109:Target AMF向UE发送认证请求,并在该认证请求中包括ABBA_New。Step 1109: Target AMF sends an authentication request to the UE, and includes ABBA_New in the authentication request.
步骤11010:UE使用接收到的ABBA_New生成AMF密钥。Step 11010: The UE uses the received ABBA_New to generate an AMF key.
在上述实施例四中,实现了Target AMF和UE之间进行安全特性协商,且将ABBA_New作为推衍AMF的参数。In the fourth embodiment above, the security feature negotiation between the Target AMF and the UE is realized, and ABBA_New is used as the parameter to derive the AMF.
实施例五Embodiment five
实施例五与上述实施例一至实施例四的不同之处在于,Target AMF从UE处获取UE安全特性和/或ABBA_Old,ABBA_Old中包括UE支持的安全特性和Old AMF支持的安全特性。Target也可以从本地配置或者存储中获取UE安全特性和/或Old AMF的安全特性。Target AMF获取到上述UE支持的安全特性和/或Old AMF支持的安全特性之后,可执行以下四种操作的任何一种。可参见图18所示。The fifth embodiment is different from the foregoing embodiments 1 to 4 in that the Target AMF obtains the UE security features and/or ABBA_Old from the UE, and ABBA_Old includes the security features supported by the UE and the security features supported by the Old AMF. Target can also obtain UE security features and/or Old AMF security features from local configuration or storage. After the Target AMF obtains the security features supported by the UE and/or the security features supported by the Old AMF, it can perform any one of the following four operations. This can be seen in Figure 18.
操作一:根据获取到的UE的安全特性,和Target AMF支持的安全特性,确定ABBA_New;Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF根据ABBA_New,生成AMF密钥。生成AMF密钥使用的参数包括设置的ABBA_New。Target AMF将设置的ABBA_New和可选的Indicator1发送给UE。UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New。然后UE根据新生成的AMF密钥生成NAS加密密钥和完整性密钥。参考实施例一,与实施例一的区别在于Target AMF获取安全特性的方式不同。Operation 1: Determine ABBA_New according to the acquired security features of the UE and the security features supported by the Target AMF; Target AMF acquires the security features of the UE, which can be the security features of the UE received from the RR or the security features received from the RR The security features of the UE in ABBA_Old, or the security features of the UE configured or stored locally. Target AMF generates an AMF key according to ABBA_New. The parameters used to generate the AMF key include the set ABBA_New. The Target AMF sends the set ABBA_New and optional Indicator1 to the UE. When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the newly generated AMF key. With reference to the first embodiment, the difference from the first embodiment is that the target AMF obtains the security feature in a different way.
操作二:根据获取的UE的安全特性,和Target AMF的安全特性,确定ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF在后续生成新的AMF密钥时,使用ABBA_New。Target AMF发起认证流程,将ABBA_New发送给UE;参考实施例二,与实施例二的区别在于Target AMF获取安全特性的方式不同。Operation 2: Determine ABBA_New according to the acquired UE's security features and Target AMF's security features. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF uses ABBA_New when generating a new AMF key later. The Target AMF initiates the authentication process and sends ABBA_New to the UE; referring to the second embodiment, the difference from the second embodiment is that the target AMF obtains the security feature in a different way.
操作三:如果获取到的Old AMF支持的安全特性与Target AMF所支持的安全特性不同,则Target AMF根据获取到的UE支持的安全特性与Target AMF支持的安全特性,设置ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF获取Old AMF的安全特性,可以是从RR中接收到的ABBA_Old 中的Old AMF的安全特性、或者本地配置或存储的Old AMF的安全特性。Target AMF根据ABBA_New,生成AMF密钥。生成AMF密钥使用的参数包括设置的ABBA_New。Target AMF将ABBA_New和可选的指示Indicator1发送给UE。UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New。UE生成AMF密钥使用的参数包括接收到的ABBA_New。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。参考实施例三,区别在于Target AMF获取安全特性的方式不同。Operation 3: If the acquired security features supported by the Old AMF are different from those supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored. Target AMF generates an AMF key according to ABBA_New. The parameters used to generate the AMF key include the set ABBA_New. The Target AMF sends ABBA_New and an optional indication Indicator1 to the UE. When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. The parameters used by the UE to generate the AMF key include the received ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key. With reference to the third embodiment, the difference lies in the way in which the Target AMF obtains the security feature.
操作四:如果获取到的Old AMF支持的安全特性与Target AMF所支持的安全特性不同,则Target AMF根据获取到的UE支持的安全特性与Target AMF支持的安全特性,设置ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF获取Old AMF的安全特性,可以是从RR中接收到的ABBA_Old中的Old AMF的安全特性、或者本地配置或存储的Old AMF的安全特性。Target AMF发起认证流程,将设置的ABBA_New发送给UE。参考实施例四,注意区别在于Target AMF获取安全特性的方式不同。Operation 4: If the acquired security features supported by the Old AMF are different from those supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored. Target AMF initiates the authentication process and sends the set ABBA_New to the UE. With reference to the fourth embodiment, note that the difference lies in the way in which the Target AMF obtains the security feature.
如图19所示,提供实施例五的一种具体流程,该流程包括但不限于:As shown in Figure 19, a specific process of Embodiment 5 is provided, and the process includes but is not limited to:
步骤1901,UE向Target AMF发送注册请求(reqistration request,RR)消息,RR消息中ABBA_Old和/或UE的安全特性。RR中可能携带5G-GUTI。Step 1901: The UE sends a registration request (reqistration request, RR) message to the Target AMF, and ABBA_Old and/or the security feature of the UE in the RR message. The RR may carry 5G-GUTI.
步骤1902,如果RR中携带5G-GUTI,则Target AMF向Old AMF发UE上下文的请求消息。例如,UE上下文的请求消息可以是Namf_Communication_UEContextTransfer Request。Step 1902: If the RR carries 5G-GUTI, the Target AMF sends a UE context request message to the Old AMF. For example, the request message of the UE context may be Namf_Communication_UEContextTransfer Request.
步骤1903,Old AMF接收Target AMF发送的UE上下文的响应消息,所述UE上下文的响应消息中包括Old AMF的AMF密钥。例如UE上下文的响应消息可以是Namf_Communication_UEContextTransfer Response。该UE上下文响应消息中包括Old AMF的AMF密钥。Step 1903: The Old AMF receives the UE context response message sent by the Target AMF, where the UE context response message includes the AMF key of the Old AMF. For example, the response message of the UE context may be Namf_Communication_UEContextTransfer Response. The UE context response message includes the AMF key of Old AMF.
可选的,在一种可能的实现方式中,可执行下述操作一:Optionally, in a possible implementation manner, the following operation one can be performed:
步骤1904a,Target AMF根据获取的UE的安全特性,和Target AMF的安全特性,确定ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF生成新的AMF密钥。生成新的AMF密钥,使用ABBA_New。推衍新的AMF密钥,还使用Old AMF的AMF密钥。In step 1904a, the Target AMF determines ABBA_New according to the acquired security features of the UE and the security features of the Target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF generates a new AMF key. To generate a new AMF key, use ABBA_New. The new AMF key is derived, and the Old AMF AMF key is also used.
步骤1905a,Target AMF向Old AMF发送NAS SMC,该NAS SMC中包括ABBA_New参数以及可选的Indicator1。Indicator1用于指示UE推衍AMF密钥,或用于指示UE使用ABBA_New生成AMF密钥。In step 1905a, the Target AMF sends the NAS SMC to the Old AMF, and the NAS SMC includes the ABBA_New parameter and the optional Indicator1. Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key.
步骤1906a,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。In step 1906a, when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
可选的,在另一种可的实现方式中,可执行下述操作二:Optionally, in another possible implementation manner, the following operation two can be performed:
步骤1904b,Target AMF根据获取的UE的安全特性,和Target AMF的安全特性,确定ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF在后续推衍新的AMF密钥时,使用ABBA_New。In step 1904b, the Target AMF determines ABBA_New according to the acquired security features of the UE and the security features of the Target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF uses ABBA_New when deriving a new AMF key later.
步骤1905b,Target AAMF发起主认证流程,向UE发送认证请求(authentication request),该认证请求中包括ABBA_New参数。UE使用该ABBA_New生成AMF密钥。Step 1905b, Target AAMF initiates the main authentication process, and sends an authentication request (authentication request) to the UE. The authentication request includes the ABBA_New parameter. The UE uses the ABBA_New to generate the AMF key.
可选的,在另一种可能的实现方式中,可执行下述操作三:Optionally, in another possible implementation manner, the following operation three can be performed:
步骤1904c,如果获取到的Old AMF支持的安全特性与Target AMF所支持的安全特性不同,则Target AMF根据获取到的UE支持的安全特性与Target AMF支持的安全特性,设置ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF获取Old AMF的安全特性,可以是从RR中接收到的ABBA_Old中的Old AMF的安全特性、或者本地配置或存储的Old AMF的安全特性。Target AMF使用ABBA_New生成新的AMF密钥。Step 1904c, if the acquired security features supported by the Old AMF are different from the security features supported by the Target AMF, the Target AMF sets ABBA_New according to the acquired security features supported by the UE and the security features supported by the Target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored. Target AMF uses ABBA_New to generate a new AMF key.
步骤1905c,Target AMF向UE发送NAS消息,该NAS消息中包括ABBA_New参数以及可选的Indicator1。Indicator1用于指示UE推衍AMF密钥,或用于指示UE使用ABBA_New生成AMF密钥。In step 1905c, the Target AMF sends a NAS message to the UE. The NAS message includes the ABBA_New parameter and optional Indicator1. Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key.
步骤1906c,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式,使用的参数包括ABBA_New。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。In step 1906c, when the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side, and the parameters used include ABBA_New. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
可选的,在另一种可能的实现方式中,可执行下述操作四:Optionally, in another possible implementation manner, the following operation four can be performed:
步骤1904d,如果获取到的Old AMF支持的安全特性与Target AMF支持的安全特性不同,则Target AMF根据获取到的UE的安全特性以及Target AMF的安全特性,确定ABBA_New。Target AMF获取UE的安全特性,可以是从RR中接收到的UE的安全特性、或者RR中接收到的ABBA_Old中的UE的安全特性、或者本地配置或存储的UE的安全特性。Target AMF获取Old AMF的安全特性,可以是从RR中接收到的ABBA_Old中的Old AMF的安全特性、或者本地配置或存储的Old AMF的安全特性。Target AMF在后续推衍新的AMF密钥时,使用ABBA_New。In step 1904d, if the acquired security features supported by the Old AMF are different from those supported by the Target AMF, the Target AMF determines ABBA_New according to the acquired security features of the UE and the target AMF. The Target AMF obtains the security features of the UE, which may be the security features of the UE received from the RR, or the security features of the UE in ABBA_Old received from the RR, or the security features of the UE that are locally configured or stored. Target AMF obtains the security features of Old AMF, which may be the security features of Old AMF in ABBA_Old received from the RR, or the security features of Old AMF that are locally configured or stored. Target AMF uses ABBA_New when deriving a new AMF key later.
步骤1905d,Target AMF发起主认证流程,向UE发送认证请求(authentication request),该认证请求中包括ABBA_New参数。之后,UE根据ABBA_New,生成新的AMF密钥。Step 1905d, Target AMF initiates the main authentication process, and sends an authentication request (authentication request) to the UE. The authentication request includes the ABBA_New parameter. After that, the UE generates a new AMF key according to ABBA_New.
在上述实施例四中,实现了Target AMF和UE之间进行安全特性协商,将ABBA_New作为输入参数,生成新的AMF密钥。In the fourth embodiment above, the security feature negotiation between the Target AMF and the UE is implemented, and ABBA_New is used as an input parameter to generate a new AMF key.
实施例六Example Six
在上述实施例一至实施例五中,都是Target AMF获取安全特性,设置ABBA_New,推衍AMF密钥。而在本申请实施例六中,由Old AMF获取安全特性,设置ABBA_New。Old AMF还可根据ABBA_New推衍密钥。例如,参见图20所示。In the first to fifth embodiments above, Target AMF acquires security features, sets ABBA_New, and derives the AMF key. In the sixth embodiment of this application, Old AMF obtains the security feature and sets ABBA_New. Old AMF can also derive the key based on ABBA_New. For example, see Figure 20.
Old AMF获取Target AMF的安全特性。Old AMF获取Old AMF获取Target AMF的安 全特性,可以通过:Target AMF可向Old AMF发送Target AMF安全特性;或者Old AMF根据本地存储或者配置获取Target AMF的安全特性。Old AMF acquires the security features of Target AMF. Old AMF obtains Old AMF to obtain the security features of Target AMF through: Target AMF can send Target AMF security features to Old AMF; or Old AMF obtains Target AMF security features based on local storage or configuration.
Old AMF根据UE的安全特性和Target AMF的安全特性,确定ABBA_New。Old AMF determines ABBA_New according to the security features of UE and Target AMF.
Old AMF推演新的AMF密钥。推衍新的AMF密钥使用的参数包括ABBA_New。推衍新的AMF密钥使用的参数还可以包括以下中的任意一种:Old AMF derives a new AMF key. The parameters used to derive the new AMF key include ABBA_New. The parameters used to derive the new AMF key can also include any of the following:
1、当前的AMF密钥,即Old AMF的密钥。1. The current AMF key, that is, the key of Old AMF.
2、对当前的AMF密钥进行水平K AMF推演生成的密钥。 2. The key generated by horizontal K AMF deduction on the current AMF key.
可选地,Old AMF在确定ABBA_New之前,Old AMF判断Target AMF的安全特性与Old AMF支持的安全特性是否相同;如果不同,则Old AMF根据UE安全特性和Target AMF安全特性,确定ABBA_New,生成新的AMF密钥。Optionally, before Old AMF determines ABBA_New, Old AMF determines whether the security features of Target AMF are the same as those supported by Old AMF; if they are different, Old AMF determines ABBA_New according to UE security features and Target AMF security features, and generates a new one. The AMF key.
Old AMF将推衍新的AMF密钥所需的参数ABBA_New以及可选的Indicator1,发送给UE。或者,Old AMF也可将ABBA_New和可选的Indicator2,发送给Target AMF。之后由Target AMF发送给UE。Target AMF将接收到的ABBA_New发给UE。如果Target AMF接收到Indicator2,则Target AMF发送Indicator1给UE。Old AMF sends the parameters ABBA_New and optional Indicator1 required to derive the new AMF key to the UE. Alternatively, Old AMF can also send ABBA_New and optional Indicator2 to Target AMF. Then it is sent to the UE by Target AMF. The Target AMF sends the received ABBA_New to the UE. If the Target AMF receives Indicator2, the Target AMF sends Indicator1 to the UE.
在本申请中,该Indicator1用于指示UE进行AMF密钥推衍,或者用于指示UE使用ABBA_New生成AMF密钥。Indicator2指示的含义同Indicator1。Indicator2和Indicator1可以为同一个指示,或者不同的指示。In this application, the Indicator1 is used to instruct the UE to derive the AMF key, or to instruct the UE to use ABBA_New to generate the AMF key. The meaning of Indicator2 indication is the same as Indicator1. Indicator2 and Indicator1 can be the same indicator or different indicators.
UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。然后UE根据新的AMF密钥生成NAS加密密钥和完整性密钥。When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key.
如图21所示提供实施例六的一种具体流程。例如,该流程可以为UE在5GS的空闲态移动注册流程。该流程同样适用UE从EPS切换到5GS后的注册流程,和UE从EPS空闲态移动到5GS的注册流程。该流程包括但不限于:As shown in FIG. 21, a specific process of the sixth embodiment is provided. For example, the procedure may be a mobile registration procedure of the UE in the 5GS idle state. This procedure is also applicable to the registration procedure after the UE switches from EPS to 5GS, and the registration procedure when UE moves from EPS idle state to 5GS. This process includes but is not limited to:
步骤2103,UE向Target AMF发送注册请求RR消息,所述注册请求RR消息中可选地携带有5G-GUTI。Step 2103: The UE sends a registration request RR message to the Target AMF, where the registration request RR message may optionally carry 5G-GUTI.
步骤2104,如果RR中有5G-GUTI,则Target AMF向Old AMF发送UE上下文请求,所述UE上下文请求中携带有Target AMF所支持的安全特性。例如,该UE上下文请求可以是Namf_Communication_UEContextTransfer Request。Step 2104: If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request to the Old AMF, and the UE context request carries the security features supported by the Target AMF. For example, the UE context request may be Namf_Communication_UEContextTransfer Request.
步骤2105,Old AMF根据UE的安全特性和Target AMF的安全特性,确定ABBA_New。Old AMF获取Target AMF的安全特性可以是通过:接收到Target AMF发送的Target AMF的安全特性,或者从本地存储或者配置中获取。Old AMF生成新的AMF密钥。生成新的AMF密钥所使用的密钥包括设置的ABBA_New。推衍新的AMF密钥使用的参数还可以使用Old AMF当前的AMF密钥,或者根据当前的AMF密钥进行水平K AMF推演生成的密钥。 Step 2105: The Old AMF determines ABBA_New according to the security features of the UE and the security features of the Target AMF. The Old AMF can obtain the security features of the Target AMF by: receiving the security features of the Target AMF sent by the Target AMF, or obtaining it from local storage or configuration. Old AMF generates a new AMF key. The key used to generate the new AMF key includes the set ABBA_New. The parameters used to derive the new AMF key can also use the current AMF key of Old AMF, or the key generated by horizontal K AMF derivation based on the current AMF key.
可选地,Old AMF在生成ABBA_New之前,Old AMF将Target AMF支持的安全特性,与Old AMF支持的安全特性相比较。如果两者不同,则Old AMF根据UE和Target AMF支持的安全特性,确定ABBA_New。Target AMF生成新的AMF密钥。Optionally, before Old AMF generates ABBA_New, Old AMF compares the security features supported by Target AMF with the security features supported by Old AMF. If the two are different, Old AMF determines ABBA_New according to the security features supported by the UE and Target AMF. Target AMF generates a new AMF key.
步骤2106,Old AMF向Target AMF发送UE上下文请求的响应消息。例如,UE上下文请求消息可以是Namf_Communication_UEContextTransfer Response消息。该消息中包括 ABBA_New,以及可选的指示Indicator2。Step 2106: The Old AMF sends a response message for the UE context request to the Target AMF. For example, the UE context request message may be Namf_Communication_UEContextTransfer Response message. The message includes ABBA_New, and optional indication Indicator2.
步骤2107,Target AMF向UE发送接收到的ABBA_New和可选的Indicator1。例如,Target AMF向UE发送NAS SMC。该NAS SMC中包括ABBA_New和可选的Indicator1。如果Target AMF接收到Indicator2,则Target AMF向UE发送Indicator1。Step 2107: The Target AMF sends the received ABBA_New and optional Indicator1 to the UE. For example, Target AMF sends NAS SMC to UE. The NAS SMC includes ABBA_New and optional Indicator1. If the Target AMF receives Indicator2, the Target AMF sends Indicator1 to the UE.
步骤2108,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。UE根据生成的新的AMF密钥生成NAS加密密钥和完整性密钥。Step 2108: When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. The UE generates a NAS encryption key and an integrity key according to the generated new AMF key.
图22示出了实施例六的另一流程。例如,该流程可以是UE的N2切换流程的流程。该流程包括但不限于:Fig. 22 shows another process of the sixth embodiment. For example, the procedure may be the procedure of the N2 handover procedure of the UE. This process includes but is not limited to:
步骤2201,UE注册到Old AMF。In step 2201, the UE registers with Old AMF.
步骤2202,Old AMF发起切换。Step 2202: Old AMF initiates handover.
步骤2203,Old AMF向Target AMF发送UE上下文请求消息。例如,UE上下文请求消息可以是Namf_Communication_CreateUEContextRequest。Step 2203: The Old AMF sends a UE context request message to the Target AMF. For example, the UE context request message may be Namf_Communication_CreateUEContextRequest.
步骤2204,Target AMF向Old AMF发送UE上下文请求响应。例如,UE上下文请求响应可以是Namf_Communication_CreateUEContext Response。所述UE上下文请求响应中包括Target AMF所支持的安全特性。Step 2204: The Target AMF sends a UE context request response to the Old AMF. For example, the UE context request response may be Namf_Communication_CreateUEContext Response. The UE context request response includes the security features supported by Target AMF.
步骤2205,同步骤2105。Step 2205 is the same as step 2105.
步骤2206,Old AMF向UE发送生成的ABBA_New和可选的Indicator1。比如Old AMF向UE发送NAS SMC消息,在该NAS SMC中包括设置的ABBA_New和可选的Indicator1。Step 2206: The Old AMF sends the generated ABBA_New and optional Indicator1 to the UE. For example, Old AMF sends a NAS SMC message to the UE, and the NAS SMC includes the set ABBA_New and optional Indicator1.
步骤2207,同步骤2108。Step 2207 is the same as step 2108.
在上述实施例六中,实现了Target AMF与UE之间进行安全特性协商,将且ABBA_New作为输入参数,推衍AMF的新密钥。In the sixth embodiment above, the security feature negotiation between the Target AMF and the UE is implemented, and ABBA_New is used as an input parameter to derive the new AMF key.
实施例七Example Seven
如图23所示,在实施例七中,AMF和SEAF不合设,为两个独立的网络功能。在该实施例中,AMF向SEAF请求密钥。SEAF根据UE的安全特性和Target AMF的安全特性生成ABBA_New。SEAF生成AMF密钥,使用ABBA_New。SEAF生成AMF密钥,还可以使用K SEAF或者K AMFAs shown in Figure 23, in the seventh embodiment, AMF and SEAF are not co-located, and are two independent network functions. In this embodiment, the AMF requests the key from SEAF. SEAF generates ABBA_New based on the security features of the UE and the target AMF. SEAF generates the AMF key and uses ABBA_New. SEAF generates AMF keys, you can also use K SEAF or K AMF .
SEAF将生成的AMF密钥和可选的Indicator3发送给Target AMF。Target AMF向UE发送ABBA_New和可选的Indicator1。如果Target AMF接收到Indicator3,则Target AMF向UE发送Indicator1。SEAF sends the generated AMF key and optional Indicator3 to Target AMF. The Target AMF sends ABBA_New and optional Indicator1 to the UE. If the Target AMF receives Indicator3, the Target AMF sends Indicator1 to the UE.
在本申请中,Indicator3指示的含义同Indicator1。Indicator3和Indicator1可以为同一个指示,或者不同的指示。In this application, Indicator3 has the same meaning as Indicator1. Indicator3 and Indicator1 can be the same indicator or different indicators.
其中,SEAF生成ABBA_New使用的UE安全特性和Target AMF安全特性,可通过以下方式获取。Among them, the UE security features and Target AMF security features used by SEAF to generate ABBA_New can be obtained in the following ways.
1,SEAF从本地存储或配置中获取UE安全特性,或者Target AMF向SEAF发送UE安全特性。1. SEAF obtains UE security features from local storage or configuration, or Target AMF sends UE security features to SEAF.
2,SEAF从本地存储或配置中获取Target AMF安全特性,或者Target AMF向SEAF 发送Target AMF安全特性。2. SEAF obtains Target AMF security features from local storage or configuration, or Target AMF sends Target AMF security features to SEAF.
SEAF也可以不用生成ABBA_New,而是直接从Target AMF处获取ABBA_New,即Target AMF向SEAF发送ABBA_New。SEAF can also directly obtain ABBA_New from Target AMF without generating ABBA_New, that is, Target AMF sends ABBA_New to SEAF.
图24示出了实施例七提供的一种具体流程。该流程可具体为UE在5G中的空闲态移动注册流程、UE从EPS空闲态移动到5GS的注册,或者UE从EPS切换到5GS的注册流程等。该流程包括但不限于:Fig. 24 shows a specific process provided in the seventh embodiment. The process may specifically be the idle state mobile registration process of the UE in 5G, the registration process of the UE moving from the EPS idle state to the 5GS, or the registration process of the UE switching from the EPS to the 5GS, etc. This process includes but is not limited to:
步骤2403,UE向Target AMF发送RR消息,所述RR消息中携带可选的有5G-GUTI,和可选的ABBA_Old、可选的UE安全特性。Step 2403: The UE sends an RR message to the Target AMF. The RR message carries optional 5G-GUTI, optional ABBA_Old, and optional UE security features.
步骤2404,如果有RR中有5G-GUTI,则Target AMF向Old AMF发送UE上下文请求消息。例如UE上下文请求消息可以是Namf_Communication_UEContextTransfer Resquest。Step 2404: If there is a 5G-GUTI in the RR, the Target AMF sends a UE context request message to the Old AMF. For example, the UE context request message may be Namf_Communication_UEContextTransfer Request.
步骤2405,Old AMF向Target AMF发送UE上下文响应消息。例如,UE上下文响应消息可以是Namf_Communication_UEContextTransfer Response。该消息中可选的包括UE支持的安全特性、和/或,Old AMF支持的安全特性,和/或,ABBA_Old。Step 2405: The Old AMF sends a UE context response message to the Target AMF. For example, the UE context response message may be Namf_Communication_UEContextTransfer Response. The message may optionally include security features supported by the UE, and/or security features supported by Old AMF, and/or ABBA_Old.
因此,Target AMF获取UE安全特性或Old AMF安全特性,可以是通过:UE向TargetAMF发送,或者本地存储或者配置,或者Old AMF发送。Target AMF获取ABBA_Old,可以是通过:UE发送或者Old AMF发送。Therefore, the Target AMF obtains the UE security feature or the Old AMF security feature through: the UE sends it to the TargetAMF, or stores or configures it locally, or sends it to the Old AMF. Target AMF obtains ABBA_Old, which can be sent by UE or Old AMF.
步骤2406,Target AMF向SEAF发送密钥请求消息,用于请求SEAF生成AMF密钥。该密钥请求消息中携带有UE的标识,例如,UE的订阅永久标识(subsciber permanent identifier,SUPI)或者,5G-GUTI。该密钥请求消息中还可以包括以下中的任意一项或多项:获取的UE支持的安全特性,Old AMF支持的安全特性,Target AMF支持的安全特性,ABBA_Old。Step 2406: The Target AMF sends a key request message to the SEAF, which is used to request the SEAF to generate an AMF key. The key request message carries the identity of the UE, for example, the UE's subscription permanent identifier (SUPI) or 5G-GUTI. The key request message may also include any one or more of the following: acquired security features supported by the UE, security features supported by Old AMF, security features supported by Target AMF, ABBA_Old.
可选的,Target AMF可判断获取的Old AMF支持的安全特性是否与Target AMF支持的安全特性相同;如果不同,则上述Target AMF向SEAF发送密钥请求消息。或者,Target AMF根据UE和Target AMF支持的安全特性,确定ABBA_New。Target AMF向SEAF发送密钥请求消息,在该消息中携带有ABBA_New。Optionally, the Target AMF may determine whether the acquired security features supported by the Old AMF are the same as the security features supported by the Target AMF; if they are different, the above Target AMF sends a key request message to the SEAF. Alternatively, the Target AMF determines ABBA_New according to the security features supported by the UE and the Target AMF. Target AMF sends a key request message to SEAF, which carries ABBA_New.
步骤2407,SEAF生成AMF密钥。SEAF生成AMF密钥采用的参数包括SEAF密钥或者AMF密钥,以及ABBA_New。Step 2407, SEAF generates an AMF key. The parameters used by SEAF to generate the AMF key include the SEAF key or the AMF key, and ABBA_New.
其中,SEAF生成AMF密钥采用的ABBA_New可以通过以下中的任意一种方式获取:Among them, the ABBA_New used by SEAF to generate the AMF key can be obtained in any of the following ways:
1、Target AMF向SEAF发送ABBA_New。1. Target AMF sends ABBA_New to SEAF.
2、SEAF获取UE和Target AMF支持的安全特性,SEAF生成ABBA_New。2. The SEAF obtains the security features supported by the UE and Target AMF, and the SEAF generates ABBA_New.
3、SEAF获取Old AMF和Target AMF支持的安全特性,如果Old AMF和Target AMF支持的安全特性不同,则SEAF生成ABBA_New。3. SEAF obtains the security features supported by Old AMF and Target AMF. If the security features supported by Old AMF and Target AMF are different, SEAF generates ABBA_New.
进一步,SEAF获取UE或者Target AMF或者Old AMF支持的安全特性,可以是通过以下中的任意一种方式:Further, the SEAF obtains the security features supported by the UE or Target AMF or Old AMF through any of the following methods:
1、SEAF从本地存储或配置中获取。1. SEAF is obtained from local storage or configuration.
2、Target AMF向SEAF发送UE或Target AMF或Old AMF支持的安全特性。2. The Target AMF sends the security features supported by the UE or Target AMF or Old AMF to the SEAF.
可选的,SEAF在生成AMF密钥或者ABBA_New之前,也可以先进行判断:如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则SEAF生成AMF密钥或者ABBA_New。Optionally, before generating the AMF key or ABBA_New, the SEAF may also make a judgment first: if the security features supported by the Old AMF are different from those supported by the Target AMF, the SEAF generates the AMF key or ABBA_New.
步骤2408,SEAF向Target AMF发送AMF密钥和可选的ABBA_New,以及可选的 Indicator3。Step 2408, SEAF sends the AMF key, optional ABBA_New, and optional Indicator3 to Target AMF.
步骤2409,Target AMF向UE发送ABBA_New,以及可选的Indicator1。例如Target AMF向UE发送NAS SMC,在NAS SMC中包括ABBA_New和可选的Indicator1。Step 2409: The Target AMF sends ABBA_New and optional Indicator1 to the UE. For example, Target AMF sends NAS SMC to UE, and NAS SMC includes ABBA_New and optional Indicator1.
Target AMF发送Indicator1,可以是根据以下中的任意一种或多种:Target AMF接收到SEAF发送的Indicator3;Target AMF接收到SEAF发送的AMF密钥;Target AMF接收到SEAF发送的ABBA_New。Target AMF sends Indicator1, which can be based on any one or more of the following: Target AMF receives Indicator3 sent by SEAF; Target AMF receives the AMF key sent by SEAF; Target AMF receives ABBA_New sent by SEAF.
步骤2410,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。然后UE根据推演的新的AMF密钥,生成NAS加密密钥和完整性密钥。Step 2410: When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
图25示出了实施例七的另一流程,该流程是UE的N2切换流程,该流程包括但不限于:FIG. 25 shows another process of the seventh embodiment. This process is the N2 handover process of the UE. The process includes but is not limited to:
步骤2501,UE注册到Old AMF。In step 2501, the UE registers with Old AMF.
步骤2502,Old AMF发起切换。Step 2502: Old AMF initiates handover.
步骤2503,Old AMF向Target AMF发送创建UE上下文请求消息。例如,该UE上下文请求消息可以是Namf_Communication_CreateUEContext Request消息。该消息中可选的包括以下中的任意一项或多项:UE支持的安全特性;Old AMF支持的安全特性,ABBA_Old。Step 2503: The Old AMF sends a UE context creation request message to the Target AMF. For example, the UE context request message may be Namf_Communication_CreateUEContext Request message. The message may optionally include any one or more of the following: security features supported by the UE; security features supported by Old AMF, ABBA_Old.
可能地:Target AMF也可以从UE或者本地存储,获取UE支持的安全特性和/或Old AMF支持的安全特性,和/或ABBA_Old。Possibly: Target AMF may also obtain the security features supported by the UE and/or the security features supported by Old AMF, and/or ABBA_Old from the UE or local storage.
关于上述步骤2504至步骤2506的具体说明,可参见上述图24中的步骤2406至2408,不再额外说明。For the specific description of the foregoing steps 2504 to 2506, please refer to the foregoing steps 2406 to 2408 in FIG. 24, and no additional description is required.
步骤2507,Target AMF向Old AMF发送UE上下文响应消息。例如,该UE上下文响应消息可以是Namf_Communication_CreatUEContext Response。该消息中携带ABBA_new和可选的Indicator4。Step 2507: The Target AMF sends a UE context response message to the Old AMF. For example, the UE context response message may be Namf_Communication_CreatUEContext Response. The message carries ABBA_new and optional Indicator4.
在本申请中,Indicator4指示的含义同Indicator3。Indicator4和Indicator3可以为同一个指示,或者不同的指示。In this application, Indicator4 has the same meaning as Indicator3. Indicator4 and Indicator3 can be the same indicator or different indicators.
步骤2508,Old AMF向UE发送ABBA_new和可选的Indicator1。如果Old AMF接收到Indicator4,则Old AMF向UE发送Indicator1。Step 2508: The Old AMF sends ABBA_new and optional Indicator1 to the UE. If Old AMF receives Indicator4, Old AMF sends Indicator1 to the UE.
在本申请中,上述Indicator4与Indicator1可以是同一指示,或者不同指示,不作限定。In this application, the aforementioned Indicator4 and Indicator1 may be the same indication or different indications, which is not limited.
步骤2509,UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。然后UE根据推演的新的AMF密钥,生成NAS加密密钥和完整性密钥。Step 2509: When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
作为实施例七的另一流程,该流程包括但不限于:As another process of the seventh embodiment, the process includes but is not limited to:
UE注册到Old AMF。The UE is registered with Old AMF.
Old AMF发起切换。Old AMF initiates handover.
Old AMF向Target AMF发送创建UE上下文请求消息。例如,该UE上下文请求消息可以是Namf_Communication_CreateUEContext Request消息。Old AMF sends a UE context creation request message to Target AMF. For example, the UE context request message may be Namf_Communication_CreateUEContext Request message.
Target AMF向Old AMF发送创建UE上下午响应消息。例如,该UE上下文请求消息可以是Namf_Communication_CreateUEContext Response消息。该Response消息包括 Target AMF的安全特性。The Target AMF sends the morning and afternoon response messages of creating the UE to the Old AMF. For example, the UE context request message may be Namf_Communication_CreateUEContext Response message. The Response message includes the security features of Target AMF.
Old AMF向SEAF发送密钥请求消息,用于请求SEAF生成AMF密钥。该密钥请求消息中携带有UE的标识,例如,UE的订阅永久标识(subsciber permanent identifier,SUPI)或者,5G-GUTI。该密钥请求消息中还可以包括以下中的任意一项或多项:UE支持的安全特性,Old AMF支持的安全特性,Target AMF支持的安全特性,ABBA_Old。The Old AMF sends a key request message to the SEAF to request the SEAF to generate an AMF key. The key request message carries the identity of the UE, for example, the UE's subscription permanent identifier (SUPI) or 5G-GUTI. The key request message may also include any one or more of the following: security features supported by the UE, security features supported by Old AMF, security features supported by Target AMF, ABBA_Old.
可选的,Old AMF可判断获取的Target AMF支持的安全特性是否与Old AMF支持的安全特性相同;如果不同,则上述Old AMF向SEAF发送密钥请求消息。或者,Old AMF根据UE和Target AMF支持的安全特性,确定ABBA_New。Old AMF向SEAF发送密钥请求消息,在该消息中携带有ABBA_New。Optionally, the Old AMF may determine whether the acquired security features supported by the Target AMF are the same as those supported by the Old AMF; if they are different, the Old AMF sends a key request message to the SEAF. Or, Old AMF determines ABBA_New according to the security features supported by the UE and Target AMF. Old AMF sends a key request message to SEAF, which carries ABBA_New.
SEAF生成AMF密钥。SEAF生成AMF密钥采用的参数包括SEAF密钥或者AMF密钥,以及ABBA_New。SEAF generates an AMF key. The parameters used by SEAF to generate the AMF key include the SEAF key or the AMF key, and ABBA_New.
其中,SEAF生成AMF密钥采用的ABBA_New可以通过以下中的任意一种方式获取:Among them, the ABBA_New used by SEAF to generate the AMF key can be obtained in any of the following ways:
1、Old AMF向SEAF发送ABBA_New。1. Old AMF sends ABBA_New to SEAF.
2、SEAF获取UE和Target AMF支持的安全特性,SEAF生成ABBA_New。2. The SEAF obtains the security features supported by the UE and Target AMF, and the SEAF generates ABBA_New.
3、SEAF获取Old AMF和Target AMF支持的安全特性,如果Old AMF和Target AMF支持的安全特性不同,则SEAF生成ABBA_New。3. SEAF obtains the security features supported by Old AMF and Target AMF. If the security features supported by Old AMF and Target AMF are different, SEAF generates ABBA_New.
进一步,SEAF获取UE或者Target AMF或者Old AMF支持的安全特性,可以是通过以下中的任意一种方式:Further, the SEAF obtains the security features supported by the UE or Target AMF or Old AMF through any of the following methods:
1、SEAF从本地存储或配置中获取。1. SEAF is obtained from local storage or configuration.
2、Old AMF向SEAF发送UE或Target AMF或Old AMF支持的安全特性。2. The Old AMF sends the security features supported by the UE or Target AMF or Old AMF to the SEAF.
可选的,SEAF在生成AMF密钥或者ABBA_New之前,也可以先进行判断:如果Old AMF支持的安全特性与Target AMF支持的安全特性不同,则SEAF生成AMF密钥或者ABBA_New。Optionally, before generating the AMF key or ABBA_New, the SEAF may also make a judgment first: if the security features supported by the Old AMF are different from those supported by the Target AMF, the SEAF generates the AMF key or ABBA_New.
SEAF向Old AMF发送AMF密钥和可选的ABBA_New,以及可选的Indicator5。SEAF sends the AMF key, optional ABBA_New, and optional Indicator5 to Old AMF.
Old AMF向UE发送ABBA_new和可选的Indicator1。如果Old AMF接收到Indicator5,则Old AMF向UE发送Indicator1。Old AMF sends ABBA_new and optional Indicator1 to the UE. If Old AMF receives Indicator5, Old AMF sends Indicator1 to the UE.
在本申请中,上述Indicator5与Indicator1可以是同一指示,或者不同指示,不作限定。In this application, the aforementioned Indicator5 and Indicator1 may be the same indication or different indications, which is not limited.
UE在接收到ABBA_New时,可根据ABBA_New,生成新的AMF密钥。如果UE接收到第一指示信息,可在第一指示信息的指示下,生成新的AMF密钥。UE生成新的AMF密钥,采用与网络侧相同的方式。然后UE根据推演的新的AMF密钥,生成NAS加密密钥和完整性密钥。When the UE receives ABBA_New, it can generate a new AMF key according to ABBA_New. If the UE receives the first indication information, it can generate a new AMF key under the indication of the first indication information. The UE generates a new AMF key in the same way as the network side. Then the UE generates a NAS encryption key and an integrity key according to the new AMF key derived.
在本申请中,指示Indicator1,Indicator2,Indicator3,Indicator4,和Indicator5都指示相同的内容。本申请中不一一描述。In this application, the indicators Indicator1, Indicator2, Indicator3, Indicator4, and Indicator5 all indicate the same content. They are not described one by one in this application.
在上述实施例七中,实现了Target AMF和UE之间进行安全特性协商,已经将ABBA作为密钥推衍的参数。当AMF改变时,从Old AMF到Target AMF,Target AMF和UE如何协商支持的安全特性以及生成ABBA,并根据该ABBA生成新密钥。In the seventh embodiment above, the security feature negotiation between the Target AMF and the UE is implemented, and ABBA has been used as the key derivation parameter. When the AMF changes, from Old AMF to Target AMF, how the Target AMF and the UE negotiate the supported security features and generate ABBA, and generate a new key based on the ABBA.
通过上述实施例一至实施例七,解决了5G中UE空闲态移动注册、N2切换、UE空闲态从EPS移动到5GS,UE从EPS切换到5GS的过程中,可能出的降维攻击。Through the foregoing embodiment 1 to embodiment 7, the possible dimensionality reduction attacks in the process of UE idle state mobile registration, N2 handover, UE idle state moving from EPS to 5GS, and UE switching from EPS to 5GS in 5G are solved.
以上结合图1至图25详细说明了本申请实施例提供的方法。以下结合图26和图27详细说明本申请实施例提供的装置。应理解,装置实施例的描述与方法实施例的描述相互 对应。因此,未详细描述的内容可参见上文方法实施例中的描述。The method provided by the embodiment of the present application is described in detail above with reference to FIG. 1 to FIG. 25. The device provided by the embodiment of the present application will be described in detail below with reference to FIG. 26 and FIG. 27. It should be understood that the description of the device embodiment and the description of the method embodiment correspond to each other. Therefore, for the content that is not described in detail, please refer to the description in the method embodiment above.
图26是本申请实施例提供的装置2600的示意性框图。例如,该装置可以为软件单元或芯片系统。所述芯片系统可以由芯片构成,也可以包括芯片和其它分立器件。该装置包括通信单元2601,还可包括处理单元2602。通信单元2601,可以与处部进行通信,通信单元2601可以包括发送单元和/或接收单元等。处理单元2602,用于进行处理。FIG. 26 is a schematic block diagram of an apparatus 2600 provided by an embodiment of the present application. For example, the device may be a software unit or a chip system. The chip system may be composed of chips, or may include chips and other discrete devices. The device includes a communication unit 2601 and may also include a processing unit 2602. The communication unit 2601 may communicate with the department, and the communication unit 2601 may include a sending unit and/or a receiving unit, and so on. The processing unit 2602 is used for processing.
在一种示例中,装置2600可实现上文方法实施例中第一AMF执行的步骤,所述装置2600可以是第一AMF,或者配置于第一AMF中的芯片或电路。处理单元2602,用于执行上文方法实施例中第一AMF侧的处理操作,通信单元2601,用于执行上文方法实施例中第一AMF侧的收发相关操作。In an example, the device 2600 can implement the steps performed by the first AMF in the above method embodiment, and the device 2600 can be the first AMF, or a chip or circuit configured in the first AMF. The processing unit 2602 is configured to perform processing operations on the first AMF side in the foregoing method embodiment, and the communication unit 2601 is configured to perform transceiving related operations on the first AMF side in the foregoing method embodiment.
比如,处理单元2602,用于确定终端设备的安全特性;处理单元2602,还用于根据所述终端设备的安全特性以及第一AMF的安全特性,确定第一架构间抗降维ABBA参数;处理单元2602,还用于获取第二AMF的密钥;处理单元2602,还用于根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。For example, the processing unit 2602 is used to determine the security features of the terminal device; the processing unit 2602 is also used to determine the first inter-architecture anti-dimensionality reduction ABBA parameters based on the security features of the terminal device and the security features of the first AMF; The unit 2602 is further configured to obtain the key of the second AMF; the processing unit 2602 is further configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
可选的,处理单元2602确定终端设备的安全特性,包括:控制通信单元2601向第二AMF发送用于请求终端设备上下文的请求消息;控制通信单元2601接收第二AMF发送的终端设备上下文,所述终端设备上下文中携带有终端设备的安全特性。Optionally, the processing unit 2602 determines the security features of the terminal device, including: controlling the communication unit 2601 to send a request message for requesting the terminal device context to the second AMF; controlling the communication unit 2601 to receive the terminal device context sent by the second AMF, so The terminal device context carries the security features of the terminal device.
可选的,处理单元2602确定终端设备的安全特性,包括:控制通信单元2601接收终端设备发送的注册请求,所述注册请求中携带有终端设备的安全特性。Optionally, the processing unit 2602 determining the security feature of the terminal device includes: controlling the communication unit 2601 to receive a registration request sent by the terminal device, and the registration request carries the security feature of the terminal device.
可选的,处理单元2602获取第二AMF的密钥,包括:控制通信单元2601向第二AMF发送用于请求终端设备上下文的请求消息,控制通信单元2601接收第二AMF发送的终端设备上下文,所述终端设备上下文中携带有第二AMF的密钥。Optionally, the processing unit 2602 acquiring the key of the second AMF includes: controlling the communication unit 2601 to send a request message for requesting the terminal device context to the second AMF, and controlling the communication unit 2601 to receive the terminal device context sent by the second AMF, The terminal device context carries the key of the second AMF.
可选的,在处理单元2602根据终端设备的安全特性以及第一AMF的安全特性,确定第一ABBA参数之前,处理单元2602还用于:确定第二AMF的安全特性;确定所述第一AMF的安全特性与所述第二AMF的安全特性不同。Optionally, before the processing unit 2602 determines the first ABBA parameter according to the security characteristics of the terminal device and the security characteristics of the first AMF, the processing unit 2602 is further configured to: determine the security characteristics of the second AMF; determine the first AMF The security feature of is different from the security feature of the second AMF.
可选的,在处理单元2602根据终端设备的安全特性以及第一AMF的安全特性,确定第一ABBA参数之后,通信单元2601,还用于:向所述终端设备发送所述第一ABBA参数以及第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥。Optionally, after the processing unit 2602 determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the communication unit 2601 is further configured to: send the first ABBA parameter to the terminal device and First indication information, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
在另一种示例中,装置2600可实现上文方法实施例中终端设备执行的步骤,所述装置2600可以是终端设备,或者配置于终端设备中的芯片或电路。通信单元2601执行上文方法实施例中终端设备的收发操作,处理单元2602用于执行上文方法实施例中终端设备的处理相关操作。In another example, the apparatus 2600 may implement the steps performed by the terminal device in the above method embodiment, and the apparatus 2600 may be a terminal device, or a chip or circuit configured in the terminal device. The communication unit 2601 performs the transceiving operations of the terminal device in the above method embodiment, and the processing unit 2602 is configured to perform the processing related operations of the terminal device in the above method embodiment.
比如,通信单元2601,用于接收第一AMF发送的第一ABBA参数和第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥;处理单元2602,用于根据所述第一ABBA参数和第二AMF的密钥,确定所述第一AMF的密钥。For example, the communication unit 2601 is configured to receive the first ABBA parameter and first indication information sent by the first AMF, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; processing The unit 2602 is configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
可选的,所述第一ABBA参数包括所述终端设备的安全特性和所述第一AMF的安全特性。Optionally, the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
可选的,通信单元2601,还用于:向第一AMF发送注册请求,所述注册请求中携带有终端设备的安全特性。Optionally, the communication unit 2601 is further configured to send a registration request to the first AMF, where the registration request carries the security feature of the terminal device.
本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。The division of units in the embodiments of this application is illustrative, and is only a logical function division. In actual implementation, there may be other division methods. In addition, the functional units in each embodiment of this application can be integrated into one processing unit. In the device, it can also exist alone physically, or two or more units can be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
可以理解的是,上述实施例中的通信单元的功能可以由收发器实现,处理单元的功能可以由处理器实现。收发器可以包括发射器和/或接收器等,分别用于实现发送单元和/或接收单元的功能。以下结合图27举例进行说明。It can be understood that the functions of the communication unit in the foregoing embodiments may be implemented by a transceiver, and the functions of the processing unit may be implemented by a processor. The transceiver may include a transmitter and/or a receiver, etc., which are used to implement the functions of the transmitting unit and/or the receiving unit, respectively. The following description will be given with reference to FIG. 27 as an example.
图2700是本申请实施例提供的装置2700的示意性框图,图2700所示的装置2700可以为图2600所示的装置的一种硬件电路的实现方式。为了便于说明,图27仅示出该通信装置的主要部件。FIG. 2700 is a schematic block diagram of a device 2700 provided in an embodiment of the present application. The device 2700 shown in FIG. 2700 may be a hardware circuit implementation of the device shown in FIG. 2600. For ease of description, FIG. 27 only shows the main components of the communication device.
图2700所示的通信装置2700包括至少一个处理器2701。通信装置2700还可以包括至少一个存储器2702,用于存储程序指令和/或数据。存储器2702和处理器2701耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性、机械性或其它的形式,用于装置、单元或模块之间的信息交互。处理器2701可以和存储器2702协同操作,处理器2701可以执行存储器2702中存储的程序指令,所述至少一个存储器中2702中的至少一个可以包括于处理器2701中。The communication device 2700 shown in FIG. 2700 includes at least one processor 2701. The communication device 2700 may also include at least one memory 2702 for storing program instructions and/or data. The memory 2702 and the processor 2701 are coupled. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units, or modules, which can be electrical, mechanical, or other forms, and is used for information exchange between devices, units, or modules. The processor 2701 may cooperate with the memory 2702, the processor 2701 may execute program instructions stored in the memory 2702, and at least one of the at least one memory 2702 may be included in the processor 2701.
装置2700还可以包括通信接口2703,用于通过传输介质和其它设备进行通信,从而用于通信装置2700可以和其它设备进行通信。在本申请实施例中,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。在本申请实施例中,通信接口为收发器时,收发器可以包括独立的接收器、独立的发射器;也可以集成收发功能的收发器、或者是接口电路。The apparatus 2700 may further include a communication interface 2703 for communicating with other devices through a transmission medium, so that the communication apparatus 2700 can communicate with other devices. In the embodiment of the present application, the communication interface may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces. In the embodiment of the present application, when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver with integrated transceiver functions, or an interface circuit.
应理解,本申请实施例中不限定上述处理器2701、存储器2702以及通信接口2703之间的连接介质。本申请实施例在图27中以存储器2702、处理器2701以及通信接口2703之间通过通信总线2704连接,总线在图27中以粗线表示,其它部件之间的连接方式,仅是示意性说明,并不作为限定。所述总线可以包括地址总线、数据总线、控制总线等。为了便于表示,图27中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线等。It should be understood that the connection medium between the processor 2701, the memory 2702, and the communication interface 2703 is not limited in the embodiment of the present application. In the embodiment of the present application in FIG. 27, the memory 2702, the processor 2701, and the communication interface 2703 are connected by a communication bus 2704. The bus is represented by a thick line in FIG. 27. The connection mode between other components is only a schematic illustration. , Not as a limitation. The bus may include an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used to represent in FIG. 27, but it does not mean that there is only one bus or one type of bus.
在一种示例中,装置2700用于实现上文方法实施例中第一AMF执行的步骤。通信接口2703用于执行上文方法实施例中第一AMF的收发相关操作,处理器2701用于执行上文方法实施例中第一AMF的处理相关操作。In an example, the device 2700 is used to implement the steps performed by the first AMF in the above method embodiment. The communication interface 2703 is used to perform the transceiving-related operations of the first AMF in the above method embodiment, and the processor 2701 is used to perform the processing related operations of the first AMF in the above method embodiment.
比如,处理器2701,用于确定终端设备的安全特性;处理器2701,还用于根据所述终端设备的安全特性以及第一AMF的安全特性,确定第一架构间抗降维ABBA参数;处理器2701,还用于获取第二AMF的密钥;处理器2701,还用于根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。For example, the processor 2701 is configured to determine the security feature of the terminal device; the processor 2701 is also configured to determine the first inter-architecture anti-dimensionality reduction ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF; The processor 2701 is further configured to obtain the key of the second AMF; the processor 2701 is further configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
可选的,处理器2701确定终端设备的安全特性,包括:控制通信接口2703向第二AMF发送用于请求终端设备上下文的请求消息,以及控制通信接口2703接收第二AMF发送的终端设备上下文,所述终端设备上下文中携带有终端设备的安全特性。Optionally, the processor 2701 determining the security feature of the terminal device includes: controlling the communication interface 2703 to send a request message for requesting the terminal device context to the second AMF, and controlling the communication interface 2703 to receive the terminal device context sent by the second AMF, The terminal device context carries the security features of the terminal device.
可选的,处理器2701确定终端设备的安全特性,包括:控制通信接口2703接收终端设备发送的注册请求,所述注册请求中携带有所述终端设备的安全特性。Optionally, the processor 2701 determining the security feature of the terminal device includes: controlling the communication interface 2703 to receive a registration request sent by the terminal device, and the registration request carries the security feature of the terminal device.
可选的,处理器2701获取第二AMF的密钥,包括:控制通信接口2703向所述第二AMF发送用于请求终端设备上下文的请求消息;控制通信接口2703接收所述第二AMF 发送的终端设备上下文,所述终端设备上下文中携带有所述第二AMF的密钥。Optionally, the processor 2701 obtaining the key of the second AMF includes: controlling the communication interface 2703 to send a request message for requesting the context of the terminal device to the second AMF; controlling the communication interface 2703 to receive the key sent by the second AMF The terminal device context, the terminal device context carries the key of the second AMF.
可选的,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之前,处理器2701还用于:确定第二AMF的安全特性;确定所述第一AMF的安全特性与所述第二AMF的安全特性不同。Optionally, before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the processor 2701 is further configured to: determine the security feature of the second AMF; It is determined that the security feature of the first AMF is different from the security feature of the second AMF.
可选的,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之后,通信接口2703还用于:向所述终端设备发送所述第一ABBA参数以及第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥。Optionally, after the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, the communication interface 2703 is further configured to: send the terminal device The first ABBA parameter and first indication information, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
在一种示例中,装置2700用于实现上文方法实施例中终端设备的步骤。通信接口2703用于执行上文实施例中终端设备的收发相关操作,处理器2701用于执行上文方法实施例中终端设备的处理相关操作。In an example, the apparatus 2700 is used to implement the steps of the terminal device in the above method embodiment. The communication interface 2703 is used to perform the transceiving-related operations of the terminal device in the above embodiment, and the processor 2701 is used to perform the processing related operations of the terminal device in the above method embodiment.
比如,通信接口2703,用于接收第一AMF发送的第一ABBA参数和第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥;处理器2701,用于根据所述第一ABBA参数和第二AMF的密钥,确定所述第一AMF的密钥。For example, the communication interface 2703 is configured to receive the first ABBA parameter and first indication information sent by the first AMF, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter; processing The device 2701 is configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
可选的,所述第一ABBA参数包括所述终端设备的安全特性和所述第一AMF的安全特性。Optionally, the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
可选的,通信接口2703,还用于:向第一AMF发送注册请求,所述注册请求中携带有终端设备的安全特性。Optionally, the communication interface 2703 is further configured to send a registration request to the first AMF, where the registration request carries the security feature of the terminal device.
进一步的,本申请实施例还提供一种系统,该系统包括上文方法实施例中的第一AMF、第二AMF或UE中的至少一个。一种装置,所述装置用于执行上文方法实施例中的方法。一种计算机可读存储介质,包括程序,当所述程序被处理器运行时,上文方法实施例中的方法被执行。一种计算机程序产品,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机实现上文方法实施例中的方法。一种芯片,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得装置执行上文方法实施例中的方法。Further, an embodiment of the present application also provides a system, which includes at least one of the first AMF, the second AMF, or the UE in the above method embodiment. A device for executing the method in the above method embodiment. A computer-readable storage medium includes a program, and when the program is executed by a processor, the method in the above method embodiment is executed. A computer program product, the computer program product includes computer program code, when the computer program code runs on a computer, the computer realizes the method in the above method embodiment. A chip includes: a processor, the processor is coupled with a memory, the memory is used to store a program or an instruction, when the program or an instruction is executed by the processor, the device executes the above method embodiment Methods.
本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the embodiments of the present application, the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, which can implement or execute The methods, steps, and logic block diagrams disclosed in the embodiments of the present application. The general-purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
在本申请实施例中,存储器可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。In the embodiment of the present application, the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory), for example Random-access memory (random-access memory, RAM). The memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this. The memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、 专用计算机、计算机网络、网络设备、用户设备或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,简称DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,简称DVD))、或者半导体介质(例如,SSD)等。The methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented by software, it can be implemented in the form of a computer program product in whole or in part. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present invention are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server, or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital video disc (digital video disc, DVD for short)), or a semiconductor medium (for example, SSD).
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the application without departing from the scope of the application. In this way, if these modifications and variations of this application fall within the scope of the claims of this application and their equivalent technologies, this application also intends to include these modifications and variations.

Claims (26)

  1. 一种通信方法,其特征在于,包括:A communication method, characterized in that it comprises:
    第一接入和移动管理功能AMF确定终端设备的安全特性;The first access and mobility management function AMF determines the security features of the terminal equipment;
    所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一架构间抗降维ABBA参数;The first AMF determines the first inter-architecture anti-dimensionality reduction ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF;
    所述第一AMF获取第二AMF的密钥;Obtaining the key of the second AMF by the first AMF;
    所述第一AMF根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。The first AMF determines the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  2. 如权利要求1所述的方法,其特征在于,所述第一AMF确定终端设备的安全特性,包括:The method according to claim 1, wherein the first AMF determining the security feature of the terminal device comprises:
    所述第一AMF向所述第二AMF发送用于请求终端设备上下文的请求消息;Sending, by the first AMF, a request message for requesting the context of the terminal device to the second AMF;
    所述第一AMF接收所述第二AMF发送的终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性。The first AMF receives the terminal device context sent by the second AMF, and the terminal device context carries the security feature of the terminal device.
  3. 如权利要求1所述的方法,其特征在于,所述第一AMF确定终端设备的安全特性,包括:The method according to claim 1, wherein the first AMF determining the security feature of the terminal device comprises:
    所述第一AMF接收终端设备发送的注册请求,所述注册请求中携带有所述终端设备的安全特性。The first AMF receives a registration request sent by a terminal device, and the registration request carries the security feature of the terminal device.
  4. 如权利要求1至3任一所述的方法,其特征在于,所述第一AMF获取第二AMF的密钥,包括:The method according to any one of claims 1 to 3, wherein the first AMF acquiring the key of the second AMF comprises:
    所述第一AMF向所述第二AMF发送用于请求终端设备上下文的请求消息;Sending, by the first AMF, a request message for requesting the context of the terminal device to the second AMF;
    所述第一AMF接收所述第二AMF发送的终端设备上下文,所述终端设备上下文中携带有所述第二AMF的密钥。The first AMF receives the terminal device context sent by the second AMF, and the terminal device context carries the key of the second AMF.
  5. 如权利要求1至4中任一项所述的方法,其特征在于,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之前,所述方法还包括:The method according to any one of claims 1 to 4, characterized in that, before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, The method also includes:
    所述第一AMF确定第二AMF的安全特性;The first AMF determines the security feature of the second AMF;
    所述第一AMF确定所述第一AMF的安全特性与所述第二AMF的安全特性不同。The first AMF determines that the security feature of the first AMF is different from the security feature of the second AMF.
  6. 如权利要求1至5中任一项所述的方法,其特征在于,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数之后,所述方法还包括:The method according to any one of claims 1 to 5, wherein after the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF, The method also includes:
    所述第一AMF向所述终端设备发送所述第一ABBA参数以及第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥。The first AMF sends the first ABBA parameter and first indication information to the terminal device, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
  7. 一种通信方法,其特征在于,包括:A communication method, characterized in that it comprises:
    终端设备接收第一接入和移动管理功能AMF发送的第一架构间抗降维ABBA参数和第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥;The terminal device receives the first inter-architecture anti-dimensionality reduction ABBA parameter and first indication information sent by the first access and mobility management function AMF, where the first indication information is used to instruct the terminal device to update according to the first ABBA parameter AMF key;
    所述终端设备根据所述第一ABBA参数和第二AMF的密钥,确定所述第一AMF的密钥。The terminal device determines the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  8. 如权利要求7所述的方法,其特征在于,所述第一ABBA参数包括所述终端设备 的安全特性和所述第一AMF的安全特性。The method according to claim 7, wherein the first ABBA parameter includes the security feature of the terminal device and the security feature of the first AMF.
  9. 如权利要求7或8所述的方法,其特征在于,还包括:The method according to claim 7 or 8, further comprising:
    所述终端设备向所述第一AMF发送注册请求,所述注册请求中携带有所述终端设备的安全特性。The terminal device sends a registration request to the first AMF, and the registration request carries the security feature of the terminal device.
  10. 一种通信方法,其特征在于,包括:A communication method, characterized in that it comprises:
    第二接入和移动管理功能AMF向第一AMF发送终端设备的安全特性,以及所述第二AMF的密钥;The second access and mobility management function AMF sends the security feature of the terminal device and the key of the second AMF to the first AMF;
    所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数;The first AMF determines the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF;
    所述第一AMF根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。The first AMF determines the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  11. 如权利要求10所述的方法,其特征在于,所述第二AMF向第一AMF发送终端设备的安全特性以及所述第二AMF的密钥,包括:The method according to claim 10, wherein the sending, by the second AMF, the security feature of the terminal device and the key of the second AMF to the first AMF comprises:
    所述第一AMF向所述第二AMF发送用于请求终端设备上下文的请求消息;Sending, by the first AMF, a request message for requesting the context of the terminal device to the second AMF;
    所述第二AMF向所述第一AMF发送终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性以及所述第二AMF的密钥。The second AMF sends a terminal device context to the first AMF, and the terminal device context carries the security feature of the terminal device and the key of the second AMF.
  12. 如权利要求10或11所述的方法,其特征在于,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的密钥,确定第一ABBA参数之前,所述方法还包括:The method according to claim 10 or 11, characterized in that, before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the key of the first AMF, the method further include:
    所述第一AMF确定所述第二AMF的安全特性;Determining the security feature of the second AMF by the first AMF;
    所述第一AMF确定所述第一AMF与所述第二AMF的安全特性不同。The first AMF determines that the security characteristics of the first AMF and the second AMF are different.
  13. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    处理单元,用于确定终端设备的安全特性;The processing unit is used to determine the security features of the terminal equipment;
    所述处理单元,还用于根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一架构间抗降维ABBA参数;The processing unit is further configured to determine the first inter-architecture anti-dimensionality reduction ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF;
    所述处理单元,还用于获取第二AMF的密钥;The processing unit is also used to obtain the key of the second AMF;
    所述处理单元,还用于根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。The processing unit is further configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  14. 如权利要求13所述的装置,其特征在于,所述处理单元确定终端设备的安全特性,包括:The apparatus according to claim 13, wherein the processing unit determining the security feature of the terminal device comprises:
    控制通信单元向所述第二AMF发送用于请求终端设备上下文的请求消息;Control the communication unit to send a request message for requesting the context of the terminal device to the second AMF;
    控制通信单元接收所述第二AMF发送的终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性。The control communication unit receives the terminal device context sent by the second AMF, and the terminal device context carries the security feature of the terminal device.
  15. 如权利要求13所述的装置,其特征在于,所述处理单元确定终端设备的安全特性,包括:The apparatus according to claim 13, wherein the processing unit determining the security feature of the terminal device comprises:
    控制通信单元接收终端设备发送的注册请求,所述注册请求中携带有所述终端设备的安全特性。The control communication unit receives a registration request sent by a terminal device, and the registration request carries the security feature of the terminal device.
  16. 如权利要求13至15任一所述的装置,其特征在于,所述处理单元获取第二AMF的密钥,包括:15. The device according to any one of claims 13 to 15, wherein the processing unit acquiring the key of the second AMF comprises:
    控制通信单元向所述第二AMF发送用于请求终端设备上下文的请求消息;Control the communication unit to send a request message for requesting the context of the terminal device to the second AMF;
    控制所述通信单元接收所述第二AMF发送的终端设备上下文,所述终端设备上下文 中携带有所述第二AMF的密钥。The communication unit is controlled to receive the terminal device context sent by the second AMF, and the terminal device context carries the key of the second AMF.
  17. 如权利要求13至16中任一项所述的装置,其特征在于,所述处理单元,还用于:The device according to any one of claims 13 to 16, wherein the processing unit is further configured to:
    确定第二AMF的安全特性;Determine the security features of the second AMF;
    确定所述第一AMF的安全特性与所述第二AMF的安全特性不同。It is determined that the security feature of the first AMF is different from the security feature of the second AMF.
  18. 如权利要求13至17中任一项所述的装置,其特征在于,通信接口,还用于:The device according to any one of claims 13 to 17, wherein the communication interface is further used for:
    向所述终端设备发送所述第一ABBA参数以及第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥。Send the first ABBA parameter and first indication information to the terminal device, where the first indication information is used to instruct the terminal device to update the AMF key according to the first ABBA parameter.
  19. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    通信单元,用于接收第一接入和移动管理功能AMF发送的第一架构间抗降维ABBA参数和第一指示信息,所述第一指示信息用于指示所述终端设备根据所述第一ABBA参数更新AMF密钥;The communication unit is configured to receive the first inter-architecture anti-dimensionality reduction ABBA parameter and first indication information sent by the first access and mobility management function AMF, where the first indication information is used to instruct the terminal device according to the first ABBA parameters update AMF key;
    处理单元,用于根据所述第一ABBA参数和第二AMF的密钥,确定所述第一AMF的密钥。The processing unit is configured to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  20. 如权利要求19所述的装置,其特征在于,所述第一ABBA参数包括所述终端设备的安全特性和所述第一AMF的安全特性。The apparatus according to claim 19, wherein the first ABBA parameter includes a security feature of the terminal device and a security feature of the first AMF.
  21. 如权利要求19或20所述的装置,其特征在于,所述通信单元还用于:The device according to claim 19 or 20, wherein the communication unit is further configured to:
    向所述第一AMF发送注册请求,所述注册请求中携带有所述终端设备的安全特性。Send a registration request to the first AMF, where the registration request carries the security feature of the terminal device.
  22. 一种通信系统,其特征在于,包括:A communication system, characterized in that it comprises:
    第二接入和移动管理功能AMF,用于向第一AMF发送终端设备的安全特性,以及所述第二AMF的密钥;The second access and mobility management function AMF is used to send the security feature of the terminal device and the key of the second AMF to the first AMF;
    所述第一AMF,用于根据所述终端设备的安全特性以及所述第一AMF的安全特性,确定第一ABBA参数;The first AMF is configured to determine the first ABBA parameter according to the security feature of the terminal device and the security feature of the first AMF;
    所述第一AMF,还用于根据所述第一ABBA参数和所述第二AMF的密钥,确定所述第一AMF的密钥。The first AMF is also used to determine the key of the first AMF according to the first ABBA parameter and the key of the second AMF.
  23. 如权利要求22所述的系统,其特征在于,所述第二AMF向第一AMF发送终端设备的安全特性以及所述第二AMF的密钥,包括:The system according to claim 22, wherein the sending of the security feature of the terminal device and the key of the second AMF by the second AMF to the first AMF comprises:
    接收所述第一AMF发送的用于请求终端设备上下文的请求消息;Receiving a request message sent by the first AMF for requesting the context of a terminal device;
    向所述第一AMF发送终端设备上下文,所述终端设备上下文中携带有所述终端设备的安全特性以及所述第二AMF的密钥。Send a terminal device context to the first AMF, where the terminal device context carries the security feature of the terminal device and the key of the second AMF.
  24. 如权利要求22或23所述的系统,其特征在于,在所述第一AMF根据所述终端设备的安全特性以及所述第一AMF的密钥,确定第一ABBA参数之前,所述第一AMF还用于:The system according to claim 22 or 23, wherein before the first AMF determines the first ABBA parameter according to the security feature of the terminal device and the key of the first AMF, the first AMF is also used to:
    确定所述第二AMF的安全特性;Determine the security feature of the second AMF;
    确定所述第一AMF与所述第二AMF的安全特性不同。It is determined that the security characteristics of the first AMF and the second AMF are different.
  25. 一种通信装置,其特征在于,包括处理器和存储器,所述存储器中存储有指令,所述处理器执行所述指令时,使得所述通信装置执行权利要求1至6任一项所述的方法,或者,使得所述通信装置执行权利要求7至9任一项所述的方法,或者,使得所述通信装置执行权利要求10至12任一项所述的方法。A communication device, characterized in that it comprises a processor and a memory, and instructions are stored in the memory. When the processor executes the instructions, the communication device is caused to execute the communication device described in any one of claims 1 to 6. The method, or the communication device is caused to execute the method according to any one of claims 7 to 9, or the communication device is caused to execute the method according to any one of claims 10 to 12.
  26. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行权利要求1至6任一项所述的方法,或者,使得 计算机执行权利要求7至9任一项所述的方法,或者,使得计算机执行权利要求10至12任一项所述的方法。A computer-readable storage medium, characterized in that instructions are stored in the computer-readable storage medium, which when run on a computer, cause the computer to execute the method according to any one of claims 1 to 6, or, The computer is caused to execute the method according to any one of claims 7 to 9, or the computer is caused to execute the method according to any one of claims 10 to 12.
PCT/CN2021/073668 2020-05-29 2021-01-25 Communication method, apparatus and system WO2021238280A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010479818.1 2020-05-29
CN202010479818.1A CN113810903B (en) 2020-05-29 2020-05-29 Communication method and device

Publications (1)

Publication Number Publication Date
WO2021238280A1 true WO2021238280A1 (en) 2021-12-02

Family

ID=78745565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/073668 WO2021238280A1 (en) 2020-05-29 2021-01-25 Communication method, apparatus and system

Country Status (2)

Country Link
CN (1) CN113810903B (en)
WO (1) WO2021238280A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190268335A1 (en) * 2018-02-23 2019-08-29 T-Mobile Usa, Inc. Key-Derivation Verification in Telecommunications Network
CN110859058A (en) * 2018-06-25 2020-03-03 联发科技(新加坡)私人有限公司 Additional security capability indication using non-access stratum signaling in 5G mobile communications

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109560919B (en) * 2017-09-27 2021-02-09 华为技术有限公司 Key derivation algorithm negotiation method and device
CN109819439B (en) * 2017-11-19 2020-11-17 华为技术有限公司 Method for updating key and related entity
WO2019097084A1 (en) * 2017-11-20 2019-05-23 Telefonaktiebolaget Lm Ericsson (Publ) Security context handling in 5g during handover
WO2020090886A1 (en) * 2018-11-02 2020-05-07 Nec Corporation Method, ue, and network for providing kdf negotiation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190268335A1 (en) * 2018-02-23 2019-08-29 T-Mobile Usa, Inc. Key-Derivation Verification in Telecommunications Network
CN110859058A (en) * 2018-06-25 2020-03-03 联发科技(新加坡)私人有限公司 Additional security capability indication using non-access stratum signaling in 5G mobile communications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SAMSUNG: "Discussion whether a NAS reject message can be sent protected or unprotected by an AMF", C1-196541, 3GPP TSG-CT WG1 MEETING #120, PORTOROZ (SLOVENIA), 7-11 OCTOBER 2019, 1 October 2019 (2019-10-01), XP051788128 *
ZTE: "Discussion on authentication and NAS SMC handling with race condition", S3-181548, 3GPP TSG SA WG3 (SECURITY) MEETING #91, 16 - 20 APRIL, 2018, BELGRADE, SERBIA, 20 April 2018 (2018-04-20), XP051433259 *

Also Published As

Publication number Publication date
CN113810903B (en) 2023-07-11
CN113810903A (en) 2021-12-17

Similar Documents

Publication Publication Date Title
KR102224248B1 (en) Method for establishing protocol data unit in communication system
US11533610B2 (en) Key generation method and related apparatus
US20230239686A1 (en) Secure communication method, apparatus, and system
JP6791353B2 (en) Terminal, first network device, and second network device
WO2021136211A1 (en) Method and device for determining authorization result
EP3860176B1 (en) Method, apparatus, and system for obtaining capability information of terminal
WO2021233208A1 (en) Method and apparatus for protecting communication
US20220210859A1 (en) Data transmission method and apparatus
WO2021051420A1 (en) Dns cache record determination method and apparatus
US20220303763A1 (en) Communication method, apparatus, and system
WO2021196051A1 (en) Communication method, apparatus and system
CN109936444B (en) Key generation method and device
WO2022067831A1 (en) Method and apparatus for establishing secure communication
WO2023246942A1 (en) Communication method and apparatus
WO2021238280A1 (en) Communication method, apparatus and system
WO2021073382A1 (en) Registration method and apparatus
US20200403788A1 (en) Information Sending Method, Key Generation Method, and Apparatus
WO2021138784A1 (en) Network access method, apparatus and system
US20190110194A1 (en) Network connection method, method for determining security node, and apparatus
WO2023071885A1 (en) Communication method and communication apparatus
WO2023246457A1 (en) Security decision negotiation method and network element
EP4274310A1 (en) Network intercommunication method and apparatus
WO2021088060A1 (en) Communication method and apparatus
CN117083890A (en) Device and method for coordinating registration process of accessing unmanned aerial vehicle service
CN117793710A (en) Authentication method, communication device and communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21814273

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21814273

Country of ref document: EP

Kind code of ref document: A1