WO2022178888A1 - Communication method and apparatus - Google Patents

Communication method and apparatus Download PDF

Info

Publication number
WO2022178888A1
WO2022178888A1 PCT/CN2021/078325 CN2021078325W WO2022178888A1 WO 2022178888 A1 WO2022178888 A1 WO 2022178888A1 CN 2021078325 W CN2021078325 W CN 2021078325W WO 2022178888 A1 WO2022178888 A1 WO 2022178888A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
security
security gateway
gateway
ike
Prior art date
Application number
PCT/CN2021/078325
Other languages
French (fr)
Chinese (zh)
Inventor
王亚鑫
李岩
吴义壮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/078325 priority Critical patent/WO2022178888A1/en
Publication of WO2022178888A1 publication Critical patent/WO2022178888A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a communication method and apparatus.
  • Mobile edge computing is a technology that deeply integrates access network and Internet services based on the evolution architecture of the fifth generation (5rd generation, 5G) system.
  • a security gateway is deployed between a central user plane function or an uplink classifier (ULCL) and an application server.
  • IKE Internet Key Exchange Protocol
  • SA Security Association
  • IPsec Internet Protocol Security
  • the present application provides a communication method and device, which are used to solve the problem of complicated handover procedures.
  • an embodiment of the present application provides a communication method, and the method may be implemented by a first security gateway or a chip or a chip system in the first security gateway.
  • the communication method includes: a first security gateway establishes an Internet Key Security Protocol IKE Security Association SA connection with a terminal device; when the first security gateway determines that the terminal device needs to perform secure transmission of user plane data through the second security gateway, An Internet Protocol Security Protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the first security gateway is used to establish the IKE SA with the terminal device.
  • the second security gateway used for user plane data transmission is used for establishing a user plane SA with the terminal device, encrypting data and protecting integrity.
  • the IPsec sub-SA of the second security gateway is established on behalf of the first security gateway. Therefore, when the terminal device needs to switch the application server, there is no need to establish an IKE SA with the switched second security gateway, which reduces the switching process and reduces the switching complexity.
  • the terminal device does not need to perceive the existence of the second security gateway, and only interacts with the first security gateway. Therefore, the terminal device does not need to perceive the insertion of the ULCL and the change of the application server, and the switching of the security gateway can also be realized.
  • establishing an IPsec sub-SA connection for the second security gateway includes: negotiating an IPsec sub-SA connection between the first security gateway and the terminal device to obtain a first security parameter ; the first security gateway configures the first security parameter to the second security gateway; wherein, the first security parameter is used for user plane data between the second security gateway and the terminal device secure transmission.
  • the first security gateway replaces the second security gateway to establish an IPSec sub-SA connection with the terminal device for transmitting user plane data, and then configure the security parameters of the established IPSec sub-SA connection to the second security gateway.
  • the terminal device does not need to sense the existence of the second security gateway through control plane signaling.
  • the terminal device only interacts with the first security gateway to establish an IPsec sub-SA connection.
  • the second security gateway is changed (such as the MEC scenario of ULCL insertion)
  • the update and establishment of the IPSec sub-SA connection can also be completed without additional control plane signaling overhead.
  • every time the second gateway changes there is no need to establish an IKE SA connection, which reduces signaling overhead.
  • the first security parameter includes material for generating a key for user plane data transmission with the terminal device.
  • the first security gateway configures the second security gateway with the material for generating the key for user plane data transmission with the terminal device, so that the second security gateway can communicate with the terminal device according to the key. Secure transmission of user plane data.
  • the material for generating a key for user plane data transmission with the terminal device includes one or more of the following:
  • key material generated by the first security gateway key exchange material of the terminal device, key exchange material configured for the second security gateway, random numbers of the terminal device or generated for the second security gateway of random numbers.
  • the first security parameter further includes one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, used for the terminal device to communicate with all Describe the packet filtering rules for user plane data transmission between the second security gateways.
  • the first security gateway establishing an Internet Protocol Security Protocol (IPsec) sub-SA for the second security gateway includes: the first security gateway receives a setup request initiated by a terminal device, and the setup request uses upon requesting to establish an Internet Protocol Security Protocol IPsec sub-SA connection with the second security gateway; the first security gateway sends a configuration context of the IPsec sub-SA connection to the second security gateway, and the configuration context includes the configuration context for the
  • the second security gateway updates or confirms the second security parameter; the first security gateway sends an establishment response to the terminal device, and the establishment response includes the third security parameter; wherein the third security The parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the first security gateway interacts with the terminal device instead of the second security gateway, and the second security gateway updates or confirms the second security parameter configured by the first security gateway. Furthermore, when the second security gateway switches, there is no need to re-establish the IKE SA, which reduces the signaling interaction process.
  • the second security parameter includes material for the second security gateway to generate a key for user plane data transmission between the second security gateway and the terminal device.
  • the material for generating the key for user plane data transmission with the terminal device includes one or more of the following: the key material generated by the first security gateway, The key exchange material of the terminal device, the first key exchange material of the first security gateway, the first random number used by the terminal device, or the second random number used by the first security gateway.
  • the third security parameter includes one or more of the following: a second key exchange material for updating the first key exchange material, and a second key exchange material for updating the first random number the third random number.
  • the first security gateway interacts with the terminal device instead of the second security gateway, and the second security gateway updates the key exchange material or random number configured by the first security gateway to improve the security of the generated key.
  • the second security parameter further includes one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, or an encryption algorithm for the terminal device to communicate with the The first packet filtering rule for user plane data transmission between the second security gateways.
  • the third security parameter further includes a second data packet filtering rule for updating the first data packet filtering rule.
  • the third security parameter further includes an encryption algorithm selected by the second security gateway.
  • an embodiment of the present application provides a communication method, including: a first core network network element determining a first security gateway that provides security services for a terminal device, where the first security gateway is used to establish an Internet connection with the terminal device
  • the key security protocol IKE SA is connected to the SA connection;
  • the first core network element configures the user plane network element with a first forwarding rule, and the first forwarding rule is used to instruct the user plane network element to belong to the data packet of the IKE SA connection Forwarding to the first security gateway; after determining that the Internet Protocol Security Protocol IPsec sub-SA connection is established between the terminal device and the second security gateway, the first core network element configures the user plane network element with the first Two forwarding rules, where the second forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
  • the first core network element configures the first forwarding rule for the user plane network element, so as to realize the security protection of the data packets belonging to the IKE SA connection through the first security gateway.
  • the second forwarding rule is configured for the user plane network element, so as to realize the security protection of the user plane data through the second security gateway.
  • the first core network element determining the first security gateway that provides security services for the terminal device includes: determining, by the first core network element, as the terminal according to the subscription data of the terminal device the first security gateway that provides security services for the device; or, the first core network element determines the first security gateway that provides security services for the terminal device according to local configuration information; or, the first core network element receives address information of the first security gateway from the network element of the second core network, and determine the first security gateway that provides security services for the terminal device according to the address information of the first security gateway; or, the first core network network The element receives address information from a first security gateway of a terminal device, where the first security gateway is one of at least one security gateway configured by a policy control network element for the terminal device.
  • the policy control network element may send the address of at least one security gateway capable of serving the terminal device to the terminal device, and the terminal device selects the first security gateway from the at least one security gateway.
  • the first core network element is a session management network element
  • the second core network element is a mobility management network element
  • the method further includes: the first core network element sends the determined address information of the first security gateway to the terminal device, where the address information of the first security gateway is used for The terminal device triggers the establishment of an IKE SA connection.
  • the method further includes: sending, by the first core network element, the address information of the terminal device to the first security gateway, where the address information of the terminal device is used for the first security gateway.
  • the security gateway triggers the establishment of an IKE SA connection.
  • an embodiment of the present application provides a communication method, which is applied to a terminal device or a chip or a chip system of the terminal device.
  • the terminal device receives the address information of the first security gateway from the network element of the first core network, and triggers the establishment of the IKE SA to the first security gateway according to the address information.
  • a request message for establishing an IPsec sub-SA is triggered to the first security gateway.
  • the request message carries the address segment of the second security gateway.
  • the terminal device receives the address information of at least one security gateway from the policy control network element, and triggers the establishment of the IKE SA to the first security gateway.
  • the first security gateway is one of the security gateways indicated by the address information of the at least one security gateway.
  • a request message for establishing an IPsec sub-SA is triggered to the first security gateway.
  • the request message carries the address segment of the second security gateway.
  • a communication device for example, the communication device is the aforementioned first security gateway.
  • the communication device has the function of implementing the behavior in the method embodiment of the first aspect.
  • the functions can be implemented by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the communication device includes, for example, a transceiver module and a processing module coupled with each other.
  • the processing module is used for establishing an Internet Key Security Protocol IKE Security Alliance SA connection with the terminal device through the transceiver module; the processing module is also used for determining that the terminal device needs to perform secure transmission of user plane data through the second security gateway At the time, an Internet Protocol security protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the present application provides a communication device, for example, the communication device is the network element of the first core network as described above.
  • the communication device has the function of implementing the behavior in the method embodiment of the second aspect.
  • the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the communication device includes, for example, a processing module and a transceiver module coupled with each other.
  • the processing module is used to determine the first security gateway that provides security services for the terminal device, and the first security gateway is used to establish an Internet Key Security Protocol IKE Security Association SA connection with the terminal device;
  • the plane network element configures a first forwarding rule, and the first forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IKE SA connection to the first security gateway;
  • the transceiver module is also used for the processing module to determine After the establishment of the IPsec sub-SA connection between the terminal device and the second security gateway is completed, a second forwarding rule is configured to the user plane network element, and the second forwarding rule is used to indicate that the user plane network element will belong to the user plane network element.
  • the data packets connected by the IPsec sub-SA are forwarded to the second security gateway.
  • a communication apparatus is provided, for example, the communication apparatus is the aforementioned terminal equipment.
  • the communication device has the function of implementing the behavior in the method embodiment of the fifth aspect.
  • the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the communication device includes, for example, a transceiver module and a processing module coupled with each other.
  • the transceiver module is configured to receive the address information of the first security gateway from the network element of the first core network
  • the processing module is configured to trigger the establishment of the IKE SA to the first security gateway according to the address information.
  • the transceiver module After completing the establishment of the IKE SA, the transceiver module is configured to trigger a request message for establishing an IPsec sub-SA to the first security gateway.
  • the request message carries the address segment of the second security gateway.
  • the transceiver module is configured to receive address information from at least one security gateway of the policy control network element, and the processing module is configured to trigger the establishment of the IKE SA to the first security gateway.
  • the first security gateway is one of the security gateways indicated by the address information of the at least one security gateway.
  • the transceiver module is further configured to trigger a request message for establishing an IPsec sub-SA to the first security gateway after completing the establishment of the IKE SA.
  • the request message carries the address segment of the second security gateway.
  • the present application provides a communication device for a first security gateway or a chip of the first security gateway, comprising at least one processing element and at least one storage element, wherein at least one storage element is used for storing programs and data, at least one A processing element is used to perform the method of the aforementioned first aspect or any possible implementation of the first aspect.
  • the present application provides a communication device for a first core network element or a chip of the first core network element, comprising at least one processing element and at least one storage element, wherein at least one storage element is used to store a program and data, at least one processing element for performing the method of the aforementioned second aspect or any possible implementation of the second aspect.
  • the present application provides a communication device for terminal equipment or a chip of the terminal equipment, comprising at least one processing element and at least one storage element, wherein at least one storage element is used for storing programs and data, and at least one processing element is used for storing programs and data. for performing the method in the aforementioned third aspect or any possible implementation manner of the third aspect, or for performing the method in the aforementioned fifth aspect.
  • the present application provides a communication device, comprising a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to the communication device
  • the processor is used to implement the method in the foregoing first aspect or any possible implementation manner of the first aspect through logic circuits or executing code instructions.
  • the present application provides a communication device, comprising a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to For other communication devices other than the communication device, the processor is used to implement the method in the foregoing second aspect or any possible implementation manner of the second aspect through logic circuits or executing code instructions.
  • the present application provides a communication device, including a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to For other communication devices other than the communication device, the processor is used to implement the method in the foregoing third aspect or any possible implementation manner of the third aspect through logic circuits or executing code instructions.
  • the present application provides a computer program product, the computer program product comprising computer instructions, when the computer instructions are executed, the method in the foregoing first aspect or any possible implementation manner of the first aspect is executed ; or cause the method in the foregoing second aspect or any possible implementation manner of the second aspect to be executed; or cause the method in the foregoing implementation manner of the third aspect to be executed.
  • the present application provides a computer-readable storage medium, where computer instructions are stored in the computer storage medium, and when the computer instructions are executed, make the first aspect or any possible implementation of the first aspect.
  • the method is performed, or causes the method of the aforementioned second aspect or any possible implementation of the second aspect to be performed, or causes the method of the aforementioned third aspect to be performed.
  • FIG. 1 is a schematic diagram of a possible communication network architecture in an embodiment of the application
  • FIG. 2A is a schematic diagram of another possible communication network architecture in an embodiment of the present application.
  • FIG. 2B is a schematic diagram of yet another possible communication network architecture in an embodiment of the present application.
  • 3A is a schematic diagram of data packet encapsulation in a transmission mode in an embodiment of the present application.
  • 3B is a schematic diagram of data packet encapsulation in tunnel mode in an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of an AF service flow path in an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of adding ULCL in an embodiment of the application.
  • FIG. 6 is a schematic diagram of an AF notification process in an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of the establishment of an IKE SA and an IPsec sub-SA in the embodiment of the application;
  • FIG. 8 is a schematic diagram of an MEC scenario in an embodiment of the present application.
  • FIG. 9 is a schematic diagram of another communication system architecture in an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a communication method in an embodiment of the application.
  • 11A is a schematic flowchart of a communication method according to a first possible implementation manner of the present application.
  • 11B is a schematic flowchart of a communication method according to a second possible implementation manner of the present application.
  • 11C is a schematic flowchart of a communication method according to a third possible implementation manner of the present application.
  • FIG. 12 is a schematic diagram of a first possible application scenario architecture of an embodiment of the present application.
  • FIG. 13 is a schematic flowchart of a communication method in a first possible application scenario of an embodiment of the present application
  • FIG. 14 is a schematic diagram of a technical effect of a communication solution in a first possible application scenario of an embodiment of the present application
  • 15 is a schematic flowchart of another communication method in the first possible application scenario of the embodiment of the present application.
  • 16 is a schematic diagram of the technical effect of another communication solution in the first possible application scenario of the embodiment of the present application.
  • 17 is a schematic diagram of a second possible application scenario architecture of an embodiment of the present application.
  • FIG. 19 is a schematic diagram of a technical effect of a communication solution in a second possible application scenario of an embodiment of the present application.
  • FIG. 20 is a schematic diagram of a third possible application scenario architecture of an embodiment of the present application.
  • 21 is a schematic flowchart of a communication method in a third possible application scenario of an embodiment of the present application.
  • FIG. 22 is a schematic diagram of a technical effect of a communication solution in a third possible application scenario of an embodiment of the present application.
  • FIG. 23 is a schematic diagram for describing the architecture and effects of the provided solution according to an embodiment of the present application.
  • FIG. 24 is a schematic structural diagram of a communication device 2400 according to an embodiment of the present application.
  • FIG. 25 is a schematic structural diagram of a communication apparatus 2500 according to an embodiment of the present application.
  • the embodiments of the present application can be applied to the network architecture of the 4th Generation mobile communication technology (4G), such as a long term evolution (LTE) system, and can also be applied to the fifth generation mobile communication technology (the In the 5th Generation mobile communication technology, 5G) network architecture, such as the NR system, or the sixth generation mobile communication technology network architecture after the 5G network architecture, or other similar communication systems, there is no specific limitation.
  • 4G 4th Generation mobile communication technology
  • 5G Fifth Generation mobile communication technology
  • An access network (AN) device including a radio access network (RAN) device, such as a base station (eg, an access point), may refer to an access network through one or more air interfaces in the access network.
  • RAN radio access network
  • a device used by a cell to communicate with a wireless terminal device, or, for example, an access network device in a vehicle-to-everything (V2X) technology is a roadside unit (RSU).
  • the base station may be used to interconvert the received air frames and IP packets, acting as a router between the terminal equipment and the rest of the access network, which may include the IP network.
  • the RSU can be a fixed infrastructure entity supporting V2X applications and can exchange messages with other entities supporting V2X applications.
  • the access network equipment can also coordinate the attribute management of the air interface.
  • the access network equipment may include an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the LTE system or long term evolution-advanced (LTE-A), or may also include a fifth
  • the next generation node B (gNB) in the 5th generation (5G) NR system may also include a cloud radio access network (Cloud RAN) ) a centralized unit (centralized unit, CU) and a distributed unit (distributed unit, DU) in the system, which are not limited in this embodiment of the present application.
  • Cloud RAN cloud radio access network
  • the device for implementing the function of the access network device may be the access network device, or may be a device capable of supporting the access network device to realize the function, such as a chip or a chip system, and the device may be installed in the access network equipment.
  • the technical solutions provided by the embodiments of the present application are described by taking an example that the device for implementing the functions of the access network equipment is the access network equipment.
  • Terminal devices including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity sexual equipment.
  • it may include a handheld device with wireless connectivity, or a processing device connected to a wireless modem.
  • the terminal equipment can communicate with the core network via the RAN, exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device (D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscription unit (subscriber unit), subscription station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • D2D device-to-device
  • V2X vehicle to everything
  • M2M/MTC machine-to-machine/machine-type communications
  • IoT Internet of things
  • subscription unit subscriber unit
  • subscription station subscriber
  • mobile station mobile station
  • remote station remote station
  • access point access point
  • AP remote terminal
  • remote terminal remote terminal
  • access terminal
  • these may include mobile telephones (or "cellular" telephones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, computer-embedded mobile devices, and the like.
  • mobile telephones or "cellular" telephones
  • PCS personal communication service
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • constrained devices such as devices with lower power consumption, or devices with limited storage capacity, or devices with limited computing power, etc.
  • it includes information sensing devices such as barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), and laser scanners.
  • RFID radio frequency identification
  • GPS global positioning system
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. Wait.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-scale, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which needs to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be considered as on-board terminal equipment.
  • the on-board terminal equipment is also called on-board unit (OBU). ).
  • the terminal device may further include a relay (relay).
  • a relay relay
  • any device capable of data communication with the base station can be regarded as a terminal device.
  • the apparatus for implementing the function of the terminal device may be the terminal device, or may be an apparatus capable of supporting the terminal device to implement the function, such as a chip or a chip system, and the apparatus may be installed in the terminal device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the network elements involved in the embodiments of the present application may be hardware, software that is functionally divided, or a combined structure of the above two.
  • the network elements may include core network network elements, access network network elements (or referred to as access network equipment), and the like.
  • the core network element for example, includes a mobility management network element, a policy control network element, or a data management network element.
  • the mobility management network element is responsible for the access and mobility management of terminal equipment in the mobile network.
  • the mobility management network element may include the access and mobility management function (AMF) in 5G, or the mobility management entity (MME) in 4G, or the integration of network elements. form all or part of the control function.
  • AMF access and mobility management function
  • MME mobility management entity
  • the mobility management network element may be an AMF network element, or have other names, which are not limited in this application.
  • the mobility management network element is taken as an example of the AMF network element.
  • the data management network element is used to help operators realize unified management of user-related data.
  • the data management network element may include, for example, a subscriber data management (subscriber data management, SDM) network element, or a unified data management (unified data management, UDM) network element or a home subscriber server (home subscriber server, HSS) network element.
  • SDM subscriber data management
  • UDM unified data management
  • HSS home subscriber server
  • the session management network element is responsible for managing user services, such as a session management function (SMF) network element in 5G.
  • SMF session management function
  • the session management network element may be an SMF network element, or have other names, which are not limited in this application.
  • the policy control network element is responsible for the functions of policy control decision-making and flow-based charging control.
  • it can be a policy control function (PCF) network element in 5G.
  • PCF policy control function
  • future communication for example, in 6G or other networks
  • the policy control network element may be a PCF network element, or other names, which are not limited in this application.
  • system and “network” are often used interchangeably herein.
  • the term “and/or” in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and A and B exist independently B these three cases.
  • the character "/" in this document generally indicates that the related objects are an "or” relationship.
  • the term “at least one” referred to in this application refers to one, or more than one, including one, two, three and more; “multiple” refers to two, or more than two, including two, three or more.
  • At least one item(s) below or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • at least one item (a) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c may be single or multiple .
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean that B is only determined according to A, and B may also be determined according to A and/or other information.
  • the communication network architecture may include terminal equipment and data network (DN).
  • DN terminal equipment and data network
  • the communication network architecture may also include one or more of the following network elements: authentication server function (AUSF) network element, network exposure function (network exposure function, NEF) network element, policy control function (policy control function) function, PCF) network element, unified data management (unified data management, UDM) network element, unified database (unified data repository, UDR), network storage function (network repository function, NRF) network element, application function (application function, AF) ) network element, access and mobility management function (AMF) network element, session management function (SMF) network element, RAN network element and user plane function (UPF) network element, unified data repository function (unified data repository, UDR) network element, etc.
  • AUSF authentication server function
  • NEF network exposure function
  • policy control function policy control function
  • PCF policy control function
  • UDM unified data management
  • UDM network exposure function
  • UDR unified data repository
  • NRF network repository function
  • AMF access and mobility management function
  • SMS session management function
  • UPF user plane function
  • UDR
  • the AMF network element is responsible for user mobility management, including mobility status management, assigning user temporary identity, and authenticating and authorizing users.
  • the SMF network element is responsible for UPF network element selection, UPF network element reselection, Internet Protocol (Internet Protocol, IP) address allocation, bearer establishment, modification and release, and QoS control.
  • the PCF network element includes the functions of policy control decision and flow-based charging control, including user subscription data management function, policy control function, charging policy control function, QoS control and so on.
  • the UDM network element is responsible for managing the subscription data, and is responsible for notifying the corresponding network element when the subscription data is modified.
  • the UDR network element is responsible for storing and retrieving subscription data, policy data and public architecture data, etc.; for UDM, PCF and NEF to obtain relevant data.
  • UDR should be able to have different data access authentication mechanisms for different types of data, such as contract data and policy data, to ensure the security of data access; UDR should be able to return the appropriate data for illegal service operations or data access requests. Failure response for the reason value.
  • the AF network element is used to provide a certain application layer service to the UE.
  • the AF provides services to the UE, it has requirements on the QoS policy (Policy) and charging (Charging) policy, and needs to notify the network.
  • Policy QoS policy
  • Charging charging
  • the AF also needs application-related information fed back by other network elements of the core network.
  • the NEF network element mainly supports the network capability opening function, and opens network capabilities and services to the outside world; the 3rd generation partnership project (3GPP) network function (network function, NF) publishes functions and events to other NFs through NEF. The capabilities and events opened by NF can be safely opened to third-party applications.
  • 3GPP 3rd generation partnership project
  • NEF uses a standardized interface to UDR (Nudr) to store/retrieve structured data.
  • UDR Network function
  • Internal 5G core information such as data network name (DNN) or single network slice selection assistance information (S-NSSAI).
  • DNN data network name
  • S-NSSAI single network slice selection assistance information
  • the UPF network element supports all or part of the following functions: interconnecting protocol data unit (PDU) sessions with the data network; packet routing and forwarding functions, for example, supporting the downlink classifier to forward traffic to Data network, support branching point (branching point) function to support multi-homed (multi-homed) PDU session; packet inspection function.
  • UPF network elements are specifically divided into intermediate-UPF (intermediate-UPF, I-UPF) and anchor UPF (anchor-UPF, A-UPF).
  • the I-UPF is connected to the access network RAN
  • the A-UPF is the UPF of the session anchor
  • the A-UPF may also be called the PDU session anchor user plane network element (PDU session anchor, PSA).
  • the UPF in this embodiment of the present application may have an offload function, such as an uplink classifier (uplink classifier, ULCL) or a branch point (branching point, BP) that supports the offload function.
  • uplink classifier uplink classifier,
  • the AUSF network element is responsible for the authentication function or performs the network slice specific authentication and authorization (NSSAA) process.
  • NSSAA network slice specific authentication and authorization
  • Untrusted non-3GPP access network (untrusted non-3GPP access network) equipment This equipment allows non-3GPP technology interconnection and intercommunication between terminal equipment and 3GPP core network, including non-3GPP technology such as wireless fidelity (wireless fidelity, Wi-Fi), worldwide interoperability for microwave access (WiMAX), code division multiple access (code division multiple access, CDMA) networks, etc.
  • the terminal equipment accessing the untrusted non-3GPP access network needs to interconnect with the 3GPP core network through the secure tunnel established with the security gateway.
  • the security gateway may be, for example, an evolved packet data gateway (ePDG) or a non-3rd generation partnership project (3GPP) interworking function (non-3GPP interworking function, N3IWF) network element.
  • ePDG evolved packet data gateway
  • N3IWF non-3rd generation partnership project
  • the "network element" in each functional network element is removed.
  • the AMF network element is abbreviated as AMF
  • the UDM network element is abbreviated as UDM.
  • Figure 1 shows a schematic diagram of a communication network architecture based on a service-oriented architecture.
  • the communication between any two network elements can use service-oriented communication
  • the interfaces Nnef or Nausf used for communication between NEF and AUSF are service-oriented interfaces.
  • interfaces Nnrf, Npcf, Nudm, Naf, Nudr, Namf, and Nsmf are service-oriented interfaces.
  • AMF and terminal equipment can communicate through N1 interface
  • AMF and (R)AN can communicate through N2 interface
  • RAN and UPF can communicate through N3 interface
  • SMF and UPF can communicate through N4 interface
  • air interface between terminal equipment and RAN Communication UPF and DN can communicate through N6 interface.
  • FIG. 2A is a schematic diagram of a communication network architecture based on a point-to-point interface; the main difference between FIG. 1 and FIG. 2A is that the interface between each network element in FIG. 2A is a point-to-point interface, not a service-oriented interface.
  • the communication network architecture shown in FIG. 1 and FIG. 2A is a 3rd generation partnership project (3rd generation partnership project, 3GPP) system architecture.
  • FIG. 2B is a non-3GPP (non-3GPP) system architecture. Compared with the 3GPP architecture, the non-3GPP system architecture adds N3IWF network elements.
  • the 3GPP core network is the home public land mobile network (home public land mobile network, HPLMN) of the UE as an example.
  • the UE may access the 3GPP core network through at least one of a 3GPP access network (eg, RAN) and an untrusted non-3GPP access network.
  • a 3GPP access network eg, RAN
  • IPsec Internet Protocol Security
  • IPsec is not a separate protocol, it specifically provides a set of solutions applied to network security at the IP layer. IPsec is used to protect sensitive data in transit in insecure network environments. The two communicating parties perform encryption and data source authentication at the IP layer to ensure the confidentiality of data packet transmission, data consistency, perform data source authentication, and implement anti-replay.
  • data source authentication means that the identity of the peer is authenticated and cannot be denied.
  • Integrity protection refers to ensuring that data is not tampered with during transmission.
  • Confidentiality refers to the encryption protection of sensitive user data in transit.
  • Anti-replay refers to refusing to receive old or duplicate packets.
  • Encapsulating security payload (ESP) and authentication header (AH) are two IPSec security protocols used to provide this security protocol for IP datagrams.
  • AH mainly provides functions such as data source authentication, data integrity verification, and anti-replay attack, but does not support data encryption.
  • ESP mainly provides data source authentication, data integrity verification, anti-replay attack, data encryption and other functions.
  • AH and ESP can be used individually or nested. These combinations can be used between two hosts, two security gateways (firewall and router), or between a host and a security gateway.
  • IPSec There are two working modes of IPSec, namely transport mode and tunnel mode. Each mode uses different scenarios and handles data differently.
  • Transport mode is used for communication between two hosts, or between a host and a security gateway.
  • the two devices that encrypt and decrypt the message must be the original sender and final receiver of the message.
  • the encryption/decryption point is the actual communication point.
  • RRC Request For Comments
  • FIG. 3B is a schematic diagram of a data encapsulation manner in tunnel mode.
  • Tunnel mode is often used in network-to-network scenarios. Usually, most of the data traffic between two security gateways (routers) is not the traffic of the security gateway itself, so the tunnel mode is generally not used between the security gateways. Packets encrypted at one security gateway can only be decrypted by another security gateway. Therefore, the IP packet must be tunnel encapsulated, that is, a new IP header is added, and the IP packet after tunnel encapsulation is sent to another security gateway to be decrypted.
  • SPD security policy database
  • IPsec security policy database
  • SA is an agreement established by two communication entities (such as: host, security gateway) through negotiation. It creates a one-way logical connection for security purposes. All data flows passing through the same SA will get the same security service.
  • IPSec protocol AH or ESP
  • operation mode transmission mode or tunnel mode
  • authentication algorithm encryption algorithm
  • encryption key key lifetime
  • anti-replay window etc.
  • IKE SA Internet Key Exchange Protocol
  • IPsec SA IP Security association is a basic part of IPSec, which can include Internet Key Exchange Protocol (IKE) SA and IPsec SA.
  • IKE SA is used to protect negotiation traffic and authentication traffic, such as negotiated IPSec protocol (AH or ESP), operation mode (transport mode or tunnel mode), authentication algorithm, encryption algorithm, encryption key, key lifetime, anti-replay window Wait.
  • IPsec SA is used to protect the actual transmitted data traffic. IPsec SA is a one-way protection. Both IKE SA and IPsec SA are generated through IKE protocol negotiation.
  • the IKE protocol is responsible for key management, and defines the methods for performing identity authentication, negotiating encryption algorithms and generating shared session keys between communicating entities. IKE keeps the result of key negotiation in SA for later use by AH and ESP.
  • Security Association database (security Association database, SAD): a storage structure for storing all state data associated with SA.
  • Security parameter index (security parameter index, SPI): a 32-bit value used to find SA. SPI, IP destination address, and security protocol number are combined to form a triplet, which is used to uniquely identify a specific SA.
  • SP Security policy: Configured by the user, it decides what kind of protection to provide for IP packets and in what way to implement the protection.
  • SP attributes include protected data streams (such as access control lists (ACL)), security proposals (working mode, IPsec protocol, encryption and authentication algorithms), key configuration methods, local/peer IP addresses of the secure tunnel, IKE peer (Peer) and so on.
  • a feasible encryption scheme is to deploy security between UPF and DN. gateway.
  • the communication between the UE and the security gateway implements end-to-end (E2E) encryption at the IP layer.
  • E2E end-to-end
  • the practical key and encryption strategy for encryption can be obtained through negotiation between the UE and the security gateway based on a security protocol (such as IPsec).
  • the edge network is a peer-to-peer concept of the central cloud, which can be understood as a local data center, which can be identified by a data network access identifier (DNAI), and can also be called an edge computing network (edge computing network). computing network). Multiple local data networks (local DN) can be deployed in the edge network.
  • the edge network may be an edge data network (EDN).
  • EDN edge data network
  • MEC mobile edge computing
  • the attached edge network may be updated in the process of moving, so the DNAI of the access will also change.
  • the AF notifies the SMF of the DNAI supporting the MEC service, the corresponding location area, and service flow information through the PCF, so that the SMF triggers and adjusts the current session of the terminal device.
  • the AF generates an AF request (request).
  • the AF request may include the AF service identifier (AF Transaction ID) and the receiving method of the AF notification (for example, the AF notification needs to be received).
  • the AF request may also include an AF service indicator (AF service ID), a DNAI list corresponding to the service, and an application ID (such as an APP ID) and service flow information (traffic filtering information) of the indicated service.
  • the AF request may also include N6 routing information (including port information for establishing an N6 connection with the UPF). The traffic flow information is used to identify the traffic flow.
  • the AF sends the generated AF request to the NEF.
  • the AF may send the AF request to the NEF through the servitization interface message between the AF and the NEF.
  • Service interface message such as Nnef_Traffic Influence_Creat/Update/Delete.
  • the NEF stores the content carried in the AF request in the UDR.
  • the NEF notifies the AF of the storage/update/deletion of the content carried in the request in the storage information of the NEF.
  • the AF may be notified of the storage/update/deletion of the content carried in the AF request in the storage information of the NEF through a service interface message between the NEF and the AF.
  • the service interface message can be Nnef_Traffic Influence_Creat/Update/Delete Response.
  • the UDR may also perform 404 .
  • the UDR will notify the PCF of the modification (including update/deletion, etc.) of the content carried by the corresponding AF request.
  • the UDR can notify the PCF of the modification of the content carried by the AF request through the service interface message of the UDR.
  • the service interface message of the UDR may be Nudr_DM_Notify.
  • the PCF determines whether the PDU session needs to be modified according to the content in Nudr_DM_Notify. If it is determined that the PDU session needs to be modified, a policy and charging control rule (policy and charging control rule, PCC rule) are generated according to the content in Nudr_DM_Notify. PCF sends PCC rule to SMF. Among them, the receiving method of the AF notification is that when the AF notification needs to be received, the PCF also sends the subscription event of the AF notification to the SMF.
  • the PCF may send the PCC rule to the SMF through the PCF's servitization interface message.
  • the PCF's serviced interface message may be Npcf_SM PolicyControl_UpdateNotify.
  • the SMF receives the PCC rule sent by the PCF, and performs user plane reconfiguration according to the PCC rule, including adjusting the current PDU session, which may include one or more of the following:
  • the SMF determines to execute the PCC rule issued in the flow of FIG. 4 through the change of the area or detects the corresponding service flow, and the SMF executes the insertion of the ULCL node.
  • the SMF needs to adjust the forwarding rules of PSA1, PSA2, and ULCL respectively to ensure that the corresponding uplink and downlink data packets are transmitted from the correct user plane network element.
  • the UE has established a PDU session with PSA1.
  • the SMF locally stores the port information corresponding to the PDU session, such as the uplink port information on the PSA1 used for connecting to the RAN, and the downlink port information on the RAN used for connecting with the PSA1.
  • the SMF selects and configures the PSA2, mainly configures the N6 port of the PSA2, and obtains the uplink port of the PSA2.
  • the SMF selects and configures the added UPF (ULCL/BP), taking ULCL as an example.
  • ULCL/BP UPF
  • the SMF updates the data forwarding rule of PSA1, and configures the downlink tunnel from PSA1 to ULCL mainly according to the downlink port information used by ULCL to connect with PSA1.
  • the SMF updates the data forwarding rule of PSA2, and configures the downlink tunnel of PSA2 mainly according to the downlink port information used by the ULCL to connect with PSA2.
  • the SMF updates the data forwarding rule of the RAN, and mainly establishes an uplink tunnel from the RAN to the ULCL according to the uplink port information used by the ULCL to connect with the RAN.
  • the SMF notifies the UE of the new IP address (IP prefix) of PSA2, for example, PSA2 adopts an IPv6 address.
  • the SMF updates the IP prefix of PSA1 to the UE, and PSA2 adopts the IPv6 address.
  • Steps 507-508 are mainly the transmission mechanism of the IPv6 address of the PSA, and update the respective IPv6 addresses. Since the routing path has changed after inserting the ULCL, the SMF adds the IPv6 address of the ULCL to the IPv6 address list of PSA1 and PSA2).
  • AF notification can include Early notification or Late notification.
  • AF notification is mainly used to notify AF of DNAI changes after inserting ULCL for SMF.
  • the SMF determines that the conditions for triggering the AF notification subscribed by the AF are met.
  • the SMF sends the early notification to the NEF, and the AF notification may include the target DNAI of the current PDU session.
  • the SMF may send an early notification to the NEF through a servitized interface message with the NEF.
  • the NEF service interface message can be Nsmf_EventExposure_notify(early notification).
  • the NEF after receiving the early notification, the NEF sends the early notification to the AF that subscribes to the early notification.
  • NEF can send early notification to AF through service interface message.
  • the service interface message can be Nnef_trafficInfluence_Notify(early notification).
  • NEF can also perform message mapping, such as selecting the corresponding AF transaction ID, etc., and Nnef_trafficInfluence_Notify can also include AF transaction ID, etc.
  • the AF sends a reply message to the NEF, or the AF sends a reply message to the NEF after redeploying the application of Target DNAI.
  • the reply message carries the N6 data routing information corresponding to Target DNAI.
  • the AF may send a reply message to the NEF through the NEF serviced interface message.
  • the NEF service interface message is Nnef_TrafficInfluence_AppRelocationinfo.
  • the NEF triggers a matching notification message to notify the SMF of the application redeployment information (mainly including the N6 data routing information of the Target DNAI of the application redeployment).
  • the NEF may send the application redeployment information to the SMF through the SMF service-oriented interface message.
  • the SMF service interface message can be Nsmf_TrafficInfluence_AppRelocationinfo.
  • the SMF sends the early notification to the AF, and the early notification may include the target DNAI of the current PDU session.
  • the SMF may send an early notification to the AF through an SMF serviced interface message with the AF.
  • the SMF service interface message can be Nsmf_EventExposure_notify(early notification).
  • the AF directly sends a reply message to the SMF, or the AF sends a reply message to the NEF after redeploying the application of Target DNAI.
  • the reply message carries the N6 data routing information corresponding to Target DNAI.
  • the AF may send a reply message to the SMF through a serviced interface message.
  • the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
  • the SMF executes the DNAI change process or the UPF add/modify/remove process. If the AF subscribes to the SMF for an AF acknowledgment to be expected indication, the SMF may wait for the reply message sent by the AF before executing the step 604 and then execute the step 604; otherwise, the SMF may execute the step 604 after sending the early notification. DNAI change process or perform UPF add/modify/remove (UPF addition/relocation/removal) process.
  • UPF add/modify/remove UPF addition/relocation/removal
  • the SMF sends the late notification to the NEF.
  • the late notification includes the Target DNAI of the current PDU Session.
  • the SMF may send the late notification to the NEF through a servitization interface message, for example, the servitization interface message may be Nsmf_EventExposure_Notify.
  • the NEF after receiving the late notification, the NEF sends the late notification to the AF that subscribes to the late notification.
  • NEF can send late notification to AF through service interface message.
  • the service interface message can be Nnef_trafficInfluence_Notify(late notification).
  • NEF after NEF receives the late notification, it can also perform message mapping, such as selecting the corresponding AF transaction ID, etc., and Nnef_trafficInfluence_Notify can also include the AF transaction ID, etc.
  • the AF sends a reply message to the NEF, or the AF sends a reply message to the NEF after redeploying the application to Target DNAI.
  • the reply message carries the detailed N6 data routing information corresponding to Target DNAI. If the AF changes, the AF includes the AF switching indication, including the Target AF ID, in the reply message, and notifies the NEF of the Target AF's target address (Target Address).
  • the AF may send a reply message to the NEF through a serviced interface message.
  • the service interface message is Nnef_TrafficInfluence_AppRelocationinfo.
  • the NEF triggers a matching notification message to notify the SMF of the redeployment information of the application (mainly including the N6 data routing information of the Target DNAI of the application redeployment).
  • the NEF may send a reply message to the SMF through a serviced interface message.
  • the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
  • the SMF sends the late notification to the AF.
  • the late notification includes the Target DNAI of the current PDU Session.
  • the AF detects whether it can serve the Target DNAI. If the AF entity needs to be replaced, the AF selects the Target AF for the Target DNAI and performs AF migration.
  • the SMF may send a late notification to the AF through a serviceable interface message.
  • the service interface message can be Nsmf_trafficInfluence_Notify(late notification).
  • the AF sends a reply message to the SMF, or the AF sends a reply message to the SMF after redeploying the application to Target DNAI.
  • the reply message carries the detailed N6 data routing information corresponding to Target DNAI. If the AF changes, the AF includes the AF switching indication in the reply message, including the Target AF ID, and notifies the SMF of the Target AF's target address (Target Address).
  • the AF may send a reply message to the SMF through a serviced interface message.
  • the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
  • Steps 701-702 are the establishment flow of IKE SA.
  • Steps 703 to 704 are procedures for establishing an IPsec sub-SA.
  • the information exchanged in the subsequent IPsec sub-SA establishment process can be encrypted and transmitted through the IKE SA.
  • the data packets belonging to the IPsec sub-SA are encrypted and transmitted by the IPsec sub-SA.
  • the information in square brackets in Figure 7 is optional, and the information in curly brackets is encrypted and protected by IKE SA.
  • the initiator initiates a message 1 for establishing an IKE SA to the responder, where the message 1 includes one or more of HDR, SAi1, KEi1, or Ni.
  • HDR stands for IKE header, and HDR includes Security Parameter Indexes (SPI) (used to find security policy parameters), IKE protocol version number, exchange type (transmission type or tunnel type), and message ID (Message ID). ), other types of flags (Flag).
  • SPI Security Parameter Indexes
  • SAi1 represents the encryption algorithm supported by the initiator
  • KEi1 represents the key exchange material of the initiator
  • KEi1 contains the Diffie-Hellman value of the initiator, which is used to generate the encryption material.
  • Ni represents the random number of the initiator, which is used to generate a key or for encryption, etc.
  • the responder sends a message 2 to the initiator, where the message 2 is used to respond to the message 1, and the message 2 includes one or more of HDR, SAr1, KEr1, or Nr.
  • SAr1 represents the encryption algorithm supported by the responder
  • KEr1 represents the key exchange material of the responder.
  • KEr1 includes the responder's Diffie-Hellman value, which is used to generate the cryptographic material.
  • Nr represents the random number of the responder, which is used to generate a key or for encryption, etc.
  • Message 2 may also contain an authentication request. At this point, both parties have obtained the other party's KE and random number, and can generate the same SKEYSEED for generating all subsequent keys.
  • the initiator initiates a message 3 for establishing an IPSec sub-SA to the responder, and the message 3 includes HDR, SK ⁇ IDi, AUTH, SAi2, TSi, TSr ⁇ .
  • SK ⁇ means to use IKE SA to encrypt the content in curly brackets.
  • message 3 may also include one or more of [CERT] or [CERTREQ].
  • IDi and AUTH are used for authentication verification and integrity protection.
  • Idi represents the identity information indicator (Identification-Initiator) of the initiator.
  • AUTH authentication means authentication.
  • CERT stands for certificate.
  • CERTREQ stands for certificate request.
  • SAi2 represents the encryption algorithm used by the IPSec sub-SA of the initiator, and TSi and TSr are the packet filtering rules applied to the encryption of this sub-SA.
  • TSi may include IP addresses or IP address segments.
  • the TSr may include an IP address or an IP address segment.
  • the sub-SA needs to be encrypted.
  • the responder if the source address of the data packet sent from the initiator is within the IP address range of the TSi and the destination address is within the IP address range of the TSr, the sub-SA needs to be decrypted.
  • the SA needs to be decrypted.
  • the responder if the source address of the data packet sent from the responder is within the IP address range of the TSr, and the destination address is within the IP address range of the TSi, the sub-SA needs to be encrypted.
  • the responder responds with message 4 to the initiator.
  • Message 4 includes HDR, SK ⁇ IDr, AUTH, SAr2, TSi, TSr ⁇ .
  • [CERT] may also be included in message 4.
  • IDr represents the identity information indicator of the responder.
  • AUTH authentication means authentication.
  • CERT stands for certificate.
  • SAr2 represents the encryption algorithm used by the responder's IPSec sub-SA, and TSi and TSr are the packet filtering rules applied to the encryption of this sub-SA.
  • steps 703 and 704 may be performed multiple times, and IKE SAs are used for encryption protection to establish multiple groups of IPsec sub-SAs for data transmission. It should be understood that the initiator of the establishment of the IPsec sub-SA may be the initiator of the IKE SA, or the responder of the IKE SA.
  • a possible implementation method is to deploy a security gateway after each PSA (UPF) to realize end-to-end user plane data transmitted by terminal devices. side encryption.
  • the central UPF which is the anchor UPF of the session, is located in the centralized data center at the far end.
  • the APP server 1 (server1) in the remote data center can send user plane data, such as user plane APP data, to the terminal device through the central UPF.
  • ULCL/BP can be regarded as a special UPF. It is located at the edge node closer to the terminal device.
  • the security gateway is an IPsec gateway deployed between the UPF and the APP server, and is mainly used to encrypt the data of the APP. In order to ensure the encrypted state of the APP data in the transmission path between the terminal device and the security gateway, that is, to ensure that the APP data is invisible on the core network side and the base station side (such as the RAN side).
  • an independent security gateway needs to be deployed after the central UPF and ULCL/BP.
  • the service of the terminal device is updated or the location of the terminal device changes, the insertion of a new ULCL/BP may be triggered and the security gateway may be changed, or the update of the ULCL/BP and the security gateway may be triggered.
  • the original server serving the terminal device is APP server1, and then due to the service update of the terminal device, the APP server1 of the original server terminal device needs to be switched to APP server2. Therefore, it is necessary to trigger the insertion of a new ULCL/BP and update the security gateway , switch from the original security gateway 1 to the security gateway 2.
  • the adjustment of the server is mainly realized by the AF influence traffic routing related process (for example, see the relevant description in Figure 4), and the AF can first provide the DNAI available to the relevant application server to the SMF through the PCF (that is, the access network where the application server is located).
  • the SMF triggers a new ULCL/BP insertion process (for example, refer to the relevant description in Figure 5) due to the movement of the terminal device or detects the data flow corresponding to the terminal device, and after the selection of ULCL/BP is completed, it notifies the AF to the DNAI change, and obtain the N6 configuration options and related routing rules required by the ULCL/BP through the AF notification process (for example, see the relevant description in Figure 6), and then configure the ULCL/BP. Then, in order to ensure the security of the user plane data, the establishment of the IKE SA and the IPsec SA of the security gateway 2 is further performed.
  • a new ULCL/BP insertion process for example, refer to the relevant description in Figure 5
  • the SMF triggers a new ULCL/BP insertion process (for example, refer to the relevant description in Figure 5) due to the movement of the terminal device or detects the data flow corresponding to the terminal device, and after the selection of ULCL/BP is completed, it notifies the AF to
  • the embodiments of the present application provide a communication method and apparatus, by deploying a centralized security gateway.
  • a centralized security gateway is used to establish IKE SAs with end devices.
  • Centralized security gateway overhead manages key generation and distribution.
  • the security gateway that provides security protection for user plane data transmission adopts distributed deployment.
  • Distributed security gateways can be deployed after ULCL/BP to establish user plane IPsec sub-SA connections with terminal devices.
  • the centralized security gateway replaces the distributed security gateway to create an IPsec sub-SA connection with the terminal device, or the centralized security gateway creates an IPsec sub-SA connection with the terminal device for the distributed security gateway.
  • a centralized security gateway may establish transport-mode IPsec sub-SAs for distributed security gateways.
  • the communication system includes a first security gateway and a second security gateway.
  • the first security gateway may also be referred to as a centralized security gateway.
  • the first security gateway is used to provide security protection of the IKE SA, and the first security gateway may also be referred to as an IKE gateway.
  • the second security gateway may be referred to as a distributed security gateway.
  • the second security gateway is used to provide security protection of the IPsec SA, and the second security gateway may also be referred to as an IPsec gateway.
  • the first security gateway may be deployed in a data center.
  • the second security gateway may be distributed and deployed between each PSA and the application server.
  • the communication system further includes network elements of the first core network and network elements of the second core network.
  • the first core network network element may include a session management network element
  • the second core network network element may include a mobility management network element or a policy control network element.
  • the session management network element may be SMF
  • the mobility management network element may be AMF
  • the policy control network element may be PCF.
  • the communication system may further include a user plane network element.
  • FIG. 10 a schematic flowchart of a communication method provided by an embodiment of the present application is shown.
  • the first security gateway establishes an IKE SA connection with a terminal device.
  • the first security gateway establishes an IPsec sub-SA connection for the second security gateway when it is determined that the user plane data needs to be securely transmitted through the second security gateway.
  • the IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the end-to-end security service on the terminal device needs to be switched to the EAS server.
  • the ULCL/BP needs to be inserted and the security gateway needs to be replaced. Therefore, it is necessary to determine the user plane data between the terminal device and the EAS server. Two security gateways for secure transmission.
  • the first security gateway when the first security gateway establishes an IPsec sub-SA connection for the second security gateway, it may be implemented in any of the following ways:
  • the first security gateway may obtain the first security parameter by negotiating the IPsec sub-SA connection between the second security gateway and the terminal device instead of the second security gateway, and the second security gateway does not participate in the negotiation of the IPsec sub-SA connection, Then, the negotiated security parameters are configured to the second security gateway for use by the second security gateway.
  • the first security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the first security parameter may include material for generating a key for user plane data transmission with the terminal device.
  • the material may include key material generated by the first security gateway, key exchange material of the terminal device, key exchange material configured for the second security gateway, random numbers of the terminal device or random numbers generated for the second security gateway.
  • the second security gateway may generate key material according to the material provided by the first security gateway. For example, see the formula (1) below.
  • KEYMAT key material
  • Prf stands for pseudo-random function
  • Ni represents a random number of the terminal device
  • Nr represents a random number generated by the second security gateway
  • SK_d represents the key material derived on the basis of IKE SA.
  • the second security gateway may generate key material according to the material provided by the first security gateway. For example, see the formula (2) below.
  • KEYMAT represents the key material generated by the second security gateway.
  • Prf stands for pseudo-random function.
  • Ni represents a random number of the terminal device, and Nr represents a random number generated by the second security gateway.
  • SK_d represents the key material derived on the basis of IKE SA.
  • g ⁇ ir is generated from KEi and KEr.
  • KEi represents the key exchange material of the terminal device, and KEr represents the key exchange material configured for the second security gateway.
  • SPIi and SPIr represent the security association index values of the initiator and the responder.
  • g ⁇ ir is generated from KEi1 and KEr1.
  • KEi1 represents the key exchange material of the terminal device in the IKE SA negotiation phase.
  • KEr1 represents the key exchange material of the first security gateway in the IKE SA negotiation phase.
  • Ni1 represents the random number of the terminal device in the IKE SA negotiation phase, and Nr1 represents the random number of the first security gateway in the IKE SA negotiation phase.
  • the first security parameter may further include one or more of the following:
  • the encryption algorithm of the terminal device is the encryption algorithm allocated by the second security gateway, and is used for the packet filtering rule for user plane data transmission between the terminal device and the second security gateway.
  • TSi and TSr can be included in the packet filtering rule.
  • TSi may include IP addresses or IP address segments.
  • the TSr may include an IP address or an IP address segment. For the initiator, if the source address of the data packet sent from the initiator is within the IP address range of the TSi and the destination address is within the IP address range of the TSr, the sub-SA needs to be encrypted.
  • the responder if the source address of the data packet sent from the initiator is within the IP address range of the TSi, and the destination address is within the IP address range of the TSr, the sub-SA needs to be decrypted. Or, for the initiator, if the destination address of the data packet sent from the responder is within the IP address range of the TSi, and the source address is within the IP address range of the TSr, the SA needs to be decrypted. For the responder, if the source address of the data packet sent from the responder is within the IP address range of the TSr, and the destination address is within the IP address range of the TSi, the sub-SA needs to be encrypted. In this embodiment, the initiator is a terminal device, and the responder can be considered as the second security gateway.
  • the KEYMAT may be generated according to the first security parameter, for example, using formula (1) or formula (2), and then the generated KEYMAT sent to the second security gateway.
  • KEYMAT is a binary data string. Therefore, the second security gateway can intercept a part of the bits from the KEYMAT as the encryption key or decryption key of the IPsec sub-SA.
  • the second security gateway may participate in the negotiation of the IPsec sub-SA connection between the first security gateway and the terminal device.
  • the first security gateway may configure security parameters for the second security gateway during the negotiation process with the terminal device, the second security gateway may confirm or modify the security parameters after receiving the security parameters, and the second security gateway may send the modified or confirmed security parameters.
  • the first security gateway sends the security parameters modified or confirmed by the second security gateway to the terminal device as its own negotiation result.
  • the IPsec sub-SA negotiation is performed twice between the first security gateway and the terminal device.
  • the first security gateway and the terminal device negotiate the IPsec sub-SA connection.
  • the first security gateway as an intermediate proxy network element, is responsible for forwarding the signaling message for negotiating the IPsec sub-SA connection between the second security gateway and the terminal device.
  • the negotiation object that the terminal device can perceive is the first security gateway, and does not perceive the second security gateway.
  • the terminal device initiates an establishment request to the first security gateway, so that the first security gateway receives the establishment request initiated by the terminal device, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway. It should be understood that the terminal device does not perceive the second security gateway and only exchanges messages with the first security gateway, but actually the first security gateway establishes the IPsec sub-SA connection instead of the second security gateway.
  • the establishment request may include the encryption algorithm of the terminal device and the key exchange material of the terminal device.
  • the establishment request may also include a packet filtering rule for using the IPsec sub-SA connection to transmit data on the user plane.
  • SAi represents the encryption algorithm of the terminal device.
  • KEi represents the key exchange material for the end device.
  • TSi and TSr represent packet filtering rules for user plane data transmission using IPsec sub-SA connections. It can be understood that TSi represents the IP address or IP address segment of the terminal device.
  • TSr represents the IP address segment of the target application server, which may be understood as the IP address segment of the second security gateway.
  • the establishment request may also include a random number of the terminal device, which is represented by Ni as an example.
  • the first security gateway sends the first security parameter of the IPsec sub-SA connection to the second security gateway.
  • the first security parameter may include material for generating a key for user plane data transmission with the terminal device.
  • the first security parameter includes one or more of the following key material (SK_d) generated by the first security gateway, key exchange material (KEi) of the terminal device, and key exchange material configured for the second security gateway: (KEr), a random number (Ni) of the terminal device, or a random number (Nr) generated for the second security gateway.
  • SK_d key material
  • KEi key exchange material
  • Nr random number
  • the first security parameter may further include SAi and SAr.
  • SAr represents the encryption algorithm configured for the second security gateway.
  • the first security parameter may also include TSi and TSr.
  • the first security gateway may also update the TSr for the second security gateway according to the TSr and the configuration information. For example, the updated TSr is represented by TSr*, then the TSi included in the first security parameter and the updated TSr( i.e. TSr*).
  • the second security gateway after receiving the first security parameter, the second security gateway sends a confirmation message to the first security parameter, where the confirmation message is used to indicate that the first security parameter has been received.
  • 1104a may not be executed, and the first security gateway directly executes 1105a after executing 1103a.
  • the first security gateway sends a setup response to the terminal device, where the setup response includes the first security parameter.
  • the terminal device initiates an establishment request to the first security gateway, so that the first security gateway receives the establishment request initiated by the terminal device, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway. It should be understood that the terminal device does not perceive the second security gateway and only exchanges messages with the first security gateway, but actually the first security gateway establishes the IPsec sub-SA connection instead of the second security gateway.
  • the setup request may include SAi, KEi, TSi or TSr.
  • SAi represents the encryption algorithm of the terminal device.
  • KEi represents the key exchange material for the end device.
  • TSi and TSr represent packet filtering rules for transmitting user plane data using the IPsec sub-SA connection.
  • the establishment request may also include Ni, where Ni is a random number of the terminal device.
  • the first security gateway sends a configuration context of the IPsec sub-SA connection to the second security gateway, where the configuration context includes second security parameters configured for the second security gateway and used to establish an IPsec sub-SA connection with the terminal device.
  • the second security parameter includes material for the second security gateway to generate a key for user plane data transmission between the second security gateway and the terminal device.
  • the material used to generate the key for user plane data transmission with the terminal device includes one or more of the following: key material generated by the first security gateway, key of the terminal device The exchange material, the key exchange material configured for the second security gateway, the random number of the terminal device or the random number of the first security gateway.
  • the second security parameter may further include one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, or an encryption algorithm used for the terminal device and the second security gateway.
  • the second security gateway after receiving the second security parameter, the second security gateway obtains the third security parameter according to the second security parameter, and sends the third security parameter to the first security gateway. Parameters are updated or confirmed.
  • the third security parameter includes one or more of the following: a second key exchange material for updating the first key exchange material, a second key exchange material for updating the first key exchange material, a The updated second random number.
  • the second security gateway confirms the second security parameter, and the parameters included in the third security parameter are the same as the second security parameter.
  • KEYMAT1 represents the key material generated by the second security gateway.
  • Prf stands for pseudo-random function.
  • Ni represents a random number of the terminal device, and Nr represents a random number generated by the first security gateway.
  • SK_d represents the key material derived on the basis of IKE SA.
  • g ⁇ ir is generated from KEi and KEr.
  • KEi represents the key exchange material of the terminal device, and KEr represents the first key exchange material of the first security gateway.
  • the second security gateway may obtain the key for user plane data transmission with the terminal device from KEYMAT1.
  • the second security gateway may update the first key exchange material in the second security parameter, for example, to the second key exchange material.
  • the key material KEYMAT2 is generated by the following formula (5).
  • KEYMAT represents the key material generated by the second security gateway.
  • Prf stands for pseudo-random function.
  • Ni represents a random number of the terminal device, and Nr represents a random number generated by the second security gateway.
  • SK_d represents the key material derived on the basis of IKE SA.
  • g ⁇ ir(new) is generated from KEi and KEr*.
  • KEi represents the key exchange material of the terminal device, and KEr* represents the second key exchange material.
  • the second security gateway may update the first key exchange material in the second security parameter, for example, update it to the second key exchange material.
  • the first random number is also updated, for example, updated to its own random number, that is, the second random number.
  • the key material KEYMAT3 is generated by the following formula (6).
  • KEYMAT3 represents the key material generated by the second security gateway.
  • Prf stands for pseudo-random function.
  • Ni represents the random number of the terminal device, and Nr* represents the random number of the second security gateway.
  • SK_d represents the key material derived on the basis of IKE SA.
  • g ⁇ ir(new) is generated from KEi and KEr*.
  • KEi represents the key exchange material of the terminal device, and KEr* represents the second key exchange material.
  • the second security gateway may update the first random number, for example, update it to its own random number, that is, the second random number.
  • the key material KEYMAT4 is generated by the following formula (7).
  • KEYMAT4 represents the key material generated by the second security gateway.
  • Prf stands for pseudo-random function.
  • Ni represents the random number of the terminal device, and Nr* represents the random number of the second security gateway.
  • SK_d represents the key material derived on the basis of IKE SA.
  • g ⁇ ir is generated from KEi and KEr.
  • the third security parameter may further include SAr* and/or TSr*.
  • SAr* may be an encryption algorithm updated by the second security gateway for SAr.
  • TSr* may be obtained after the second security gateway updates the TSr.
  • the first security gateway sends a setup response to the terminal device, where the setup response includes the third security parameter.
  • the third security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
  • the terminal device initiates an establishment request 1 to the first security gateway, so that the first security gateway receives the establishment request 1 initiated by the terminal device, and the establishment request 1 is used to request the first establishment of an IPsec sub-SA connection with the first security gateway.
  • the first security gateway sends an establishment response 1 to the terminal device, where the establishment response 1 is used to respond to the establishment request 1, so as to complete the establishment of the first IPsec sub-SA connection between the first security gateway and the terminal device.
  • the terminal device initiates an establishment request 2 to the first security gateway, so that the first security gateway receives the establishment request 2 initiated by the terminal device, and the establishment request 2 is used to request to establish a second IPsec sub-SA connection with the first security gateway.
  • the establishment request 2 may include a fourth security parameter, where the fourth security parameter includes an encryption algorithm of the terminal device and a key exchange material of the terminal device.
  • the fourth security parameter may further include a packet filtering rule for user plane data transmission using the IPsec sub-SA connection.
  • the encryption algorithm of the terminal device is represented by SAi.
  • the key exchange material of the terminal device is represented by KEi.
  • TSi and TSr represent packet filtering rules.
  • the first security gateway receives the establishment request 2, and forwards the fourth security parameter to the second security gateway.
  • the first security gateway also sends the key material SK_d of the first security gateway in the IKE SA negotiation stage to the second security gateway.
  • the second security gateway after receiving the fourth security parameter, the second security gateway obtains a fifth security parameter matching the fourth security parameter, and sends the fifth security parameter to the first security gateway.
  • the fifth security parameter includes KEr* and SAr*.
  • KEr* includes the key exchange material for the second security gateway.
  • SAr* includes the encryption algorithm of the second security gateway.
  • the fifth security parameter may also include a random number Nr* of the second security gateway.
  • the first security gateway sends a setup response 2 to the terminal device, where the setup response 2 includes the fifth security parameter (for example, including KEr*, SAr*, and Nr*).
  • the setup response 2 may also include SAi, KEi, TSi or TSr*.
  • the TSr* may be obtained after the second security gateway updates the TSr.
  • the terminal device and the first security gateway negotiate twice, and in the first negotiation, an IPsec sub-SA connection is established between the first security gateway and the terminal device.
  • the first security gateway does not actually configure the security parameters for the second security gateway, but forwards the security parameters to be negotiated sent by the terminal device to the second security gateway, and the terminal device does not perceive the security parameters of the second security gateway.
  • the existence of the second security gateway actually means that the terminal device negotiates with the second security gateway to establish an IPsec sub-SA connection.
  • the first security gateway establishes the IKE SA connection with the terminal device, which may be triggered by the terminal device, or may be triggered by the first security gateway to establish the IKE SA connection.
  • the establishment of the IKE SA connection is triggered by the first security gateway to the terminal device, and the first core network element may send the address of the terminal device to the first security gateway in the session management process (such as the session establishment/modification process).
  • the address information may be the IP address and/or port number of the terminal device.
  • the first security gateway can trigger the establishment of an IKE SA connection to the terminal device according to the address information of the terminal device.
  • the terminal device triggers the establishment of the IKE SA connection to the first security gateway, and the first core network network element may send the address information of the first security gateway to the terminal device in the session management process. Further, the terminal device can trigger the establishment of an IKE SA connection to the first security gateway according to the address information of the first security gateway.
  • a second forwarding rule can be configured on the user plane network element.
  • the second forwarding rule It is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
  • the first core network element Before establishing the IPsec sub-SA connection, when the first core network element determines the first security gateway that provides security services for the terminal device, the first core network element configures the user plane network element with a first forwarding rule, and the first forwarding rule uses to instruct the user plane network element to forward the data packet of the terminal device to the first security gateway.
  • the network element of the first core network may determine the first security gateway that provides security services for the terminal device according to the subscription data of the terminal device.
  • the network element of the first core network may acquire subscription data of the terminal device from the UDM or the UDR.
  • the network element of the first core network may determine the first security gateway that provides the security service for the terminal device from the subscription data of the terminal device according to the service identifier of the terminal device.
  • the service identifier may be DNN or NSSAI, etc., and the service identifier may also be other identifiers used to identify the service of the terminal device.
  • the first security gateway that provides security services for the terminal device is selected by the network element of the first core network.
  • the network element of the first core network determines the first security gateway that provides security services for the terminal device according to the local configuration information.
  • the network element of the first core network may determine the first security gateway that provides the security service for the terminal device from the local configuration information according to the service identifier of the terminal device.
  • the service identifier may be DNN or NSSAI or the like.
  • the first security gateway that provides security services for the terminal device is selected by the network element of the first core network.
  • the first core network element may further receive address information of the first security gateway of the second core network element, so as to determine the first security gateway that provides security services for the terminal device.
  • the network element of the second core network may be a policy control network element or a mobility management network element.
  • the first security gateway that provides security services for the terminal device may be selected by a mobility management network element or a policy management network element.
  • the first security gateway is called an IKE gateway as an example
  • the second security gateway is called an IPsec gateway as an example.
  • the selection of the first security gateway for the terminal device by the network element of the first core network is taken as an example.
  • FIG. 12 it is a schematic diagram of a possible communication network architecture.
  • the interface deployed between the SMF and the IKE gateway is an Nxx interface as an example.
  • the interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example.
  • the interface may also adopt other names, which are not specifically limited in this embodiment of the present application.
  • the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
  • FIG. 13 a schematic flowchart of a possible communication method is shown.
  • the selection of the first security network gateway is performed by the SMF as an example.
  • the creation is triggered by the terminal device as an example.
  • a PDU session establishment process a PDU session establishment process. Exemplarily, the following steps may occur in a session establishment process or a session modification process.
  • the SMF determines that the current PDU session of the terminal device requires end-to-end security protection.
  • the SMF can query the subscription data of the terminal device from the UDM, and determine according to the subscription data that the current PDU session of the terminal device needs to perform end-to-end security protection.
  • the SMF determines the IKE gateway through local configuration information or subscription data of the terminal device.
  • the SMF can obtain the subscription data of the terminal device from the UDM or the UDR.
  • the SMF obtains the address information of the IKE gateway from the local configuration information or the subscription data of the terminal device.
  • the address information may include IP addresses and/or port numbers.
  • the SMF performs IKE gateway authentication. For example, an authorization request is initiated to the IKE gateway to verify whether the IKE gateway can provide the terminal device with a security service for the business processed by the terminal device.
  • the authorization request may include the identifier of the terminal device, the destination IP address or the data network name (DNN).
  • the IKE gateway determines, according to the authorization request, whether the IKE gateway can provide the terminal with encryption services for the network segment corresponding to the destination IP address or data network name.
  • the identity of the terminal device may be a 5G globally unique temporary UE identity (5G-globally unique temporary identity, 5G-GUTI), or a user permanent identifier (subscription permanent identifier, SUPI), or a generic public subscription identifier (generic public subscription identifier). , GPSI), or user concealed identifier (subscription concealed identifier, SUCI), etc.
  • 5G-globally unique temporary identity 5G-GUTI
  • SUPI user permanent identifier
  • generic public subscription identifier generic public subscription identifier
  • GPSI GPSI
  • user concealed identifier subscription concealed identifier
  • 1304 is an optional step. After the IKE gateway is determined according to the subscription data or local configuration information, the IKE gateway may not be authorized any more.
  • the SMF configures the UPF with the first forwarding rule.
  • the first forwarding rule may include address information of the IKE gateway, and the first forwarding rule is used to instruct the UPF to forward the data packets of the PDU session of the terminal device to the IKE gateway.
  • the SMF may configure the UPF with the first forwarding rule during the N4 session establishment process.
  • the SMF sends the address information of the IKE gateway to the terminal device through the AMF. Used by the terminal device to initiate the establishment of an IKE SA connection. For example, the SMF can send the address information of the IKE gateway to the AMF through N11. Then the AMF sends the address information of the IKE gateway to the terminal device through the NAS message.
  • the terminal device initiates the establishment process of the IKE SA connection to the IKE gateway, and completes the establishment of the IKE SA connection with the IKE gateway.
  • the terminal device initiates an IPSec sub-SA connection establishment process to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway.
  • any one of the above-mentioned first to third possible implementation manners can be used for implementation.
  • the second possible implementation manner is taken as an example for description.
  • the terminal device initiates an establishment request to the IKE gateway, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway.
  • the mode of establishment of the IPsec sub-SA connection may adopt the transport mode.
  • the target Traffic Selectors carried in the establishment request is the address segment of the IPSec gateway, and the first security gateway can determine that the terminal device actually needs to select the IPsec gateway to provide security services for the terminal device according to the address segment of the IPsec gateway. It should be noted that the address segment of the IPsec gateway is the same as the address segment of the server that needs to provide business services for the terminal device.
  • the setup request carries SAi, KEi, TSi, TSr, and Ni.
  • SAi represents the encryption algorithm of the terminal device.
  • KEi represents the key exchange material for the end device.
  • TSi and TSr represent packet filtering rules for transmitting user plane data using the IPsec sub-SA connection.
  • Ni represents the random number of the terminal device.
  • the IKE gateway sends the configuration context of the IPsec sub-SA connection to the IPsec gateway.
  • the configuration context includes the second security parameter, and details are not repeated here.
  • the second security parameter includes SAi, SAr, KEi, KEr, TSi, TSr, Ni, Nr, and SK_d as an example.
  • SK_d represents the key material derived based on the IKE SA
  • KEr represents the first key exchange material of the IKE gateway.
  • Nr represents the random number of the IKE gateway.
  • TSr represents the key exchange material for the IKE gateway.
  • the IPSec gateway feeds back the configuration information of the sub-SA connection to the IKE gateway, see 1104b, the configuration information includes the third security parameter, for the description of the third security parameter, see the description of 1104b, which is not repeated here.
  • the third security parameter includes KEr* and Nr* as an example. It should be understood that the third security parameter may further include SAr* and/or TSr*, and may also include SAi, KEi, TSi, and Ni.
  • SAr* represents the encryption algorithm confirmed by the IPsec gateway according to SAr. In some embodiments, SAr* may or may not be the same as SAr.
  • KEr* represents the key exchange material of the IPsec gateway.
  • the IKE gateway sends an establishment response to the terminal device according to the configuration information of the IPsec sub-SA connection received from the IPSec gateway, where the establishment response may include a third security parameter.
  • the establishment response may include a third security parameter.
  • the IKE gateway feeds back information on the establishment of the IPsec sub-SA connection to the SMF.
  • the setup situation information may include TSr*.
  • the SMF configures the second forwarding rule to the UPF.
  • TSr* may be included in the second forwarding rule.
  • the second forwarding rule is used to instruct the UPF to forward the data packets belonging to the IPsec sub-SA connection to the IPSec gateway according to TSr*.
  • the terminal device does not need to use control plane signaling to perceive the existence of the IPSec gateway.
  • End devices only interact with the centralized IKE gateway to establish IPsec sub-SA connections.
  • the IPSec gateway is changed (such as the MEC scenario of ULCL insertion)
  • the update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead.
  • every time the IPSec gateway changes there is no need to establish an IKE SA connection, which reduces signaling overhead.
  • the selection and interaction of the IKE gateway is performed by the SMF.
  • the SMF first informs the terminal device of the address information of the IKE gateway through a NAS message, and configures the first forwarding rule of the UPF, Instructs the UPF to forward the end device's packets to the IKE gateway.
  • the terminal device can only interact with the IKE gateway.
  • the terminal device initiates an IKE SA establishment process according to the address information of the IKE gateway, and after establishing the IKE SA connection with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish with the terminal device for transmitting user plane data.
  • IPSec sub-SA connection Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
  • FIG. 15 another possible communication method flow provided by the embodiment of the present application is described, as shown in FIG. 15 .
  • the selection of the first security network gateway is performed by the SMF as an example.
  • the creation of an IKE SA is triggered by IKE to the terminal device as an example.
  • the SMF sends the address information of the terminal device to the IKE gateway.
  • the IKE gateway initiates the establishment of the IKE SA connection.
  • the SMF may send an SA establishment request message to the IKE gateway, where the SA establishment request message includes address information of the terminal device.
  • the IKE gateway initiates the establishment process of the IKE SA connection to the terminal device, and the establishment of the IKE SA connection between the IKE gateway and the terminal device is completed.
  • the terminal device initiates the establishment process of the IPsec sub-SA connection to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway.
  • any one of the above-mentioned first to third possible implementation manners can be used for implementation.
  • the second possible implementation manner is taken as an example for description.
  • the IKE gateway is notified of the address information of the terminal device by the SMF, so there is no additional signaling overhead for the terminal device.
  • the terminal device does not need to perceive the existence of the IPSec gateway through control plane signaling.
  • the establishment of the IPsec SA only interacts with the centralized IKE gateway.
  • the IPSec gateway changes later such as the MEC scenario of ULCL insertion
  • the update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead.
  • every time the IPSec gateway changes there is no need to establish an IKE SA connection, which reduces signaling overhead.
  • the selection and interaction of the IKE gateway is performed by the SMF.
  • the SMF notifies the IKE gateway of the address information of the terminal device, and configures the first forwarding rule of the UPF, instructing the UPF to transfer the terminal device to the terminal device.
  • the packets are forwarded to the IKE gateway.
  • the terminal device can only interact with the IKE gateway.
  • the terminal device initiates an IKE SA establishment process according to the address information of the IKE gateway, and after establishing the IKE SA connection with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish with the terminal device for transmitting user plane data.
  • IPSec sub-SA connection Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
  • the mobility management network element selects the first security gateway for the terminal device as an example.
  • FIG. 17 it is a schematic diagram of a possible communication network architecture. Take the mobility management gateway as the AMF in the 5G communication network as an example.
  • the interface deployed between the AMF and the IKE gateway is an Nxx interface as an example.
  • the interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example.
  • the interface may also adopt other names, which are not specifically limited in this embodiment of the present application.
  • the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
  • the AMF is used as an example to notify the SMF after selecting the first security network gateway as the terminal device.
  • the creation is triggered by the terminal device as an example.
  • the AMF selects and configures the IKE gateway, and sends the address information of the IKE gateway to the terminal device.
  • the AMF first sends the address information of the IKE gateway to the SMF, and the SMF notifies the terminal device, and further, the terminal device initiates the establishment of an IKE SA with the IKE gateway.
  • the AMF determines that the current PDU session of the terminal device needs to perform end-to-end security protection. For example, the AMF may query the UDM for the subscription information of the terminal device, and determine according to the subscription information that the current PDU session of the terminal device needs to perform end-to-end security protection.
  • the AMF determines the IKE gateway according to the local configuration information or the subscription data of the terminal device.
  • the AMF can acquire the subscription data of the terminal device from the UDM or the UDR.
  • the AMF may select the first security gateway for the terminal device from the subscription data of the terminal device according to the service identifier of the terminal device.
  • the service identifier can be DNN or NSSAI, etc., and the service identifier can also be other identifiers used to identify the service of the terminal device.
  • the first security gateway that provides security services to the terminal device is selected by the AMF.
  • different service identifiers in the subscription data of the terminal device correspond to different IKE gateways.
  • the AMF determines the IKE gateway that provides the security service for the terminal device according to the local configuration information.
  • the AMF can determine the IKE gateway that provides the security service for the terminal device from the local configuration information according to the service identifier of the terminal device.
  • the service identifier may be DNN or NSSAI or the like.
  • different service identifiers in the local configuration information correspond to different IKE gateways.
  • the AMF obtains the address information of the IKE gateway from the local configuration information or the subscription data of the terminal device.
  • the address information may include IP addresses and/or port numbers.
  • the AMF initiates an authorization request to the IKE gateway to verify whether the IKE gateway can provide the terminal device with a security service for the business processed by the terminal device.
  • the authorization request may include the identifier of the terminal device, the destination IP address or the data network name (DNN).
  • the IKE gateway determines, according to the authorization request, whether the IKE gateway can provide the terminal with encryption services for the network segment corresponding to the destination IP address or data network name.
  • 1804 is an optional step. After the IKE gateway is determined according to the subscription data or the local configuration information, the IKE gateway may not be authorized any more.
  • the AMF sends the address information of the IKE gateway to the terminal device.
  • a PDU session establishment process a PDU session establishment process.
  • the following steps 1807-1815 belong to the PDU session establishment flow.
  • the AMF sends the address information of the IKE gateway to the SMF.
  • the terminal device initiates the establishment process of the IPsec sub-SA connection to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway.
  • any one of the above-mentioned first to third possible implementation manners can be used for implementation.
  • the second possible implementation manner is taken as an example for description.
  • the terminal device does not need to use control plane signaling to perceive the existence of the IPSec gateway.
  • the establishment of IKE SA and IPsec sub-SA only interacts with the centralized IKE gateway.
  • the IPSec gateway changes subsequently, it does not need to be
  • the extra control plane signaling overhead can complete the update and establishment of the IPSec gateway sub-SA.
  • the IKE gateway is managed and allocated by the AMF.
  • the AMF selects the IKE gateway for the terminal device, and then notifies the SMF and UE of the address information of the IKE gateway in the PDU management process of the terminal device.
  • the AMF can also notify the IKE gateway of the address information of the terminal device in the PDU management process of the terminal device, and then the IKE gateway triggers the creation of an IKE SA connection.
  • the AMF selects and interacts with the IKE gateway for the terminal device.
  • the AMF first selects the IKE gateway for the terminal device.
  • the AMF sends the The SMF informs the IKE gateway of the address information.
  • the first forwarding rule of the UPF is configured by the SMF, and the UPF is instructed to forward the data packets of the terminal device to the IKE gateway.
  • the terminal device can only interact with the IKE gateway.
  • the terminal device initiates the IKE SA establishment process according to the address information of the IKE gateway.
  • the IKE gateway After the IKE SA connection is established with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish IPSec with the terminal device for transmitting user plane data. Sub-SA connection. Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
  • the policy control network element configures the address information of the IKE gateway for the terminal device as an example.
  • FIG. 20 it is a schematic diagram of a possible communication network architecture. Take the policy control network element as the PCF in the 5G communication network as an example.
  • the interface deployed between the PCF and the IKE gateway is an Nxx interface as an example.
  • the interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example.
  • the interface may also adopt other names, which are not specifically limited in this embodiment of the present application.
  • the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
  • the PCF is used as an example to configure IKE gateways corresponding to different services for the terminal device.
  • the creation is triggered by the terminal device as an example.
  • the PCF configures the IKE gateway for the terminal device.
  • the terminal device first sends the address information of the IKE gateway to the SMF, and the SMF configures the first forwarding rule, and the terminal device initiates the establishment of an IKE SA with the IKE gateway.
  • the PCF configures the terminal device with address information of the IKE gateway serving different services of the terminal device.
  • the PCF configures a security policy for the terminal device, and the security policy includes address information of IKE gateways of different services.
  • Security policies can also include security levels for different network slices or sessions or data networks. For example, different security levels can correspond to different IKE gateways.
  • the PCF may configure the terminal device with address information of IKE gateways serving different services of the terminal device in a user configuration update (user configuration update) process. For example, different services of terminal equipment can be indicated by DNN.
  • the PCF can carry the security policy in the user equipment routing selection policy (URSP) and configure it to the terminal device, that is, the PCF can carry the address information of the IKE gateway corresponding to each DNN in the URSP and configure it to the terminal device.
  • URSP user equipment routing selection policy
  • a PDU session establishment process of the terminal device a PDU session establishment process of the terminal device.
  • the following steps 2104-2114 may be included in the PDU session establishment process.
  • the terminal device sends a PDU session establishment request (PDU session establishment request) to the AMF, where the PDU session establishment request includes address information of the IKE gateway.
  • PDU session establishment request includes address information of the IKE gateway.
  • the AMF forwards the PDU session establishment request to the SMF.
  • the AMF may forward the PDU session establishment request to the SMF through the SMF serviced interface message.
  • the SMF serviced interface message may be Nsmf_PDUSession_CreatSMContext Response.
  • the PCF when configuring the URSP, the PCF sends the address information of the IKE gateway that can provide services to the terminal device to the terminal device, so that the terminal device can select the IKE gateway according to the current service.
  • Terminal devices do not need to use control plane signaling to perceive the existence of IPSec gateways.
  • End devices only interact with the centralized IKE gateway to establish IPsec SA connections.
  • the IPSec gateway changes subsequently the update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead.
  • every time the IPSec gateway changes there is no need to establish an IKE SA connection, which reduces signaling overhead.
  • the PCF configures the terminal device with an IKE gateway capable of providing services for the terminal device in the URSP rule.
  • the terminal device selects an IKE gateway from the IKE gateways configured by the PCF according to the currently processed service, and notifies the SMF of the address information of the IKE gateway.
  • the SMF configures the first forwarding rule of the UPF, instructing the UPF to forward the data packets of the terminal device to the IKE gateway.
  • the terminal device can only interact with the IKE gateway.
  • the terminal device initiates the IKE SA connection establishment process according to the address information of the IKE gateway.
  • the IKE gateway selects an IPSec gateway for the terminal device, and instead of the IPSec gateway, establishes an IPSec gateway with the terminal device for transmitting user plane data.
  • IPSec sub-SA connection Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
  • the IKE gateway is centrally deployed to establish an IKE SA with terminal devices, and is responsible for managing the generation and distribution of keys.
  • the IPsec gateways used for user plane data transmission are deployed in a distributed manner, and are used to establish user plane SAs with terminal devices, encrypt data, and protect integrity.
  • the sub-SA of the distributed IPsec gateway is established by the centralized IKE gateway, and the local configuration context and forwarding rules are configured by the IKE gateway.
  • the established IPsec sub-SA connection mode may be the transmission mode
  • the centralized IKE gateway may establish the transmission mode IPsec sub-SA for the distributed IPSec gateway, and the data packets belonging to the IPsec sub-SA will pass through the IPsec sub-SA.
  • IPSec gateway for forwarding.
  • the forwarding rule of the IPSec sub-SA and the configuration context of the IPsec sub-SA can be configured for the IPsec gateway when the session is established.
  • the UE establishes an IKE SA1 with the centralized IKE gateway.
  • the terminal device When the terminal device needs to conduct services through the IPsec gateway 2, the terminal device can interact with the IKE gateway to establish an IPsec SA2 for communication with the IPsec gateway 2, and the IKE gateway communicates with the IPsec gateway. To configure, configure the configuration context of IPSEC SA2 to IPsec Gateway 2.
  • the solution provided by the embodiments of the present application effectively solves the problem of the application server switching of the terminal device. During the IPsec gateway switching process, the terminal device does not perceive the IPsec gateway and does not need to establish an IKE SA with the IPsec gateway.
  • the communication device 2400 can correspondingly implement the first security gateway (or IKE gateway), the second security gateway in the above method embodiments, and the second security gateway.
  • the communication device may include a transceiver module 2401 and a processing module 2402 .
  • a storage module may also be included, and the storage module may be used to store instructions (codes or programs) and/or data.
  • the transceiver module 2401 and the processing module 2402 may be coupled with the storage module, for example, the processing module 2402 may read instructions (codes or programs) and/or data in the storage module to implement corresponding methods.
  • the processing module 2402 may read instructions (codes or programs) and/or data in the storage module to implement corresponding methods.
  • Each of the above modules can be set independently, and can also be partially or fully integrated.
  • the transceiver module 2401 may include a sending module and a receiving module, the sending module is configured to perform a sending operation, and the receiving module is configured to perform a receiving operation.
  • the processing module 2402 can be a processor or a controller, such as a general-purpose central processing unit (CPU), general-purpose processor, digital signal processing (DSP), application-specific integrated circuit (application specific integrated circuit) integrated circuits, ASIC), field programmable gate array (FPGA), or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and the like.
  • the transceiver module 2401 is an interface circuit of the device for receiving signals from other devices. For example, when the device is implemented in the form of a chip, the transceiver module 2401 is an interface circuit used by the chip to receive signals from other chips or devices, or an interface circuit used by the chip to send signals to other chips or devices.
  • the communication apparatus 2400 may be the first security gateway (or IKE gateway), the second security gateway (IPsec gateway), the first core network element, the policy control network element, and the terminal device in the above-mentioned embodiment, or may be the first security gateway (or IKE gateway) in the above-mentioned embodiment.
  • the processing module 2402 may be, for example, a processing
  • the transceiver module 2401 may be, for example, a transceiver.
  • the transceiver may include a radio frequency circuit or an input/output interface, and the storage unit may be, for example, a memory.
  • the processing module 2402 when the communication device 2400 is a chip used for the first security gateway (or IKE gateway), the second security gateway (IPsec gateway), the first core network element, the policy control network element, and the terminal device, the processing module 2402
  • it may be a processor, and the transceiver module 2401 may be, for example, an input/output interface, a pin, or a circuit.
  • the processing module 2402 can execute computer-executed instructions stored in a storage unit.
  • the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit can also be the first security gateway (or the IKE gateway).
  • the second security gateway IPsec gateway
  • the first core network element the policy control network element or a storage unit located outside the chip in the terminal device, such as a read-only memory (ROM) or a storage unit that can store Other types of static storage devices for static information and instructions, random access memory (RAM), etc.
  • ROM read-only memory
  • RAM random access memory
  • the communication apparatus 2400 can correspondingly implement the behaviors and functions of the first security gateway (or IKE gateway) in the foregoing method embodiments.
  • the communication apparatus 2400 may be a first security gateway (or an IKE gateway), or may be a component (eg, a chip or a circuit) applied in the first security gateway (or an IKE gateway).
  • the transceiver module 2401 can be used to support the communication between the first security gateway (or IKE gateway) and other network entities, for example, supporting the communication between the first security gateway (or IKE gateway) and FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , Communication among the second security gateway, terminal device, AMF, SMF, etc.
  • the processing module 2402 is configured to control and manage the actions of the first security gateway (or the IKE gateway).
  • the processing module 2402 is configured to support the first security gateway (or the IKE gateway) to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , The operations of the first security gateway (or the IKE gateway) in Fig. 13, Fig. 15, Fig. 18, and Fig. 21 except for sending and receiving.
  • the processing module 2402 is configured to establish an Internet Key Security Protocol IKE SA connection with the terminal device through the transceiver module 2401; the processing module 2402 is further configured to determine that the terminal device needs to pass the second When the security gateway performs secure transmission of user plane data, an Internet Protocol security protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for the communication between the second security gateway and the terminal device. Secure transmission of user plane data.
  • the communication apparatus 2400 can correspondingly implement the behaviors and functions of the first core network network element (or SMF) in the foregoing method embodiments.
  • the communication apparatus 2400 may be a first core network element (or SMF), or may be a component (eg, a chip or circuit) applied in the first core network element (or SMF).
  • the transceiver module 2401 can be used to support the communication between the first core network element (or SMF) and other network entities, for example, support the first core network element (or SMF) to communicate with FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , and FIG. 13. Communication between AMF, UPF, first security gateway (IKE gateway), terminal equipment, etc. shown in FIG.
  • the processing module 2402 is used to control and manage the actions of the first core network element (or SMF), for example, the processing module 2402 is used to support the first core network element (or SMF) to execute FIG. 10 , FIG. 11A , FIG. 11B , and FIG. Operations of the first core network element (or SMF) in 11C, FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21 except for sending and receiving.
  • the processing module 2402 is configured to determine a first security gateway that provides security services for the terminal device, where the first security gateway is configured to establish an Internet Key Security Protocol IKE Security Association SA connection with the terminal device;
  • the transceiver module 2401 is configured to configure a first forwarding rule for the user plane network element, where the first forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IKE SA connection to the first security gateway; the transceiver module 2401 , and is also used for the processing module to configure a second forwarding rule to the user plane network element after the establishment of the IPsec sub-SA connection between the terminal device and the second security gateway is completed, and the second forwarding rule It is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
  • the communication apparatus 2400 can correspondingly implement the behaviors and functions of the second security gateway (IPsec gateway) in the foregoing method embodiments.
  • the communication apparatus 2400 may be a second security gateway (IPsec gateway), or may be a component (eg, a chip or a circuit) applied in the second security gateway (IPsec gateway).
  • the transceiver module 2401 can be used to support the communication between the second security gateway (IPsec gateway) and other network entities, for example, supporting the communication between the second security gateway (IPsec gateway) and FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , and FIG. 15 , the communication between the first security gateway, UPF, terminal equipment, etc. shown in FIG.
  • the processing module 2402 is used to control and manage the actions of the second security gateway (IPsec gateway).
  • IPsec gateway the processing module 2402 is used to support the second security gateway (IPsec gateway) to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , and FIG. 13 , Figure 15, Figure 18, Figure 21 in the second security gateway (IPsec gateway) operations other than sending and receiving.
  • the communication apparatus 2400 can correspondingly implement the behaviors and functions of the terminal equipment in the foregoing method embodiments.
  • the communication apparatus 2400 may be a terminal device, or may be a component (eg, a chip or a circuit) applied in the terminal device.
  • the transceiver module 2401 can be used to support the communication between the terminal device and other network entities, for example, to support the terminal device to communicate with the AMF shown in FIG. 10, FIG. 11A, FIG. 11B, FIG. - Communication between security gateways, user plane network elements, etc.
  • the processing module 2402 is used to control and manage the actions of the terminal equipment.
  • the processing module 2402 is used to support the terminal equipment to execute the terminal equipment shown in Figure 10, Figure 11A, Figure 11B, Figure 11C, Figure 13, Figure 15, Figure 18, and Figure 21. All operations except sending and receiving.
  • FIG. 25 shows a communication device 2500 provided in this embodiment of the present application, where the communication device 2500 may be a first security gateway (IKE gateway), which can implement the first security gateway (IKE gateway) in the method provided in this embodiment of the present application function of the first core network element (SMF), or the communication apparatus 2500 may be the first core network element (SMF), which can implement the function of the first core network element (SMF) in the method provided in the embodiments of this application; or, the communication apparatus 2500 may be the first core network element (SMF) Two security gateways (IPsec gateways), which can implement the functions of the second security gateways (IPsec gateways) in the methods provided in the embodiments of the present application; or, the communication apparatus 2500 may be a terminal device, which can implement the terminal devices in the methods provided in the embodiments of the present application.
  • IKE gateway first security gateway
  • IKE gateway first security gateway
  • the communication apparatus 2500 may also be capable of supporting a first security gateway (IKE gateway), a first core network element (SMF), a second security gateway (IPsec gateway), or a terminal device to implement the embodiments of the present application.
  • IKE gateway first security gateway
  • SMSF first core network element
  • IPsec gateway second security gateway
  • the communication apparatus 2500 may be a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the above-mentioned transceiver module 2401 may be a transceiver, and the transceiver is integrated in the communication device 2500 to form a communication interface 2503 .
  • the communication device 2500 includes at least one processor 2502, and the processor 2502 may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the programs of the present application, for implementing or supporting the communication device 2500 implements the functions of the first security gateway (IKE gateway) or the first core network element (SMF) or the second security gateway (IPsec gateway) or the terminal device in the method provided by the embodiment of the present application.
  • IKE gateway first security gateway
  • SMF first core network element
  • IPsec gateway the second security gateway
  • the communication apparatus 2500 may also include at least one memory 2501 for storing program instructions and/or data.
  • Memory 2501 and processor 2502 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 2502 may cooperate with the memory 2501.
  • the processor 2502 may execute program instructions and/or data stored in the memory 2501 to cause the communication device 2500 to implement the corresponding method.
  • At least one of the at least one memory may be included in the processor 2502.
  • the communication device 2500 may also include a communication interface 2503, using any transceiver-like device, for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area network (wireless local area network) area networks, WLAN), wired access networks, etc.
  • the communication interface 2503 is used to communicate with other devices through a transmission medium, so that the devices used in the communication device 2500 can communicate with other devices.
  • the processor 2502 can use the communication interface 2503 to send and receive data.
  • the communication interface 2503 may specifically be a transceiver.
  • the specific connection medium between the communication interface 2503 , the processor 2502 , and the memory 2501 is not limited in the embodiments of the present application.
  • the memory 2501, the processor 2502, and the communication interface 2503 are connected by a bus 2504 in FIG. 25.
  • the bus is represented by a thick line in FIG. 25.
  • the connection between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is shown in FIG. 25, but it does not mean that there is only one bus or one type of bus.
  • the processor 2502 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can realize Alternatively, each method, step, and logic block diagram disclosed in the embodiments of the present application are executed.
  • a general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the memory 2501 can be a ROM or other types of static storage devices that can store static information and instructions, a RAM or other types of dynamic storage devices that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory).
  • read-only memory EEPROM
  • compact disc read-only memory CD-ROM
  • optical disc storage including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.
  • magnetic disk A storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, without limitation.
  • the memory may exist independently and be connected to the processor through communication line 2504. The memory can also be integrated with the processor.
  • the memory 2501 is used for storing computer-executed instructions for executing the solution of the present application, and the execution is controlled by the processor 2502 .
  • the processor 2502 is configured to execute the computer-executed instructions stored in the memory 2501, thereby implementing the service management method provided by the foregoing embodiments of the present application.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application code, which is not specifically limited in the embodiments of the present application.
  • Embodiments of the present application further provide a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG.
  • FIG. 21 the method performed by the first security gateway (IKE gateway) or the first core network element (SMF) or the second security gateway (IPsec gateway) or the terminal device.
  • Embodiments of the present application further provide a computer program product, including instructions, which, when run on a computer, cause the computer to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21
  • a first security gateway IKE gateway
  • a first core network element SMF
  • IPsec gateway IPsec gateway
  • An embodiment of the present application provides a chip system, where the chip system includes a processor and may also include a memory, for implementing the aforementioned FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • At least one item (single, species) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple.
  • “Plurality” means two or more, and other quantifiers are similar.
  • occurrences of the singular forms "a”, “an” and “the” do not mean “one or only one” unless the context clearly dictates otherwise, but rather “one or more” in one".
  • "a device” means to one or more such devices.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that a computer can access, or a data storage device such as a server, a data center, or the like that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
  • a general-purpose processor may be a microprocessor, or alternatively, the general-purpose processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors in combination with a digital signal processor core, or any other similar configuration. accomplish.
  • a software unit may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art.
  • a storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium.
  • the storage medium can also be integrated into the processor.
  • the processor and storage medium may be provided in the ASIC.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application discloses a communication method and apparatus, used for solving the problem of switching process complexity. A first security gateway is used for establishing an IKE SA with a terminal device. A second security gateway used for user plane data transmission is used for establishing a user plane sub-SA with the terminal device, encrypting data, and for integrity protection. An IPsec sub-SA of the second security gateway is established by the first security gateway. In this way, when needing to switch application servers, the terminal device does not need to establish an IKE SA with the second security gateway after switching, thereby simplifying the switching process, and reducing switching complexity. Moreover, the terminal device does not need to perceive the presence of the second security gateway, and only interacts with the first security gateway.

Description

一种通信方法及装置A communication method and device 技术领域technical field
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。The present application relates to the field of communication technologies, and in particular, to a communication method and apparatus.
背景技术Background technique
移动边缘计算(mobile edge computing,MEC)是基于第五代(5rd generation,5G)系统的演进架构,将接入网与互联网业务深度融合的一种技术。Mobile edge computing (MEC) is a technology that deeply integrates access network and Internet services based on the evolution architecture of the fifth generation (5rd generation, 5G) system.
目前,MEC场景下,为了保障用户面数据传输的安全需求,在中央用户面功能或者上行分类器(uplinkclassifier,ULCL)与应用服务器之间部署安全网关。在终端设备与安全网关之间创建因特网秘钥交换协议(internet key exchange protocol,IKE)安全联盟(security association,SA)和互联网安全协议(internet protocol security,IPsec)SA。但是由于终端设备业务的变化,导致应用服务器发生变化,从而导致需要切换ULCL和安全网关。进一步终端设备需要与切换的安全网关重新建立IKE SA和IPsec SA,使得切换流程较复杂。Currently, in the MEC scenario, in order to ensure the security requirements of user plane data transmission, a security gateway is deployed between a central user plane function or an uplink classifier (ULCL) and an application server. The Internet Key Exchange Protocol (IKE) Security Association (SA) and the Internet Protocol Security (IPsec) SA are created between the terminal device and the security gateway. However, due to the change of the terminal device service, the application server changes, so that the ULCL and the security gateway need to be switched. Further, the terminal device needs to re-establish IKE SA and IPsec SA with the switched security gateway, which makes the switching process more complicated.
发明内容SUMMARY OF THE INVENTION
本申请提供一种通信方法及装置,用于解决切换流程复杂的问题。The present application provides a communication method and device, which are used to solve the problem of complicated handover procedures.
第一方面,本申请实施例提供一种通信方法,该方法可以由第一安全网关或者第一安全网关中的芯片或者芯片系统实现。通信方法包括:第一安全网关与终端设备建立因特网密钥安全协议IKE安全联盟SA连接;所述第一安全网关在确定所述终端设备需要通过第二安全网关进行用户面数据的安全传输时,为所述第二安全网关建立因特网协议安全协议IPsec子SA连接;所述IPsec子SA连接用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。In a first aspect, an embodiment of the present application provides a communication method, and the method may be implemented by a first security gateway or a chip or a chip system in the first security gateway. The communication method includes: a first security gateway establishes an Internet Key Security Protocol IKE Security Association SA connection with a terminal device; when the first security gateway determines that the terminal device needs to perform secure transmission of user plane data through the second security gateway, An Internet Protocol Security Protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
本申请提供的方案中,第一安全网关,用于与终端设备之间进行IKE SA的建立。而用于用户面数据传输的第二安全网关用于与终端设备进行用户面子SA的建立和数据的加密以及完整性保护。第二安全网关的IPsec子SA由第一安全网关代为建立。从而在终端设备在需要切换应用服务器时,无需与切换后的第二安全网关建立IKE SA,减少切换流程,降低切换复杂度。并且终端设备并不需要感知第二安全网关的存在,仅与第一安全网关进行交互,因此终端设备无需感知ULCL的插入和应用服务器的改变,也能实现安全网关的切换。In the solution provided by this application, the first security gateway is used to establish the IKE SA with the terminal device. The second security gateway used for user plane data transmission is used for establishing a user plane SA with the terminal device, encrypting data and protecting integrity. The IPsec sub-SA of the second security gateway is established on behalf of the first security gateway. Therefore, when the terminal device needs to switch the application server, there is no need to establish an IKE SA with the switched second security gateway, which reduces the switching process and reduces the switching complexity. In addition, the terminal device does not need to perceive the existence of the second security gateway, and only interacts with the first security gateway. Therefore, the terminal device does not need to perceive the insertion of the ULCL and the change of the application server, and the switching of the security gateway can also be realized.
在一种可能的设计中,所述为所述第二安全网关建立IPsec子SA连接,包括:所述第一安全网关与所述终端设备之间进行IPsec子SA连接的协商得到第一安全参数;所述第一安全网关将所述第一安全参数配置给所述第二安全网关;其中,所述第一安全参数用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。In a possible design, establishing an IPsec sub-SA connection for the second security gateway includes: negotiating an IPsec sub-SA connection between the first security gateway and the terminal device to obtain a first security parameter ; the first security gateway configures the first security parameter to the second security gateway; wherein, the first security parameter is used for user plane data between the second security gateway and the terminal device secure transmission.
通过上述设计,由第一安全网关代替第二安全网关与终端设备建立用于传输用户面数据的IPSec子SA连接,然后将建立的IPSec子SA连接的安全参数配置给第二安全网关即可。终端设备不需要通过控制面信令,来感知第二安全网关的存在。终端设备只与第一安全网关进行交互来建立IPsec子SA连接。后续当第二安全网关发生改变(如ULCL插入的MEC场景)时,也可以不需要额外的控制面信令开销即能完成IPSec子SA连接的更 新和建立。另外,在每次第二网关发生改变时,无需再建立IKE SA连接,减少信令开销。Through the above design, the first security gateway replaces the second security gateway to establish an IPSec sub-SA connection with the terminal device for transmitting user plane data, and then configure the security parameters of the established IPSec sub-SA connection to the second security gateway. The terminal device does not need to sense the existence of the second security gateway through control plane signaling. The terminal device only interacts with the first security gateway to establish an IPsec sub-SA connection. Subsequently, when the second security gateway is changed (such as the MEC scenario of ULCL insertion), the update and establishment of the IPSec sub-SA connection can also be completed without additional control plane signaling overhead. In addition, every time the second gateway changes, there is no need to establish an IKE SA connection, which reduces signaling overhead.
在一种可能的设计中,所述第一安全参数包括用于生成与所述终端设备之间进行用户面数据传输的密钥的材料。上述设计中,第一安全网关将用于生成与所述终端设备之间进行用户面数据传输的密钥的材料配置给第二安全网关,从而第二安全网关能够根据密钥与终端设备之间用户面数据的安全传输。In a possible design, the first security parameter includes material for generating a key for user plane data transmission with the terminal device. In the above design, the first security gateway configures the second security gateway with the material for generating the key for user plane data transmission with the terminal device, so that the second security gateway can communicate with the terminal device according to the key. Secure transmission of user plane data.
在一种可能的设计,所述用于生成与所述终端设备之间进行用户面数据传输的密钥的材料包括如下一项或者多项:In a possible design, the material for generating a key for user plane data transmission with the terminal device includes one or more of the following:
第一安全网关生成的密钥材料、所述终端设备的密钥交换材料、为所述第二安全网关配置的密钥交换材料、所述终端设备的随机数或者为所述第二安全网关生成的随机数。key material generated by the first security gateway, key exchange material of the terminal device, key exchange material configured for the second security gateway, random numbers of the terminal device or generated for the second security gateway of random numbers.
在一种可能的设计,所述第一安全参数还包括如下一项或者多项:所述终端设备的加密算法,为所述第二安全网关分配的加密算法,用于所述终端设备与所述第二安全网关之间进行用户面数据传输的数据包过滤规则。In a possible design, the first security parameter further includes one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, used for the terminal device to communicate with all Describe the packet filtering rules for user plane data transmission between the second security gateways.
在一种可能的设计,所述第一安全网关为所述第二安全网关建立因特网协议安全协议IPsec子SA,包括:所述第一安全网关接收终端设备发起的建立请求,所述建立请求用于请求与所述第二安全网关建立因特网协议安全协议IPsec子SA连接;所述第一安全网关向所述第二安全网关发送IPsec子SA连接的配置上下文,所述配置上下文中包括为所述第二安全网关配置的用于与终端设备建立IPsec子SA连接的第二安全参数;所述第一安全网关接收来自第二安全网关的第三安全参数,所述第三安全参数是所述第二安全网关对所述第二安全参数进行更新或者确认得到的;所述第一安全网关向终端设备发送建立响应,所述建立响应中包括所述第三安全参数;其中,所述第三安全参数用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。In a possible design, the first security gateway establishing an Internet Protocol Security Protocol (IPsec) sub-SA for the second security gateway includes: the first security gateway receives a setup request initiated by a terminal device, and the setup request uses upon requesting to establish an Internet Protocol Security Protocol IPsec sub-SA connection with the second security gateway; the first security gateway sends a configuration context of the IPsec sub-SA connection to the second security gateway, and the configuration context includes the configuration context for the The second security parameter configured by the second security gateway for establishing an IPsec sub-SA connection with the terminal device; the first security gateway receives the third security parameter from the second security gateway, and the third security parameter is the first security parameter. The second security gateway updates or confirms the second security parameter; the first security gateway sends an establishment response to the terminal device, and the establishment response includes the third security parameter; wherein the third security The parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
通过上述设计,第一安全网关代替第二安全网关与终端设备交互,并且第二安全网关对第一安全网关配置的第二安全参数进行更新或者确认。进而第二安全网关发生切换时,也无需重新进行IKE SA的建立,减少信令交互流程。Through the above design, the first security gateway interacts with the terminal device instead of the second security gateway, and the second security gateway updates or confirms the second security parameter configured by the first security gateway. Furthermore, when the second security gateway switches, there is no need to re-establish the IKE SA, which reduces the signaling interaction process.
在一种可能的设计中,所述第二安全参数包括用于所述第二安全网关生成与所述终端设备之间进行用户面数据传输的密钥的材料。In a possible design, the second security parameter includes material for the second security gateway to generate a key for user plane data transmission between the second security gateway and the terminal device.
在一种可能的设计中,所述用于生成与所述终端设备之间进行用户面数据传输的密钥的材料包括如下一项或者多项:所述第一安全网关生成的密钥材料、所述终端设备的密钥交换材料、所述第一安全网关的第一密钥交换材料、所述终端设备使用的第一随机数或者所述第一安全网关使用的第二随机数。In a possible design, the material for generating the key for user plane data transmission with the terminal device includes one or more of the following: the key material generated by the first security gateway, The key exchange material of the terminal device, the first key exchange material of the first security gateway, the first random number used by the terminal device, or the second random number used by the first security gateway.
在一种可能的设计中,所述第三安全参数包括如下一项或者多项:对所述第一密钥交换材料进行更新的第二密钥交换材料、对所述第一随机数进行更新的第三随机数。In a possible design, the third security parameter includes one or more of the following: a second key exchange material for updating the first key exchange material, and a second key exchange material for updating the first random number the third random number.
通过上述设计,第一安全网关代替第二安全网关与终端设备交互,并且第二安全网关对第一安全网关配置的密钥交换材料或者随机数进行更新,以提高生成的密钥的安全性。Through the above design, the first security gateway interacts with the terminal device instead of the second security gateway, and the second security gateway updates the key exchange material or random number configured by the first security gateway to improve the security of the generated key.
在一种可能的设计中,所述第二安全参数还包括如下一项或者多项:终端设备的加密算法、为所述第二安全网关分配的加密算法或者用于所述终端设备与所述第二安全网关之间进行用户面数据传输的第一数据包过滤规则。In a possible design, the second security parameter further includes one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, or an encryption algorithm for the terminal device to communicate with the The first packet filtering rule for user plane data transmission between the second security gateways.
在一种可能的设计中,所述第三安全参数还包括对所述第一数据包过滤规则进行更新的第二数据包过滤规则。In a possible design, the third security parameter further includes a second data packet filtering rule for updating the first data packet filtering rule.
在一种可能的设计中,所述第三安全参数还包括所述第二安全网关选择的加密算法。In a possible design, the third security parameter further includes an encryption algorithm selected by the second security gateway.
第二方面,本申请实施例提供一种通信方法,包括:第一核心网网元确定为终端设备提供安全服务的第一安全网关,所述第一安全网关用于与终端设备之间建立因特网密钥安全协议IKE安全联盟SA连接;所述第一核心网网元向用户面网元配置第一转发规则,所述第一转发规则用于指示用户面网元将属于IKE SA连接的数据包转发给所述第一安全网关;所述第一核心网网元在确定终端设备与第二安全网关之间完成因特网协议安全协议IPsec子SA连接的建立后,向所述用户面网元配置第二转发规则,所述第二转发规则用于指示用户面网元将属于所述IPsec子SA连接的数据包转发给所述第二安全网关。In a second aspect, an embodiment of the present application provides a communication method, including: a first core network network element determining a first security gateway that provides security services for a terminal device, where the first security gateway is used to establish an Internet connection with the terminal device The key security protocol IKE SA is connected to the SA connection; the first core network element configures the user plane network element with a first forwarding rule, and the first forwarding rule is used to instruct the user plane network element to belong to the data packet of the IKE SA connection Forwarding to the first security gateway; after determining that the Internet Protocol Security Protocol IPsec sub-SA connection is established between the terminal device and the second security gateway, the first core network element configures the user plane network element with the first Two forwarding rules, where the second forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
上述方案,由第一核心网网元为用户面网元配置第一转发规则,以实现属于IKE SA连接的数据包经过第一安全网关进行安全保护。在建立IPsec子SA连接时,为用户面网元配置第二转发规则,是实现用户面数据经过第二安全网关进行安全保护。In the above solution, the first core network element configures the first forwarding rule for the user plane network element, so as to realize the security protection of the data packets belonging to the IKE SA connection through the first security gateway. When the IPsec sub-SA connection is established, the second forwarding rule is configured for the user plane network element, so as to realize the security protection of the user plane data through the second security gateway.
在一种可能的设计中,第一核心网网元确定为终端设备提供安全服务的第一安全网关,包括:所述第一核心网网元根据所述终端设备的签约数据确定为所述终端设备提供安全服务的第一安全网关;或者,所述第一核心网网元根据本地配置信息确定为所述终端设备提供安全服务的第一安全网关;或者,所述第一核心网网元接收来自第二核心网网元的第一安全网关的地址信息,根据所述第一安全网关的地址信息确定为所述终端设备提供安全服务的第一安全网关;或者,所述第一核心网网元接收来自终端设备的第一安全网关的地址信息,所述第一安全网关为策略控制网元为所述终端设备配置的至少一个安全网关中的一个。In a possible design, the first core network element determining the first security gateway that provides security services for the terminal device includes: determining, by the first core network element, as the terminal according to the subscription data of the terminal device the first security gateway that provides security services for the device; or, the first core network element determines the first security gateway that provides security services for the terminal device according to local configuration information; or, the first core network element receives address information of the first security gateway from the network element of the second core network, and determine the first security gateway that provides security services for the terminal device according to the address information of the first security gateway; or, the first core network network The element receives address information from a first security gateway of a terminal device, where the first security gateway is one of at least one security gateway configured by a policy control network element for the terminal device.
上述设计中,提供几种可能确定第一安全网关的方式,比如由第一核心网网元为终端设备选择第一安全网关或者由第二核心网网元为终端设备选择第一安全网关,又或者可以由策略控制网元将能够为终端设备服务的至少一个安全网关的地址发送给终端设备,由终端设备从至少一个安全网关中选择第一安全网关。In the above design, several possible ways to determine the first security gateway are provided, such as selecting the first security gateway for the terminal device by the first core network element or selecting the first security gateway for the terminal device by the second core network element, and Alternatively, the policy control network element may send the address of at least one security gateway capable of serving the terminal device to the terminal device, and the terminal device selects the first security gateway from the at least one security gateway.
在一种可能的设计,所述第一核心网网元为会话管理网元,所述第二核心网网元为移动性管理网元。In a possible design, the first core network element is a session management network element, and the second core network element is a mobility management network element.
在一种可能的设计中,所述方法还包括:所述第一核心网网元将确定的第一安全网关的地址信息发送给所述终端设备,所述第一安全网关的地址信息用于所述终端设备触发建立IKE SA连接。上述设计提供一种触发创建IKE SA的方式,简单易实现。In a possible design, the method further includes: the first core network element sends the determined address information of the first security gateway to the terminal device, where the address information of the first security gateway is used for The terminal device triggers the establishment of an IKE SA connection. The above design provides a way to trigger the creation of an IKE SA, which is simple and easy to implement.
在一种可能的设计中,所述方法还包括:所述第一核心网网元将所述终端设备的地址信息发送给第一安全网关,所述终端设备的地址信息用于所述第一安全网关触发建立IKE SA连接。上述设计提供一种触发创建IKE SA的方式,简单易实现。In a possible design, the method further includes: sending, by the first core network element, the address information of the terminal device to the first security gateway, where the address information of the terminal device is used for the first security gateway. The security gateway triggers the establishment of an IKE SA connection. The above design provides a way to trigger the creation of an IKE SA, which is simple and easy to implement.
第三方面,本申请实施例提供一种通信方法,应用于终端设备或者终端设备的芯片或者芯片系统。终端设备接收来自第一核心网网元的第一安全网关的地址信息,根据地址信息向第一安全网关触发IKE SA的建立。在完成所述IKE SA的建立后,向第一安全网关触发用于建立IPsec子SA的请求消息。请求消息中携带第二安全网关的地址段。In a third aspect, an embodiment of the present application provides a communication method, which is applied to a terminal device or a chip or a chip system of the terminal device. The terminal device receives the address information of the first security gateway from the network element of the first core network, and triggers the establishment of the IKE SA to the first security gateway according to the address information. After completing the establishment of the IKE SA, a request message for establishing an IPsec sub-SA is triggered to the first security gateway. The request message carries the address segment of the second security gateway.
终端设备接收来自策略控制网元的至少一个安全网关的地址信息,向第一安全网关触发IKE SA的建立。第一安全网关为至少一个安全网关的地址信息指示的安全网关中的一个。在完成所述IKE SA的建立后,向第一安全网关触发用于建立IPsec子SA的请求消息。请求消息中携带第二安全网关的地址段。The terminal device receives the address information of at least one security gateway from the policy control network element, and triggers the establishment of the IKE SA to the first security gateway. The first security gateway is one of the security gateways indicated by the address information of the at least one security gateway. After completing the establishment of the IKE SA, a request message for establishing an IPsec sub-SA is triggered to the first security gateway. The request message carries the address segment of the second security gateway.
第四方面,提供了一种通信装置,例如该通信装置为如前所述的第一安全网关。该通信装置具有实现上述第一方面方法实施例中的行为的功能。所述功能可以通过硬件实现, 也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置例如包括相互耦合的收发模块和处理模块。In a fourth aspect, a communication device is provided, for example, the communication device is the aforementioned first security gateway. The communication device has the function of implementing the behavior in the method embodiment of the first aspect. The functions can be implemented by hardware, and can also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the communication device includes, for example, a transceiver module and a processing module coupled with each other.
处理模块,用于通过收发模块与终端设备建立因特网密钥安全协议IKE安全联盟SA连接;所述处理模块,还用于在确定所述终端设备需要通过第二安全网关进行用户面数据的安全传输时,为所述第二安全网关建立因特网协议安全协议IPsec子SA连接;所述IPsec子SA连接用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。The processing module is used for establishing an Internet Key Security Protocol IKE Security Alliance SA connection with the terminal device through the transceiver module; the processing module is also used for determining that the terminal device needs to perform secure transmission of user plane data through the second security gateway At the time, an Internet Protocol security protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
这些模块可以执行上述第一方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不再赘述。These modules can perform the corresponding functions in the method examples of the first aspect. For details, please refer to the detailed descriptions in the method examples, which will not be repeated here.
第五方面,本申请提供一种通信装置,例如该通信装置为如前所述的第一核心网网元。该通信装置具有实现上述第二方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置例如包括相互耦合的处理模块和收发模块。处理模块,用于确定为终端设备提供安全服务的第一安全网关,所述第一安全网关用于与终端设备之间建立因特网密钥安全协议IKE安全联盟SA连接;收发模块,用于向用户面网元配置第一转发规则,所述第一转发规则用于指示用户面网元将属于IKE SA连接的数据包转发给所述第一安全网关;收发模块,还用于所述处理模块确定终端设备与第二安全网关之间完成因特网协议安全协议IPsec子SA连接的建立后,向所述用户面网元配置第二转发规则,所述第二转发规则用于指示用户面网元将属于所述IPsec子SA连接的数据包转发给所述第二安全网关。In a fifth aspect, the present application provides a communication device, for example, the communication device is the network element of the first core network as described above. The communication device has the function of implementing the behavior in the method embodiment of the second aspect. The functions can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the communication device includes, for example, a processing module and a transceiver module coupled with each other. The processing module is used to determine the first security gateway that provides security services for the terminal device, and the first security gateway is used to establish an Internet Key Security Protocol IKE Security Association SA connection with the terminal device; The plane network element configures a first forwarding rule, and the first forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IKE SA connection to the first security gateway; the transceiver module is also used for the processing module to determine After the establishment of the IPsec sub-SA connection between the terminal device and the second security gateway is completed, a second forwarding rule is configured to the user plane network element, and the second forwarding rule is used to indicate that the user plane network element will belong to the user plane network element. The data packets connected by the IPsec sub-SA are forwarded to the second security gateway.
这些模块可以执行上述第二方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不再赘述。These modules can perform the corresponding functions in the method examples of the second aspect. For details, please refer to the detailed descriptions in the method examples, which will not be repeated here.
第六方面,提供了一种通信装置,例如该通信装置为如前所述的终端设备。该通信装置具有实现上述第五方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置例如包括相互耦合的收发模块和处理模块。例如,收发模块,用于接收来自第一核心网网元的第一安全网关的地址信息,所述处理模块用于根据地址信息向第一安全网关触发IKE SA的建立。在完成所述IKE SA的建立后,所述收发模块用于向第一安全网关触发用于建立IPsec子SA的请求消息。请求消息中携带第二安全网关的地址段。再例如,收发模块,用于接收来自策略控制网元的至少一个安全网关的地址信息,处理模块用于向第一安全网关触发IKE SA的建立。第一安全网关为至少一个安全网关的地址信息指示的安全网关中的一个。收发模块,还用于在完成所述IKE SA的建立后,向第一安全网关触发用于建立IPsec子SA的请求消息。请求消息中携带第二安全网关的地址段。In a sixth aspect, a communication apparatus is provided, for example, the communication apparatus is the aforementioned terminal equipment. The communication device has the function of implementing the behavior in the method embodiment of the fifth aspect. The functions can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the communication device includes, for example, a transceiver module and a processing module coupled with each other. For example, the transceiver module is configured to receive the address information of the first security gateway from the network element of the first core network, and the processing module is configured to trigger the establishment of the IKE SA to the first security gateway according to the address information. After completing the establishment of the IKE SA, the transceiver module is configured to trigger a request message for establishing an IPsec sub-SA to the first security gateway. The request message carries the address segment of the second security gateway. For another example, the transceiver module is configured to receive address information from at least one security gateway of the policy control network element, and the processing module is configured to trigger the establishment of the IKE SA to the first security gateway. The first security gateway is one of the security gateways indicated by the address information of the at least one security gateway. The transceiver module is further configured to trigger a request message for establishing an IPsec sub-SA to the first security gateway after completing the establishment of the IKE SA. The request message carries the address segment of the second security gateway.
第七方面,本申请提供一种通信装置,用于第一安全网关或第一安全网关的芯片,包括至少一个处理元件和至少一个存储元件,其中至少一个存储元件用于存储程序和数据,至少一个处理元件用于执行前述第一方面或第一方面的任意可能的实现方式中的方法。In a seventh aspect, the present application provides a communication device for a first security gateway or a chip of the first security gateway, comprising at least one processing element and at least one storage element, wherein at least one storage element is used for storing programs and data, at least one A processing element is used to perform the method of the aforementioned first aspect or any possible implementation of the first aspect.
第八方面,本申请提供一种通信装置,用于第一核心网网元或第一核心网网元的芯片,包括至少一个处理元件和至少一个存储元件,其中至少一个存储元件用于存储程序和数据,至少一个处理元件用于执行前述第二方面或第二方面的任意可能的实现方式中的方法。In an eighth aspect, the present application provides a communication device for a first core network element or a chip of the first core network element, comprising at least one processing element and at least one storage element, wherein at least one storage element is used to store a program and data, at least one processing element for performing the method of the aforementioned second aspect or any possible implementation of the second aspect.
第九方面,本申请提供一种通信装置,用于终端设备或终端设备的芯片,包括至少一 个处理元件和至少一个存储元件,其中至少一个存储元件用于存储程序和数据,至少一个处理元件用于执行前述第三方面或第三方面的任意可能的实现方式中的方法,或者用于执行前述第五方面中的方法。In a ninth aspect, the present application provides a communication device for terminal equipment or a chip of the terminal equipment, comprising at least one processing element and at least one storage element, wherein at least one storage element is used for storing programs and data, and at least one processing element is used for storing programs and data. for performing the method in the aforementioned third aspect or any possible implementation manner of the third aspect, or for performing the method in the aforementioned fifth aspect.
第十方面,本申请提供一种通信装置,包括处理器和接口电路,接口电路用于接收来自通信装置之外的其它通信装置的信号并传输至处理器或将来自处理器的信号发送给通信装置之外的其它通信装置,处理器通过逻辑电路或执行代码指令用于实现前述第一方面或第一方面的任意可能的实现方式中的方法。In a tenth aspect, the present application provides a communication device, comprising a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to the communication device For other communication devices other than the device, the processor is used to implement the method in the foregoing first aspect or any possible implementation manner of the first aspect through logic circuits or executing code instructions.
第十一方面,本申请提供一种通信装置,包括处理器和接口电路,接口电路用于接收来自通信装置之外的其它通信装置的信号并传输至处理器或将来自处理器的信号发送给通信装置之外的其它通信装置,处理器通过逻辑电路或执行代码指令用于实现前述第二方面或第二方面的任意可能的实现方式中的方法。In an eleventh aspect, the present application provides a communication device, comprising a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to For other communication devices other than the communication device, the processor is used to implement the method in the foregoing second aspect or any possible implementation manner of the second aspect through logic circuits or executing code instructions.
第十二方面,本申请提供一种通信装置,包括处理器和接口电路,接口电路用于接收来自通信装置之外的其它通信装置的信号并传输至处理器或将来自处理器的信号发送给通信装置之外的其它通信装置,处理器通过逻辑电路或执行代码指令用于实现前述第三方面或第三方面的任意可能的实现方式中的方法。In a twelfth aspect, the present application provides a communication device, including a processor and an interface circuit, the interface circuit is configured to receive signals from other communication devices other than the communication device and transmit to the processor or send signals from the processor to For other communication devices other than the communication device, the processor is used to implement the method in the foregoing third aspect or any possible implementation manner of the third aspect through logic circuits or executing code instructions.
第十三方面,本申请提供一种计算机程序产品,该计算机程序产品包括计算机指令,当该计算机指令被执行时,使得前述第一方面或第一方面的任意可能的实现方式中的方法被执行;或者使得前述第二方面或第二方面的任意可能的实现方式中的方法被执行;或者,使得前述第三方面的实现方式中的方法被执行。In a thirteenth aspect, the present application provides a computer program product, the computer program product comprising computer instructions, when the computer instructions are executed, the method in the foregoing first aspect or any possible implementation manner of the first aspect is executed ; or cause the method in the foregoing second aspect or any possible implementation manner of the second aspect to be executed; or cause the method in the foregoing implementation manner of the third aspect to be executed.
第十四方面,本申请提供了一种计算机可读存储介质,该计算机存储介质存储有计算机指令,当计算机指令被执行时,使得前述第一方面或第一方面的任意可能的实现方式中的方法被执行,或使得前述第二方面或第二方面的任意可能的实现方式中的方法被执行,或使得前述第三方面中的方法被执行。In a fourteenth aspect, the present application provides a computer-readable storage medium, where computer instructions are stored in the computer storage medium, and when the computer instructions are executed, make the first aspect or any possible implementation of the first aspect. The method is performed, or causes the method of the aforementioned second aspect or any possible implementation of the second aspect to be performed, or causes the method of the aforementioned third aspect to be performed.
关于上述第三方面-第十四方面的有益效果的介绍,可具体参见上述第一方面-第二方面的记载,此处不再赘述。For the introduction of the beneficial effects of the third aspect to the fourteenth aspect, reference may be made to the description of the first aspect to the second aspect, which will not be repeated here.
附图说明Description of drawings
图1为本申请实施例中一种可能的通信网络架构的示意图;FIG. 1 is a schematic diagram of a possible communication network architecture in an embodiment of the application;
图2A为本申请实施例中另一种可能的通信网络架构的示意图;2A is a schematic diagram of another possible communication network architecture in an embodiment of the present application;
图2B为本申请实施例中又一种可能的通信网络架构的示意图;2B is a schematic diagram of yet another possible communication network architecture in an embodiment of the present application;
图3A为本申请实施例中传输模式的数据包封装示意图;3A is a schematic diagram of data packet encapsulation in a transmission mode in an embodiment of the present application;
图3B为本申请实施例中隧道模式的数据包封装示意图;3B is a schematic diagram of data packet encapsulation in tunnel mode in an embodiment of the present application;
图4为本申请实施例中AF业务流路径流程示意图;FIG. 4 is a schematic flowchart of an AF service flow path in an embodiment of the present application;
图5为本申请实施例中增加ULCL流程示意图;FIG. 5 is a schematic flowchart of adding ULCL in an embodiment of the application;
图6为本申请实施例中AF通知流程示意图;FIG. 6 is a schematic diagram of an AF notification process in an embodiment of the present application;
图7为本申请实施例中IKE SA和IPsec子SA的建立流程示意图;7 is a schematic flowchart of the establishment of an IKE SA and an IPsec sub-SA in the embodiment of the application;
图8为本申请实施例中MEC场景示意图;8 is a schematic diagram of an MEC scenario in an embodiment of the present application;
图9为本申请实施例中又一种通信系统架构示意图;FIG. 9 is a schematic diagram of another communication system architecture in an embodiment of the present application;
图10为本申请实施例中一种通信方法流程示意图;10 is a schematic flowchart of a communication method in an embodiment of the application;
图11A为本申请第一种可能的实施方式的通信方法流程示意图;11A is a schematic flowchart of a communication method according to a first possible implementation manner of the present application;
图11B为本申请第二种可能的实施方式的通信方法流程示意图;11B is a schematic flowchart of a communication method according to a second possible implementation manner of the present application;
图11C为本申请第三种可能的实施方式的通信方法流程示意图;11C is a schematic flowchart of a communication method according to a third possible implementation manner of the present application;
图12为本申请实施例的第一种可能的应用场景架构示意图;FIG. 12 is a schematic diagram of a first possible application scenario architecture of an embodiment of the present application;
图13为本申请实施例的第一种可能的应用场景中一种通信方法流程示意图;13 is a schematic flowchart of a communication method in a first possible application scenario of an embodiment of the present application;
图14为本申请实施例的第一种可能的应用场景中的一种通信方案技术效果示意图;14 is a schematic diagram of a technical effect of a communication solution in a first possible application scenario of an embodiment of the present application;
图15为本申请实施例的第一种可能的应用场景中另一种通信方法流程示意图;15 is a schematic flowchart of another communication method in the first possible application scenario of the embodiment of the present application;
图16为本申请实施例的第一种可能的应用场景中的另一种通信方案技术效果示意图;16 is a schematic diagram of the technical effect of another communication solution in the first possible application scenario of the embodiment of the present application;
图17为本申请实施例的第二种可能的应用场景架构示意图;17 is a schematic diagram of a second possible application scenario architecture of an embodiment of the present application;
图18为本申请实施例的第二种可能的应用场景中一种通信方法流程示意图;18 is a schematic flowchart of a communication method in a second possible application scenario of an embodiment of the present application;
图19为本申请实施例的第二种可能的应用场景中的一种通信方案技术效果示意图;19 is a schematic diagram of a technical effect of a communication solution in a second possible application scenario of an embodiment of the present application;
图20为本申请实施例的第三种可能的应用场景架构示意图;FIG. 20 is a schematic diagram of a third possible application scenario architecture of an embodiment of the present application;
图21为本申请实施例的第三种可能的应用场景中一种通信方法流程示意图;21 is a schematic flowchart of a communication method in a third possible application scenario of an embodiment of the present application;
图22为本申请实施例的第三种可能的应用场景中的一种通信方案技术效果示意图;22 is a schematic diagram of a technical effect of a communication solution in a third possible application scenario of an embodiment of the present application;
图23为本申请实施例用于描述提供的方案架构及效果的示意图;23 is a schematic diagram for describing the architecture and effects of the provided solution according to an embodiment of the present application;
图24为本申请实施例通信装置2400结构示意图;FIG. 24 is a schematic structural diagram of a communication device 2400 according to an embodiment of the present application;
图25为本申请实施例通信装置2500结构示意图。FIG. 25 is a schematic structural diagram of a communication apparatus 2500 according to an embodiment of the present application.
具体实施方式Detailed ways
本申请实施例可以应用于第四代移动通信技术(the 4th Generation mobile communication technology,4G)网络架构,例如长期演进(long term evolution,LTE)系统,也可以应用于第五代移动通信技术(the 5th Generation mobile communication technology,5G)网络架构中,例如NR系统,或者5G网络架构之后的第六代移动通信技术网络架构或其他类似的通信系统,具体的不做限制。The embodiments of the present application can be applied to the network architecture of the 4th Generation mobile communication technology (4G), such as a long term evolution (LTE) system, and can also be applied to the fifth generation mobile communication technology (the In the 5th Generation mobile communication technology, 5G) network architecture, such as the NR system, or the sixth generation mobile communication technology network architecture after the 5G network architecture, or other similar communication systems, there is no specific limitation.
以下先对本申请实施例中涉及到的技术术语进行说明。The technical terms involved in the embodiments of the present application are first described below.
1)接入网(access network,AN)设备,包括无线接入网(radio access network,RAN)设备,例如基站(例如,接入点),可以是指接入网中在空口通过一个或多个小区与无线终端设备通信的设备,或者例如,一种车到一切(vehicle-to-everything,V2X)技术中的接入网设备为路侧单元(road side unit,RSU)。基站可用于将收到的空中帧与IP分组进行相互转换,作为终端设备与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。RSU可以是支持V2X应用的固定基础设施实体,可以与支持V2X应用的其他实体交换消息。接入网设备还可协调对空口的属性管理。例如,接入网设备可以包括LTE系统或高级长期演进(long term evolution-advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),或者也可以包括第五代移动通信技术(the 5th generation,5G)NR系统(也简称为NR系统)中的下一代节点B(next generation node B,gNB)或者也可以包括云接入网(cloud radio access network,Cloud RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。1) An access network (AN) device, including a radio access network (RAN) device, such as a base station (eg, an access point), may refer to an access network through one or more air interfaces in the access network. A device used by a cell to communicate with a wireless terminal device, or, for example, an access network device in a vehicle-to-everything (V2X) technology is a roadside unit (RSU). The base station may be used to interconvert the received air frames and IP packets, acting as a router between the terminal equipment and the rest of the access network, which may include the IP network. The RSU can be a fixed infrastructure entity supporting V2X applications and can exchange messages with other entities supporting V2X applications. The access network equipment can also coordinate the attribute management of the air interface. For example, the access network equipment may include an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in the LTE system or long term evolution-advanced (LTE-A), or may also include a fifth The next generation node B (gNB) in the 5th generation (5G) NR system (also referred to as the NR system) may also include a cloud radio access network (Cloud RAN) ) a centralized unit (centralized unit, CU) and a distributed unit (distributed unit, DU) in the system, which are not limited in this embodiment of the present application.
本申请实施例中,用于实现接入网设备的功能的装置可以是接入网设备,也可以是能够支持接入网设备实现该功能的装置,例如芯片或者芯片系统,该装置可以被安装在接入网设备中。在本申请实施例提供的技术方案中,以用于实现接入网设备的功能的装置是接 入网设备为例,描述本申请实施例提供的技术方案。In this embodiment of the present application, the device for implementing the function of the access network device may be the access network device, or may be a device capable of supporting the access network device to realize the function, such as a chip or a chip system, and the device may be installed in the access network equipment. In the technical solutions provided by the embodiments of the present application, the technical solutions provided by the embodiments of the present application are described by taking an example that the device for implementing the functions of the access network equipment is the access network equipment.
2)终端设备,包括向用户提供语音和/或数据连通性的设备,具体的,包括向用户提供语音的设备,或包括向用户提供数据连通性的设备,或包括向用户提供语音和数据连通性的设备。例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设备可以经RAN与核心网进行通信,与RAN交换语音或数据,或与RAN交互语音和数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、车到一切(vehicle to everything,V2X)终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、签约单元(subscriber unit)、签约站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。2) Terminal devices, including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity sexual equipment. For example, it may include a handheld device with wireless connectivity, or a processing device connected to a wireless modem. The terminal equipment can communicate with the core network via the RAN, exchange voice or data with the RAN, or exchange voice and data with the RAN. The terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device (D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscription unit (subscriber unit), subscription station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc. For example, these may include mobile telephones (or "cellular" telephones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, computer-embedded mobile devices, and the like. For example, personal communication service (PCS) phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants (personal digital assistants), PDA), etc. Also includes constrained devices, such as devices with lower power consumption, or devices with limited storage capacity, or devices with limited computing power, etc. For example, it includes information sensing devices such as barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), and laser scanners.
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。As an example and not a limitation, in this embodiment of the present application, the terminal device may also be a wearable device. Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. Wait. A wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction, and cloud interaction. In a broad sense, wearable smart devices include full-featured, large-scale, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which needs to cooperate with other devices such as smart phones. Use, such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。The various terminal devices described above, if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be considered as on-board terminal equipment. For example, the on-board terminal equipment is also called on-board unit (OBU). ).
本申请实施例中,终端设备还可以包括中继(relay)。或者理解为,能够与基站进行数据通信的都可以看作终端设备。In this embodiment of the present application, the terminal device may further include a relay (relay). Alternatively, it can be understood that any device capable of data communication with the base station can be regarded as a terminal device.
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片或芯片系统,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。本申请实施例提供的技术方案中,以用于实现终端的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。In this embodiment of the present application, the apparatus for implementing the function of the terminal device may be the terminal device, or may be an apparatus capable of supporting the terminal device to implement the function, such as a chip or a chip system, and the apparatus may be installed in the terminal device. In this embodiment of the present application, the chip system may be composed of chips, or may include chips and other discrete devices. In the technical solutions provided by the embodiments of the present application, the technical solutions provided by the embodiments of the present application are described by taking the device for realizing the function of the terminal being a terminal device as an example.
3)本申请实施例中涉及的网元可以是硬件,也可以是从功能上划分的软件或者以上二者结合后的结构。网元可以包括核心网网元,接入网网元(或者称为接入网设备)等。核心网网元,比如包括移动性管理网元、策略控制网元或数据管理网元等。3) The network elements involved in the embodiments of the present application may be hardware, software that is functionally divided, or a combined structure of the above two. The network elements may include core network network elements, access network network elements (or referred to as access network equipment), and the like. The core network element, for example, includes a mobility management network element, a policy control network element, or a data management network element.
移动性管理网元负责移动网络中终端设备的接入与移动性管理。移动性管理网元可以 包括是5G中的接入与移动性管理实体(access and mobility management function,AMF)、或者是4G中移动性管理实体(mobility management entity,MME),或者是以上网元融合后形成的控制功能的全部或部分。在未来通信(例如6G或者其他的网络中),移动性管理网元可以是AMF网元,或有其它的名称,本申请不做限定。本申请后续在描述时,以移动性管理网元为AMF网元为例。The mobility management network element is responsible for the access and mobility management of terminal equipment in the mobile network. The mobility management network element may include the access and mobility management function (AMF) in 5G, or the mobility management entity (MME) in 4G, or the integration of network elements. form all or part of the control function. In future communication (for example, in 6G or other networks), the mobility management network element may be an AMF network element, or have other names, which are not limited in this application. In the subsequent description of this application, the mobility management network element is taken as an example of the AMF network element.
数据管理网元用于帮助运营商实现对与用户相关的数据的统一管理。数据管理网元比如可以包括用户数据管理(subscriber data management,SDM)网元,或者统一数据管理(unified data management,UDM)网元或者归属签约用户服务器(home subscriber server,HSS)网元。The data management network element is used to help operators realize unified management of user-related data. The data management network element may include, for example, a subscriber data management (subscriber data management, SDM) network element, or a unified data management (unified data management, UDM) network element or a home subscriber server (home subscriber server, HSS) network element.
会话管理网元负责管理用户业务,比如可以是5G中的会话管理功能(session management function,SMF)网元。在未来通信(例如6G或者其他的网络中),会话管理网元可以是SMF网元,或有其它的名称,本申请不做限定。The session management network element is responsible for managing user services, such as a session management function (SMF) network element in 5G. In future communication (for example, in 6G or other networks), the session management network element may be an SMF network element, or have other names, which are not limited in this application.
策略控制网元负责策略控制决策和基于流计费控制的功能。比如可以是5G中的策略控制功能(policy control function,PCF)网元。在未来通信(例如6G或者其它的网络中),策略控制网元可以是PCF网元,或者由其它的名称,本申请不作限定。The policy control network element is responsible for the functions of policy control decision-making and flow-based charging control. For example, it can be a policy control function (PCF) network element in 5G. In future communication (for example, in 6G or other networks), the policy control network element may be a PCF network element, or other names, which are not limited in this application.
4)本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。本申请涉及的术语“至少一个”,是指一个,或一个以上,即包括一个、两个、三个及以上;“多个”,是指两个,或两个以上,即包括两个、三个及以上。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。应理解,在本申请实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。此外,本申请实施例和权利要求书及附图中的术语“包括”和“具有”不是排他的。例如,包括了一系列步骤或模块的过程、方法、系统、产品或设备没有限定于已列出的步骤或模块,还可以包括没有列出的步骤或模块。4) The terms "system" and "network" are often used interchangeably herein. The term "and/or" in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and A and B exist independently B these three cases. In addition, the character "/" in this document generally indicates that the related objects are an "or" relationship. The term "at least one" referred to in this application refers to one, or more than one, including one, two, three and more; "multiple" refers to two, or more than two, including two, three or more. "At least one item(s) below" or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one item (a) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c may be single or multiple . It should be understood that, in this embodiment of the present application, "B corresponding to A" means that B is associated with A, and B can be determined according to A. However, it should also be understood that determining B according to A does not mean that B is only determined according to A, and B may also be determined according to A and/or other information. And, unless stated to the contrary, the ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, sequence, priority or priority of multiple objects. Importance. In addition, the terms "comprising" and "having" in the embodiments and claims of the present application and the drawings are not exclusive. For example, a process, method, system, product or device that includes a series of steps or modules is not limited to the listed steps or modules, and may also include unlisted steps or modules.
以5G通信网络架构为例,参见图1、图2A和图2B所示,为本申请实施例中示例性地提供三种可能的5G通信网络架构的示意图。通信网络架构中可以包括终端设备、数据网络(data network,DN)。通信网络架构中还可以包括以下网元中的一个或多个:鉴权服务器功能(authentication server function,AUSF)网元、网络开放功能(network exposure function,NEF)网元、策略控制功能(policy control function,PCF)网元、统一数据管理(unified data management,UDM)网元、统一数据库(unified data repository,UDR)、网络存储功能(network repository function,NRF)网元、应用功能(application function,AF)网元、接入与移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、RAN网元以及用户面功能(user plane function,UPF)网元、统一的数据存储库功能(unified data repository,UDR)网元 等。上述网元中,除无线接入网部分之外的部分也可以称为核心网部分。Taking a 5G communication network architecture as an example, referring to FIG. 1 , FIG. 2A and FIG. 2B , schematic diagrams of three possible 5G communication network architectures are exemplarily provided in the embodiments of the present application. The communication network architecture may include terminal equipment and data network (DN). The communication network architecture may also include one or more of the following network elements: authentication server function (AUSF) network element, network exposure function (network exposure function, NEF) network element, policy control function (policy control function) function, PCF) network element, unified data management (unified data management, UDM) network element, unified database (unified data repository, UDR), network storage function (network repository function, NRF) network element, application function (application function, AF) ) network element, access and mobility management function (AMF) network element, session management function (SMF) network element, RAN network element and user plane function (UPF) network element, unified data repository function (unified data repository, UDR) network element, etc. Among the above network elements, the part other than the radio access network part may also be referred to as the core network part.
下面针对上述各个网元的功能进行简要说明。The functions of the above network elements are briefly described below.
AMF网元,负责用户的移动性管理,包括移动状态管理,分配用户临时身份标识,认证和授权用户。The AMF network element is responsible for user mobility management, including mobility status management, assigning user temporary identity, and authenticating and authorizing users.
SMF网元,负责UPF网元选择,UPF网元重选,网络协议(Internet Protocol,IP)地址分配,负责承载的建立、修改和释放,QoS控制。The SMF network element is responsible for UPF network element selection, UPF network element reselection, Internet Protocol (Internet Protocol, IP) address allocation, bearer establishment, modification and release, and QoS control.
PCF网元,包含策略控制决策和基于流计费控制的功能,包含用户签约数据管理功能,策略控制功能,计费策略控制功能,QoS控制等等。The PCF network element includes the functions of policy control decision and flow-based charging control, including user subscription data management function, policy control function, charging policy control function, QoS control and so on.
UDM网元,负责管理签约数据,当签约数据修改的时候,负责通知相应的网元。The UDM network element is responsible for managing the subscription data, and is responsible for notifying the corresponding network element when the subscription data is modified.
UDR网元,负责存储和检索签约数据、策略数据和公共架构数据等;供UDM、PCF和NEF获取相关数据。UDR要能够针对不同类型的数据如签约数据、策略数据有不同的数据接入鉴权机制,以保证数据接入的安全性;UDR对于非法的服务化操作或者数据接入请求要能够返回携带合适原因值的失败响应。The UDR network element is responsible for storing and retrieving subscription data, policy data and public architecture data, etc.; for UDM, PCF and NEF to obtain relevant data. UDR should be able to have different data access authentication mechanisms for different types of data, such as contract data and policy data, to ensure the security of data access; UDR should be able to return the appropriate data for illegal service operations or data access requests. Failure response for the reason value.
AF网元,用于向UE提供某种应用层服务,AF在向UE提供服务时,对服务质量QoS策略(Policy)和计费(Charging)策略有要求,且需要通知网络。同时,AF也需要核心网其它网元反馈的应用相关的信息。The AF network element is used to provide a certain application layer service to the UE. When the AF provides services to the UE, it has requirements on the QoS policy (Policy) and charging (Charging) policy, and needs to notify the network. At the same time, the AF also needs application-related information fed back by other network elements of the core network.
NEF网元,主要支持网络能力开放功能,对外开放网络能力和服务;第三代合作伙伴计划(3rd generation partnership project 3GPP)网络功能(network function,NF)通过NEF向其他NF发布功能和事件。NF开放的能力和事件可以安全地开放给第三方应用。NEF使用UDR的标准化接口(Nudr)将结构化数据进行存储/检索。将AF的交换信息与内部网络功能的交换信息进行翻译。例如,将在AF-服务(Service)-指示符(Identifier)和内部5G核心信息之间进行转换。内部5G核心信息,比如可以是数据网络名称(data network name,DNN)或者单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)。The NEF network element mainly supports the network capability opening function, and opens network capabilities and services to the outside world; the 3rd generation partnership project (3GPP) network function (network function, NF) publishes functions and events to other NFs through NEF. The capabilities and events opened by NF can be safely opened to third-party applications. NEF uses a standardized interface to UDR (Nudr) to store/retrieve structured data. Translate the exchange information of the AF with the exchange information of the internal network function. For example, there will be a conversion between AF-Service-Identifier and internal 5G core information. Internal 5G core information, such as data network name (DNN) or single network slice selection assistance information (S-NSSAI).
UPF网元,支持以下全部或者部分功能:将协议数据单元(protocol data unit,PDU)会话与数据网络互连;分组路由和转发功能,例如,支持对流量进行下行分流(uplink classifier)后转发到数据网络,支持分支点(branching point)功能以支持多宿主(multi-homed)PDU会话;数据包检测功能。UPF网元具体分为中间-UPF(intermediate-UPF,I-UPF)和锚点UPF(anchor-UPF,A-UPF)。其中,I-UPF与接入网RAN连接,A-UPF为会话锚点的UPF,A-UPF又可以称为PDU会话锚点用户面网元(PDU session anchor,PSA)。本申请实施例的UPF可以具备分流功能,例如支持分流作用的上行分类器(uplink classifier,ULCL)或分支点(branching point,BP)。The UPF network element supports all or part of the following functions: interconnecting protocol data unit (PDU) sessions with the data network; packet routing and forwarding functions, for example, supporting the downlink classifier to forward traffic to Data network, support branching point (branching point) function to support multi-homed (multi-homed) PDU session; packet inspection function. UPF network elements are specifically divided into intermediate-UPF (intermediate-UPF, I-UPF) and anchor UPF (anchor-UPF, A-UPF). Among them, the I-UPF is connected to the access network RAN, the A-UPF is the UPF of the session anchor, and the A-UPF may also be called the PDU session anchor user plane network element (PDU session anchor, PSA). The UPF in this embodiment of the present application may have an offload function, such as an uplink classifier (uplink classifier, ULCL) or a branch point (branching point, BP) that supports the offload function.
AUSF网元,负责鉴权功能或执行网络切片鉴权授权(network slice specific authentication and authorization,NSSAA)流程。The AUSF network element is responsible for the authentication function or performs the network slice specific authentication and authorization (NSSAA) process.
不可信的非3GPP接入网(untrusted non-3GPP access network)设备:该设备允许终端设备和3GPP核心网之间采用非3GPP技术互连互通,其中非3GPP技术例如:无线保真(wireless fidelity,Wi-Fi)、全球微波互联接入(worldwide interoperability for microwave access,WiMAX)、码分多址(code division multiple access,CDMA)网络等。接入不可信的非3GPP接入网的终端设备,需要通过与安全网关建立的安全隧道来与3GPP核心网互连互通。其中安全网关,例如可以是演进型分组数据网关(evolved packet data gateway,ePDG) 或者非第三代合作伙伴(3rd generation partnership project,3GPP)交互功能(non-3GPP interworking function,N3IWF)网元。Untrusted non-3GPP access network (untrusted non-3GPP access network) equipment: This equipment allows non-3GPP technology interconnection and intercommunication between terminal equipment and 3GPP core network, including non-3GPP technology such as wireless fidelity (wireless fidelity, Wi-Fi), worldwide interoperability for microwave access (WiMAX), code division multiple access (code division multiple access, CDMA) networks, etc. The terminal equipment accessing the untrusted non-3GPP access network needs to interconnect with the 3GPP core network through the secure tunnel established with the security gateway. The security gateway may be, for example, an evolved packet data gateway (ePDG) or a non-3rd generation partnership project (3GPP) interworking function (non-3GPP interworking function, N3IWF) network element.
另外,为了描述更为简洁,在后续描述时,将各个功能网元中的“网元”去掉,比如AMF网元简称为AMF,UDM网元简称为UDM,其它网元类似,不再一一例举。In addition, in order to make the description more concise, in the subsequent description, the "network element" in each functional network element is removed. For example, the AMF network element is abbreviated as AMF, and the UDM network element is abbreviated as UDM. For example.
图1所示为基于服务化架构的通信网络架构示意图,图1中,NEF、NRF、PCF、UDM、AUSF、UDR、AMF以及SMF之间,任意两个网元之间通信可以采用服务化通信方式,比如NEF与AUSF之间通信采用的接口Nnef或Nausf均为服务化的接口,同理,接口Nnrf、Npcf、Nudm、Naf、Nudr、Namf以及Nsmf均为服务化的接口。另外,AMF与终端设备可通过N1接口通信,AMF与(R)AN可通过N2接口通信,RAN和UPF可通过N3接口通信,SMF与UPF可通过N4接口通信,终端设备与RAN之间进行空口通信,UPF与DN可通过N6接口通信。Figure 1 shows a schematic diagram of a communication network architecture based on a service-oriented architecture. In Figure 1, between NEF, NRF, PCF, UDM, AUSF, UDR, AMF and SMF, the communication between any two network elements can use service-oriented communication For example, the interfaces Nnef or Nausf used for communication between NEF and AUSF are service-oriented interfaces. Similarly, interfaces Nnrf, Npcf, Nudm, Naf, Nudr, Namf, and Nsmf are service-oriented interfaces. In addition, AMF and terminal equipment can communicate through N1 interface, AMF and (R)AN can communicate through N2 interface, RAN and UPF can communicate through N3 interface, SMF and UPF can communicate through N4 interface, and air interface between terminal equipment and RAN Communication, UPF and DN can communicate through N6 interface.
图2A为基于点对点接口的通信网络架构示意图;图1与图2A的主要区别在于:图2A中的各个网元之间的接口是点对点的接口,而不是服务化的接口。FIG. 2A is a schematic diagram of a communication network architecture based on a point-to-point interface; the main difference between FIG. 1 and FIG. 2A is that the interface between each network element in FIG. 2A is a point-to-point interface, not a service-oriented interface.
图1和图2A所示的通信网络架构为第三代合作伙伴计划(3rd generation partnership project,3GPP)系统架构。图2B为非3GPP(non-3GPP)系统架构。non-3GPP系统架构相比3GPP架构来说,增加了N3IWF网元。图2B中,以3GPP核心网为UE的归属公共陆地移动网络(home public land mobile network,HPLMN)为例。UE可以通过3GPP接入网(例如RAN)和不可信的非3GPP接入网中的至少一个接入3GPP核心网。The communication network architecture shown in FIG. 1 and FIG. 2A is a 3rd generation partnership project (3rd generation partnership project, 3GPP) system architecture. FIG. 2B is a non-3GPP (non-3GPP) system architecture. Compared with the 3GPP architecture, the non-3GPP system architecture adds N3IWF network elements. In FIG. 2B , the 3GPP core network is the home public land mobile network (home public land mobile network, HPLMN) of the UE as an example. The UE may access the 3GPP core network through at least one of a 3GPP access network (eg, RAN) and an untrusted non-3GPP access network.
下面在针对本申请实施例提供的方案进行详细描述之前,先对本申请实施例涉及的技术概念进行简要说明。Before describing in detail the solutions provided by the embodiments of the present application, the technical concepts involved in the embodiments of the present application are briefly described below.
(1)互联网安全协议(Internet protocol Security,IPsec):(1) Internet Protocol Security (IPsec):
IPsec并不是单独的某个协议,具体给出了应用于IP层上网络安全的一套方案。IPsec用于在不安全的网络环境中为传输的敏感数据提供保护。通信双方在IP层执行加密以及数据源认证来确保数据包传输的机密性、数据一致性、执行数据源认证以及实现抗重放等。IPsec is not a separate protocol, it specifically provides a set of solutions applied to network security at the IP layer. IPsec is used to protect sensitive data in transit in insecure network environments. The two communicating parties perform encryption and data source authentication at the IP layer to ensure the confidentiality of data packet transmission, data consistency, perform data source authentication, and implement anti-replay.
其中,数据源认证是指,针对对端身份进行认证,不可抵赖。完整性保护是指,保证数据在传输过程中不被篡改。机密性是指对传输的用户敏感数据进行加密保护。抗重放是指拒绝接收旧的或者重复的报文。Among them, data source authentication means that the identity of the peer is authenticated and cannot be denied. Integrity protection refers to ensuring that data is not tampered with during transmission. Confidentiality refers to the encryption protection of sensitive user data in transit. Anti-replay refers to refusing to receive old or duplicate packets.
安全载荷协议(encapsulating security payload,ESP)和认证头协议(authentication header,AH)是两种IPSec安全协议,用于为IP数据报提供这种安全协议。AH主要提供数据源认证、数据完整性校验、防重放攻击等功能,不支持数据加密。ESP主要提供数据源认证、数据完整性校验、防重放攻击、数据加密等功能。AH和ESP可以单独使用,也可以嵌套使用。通过这些组合方式,可以在两台主机、两台安全网关(防火墙和路由器),或者主机与安全网关之间使用。Encapsulating security payload (ESP) and authentication header (AH) are two IPSec security protocols used to provide this security protocol for IP datagrams. AH mainly provides functions such as data source authentication, data integrity verification, and anti-replay attack, but does not support data encryption. ESP mainly provides data source authentication, data integrity verification, anti-replay attack, data encryption and other functions. AH and ESP can be used individually or nested. These combinations can be used between two hosts, two security gateways (firewall and router), or between a host and a security gateway.
IPSec的工作模式包括两个,分别是传输模式(transport mode)和隧道模式(tunnel mode)。每个模式使用的场景不同,对数据的处理方式也不同。There are two working modes of IPSec, namely transport mode and tunnel mode. Each mode uses different scenarios and handles data differently.
在传输模式下,AH或ESP被插入到IP头之后但在所有传输层协议之前,或所有其他IPSec协议之前。例如,参见图3A所示为传输模式下的数据封装方式示意图。传输模式用于两台主机之间的通讯,或者是一台主机和一个安全网关之间的通讯。在传输模式下,对报文进行加密和解密的两台设备本身必须是报文的原始发送者和最终接收者。换句话说, 就是加解密点是实际的通信点。需要说明的是,请求评论(Request For Comments,RFC)协议目前支持终端设备(例如主机)和安全网关采用传输模式通信,但需要确保所有由安全网关加解密的数据包都要从该安全网关转发。In transport mode, AH or ESP is inserted after the IP header but before all transport layer protocols, or before all other IPSec protocols. For example, see FIG. 3A for a schematic diagram of a data encapsulation manner in the transmission mode. Transport mode is used for communication between two hosts, or between a host and a security gateway. In the transmission mode, the two devices that encrypt and decrypt the message must be the original sender and final receiver of the message. In other words, the encryption/decryption point is the actual communication point. It should be noted that the Request For Comments (RFC) protocol currently supports terminal devices (such as hosts) and security gateways to communicate in transport mode, but it needs to ensure that all data packets encrypted and decrypted by the security gateway are forwarded from the security gateway .
在隧道模式下,AH或ESP插在原始IP头之前,另外生成一个新IP头放到AH或ESP之前。例如,参见图3B所示为隧道模式下的数据封装方式示意图。隧道模式经常使用在网络到网络的场景中。通常,在两个安全网关(路由器)之间的数据流量,绝大部分都不是安全网关本身的通讯量,因此在安全网关之间一般不使用传输模式,而是使用隧道模式。在一个安全网关被加密的报文,只有另一个安全网关能够解密。因此必须对IP报文进行隧道封装,即增加一个新的IP头,进行隧道封装后的IP报文被发送到另一个安全网关,才能够被解密。In tunnel mode, AH or ESP is inserted before the original IP header, and a new IP header is generated and placed before AH or ESP. For example, referring to FIG. 3B is a schematic diagram of a data encapsulation manner in tunnel mode. Tunnel mode is often used in network-to-network scenarios. Usually, most of the data traffic between two security gateways (routers) is not the traffic of the security gateway itself, so the tunnel mode is generally not used between the security gateways. Packets encrypted at one security gateway can only be decrypted by another security gateway. Therefore, the IP packet must be tunnel encapsulated, that is, a new IP header is added, and the IP packet after tunnel encapsulation is sent to another security gateway to be decrypted.
IPsec提供的安全服务是基于安全策略数据库(security policy database,SPD)定义的策略规则来实现的。SPD通常是一个有序的结构,用访问控制列表来描述数据流特性。定义哪些数据流需要采用IPsec。SPD存储的主要内容可以包括源IP地址、目的IPR地址、目的端口号、源端口号、封装协议和工作模式等等。SPD定义3种可能的处理方式:旁路、IPsec加密或者丢弃。旁路是指当数据包源目IP不匹配SPD记录的策略时,按照路由表转发。IPSec加密是指当数据包的源目IP匹配SPD记录策略时,交给相应的封装来执行IPSec处理。丢弃是指针对该数据包不作处理,直接丢弃。The security services provided by IPsec are implemented based on policy rules defined by a security policy database (SPD). SPD is usually an ordered structure, with access control lists to describe data flow characteristics. Define which data flows need to use IPsec. The main contents stored in the SPD may include source IP address, destination IPR address, destination port number, source port number, encapsulation protocol, working mode, and so on. SPD defines 3 possible processing methods: bypass, IPsec encryption or discard. Bypass means that when the source and destination IP of the data packet does not match the policy recorded by the SPD, it is forwarded according to the routing table. IPSec encryption means that when the source and destination IPs of the data packets match the SPD record policy, they are handed over to the corresponding encapsulation to perform IPSec processing. Discard means that the data packet is not processed and directly discarded.
安全联盟(Security Association,SA):Security Association (SA):
SA是两个通信实体(比如:主机、安全网关)经协商建立起来的一种协定,为安全目的创建一个单向逻辑连接,所有经过同一SA的数据流会得到相同安全服务,其决定用来保护数据包安全的IPSec协议(AH或者ESP)、运行模式(传输模式还是隧道模式)、验证算法、加密算法、加密密钥、密钥生存期、抗重放窗口等。SA是构成IPSec的基础。SA is an agreement established by two communication entities (such as: host, security gateway) through negotiation. It creates a one-way logical connection for security purposes. All data flows passing through the same SA will get the same security service. IPSec protocol (AH or ESP), operation mode (transmission mode or tunnel mode), authentication algorithm, encryption algorithm, encryption key, key lifetime, anti-replay window, etc. to protect data packet security. SA is the foundation of IPSec.
安全关联是IPSec的基本组成部分,可以包括因特网秘钥交换协议(internet key exchange protocol,IKE)SA和IPsec SA。IKE SA用于保护协商流量和认证流量,比如协商IPSec协议(AH或者ESP)、运行模式(传输模式还是隧道模式)、验证算法、加密算法、加密密钥、密钥生存期、抗重放窗口等。IPsec SA用于保护实际传输的数据流量。IPsec SA是单向保护。IKE SA和IPsec SA都是通过IKE协议协商产生的。Security association is a basic part of IPSec, which can include Internet Key Exchange Protocol (IKE) SA and IPsec SA. IKE SA is used to protect negotiation traffic and authentication traffic, such as negotiated IPSec protocol (AH or ESP), operation mode (transport mode or tunnel mode), authentication algorithm, encryption algorithm, encryption key, key lifetime, anti-replay window Wait. IPsec SA is used to protect the actual transmitted data traffic. IPsec SA is a one-way protection. Both IKE SA and IPsec SA are generated through IKE protocol negotiation.
IKE协议负责密钥管理,定义了通信实体间进行身份认证、协商加密算法以及生成共享的会话密钥的方法。IKE将密钥协商的结果保留在SA中,供AH和ESP以后使用。The IKE protocol is responsible for key management, and defines the methods for performing identity authentication, negotiating encryption algorithms and generating shared session keys between communicating entities. IKE keeps the result of key negotiation in SA for later use by AH and ESP.
安全关联数据库(security Association database,SAD):用于存放与SA关联的所有状态数据的存储结构。Security Association database (security Association database, SAD): a storage structure for storing all state data associated with SA.
安全参数索引(security parameter index,SPI):一个32bit的数值,用于查找SA。SPI、IP目的地址、安全协议号三者结合起来共同构成三元组,用来唯一标识一个特定的SA。Security parameter index (security parameter index, SPI): a 32-bit value used to find SA. SPI, IP destination address, and security protocol number are combined to form a triplet, which is used to uniquely identify a specific SA.
安全策略(security policy,SP):由用户配置,决定对IP数据包提供何种保护,并以何种方式实施保护。SP属性包括保护的数据流(比如访问控制列表(access control lists,ACL))、安全提议(工作模式、IPsec协议、加密认证算法)、密钥配置方式、安全隧道本端/对端IP地址、IKE对等体(Peer)等。Security policy (SP): Configured by the user, it decides what kind of protection to provide for IP packets and in what way to implement the protection. SP attributes include protected data streams (such as access control lists (ACL)), security proposals (working mode, IPsec protocol, encryption and authentication algorithms), key configuration methods, local/peer IP addresses of the secure tunnel, IKE peer (Peer) and so on.
随着网络的迅速发展,对数据安全提出更好的挑战,目前提出针对终端设备到核心网(core network,CN)的加密需求,一种可行的加密方案是,在UPF与DN之间部署安全网关。UE与安全网关之间通信实现IP层的端到端(end to end,E2E)加密。加密所实用 的密钥和加密策略可以是UE与安全网关之间基于安全协议(比如IPsec)协商获得。With the rapid development of the network, it poses better challenges to data security. At present, the encryption requirements from the terminal device to the core network (CN) are proposed. A feasible encryption scheme is to deploy security between UPF and DN. gateway. The communication between the UE and the security gateway implements end-to-end (E2E) encryption at the IP layer. The practical key and encryption strategy for encryption can be obtained through negotiation between the UE and the security gateway based on a security protocol (such as IPsec).
(2)边缘网络是中心云的对等概念,可以理解为是一个本地的数据中心,可以使用数据网络接入标识(data network access identifier,DNAI)来标识,还可以称为边缘计算网络(edge computing network)。边缘网络中可以部署多个本地数据网络(local data network,local DN)。在一种实现方式中,边缘网络可以是边缘数据网络(edge data network,EDN)。移动边缘计算(mobile edge computing,MEC)业务是边缘网络提供的业务。MEC业务也可以简称为边缘业务。(2) The edge network is a peer-to-peer concept of the central cloud, which can be understood as a local data center, which can be identified by a data network access identifier (DNAI), and can also be called an edge computing network (edge computing network). computing network). Multiple local data networks (local DN) can be deployed in the edge network. In one implementation, the edge network may be an edge data network (EDN). Mobile edge computing (mobile edge computing, MEC) services are services provided by edge networks. The MEC service may also be referred to as the edge service for short.
UE由于具有移动性,移动的过程中可能会更新附着的边缘网络,因此接入的DNAI也会发生改变。下面针对DNAI变化的流程进行详细说明。Due to the mobility of the UE, the attached edge network may be updated in the process of moving, so the DNAI of the access will also change. The following describes the process of DNAI change in detail.
参见图4所示为AF业务流路由(influence traffic routing)流程。由AF将支持MEC业务的DNAI、相应的位置区域以及业务流信息等通过PCF通知给SMF,以使得SMF触发调整终端设备的当前会话。See Figure 4 for an AF service flow routing (influence traffic routing) process. The AF notifies the SMF of the DNAI supporting the MEC service, the corresponding location area, and service flow information through the PCF, so that the SMF triggers and adjusts the current session of the terminal device.
401,AF生成AF请求(request)。其中,AF request中可以包括AF业务标识(AF Transaction ID)以及AF通知(notification)的接收方式(比如,需要接收AF notification)。可选地,AF request中还可以包括AF业务指示符(AF service ID),业务对应的DNAI列表以及所指示业务的应用ID(比如APP ID)和业务流信息(traffic filtering information)。AF request中还可以包括N6路由信息(包括用于建立与UPF的N6连接的端口信息)。业务流信息用于识别业务流。401. The AF generates an AF request (request). Wherein, the AF request may include the AF service identifier (AF Transaction ID) and the receiving method of the AF notification (for example, the AF notification needs to be received). Optionally, the AF request may also include an AF service indicator (AF service ID), a DNAI list corresponding to the service, and an application ID (such as an APP ID) and service flow information (traffic filtering information) of the indicated service. The AF request may also include N6 routing information (including port information for establishing an N6 connection with the UPF). The traffic flow information is used to identify the traffic flow.
402,AF将生成的AF request发送给NEF。402, the AF sends the generated AF request to the NEF.
示例性地,AF可以通过AF与NEF的服务化接口消息中向NEF发送AF request。服务化接口消息,比如可以为Nnef_Traffic Influence_Creat/Update/Delete。Exemplarily, the AF may send the AF request to the NEF through the servitization interface message between the AF and the NEF. Service interface message, such as Nnef_Traffic Influence_Creat/Update/Delete.
403a,NEF将AF request中携带的内容存储在UDR中。403a, the NEF stores the content carried in the AF request in the UDR.
403b,NEF通知AF request中携带的内容在NEF的存储信息中的存储/更新/删除情况。例如可以通过NEF与AF的服务化接口消息向AF通知AF request中携带的内容在NEF的存储信息中的存储/更新/删除情况。例如,服务化接口消息可以是Nnef_Traffic Influence_Creat/Update/Delete Response。403b, the NEF notifies the AF of the storage/update/deletion of the content carried in the request in the storage information of the NEF. For example, the AF may be notified of the storage/update/deletion of the content carried in the AF request in the storage information of the NEF through a service interface message between the NEF and the AF. For example, the service interface message can be Nnef_Traffic Influence_Creat/Update/Delete Response.
可选地,UDR还可以执行404。Optionally, the UDR may also perform 404 .
404,若PCF已订阅AF request的通知,则UDR会通知PCF相应的AF request携带的内容的修改情况(包括更新/删除等)。例如,UDR可以通过UDR的服务化接口消息向PCF通知AF request携带的内容的修改情况。比如,UDR的服务化接口消息可以为Nudr_DM_Notify。404. If the PCF has subscribed to the notification of the AF request, the UDR will notify the PCF of the modification (including update/deletion, etc.) of the content carried by the corresponding AF request. For example, the UDR can notify the PCF of the modification of the content carried by the AF request through the service interface message of the UDR. For example, the service interface message of the UDR may be Nudr_DM_Notify.
405,PCF根据Nudr_DM_Notify中的内容确定是否需要修改PDU会话,若确定需要修改PDU会话,则根据Nudr_DM_Notify中的内容生成策略与计费控制规则(policy and charging control rule,PCC rule)。PCF向SMF发送PCC rule。其中,AF通知(notification)的接收方式为需要接收AF notification时,PCF还向SMF发送AF notification的订阅事件。405. The PCF determines whether the PDU session needs to be modified according to the content in Nudr_DM_Notify. If it is determined that the PDU session needs to be modified, a policy and charging control rule (policy and charging control rule, PCC rule) are generated according to the content in Nudr_DM_Notify. PCF sends PCC rule to SMF. Among them, the receiving method of the AF notification is that when the AF notification needs to be received, the PCF also sends the subscription event of the AF notification to the SMF.
示例性地,PCF可以通过PCF的服务化接口消息向SMF发送PCC rule。PCF的服务化接口消息可以是Npcf_SM PolicyControl_UpdateNotify。Exemplarily, the PCF may send the PCC rule to the SMF through the PCF's servitization interface message. The PCF's serviced interface message may be Npcf_SM PolicyControl_UpdateNotify.
406,SMF收到PCF发送的PCC rule,会根据PCC rule执行用户面重配置,包括对当前PDU会话进行调整,比如可以包括如下一项或多项:406. The SMF receives the PCC rule sent by the PCF, and performs user plane reconfiguration according to the PCC rule, including adjusting the current PDU session, which may include one or more of the following:
(1)根据更新的DNAI列表和UE的位置信息为UE增加/替换/删除PDU会话锚点用 户面网元(比如,ULCL节点)。(1) Add/replace/delete a PDU session anchor user plane network element (such as a ULCL node) for the UE according to the updated DNAI list and the location information of the UE.
(2)为UPF添加新的目标DNAI以及新的路由规则(traffic steering rules)。(2) Add new target DNAI and new routing rules (traffic steering rules) to UPF.
(3)向AMF订阅新的UE位置信息通知事件。(3) Subscribe to the AMF for a new UE location information notification event.
参见图5所示为增加ULCL的流程。具体为SMF通过区域的变化或检测到对应的业务流,决定执行图4流程中下发的PCC规则,SMF执行插入ULCL节点。图5所示的增加ULCL的流程中,SMF需要分别调整PSA1,PSA2,ULCL的转发规则,确保对应的上下行数据包从正确的用户面网元传输。See Figure 5 for the flow of adding ULCL. Specifically, the SMF determines to execute the PCC rule issued in the flow of FIG. 4 through the change of the area or detects the corresponding service flow, and the SMF executes the insertion of the ULCL node. In the process of adding ULCL shown in FIG. 5, the SMF needs to adjust the forwarding rules of PSA1, PSA2, and ULCL respectively to ensure that the corresponding uplink and downlink data packets are transmitted from the correct user plane network element.
501,UE已与PSA1建立PDU会话。此时SMF本地存储有该PDU会话所对应的端口信息,比如包括PSA1上用于与RAN连接的上行端口信息,RAN上用于与PSA1连接的下行端口信息501, the UE has established a PDU session with PSA1. At this time, the SMF locally stores the port information corresponding to the PDU session, such as the uplink port information on the PSA1 used for connecting to the RAN, and the downlink port information on the RAN used for connecting with the PSA1.
502,SMF选取并配置PSA2,主要配置PSA2的N6端口,以及获取PSA2的上行端口。502, the SMF selects and configures the PSA2, mainly configures the N6 port of the PSA2, and obtains the uplink port of the PSA2.
503,SMF选取并配置增加的UPF(ULCL/BP),以ULCL为例。主要配置ULCL到PSA1和PSA2的上行隧道(根据PSA1和PSA2的上行端口信息),以及配置ULCL到RAN的下行隧道(根据RAN的下行端口信息)。并获取ULCL分别用于与PSA1和PSA2连接的下行端口信息以及ULCL用于与RAN连接的上行端口信息。同时还需要配置各端口相关的数据转发规则。503, the SMF selects and configures the added UPF (ULCL/BP), taking ULCL as an example. Mainly configure the uplink tunnel from ULCL to PSA1 and PSA2 (according to the uplink port information of PSA1 and PSA2), and configure the downlink tunnel from ULCL to RAN (according to the downlink port information of RAN). And obtain the downlink port information that the ULCL is used to connect with PSA1 and PSA2 respectively, and the uplink port information that the ULCL is used to connect to the RAN. At the same time, you need to configure data forwarding rules related to each port.
504,SMF更新PSA1的数据转发规则,主要根据ULCL用于与PSA1连接的下行端口信息配置PSA1到ULCL的下行隧道。504 , the SMF updates the data forwarding rule of PSA1, and configures the downlink tunnel from PSA1 to ULCL mainly according to the downlink port information used by ULCL to connect with PSA1.
505,SMF更新PSA2的数据转发规则,主要根据ULCL用于与PSA2连接的下行端口信息配置PSA2的下行隧道。505 , the SMF updates the data forwarding rule of PSA2, and configures the downlink tunnel of PSA2 mainly according to the downlink port information used by the ULCL to connect with PSA2.
506,SMF更新RAN的数据转发规则,主要根据ULCL用于与RAN连接的上行端口信息建立RAN到ULCL的上行隧道。506 , the SMF updates the data forwarding rule of the RAN, and mainly establishes an uplink tunnel from the RAN to the ULCL according to the uplink port information used by the ULCL to connect with the RAN.
507,SMF通知UE PSA2的新IP地址(IP prefix),比如PSA2采用IPv6地址。507, the SMF notifies the UE of the new IP address (IP prefix) of PSA2, for example, PSA2 adopts an IPv6 address.
508,SMF向UE更新PSA1的IP prefix,PSA2采用IPv6地址。508, the SMF updates the IP prefix of PSA1 to the UE, and PSA2 adopts the IPv6 address.
步骤507-508主要为PSA的IPv6地址的传输机制,更新各自的IPv6地址。由于插入ULCL后,路由路径已发生改变,SMF将ULCL的IPv6地址加入到PSA1和PSA2的IPv6地址列表中)。Steps 507-508 are mainly the transmission mechanism of the IPv6 address of the PSA, and update the respective IPv6 addresses. Since the routing path has changed after inserting the ULCL, the SMF adds the IPv6 address of the ULCL to the IPv6 address list of PSA1 and PSA2).
参见图6所示为AF notification的流程。AF notification可以包括提前通知(Early notification)或者滞后通知(Late notification)。AF notification主要用于在为SMF插入ULCL后,向AF通知DNAI变化情况。See Figure 6 for the flow of AF notification. AF notification can include Early notification or Late notification. AF notification is mainly used to notify AF of DNAI changes after inserting ULCL for SMF.
601,SMF确定满足触发AF所订阅的AF notification的条件。601. The SMF determines that the conditions for triggering the AF notification subscribed by the AF are met.
602a,若AF订阅的是通过NEF的early notification,则SMF向NEF发送early notification,AF notification可以包括当前PDU会话的目标DNAI。602a, if the AF subscribes to the early notification through the NEF, the SMF sends the early notification to the NEF, and the AF notification may include the target DNAI of the current PDU session.
示例性地,SMF可以通过与NEF之间的服务化接口消息向NEF发送early notification。比如,NEF服务化接口消息可以是Nsmf_EventExposure_notify(early notification)。Exemplarily, the SMF may send an early notification to the NEF through a servitized interface message with the NEF. For example, the NEF service interface message can be Nsmf_EventExposure_notify(early notification).
602b,NEF收到early notification后,向订阅early notification的AF发送该early notification。NEF可以通过服务化接口消息向AF发送early notification。服务化接口消息可以是Nnef_trafficInfluence_Notify(early notification)。602b, after receiving the early notification, the NEF sends the early notification to the AF that subscribes to the early notification. NEF can send early notification to AF through service interface message. The service interface message can be Nnef_trafficInfluence_Notify(early notification).
示例性地,NEF收到early notification后,还可以执行消息映射,比如选取对应的AF  transaction ID等,Nnef_trafficInfluence_Notify还可以包括AF transaction ID等。Exemplarily, after receiving the early notification, NEF can also perform message mapping, such as selecting the corresponding AF transaction ID, etc., and Nnef_trafficInfluence_Notify can also include AF transaction ID, etc.
603a,AF向NEF发送回复消息,或AF经过对Target DNAI的应用重部署之后向NEF发送回复消息。回复消息中携带对应Target DNAI的N6数据路由信息。603a, the AF sends a reply message to the NEF, or the AF sends a reply message to the NEF after redeploying the application of Target DNAI. The reply message carries the N6 data routing information corresponding to Target DNAI.
示例性地,AF可以通过NEF服务化接口消息向NEF发送回复消息。比如,NEF服务化接口消息为Nnef_TrafficInfluence_AppRelocationinfo。Illustratively, the AF may send a reply message to the NEF through the NEF serviced interface message. For example, the NEF service interface message is Nnef_TrafficInfluence_AppRelocationinfo.
603b,当NEF收到AF的回复消息后,NEF触发相匹配的通知消息通知SMF应用重部署信息(主要包括应用重部署的Target DNAI的N6数据路由信息)。603b, after the NEF receives the reply message from the AF, the NEF triggers a matching notification message to notify the SMF of the application redeployment information (mainly including the N6 data routing information of the Target DNAI of the application redeployment).
示例性地,NEF可以通过SMF服务化接口消息向SMF发送应用重部署信息。比如,SMF服务化接口消息可以是Nsmf_TrafficInfluence_AppRelocationinfo。Exemplarily, the NEF may send the application redeployment information to the SMF through the SMF service-oriented interface message. For example, the SMF service interface message can be Nsmf_TrafficInfluence_AppRelocationinfo.
602c,若AF订阅的是直接通知的early notification,则SMF向AF发送early notification,early notification可以包括当前PDU会话的目标DNAI。602c, if the AF subscribes to the early notification of the direct notification, the SMF sends the early notification to the AF, and the early notification may include the target DNAI of the current PDU session.
示例性地,SMF可以通过与AF之间的SMF服务化接口消息向AF发送early notification。比如,SMF服务化接口消息可以是Nsmf_EventExposure_notify(early notification)。Exemplarily, the SMF may send an early notification to the AF through an SMF serviced interface message with the AF. For example, the SMF service interface message can be Nsmf_EventExposure_notify(early notification).
603c,AF直接向SMF发送回复消息,或AF经过对Target DNAI的应用重部署之后向NEF发送回复消息。回复消息中携带对应Target DNAI的N6数据路由信息。603c, the AF directly sends a reply message to the SMF, or the AF sends a reply message to the NEF after redeploying the application of Target DNAI. The reply message carries the N6 data routing information corresponding to Target DNAI.
示例性地,AF可以通过服务化接口消息向SMF发送回复消息。比如,服务化接口消息为Nsmf_TrafficInfluence_AppRelocationinfo。Illustratively, the AF may send a reply message to the SMF through a serviced interface message. For example, the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
应理解的是,在执行602a和602b的情况下,602c不再执行。It should be understood that where 602a and 602b are performed, 602c is no longer performed.
604,SMF执行DNAI change流程或执行UPF的添加/修改/移除流程。若AF向SMF订阅了期望AF确认(AF acknowledgment to be expected)指示,则SMF可能在执行步骤604之前一直等待AF发送的回复消息再执行此步骤604,否则SMF可以在发送early notification后,则执行DNAI change流程或执行UPF的添加/修改/移除(UPF addition/relocation/removal)流程。604, the SMF executes the DNAI change process or the UPF add/modify/remove process. If the AF subscribes to the SMF for an AF acknowledgment to be expected indication, the SMF may wait for the reply message sent by the AF before executing the step 604 and then execute the step 604; otherwise, the SMF may execute the step 604 after sending the early notification. DNAI change process or perform UPF add/modify/remove (UPF addition/relocation/removal) process.
605a,若AF订阅的是通过NEF的late notification,则SMF向NEF发送late notification。late notification包括当前PDU Session的Target DNAI。605a, if the AF subscribes to the late notification through the NEF, the SMF sends the late notification to the NEF. The late notification includes the Target DNAI of the current PDU Session.
示例性地,SMF可以通过服务化接口消息向NEF发送late notification,例如,服务化接口消息可以是Nsmf_EventExposure_Notify。Exemplarily, the SMF may send the late notification to the NEF through a servitization interface message, for example, the servitization interface message may be Nsmf_EventExposure_Notify.
605b,NEF收到late notification后,向订阅late notification的AF发送该late notification。NEF可以通过服务化接口消息向AF发送late notification。服务化接口消息可以是Nnef_trafficInfluence_Notify(late notification)。605b, after receiving the late notification, the NEF sends the late notification to the AF that subscribes to the late notification. NEF can send late notification to AF through service interface message. The service interface message can be Nnef_trafficInfluence_Notify(late notification).
示例性地,NEF收到late notification后,还可以执行消息映射,比如选取对应的AF transaction ID等,Nnef_trafficInfluence_Notify还可以包括AF transaction ID等。Exemplarily, after NEF receives the late notification, it can also perform message mapping, such as selecting the corresponding AF transaction ID, etc., and Nnef_trafficInfluence_Notify can also include the AF transaction ID, etc.
606a,AF向NEF发送回复消息,或AF经过对Target DNAI的应用重部署之后向NEF发送回复消息。回复消息携带对应Target DNAI的详细的N6数据路由信息。若AF发生变换,则AF在回复消息中包含AF切换的指示,包含Target AF ID,并向NEF通知Target AF的目标地址(Target Address)。606a, the AF sends a reply message to the NEF, or the AF sends a reply message to the NEF after redeploying the application to Target DNAI. The reply message carries the detailed N6 data routing information corresponding to Target DNAI. If the AF changes, the AF includes the AF switching indication, including the Target AF ID, in the reply message, and notifies the NEF of the Target AF's target address (Target Address).
示例性地,AF可以通过服务化接口消息向NEF发送回复消息。比如,服务化接口消息为Nnef_TrafficInfluence_AppRelocationinfo。Illustratively, the AF may send a reply message to the NEF through a serviced interface message. For example, the service interface message is Nnef_TrafficInfluence_AppRelocationinfo.
606b,当NEF收到AF的回复消息后,NEF触发相匹配的通知消息通知SMF应用的重部署信息(主要包括应用重部署的Target DNAI的N6数据路由信息)。606b, after the NEF receives the reply message from the AF, the NEF triggers a matching notification message to notify the SMF of the redeployment information of the application (mainly including the N6 data routing information of the Target DNAI of the application redeployment).
示例性地,NEF可以通过服务化接口消息向SMF发送回复消息。比如,服务化接口消息为Nsmf_TrafficInfluence_AppRelocationinfo。Illustratively, the NEF may send a reply message to the SMF through a serviced interface message. For example, the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
605c,若AF订阅的是直接通知的late notification,则SMF向AF发送late notification。late notification包括当前PDU Session的Target DNAI。AF收到SMF的late notification后,AF检测自己是否可以服务Target DNAI,若需要更换AF实体,则AF选取用于Target DNAI的Target AF并进行AF迁移。605c, if the AF subscribes to the late notification of the direct notification, the SMF sends the late notification to the AF. The late notification includes the Target DNAI of the current PDU Session. After the AF receives the late notification from the SMF, the AF detects whether it can serve the Target DNAI. If the AF entity needs to be replaced, the AF selects the Target AF for the Target DNAI and performs AF migration.
示例性地,SMF可以通过服务化接口消息向AF发送late notification。服务化接口消息可以是Nsmf_trafficInfluence_Notify(late notification)。Exemplarily, the SMF may send a late notification to the AF through a serviceable interface message. The service interface message can be Nsmf_trafficInfluence_Notify(late notification).
606c,AF向SMF发送回复消息,或AF经过对Target DNAI的应用重部署之后向SMF发送回复消息。回复消息携带对应Target DNAI的详细的N6数据路由信息。若AF发生变换,则AF在回复消息中包含AF切换的指示,包含Target AF ID,并向SMF通知Target AF的目标地址(Target Address)。606c, the AF sends a reply message to the SMF, or the AF sends a reply message to the SMF after redeploying the application to Target DNAI. The reply message carries the detailed N6 data routing information corresponding to Target DNAI. If the AF changes, the AF includes the AF switching indication in the reply message, including the Target AF ID, and notifies the SMF of the Target AF's target address (Target Address).
示例性地,AF可以通过服务化接口消息向SMF发送回复消息。比如,服务化接口消息为Nsmf_TrafficInfluence_AppRelocationinfo。Illustratively, the AF may send a reply message to the SMF through a serviced interface message. For example, the service interface message is Nsmf_TrafficInfluence_AppRelocationinfo.
下面针对IKE SA和IPsec子SA的建立流程进行描述。参见图7所示,701-702为IKE SA的建立流程。703-704为IPsec子SA的建立流程。IKE SA建立完成后,后续的IPsec子SA建立流程中交互的信息均可以通过IKE SA加密传输。而IPsec子SA建立完成后,属于该IPsec子SA的数据包均由该IPsec子SA加密传输。图7的中括号中的信息为可选项,大括号中的信息由IKE SA加密保护。The following describes the process of establishing an IKE SA and an IPsec sub-SA. Referring to Fig. 7, 701-702 are the establishment flow of IKE SA. Steps 703 to 704 are procedures for establishing an IPsec sub-SA. After the IKE SA is established, the information exchanged in the subsequent IPsec sub-SA establishment process can be encrypted and transmitted through the IKE SA. After the establishment of the IPsec sub-SA is completed, the data packets belonging to the IPsec sub-SA are encrypted and transmitted by the IPsec sub-SA. The information in square brackets in Figure 7 is optional, and the information in curly brackets is encrypted and protected by IKE SA.
701,发起者向回应者发起用于建立IKE SA的消息1,消息1包含HDR、SAi1、KEi1或者Ni中的一项或多项。HDR表示IKE头(header),HDR中包括安全策略索引(Security Parameter Indexes,SPI)(用于查找安全策略参数)、IKE协议版本号、交换类型(传输类型还是隧道类型)、消息标识(Message ID)、其他类型的标识(Flag)。SAi1表示发起者支持的加密算法,KEi1表示发起者的密钥交换材料,KEi1包含发起者的Diffie-Hellman值,用于生成加密材料。Ni表示发起者的随机数,用于生成密钥或者用于加密等。701, the initiator initiates a message 1 for establishing an IKE SA to the responder, where the message 1 includes one or more of HDR, SAi1, KEi1, or Ni. HDR stands for IKE header, and HDR includes Security Parameter Indexes (SPI) (used to find security policy parameters), IKE protocol version number, exchange type (transmission type or tunnel type), and message ID (Message ID). ), other types of flags (Flag). SAi1 represents the encryption algorithm supported by the initiator, KEi1 represents the key exchange material of the initiator, and KEi1 contains the Diffie-Hellman value of the initiator, which is used to generate the encryption material. Ni represents the random number of the initiator, which is used to generate a key or for encryption, etc.
702,回应者向发起者发送消息2,消息2用于回应消息1,消息2中包含HDR、SAr1、KEr1或者Nr中的一项或多项。SAr1表示回应者支持的加密算法,KEr1表示回应者的密钥交换材料。KEr1包括回应者的Diffie-Hellman值,用于生成加密材料。Nr表示回应者的随机数,用于生成密钥或者用于加密等。消息2还可以包含身份验证请求。此时双方均已获得对方的KE和随机数,可以生成相同的SKEYSEED,用于生成后续所有的密钥。702, the responder sends a message 2 to the initiator, where the message 2 is used to respond to the message 1, and the message 2 includes one or more of HDR, SAr1, KEr1, or Nr. SAr1 represents the encryption algorithm supported by the responder, and KEr1 represents the key exchange material of the responder. KEr1 includes the responder's Diffie-Hellman value, which is used to generate the cryptographic material. Nr represents the random number of the responder, which is used to generate a key or for encryption, etc. Message 2 may also contain an authentication request. At this point, both parties have obtained the other party's KE and random number, and can generate the same SKEYSEED for generating all subsequent keys.
703,发起者向回应者发起用于建立IPSec子SA的消息3,消息3包含HDR、SK{IDi、AUTH、SAi2、TSi、TSr}。其中,SK{}表示使用IKE SA对大括号中的内容进行加密。可选地,消息3中还可以包括[CERT]或[CERTREQ]中的一项或多项。其中IDi和AUTH用于鉴权验证和完整性保护。Idi表示发起者的身份信息指示符(Identification-Initiator)。AUTH(authentication)表示身份认证。CERT表示证书(certificate)。CERTREQ表示认证请求(certificate request)。SAi2表示发起者的IPSec子SA使用的加密算法,TSi和TSr为应用于该子SA加密的数据包过滤规则。TSi可以包括IP地址或者IP地址段。TSr可以包括IP地址或者IP地址段。针对发起者来说,若从发起者发送的数据包的源地址在该TSi的IP地址范围内,目标地址在该TSr的IP地址范围内,需要使用该子SA加密。针对回应者来 说,若从发起者发送的数据包的源地址在该TSi的IP地址范围内,目标地址在该TSr的IP地址范围内,需要使用该子SA解密。或者,针对发起者来说,若从回应者发送的数据包的目标地址在该TSi的IP地址范围内,源地址在该TSr的IP地址范围内,需要是使用该SA解密。针对回应者来说,若从回应者发送的数据包的源地址在该TSr的IP地址范围内,目的地址在该TSi的IP地址范围内,需要使用该子SA加密。703, the initiator initiates a message 3 for establishing an IPSec sub-SA to the responder, and the message 3 includes HDR, SK{IDi, AUTH, SAi2, TSi, TSr}. Among them, SK{} means to use IKE SA to encrypt the content in curly brackets. Optionally, message 3 may also include one or more of [CERT] or [CERTREQ]. Among them, IDi and AUTH are used for authentication verification and integrity protection. Idi represents the identity information indicator (Identification-Initiator) of the initiator. AUTH (authentication) means authentication. CERT stands for certificate. CERTREQ stands for certificate request. SAi2 represents the encryption algorithm used by the IPSec sub-SA of the initiator, and TSi and TSr are the packet filtering rules applied to the encryption of this sub-SA. TSi may include IP addresses or IP address segments. The TSr may include an IP address or an IP address segment. For the initiator, if the source address of the data packet sent from the initiator is within the IP address range of the TSi and the destination address is within the IP address range of the TSr, the sub-SA needs to be encrypted. For the responder, if the source address of the data packet sent from the initiator is within the IP address range of the TSi and the destination address is within the IP address range of the TSr, the sub-SA needs to be decrypted. Or, for the initiator, if the destination address of the data packet sent from the responder is within the IP address range of the TSi, and the source address is within the IP address range of the TSr, the SA needs to be decrypted. For the responder, if the source address of the data packet sent from the responder is within the IP address range of the TSr, and the destination address is within the IP address range of the TSi, the sub-SA needs to be encrypted.
704,回应者向发起者回应消息4。消息4中包括HDR、SK{IDr、AUTH、SAr2、TSi、TSr}。可选地,消息4中还可以包括[CERT]。IDr表示回应者的身份信息指示符。AUTH(authentication)表示身份认证。CERT表示证书(certificate)。SAr2表示回应者的IPSec子SA使用的加密算法,TSi和TSr为应用于该子SA加密的数据包过滤规则。704, the responder responds with message 4 to the initiator. Message 4 includes HDR, SK{IDr, AUTH, SAr2, TSi, TSr}. Optionally, [CERT] may also be included in message 4. IDr represents the identity information indicator of the responder. AUTH (authentication) means authentication. CERT stands for certificate. SAr2 represents the encryption algorithm used by the responder's IPSec sub-SA, and TSi and TSr are the packet filtering rules applied to the encryption of this sub-SA.
在一些实施例中,步骤703和704可以进行多次执行,并且使用IKE SA进行加密保护,以建立多组IPsec子SA进行数据传输。应理解的是,IPsec子SA的建立的发起方可以为IKE SA的发起方,也可以为IKE SA的回应方。In some embodiments, steps 703 and 704 may be performed multiple times, and IKE SAs are used for encryption protection to establish multiple groups of IPsec sub-SAs for data transmission. It should be understood that the initiator of the establishment of the IPsec sub-SA may be the initiator of the IKE SA, or the responder of the IKE SA.
目前为了实现IPsec端到端(end to end,E2E)的加密,一种可能的实现方式是在每个PSA(UPF)后部署一个安全网关,以实现对终端设备传输的用户面数据的端到端的加密。以MEC场景为例,参见图8所示。图8中,中心(central)UPF,为会话的锚点UPF,位于远端集中的数据中心。远端数据中心中的APP服务器1(server1)可以通过该central UPF向终端设备发送用户面数据,比如用户面的APP数据。图8中,ULCL/BP,可以看作一种特殊的UPF,位于距离终端设备更近的边缘节点,可以与部署在边缘机房的APP Server2进行连接,并转发用户面的APP数据。ULCL/BP用于对终端设备的流量进行分流,即可以将部分终端设备的APP数据发送到离UE更近的APP Server2上处理。图8中,安全网关,是部署于UPF与APP服务器之间IPsec网关,主要用于对APP的数据进行加密。以保证APP数据在终端设备到达安全网关之间传输路径中的加密状态,即保障APP数据在核心网侧以及基站侧(比如RAN侧)均不可见。从上可以看出,为了保障端到端侧的数据传输的安全性,在central UPF和ULCL/BP后都需要部署独立的安全网关。终端设备业务发生更新或者终端设备位置发生变化,可能会触发新的ULCL/BP的插入且导致安全网关发生变化,或者触发ULCL/BP和安全网关的更新。比如,原来服务于终端设备的服务器为APP server1,然后由于终端设备的业务更新,由原来服务器终端设备的APP server1需要切换到APP server2,因此,需要触发新的ULCL/BP的插入以及更新安全网关,由原来的安全网关1切换到安全网关2。具体的,服务器的调整主要由AF influence traffic routing相关流程实现(比如,参见图4的相关描述),可以先由AF通过PCF向SMF提供相关应用服务器可用的DNAI(即应用服务器所在的接入网实体),SMF因终端设备移动或检测到终端设备对应的数据流后,触发新的ULCL/BP插入流程(比如参见图5的相关描述),在完成ULCL/BP的选择后,向AF通知DNAI变化,并通过AF notification流程(比如参见图6的相关描述)获取ULCL/BP所需的N6配置选项和相关路由规则,再对ULCL/BP进行配置。然后为了保障用户面数据的安全性,进一步执行安全网关2的IKE SA和IPsec SA的建立。由于目前的方案中,每次发生ULCL/BP插入或者切换,都需要与新的安全网关重新建立IKE SA和IPsecSA,导致流程较复杂,造成资源浪费。另外,在一些MEC应用场景中,终端设备并不能感知到ULCL的插入以及应用服务器的变化,导致核心网无法通知终端设备进行安全网关的切换,从而导致一些MEC场景下,无法实现端到端的安全 保护。At present, in order to realize the end-to-end (E2E) encryption of IPsec, a possible implementation method is to deploy a security gateway after each PSA (UPF) to realize end-to-end user plane data transmitted by terminal devices. side encryption. Taking the MEC scenario as an example, see Figure 8. In FIG. 8 , the central UPF, which is the anchor UPF of the session, is located in the centralized data center at the far end. The APP server 1 (server1) in the remote data center can send user plane data, such as user plane APP data, to the terminal device through the central UPF. In Figure 8, ULCL/BP can be regarded as a special UPF. It is located at the edge node closer to the terminal device. It can connect with the APP Server2 deployed in the edge computer room and forward the APP data on the user plane. ULCL/BP is used to offload the traffic of the terminal device, that is, the APP data of some terminal devices can be sent to the APP Server2 which is closer to the UE for processing. In Figure 8, the security gateway is an IPsec gateway deployed between the UPF and the APP server, and is mainly used to encrypt the data of the APP. In order to ensure the encrypted state of the APP data in the transmission path between the terminal device and the security gateway, that is, to ensure that the APP data is invisible on the core network side and the base station side (such as the RAN side). As can be seen from the above, in order to ensure the security of data transmission on the end-to-end side, an independent security gateway needs to be deployed after the central UPF and ULCL/BP. When the service of the terminal device is updated or the location of the terminal device changes, the insertion of a new ULCL/BP may be triggered and the security gateway may be changed, or the update of the ULCL/BP and the security gateway may be triggered. For example, the original server serving the terminal device is APP server1, and then due to the service update of the terminal device, the APP server1 of the original server terminal device needs to be switched to APP server2. Therefore, it is necessary to trigger the insertion of a new ULCL/BP and update the security gateway , switch from the original security gateway 1 to the security gateway 2. Specifically, the adjustment of the server is mainly realized by the AF influence traffic routing related process (for example, see the relevant description in Figure 4), and the AF can first provide the DNAI available to the relevant application server to the SMF through the PCF (that is, the access network where the application server is located). entity), the SMF triggers a new ULCL/BP insertion process (for example, refer to the relevant description in Figure 5) due to the movement of the terminal device or detects the data flow corresponding to the terminal device, and after the selection of ULCL/BP is completed, it notifies the AF to the DNAI change, and obtain the N6 configuration options and related routing rules required by the ULCL/BP through the AF notification process (for example, see the relevant description in Figure 6), and then configure the ULCL/BP. Then, in order to ensure the security of the user plane data, the establishment of the IKE SA and the IPsec SA of the security gateway 2 is further performed. In the current solution, every time ULCL/BP insertion or switching occurs, IKE SA and IPsec SA need to be re-established with the new security gateway, which leads to a complicated process and waste of resources. In addition, in some MEC application scenarios, the terminal device cannot perceive the insertion of the ULCL and the change of the application server, so that the core network cannot notify the terminal device to switch the security gateway, resulting in the inability to achieve end-to-end security in some MEC scenarios. Protect.
基于此,本申请实施例提供一种通信方法及装置,通过部署集中式的安全网关。集中式的安全网关用于与终端设备之间建立IKE SA。集中式的安全网关负载管理密钥的生成和分配。而为用户面数据传输提供安全保护的安全网关采用分布式部署,可以在ULCL/BP后部署分布式的安全网关,用于与终端设备之间建立用户面的IPsec子SA连接。本申请实施例中集中式的安全网关代替分布式的安全网关创建与终端设备的IPsec子SA连接,或者说集中式的安全网关为分布式的安全网关创建与终端设备的IPsec子SA连接。举例来说,集中式的安全网关可以为分布式的安全网关建立传输模式的IPsec子SA。Based on this, the embodiments of the present application provide a communication method and apparatus, by deploying a centralized security gateway. A centralized security gateway is used to establish IKE SAs with end devices. Centralized security gateway overhead manages key generation and distribution. The security gateway that provides security protection for user plane data transmission adopts distributed deployment. Distributed security gateways can be deployed after ULCL/BP to establish user plane IPsec sub-SA connections with terminal devices. In the embodiment of the present application, the centralized security gateway replaces the distributed security gateway to create an IPsec sub-SA connection with the terminal device, or the centralized security gateway creates an IPsec sub-SA connection with the terminal device for the distributed security gateway. For example, a centralized security gateway may establish transport-mode IPsec sub-SAs for distributed security gateways.
参见图9所示,为本申请实施例提供的一种通信系统架构示意图。通信系统中包括第一安全网关和第二安全网关。第一安全网关也可以称为集中式的安全网关。第一安全网关用于提供IKE SA的安全保护,第一安全网关也可以称为IKE网关。第二安全网关可以称为分布式的安全网关。第二安全网关用于提供IPsec SA的安全保护,第二安全网关也可以称为IPsec网关。第一安全网关可以部署于数据中心。第二安全网关可以分布式部署于各个PSA与应用服务器之间。通信系统中还包括第一核心网网元、第二核心网网元。作为一种举例,第一核心网网元可以包括会话管理网元,第二核心网网元可以包括移动性管理网元或者策略控制网元。以5G通信网络架构为例,会话管理网元可以为SMF,移动性管理网元可以是AMF,策略控制网元可以是PCF。示例性的,通信系统中还可以包括用户面网元。Referring to FIG. 9 , a schematic diagram of the architecture of a communication system provided by an embodiment of the present application is shown. The communication system includes a first security gateway and a second security gateway. The first security gateway may also be referred to as a centralized security gateway. The first security gateway is used to provide security protection of the IKE SA, and the first security gateway may also be referred to as an IKE gateway. The second security gateway may be referred to as a distributed security gateway. The second security gateway is used to provide security protection of the IPsec SA, and the second security gateway may also be referred to as an IPsec gateway. The first security gateway may be deployed in a data center. The second security gateway may be distributed and deployed between each PSA and the application server. The communication system further includes network elements of the first core network and network elements of the second core network. As an example, the first core network network element may include a session management network element, and the second core network network element may include a mobility management network element or a policy control network element. Taking the 5G communication network architecture as an example, the session management network element may be SMF, the mobility management network element may be AMF, and the policy control network element may be PCF. Exemplarily, the communication system may further include a user plane network element.
下面结合图9所示的通信系统架构,对本申请实施例提供的方案进行描述。参见图10所示,为本申请实施例提供的一种通信方法流程示意图。The solution provided by the embodiment of the present application is described below with reference to the communication system architecture shown in FIG. 9 . Referring to FIG. 10 , a schematic flowchart of a communication method provided by an embodiment of the present application is shown.
1001,第一安全网关与终端设备建立IKE SA连接。1001, the first security gateway establishes an IKE SA connection with a terminal device.
1002,第一安全网关在确定需要通过第二安全网关进行用户面数据的安全传输时,为第二安全网关建立IPsec子SA连接。其中,所述IPsec子SA连接用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。1002. The first security gateway establishes an IPsec sub-SA connection for the second security gateway when it is determined that the user plane data needs to be securely transmitted through the second security gateway. The IPsec sub-SA connection is used for secure transmission of user plane data between the second security gateway and the terminal device.
示例性地,在终端设备上端到端的安全业务需要切换到EAS服务器,在该场景下,需要插入ULCL/BP并更换安全网关,因此,确定终端设备与EAS服务器之间的用户面数据需要通过第二安全网关进行安全传输。Exemplarily, the end-to-end security service on the terminal device needs to be switched to the EAS server. In this scenario, the ULCL/BP needs to be inserted and the security gateway needs to be replaced. Therefore, it is necessary to determine the user plane data between the terminal device and the EAS server. Two security gateways for secure transmission.
一种可能的实施方式中,第一安全网关在为第二安全网关建立IPsec子SA连接时,可以通过以下任意方式来实现:In a possible implementation manner, when the first security gateway establishes an IPsec sub-SA connection for the second security gateway, it may be implemented in any of the following ways:
第一种可能的实施方式中,第一安全网关可以代替第二安全网关与终端设备之间进行IPsec子SA连接的协商得到第一安全参数,第二安全网关不参与IPsec子SA连接的协商,然后将协商得到的安全参数配置给第二安全网关,以供第二安全网关使用。第一安全参数用于第二安全网关与终端设备之间进行用户面数据的安全传输。示例性地,第一安全参数中可以包括用于生成与终端设备之间进行用户面数据传输的密钥的材料。比如材料可以包括第一安全网关生成的密钥材料、终端设备的密钥交换材料、为第二安全网关配置的密钥交换材料、终端设备的随机数或者为第二安全网关生成的随机数。In a first possible implementation manner, the first security gateway may obtain the first security parameter by negotiating the IPsec sub-SA connection between the second security gateway and the terminal device instead of the second security gateway, and the second security gateway does not participate in the negotiation of the IPsec sub-SA connection, Then, the negotiated security parameters are configured to the second security gateway for use by the second security gateway. The first security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device. Exemplarily, the first security parameter may include material for generating a key for user plane data transmission with the terminal device. For example, the material may include key material generated by the first security gateway, key exchange material of the terminal device, key exchange material configured for the second security gateway, random numbers of the terminal device or random numbers generated for the second security gateway.
作为一种示例,第二安全网关可以根据第一安全网关提供的材料来生成密钥材料。例如,参见如下公式(1)所示。As an example, the second security gateway may generate key material according to the material provided by the first security gateway. For example, see the formula (1) below.
KEYMAT=prf+(SK_d,Ni|Nr)    公式(1)KEYMAT=prf+(SK_d,Ni|Nr) Formula (1)
其中,KEYMAT(keying material)表示第二安全网关生成的密钥材料。Prf表示伪随 机函数。Ni表示终端设备的随机数,Nr表示为第二安全网关生成的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。Wherein, KEYMAT (keying material) represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents a random number of the terminal device, and Nr represents a random number generated by the second security gateway. SK_d represents the key material derived on the basis of IKE SA.
作为另一种示例,第二安全网关可以根据第一安全网关提供的材料生成密钥材料。例如,参见如下公式(2)所示。As another example, the second security gateway may generate key material according to the material provided by the first security gateway. For example, see the formula (2) below.
KEYMAT=prf+(SK_d,g^ir|Ni|Nr)   公式(2)KEYMAT=prf+(SK_d,g^ir|Ni|Nr) Formula (2)
其中,KEYMAT表示第二安全网关生成的密钥材料。Prf表示伪随机函数。Ni表示终端设备的随机数,Nr表示为第二安全网关生成的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。g^ir根据KEi和KEr生成。KEi表示终端设备的密钥交换材料、KEr表示为第二安全网关配置的密钥交换材料。Wherein, KEYMAT represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents a random number of the terminal device, and Nr represents a random number generated by the second security gateway. SK_d represents the key material derived on the basis of IKE SA. g^ir is generated from KEi and KEr. KEi represents the key exchange material of the terminal device, and KEr represents the key exchange material configured for the second security gateway.
作为一种示例,如下示例性的描述SK_d的生成方式,参见公式(3)和公式(4)所示。As an example, the generation manner of SK_d is exemplarily described below, as shown in formula (3) and formula (4).
SK_d=prf+(SKEYSEED,Ni1|Nr1|SPIi|SPIr)    公式(3)SK_d=prf+(SKEYSEED,Ni1|Nr1|SPIi|SPIr) Formula (3)
SKEYSEED=prf(Ni1|Nr1,g^ir)     公式(4)SKEYSEED=prf(Ni1|Nr1,g^ir) Formula (4)
其中,SPIi和SPIr表示发起者和响应者的安全关联索引值。g^ir根据KEi1和KEr1生成。KEi1表示IKE SA协商阶段中,终端设备的密钥交换材料。KEr1表示IKE SA协商阶段中,第一安全网关的密钥交换材料。Ni1表示IKE SA协商阶段中,终端设备的随机数,Nr1表示IKE SA协商阶段中,第一安全网关的随机数。Among them, SPIi and SPIr represent the security association index values of the initiator and the responder. g^ir is generated from KEi1 and KEr1. KEi1 represents the key exchange material of the terminal device in the IKE SA negotiation phase. KEr1 represents the key exchange material of the first security gateway in the IKE SA negotiation phase. Ni1 represents the random number of the terminal device in the IKE SA negotiation phase, and Nr1 represents the random number of the first security gateway in the IKE SA negotiation phase.
在一些实施例中,第一安全参数还可以包括如下一项或者多项:In some embodiments, the first security parameter may further include one or more of the following:
所述终端设备的加密算法,为所述第二安全网关分配的加密算法,用于所述终端设备与所述第二安全网关之间进行用户面数据传输的数据包过滤规则。作为一种举例,数据包过滤规则中可以TSi和TSr。TSi可以包括IP地址或者IP地址段。TSr可以包括IP地址或者IP地址段。针对发起者来说,若从发起者发送的数据包的源地址在该TSi的IP地址范围内,目标地址在该TSr的IP地址范围内,需要使用该子SA加密。针对回应者来说,若从发起者发送的数据包的源地址在该TSi的IP地址范围内,目标地址在该TSr的IP地址范围内,需要使用该子SA解密。或者,针对发起者来说,若从回应者发送的数据包的目标地址在该TSi的IP地址范围内,源地址在该TSr的IP地址范围内,需要是使用该SA解密。针对回应者来说,若从回应者发送的数据包的源地址在该TSr的IP地址范围内,目的地址在该TSi的IP地址范围内,需要使用该子SA加密。在本实施例中,发起者为终端设备,回应者可以认为是第二安全网关。The encryption algorithm of the terminal device is the encryption algorithm allocated by the second security gateway, and is used for the packet filtering rule for user plane data transmission between the terminal device and the second security gateway. As an example, TSi and TSr can be included in the packet filtering rule. TSi may include IP addresses or IP address segments. The TSr may include an IP address or an IP address segment. For the initiator, if the source address of the data packet sent from the initiator is within the IP address range of the TSi and the destination address is within the IP address range of the TSr, the sub-SA needs to be encrypted. For the responder, if the source address of the data packet sent from the initiator is within the IP address range of the TSi, and the destination address is within the IP address range of the TSr, the sub-SA needs to be decrypted. Or, for the initiator, if the destination address of the data packet sent from the responder is within the IP address range of the TSi, and the source address is within the IP address range of the TSr, the SA needs to be decrypted. For the responder, if the source address of the data packet sent from the responder is within the IP address range of the TSr, and the destination address is within the IP address range of the TSi, the sub-SA needs to be encrypted. In this embodiment, the initiator is a terminal device, and the responder can be considered as the second security gateway.
在一些实施例中,第一安全网关与终端设备协商得到第一安全参数后,可以根据第一安全参数生成KEYMAT,比如,采用公式(1)或者公式(2)的方式,然后将生成的KEYMAT发送给第二安全网关。KEYMAT为一段二进制数据串。从而第二安全网关可以从KEYMAT截取一部分位数作为IPsec子SA的加密密钥或者解密秘钥。In some embodiments, after the first security gateway negotiates with the terminal device and obtains the first security parameter, the KEYMAT may be generated according to the first security parameter, for example, using formula (1) or formula (2), and then the generated KEYMAT sent to the second security gateway. KEYMAT is a binary data string. Therefore, the second security gateway can intercept a part of the bits from the KEYMAT as the encryption key or decryption key of the IPsec sub-SA.
第二种可能的实施方式,第二安全网关可以参与第一安全网关与终端设备之间的IPsec子SA连接的协商。第一安全网关可以在与终端设备协商过程中,为第二安全网关配置安全参数,第二安全网关接收到安全参数后可以进行确认或者修改,第二安全网关可以将修改或者确认的安全参数发送给第一安全网关,第一安全网关将经过第二安全网关修改或者确认的安全参数作为自身的协商结果发送给终端设备。In a second possible implementation manner, the second security gateway may participate in the negotiation of the IPsec sub-SA connection between the first security gateway and the terminal device. The first security gateway may configure security parameters for the second security gateway during the negotiation process with the terminal device, the second security gateway may confirm or modify the security parameters after receiving the security parameters, and the second security gateway may send the modified or confirmed security parameters. To the first security gateway, the first security gateway sends the security parameters modified or confirmed by the second security gateway to the terminal device as its own negotiation result.
第三种可能的实施方式,第一安全网关与终端设备之间执行两次IPsec子SA的协商。第一次协商,第一安全网关与终端设备之间进行IPsec子SA连接的协商。第二次协商,第 一安全网关作为中间代理网元,负责转发第二安全网关与终端设备之间进行IPsec子SA连接的协商的信令消息。需要说明的是,针对终端设备来说能够感知的协商对象是第一安全网关,并不感知第二安全网关。In a third possible implementation manner, the IPsec sub-SA negotiation is performed twice between the first security gateway and the terminal device. For the first negotiation, the first security gateway and the terminal device negotiate the IPsec sub-SA connection. In the second negotiation, the first security gateway, as an intermediate proxy network element, is responsible for forwarding the signaling message for negotiating the IPsec sub-SA connection between the second security gateway and the terminal device. It should be noted that the negotiation object that the terminal device can perceive is the first security gateway, and does not perceive the second security gateway.
下面结合图11A对上述第一种可能的实施方式进行描述。The above-mentioned first possible implementation manner will be described below with reference to FIG. 11A .
1101a,参见1001,此处不再赘述。1101a, refer to 1001, which will not be repeated here.
1102a,终端设备向第一安全网关发起建立请求,从而第一安全网关接收终端设备发起的建立请求,建立请求用于请求与第一安全网关建立IPsec子SA连接。应理解的是,对于终端设备来说,并不感知第二安全网关,仅与第一安全网关进行消息交互,而实际上是第一安全网关代替第二安全网关建立IPsec子SA连接。1102a, the terminal device initiates an establishment request to the first security gateway, so that the first security gateway receives the establishment request initiated by the terminal device, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway. It should be understood that the terminal device does not perceive the second security gateway and only exchanges messages with the first security gateway, but actually the first security gateway establishes the IPsec sub-SA connection instead of the second security gateway.
一些实施例中,建立请求中可以包括终端设备的加密算法、终端设备的密钥交换材料。建立请求中还可以包括使用IPsec子SA连接进行用户面数据传输的数据包过滤规则。In some embodiments, the establishment request may include the encryption algorithm of the terminal device and the key exchange material of the terminal device. The establishment request may also include a packet filtering rule for using the IPsec sub-SA connection to transmit data on the user plane.
作为一种举例,SAi表示终端设备的加密算法。KEi表示终端设备的密钥交换材料。TSi和TSr表示使用IPsec子SA连接进行用户面数据传输的数据包过滤规则。可以理解的是,TSi表示终端设备的IP地址或者IP地址段。TSr表示目标应用服务器的IP地址段,可以理解为第二安全网关的IP地址段。建立请求中还可以包括终端设备的随机数,以通过Ni表示为例。As an example, SAi represents the encryption algorithm of the terminal device. KEi represents the key exchange material for the end device. TSi and TSr represent packet filtering rules for user plane data transmission using IPsec sub-SA connections. It can be understood that TSi represents the IP address or IP address segment of the terminal device. TSr represents the IP address segment of the target application server, which may be understood as the IP address segment of the second security gateway. The establishment request may also include a random number of the terminal device, which is represented by Ni as an example.
1103a,第一安全网关向第二安全网关发送IPsec子SA连接的第一安全参数。1103a, the first security gateway sends the first security parameter of the IPsec sub-SA connection to the second security gateway.
示例性地,第一安全参数中可以包括用于生成与终端设备之间进行用户面数据传输的密钥的材料。Exemplarily, the first security parameter may include material for generating a key for user plane data transmission with the terminal device.
示例性地,第一安全参数包括如下一项或者多项第一安全网关生成的密钥材料(SK_d)、终端设备的密钥交换材料(KEi)、为第二安全网关配置的密钥交换材料(KEr)、终端设备的随机数(Ni)或者为第二安全网关生成的随机数(Nr)。Exemplarily, the first security parameter includes one or more of the following key material (SK_d) generated by the first security gateway, key exchange material (KEi) of the terminal device, and key exchange material configured for the second security gateway: (KEr), a random number (Ni) of the terminal device, or a random number (Nr) generated for the second security gateway.
一些实施例中,第一安全参数还可以包括SAi、SAr。SAr表示为第二安全网关配置的加密算法。第一安全参数中还可以包括TSi和TSr。一种可能的示例中,第一安全网关还可以根据TSr以及配置信息为第二安全网关更新TSr,比如更新后的TSr通过TSr*表示,则第一安全参数中包括的TSi和更新的TSr(即TSr*)。In some embodiments, the first security parameter may further include SAi and SAr. SAr represents the encryption algorithm configured for the second security gateway. The first security parameter may also include TSi and TSr. In a possible example, the first security gateway may also update the TSr for the second security gateway according to the TSr and the configuration information. For example, the updated TSr is represented by TSr*, then the TSi included in the first security parameter and the updated TSr( i.e. TSr*).
1104a,第二安全网关接收到第一安全参数后,向所述第一安全参数发送确认消息,确认消息用于指示已收到第一安全参数。1104a, after receiving the first security parameter, the second security gateway sends a confirmation message to the first security parameter, where the confirmation message is used to indicate that the first security parameter has been received.
需要说明的是,1104a作为一个可选的步骤,也可以不执行,第一安全网关在执行1103a后,直接执行1105a。It should be noted that, as an optional step, 1104a may not be executed, and the first security gateway directly executes 1105a after executing 1103a.
1105a,第一安全网关向终端设备发送建立响应,建立响应中包括第一安全参数。1105a, the first security gateway sends a setup response to the terminal device, where the setup response includes the first security parameter.
下面结合图11B对上述第二种可能的实施方式进行描述。The above-mentioned second possible implementation manner will be described below with reference to FIG. 11B .
1101b,参见1001,此处不再赘述。1101b, refer to 1001, which will not be repeated here.
1102b,终端设备向第一安全网关发起建立请求,从而第一安全网关接收终端设备发起的建立请求,建立请求用于请求与第一安全网关建立IPsec子SA连接。应理解的是,对于终端设备来说,并不感知第二安全网关,仅与第一安全网关进行消息交互,而实际上是第一安全网关代替第二安全网关建立IPsec子SA连接。1102b, the terminal device initiates an establishment request to the first security gateway, so that the first security gateway receives the establishment request initiated by the terminal device, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway. It should be understood that the terminal device does not perceive the second security gateway and only exchanges messages with the first security gateway, but actually the first security gateway establishes the IPsec sub-SA connection instead of the second security gateway.
一些实施例中,建立请求中可以包括SAi、KEi、TSi或者TSr。SAi表示终端设备的加密算法。KEi表示终端设备的密钥交换材料。TSi和TSr表示使用所述IPsec子SA连接传输用户面数据的数据包过滤规则。建立请求中还可以包括Ni,Ni为终端设备的随机数。In some embodiments, the setup request may include SAi, KEi, TSi or TSr. SAi represents the encryption algorithm of the terminal device. KEi represents the key exchange material for the end device. TSi and TSr represent packet filtering rules for transmitting user plane data using the IPsec sub-SA connection. The establishment request may also include Ni, where Ni is a random number of the terminal device.
1103b,第一安全网关向第二安全网关发送IPsec子SA连接的配置上下文,配置上下文包括为第二安全网关配置的用于与终端设备建立IPsec子SA连接的第二安全参数。1103b, the first security gateway sends a configuration context of the IPsec sub-SA connection to the second security gateway, where the configuration context includes second security parameters configured for the second security gateway and used to establish an IPsec sub-SA connection with the terminal device.
示例性地,所述第二安全参数包括用于所述第二安全网关生成与所述终端设备之间进行用户面数据传输的密钥的材料。Exemplarily, the second security parameter includes material for the second security gateway to generate a key for user plane data transmission between the second security gateway and the terminal device.
一些实施例中,用于生成与所述终端设备之间进行用户面数据传输的密钥的材料包括如下一项或者多项:第一安全网关生成的密钥材料、所述终端设备的密钥交换材料、为所述第二安全网关配置的密钥交换材料、所述终端设备的随机数或者所述第一安全网关的随机数。In some embodiments, the material used to generate the key for user plane data transmission with the terminal device includes one or more of the following: key material generated by the first security gateway, key of the terminal device The exchange material, the key exchange material configured for the second security gateway, the random number of the terminal device or the random number of the first security gateway.
一些实施例中,第二安全参数还可以包括如下一项或多项:终端设备的加密算法、为所述第二安全网关分配的加密算法或者用于所述终端设备与所述第二安全网关之间进行用户面数据传输的第一数据包过滤规则。In some embodiments, the second security parameter may further include one or more of the following: an encryption algorithm of the terminal device, an encryption algorithm allocated to the second security gateway, or an encryption algorithm used for the terminal device and the second security gateway. The first packet filtering rule for user plane data transmission between them.
1104b,第二安全网关接收到第二安全参数后,根据第二安全参数获得第三安全参数,并向第一安全网关发送第三安全参数,第三安全参数是第二安全网关对第二安全参数进行更新或者确认得到的。1104b, after receiving the second security parameter, the second security gateway obtains the third security parameter according to the second security parameter, and sends the third security parameter to the first security gateway. Parameters are updated or confirmed.
在一种可能的实现方式中,所述第三安全参数包括如下一项或者多项:对所述第一密钥交换材料进行更新的第二密钥交换材料、对所述第一随机数进行更新的第二随机数。In a possible implementation manner, the third security parameter includes one or more of the following: a second key exchange material for updating the first key exchange material, a second key exchange material for updating the first key exchange material, a The updated second random number.
一种示例中,第二安全网关对第二安全参数进行确认,则第三安全参数包括的参数与第二安全参数相同。第二安全网关可以根据第二安全参数获得用于与所述终端设备之间进行用户面数据传输的密钥。比如,结合公式(2),KEYMAT 1=prf+(SK_d,g^ir|Ni|Nr)。In an example, the second security gateway confirms the second security parameter, and the parameters included in the third security parameter are the same as the second security parameter. The second security gateway may obtain a key for user plane data transmission with the terminal device according to the second security parameter. For example, in combination with formula (2), KEYMAT 1=prf+(SK_d,g^ir|Ni|Nr).
其中,KEYMAT1表示第二安全网关生成的密钥材料。Prf表示伪随机函数。Ni表示终端设备的随机数,Nr表示第一安全网关生成的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。g^ir根据KEi和KEr生成。KEi表示终端设备的密钥交换材料、KEr表示第一安全网关的第一密钥交换材料。然后进一步地,第二安全网关可以从KEYMAT1获取用于与所述终端设备之间进行用户面数据传输的密钥。Wherein, KEYMAT1 represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents a random number of the terminal device, and Nr represents a random number generated by the first security gateway. SK_d represents the key material derived on the basis of IKE SA. g^ir is generated from KEi and KEr. KEi represents the key exchange material of the terminal device, and KEr represents the first key exchange material of the first security gateway. Then further, the second security gateway may obtain the key for user plane data transmission with the terminal device from KEYMAT1.
另一种示例中,第二安全网关可以对第二安全参数中的第一密钥交换材料进行更新,比如更新为第二密钥交换材料。比如,通过如下公式(5)来生成密钥材料KEYMAT2。In another example, the second security gateway may update the first key exchange material in the second security parameter, for example, to the second key exchange material. For example, the key material KEYMAT2 is generated by the following formula (5).
KEYMAT 2=prf+(SK_d,g^ir(new)|Ni|Nr)      公式(5)KEYMAT 2=prf+(SK_d,g^ir(new)|Ni|Nr) Formula (5)
其中,KEYMAT表示第二安全网关生成的密钥材料。Prf表示伪随机函数。Ni表示终端设备的随机数,Nr表示为第二安全网关生成的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。g^ir(new)根据KEi和KEr*生成。KEi表示终端设备的密钥交换材料、KEr*表示第二密钥交换材料。Wherein, KEYMAT represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents a random number of the terminal device, and Nr represents a random number generated by the second security gateway. SK_d represents the key material derived on the basis of IKE SA. g^ir(new) is generated from KEi and KEr*. KEi represents the key exchange material of the terminal device, and KEr* represents the second key exchange material.
又一种示例中,第二安全网关可以对第二安全参数中的第一密钥交换材料进行更新,比如更新为第二密钥交换材料。还对第一随机数进行更新,比如更新为自身的随机数,即第二随机数。比如,通过如下公式(6)来生成密钥材料KEYMAT3。In another example, the second security gateway may update the first key exchange material in the second security parameter, for example, update it to the second key exchange material. The first random number is also updated, for example, updated to its own random number, that is, the second random number. For example, the key material KEYMAT3 is generated by the following formula (6).
KEYMAT3=prf+(SK_d,g^ir(new)|Ni|Nr*)     公式(6)KEYMAT3=prf+(SK_d,g^ir(new)|Ni|Nr*) Formula (6)
其中,KEYMAT3表示第二安全网关生成的密钥材料。Prf表示伪随机函数。Ni表示终端设备的随机数,Nr*表示第二安全网关的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。g^ir(new)根据KEi和KEr*生成。KEi表示终端设备的密钥交换材料、KEr*表示第二密钥交换材料。Wherein, KEYMAT3 represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents the random number of the terminal device, and Nr* represents the random number of the second security gateway. SK_d represents the key material derived on the basis of IKE SA. g^ir(new) is generated from KEi and KEr*. KEi represents the key exchange material of the terminal device, and KEr* represents the second key exchange material.
再一种示例中,第二安全网关可以对第一随机数进行更新,比如更新为自身的随机数, 即第二随机数。比如,通过如下公式(7)来生成密钥材料KEYMAT4。In another example, the second security gateway may update the first random number, for example, update it to its own random number, that is, the second random number. For example, the key material KEYMAT4 is generated by the following formula (7).
KEYMAT4=prf+(SK_d,g^ir|Ni|Nr*)     公式(7)KEYMAT4=prf+(SK_d,g^ir|Ni|Nr*) Formula (7)
其中,KEYMAT4表示第二安全网关生成的密钥材料。Prf表示伪随机函数。Ni表示终端设备的随机数,Nr*表示第二安全网关的随机数。SK_d表示建立在IKE SA基础上派生的密钥材料。g^ir根据KEi和KEr生成。Wherein, KEYMAT4 represents the key material generated by the second security gateway. Prf stands for pseudo-random function. Ni represents the random number of the terminal device, and Nr* represents the random number of the second security gateway. SK_d represents the key material derived on the basis of IKE SA. g^ir is generated from KEi and KEr.
可选地,第三安全参数中还可以包括SAr*和/或TSr*。SAr*可以是第二安全网关针对SAr更新的加密算法。TSr*可以是第二安全网关针对TSr进行更新后得到的。Optionally, the third security parameter may further include SAr* and/or TSr*. SAr* may be an encryption algorithm updated by the second security gateway for SAr. TSr* may be obtained after the second security gateway updates the TSr.
1105b,第一安全网关向终端设备发送建立响应,建立响应中包括第三安全参数。其中,第三安全参数用于第二安全网关与终端设备之间进行用户面数据的安全传输。1105b, the first security gateway sends a setup response to the terminal device, where the setup response includes the third security parameter. The third security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
下面结合图11c对上述第三种可能的实施方式进行描述。The above-mentioned third possible implementation manner will be described below with reference to FIG. 11c.
1101c,参见1001,此处不再赘述。1101c, refer to 1001, which will not be repeated here.
1102c,终端设备向第一安全网关发起建立请求1,从而第一安全网关接收终端设备发起的建立请求1,建立请求1用于请求与第一安全网关第一建立IPsec子SA连接。1102c, the terminal device initiates an establishment request 1 to the first security gateway, so that the first security gateway receives the establishment request 1 initiated by the terminal device, and the establishment request 1 is used to request the first establishment of an IPsec sub-SA connection with the first security gateway.
1103c,第一安全网关向终端设备发送建立响应1,建立响应1用于响应建立请求1,以完成第一安全网关与终端设备建立第一IPsec子SA连接。1103c, the first security gateway sends an establishment response 1 to the terminal device, where the establishment response 1 is used to respond to the establishment request 1, so as to complete the establishment of the first IPsec sub-SA connection between the first security gateway and the terminal device.
1104c,终端设备向第一安全网关发起建立请求2,从而第一安全网关接收终端设备发起的建立请求2,建立请求2用于请求与第一安全网关建立第二IPsec子SA连接。一些实施例中,建立请求2中可以包括第四安全参数,所述第四安全参数包括终端设备的加密算法、终端设备的密钥交换材料。所述第四安全参数还可以包括使用IPsec子SA连接进行用户面数据传输的数据包过滤规则。例如,通过SAi表示终端设备的加密算法。通过KEi表示终端设备的密钥交换材料。TSi和TSr表示数据包过滤规则。1104c, the terminal device initiates an establishment request 2 to the first security gateway, so that the first security gateway receives the establishment request 2 initiated by the terminal device, and the establishment request 2 is used to request to establish a second IPsec sub-SA connection with the first security gateway. In some embodiments, the establishment request 2 may include a fourth security parameter, where the fourth security parameter includes an encryption algorithm of the terminal device and a key exchange material of the terminal device. The fourth security parameter may further include a packet filtering rule for user plane data transmission using the IPsec sub-SA connection. For example, the encryption algorithm of the terminal device is represented by SAi. The key exchange material of the terminal device is represented by KEi. TSi and TSr represent packet filtering rules.
1105c,第一安全网关接收到建立请求2,将第四安全参数转发给第二安全网关。1105c, the first security gateway receives the establishment request 2, and forwards the fourth security parameter to the second security gateway.
示例性地,第一安全网关还将第一安全网关在IKE SA协商阶段的密钥材料SK_d发送给第二安全网关。Exemplarily, the first security gateway also sends the key material SK_d of the first security gateway in the IKE SA negotiation stage to the second security gateway.
1106c,第二安全网关接收到第四安全参数后,获得与所述第四安全参数匹配的第五安全参数,将第五安全参数发送给第一安全网关。1106c, after receiving the fourth security parameter, the second security gateway obtains a fifth security parameter matching the fourth security parameter, and sends the fifth security parameter to the first security gateway.
示例性地,第五安全参数包括KEr*和SAr*。KEr*包括第二安全网关的密钥交换材料。SAr*包括第二安全网关的加密算法。第五安全参数还可以包括第二安全网关的随机数Nr*。Exemplarily, the fifth security parameter includes KEr* and SAr*. KEr* includes the key exchange material for the second security gateway. SAr* includes the encryption algorithm of the second security gateway. The fifth security parameter may also include a random number Nr* of the second security gateway.
1107c,第一安全网关向终端设备发送建立响应2,建立响应2包括所述第五安全参数(比如包括KEr*、SAr*、Nr*)。建立响应2中还可以包括SAi、KEi、TSi或者TSr*。TSr*可以是第二安全网关对TSr进行更新后得到的。1107c: The first security gateway sends a setup response 2 to the terminal device, where the setup response 2 includes the fifth security parameter (for example, including KEr*, SAr*, and Nr*). The setup response 2 may also include SAi, KEi, TSi or TSr*. The TSr* may be obtained after the second security gateway updates the TSr.
在上述第三种可能的实施方式中,终端设备与第一安全网关进行两次协商,第一次协商,第一安全网关与终端设备之间建立IPsec子SA连接。第二次协商时,第一安全网关实际上并未第二安全网关配置安全参数,而是将终端设备发来的待协商的安全参数转发给第二安全网关,在终端设备上并未感知第二安全网关的存在,而实际上是终端设备与第二安全网关协商建立IPsec子SA连接。In the above third possible implementation manner, the terminal device and the first security gateway negotiate twice, and in the first negotiation, an IPsec sub-SA connection is established between the first security gateway and the terminal device. During the second negotiation, the first security gateway does not actually configure the security parameters for the second security gateway, but forwards the security parameters to be negotiated sent by the terminal device to the second security gateway, and the terminal device does not perceive the security parameters of the second security gateway. The existence of the second security gateway actually means that the terminal device negotiates with the second security gateway to establish an IPsec sub-SA connection.
在一种可能的实施方式中,第一安全网关与终端设备建立IKE SA连接,可以是由终端设备触发建立,也可以是由第一安全网关触发建立IKE SA连接。In a possible implementation manner, the first security gateway establishes the IKE SA connection with the terminal device, which may be triggered by the terminal device, or may be triggered by the first security gateway to establish the IKE SA connection.
一些实施例中,由第一安全网关向终端设备触发建立IKE SA连接,第一核心网网元可以在会话管理流程(比如会话建立/修改流程)中,向第一安全网关发送终端设备的地址 信息。比如地址信息可以是终端设备的IP地址和/或端口号等。进一步地,第一安全网关可以根据终端设备的地址信息向终端设备触发建立IKE SA连接。In some embodiments, the establishment of the IKE SA connection is triggered by the first security gateway to the terminal device, and the first core network element may send the address of the terminal device to the first security gateway in the session management process (such as the session establishment/modification process). information. For example, the address information may be the IP address and/or port number of the terminal device. Further, the first security gateway can trigger the establishment of an IKE SA connection to the terminal device according to the address information of the terminal device.
另一些实施例中,由终端设备向第一安全网关触发建立IKE SA连接,第一核心网网元可以在会话管理流程中,向终端设备发送第一安全网关的地址信息。进一步地,终端设备可以根据第一安全网关的地址信息向第一安全网关触发建立IKE SA连接。In other embodiments, the terminal device triggers the establishment of the IKE SA connection to the first security gateway, and the first core network network element may send the address information of the first security gateway to the terminal device in the session management process. Further, the terminal device can trigger the establishment of an IKE SA connection to the first security gateway according to the address information of the first security gateway.
在一种可能的实施方式中,在第一安全网关代替第二安全网关完成与终端设备之间的IPsec子SA连接建立后,后续属于该IPsec子SA连接的数据包(包括上行数据包或者下行数据包)应该由第二安全网关转发。本申请实施例中,可以由第一核心网网元确定终端设备与第二安全网关之间完成IPsec子SA连接的建立后,向用户面网元配置第二转发规则,所述第二转发规则用于指示用户面网元将属于所述IPsec子SA连接的数据包转发给所述第二安全网关。在建立IPsec子SA连接之前,第一核心网网元确定为终端设备提供安全服务的第一安全网关时,第一核心网网元向用户面网元配置第一转发规则,第一转发规则用于指示用户面网元将所述终端设备的数据包转发给所述第一安全网关。In a possible implementation manner, after the first security gateway replaces the second security gateway and completes the establishment of the IPsec sub-SA connection with the terminal device, subsequent data packets (including uplink data packets or downlink data packets) belonging to the IPsec sub-SA connection data packets) should be forwarded by the second security gateway. In this embodiment of the present application, after the first core network element determines that the IPsec sub-SA connection is established between the terminal device and the second security gateway, a second forwarding rule can be configured on the user plane network element. The second forwarding rule It is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway. Before establishing the IPsec sub-SA connection, when the first core network element determines the first security gateway that provides security services for the terminal device, the first core network element configures the user plane network element with a first forwarding rule, and the first forwarding rule uses to instruct the user plane network element to forward the data packet of the terminal device to the first security gateway.
在一些实施例中,第一核心网网元可以根据终端设备的签约数据确定为终端设备提供安全服务的第一安全网关。例如,第一核心网网元可以从UDM或者UDR中获取终端设备的签约数据。比如,第一核心网网元可以根据终端设备的业务标识从终端设备的签约数据中确定为终端设备提供安全服务的第一安全网关。例如,业务标识可以是DNN或者NSSAI等,业务标识还可以是其它用于标识终端设备的业务的标识。在实施例下,为终端设备提供安全服务的第一安全网关由第一核心网网元来选择。In some embodiments, the network element of the first core network may determine the first security gateway that provides security services for the terminal device according to the subscription data of the terminal device. For example, the network element of the first core network may acquire subscription data of the terminal device from the UDM or the UDR. For example, the network element of the first core network may determine the first security gateway that provides the security service for the terminal device from the subscription data of the terminal device according to the service identifier of the terminal device. For example, the service identifier may be DNN or NSSAI, etc., and the service identifier may also be other identifiers used to identify the service of the terminal device. In an embodiment, the first security gateway that provides security services for the terminal device is selected by the network element of the first core network.
另一些实施例中,第一核心网网元根据本地配置信息确定为终端设备提供安全服务的第一安全网关。比如,第一核心网网元可以根据终端设备的业务标识从本地配置信息中确定为终端设备提供安全服务的第一安全网关。例如,业务标识可以是DNN或者NSSAI等。在实施例下,为终端设备提供安全服务的第一安全网关由第一核心网网元来选择。In other embodiments, the network element of the first core network determines the first security gateway that provides security services for the terminal device according to the local configuration information. For example, the network element of the first core network may determine the first security gateway that provides the security service for the terminal device from the local configuration information according to the service identifier of the terminal device. For example, the service identifier may be DNN or NSSAI or the like. In an embodiment, the first security gateway that provides security services for the terminal device is selected by the network element of the first core network.
在又一些实施例中,第一核心网网元还可以接收第二核心网网元的第一安全网关的地址信息,从而确定为终端设备提供安全服务的第一安全网关。例如,第二核心网网元可以是策略控制网元或者移动性管理网元。在该实施例下,为终端设备提供安全服务的第一安全网关可以由移动性管理网元或者策略管理网元来选择。In still other embodiments, the first core network element may further receive address information of the first security gateway of the second core network element, so as to determine the first security gateway that provides security services for the terminal device. For example, the network element of the second core network may be a policy control network element or a mobility management network element. In this embodiment, the first security gateway that provides security services for the terminal device may be selected by a mobility management network element or a policy management network element.
如下结合具体场景对本申请实施例提供的方案进行详细说明。后续描述时,以第一安全网关称为IKE网关为例,第二安全网关称为IPsec网关为例。The solutions provided by the embodiments of the present application are described in detail below in combination with specific scenarios. In the subsequent description, the first security gateway is called an IKE gateway as an example, and the second security gateway is called an IPsec gateway as an example.
第一种可能的应用场景中,以由第一核心网网元为终端设备选择第一安全网关为例。参见图12所示,为一种可能的通信网络架构示意图。图12中,以SMF与IKE网关之间部署的接口为Nxx接口为例。IKE网关与IPsec网关之间部署的接口为Nyy为例。当然接口还可以采用其它的名称,本申请实施例中对此不作具体限定。需要说明的是,通信网络中可以包括一个或者多个IKE网关,比如,不同的IKE网关可以用于处理不同的业务。In the first possible application scenario, the selection of the first security gateway for the terminal device by the network element of the first core network is taken as an example. Referring to FIG. 12, it is a schematic diagram of a possible communication network architecture. In Figure 12, the interface deployed between the SMF and the IKE gateway is an Nxx interface as an example. The interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example. Of course, the interface may also adopt other names, which are not specifically limited in this embodiment of the present application. It should be noted that the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
下面结合图12对本申请实施例的通信方法流程进行描述。The flow of the communication method according to the embodiment of the present application will be described below with reference to FIG. 12 .
参见图13所示为一种可能的通信方法流程示意图。图13中,以SMF进行第一安全网网关的选择为例。在触发创建IKE SA时,由终端设备触发创建为例。Referring to FIG. 13, a schematic flowchart of a possible communication method is shown. In FIG. 13 , the selection of the first security network gateway is performed by the SMF as an example. When triggering the creation of an IKE SA, the creation is triggered by the terminal device as an example.
1301,PDU会话建立流程。示例性的,以下步骤可以发生在会话建立流程或者会话修 改流程中。1301, a PDU session establishment process. Exemplarily, the following steps may occur in a session establishment process or a session modification process.
1302:SMF确定终端设备的当前PDU会话需要进行端到端的安全保护。1302: The SMF determines that the current PDU session of the terminal device requires end-to-end security protection.
比如,SMF可以从UDM查询终端设备的签约数据,根据签约数据确定终端设备的当前PDU会话需要进行端到端的安全保护。For example, the SMF can query the subscription data of the terminal device from the UDM, and determine according to the subscription data that the current PDU session of the terminal device needs to perform end-to-end security protection.
1303:SMF通过本地配置信息或者终端设备的签约数据确定IKE网关。SMF可以从UDM或者UDR中获取终端设备的签约数据。1303: The SMF determines the IKE gateway through local configuration information or subscription data of the terminal device. The SMF can obtain the subscription data of the terminal device from the UDM or the UDR.
示例性地,SMF从本地配置信息或者终端设备的签约数据中获取IKE网关的地址信息。地址信息可以包括IP地址和/或端口号。Exemplarily, the SMF obtains the address information of the IKE gateway from the local configuration information or the subscription data of the terminal device. The address information may include IP addresses and/or port numbers.
1304:SMF执行IKE网关认证。比如,向IKE网关发起授权请求,验证该IKE网关是否可以为该终端设备提供终端设备所处理的业务的安全服务。1304: The SMF performs IKE gateway authentication. For example, an authorization request is initiated to the IKE gateway to verify whether the IKE gateway can provide the terminal device with a security service for the business processed by the terminal device.
示例性地,授权请求中可以包括终端设备的标识,目的IP地址或者数据网络名称(DNN)。IKE网关根据授权请求确定IKE网关是否可以为该终端提供目的IP地址或者数据网络名称对应的网段的加密服务。Exemplarily, the authorization request may include the identifier of the terminal device, the destination IP address or the data network name (DNN). The IKE gateway determines, according to the authorization request, whether the IKE gateway can provide the terminal with encryption services for the network segment corresponding to the destination IP address or data network name.
例如,终端设备的标识可以是5G全球唯一临时UE标识(5G-globally unique temporary identity,5G-GUTI),或者用户永久标识符(subscription permanent identifier,SUPI),或者通用公共用户标识(generic public subscription identifier,GPSI)、或者用户隐藏标识(subscription concealed identifier,SUCI)等。For example, the identity of the terminal device may be a 5G globally unique temporary UE identity (5G-globally unique temporary identity, 5G-GUTI), or a user permanent identifier (subscription permanent identifier, SUPI), or a generic public subscription identifier (generic public subscription identifier). , GPSI), or user concealed identifier (subscription concealed identifier, SUCI), etc.
一些实施例中,1304为可选的步骤,在根据签约数据或者本地配置信息确定IKE网关后,也可以不再向IKE网关进行授权。In some embodiments, 1304 is an optional step. After the IKE gateway is determined according to the subscription data or local configuration information, the IKE gateway may not be authorized any more.
1305:SMF向UPF配置第一转发规则。示例性地,第一转发规则中可以包含IKE网关的地址信息,第一转发规则用于指示UPF将终端设备的PDU会话的数据包转发给IKE网关。1305: The SMF configures the UPF with the first forwarding rule. Exemplarily, the first forwarding rule may include address information of the IKE gateway, and the first forwarding rule is used to instruct the UPF to forward the data packets of the PDU session of the terminal device to the IKE gateway.
在一些实施例中,SMF可以在N4会话建立流程中,向UPF配置第一转发规则。In some embodiments, the SMF may configure the UPF with the first forwarding rule during the N4 session establishment process.
1306,SMF通过AMF向终端设备发送IKE网关的地址信息。用于终端设备发起IKE SA连接的建立。比如,SMF可以通过N11向AMF发送IKE网关的地址信息。然后AMF通过NAS消息向终端设备发送IKE网关的地址信息。1306, the SMF sends the address information of the IKE gateway to the terminal device through the AMF. Used by the terminal device to initiate the establishment of an IKE SA connection. For example, the SMF can send the address information of the IKE gateway to the AMF through N11. Then the AMF sends the address information of the IKE gateway to the terminal device through the NAS message.
1307:终端设备向IKE网关发起IKE SA连接的建立流程,完成与IKE网关之间IKE SA连接的建立。1307: The terminal device initiates the establishment process of the IKE SA connection to the IKE gateway, and completes the establishment of the IKE SA connection with the IKE gateway.
1308:终端设备向IKE网关发起IPSec子SA连接的建立流程。进一步的,IKE网关代替IPsec网关与终端设备之间创建IPsec子SA连接。具体可以采用上述第一种-第三种任一种可能的实施方式来实现。图13中,以第二种可能的实施方式为例进行说明。示例性地,终端设备向IKE网关发起建立请求,建立请求用于请求与第一安全网关建立IPsec子SA连接。举例来说,IPsec子SA连接的建立的模式可以采用传输模式。建立请求携带的目标Traffic Selectors为IPSec网关的地址段,第一安全网关根据IPsec网关的地址段可以确定终端设备实际需要选择IPsec网关为终端设备提供安全服务。需要说明的是,IPsec网关的地址段与为终端设备需要提供业务服务的服务器的地址段相同。1308: The terminal device initiates an IPSec sub-SA connection establishment process to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway. Specifically, any one of the above-mentioned first to third possible implementation manners can be used for implementation. In FIG. 13 , the second possible implementation manner is taken as an example for description. Exemplarily, the terminal device initiates an establishment request to the IKE gateway, and the establishment request is used to request to establish an IPsec sub-SA connection with the first security gateway. For example, the mode of establishment of the IPsec sub-SA connection may adopt the transport mode. The target Traffic Selectors carried in the establishment request is the address segment of the IPSec gateway, and the first security gateway can determine that the terminal device actually needs to select the IPsec gateway to provide security services for the terminal device according to the address segment of the IPsec gateway. It should be noted that the address segment of the IPsec gateway is the same as the address segment of the server that needs to provide business services for the terminal device.
示例性地,建立请求中携带SAi、KEi、TSi、TSr、Ni。SAi表示终端设备的加密算法。KEi表示终端设备的密钥交换材料。TSi和TSr表示使用所述IPsec子SA连接传输用户面数据的数据包过滤规则。Ni表示终端设备的随机数。Exemplarily, the setup request carries SAi, KEi, TSi, TSr, and Ni. SAi represents the encryption algorithm of the terminal device. KEi represents the key exchange material for the end device. TSi and TSr represent packet filtering rules for transmitting user plane data using the IPsec sub-SA connection. Ni represents the random number of the terminal device.
1309:IKE网关向IPsec网关发送IPsec子SA连接的配置上下文。具体可以参见1103b, 配置上下文包括第二安全参数,此处不再赘述。图13中以第二安全参数包括SAi、SAr、KEi、KEr、TSi、TSr、Ni、Nr、SK_d为例。SK_d表示建立在IKE SA基础上派生的密钥材料,KEr表示IKE网关的第一密钥交换材料。Nr表示IKE网关的随机数。TSr表示IKE网关的密钥交换材料。1309: The IKE gateway sends the configuration context of the IPsec sub-SA connection to the IPsec gateway. For details, see 1103b, the configuration context includes the second security parameter, and details are not repeated here. In FIG. 13 , the second security parameter includes SAi, SAr, KEi, KEr, TSi, TSr, Ni, Nr, and SK_d as an example. SK_d represents the key material derived based on the IKE SA, and KEr represents the first key exchange material of the IKE gateway. Nr represents the random number of the IKE gateway. TSr represents the key exchange material for the IKE gateway.
1310:IPSec网关向IKE网关反馈子SA连接的配置情况信息,参见1104b,配置情况信息包括第三安全参数,针对第三安全参数的说明,参见1104b的描述,此处不再赘述。图13中,以第三安全参数包括KEr*和Nr*为例。应理解的是,第三安全参数还可以包括SAr*和/或TSr*,还可以包括SAi、KEi、TSi、Ni。SAr*表示IPsec网关根据SAr确认的加密算法。一些实施例中,SAr*可以与SAr相同,也可以不同。KEr*表示所述IPsec网关的密钥交换材料。1310: The IPSec gateway feeds back the configuration information of the sub-SA connection to the IKE gateway, see 1104b, the configuration information includes the third security parameter, for the description of the third security parameter, see the description of 1104b, which is not repeated here. In FIG. 13 , the third security parameter includes KEr* and Nr* as an example. It should be understood that the third security parameter may further include SAr* and/or TSr*, and may also include SAi, KEi, TSi, and Ni. SAr* represents the encryption algorithm confirmed by the IPsec gateway according to SAr. In some embodiments, SAr* may or may not be the same as SAr. KEr* represents the key exchange material of the IPsec gateway.
1311:IKE网关根据从IPSec网关收到的IPsec子SA连接的配置情况信息,向终端设备发送建立响应,其中建立响应中可以包含第三安全参数。具体参见1105b的描述,此处不再赘述。1311: The IKE gateway sends an establishment response to the terminal device according to the configuration information of the IPsec sub-SA connection received from the IPSec gateway, where the establishment response may include a third security parameter. For details, refer to the description of 1105b, which will not be repeated here.
1312:IKE网关向SMF反馈IPsec子SA连接的建立情况信息。建立情况信息可以包括TSr*。1312: The IKE gateway feeds back information on the establishment of the IPsec sub-SA connection to the SMF. The setup situation information may include TSr*.
1313:SMF向UPF配置第二转发规则。例如,第二转发规则中可以包括TSr*。第二转发规则用于指示UPF根据TSr*将属于IPsec子SA连接的数据包转发给IPSec网关。1313: The SMF configures the second forwarding rule to the UPF. For example, TSr* may be included in the second forwarding rule. The second forwarding rule is used to instruct the UPF to forward the data packets belonging to the IPsec sub-SA connection to the IPSec gateway according to TSr*.
通过上述方案,终端设备不需要通过控制面信令,来感知IPSec网关的存在。终端设备只与集中式的IKE网关进行交互来建立IPsec子SA连接。后续当IPSec网关发生改变(如ULCL插入的MEC场景)时,也可以不需要额外的控制面信令开销即能完成IPSec子SA连接的更新和建立。另外,在每次IPSec网关发生改变时,无需再建立IKE SA连接,减少信令开销。Through the above solution, the terminal device does not need to use control plane signaling to perceive the existence of the IPSec gateway. End devices only interact with the centralized IKE gateway to establish IPsec sub-SA connections. Subsequently, when the IPSec gateway is changed (such as the MEC scenario of ULCL insertion), the update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead. In addition, every time the IPSec gateway changes, there is no need to establish an IKE SA connection, which reduces signaling overhead.
示例性地,参见图14所示,对上述方案的技术效果进行描述。参见图14所示,由SMF进行IKE网关的选择和交互,在终端设备的PDU会话建立过程中,SMF先通过NAS消息通知终端设备,IKE网关的地址信息,并配置UPF的第一转发规则,指示UPF将终端设备的数据包转发给IKE网关。此时尽管终端设备的PDU会话已经建立,但终端设备只能与IKE网关进行交互。进一步地,终端设备根据IKE网关的地址信息发起IKE SA建立流程,与IKE网关建立IKE SA连接后,由IKE网关为终端设备选择IPSec网关,并代替IPSec网关与终端设备建立用于传输用户面数据的IPSec子SA连接。进而SMF再对UPF进行第二转发规则的配置,指示UPF将该IPSec子SA的数据包都转发到IPSec网关上。Exemplarily, referring to FIG. 14 , the technical effect of the above solution will be described. Referring to Figure 14, the selection and interaction of the IKE gateway is performed by the SMF. During the establishment of the PDU session of the terminal device, the SMF first informs the terminal device of the address information of the IKE gateway through a NAS message, and configures the first forwarding rule of the UPF, Instructs the UPF to forward the end device's packets to the IKE gateway. At this time, although the PDU session of the terminal device has been established, the terminal device can only interact with the IKE gateway. Further, the terminal device initiates an IKE SA establishment process according to the address information of the IKE gateway, and after establishing the IKE SA connection with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish with the terminal device for transmitting user plane data. IPSec sub-SA connection. Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
结合图12,对本申请实施例提供的另一种可能的通信方法流程进行描述,参见图15所示。图15中,以SMF进行第一安全网网关的选择为例。在触发创建IKE SA时,由IKE向终端设备触发创建IKE SA为例。With reference to FIG. 12 , another possible communication method flow provided by the embodiment of the present application is described, as shown in FIG. 15 . In FIG. 15 , the selection of the first security network gateway is performed by the SMF as an example. When triggering the creation of an IKE SA, the creation of an IKE SA is triggered by IKE to the terminal device as an example.
1501-1505,参见1301-1305,此处不再赘述。1501-1505, see 1301-1305, which will not be repeated here.
1506,SMF向IKE网关发送终端设备的地址信息。用于IKE关发起IKE的SA连接的建立。例如,SMF可以向IKE网关发送SA建立请求消息,SA建立请求消息中包括终端设备的地址信息。1506, the SMF sends the address information of the terminal device to the IKE gateway. The IKE gateway initiates the establishment of the IKE SA connection. For example, the SMF may send an SA establishment request message to the IKE gateway, where the SA establishment request message includes address information of the terminal device.
1507,IKE网关向终端设备发起IKE SA连接的建立流程,完成IKE网关与终端设备之间IKE SA连接的建立。1507, the IKE gateway initiates the establishment process of the IKE SA connection to the terminal device, and the establishment of the IKE SA connection between the IKE gateway and the terminal device is completed.
1508,终端设备向IKE网关发起IPsec子SA连接的建立流程。进一步的,IKE网关代替IPsec网关与终端设备之间创建IPsec子SA连接。具体可以采用上述第一种-第三种任一种可能的实施方式来实现。图15中,以第二种可能的实施方式为例进行说明。1508, the terminal device initiates the establishment process of the IPsec sub-SA connection to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway. Specifically, any one of the above-mentioned first to third possible implementation manners can be used for implementation. In FIG. 15 , the second possible implementation manner is taken as an example for description.
1509-1513,参见1309-1313,此处不再赘述。1509-1513, see 1309-1313, which will not be repeated here.
通过上述方案,相比图13的方案,由SMF通知IKE网关终端设备的地址信息,因此对于终端设备没有额外的信令开销。另外,终端设备不需要通过控制面信令,感知IPSec网关的存在,IPsec SA的建立只与集中式的IKE网关进行交互,后续当IPSec网关发生改变(如ULCL插入的MEC场景)时,也可以不需要额外的控制面信令开销即能完成IPSec子SA连接的更新和建立。另外,在每次IPSec网关发生改变时,无需再建立IKE SA连接,减少的信令开销。Through the above solution, compared with the solution of FIG. 13 , the IKE gateway is notified of the address information of the terminal device by the SMF, so there is no additional signaling overhead for the terminal device. In addition, the terminal device does not need to perceive the existence of the IPSec gateway through control plane signaling. The establishment of the IPsec SA only interacts with the centralized IKE gateway. When the IPSec gateway changes later (such as the MEC scenario of ULCL insertion), it can also The update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead. In addition, every time the IPSec gateway changes, there is no need to establish an IKE SA connection, which reduces signaling overhead.
示例性地,参见图16所示,对上述方案的技术效果进行描述。参见图16所示,由SMF进行IKE网关的选择和交互,在终端设备的PDU会话建立过程中,SMF通知IKE网关终端设备的地址信息,并配置UPF的第一转发规则,指示UPF将终端设备的数据包转发给IKE网关。此时尽管终端设备的PDU会话已经建立,但终端设备只能与IKE网关进行交互。进一步地,终端设备根据IKE网关的地址信息发起IKE SA建立流程,与IKE网关建立IKE SA连接后,由IKE网关为终端设备选择IPSec网关,并代替IPSec网关与终端设备建立用于传输用户面数据的IPSec子SA连接。进而SMF再对UPF进行第二转发规则的配置,指示UPF将该IPSec子SA的数据包都转发到IPSec网关上。Exemplarily, referring to FIG. 16 , the technical effect of the above solution will be described. Referring to Figure 16, the selection and interaction of the IKE gateway is performed by the SMF. During the establishment of the PDU session of the terminal device, the SMF notifies the IKE gateway of the address information of the terminal device, and configures the first forwarding rule of the UPF, instructing the UPF to transfer the terminal device to the terminal device. The packets are forwarded to the IKE gateway. At this time, although the PDU session of the terminal device has been established, the terminal device can only interact with the IKE gateway. Further, the terminal device initiates an IKE SA establishment process according to the address information of the IKE gateway, and after establishing the IKE SA connection with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish with the terminal device for transmitting user plane data. IPSec sub-SA connection. Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
第二种可能的应用场景中,以由移动性管理网元为终端设备选择第一安全网关为例。参见图17所示,为一种可能的通信网络架构示意图。以移动性管理网关为5G通信网络中的AMF为例。图17中,以AMF与IKE网关之间部署的接口为Nxx接口为例。IKE网关与IPsec网关之间部署的接口为Nyy为例。当然接口还可以采用其它的名称,本申请实施例中对此不作具体限定。需要说明的是,通信网络中可以包括一个或者多个IKE网关,比如,不同的IKE网关可以用于处理不同的业务。In the second possible application scenario, the mobility management network element selects the first security gateway for the terminal device as an example. Referring to FIG. 17, it is a schematic diagram of a possible communication network architecture. Take the mobility management gateway as the AMF in the 5G communication network as an example. In Figure 17, the interface deployed between the AMF and the IKE gateway is an Nxx interface as an example. The interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example. Of course, the interface may also adopt other names, which are not specifically limited in this embodiment of the present application. It should be noted that the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
下面结合图17对本申请实施例的通信方法流程进行描述。The flow of the communication method according to the embodiment of the present application will be described below with reference to FIG. 17 .
参见图18所示为一种可能的通信方法流程示意图。图18中,以AMF为终端设备进行第一安全网网关的选择后通知给SMF为例。在触发创建IKE SA时,由终端设备触发创建为例。作为一种举例,在终端设备的注册流程中,由AMF进行IKE网关的选择和配置,并将IKE网关的地址信息发送给终端设备。终端设备的PDU会话建立时,先由AMF将IKE网关的地址信息发送给SMF,由SMF通知给终端设备,进一步地由终端设备发起与IKE网关的IKE SA建立。Referring to FIG. 18, a schematic flowchart of a possible communication method is shown. In FIG. 18 , the AMF is used as an example to notify the SMF after selecting the first security network gateway as the terminal device. When triggering the creation of an IKE SA, the creation is triggered by the terminal device as an example. As an example, in the registration process of the terminal device, the AMF selects and configures the IKE gateway, and sends the address information of the IKE gateway to the terminal device. When the PDU session of the terminal device is established, the AMF first sends the address information of the IKE gateway to the SMF, and the SMF notifies the terminal device, and further, the terminal device initiates the establishment of an IKE SA with the IKE gateway.
1801,终端设备的注册流程。1801, a registration process of a terminal device.
1802,AMF确定终端设备的当前PDU会话需要进行端到端的安全保护。例如,AMF可以向UDM查询终端设备的签约信息,根据签约信息确定终端设备的当前PDU会话需要进行端到端的安全保护。1802, the AMF determines that the current PDU session of the terminal device needs to perform end-to-end security protection. For example, the AMF may query the UDM for the subscription information of the terminal device, and determine according to the subscription information that the current PDU session of the terminal device needs to perform end-to-end security protection.
1803,AMF通过本地配置信息或者终端设备的签约数据确定IKE网关。1803, the AMF determines the IKE gateway according to the local configuration information or the subscription data of the terminal device.
比如,AMF可以从UDM或者UDR中获取终端设备的签约数据。比如,AMF可以根据终端设备的业务标识从终端设备的签约数据中为终端设备选择第一安全网关。例如,业务标识可以是DNN或者NSSAI等,业务标识还可以是其它用于标识终端设备的业务的标 识。在实施例下,为终端设备提供安全服务的第一安全网关由AMF来选择。例如,在终端设备的签约数据中不同的业务标识对应不同的IKE网关。For example, the AMF can acquire the subscription data of the terminal device from the UDM or the UDR. For example, the AMF may select the first security gateway for the terminal device from the subscription data of the terminal device according to the service identifier of the terminal device. For example, the service identifier can be DNN or NSSAI, etc., and the service identifier can also be other identifiers used to identify the service of the terminal device. Under an embodiment, the first security gateway that provides security services to the terminal device is selected by the AMF. For example, different service identifiers in the subscription data of the terminal device correspond to different IKE gateways.
再比如,AMF根据本地配置信息确定为终端设备提供安全服务的IKE网关。比如,AMF可以根据终端设备的业务标识从本地配置信息中确定为终端设备提供安全服务的IKE网关。例如,业务标识可以是DNN或者NSSAI等。例如,在本地配置信息中不同的业务标识对应不同的IKE网关。For another example, the AMF determines the IKE gateway that provides the security service for the terminal device according to the local configuration information. For example, the AMF can determine the IKE gateway that provides the security service for the terminal device from the local configuration information according to the service identifier of the terminal device. For example, the service identifier may be DNN or NSSAI or the like. For example, different service identifiers in the local configuration information correspond to different IKE gateways.
示例性地,AMF从本地配置信息或者终端设备的签约数据中获取IKE网关的地址信息。地址信息可以包括IP地址和/或端口号。Exemplarily, the AMF obtains the address information of the IKE gateway from the local configuration information or the subscription data of the terminal device. The address information may include IP addresses and/or port numbers.
1804,AMF向IKE网关发起授权请求,验证该IKE网关是否可以为该终端设备提供终端设备所处理的业务的安全服务。1804, the AMF initiates an authorization request to the IKE gateway to verify whether the IKE gateway can provide the terminal device with a security service for the business processed by the terminal device.
示例性地,授权请求中可以包括终端设备的标识,目的IP地址或者数据网络名称(DNN)。IKE网关根据授权请求确定IKE网关是否可以为该终端提供目的IP地址或者数据网络名称对应的网段的加密服务。Exemplarily, the authorization request may include the identifier of the terminal device, the destination IP address or the data network name (DNN). The IKE gateway determines, according to the authorization request, whether the IKE gateway can provide the terminal with encryption services for the network segment corresponding to the destination IP address or data network name.
一些实施例中,1804为可选的步骤,在根据签约数据或者本地配置信息确定IKE网关后,也可以不再向IKE网关进行授权。In some embodiments, 1804 is an optional step. After the IKE gateway is determined according to the subscription data or the local configuration information, the IKE gateway may not be authorized any more.
1805,AMF将IKE网关的地址信息发送给终端设备。1805, the AMF sends the address information of the IKE gateway to the terminal device.
1806,PDU会话建立流程。示例性地,如下步骤1807-1815属于PDU会话建立流程。1806, a PDU session establishment process. Exemplarily, the following steps 1807-1815 belong to the PDU session establishment flow.
1807,AMF将IKE网关的地址信息发送给SMF。1807, the AMF sends the address information of the IKE gateway to the SMF.
1808,参见1305,此处不再赘述。1808, see 1305, which will not be repeated here.
1809,参见1307,此处不再赘述。1809, see 1307, which will not be repeated here.
1810,终端设备向IKE网关发起IPsec子SA连接的建立流程。进一步的,IKE网关代替IPsec网关与终端设备之间创建IPsec子SA连接。具体可以采用上述第一种-第三种任一种可能的实施方式来实现。图15中,以第二种可能的实施方式为例进行说明。1810, the terminal device initiates the establishment process of the IPsec sub-SA connection to the IKE gateway. Further, an IPsec sub-SA connection is created between the IKE gateway and the terminal device instead of the IPsec gateway. Specifically, any one of the above-mentioned first to third possible implementation manners can be used for implementation. In FIG. 15 , the second possible implementation manner is taken as an example for description.
1811-1815,参见1309-1313,此处不再赘述。1811-1815, see 1309-1313, which will not be repeated here.
通过上述方案,终端设备不需要通过控制面信令,感知IPSec网关的存在,IKE SA和IPsec子SA的建立只与集中式的IKE网关进行交互,后续当IPSec网关发生改变时,也可以不需要额外的控制面信令开销即能完成IPSec网关子SA的更新和建立。上述方案中,IKE网关由AMF进行管理和分配,在终端设备的注册流程中,AMF为终端设备选好IKE网关,然后在终端设备的PDU管理流程中将IKE网关的地址信息通知给SMF和UE。作为一种可能的实现方式,AMF也可以在终端设备的PDU管理流程中,将终端设备的地址信息通知给IKE网关,然后由IKE网关触发创建IKE SA连接。Through the above solution, the terminal device does not need to use control plane signaling to perceive the existence of the IPSec gateway. The establishment of IKE SA and IPsec sub-SA only interacts with the centralized IKE gateway. When the IPSec gateway changes subsequently, it does not need to be The extra control plane signaling overhead can complete the update and establishment of the IPSec gateway sub-SA. In the above scheme, the IKE gateway is managed and allocated by the AMF. In the registration process of the terminal device, the AMF selects the IKE gateway for the terminal device, and then notifies the SMF and UE of the address information of the IKE gateway in the PDU management process of the terminal device. . As a possible implementation, the AMF can also notify the IKE gateway of the address information of the terminal device in the PDU management process of the terminal device, and then the IKE gateway triggers the creation of an IKE SA connection.
示例性地,参见图19所示,对上述方案的技术效果进行描述。参见图19所示,由AMF为终端设备进行IKE网关的选择和交互,终端设备的注册流程中,AMF先为终端设备选取IKE网关,在终端设备的PDU会话建立过程中,AMF向终端设备和SMF通知IKE网关的地址信息。由SMF配置UPF的第一转发规则,指示UPF将终端设备的数据包转发给IKE网关。此时尽管终端设备的PDU会话已经建立,但终端设备只能与IKE网关进行交互。终端设备根据IKE网关的地址信息发起IKE SA的建立流程,与IKE网关建立IKE SA连接后,由IKE网关为终端设备选择IPSec网关,并代替IPSec网关与终端设备建立用于传输用户面数据的IPSec子SA连接。进而SMF再对UPF进行第二转发规则的配置,指示UPF将该IPSec子SA的数据包都转发到IPSec网关上。Exemplarily, referring to Fig. 19, the technical effect of the above solution will be described. Referring to Figure 19, the AMF selects and interacts with the IKE gateway for the terminal device. During the registration process of the terminal device, the AMF first selects the IKE gateway for the terminal device. During the establishment of the PDU session of the terminal device, the AMF sends the The SMF informs the IKE gateway of the address information. The first forwarding rule of the UPF is configured by the SMF, and the UPF is instructed to forward the data packets of the terminal device to the IKE gateway. At this time, although the PDU session of the terminal device has been established, the terminal device can only interact with the IKE gateway. The terminal device initiates the IKE SA establishment process according to the address information of the IKE gateway. After the IKE SA connection is established with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and replaces the IPSec gateway to establish IPSec with the terminal device for transmitting user plane data. Sub-SA connection. Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
第三种可能的应用场景中,以由策略控制网元为终端设备配置IKE网关的地址信息为例。参见图20所示,为一种可能的通信网络架构示意图。以策略控制网元为5G通信网络中的PCF为例。图20中,以PCF与IKE网关之间部署的接口为Nxx接口为例。IKE网关与IPsec网关之间部署的接口为Nyy为例。当然接口还可以采用其它的名称,本申请实施例中对此不作具体限定。需要说明的是,通信网络中可以包括一个或者多个IKE网关,比如,不同的IKE网关可以用于处理不同的业务。In the third possible application scenario, the policy control network element configures the address information of the IKE gateway for the terminal device as an example. Referring to FIG. 20, it is a schematic diagram of a possible communication network architecture. Take the policy control network element as the PCF in the 5G communication network as an example. In Figure 20, the interface deployed between the PCF and the IKE gateway is an Nxx interface as an example. The interface deployed between the IKE gateway and the IPsec gateway is Nyy as an example. Of course, the interface may also adopt other names, which are not specifically limited in this embodiment of the present application. It should be noted that the communication network may include one or more IKE gateways, for example, different IKE gateways may be used to process different services.
下面结合图20对本申请实施例的通信方法流程进行描述。The flow of the communication method according to the embodiment of the present application will be described below with reference to FIG. 20 .
参见图21所示为一种可能的通信方法流程示意图。图20中,以PCF为终端设备配置不同业务对应的IKE网关为例。在触发创建IKE SA时,由终端设备触发创建为例。作为一种举例,在终端设备的注册流程中,由PCF对终端设备进行IKE网关的配置。终端设备的PDU会话建立时,先由终端设备将IKE网关的地址信息发送给SMF,由SMF为配置第一转发规则,由终端设备发起与IKE网关的IKE SA建立。Referring to FIG. 21, a schematic flowchart of a possible communication method is shown. In Figure 20, the PCF is used as an example to configure IKE gateways corresponding to different services for the terminal device. When triggering the creation of an IKE SA, the creation is triggered by the terminal device as an example. As an example, in the registration process of the terminal device, the PCF configures the IKE gateway for the terminal device. When the PDU session of the terminal device is established, the terminal device first sends the address information of the IKE gateway to the SMF, and the SMF configures the first forwarding rule, and the terminal device initiates the establishment of an IKE SA with the IKE gateway.
2101,终端设备的注册流程。2101, a registration process of a terminal device.
2102,PCF将服务于终端设备的不同业务的IKE网关的地址信息配置给终端设备。例如,PCF向终端设备配置安全策略,安全策略中包括不同业务的IKE网关的地址信息。安全策略还可以包括不同网络切片或者会话或者数据网络的安全级别。举例来说,不同的安全级别可以对应不同的IKE网关。示例性地,PCF可以在用户配置更新(user configuration update)流程中,将服务于终端设备的不同业务的IKE网关的地址信息配置给终端设备。比如终端设备的不同业务可以通过DNN来指示。PCF可以将安全策略承载在终端设备路由选择策略(user equipment routing selection policy,URSP)中配置给终端设备,即PCF可以将各个DNN对应的IKE网关的地址信息承载在URSP中配置给终端设备。2102. The PCF configures the terminal device with address information of the IKE gateway serving different services of the terminal device. For example, the PCF configures a security policy for the terminal device, and the security policy includes address information of IKE gateways of different services. Security policies can also include security levels for different network slices or sessions or data networks. For example, different security levels can correspond to different IKE gateways. Exemplarily, the PCF may configure the terminal device with address information of IKE gateways serving different services of the terminal device in a user configuration update (user configuration update) process. For example, different services of terminal equipment can be indicated by DNN. The PCF can carry the security policy in the user equipment routing selection policy (URSP) and configure it to the terminal device, that is, the PCF can carry the address information of the IKE gateway corresponding to each DNN in the URSP and configure it to the terminal device.
2103,终端设备的PDU会话建立流程。示例性地,如下步骤2104-2114可以包含在PDU会话建立流程中。2103, a PDU session establishment process of the terminal device. Exemplarily, the following steps 2104-2114 may be included in the PDU session establishment process.
2104,终端设备向AMF发送PDU会话建立请求(PDU session establishment request),PDU会话建立请求包括IKE网关的地址信息。2104, the terminal device sends a PDU session establishment request (PDU session establishment request) to the AMF, where the PDU session establishment request includes address information of the IKE gateway.
2105,AMF向SMF转发PDU会话建立请求。示例性地,AMF可以通过SMF服务化接口消息向SMF转发PDU会话建立请求。例如,SMF服务化接口消息可以为Nsmf_PDUSession_CreatSMContext Response。2105, the AMF forwards the PDU session establishment request to the SMF. Exemplarily, the AMF may forward the PDU session establishment request to the SMF through the SMF serviced interface message. For example, the SMF serviced interface message may be Nsmf_PDUSession_CreatSMContext Response.
2106-2107,参见1304-1305,此处不再赘述。2106-2107, see 1304-1305, which will not be repeated here.
2108-2114,参见1307-1313,此处不再赘述。2108-2114, see 1307-1313, which will not be repeated here.
上述方案中,由PCF在配置URSP时,将可为终端设备提供服务的IKE网关的地址信息发送给终端设备,从而终端设备可以根据当前业务进行IKE网关的选择。终端设备不需要通过控制面信令,来感知IPSec网关的存在。终端设备只与集中式的IKE网关进行交互来建立IPsec SA连接。后续当IPSec网关发生改变时,也可以不需要额外的控制面信令开销即能完成IPSec子SA连接的更新和建立。另外,在每次IPSec网关发生改变时,无需再建立IKE SA连接,减少信令开销。In the above solution, when configuring the URSP, the PCF sends the address information of the IKE gateway that can provide services to the terminal device to the terminal device, so that the terminal device can select the IKE gateway according to the current service. Terminal devices do not need to use control plane signaling to perceive the existence of IPSec gateways. End devices only interact with the centralized IKE gateway to establish IPsec SA connections. When the IPSec gateway changes subsequently, the update and establishment of the IPSec sub-SA connection can be completed without additional control plane signaling overhead. In addition, every time the IPSec gateway changes, there is no need to establish an IKE SA connection, which reduces signaling overhead.
示例性地,参见图22所示,对上述方案的技术效果进行描述。参见图22所示,由PCF在URSP规则向终端设备配置能够为终端设备提供服务的IKE网关。PDU会话建立流程中,终端设备根据当前处理的业务从PCF配置的IKE网关中选取一个IKE网关,并向SMF通 知IKE网关的地址信息。然后由SMF配置UPF的第一转发规则,指示UPF将终端设备的数据包转发给IKE网关。此时尽管终端设备的PDU会话已经建立,但终端设备只能与IKE网关进行交互。终端设备根据IKE网关的地址信息发起IKE SA连接的建立流程,与IKE网关建立IKE SA连接后,由IKE网关为终端设备选择IPSec网关,并代替IPSec网关与终端设备建立用于传输用户面数据的IPSec子SA连接。进而SMF再对UPF进行第二转发规则的配置,指示UPF将该IPSec子SA的数据包都转发到IPSec网关上。Exemplarily, referring to Fig. 22, the technical effect of the above solution will be described. Referring to Figure 22, the PCF configures the terminal device with an IKE gateway capable of providing services for the terminal device in the URSP rule. In the process of establishing a PDU session, the terminal device selects an IKE gateway from the IKE gateways configured by the PCF according to the currently processed service, and notifies the SMF of the address information of the IKE gateway. Then the SMF configures the first forwarding rule of the UPF, instructing the UPF to forward the data packets of the terminal device to the IKE gateway. At this time, although the PDU session of the terminal device has been established, the terminal device can only interact with the IKE gateway. The terminal device initiates the IKE SA connection establishment process according to the address information of the IKE gateway. After the IKE SA connection is established with the IKE gateway, the IKE gateway selects an IPSec gateway for the terminal device, and instead of the IPSec gateway, establishes an IPSec gateway with the terminal device for transmitting user plane data. IPSec sub-SA connection. Further, the SMF configures the second forwarding rule on the UPF, and instructs the UPF to forward all the data packets of the IPSec sub-SA to the IPSec gateway.
下面结合具体应用场景对本申请实施例所带来的有益效果进行说明。参见图23所示,集中化部署IKE网关,用于与终端设备之间进行IKE SA的建立,并负责管理密钥的生成和分配。而用于用户面数据传输的IPsec网关则分布式部署,用于与终端设备进行用户面子SA的建立和数据的加密以及完整性保护。其中分布式的IPsec网关,其子SA由集中式的IKE网关代为建立,并由IKE网关进行本地配置上下文和转发规则的配置。本申请实施例中,建立的IPsec子SA连接的模式可以是传输模式,集中式的IKE网关可以为分布式的IPSec网关建立传输模式的IPsec子SA,属于该IPsec子SA的数据包都会经过该IPSec网关进行转发。本申请实施例中可以在会话建立时配置IPSec子SA的转发规则和为IPsec网关配置IPsec子SA的配置上下文。UE与集中式的IKE网关建立IKE SA1,当终端设备需要通过IPsec网关2进行业务时,终端设备可以与IKE网关进行交互,建立用于IPsec网关2通信的IPsec SA2,并由IKE网关对IPsec网关进行配置,将IPSEC SA2的配置上下文配置给IPsec网关2。通过本申请实施例提供的方案有效解决终端设备的应用服务器切换的问题,在IPsec网关切换的过程中,终端设备不感知IPsec网关,也无需与IPsec网关建立IKE SA。The beneficial effects brought by the embodiments of the present application will be described below with reference to specific application scenarios. Referring to Figure 23, the IKE gateway is centrally deployed to establish an IKE SA with terminal devices, and is responsible for managing the generation and distribution of keys. The IPsec gateways used for user plane data transmission are deployed in a distributed manner, and are used to establish user plane SAs with terminal devices, encrypt data, and protect integrity. Among them, the sub-SA of the distributed IPsec gateway is established by the centralized IKE gateway, and the local configuration context and forwarding rules are configured by the IKE gateway. In the embodiment of the present application, the established IPsec sub-SA connection mode may be the transmission mode, the centralized IKE gateway may establish the transmission mode IPsec sub-SA for the distributed IPSec gateway, and the data packets belonging to the IPsec sub-SA will pass through the IPsec sub-SA. IPSec gateway for forwarding. In this embodiment of the present application, the forwarding rule of the IPSec sub-SA and the configuration context of the IPsec sub-SA can be configured for the IPsec gateway when the session is established. The UE establishes an IKE SA1 with the centralized IKE gateway. When the terminal device needs to conduct services through the IPsec gateway 2, the terminal device can interact with the IKE gateway to establish an IPsec SA2 for communication with the IPsec gateway 2, and the IKE gateway communicates with the IPsec gateway. To configure, configure the configuration context of IPSEC SA2 to IPsec Gateway 2. The solution provided by the embodiments of the present application effectively solves the problem of the application server switching of the terminal device. During the IPsec gateway switching process, the terminal device does not perceive the IPsec gateway and does not need to establish an IKE SA with the IPsec gateway.
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。The apparatus for implementing the above method in the embodiments of the present application will be described below with reference to the accompanying drawings. Therefore, the above content can be used in subsequent embodiments, and repeated content will not be repeated.
如图24所示,为本申请所涉及的通信装置的一种可能的示例性框图,该通信装置2400可以对应实现上述各个方法实施例中由第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元、终端设备实现的功能或者步骤。该通信装置可以包括收发模块2401和处理模块2402。可选地,还可以包括存储模块,该存储模块可以用于存储指令(代码或者程序)和/或数据。收发模块2401和处理模块2402可以与该存储模块耦合,例如,处理模块2402可以读取存储模块中的指令(代码或者程序)和/或数据,以实现相应的方法。上述各个模块可以独立设置,也可以部分或者全部集成。可选地,收发模块2401可以包括发送模块和接收模块,发送模块用于执行发送操作,接收模块用于执行接收操作。As shown in FIG. 24 , which is a possible exemplary block diagram of the communication device involved in the present application, the communication device 2400 can correspondingly implement the first security gateway (or IKE gateway), the second security gateway in the above method embodiments, and the second security gateway. The functions or steps implemented by the gateway (IPsec gateway), the first core network element, the policy control network element, and the terminal device. The communication device may include a transceiver module 2401 and a processing module 2402 . Optionally, a storage module may also be included, and the storage module may be used to store instructions (codes or programs) and/or data. The transceiver module 2401 and the processing module 2402 may be coupled with the storage module, for example, the processing module 2402 may read instructions (codes or programs) and/or data in the storage module to implement corresponding methods. Each of the above modules can be set independently, and can also be partially or fully integrated. Optionally, the transceiver module 2401 may include a sending module and a receiving module, the sending module is configured to perform a sending operation, and the receiving module is configured to perform a receiving operation.
应理解,处理模块2402可以是处理器或控制器,例如可以是通用中央处理器(central processing unit,CPU),通用处理器,数字信号处理(digital signal processing,DSP),专用集成电路(application specific integrated circuits,ASIC),现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包括一个或多个微处理器组合,DSP和微处理器的组合等等。收发模块2401是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该收发模块2401是该芯片用于从 其它芯片或装置接收信号的接口电路,或者,是该芯片用于向其它芯片或装置发送信号的接口电路。It should be understood that the processing module 2402 can be a processor or a controller, such as a general-purpose central processing unit (CPU), general-purpose processor, digital signal processing (DSP), application-specific integrated circuit (application specific integrated circuit) integrated circuits, ASIC), field programmable gate array (FPGA), or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure. The processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and the like. The transceiver module 2401 is an interface circuit of the device for receiving signals from other devices. For example, when the device is implemented in the form of a chip, the transceiver module 2401 is an interface circuit used by the chip to receive signals from other chips or devices, or an interface circuit used by the chip to send signals to other chips or devices.
该通信装置2400可以为上述实施例中的第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元、终端设备,或者可以为用第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元、终端设备的芯片。例如,当通信装置2400为第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元、终端设备时,该处理模块2402例如可以是处理器,该收发模块2401例如可以是收发器。可选地,该收发器可以包括射频电路或者输入输出接口,该存储单元例如可以是存储器。例如,当通信装置2400为用于第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元、终端设备的芯片时,该处理模块2402例如可以是处理器,该收发模块2401例如可以是输入/输出接口、管脚或电路等。该处理模块2402可执行存储单元存储的计算机执行指令,可选地,该存储单元为该芯片内的存储单元,如寄存器、缓存等,该存储单元还可以是该第一安全网关(或者IKE网关)、第二安全网关(IPsec网关)、第一核心网网元、策略控制网元或者终端设备内的位于该芯片外部的存储单元,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。The communication apparatus 2400 may be the first security gateway (or IKE gateway), the second security gateway (IPsec gateway), the first core network element, the policy control network element, and the terminal device in the above-mentioned embodiment, or may be the first security gateway (or IKE gateway) in the above-mentioned embodiment. A security gateway (or IKE gateway), a second security gateway (IPsec gateway), a first core network element, a policy control network element, and a chip of a terminal device. For example, when the communication apparatus 2400 is a first security gateway (or an IKE gateway), a second security gateway (IPsec gateway), a first core network element, a policy control network element, or a terminal device, the processing module 2402 may be, for example, a processing The transceiver module 2401 may be, for example, a transceiver. Optionally, the transceiver may include a radio frequency circuit or an input/output interface, and the storage unit may be, for example, a memory. For example, when the communication device 2400 is a chip used for the first security gateway (or IKE gateway), the second security gateway (IPsec gateway), the first core network element, the policy control network element, and the terminal device, the processing module 2402 For example, it may be a processor, and the transceiver module 2401 may be, for example, an input/output interface, a pin, or a circuit. The processing module 2402 can execute computer-executed instructions stored in a storage unit. Optionally, the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit can also be the first security gateway (or the IKE gateway). ), the second security gateway (IPsec gateway), the first core network element, the policy control network element or a storage unit located outside the chip in the terminal device, such as a read-only memory (ROM) or a storage unit that can store Other types of static storage devices for static information and instructions, random access memory (RAM), etc.
一些可能的实施方式中,通信装置2400能够对应实现上述方法实施例中第一安全网关(或者IKE网关)的行为和功能。例如通信装置2400可以为第一安全网关(或者IKE网关),也可以为应用于第一安全网关(或者IKE网关)中的部件(例如芯片或者电路)。收发模块2401可以用于支持第一安全网关(或者IKE网关)与其他网络实体的通信,例如支持第一安全网关(或者IKE网关)与图10、图11A、图11B、图11C、图13、图15、图18、图21所示的第二安全网关、终端设备、AMF、SMF等之间的通信。处理模块2402用于对第一安全网关(或者IKE网关)的动作进行控制管理,例如处理模块2402用于支持第一安全网关(或者IKE网关)执行图10、图11A、图11B、图11C、图13、图15、图18、图21中第一安全网关(或者IKE网关)除收发之外的操作。In some possible implementation manners, the communication apparatus 2400 can correspondingly implement the behaviors and functions of the first security gateway (or IKE gateway) in the foregoing method embodiments. For example, the communication apparatus 2400 may be a first security gateway (or an IKE gateway), or may be a component (eg, a chip or a circuit) applied in the first security gateway (or an IKE gateway). The transceiver module 2401 can be used to support the communication between the first security gateway (or IKE gateway) and other network entities, for example, supporting the communication between the first security gateway (or IKE gateway) and FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , Communication among the second security gateway, terminal device, AMF, SMF, etc. shown in FIG. 15 , FIG. 18 , and FIG. 21 . The processing module 2402 is configured to control and manage the actions of the first security gateway (or the IKE gateway). For example, the processing module 2402 is configured to support the first security gateway (or the IKE gateway) to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , The operations of the first security gateway (or the IKE gateway) in Fig. 13, Fig. 15, Fig. 18, and Fig. 21 except for sending and receiving.
在一些实施例中,处理模块2402,用于通过收发模块2401与终端设备建立因特网密钥安全协议IKE安全联盟SA连接;所述处理模块2402,还用于在确定所述终端设备需要通过第二安全网关进行用户面数据的安全传输时,为所述第二安全网关建立因特网协议安全协议IPsec子SA连接;所述IPsec子SA连接用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。In some embodiments, the processing module 2402 is configured to establish an Internet Key Security Protocol IKE SA connection with the terminal device through the transceiver module 2401; the processing module 2402 is further configured to determine that the terminal device needs to pass the second When the security gateway performs secure transmission of user plane data, an Internet Protocol security protocol IPsec sub-SA connection is established for the second security gateway; the IPsec sub-SA connection is used for the communication between the second security gateway and the terminal device. Secure transmission of user plane data.
另一些可能的实施方式中,通信装置2400能够对应实现上述方法实施例中第一核心网网元(或者SMF)的行为和功能。例如通信装置2400可以为第一核心网网元(或者SMF),也可以为应用于第一核心网网元(或者SMF)中的部件(例如芯片或者电路)。收发模块2401可以用于支持第一核心网网元(或者SMF)与其他网络实体的通信,例如支持第一核心网网元(或者SMF)与图10、图11A、图11B、图11C、图13、图15、图18、图21所示的AMF、UPF、第一安全网关(IKE网关)、终端设备等之间的通信。处理模块2402用于对第一核心网网元(或者SMF)的动作进行控制管理,例如处理模块2402用于支持第一核心网网元(或者SMF)执行图10、图11A、图11B、图11C、图13、图15、图18、图21中第一核心网网元(或者SMF)除收发之外的操作。In other possible implementation manners, the communication apparatus 2400 can correspondingly implement the behaviors and functions of the first core network network element (or SMF) in the foregoing method embodiments. For example, the communication apparatus 2400 may be a first core network element (or SMF), or may be a component (eg, a chip or circuit) applied in the first core network element (or SMF). The transceiver module 2401 can be used to support the communication between the first core network element (or SMF) and other network entities, for example, support the first core network element (or SMF) to communicate with FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , and FIG. 13. Communication between AMF, UPF, first security gateway (IKE gateway), terminal equipment, etc. shown in FIG. 15 , FIG. 18 , and FIG. 21 . The processing module 2402 is used to control and manage the actions of the first core network element (or SMF), for example, the processing module 2402 is used to support the first core network element (or SMF) to execute FIG. 10 , FIG. 11A , FIG. 11B , and FIG. Operations of the first core network element (or SMF) in 11C, FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21 except for sending and receiving.
在一些实施例中,处理模块2402,用于确定为终端设备提供安全服务的第一安全网关,所述第一安全网关用于与终端设备之间建立因特网密钥安全协议IKE安全联盟SA连接;收发模块2401,用于向用户面网元配置第一转发规则,所述第一转发规则用于指示用户面网元将属于IKE SA连接的数据包转发给所述第一安全网关;收发模块2401,还用于所述处理模块确定终端设备与第二安全网关之间完成因特网协议安全协议IPsec子SA连接的建立后,向所述用户面网元配置第二转发规则,所述第二转发规则用于指示用户面网元将属于所述IPsec子SA连接的数据包转发给所述第二安全网关。In some embodiments, the processing module 2402 is configured to determine a first security gateway that provides security services for the terminal device, where the first security gateway is configured to establish an Internet Key Security Protocol IKE Security Association SA connection with the terminal device; The transceiver module 2401 is configured to configure a first forwarding rule for the user plane network element, where the first forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IKE SA connection to the first security gateway; the transceiver module 2401 , and is also used for the processing module to configure a second forwarding rule to the user plane network element after the establishment of the IPsec sub-SA connection between the terminal device and the second security gateway is completed, and the second forwarding rule It is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
又一些可能的实施方式中,通信装置2400能够对应实现上述方法实施例中第二安全网关(IPsec网关)的行为和功能。例如通信装置2400可以为第二安全网关(IPsec网关),也可以为应用于第二安全网关(IPsec网关)中的部件(例如芯片或者电路)。收发模块2401可以用于支持第二安全网关(IPsec网关)与其他网络实体的通信,例如支持第二安全网关(IPsec网关)与图10、图11A、图11B、图11C、图13、图15、图18、图21所示的第一安全网关、UPF、终端设备等之间的通信。处理模块2402用于对第二安全网关(IPsec网关)的动作进行控制管理,例如处理模块2402用于支持第二安全网关(IPsec网关)执行图10、图11A、图11B、图11C、图13、图15、图18、图21中第二安全网关(IPsec网关)除收发之外的操作。In some other possible implementation manners, the communication apparatus 2400 can correspondingly implement the behaviors and functions of the second security gateway (IPsec gateway) in the foregoing method embodiments. For example, the communication apparatus 2400 may be a second security gateway (IPsec gateway), or may be a component (eg, a chip or a circuit) applied in the second security gateway (IPsec gateway). The transceiver module 2401 can be used to support the communication between the second security gateway (IPsec gateway) and other network entities, for example, supporting the communication between the second security gateway (IPsec gateway) and FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , and FIG. 15 , the communication between the first security gateway, UPF, terminal equipment, etc. shown in FIG. 18 and FIG. 21 . The processing module 2402 is used to control and manage the actions of the second security gateway (IPsec gateway). For example, the processing module 2402 is used to support the second security gateway (IPsec gateway) to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , and FIG. 13 , Figure 15, Figure 18, Figure 21 in the second security gateway (IPsec gateway) operations other than sending and receiving.
又一些可能的实施方式中,通信装置2400能够对应实现上述方法实施例中终端设备的行为和功能。例如通信装置2400可以为终端设备,也可以为应用于终端设备中的部件(例如芯片或者电路)。收发模块2401可以用于支持终端设备与其他网络实体的通信,例如支持终端设备与图10、图11A、图11B、图11C、图13、图15、图18、图21所示的AMF、第一安全网关、用户面网元等之间的通信。处理模块2402用于对终端设备的动作进行控制管理,例如处理模块2402用于支持终端设备执行图10、图11A、图11B、图11C、图13、图15、图18、图21中终端设备除收发之外的全部操作。In some other possible implementation manners, the communication apparatus 2400 can correspondingly implement the behaviors and functions of the terminal equipment in the foregoing method embodiments. For example, the communication apparatus 2400 may be a terminal device, or may be a component (eg, a chip or a circuit) applied in the terminal device. The transceiver module 2401 can be used to support the communication between the terminal device and other network entities, for example, to support the terminal device to communicate with the AMF shown in FIG. 10, FIG. 11A, FIG. 11B, FIG. - Communication between security gateways, user plane network elements, etc. The processing module 2402 is used to control and manage the actions of the terminal equipment. For example, the processing module 2402 is used to support the terminal equipment to execute the terminal equipment shown in Figure 10, Figure 11A, Figure 11B, Figure 11C, Figure 13, Figure 15, Figure 18, and Figure 21. All operations except sending and receiving.
如图25所示为本申请实施例提供的通信装置2500,其中,通信装置2500可以是第一安全网关(IKE网关),能够实现本申请实施例提供的方法中第一安全网关(IKE网关)的功能,或者,通信装置2500可以是第一核心网网元(SMF),能够实现本申请实施例提供的方法中第一核心网网元(SMF)的功能;或者,通信装置2500可以是第二安全网关(IPsec网关),能够实现本申请实施例提供的方法中第二安全网关(IPsec网关)的功能;或者,通信装置2500可以是终端设备,能够实现本申请实施例提供的方法中终端设备的功能;或者,通信装置2500也可以是能够支持第一安全网关(IKE网关)或者第一核心网网元(SMF)或者第二安全网关(IPsec网关)或者终端设备实现本申请实施例提供的方法中对应的功能的装置。其中,该通信装置2500可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。FIG. 25 shows a communication device 2500 provided in this embodiment of the present application, where the communication device 2500 may be a first security gateway (IKE gateway), which can implement the first security gateway (IKE gateway) in the method provided in this embodiment of the present application function of the first core network element (SMF), or the communication apparatus 2500 may be the first core network element (SMF), which can implement the function of the first core network element (SMF) in the method provided in the embodiments of this application; or, the communication apparatus 2500 may be the first core network element (SMF) Two security gateways (IPsec gateways), which can implement the functions of the second security gateways (IPsec gateways) in the methods provided in the embodiments of the present application; or, the communication apparatus 2500 may be a terminal device, which can implement the terminal devices in the methods provided in the embodiments of the present application. Alternatively, the communication apparatus 2500 may also be capable of supporting a first security gateway (IKE gateway), a first core network element (SMF), a second security gateway (IPsec gateway), or a terminal device to implement the embodiments of the present application. The means of the corresponding function in the method. Wherein, the communication apparatus 2500 may be a chip system. In this embodiment of the present application, the chip system may be composed of chips, or may include chips and other discrete devices.
在硬件实现上,上述收发模块2401可以为收发器,收发器集成在通信装置2500中构成通信接口2503。In terms of hardware implementation, the above-mentioned transceiver module 2401 may be a transceiver, and the transceiver is integrated in the communication device 2500 to form a communication interface 2503 .
通信装置2500包括至少一个处理器2502,处理器2502可以是一个CPU,微处理器,ASIC,或一个或多个用于控制本申请方案程序执行的集成电路,用于实现或用于支持通信装置2500实现本申请实施例提供的方法中第一安全网关(IKE网关)或者第一核心网网元(SMF)或者第二安全网关(IPsec网关)或者终端设备的功能。具体参见方法示例中的详细描述,此处不做赘述。The communication device 2500 includes at least one processor 2502, and the processor 2502 may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the programs of the present application, for implementing or supporting the communication device 2500 implements the functions of the first security gateway (IKE gateway) or the first core network element (SMF) or the second security gateway (IPsec gateway) or the terminal device in the method provided by the embodiment of the present application. For details, refer to the detailed description in the method example, which is not repeated here.
通信装置2500还可以包括至少一个存储器2501,用于存储程序指令和/或数据。存储器2501和处理器2502耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器2502可能和存储器2501协同操作。处理器2502可能执行存储器2501中存储的程序指令和/或数据,以使得通信装置2500实现相应的方法。所述至少一个存储器中的至少一个可以包括于处理器2502中。The communication apparatus 2500 may also include at least one memory 2501 for storing program instructions and/or data. Memory 2501 and processor 2502 are coupled. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. The processor 2502 may cooperate with the memory 2501. The processor 2502 may execute program instructions and/or data stored in the memory 2501 to cause the communication device 2500 to implement the corresponding method. At least one of the at least one memory may be included in the processor 2502.
通信装置2500还可以包括通信接口2503,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN),有线接入网等。该通信接口2503用于通过传输介质和其它设备进行通信,从而用于通信装置2500中的装置可以和其它设备进行通信。处理器2502可以利用通信接口2503收发数据。通信接口2503具体可以是收发器。The communication device 2500 may also include a communication interface 2503, using any transceiver-like device, for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area network (wireless local area network) area networks, WLAN), wired access networks, etc. The communication interface 2503 is used to communicate with other devices through a transmission medium, so that the devices used in the communication device 2500 can communicate with other devices. The processor 2502 can use the communication interface 2503 to send and receive data. The communication interface 2503 may specifically be a transceiver.
本申请实施例中不限定上述通信接口2503、处理器2502以及存储器2501之间的具体连接介质。本申请实施例在图25中以存储器2501、处理器2502以及通信接口2503之间通过总线2504连接,总线在图25中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图25中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The specific connection medium between the communication interface 2503 , the processor 2502 , and the memory 2501 is not limited in the embodiments of the present application. In this embodiment of the present application, the memory 2501, the processor 2502, and the communication interface 2503 are connected by a bus 2504 in FIG. 25. The bus is represented by a thick line in FIG. 25. The connection between other components is only for schematic illustration. , is not limited. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is shown in FIG. 25, but it does not mean that there is only one bus or one type of bus.
在本申请实施例中,处理器2502可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In this embodiment of the present application, the processor 2502 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can realize Alternatively, each method, step, and logic block diagram disclosed in the embodiments of the present application are executed. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
存储器2501可以是ROM或可存储静态信息和指令的其他类型的静态存储设备,RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路2504与处理器相连接。存储器也可以和处理器集成在一起。The memory 2501 can be a ROM or other types of static storage devices that can store static information and instructions, a RAM or other types of dynamic storage devices that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory). read-only memory, EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), magnetic disk A storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, without limitation. The memory may exist independently and be connected to the processor through communication line 2504. The memory can also be integrated with the processor.
其中,存储器2501用于存储执行本申请方案的计算机执行指令,并由处理器2502来控制执行。处理器2502用于执行存储器2501中存储的计算机执行指令,从而实现本申请上述实施例提供的业务管理方法。The memory 2501 is used for storing computer-executed instructions for executing the solution of the present application, and the execution is controlled by the processor 2502 . The processor 2502 is configured to execute the computer-executed instructions stored in the memory 2501, thereby implementing the service management method provided by the foregoing embodiments of the present application.
可选地,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。Optionally, the computer-executed instructions in the embodiments of the present application may also be referred to as application code, which is not specifically limited in the embodiments of the present application.
本申请实施例中还提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行图10、图11A、图11B、图11C、图13、图15、图18、图21中第一安全网关(IKE网关)或者第一核心网网元(SMF)或者第二安全网关(IPsec网关)或者终端设备执行的方法。Embodiments of the present application further provide a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG. In FIG. 21 , the method performed by the first security gateway (IKE gateway) or the first core network element (SMF) or the second security gateway (IPsec gateway) or the terminal device.
本申请实施例中还提供一种计算机程序产品,包括指令,当其在计算机上运行时,使得计算机执行图10、图11A、图11B、图11C、图13、图15、图18、图21中第一安全网 关(IKE网关)或者第一核心网网元(SMF)或者第二安全网关(IPsec网关)或者终端设备执行的方法。Embodiments of the present application further provide a computer program product, including instructions, which, when run on a computer, cause the computer to execute FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21 In the method, a first security gateway (IKE gateway) or a first core network element (SMF) or a second security gateway (IPsec gateway) or a terminal device executes the method.
本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述图10、图11A、图11B、图11C、图13、图15、图18、图21中第一安全网关(IKE网关)或者第一核心网网元(SMF)或者第二安全网关(IPsec网关)或者终端设备的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。An embodiment of the present application provides a chip system, where the chip system includes a processor and may also include a memory, for implementing the aforementioned FIG. 10 , FIG. 11A , FIG. 11B , FIG. 11C , FIG. 13 , FIG. 15 , FIG. 18 , and FIG. 21 The functions of the first security gateway (IKE gateway) or the first core network element (SMF) or the second security gateway (IPsec gateway) or the terminal device. The chip system can be composed of chips, and can also include chips and other discrete devices.
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,也表示先后顺序。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。“至少一个”是指一个或者多个。至少两个是指两个或者多个。“至少一个”、“任意一个”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个、种),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。“多个”是指两个或两个以上,其它量词与之类似。此外,对于单数形式“a”,“an”和“the”出现的元素(element),除非上下文另有明确规定,否则其不意味着“一个或仅一个”,而是意味着“一个或多于一个”。例如,“a device”意味着对一个或多个这样的device。Those of ordinary skill in the art can understand that the first, second, and other numeral numbers involved in the present application are only for the convenience of description, and are not used to limit the scope of the embodiments of the present application, but also represent the sequence. "And/or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone. The character "/" generally indicates that the associated objects are an "or" relationship. "At least one" means one or more. At least two means two or more. "At least one", "any one", or similar expressions, refers to any combination of these items, including any combination of single item(s) or plural item(s). For example, at least one item (single, species) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple. "Plurality" means two or more, and other quantifiers are similar. Furthermore, occurrences of the singular forms "a", "an" and "the" do not mean "one or only one" unless the context clearly dictates otherwise, but rather "one or more" in one". For example, "a device" means to one or more such devices.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包括一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that a computer can access, or a data storage device such as a server, a data center, or the like that includes an integration of one or more available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
本申请实施例中所描述的各种说明性的逻辑单元和电路可以通过通用处理器,数字信号处理器,专用集成电路(ASIC),现场可编程门阵列(FPGA)或其它可编程逻辑装置,离散门或晶体管逻辑,离散硬件部件,或上述任何组合的设计来实现或操作所描述的功能。通用处理器可以为微处理器,可选地,该通用处理器也可以为任何传统的处理器、控制器、微控制器或状态机。处理器也可以通过计算装置的组合来实现,例如数字信号处理器和微处理器,多个微处理器,一个或多个微处理器联合一个数字信号处理器核,或任何其它类似的配置来实现。The various illustrative logic units and circuits described in the embodiments of this application may be implemented by general purpose processors, digital signal processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) or other programmable logic devices, Discrete gate or transistor logic, discrete hardware components, or any combination of the above are designed to implement or operate the described functions. A general-purpose processor may be a microprocessor, or alternatively, the general-purpose processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors in combination with a digital signal processor core, or any other similar configuration. accomplish.
本申请实施例中所描述的方法或算法的步骤可以直接嵌入硬件、处理器执行的软件单元、或者这两者的结合。软件单元可以存储于RAM存储器、闪存、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、可移动磁盘、CD-ROM或本领域中其它任意形式的存储媒介中。示例性地,存储媒介可以与处理器连接,以使得处理器可以从存储媒 介中读取信息,并可以向存储媒介存写信息。可选地,存储媒介还可以集成到处理器中。处理器和存储媒介可以设置于ASIC中。The steps of the method or algorithm described in the embodiments of this application may be directly embedded in hardware, a software unit executed by a processor, or a combination of the two. A software unit may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. Illustratively, a storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. Optionally, the storage medium can also be integrated into the processor. The processor and storage medium may be provided in the ASIC.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包括这些改动和变型在内。Although the application has been described in conjunction with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made therein without departing from the spirit and scope of the application. Accordingly, this specification and drawings are merely exemplary illustrations of the application as defined by the appended claims, and are deemed to cover any and all modifications, variations, combinations or equivalents within the scope of this application. Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (20)

  1. 一种通信方法,其特征在于,包括:A communication method, comprising:
    第一安全网关与终端设备建立因特网密钥安全协议IKE安全联盟SA连接;The first security gateway establishes an Internet Key Security Protocol IKE Security Association SA connection with the terminal device;
    所述第一安全网关在确定所述终端设备需要通过第二安全网关进行用户面数据的安全传输时,为所述第二安全网关建立因特网协议安全协议IPsec子SA连接;所述IPsec子SA连接用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。When determining that the terminal device needs to perform secure transmission of user plane data through the second security gateway, the first security gateway establishes an Internet Protocol security protocol IPsec sub-SA connection for the second security gateway; the IPsec sub-SA connection It is used for the secure transmission of user plane data between the second security gateway and the terminal device.
  2. 如权利要求1所述的方法,其特征在于,所述为所述第二安全网关建立因特网协议安全协议IPsec子SA连接,包括:The method of claim 1, wherein establishing an Internet Protocol Security Protocol (IPsec) sub-SA connection for the second security gateway comprises:
    所述第一安全网关与所述终端设备之间进行IPsec子SA连接的协商得到第一安全参数;negotiating an IPsec sub-SA connection between the first security gateway and the terminal device to obtain a first security parameter;
    所述第一安全网关将所述第一安全参数配置给所述第二安全网关;the first security gateway configures the first security parameter to the second security gateway;
    其中,所述第一安全参数用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。Wherein, the first security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
  3. 如权利要求2所述的方法,其特征在于,所述第一安全参数包括用于生成与所述终端设备之间进行用户面数据传输的密钥的材料。The method of claim 2, wherein the first security parameter comprises material for generating a key for user plane data transmission with the terminal device.
  4. 如权利要求3所述的方法,其特征在于,所述用于生成与所述终端设备之间进行用户面数据传输的密钥的材料包括如下一项或者多项:The method according to claim 3, wherein the material for generating a key for user plane data transmission with the terminal device comprises one or more of the following:
    第一安全网关生成的密钥材料、所述终端设备的密钥交换材料、为所述第二安全网关配置的密钥交换材料、所述终端设备的随机数或者为所述第二安全网关生成的随机数。Key material generated by the first security gateway, key exchange material of the terminal device, key exchange material configured for the second security gateway, random numbers of the terminal device or generated for the second security gateway of random numbers.
  5. 如权利要求3或4所述的方法,其特征在于,所述第一安全参数还包括如下一项或者多项:The method according to claim 3 or 4, wherein the first security parameter further comprises one or more of the following:
    所述终端设备的加密算法,为所述第二安全网关分配的加密算法,用于所述终端设备与所述第二安全网关之间进行用户面数据传输的数据包过滤规则。The encryption algorithm of the terminal device is the encryption algorithm allocated by the second security gateway, and is used for the packet filtering rule for user plane data transmission between the terminal device and the second security gateway.
  6. 如权利要求1所述的方法,其特征在于,所述第一安全网关为所述第二安全网关建立因特网协议安全协议IPsec子SA,包括:The method of claim 1, wherein the first security gateway establishes an Internet Protocol Security Protocol (IPsec) sub-SA for the second security gateway, comprising:
    所述第一安全网关接收终端设备发起的建立请求,所述建立请求用于请求与所述第二安全网关建立因特网协议安全协议IPsec子SA连接;receiving, by the first security gateway, an establishment request initiated by a terminal device, where the establishment request is used to request to establish an IPsec sub-SA connection with the second security gateway;
    所述第一安全网关向所述第二安全网关发送IPsec子SA连接的配置上下文,所述配置上下文中包括为所述第二安全网关配置的用于与终端设备建立IPsec子SA连接的第二安全参数;The first security gateway sends a configuration context of an IPsec sub-SA connection to the second security gateway, where the configuration context includes a second configuration context configured for the second security gateway for establishing an IPsec sub-SA connection with a terminal device. security parameters;
    所述第一安全网关接收来自第二安全网关的第三安全参数,所述第三安全参数是所述第二安全网关对所述第二安全参数进行更新或者确认得到的;receiving, by the first security gateway, a third security parameter from a second security gateway, where the third security parameter is obtained by updating or confirming the second security parameter by the second security gateway;
    所述第一安全网关向终端设备发送建立响应,所述建立响应中包括所述第三安全参数;sending, by the first security gateway, a setup response to the terminal device, where the setup response includes the third security parameter;
    其中,所述第三安全参数用于所述第二安全网关与所述终端设备之间进行用户面数据的安全传输。The third security parameter is used for secure transmission of user plane data between the second security gateway and the terminal device.
  7. 如权利要求6所述的方法,其特征在于,所述第二安全参数包括用于所述第二安全网关生成与所述终端设备之间进行用户面数据传输的密钥的材料。6. The method of claim 6, wherein the second security parameter comprises material used for the second security gateway to generate a key for user plane data transmission with the terminal device.
  8. 如权利要求7所述的方法,其特征在于,所述用于生成与所述终端设备之间进行用户面数据传输的密钥的材料包括如下一项或者多项:The method according to claim 7, wherein the material for generating a key for user plane data transmission with the terminal device comprises one or more of the following:
    所述第一安全网关生成的密钥材料、所述终端设备的密钥交换材料、所述第一安全网 关的第一密钥交换材料、所述终端设备使用的第一随机数或者所述第一安全网关使用的第二随机数。The key material generated by the first security gateway, the key exchange material of the terminal device, the first key exchange material of the first security gateway, the first random number used by the terminal device, or the first key exchange material of the terminal device. A second random number used by the security gateway.
  9. 如权利要求8所述的方法,其特征在于,所述第三安全参数包括如下一项或者多项:The method of claim 8, wherein the third security parameter includes one or more of the following:
    对所述第一密钥交换材料进行更新的第二密钥交换材料、对所述第一随机数进行更新的第三随机数。A second key exchange material for updating the first key exchange material, and a third random number for updating the first random number.
  10. 如权利要求8或9所述的方法,其特征在于,所述第二安全参数还包括如下一项或者多项:The method according to claim 8 or 9, wherein the second security parameter further comprises one or more of the following:
    终端设备的加密算法、为所述第二安全网关分配的加密算法或者用于所述终端设备与所述第二安全网关之间进行用户面数据传输的第一数据包过滤规则。The encryption algorithm of the terminal device, the encryption algorithm allocated to the second security gateway, or the first data packet filtering rule used for user plane data transmission between the terminal device and the second security gateway.
  11. 如权利要求10所述的方法,其特征在于,所述第三安全参数还包括对所述第一数据包过滤规则进行更新的第二数据包过滤规则。The method of claim 10, wherein the third security parameter further comprises a second packet filtering rule for updating the first packet filtering rule.
  12. 如权利要求10或11所述的方法,其特征在于,所述第三安全参数还包括所述第二安全网关选择的加密算法。The method according to claim 10 or 11, wherein the third security parameter further comprises an encryption algorithm selected by the second security gateway.
  13. 一种通信方法,其特征在于,包括:A communication method, comprising:
    第一核心网网元确定为终端设备提供安全服务的第一安全网关,所述第一安全网关用于与终端设备之间建立因特网密钥安全协议IKE安全联盟SA连接;The network element of the first core network determines a first security gateway that provides security services for the terminal device, where the first security gateway is configured to establish an Internet Key Security Protocol IKE Security Association SA connection with the terminal device;
    所述第一核心网网元向用户面网元配置第一转发规则,所述第一转发规则用于指示用户面网元将属于IKE SA连接的数据包转发给所述第一安全网关;The first core network element configures the user plane network element with a first forwarding rule, where the first forwarding rule is used to instruct the user plane network element to forward the data packets belonging to the IKE SA connection to the first security gateway;
    所述第一核心网网元在确定终端设备与第二安全网关之间完成因特网协议安全协议IPsec子SA连接的建立后,向所述用户面网元配置第二转发规则,所述第二转发规则用于指示用户面网元将属于所述IPsec子SA连接的数据包转发给所述第二安全网关。The first core network element configures the user plane network element with a second forwarding rule after determining that the establishment of the Internet Protocol Security Protocol (IPsec) sub-SA connection between the terminal device and the second security gateway is completed. The rule is used to instruct the user plane network element to forward the data packets belonging to the IPsec sub-SA connection to the second security gateway.
  14. 如权利要求13所述的方法,其特征在于,第一核心网网元确定为终端设备提供安全服务的第一安全网关,包括:The method according to claim 13, wherein determining the first security gateway that provides security services for the terminal device by the first core network element comprises:
    所述第一核心网网元根据所述终端设备的签约数据确定为所述终端设备提供安全服务的第一安全网关;或者,The first core network element determines, according to the subscription data of the terminal device, a first security gateway that provides security services for the terminal device; or,
    所述第一核心网网元根据本地配置信息确定为所述终端设备提供安全服务的第一安全网关;或者,The network element of the first core network determines, according to the local configuration information, a first security gateway that provides security services for the terminal device; or,
    所述第一核心网网元接收来自第二核心网网元的第一安全网关的地址信息,根据所述第一安全网关的地址信息确定为所述终端设备提供安全服务的第一安全网关;或者,The first core network element receives address information of a first security gateway from a second core network network element, and determines a first security gateway that provides security services for the terminal device according to the address information of the first security gateway; or,
    所述第一核心网网元接收来自终端设备的第一安全网关的地址信息,所述第一安全网关为策略控制网元为所述终端设备配置的至少一个安全网关中的一个。The first core network element receives address information from a first security gateway of a terminal device, where the first security gateway is one of at least one security gateway configured by a policy control network element for the terminal device.
  15. 如权利要求14所述的方法,其特征在于,所述第一核心网网元为会话管理网元,所述第二核心网网元为移动性管理网元。The method of claim 14, wherein the first core network element is a session management network element, and the second core network element is a mobility management network element.
  16. 如权利要求13-15任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 13-15, wherein the method further comprises:
    所述第一核心网网元将确定的第一安全网关的地址信息发送给所述终端设备,所述第一安全网关的地址信息用于所述终端设备触发建立IKE SA连接。The first core network element sends the determined address information of the first security gateway to the terminal device, where the address information of the first security gateway is used by the terminal device to trigger the establishment of an IKE SA connection.
  17. 如权利要求13-15任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 13-15, wherein the method further comprises:
    所述第一核心网网元将所述终端设备的地址信息发送给第一安全网关,所述终端设备的地址信息用于所述第一安全网关触发建立IKE SA连接。The first core network element sends the address information of the terminal device to the first security gateway, where the address information of the terminal device is used by the first security gateway to trigger the establishment of an IKE SA connection.
  18. 一种通信装置,其特征在于,包括用于执行如权利要求1至12或13至17中的任 一项所述方法的模块。A communication device, characterized in that it comprises means for performing the method of any one of claims 1 to 12 or 13 to 17.
  19. 一种通信装置,其特征在于,包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1至12或13至17中任一项所述的方法。A communication device, characterized by comprising a processor and an interface circuit, the interface circuit being configured to receive signals from other communication devices other than the communication device and transmit to the processor or transfer signals from the processor The signal is sent to other communication devices other than the communication device, and the processor is used to implement the method according to any one of claims 1 to 12 or 13 to 17 by means of a logic circuit or executing code instructions.
  20. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机指令,当所述计算机指令被执行时,使得权利要求1至12或13至17中任一项所述的方法被执行。A computer-readable storage medium, characterized in that the computer-readable storage medium stores computer instructions, when the computer instructions are executed, the computer instructions described in any one of claims 1 to 12 or 13 to 17 are made method is executed.
PCT/CN2021/078325 2021-02-27 2021-02-27 Communication method and apparatus WO2022178888A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/078325 WO2022178888A1 (en) 2021-02-27 2021-02-27 Communication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/078325 WO2022178888A1 (en) 2021-02-27 2021-02-27 Communication method and apparatus

Publications (1)

Publication Number Publication Date
WO2022178888A1 true WO2022178888A1 (en) 2022-09-01

Family

ID=83047675

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/078325 WO2022178888A1 (en) 2021-02-27 2021-02-27 Communication method and apparatus

Country Status (1)

Country Link
WO (1) WO2022178888A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227494A (en) * 2008-01-09 2008-07-23 中兴通讯股份有限公司 Method for establishing Internet safety protocol safe alliance when accessing multi grouping data network
CN107615825A (en) * 2015-05-28 2018-01-19 瑞典爱立信有限公司 Multiple PDN connections in insincere WLAN accesses
CN109428852A (en) * 2017-07-18 2019-03-05 中兴通讯股份有限公司 Communication tunnel end-point addresses separation method, terminal, ePDG and storage medium
WO2019186504A1 (en) * 2018-03-29 2019-10-03 Telefonaktiebolaget Lm Ericsson (Publ) Methods for support of user plane separation and user plane local offloading for 5g non-3gpp access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227494A (en) * 2008-01-09 2008-07-23 中兴通讯股份有限公司 Method for establishing Internet safety protocol safe alliance when accessing multi grouping data network
CN107615825A (en) * 2015-05-28 2018-01-19 瑞典爱立信有限公司 Multiple PDN connections in insincere WLAN accesses
CN109428852A (en) * 2017-07-18 2019-03-05 中兴通讯股份有限公司 Communication tunnel end-point addresses separation method, terminal, ePDG and storage medium
WO2019186504A1 (en) * 2018-03-29 2019-10-03 Telefonaktiebolaget Lm Ericsson (Publ) Methods for support of user plane separation and user plane local offloading for 5g non-3gpp access

Similar Documents

Publication Publication Date Title
JP7469045B2 (en) Method and system for protecting privacy of 5G slice identifiers
EP3577878B1 (en) Securing communication of devices in the internet of things
JP6903006B2 (en) User plane security for next-generation cellular networks
WO2020029938A1 (en) Secure conversation method and device
WO2017200978A1 (en) Security-based slice selection and assignment
US20220295273A1 (en) System and method for deriving a profile for a target endpoint device
JP2019527498A (en) Key configuration method, security policy determination method, and apparatus
JP6936393B2 (en) Parameter protection method and device, and system
EP3284276B1 (en) Security improvements in a cellular network
KR20200003108A (en) Key generation methods, user equipment, devices, computer readable storage media, and communication systems
TW201715864A (en) Key hierarchy for network slicing
Xu et al. BE-RAN: Blockchain-enabled open RAN with decentralized identity management and privacy-preserving communication
CN112887970A (en) Machine-to-machine cellular communication security
US20230354013A1 (en) Secure communication method and device
US20210219137A1 (en) Security management between edge proxy and internetwork exchange node in a communication system
WO2020094914A1 (en) Secure inter-mobile network communication
Krishnan et al. Sdn enabled qoe and security framework for multimedia applications in 5g networks
EP3520452A1 (en) Updating security key
Fujdiak et al. Security in low-power wide-area networks: State-of-the-art and development toward the 5G
WO2012083873A1 (en) Method, apparatus and system for key generation
WO2022160314A1 (en) Method, apparatus and system for obtaining security parameters
WO2022178888A1 (en) Communication method and apparatus
WO2022165745A1 (en) Data configuration method and apparatus, system, and storage medium
Singh et al. Unified heterogeneous networking design
US20240146702A1 (en) Traffic management with asymmetric traffic encryption in 5g networks

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21927323

Country of ref document: EP

Kind code of ref document: A1