WO2022253083A1 - Isolation method, apparatus and system for public and private network services - Google Patents

Isolation method, apparatus and system for public and private network services Download PDF

Info

Publication number
WO2022253083A1
WO2022253083A1 PCT/CN2022/095079 CN2022095079W WO2022253083A1 WO 2022253083 A1 WO2022253083 A1 WO 2022253083A1 CN 2022095079 W CN2022095079 W CN 2022095079W WO 2022253083 A1 WO2022253083 A1 WO 2022253083A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
private network
key
control plane
network element
Prior art date
Application number
PCT/CN2022/095079
Other languages
French (fr)
Chinese (zh)
Inventor
朱浩仁
诸华林
徐艺珊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022253083A1 publication Critical patent/WO2022253083A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present application relates to the technical field of communications, and in particular to a method, device and system for isolating public and private network services.
  • the private network and the public network will share access network (radio access network, RAN) nodes, 5G core part (5th-Generation Core, 5GC) control plane, and the private network has an independent user plane function (UPF) Network element; or, private network and public network share RAN nodes, 5GC control plane and 5GC user plane, and private network relies on public network slice or closed access group (closed access group, CAG) feature to isolate from public network.
  • access network radio access network
  • RAN radio access network
  • 5GC 5th-Generation Core
  • UPF user plane function
  • private network and public network share RAN nodes, 5GC control plane and 5GC user plane, and private network relies on public network slice or closed access group (closed access group, CAG) feature to isolate from public network.
  • CAG closed access group
  • the present application provides a method, device and system for isolating public and private network services, which are used to ensure the security of private network services.
  • the present application provides a method for isolating public and private network services.
  • the method includes: the control plane network element of the private network obtains the key of the private network, and the key of the private network is the root key of the private network or A key derived from the root key of the private network.
  • the root key of the private network is different from the root key of the public network.
  • the key of the private network is used for user plane security of the air interface.
  • the root key of the public network The control plane security for the air interface; the control plane network element of the private network receives a first message from the terminal device, and the first message includes a session establishment request; the control plane network element of the private network determines that the session establishment request corresponds to The private network; the network element of the control plane of the private network establishes the security of the user plane of the air interface according to the key of the private network.
  • the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
  • the method further includes: the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network ; The control plane network element of the private network uses the NAS key of the public network to parse the first message to obtain the session establishment request.
  • the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network, including: the private network
  • the control plane network element of the network receives a second message from the mobility management network element of the public network, the second message includes second information and the NAS key of the public network, and the second information is used to indicate that the private network is authorized to
  • the control plane NEs have permission to use the NAS key of the public network.
  • the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the control plane network element of the private network determines that the The session establishment request corresponding to the private network includes: the control plane network element of the private network determining that the session establishment request corresponds to the private network according to the first information.
  • receiving the first message from the terminal device by the control plane network element of the private network includes: the control plane network element of the private network transmits the message between the private network and the terminal device The first connection between receives the first message from the terminal device; the control plane network element of the private network determines that the session establishment request corresponds to the private network, including: the control plane network element of the private network determines according to the first connection The session establishment request corresponds to the private network.
  • the method further includes: the control plane network element of the private network receives a first connection establishment request from the terminal device, and the first connection establishment request is used to request establishment of the The first connection; the control plane network element of the private network establishes the first connection according to the first connection establishment request; the control plane network element of the private network receives the second connection establishment request from the terminal device, and the second connection The establishment request is used to request establishment of a second connection between the public network and the terminal device; the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
  • the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, including: the control plane network element of the private network according to the private key The key generation security parameter of the private network; the control plane network element of the private network sends the security parameter to the terminal device and/or the access network device, and the security parameter is used for the terminal device and/or the access network device to generate the Air interface user plane key.
  • control plane network element of the private network stores the private network key; or, the control plane network element of the private network obtains the private network key, including : The control plane network element of the private network obtains the key of the private network from the authentication, authorization, and accounting AAA server.
  • the embodiment of the present application provides another method for isolating public and private network services.
  • the method includes: the terminal device sends a first message to the control plane network element of the private network, and the first message includes information corresponding to the private network.
  • Session establishment request; the terminal establishes user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the root key of the private network.
  • the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
  • the method further includes: the terminal device sends a first connection establishment request to a control plane network element of the private network, and the first connection establishment request is used to request establishment of the private network. network and the terminal device, the first connection is used to transmit the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used to transmit the public network signaling.
  • the method further includes: the terminal device sends a second connection establishment request to a mobility management network element of the public network, where the second connection establishment request is used to request establishment of the A second connection between the public network and the terminal device; the terminal generates the control plane key of the air interface according to the root key of the public network.
  • the method further includes: the terminal device receiving security parameters from the control plane network element of the private network; the terminal establishing an air interface user plane
  • the security includes: the terminal device generates the user plane key of the air interface according to the security parameter and the private network key; the terminal device establishes the user plane security of the air interface according to the user plane key of the air interface.
  • the present application provides yet another method for isolating public and private network services.
  • the method includes: the access network device receives a third message from the terminal device, the third message includes a first connection establishment request, and the first connection establishment request The request is used to request establishment of the first connection between the private network and the terminal device; the access network device discovers the control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection A connection: the access network device sends the first connection establishment request to the control plane network element of the private network.
  • the access network device can discover the control plane network element of the private network according to the third message, and send the first message for requesting establishment of a connection between the private network and the terminal device to the control plane network element of the private network.
  • a connection establishment request triggers the establishment of a connection between the private network and the terminal device, which can realize the security isolation of public network and private network services and improve the security of private network services.
  • the method further includes: the access network device receiving a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment The request is used to request establishment of a second connection between the public network and the terminal device; the access network device sends the second connection establishment request to the mobility management network element of the public network according to the fourth message.
  • the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control network element.
  • the embodiment of the present application provides a method for isolating public and private network services.
  • the method includes: a mobility management network element of the public network obtains a non-access stratum NAS key of the public network; The network element sends the NAS key of the public network to the control plane network element of the private network. In this way, the control plane network element of the private network can obtain the NAS key of the public network, so as to analyze the received first message.
  • the mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network, including: the mobility management network element of the public network
  • the element sends a second message to the control plane network element of the private network, the second message includes second information and the NAS key of the public network, and the second information is used to indicate that the control plane network element of the private network is authorized to use the The permission of the NAS key on the public network.
  • the present application provides a method for isolating public and private network services.
  • the method includes: the control plane network element of the private network obtains a key of the private network, and the key of the private network is the root key of the private network or A key derived from the root key of the private network.
  • the root key of the private network is different from the root key of the public network.
  • the key of the private network is used for user plane security of the air interface.
  • the root key of the public network It is used for the control plane security of the air interface; the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network.
  • the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
  • the method further includes: the control plane network element of the private network A network element receives a first message from a terminal device, where the first message includes a session establishment request; a control plane network element of the private network determines that the session establishment request corresponds to the private network.
  • the method further includes: the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network; The control plane network element of the private network uses the NAS key of the public network to parse the first message to obtain the session establishment request.
  • the receiving the NAS key of the public network by the control plane network element of the private network includes: receiving the mobility management network key from the public network by the control plane network element of the private network.
  • the second message of the element, the second message includes the second information and the NAS key of the public network, and the second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
  • the method further includes: the control plane network element of the private network The network element receives a first message from the terminal device through the first connection between the private network and the terminal device, where the first message includes a session establishment request.
  • the method further includes: the control plane network element of the private network The network element determines according to the first connection that the session establishment request corresponds to the private network.
  • the method further includes: the control plane network element of the private network receives a first connection establishment request from the terminal device, and the first connection establishment request is used to request establishment of the second connection establishment request.
  • a connection the control plane network element of the private network establishes the first connection according to the first connection establishment request; the control plane network element of the private network receives a second connection establishment request from the terminal device, and the second connection establishment The request is used to request establishment of a second connection between the public network and the terminal device; the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
  • the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the control plane network element of the private network determines that the The session establishment request corresponding to the private network includes: the control plane network element of the private network determining that the session establishment request corresponds to the private network according to the first information.
  • the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, including: the control plane network element of the private network according to the private key The key generation security parameter of the private network; the control plane network element of the private network sends the security parameter to the terminal device and/or the access network device, and the security parameter is used for the terminal device and/or the access network device to generate the air interface user plane key.
  • the private network control plane network element stores the private network key; or, the private network control plane network element obtains the private network key, including: The control plane network element of the private network obtains the key of the private network from the authentication, authorization and accounting AAA server.
  • the present application provides a control plane network element of a private network, and the control plane network element of a private network has a function of implementing the behavior in the method embodiment of the first aspect above.
  • This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the control plane network element of the private network includes a processing unit and a transceiver unit, wherein: the processing unit is used to obtain the key of the private network, and the key of the private network is the key of the private network The root key or a key derived based on the root key of the private network. The root key of the private network is different from the root key of the public network.
  • the key of the private network is used for the security of the user plane of the air interface.
  • the root key is used for the control plane security of the air interface;
  • the transceiver unit is used to receive the first message from the terminal device, and the first message includes a session establishment request;
  • the processing unit is also used to determine that the session establishment request corresponds to on the private network;
  • the processing unit is also used to establish the user plane security of the air interface according to the key of the private network.
  • the transceiver unit is further configured to: receive a non-access stratum NAS key of the public network from a mobility management network element of the public network;
  • the NAS key parses the first message to obtain the session establishment request.
  • the transceiver unit is specifically configured to: receive a second message from a mobility management network element of the public network, where the second message includes the second information and the A NAS key, the second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
  • the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the processing unit is specifically configured to: according to the first A message confirms that the session establishment request corresponds to the private network.
  • the transceiver unit is specifically configured to: receive the first message from the terminal device through the first connection between the private network and the terminal device; the processing unit specifically uses In: determining according to the first connection that the session establishment request corresponds to the private network.
  • the transceiver unit is further configured to receive a first connection establishment request from a terminal device, where the first connection establishment request is used to request establishment of the first connection; the processing unit is further configured to establish the first connection according to the first connection establishment request; the transceiver unit is further configured to receive a second connection establishment request from the terminal device, and the second connection establishment request is used to request establishment of the public network and The second connection between terminal devices; the transceiver unit is further configured to send the second connection establishment request to a mobility management network element of the public network.
  • the processing unit is specifically configured to: generate a security parameter according to the key of the private network; the transceiver unit is also configured to: send the terminal device and/or the access network device The security parameter is sent, and the security parameter is used for the terminal device and/or the access network device to generate the user plane key of the air interface.
  • control plane network element of the private network stores the key of the private network; or, the processing unit is specifically configured to: from the authentication, authorization and accounting AAA server Obtain the key of the private network.
  • an embodiment of the present application provides a terminal device, where the terminal device has a function of implementing the behavior in the method embodiment of the second aspect above.
  • This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the terminal device includes a transceiver unit and a processing unit: the transceiver unit is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment corresponding to the private network Request; the processing unit is used to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the private network The root key of the private network or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
  • the transceiver unit is further configured to: send a first connection establishment request to a control plane network element of the private network, where the first connection establishment request is used to request establishment of the private network A first connection with the terminal device, where the first connection is used to transmit the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used to transmit the information of the public network signaling.
  • the transceiver unit is further configured to send a second connection establishment request to a mobility management network element of the public network, where the second connection establishment request is used to request establishment of the public network
  • the second connection with the terminal device is further configured to generate the control plane key of the air interface according to the root key of the public network.
  • the transceiver unit is further configured to receive security parameters from the control plane network element of the private network; the processing unit is specifically configured to The key generates the user plane key of the air interface; the user plane security of the air interface is established according to the user plane key of the air interface.
  • the embodiment of the present application provides an access network device, and the access network device has a function of implementing the behavior in the method embodiment of the first aspect above.
  • This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the access network device includes a transceiver unit and a processing unit, where: the transceiver unit is configured to receive a third message from the terminal device, the third message includes a first connection establishment request, and the first A connection establishment request is used to request to establish a first connection between the private network and the terminal device; the processing unit is used to discover the control plane network element of the private network according to the third message, and the control plane network element of the private network uses for establishing the first connection; the transceiving unit is further configured to send the first connection establishment request to the control plane network element of the private network.
  • the transceiver unit is further configured to receive a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment request is used to request Establishing a second connection between the public network and the terminal device; the transceiver unit is further configured to send the second connection establishment request to a mobility management network element of the public network according to the fourth message.
  • the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control network element.
  • the present application provides a mobility management network element of a public network, where the mobility management network element of the public network has a function of implementing the behavior in the method embodiment of the fourth aspect above.
  • This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the mobility management network element of the public network includes a transceiver unit and a processing unit, wherein: the processing unit is used to obtain a non-access stratum NAS key of the public network; the transceiver unit is used to Send the NAS key of the public network to the control plane network element of the private network.
  • the present application provides a control plane network element of a private network, and the control plane network element of a private network has a function of implementing the behavior in the method embodiment of the fifth aspect above.
  • This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the control plane network element of the private network includes a transceiver unit and a processing unit, wherein: the processing unit is used to obtain the key of the private network, and the key of the private network is the root of the private network key or a key derived based on the root key of the private network.
  • the root key of the private network is different from the root key of the public network.
  • the key of the private network is used for the security of the user plane of the air interface.
  • the root key is used for the control plane security of the air interface; the processing unit is also used for establishing the user plane security of the air interface according to the private network key.
  • the present application provides a communication device.
  • the communication device may be the control plane network element of the private network in the design of the above method or a chip arranged in the control plane network element of the private network.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface.
  • the communication device executes the method described above by the control plane network element of the private network. method of execution.
  • a communication device may be the access network device designed in the above method or a chip set in the access network device.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory and the communication interface, and when the processor executes the computer programs or instructions, the communication device executes the method performed by the access network device in the above method embodiment .
  • a communication device may be the terminal device designed in the above method or a chip provided in the terminal device.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory and the communication interface.
  • a communication device may be the mobility management network element of the public network in the design of the above method or a chip set on the mobility management network element of the public network.
  • the communication device includes a communication interface and a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory and the communication interface.
  • the communication device executes the mobility management network element of the public network in the above method embodiments. The method executed.
  • the communication interface in the communication device of the tenth aspect to the fourteenth aspect may be a transceiver in the communication device, for example, realized by an antenna, a feeder, and a codec in the communication device, or, if the communication device is configured For a chip in a communication device, the communication interface may be an input/output interface of the chip, such as an input/output pin or the like.
  • a communication system in a fifteenth aspect, includes a control plane network element of a private network and an access network device.
  • the control plane network element of the private network is used to execute the first aspect or any method designed in the first aspect, or to execute the fifth aspect or any method designed in the fifth aspect.
  • the access network device is configured to execute the third aspect or any method designed in the third aspect.
  • the system further includes a mobility management network element of the public network, and the mobility management network element of the public network is used to execute the fourth aspect or any one of the methods designed in the fourth aspect.
  • the present application provides a chip system
  • the chip system includes a processor, used to implement the control plane network element of the private network or the access network device or the mobility management network of the public network in the methods of the above aspects element or end device functionality.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
  • a computer program product includes: computer program code, when the computer program code runs in parallel, the network element of the control plane of the private network or the access network device in the above aspects can Or a method executed by a mobility management network element of a public network or a terminal device is executed.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium.
  • the control plane network element of the private network or the A method performed by an access network device or a mobility management network element of a public network or a terminal device.
  • the key used to establish the security of the user plane of the air interface is different from the key used to establish the security of the control plane of the air interface.
  • the establishment of security of the user plane is more independent, which can improve the security of services.
  • FIG. 1 is a schematic diagram of a network architecture of a 5G system provided in an embodiment of the present application
  • FIG. 2 is a schematic diagram of another 5G system network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a non-3GPP network architecture in a 5G system provided by an embodiment of the present application
  • FIG. 4 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • FIG. 5 is a flow chart of a method for isolating public and private network services provided by an embodiment of the present application
  • FIG. 6 is a schematic flow diagram of establishing user plane security and control plane security of the air interface provided by an embodiment of the present application.
  • FIG. 7 is a flow chart of another method for isolating public and private network services provided by an embodiment of the present application.
  • FIG. 8 is a flow chart of another method for isolating public and private network services provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another communication device 1000 provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a chip provided by an embodiment of the present application.
  • the embodiments of the present application can be applied to the network architecture of the 4th Generation mobile communication technology (4G), such as the long term evolution (Long term evolution, LTE) system, and can also be applied to the 5th generation mobile communication technology (the In the 5th Generation mobile communication technology (5G) network architecture, such as the NR system, or the sixth generation mobile communication technology network architecture after the 5G network architecture or other similar communication systems, there is no specific limitation.
  • 4G 4th Generation mobile communication technology
  • LTE long term evolution
  • FIG. 1 it is a schematic diagram of a network architecture of a 5G system provided by an embodiment of the present application.
  • the network architecture includes user equipment (user equipment, UE), access network (access network, AN) equipment, core network elements, and data network (data network, DN).
  • Terminal equipment including equipment that provides voice and/or data connectivity to users, specifically, equipment that provides voice to users, or equipment that provides data connectivity to users, or equipment that provides voice and data connectivity to users equipment. Examples may include a handheld device with wireless connectivity, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via the RAN, exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • the terminal equipment may include user equipment (user equipment, UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (vehicle to everything, V2X) terminal equipment , machine-to-machine/machine-type communications (machine-to-machine/machine-type communications, M2M/MTC) terminal equipment, Internet of things (internet of things, IoT) terminal equipment, subscriber unit, subscriber station station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • IoT Internet of things
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket, hand-held, computer built-in mobile devices, and the like.
  • PCS personal communication service
  • cordless telephone cordless telephone
  • session initiation protocol session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • constrained devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities, etc.
  • it includes barcodes, radio frequency identification (radio frequency identification, RFID), sensors, global positioning system (global positioning system, GPS), laser scanners and other information sensing devices.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc., which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be considered as vehicle-mounted terminal devices. ).
  • the terminal device may further include a relay (relay).
  • a relay relay
  • all devices capable of performing data communication with the base station can be regarded as terminal devices.
  • the device for realizing the function of the terminal device may be the terminal device, or may be a device capable of supporting the terminal device to realize the function, such as a chip or a chip system, and the device may be installed in the terminal device.
  • the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
  • the AN device may also be a radio access network (radio access network, RAN) device.
  • the access network device may be a device deployed in the wireless access network and capable of performing wireless communication with the terminal device. It is mainly responsible for wireless resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
  • Access network equipment may include base stations in various forms, for example: macro base stations, micro base stations (also called small stations), relay stations, access points, and so on.
  • the names of equipment with base station functions may be different, for example, in the fifth generation (5G) system, it is called gNB; in the LTE system, it is called It is an evolved Node B (evolved NodeB, eNB or eNodeB); in the third generation (3rd generation, 3G) system, it is called Node B (Node B), etc.
  • the access network device involved in the embodiment of the present application may be a base station in 5G or a base station in long term evolution (LTE), where the base station in 5G may also be called a transmission and reception point (transmission reception point (TRP) or next generation Node B (gNB).
  • TRP transmission reception point
  • gNB next generation Node B
  • the device for implementing the function of the access network device may be the access network device, or a device capable of supporting the access network device to realize the function, such as a chip or a chip system, and the device may be installed in the access network equipment.
  • the technical solution provided by the embodiment of the present application is described by taking the access network device as an example for realizing the function of the access network device.
  • the core network elements may include: access and mobility management function (access and mobility management function, AMF), authentication server function (authentication server function, AUSF), unified data management (unified data management, UDM), session Management function (session management function, SMF), policy control function (policy control function, PCF), application function (application, AF), user plane function (user plane function, UPF) network element and network slice selection function (network slice selection function, NSSF) network element.
  • access and mobility management function access and mobility management function
  • AMF authentication server function
  • authentication server function authentication server function
  • AUSF authentication server function
  • UDM unified data management
  • session Management function session management function
  • SMF session Management function
  • policy control function policy control function
  • PCF policy control function
  • application function application, AF
  • user plane function user plane function
  • UPF network slice selection function
  • NSSF network slice selection function
  • the AMF network element is mainly responsible for signaling processing, such as access control, mobility management, attachment and detachment, and gateway selection.
  • the AMF network element When the AMF network element provides services for the session in the terminal device, it will provide the session with storage resources on the control plane, and store the session ID, the SMF network element ID associated with the session ID, and the like.
  • UE and AMF can communicate through N1 non-access stratum (nonaccess stratum, NAS) message, and communication messages between UE and AMF can also be transferred through N2 message of RAN.
  • RAN and AMF communicate through N2 messages.
  • AUSF network element has an authentication service function, and is used to process authentication requests for 3rd generation partnership project (3GPP) access and non-3GPP access.
  • 3GPP 3rd generation partnership project
  • UDM network element used to manage user subscription information and complete user authentication and authorization.
  • the SMF network element is responsible for user plane network element selection, user plane network element redirection, Internet protocol (internet protocol, IP) address allocation, bearer establishment, modification and release, and QoS control.
  • Internet protocol Internet protocol, IP
  • the PCF network element is used to generate and manage users, sessions, and quality of service (quality of service, QoS) flow processing policies. It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the network functions of the control layer, and is responsible for obtaining user subscription information related to policies.
  • the AF network element mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side, and can be located in the operator's network or outside the operator's network.
  • the UPF network element is used to process user packets, such as forwarding and charging. It can be responsible for the forwarding and receiving of user data in the terminal device. It can receive user data from the data network and transmit it to the terminal device through the access network device; the UPF network element can also receive user data from the terminal device through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions that provide services for terminal equipment in the UPF network element are managed and controlled by the SMF network element.
  • the NSSF network element is used to support flexible selection of slices based on information such as user requested and contracted network slice selection assistance information (NSSAI), user location area, slice capacity, and slice current load.
  • NSSAI network slice selection assistance information
  • Authentication, authorization, and accounting (authentication, authorization, accounting, AAA) server (not shown in Figure 1): a server program capable of processing user access requests, providing verification authorization and account services, the main purpose is to manage user access to network servers, and to Services are provided to users with access rights.
  • DN is responsible for providing services for UE, including operator services, Internet services, third-party services, etc., such as providing Internet access functions and SMS functions for UEs.
  • the schematic diagram of the network architecture shown in FIG. 1 also includes interfaces between various network elements, for example, N1 represents the interface between the UE and the AMF network element, N2 represents the interface between the AMF network element and the RAN device, and so on.
  • N1 represents the interface between the UE and the AMF network element
  • N2 represents the interface between the AMF network element and the RAN device, and so on.
  • some interfaces may be implemented in the form of service interfaces, as shown in FIG. 2 for details.
  • the UE, (R)AN equipment, UPF network element, and DN in Figure 1 are generally referred to as user layer network functional entities.
  • User data traffic can pass through the protocol data unit session (protocol data unit Session) established between UE and DN. PDU Session) for transmission, the transmission will pass through the two network functions (entities) of (R)AN and UPF; while other parts are called control layer network functions and entities, which are mainly responsible for authentication and authentication, registration management, session Management, mobility management, policy control and other functions, so as to realize reliable and stable transmission of user layer traffic.
  • protocol data unit Session protocol data unit Session
  • PDU Session protocol data unit Session
  • control layer network functions and entities which are mainly responsible for authentication and authentication, registration management, session Management, mobility management, policy control and other functions, so as to realize reliable and stable transmission of user layer traffic.
  • FIG. 3 it is a schematic diagram of a non-3GPP network architecture in 5G provided by an embodiment of the present application.
  • N3IWF non-3GPP interworking function
  • the N3IWF network element is used to support the non-3GPP access network to connect to the 5G core network.
  • the N3IWF network element is connected to the 5G core network user plane (user plane, UP) and control plane (CP, control plane) functions through the N2 and N3 interfaces respectively. If the selected N3IWF network element is located in the same public land mobile network (PLMN) as the 3GPP access, UEs connected to the same 5G core network of the PLMN through 3GPP access and non-3GPP access at the same time will be operated by the same AMF service.
  • PLMN public land mobile network
  • the functions of the N3IWF network element include: supporting the establishment of an Internet security protocol (internet protocol security, IPsec) tunnel with the UE, the N3IWF network element terminates the IKEv2/IPsec protocol with the UE through the NWu, And through the N2 relay to authenticate the UE and authorize it to access the information required by the 5G core network; relay the uplink and downlink control plane NAS (N1) signaling between the UE and the AMF; establish an IPsec security association (IPsec SA ) to support PDU session traffic; relay uplink and downlink user plane data packets between UE and UPF, and so on.
  • IPsec Internet protocol security
  • the untrusted non-3GPP access network (Untrusted non-3GPP Access Network) equipment is used to support the interconnection and intercommunication between the terminal equipment and the 3GPP core network using non-3GPP technology.
  • non-3GPP technologies such as: Wireless Fidelity (Wireless Fidelity, Wi-Fi), Worldwide Interoperability for Microwave Access (WiMAX), Code Division Multiple Access (CDMA) network, etc.
  • This network element needs to be interconnected with the 3GPP core network through a secure tunnel established by a security gateway.
  • the security gateway is, for example: Evolved Packet Data Gateway (Evolved Packet Data Gateway, ePDG) or non-3GPP interworking function (Non-3GPP InterWorking Function, N3IWF) network element.
  • 5G-ACIA defines four private network deployment scenarios, which are further introduced below.
  • Scenario 1 Completely independent private network.
  • the private network deploys completely independent RAN nodes and 5GC devices (including control plane network elements and user plane network elements), and the private network can communicate with the public network through the firewall;
  • Scenario 2 RAN nodes share the private network.
  • the private network has RAN nodes shared with the public network, but has independent 5GC equipment (including control plane network elements and user plane network elements);
  • Scenario 3 RAN node/5GC control plane share the private network.
  • the private network has the RAN node and 5GC control plane shared with the public network, but the private network has an independent user plane network element UPF;
  • Scenario 4 RAN node/5GC share the private network.
  • the private network and the public network share the RAN node and 5GC (including the control plane and user plane).
  • the private network isolation depends on the slicing or CAG characteristics of the public network. isolation.
  • the network architectures of Scenario 3 and Scenario 4 above are mainly used.
  • the security of the user plane of private network services completely depends on the public network.
  • the user plane key of the private network is derived from the root key of the public network.
  • the root key of the public network is stored on the public network, and the user plane key of the private network is also derived from the public network.
  • the AMF of the public network is deduced according to the key K amf of the public network, and is used to derive an intermediate key between the air interface control plane key and the air interface user plane key, such as K gnb .
  • k amf is a key derived from the root key of the public network. Then the AMF sends the K gnb to the access network device, and then the access network device further deduces the air interface user plane key and the air interface control plane key according to the K gnb . Based on this, the air interface user plane key used in the private network depends on the public network key, and the key is exposed on the public network. If the public network key is leaked or leaked during the derivation process, the security of private network services will be affected.
  • the control plane network element of the private network establishes the user plane security of the private network according to the key of the private network.
  • the key of the private network is different from the key of the public network.
  • the key of the private network is used for air interface
  • the user plane security of the public network is used for the control plane security of the air interface.
  • the air interface is used for communication between the terminal device and the private network.
  • control plane network elements of the private network are not shared by the public network, and the control plane network elements of the private network use independent private network keys to establish the security of the user plane of the private network, which can make public network services and Private network services are isolated from each other to improve the security of private network services.
  • FIG. 4 it is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • the communication system shown in Figure 4 includes: terminal equipment (such as UE), access network (RAN) equipment, private network control plane network elements, public network mobility management (AMF) network elements, public network A session management function (SMF) network element and a user plane function (UPF) network element.
  • terminal equipment such as UE
  • RAN access network
  • AMF public network mobility management
  • SMF public network A session management function
  • UPF user plane function
  • the name of the device/network element shown in Figure 4 may change with the development of the mobile communication field, and the embodiment of the present application does not limit the name of each device/network element; in addition, a device/network element may also be It evolves into multiple devices/network elements, and the multiple devices/network elements jointly realize the functions realized by the one device/network element.
  • the name of the message between network elements or the name of each parameter in the message in the following embodiments of the present application is just an example, and other names may also be used in specific implementation, which is not specifically limited in the embodiment of the present application.
  • Each device/network element included in FIG. 4 is specifically introduced below.
  • the access network equipment and user plane function network elements can be shared by the public network and the private network, or can be exclusively used by the private network. It should be noted that access network equipment and user plane functional network elements are exclusive to the private network, which means that the access network equipment and user plane functional network elements only provide user plane services for private network services of terminal equipment. In the case that the access network equipment and user plane functional network elements are exclusively used by the private network, the mobility management functions of the private network and the public network, as well as the session management function of the public network are still in charge of the control plane network elements of the public network. In addition, the data of the user plane of the public network will not be processed by the functional network element of the user plane of the private network, but will be processed by the functional network element of the user plane of the public network (not shown in FIG. 4 ).
  • the functions of the terminal device, the mobility management (AMF) network element of the public network, the session management function (SMF) network element of the public network, and the user plane function (UPF) network element can refer to the content of the above embodiment corresponding to FIG. 1 or FIG. 3 The introduction in , will not be repeated here.
  • AMF mobility management
  • SMF session management function
  • UPF user plane function
  • the control plane network element of the private network may optionally be named as a local control plane (local control plane, L-CP) network element, or may be named by another name, which is not limited in this embodiment of the present application.
  • the control plane network element of the private network is a control plane network element deployed locally in the private network, and has functions of relaying N2 messages (or called signaling) and managing private network service sessions.
  • the relaying of the N2 message by the control plane network element of the private network means that the control plane network element of the private network can forward the N2 message sent between the access network device and the mobility management (AMF) network element of the public network.
  • AMF mobility management
  • the control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element jointly realize the functions realized by the control plane network element of the private network.
  • the first network element (example, may be named Proxy network element) can realize the function of relaying N2 message
  • the second network element can implement the function of managing private network service sessions.
  • the relevant configuration and policy information of private network service session management may be preconfigured or delivered from the public network to the control plane network element of the private network.
  • the mobility management functions of the private network and the public network and the session management function of the public network are still in charge of the control plane network element of the public network.
  • FIG. 4 also illustrates the equipment/network elements involved in the transmission of the session management (session management, SM) message of the private network and the session management message of the public network in the embodiment of the present application.
  • the session management message is information used to manage information on the user plane.
  • the session management message may include a session establishment request message, a session modification message, a session deletion message, and the like.
  • the private network session management message may include one or more of N1 session management message, N2SM message or N4SM message.
  • the N1SM message is used during the interaction process between the control plane network element of the private network and the UE; it can also be an N2SM message, and the N2SM message is used during the interaction process between the private network control plane network element and the RAN device; it can also be an N4SM message , the N4SM message is used in the interaction process between the control plane network element of the private network and the UPF network element.
  • the session management message of the public network may include one or more of N1SM message, N2SM message or N4SM message.
  • the N1SM message is used in the interaction process between the control plane network element of the public network (for example, it can be an AMF network element) and the UE; it can also be an N2SM message, and the N2SM message is used between the control plane network element of the public network and the RAN device It can also be an N4SM message, and the N4SM message is used during the interaction between the control plane network element of the public network and the UPF network element.
  • the session management message of the private network is a session establishment request of the private network
  • the session management message of the private network is generated by the terminal device, passes through the access network device, the control plane network element of the private network, After the session establishment request of the private network is passed, the control plane network element of the private network instructs the functional network element of the user plane to establish a private network session.
  • the session management message of the public network is a session establishment request of the public network
  • the session management message of the public network is generated by the terminal device, and passes through the access network device, the control plane network element of the private network, and the mobility management of the public network
  • the network element with the session management function of the public network instructs the network element with the user plane function to establish a session with the public network.
  • FIG. 5 is a flow chart of a method for isolating public and private network services provided by an embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
  • the control plane network element of the private network obtains the key of the private network.
  • the key of the private network is the root key of the private network or a key derived based on the root key of the private network.
  • the key of the private network can be the root key of the private network or the intermediate key of the private network, and the intermediate key is a key derived from the root key of the private network.
  • the root key of the private network can be the master session key (master session key, MSK), the extended master session key (extended master session key, EMSK), and the intermediate key of the private network can be the local control plane key (local control plane key, KL-CP (Kl-cp)) or K gnb , the role of the K L-CP can be compared to a mobility management key (access and mobility management function key, KAMF (K amf )).
  • the key of the public network may be the root key of the public network or the intermediate key of the public network, and the intermediate key is a key derived from the root key of the public network.
  • the root key of the public network can be the master session key (master session key, MSK), the extended master session key (extended master session key, EMSK), the intermediate key of the public network can be K amf or K gnb .
  • the root key of the private network is different from the root key of the public network.
  • the private network key is used for user plane security of the air interface
  • the root key of the public network is used for control plane security of the air interface.
  • the air interface is an air interface used for communication between the terminal device and the private network.
  • the root key of the public network is stored in the public network; the root key of the private network is stored in the private network, and the business key derived from the private network is also stored in the private network.
  • the control plane network elements of the private network are not shared by the public network, and the private network key is no longer stored in the public network. Even if the public network key is leaked or leaked during the derivation process, it will not affect the private network security of network services.
  • control plane network element of the private network stores the key of the private network. Then, the control plane network element of the private network can read the key of the private network from its own storage medium.
  • the private network key is stored in the AAA server.
  • the control plane network element of the private network can obtain the key of the private network from the AAA server.
  • the AAA server can grant the control plane network element of the private network the permission to access and read the key of the private network, and verify the permission of the access device (or user) through the AAA server, which can prevent other devices or The user reads the key of the private network to improve the security of the private network key.
  • the key of the private network is stored in another network element (for example, the network element may be a network element exclusive to the private network), and the control plane network element of the private network may Obtain the key of the private network from the other network element.
  • the other network element may store the root key of the private network, and send the intermediate key derived from the root key of the private network to the control plane network element of the private network.
  • the terminal device sends a first message to the control plane network element of the private network, where the first message includes a session establishment request.
  • the process of the terminal device sending the first message to the control plane network element of the private network may be as follows:
  • Step a1 the terminal device sends a first message to the RAN device.
  • Step a2 The RAN device forwards the first message to the control plane network element of the private network.
  • the RAN device may be an intermediate forwarding node of the first message, and does not perceive the content of the first message.
  • control plane network element of the private network After the control plane network element of the private network receives the first message from the terminal device, the control plane network element of the private network determines that the session establishment request corresponds to the private network.
  • control plane network element of the private network may obtain the NAS key of the public network, and use the NAS key to parse the first message to obtain the session establishment request. If the session establishment request includes the first information, the control plane network element of the private network determines according to the first information that the session establishment request corresponds to the private network. Wherein, the first information is used to indicate that the session establishment request corresponds to a private network. For example, reference may be made to the introduction of the embodiment corresponding to FIG. 7 , which will not be described in detail here.
  • the control plane network element of the private network may establish a connection between the private network and the terminal device. If the control plane network element of the private network receives the first message from the terminal device through the connection between the private network and the terminal device, the control plane network element of the private network determines that the session is established according to the connection between the private network and the terminal device The request corresponds to the private network. For example, reference may be made to the introduction of the embodiment corresponding to FIG. 8 , which will not be described in detail here.
  • the control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
  • control plane network element of the private network can establish the user plane security of the air interface according to the key of the private network: the control plane network element of the private network generates security parameters according to the key of the private network; The network element sends the security parameter to the terminal device and/or the access network device.
  • the security parameter is used for the terminal device and/or the access network device to generate an air interface user plane key.
  • the security parameter sent by the control plane network element of the private network to the terminal device may be the same as or different from the security parameter of the access network device.
  • the control plane network element of the private network can determine whether the session establishment request corresponds to the public network or the private network, and if the session establishment request corresponds to the private network, establish The user plane of the private network is secure; if the session establishment request corresponds to the public network, the session establishment request is forwarded to the mobility management network element of the public network for processing. In this way, it can be ensured that the user plane key of the private network is derived from the key of the private network, and the security isolation of public network and private network services can be realized, and the security of private network services can be improved.
  • FIG. 6 is a schematic flowchart of establishing user plane security and control plane security of a private network provided by an embodiment of the present application.
  • step b1 the control plane network element of the private network generates a first security parameter according to the key of the private network, and the first security parameter is used to deduce the user plane key of the air interface of the terminal device.
  • the first security parameter may be included in the session security context.
  • the first security parameter includes an intermediate key used to generate a user plane key for the air interface.
  • control plane network element of the private network executes step b1, it can be implemented in the following ways:
  • the control plane network element of the private network may generate the first security parameter according to the key and auxiliary parameters of the private network.
  • the first security parameter includes an intermediate key.
  • the intermediate key in the embodiment of this application refers to the key generated from the root key after one or more derivations. After the network element receives the intermediate key, it can further perform key derivation, and finally obtain the key for integrity protection and/or encryption.
  • the access network device uses the intermediate key to deduce the key used for integrity protection and/or encryption of the user plane of the air interface.
  • the intermediate key may be k eNB .
  • the intermediate key may also be called K npn .
  • control plane network element of the private network generates the first security parameter according to the private network key and auxiliary parameters, which may include deriving an intermediate key according to the private network key and auxiliary parameters.
  • the user plane key of the air interface may include K UPenc and/or K UPint .
  • K UPenc is used to protect user plane services through encryption algorithms.
  • K UPint is used to protect user plane services through specific integrity algorithms.
  • the auxiliary parameter may include single network slice selection assistance information (single network slice selection assistance information, S-NSSAI), data network name (data network name, DNN) or downlink NAS message count (downlink NAS count, DL NAS Count ), or one or more items in other preset auxiliary parameters.
  • DL NAS Count can be sent by the control plane NE of the public network to the control plane NE of the private network.
  • step b2 the control plane network element of the private network sends the first security parameter to the access network device providing access service for the terminal device.
  • control plane network element of the private network also sends auxiliary parameters to the access network device.
  • Step b3 the access network device deduces the user plane key of the air interface according to the first security parameter.
  • Step b4 the control plane network element of the private network sends auxiliary parameters to the terminal device, and the auxiliary parameters are used by the terminal device to deduce and generate the intermediate key of the user plane key of the air interface.
  • control plane network element of the private network may send the auxiliary parameters to the mobility management network element, and the mobility management network element sends the auxiliary parameters to the terminal device, for example, the mobility management network element sends the auxiliary parameters to the terminal device through the N1 interface.
  • control plane network element of the private network can send auxiliary parameters to the mobility management network element, the mobility management network element sends the auxiliary parameters to the access network equipment, and the access network equipment sends auxiliary parameters to the terminal equipment, such as The network access device may send auxiliary parameters to the terminal device through an RRC connection reconfiguration message.
  • step b2 does not limit the execution order of step b2 and step b4.
  • Step b5 after the terminal device receives the auxiliary parameters from the control plane network element of the private network, the terminal device generates an intermediate key according to the root key of the private network and the auxiliary parameters, and deduces the user plane key of the air interface according to the intermediate key.
  • the root key of the private network is stored on the terminal device.
  • the terminal device can also obtain the root key of the private network through online signing.
  • the terminal device can temporarily access the cellular network, and access the private network (
  • the root key is obtained from the control plane network element of the private network; or the terminal device obtains the root key from the private network through a user plane connection established by a non-3GPP network (such as a WiFi network).
  • the user plane key of the air interface when transmitting uplink and downlink service data, can be used to encrypt and decrypt service data, That is, it can be understood as establishing the user plane security of the air interface.
  • the terminal device sends uplink service data to the access network device
  • the user plane key of the air interface can be used to encrypt the uplink service data and then sent to the access network device, so that the user plane key of the air interface can be used to protect the Security of uplink business data.
  • the user plane key of the air interface can be used to encrypt the downlink service data before sending it to the terminal device, so that the user plane key of the air interface can be used on the air interface to protect the downlink service Data Security.
  • the following describes the derivation process of the air interface control plane key, as shown in FIG. 6 .
  • step c1 the network element of the control plane of the public network obtains the key of the public network of the terminal device.
  • Step c2 the control plane network element of the public network generates a second security parameter according to the key of the public network, and the second security parameter is used to deduce the air interface control plane key of the terminal device.
  • the second security parameter includes an intermediate key.
  • the access network device uses the intermediate key to deduce the key used for integrity protection and/or encryption of the control plane of the air interface.
  • the intermediate key may be k eNB .
  • the intermediate key may also be called K npn .
  • control plane network element of the public network generates the second security parameter according to the public network key and auxiliary parameters, which may include deriving an intermediate key according to the public network key and auxiliary parameters.
  • Step c3 the control plane network element of the public network sends the second security parameter to the access network device.
  • Step c4 the access network device deduces the control plane key of the air interface according to the second security parameter.
  • Step c5 the control plane network element of the public network sends auxiliary parameters for deriving the control plane key of the air interface to the terminal device.
  • control plane network element of the public network may send the auxiliary parameters used for deriving the control plane key of the air interface to the terminal device through the N1 interface.
  • control plane network element of the public network can send auxiliary parameters to the access network device, and the access network device sends auxiliary parameters used to deduce the control plane key of the air interface to the terminal device, such as the access network device.
  • Auxiliary parameters for deriving the control plane key of the air interface may be sent to the terminal device through an RRC connection reconfiguration message.
  • the auxiliary parameters used for deriving the air interface user plane key and the auxiliary parameters used for deriving the air interface control plane key may be the same or different, which is not limited in the embodiment of the present application.
  • Step c6 the terminal device generates an intermediate key according to the public network root key and auxiliary parameters, and deduces an air interface control plane key according to the intermediate key.
  • control plane network element of the public network can still send auxiliary parameters for deriving the NAS control plane key to the terminal device.
  • the terminal device uses the public network root key and auxiliary parameters to generate an intermediate key, and deduces the NAS control plane key based on the intermediate key.
  • the security parameters of the control plane key used for deriving the air interface and the security parameters of the user plane key for the air interface are independently generated, that is, the control plane network element of the public network generates the security parameters used for deriving the air interface.
  • the security parameters of the control plane key, as well as the security parameters of the user plane key generated by the control plane network element of the private network and used to deduce the user plane key of the air interface because the private network network element is not shared by the public network, the private network key can be guaranteed It is not known by the public network, thereby ensuring the security of the private network.
  • the user plane key of the air interface is used to securely transmit the service data, the security of the service data transmission of the air interface is improved.
  • the security parameters used to deduce the control plane key of the air interface and the user plane key of the air interface may also be the same.
  • the access network device may also deduce the air interface key according to the first security parameter. control plane key.
  • the auxiliary parameters may also be used by the terminal device to deduce and generate an intermediate key for the control plane key of the air interface.
  • the terminal device can also generate an intermediate key according to the private network root key and auxiliary parameters, and then use the intermediate key to deduce the air interface control plane key. In this case, the above step c4-step c6 may not be executed.
  • step b2 when the control plane network element of the private network sends the first security parameter to the access network device, may be implemented in any of the following possible ways:
  • control plane network element of the private network may send the first security parameter to the access network device through the control plane network element of the public network.
  • control plane network element of the public network may include a public network mobility management network element.
  • control plane network element of the private network may send the first security parameter to the access network device through the user plane network element of the private network.
  • the private network user plane network element may include a private network UPF.
  • the control plane network element of the private network transfers the first security parameter to the access network device through the control plane network element of the public network, or transmits the first security parameter through the private network
  • the user plane network element transfers the first security parameter to the access network device
  • the private network control plane network element can encrypt the first security parameter, and then pass the encrypted first security parameter through the public network control plane network element or
  • the user plane network element of the private network sends it to the access network device.
  • the access network device may decrypt it using a decryption key to obtain the first security parameter.
  • the decryption key may be a symmetric key to the encryption key.
  • the key used to encrypt the first security parameter may be called a security parameter key, a tunnel key, or another name, which is not specifically limited in this application.
  • the decryption key may be a symmetric key of the encryption key, and the decryption key may also be a security parameter key.
  • FIG. 7 it is a flow chart of another method for isolating public and private network services provided in the embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
  • the terminal device registers in the network.
  • the terminal device is registered in the public network.
  • the RAN device selects the AMF network element, it can discover the control plane network element of the private network (which may be called the L-CP network element) according to the information pre-configured by the operator. In this way, the AMF network element can perceive the existence of the control plane network element of the private network.
  • the control plane network element of the private network which may be called the L-CP network element
  • the control plane network element of the private network may indicate that it is a relay node during the process of establishing the N2 tunnel with the AMF network element.
  • the control plane network element of the private network sends first indication information to the AMF network element, where the first indication information is used to indicate that the control plane network element of the private network is a relay node between the RAN device and the AMF network element.
  • a mobility management (AMF) network element of the public network acquires a NAS key of the public network.
  • the mobility management network element of the public network can obtain the NAS key of the public network corresponding to the terminal device.
  • the mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network.
  • control plane network element of the private network receives the NAS key of the public network from the mobility management network element of the public network.
  • the mobility management network element of the public network In the process of registering the terminal device to the public network, the mobility management network element of the public network records the corresponding relationship between the terminal device and the corresponding control plane network element of the private network.
  • the mobility management network element of the public network sends the NAS key of the public network corresponding to the terminal device to the control plane network element of the private network corresponding to the terminal device, so that the control plane network element of the private network can use the NAS key of the public network
  • the key parses the received NAS message.
  • the way that the mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network is as follows: the mobility management network element of the public network sends the private network control plane key
  • the network element sends a second message, the second message includes the second information and the NAS key of the public network, and the second information is used to indicate the permission granted to the control plane network element of the private network to use the NAS key of the public network.
  • the second message may be the NAS context of the terminal device (that is, the terminal device corresponding to the control plane network element of the private network).
  • the configuration information of the mobility management network element of the public network includes authorization information that allows the mobility management network element of the public network to send the NAS context.
  • the configuration information may be pre-stored, or delivered by the network to the mobility management network element of the public network.
  • the mobility network element of the public network After the mobility network element of the public network obtains the NAS key of the public network, it can send the NAS context to the control plane network element of the private network according to the configuration information.
  • the terminal device sends a first message to the control plane network element of the private network, where the first message includes a session establishment request.
  • control plane network element of the private network receives a first message from the terminal device, where the first message includes a session establishment request.
  • the process of the terminal device sending the first message to the control plane network element of the private network may be as follows:
  • Step a1 the terminal device sends a first message to the RAN device.
  • Step a2 The RAN device forwards the first message to the control plane network element of the private network.
  • the RAN device may be an intermediate forwarding node of the first message, and does not perceive the content of the first message.
  • the first message includes first information, and the first information is used to indicate that the session establishment request corresponds to a private network.
  • the first information may be: the first parameter, network slice selection assistance information (network slice selection assistance information, NSSAI) of the private network, or data network name (data network name, DNN) of the private network one or more of .
  • the network slice selection support information of the private network is the network slice selection support information dedicated to the private network
  • the data network name of the private network is a data network name dedicated to the private network.
  • the first parameter is used to indicate that the key of the private network is used to derive the user plane key of the air interface.
  • the first parameter may be named as a local credential derivative request (LCDR).
  • the first message may further include a second parameter, where the second parameter is used to instruct the terminal device to use an independent key to derive the user plane key when establishing user plane security.
  • using an independent key means that the key of the user plane key derived from the air interface is different from the key derived from the control plane key of the air interface, or it can be expressed as that the network element/device that derives the user plane key of the air interface is different from The network element/device that derives the control plane key of the air interface is different, or it can be expressed that the control plane key of the air interface of the terminal device and the user plane key of the air interface are isolated from each other.
  • the second parameter may be named user plane key separation indication (user plane separation request, UPSR).
  • the first parameter and the second parameter may also be represented by one parameter, and the one parameter may indicate meanings indicated by the first parameter and the second parameter.
  • the control plane network element of the private network uses the NAS key of the public network to parse the first message, so as to obtain a session establishment request.
  • the control plane network element of the private network determines according to the first information that the session establishment request corresponds to the private network.
  • the control plane network element of the private network determines that the session establishment request corresponds to the private network.
  • the control plane network element of the private network uses the NAS key to inspect the received first message, if the first message is a session management NAS message, and the session management NAS message includes first information (first parameter, NSSAI of the private network or DNN of the private network), the control plane network element of the private network determines that the session management NAS message corresponds to the private network according to the first information.
  • control plane network element of the private network determines that the session establishment request corresponds to the private network
  • the control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
  • control plane network element of the private network may, according to the first parameter in the first message, the second parameter, local configuration information or One or more items in the subscription information corresponding to the terminal device determine that the user plane security of the air interface is established using the key of the private network.
  • control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the first parameter or the second parameter in the first message. It can be understood that: if the first message includes the first parameter or the second parameter, the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface.
  • the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the local configuration information. It can be understood as: if the local configuration information indicates that when the control plane network element of the private network determines that the session establishment request corresponds to the private network, the operation of establishing the user plane security of the air interface using the key of the private network is triggered. Then, when the control plane network element of the private network determines that the session establishment request corresponds to the private network, it is determined that the user plane security of the air interface is established using the key of the private network.
  • the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the subscription information corresponding to the terminal device. It can be understood as: if the subscription information corresponding to the terminal device indicates that when the control plane network element of the private network determines that the session establishment request corresponds to the private network, trigger the establishment of the air interface corresponding to the terminal device using the key of the private network safe operation of the user plane. Then, when the control plane network element of the private network determines that the session establishment request corresponds to the private network, it is determined that the user plane security of the air interface is established using the key of the private network. In this manner, the subscription information corresponds to the terminal device, and different terminal devices may have different subscription information.
  • the control plane network element of the private network forwards the first message to the control plane network element of the public network (for example, the AMF network element of the public network).
  • the control plane network element of the public network performs the next step processing on the first message. Exemplarily, in this case, it may be triggered to use the key of the public network to establish the user of the air interface corresponding to the terminal device. safe operation.
  • the control plane network element of the private network feeds back a message of session establishment failure to the terminal device.
  • the feedback message may include a cause value of the creation failure ( cause value). Since different terminal devices may have different functions, in this manner, terminal devices with different functions may adopt different processing methods for the first message.
  • control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network
  • the manner in which the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network can refer to the introduction in the above step S104 , and will not be repeated here.
  • control plane network element of the private network determines that the session establishment request corresponds to the public network
  • the control plane network element of the private network forwards the first message to the AMF network element of the public network.
  • the AMF network element of the public network performs the next processing on the first message.
  • the control plane network element of the private network may determine that the session establishment request corresponds to the public network according to the NSSAI/DNN included in the first message, or determine that the session establishment request corresponds to the public network according to the fact that the first parameter is not included in the first message.
  • control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element
  • the network elements jointly realize the functions realized by the network elements of the control plane of the private network.
  • the function of the control plane network element of the private network to receive and/or receive messages from other devices, or to forward messages to other devices may be implemented by the first network element.
  • the function of managing private network service sessions may be implemented by the second network element.
  • the operation of step S203 may be: the mobility management network element of the public network sends the NAS key of the public network to the first network element, and correspondingly, the first network element receives the mobility key from the public network.
  • NAS key of the public network of the management NE may be: the terminal device sends the first message to the first network element, and correspondingly, the first network element receives the first message from the terminal device.
  • the execution subject of step S205 and step S206 may be the first network element.
  • step S207 can refer to the following process:
  • Step d1 When the first network element determines that the session establishment request corresponds to a private network, the first network element forwards the first message to the second network element.
  • the first network element inspects the received first message using the NAS key, if the first message is a session management NAS message, and the session management NAS message includes first information (first parameter, private network NSSAI or DNN of the private network), the first network element determines that the session management NAS message corresponds to the private network according to the first information.
  • Step d2 According to one or more items of the first parameter, the second parameter, the local configuration information in the first message, or the subscription information corresponding to the terminal device, the second network element determines to use the key of the private network to establish the air interface. User plane security.
  • the second network element determines to use the key of the private network to establish the user plane security of the air interface. It can be understood that: if the first message includes the first parameter or the second parameter, the second network element determines to use the key of the private network to establish the user plane security of the air interface.
  • the second network element determines to use the key of the private network to establish the user plane security of the air interface according to the local configuration information. It can be understood as: if the local configuration information indicates that the second network element receives the message, it triggers an operation of using the private network key to establish the user plane security of the air interface. Then, when the second network element receives the first message, it determines to use the key of the private network to establish the user plane security of the air interface.
  • the second network element determines to use the private network key to establish user plane security of the air interface according to the subscription information corresponding to the terminal device. It can be understood as: if the subscription information corresponding to the terminal device indicates that the second network element receives the message sent by the terminal device, it triggers the operation of using the private network key to establish the user plane security of the air interface corresponding to the terminal device. Then, after receiving the first message sent by the terminal device, the second network element determines to use the key of the private network to establish the user plane security of the air interface. In this manner, the subscription information corresponds to the terminal device, and different terminal devices may have different subscription information.
  • the second network element forwards the first message to the first network element, and instructs the first network element to forward the first message to the control plane of the public network
  • a network element for example, an AMF network element of the public network.
  • the first message is processed by the network element of the control plane of the public network.
  • an operation of establishing user plane security for an air interface corresponding to the terminal device using a public network key may be triggered.
  • the second network element in response to the first message, feeds back a message of session establishment failure to the terminal device.
  • the feedback message may include Cause value (cause value) of creation failure. Since different terminal devices may have different functions, in this manner, terminal devices with different functions may adopt different processing methods for the first message.
  • Step d3 the second network element establishes user plane security of the air interface according to the key of the private network.
  • the second network element may store a private network key.
  • the second network element may obtain the private network key from the AAA server.
  • the second network element may obtain the private network key or a derived key of the private network key from another network element storing the private network key.
  • FIG. 8 it is a flow chart of another method for isolating public and private network services provided in the embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
  • the terminal device initiates a registration process.
  • step S301 the implementation manner of establishing the N2 tunnel between the access network device and the public network can refer to the content introduced in the above step S201, and will not be repeated here.
  • the terminal device in the embodiment of the present application corresponds to a piece of network subscription information.
  • the terminal device in the embodiment of the present application corresponds to a subscriber identification module (SIM) card, and with the evolution of communication technology, the SIM card can also be a built-in chip subscriber identification (embedded-SIM, eSIM) card, etc.
  • SIM subscriber identification module
  • eSIM embedded-SIM
  • a dual-card dual-standby terminal device may be regarded as two terminal devices in the embodiment of the present application.
  • the terminal device sends a fourth message to the access network device, where the fourth message includes the second connection establishment request.
  • the fourth message may be an uplink radio resource control (radio resource control, RRC) message.
  • the fourth message is used to trigger establishment of a connection between the public network and the terminal device.
  • the fourth message may include a second connection establishment request, and the second connection establishment request is used to request establishment of a connection between the public network and the terminal device.
  • the connection between the public network and the terminal device may be a NAS connection of the public network.
  • the connection between the public network and the terminal device may be used to transmit signaling interacted between the terminal device and a control plane network element (for example, an AMF network element) of the public network, and the interactive signaling may include establishing (or modifying, Delete) session connection related signaling, mobility management related signaling, and so on.
  • a control plane network element for example, an AMF network element
  • the access network device After the access network device receives the fourth message from the terminal device, the access network device sends a second connection establishment request to the mobility management network element of the public network.
  • the process of the access network device sending the second connection establishment request to the mobility management network element of the public network may be:
  • Step e1 the access network device sends the second connection establishment request to the control plane device of the private network.
  • control plane network element of the private network receives the second connection establishment request from the terminal device.
  • the second connection establishment request is carried in the N2 message. Since the control plane network element of the private network is a relay node between the RAN device and the control plane network element (exemplary, AMF network element) of the public network, it will The received N2 message is forwarded; therefore, the message sent by the RAN device to the control plane network element of the public network through the N2 tunnel will be forwarded by the control plane network element of the private network.
  • the control plane network element of the private network is a relay node between the RAN device and the control plane network element (exemplary, AMF network element) of the public network.
  • Step e2 the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
  • control plane network element of the private network sends to the control plane network element of the public network is the N2 message carrying the second connection establishment request.
  • control plane network element of the private network determines that the N2 message corresponds to the public network.
  • the N2 message includes the first indication identifier, which indicates that the N2 message corresponds to the public network.
  • the first indication is used to indicate that the N2 message corresponds to the public network, that is, the control plane network element of the private network does not need to process the message, but only needs to forward the N2 message.
  • the control plane network element of the private network may determine that the N2 message corresponds to the public network according to the first indicator.
  • the N2 message does not contain the second indicator, or the N2 message is not a special (or called a specific, preset) form of N2 message (specific N2Message), it means that the N2 message Corresponds to the public network.
  • the second indication identifier or the special form of the message is used to indicate that the N2 message corresponds to a private network, that is to say, the control plane network element of the private network needs to perform the next processing on the N2 message.
  • this kind of N2 message may be the N2 message including the first connection establishment request described in the subsequent content.
  • the control plane network element of the private network may determine that the N2 message corresponds to the public network according to the fact that the N2 message does not include the second indicator, or the N2 message is not a special N2 message.
  • step S301 the control plane network element of the private network discovered by the RAN device to implement the relay function (for the convenience of description, it is called the control plane network element of the first type of private network ) and the control plane network element of the private network discovered by the RAN device according to the routing information in the subsequent step S306 (for the sake of description, referred to as the control plane network element of the second type of private network) are different control plane network elements.
  • the control plane network element of the first type of private network forwards the received N2 message
  • the control plane network element of the second type of private network responds to the connection request in the received N2 message, Further establish the connection between the private network and the terminal device.
  • the mobility management network element of the public network After the mobility management network element of the public network receives the second connection establishment request from the access network device, the mobility management network element of the public network establishes a connection between the public network and the terminal device according to the second connection establishment request. connect.
  • the NAS security of the public network can be established by using the key of the public network. That is to say, based on the key of the public network, the mobility management network element and the terminal device of the public network agree on a key corresponding to the NAS control plane of the public network.
  • the terminal device sends a third message to the access network device, where the third message includes the first connection establishment request.
  • the third message may be an uplink radio resource control (radio resource control, RRC) message.
  • the third message is used to trigger the establishment of the connection between the private network and the terminal device.
  • the third message includes a first connection establishment request and routing information of a control plane network element of the private network, where the first connection establishment request is used to request establishment of a connection between the private network and the terminal device, and the private network The routing information of the control plane network elements of the private network is used to discover the control plane network elements of the private network.
  • RRC radio resource control
  • the connection between the private network and the terminal device may be a NAS connection of the private network.
  • the third message may include the second indication information, the routing information of the control plane network element of the private network, and the first connection establishment request.
  • the second indication information is used to instruct the access network device to discover the control plane network element of the private network
  • the routing information of the control plane network element of the private network is used to discover the control plane network element of the private network.
  • the first connection establishment request may be an Initial UE NAS message, or other newly defined (or called specific, specific, or preset) NAS message. If the first connection establishment request is an Initial UE NAS message, then the third message also includes a third indication message, and the third indication message is used to indicate that the Initial UE NAS message corresponds to a private network. If the first connection establishment request is another newly defined NAS message, then this newly defined NAS message may indicate that the NAS message corresponds to a private network.
  • the terminal device may determine to establish a private network NAS connection according to the private network-specific DNN or private network-specific NSSAI to transmit the private network session management message.
  • the private network-specific DNN or private network-specific NSSAI may be included in the policy information pre-configured in the terminal device or issued by the network device.
  • the policy information may instruct the terminal device to establish a private network if there is a private network-specific DNN or a private network-specific NSSAI in the policy information during the process of registering the terminal device to the network (for example, when the terminal is powered on).
  • NAS connection to transmit private network session management messages.
  • the policy message may instruct the terminal device to establish a private network NAS connection to Transmit private network session management messages.
  • the access network device After the access network device receives the third message from the terminal device, the access network device discovers the control plane network element of the private network according to the third message, and sends the first connection establishment request to the control plane network element of the private network .
  • control plane network element of the private network is used to establish a connection between the private network and the terminal device. It should be noted that the control plane network element of the private network discovered by the access network device in S306 may be the same as or different from the control plane network element of the private network discovered by the access network device during the registration process of the terminal device.
  • the first connection establishment request is carried in an N2 message.
  • control plane network element of the private network After the control plane network element of the private network receives the first connection establishment request from the access network device, the control plane network element of the private network establishes a connection between the private network and the terminal device according to the first connection establishment request.
  • connection between the private network and the terminal device may be used to transmit the signaling interacted between the terminal device and the control plane network element of the private network (for example, it may be an L-CP network element).
  • the signaling may include related signaling for establishing (or modifying, deleting) a session connection, and so on.
  • the connection between the private network and the terminal device may be used for the first message in S308.
  • the private network control plane network element determines the N2 message carrying the first connection establishment request Corresponds to the private network. It should be noted that the determination method can refer to the introduction in the above step e2.
  • control plane network element of the private network determines that the N2 message does not correspond to the public network, it can determine that the N2 message corresponds to the private network.
  • control plane network element of the private network in step S307 is the control plane network element of the second type of private network introduced in the above step e2.
  • the NAS security of the private network can be established by using the key of the private network. That is to say, the control plane network elements and terminal devices of the private network agree on the NAS control plane key corresponding to the private network based on the private network key.
  • the terminal device sends the first message to the control plane network element of the private network through the connection between the private network and the terminal device.
  • the first message may be forwarded by the access network device.
  • control plane network element of the private network After the control plane network element of the private network receives the first message from the terminal device through the connection between the private network and the terminal device, the control plane network element of the private network according to the connection between the private network and the terminal device It is determined that the session establishment request in the first message corresponds to a private network.
  • control plane network element of the private network determines that the session establishment request is sent through the connection between the private network and the terminal device, then the control plane network element of the private network determines that the session establishment request corresponds to the private network.
  • the control plane network element of the private network may determine one or more items of the first parameter in the first message, the second parameter, local configuration information, or the subscription information corresponding to the terminal device in the first message.
  • the session establishment request corresponds to the private network or determines to use the key of the private network to establish the user plane security of the air interface. It should be noted that, for the method of determining that the session establishment request corresponds to the private network, refer to the introduction in S206 above, and for determining the user plane security of the air interface using the key of the private network, refer to the introduction in S207 above, which will not be repeated here. .
  • control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
  • control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network may refer to the introduction in the above step S104 , which will not be repeated here.
  • the terminal device respectively establishes a connection with the public network and a connection with the private network.
  • the terminal device can obtain the root key of the private network and the root key of the public network.
  • the root key of the private network is different from the root key of the public network.
  • the user plane key of the private network is generated using the key, and the user plane key of the public network is generated according to the root key of the public network.
  • control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element
  • the network elements jointly realize the functions realized by the network elements of the control plane of the private network.
  • the function of the control plane network element of the private network to receive and/or receive messages from other devices, or to forward messages to other devices, or to establish a connection between the private network and the terminal device can be implemented by the first network element .
  • the function of managing private network service sessions may be implemented by the second network element.
  • the operation in step e1 may be: the access network device sends the second connection establishment request to the first network element, and correspondingly, the first network element receives the second connection establishment request from the access network device Connection establishment request.
  • step S306 may be: the access network device discovers the first network element according to the first message, and sends the first connection establishment request to the first network element, and correspondingly, the first network element receives the first network element from the access network device A first connection establishment request, where the first message includes a session establishment request.
  • step S308 may be: the terminal device sends the first message to the first network element through the connection between the private network and the terminal device, and correspondingly, the first network element receives the message from the terminal device through the connection between the private network and the terminal device. The first message for this end device.
  • the execution subject of step e2 and step S307 may be the first network element.
  • step S310 can refer to the following process:
  • Step f1 When the first network element determines that the session establishment request corresponds to a private network, the first network element forwards the first message to the second network element.
  • the first network element may directly forward the first message received through the connection between the private network and the terminal device to the second network element.
  • Step f2 According to one or more items of the first parameter, the second parameter, the local configuration information in the first message, or the subscription information corresponding to the terminal device, the second network element determines to use the key of the private network to establish the air interface. User plane security.
  • step f2 can refer to the introduction of step d2 in the above content, and will not be repeated here.
  • Step f3 the second network element establishes user plane security of the air interface according to the key of the private network.
  • the user plane security of the air interface established by the second network element according to the key of the private network can refer to the introduction in the above content, and will not be repeated here.
  • the second network element may store a private network key.
  • the second network element may obtain the private network key from the AAA server.
  • the second network element may obtain the private network key or a derived key of the private network key from another network element storing the private network key.
  • the method provided in the embodiments of the present application is carried out from the perspective of interaction between the control plane network elements, terminal devices, access network devices, and public network mobility management network elements of the private network.
  • the control plane network elements, terminal devices, access network devices of the private network, and the mobility management network elements of the public network may include hardware structures, software modules, and hardware structure , software modules, or hardware structure plus software modules to realize the above functions.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • FIG. 9 it is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
  • the communication device 900 can correspond to the control plane network element, terminal device, access network device or The functions or steps implemented by the mobility management network element of the public network.
  • the communication device 900 may include a transceiver unit 901 or a processing unit 902 .
  • a storage unit may also be included, and the storage unit may be used to store instructions (code or program) and/or data.
  • the transceiver unit 901 or the processing unit 902 may be coupled with the storage unit, for example, the processing unit 902 may read instructions (code or program) or/or data in the storage unit to implement a corresponding method.
  • Each of the above units can be set independently, or can be partially or fully integrated.
  • the transceiving unit 901 may include a sending unit or a receiving unit, the sending unit is configured to perform a sending operation, and the receiving unit is configured to perform a receiving operation.
  • the processing unit 902 may be a processor or a controller, such as a general-purpose central processing unit (central processing unit, CPU), a general-purpose processor, digital signal processing (digital signal processing, DSP), an application specific integrated circuit (application specific integrated circuits, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may realize or execute various exemplary logical blocks, units or circuits described in connection with the disclosure of this application.
  • the processor may also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of DSP or microprocessors, and the like.
  • the transceiver unit 901 is an interface circuit of the device for receiving signals from other devices.
  • the transceiver unit 901 is an interface circuit for the chip to receive signals from other chips or devices, or an interface circuit for the chip to send signals to other chips or devices.
  • the communication device 900 may be a control plane network element, a terminal device, or an access network device of a private network or a mobility management network element of a public network in the above embodiments.
  • a control plane network element, a terminal device, or an access network of a private network The device or the mobility management network element of the public network can also be the control plane network element, terminal device, and access network device used for the private network or the mobility management network element of the public network.
  • the control plane network element and terminal device of the private network Or, a chip of an access network device or a mobility management network element of a public network.
  • the processing unit 902 may be, for example, a processor
  • the transceiver unit 901 may be, for example, a transceiver device.
  • the transceiver may include a radio frequency circuit or an input/output interface
  • the storage unit may be, for example, a memory.
  • the processing unit 902 may be a processor, for example, and the transceiver unit 901 For example, it may be an input/output interface, a pin, or a circuit.
  • the processing unit 902 can execute the computer-executed instructions stored in the storage unit.
  • the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit can also be a control plane network element or a terminal of the private network.
  • a storage unit located outside the chip within a device or an access network device or a mobility management network element of the public network such as a read-only memory (ROM) or other types of static memory that can store static information or instructions Storage device, random access memory (random access memory, RAM), etc.
  • ROM read-only memory
  • RAM random access memory
  • the communication device 900 can correspondingly realize the behavior and function of the control plane network element (or called L-SMF) of the private network in the above method embodiments.
  • the communication device 900 may be a control plane network element of the private network, or may be a component (such as a chip or a circuit) applied to the control plane network element of the private network.
  • the transceiver unit 901 can be used to support the communication between the control plane network element of the private network and other network entities, for example, support the control plane network element of the private network and the mobility management network element of the public network shown in FIGS. 4-8 , Communication between access network devices, terminal devices, etc.
  • the processing unit 902 is used to control and manage the actions of the control plane network elements of the private network.
  • the processing unit 902 is used to support the control plane network elements of the private network to execute the transmission and reception of the control plane network elements of the private network as shown in Figures 4-8. other operations.
  • the processing unit 902 is configured to obtain the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, the root key of the private network The key is different from the root key of the public network.
  • the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
  • step S101 in the method shown in FIG. 5 above.
  • the transceiving unit 901 is configured to receive a first message from a terminal device, where the first message includes a session establishment request.
  • the first message includes a session establishment request.
  • the processing unit 902 is further configured to determine that the session establishment request corresponds to the private network. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step S103 in the method shown in FIG. 5 above.
  • the processing unit 902 is further configured to establish user plane security of the air interface according to the private network key. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step S104 in the method shown in FIG. 5 above.
  • the transceiver unit 901 is further configured to: receive the non-access stratum NAS key of the public network from the mobility management network element of the public network; use the NAS key of the public network to resolve the The first message to get the session establishment request.
  • the transceiving unit 901 is specifically configured to: receive a second message from a mobility management network element of the public network, where the second message includes second information and a NAS key of the public network, the The second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
  • the first message includes first information
  • the first information is used to indicate that the session establishment request corresponds to the private network
  • the processing unit 902 is specifically configured to: determine the session The establishment request corresponds to the private network.
  • the transceiver unit 901 is specifically configured to: receive the first message from the terminal device through the first connection between the private network and the terminal device; the processing unit 902 is specifically configured to: A connection determines that the session establishment request corresponds to the private network.
  • the transceiver unit 901 is further configured to receive a first connection establishment request from the terminal device, where the first connection establishment request is used to request establishment of the first connection; the processing unit 902 is further configured to The first connection establishment request is to establish the first connection; the transceiver unit 901 is also configured to receive a second connection establishment request from the terminal device, and the second connection establishment request is used to request to establish a connection between the public network and the terminal device the second connection; the transceiver unit 901 is further configured to send the second connection establishment request to the mobility management network element of the public network.
  • the processing unit 902 is specifically configured to: generate a security parameter according to the key of the private network; the transceiver unit 901 is also configured to: send the security parameter to the terminal device and/or access network device, The security parameter is used for the terminal device and/or the access network device to generate an air interface user plane key.
  • control plane network element of the private network stores the key of the private network; or, the processing unit 902 is specifically configured to: obtain the key of the private network from an authentication, authorization and accounting AAA server key.
  • each unit of the control plane network element of the private network shown in this embodiment can refer to the relevant content of the control plane network element of the private network in the above method embodiment corresponding to Figure 4- Figure 8, and will not be detailed here. stated.
  • Each of the above units may be implemented in hardware, software or a combination of software and hardware.
  • the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 .
  • the key for establishing the security of the user plane of the air interface is different from the key for establishing the security of the control plane of the air interface, and the establishment of security of the user plane is more independent, which can improve the security of services.
  • the communications apparatus 900 can correspondingly implement the behavior and functions of the terminal device in the foregoing method embodiments.
  • the communication apparatus 900 may be a terminal device, or may be a component (such as a chip or a circuit) applied in the terminal device.
  • the transceiver unit 901 can be used to support the communication between the terminal device and other network entities, for example, support the mobility management between the terminal device and the control plane network element of the private network, the access network device, and the public network shown in Fig. 4-8 Communication between network elements, etc.
  • the processing unit 902 is used to control and manage the actions of the terminal device, for example, the processing unit 902 is used to support the terminal device to perform operations of the terminal device in FIGS. 4-8 except for sending and receiving.
  • the transceiver unit 901 is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment request corresponding to the private network.
  • the transceiving unit 901 for operations performed by the transceiving unit 901, reference may be made to the introduction in step S308 in the method shown in FIG. 8 above.
  • the processing unit 902 is configured to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the root of the private network
  • the key or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
  • the operations performed by the processing unit 902 reference may be made to the introduction of step b5 in the method shown in FIG. 6 above.
  • the transceiver unit 901 is further configured to: send a first connection establishment request to the control plane network element of the private network, where the first connection establishment request is used to request establishment of a connection between the private network and the terminal device.
  • the transceiver unit 901 is further configured to send a second connection establishment request to the mobility management network element of the public network, where the second connection establishment request is used to request to establish a connection between the public network and the terminal device.
  • the second connection among them; the processing unit 902 is further configured to generate an air interface control plane key according to the root key of the public network.
  • the transceiver unit 901 is further configured to receive security parameters from the control plane network element of the private network; the processing unit 902 is specifically configured to generate the security parameter of the air interface according to the security parameters and the key of the private network.
  • User plane key establish the user plane security of the air interface according to the user plane key of the air interface.
  • each unit of the terminal device shown in this embodiment For the operations performed by each unit of the terminal device shown in this embodiment, reference may be made to the relevant content of the terminal device in the above method embodiments corresponding to FIGS. 4-8 , which will not be described in detail here.
  • Each of the above units may be implemented in hardware, software or a combination of software and hardware.
  • the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 .
  • the connection between the private network and the terminal device can be established, and the user plane key of the air interface can be generated according to the root key of the private network; thus, the security isolation of the public network and the private network can be realized, and the private network can be improved. security of network services.
  • the communications apparatus 900 can correspondingly implement the behaviors and functions of the access network device in the foregoing method embodiments.
  • the communication apparatus 900 may be an access network device, or may be a component (such as a chip or a circuit) applied in the access network device.
  • the transceiver unit 901 can be used to support the communication between the access network equipment and other network entities, for example, support the communication between the access network equipment and the control plane network elements of the private network and the mobility management network of the public network shown in FIG. 4-FIG. Communication between elements, terminal devices, etc.
  • the processing unit 902 is used to control and manage the actions of the access network device, for example, the processing unit 902 is used to support the access network device to perform operations of the access network device in Figures 4-8 except for sending and receiving.
  • the transceiver unit 901 is configured to receive a third message from the terminal device, where the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device. connect.
  • the transceiving unit 901 for operations performed by the transceiving unit 901, reference may be made to the introduction in step S305 in the method shown in FIG. 8 above.
  • the processing unit 902 is configured to discover a control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection.
  • the transceiving unit 901 for operations performed by the transceiving unit 901, reference may be made to the introduction in step S306 in the method shown in FIG. 8 above.
  • the transceiver unit 901 is further configured to send the first connection establishment request to the control plane network element of the private network.
  • the transceiving unit 901 for operations performed by the transceiving unit 901, reference may be made to the introduction in step S306 in the method shown in FIG. 8 above.
  • the transceiver unit 901 is further configured to receive a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment request is used to request establishment of the public network and the The second connection between terminal devices; the transceiving unit 901 is further configured to send the second connection establishment request to the mobility management network element of the public network according to the fourth message.
  • the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control plane network element of the private network.
  • each unit of the access network device shown in this embodiment For the operations performed by each unit of the access network device shown in this embodiment, reference may be made to the relevant content of the access network device in the above method embodiments corresponding to FIGS. 4-8 , which will not be described in detail here.
  • Each of the above units may be implemented in hardware, software or a combination of software and hardware.
  • the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 .
  • the control plane network element of the private network can be discovered according to the third message, and the first connection establishment request for establishing a connection between the private network and the terminal device can be sent to the control plane network element of the private network. request, and then trigger the establishment of a connection between the private network and the terminal device, which can realize the security isolation of public network and private network services and improve the security of private network services.
  • the communication device 1000 may be a control plane network element of a private network, a terminal device, an access network device, or a mobility management network element of a public network, and can implement the control plane network element of a private network, Functions or steps of terminal equipment, access network equipment or mobility management network elements of the public network.
  • the communication device 1000 may be a system on a chip.
  • the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
  • the communication device 1000 includes at least one processor 1002, and the processor 1002 may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits used to control the program execution of the program of this application, for implementing or supporting the communication device 1000 realizes the functions of the control plane network element of the private network, the terminal device, the access network device or the mobility management network element of the public network in the method provided by the embodiment of the present application.
  • the processor 1002 may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits used to control the program execution of the program of this application, for implementing or supporting the communication device 1000 realizes the functions of the control plane network element of the private network, the terminal device, the access network device or the mobility management network element of the public network in the method provided by the embodiment of the present application.
  • the communication device 1000 may also include at least one memory 1001 for storing program instructions and/or data.
  • the memory 1001 is coupled to the processor 1002 .
  • the coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • Processor 1002 may cooperate with memory 1001 .
  • the processor 1002 may execute program instructions and/or data stored in the memory 1001, so that the communication device 1000 implements a corresponding method. At least one of the at least one memory may be included in the processor 1002 .
  • the communication device 1000 may also include a communication interface 1003, using any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), wired access network, etc.
  • the communication interface 1003 is used to communicate with other devices through a transmission medium, so that the devices used in the communication device 1000 can communicate with other devices.
  • the other device when the communication device 1000 is a private network element, the other device is a public network element or a private network user plane network element or an access network device or a terminal device; or, when the communication device is a public network When the other device is a private network element (private network session management network element or private network authentication network element) or a private network user plane network element or an access network device or a terminal device.
  • the processor 1002 can use the communication interface 1003 to send and receive data.
  • the communication interface 1003 may specifically be a transceiver.
  • the embodiment of the present application does not limit the specific connection medium among the communication interface 1003, the processor 1002, and the memory 1001.
  • the memory 1001, the processor 1002, and the communication interface 1003 are connected through the bus 1004.
  • the bus is represented by a thick line in FIG. 10, and the connection mode between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 10 , but it does not mean that there is only one bus or one type of bus.
  • the processor 1002 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement Or execute the methods, steps and logic block diagrams disclosed in the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software units in the processor.
  • Memory 1001 can be ROM or other types of static storage devices that can store static information and instructions, RAM or other types of dynamic storage devices that can store information and instructions, and can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), magnetic disk Storage media or other magnetic storage devices, or any other media that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, without limitation.
  • the memory may exist independently and be connected to the processor through the bus 1004 . Memory can also be integrated with the processor.
  • the memory 1001 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 1002 .
  • the processor 1002 is configured to execute computer-executed instructions stored in the memory 1001, so as to implement the method for isolating public and private network services provided in the above-mentioned embodiments of the present application.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the communication device may be a chip or a chip system
  • the chip 110 shown in FIG. 11 includes a processor 1101 and an interface 1102 .
  • the number of processors 1101 may be one or more, and the number of interfaces 1102 may be more than one.
  • Processor 1101 configured to obtain the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, the root key of the private network is related to The root key of the public network is different.
  • the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
  • the operations performed by the processor 1101 reference may be made to the introduction of step S101 in the method shown in FIG. 5 above.
  • the interface 1102 is configured to receive a first message from a terminal device, where the first message includes a session establishment request.
  • the first message includes a session establishment request.
  • the processor 1101 is further configured to determine that the session establishment request corresponds to the private network. Exemplarily, for the operations performed by the processor 1101, reference may be made to the introduction of step S103 in the method shown in FIG. 5 above.
  • the processor 1101 is further configured to establish user plane security of the air interface according to the private network key.
  • the processor 1101 reference may be made to the introduction of step S104 in the method shown in FIG. 5 above.
  • the interface 1102 is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment request corresponding to the private network.
  • the operations performed by the interface 1102 may refer to the introduction in step S308 in the method shown in FIG. 8 above.
  • the processor 1101 is configured to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the key of the private network
  • the root key or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
  • the interface 1102 is configured to receive a third message from the terminal device, where the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device.
  • the operations performed by the interface 1102 may refer to the introduction in step S305 in the method shown in FIG. 8 above.
  • the processor 1101 is configured to discover a control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection.
  • the control plane network element of the private network is used to establish the first connection.
  • the interface 1102 is further configured to send the first connection establishment request to the control plane network element of the private network.
  • the operations performed by the interface 1102 may refer to the introduction in step S306 in the method shown in FIG. 8 above.
  • the chip further includes a memory 1103, and the memory 1103 is used to store necessary program instructions and data of the terminal device.
  • the embodiment of the present application also provides a communication system.
  • the communication system includes a control plane network element of a private network, a mobility management network element of a public network, and an access network device.
  • the communication system includes a control plane network element of a private network, a mobility management network element of a public network, and an access network device for realizing the above-mentioned related functions in FIGS. 4-8 .
  • the control plane network element of the private network is used to realize the functions of the control plane network element of the private network related to the above-mentioned FIG. 4 to FIG. 8 .
  • the mobility management network element of the public network is used to realize the functions of the mobility management network element part of the public network related to FIG. 4 to FIG. 8 .
  • the access network device is used to implement the functions of the above-mentioned part of the access network device in Fig. 4-Fig. 8 .
  • An embodiment of the present application also provides a computer-readable storage medium, including instructions, which, when run on a computer, cause the computer to execute the control plane network elements of the private network and the mobility management network of the public network in Figures 4-8.
  • An embodiment of the present application also provides a computer program product, including instructions, which, when run on a computer, cause the computer to execute the control plane network element of the private network, the mobility management network element of the public network, and A method performed by an access network device or a terminal device.
  • An embodiment of the present application provides a chip system, the chip system includes a processor, and may also include a memory for implementing the control plane network element of the private network, the mobility management network element of the public network, and the access network device in the foregoing method Or the functionality of the terminal equipment.
  • the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disk, SSD)
  • the corresponding relationships shown in the tables in this application can be configured or predefined.
  • the values of the information in each table are just examples, and may be configured as other values, which are not limited in this application.
  • the corresponding relationship shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, for example, splitting, merging, and so on.
  • the names of the parameters shown in the titles of the above tables may also adopt other names understandable by the communication device, and the values or representations of the parameters may also be other values or representations understandable by the communication device.
  • other data structures can also be used, for example, arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables can be used Wait.
  • Predefinition in this application can be understood as definition, predefinition, storage, prestorage, prenegotiation, preconfiguration, curing, or prefiring.

Abstract

Disclosed in embodiments of the present application are an isolation method, apparatus and system for public and private network services. The method comprises: a control plane network element of a private network obtains a key of the private network, wherein the key of the private network is a root key of the private network or a key derived based on the root key of the private network, the root key of the private network is different from a root key of the public network, the key of the private network is used for the user plane security of an air interface, and the root key of the public network is used for the control plane security of the air interface; the control plane network element of the private network receives a first message from a terminal device, the first message comprising a session establishment request; the control plane network element of the private network determines that the session establishment request corresponds to the private network; and the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network. In the embodiments of the present application, the key for establishing the user plane security of the air interface is different from the key for establishing the control plane security of the air interface, the establishment of the user plane security is more independent, and the security of the service can be improved.

Description

一种公私网业务的隔离方法、装置及系统Method, device and system for isolating public and private network services
本申请要求于2021年5月31日提交中国国家知识产权局、申请号为202110605645.8、申请名称为“一种公私网业务的隔离方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application submitted to the State Intellectual Property Office of China on May 31, 2021, the application number is 202110605645.8, and the application name is "A method, device and system for isolating public and private network services", the entire content of which Incorporated in this application by reference.
技术领域technical field
本申请涉及通信技术领域,尤其涉及一种公私网业务的隔离方法、装置及系统。The present application relates to the technical field of communications, and in particular to a method, device and system for isolating public and private network services.
背景技术Background technique
为了提升数据业务的信息安全性,安全性要求更高的数据业务将在特定的私网中进行信息交互。如今,工业场景中不仅要求私网业务数据不出园区,还要求私网业务数据的完整性和加密性得到严格保证。In order to improve the information security of data services, data services with higher security requirements will exchange information in a specific private network. Today, industrial scenarios not only require private network business data not to leave the park, but also require the integrity and encryption of private network business data to be strictly guaranteed.
从成本角度考虑,公网和私网共享硬件是降低成本的有效手段。一般的,私网和公网会共享接入网(radio access network,RAN)节点、5G核心部分(5th-Generation Core,5GC)控制面,私网拥有独立的用户面(user plane function,UPF)网元;或者,私网和公网共享RAN节点、5GC控制面和5GC用户面,私网依赖于公网的切片或者闭合接入组(closed access group,CAG)特性与公网进行隔离。在上述方式中,由于公网和私网共享的方式,会影响私网业务的安全性。From a cost perspective, sharing hardware between public and private networks is an effective means to reduce costs. Generally, the private network and the public network will share access network (radio access network, RAN) nodes, 5G core part (5th-Generation Core, 5GC) control plane, and the private network has an independent user plane function (UPF) Network element; or, private network and public network share RAN nodes, 5GC control plane and 5GC user plane, and private network relies on public network slice or closed access group (closed access group, CAG) feature to isolate from public network. In the above method, since the public network and the private network are shared, the security of the private network service will be affected.
发明内容Contents of the invention
本申请提供一种公私网业务的隔离方法、装置及系统,用于保障私网业务的安全性。The present application provides a method, device and system for isolating public and private network services, which are used to ensure the security of private network services.
第一方面,本申请提供一种公私网业务的隔离方法,该方法包括:私网的控制面网元获取该私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全;该私网的控制面网元接收来自终端设备的第一消息,该第一消息包括会话建立请求;该私网的控制面网元确定该会话建立请求对应于该私网;该私网的控制面网元根据该私网的密钥建立该空口的用户面安全。通过这种方法,建立空口的用户面安全的密钥与建立该空口的控制面安全的密钥不同,用户面安全的建立更加独立,可以提升业务的安全性。In a first aspect, the present application provides a method for isolating public and private network services. The method includes: the control plane network element of the private network obtains the key of the private network, and the key of the private network is the root key of the private network or A key derived from the root key of the private network. The root key of the private network is different from the root key of the public network. The key of the private network is used for user plane security of the air interface. The root key of the public network The control plane security for the air interface; the control plane network element of the private network receives a first message from the terminal device, and the first message includes a session establishment request; the control plane network element of the private network determines that the session establishment request corresponds to The private network; the network element of the control plane of the private network establishes the security of the user plane of the air interface according to the key of the private network. In this way, the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
结合第一方面,在一种可能的实现方式中,该方法还包括:该私网的控制面网元接收来自该公网的移动性管理网元的该公网的非接入层NAS密钥;该私网的控制面网元使用该公网的NAS密钥解析该第一消息,以获得该会话建立请求。With reference to the first aspect, in a possible implementation manner, the method further includes: the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network ; The control plane network element of the private network uses the NAS key of the public network to parse the first message to obtain the session establishment request.
结合第一方面,在一种可能的实现方式中,该私网的控制面网元接收来自该公网的移动性管理网元的该公网的非接入层NAS密钥,包括:该私网的控制面网元接收来自该公网的移动性管理网元的第二消息,该第二消息包括第二信息和该公网的NAS密钥,该第二信息用于指示授予该私网的控制面网元使用该公网的NAS密钥的权限。With reference to the first aspect, in a possible implementation manner, the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network, including: the private network The control plane network element of the network receives a second message from the mobility management network element of the public network, the second message includes second information and the NAS key of the public network, and the second information is used to indicate that the private network is authorized to The control plane NEs have permission to use the NAS key of the public network.
结合第一方面,在一种可能的实现方式中,该第一消息包括第一信息,该第一信息用于 指示该会话建立请求对应于该私网,该私网的控制面网元确定该会话建立请求对应于该私网包括:该私网的控制面网元根据该第一信息确定该会话建立请求对应于该私网。With reference to the first aspect, in a possible implementation manner, the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the control plane network element of the private network determines that the The session establishment request corresponding to the private network includes: the control plane network element of the private network determining that the session establishment request corresponds to the private network according to the first information.
结合第一方面,在一种可能的实现方式中,该私网的控制面网元接收来自终端设备的第一消息,包括:该私网的控制面网元通过该私网和该终端设备之间的第一连接接收来自该终端设备的第一消息;该私网的控制面网元确定该会话建立请求对应于该私网,包括:该私网的控制面网元根据该第一连接确定该会话建立请求对应于该私网。With reference to the first aspect, in a possible implementation manner, receiving the first message from the terminal device by the control plane network element of the private network includes: the control plane network element of the private network transmits the message between the private network and the terminal device The first connection between receives the first message from the terminal device; the control plane network element of the private network determines that the session establishment request corresponds to the private network, including: the control plane network element of the private network determines according to the first connection The session establishment request corresponds to the private network.
结合第一方面,在一种可能的实现方式中,该方法还包括:该私网的控制面网元接收来自该终端设备的第一连接建立请求,该第一连接建立请求用于请求建立该第一连接;该私网的控制面网元根据该第一连接建立请求,建立该第一连接;该私网的控制面网元接收来自该终端设备的第二连接建立请求,该第二连接建立请求用于请求建立该公网和该终端设备之间的第二连接;该私网的控制面网元向该公网的移动性管理网元发送该第二连接建立请求。With reference to the first aspect, in a possible implementation manner, the method further includes: the control plane network element of the private network receives a first connection establishment request from the terminal device, and the first connection establishment request is used to request establishment of the The first connection; the control plane network element of the private network establishes the first connection according to the first connection establishment request; the control plane network element of the private network receives the second connection establishment request from the terminal device, and the second connection The establishment request is used to request establishment of a second connection between the public network and the terminal device; the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
结合第一方面,在一种可能的实现方式中,该私网的控制面网元根据该私网的密钥建立该空口的用户面安全,包括:该私网的控制面网元根据该私网的密钥生成安全参数;该私网的控制面网元向该终端设备和/或接入网设备发送该安全参数,该安全参数用于该终端设备和/或该接入网设备生成该空口的用户面密钥。With reference to the first aspect, in a possible implementation manner, the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, including: the control plane network element of the private network according to the private key The key generation security parameter of the private network; the control plane network element of the private network sends the security parameter to the terminal device and/or the access network device, and the security parameter is used for the terminal device and/or the access network device to generate the Air interface user plane key.
结合第一方面,在一种可能的实现方式中,该私网的控制面网元存储有该私网的密钥;或者,该私网的控制面网元获取该私网的密钥,包括:该私网的控制面网元从认证、授权和计费AAA服务器中获取该私网的密钥。With reference to the first aspect, in a possible implementation manner, the control plane network element of the private network stores the private network key; or, the control plane network element of the private network obtains the private network key, including : The control plane network element of the private network obtains the key of the private network from the authentication, authorization, and accounting AAA server.
第二方面,本申请实施例提供了又一种公私网业务的隔离方法,该方法包括:终端设备向私网的控制面网元发送第一消息,该第一消息包括对应于该私网的会话建立请求;该终端根据该私网的密钥建立空口的用户面安全;其中,该私网的根密钥与公网的根密钥不同,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的密钥用于该空口的用户面安全,该公网的根密钥用于该空口的控制面安全。通过这种方法,建立空口的用户面安全的密钥与建立该空口的控制面安全的密钥不同,用户面安全的建立更加独立,可以提升业务的安全性。In the second aspect, the embodiment of the present application provides another method for isolating public and private network services. The method includes: the terminal device sends a first message to the control plane network element of the private network, and the first message includes information corresponding to the private network. Session establishment request; the terminal establishes user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the root key of the private network The key or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface. In this way, the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
结合第二方面,在一种可能的实现方式中,该方法还包括:该终端设备向该私网的控制面网元发送第一连接建立请求,该第一连接建立请求用于请求建立该私网和该终端设备之间的第一连接,该第一连接用于传输该第一消息;其中,该终端设备和该公网之间存在第二连接,该第二连接用于传输该公网的信令。With reference to the second aspect, in a possible implementation manner, the method further includes: the terminal device sends a first connection establishment request to a control plane network element of the private network, and the first connection establishment request is used to request establishment of the private network. network and the terminal device, the first connection is used to transmit the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used to transmit the public network signaling.
结合第二方面,在一种可能的实现方式中,该方法还包括:该终端设备向该公网的移动性管理网元发送第二连接建立请求,该第二连接建立请求用于请求建立该公网和该终端设备之间的第二连接;该终端根据该公网的根密钥生成该空口的控制面密钥。With reference to the second aspect, in a possible implementation manner, the method further includes: the terminal device sends a second connection establishment request to a mobility management network element of the public network, where the second connection establishment request is used to request establishment of the A second connection between the public network and the terminal device; the terminal generates the control plane key of the air interface according to the root key of the public network.
结合第二方面,在一种可能的实现方式中,该方法还包括:该终端设备接收来自该私网的控制面网元的安全参数;该终端根据该私网的密钥建立空口的用户面安全包括:该终端设备根据该安全参数和该私网的密钥生成所述空口的用户面密钥;该终端设备根据该空口的用户面密钥建立该空口的用户面安全。With reference to the second aspect, in a possible implementation manner, the method further includes: the terminal device receiving security parameters from the control plane network element of the private network; the terminal establishing an air interface user plane The security includes: the terminal device generates the user plane key of the air interface according to the security parameter and the private network key; the terminal device establishes the user plane security of the air interface according to the user plane key of the air interface.
第三方面,本申请提供又一种公私网业务的隔离方法,该方法包括:接入网设备接收来自终端设备的第三消息,该第三消息包括第一连接建立请求,该第一连接建立请求用于请求建立私网和该终端设备之间的第一连接;该接入网设备根据该第三消息发现私网的控制面网元,该私网的控制面网元用于建立该第一连接;该接入网设备向该私网的控制面网元发送该第一连接建立请求。通过这种方法,接入网设备可以根据第三消息发现私网的控制面网元, 并向该私网的控制面网元发送用于请求建立私网和该终端设备之间的连接的第一连接建立请求,进而触发建立私网与终端设备之间的连接,可以实现公网和私网业务安全隔离,提升私网业务的安全性。In a third aspect, the present application provides yet another method for isolating public and private network services. The method includes: the access network device receives a third message from the terminal device, the third message includes a first connection establishment request, and the first connection establishment request The request is used to request establishment of the first connection between the private network and the terminal device; the access network device discovers the control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection A connection: the access network device sends the first connection establishment request to the control plane network element of the private network. Through this method, the access network device can discover the control plane network element of the private network according to the third message, and send the first message for requesting establishment of a connection between the private network and the terminal device to the control plane network element of the private network. A connection establishment request triggers the establishment of a connection between the private network and the terminal device, which can realize the security isolation of public network and private network services and improve the security of private network services.
结合第三方面,在一种可能的实现方式中,该方法还包括:该接入网设备接收来自该终端设备的第四消息,该第四消息包括第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;该接入网设备根据该第四消息向该公网的移动性管理网元发送该第二连接建立请求。With reference to the third aspect, in a possible implementation manner, the method further includes: the access network device receiving a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment The request is used to request establishment of a second connection between the public network and the terminal device; the access network device sends the second connection establishment request to the mobility management network element of the public network according to the fourth message.
结合第三方面,在一种可能的实现方式中,该第三消息包括该私网的控制面网元的路由信息,该私网的控制面网元的路由信息用于发现该私网的控制面网元。With reference to the third aspect, in a possible implementation manner, the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control network element.
第四方面,本申请实施例提供了一种公私网业务的隔离方法,该方法包括:公网的移动性管理网元获取公网的非接入层NAS密钥;该公网的移动性管理网元向私网的控制面网元发送该公网的NAS密钥。通过这种方式,私网的控制面网元可以获取到公网的NAS密钥,从而可以对接收到的第一消息进行解析。In a fourth aspect, the embodiment of the present application provides a method for isolating public and private network services. The method includes: a mobility management network element of the public network obtains a non-access stratum NAS key of the public network; The network element sends the NAS key of the public network to the control plane network element of the private network. In this way, the control plane network element of the private network can obtain the NAS key of the public network, so as to analyze the received first message.
结合第四方面,在一种可能的实现方式中,该公网的移动性管理网元向私网的控制面网元发送该公网的NAS密钥,包括:该公网的移动性管理网元向该私网的控制面网元发送第二消息,该第二消息包括第二信息和该公网的NAS密钥,该第二信息用于指示授予该私网的控制面网元使用该公网的NAS密钥的权限。With reference to the fourth aspect, in a possible implementation manner, the mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network, including: the mobility management network element of the public network The element sends a second message to the control plane network element of the private network, the second message includes second information and the NAS key of the public network, and the second information is used to indicate that the control plane network element of the private network is authorized to use the The permission of the NAS key on the public network.
第五方面,本申请提供了一种公私网业务的隔离方法,该方法包括:私网的控制面网元获取私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全;该私网的控制面网元根据该私网的密钥建立该空口的用户面安全。通过这种方法,建立空口的用户面安全的密钥与建立该空口的控制面安全的密钥不同,用户面安全的建立更加独立,可以提升业务的安全性。In a fifth aspect, the present application provides a method for isolating public and private network services. The method includes: the control plane network element of the private network obtains a key of the private network, and the key of the private network is the root key of the private network or A key derived from the root key of the private network. The root key of the private network is different from the root key of the public network. The key of the private network is used for user plane security of the air interface. The root key of the public network It is used for the control plane security of the air interface; the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network. In this way, the user plane security key for the air interface is different from the control plane security key for the air interface, and the user plane security is established more independently, which can improve service security.
结合第五方面,在一种可能的实现方式中,在该私网的控制面网元根据该私网的密钥建立该空口的用户面安全之前,该方法还包括:该私网的控制面网元接收来自终端设备的第一消息,该第一消息包括会话建立请求;该私网的控制面网元确定该会话建立请求对应于该私网。With reference to the fifth aspect, in a possible implementation manner, before the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, the method further includes: the control plane network element of the private network A network element receives a first message from a terminal device, where the first message includes a session establishment request; a control plane network element of the private network determines that the session establishment request corresponds to the private network.
结合第五方面,在一种可能的实现方式中,该方法还包括:该私网的控制面网元接收来自公网的移动性管理网元的公网的非接入层NAS密钥;该私网的控制面网元使用该公网的NAS密钥解析该第一消息,以获得该会话建立请求。With reference to the fifth aspect, in a possible implementation manner, the method further includes: the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network; The control plane network element of the private network uses the NAS key of the public network to parse the first message to obtain the session establishment request.
结合第五方面,在一种可能的实现方式中,该私网的控制面网元接收该公网的NAS密钥包括:该私网的控制面网元接收来自该公网的移动性管理网元的第二消息,该第二消息包括第二信息和该公网的NAS密钥,该第二信息用于指示授予该私网的控制面网元使用该公网的NAS密钥的权限。With reference to the fifth aspect, in a possible implementation, the receiving the NAS key of the public network by the control plane network element of the private network includes: receiving the mobility management network key from the public network by the control plane network element of the private network. The second message of the element, the second message includes the second information and the NAS key of the public network, and the second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
结合第五方面,在一种可能的实现方式中,在该私网的控制面网元根据该私网的密钥建立该空口的用户面安全之前,该方法还包括:该私网的控制面网元通过该私网和终端设备之间的第一连接接收来自该终端设备的第一消息,该第一消息包括会话建立请求。With reference to the fifth aspect, in a possible implementation manner, before the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, the method further includes: the control plane network element of the private network The network element receives a first message from the terminal device through the first connection between the private network and the terminal device, where the first message includes a session establishment request.
结合第五方面,在一种可能的实现方式中,在该私网的控制面网元根据该私网的密钥建立该空口的用户面安全之前,该方法还包括:该私网的控制面网元根据该第一连接确定该会话建立请求对应于该私网。With reference to the fifth aspect, in a possible implementation manner, before the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, the method further includes: the control plane network element of the private network The network element determines according to the first connection that the session establishment request corresponds to the private network.
结合第五方面,在一种可能的实现方式中,该方法还包括:该私网的控制面网元接收来 自终端设备的第一连接建立请求,该第一连接建立请求用于请求建立该第一连接;该私网的控制面网元根据该第一连接建立请求,建立该第一连接;该私网的控制面网元接收来自该终端设备的第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;该私网的控制面网元向该公网的移动性管理网元发送该第二连接建立请求。With reference to the fifth aspect, in a possible implementation manner, the method further includes: the control plane network element of the private network receives a first connection establishment request from the terminal device, and the first connection establishment request is used to request establishment of the second connection establishment request. A connection; the control plane network element of the private network establishes the first connection according to the first connection establishment request; the control plane network element of the private network receives a second connection establishment request from the terminal device, and the second connection establishment The request is used to request establishment of a second connection between the public network and the terminal device; the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
结合第五方面,在一种可能的实现方式中,该第一消息包括第一信息,该第一信息用于指示该会话建立请求对应于该私网,该私网的控制面网元确定该会话建立请求对应于该私网包括:该私网的控制面网元根据该第一信息确定该会话建立请求对应于该私网。With reference to the fifth aspect, in a possible implementation manner, the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the control plane network element of the private network determines that the The session establishment request corresponding to the private network includes: the control plane network element of the private network determining that the session establishment request corresponds to the private network according to the first information.
结合第五方面,在一种可能的实现方式中,该私网的控制面网元根据该私网的密钥建立该空口的用户面安全,包括:该私网的控制面网元根据该私网的密钥生成安全参数;该私网的控制面网元向终端设备和/或接入网设备发送该安全参数,该安全参数用于该终端设备和/或该接入网设备生成该空口的用户面密钥。With reference to the fifth aspect, in a possible implementation manner, the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, including: the control plane network element of the private network according to the private key The key generation security parameter of the private network; the control plane network element of the private network sends the security parameter to the terminal device and/or the access network device, and the security parameter is used for the terminal device and/or the access network device to generate the air interface user plane key.
结合第五方面,在一种可能的实现方式中,该私网的控制面网元存储有该私网的密钥;或者,该私网的控制面网元获取私网的密钥,包括:该私网的控制面网元从认证、授权和计费AAA服务器中获取该私网的密钥。With reference to the fifth aspect, in a possible implementation manner, the private network control plane network element stores the private network key; or, the private network control plane network element obtains the private network key, including: The control plane network element of the private network obtains the key of the private network from the authentication, authorization and accounting AAA server.
第六方面,本申请提供了一种私网的控制面网元,该私网的控制面网元具有实现上述第一方面方法实施例中的行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在一种可能的设计中,该私网的控制面网元包括处理单元和收发单元,其中:该处理单元,用于获取该私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全;该收发单元,用于接收来自终端设备的第一消息,该第一消息包括会话建立请求;该处理单元,还用于确定该会话建立请求对应于该私网;该处理单元,还用于根据该私网的密钥建立该空口的用户面安全。In a sixth aspect, the present application provides a control plane network element of a private network, and the control plane network element of a private network has a function of implementing the behavior in the method embodiment of the first aspect above. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the control plane network element of the private network includes a processing unit and a transceiver unit, wherein: the processing unit is used to obtain the key of the private network, and the key of the private network is the key of the private network The root key or a key derived based on the root key of the private network. The root key of the private network is different from the root key of the public network. The key of the private network is used for the security of the user plane of the air interface. The root key is used for the control plane security of the air interface; the transceiver unit is used to receive the first message from the terminal device, and the first message includes a session establishment request; the processing unit is also used to determine that the session establishment request corresponds to on the private network; the processing unit is also used to establish the user plane security of the air interface according to the key of the private network.
结合第六方面,在一种可能的实现方式中,该收发单元还用于:接收来自该公网的移动性管理网元的该公网的非接入层NAS密钥;使用该公网的NAS密钥解析该第一消息,以获得该会话建立请求。With reference to the sixth aspect, in a possible implementation manner, the transceiver unit is further configured to: receive a non-access stratum NAS key of the public network from a mobility management network element of the public network; The NAS key parses the first message to obtain the session establishment request.
结合第六方面,在一种可能的实现方式中,该收发单元具体用于:接收来自该公网的移动性管理网元的第二消息,该第二消息包括第二信息和该公网的NAS密钥,该第二信息用于指示授予该私网的控制面网元使用该公网的NAS密钥的权限。With reference to the sixth aspect, in a possible implementation manner, the transceiver unit is specifically configured to: receive a second message from a mobility management network element of the public network, where the second message includes the second information and the A NAS key, the second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
结合第六方面,在一种可能的实现方式中,该第一消息包括第一信息,该第一信息用于指示该会话建立请求对应于该私网,该处理单元具体用于:根据该第一信息确定该会话建立请求对应于该私网。With reference to the sixth aspect, in a possible implementation manner, the first message includes first information, where the first information is used to indicate that the session establishment request corresponds to the private network, and the processing unit is specifically configured to: according to the first A message confirms that the session establishment request corresponds to the private network.
结合第六方面,在一种可能的实现方式中,该收发单元具体用于:通过该私网和该终端设备之间的第一连接接收来自该终端设备的第一消息;该处理单元具体用于:根据该第一连接确定该会话建立请求对应于该私网。With reference to the sixth aspect, in a possible implementation manner, the transceiver unit is specifically configured to: receive the first message from the terminal device through the first connection between the private network and the terminal device; the processing unit specifically uses In: determining according to the first connection that the session establishment request corresponds to the private network.
结合第六方面,在一种可能的实现方式中,该收发单元,还用于接收来自终端设备的第一连接建立请求,该第一连接建立请求用于请求建立该第一连接;该处理单元,还用于根据该第一连接建立请求,建立该第一连接;该收发单元,还用于接收来自该终端设备的第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;该收发单元,还用于向该公网的移动性管理网元发送该第二连接建立请求。With reference to the sixth aspect, in a possible implementation manner, the transceiver unit is further configured to receive a first connection establishment request from a terminal device, where the first connection establishment request is used to request establishment of the first connection; the processing unit is further configured to establish the first connection according to the first connection establishment request; the transceiver unit is further configured to receive a second connection establishment request from the terminal device, and the second connection establishment request is used to request establishment of the public network and The second connection between terminal devices; the transceiver unit is further configured to send the second connection establishment request to a mobility management network element of the public network.
结合第六方面,在一种可能的实现方式中,该处理单元具体用于:根据该私网的密钥生 成安全参数;该收发单元还用于:向该终端设备和/或接入网设备发送该安全参数,该安全参数用于该终端设备和/或该接入网设备生成该空口的用户面密钥。With reference to the sixth aspect, in a possible implementation manner, the processing unit is specifically configured to: generate a security parameter according to the key of the private network; the transceiver unit is also configured to: send the terminal device and/or the access network device The security parameter is sent, and the security parameter is used for the terminal device and/or the access network device to generate the user plane key of the air interface.
结合第六方面,在一种可能的实现方式中,该私网的控制面网元存储有该私网的密钥;或者,该处理单元具体用于:从认证、授权和计费AAA服务器中获取该私网的密钥。With reference to the sixth aspect, in a possible implementation manner, the control plane network element of the private network stores the key of the private network; or, the processing unit is specifically configured to: from the authentication, authorization and accounting AAA server Obtain the key of the private network.
关于第六方面或第六方面的各种可能的设计所带来的技术效果,可以参考对第一方面或第一方面的各种可能的设计的技术效果的介绍。Regarding the sixth aspect or the technical effects brought about by various possible designs of the sixth aspect, reference may be made to the introduction of the first aspect or the technical effects of various possible designs of the first aspect.
第七方面,本申请实施例提供了一种终端设备,该终端设备具有实现上述第二方面方法实施例中的行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在一种可能的设计中,该终端设备包括收发单元和处理单元:该收发单元,用于向私网的控制面网元发送第一消息,该第一消息包括对应于该私网的会话建立请求;该处理单元,用于根据该私网的密钥建立空口的用户面安全;其中,该私网的根密钥与公网的根密钥不同,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的密钥用于该空口的用户面安全,该公网的根密钥用于该空口的控制面安全。In a seventh aspect, an embodiment of the present application provides a terminal device, where the terminal device has a function of implementing the behavior in the method embodiment of the second aspect above. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the terminal device includes a transceiver unit and a processing unit: the transceiver unit is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment corresponding to the private network Request; the processing unit is used to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the private network The root key of the private network or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface.
结合第七方面,在一种可能的实现方式中,该收发单元还用于:向该私网的控制面网元发送第一连接建立请求,该第一连接建立请求用于请求建立该私网和该终端设备之间的第一连接,该第一连接用于传输该第一消息;其中,该终端设备和该公网之间存在第二连接,该第二连接用于传输该公网的信令。With reference to the seventh aspect, in a possible implementation manner, the transceiver unit is further configured to: send a first connection establishment request to a control plane network element of the private network, where the first connection establishment request is used to request establishment of the private network A first connection with the terminal device, where the first connection is used to transmit the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used to transmit the information of the public network signaling.
结合第七方面,在一种可能的实现方式中,该收发单元还用于向该公网的移动性管理网元发送第二连接建立请求,该第二连接建立请求用于请求建立该公网和该终端设备之间的第二连接;该处理单元,还用于根据该公网的根密钥生成该空口的控制面密钥。With reference to the seventh aspect, in a possible implementation manner, the transceiver unit is further configured to send a second connection establishment request to a mobility management network element of the public network, where the second connection establishment request is used to request establishment of the public network The second connection with the terminal device; the processing unit is further configured to generate the control plane key of the air interface according to the root key of the public network.
结合第七方面,在一种可能的实现方式中,该收发单元还用于接收来自该私网的控制面网元的安全参数;该处理单元,具体用于根据该安全参数和该私网的密钥生成所述空口的用户面密钥;根据该空口的用户面密钥建立该空口的用户面安全。With reference to the seventh aspect, in a possible implementation manner, the transceiver unit is further configured to receive security parameters from the control plane network element of the private network; the processing unit is specifically configured to The key generates the user plane key of the air interface; the user plane security of the air interface is established according to the user plane key of the air interface.
关于第七方面或第七方面的各种可能的设计所带来的技术效果,可以参考对第二方面或第二方面的各种可能的实施方式的技术效果的介绍。Regarding the seventh aspect or the technical effects brought about by various possible designs of the seventh aspect, reference may be made to the introduction of the second aspect or the technical effects of various possible implementation manners of the second aspect.
第八方面,本申请实施例提供了一种接入网设备,该接入网设备具有实现上述第一方面方法实施例中的行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在一种可能的设计中,该接入网设备包括收发单元和处理单元,其中:该收发单元,用于接收来自终端设备的第三消息,该第三消息包括第一连接建立请求,该第一连接建立请求用于请求建立私网和该终端设备之间的第一连接;该处理单元,用于根据该第三消息发现私网的控制面网元,该私网的控制面网元用于建立该第一连接;该收发单元,还用于向该私网的控制面网元发送该第一连接建立请求。In an eighth aspect, the embodiment of the present application provides an access network device, and the access network device has a function of implementing the behavior in the method embodiment of the first aspect above. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the access network device includes a transceiver unit and a processing unit, where: the transceiver unit is configured to receive a third message from the terminal device, the third message includes a first connection establishment request, and the first A connection establishment request is used to request to establish a first connection between the private network and the terminal device; the processing unit is used to discover the control plane network element of the private network according to the third message, and the control plane network element of the private network uses for establishing the first connection; the transceiving unit is further configured to send the first connection establishment request to the control plane network element of the private network.
结合第八方面,在一种可能的实现方式中,该收发单元还用于接收来自该终端设备的第四消息,该第四消息包括第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;该收发单元还用于根据该第四消息向该公网的移动性管理网元发送该第二连接建立请求。With reference to the eighth aspect, in a possible implementation manner, the transceiver unit is further configured to receive a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment request is used to request Establishing a second connection between the public network and the terminal device; the transceiver unit is further configured to send the second connection establishment request to a mobility management network element of the public network according to the fourth message.
结合第八方面,在一种可能的实现方式中,该第三消息包括该私网的控制面网元的路由信息,该私网的控制面网元的路由信息用于发现该私网的控制面网元。With reference to the eighth aspect, in a possible implementation manner, the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control network element.
关于第八方面或第八方面的各种可能的设计所带来的技术效果,可以参考对第三方面或 第三方面的各种可能的实施方式的技术效果的介绍。For the technical effects brought about by the eighth aspect or various possible designs of the eighth aspect, reference may be made to the introduction of the technical effects of the third aspect or various possible implementation manners of the third aspect.
第九方面,本申请提供了一种公网的移动性管理网元,该公网的移动性管理网元具有实现上述第四方面方法实施例中的行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在一种可能的设计中,该公网的移动性管理网元包括收发单元和处理单元,其中:该处理单元,用于获取公网的非接入层NAS密钥;该收发单元,用于向私网的控制面网元发送该公网的NAS密钥。这些模块可以执行上述第四方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不再赘述。In a ninth aspect, the present application provides a mobility management network element of a public network, where the mobility management network element of the public network has a function of implementing the behavior in the method embodiment of the fourth aspect above. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the mobility management network element of the public network includes a transceiver unit and a processing unit, wherein: the processing unit is used to obtain a non-access stratum NAS key of the public network; the transceiver unit is used to Send the NAS key of the public network to the control plane network element of the private network. These modules can perform the corresponding functions in the method examples of the fourth aspect above. For details, refer to the detailed description in the method examples, and details will not be repeated here.
关于第九方面或第九方面的各种可能的设计所带来的技术效果,可以参考对第四方面或第四方面的各种可能的实施方式的技术效果的介绍。Regarding the ninth aspect or the technical effects brought about by various possible designs of the ninth aspect, reference may be made to the introduction of the fourth aspect or the technical effects of various possible implementation manners of the fourth aspect.
第十方面,本申请提供了一种私网的控制面网元,该私网的控制面网元具有实现上述第五方面方法实施例中的行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在一种可能的设计中,该私网的控制面网元包括收发单元和处理单元,其中:该处理单元,用于获取私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全;该处理单元,还用于根据该私网的密钥建立该空口的用户面安全。这些模块可以执行上述第五方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不再赘述。In a tenth aspect, the present application provides a control plane network element of a private network, and the control plane network element of a private network has a function of implementing the behavior in the method embodiment of the fifth aspect above. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions. In a possible design, the control plane network element of the private network includes a transceiver unit and a processing unit, wherein: the processing unit is used to obtain the key of the private network, and the key of the private network is the root of the private network key or a key derived based on the root key of the private network. The root key of the private network is different from the root key of the public network. The key of the private network is used for the security of the user plane of the air interface. The root key is used for the control plane security of the air interface; the processing unit is also used for establishing the user plane security of the air interface according to the private network key. These modules can perform the corresponding functions in the method examples of the fifth aspect above. For details, refer to the detailed description in the method examples, which will not be repeated here.
关于第十方面或第十方面的各种可能的设计所带来的技术效果,可以参考对第五方面或第五方面的各种可能的实施方式的技术效果的介绍。Regarding the technical effects brought about by the tenth aspect or various possible designs of the tenth aspect, reference may be made to the introduction of the fifth aspect or the technical effects of various possible implementation manners of the fifth aspect.
第十一方面,本申请提供了一种通信装置。该通信装置可以为上述方法设计中的私网的控制面网元或者设置在私网的控制面网元中的芯片。该通信装置包括通信接口以及处理器,可选地,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行该计算机程序或指令时,使通信装置执行上述方法实施例中由私网的控制面网元所执行的方法。In an eleventh aspect, the present application provides a communication device. The communication device may be the control plane network element of the private network in the design of the above method or a chip arranged in the control plane network element of the private network. The communication device includes a communication interface and a processor, and optionally, a memory. Wherein, the memory is used to store computer programs or instructions, and the processor is coupled with the memory and the communication interface. When the processor executes the computer programs or instructions, the communication device executes the method described above by the control plane network element of the private network. method of execution.
第十二方面,提供了一种通信装置。该通信装置可以为上述方法设计中的接入网设备或者设置在接入网设备中的芯片。该通信装置包括通信接口以及处理器,可选地,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行该计算机程序或指令时,使通信装置执行上述方法实施例中由接入网设备所执行的方法。In a twelfth aspect, a communication device is provided. The communication device may be the access network device designed in the above method or a chip set in the access network device. The communication device includes a communication interface and a processor, and optionally, a memory. Wherein, the memory is used to store computer programs or instructions, and the processor is coupled to the memory and the communication interface, and when the processor executes the computer programs or instructions, the communication device executes the method performed by the access network device in the above method embodiment .
第十三方面,提供了一种通信装置。该通信装置可以为上述方法设计中的终端设备或者设置在终端设备的芯片。该通信装置包括通信接口以及处理器,可选地,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行该计算机程序或指令时,使通信装置执行上述方法实施例中由终端设备所执行的方法。In a thirteenth aspect, a communication device is provided. The communication device may be the terminal device designed in the above method or a chip provided in the terminal device. The communication device includes a communication interface and a processor, and optionally, a memory. Wherein, the memory is used to store computer programs or instructions, and the processor is coupled to the memory and the communication interface. When the processor executes the computer programs or instructions, the communication device executes the method performed by the terminal device in the above method embodiments.
第十四方面,提供了一种通信装置。该通信装置可以为上述方法设计中的公网的移动性管理网元或者设置在公网的移动性管理网元的芯片。该通信装置包括通信接口以及处理器,可选地,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行该计算机程序或指令时,使通信装置执行上述方法实施例中由公网的移动性管理网元所执行的方法。In a fourteenth aspect, a communication device is provided. The communication device may be the mobility management network element of the public network in the design of the above method or a chip set on the mobility management network element of the public network. The communication device includes a communication interface and a processor, and optionally, a memory. Wherein, the memory is used to store computer programs or instructions, and the processor is coupled to the memory and the communication interface. When the processor executes the computer programs or instructions, the communication device executes the mobility management network element of the public network in the above method embodiments. The method executed.
其中,第十方面-第十四方面的通信装置中的通信接口可以是通信装置中的收发器,例如通过该通信装置中的天线、馈线和编解码器等实现,或者,如果通信装置为设置在通信装置 中的芯片,则通信接口可以是该芯片的输入/输出接口,例如输入/输出管脚等。Wherein, the communication interface in the communication device of the tenth aspect to the fourteenth aspect may be a transceiver in the communication device, for example, realized by an antenna, a feeder, and a codec in the communication device, or, if the communication device is configured For a chip in a communication device, the communication interface may be an input/output interface of the chip, such as an input/output pin or the like.
第十五方面,提供了一种通信系统,该通信系统包括私网的控制面网元和接入网设备。私网的控制面网元用于执行第一方面或者第一方面任一设计该的方法,或者用于执行第五方面或者第五方面任一设计该的方法。接入网设备用于执行第三方面或者第三方面任一设计该的方法。在一种可能的设计中,该系统还包括公网的移动性管理网元,该公网的移动性管理网元用于执行第四方面或者第四方面任一设计该的方法。In a fifteenth aspect, a communication system is provided, and the communication system includes a control plane network element of a private network and an access network device. The control plane network element of the private network is used to execute the first aspect or any method designed in the first aspect, or to execute the fifth aspect or any method designed in the fifth aspect. The access network device is configured to execute the third aspect or any method designed in the third aspect. In a possible design, the system further includes a mobility management network element of the public network, and the mobility management network element of the public network is used to execute the fourth aspect or any one of the methods designed in the fourth aspect.
第十六方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述各方面的方法中私网的控制面网元或接入网设备或公网的移动性管理网元或终端设备的功能。在一种可能的设计中,该芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。In a sixteenth aspect, the present application provides a chip system, the chip system includes a processor, used to implement the control plane network element of the private network or the access network device or the mobility management network of the public network in the methods of the above aspects element or end device functionality. In a possible design, the chip system further includes a memory for storing program instructions and/or data. The system-on-a-chip may consist of chips, or may include chips and other discrete devices.
第十七方面,提供了一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码并运行时,使得上述各方面中由私网的控制面网元或接入网设备或公网的移动性管理网元或终端设备执行的方法被执行。In a seventeenth aspect, a computer program product is provided, and the computer program product includes: computer program code, when the computer program code runs in parallel, the network element of the control plane of the private network or the access network device in the above aspects can Or a method executed by a mobility management network element of a public network or a terminal device is executed.
第十八方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述各方面中由私网的控制面网元或接入网设备或公网的移动性管理网元或终端设备执行的方法。In an eighteenth aspect, the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium. When the computer program is run, the control plane network element of the private network or the A method performed by an access network device or a mobility management network element of a public network or a terminal device.
在本申请实施例中,建立空口的用户面安全的密钥与建立该空口的控制面安全的密钥不同,用户面安全的建立更加独立,可以提升业务的安全性。In the embodiment of the present application, the key used to establish the security of the user plane of the air interface is different from the key used to establish the security of the control plane of the air interface. The establishment of security of the user plane is more independent, which can improve the security of services.
附图说明Description of drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍。In order to more clearly illustrate the technical solutions in the embodiments of the present application or the prior art, the following briefly introduces the drawings that are required in the description of the embodiments or the prior art.
图1是本申请实施例提供的一种5G系统的网络架构的示意图;FIG. 1 is a schematic diagram of a network architecture of a 5G system provided in an embodiment of the present application;
图2是本申请实施例提供的又一种5G系统的网络架构的示意图;FIG. 2 is a schematic diagram of another 5G system network architecture provided by an embodiment of the present application;
图3是本申请实施例提供的一种5G系统中non-3GPP的网络架构的示意图;FIG. 3 is a schematic diagram of a non-3GPP network architecture in a 5G system provided by an embodiment of the present application;
图4是本申请实施例提供的一种通信系统的架构示意图;FIG. 4 is a schematic structural diagram of a communication system provided by an embodiment of the present application;
图5是本申请实施例提供的一种公私网业务的隔离方法的流程图;FIG. 5 is a flow chart of a method for isolating public and private network services provided by an embodiment of the present application;
图6是本申请实施例提供的一种建立该空口的用户面安全以及控制面安全的流程示意图;FIG. 6 is a schematic flow diagram of establishing user plane security and control plane security of the air interface provided by an embodiment of the present application;
图7是本申请实施例提供的又一种公私网业务的隔离方法的流程图;FIG. 7 is a flow chart of another method for isolating public and private network services provided by an embodiment of the present application;
图8是本申请实施例提供的又一种公私网业务的隔离方法的流程图;FIG. 8 is a flow chart of another method for isolating public and private network services provided by an embodiment of the present application;
图9是本申请实施例提供的一种通信装置900的结构示意图;FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application;
图10是本申请实施例提供的又一种通信装置1000的结构示意图;FIG. 10 is a schematic structural diagram of another communication device 1000 provided by an embodiment of the present application;
图11是本申请实施例提供的一种芯片的结构示意图。FIG. 11 is a schematic structural diagram of a chip provided by an embodiment of the present application.
具体实施方式Detailed ways
本申请实施例可以应用于第四代移动通信技术(the 4th Generation mobile communication technology,4G)网络架构,例如长期演进(long term evolution,LTE)系统,也可以应用于第五代移动通信技术(the 5th Generation mobile communication technology,5G)网络架构中,例如NR系统,或者5G网络架构之后的第六代移动通信技术网络架构或其他类似的通信系统,具体的不做限制。The embodiments of the present application can be applied to the network architecture of the 4th Generation mobile communication technology (4G), such as the long term evolution (Long term evolution, LTE) system, and can also be applied to the 5th generation mobile communication technology (the In the 5th Generation mobile communication technology (5G) network architecture, such as the NR system, or the sixth generation mobile communication technology network architecture after the 5G network architecture or other similar communication systems, there is no specific limitation.
下面对本申请实施例中的技术方案进行更详细地描述。The technical solutions in the embodiments of the present application are described in more detail below.
为了更好地理解本申请实施例提供的技术方案,以下以5G通信系统为例进行介绍。首先对本申请实施例涉及的技术术语进行介绍。In order to better understand the technical solutions provided by the embodiments of the present application, a 5G communication system is used as an example for introduction below. Firstly, the technical terms involved in the embodiments of the present application are introduced.
1、第五代通信(5 th generation,5G)系统的网络架构 1. The network architecture of the fifth generation communication (5 th generation, 5G) system
参见图1,是本申请实施例提供的一种5G系统的网络架构的示意图。该网络架构包括用户设备(user equipment,UE)、接入网(access network,AN)设备、核心网网元、数据网络(data network,DN)。Referring to FIG. 1 , it is a schematic diagram of a network architecture of a 5G system provided by an embodiment of the present application. The network architecture includes user equipment (user equipment, UE), access network (access network, AN) equipment, core network elements, and data network (data network, DN).
终端设备,包括向用户提供语音和/或数据连通性的设备,具体的,包括向用户提供语音的设备,或包括向用户提供数据连通性的设备,或包括向用户提供语音和数据连通性的设备。例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设备可以经RAN与核心网进行通信,与RAN交换语音或数据,或与RAN交互语音和数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、车到一切(vehicle to everything,V2X)终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、签约单元(subscriber unit)、签约站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。Terminal equipment, including equipment that provides voice and/or data connectivity to users, specifically, equipment that provides voice to users, or equipment that provides data connectivity to users, or equipment that provides voice and data connectivity to users equipment. Examples may include a handheld device with wireless connectivity, or a processing device connected to a wireless modem. The terminal device can communicate with the core network via the RAN, exchange voice or data with the RAN, or exchange voice and data with the RAN. The terminal equipment may include user equipment (user equipment, UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (vehicle to everything, V2X) terminal equipment , machine-to-machine/machine-type communications (machine-to-machine/machine-type communications, M2M/MTC) terminal equipment, Internet of things (internet of things, IoT) terminal equipment, subscriber unit, subscriber station station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc. For example, it may include mobile phones (or "cellular" phones), computers with mobile terminal equipment, portable, pocket, hand-held, computer built-in mobile devices, and the like. For example, personal communication service (PCS) telephone, cordless telephone, session initiation protocol (session initiation protocol, SIP) telephone, wireless local loop (wireless local loop, WLL) station, personal digital assistant (personal digital assistant, PDA), and other equipment. Also includes constrained devices, such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities, etc. For example, it includes barcodes, radio frequency identification (radio frequency identification, RFID), sensors, global positioning system (global positioning system, GPS), laser scanners and other information sensing devices.
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。As an example but not a limitation, in this embodiment of the present application, the terminal device may also be a wearable device. Wearable devices can also be called wearable smart devices or smart wearable devices, etc., which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait. A wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction. Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。The various terminal devices described above, if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be considered as vehicle-mounted terminal devices. ).
本申请实施例中,终端设备还可以包括中继(relay)。或者理解为,能够与基站进行数据通信的都可以看作终端设备。In this embodiment of the present application, the terminal device may further include a relay (relay). Or it can be understood that all devices capable of performing data communication with the base station can be regarded as terminal devices.
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片或芯片系统,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。本申请实施例提供的技术方案中,以用于实现终端的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。In this embodiment of the present application, the device for realizing the function of the terminal device may be the terminal device, or may be a device capable of supporting the terminal device to realize the function, such as a chip or a chip system, and the device may be installed in the terminal device. In the embodiment of the present application, the system-on-a-chip may be composed of chips, or may include chips and other discrete devices. In the technical solutions provided in the embodiments of the present application, the technical solutions provided in the embodiments of the present application are described by taking the terminal equipment as an example for realizing the terminal functions.
AN设备,也可以是无线接入网(radio access network,RAN)设备。接入网设备可以是一种部署在无线接入网络中能够和终端设备进行无线通信的设备。它主要负责空口侧的无线资源管理、服务质量(quality of service,QoS)管理、数据压缩和加密等功能。接入网设备可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同,例如,在第五代(5th generation,5G)系统中,称为gNB;在LTE系统中,称为演进的节点B(evolved NodeB,eNB或者eNodeB);在第三代(3rd generation,3G)系统中,称为节点B(Node B)等。示例性地,本申请实施例涉及到的接入网设备可以是5G中的基站或长期演进(long term evolution,LTE)中的基站,其中,5G中的基站还可以称为发送接收点(transmission reception point,TRP)或下一代基站节点(next generation Node B,gNB)。The AN device may also be a radio access network (radio access network, RAN) device. The access network device may be a device deployed in the wireless access network and capable of performing wireless communication with the terminal device. It is mainly responsible for wireless resource management, quality of service (QoS) management, data compression and encryption on the air interface side. Access network equipment may include base stations in various forms, for example: macro base stations, micro base stations (also called small stations), relay stations, access points, and so on. In systems using different radio access technologies, the names of equipment with base station functions may be different, for example, in the fifth generation (5G) system, it is called gNB; in the LTE system, it is called It is an evolved Node B (evolved NodeB, eNB or eNodeB); in the third generation (3rd generation, 3G) system, it is called Node B (Node B), etc. Exemplarily, the access network device involved in the embodiment of the present application may be a base station in 5G or a base station in long term evolution (LTE), where the base station in 5G may also be called a transmission and reception point (transmission reception point (TRP) or next generation Node B (gNB).
本申请实施例中,用于实现接入网设备的功能的装置可以是接入网设备,也可以是能够支持接入网设备实现该功能的装置,例如芯片或者芯片系统,该装置可以被安装在接入网设备中。在本申请实施例提供的技术方案中,以用于实现接入网设备的功能的装置是接入网设备为例,描述本申请实施例提供的技术方案。In the embodiment of the present application, the device for implementing the function of the access network device may be the access network device, or a device capable of supporting the access network device to realize the function, such as a chip or a chip system, and the device may be installed in the access network equipment. In the technical solution provided by the embodiment of the present application, the technical solution provided by the embodiment of the present application is described by taking the access network device as an example for realizing the function of the access network device.
其中,核心网网元可以包括:接入和移动性管理功能(access and mobility management function,AMF)、鉴权服务器功能(authentication server function,AUSF)、统一数据管理(unified data management,UDM)、会话管理功能(session management function,SMF)、策略控制功能(policy control function,PCF)、应用功能(application,AF)、用户面功能(user plane function,UPF)网元和网络切片选择功能(network slice selection function,NSSF)网元。Among them, the core network elements may include: access and mobility management function (access and mobility management function, AMF), authentication server function (authentication server function, AUSF), unified data management (unified data management, UDM), session Management function (session management function, SMF), policy control function (policy control function, PCF), application function (application, AF), user plane function (user plane function, UPF) network element and network slice selection function (network slice selection function, NSSF) network element.
AMF网元,主要负责信令处理部分,例如:接入控制、移动性管理、附着与去附着以及网关选择等功能。AMF网元为终端设备中的会话提供服务的情况下,会为该会话提供控制面的存储资源,以及存储会话标识、与会话标识关联的SMF网元标识等。一般而言,UE与AMF可以通过N1非接入层(nonaccess stratum,NAS)消息进行通信,UE与AMF之间的通信消息也可以通过RAN的N2消息进行中转。RAN与AMF通过N2消息进行通信。The AMF network element is mainly responsible for signaling processing, such as access control, mobility management, attachment and detachment, and gateway selection. When the AMF network element provides services for the session in the terminal device, it will provide the session with storage resources on the control plane, and store the session ID, the SMF network element ID associated with the session ID, and the like. Generally speaking, UE and AMF can communicate through N1 non-access stratum (nonaccess stratum, NAS) message, and communication messages between UE and AMF can also be transferred through N2 message of RAN. RAN and AMF communicate through N2 messages.
AUSF网元:具有鉴权服务功能,用于处理第三代合作伙伴计划(3 rd generation partnership project,3GPP)接入和非3GPP接入的认证请求。 AUSF network element: has an authentication service function, and is used to process authentication requests for 3rd generation partnership project (3GPP) access and non-3GPP access.
UDM网元:用于管理用户的签约信息,完成用户认证与授权。UDM network element: used to manage user subscription information and complete user authentication and authorization.
SMF网元,负责用户面网元选择,用户面网元重定向,因特网协议(internet protocol,IP)地址分配,承载的建立、修改和释放以及QoS控制。The SMF network element is responsible for user plane network element selection, user plane network element redirection, Internet protocol (internet protocol, IP) address allocation, bearer establishment, modification and release, and QoS control.
PCF网元,用于生成、管理用户、会话、服务质量(quality of service,QoS)流处理策略。主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略相关的用户签约信息。The PCF network element is used to generate and manage users, sessions, and quality of service (quality of service, QoS) flow processing policies. It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the network functions of the control layer, and is responsible for obtaining user subscription information related to policies.
AF网元,主要支持与3GPP核心网交互来提供服务,例如影响数据路由决策,策略控制功能或者向网络侧提供第三方的一些服务,可以位于运营商网络内,也可以位于运营商网络外。The AF network element mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side, and can be located in the operator's network or outside the operator's network.
UPF网元,用于对用户报文进行处理,例如转发、计费等。它可以负责终端设备中用户数据的转发和接收。可以从数据网络接收用户数据,通过接入网设备传输给终端设备;UPF网元还可以通过接入网设备从终端设备接收用户数据,转发到数据网络。UPF网元中为终端设备提供服务的传输资源和调度功能由SMF网元管理控制的。The UPF network element is used to process user packets, such as forwarding and charging. It can be responsible for the forwarding and receiving of user data in the terminal device. It can receive user data from the data network and transmit it to the terminal device through the access network device; the UPF network element can also receive user data from the terminal device through the access network device and forward it to the data network. The transmission resources and scheduling functions that provide services for terminal equipment in the UPF network element are managed and controlled by the SMF network element.
NSSF网元,用于支持基于用户请求的和签约的网络切片选择辅助信息(network slice selection assistance information,NSSAI)、用户位置区域、切片容量、切片当前负荷等信息, 进行切片的灵活选择。The NSSF network element is used to support flexible selection of slices based on information such as user requested and contracted network slice selection assistance information (NSSAI), user location area, slice capacity, and slice current load.
认证、授权和计费(authentication、authorization、accounting,AAA)服务器(图1中未示):能够处理用户访问请求的服务器程序,提供验证授权以及帐户服务,主要目的是管理用户访问网络服务器,对具有访问权的用户提供服务。Authentication, authorization, and accounting (authentication, authorization, accounting, AAA) server (not shown in Figure 1): a server program capable of processing user access requests, providing verification authorization and account services, the main purpose is to manage user access to network servers, and to Services are provided to users with access rights.
DN,负责为UE提供服务,包含运营商服务,互联网服务,第三方服务等,如为UE提供上网功能、短信功能等。DN is responsible for providing services for UE, including operator services, Internet services, third-party services, etc., such as providing Internet access functions and SMS functions for UEs.
图1所示的网络架构示意图中,还包括各个网元之间的接口,例如N1表示UE与AMF网元之间的接口,N2表示AMF网元与RAN设备之间的接口,等等。在一种可能的实现方式中,部分接口可以采用服务化接口的方式实现,具体可以参见图2所示。The schematic diagram of the network architecture shown in FIG. 1 also includes interfaces between various network elements, for example, N1 represents the interface between the UE and the AMF network element, N2 represents the interface between the AMF network element and the RAN device, and so on. In a possible implementation manner, some interfaces may be implemented in the form of service interfaces, as shown in FIG. 2 for details.
图1中的UE、(R)AN设备、UPF网元和DN一般被称为用户层网络功能实体,用户的数据流量可以通过UE和DN之间建立的协议数据单元会话(protocol data unit Session,PDU Session)进行传输,传输会经过(R)AN和UPF这两个网络功能(实体);而其他的部分则被称为控制层网络功能和实体,主要负责认证和鉴权、注册管理、会话管理、移动性管理以及策略控制等功能,从而实现用户层流量可靠稳定的传输。The UE, (R)AN equipment, UPF network element, and DN in Figure 1 are generally referred to as user layer network functional entities. User data traffic can pass through the protocol data unit session (protocol data unit Session) established between UE and DN. PDU Session) for transmission, the transmission will pass through the two network functions (entities) of (R)AN and UPF; while other parts are called control layer network functions and entities, which are mainly responsible for authentication and authentication, registration management, session Management, mobility management, policy control and other functions, so as to realize reliable and stable transmission of user layer traffic.
2、5G中非3GPP(non-3GPP)的网络架构2. The network architecture of non-3GPP (non-3GPP) in 5G
参见图3,是本申请实施例提供的一种5G中non-3GPP的网络架构的示意图。相比于3GPP的系统架构(可参见图1),该网络架构中新增非3GPP互连功能(non-3GPP interworking function,N3IWF)网元。Referring to FIG. 3 , it is a schematic diagram of a non-3GPP network architecture in 5G provided by an embodiment of the present application. Compared with the 3GPP system architecture (see FIG. 1 ), a non-3GPP interworking function (N3IWF) network element is newly added in the network architecture.
针对图3包括的各个网元进行介绍,需要说明的是,部分网元可参照上述内容中的描述,此处不再赘述。Each network element included in FIG. 3 is introduced. It should be noted that for some network elements, reference may be made to the description in the foregoing content, and details are not repeated here.
N3IWF网元,用于支持非3GPP接入网连接到5G核心网。N3IWF网元分别通过N2和N3接口连接5G核心网用户面(user plane,UP)和控制面(CP,control plane)功能。如果所选的N3IWF网元与3GPP接入位于同一公共陆地移动网络(public land mobile network,PLMN),则通过3GPP接入和非3GPP接入同时连接到PLMN的同一5G核心网络的UE将由同一个AMF服务。在不受信任的非3GPP接入的情况下,N3IWF网元的功能包括:支持与UE建立互联网安全协议(internet protocol security,IPsec)隧道,N3IWF网元通过NWu终止与UE的IKEv2/IPsec协议,并通过N2中继认证UE并授权其访问5G核心网络所需的信息;在UE和AMF之间中继上行链路和下行链路控制平面NAS(N1)信令;建立IPsec安全关联(IPsec SA)以支持PDU会话流量;在UE和UPF之间中继上下行用户面数据包,等等。The N3IWF network element is used to support the non-3GPP access network to connect to the 5G core network. The N3IWF network element is connected to the 5G core network user plane (user plane, UP) and control plane (CP, control plane) functions through the N2 and N3 interfaces respectively. If the selected N3IWF network element is located in the same public land mobile network (PLMN) as the 3GPP access, UEs connected to the same 5G core network of the PLMN through 3GPP access and non-3GPP access at the same time will be operated by the same AMF service. In the case of untrusted non-3GPP access, the functions of the N3IWF network element include: supporting the establishment of an Internet security protocol (internet protocol security, IPsec) tunnel with the UE, the N3IWF network element terminates the IKEv2/IPsec protocol with the UE through the NWu, And through the N2 relay to authenticate the UE and authorize it to access the information required by the 5G core network; relay the uplink and downlink control plane NAS (N1) signaling between the UE and the AMF; establish an IPsec security association (IPsec SA ) to support PDU session traffic; relay uplink and downlink user plane data packets between UE and UPF, and so on.
其中,不可信的非3GPP接入网(Untrusted non-3GPP Access Network)设备用于支持终端设备和3GPP核心网之间采用非3GPP技术互连互通。其中,非3GPP技术例如:无线保真(WirelessFidelity,Wi-Fi)、全球微波互联接入(Worldwide Interoperability for Microwave Access,WiMAX)、码分多址(Code Division Multiple Access,CDMA)网络等,相对于可信的非3GPP接入网设备可以直接接入3GPP核心网,该网元需要通过安全网关建立的安全隧道来与3GPP核心网互连互通,其中安全网关例如:演进型分组数据网关(Evolved Packet Data Gateway,ePDG)或者非3GPP互通功能(Non-3GPP InterWorking Function,N3IWF)网元。Among them, the untrusted non-3GPP access network (Untrusted non-3GPP Access Network) equipment is used to support the interconnection and intercommunication between the terminal equipment and the 3GPP core network using non-3GPP technology. Among them, non-3GPP technologies such as: Wireless Fidelity (Wireless Fidelity, Wi-Fi), Worldwide Interoperability for Microwave Access (WiMAX), Code Division Multiple Access (CDMA) network, etc., compared to Trusted non-3GPP access network equipment can directly access the 3GPP core network. This network element needs to be interconnected with the 3GPP core network through a secure tunnel established by a security gateway. The security gateway is, for example: Evolved Packet Data Gateway (Evolved Packet Data Gateway, ePDG) or non-3GPP interworking function (Non-3GPP InterWorking Function, N3IWF) network element.
3、5G互联产业及自动化联盟(5G Alliance for Connected Industries and Automation,5G-ACIA)的网络架构3. Network architecture of 5G Alliance for Connected Industries and Automation (5G-ACIA)
为了提升数据业务的信息安全性,安全性要求更高的数据业务将在特定的私网中进行信息交互。如今,工业场景中不仅要求私网业务数据不出园区,还要求私网业务数据的完整性和加密性得到严格保证。In order to improve the information security of data services, data services with higher security requirements will exchange information in a specific private network. Today, industrial scenarios not only require private network business data not to leave the park, but also require the integrity and encryption of private network business data to be strictly guaranteed.
5G-ACIA定义了四种私网部署的场景,以下对这四种私网部署场景作进一步的介绍。5G-ACIA defines four private network deployment scenarios, which are further introduced below.
1)场景1:完全独立私网,该场景下私网部署了完全独立的RAN节点和5GC设备(包括控制面网元以及用户面网元),私网可以通过防火墙与公网进行互通;1) Scenario 1: Completely independent private network. In this scenario, the private network deploys completely independent RAN nodes and 5GC devices (including control plane network elements and user plane network elements), and the private network can communicate with the public network through the firewall;
2)场景2:RAN节点共享私网,该场景下私网拥有和公网共享的RAN节点,但是拥有独立的5GC设备(包括控制面网元以及用户面网元);2) Scenario 2: RAN nodes share the private network. In this scenario, the private network has RAN nodes shared with the public network, but has independent 5GC equipment (including control plane network elements and user plane network elements);
3)场景3:RAN节点/5GC控制面共享私网,该场景下私网拥有和公网共享的RAN节点以及5GC控制面,但是私网拥有独立用户面网元UPF;3) Scenario 3: RAN node/5GC control plane share the private network. In this scenario, the private network has the RAN node and 5GC control plane shared with the public network, but the private network has an independent user plane network element UPF;
4)场景4:RAN节点/5GC共享私网,该场景下私网和公网共享RAN节点以及5GC(包括控制面和用户面),此时私网隔离依赖于公网的切片或者CAG特性进行隔离。4) Scenario 4: RAN node/5GC share the private network. In this scenario, the private network and the public network share the RAN node and 5GC (including the control plane and user plane). At this time, the private network isolation depends on the slicing or CAG characteristics of the public network. isolation.
从成本角度考虑,公网和私网共享硬件是降低成本的有效手段。因此,主要使用上述场景3和场景4的网络架构。但在这两种网络架构中,私网业务的用户面安全完全依赖于公网。私网的用户面密钥是由公网的根密钥衍生出的,该公网的根密钥保存在公网,且私网的用户面密钥的衍生也在公网。示例性的,公网的AMF根据公网的密钥K amf来推演,用于派生空口控制面密钥和空口用户面密钥的中间密钥,比如K gnb。其中,k amf是根据公网的根密钥推演出的密钥。然后AMF将K gnb发送给接入网设备,之后接入网设备进一步根据K gnb推演空口用户面密钥和空口控制面密钥。基于此,私网内使用的空口用户面密钥依赖公网的密钥,密钥暴露在公网,若公网的密钥泄露或者在衍生过程中泄露,会影响私网业务的安全性。 From the perspective of cost, sharing hardware between the public network and private network is an effective means to reduce costs. Therefore, the network architectures of Scenario 3 and Scenario 4 above are mainly used. However, in these two network architectures, the security of the user plane of private network services completely depends on the public network. The user plane key of the private network is derived from the root key of the public network. The root key of the public network is stored on the public network, and the user plane key of the private network is also derived from the public network. Exemplarily, the AMF of the public network is deduced according to the key K amf of the public network, and is used to derive an intermediate key between the air interface control plane key and the air interface user plane key, such as K gnb . Among them, k amf is a key derived from the root key of the public network. Then the AMF sends the K gnb to the access network device, and then the access network device further deduces the air interface user plane key and the air interface control plane key according to the K gnb . Based on this, the air interface user plane key used in the private network depends on the public network key, and the key is exposed on the public network. If the public network key is leaked or leaked during the derivation process, the security of private network services will be affected.
基于此,提出本申请实施例所提供的一种公私网业务的隔离方法。在本申请实施例中,私网的控制面网元根据私网的密钥建立私网的用户面安全,私网的密钥与公网的密钥不同,该私网的密钥用于空口的用户面安全,该公网的密钥用于空口的控制面安全。可选的,该空口用于终端设备与私网之间的通信。通过这种方式,私网的控制面网元不被公网所共享,且该私网的控制面网元利用独立的私网的密钥建立私网的用户面安全,可以使得公网业务和私网业务相互隔离,提升私网业务的安全性。Based on this, a method for isolating public and private network services provided by the embodiment of the present application is proposed. In the embodiment of this application, the control plane network element of the private network establishes the user plane security of the private network according to the key of the private network. The key of the private network is different from the key of the public network. The key of the private network is used for air interface The user plane security of the public network is used for the control plane security of the air interface. Optionally, the air interface is used for communication between the terminal device and the private network. In this way, the control plane network elements of the private network are not shared by the public network, and the control plane network elements of the private network use independent private network keys to establish the security of the user plane of the private network, which can make public network services and Private network services are isolated from each other to improve the security of private network services.
参见图4,是本申请实施例提供的一种通信系统的架构示意图。在图4所示的通信系统中,包括:终端设备(例如UE)、接入网(RAN)设备、私网的控制面网元、公网的移动性管理(AMF)网元、公网的会话管理功能(SMF)网元和用户面功能(UPF)网元。需要说明的是,图4中并未全部示意出通信系统中包括的所有设备/网元,通信系统中还可以包括更多的设备/网元,示例性的,还可以包括图1或者图3中示意出的设备/网元。Referring to FIG. 4 , it is a schematic structural diagram of a communication system provided by an embodiment of the present application. In the communication system shown in Figure 4, it includes: terminal equipment (such as UE), access network (RAN) equipment, private network control plane network elements, public network mobility management (AMF) network elements, public network A session management function (SMF) network element and a user plane function (UPF) network element. It should be noted that all devices/network elements included in the communication system are not shown in FIG. 4 , and more devices/network elements may be included in the communication system. For example, the devices/network elements shown in FIG. 1 or 3 may also be included. The device/NE shown in the figure.
图4中示意出的设备/网元的名称随着移动通信领域的发展,可能会有所改变,本申请实施例对各个设备/网元的名称不作限制;另外,一个设备/网元也有可能演进为多个设备/网元,这多个设备/网元共同实现该一个设备/网元所实现的功能。本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。The name of the device/network element shown in Figure 4 may change with the development of the mobile communication field, and the embodiment of the present application does not limit the name of each device/network element; in addition, a device/network element may also be It evolves into multiple devices/network elements, and the multiple devices/network elements jointly realize the functions realized by the one device/network element. The name of the message between network elements or the name of each parameter in the message in the following embodiments of the present application is just an example, and other names may also be used in specific implementation, which is not specifically limited in the embodiment of the present application.
以下对图4中包括的各个设备/网元进行具体的介绍。Each device/network element included in FIG. 4 is specifically introduced below.
接入网设备和用户面功能网元可以是公网和私网共享的,也可以是私网独享的。需要说明的是,接入网设备和用户面功能网元是私网独享的含义是,接入网设备和用户面功能网元仅为终端设备的私网业务提供用户面服务。在私网独享接入网设备和用户面功能网元的情况 下,私网和公网的移动性管理功能,以及公网的会话管理功能仍然由公网的控制面网元负责。另外,公网的用户面的数据将不会由私网的用户面功能网元处理,而是由公网的用户面功能网元(图4中未示出)处理。The access network equipment and user plane function network elements can be shared by the public network and the private network, or can be exclusively used by the private network. It should be noted that access network equipment and user plane functional network elements are exclusive to the private network, which means that the access network equipment and user plane functional network elements only provide user plane services for private network services of terminal equipment. In the case that the access network equipment and user plane functional network elements are exclusively used by the private network, the mobility management functions of the private network and the public network, as well as the session management function of the public network are still in charge of the control plane network elements of the public network. In addition, the data of the user plane of the public network will not be processed by the functional network element of the user plane of the private network, but will be processed by the functional network element of the user plane of the public network (not shown in FIG. 4 ).
终端设备、公网的移动性管理(AMF)网元、公网的会话管理功能(SMF)网元和用户面功能(UPF)网元的功能可以参照上述图1或者图3对应的实施例内容中的介绍,此处不再赘述。The functions of the terminal device, the mobility management (AMF) network element of the public network, the session management function (SMF) network element of the public network, and the user plane function (UPF) network element can refer to the content of the above embodiment corresponding to FIG. 1 or FIG. 3 The introduction in , will not be repeated here.
私网的控制面网元,可选的,可以命名为本地控制面(local control plane,L-CP)网元,还可以命名为其他名称,本申请实施例不作限制。私网的控制面网元是私网本地部署的控制面网元,具备中继N2消息(或者称为信令)以及管理私网业务会话的功能。其中,私网的控制面网元中继N2消息是指,私网的控制面网元可以转发接入网设备和公网的移动性管理(AMF)网元之间发送的N2消息。在一种可能的实现方式中,私网的控制面网元包括第一网元和第二网元,或者,第一网元和第二网元为独立的两个网元;第一网元和第二网元共同实现该私网的控制面网元所实现的功能。示例性的,第一网元(示例性的,可以命名为Proxy网元)可以实现中继N2消息的功能,第二网元(示例性的,命名为本地会话管理功能(local session management function,L-SMF)网元)可以实现管理私网业务会话的功能。可选的,私网业务会话管理的相关配置和策略信息可以预配置或者由公网下发给私网的控制面网元。The control plane network element of the private network may optionally be named as a local control plane (local control plane, L-CP) network element, or may be named by another name, which is not limited in this embodiment of the present application. The control plane network element of the private network is a control plane network element deployed locally in the private network, and has functions of relaying N2 messages (or called signaling) and managing private network service sessions. The relaying of the N2 message by the control plane network element of the private network means that the control plane network element of the private network can forward the N2 message sent between the access network device and the mobility management (AMF) network element of the public network. In a possible implementation manner, the control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element jointly realize the functions realized by the control plane network element of the private network. Exemplarily, the first network element (example, may be named Proxy network element) can realize the function of relaying N2 message, and the second network element (example, named local session management function (local session management function, L-SMF (network element) can implement the function of managing private network service sessions. Optionally, the relevant configuration and policy information of private network service session management may be preconfigured or delivered from the public network to the control plane network element of the private network.
在一种可能的实现方式中,对于图4所示的通信系统而言,私网和公网的移动性管理功能以及公网的会话管理功能仍然由公网的控制面网元负责。In a possible implementation manner, for the communication system shown in FIG. 4 , the mobility management functions of the private network and the public network and the session management function of the public network are still in charge of the control plane network element of the public network.
图4中还示意了在本申请实施例中,私网的会话管理(session management,SM)消息和公网的会话管理消息的传输所涉及到的设备/网元。其中,会话管理消息是用于对用户面的信息进行管理的信息,示例性的,会话管理消息可以包括会话建立请求消息,会话修改消息,会话删除消息,等等。FIG. 4 also illustrates the equipment/network elements involved in the transmission of the session management (session management, SM) message of the private network and the session management message of the public network in the embodiment of the present application. Wherein, the session management message is information used to manage information on the user plane. Exemplarily, the session management message may include a session establishment request message, a session modification message, a session deletion message, and the like.
以私网的会话管理消息为例,私网的会话管理消息可以包括N1会话管理消息、N2SM消息或N4SM消息中的一个或多个。该N1SM消息在私网的控制面网元与UE的交互过程中使用;也可以是N2SM消息,该N2SM消息在私网的控制面网元与RAN设备的交互过程中使用;也可以是N4SM消息,该N4SM消息在私网的控制面网元与UPF网元的交互过程中使用。Taking the private network session management message as an example, the private network session management message may include one or more of N1 session management message, N2SM message or N4SM message. The N1SM message is used during the interaction process between the control plane network element of the private network and the UE; it can also be an N2SM message, and the N2SM message is used during the interaction process between the private network control plane network element and the RAN device; it can also be an N4SM message , the N4SM message is used in the interaction process between the control plane network element of the private network and the UPF network element.
以公网的会话管理消息为例,公网的会话管理消息可以包括N1SM消息、N2SM消息或N4SM消息中的一个或多个。该N1SM消息在公网的控制面网元(示例性的,可以为AMF网元)与UE的交互过程中使用;也可以是N2SM消息,该N2SM消息在公网的控制面网元与RAN设备的交互过程中使用;也可以是N4SM消息,该N4SM消息在公网的控制面网元与UPF网元的交互过程中使用。Taking the session management message of the public network as an example, the session management message of the public network may include one or more of N1SM message, N2SM message or N4SM message. The N1SM message is used in the interaction process between the control plane network element of the public network (for example, it can be an AMF network element) and the UE; it can also be an N2SM message, and the N2SM message is used between the control plane network element of the public network and the RAN device It can also be an N4SM message, and the N4SM message is used during the interaction between the control plane network element of the public network and the UPF network element.
示例的,若该私网的会话管理消息是私网的会话建立请求,则该私网的会话管理消息由该终端设备生成,经过接入网设备、私网的控制面网元,在该私网的会话建立请求通过后,私网的控制面网元指示该用户面功能网元建立私网的会话。若该公网的会话管理消息是公网的会话建立请求,则该公网的会话管理消息由该终端设备生成,经过接入网设备、私网的控制面网元、公网的移动性管理网元和公网的会话管理功能网元,在该公网的会话建立请求通过后,公网的会话管理功能网元指示该用户面功能网元建立公网的会话。For example, if the session management message of the private network is a session establishment request of the private network, the session management message of the private network is generated by the terminal device, passes through the access network device, the control plane network element of the private network, After the session establishment request of the private network is passed, the control plane network element of the private network instructs the functional network element of the user plane to establish a private network session. If the session management message of the public network is a session establishment request of the public network, the session management message of the public network is generated by the terminal device, and passes through the access network device, the control plane network element of the private network, and the mobility management of the public network After the network element and the network element with the session management function of the public network pass the session establishment request of the public network, the network element with the session management function of the public network instructs the network element with the user plane function to establish a session with the public network.
下面基于上述内容中介绍的网络架构以及相关设备,对本申请实施例提供的一种公私网业务的隔离方法进行介绍。需要说明的是,在本申请实施例的附图中,各个实施例所示的步骤,以及步骤之间的先后顺序用于举例,并不构成对本申请实施例的限定。应理解,执行图 示中的部分步骤或调整步骤的顺序进行具体实施,均落在本申请的保护范围内。Based on the network architecture and related equipment introduced in the above content, a method for isolating public and private network services provided by the embodiment of the present application will be introduced below. It should be noted that, in the drawings of the embodiments of the present application, the steps shown in the various embodiments and the sequence of the steps are for example, and do not constitute a limitation to the embodiments of the present application. It should be understood that performing some of the steps in the illustration or adjusting the order of the steps for specific implementation falls within the protection scope of the present application.
参见图5,图5是本申请实施例提供的一种公私网业务的隔离方法的流程图。该方法可以基于图4所示的网络架构来实现。该方法包括以下步骤。Referring to FIG. 5 , FIG. 5 is a flow chart of a method for isolating public and private network services provided by an embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
S101、私网的控制面网元获取私网的密钥。S101. The control plane network element of the private network obtains the key of the private network.
其中,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥。换句话说,该私网的密钥可以是私网的根密钥或者私网的中间密钥,中间密钥即为根据该私网的根密钥衍生出的密钥。其中,私网的根密钥可以是主会话密钥(master session key,MSK)、扩展的主会话密钥(extended master session key,EMSK),私网的中间密钥可以是本地控制面密钥(local control plane key,KL-CP(Kl-cp))或者K gnb,K L-CP的作用可类比于移动性管理密钥(access and mobility management function key,KAMF(K amf))。 Wherein, the key of the private network is the root key of the private network or a key derived based on the root key of the private network. In other words, the key of the private network can be the root key of the private network or the intermediate key of the private network, and the intermediate key is a key derived from the root key of the private network. Among them, the root key of the private network can be the master session key (master session key, MSK), the extended master session key (extended master session key, EMSK), and the intermediate key of the private network can be the local control plane key (local control plane key, KL-CP (Kl-cp)) or K gnb , the role of the K L-CP can be compared to a mobility management key (access and mobility management function key, KAMF (K amf )).
该公网的密钥可以是公网的根密钥或者公网的中间密钥,中间密钥即为根据该公网的根密钥衍生出的密钥。其中,公网的根密钥可以是主会话密钥(master session key,MSK)、扩展的主会话密钥(extended master session key,EMSK),公网的中间密钥可以是K amf或者K gnbThe key of the public network may be the root key of the public network or the intermediate key of the public network, and the intermediate key is a key derived from the root key of the public network. Among them, the root key of the public network can be the master session key (master session key, MSK), the extended master session key (extended master session key, EMSK), the intermediate key of the public network can be K amf or K gnb .
该私网的根密钥与公网的根密钥不同,私网的密钥用于空口的用户面安全,公网的根密钥用于该空口的控制面安全。可选的,该空口为终端设备与私网之间通信所使用的空口。在本申请实施例中,公网的根密钥保存在公网中;私网的根密钥保存在私网中,且私网的业务密钥衍生也在私网中。通过这种方式,私网的控制面网元不被公网所共享,公网中不再存储私网的密钥,即使公网的密钥泄露或者在衍生过程中泄露,也不会影响私网业务的安全性。The root key of the private network is different from the root key of the public network. The private network key is used for user plane security of the air interface, and the root key of the public network is used for control plane security of the air interface. Optionally, the air interface is an air interface used for communication between the terminal device and the private network. In this embodiment of the application, the root key of the public network is stored in the public network; the root key of the private network is stored in the private network, and the business key derived from the private network is also stored in the private network. In this way, the control plane network elements of the private network are not shared by the public network, and the private network key is no longer stored in the public network. Even if the public network key is leaked or leaked during the derivation process, it will not affect the private network security of network services.
在一种可能的实现方式中,该私网的控制面网元存储有私网的密钥。那么,私网的控制面网元可以从自身的存储介质中读取该私网的密钥。In a possible implementation manner, the control plane network element of the private network stores the key of the private network. Then, the control plane network element of the private network can read the key of the private network from its own storage medium.
在又一种可能的实现方式中,该私网的密钥保存在AAA服务器中。私网的控制面网元可以从AAA服务器中获取私网的密钥。可选的,AAA服务器可以授予该私网的控制面网元可以访问、读取该私网的密钥的权限,通过AAA服务器验证访问设备(或者称为用户)的权限,可以避免其他设备或者用户读取该私网的密钥,提升私网的密钥的安全性。In yet another possible implementation manner, the private network key is stored in the AAA server. The control plane network element of the private network can obtain the key of the private network from the AAA server. Optionally, the AAA server can grant the control plane network element of the private network the permission to access and read the key of the private network, and verify the permission of the access device (or user) through the AAA server, which can prevent other devices or The user reads the key of the private network to improve the security of the private network key.
在又一种可能的实现方式中,该私网的密钥保存在另一个网元(示例性的,该网元可以是私网独享的网元)中,私网的控制面网元可以从该另一个网元中获取该私网的密钥。示例性的,该另一个网元可以存储有私网的根密钥,以及将根据该私网的根密钥衍生出的中间密钥发送给私网的控制面网元。In yet another possible implementation, the key of the private network is stored in another network element (for example, the network element may be a network element exclusive to the private network), and the control plane network element of the private network may Obtain the key of the private network from the other network element. Exemplarily, the other network element may store the root key of the private network, and send the intermediate key derived from the root key of the private network to the control plane network element of the private network.
S102、终端设备向私网的控制面网元发送第一消息,第一消息包括会话建立请求。具体的,终端设备向私网的控制面网元发送第一消息的过程可以为:S102. The terminal device sends a first message to the control plane network element of the private network, where the first message includes a session establishment request. Specifically, the process of the terminal device sending the first message to the control plane network element of the private network may be as follows:
步骤a1:终端设备向RAN设备发送第一消息。Step a1: the terminal device sends a first message to the RAN device.
步骤a2:RAN设备向私网的控制面网元转发该第一消息。Step a2: The RAN device forwards the first message to the control plane network element of the private network.
在这个过程中,RAN设备可以是第一消息的中间转发节点,不感知第一消息的内容。In this process, the RAN device may be an intermediate forwarding node of the first message, and does not perceive the content of the first message.
S103、在私网的控制面网元接收来自终端设备的第一消息之后,私网的控制面网元确定会话建立请求对应于私网。S103. After the control plane network element of the private network receives the first message from the terminal device, the control plane network element of the private network determines that the session establishment request corresponds to the private network.
需要说明的是,私网的控制面网元获取私网的密钥和接收第一消息的顺序,本申请实施例不作限制。在一种可能的实现方式中,私网的控制面网元可以获取公网的NAS密钥,使用该NAS密钥解析该第一消息,以获得该会话建立请求。若该会话建立请求包括第一信息,则该私网的控制面网元根据该第一信息确定会话建立请求对应于私网。其中,第一信息用于指示会话建立请求对应于私网。示例性的,可以参见图7所对应的实施例的介绍,此处不具体展开描述。It should be noted that the order in which the control plane network element of the private network obtains the key of the private network and receives the first message is not limited by this embodiment of the present application. In a possible implementation manner, the control plane network element of the private network may obtain the NAS key of the public network, and use the NAS key to parse the first message to obtain the session establishment request. If the session establishment request includes the first information, the control plane network element of the private network determines according to the first information that the session establishment request corresponds to the private network. Wherein, the first information is used to indicate that the session establishment request corresponds to a private network. For example, reference may be made to the introduction of the embodiment corresponding to FIG. 7 , which will not be described in detail here.
在一种可能的实现方式,私网的控制面网元可以建立私网和终端设备之间的连接。若私网的控制面网元通过私网和终端设备之间的连接接收来自终端设备的第一消息,则私网的控制面网元根据该私网和终端设备之间的连接确定该会话建立请求对应于私网。示例性的,可以参见图8所对应的实施例的介绍,此处不具体展开描述。In a possible implementation manner, the control plane network element of the private network may establish a connection between the private network and the terminal device. If the control plane network element of the private network receives the first message from the terminal device through the connection between the private network and the terminal device, the control plane network element of the private network determines that the session is established according to the connection between the private network and the terminal device The request corresponds to the private network. For example, reference may be made to the introduction of the embodiment corresponding to FIG. 8 , which will not be described in detail here.
S104、私网的控制面网元根据私网的密钥建立空口的用户面安全。S104. The control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
可选的,私网的控制面网元根据私网的密钥建立空口的用户面安全的方式可以为:私网的控制面网元根据私网的密钥生成安全参数;私网的控制面网元向终端设备和/或接入网设备发送安全参数。其中,该安全参数用于终端设备和/或接入网设备生成空口的用户面密钥。可选的,私网的控制面网元发送给终端设备的安全参数和接入网设备的安全参数可以相同,也可以不同。Optionally, the control plane network element of the private network can establish the user plane security of the air interface according to the key of the private network: the control plane network element of the private network generates security parameters according to the key of the private network; The network element sends the security parameter to the terminal device and/or the access network device. Wherein, the security parameter is used for the terminal device and/or the access network device to generate an air interface user plane key. Optionally, the security parameter sent by the control plane network element of the private network to the terminal device may be the same as or different from the security parameter of the access network device.
通过图5所对应的实施例的方式,私网的控制面网元可以判定会话建立请求对应于公网还是私网,在会话建立请求对应于私网的情况下,根据私网的密钥建立私网的用户面安全;在会话建立请求对应于公网的情况下,将该会话建立请求转发给公网的移动性管理网元进行处理。通过这种方式,可以保证私网的用户面密钥由私网的密钥进行衍生,可以实现公网和私网业务安全隔离,提升私网业务的安全性。Through the method of the embodiment corresponding to Fig. 5, the control plane network element of the private network can determine whether the session establishment request corresponds to the public network or the private network, and if the session establishment request corresponds to the private network, establish The user plane of the private network is secure; if the session establishment request corresponds to the public network, the session establishment request is forwarded to the mobility management network element of the public network for processing. In this way, it can be ensured that the user plane key of the private network is derived from the key of the private network, and the security isolation of public network and private network services can be realized, and the security of private network services can be improved.
示例性的,参见图6,是本申请实施例提供的一种建立私网的用户面安全以及控制面安全的流程示意图。For example, refer to FIG. 6 , which is a schematic flowchart of establishing user plane security and control plane security of a private network provided by an embodiment of the present application.
步骤b1,私网的控制面网元根据私网的密钥生成第一安全参数,第一安全参数用于推演终端设备的空口的用户面密钥。In step b1, the control plane network element of the private network generates a first security parameter according to the key of the private network, and the first security parameter is used to deduce the user plane key of the air interface of the terminal device.
例如,第一安全参数可以包含在会话安全上下文中。第一安全参数包括用于生成空口的用户面密钥的中间密钥。For example, the first security parameter may be included in the session security context. The first security parameter includes an intermediate key used to generate a user plane key for the air interface.
私网的控制面网元在执行步骤b1时,具体可以通过如下方式来实现:When the control plane network element of the private network executes step b1, it can be implemented in the following ways:
私网的控制面网元可以根据私网的密钥以及辅助参数生成第一安全参数。第一安全参数包括中间密钥。本申请实施例中的中间密钥,指由根密钥经过一次或者多次推演产生的密钥。网元接收中间密钥后可以进一步进行密钥推演,最终获得用于完整性保护和/或加密的密钥。示例性的,接入网设备使用中间密钥推演用于空口的用户面完整性保护和/或加密的密钥。例如,在4G通信系统中,中间密钥可以为k eNB。示例性地,该中间密钥也可以称为K npnThe control plane network element of the private network may generate the first security parameter according to the key and auxiliary parameters of the private network. The first security parameter includes an intermediate key. The intermediate key in the embodiment of this application refers to the key generated from the root key after one or more derivations. After the network element receives the intermediate key, it can further perform key derivation, and finally obtain the key for integrity protection and/or encryption. Exemplarily, the access network device uses the intermediate key to deduce the key used for integrity protection and/or encryption of the user plane of the air interface. For example, in a 4G communication system, the intermediate key may be k eNB . Exemplarily, the intermediate key may also be called K npn .
可以理解的是,私网的控制面网元根据私网的密钥和辅助参数生成第一安全参数,可以包括根据私网的密钥和辅助参数推演中间密钥。It can be understood that the control plane network element of the private network generates the first security parameter according to the private network key and auxiliary parameters, which may include deriving an intermediate key according to the private network key and auxiliary parameters.
作为一种示例,空口的用户面密钥可以包括K UPenc和/或K UPint。K UPenc用于通过加密算法来保护用户面业务。K UPint用于通过特定的完整性算法来保护用户面业务。 As an example, the user plane key of the air interface may include K UPenc and/or K UPint . K UPenc is used to protect user plane services through encryption algorithms. K UPint is used to protect user plane services through specific integrity algorithms.
示例性地,辅助参数可以包括单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)、数据网络名称(data network name,DNN)或者下行NAS消息计数(downlink NAS count,DL NAS Count)中的一项或多项,也可以是其它预设的辅助参数。DL NAS Count可以由公网控制面网元发送给私网的控制面网元。Exemplarily, the auxiliary parameter may include single network slice selection assistance information (single network slice selection assistance information, S-NSSAI), data network name (data network name, DNN) or downlink NAS message count (downlink NAS count, DL NAS Count ), or one or more items in other preset auxiliary parameters. DL NAS Count can be sent by the control plane NE of the public network to the control plane NE of the private network.
步骤b2,私网的控制面网元向为终端设备提供接入服务的接入网设备发送该第一安全参数。In step b2, the control plane network element of the private network sends the first security parameter to the access network device providing access service for the terminal device.
可选地,私网的控制面网元还向该接入网设备发送辅助参数。Optionally, the control plane network element of the private network also sends auxiliary parameters to the access network device.
步骤b3,接入网设备根据第一安全参数推演空口的用户面密钥。Step b3, the access network device deduces the user plane key of the air interface according to the first security parameter.
步骤b4,私网的控制面网元向终端设备发送辅助参数,辅助参数用于终端设备推演生成 空口的用户面密钥的中间密钥。Step b4, the control plane network element of the private network sends auxiliary parameters to the terminal device, and the auxiliary parameters are used by the terminal device to deduce and generate the intermediate key of the user plane key of the air interface.
一种示例中,私网的控制面网元可以将辅助参数发送给移动性管理网元,由移动性管理网元发送给终端设备,比如移动性管理网元通过N1接口发送给终端设备。另一种示例中,私网的控制面网元可以将辅助参数发送给移动性管理网元,移动性管理网元发送给接入网设备,接入网设备向终端设备发送辅助参数,比如接入网设备可以通过RRC连接重配置消息向终端设备发送辅助参数。In an example, the control plane network element of the private network may send the auxiliary parameters to the mobility management network element, and the mobility management network element sends the auxiliary parameters to the terminal device, for example, the mobility management network element sends the auxiliary parameters to the terminal device through the N1 interface. In another example, the control plane network element of the private network can send auxiliary parameters to the mobility management network element, the mobility management network element sends the auxiliary parameters to the access network equipment, and the access network equipment sends auxiliary parameters to the terminal equipment, such as The network access device may send auxiliary parameters to the terminal device through an RRC connection reconfiguration message.
需要说明的是,本申请并不限定步骤b2与步骤b4的先后执行顺序。It should be noted that, the present application does not limit the execution order of step b2 and step b4.
步骤b5,在终端设备接收来自私网的控制面网元的辅助参数之后,终端设备根据私网的根密钥以及辅助参数生成中间密钥,并根据中间密钥推演空口的用户面密钥。Step b5, after the terminal device receives the auxiliary parameters from the control plane network element of the private network, the terminal device generates an intermediate key according to the root key of the private network and the auxiliary parameters, and deduces the user plane key of the air interface according to the intermediate key.
作为一种举例,终端设备上存储有私网的根密钥。作为另一种举例,终端设备还可以通过在线签约的方式获取私网根密钥,比如,终端设备可以临时接入蜂窝网络,通过临时接入蜂窝网络的控制面或者用户面通道从私网(比如,私网的控制面网元)中获取根密钥;或者终端设备通过非3GPP网络(比如WiFi网络)建立的用户面连接从私网中获取根密钥。As an example, the root key of the private network is stored on the terminal device. As another example, the terminal device can also obtain the root key of the private network through online signing. For example, the terminal device can temporarily access the cellular network, and access the private network ( For example, the root key is obtained from the control plane network element of the private network; or the terminal device obtains the root key from the private network through a user plane connection established by a non-3GPP network (such as a WiFi network).
在申请实施例中,接入网设备和终端设备均完成空口的用户面密钥的推演后,在进行上下行业务数据传输时,可以使用空口的用户面密钥进行业务数据的加解密处理,即可以理解为建立空口的用户面安全。在终端设备向接入网设备发送上行业务数据时,可以使用空口的用户面密钥对上行业务数据进行加密处理后再发送给接入网设备,从而在空口使用空口的用户面密钥来保护上行业务数据的安全性。在接入网设备向终端设备发送下行业务数据时,可以使用空口的用户面密钥对下行业务数据进行加密处理后再发送给终端设备,从而在空口使用空口的用户面密钥来保护下行业务数据的安全性。In the application example, after both the access network device and the terminal device have completed the deduction of the user plane key of the air interface, when transmitting uplink and downlink service data, the user plane key of the air interface can be used to encrypt and decrypt service data, That is, it can be understood as establishing the user plane security of the air interface. When the terminal device sends uplink service data to the access network device, the user plane key of the air interface can be used to encrypt the uplink service data and then sent to the access network device, so that the user plane key of the air interface can be used to protect the Security of uplink business data. When the access network device sends downlink service data to the terminal device, the user plane key of the air interface can be used to encrypt the downlink service data before sending it to the terminal device, so that the user plane key of the air interface can be used on the air interface to protect the downlink service Data Security.
示例性的,下面针对空口的控制面密钥的推演流程进行说明,参见图6所示。Exemplarily, the following describes the derivation process of the air interface control plane key, as shown in FIG. 6 .
步骤c1,公网的控制面网元获取终端设备的公网的密钥。In step c1, the network element of the control plane of the public network obtains the key of the public network of the terminal device.
步骤c2,公网的控制面网元根据公网的密钥生成第二安全参数,第二安全参数用于推演终端设备的空口控制面密钥。Step c2, the control plane network element of the public network generates a second security parameter according to the key of the public network, and the second security parameter is used to deduce the air interface control plane key of the terminal device.
该第二安全参数包括中间密钥。示例性的,接入网设备使用中间密钥推演用于空口的控制面完整性保护和/或加密的密钥。例如,在4G通信系统中,中间密钥可以为k eNB。示例性地,该中间密钥也可以称为K npnThe second security parameter includes an intermediate key. Exemplarily, the access network device uses the intermediate key to deduce the key used for integrity protection and/or encryption of the control plane of the air interface. For example, in a 4G communication system, the intermediate key may be k eNB . Exemplarily, the intermediate key may also be called K npn .
可以理解的是,公网的控制面网元根据公网的密钥和辅助参数生成第二安全参数,可以包括根据公网的密钥和辅助参数推演中间密钥。It can be understood that the control plane network element of the public network generates the second security parameter according to the public network key and auxiliary parameters, which may include deriving an intermediate key according to the public network key and auxiliary parameters.
步骤c3,公网的控制面网元向接入网设备发送该第二安全参数。Step c3, the control plane network element of the public network sends the second security parameter to the access network device.
步骤c4,接入网设备根据第二安全参数推演空口的控制面密钥。Step c4, the access network device deduces the control plane key of the air interface according to the second security parameter.
步骤c5,公网的控制面网元向终端设备发送用于推演空口的控制面密钥的辅助参数。Step c5, the control plane network element of the public network sends auxiliary parameters for deriving the control plane key of the air interface to the terminal device.
一种示例中,公网的控制面网元可以将用于推演空口的控制面密钥的辅助参数通过N1接口发送给终端设备。另一种示例中,公网的控制面网元可以将辅助参数发送给接入网设备,接入网设备向终端设备发送用于推演空口的控制面密钥的辅助参数,比如接入网设备可以通过RRC连接重配置消息向终端设备发送用于推演空口的控制面密钥的辅助参数。In an example, the control plane network element of the public network may send the auxiliary parameters used for deriving the control plane key of the air interface to the terminal device through the N1 interface. In another example, the control plane network element of the public network can send auxiliary parameters to the access network device, and the access network device sends auxiliary parameters used to deduce the control plane key of the air interface to the terminal device, such as the access network device Auxiliary parameters for deriving the control plane key of the air interface may be sent to the terminal device through an RRC connection reconfiguration message.
本申请实施例中用于推演空口用户面密钥的辅助参数与用于推演空口控制面密钥的辅助参数可以相同,也可以不同,本申请实施例对此不作限定。In the embodiment of the present application, the auxiliary parameters used for deriving the air interface user plane key and the auxiliary parameters used for deriving the air interface control plane key may be the same or different, which is not limited in the embodiment of the present application.
需要说明的是,本申请并不限定步骤c3与步骤c5的先后执行顺序。It should be noted that, the present application does not limit the execution order of step c3 and step c5.
步骤c6,终端设备根据公网根密钥以及辅助参数生成中间密钥,并根据中间密钥推演空口控制面密钥。Step c6, the terminal device generates an intermediate key according to the public network root key and auxiliary parameters, and deduces an air interface control plane key according to the intermediate key.
需要说明的是,公网的控制面网元仍可以向终端设备发送用于推演NAS控制面密钥的辅助参数。终端设备使用公网根密钥以及辅助参数生成中间密钥,并根据中间密钥推演NAS控制面密钥。It should be noted that the control plane network element of the public network can still send auxiliary parameters for deriving the NAS control plane key to the terminal device. The terminal device uses the public network root key and auxiliary parameters to generate an intermediate key, and deduces the NAS control plane key based on the intermediate key.
本申请实施例提供的上述方案中,用于推演空口的控制面密钥和空口的用户面密钥的安全参数是分别独立生成的,即由公网的控制面网元生成用于推演空口的控制面密钥的安全参数,以及由私网的控制面网元生成用于推演空口的用户面密钥的安全参数,由于私网网元不被公网所共享,可以保障私网的密钥不被公网所获知,进而保障私网的安全性。进一步地,在使用空口的用户面密钥对业务数据进行安全传输时,提高空口业务数据传输安全性。In the above solution provided by the embodiment of the present application, the security parameters of the control plane key used for deriving the air interface and the security parameters of the user plane key for the air interface are independently generated, that is, the control plane network element of the public network generates the security parameters used for deriving the air interface. The security parameters of the control plane key, as well as the security parameters of the user plane key generated by the control plane network element of the private network and used to deduce the user plane key of the air interface, because the private network network element is not shared by the public network, the private network key can be guaranteed It is not known by the public network, thereby ensuring the security of the private network. Further, when the user plane key of the air interface is used to securely transmit the service data, the security of the service data transmission of the air interface is improved.
需要说明是,用于推演空口的控制面密钥和空口的用户面密钥的安全参数也可以是同一个,例如,在步骤b3中,接入网设备还可以根据第一安全参数来推演空口的控制面密钥。在步骤b4中,辅助参数还可以用于终端设备推演生成空口控制面密钥的中间密钥。在步骤b5中,终端设备还可以根据私网根密钥和辅助参数来生成中间密钥,然后通过中间密钥来推演空口控制面密钥。在该情况下,上述步骤c4-步骤c6可以不执行。It should be noted that the security parameters used to deduce the control plane key of the air interface and the user plane key of the air interface may also be the same. For example, in step b3, the access network device may also deduce the air interface key according to the first security parameter. control plane key. In step b4, the auxiliary parameters may also be used by the terminal device to deduce and generate an intermediate key for the control plane key of the air interface. In step b5, the terminal device can also generate an intermediate key according to the private network root key and auxiliary parameters, and then use the intermediate key to deduce the air interface control plane key. In this case, the above step c4-step c6 may not be executed.
在本申请的一些实施例中,步骤b2,私网的控制面网元在向接入网设备发送第一安全参数时,可以通过以下任一种可能的方式实现:In some embodiments of the present application, step b2, when the control plane network element of the private network sends the first security parameter to the access network device, may be implemented in any of the following possible ways:
第一种可能的实现方式中,私网的控制面网元可以通过公网的控制面网元向接入网设备发送第一安全参数。例如,公网的控制面网元可以包括公网移动性管理网元。In a first possible implementation manner, the control plane network element of the private network may send the first security parameter to the access network device through the control plane network element of the public network. For example, the control plane network element of the public network may include a public network mobility management network element.
第二种可能的实现方式中,私网的控制面网元可以通过私网的用户面网元向接入网设备发送第一安全参数。例如,私网用户面网元可以包括私网UPF。In a second possible implementation manner, the control plane network element of the private network may send the first security parameter to the access network device through the user plane network element of the private network. For example, the private network user plane network element may include a private network UPF.
在一种可能的实施方式中,为了提高第一安全参数的安全性,无论私网的控制面网元通过公网的控制面网元向接入网设备中转第一安全参数,还是通过私网用户面网元向接入网设备中转第一安全参数,私网的控制面网元可以对第一安全参数进行加密处理,然后将加密后的第一安全参数通过公网的控制面网元或者私网的用户面网元发送给接入网设备。接入网设备接收到加密后的第一安全参数后,可以通过解密密钥来解密获得第一安全参数。比如,解密密钥可以是加密密钥的对称密钥。In a possible implementation manner, in order to improve the security of the first security parameter, no matter whether the control plane network element of the private network transfers the first security parameter to the access network device through the control plane network element of the public network, or transmits the first security parameter through the private network The user plane network element transfers the first security parameter to the access network device, and the private network control plane network element can encrypt the first security parameter, and then pass the encrypted first security parameter through the public network control plane network element or The user plane network element of the private network sends it to the access network device. After receiving the encrypted first security parameter, the access network device may decrypt it using a decryption key to obtain the first security parameter. For example, the decryption key may be a symmetric key to the encryption key.
用于对第一安全参数进行加密的密钥可以称为安全参数密钥,也可以称为隧道密钥,或者采用其它的名称,本申请对此不作具体限定。比如,解密密钥可以是加密密钥的对称密钥,则解密密钥也可以是安全参数密钥。The key used to encrypt the first security parameter may be called a security parameter key, a tunnel key, or another name, which is not specifically limited in this application. For example, the decryption key may be a symmetric key of the encryption key, and the decryption key may also be a security parameter key.
参见图7,是本申请实施例中提供的又一种公私网业务的隔离方法的流程图。该方法可以基于图4所示的网络架构来实现。该方法包括以下步骤。Referring to FIG. 7 , it is a flow chart of another method for isolating public and private network services provided in the embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
S201、终端设备注册到网络中。S201. The terminal device registers in the network.
具体的,终端设备在公网中注册。在终端设备注册到网络的过程,当RAN设备选择AMF网元后,可以根据运营商预配置的信息发现私网的控制面网元(可以称为L-CP网元)。在这种方式中,AMF网元能够感知私网的控制面网元的存在。Specifically, the terminal device is registered in the public network. During the registration process of the terminal device to the network, after the RAN device selects the AMF network element, it can discover the control plane network element of the private network (which may be called the L-CP network element) according to the information pre-configured by the operator. In this way, the AMF network element can perceive the existence of the control plane network element of the private network.
在一种可能的实现方式中,私网的控制面网元在和AMF网元建立N2隧道的过程中,可以指示自己是中继节点。例如,私网的控制面网元向AMF网元发送第一指示信息,该第一指示信息用于指示私网的控制面网元为RAN设备和AMF网元的中继节点。In a possible implementation manner, the control plane network element of the private network may indicate that it is a relay node during the process of establishing the N2 tunnel with the AMF network element. For example, the control plane network element of the private network sends first indication information to the AMF network element, where the first indication information is used to indicate that the control plane network element of the private network is a relay node between the RAN device and the AMF network element.
S202、公网的移动性管理(AMF)网元获取公网的NAS密钥。S202. A mobility management (AMF) network element of the public network acquires a NAS key of the public network.
在终端设备注册到公网的流程中,公网的移动性管理网元可以获取该终端设备对应的公网的NAS密钥。During the process of the terminal device registering with the public network, the mobility management network element of the public network can obtain the NAS key of the public network corresponding to the terminal device.
S203、公网的移动性管理网元向私网的控制面网元发送公网的NAS密钥。S203. The mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network.
对应的,私网的控制面网元接收来自公网的移动性管理网元的公网的NAS密钥。Correspondingly, the control plane network element of the private network receives the NAS key of the public network from the mobility management network element of the public network.
在终端设备注册到公网的流程中,公网的移动性管理网元记录终端设备与其对应的私网的控制面网元的对应关系。公网的移动性管理网元向终端设备对应的私网的控制面网元发送该终端设备对应的公网的NAS密钥,以使得该私网的控制面网元可以根据该公网的NAS密钥解析接收到的NAS消息。In the process of registering the terminal device to the public network, the mobility management network element of the public network records the corresponding relationship between the terminal device and the corresponding control plane network element of the private network. The mobility management network element of the public network sends the NAS key of the public network corresponding to the terminal device to the control plane network element of the private network corresponding to the terminal device, so that the control plane network element of the private network can use the NAS key of the public network The key parses the received NAS message.
在一种可能的实现方式中,公网的移动性管理网元向私网的控制面网元发送公网的NAS密钥的方式为:公网的移动性管理网元向私网的控制面网元发送第二消息,第二消息包括第二信息和公网的NAS密钥,第二信息用于指示授予私网的控制面网元使用公网的NAS密钥的权限。示例性的,该第二消息可以为终端设备(即私网的控制面网元对应的终端设备)的NAS上下文。示例性的,公网的移动性管理网元的配置信息中,包含有允许该公网的移动性管理网元发送NAS上下文的授权信息。可选的,该配置信息可以是预存的,或者是网络下发给该公网的移动性管理网元的。在公网的移动性网元获取了公网的NAS密钥之后,可以根据该配置信息向私网的控制面网元发送NAS上下文。In a possible implementation, the way that the mobility management network element of the public network sends the NAS key of the public network to the control plane network element of the private network is as follows: the mobility management network element of the public network sends the private network control plane key The network element sends a second message, the second message includes the second information and the NAS key of the public network, and the second information is used to indicate the permission granted to the control plane network element of the private network to use the NAS key of the public network. Exemplarily, the second message may be the NAS context of the terminal device (that is, the terminal device corresponding to the control plane network element of the private network). Exemplarily, the configuration information of the mobility management network element of the public network includes authorization information that allows the mobility management network element of the public network to send the NAS context. Optionally, the configuration information may be pre-stored, or delivered by the network to the mobility management network element of the public network. After the mobility network element of the public network obtains the NAS key of the public network, it can send the NAS context to the control plane network element of the private network according to the configuration information.
S204、终端设备向私网的控制面网元发送第一消息,第一消息包括会话建立请求。S204. The terminal device sends a first message to the control plane network element of the private network, where the first message includes a session establishment request.
对应的,私网的控制面网元接收来自终端设备的第一消息,第一消息包括会话建立请求。Correspondingly, the control plane network element of the private network receives a first message from the terminal device, where the first message includes a session establishment request.
具体的,终端设备向私网的控制面网元发送第一消息的过程可以为:Specifically, the process of the terminal device sending the first message to the control plane network element of the private network may be as follows:
步骤a1:终端设备向RAN设备发送第一消息。Step a1: the terminal device sends a first message to the RAN device.
步骤a2:RAN设备向私网的控制面网元转发该第一消息。Step a2: The RAN device forwards the first message to the control plane network element of the private network.
在这个过程中,RAN设备可以是第一消息的中间转发节点,不感知第一消息的内容。In this process, the RAN device may be an intermediate forwarding node of the first message, and does not perceive the content of the first message.
在会话建立请求对应于私网的情况下,第一消息中包括第一信息,第一信息用于指示会话建立请求对应于私网。在一些可能的实现方式中,第一信息可以是:第一参数、私网的网络切片选择支撑信息(network slice selection assistance information,NSSAI)或者私网的数据网络名(data network name,DNN)中的一项或多项。其中,私网的网络切片选择支撑信息为私网专用的网络切片选择支撑信息,私网的数据网络名为私网专用的数据网络名。该第一参数用于指示使用私网的密钥衍生空口的用户面密钥。示例性的,该第一参数可以命名为本地密钥衍生指示(local credential derivative request,LCDR)。In the case that the session establishment request corresponds to a private network, the first message includes first information, and the first information is used to indicate that the session establishment request corresponds to a private network. In some possible implementations, the first information may be: the first parameter, network slice selection assistance information (network slice selection assistance information, NSSAI) of the private network, or data network name (data network name, DNN) of the private network one or more of . Wherein, the network slice selection support information of the private network is the network slice selection support information dedicated to the private network, and the data network name of the private network is a data network name dedicated to the private network. The first parameter is used to indicate that the key of the private network is used to derive the user plane key of the air interface. Exemplarily, the first parameter may be named as a local credential derivative request (LCDR).
在一种可能的实现方式中,第一消息中还可以包括第二参数,该第二参数用于指示终端设备建立用户面安全时使用独立的密钥衍生用户面密钥。其中,使用独立的密钥是指,衍生空口的用户面密钥的密钥与衍生空口的控制面密钥的密钥不同,或者可以表达为衍生空口的用户面密钥的网元/设备与衍生空口的控制面密钥的网元/设备不同,或者可以表达为终端设备的空口的控制面密钥和空口的用户面密钥相互隔离。示例性的,该第二参数可以命名为用户面秘钥隔离指示(user plane separation request,UPSR)。可选的,第一参数和第二参数也可以用一个参数进行表示,该一个参数可以指示第一参数和第二参数指示的含义。In a possible implementation manner, the first message may further include a second parameter, where the second parameter is used to instruct the terminal device to use an independent key to derive the user plane key when establishing user plane security. Wherein, using an independent key means that the key of the user plane key derived from the air interface is different from the key derived from the control plane key of the air interface, or it can be expressed as that the network element/device that derives the user plane key of the air interface is different from The network element/device that derives the control plane key of the air interface is different, or it can be expressed that the control plane key of the air interface of the terminal device and the user plane key of the air interface are isolated from each other. Exemplarily, the second parameter may be named user plane key separation indication (user plane separation request, UPSR). Optionally, the first parameter and the second parameter may also be represented by one parameter, and the one parameter may indicate meanings indicated by the first parameter and the second parameter.
S205、私网的控制面网元使用公网的NAS密钥解析第一消息,以获得会话建立请求。S205. The control plane network element of the private network uses the NAS key of the public network to parse the first message, so as to obtain a session establishment request.
S206、私网的控制面网元根据第一信息确定会话建立请求对应于私网。S206. The control plane network element of the private network determines according to the first information that the session establishment request corresponds to the private network.
也即是说,若第一消息中包括第一信息,则私网的控制面网元确定会话建立请求对应于私网。示例性,私网的控制面网元使用NAS密钥视察接收到的第一消息,若该第一消息是会话管理NAS消息,并且,该会话管理NAS消息中包括第一信息(第一参数、私网的NSSAI或者私网的DNN)中的一项或多项),则私网的控制面网元根据第一信息确定该会话管理NAS消息对应于私网。That is to say, if the first message includes the first information, the control plane network element of the private network determines that the session establishment request corresponds to the private network. Exemplarily, the control plane network element of the private network uses the NAS key to inspect the received first message, if the first message is a session management NAS message, and the session management NAS message includes first information (first parameter, NSSAI of the private network or DNN of the private network), the control plane network element of the private network determines that the session management NAS message corresponds to the private network according to the first information.
S207、在私网的控制面网元确定会话建立请求对应于私网的情况下,私网的控制面网元根据私网的密钥建立空口的用户面安全。S207. When the control plane network element of the private network determines that the session establishment request corresponds to the private network, the control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
示例性的,在私网的控制面网元确定会话建立请求对应于私网的情况下,私网的控制面网元可以根据第一消息中的第一参数、第二参数、本地配置信息或者该终端设备对应的签约信息中的一项或者多项,确定使用该私网的密钥建立空口的用户面安全。Exemplarily, when the control plane network element of the private network determines that the session establishment request corresponds to the private network, the control plane network element of the private network may, according to the first parameter in the first message, the second parameter, local configuration information or One or more items in the subscription information corresponding to the terminal device determine that the user plane security of the air interface is established using the key of the private network.
可选的,私网的控制面网元根据第一消息中的第一参数或者第二参数,确定使用私网的密钥建立空口的用户面安全。可以理解为:若第一消息中包括第一参数或者第二参数,则私网的控制面网元确定使用私网的密钥建立空口的用户面安全。Optionally, the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the first parameter or the second parameter in the first message. It can be understood that: if the first message includes the first parameter or the second parameter, the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface.
可选的,私网的控制面网元根据本地配置信息确定使用私网的密钥建立空口的用户面安全。可以理解为:若该本地配置信息中表明,在私网的控制面网元确定会话建立请求对应于私网的情况下,则触发使用私网的密钥建立空口的用户面安全的操作。那么,在私网的控制面网元确定会话建立请求对应于私网的情况下,则确定使用私网的密钥建立空口的用户面安全。Optionally, the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the local configuration information. It can be understood as: if the local configuration information indicates that when the control plane network element of the private network determines that the session establishment request corresponds to the private network, the operation of establishing the user plane security of the air interface using the key of the private network is triggered. Then, when the control plane network element of the private network determines that the session establishment request corresponds to the private network, it is determined that the user plane security of the air interface is established using the key of the private network.
可选的,私网的控制面网元根据该终端设备对应的签约信息确定使用私网的密钥建立空口的用户面安全。可以理解为:若该终端设备对应的签约信息中表明,在私网的控制面网元确定会话建立请求对应于私网的情况下,则触发使用私网的密钥建立该终端设备对应的空口的用户面安全的操作。那么,在私网的控制面网元确定会话建立请求对应于私网的情况下,则确定使用私网的密钥建立空口的用户面安全。在这种方式中,签约信息与终端设备相对应,不同的终端设备可以对应有不同的签约信息。Optionally, the control plane network element of the private network determines to use the key of the private network to establish the user plane security of the air interface according to the subscription information corresponding to the terminal device. It can be understood as: if the subscription information corresponding to the terminal device indicates that when the control plane network element of the private network determines that the session establishment request corresponds to the private network, trigger the establishment of the air interface corresponding to the terminal device using the key of the private network safe operation of the user plane. Then, when the control plane network element of the private network determines that the session establishment request corresponds to the private network, it is determined that the user plane security of the air interface is established using the key of the private network. In this manner, the subscription information corresponds to the terminal device, and different terminal devices may have different subscription information.
可能存在另一些终端设备的签约信息中表明,该终端设备发送的消息,不触发使用私网的密钥建立该终端设备对应的空口的用户面安全的操作。在这种情况下,在一种可能的实现方式中,私网的控制面网元将该第一消息转发给公网的控制面网元(例如,公网的AMF网元)。后续过程中,由公网的控制面网元对该第一消息进行下一步的处理,示例性的,在这种情况下,可以触发使用公网的密钥建立该终端设备对应的空口的用户面安全的操作。在又一种可能的实现方式中,响应于该第一消息,私网的控制面网元向终端设备反馈会话建立失败的消息,可选的,该反馈消息中可以包含创建失败的原因值(cause值)。由于不同的终端设备可以具备的功能不同,通过这种方式,具备不同功能的终端设备对第一消息可以采取不同的处理方式。It may be indicated in the subscription information of some other terminal devices that the message sent by the terminal device does not trigger the operation of using the key of the private network to establish the user plane security of the air interface corresponding to the terminal device. In this case, in a possible implementation manner, the control plane network element of the private network forwards the first message to the control plane network element of the public network (for example, the AMF network element of the public network). In the subsequent process, the control plane network element of the public network performs the next step processing on the first message. Exemplarily, in this case, it may be triggered to use the key of the public network to establish the user of the air interface corresponding to the terminal device. safe operation. In yet another possible implementation manner, in response to the first message, the control plane network element of the private network feeds back a message of session establishment failure to the terminal device. Optionally, the feedback message may include a cause value of the creation failure ( cause value). Since different terminal devices may have different functions, in this manner, terminal devices with different functions may adopt different processing methods for the first message.
其中,私网的控制面网元根据私网的密钥建立空口的用户面安全的方式可以参照上述步骤S104中的介绍,此处不再赘述。Wherein, the manner in which the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network can refer to the introduction in the above step S104 , and will not be repeated here.
需要说明的是,当私网的控制面网元确定会话建立请求对应于公网的情况下,私网的控制面网元将该第一消息转发给公网的AMF网元。后续过程中,由公网的AMF网元对该第一消息进行下一步的处理。其中,私网的控制面网元可以根据第一消息中包括的NSSAI/DNN确定会话建立请求对应于公网,或者根据第一消息中未包括第一参数,确定会话建立请求对应于公网。It should be noted that, when the control plane network element of the private network determines that the session establishment request corresponds to the public network, the control plane network element of the private network forwards the first message to the AMF network element of the public network. In the subsequent process, the AMF network element of the public network performs the next processing on the first message. Wherein, the control plane network element of the private network may determine that the session establishment request corresponds to the public network according to the NSSAI/DNN included in the first message, or determine that the session establishment request corresponds to the public network according to the fact that the first parameter is not included in the first message.
在一些实施例中,私网的控制面网元包括第一网元和第二网元,或者,第一网元和第二网元为独立的两个网元;第一网元和第二网元共同实现该私网的控制面网元所实现的功能。In some embodiments, the control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element The network elements jointly realize the functions realized by the network elements of the control plane of the private network.
在这种实施例中,私网的控制面网元接收和/或来自其他设备的消息,或者向其他设备转发消息的功能可以由第一网元来实现。实现管理私网业务会话的功能可以由第二网元来实现。对应于上述介绍的实施例,步骤S203的操作可以为:公网的移动性管理网元向第一网元发送 公网的NAS密钥,相应的,第一网元接收来自公网的移动性管理网元的公网的NAS密钥。步骤S204的操作可以为:终端设备向第一网元发送第一消息,相应的,第一网元接收来自终端设备的第一消息。步骤S205以及步骤S206的执行主体可以为第一网元。In this embodiment, the function of the control plane network element of the private network to receive and/or receive messages from other devices, or to forward messages to other devices may be implemented by the first network element. The function of managing private network service sessions may be implemented by the second network element. Corresponding to the above described embodiment, the operation of step S203 may be: the mobility management network element of the public network sends the NAS key of the public network to the first network element, and correspondingly, the first network element receives the mobility key from the public network. NAS key of the public network of the management NE. The operation of step S204 may be: the terminal device sends the first message to the first network element, and correspondingly, the first network element receives the first message from the terminal device. The execution subject of step S205 and step S206 may be the first network element.
步骤S207的执行方式可以参照以下流程:The execution method of step S207 can refer to the following process:
步骤d1:在第一网元确定会话建立请求对应于私网的情况下,第一网元将该第一消息转发给第二网元。Step d1: When the first network element determines that the session establishment request corresponds to a private network, the first network element forwards the first message to the second network element.
示例性的,第一网元使用NAS密钥视察接收到的第一消息,若该第一消息是会话管理NAS消息,并且,该会话管理NAS消息中包括第一信息(第一参数、私网的NSSAI或者私网的DNN)中的一项或多项),则第一网元根据第一信息确定该会话管理NAS消息对应于私网。步骤d2:第二网元根据第一消息中的第一参数、第二参数、本地配置信息或者该终端设备对应的签约信息中的一项或者多项,确定使用私网的密钥建立空口的用户面安全。Exemplarily, the first network element inspects the received first message using the NAS key, if the first message is a session management NAS message, and the session management NAS message includes first information (first parameter, private network NSSAI or DNN of the private network), the first network element determines that the session management NAS message corresponds to the private network according to the first information. Step d2: According to one or more items of the first parameter, the second parameter, the local configuration information in the first message, or the subscription information corresponding to the terminal device, the second network element determines to use the key of the private network to establish the air interface. User plane security.
可选的,第二网元根据第一消息中的第一参数或者第二参数,确定使用私网的密钥建立空口的用户面安全。可以理解为:若第一消息中包括第一参数或者第二参数,则第二网元确定使用私网的密钥建立空口的用户面安全。Optionally, according to the first parameter or the second parameter in the first message, the second network element determines to use the key of the private network to establish the user plane security of the air interface. It can be understood that: if the first message includes the first parameter or the second parameter, the second network element determines to use the key of the private network to establish the user plane security of the air interface.
可选的,第二网元根据本地配置信息确定使用私网的密钥建立空口的用户面安全。可以理解为:若该本地配置信息中表明,第二网元接收到消息,则触发使用私网的密钥建立空口的用户面安全的操作。那么,第二网元接收到第一消息,则确定使用私网的密钥建立空口的用户面安全。Optionally, the second network element determines to use the key of the private network to establish the user plane security of the air interface according to the local configuration information. It can be understood as: if the local configuration information indicates that the second network element receives the message, it triggers an operation of using the private network key to establish the user plane security of the air interface. Then, when the second network element receives the first message, it determines to use the key of the private network to establish the user plane security of the air interface.
可选的,第二网元根据该终端设备对应的签约信息确定使用私网的密钥建立空口的用户面安全。可以理解为:若该终端设备对应的签约信息中表明,第二网元接收到该终端设备发送的消息,则触发使用私网的密钥建立该终端设备对应的空口的用户面安全的操作。那么,第二网元接收到该终端设备发送的第一消息,则确定使用私网的密钥建立空口的用户面安全。在这种方式中,签约信息与终端设备相对应,不同的终端设备可以对应有不同的签约信息。Optionally, the second network element determines to use the private network key to establish user plane security of the air interface according to the subscription information corresponding to the terminal device. It can be understood as: if the subscription information corresponding to the terminal device indicates that the second network element receives the message sent by the terminal device, it triggers the operation of using the private network key to establish the user plane security of the air interface corresponding to the terminal device. Then, after receiving the first message sent by the terminal device, the second network element determines to use the key of the private network to establish the user plane security of the air interface. In this manner, the subscription information corresponds to the terminal device, and different terminal devices may have different subscription information.
可能存在另一些终端设备的签约信息中表明,该终端设备发送的消息,不触发使用私网的密钥建立该终端设备对应的空口的用户面安全的操作。在这种情况下,在一种可能的实现方式中,第二网元将该第一消息转发给该第一网元,并指示第一网元将该第一消息转发给公网的控制面网元(例如,公网的AMF网元)。后续过程中,由公网的控制面网元对该第一消息进行下一步的处理。示例性的,在这种实现方式中,可以触发使用公网的密钥建立该终端设备对应的空口的用户面安全的操作。在又一种可能的实现方式中,响应于该第一消息,第二网元(可以通过第一网元发送)向终端设备反馈会话建立失败的消息,可选的,该反馈消息中可以包含创建失败的原因值(cause值)。由于不同的终端设备可以具备的功能不同,通过这种方式,具备不同功能的终端设备对第一消息可以采取不同的处理方式。It may be indicated in the subscription information of some other terminal devices that the message sent by the terminal device does not trigger the operation of using the key of the private network to establish the user plane security of the air interface corresponding to the terminal device. In this case, in a possible implementation manner, the second network element forwards the first message to the first network element, and instructs the first network element to forward the first message to the control plane of the public network A network element (for example, an AMF network element of the public network). In the subsequent process, the first message is processed by the network element of the control plane of the public network. Exemplarily, in this implementation manner, an operation of establishing user plane security for an air interface corresponding to the terminal device using a public network key may be triggered. In yet another possible implementation manner, in response to the first message, the second network element (which may be sent by the first network element) feeds back a message of session establishment failure to the terminal device. Optionally, the feedback message may include Cause value (cause value) of creation failure. Since different terminal devices may have different functions, in this manner, terminal devices with different functions may adopt different processing methods for the first message.
步骤d3:第二网元根据私网的密钥建立空口的用户面安全。Step d3: the second network element establishes user plane security of the air interface according to the key of the private network.
第二网元根据私网的密钥建立空口的用户面安全可以参照上述内容中步骤S104中的介绍,此处不再赘述。可选的,该第二网元可以存储有私网的密钥。可选的,第二网元可以从AAA服务器中获取私网的密钥。可选的,第二网元可以从存储有私网的密钥的另一网元中获取私网的密钥,或者私网的密钥的衍生密钥。For the user plane security of the air interface established by the second network element according to the key of the private network, reference may be made to the introduction in step S104 in the above content, which will not be repeated here. Optionally, the second network element may store a private network key. Optionally, the second network element may obtain the private network key from the AAA server. Optionally, the second network element may obtain the private network key or a derived key of the private network key from another network element storing the private network key.
参见图8,是本申请实施例中提供的又一种公私网业务的隔离方法的流程图。该方法可以基于图4所示的网络架构来实现。该方法包括以下步骤。Referring to FIG. 8 , it is a flow chart of another method for isolating public and private network services provided in the embodiment of the present application. This method can be implemented based on the network architecture shown in FIG. 4 . The method includes the following steps.
S301、终端设备发起注册流程。S301. The terminal device initiates a registration process.
在步骤S301中,接入网设备和公网之间的N2隧道建立的实现方式可以参照上述步骤S201中介绍的内容,此处不再赘述。In step S301, the implementation manner of establishing the N2 tunnel between the access network device and the public network can refer to the content introduced in the above step S201, and will not be repeated here.
需要说明的是,本申请实施例中的终端设备对应一份入网签约信息。示例性的,本申请实施例中的终端设备对应一张用户身份识别(subscriber identification module,SIM)卡,随着通信技术的演进,SIM卡还可以为内置芯片式用户身份识别(embedded-SIM,eSIM)卡,等等。举例而言,双卡双待的终端设备在本申请实施例中可以视为两个终端设备。It should be noted that the terminal device in the embodiment of the present application corresponds to a piece of network subscription information. Exemplarily, the terminal device in the embodiment of the present application corresponds to a subscriber identification module (SIM) card, and with the evolution of communication technology, the SIM card can also be a built-in chip subscriber identification (embedded-SIM, eSIM) card, etc. For example, a dual-card dual-standby terminal device may be regarded as two terminal devices in the embodiment of the present application.
S302、终端设备向接入网设备发送第四消息,该第四消息中包括第二连接建立请求。S302. The terminal device sends a fourth message to the access network device, where the fourth message includes the second connection establishment request.
示例性的,该第四消息可以为上行无线资源控制(radio resource control,RRC)消息。该第四消息用于触发公网和该终端设备之间的连接的建立。其中,该第四消息中可以包括第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的连接。其中,该公网和终端设备之间的连接可以为公网的NAS连接。该公网和终端设备之间的连接可以用来传输终端设备和公网的控制面网元(例如,AMF网元)之间交互的信令,该交互的信令可以包括建立(或者修改、删除)会话连接的相关信令,移动性管理的相关信令,等等。Exemplarily, the fourth message may be an uplink radio resource control (radio resource control, RRC) message. The fourth message is used to trigger establishment of a connection between the public network and the terminal device. Wherein, the fourth message may include a second connection establishment request, and the second connection establishment request is used to request establishment of a connection between the public network and the terminal device. Wherein, the connection between the public network and the terminal device may be a NAS connection of the public network. The connection between the public network and the terminal device may be used to transmit signaling interacted between the terminal device and a control plane network element (for example, an AMF network element) of the public network, and the interactive signaling may include establishing (or modifying, Delete) session connection related signaling, mobility management related signaling, and so on.
S303、在接入网设备接收来自终端设备的第四消息之后,接入网设备向公网的移动性管理网元发送第二连接建立请求。S303. After the access network device receives the fourth message from the terminal device, the access network device sends a second connection establishment request to the mobility management network element of the public network.
示例性的,接入网设备向公网的移动性管理网元发送该第二连接建立请求的过程可以为:Exemplarily, the process of the access network device sending the second connection establishment request to the mobility management network element of the public network may be:
步骤e1:接入网设备向私网的控制面设备发送该第二连接建立请求。Step e1: the access network device sends the second connection establishment request to the control plane device of the private network.
对应的,私网的控制面网元接收来自该终端设备的第二连接建立请求。Correspondingly, the control plane network element of the private network receives the second connection establishment request from the terminal device.
可选的,该第二连接建立请求承载在N2消息中,由于私网的控制面网元是RAN设备和公网的控制面网元(示例性的,AMF网元)的中继节点,会转发接收到的N2消息;因此,RAN设备通过N2隧道向公网的控制面网元发送的消息会由该私网的控制面网元转发。Optionally, the second connection establishment request is carried in the N2 message. Since the control plane network element of the private network is a relay node between the RAN device and the control plane network element (exemplary, AMF network element) of the public network, it will The received N2 message is forwarded; therefore, the message sent by the RAN device to the control plane network element of the public network through the N2 tunnel will be forwarded by the control plane network element of the private network.
步骤e2:私网的控制面网元向公网的移动性管理网元发送该第二连接建立请求。Step e2: the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
需要说明的是,在实际传输过程中,私网的控制面网元向公网的控制面网元发送的是,承载了该第二连接建立请求的N2消息。可选的,在私网的控制面网元向公网的移动性管理网元发送该第二连接建立请求之前,私网的控制面网元确定该N2消息对应于公网。It should be noted that, in the actual transmission process, what the control plane network element of the private network sends to the control plane network element of the public network is the N2 message carrying the second connection establishment request. Optionally, before the control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network, the control plane network element of the private network determines that the N2 message corresponds to the public network.
在一种可能的实现方式中,该N2消息中包含有第一指示标识,则表示该N2消息对应于公网。其中,该第一指示标识用于指示该N2消息对应于公网,也即是说,该私网的控制面网元无需处理该消息,仅需要转发该N2消息。在这种情况下,私网的控制面网元可以根据第一指示标识确定该N2消息对应于公网。In a possible implementation manner, the N2 message includes the first indication identifier, which indicates that the N2 message corresponds to the public network. Wherein, the first indication is used to indicate that the N2 message corresponds to the public network, that is, the control plane network element of the private network does not need to process the message, but only needs to forward the N2 message. In this case, the control plane network element of the private network may determine that the N2 message corresponds to the public network according to the first indicator.
在又一种可能的实现方式中,N2消息中未包含有第二指示标识,或者N2消息并不是特殊(或者称为特定、预设)形式的N2消息(specific N2Message),则表示该N2消息对应于公网。其中,第二指示标识,或者消息的特殊形式用于指示N2消息对应于私网,也即是说,该私网的控制面网元需要对该N2消息进行下一步的处理。示例性的,这种N2消息可以是后续内容中介绍的包含有第一连接建立请求的N2消息。在这种情况下,私网的控制面网元可以根据N2消息中未包含有第二指示标识,或者N2消息并不是特殊N2消息,确定该N2消息对应于公网。In yet another possible implementation, if the N2 message does not contain the second indicator, or the N2 message is not a special (or called a specific, preset) form of N2 message (specific N2Message), it means that the N2 message Corresponds to the public network. Wherein, the second indication identifier or the special form of the message is used to indicate that the N2 message corresponds to a private network, that is to say, the control plane network element of the private network needs to perform the next processing on the N2 message. Exemplarily, this kind of N2 message may be the N2 message including the first connection establishment request described in the subsequent content. In this case, the control plane network element of the private network may determine that the N2 message corresponds to the public network according to the fact that the N2 message does not include the second indicator, or the N2 message is not a special N2 message.
在又一种可能的实现方式,在步骤S301中,RAN设备发现的用于实现中继功能的私网的控制面网元(为了方便描述,称之为第一类私网的控制面网元)和后续步骤S306中RAN设备根据路由信息发现的私网的控制面网元(为了方面描述,称之为第二类私网的控制面网元)是不同的控制面网元。在这种情况下,第一类私网的控制面网元对于接收到的N2消息作转发处理,而第二类私网的控制面网元将响应于接收到的N2消息中的连接请求,进一步 建立私网和终端设备之间的连接。In yet another possible implementation, in step S301, the control plane network element of the private network discovered by the RAN device to implement the relay function (for the convenience of description, it is called the control plane network element of the first type of private network ) and the control plane network element of the private network discovered by the RAN device according to the routing information in the subsequent step S306 (for the sake of description, referred to as the control plane network element of the second type of private network) are different control plane network elements. In this case, the control plane network element of the first type of private network forwards the received N2 message, and the control plane network element of the second type of private network responds to the connection request in the received N2 message, Further establish the connection between the private network and the terminal device.
S304、在公网的移动性管理网元接收来自接入网设备的第二连接建立请求之后,公网的移动性管理网元根据该第二连接建立请求建立公网和该终端设备之间的连接。S304. After the mobility management network element of the public network receives the second connection establishment request from the access network device, the mobility management network element of the public network establishes a connection between the public network and the terminal device according to the second connection establishment request. connect.
可以理解的是,在公网的移动性管理网元建立了公网和该终端设备的连接之后,可以采用公网的密钥建立公网的NAS安全。也即是说,公网的移动性管理网元和终端设备基于公网的密钥,约定对应于公网的NAS控制面密钥。It can be understood that after the mobility management network element of the public network establishes the connection between the public network and the terminal device, the NAS security of the public network can be established by using the key of the public network. That is to say, based on the key of the public network, the mobility management network element and the terminal device of the public network agree on a key corresponding to the NAS control plane of the public network.
S305、终端设备向接入网设备发送第三消息,第三消息中包括第一连接建立请求。S305. The terminal device sends a third message to the access network device, where the third message includes the first connection establishment request.
示例性的,该第三消息可以为上行无线资源控制(radio resource control,RRC)消息。该第三消息用于触发私网和该终端设备之间的连接的建立。可选的,该第三消息包括第一连接建立请求和私网的控制面网元的路由信息,其中,该第一连接建立请求用于请求建立私网和该终端设备之间的连接,私网的控制面网元的路由信息用于发现该私网的控制面网元。Exemplarily, the third message may be an uplink radio resource control (radio resource control, RRC) message. The third message is used to trigger the establishment of the connection between the private network and the terminal device. Optionally, the third message includes a first connection establishment request and routing information of a control plane network element of the private network, where the first connection establishment request is used to request establishment of a connection between the private network and the terminal device, and the private network The routing information of the control plane network elements of the private network is used to discover the control plane network elements of the private network.
示例性的,私网和该终端设备之间的连接可以为私网的NAS连接。示例性的,第三消息可以包括第二指示信息、私网的控制面网元的路由信息以及第一连接建立请求。其中,第二指示信息用于指示接入网设备发现私网的控制面网元,该私网的控制面网元的路由信息用于发现该私网的控制面网元。Exemplarily, the connection between the private network and the terminal device may be a NAS connection of the private network. Exemplarily, the third message may include the second indication information, the routing information of the control plane network element of the private network, and the first connection establishment request. Wherein, the second indication information is used to instruct the access network device to discover the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control plane network element of the private network.
示例性的,第一连接建立请求可以是Initial UE NAS消息,或者是其他的新定义(或者称为特殊(specific)、特定或者预设)的NAS消息。若第一连接建立请求是Initial UE NAS消息,那么第三消息中还包括第三指示消息,该第三指示消息用于指示该Initial UE NAS消息对应于私网。若第一连接建立请求是其他新定义的NAS消息,那么这种新定义的NAS消息可以指示该NAS消息对应于私网。Exemplarily, the first connection establishment request may be an Initial UE NAS message, or other newly defined (or called specific, specific, or preset) NAS message. If the first connection establishment request is an Initial UE NAS message, then the third message also includes a third indication message, and the third indication message is used to indicate that the Initial UE NAS message corresponds to a private network. If the first connection establishment request is another newly defined NAS message, then this newly defined NAS message may indicate that the NAS message corresponds to a private network.
可选的,在终端设备向接入网设备发送第三消息之前,终端设备可以根据私网专用的DNN或者私网专用的NSSAI确定建立私网的NAS连接来传输私网的会话管理消息。示例性的,该私网专用的DNN或者私网专用的NSSAI可以包含在终端设备中预配置或者网络设备下发的策略信息中。Optionally, before the terminal device sends the third message to the access network device, the terminal device may determine to establish a private network NAS connection according to the private network-specific DNN or private network-specific NSSAI to transmit the private network session management message. Exemplarily, the private network-specific DNN or private network-specific NSSAI may be included in the policy information pre-configured in the terminal device or issued by the network device.
示例性的,该策略信息可以指示终端设备在注册到网络的过程中(示例性的,终端开机的时候),若策略信息中存在私网专用的DNN或者私网专用的NSSAI,则建立私网的NAS连接来传输私网的会话管理消息。在另一示例中,该策略消息可以指示终端设备在接收到网络设备下发的指示信息后,若策略信息中存在私网专用的DNN或者私网专用的NSSAI,则建立私网的NAS连接来传输私网的会话管理消息。需要说明的是,上述步骤S302和步骤S305的执行没有先后顺序,即可以先执行步骤S302,再执行步骤S305;也可以先执行步骤S305,再执行步骤S302。Exemplarily, the policy information may instruct the terminal device to establish a private network if there is a private network-specific DNN or a private network-specific NSSAI in the policy information during the process of registering the terminal device to the network (for example, when the terminal is powered on). NAS connection to transmit private network session management messages. In another example, the policy message may instruct the terminal device to establish a private network NAS connection to Transmit private network session management messages. It should be noted that the execution of the above step S302 and step S305 has no sequence, that is, step S302 may be executed first, and then step S305 may be executed; or step S305 may be executed first, and then step S302 may be executed.
S306、在接入网设备接收来自终端设备的第三消息之后,接入网设备根据第三消息发现私网的控制面网元,并向私网的控制面网元发送该第一连接建立请求。S306. After the access network device receives the third message from the terminal device, the access network device discovers the control plane network element of the private network according to the third message, and sends the first connection establishment request to the control plane network element of the private network .
其中,该私网的控制面网元用于建立私网与该终端设备之间的连接。需要说明的是,在S306中接入网设备发现的私网的控制面网元,与终端设备在注册过程中,接入网设备发现的私网的控制面网元可以相同,也可以不同。Wherein, the control plane network element of the private network is used to establish a connection between the private network and the terminal device. It should be noted that the control plane network element of the private network discovered by the access network device in S306 may be the same as or different from the control plane network element of the private network discovered by the access network device during the registration process of the terminal device.
可选的,该第一连接建立请求承载在N2消息中。Optionally, the first connection establishment request is carried in an N2 message.
S307、在私网的控制面网元接收来自接入网设备的第一连接建立请求之后,该私网的控制面网元根据第一连接建立请求建立私网和该终端设备之间的连接。S307. After the control plane network element of the private network receives the first connection establishment request from the access network device, the control plane network element of the private network establishes a connection between the private network and the terminal device according to the first connection establishment request.
其中,该私网和终端设备之间的连接可以用来传输终端设备和私网的控制面网元(示例性的,可以是L-CP网元)之间交互的信令,该交互的信令可以包括建立(或者修改、删除) 会话连接的相关信令,等等。例如,该私网和终端设备之间的连接可以用来S308中的第一消息。可选的,在私网的控制面网元根据该第一连接建立请求建立私网和该终端设备之间的连接之前,私网的控制面网元确定承载该第一连接建立请求的N2消息对应于私网。需要说明的是,确定的方法可以参照上述步骤e2中的介绍,简而言之,私网的控制面网元确定该N2消息不对应公网,则可以确定该N2消息对应于私网。或者,步骤S307中的私网的控制面网元为上述步骤e2中介绍的第二类私网的控制面网元。Wherein, the connection between the private network and the terminal device may be used to transmit the signaling interacted between the terminal device and the control plane network element of the private network (for example, it may be an L-CP network element). The signaling may include related signaling for establishing (or modifying, deleting) a session connection, and so on. For example, the connection between the private network and the terminal device may be used for the first message in S308. Optionally, before the control plane network element of the private network establishes the connection between the private network and the terminal device according to the first connection establishment request, the private network control plane network element determines the N2 message carrying the first connection establishment request Corresponds to the private network. It should be noted that the determination method can refer to the introduction in the above step e2. In short, if the control plane network element of the private network determines that the N2 message does not correspond to the public network, it can determine that the N2 message corresponds to the private network. Alternatively, the control plane network element of the private network in step S307 is the control plane network element of the second type of private network introduced in the above step e2.
可以理解的是,在私网的控制面网元建立了私网和该终端设备的连接之后,可以采用私网的密钥建立私网的NAS安全。也即是说,私网的控制面网元和终端设备基于私网的密钥,约定对应于私网的NAS控制面密钥。It can be understood that after the control plane network element of the private network establishes the connection between the private network and the terminal device, the NAS security of the private network can be established by using the key of the private network. That is to say, the control plane network elements and terminal devices of the private network agree on the NAS control plane key corresponding to the private network based on the private network key.
S308、终端设备通过私网和该终端设备之间的连接向私网的控制面网元发送第一消息。S308. The terminal device sends the first message to the control plane network element of the private network through the connection between the private network and the terminal device.
其中,该第一消息的介绍可以参照上述图5或者图7对应的实施例中有关第一消息的介绍,此处不再赘述。For the introduction of the first message, reference may be made to the introduction of the first message in the above embodiment corresponding to FIG. 5 or FIG. 7 , which will not be repeated here.
需要说明的是,在终端设备通过私网和该终端设备之间的连接向私网的控制面网元发送第一消息的过程中,可以由接入网设备对该第一消息进行转发。It should be noted that, during the process of the terminal device sending the first message to the control plane network element of the private network through the connection between the private network and the terminal device, the first message may be forwarded by the access network device.
S309、在私网的控制面网元通过私网和该终端设备之间的连接接收来自该终端设备的第一消息之后,私网的控制面网元根据私网和该终端设备之间的连接确定第一消息中的会话建立请求对应于私网。S309. After the control plane network element of the private network receives the first message from the terminal device through the connection between the private network and the terminal device, the control plane network element of the private network according to the connection between the private network and the terminal device It is determined that the session establishment request in the first message corresponds to a private network.
也即是说,若私网的控制面网元确定该会话建立请求是通过私网和终端设备之间的连接发送的,则私网的控制面网元确定该会话建立请求对应于私网。That is to say, if the control plane network element of the private network determines that the session establishment request is sent through the connection between the private network and the terminal device, then the control plane network element of the private network determines that the session establishment request corresponds to the private network.
示例性的,私网的控制面网元可以根据第一消息中的第一参数、第二参数、本地配置信息或者该终端设备对应的签约信息中的一项或者多项,确定第一消息中的会话建立请求对应于私网或确定使用该私网的密钥建立空口的用户面安全。需要说明的是,确定的会话建立请求对应于私网的方式可以参照上述S206中的介绍,确定使用私网的密钥建立空口的用户面安全可以参考上述S207中的介绍,此处不再赘述。Exemplarily, the control plane network element of the private network may determine one or more items of the first parameter in the first message, the second parameter, local configuration information, or the subscription information corresponding to the terminal device in the first message. The session establishment request corresponds to the private network or determines to use the key of the private network to establish the user plane security of the air interface. It should be noted that, for the method of determining that the session establishment request corresponds to the private network, refer to the introduction in S206 above, and for determining the user plane security of the air interface using the key of the private network, refer to the introduction in S207 above, which will not be repeated here. .
S310、私网的控制面网元根据私网的密钥建立空口的用户面安全。S310. The control plane network element of the private network establishes user plane security of the air interface according to the key of the private network.
具体的,私网的控制面网元根据私网的密钥建立空口的用户面安全的方式可以参照上述步骤S104中的介绍,此处不再赘述。Specifically, the manner in which the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network may refer to the introduction in the above step S104 , which will not be repeated here.
需要说明的是,在上述实施例中,终端设备分别建立了与公网的连接以及与私网的连接。在这种情况下,终端设备可以获取私网的根密钥和公网的根密钥,该私网的根密钥与公网的根密钥不同,该终端设备可以根据私网的根密钥生成私网的用户面密钥,根据公网的根密钥生成公网的用户面密钥。It should be noted that, in the foregoing embodiments, the terminal device respectively establishes a connection with the public network and a connection with the private network. In this case, the terminal device can obtain the root key of the private network and the root key of the public network. The root key of the private network is different from the root key of the public network. The user plane key of the private network is generated using the key, and the user plane key of the public network is generated according to the root key of the public network.
在一些实施例中,私网的控制面网元包括第一网元和第二网元,或者,第一网元和第二网元为独立的两个网元;第一网元和第二网元共同实现该私网的控制面网元所实现的功能。In some embodiments, the control plane network elements of the private network include a first network element and a second network element, or, the first network element and the second network element are two independent network elements; the first network element and the second network element The network elements jointly realize the functions realized by the network elements of the control plane of the private network.
在这种实施例中,私网的控制面网元接收和/或来自其他设备的消息,或者向其他设备转发消息的功能,或者建立私网与终端设备的连接可以由第一网元来实现。实现管理私网业务会话的功能可以由第二网元来实现。对应于上述介绍的实施例,步骤e1中的操作可以为:接入网设备向第一网元发送该第二连接建立请求,相应的,第一网元接收来自该接入网设备的第二连接建立请求。步骤S306的操作可以为:接入网设备根据第一消息发现第一网元,并向该第一网元发送该第一连接建立请求,相应的,第一网元接收来自接入网设备的第一连接建立请求,第一消息包括会话建立请求。步骤S308的操作可以为:终端设备通过私网和该终端 设备之间的连接向第一网元发送第一消息,相应的,第一网元通过私网和该终端设备之间的连接接收来自该终端设备的第一消息。另外,步骤e2、步骤S307的执行主体可以为第一网元。In this embodiment, the function of the control plane network element of the private network to receive and/or receive messages from other devices, or to forward messages to other devices, or to establish a connection between the private network and the terminal device can be implemented by the first network element . The function of managing private network service sessions may be implemented by the second network element. Corresponding to the embodiment described above, the operation in step e1 may be: the access network device sends the second connection establishment request to the first network element, and correspondingly, the first network element receives the second connection establishment request from the access network device Connection establishment request. The operation of step S306 may be: the access network device discovers the first network element according to the first message, and sends the first connection establishment request to the first network element, and correspondingly, the first network element receives the first network element from the access network device A first connection establishment request, where the first message includes a session establishment request. The operation of step S308 may be: the terminal device sends the first message to the first network element through the connection between the private network and the terminal device, and correspondingly, the first network element receives the message from the terminal device through the connection between the private network and the terminal device. The first message for this end device. In addition, the execution subject of step e2 and step S307 may be the first network element.
步骤S310的执行方式可以参照以下流程:The execution method of step S310 can refer to the following process:
步骤f1:在第一网元确定会话建立请求对应于私网的情况下,第一网元将该第一消息转发给第二网元。可选的,第一网元可以直接将通过私网和该终端设备之间的连接接收到的第一消息转发给第二网元。Step f1: When the first network element determines that the session establishment request corresponds to a private network, the first network element forwards the first message to the second network element. Optionally, the first network element may directly forward the first message received through the connection between the private network and the terminal device to the second network element.
示例性的,若第一网元确定该会话建立请求是通过私网和终端设备之间的连接发送的,则第一网元确定该会话建立请求对应于私网。步骤f2:第二网元根据第一消息中的第一参数、第二参数、本地配置信息或者该终端设备对应的签约信息中的一项或者多项,确定使用私网的密钥建立空口的用户面安全。Exemplarily, if the first network element determines that the session establishment request is sent through the connection between the private network and the terminal device, the first network element determines that the session establishment request corresponds to the private network. Step f2: According to one or more items of the first parameter, the second parameter, the local configuration information in the first message, or the subscription information corresponding to the terminal device, the second network element determines to use the key of the private network to establish the air interface. User plane security.
需要说明的是,步骤f2的实现方式可以参照上述内容中步骤d2的介绍,此处不再赘述。It should be noted that the implementation of step f2 can refer to the introduction of step d2 in the above content, and will not be repeated here.
步骤f3:第二网元根据私网的密钥建立空口的用户面安全。Step f3: the second network element establishes user plane security of the air interface according to the key of the private network.
第二网元根据私网的密钥建立空口的用户面安全可以参照上述内容中的介绍,此处不再赘述。可选的,该第二网元可以存储有私网的密钥。可选的,第二网元可以从AAA服务器中获取私网的密钥。可选的,第二网元可以从存储有私网的密钥的另一网元中获取私网的密钥,或者私网的密钥的衍生密钥。The user plane security of the air interface established by the second network element according to the key of the private network can refer to the introduction in the above content, and will not be repeated here. Optionally, the second network element may store a private network key. Optionally, the second network element may obtain the private network key from the AAA server. Optionally, the second network element may obtain the private network key or a derived key of the private network key from another network element storing the private network key.
需要说明的是,图7和图8所对应的实施例中的步骤的执行方式,均可参照图5所对应的实施例的介绍。另外,本申请的各实施方式可以进行组合,以实现不同的技术效果。例如,图5对应的实施例中的各个可能的实现方式,在与图7和图8对应的实施例不冲突的前提下,都可以应用在图7和图8对应的实施例以及该实施例对应的可能的实现方式中。It should be noted that, for the execution manners of the steps in the embodiments corresponding to FIG. 7 and FIG. 8 , reference may be made to the introduction of the embodiment corresponding to FIG. 5 . In addition, various implementation modes of the present application can be combined to achieve different technical effects. For example, each possible implementation in the embodiment corresponding to FIG. 5 can be applied to the embodiment corresponding to FIG. 7 and FIG. 8 and this embodiment on the premise that it does not conflict with the embodiment corresponding to FIG. corresponding possible implementations.
上述本申请提供的实施例中,分别从私网的控制面网元、终端设备、接入网设备和公网的移动性管理网元等设备之间交互的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,私网的控制面网元、终端设备、接入网设备和公网的移动性管理网元可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。In the above-mentioned embodiments provided by the present application, the method provided in the embodiments of the present application is carried out from the perspective of interaction between the control plane network elements, terminal devices, access network devices, and public network mobility management network elements of the private network. introduced. In order to realize the various functions in the method provided by the above-mentioned embodiments of the present application, the control plane network elements, terminal devices, access network devices of the private network, and the mobility management network elements of the public network may include hardware structures, software modules, and hardware structure , software modules, or hardware structure plus software modules to realize the above functions. A certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。The following describes the devices used to implement the above methods in the embodiments of the present application with reference to the accompanying drawings. Therefore, all the content above can be used in subsequent embodiments, and repeated content will not be repeated.
参见图9,是本申请实施例提供的一种通信装置900的结构示意图,该通信装置900可以对应实现上述各个方法实施例中由私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元所实现的功能或者步骤。Referring to FIG. 9 , it is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application. The communication device 900 can correspond to the control plane network element, terminal device, access network device or The functions or steps implemented by the mobility management network element of the public network.
该通信装置900可以包括收发单元901或处理单元902。可选地,还可以包括存储单元,该存储单元可以用于存储指令(代码或者程序)和/或数据。收发单元901或处理单元902可以与该存储单元耦合,例如,处理单元902可以读取存储单元中的指令(代码或者程序)或/或数据,以实现相应的方法。上述各个单元可以独立设置,也可以部分或者全部集成。可选地,收发单元901可以包括发送单元或接收单元,发送单元用于执行发送操作,接收单元用于执行接收操作。The communication device 900 may include a transceiver unit 901 or a processing unit 902 . Optionally, a storage unit may also be included, and the storage unit may be used to store instructions (code or program) and/or data. The transceiver unit 901 or the processing unit 902 may be coupled with the storage unit, for example, the processing unit 902 may read instructions (code or program) or/or data in the storage unit to implement a corresponding method. Each of the above units can be set independently, or can be partially or fully integrated. Optionally, the transceiving unit 901 may include a sending unit or a receiving unit, the sending unit is configured to perform a sending operation, and the receiving unit is configured to perform a receiving operation.
应理解,处理单元902可以是处理器或控制器,例如可以是通用中央处理器(central processing unit,CPU),通用处理器,数字信号处理(digital signal processing,DSP),专用集 成电路(application specific integrated circuits,ASIC),现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,单元或电路。该处理器也可以是实现计算功能的组合,例如包括一个或多个微处理器组合,DSP或微处理器的组合等等。收发单元901是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,收发单元901是该芯片用于从其它芯片或装置接收信号的接口电路,或者,是该芯片用于向其它芯片或装置发送信号的接口电路。It should be understood that the processing unit 902 may be a processor or a controller, such as a general-purpose central processing unit (central processing unit, CPU), a general-purpose processor, digital signal processing (digital signal processing, DSP), an application specific integrated circuit (application specific integrated circuits, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may realize or execute various exemplary logical blocks, units or circuits described in connection with the disclosure of this application. The processor may also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of DSP or microprocessors, and the like. The transceiver unit 901 is an interface circuit of the device for receiving signals from other devices. For example, when the device is implemented as a chip, the transceiver unit 901 is an interface circuit for the chip to receive signals from other chips or devices, or an interface circuit for the chip to send signals to other chips or devices.
该通信装置900可以为上述实施例中的私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元私网的控制面网元、终端设备或、接入网设备或公网的移动性管理网元,还可以为用于私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元私网的控制面网元、终端设备或、接入网设备或公网的移动性管理网元的芯片。The communication device 900 may be a control plane network element, a terminal device, or an access network device of a private network or a mobility management network element of a public network in the above embodiments. A control plane network element, a terminal device, or an access network of a private network The device or the mobility management network element of the public network can also be the control plane network element, terminal device, and access network device used for the private network or the mobility management network element of the public network. The control plane network element and terminal device of the private network Or, a chip of an access network device or a mobility management network element of a public network.
例如,当通信装置900为私网的控制面网元、终端设备或、接入网设备或公网的移动性管理网元时,处理单元902例如可以是处理器,收发单元901例如可以是收发器。可选地,该收发器可以包括射频电路或者输入输出接口,该存储单元例如可以是存储器。例如,当通信装置900为用于私网的控制面网元、终端设备或、接入网设备或公网的移动性管理网元的芯片时,处理单元902例如可以是处理器,收发单元901例如可以是输入/输出接口、管脚或电路等。处理单元902可执行存储单元存储的计算机执行指令,可选地,该存储单元为该芯片内的存储单元,如寄存器、缓存等,该存储单元还可以是该私网的控制面网元、终端设备或、接入网设备或公网的移动性管理网元内的位于该芯片外部的存储单元,如只读存储器(read-only memory,ROM)或可存储静态信息或指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。For example, when the communication device 900 is a control plane network element of a private network, a terminal device, or an access network device or a mobility management network element of a public network, the processing unit 902 may be, for example, a processor, and the transceiver unit 901 may be, for example, a transceiver device. Optionally, the transceiver may include a radio frequency circuit or an input/output interface, and the storage unit may be, for example, a memory. For example, when the communication device 900 is a chip used for a control plane network element of a private network, a terminal device, or an access network device or a mobility management network element of a public network, the processing unit 902 may be a processor, for example, and the transceiver unit 901 For example, it may be an input/output interface, a pin, or a circuit. The processing unit 902 can execute the computer-executed instructions stored in the storage unit. Optionally, the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit can also be a control plane network element or a terminal of the private network. A storage unit located outside the chip within a device or an access network device or a mobility management network element of the public network, such as a read-only memory (ROM) or other types of static memory that can store static information or instructions Storage device, random access memory (random access memory, RAM), etc.
在一些实施例中,通信装置900能够对应实现上述方法实施例中私网的控制面网元(或者称为L-SMF)的行为和功能。例如通信装置900可以为私网的控制面网元,也可以为应用于私网的控制面网元中的部件(例如芯片或者电路)。In some embodiments, the communication device 900 can correspondingly realize the behavior and function of the control plane network element (or called L-SMF) of the private network in the above method embodiments. For example, the communication device 900 may be a control plane network element of the private network, or may be a component (such as a chip or a circuit) applied to the control plane network element of the private network.
其中,收发单元901可以用于支持私网的控制面网元与其他网络实体的通信,例如支持私网的控制面网元与图4-图8所示的公网的移动性管理网元、接入网设备、终端设备等之间的通信。处理单元902用于对私网的控制面网元的动作进行控制管理,例如处理单元902用于支持私网的控制面网元执行如图4-图8中私网的控制面网元除收发之外的操作。Wherein, the transceiver unit 901 can be used to support the communication between the control plane network element of the private network and other network entities, for example, support the control plane network element of the private network and the mobility management network element of the public network shown in FIGS. 4-8 , Communication between access network devices, terminal devices, etc. The processing unit 902 is used to control and manage the actions of the control plane network elements of the private network. For example, the processing unit 902 is used to support the control plane network elements of the private network to execute the transmission and reception of the control plane network elements of the private network as shown in Figures 4-8. other operations.
具体的,处理单元902,用于获取该私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全。示例性的,处理单元902所执行的操作可以参照上述图5所示方法中步骤S101的介绍。Specifically, the processing unit 902 is configured to obtain the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, the root key of the private network The key is different from the root key of the public network. The key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step S101 in the method shown in FIG. 5 above.
收发单元901,用于接收来自终端设备的第一消息,该第一消息包括会话建立请求。示例性的,收发单元901所执行的操作可以参照上述图5所示方法中步骤S102的介绍。The transceiving unit 901 is configured to receive a first message from a terminal device, where the first message includes a session establishment request. Exemplarily, for operations performed by the transceiving unit 901, reference may be made to the introduction of step S102 in the method shown in FIG. 5 above.
处理单元902,还用于确定该会话建立请求对应于该私网。示例性的,处理单元902所执行的操作可以参照上述图5所示方法中步骤S103的介绍。The processing unit 902 is further configured to determine that the session establishment request corresponds to the private network. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step S103 in the method shown in FIG. 5 above.
处理单元902,还用于根据该私网的密钥建立该空口的用户面安全。示例性的,处理单元902所执行的操作可以参照上述图5所示方法中步骤S104的介绍。The processing unit 902 is further configured to establish user plane security of the air interface according to the private network key. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step S104 in the method shown in FIG. 5 above.
在一种可能的实现方式中,收发单元901还用于:接收来自该公网的移动性管理网元的该公网的非接入层NAS密钥;使用该公网的NAS密钥解析该第一消息,以获得该会话建立请求。In a possible implementation manner, the transceiver unit 901 is further configured to: receive the non-access stratum NAS key of the public network from the mobility management network element of the public network; use the NAS key of the public network to resolve the The first message to get the session establishment request.
在一种可能的实现方式中,收发单元901具体用于:接收来自该公网的移动性管理网元的第二消息,该第二消息包括第二信息和该公网的NAS密钥,该第二信息用于指示授予该私网的控制面网元使用该公网的NAS密钥的权限。In a possible implementation manner, the transceiving unit 901 is specifically configured to: receive a second message from a mobility management network element of the public network, where the second message includes second information and a NAS key of the public network, the The second information is used to indicate the authority granted to the control plane network element of the private network to use the NAS key of the public network.
在一种可能的实现方式中,该第一消息包括第一信息,该第一信息用于指示该会话建立请求对应于该私网,处理单元902具体用于:根据该第一信息确定该会话建立请求对应于该私网。In a possible implementation manner, the first message includes first information, and the first information is used to indicate that the session establishment request corresponds to the private network, and the processing unit 902 is specifically configured to: determine the session The establishment request corresponds to the private network.
在一种可能的实现方式中,收发单元901具体用于:通过该私网和该终端设备之间的第一连接接收来自该终端设备的第一消息;处理单元902具体用于:根据该第一连接确定该会话建立请求对应于该私网。In a possible implementation manner, the transceiver unit 901 is specifically configured to: receive the first message from the terminal device through the first connection between the private network and the terminal device; the processing unit 902 is specifically configured to: A connection determines that the session establishment request corresponds to the private network.
在一种可能的实现方式中,收发单元901,还用于接收来自终端设备的第一连接建立请求,该第一连接建立请求用于请求建立该第一连接;处理单元902,还用于根据该第一连接建立请求,建立该第一连接;收发单元901,还用于接收来自该终端设备的第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;收发单元901,还用于向该公网的移动性管理网元发送该第二连接建立请求。In a possible implementation manner, the transceiver unit 901 is further configured to receive a first connection establishment request from the terminal device, where the first connection establishment request is used to request establishment of the first connection; the processing unit 902 is further configured to The first connection establishment request is to establish the first connection; the transceiver unit 901 is also configured to receive a second connection establishment request from the terminal device, and the second connection establishment request is used to request to establish a connection between the public network and the terminal device the second connection; the transceiver unit 901 is further configured to send the second connection establishment request to the mobility management network element of the public network.
在一种可能的实现方式中,处理单元902具体用于:根据该私网的密钥生成安全参数;收发单元901还用于:向该终端设备和/或接入网设备发送该安全参数,该安全参数用于该终端设备和/或该接入网设备生成空口的用户面密钥。In a possible implementation manner, the processing unit 902 is specifically configured to: generate a security parameter according to the key of the private network; the transceiver unit 901 is also configured to: send the security parameter to the terminal device and/or access network device, The security parameter is used for the terminal device and/or the access network device to generate an air interface user plane key.
在一种可能的实现方式中,该私网的控制面网元存储有该私网的密钥;或者,处理单元902具体用于:从认证、授权和计费AAA服务器中获取该私网的密钥。In a possible implementation manner, the control plane network element of the private network stores the key of the private network; or, the processing unit 902 is specifically configured to: obtain the key of the private network from an authentication, authorization and accounting AAA server key.
这种实施例所示的私网的控制面网元的各个单元执行的操作可以参照上述图4-图8对应的方法实施例中私网的控制面网元的相关内容,此处不再详述。上述各个单元可以以硬件,软件或者软硬件结合的方式来实现。在一个实施例中,上述内容中的收发单元901以及处理单元902的功能可以由通信装置900中的一个或多个处理器来实现。通过这种通信装置,建立空口的用户面安全的密钥与建立该空口的控制面安全的密钥不同,用户面安全的建立更加独立,可以提升业务的安全性。The operations performed by each unit of the control plane network element of the private network shown in this embodiment can refer to the relevant content of the control plane network element of the private network in the above method embodiment corresponding to Figure 4-Figure 8, and will not be detailed here. stated. Each of the above units may be implemented in hardware, software or a combination of software and hardware. In one embodiment, the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 . With this communication device, the key for establishing the security of the user plane of the air interface is different from the key for establishing the security of the control plane of the air interface, and the establishment of security of the user plane is more independent, which can improve the security of services.
在另一些实施例中,通信装置900能够对应实现上述方法实施例中终端设备的行为和功能。例如通信装置900可以为终端设备,也可以为应用于终端设备中的部件(例如芯片或者电路)。In other embodiments, the communications apparatus 900 can correspondingly implement the behavior and functions of the terminal device in the foregoing method embodiments. For example, the communication apparatus 900 may be a terminal device, or may be a component (such as a chip or a circuit) applied in the terminal device.
其中,收发单元901可以用于支持终端设备与其他网络实体的通信,例如支持终端设备与图4-图8所示的私网的控制面网元、接入网设备、公网的移动性管理网元等之间的通信。处理单元902用于对终端设备的动作进行控制管理,例如处理单元902用于支持终端设备执行图4-图8中终端设备除收发之外的操作。Among them, the transceiver unit 901 can be used to support the communication between the terminal device and other network entities, for example, support the mobility management between the terminal device and the control plane network element of the private network, the access network device, and the public network shown in Fig. 4-8 Communication between network elements, etc. The processing unit 902 is used to control and manage the actions of the terminal device, for example, the processing unit 902 is used to support the terminal device to perform operations of the terminal device in FIGS. 4-8 except for sending and receiving.
具体的,收发单元901,用于向私网的控制面网元发送第一消息,该第一消息包括对应于该私网的会话建立请求。示例性的,收发单元901所执行的操作可以参照上述图8所示方法中的步骤S308中的介绍。Specifically, the transceiver unit 901 is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment request corresponding to the private network. Exemplarily, for operations performed by the transceiving unit 901, reference may be made to the introduction in step S308 in the method shown in FIG. 8 above.
处理单元902,用于根据该私网的密钥建立空口的用户面安全;其中,该私网的根密钥与公网的根密钥不同,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的密钥用于该空口的用户面安全,该公网的根密钥用于该空口的控制面安全。示例性的,处理单元902所执行的操作可以参照上述图6所示方法中的步骤b5的介绍。The processing unit 902 is configured to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the root of the private network The key or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface. Exemplarily, for the operations performed by the processing unit 902, reference may be made to the introduction of step b5 in the method shown in FIG. 6 above.
在一种可能的实现方式中,收发单元901还用于:向该私网的控制面网元发送第一连接 建立请求,该第一连接建立请求用于请求建立该私网和该终端设备之间的第一连接;其中,该终端设备和该公网之间存在第二连接。In a possible implementation manner, the transceiver unit 901 is further configured to: send a first connection establishment request to the control plane network element of the private network, where the first connection establishment request is used to request establishment of a connection between the private network and the terminal device. The first connection between; wherein, there is a second connection between the terminal device and the public network.
在一种可能的实现方式中,收发单元901还用于向该公网的移动性管理网元发送第二连接建立请求,该第二连接建立请求用于请求建立该公网和该终端设备之间的第二连接;处理单元902,还用于根据该公网的根密钥生成空口的控制面密钥。In a possible implementation manner, the transceiver unit 901 is further configured to send a second connection establishment request to the mobility management network element of the public network, where the second connection establishment request is used to request to establish a connection between the public network and the terminal device. The second connection among them; the processing unit 902 is further configured to generate an air interface control plane key according to the root key of the public network.
在一种可能的实现方式中,收发单元901还用于接收来自该私网的控制面网元的安全参数;处理单元902,具体用于根据该安全参数和该私网的密钥生成空口的用户面密钥;根据该空口的用户面密钥建立该空口的用户面安全。In a possible implementation manner, the transceiver unit 901 is further configured to receive security parameters from the control plane network element of the private network; the processing unit 902 is specifically configured to generate the security parameter of the air interface according to the security parameters and the key of the private network. User plane key: establish the user plane security of the air interface according to the user plane key of the air interface.
这种实施例所示的终端设备的各个单元执行的操作可以参照上述图4-图8对应的方法实施例中终端设备的相关内容,此处不再详述。上述各个单元可以以硬件,软件或者软硬件结合的方式来实现。在一个实施例中,上述内容中的收发单元901以及处理单元902的功能可以由通信装置900中的一个或多个处理器来实现。通过这种通信装置,可以建立私网和该终端设备之间的连接,且可以根据私网的根密钥生成空口的用户面密钥;从而可以实现公网和私网业务安全隔离,提升私网业务的安全性。For the operations performed by each unit of the terminal device shown in this embodiment, reference may be made to the relevant content of the terminal device in the above method embodiments corresponding to FIGS. 4-8 , which will not be described in detail here. Each of the above units may be implemented in hardware, software or a combination of software and hardware. In one embodiment, the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 . Through this communication device, the connection between the private network and the terminal device can be established, and the user plane key of the air interface can be generated according to the root key of the private network; thus, the security isolation of the public network and the private network can be realized, and the private network can be improved. security of network services.
在另一些实施例中,通信装置900能够对应实现上述方法实施例中接入网设备的行为和功能。例如通信装置900可以为接入网设备,也可以为应用于接入网设备中的部件(例如芯片或者电路)。In some other embodiments, the communications apparatus 900 can correspondingly implement the behaviors and functions of the access network device in the foregoing method embodiments. For example, the communication apparatus 900 may be an access network device, or may be a component (such as a chip or a circuit) applied in the access network device.
其中,收发单元901可以用于支持接入网设备与其他网络实体的通信,例如支持接入网设备与图4-图8所示的私网的控制面网元、公网的移动性管理网元、终端设备等之间的通信。处理单元902用于对接入网设备的动作进行控制管理,例如处理单元902用于支持接入网设备执行图4-图8中接入网设备除收发之外的操作。Among them, the transceiver unit 901 can be used to support the communication between the access network equipment and other network entities, for example, support the communication between the access network equipment and the control plane network elements of the private network and the mobility management network of the public network shown in FIG. 4-FIG. Communication between elements, terminal devices, etc. The processing unit 902 is used to control and manage the actions of the access network device, for example, the processing unit 902 is used to support the access network device to perform operations of the access network device in Figures 4-8 except for sending and receiving.
具体的,收发单元901,用于接收来自终端设备的第三消息,该第三消息包括第一连接建立请求,该第一连接建立请求用于请求建立私网和该终端设备之间的第一连接。示例性的,收发单元901所执行的操作可以参照上述图8所示方法中的步骤S305中的介绍。Specifically, the transceiver unit 901 is configured to receive a third message from the terminal device, where the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device. connect. Exemplarily, for operations performed by the transceiving unit 901, reference may be made to the introduction in step S305 in the method shown in FIG. 8 above.
处理单元902,用于根据该第三消息发现私网的控制面网元,该私网的控制面网元用于建立该第一连接。示例性的,收发单元901所执行的操作可以参照上述图8所示方法中的步骤S306中的介绍。The processing unit 902 is configured to discover a control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection. Exemplarily, for operations performed by the transceiving unit 901, reference may be made to the introduction in step S306 in the method shown in FIG. 8 above.
收发单元901,还用于向该私网的控制面网元发送该第一连接建立请求。示例性的,收发单元901所执行的操作可以参照上述图8所示方法中的步骤S306中的介绍。The transceiver unit 901 is further configured to send the first connection establishment request to the control plane network element of the private network. Exemplarily, for operations performed by the transceiving unit 901, reference may be made to the introduction in step S306 in the method shown in FIG. 8 above.
在一种可能的实现方式中,收发单元901还用于接收来自该终端设备的第四消息,该第四消息包括第二连接建立请求,该第二连接建立请求用于请求建立公网和该终端设备之间的第二连接;收发单元901还用于根据该第四消息向该公网的移动性管理网元发送该第二连接建立请求。In a possible implementation manner, the transceiver unit 901 is further configured to receive a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment request is used to request establishment of the public network and the The second connection between terminal devices; the transceiving unit 901 is further configured to send the second connection establishment request to the mobility management network element of the public network according to the fourth message.
在一种可能的实现方式中,该第三消息包括该私网的控制面网元的路由信息,该私网的控制面网元的路由信息用于发现该私网的控制面网元。In a possible implementation manner, the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control plane network element of the private network.
这种实施例所示的接入网设备的各个单元执行的操作可以参照上述图4-图8对应的方法实施例中接入网设备的相关内容,此处不再详述。上述各个单元可以以硬件,软件或者软硬件结合的方式来实现。在一个实施例中,上述内容中的收发单元901以及处理单元902的功能可以由通信装置900中的一个或多个处理器来实现。通过这种通信装置,可以根据第三消息发现私网的控制面网元,并向该私网的控制面网元发送用于请求建立私网和该终端设备之 间的连接的第一连接建立请求,进而触发建立私网与终端设备之间的连接,可以实现公网和私网业务安全隔离,提升私网业务的安全性。For the operations performed by each unit of the access network device shown in this embodiment, reference may be made to the relevant content of the access network device in the above method embodiments corresponding to FIGS. 4-8 , which will not be described in detail here. Each of the above units may be implemented in hardware, software or a combination of software and hardware. In one embodiment, the functions of the transceiver unit 901 and the processing unit 902 in the above content may be implemented by one or more processors in the communication device 900 . Through this communication device, the control plane network element of the private network can be discovered according to the third message, and the first connection establishment request for establishing a connection between the private network and the terminal device can be sent to the control plane network element of the private network. request, and then trigger the establishment of a connection between the private network and the terminal device, which can realize the security isolation of public network and private network services and improve the security of private network services.
参见图10,是本申请实施例提供的一种通信装置1000的结构示意图。其中,通信装置1000可以是私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元,能够实现本申请实施例提供的方法中私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元的功能或者步骤。其中,该通信装置1000可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。Referring to FIG. 10 , it is a schematic structural diagram of a communication device 1000 provided by an embodiment of the present application. Wherein, the communication device 1000 may be a control plane network element of a private network, a terminal device, an access network device, or a mobility management network element of a public network, and can implement the control plane network element of a private network, Functions or steps of terminal equipment, access network equipment or mobility management network elements of the public network. Wherein, the communication device 1000 may be a system on a chip. In the embodiment of the present application, the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
通信装置1000包括至少一个处理器1002,处理器1002可以是一个CPU,微处理器,ASIC,或一个或多个用于控制本申请方案程序执行的集成电路,用于实现或用于支持通信装置1000实现本申请实施例提供的方法中私网的控制面网元、终端设备、接入网设备或公网的移动性管理网元的功能。具体参见方法示例中的详细描述,此处不做赘述。The communication device 1000 includes at least one processor 1002, and the processor 1002 may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits used to control the program execution of the program of this application, for implementing or supporting the communication device 1000 realizes the functions of the control plane network element of the private network, the terminal device, the access network device or the mobility management network element of the public network in the method provided by the embodiment of the present application. For details, refer to the detailed description in the method example, and details are not repeated here.
通信装置1000还可以包括至少一个存储器1001,用于存储程序指令和/或数据。存储器1001和处理器1002耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1002可能和存储器1001协同操作。处理器1002可能执行存储器1001中存储的程序指令和/或数据,以使得通信装置1000实现相应的方法。该至少一个存储器中的至少一个可以包括于处理器1002中。The communication device 1000 may also include at least one memory 1001 for storing program instructions and/or data. The memory 1001 is coupled to the processor 1002 . The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. Processor 1002 may cooperate with memory 1001 . The processor 1002 may execute program instructions and/or data stored in the memory 1001, so that the communication device 1000 implements a corresponding method. At least one of the at least one memory may be included in the processor 1002 .
通信装置1000还可以包括通信接口1003,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN),有线接入网等。该通信接口1003用于通过传输介质和其它设备进行通信,从而用于通信装置1000中的装置可以和其它设备进行通信。示例性地,当该通信装置1000为私网网元时,该其它设备为公网网元或者私网用户面网元或者接入网设备或者终端设备;或者,当该通信装置为公网网元时,该其它设备为私网网元(私网会话管理网元或者私网认证网元)或者私网用户面网元或者接入网设备或者终端设备。处理器1002可以利用通信接口1003收发数据。通信接口1003具体可以是收发器。The communication device 1000 may also include a communication interface 1003, using any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), wired access network, etc. The communication interface 1003 is used to communicate with other devices through a transmission medium, so that the devices used in the communication device 1000 can communicate with other devices. Exemplarily, when the communication device 1000 is a private network element, the other device is a public network element or a private network user plane network element or an access network device or a terminal device; or, when the communication device is a public network When the other device is a private network element (private network session management network element or private network authentication network element) or a private network user plane network element or an access network device or a terminal device. The processor 1002 can use the communication interface 1003 to send and receive data. The communication interface 1003 may specifically be a transceiver.
本申请实施例中不限定上述通信接口1003、处理器1002以及存储器1001之间的具体连接介质。本申请实施例在图10中以存储器1001、处理器1002以及通信接口1003之间通过总线1004连接,总线在图10中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The embodiment of the present application does not limit the specific connection medium among the communication interface 1003, the processor 1002, and the memory 1001. In the embodiment of the present application, in FIG. 10, the memory 1001, the processor 1002, and the communication interface 1003 are connected through the bus 1004. The bus is represented by a thick line in FIG. 10, and the connection mode between other components is only for schematic illustration. , is not limited. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 10 , but it does not mean that there is only one bus or one type of bus.
在本申请实施例中,处理器1002可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件单元组合执行完成。In this embodiment of the application, the processor 1002 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement Or execute the methods, steps and logic block diagrams disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software units in the processor.
存储器1001可以是ROM或可存储静态信息和指令的其他类型的静态存储设备,RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储 具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线1004与处理器相连接。存储器也可以和处理器集成在一起。 Memory 1001 can be ROM or other types of static storage devices that can store static information and instructions, RAM or other types of dynamic storage devices that can store information and instructions, and can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), magnetic disk Storage media or other magnetic storage devices, or any other media that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, without limitation. The memory may exist independently and be connected to the processor through the bus 1004 . Memory can also be integrated with the processor.
其中,存储器1001用于存储执行本申请方案的计算机执行指令,并由处理器1002来控制执行。处理器1002用于执行存储器1001中存储的计算机执行指令,从而实现本申请上述实施例提供的公私网业务的隔离方法。Wherein, the memory 1001 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 1002 . The processor 1002 is configured to execute computer-executed instructions stored in the memory 1001, so as to implement the method for isolating public and private network services provided in the above-mentioned embodiments of the present application.
可选地,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。Optionally, the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
对于通信装置可以是芯片或芯片系统的情况,可参见图11所示的芯片的结构示意图。图11所示的芯片110包括处理器1101和接口1102。其中,处理器1101的数量可以是一个或多个,接口1102的数量可以是多个。For the case where the communication device may be a chip or a chip system, refer to the schematic structural diagram of the chip shown in FIG. 11 . The chip 110 shown in FIG. 11 includes a processor 1101 and an interface 1102 . Wherein, the number of processors 1101 may be one or more, and the number of interfaces 1102 may be more than one.
对于芯片用于实现本申请实施例中私网的控制面网元的功能的情况:For the case where the chip is used to implement the functions of the control plane network element of the private network in the embodiment of this application:
处理器1101,用于获取该私网的密钥,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的根密钥与公网的根密钥不同,该私网的密钥用于空口的用户面安全,该公网的根密钥用于该空口的控制面安全。示例性的,该处理器1101所执行的操作可以参照上述图5所示方法中步骤S101的介绍。Processor 1101, configured to obtain the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, the root key of the private network is related to The root key of the public network is different. The key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface. Exemplarily, for the operations performed by the processor 1101, reference may be made to the introduction of step S101 in the method shown in FIG. 5 above.
接口1102,用于接收来自终端设备的第一消息,该第一消息包括会话建立请求。示例性的,该接口1102所执行的操作可以参照上述图5所示方法中步骤S102的介绍。The interface 1102 is configured to receive a first message from a terminal device, where the first message includes a session establishment request. Exemplarily, for the operations performed by the interface 1102, reference may be made to the introduction of step S102 in the method shown in FIG. 5 above.
处理器1101,还用于确定该会话建立请求对应于该私网。示例性的,该处理器1101所执行的操作可以参照上述图5所示方法中步骤S103的介绍。The processor 1101 is further configured to determine that the session establishment request corresponds to the private network. Exemplarily, for the operations performed by the processor 1101, reference may be made to the introduction of step S103 in the method shown in FIG. 5 above.
处理器1101,还用于根据该私网的密钥建立该空口的用户面安全。示例性的,该处理器1101所执行的操作可以参照上述图5所示方法中步骤S104的介绍。The processor 1101 is further configured to establish user plane security of the air interface according to the private network key. Exemplarily, for the operations performed by the processor 1101, reference may be made to the introduction of step S104 in the method shown in FIG. 5 above.
对于芯片用于实现本申请实施例中终端设备的功能的情况:For the case where the chip is used to implement the functions of the terminal device in the embodiment of this application:
接口1102,用于向私网的控制面网元发送第一消息,该第一消息包括对应于该私网的会话建立请求。示例性的,该接口1102所执行的操作可以参照上述图8所示方法中的步骤S308中的介绍。The interface 1102 is configured to send a first message to a control plane network element of the private network, where the first message includes a session establishment request corresponding to the private network. Exemplarily, the operations performed by the interface 1102 may refer to the introduction in step S308 in the method shown in FIG. 8 above.
该处理器1101,用于根据该私网的密钥建立空口的用户面安全;其中,该私网的根密钥与公网的根密钥不同,该私网的密钥为该私网的根密钥或者基于该私网的根密钥衍生的密钥,该私网的密钥用于该空口的用户面安全,该公网的根密钥用于该空口的控制面安全。示例性的,该处理器1101所执行的操作可以参照上述图6所示方法中的步骤b5的介绍。The processor 1101 is configured to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the key of the private network The root key or a key derived based on the root key of the private network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface. Exemplarily, for operations performed by the processor 1101, reference may be made to the introduction of step b5 in the method shown in FIG. 6 above.
对于芯片用于实现本申请实施例中接入网设备的功能的情况:For the case where the chip is used to implement the functions of the access network device in the embodiment of this application:
接口1102,用于接收来自终端设备的第三消息,该第三消息包括第一连接建立请求,该第一连接建立请求用于请求建立私网和该终端设备之间的第一连接。示例性的,接口1102所执行的操作可以参照上述图8所示方法中的步骤S305中的介绍。The interface 1102 is configured to receive a third message from the terminal device, where the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device. Exemplarily, the operations performed by the interface 1102 may refer to the introduction in step S305 in the method shown in FIG. 8 above.
处理器1101,用于根据该第三消息发现私网的控制面网元,该私网的控制面网元用于建立该第一连接。示例性的,处理器1101所执行的操作可以参照上述图8所示方法中的步骤S306中的介绍。The processor 1101 is configured to discover a control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection. Exemplarily, for operations performed by the processor 1101, reference may be made to the introduction in step S306 in the method shown in FIG. 8 above.
接口1102,还用于向该私网的控制面网元发送该第一连接建立请求。示例性的,接口1102所执行的操作可以参照上述图8所示方法中的步骤S306中的介绍。The interface 1102 is further configured to send the first connection establishment request to the control plane network element of the private network. Exemplarily, the operations performed by the interface 1102 may refer to the introduction in step S306 in the method shown in FIG. 8 above.
可选的,芯片还包括存储器1103,存储器1103用于存储终端设备必要的程序指令和数 据。Optionally, the chip further includes a memory 1103, and the memory 1103 is used to store necessary program instructions and data of the terminal device.
本申请实施例还提供一种通信系统,具体的,通信系统包括私网的控制面网元、公网的移动性管理网元、接入网设备。示例性的,通信系统包括用于实现上述图4-图8的相关功能的私网的控制面网元、公网的移动性管理网元、接入网设备。The embodiment of the present application also provides a communication system. Specifically, the communication system includes a control plane network element of a private network, a mobility management network element of a public network, and an access network device. Exemplarily, the communication system includes a control plane network element of a private network, a mobility management network element of a public network, and an access network device for realizing the above-mentioned related functions in FIGS. 4-8 .
该私网的控制面网元用于实现上述图4-图8相关私网的控制面网元部分的功能。该公网的移动性管理网元用于实现上述图4-图8相关公网的移动性管理网元部分的功能。该接入网设备用于实现上述图4-图8相关接入网设备部分的功能。具体请参考上述方法实施例中的相关描述,这里不再赘述。The control plane network element of the private network is used to realize the functions of the control plane network element of the private network related to the above-mentioned FIG. 4 to FIG. 8 . The mobility management network element of the public network is used to realize the functions of the mobility management network element part of the public network related to FIG. 4 to FIG. 8 . The access network device is used to implement the functions of the above-mentioned part of the access network device in Fig. 4-Fig. 8 . For details, please refer to relevant descriptions in the foregoing method embodiments, and details are not repeated here.
本申请实施例中还提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行图4-图8中私网的控制面网元、公网的移动性管理网元、接入网设备或者终端设备执行的方法。An embodiment of the present application also provides a computer-readable storage medium, including instructions, which, when run on a computer, cause the computer to execute the control plane network elements of the private network and the mobility management network of the public network in Figures 4-8. A method performed by an element, an access network device or a terminal device.
本申请实施例中还提供一种计算机程序产品,包括指令,当其在计算机上运行时,使得计算机执行图4-图8中私网的控制面网元、公网的移动性管理网元、接入网设备或者终端设备执行的方法。An embodiment of the present application also provides a computer program product, including instructions, which, when run on a computer, cause the computer to execute the control plane network element of the private network, the mobility management network element of the public network, and A method performed by an access network device or a terminal device.
本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述方法中私网的控制面网元、公网的移动性管理网元、接入网设备或者终端设备的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。An embodiment of the present application provides a chip system, the chip system includes a processor, and may also include a memory for implementing the control plane network element of the private network, the mobility management network element of the public network, and the access network device in the foregoing method Or the functionality of the terminal equipment. The system-on-a-chip may consist of chips, or may include chips and other discrete devices.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) etc.
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,先后顺序。Those of ordinary skill in the art can understand that: the first, second and other numbers involved in the present application are only for convenience of description, and are not used to limit the scope and order of the embodiments of the present application.
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。The corresponding relationships shown in the tables in this application can be configured or predefined. The values of the information in each table are just examples, and may be configured as other values, which are not limited in this application. When configuring the corresponding relationship between the information and each parameter, it is not necessarily required to configure all the corresponding relationships shown in the tables. For example, in the table in this application, the corresponding relationship shown in some rows may not be configured. For another example, appropriate deformation adjustments can be made based on the above table, for example, splitting, merging, and so on. The names of the parameters shown in the titles of the above tables may also adopt other names understandable by the communication device, and the values or representations of the parameters may also be other values or representations understandable by the communication device. When the above tables are implemented, other data structures can also be used, for example, arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables can be used Wait.
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、 或预烧制。Predefinition in this application can be understood as definition, predefinition, storage, prestorage, prenegotiation, preconfiguration, curing, or prefiring.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application. Should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.

Claims (34)

  1. 一种公私网业务的隔离方法,其特征在于,所述方法包括:A method for isolating public and private network services, characterized in that the method comprises:
    私网的控制面网元获取私网的密钥,所述私网的密钥为所述私网的根密钥或者基于所述私网的根密钥衍生的密钥,所述私网的根密钥与公网的根密钥不同,所述私网的密钥用于空口的用户面安全,所述公网的根密钥用于所述空口的控制面安全;The control plane network element of the private network obtains the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, and the key of the private network The root key is different from the root key of the public network, the key of the private network is used for the user plane security of the air interface, and the root key of the public network is used for the control plane security of the air interface;
    所述私网的控制面网元接收来自终端设备的第一消息,所述第一消息包括会话建立请求;The control plane network element of the private network receives a first message from the terminal device, where the first message includes a session establishment request;
    所述私网的控制面网元确定所述会话建立请求对应于所述私网;The control plane network element of the private network determines that the session establishment request corresponds to the private network;
    所述私网的控制面网元根据所述私网的密钥建立所述空口的用户面安全。The control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, further comprising:
    所述私网的控制面网元接收来自所述公网的移动性管理网元的所述公网的非接入层NAS密钥;The control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network;
    所述私网的控制面网元使用所述公网的NAS密钥解析所述第一消息,以获得所述会话建立请求。The control plane network element of the private network uses the NAS key of the public network to parse the first message to obtain the session establishment request.
  3. 根据权利要求2所述的方法,其特征在于,所述私网的控制面网元接收来自所述公网的移动性管理网元的所述公网的非接入层NAS密钥,包括:The method according to claim 2, wherein the control plane network element of the private network receives the non-access stratum NAS key of the public network from the mobility management network element of the public network, comprising:
    所述私网的控制面网元接收来自所述公网的移动性管理网元的第二消息,所述第二消息包括第二信息和所述公网的NAS密钥,所述第二信息用于指示授予所述私网的控制面网元使用所述公网的NAS密钥的权限。The control plane network element of the private network receives a second message from the mobility management network element of the public network, the second message includes second information and the NAS key of the public network, and the second information It is used to indicate the permission granted to the control plane network element of the private network to use the NAS key of the public network.
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述第一消息包括第一信息,所述第一信息用于指示所述会话建立请求对应于所述私网,所述私网的控制面网元确定所述会话建立请求对应于所述私网包括:The method according to any one of claims 1-3, wherein the first message includes first information, and the first information is used to indicate that the session establishment request corresponds to the private network, and the The control plane network element of the private network determining that the session establishment request corresponds to the private network includes:
    所述私网的控制面网元根据所述第一信息确定所述会话建立请求对应于所述私网。The control plane network element of the private network determines according to the first information that the session establishment request corresponds to the private network.
  5. 根据权利要求1-3任一项所述的方法,其特征在于,所述私网的控制面网元接收来自终端设备的第一消息,包括:The method according to any one of claims 1-3, wherein the receiving the first message from the terminal device by the control plane network element of the private network includes:
    所述私网的控制面网元通过所述私网和所述终端设备之间的第一连接接收来自所述终端设备的第一消息;The control plane network element of the private network receives a first message from the terminal device through the first connection between the private network and the terminal device;
    所述私网的控制面网元确定所述会话建立请求对应于所述私网,包括:The control plane network element of the private network determines that the session establishment request corresponds to the private network, including:
    所述私网的控制面网元根据所述第一连接确定所述会话建立请求对应于所述私网。The control plane network element of the private network determines according to the first connection that the session establishment request corresponds to the private network.
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:The method according to claim 5, wherein the method further comprises:
    所述私网的控制面网元接收来自所述终端设备的第一连接建立请求,所述第一连接建立请求用于请求建立所述第一连接;The control plane network element of the private network receives a first connection establishment request from the terminal device, where the first connection establishment request is used to request establishment of the first connection;
    所述私网的控制面网元根据所述第一连接建立请求,建立所述第一连接;The control plane network element of the private network establishes the first connection according to the first connection establishment request;
    所述私网的控制面网元接收来自所述终端设备的第二连接建立请求,所述第二连接建立请求用于请求建立所述公网和所述终端设备之间的第二连接;The control plane network element of the private network receives a second connection establishment request from the terminal device, where the second connection establishment request is used to request establishment of a second connection between the public network and the terminal device;
    所述私网的控制面网元向所述公网的移动性管理网元发送所述第二连接建立请求。The control plane network element of the private network sends the second connection establishment request to the mobility management network element of the public network.
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述私网的控制面网元根据所述私网的密钥建立所述空口的用户面安全,包括:The method according to any one of claims 1-6, wherein the control plane network element of the private network establishes the user plane security of the air interface according to the key of the private network, including:
    所述私网的控制面网元根据所述私网的密钥生成安全参数;The control plane network element of the private network generates a security parameter according to the key of the private network;
    所述私网的控制面网元向所述终端设备和/或接入网设备发送所述安全参数,所述安全参数用于所述终端设备和/或所述接入网设备生成所述空口的用户面密钥。The control plane network element of the private network sends the security parameter to the terminal device and/or the access network device, and the security parameter is used for the terminal device and/or the access network device to generate the air interface user plane key.
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述私网的控制面网元存储有所述私网的密钥;The method according to any one of claims 1-7, wherein the control plane network element of the private network stores the key of the private network;
    或者,所述私网的控制面网元获取所述私网的密钥,包括:Alternatively, the control plane network element of the private network obtains the key of the private network, including:
    所述私网的控制面网元从认证、授权和计费AAA服务器中获取所述私网的密钥。The control plane network element of the private network obtains the key of the private network from the authentication, authorization and accounting AAA server.
  9. 一种公私网业务的隔离方法,其特征在于,所述方法包括:A method for isolating public and private network services, characterized in that the method comprises:
    终端设备向私网的控制面网元发送第一消息,所述第一消息包括对应于所述私网的会话建立请求;The terminal device sends a first message to a control plane network element of the private network, where the first message includes a session establishment request corresponding to the private network;
    所述终端设备根据所述私网的密钥建立空口的用户面安全;其中,所述私网的根密钥与公网的根密钥不同,所述私网的密钥为所述私网的根密钥或者基于所述私网的根密钥衍生的密钥,所述私网的密钥用于所述空口的用户面安全,所述公网的根密钥用于所述空口的控制面安全。The terminal device establishes the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the The root key of the private network or a key derived based on the root key of the private network, the key of the private network is used for the user plane security of the air interface, and the root key of the public network is used for the security of the air interface Control surface security.
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:The method according to claim 9, characterized in that the method further comprises:
    所述终端设备向所述私网的控制面网元发送第一连接建立请求,所述第一连接建立请求用于请求建立所述私网和所述终端设备之间的第一连接,所述第一连接用于传输所述第一消息;其中,所述终端设备和所述公网之间存在第二连接,所述第二连接用于传输所述公网的信令。The terminal device sends a first connection establishment request to a control plane network element of the private network, where the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device, the The first connection is used to transmit the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used to transmit signaling of the public network.
  11. 根据权利要求9或10所述的方法,其特征在于,所述方法还包括:The method according to claim 9 or 10, characterized in that the method further comprises:
    所述终端设备向所述公网的移动性管理网元发送第二连接建立请求,所述第二连接建立请求用于请求建立所述公网和所述终端设备之间的第二连接;The terminal device sends a second connection establishment request to a mobility management network element of the public network, where the second connection establishment request is used to request establishment of a second connection between the public network and the terminal device;
    所述终端根据所述公网的根密钥生成所述空口的控制面密钥。The terminal generates the control plane key of the air interface according to the root key of the public network.
  12. 根据权利要求9-11任一项所述的方法,其特征在于,所述方法还包括:所述终端设备接收来自所述私网的控制面网元的安全参数;The method according to any one of claims 9-11, further comprising: the terminal device receiving security parameters from a control plane network element of the private network;
    所述终端根据所述私网的密钥建立空口的用户面安全包括:The terminal establishes the user plane security of the air interface according to the key of the private network including:
    所述终端设备根据所述安全参数和所述私网的密钥生成所述空口的用户面密钥;The terminal device generates a user plane key of the air interface according to the security parameter and the key of the private network;
    所述终端设备根据所述空口的用户面密钥建立所述空口的用户面安全。The terminal device establishes user plane security of the air interface according to the user plane key of the air interface.
  13. 一种公私网业务的隔离方法,其特征在于,所述方法包括:A method for isolating public and private network services, characterized in that the method comprises:
    接入网设备接收来自终端设备的第三消息,所述第三消息包括第一连接建立请求,所述第一连接建立请求用于请求建立私网和所述终端设备之间的第一连接;The access network device receives a third message from the terminal device, where the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between a private network and the terminal device;
    所述接入网设备根据所述第三消息发现私网的控制面网元,所述私网的控制面网元用于 建立所述第一连接;The access network device discovers the control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection;
    所述接入网设备向所述私网的控制面网元发送所述第一连接建立请求。The access network device sends the first connection establishment request to the control plane network element of the private network.
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:The method according to claim 13, further comprising:
    所述接入网设备接收来自所述终端设备的第四消息,所述第四消息包括第二连接建立请求,所述第二连接建立请求用于请求建立公网和所述终端设备之间的第二连接;The access network device receives a fourth message from the terminal device, where the fourth message includes a second connection establishment request, and the second connection establishment request is used to request establishment of a connection between the public network and the terminal device second connection;
    所述接入网设备根据所述第四消息向所述公网的移动性管理网元发送所述第二连接建立请求。The access network device sends the second connection establishment request to the mobility management network element of the public network according to the fourth message.
  15. 根据权利要求13或14所述的方法,其特征在于,所述第三消息包括所述私网的控制面网元的路由信息,所述私网的控制面网元的路由信息用于发现所述私网的控制面网元。The method according to claim 13 or 14, wherein the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the Describe the control plane network elements of the private network.
  16. 一种私网的控制面网元,其特征在于,所述私网的控制面网元包括处理单元和收发单元,其中:A control plane network element of a private network, characterized in that the control plane network element of the private network includes a processing unit and a transceiver unit, wherein:
    所述处理单元,用于获取所述私网的密钥,所述私网的密钥为所述私网的根密钥或者基于所述私网的根密钥衍生的密钥,所述私网的根密钥与公网的根密钥不同,所述私网的密钥用于空口的用户面安全,所述公网的根密钥用于所述空口的控制面安全;The processing unit is configured to obtain the key of the private network, the key of the private network is the root key of the private network or a key derived based on the root key of the private network, the private network The root key of the network is different from the root key of the public network, the key of the private network is used for the security of the user plane of the air interface, and the root key of the public network is used for the security of the control plane of the air interface;
    所述收发单元,用于接收来自终端设备的第一消息,所述第一消息包括会话建立请求;The transceiving unit is configured to receive a first message from a terminal device, where the first message includes a session establishment request;
    所述处理单元,还用于确定所述会话建立请求对应于所述私网;The processing unit is further configured to determine that the session establishment request corresponds to the private network;
    所述处理单元,还用于根据所述私网的密钥建立所述空口的用户面安全。The processing unit is further configured to establish user plane security of the air interface according to the private network key.
  17. 根据权利要求16所述的私网的控制面网元,其特征在于,所述收发单元还用于:The control plane network element of the private network according to claim 16, wherein the transceiver unit is also used for:
    接收来自所述公网的移动性管理网元的所述公网的非接入层NAS密钥;receiving a non-access stratum NAS key of the public network from a mobility management network element of the public network;
    使用所述公网的NAS密钥解析所述第一消息,以获得所述会话建立请求。Parsing the first message by using the NAS key of the public network to obtain the session establishment request.
  18. 根据权利要求17所述的私网的控制面网元,其特征在于,所述收发单元具体用于:The control plane network element of the private network according to claim 17, wherein the transceiver unit is specifically used for:
    接收来自所述公网的移动性管理网元的第二消息,所述第二消息包括第二信息和所述公网的NAS密钥,所述第二信息用于指示授予所述私网的控制面网元使用所述公网的NAS密钥的权限。receiving a second message from the mobility management network element of the public network, where the second message includes second information and the NAS key of the public network, and the second information is used to indicate the The authority of the control plane network element to use the NAS key of the public network.
  19. 根据权利要求16-18任一项所述的私网的控制面网元,其特征在于,所述第一消息包括第一信息,所述第一信息用于指示所述会话建立请求对应于所述私网,所述处理单元具体用于:The control plane network element of a private network according to any one of claims 16-18, wherein the first message includes first information, and the first information is used to indicate that the session establishment request corresponds to the For the private network, the processing unit is specifically used for:
    根据所述第一信息确定所述会话建立请求对应于所述私网。Determine according to the first information that the session establishment request corresponds to the private network.
  20. 根据权利要求16-18任一项所述的私网的控制面网元,其特征在于,所述收发单元具体用于:The control plane network element of the private network according to any one of claims 16-18, wherein the transceiver unit is specifically used for:
    通过所述私网和所述终端设备之间的第一连接接收来自所述终端设备的第一消息;receiving a first message from the terminal device via a first connection between the private network and the terminal device;
    所述处理单元具体用于:The processing unit is specifically used for:
    根据所述第一连接确定所述会话建立请求对应于所述私网。It is determined according to the first connection that the session establishment request corresponds to the private network.
  21. 根据权利要求20所述的私网的控制面网元,其特征在于,所述收发单元,还用于接收来自终端设备的第一连接建立请求,所述第一连接建立请求用于请求建立所述第一连接;The control plane network element of a private network according to claim 20, wherein the transceiver unit is further configured to receive a first connection establishment request from a terminal device, and the first connection establishment request is used to request establishment of the the first connection;
    所述处理单元,还用于根据所述第一连接建立请求,建立所述第一连接;The processing unit is further configured to establish the first connection according to the first connection establishment request;
    所述收发单元,还用于接收来自所述终端设备的第二连接建立请求,所述第二连接建立请求用于请求建立公网和所述终端设备之间的第二连接;The transceiver unit is further configured to receive a second connection establishment request from the terminal device, where the second connection establishment request is used to request establishment of a second connection between the public network and the terminal device;
    所述收发单元,还用于向所述公网的移动性管理网元发送所述第二连接建立请求。The transceiving unit is further configured to send the second connection establishment request to a mobility management network element of the public network.
  22. 根据权利要求16-21任一项所述的私网的控制面网元,其特征在于,所述处理单元具体用于:The control plane network element of the private network according to any one of claims 16-21, wherein the processing unit is specifically used for:
    根据所述私网的密钥生成安全参数;generating security parameters according to the key of the private network;
    所述收发单元还用于:The transceiver unit is also used for:
    向所述终端设备和/或接入网设备发送所述安全参数,所述安全参数用于所述终端设备和/或所述接入网设备生成所述空口的用户面密钥。Sending the security parameter to the terminal device and/or the access network device, where the security parameter is used by the terminal device and/or the access network device to generate a user plane key for the air interface.
  23. 根据权利要求16-22任一项所述的私网的控制面网元,其特征在于,所述私网的控制面网元存储有所述私网的密钥;The control plane network element of the private network according to any one of claims 16-22, wherein the control plane network element of the private network stores the key of the private network;
    或者,所述处理单元具体用于:Alternatively, the processing unit is specifically used for:
    从认证、授权和计费AAA服务器中获取所述私网的密钥。Obtain the key of the private network from the authentication, authorization and accounting AAA server.
  24. 一种终端设备,其特征在于,所述终端设备包括收发单元和处理单元:A terminal device, characterized in that the terminal device includes a transceiver unit and a processing unit:
    所述收发单元,用于向私网的控制面网元发送第一消息,所述第一消息包括对应于所述私网的会话建立请求;The transceiver unit is configured to send a first message to a control plane network element of a private network, where the first message includes a session establishment request corresponding to the private network;
    所述处理单元,用于根据所述私网的密钥建立空口的用户面安全;其中,所述私网的根密钥与公网的根密钥不同,所述私网的密钥为所述私网的根密钥或者基于所述私网的根密钥衍生的密钥,所述私网的密钥用于所述空口的用户面安全,所述公网的根密钥用于所述空口的控制面安全。The processing unit is configured to establish the user plane security of the air interface according to the key of the private network; wherein, the root key of the private network is different from the root key of the public network, and the key of the private network is the The root key of the private network or a key derived based on the root key of the private network, the key of the private network is used for the user plane security of the air interface, and the root key of the public network is used for all The security of the control surface of the above-mentioned air interface.
  25. 根据权利要求24所述的终端设备,其特征在于,所述收发单元还用于:The terminal device according to claim 24, wherein the transceiver unit is also used for:
    向所述私网的控制面网元发送第一连接建立请求,所述第一连接建立请求用于请求建立所述私网和所述终端设备之间的第一连接,所述第一连接用于传输所述第一消息;其中,所述终端设备和所述公网之间存在第二连接,所述第二连接用于传输所述公网的信令。Sending a first connection establishment request to the control plane network element of the private network, where the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device, and the first connection uses for transmitting the first message; wherein, there is a second connection between the terminal device and the public network, and the second connection is used for transmitting signaling of the public network.
  26. 根据权利要求24或25所述的终端设备,其特征在于,所述收发单元还用于向所述公网的移动性管理网元发送第二连接建立请求,所述第二连接建立请求用于请求建立所述公网和所述终端设备之间的第二连接;The terminal device according to claim 24 or 25, wherein the transceiver unit is further configured to send a second connection establishment request to the mobility management network element of the public network, and the second connection establishment request is used for requesting establishment of a second connection between the public network and the terminal device;
    所述处理单元,还用于根据所述公网的根密钥生成所述空口的控制面密钥。The processing unit is further configured to generate a control plane key of the air interface according to the root key of the public network.
  27. 根据权利要求24-26任一项所述的终端设备,其特征在于,所述收发单元还用于接收来自所述私网的控制面网元的安全参数;The terminal device according to any one of claims 24-26, wherein the transceiver unit is further configured to receive security parameters from a control plane network element of the private network;
    所述处理单元,具体用于:The processing unit is specifically used for:
    根据所述安全参数和所述私网的密钥生成所述空口的用户面密钥;generating a user plane key of the air interface according to the security parameter and the key of the private network;
    根据所述空口的用户面密钥建立所述空口的用户面安全。Establishing user plane security of the air interface according to the user plane key of the air interface.
  28. 一种接入网设备,其特征在于,所述接入网设备包括收发单元和处理单元,其中:An access network device, characterized in that the access network device includes a transceiver unit and a processing unit, wherein:
    所述收发单元,用于接收来自终端设备的第三消息,所述第三消息包括第一连接建立请求,所述第一连接建立请求用于请求建立私网和所述终端设备之间的第一连接;The transceiver unit is configured to receive a third message from the terminal device, the third message includes a first connection establishment request, and the first connection establishment request is used to request establishment of a first connection between the private network and the terminal device a connection;
    所述处理单元,用于根据所述第三消息发现私网的控制面网元,所述私网的控制面网元用于建立所述第一连接;The processing unit is configured to discover a control plane network element of the private network according to the third message, and the control plane network element of the private network is used to establish the first connection;
    所述收发单元,还用于向所述私网的控制面网元发送所述第一连接建立请求。The transceiving unit is further configured to send the first connection establishment request to a control plane network element of the private network.
  29. 根据权利要求28所述的接入网设备,其特征在于,所述收发单元还用于接收来自所述终端设备的第四消息,所述第四消息包括第二连接建立请求,所述第二连接建立请求用于请求建立公网和所述终端设备之间的第二连接;The access network device according to claim 28, wherein the transceiver unit is further configured to receive a fourth message from the terminal device, the fourth message includes a second connection establishment request, and the second The connection establishment request is used to request establishment of a second connection between the public network and the terminal device;
    所述收发单元还用于根据所述第四消息向所述公网的移动性管理网元发送所述第二连接建立请求。The transceiving unit is further configured to send the second connection establishment request to a mobility management network element of the public network according to the fourth message.
  30. 根据权利要求28或29所述的接入网设备,其特征在于,所述第三消息包括所述私网的控制面网元的路由信息,所述私网的控制面网元的路由信息用于发现所述私网的控制面网元。The access network device according to claim 28 or 29, wherein the third message includes routing information of the control plane network element of the private network, and the routing information of the control plane network element of the private network is used to discover the control plane network element of the private network.
  31. 一种通信装置,其特征在于,包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1-8任一项所述的方法,或者如权利要求9-12任一项所述的方法,或者如权利要求13-15任一项所述的方法。A communication device, characterized in that it includes a processor and an interface circuit, the interface circuit is used to receive signals from other communication devices other than the communication device and transmit them to the processor or transfer signals from the processor The signal is sent to other communication devices other than the communication device, and the processor is used to implement the method according to any one of claims 1-8 through logic circuits or executing code instructions, or according to claims 9-12 The method according to any one, or the method according to any one of claims 13-15.
  32. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储指令,当所述指令被执行时,使得如权利要求1-8任一项所述的方法,或者如权利要求9-12任一项所述的方法,或者如权利要求13-15任一项所述的方法被实现。A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store instructions, and when the instructions are executed, the method according to any one of claims 1-8, or the method according to any one of claims 1-8 The method described in any one of claims 9-12, or the method described in any one of claims 13-15 is implemented.
  33. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序或指令,当所述计算机程序或指令在计算机上运行时,使得计算机执行如权利要求1-8任一项所述的方法,或者如权利要求9-12任一项所述的方法,或者如权利要求13-15任一项所述的方法。A computer program product, characterized in that the computer program product includes a computer program or an instruction, and when the computer program or instruction is run on a computer, the computer executes the method according to any one of claims 1-8 , or the method according to any one of claims 9-12, or the method according to any one of claims 13-15.
  34. 一种通信系统,其特征在于,所述通信系统包括如权利要求16-23任一项所述的私网的控制面网元,以及如权利要求28-30任一项所述的接入网设备。A communication system, characterized in that the communication system comprises the control plane network element of the private network according to any one of claims 16-23, and the access network according to any one of claims 28-30 equipment.
PCT/CN2022/095079 2021-05-31 2022-05-25 Isolation method, apparatus and system for public and private network services WO2022253083A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110605645.8 2021-05-31
CN202110605645.8A CN115484595A (en) 2021-05-31 2021-05-31 Method, device and system for isolating public and private network services

Publications (1)

Publication Number Publication Date
WO2022253083A1 true WO2022253083A1 (en) 2022-12-08

Family

ID=84322783

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/095079 WO2022253083A1 (en) 2021-05-31 2022-05-25 Isolation method, apparatus and system for public and private network services

Country Status (2)

Country Link
CN (1) CN115484595A (en)
WO (1) WO2022253083A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116260582B (en) * 2023-05-16 2023-08-15 中汽智联技术有限公司 Identity authentication and encryption communication method for network-connected vehicle
CN117478431B (en) * 2023-12-27 2024-03-22 深圳市智联物联科技有限公司 Industrial Internet of things control method based on trusted network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079023A (en) * 2014-10-29 2017-08-18 高通股份有限公司 User plane safety for next generation cellular network
US20200021993A1 (en) * 2018-07-10 2020-01-16 Apple Inc. Identity-based message integrity protection and verification for wireless communication
CN110972218A (en) * 2018-09-30 2020-04-07 华为技术有限公司 Communication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079023A (en) * 2014-10-29 2017-08-18 高通股份有限公司 User plane safety for next generation cellular network
US20200021993A1 (en) * 2018-07-10 2020-01-16 Apple Inc. Identity-based message integrity protection and verification for wireless communication
CN110972218A (en) * 2018-09-30 2020-04-07 华为技术有限公司 Communication method and device

Also Published As

Publication number Publication date
CN115484595A (en) 2022-12-16

Similar Documents

Publication Publication Date Title
KR101834685B1 (en) Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
EP3735018B1 (en) Security negotiation method and apparatus
WO2020029938A1 (en) Secure conversation method and device
KR101836021B1 (en) Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
WO2018027988A1 (en) Method for selecting network slices, wireless access device and terminal
CN108353282B (en) Method and apparatus for wireless communication using a security model supporting multiple connectivity and service contexts
CN110786034A (en) Privacy considerations for network slice selection
WO2022253083A1 (en) Isolation method, apparatus and system for public and private network services
CN114143871B (en) Network connection method, network disconnection method and communication device
WO2022082612A1 (en) Layer 2 ue to ue data forwarding
US20230337002A1 (en) Security context generation method and apparatus, and computer-readable storage medium
EP4005181B1 (en) Rds support for lwm2m and non-lwm2m iot applications
EP3962131A1 (en) Relay selection in cellular sliced networks
TW201717688A (en) Secure connection of cellular devices without using a core cellular network
US20220225463A1 (en) Communications method, apparatus, and system
US20230096727A1 (en) Ue-driven packet flow description management
WO2023213191A1 (en) Security protection method and communication apparatus
WO2023246457A1 (en) Security decision negotiation method and network element
WO2022151129A1 (en) P-bsr enhancements for iab networks to improve e2e latency
CN114600487B (en) Identity authentication method and communication device
US20220393877A1 (en) Cryptographic Security Mechanism for Groupcast Communication
WO2022001964A1 (en) Communication method, terminal device, and radio access network device
WO2023137760A1 (en) Wireless communication methods, remote ue, ausf, and amf
CN116996985A (en) Communication method and device based on edge network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22815129

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE