WO2022225335A1 - 이동 통신 시스템에서 단말 간 연결을 통한 네트워크 접속 요청의 인증을 위한 방법 및 장치 - Google Patents
이동 통신 시스템에서 단말 간 연결을 통한 네트워크 접속 요청의 인증을 위한 방법 및 장치 Download PDFInfo
- Publication number
- WO2022225335A1 WO2022225335A1 PCT/KR2022/005673 KR2022005673W WO2022225335A1 WO 2022225335 A1 WO2022225335 A1 WO 2022225335A1 KR 2022005673 W KR2022005673 W KR 2022005673W WO 2022225335 A1 WO2022225335 A1 WO 2022225335A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- remote terminal
- relay
- identifier
- ausf
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000010295 mobile communication Methods 0.000 title description 21
- 238000004891 communication Methods 0.000 claims abstract description 120
- 238000007726 management method Methods 0.000 claims description 8
- 238000013523 data management Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 230000004044 response Effects 0.000 description 45
- 230000006870 function Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 22
- 238000005516 engineering process Methods 0.000 description 18
- 238000003860 storage Methods 0.000 description 9
- 238000013473 artificial intelligence Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 4
- 230000006872 improvement Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
Definitions
- the present disclosure relates to a method for authentication and authority management of an access requesting terminal when a mobile communication network access request is made through another terminal based on direct communication between terminals in a mobile communication system.
- 5G mobile communication technology defines a wide frequency band to enable fast transmission speed and new services. It can also be implemented in the very high frequency band ('Above 6GHz') called Wave).
- 6G mobile communication technology which is called a system after 5G communication (Beyond 5G)
- Beyond 5G in order to achieve transmission speed 50 times faster than 5G mobile communication technology and ultra-low latency reduced by one-tenth, Tera Implementations in the Terahertz band (such as, for example, the 95 GHz to 3 THz band) are being considered.
- ultra-wideband service enhanced Mobile BroadBand, eMBB
- high reliability / ultra-low latency communication Ultra-Reliable Low-Latency Communications, URLLC
- massive-scale mechanical communication massive Machine-Type Communications, mMTC
- Beamforming and Massive MIMO to increase the propagation distance and mitigate the path loss of radio waves in the ultra-high frequency band with the goal of service support and performance requirements, and efficient use of ultra-high frequency resources
- various numerology eg, operation of multiple subcarrier intervals
- New channel coding methods such as LDPC (Low Density Parity Check) code for data transmission and polar code for reliable transmission of control information, L2 pre-processing, dedicated dedicated to specific services Standardization of network slicing that provides a network has progressed.
- LDPC Low Density Parity Check
- the Intelligent Factory Intelligent Internet of Things, IIoT
- IAB Intelligent Internet of Things
- IAB Intelligent Internet of Things
- 2-step RACH for simplifying random access procedures
- 5G baseline for the grafting of Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies Standardization of the system architecture/service field for architecture (eg, Service based Architecture, Service based Interface), Mobile Edge Computing (MEC) receiving services based on the location of the terminal, etc. is also in progress.
- NFV Network Functions Virtualization
- SDN Software-Defined Networking
- the present disclosure uses direct communication between terminals in a mobile communication system to manage authentication, access permission, and creation of a security connection between terminals in a mobile communication network when accessing a mobile communication network through another terminal. suggest a way
- a method performed by an access and mobility management function (AMF) of a wireless communication system includes: receiving a relay key request message including an identifier of a remote terminal for the terminal-network relay communication from a relay terminal for terminal-network relay communication; checking whether the relay terminal is authenticated to provide a terminal-network relay service; checking an authentication server function (AUSF) associated with the remote terminal based on the identifier of the remote terminal; transmitting an authentication request message including an identifier of the remote terminal to the AUSF; When the authentication procedure for the remote terminal based on the identifier of the remote terminal is successfully performed, obtaining a ProSe (proximity-based services) session encryption key established between the remote terminal and the relay terminal; and transmitting the ProSe session encryption key to the relay terminal.
- AMF access and mobility management function
- a method performed by an AUSF of a wireless communication system includes, from the AMF, receiving an authentication request message including an identifier of a remote terminal for terminal-network relay communication; obtaining an authentication vector for the remote terminal from a unified data management (UDM) based on the identifier of the remote terminal; performing an authentication procedure for the remote terminal based on the authentication vector; and generating an encryption key shared between the remote terminal and the AUSF based on the authentication procedure for the remote terminal.
- the AUSF is related to the remote terminal, characterized in that it is identified based on the identifier of the remote terminal.
- an AMF of a wireless communication system includes a transceiver and a control unit.
- the control unit controls the transceiver to receive a relay key request message including an identifier of a remote terminal for the terminal-network relay communication, from the relay terminal for the terminal-network relay communication, and the relay terminal is the terminal-network Check whether it is authenticated to provide a relay service, check the AUSF related to the remote terminal based on the identifier of the remote terminal, and transmit and receive an authentication request message including the identifier of the remote terminal to the AUSF control wealth; When the authentication procedure for the remote terminal based on the identifier of the remote terminal is successfully performed, a ProSe session encryption key established between the remote terminal and the relay terminal is obtained, and the ProSe session encryption key is transmitted to the relay terminal to control the transceiver.
- an AUSF of a wireless communication system includes a transceiver and a control unit.
- the control unit controls the transceiver to receive an authentication request message including the identifier of the remote terminal for terminal-network relay communication from the AMF, and based on the identifier of the remote terminal, from the UDM to the remote terminal Acquire an authentication vector, perform an authentication procedure for the remote terminal based on the authentication vector, and generate an encryption key shared between the remote terminal and the AUSF based on the authentication procedure for the remote terminal.
- the AUSF is related to the remote terminal, characterized in that it is identified based on the identifier of the remote terminal.
- authentication of a network access request through a terminal-to-device connection can be effectively performed.
- FIG. 1 is a diagram showing the structure of a 5G mobile communication system according to an embodiment of the present invention.
- FIG. 2 is a sequence diagram illustrating a procedure for generating an encryption key for direct communication between terminals of a terminal according to an embodiment of the present invention.
- FIG. 3 is a sequence diagram illustrating an authentication and encryption key generation procedure of a terminal according to an embodiment of the present invention.
- FIG. 4 is a sequence diagram illustrating a direct connection between terminals and a network permission procedure using a temporary identifier of the terminal according to an embodiment of the present invention.
- FIG. 5 is a sequence diagram illustrating a direct connection between terminals and a network permission procedure through terminal authentication according to an embodiment of the present invention.
- FIG. 6 is a sequence diagram illustrating a procedure for establishing a direct connection between terminals using a temporary identifier of a terminal and generating an encryption key according to an embodiment of the present invention.
- FIG. 7 is a diagram illustrating the structure of a terminal according to an embodiment of the present invention.
- FIG. 8 is a diagram illustrating a structure of a base station according to an embodiment of the present invention.
- FIG. 9 is a diagram illustrating the structure of an AMF according to an embodiment of the present invention.
- FIG. 10 is a diagram illustrating the structure of a core network entity according to an embodiment of the present invention.
- each block of the flowchart diagrams and combinations of the flowchart diagrams may be performed by computer program instructions.
- These computer program instructions may be embodied in a processor of a general purpose computer, special purpose computer, or other programmable data processing equipment, such that the instructions performed by the processor of the computer or other programmable data processing equipment are not described in the flowchart block(s). It creates a means to perform functions.
- These computer program instructions may also be stored in a computer-usable or computer-readable memory that may direct a computer or other programmable data processing equipment to implement a function in a particular manner, and thus the computer-usable or computer-readable memory.
- the instructions stored in the flowchart block(s) may produce an article of manufacture containing instruction means for performing the function described in the flowchart block(s).
- the computer program instructions may also be mounted on a computer or other programmable data processing equipment, such that a series of operational steps are performed on the computer or other programmable data processing equipment to create a computer-executed process to create a computer or other programmable data processing equipment. It is also possible that instructions for performing the processing equipment provide steps for performing the functions described in the flowchart block(s).
- each block may represent a module, segment, or portion of code that includes one or more executable instructions for executing specified logical function(s). It should also be noted that in some alternative implementations it is also possible for the functions recited in the blocks to occur out of order. For example, it is possible that two blocks shown in succession are actually performed substantially simultaneously, or that the blocks are sometimes performed in the reverse order according to the corresponding function.
- ' ⁇ unit' used in this embodiment means software or hardware components such as FPGA or ASIC, and ' ⁇ unit' performs certain roles.
- '-part' is not limited to software or hardware.
- ' ⁇ unit' may be configured to reside on an addressable storage medium or may be configured to refresh one or more processors.
- ' ⁇ ' denotes components such as software components, object-oriented software components, class components, and task components, and processes, functions, properties, and procedures. , subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components and ' ⁇ units' may be combined into a smaller number of components and ' ⁇ units' or further separated into additional components and ' ⁇ units'.
- components and ' ⁇ units' may be implemented to play one or more CPUs in a device or secure multimedia card.
- FIG. 1 is a diagram showing the structure of a 5G mobile communication system according to an embodiment of the present invention.
- a unit performing each function in the core network of the 5G mobile communication system may be defined as a network function (NF).
- the structure of the 5G mobile communication network is shown in FIG. 1 .
- Representative NFs include an access and mobility management function (AMF) that manages network access and mobility of a user equipment (UE), a session management function (SMF) that performs a function related to a session for the terminal, and is responsible for delivering user data and UPF (user plane function) controlled by SMF, NEF (network exposure function) that provides information about the terminal to 5G network devices and other external servers, UDM (unified data management) for data storage and management and UDR (unified data repository), PCF (policy and control function) that manages policies, AUSF (authentication server function) that performs terminal authentication in 3GPP access networks and non-3GPP access networks, and users A data network (DN) such as the Internet through which data is passed may be included.
- the session information for the terminal may include quality of service (QoS) information, charging information, and
- the AMF of the 5G network system may include a Security Anchor Function (SEAF) in charge of a security-related function of the terminal.
- SEAF Security Anchor Function
- the 5G network system may further include a base station, a network slice selection function (NSSF), and a network repository function (NRF).
- NEF network repository function
- FIG. 2 is a sequence diagram illustrating a procedure for generating an encryption key for direct communication between terminals of a terminal according to an embodiment of the present invention.
- direct communication between terminals may include device-to-device (D2D) communication, proximity-based services (ProSe), and the like, but the scope of the present disclosure is not limited to the listed terms.
- D2D device-to-device
- ProSe proximity-based services
- the terminal may receive policies necessary for the terminal's network use from the AMF.
- the policy required for network use of terminals includes information necessary for whether direct communication between terminals is supported, whether UE-to-NW (network) relay operation using direct communication between terminals is possible, and connection setting of direct communication between terminals. It may include at least one.
- the terminal may transmit a request message (eg, Key Request) for generating an encryption key required for direct communication between terminals to the AMF.
- a request message eg, Key Request
- the terminal may include a temporary identifier (eg, 5G-GUTI (globally unique temporary identifier)) of the terminal allocated after performing the network registration procedure in the Key Request.
- 5G-GUTI globalally unique temporary identifier
- the registration request message sent by the UE to the AMF may be transmitted through a radio access network (RAN, or a base station, or a next generation node B (gNB), hereinafter referred to as a mixture) (not shown).
- RAN radio access network
- gNB next generation node B
- the AMF may check the subscriber's 5G subscriber identifier (eg, subscription permanent identifier; SUPI) using the terminal's temporary identifier (5G-GUTI) included in the Key Request received from the terminal, and the terminal You can check if you have completed the correct authentication.
- 5G subscriber identifier eg, subscription permanent identifier; SUPI
- 5G-GUTI temporary identifier
- AMF can use the 5G subscriber identifier confirmed by 5G-GUTI to check from the UDM whether or not the subscriber's direct communication between terminals is permitted and authority.
- the AMF uses the 5G subscriber identifier,
- the generation of an encryption key (eg, K_REAR) required for direct communication may be requested from the AUSF.
- the AMF may include the 5G subscriber identifier in a message (eg, Key Request) requesting generation of an encryption key (eg, K_REAR) required for direct communication between terminals to the AUSF.
- the key generation sequence of the encryption keys of the terminal according to an embodiment of the present invention is as follows as an example.
- K_AUSF A shared encryption key between the terminal and the AUSF generated when the subscriber authenticates the subscriber through the terminal. K_AUSF may be generated for each subscriber.
- K_REAR An encryption key for direct communication between terminals used by the subscriber for direct communication between terminals.
- K_AUSF can be used to create K_REAR.
- K_REAR may be generated for each subscriber.
- K_ProSe When a subscriber establishes a direct communication connection with another terminal using a terminal, a session encryption key for direct communication between terminals used to protect the connection. K_REAR can be used to create K_ProSe. K_ProSe may be generated for each pair of other terminals that directly communicate with the subscriber station. Whenever a direct connection between terminals is newly established, K_ProSe may be generated. By utilizing K_ProSe, keys for encryption (Encryption) and authentication verification (Integrity Protection) of direct connection data between terminals can be separately generated.
- step S210 when the AUSF receives a request to generate K_REAR from the AMF, it determines input variables and input constants necessary for K_REAR generation, and generates K_REAR using the K_AUSF generated when the terminal authenticates the input variables and input constants. can do.
- the input variable input during the generation of K_REAR may include at least one of a random number (RAND) newly determined by AUSF, an encryption key number updated every time K_REAR is generated, and some or all of the 5G subscriber identifier information of the terminal. . It may also include other values not mentioned above.
- the input constant input when generating K_REAR may include a value or character string previously negotiated between the terminal and the network.
- step S212 when generating K_REAR, the AUSF provides the AMF with the value of the input variable not previously negotiated with the terminal among the included input variables, the encryption key indicator (K_REAR ID) that can indicate K_REAR, and K_REAR, including K_REAR.
- K_REAR ID the encryption key indicator
- K_REAR ID the encryption key indicator
- K_REAR the encryption key indicator
- the AUSF may share the K_REAR and K_REAR ID of the terminal to the UDM.
- the AMF receiving the Key Response from the AUSF may store (store) the included K_REAR and K_REAR IDs as cryptographic information linked to the subscriber information of the terminal.
- the AMF may inform the terminal that the K_REAR has been successfully created in the network by transmitting a response message (eg, Key Response) to the key request.
- a response message eg, Key Response
- the AMF may include input variables necessary for generating K_REAR received from the AUSF, ID of K_REAR, etc. in Key Response for transmitting to the terminal. If there is a method agreed in advance between the terminal and the network for the allocation of the K_REAR ID, the K_REAR ID may be omitted from the message.
- the terminal may generate K_REAR by using an input variable or ID of K_REAR required to generate K_REAR.
- FIG. 3 is a sequence diagram illustrating an authentication and encryption key generation procedure of a terminal according to an embodiment of the present invention.
- FIG. 3 a procedure for generating K_REAR by using a registration procedure in which a terminal registers with a 5G system according to an embodiment of the present invention is illustrated.
- the terminal may transmit a registration request message including at least one of the 5G subscriber identifier and the terminal-to-device communication service related indicator to the AMF.
- the 5G subscriber identifier may include an unencrypted subscription permanent identifier (SUPI) or an encrypted subscription concealed identifier (SUCI).
- the terminal-to-device communication service-related indicator indicates whether the terminal-to-device communication function is mounted, the request for activation of the terminal-to-terminal communication function, the request for use of the terminal-to-device communication service, the communication service request with other terminals utilizing the terminal-to-terminal communication function, and the terminal-to-device communication function
- Some or all of information such as a UE-to-NW Relay service request using a communication function may be included.
- the registration request message sent by the terminal to the AMF may be transmitted through a RAN (base station) (not shown).
- the AMF may determine whether authentication of the subscriber station is required based on the 5G subscriber identifier included in the registration request message.
- the AMF may transmit an authentication request message (eg, Authentication Request) including at least one of a 5G user identifier and an indicator related to a communication service between terminals to the AUSF.
- an authentication request message eg, Authentication Request
- the AUSF receives the authentication request message from the AMF (SEAF), and in step S306, the AUSF may request authentication information for the subscriber station from the UDM. And, the AUSF may receive a 5G home environment authentication vector (5G HE AV: home environment authentication vector) from the UDM. The AUSF may also receive the SUPI of the UE from the UDM. And, the AUSF may generate K_AUSF using the information received from the UDM.
- SEAF authentication request message from the AMF
- 5G home environment authentication vector 5G HE AV: home environment authentication vector
- the AUSF may transmit a message (eg, Authentication Response) including a 5G serving environment authentication vector (5G SE AV) to the AMF (SEAF).
- a message eg, Authentication Response
- 5G SE AV 5G serving environment authentication vector
- step S310 the AMF receives the Authentication Response from the AUSF and based on this, the authentication request message to the terminal including information necessary for authentication confirmation of the terminal such as RAND, AUTH, and K_AUSF generation in the terminal (e.g., Authentication Request) can be sent.
- the terminal may perform operations necessary for network authentication based on the information received from the AMF. In this case, if the network authentication procedure is successful, the terminal may generate K_AUSF based on it. In addition, the terminal may use K_AUSF to generate an encryption key for direct communication between terminals (K_REAR) and other encryption keys not mentioned.
- the terminal may transmit a response message to the authentication request (eg, Authentication Response) to the AMF after the operation of the network authentication procedure.
- the terminal may include a value RES* for confirming in the AUSF whether the terminal is correctly authenticated in the response message.
- the AMF may include the RES* included in the response message of the terminal in the authentication request message to the AUSF.
- the AUSF may calculate the value of RES*, check whether the response received from the terminal is appropriate, and determine whether the subscriber terminal is successfully authenticated.
- the AUSF may deliver the result of the authentication check of the terminal to the AMF.
- the AUSF if the authentication of the terminal is successful, in step S318, the AUSF generates an encryption key necessary for the network operation of K_REAR, K_SEAF and other terminals not mentioned here, and in step S320, the AUSF sends it to the AMF. can transmit In step S322, the AMF may store the encryption key received from the AUSF.
- the AUSF may share K_REAR and the like to the UDM.
- the AMF may request the UDM to check the authority of the subscriber information including whether the terminal is permitted to communicate between terminals.
- the AMF may check the information received from the UDM and transmit to the terminal whether or not the terminal is permitted to communicate between terminals by including it in a response message to the terminal's authentication request or the terminal's registration request.
- FIG. 4 is a sequence diagram illustrating a direct connection between terminals and a network permission procedure using a temporary identifier of the terminal according to an embodiment of the present invention.
- a direct connection between terminals using a temporary identifier of the terminal and a simplified network permission procedure will be described with reference to FIG. 4 .
- a terminal for performing direct communication between terminals may be referred to as a remote terminal (Remote UE) and a relay terminal (Relay UE).
- the relay terminal may refer to a terminal that provides a network connection so that a remote terminal connects to a relay terminal through direct communication between terminals and uses a network service through a UE-to-NW Relay service.
- the remote terminal may refer to a terminal that intends to use a network service through the UE-to-NW Relay service provided by the remote terminal by connecting to the relay terminal through direct communication between terminals.
- the remote terminal and the relay terminal have received permission for direct communication between terminals in advance, use direct communication between terminals, and have received information such as parameters or policies for connecting to the UE-to-NW Relay from the network, or the terminal Related information may be set in advance.
- the above-described information may include information such as a service code for using the UE-to-NW Relay.
- the relay terminal information necessary for managing direct communication between terminals may be set in advance.
- the relay terminal may receive information such as parameters or policies for providing the UE-to-NW Relay service through direct communication between other UEs and the terminal from the network, or may be preset in the terminal.
- the relay terminal may announce a service provided by the relay terminal in a discovery procedure so that other UEs can find and connect to the relay terminal by using preset information.
- the remote terminal finds a relay terminal that can provide the UE-to-NW Relay service, and in step S402, the remote terminal requests a direct communication connection between the relay terminal and the terminal (eg For example, a Direct Communication Request) may be transmitted to the relay terminal.
- the remote terminal may include, in the Direct Communication Request, a service code indicating that it requests the 5G-GUTI and UE-to-NW Relay service allocated in advance from the network.
- step S406 Direct Comm.
- the relay terminal Upon receiving the request, the relay terminal confirms that the Service Code is a UE-to-NW Relay service request, and the relay terminal registers a message requesting authentication and related encryption key for the service request (eg, Relay Key Request). It can be transmitted to the designated AMF.
- the relay terminal may include the 5G-GUTI of the remote terminal received from the remote terminal in the Relay Key Request.
- the AMF in which the relay terminal is registered may be referred to as a relay AMF, and the AMF in which the remote terminal is registered may be referred to as a remote AMF.
- the relay AMF may check whether the relay terminal is a terminal that has completed correct authentication.
- the relay AMF may use the 5G-GUTI of the remote terminal included in the Relay Key Request to find (and confirm) the remote AMF and confirm to the remote AMF whether the remote terminal has completed correct authentication.
- the relay AMF may receive the K_REAR value of the remote terminal and the ID value of K_REAR from the remote AMF.
- the relay AMF may check whether the remote terminal is a terminal that has completed correct authentication. After that, the relay AMF uses the SUPI of the remote terminal confirmed from the 5G-GUTI of the remote terminal, and determines whether the remote terminal can use the UE-to-NW Relay service provided by the relay terminal and whether or not the permission is granted from the UDM. can be checked
- the relay AMF may receive the K_REAR value and the K_REAR ID value of the remote terminal from the UDM.
- the relay AMF may generate (or calculate) a session encryption key (K_ProSe) value to be used in the direct communication connection between the relay terminal and the remote terminal from the K_REAR value of the remote terminal.
- K_ProSe session encryption key
- the relay AMF may determine input variables and input constants input when generating K_ProSe, and may generate K_ProSe using these values and K_REAR of the remote terminal.
- the input variable input when generating K_REAR may include at least one of a random number (RAND) newly determined by the relay AMF, an encryption key number updated whenever K_ProSe is generated, and some or all of the subscriber ID of the terminal. It may also include other values not mentioned above.
- the input constant input when generating K_ProSe may include a value or character string that is set in advance between the remote terminal and the network or negotiated with each other.
- the relay AMF when generating K_ProSe, includes the value of the input variable not previously negotiated with the remote terminal among the included input variables, the encryption key indicator (K_ProSe ID) that can indicate K_ProSe, and the K_ProSe value.
- a response message (eg, Relay Key Response) to the Relay Key Request may be transmitted to the relay terminal.
- step S420 the relay terminal receiving the Relay Key Response from the relay AMF uses the included K_ProSe and K_ProSe IDs directly for encryption and authentication of data exchanged in connection with the remote terminal, or for encryption and authentication of data. You can create (or store) encryption keys to be used.
- the relay terminal may transmit a response message (eg, Direct Communication Response) indicating that the requested connection for direct communication between terminals has been successfully established to the remote terminal.
- a response message eg, Direct Communication Response
- the relay terminal includes, among the information received from the relay AMF, input variables input when generating K_ProSe, which are information necessary when the remote terminal generates K_ProSe from K_REAR, and the ID of K_ProSe in the Direct Communication Response.
- the remote terminal may generate (or calculate) K_ProSe by using the values received from the relay terminal.
- FIG. 5 is a sequence diagram illustrating a direct connection between terminals and a network permission procedure through terminal authentication according to an embodiment of the present invention.
- a procedure for establishing a direct connection between terminals and obtaining a network permission through the NW authentication procedure of the terminal will be described with reference to FIG. 5 .
- the remote terminal and the relay terminal have received permission for direct communication between terminals in advance, use direct communication between terminals, and have received information such as parameters or policies for connecting to the UE-to-NW Relay from the network, or the terminal Related information may be set in advance.
- the above-described information may include information such as a service code for using the UE-to-NW Relay.
- the relay terminal information necessary for managing direct communication between terminals may be set in advance.
- the relay terminal may receive information such as parameters or policies for providing the UE-to-NW Relay service through direct communication between other UEs and the terminal from the network, or may be preset in the terminal.
- the relay terminal may announce a service provided by the relay terminal in a discovery procedure so that other UEs can find and connect to the relay terminal by using preset information.
- the remote terminal finds a relay terminal that can provide the UE-to-NW Relay service, and then, in step S504, the remote terminal sends a message for requesting a direct communication connection between the relay terminal and the terminal (eg For example, a Direct Communication Request) may be transmitted to the relay terminal.
- the remote terminal may include a 5G-GUTI allocated in advance from the network and a Service Code indicating that the UE-to-NW Relay service is requested.
- step S506 the relay terminal receiving the Direct Communication Request from the remote terminal confirms that the Service Code is a UE-to-NW Relay service request, and a message requesting authentication and related encryption key for the service request (for example, Relay Key Request) can be transmitted to the relay AMF.
- the relay terminal may include the 5G-GUTI of the remote terminal in the Relay Key Request.
- the relay AMF may check whether the relay terminal is a terminal that has completed correct authentication.
- step S510 the relay AMF receives the 5G-GUTI of the remote terminal included in the received Relay Key Request, but if it is determined that the remote terminal needs to perform a re-authentication procedure with the network, in step S512, the remote terminal re-authenticates A message in response to the Relay Key Request (eg, Relay Key Response) may be transmitted to the relay terminal including Reject Code information indicating that the authentication procedure should be performed.
- the Relay Key Request eg, Relay Key Response
- a case in which the relay AMF receives the 5G-GUTI of the remote terminal, but determines that the remote terminal should perform the re-authentication procedure may include at least one of the following cases.
- step S514 if the Relay Key Response received from the relay AMF includes the Reject Code information indicating that the remote terminal needs to perform the re-authentication procedure, the relay terminal sends a value corresponding to the Reject Code to the Direct Communication Request.
- a response message (eg, Direct Communication Response) may be transmitted to the remote terminal.
- the remote terminal may transmit a Direct Communication Request including the 5G subscriber identifier (SUPI or SUCI) of the terminal and an inter-terminal communication service related indicator to the relay terminal.
- SUPI 5G subscriber identifier
- SUCI 5G subscriber identifier
- step S5128 the relay terminal receiving the Direct Communication Request from the remote terminal confirms that the Service Code is a UE-to-NW Relay service request, and a message requesting authentication and related encryption key for the service request (for example, Relay Key Request) can be transmitted to the relay AMF.
- the relay terminal may include the 5G subscriber identifier of the remote terminal received from the remote terminal in the Relay Key Request.
- the relay AMF may determine whether the relay terminal has completed correct authentication.
- the relay AMF receiving the Relay Key Request from the relay terminal includes the 5G subscriber identifier of the included remote terminal when the relay terminal is a terminal that has obtained permission to perform the UE-to-NW Relay function.
- a Relay Key Request can be transmitted to the AUSF in charge of authentication of the remote terminal.
- the relay AMF may request and obtain information of the terminal from the UDM storing the subscriber information of the relay terminal in order to check whether the relay terminal is permitted to perform the UE-to-NW Relay function.
- the relay AMF when the relay AMF finds the AUSF in charge of authentication of the remote terminal, it may find (check) the AUSF in charge of authentication of the remote terminal by utilizing the 5G subscriber identifier of the remote terminal.
- the AUSF in charge of authentication of the remote terminal may be an AUSF different from the AUSF in charge of authentication of the relay terminal.
- the UDM storing the subscriber information of the remote terminal may be a different UDM from the UDM storing the subscriber information of the relay terminal.
- the AUSF receiving the Relay Key Request confirms the 5G subscriber identifier of the remote terminal, and uses the SUPI information of the remote terminal and the 5G home environment authentication vector (5G HE AV: home environment authentication vector) used for authentication of the remote terminal. ) can be received from the UDM.
- the 5G subscriber identifier of the remote terminal is encrypted
- the unencrypted general 5G subscriber identifier (SUPI) information may be received from the UDM.
- the AUSF may generate K_AUSF of the remote terminal.
- steps S526 to S528, an authentication procedure for the remote terminal may be performed.
- the specific operation is as follows.
- the AUSF may transmit a message (eg, Authentication Request) including a 5G serving environment authentication vector (5G SE AV: serving environment authentication vector) to the relay AMF.
- a message eg, Authentication Request
- 5G SE AV serving environment authentication vector
- the Authentication Request may be transmitted by being included in a response message to the Relay Key Request or a separate message.
- the relay AMF may receive the Authentication Request from the AUSF and, based on it, transmit the Authentication Request to the relay terminal including information necessary for terminal authentication such as RAND and AUTH.
- the Authentication Request transmitted to the relay terminal may be transmitted by being included in a response message to the Relay Key Request or a separate message.
- the relay terminal may transmit the Authentication Request received from the relay AMF to the remote terminal.
- the remote terminal can perform operations necessary for network authentication based on the information included in the Authentication Request. In this case, if the network authentication procedure is successful, the remote terminal may generate an authentication key (K_AUSF) of the terminal based on this. In addition, the remote terminal may use K_AUSF to generate K_REAR, which is an encryption key required for direct communication between terminals, and other encryption keys.
- K_AUSF authentication key
- K_REAR an encryption key required for direct communication between terminals, and other encryption keys.
- the remote terminal may transmit a response message to the authentication request to the AMF through the relay terminal.
- the remote terminal may include a value RES* for confirming in the AUSF whether the remote terminal is correctly authenticated in the response message.
- the relay AMF may transmit the authentication response message to the AUSF.
- the relay AMF may include the RES* in the authentication response message and deliver it to the AUSF.
- the AUSF calculates the value of RES*, checks whether the response received from the remote terminal is appropriate, and can determine whether the subscriber terminal (remote terminal) is successfully authenticated.
- the AUSF may deliver the result of the authentication check of the remote terminal to the relay AMF.
- K_REAR of the remote terminal and other encryption keys required for network operation of the remote terminal may be generated and delivered to the relay AMF.
- the relay AMF may acquire K_REAR of the remote terminal received from the AUSF.
- the AUSF may share the K_REAR of the remote terminal to the UDM.
- the relay AMF may check whether the remote terminal is a terminal that has completed correct authentication. Thereafter, the relay AMF may use the SUPI of the remote terminal to check from the UDM whether the remote terminal is permitted to use the UE-to-NW Relay service provided by the relay terminal, and whether or not the authority is authorized.
- the relay AMF may receive the K_REAR value and the K_REAR ID value of the remote terminal from the UDM.
- the relay AMF may generate (or calculate) a K_ProSe value to be used in the direct communication connection between the relay terminal and the remote terminal from the K_REAR value of the remote terminal.
- the relay AMF may determine input variables and input constants input when generating K_ProSe, and may generate K_ProSe using these values and K_REAR of the remote terminal.
- the input variable input when generating K_REAR may include at least one of a random number (RAND) newly determined by the relay AMF, an encryption key number updated whenever K_ProSe is generated, and some or all of the subscriber ID of the terminal. It may also include other values not mentioned above.
- the input constant input when generating K_ProSe may include a value or character string that is set in advance between the remote terminal and the network or negotiated with each other.
- the relay AMF relays in step S538 including the value of the input variable not previously negotiated with the remote terminal among the included input variables when K_ProSe is generated, the encryption key indicator (K_ProSe ID) that can indicate K_ProSe, and the K_ProSe value.
- a response message (eg, Relay Key Response) to the Relay Key Request may be transmitted to the terminal.
- step S540 the relay terminal receiving the Relay Key Response from the relay AMF directly uses the included K_ProSe and K_ProSe IDs for encryption and authentication of data exchanged in connection with the remote terminal, or for encryption and authentication of data. You can create (or store) encryption keys to be used.
- the relay terminal may transmit a response message (eg, Direct Communication Response) indicating that the requested connection for direct communication between terminals has been successfully established to the remote terminal.
- a response message eg, Direct Communication Response
- the relay terminal includes, among the information received from the relay AMF, input variables input when generating K_ProSe, which are information necessary when the remote terminal generates K_ProSe from K_REAR, and the ID of K_ProSe in the Direct Communication Response.
- the remote terminal may generate (or calculate) K_ProSe by using the values received from the relay terminal.
- the remote terminal may directly use the K_ProSe and K_ProSe IDs for encryption and authentication of data exchanged in connection with the remote terminal, or may generate encryption keys used for encryption and authentication of data.
- FIG. 6 is a sequence diagram illustrating a procedure for establishing a direct connection between terminals using a temporary identifier of a terminal and generating an encryption key according to an embodiment of the present invention.
- the remote terminal and the relay terminal have received permission for direct communication between terminals in advance, use direct communication between terminals, and have received information such as parameters or policies for connecting to the UE-to-NW Relay from the network, or the terminal Related information may be set in advance.
- the above-described information may include information such as a service code for using the UE-to-NW Relay.
- the relay terminal information necessary for managing direct communication between terminals may be set in advance.
- the relay terminal may receive information such as parameters or policies for providing the UE-to-NW Relay service through direct communication between other UEs and the terminal from the network, or may be preset in the terminal.
- the relay terminal may announce a service provided by the relay terminal in a discovery procedure so that other UEs can find and connect to the relay terminal by using preset information.
- the remote terminal finds a relay terminal capable of providing the UE-to-NW Relay service, and then a message for requesting a direct communication connection between the relay terminal and the terminal (eg, Direct Communication Request) may be transmitted to the relay terminal.
- the remote terminal may include, in the Direct Communication Request, a service code indicating that it requests the 5G-GUTI and UE-to-NW Relay service allocated in advance from the network.
- the relay terminal Upon receiving the request, the relay terminal confirms that the Service Code is a UE-to-NW Relay service request, and transmits a message requesting authentication and related encryption key for the service request (eg, Relay Key Request) to the relay AMF.
- the relay terminal may include the 5G-GUTI of the remote terminal in the Relay Key Request.
- the relay AMF uses the 5G-GUTI of the remote terminal included in the Relay Key Request to check the remote AMF in which the remote terminal is registered, and can confirm to the remote AMF whether the remote terminal has completed the correct authentication. In this case, although the relay AMF has confirmed that the remote terminal has completed correct authentication from the remote AMF, it may not receive the ID values of K_REAR and K_REAR of the remote terminal.
- the relay AMF uses the remote terminal's SUPI to request the AUSF managing the authentication of the remote terminal to share the K_REAR of the remote terminal (e.g. For example, a Relay Key Request) may be transmitted.
- the AUSF may generate a K_REAR from the K_AUSF of the remote terminal or transmit the stored K_REAR to the AMF.
- the relay AMF may check whether the remote terminal is a terminal that has completed correct authentication. Thereafter, the relay AMF may use the SUPI of the remote terminal to check from the UDM whether or not the remote terminal is permitted to use the UE-to-NW Relay service provided by the relay terminal and the authority.
- the relay AMF may receive the K_REAR value and the K_REAR ID value of the remote terminal from the UDM.
- the relay AMF may generate (or calculate) a K_ProSe value to be used in the direct communication connection between the relay terminal and the remote terminal from the K_REAR value of the remote terminal.
- the relay AMF may determine input variables and input constants input when generating K_ProSe, and may generate K_ProSe using these values and K_REAR of the remote terminal.
- the input variable input when generating K_REAR may include at least one of a random number (RAND) newly determined by the relay AMF, an encryption key number updated whenever K_ProSe is generated, and some or all of the subscriber ID of the terminal. It may also include other values not mentioned above.
- the input constant input when generating K_ProSe may include a value or character string that is set in advance between the remote terminal and the network or negotiated with each other.
- the relay AMF When generating K_ProSe, the relay AMF includes the value of the input variable not previously negotiated with the remote terminal among the included input variables, the encryption key indicator (K_ProSe ID) that can indicate K_ProSe, and the K_ProSe value to relay to the relay terminal.
- K_ProSe ID the encryption key indicator
- K_ProSe value the K_ProSe value to relay to the relay terminal.
- a response message to the Key Request eg, Relay Key Response
- the relay terminal that receives the Relay Key Response from the relay AMF uses the included K_ProSe and K_ProSe IDs directly for encryption and authentication of data exchanged in connection with the remote terminal, or an encryption key used for encryption and authentication of data You can create (or save) them.
- the relay terminal may transmit a response message (eg, Direct Communication Response) indicating that the connection for direct communication between the requested terminals has been successfully established to the remote terminal.
- a response message eg, Direct Communication Response
- the relay terminal includes, among the information received from the relay AMF, input variables input when generating K_ProSe, which are information necessary when the remote terminal generates K_ProSe from K_REAR, and the ID of K_ProSe in the Direct Communication Response.
- the remote terminal may generate (or calculate) K_ProSe by using the values received from the relay terminal.
- the remote terminal may directly use the K_ProSe and K_ProSe IDs for encryption and authentication of data exchanged in connection with the remote terminal, or may generate encryption keys used for encryption and authentication of data.
- each configuration or step may be selectively combined/combined and applied.
- the above-described embodiments or methods do not necessarily include all of the steps described according to settings and/or definitions on the system, and some steps may be omitted.
- FIG. 7 is a diagram illustrating the structure of a terminal according to an embodiment of the present invention.
- the terminal may include a transceiver 710 , a controller 720 , and a storage 730 .
- the controller may be defined as a circuit or an application-specific integrated circuit or at least one processor.
- the terminal may be a remote terminal or a relay terminal performing direct communication between terminals.
- the transceiver 710 may transmit/receive signals to and from other network entities.
- the transceiver 710 may receive, for example, system information from a base station, and may receive a synchronization signal or a reference signal. Or, for example, a signal or data for direct communication between terminals may be transmitted and received.
- the controller 720 may control the overall operation of the terminal according to the embodiment proposed in the present invention.
- the controller 720 may control a signal flow between blocks to perform an operation according to the above-described flowchart.
- the controller 720 may control the operation proposed by the present invention for authentication of a network access request through a terminal-to-terminal connection according to an embodiment of the present invention.
- the storage unit 730 may store at least one of information transmitted and received through the transceiver 710 and information generated through the control unit 720 .
- FIG. 8 is a diagram illustrating a structure of a base station according to an embodiment of the present invention.
- the base station may include a transceiver 810 , a controller 820 , and a storage 830 .
- the controller may be defined as a circuit or an application-specific integrated circuit or at least one processor.
- the transceiver 810 may transmit/receive signals to and from other network entities.
- the transceiver 810 may transmit, for example, system information to the terminal, and may transmit a synchronization signal or a reference signal. Also, the transceiver 810 may transmit a message transmitted/received between the terminal and the AMF.
- the controller 820 may control the overall operation of the base station according to the embodiment proposed in the present invention.
- the controller 820 may control a signal flow between blocks to perform an operation according to the above-described flowchart.
- the controller 820 may control the operation proposed by the present invention for authentication of a network access request through a terminal-to-terminal connection according to an embodiment of the present invention.
- the storage unit 830 may store at least one of information transmitted and received through the transceiver 810 and information generated through the control unit 820 .
- FIG. 9 is a diagram illustrating the structure of an AMF according to an embodiment of the present invention.
- the AMF may include a transceiver 910 , a controller 920 , and a storage 930 .
- the controller may be defined as a circuit or an application-specific integrated circuit or at least one processor.
- the AMF may be a remote AMF or a relay AMF related to a remote terminal or a relay terminal performing direct communication between terminals.
- AMF may include SEAF.
- the transceiver 910 may transmit/receive signals to and from other network entities.
- the transceiver 910 may transmit/receive a series of messages for authentication of a network access request through, for example, a terminal-to-device connection with a terminal or another core network entity.
- the controller 920 may control the overall operation of the AMF according to the embodiment proposed in the present invention.
- the controller 920 may control a signal flow between blocks to perform an operation according to the above-described flowchart.
- the controller 920 may control the operation proposed by the present invention for authentication of a network access request through a terminal-to-device connection according to an embodiment of the present invention.
- the storage unit 930 may store at least one of information transmitted and received through the transceiver 910 and information generated through the control unit 920 .
- FIG. 10 is a diagram illustrating the structure of a core network entity according to an embodiment of the present invention.
- the core network entity may include a transceiver 1010 , a controller 1020 , and a storage 1030 .
- the controller may be defined as a circuit or an application-specific integrated circuit or at least one processor.
- the core network entity may be AUSF or UDM.
- the transceiver 1010 may transmit/receive signals to and from other network entities.
- the transceiver 1010 may transmit and receive a series of messages for authentication of a network access request through, for example, an inter-terminal connection with the AMF or other core network entity.
- the controller 1020 may control the overall operation of the core network entity according to the embodiment proposed in the present invention.
- the controller 1020 may control a signal flow between blocks to perform an operation according to the above-described flowchart.
- the controller 1020 may control the operation proposed by the present invention for authentication of a network access request through a terminal-to-device connection according to an embodiment of the present invention.
- the storage unit 1030 may store at least one of information transmitted and received through the transceiver 1010 and information generated through the control unit 1020 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (15)
- 무선 통신 시스템의 AMF (access and mobility management function)에 의해 수행되는 방법에 있어서,단말-네트워크 릴레이 통신을 위한 릴레이 단말로부터, 상기 단말-네트워크 릴레이 통신을 위한 리모트 단말의 식별자를 포함하는 릴레이 키 요청 메시지를 수신하는 단계;상기 릴레이 단말이 단말-네트워크 릴레이 서비스를 제공하도록 인증되었는지 여부를 확인하는 단계;상기 리모트 단말의 식별자에 기반하여, 상기 리모트 단말과 관련된 AUSF (authentication server function)를 확인하는 단계;상기 리모트 단말의 식별자를 포함하는 인증 요청 메시지를 상기 AUSF로 전송하는 단계;상기 리모트 단말의 식별자에 기반한 상기 리모트 단말에 대한 인증 절차가 성공적으로 수행된 경우, 상기 리모트 단말 및 상기 릴레이 단말 간에 수립되는 ProSe (proximity-based services) 세션 암호 키를 획득하는 단계; 및상기 ProSe 세션 암호 키를 상기 릴레이 단말에게 전송하는 단계를 포함하는 방법.
- 제1항에 있어서,상기 리모트 단말의 식별자는, 상기 리모트 단말의 암호화된 가입자 식별자(subscription concealed identifier; SUCI)인 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 리모트 단말에 대한 인증 절차에 기반하여, 상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키가 생성되고,상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키에 기반하여, 단말 간 직접 통신의 보안을 위한 암호 키가 생성되는 것을 특징으로 하는 방법.
- 제3항에 있어서,상기 ProSe 세션 암호 키는, 상기 단말 간 직접 통신의 보안을 위한 암호 키에 기반하여 생성되는 것을 특징으로 하는 방법.
- 무선 통신 시스템의 AUSF (authentication server function)에 의해 수행되는 방법에 있어서,AMF (access and mobility management function)로부터, 단말-네트워크 릴레이 통신을 위한 리모트 단말의 식별자를 포함하는 인증 요청 메시지를 수신하는 단계;상기 리모트 단말의 식별자에 기반하여, UDM (unified data management)으로부터 상기 상기 리모트 단말에 대한 인증 벡터를 획득하는 단계;상기 인증 벡터에 기반하여 상기 리모트 단말에 대한 인증 절차를 수행하는 단계; 및상기 리모트 단말에 대한 인증 절차에 기반하여, 상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키를 생성하는 단계를 포함하고,상기 AUSF는, 상기 리모트 단말과 관련되며, 상기 리모트 단말의 식별자에 기반하여 확인되는 것을 특징으로 하는 방법.
- 제5항에 있어서,상기 리모트 단말의 식별자는, 상기 리모트 단말의 암호화된 가입자 식별자(subscription concealed identifier; SUCI)인 것을 특징으로 하는 방법.
- 제5항에 있어서,상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키에 기반하여, 단말 간 직접 통신의 보안을 위한 암호 키가 생성되고,상기 단말 간 직접 통신의 보안을 위한 암호 키는, 상기 리모트 단말 및 상기 단말-네트워크 릴레이 통신을 위한 릴레이 단말 간에 수립되는 ProSe (proximity-based services) 세션 암호 키를 생성하기 위해 사용되고,상기 ProSe 세션 암호 키는, 상기 릴레이 단말로 전송되는 것을 특징으로 하는 방법.
- 무선 통신 시스템의 AMF (access and mobility management function)에 있어서,송수신부; 및단말-네트워크 릴레이 통신을 위한 릴레이 단말로부터, 상기 단말-네트워크 릴레이 통신을 위한 리모트 단말의 식별자를 포함하는 릴레이 키 요청 메시지를 수신하도록 상기 송수신부를 제어하고, 상기 릴레이 단말이 단말-네트워크 릴레이 서비스를 제공하도록 인증되었는지 여부를 확인하고, 상기 리모트 단말의 식별자에 기반하여, 상기 리모트 단말과 관련된 AUSF (authentication server function)를 확인하고, 상기 리모트 단말의 식별자를 포함하는 인증 요청 메시지를 상기 AUSF로 전송하도록 상기 송수신부를 제어하고; 상기 리모트 단말의 식별자에 기반한 상기 리모트 단말에 대한 인증 절차가 성공적으로 수행된 경우, 상기 리모트 단말 및 상기 릴레이 단말 간에 수립되는 ProSe (proximity-based services) 세션 암호 키를 획득하고, 상기 ProSe 세션 암호 키를 상기 릴레이 단말에게 전송하도록 상기 송수신부를 제어하는 제어부를 포함하는 AMF.
- 제8항에 있어서,상기 리모트 단말의 식별자는, 상기 리모트 단말의 암호화된 가입자 식별자(subscription concealed identifier; SUCI)인 것을 특징으로 하는 AMF.
- 제9항에 있어서,상기 리모트 단말에 대한 인증 절차에 기반하여, 상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키가 생성되고,상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키에 기반하여, 단말 간 직접 통신의 보안을 위한 암호 키가 생성되는 것을 특징으로 하는 AMF.
- 제10항에 있어서,상기 ProSe 세션 암호 키는, 상기 단말 간 직접 통신의 보안을 위한 암호 키에 기반하여 생성되는 것을 특징으로 하는 AMF.
- 무선 통신 시스템의 AUSF (authentication server function)에 있어서,송수신부; 및AMF (access and mobility management function)로부터, 단말-네트워크 릴레이 통신을 위한 리모트 단말의 식별자를 포함하는 인증 요청 메시지를 수신하도록 상기 송수신부를 제어하고, 상기 리모트 단말의 식별자에 기반하여, UDM (unified data management)으로부터 상기 상기 리모트 단말에 대한 인증 벡터를 획득하고, 상기 인증 벡터에 기반하여 상기 리모트 단말에 대한 인증 절차를 수행하고, 상기 리모트 단말에 대한 인증 절차에 기반하여, 상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키를 생성하는 제어부를 포함하고,상기 AUSF는, 상기 리모트 단말과 관련되며, 상기 리모트 단말의 식별자에 기반하여 확인되는 것을 특징으로 하는 AUSF.
- 제12항에 있어서,상기 리모트 단말의 식별자는, 상기 리모트 단말의 암호화된 가입자 식별자(subscription concealed identifier; SUCI)인 것을 특징으로 하는 AUSF.
- 제12항에 있어서,상기 리모트 단말과 상기 AUSF 간에 공유되는 암호 키에 기반하여, 단말 간 직접 통신의 보안을 위한 암호 키가 생성되는 것을 특징으로 하는 AUSF.
- 제14항에 있어서,상기 단말 간 직접 통신의 보안을 위한 암호 키는, 상기 리모트 단말 및 상기 단말-네트워크 릴레이 통신을 위한 릴레이 단말 간에 수립되는 ProSe (proximity-based services) 세션 암호 키를 생성하기 위해 사용되고,상기 ProSe 세션 암호 키는, 상기 릴레이 단말로 전송되는 것을 특징으로 하는 AUSF.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/282,670 US20240163666A1 (en) | 2021-04-20 | 2022-04-20 | Method and device for authenticating network access request through terminal-to-terminal connection in mobile communication system |
EP22792034.5A EP4297455A4 (en) | 2021-04-20 | 2022-04-20 | METHOD AND DEVICE FOR AUTHENTICATION OF A NETWORK ACCESS REQUEST THROUGH A TERMINAL-TO-TERMINAL CONNECTION IN A MOBILE COMMUNICATION SYSTEM |
CN202280027032.3A CN117121525A (zh) | 2021-04-20 | 2022-04-20 | 用于在移动通信系统中通过终端到终端连接认证网络接入请求的方法及装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020210051292A KR20220144670A (ko) | 2021-04-20 | 2021-04-20 | 이동 통신 시스템에서 단말 간 연결을 통한 네트워크 접속 요청의 인증을 위한 방법 및 장치 |
KR10-2021-0051292 | 2021-04-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022225335A1 true WO2022225335A1 (ko) | 2022-10-27 |
Family
ID=83722999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/005673 WO2022225335A1 (ko) | 2021-04-20 | 2022-04-20 | 이동 통신 시스템에서 단말 간 연결을 통한 네트워크 접속 요청의 인증을 위한 방법 및 장치 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240163666A1 (ko) |
EP (1) | EP4297455A4 (ko) |
KR (1) | KR20220144670A (ko) |
CN (1) | CN117121525A (ko) |
WO (1) | WO2022225335A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024094108A1 (zh) * | 2022-11-04 | 2024-05-10 | 华为技术有限公司 | 通信方法和通信装置 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240056485A1 (en) * | 2022-08-15 | 2024-02-15 | Verizon Patent And Licensing Inc. | Systems and methods for network access control using distributed ledgers |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10897707B2 (en) * | 2015-01-19 | 2021-01-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for direct communication key establishment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020201051A1 (en) * | 2019-03-29 | 2020-10-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for enabling end-to-end data protection |
WO2021034093A1 (ko) * | 2019-08-19 | 2021-02-25 | 엘지전자 주식회사 | 릴레이를 위한 인증 |
-
2021
- 2021-04-20 KR KR1020210051292A patent/KR20220144670A/ko active Search and Examination
-
2022
- 2022-04-20 CN CN202280027032.3A patent/CN117121525A/zh active Pending
- 2022-04-20 EP EP22792034.5A patent/EP4297455A4/en active Pending
- 2022-04-20 US US18/282,670 patent/US20240163666A1/en active Pending
- 2022-04-20 WO PCT/KR2022/005673 patent/WO2022225335A1/ko active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10897707B2 (en) * | 2015-01-19 | 2021-01-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for direct communication key establishment |
Non-Patent Citations (5)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on security aspects of enhancement for proximity based services in the 5G System (5GS) (Release 17)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.847, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. V0.5.0, 17 March 2021 (2021-03-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 120, XP052000063 * |
INTERDIGITAL: "TR 33.847 Update for solution #10", 3GPP DRAFT; S3-210825, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20210301 - 20210305, 21 February 2021 (2021-02-21), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051979964 * |
INTERDIGITAL: "TR 33.847 Update for solution #10", 3GPP DRAFT; S3-211240, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20210301 - 20210305, 5 March 2021 (2021-03-05), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052174132 * |
SAMSUNG: "[ProSe] Evaluation for solution#1", 3GPP DRAFT; S3-211129, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20210301 - 20210305, 22 February 2021 (2021-02-22), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051980517 * |
See also references of EP4297455A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024094108A1 (zh) * | 2022-11-04 | 2024-05-10 | 华为技术有限公司 | 通信方法和通信装置 |
Also Published As
Publication number | Publication date |
---|---|
EP4297455A4 (en) | 2024-07-24 |
CN117121525A (zh) | 2023-11-24 |
KR20220144670A (ko) | 2022-10-27 |
US20240163666A1 (en) | 2024-05-16 |
EP4297455A1 (en) | 2023-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018128499A1 (en) | Method and apparatus for selecting an access and mobility management function in a mobile communication system | |
WO2022225335A1 (ko) | 이동 통신 시스템에서 단말 간 연결을 통한 네트워크 접속 요청의 인증을 위한 방법 및 장치 | |
WO2018164498A1 (ko) | 단말 개시 통신 전용 모드 단말의 연결을 유지시키는 방법 | |
WO2014171707A1 (ko) | 이동 통신에서 가입 사업자 재가입 혹은 추가 가입 제한 정책을 지원하는 보안 방안 및 시스템 | |
WO2016148534A1 (en) | Method and apparatus for configuring connection between devices in communication system | |
WO2013008990A1 (en) | Traffic encryption key management for machine to machine multicast group | |
WO2018194202A1 (ko) | V2x 통신 장치 및 그의 데이터 통신 방법 | |
WO2022216049A1 (en) | Method and apparatus for configuring temporary user equipment (ue) external identifier in wireless communication system | |
WO2012044072A2 (ko) | 융합형 네트워크에서 사용자 키를 할당하기 위한 방법 | |
WO2020071727A1 (ko) | 무선 통신 시스템에서 로밍 단말의 네트워크 슬라이스에 상호 배타적 접속 방법 및 장치 | |
WO2021040381A1 (ko) | 무선 통신 시스템을 이용하는 uas 서비스 제어 방법 및 장치 | |
WO2021141288A1 (ko) | 단말의 사설망 접속 제어 방법 | |
WO2022245109A1 (en) | Method and device for performing uwb secure ranging | |
WO2022203360A1 (en) | Communication method and device for supporting authentication of unmanned aerial vehicle in wireless communication system | |
WO2022071779A1 (en) | Method, ue, and network entity for handling synchronization of security key in wireless network | |
WO2022235100A1 (ko) | 망간의 단말 이동성을 지원하는 방법 및 장치 | |
WO2015105401A1 (ko) | 이동 통신에서 prose그룹 통신 또는 공공 안전을 지원하기 위한 보안 방안 및 시스템 | |
WO2015053602A1 (ko) | 이동 통신 시스템 환경에서 프록시미티 기반 서비스를 위한 보안 및 정보 지원 방법 및 시스템 | |
WO2022227919A1 (zh) | 切换场景下的安全配置方法和通信装置 | |
WO2023214773A1 (ko) | 무선 통신 시스템에서 단말의 인증을 지원하는 방법 및 장치 | |
WO2023229418A1 (en) | Method and apparatus for supporting security of adhoc group call in wireless communication system | |
WO2023249192A1 (ko) | 무선 통신 시스템에서 단말 인증 방법 및 장치 | |
WO2024014640A1 (ko) | 무선 통신 시스템에서 단말 인증 방법 및 장치 | |
WO2024172502A1 (ko) | 통신 시스템에서 어플리케이션 관련 정책의 업데이트 방법 및 장치 | |
WO2023282656A1 (en) | System and method for key generation in authentication and key management for applications (akma) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22792034 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18282670 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022792034 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022792034 Country of ref document: EP Effective date: 20230922 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |