WO2022257876A1 - 密钥材料的处理方法、获取方法、信息传输方法及设备 - Google Patents

密钥材料的处理方法、获取方法、信息传输方法及设备 Download PDF

Info

Publication number
WO2022257876A1
WO2022257876A1 PCT/CN2022/097117 CN2022097117W WO2022257876A1 WO 2022257876 A1 WO2022257876 A1 WO 2022257876A1 CN 2022097117 W CN2022097117 W CN 2022097117W WO 2022257876 A1 WO2022257876 A1 WO 2022257876A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
key material
information
identifier
association relationship
Prior art date
Application number
PCT/CN2022/097117
Other languages
English (en)
French (fr)
Inventor
张奕忠
谢振华
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to EP22819474.2A priority Critical patent/EP4319230A1/en
Publication of WO2022257876A1 publication Critical patent/WO2022257876A1/zh
Priority to US18/530,202 priority patent/US20240106643A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement

Definitions

  • the application belongs to the technical field of communication, and in particular relates to a key material processing method, acquisition method, information transmission method and equipment.
  • Smart home connects various devices in the home (such as audio and video equipment, lighting system, curtain control, air conditioning control, security system, etc.) Telephone remote control, indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HVAC control and other functions and means.
  • devices in the home such as audio and video equipment, lighting system, curtain control, air conditioning control, security system, etc.
  • Telephone remote control indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HVAC control and other functions and means.
  • the embodiments of the present application provide a key material processing method, acquisition method, information transmission method and device, which can solve the problem of how to provide relevant security materials for smart IoT devices with limited functions.
  • a method for processing key material including:
  • the second terminal receives the first information; wherein the first information is used to determine a first association between the first terminal and the second terminal;
  • the second terminal sends the key material of the first terminal
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a method for obtaining key material including:
  • the first terminal receives the key material of the first terminal determined by the second terminal, where the key material of the first terminal includes: security information required by the first terminal for communication.
  • an information transmission method including:
  • the third party function or the first network function sends first information to the second terminal, the first information is used to determine the first association relationship between the first terminal and the second terminal, so that the second terminal receives the sending the key material of the first terminal in the case of the first information;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a device for processing key material including:
  • the first receiving module is configured to receive first information; wherein the first information is used to determine a first association relationship between the first terminal and the second terminal;
  • a second sending module configured to send the key material of the first terminal according to the first association relationship
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a device for obtaining key material including:
  • the second receiving module is configured to receive the key material of the first terminal determined by the second terminal, wherein the key material of the first terminal includes: security information required by the first terminal for communication.
  • a terminal includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor.
  • the program or instruction is executed by the processor Implementing the steps of the method described in the first aspect, or implementing the steps of the method described in the second aspect.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive first information, and the first information is used to determine the first association between the first terminal and the second terminal relationship, the processor is configured to send the key material of the first terminal through the communication interface according to the first association relationship; wherein the key material of the first terminal includes: when the first terminal communicates required security information; or, the communication interface is used to receive the key material of the first terminal determined by the second terminal, wherein the key material of the first terminal includes: when the first terminal communicates required security information.
  • an information transmission device including:
  • the second sending module is configured to send first information to the second terminal, the first information is used to determine the first association relationship between the first terminal and the second terminal, so that the second terminal receives the In the case of the first information, sending the key material of the first terminal;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a network-side device includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor, and the program or instruction is executed by the
  • the processor implements the steps of the method described in the third aspect when executing.
  • a network side device including a processor and a communication interface, wherein the communication interface is used to send first information to the second terminal, and the first information is used to determine the relationship between the first terminal and the second terminal.
  • a first association relationship exists between terminals, so that the second terminal sends the key material of the first terminal after receiving the first information; wherein the key material of the first terminal includes: Security information required by the first terminal for communication.
  • a readable storage medium where programs or instructions are stored on the readable storage medium, and when the programs or instructions are executed by a processor, the steps of the method as described in the first aspect are implemented, or The steps of the method as described in the third aspect.
  • a chip in a twelfth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the above described in the first aspect method, or implement the method as described in the second aspect, or implement the method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a non-volatile storage medium, and the program/program product is executed by at least one processor to implement the first
  • the second terminal receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus Realize that the first terminal obtains the key material determined by the second terminal, so even if the function of the first terminal is limited, it can also ensure the security of the first terminal in the process of accessing the network, and solves the problem of how to generate network authorization/authentication Issues related to key material used by home smart devices.
  • FIG. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application is applicable
  • FIG. 2 shows a flow chart of the steps of the key material processing method provided by the embodiment of the present application
  • FIG. 3 shows a schematic diagram of the steps of the key material acquisition method provided by the embodiment of the present application.
  • FIG. 4 shows a schematic diagram of the steps of the information transmission method provided by the embodiment of the present application.
  • FIG. 5 shows an interactive schematic diagram of Example 1 provided by the embodiment of the present application
  • FIG. 6 shows an interactive schematic diagram of Example 2 provided by the embodiment of the present application.
  • FIG. 7 shows an interactive schematic diagram of Example 3 provided by the embodiment of the present application.
  • Fig. 8 shows a schematic structural diagram of a device for processing key material provided by an embodiment of the present application
  • Fig. 9 shows a schematic structural diagram of a device for obtaining key material provided by an embodiment of the present application.
  • FIG. 10 shows a schematic structural diagram of an information transmission device provided by an embodiment of the present application.
  • FIG. 11 shows a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 12 shows a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 13 shows a schematic structural diagram of a network-side device provided by an embodiment of the present application.
  • first, second and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein and that "first" and “second” distinguish objects. It is usually one category, and the number of objects is not limited. For example, there may be one or more first objects.
  • “and/or” in the description and claims means at least one of the connected objects, and the character “/” generally means that the related objects are an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technologies can be used for the above-mentioned systems and radio technologies as well as other systems and radio technologies.
  • NR New Radio
  • the following description describes the New Radio (NR) system for illustrative purposes, and uses NR terminology in most of the following descriptions, but these techniques can also be applied to applications other than NR system applications, such as the 6th generation (6 th Generation, 6G) communication system.
  • 6G 6th Generation
  • Fig. 1 shows a block diagram of a wireless communication system to which the embodiment of the present application is applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12 .
  • the terminal 11 can also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (VUE), Pedestrian Terminal (PUE) and other terminal-side devices, wearable devices include: smart watches, bracelets, earphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, where a base station may be called a node B, an evolved node B, an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service Basic Service Set (BSS), Extended Service Set (ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, WLAN access point, WiFi node, transmission Receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only The base station in the NR system is taken as an example, but the specific type of the base station is not limited.
  • At least one embodiment of the present application provides a method for processing key material, executed by a second terminal, including:
  • Step 201 the second terminal receives first information; wherein, the first information is used to determine a first association between the first terminal and the second terminal;
  • Step 202 according to the first association relationship, the second terminal sends the key material of the first terminal
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the second terminal receives the first information, and determines that the first terminal and the second terminal have a first association relationship according to the first information, then the second terminal generates and sends the key material of the first terminal.
  • the first information may also be referred to as trigger information used to trigger the second terminal to generate and send the key material of the first terminal.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • the first identifier is the device identifier and/or user identifier of the first terminal;
  • the second identifier is the device identifier and/or user identifier of the second terminal
  • Association information where the association information is information for determining the first association relationship.
  • the key material includes at least one of the following:
  • signing credential information includes at least one of the following:
  • Terminal routing selection policy (UE Route Selection Policy, URSP);
  • 5G Key Set Identifier (Key Set Identifier in 5G, ngKSI).
  • the method also includes:
  • the second terminal derives the key material of the first terminal according to the key material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the keying material of the first terminal is derived from the keying material of the second terminal.
  • step 201 includes any of the following:
  • the second terminal receives the first information sent by the first network function;
  • the first network function is an access network function or a core network function, which is not specifically limited here;
  • the second terminal receives the first information sent by the third-party function;
  • the third-party function is an application server or other communication device with wireless transceiver function, and the third-party function can be set as a separate entity, or it can be set in other A module or unit on a network entity is not specifically limited here.
  • the second terminal sends the key material of the first terminal, including any of the following:
  • the second terminal sends the key material of the first terminal to a third-party function, and the key material of the first terminal is sent to the first terminal through the third-party function;
  • the third-party function is an application server ;
  • the second terminal sends the key material of the first terminal to the first network function, and the key material of the first terminal is sent to the first terminal through the first network function; for example, the first network function It is an access network function or a core network function, which is not specifically limited here.
  • the method provided in this embodiment of the application further includes:
  • the second terminal establishes direct communication with the first terminal. Then the second terminal sends the key material of the first terminal to the first terminal through direct communication; and/or, the second terminal receives the first information sent by the first terminal through direct communication.
  • the transmission of the first information may also be included in the process of establishing the direct connection communication.
  • the method when the second terminal sends the key material of the first terminal to the first terminal, the method further includes:
  • the second terminal sends the key material of the first terminal to the first network function or a third-party function.
  • the method further includes at least one of the following:
  • the second terminal starts a first timer, wherein the timing period of the first timer is the valid time of the security information of the first terminal; after the valid time is exceeded, the security information of the first terminal becomes invalid .
  • the first timer can reuse an existing timer, and then both the first terminal and the second terminal can obtain relevant parameters of the first timer (such as start timing, timing period, etc.).
  • the key material further includes: a valid time, where the valid time is the valid time of the security information. After the validity time expires, the security information becomes invalid.
  • the second terminal receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; In this way, the first terminal can obtain the key material determined by the second terminal. Therefore, even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate network authorization/authentication is solved. Issues related to the key material used by home smart devices.
  • the embodiment of this application also provides a method for obtaining key material, including:
  • Step 301 the first terminal receives the key material of the first terminal determined by the second terminal, where the key material of the first terminal includes: security information required by the first terminal for communication.
  • the key material of the first terminal is obtained by deriving the key material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the security information includes at least one of the following:
  • signing credential information includes at least one of the following:
  • 5G Key Set Identifier (Key Set Identifier in 5G, ngKSI).
  • the method before step 301, the method further includes:
  • the first terminal sends first information to the second terminal, where the first information is used to determine a first association relationship between the first terminal and the second terminal.
  • the first terminal sends the first information to the second terminal, and the second terminal determines that the first terminal and the second terminal have a first association relationship according to the first information, then the second terminal generates and sends the first terminal's key material.
  • the first information implicitly instructs the second terminal to generate the key material of the first terminal.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal;
  • Association information where the association information is information for determining the first association relationship.
  • the first terminal obtains the associated information according to a two-dimensional code or an application program.
  • step 301 includes any of the following:
  • the first terminal receives the key material of the first terminal sent by the third-party function, and the key material of the first terminal is sent to the third-party function by the second terminal;
  • the third-party function is an application server
  • the third-party function can be set as a separate entity, or as a module or unit set on another network entity, which is not specifically limited here;
  • the first terminal receives the key material of the first terminal sent by the first network function, and the key material of the first terminal is sent to the first network function by the second terminal; for example, the first network function It is an access network function or a core network function, which is not specifically limited here.
  • the method provided in this embodiment of the application further includes:
  • the first terminal establishes direct communication with the second terminal. Then the first terminal receives the key material of the first terminal through direct communication; and/or, the first terminal sends the first information to the second terminal through direct communication.
  • the transmission of the first information may also be included in the process of establishing the direct connection communication.
  • the method further includes:
  • the first terminal sends an initial verification message to the third-party function, where the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • the identifier of the first terminal can uniquely identify the first terminal
  • the default credential of the first terminal is the only credential that the first terminal can identify and verify security before accessing the bearer (onboarding);
  • a network identifier of the local network of the first terminal where the network identifier of the local network is a non-public network identifier different from a public land mobile network (Public Land Mobile Network, PLMN).
  • PLMN Public Land Mobile Network
  • the key material also includes:
  • Valid time where the valid time is the valid time of the security information. After the valid time expires, the security information becomes invalid.
  • the method also includes:
  • the first terminal sends first update instruction information to the second terminal, where the first update instruction information is used to instruct the second terminal to update the key material of the first terminal.
  • the second terminal receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; In this way, the first terminal can obtain the key material determined by the second terminal. Therefore, even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate network authorization/authentication is solved. Issues related to the key material used by home smart devices.
  • the embodiment of the present application also provides an information transmission method, including:
  • Step 401 the third party function or the first network function sends first information to the second terminal, the first information is used to determine the first association relationship between the first terminal and the second terminal, so that the second terminal can sending the key material of the first terminal when the first information is received;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the third-party function or the first network function sends the first information to the second terminal, and the second terminal determines that there is a first association between the first terminal and the second terminal based on the first information, then the second terminal generates and Keying material for the first terminal is sent.
  • the first information implicitly instructs the second terminal to generate the key material of the first terminal.
  • the third-party function is an application server, and the third-party function can be set as a separate entity, or a module or unit set on another network entity; the first network function is an access network function or a core network function , not specifically limited here.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal;
  • Association information where the association information is information for determining the first association relationship.
  • the key material of the first terminal is derived from the key material of the second terminal;
  • the key material of the second terminal is security information required by the second terminal for communication.
  • the security information includes at least one of the following:
  • signing credential information includes at least one of the following:
  • 5G Key Set Identifier (Key Set Identifier in 5G, ngKSI).
  • the method further includes:
  • the third-party function or the first network function receives the key material of the first terminal sent by the second terminal and determined by the second terminal;
  • the third-party function or the first network function sends the key material of the first terminal to the first terminal.
  • the method before the first network function sends the first information to the second terminal, the method further includes:
  • the third-party function or the first network function receives the first information sent by the first terminal.
  • the first network function first receives the first information sent by the first terminal, and then forwards the first information to the second terminal, and the second terminal determines the key material of the first terminal.
  • the method before the third-party function sends the first information to the second terminal, the method further includes:
  • the third-party function receives the initial verification message sent by the first terminal, and the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • the identifier of the first terminal can uniquely identify the first terminal
  • the default credential of the first terminal is the only credential that the first terminal can identify and verify security before accessing the bearer (onboarding);
  • a network identifier of the local network of the first terminal where the network identifier of the local network is a non-public network identifier different from the PLMN.
  • the embodiment of the present application provides a method in which the first network function or third-party function is assisted, and the key material is determined by the terminal, which solves the problem of how to generate relevant key material used by home smart devices during network authorization/authentication. question.
  • Example 1 the first information is triggered by the application server, indicating the first association relationship; as shown in Figure 5:
  • Step 51 the first terminal sends initial verification information to the application server, and the application server implements the verification and credit authorization of the first terminal;
  • Step 52 the application server sends the first information to the second terminal, where the first information includes the first identifier, the second identifier and/or the association relationship;
  • Step 53 the second terminal determines the first association relationship according to the first information, and determines the key material of the first terminal;
  • Step 54 the second terminal sends the key material of the first terminal to the application server;
  • Step 55 the application server sends the password material of the first terminal to the first terminal.
  • Example 2 the first information is triggered by the first terminal, indicating the first association relationship; as shown in Figure 6:
  • Step 61 the first terminal sends first information to the first network function, where the first information includes a first identifier, a second identifier and/or an association relationship;
  • Step 62 the first network function sends the first information to the second terminal
  • Step 63 the second terminal determines the first association relationship according to the first information, and determines the key material of the first terminal;
  • Step 64 the second terminal sends the key material of the first terminal to the first network function
  • Step 65 the first network function sends the key material of the first terminal to the first terminal.
  • Example 3 the first terminal establishes direct communication with the second terminal, and the first terminal triggers the first information indicating the first association relationship; as shown in Figure 7:
  • Step 71 the first terminal establishes direct communication with the second terminal
  • Step 72 the first terminal sends first information to the second terminal through direct communication, where the first information includes at least associated information;
  • Step 73 the second terminal determines the first association relationship according to the first information, and determines the key material of the first terminal;
  • Step 74 the second terminal sends the key material of the first terminal to the second terminal through direct communication
  • Step 75 the second terminal sends the key material of the first terminal to the first network function.
  • the execution subject may be a device, or a control module in the device for executing the method.
  • the device execution method is taken as an example to describe the device provided in the embodiment of the present application.
  • the embodiment of this application also provides a key material processing device 800, including:
  • the first receiving module 801 is configured to receive first information; wherein, the first information is used to determine a first association relationship between the first terminal and the second terminal;
  • the second sending module 802 is configured to send the key material of the first terminal according to the first association relationship
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • the first identifier is the device identifier and/or user identifier of the first terminal;
  • the second identifier is the device identifier and/or user identifier of the second terminal
  • Association information where the association information is information for determining the first association relationship.
  • the security information includes at least one of the following:
  • the device also includes:
  • a derivation module configured to derive the key material of the first terminal according to the key material of the second terminal
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the first receiving module further includes any one of the following:
  • a first receiving submodule configured to receive the first information sent by the first terminal
  • a second receiving submodule configured to receive the first information sent by the first network function
  • the third receiving submodule is configured to receive the first information sent by the third-party function.
  • the first sending module includes any of the following:
  • a first sending submodule configured to send the key material of the first terminal to the first terminal
  • the second sending submodule is configured to send the key material of the first terminal to a third-party function, and send the key material of the first terminal to the first terminal through the third-party function;
  • the third sending submodule is configured to send the key material of the first terminal to a first network function, and send the key material of the first terminal to the first terminal through the first network function.
  • the device also includes:
  • a third sending module configured to send the key material of the first terminal to the first network function or a third-party function.
  • the device further includes at least one of the following:
  • the first timing module is configured to start a first timer, wherein the timing period of the first timer is the valid time of the security information of the first terminal; after the valid time is exceeded, the first terminal The security information for is invalid.
  • the key material also includes:
  • Valid time where the valid time is the valid time of the security information.
  • the second terminal receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus realizing the second A terminal obtains the key material determined by the second terminal, so even if the functions of the first terminal are limited, the security of the first terminal accessing the network can be guaranteed, and it solves how to generate network authorization/authentication home intelligence Issues with the associated keying material used by the device.
  • the device for processing key material provided in the embodiment of this application is a device capable of executing the above-mentioned method for processing key material, and all embodiments of the above-mentioned method for processing key material are applicable to this device, and all Can achieve the same or similar beneficial effects.
  • the embodiment of the present application also provides an apparatus 900 for obtaining key material, including:
  • the second receiving module 901 is configured to receive the key material of the first terminal determined by the second terminal, where the key material of the first terminal includes: security information required by the first terminal for communication.
  • the key material of the first terminal is obtained by deriving the key material of the second terminal;
  • the key material of the second terminal includes: a security letter required by the second terminal for communication.
  • the security information includes at least one of the following:
  • the device also includes:
  • a fourth sending module configured to send first information to the second terminal, where the first information is used to determine a first association relationship between the first terminal and the second terminal.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal;
  • Association information where the association information is information for determining the first association relationship.
  • the second receiving module includes any one of the following:
  • a fourth receiving submodule configured to receive the key material of the first terminal sent by the second terminal
  • the fifth receiving submodule is configured to receive the key material of the first terminal sent by the third-party function, and the key material of the first terminal is sent to the third-party function by the second terminal;
  • the sixth receiving submodule is configured to receive the key material of the first terminal sent by the first network function, and the key material of the first terminal is sent to the first network function by the second terminal.
  • the device also includes:
  • a verification module configured to send an initial verification message to a third-party function, where the initial verification message is used by the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • a network identifier of the local network of the first terminal is
  • the key material also includes:
  • Valid time where the valid time is the valid time of the security information.
  • the device also includes:
  • a first update module configured to send first update instruction information to the second terminal after the validity time has expired, where the first update instruction information is used to instruct the second terminal to update the information of the first terminal key material.
  • the second terminal receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus realizing the second A terminal obtains the key material determined by the second terminal, so even if the functions of the first terminal are limited, the security of the first terminal accessing the network can be guaranteed, and it solves how to generate network authorization/authentication home intelligence Issues with the associated keying material used by the device.
  • the device for obtaining key material provided in the embodiment of this application is a device capable of executing the above-mentioned method for obtaining key material, and all embodiments of the above-mentioned method for obtaining key material are applicable to this device, and all Can achieve the same or similar beneficial effects.
  • the embodiment of the present application also provides an information transmission device 1000, including:
  • the second sending module 1001 is configured to send first information to the second terminal, the first information is used to determine the first association relationship between the first terminal and the second terminal, so that the second terminal receives the sending the key material of the first terminal in the case of the first information;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first association relationship includes at least one of the following:
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal;
  • Association information where the association information is information for determining the first association relationship.
  • the key material of the first terminal is derived from the key material of the second terminal
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the security information includes at least one of the following:
  • the device also includes:
  • a third receiving module configured to receive the key material of the first terminal sent by the second terminal and determined by the second terminal;
  • a fifth sending module configured to send the key material of the first terminal to the first terminal.
  • the device also includes:
  • a fourth receiving module configured to receive the first information sent by the first terminal.
  • the device also includes:
  • a verification receiving module configured to receive an initial verification message sent by the first terminal, where the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • a network identifier of the local network of the first terminal is
  • the second terminal receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus realizing the second A terminal obtains the key material determined by the second terminal, so even if the functions of the first terminal are limited, the security of the first terminal accessing the network can be guaranteed, and it solves how to generate network authorization/authentication home intelligence Issues with the associated keying material used by the device.
  • the device for obtaining key material provided in the embodiment of this application is a device capable of executing the above-mentioned method for obtaining key material, and all embodiments of the above-mentioned method for obtaining key material are applicable to this device, and all Can achieve the same or similar beneficial effects.
  • the processing device, acquisition device, and information transmission device in the embodiment of the present application may be a device, a device with an operating system or an electronic device, or a component, an integrated circuit, or a chip in a terminal.
  • the apparatus or electronic equipment may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may include but not limited to the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machines or self-service machines, etc., are not specifically limited in this embodiment of the present application.
  • the processing device, acquisition device, and information transmission device provided in the embodiments of the present application can realize the various processes realized by the method embodiments in Fig. 1 to Fig. 7 and achieve the same technical effect. To avoid repetition, details are not repeated here.
  • this embodiment of the present application further provides a communication device 1100, including a processor 1101, a memory 1102, and programs or instructions stored in the memory 1102 and operable on the processor 1101,
  • a communication device 1100 including a processor 1101, a memory 1102, and programs or instructions stored in the memory 1102 and operable on the processor 1101,
  • the communication device 1100 is the second terminal
  • the program or instruction is executed by the processor 1101
  • each process of the above key material processing method embodiment can be realized, and the same technical effect can be achieved.
  • the communication device is the first terminal, when the program or instruction is executed by the processor 1101, each process of the above key material acquisition method embodiment can be realized, and the same technical effect can be achieved.
  • the communication device 1100 is a network-side device (such as a first network function or a third-party function)
  • the program or instruction is executed by the processor 1101
  • each process of the above-mentioned information transmission method embodiment can be achieved, and the same technical effect can be achieved, To avoid repetition, details are not repeated here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface, where the communication interface is used to receive first information; wherein the first information is used to determine the first association between the first terminal and the second terminal relationship, the processor is configured to send the key material of the first terminal through the communication interface according to the first association relationship; the key material of the first terminal includes: required security information; or, the communication interface is used to receive the key material of the first terminal determined by the second terminal, where the key material of the first terminal includes: required safety information.
  • This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment, and each implementation process and implementation mode of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 12 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 1200 includes, but is not limited to: a radio frequency unit 1201, a network module 1202, an audio output unit 1203, an input unit 1204, a sensor 1205, a display unit 1206, a user input unit 1207, an interface unit 1208, a memory 1209, and a processor 1210, etc. at least some of the components.
  • the terminal 1200 can also include a power supply (such as a battery) for supplying power to various components, and the power supply can be logically connected to the processor 1210 through the power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • a power supply such as a battery
  • the terminal structure shown in FIG. 12 does not constitute a limitation on the terminal.
  • the terminal may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be repeated here.
  • the input unit 1204 may include a graphics processor (Graphics Processing Unit, GPU) 12041 and a microphone 12042, and the graphics processor 12041 is used for the image capture device (such as the image data of the still picture or video obtained by the camera) for processing.
  • the display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1207 includes a touch panel 12071 and other input devices 12072 .
  • the touch panel 12071 is also called a touch screen.
  • the touch panel 12071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 12072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
  • the radio frequency unit 1201 receives the downlink data from the network side device, and processes it to the processor 1210; in addition, sends the uplink data to the network side device.
  • the radio frequency unit 1201 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the memory 1209 can be used to store software programs or instructions as well as various data.
  • the memory 1209 may mainly include a program or instruction storage area and a data storage area, wherein the program or instruction storage area may store an operating system, an application program or instructions required by at least one function (such as a sound playback function, an image playback function, etc.) and the like.
  • the memory 1209 may include a high-speed random access memory, and may also include a nonvolatile memory, wherein the nonvolatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • PROM erasable programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the processor 1210 may include one or more processing units; optionally, the processor 1210 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, application programs or instructions, etc., Modem processors mainly handle wireless communications, such as baseband processors. It can be understood that the foregoing modem processor may not be integrated into the processor 1210 .
  • the radio frequency unit 1201 of the second terminal is configured to receive first information; where the first information is used to determine a first association relationship between the first terminal and the second terminal; and according to the first association relationship, Sending the key material of the first terminal; wherein the key material of the first terminal includes: security information required by the first terminal for communication.
  • the radio frequency unit 1201 of the second terminal is configured to receive the key material of the first terminal determined by the second terminal, where the key material of the first terminal includes: safety information.
  • the second terminal receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus realizing the second A terminal obtains the key material determined by the second terminal, so even if the functions of the first terminal are limited, the security of the first terminal accessing the network can be guaranteed, and it solves how to generate network authorization/authentication home intelligence Issues with the associated keying material used by the device.
  • the terminal provided in the embodiment of the present application is a terminal capable of executing the above-mentioned key material processing method or acquisition method, and all embodiments of the above-mentioned key material processing method or acquisition method are applicable to the terminal, and All can achieve the same or similar beneficial effects.
  • the embodiment of the present application also provides a network side device, including a processor and a communication interface, the communication interface is used to send the first information to the second terminal, and the first information is used to determine the existence of the first terminal and the second terminal The first association relationship, so that the second terminal sends the key material of the first terminal after receiving the first information; where the key material of the first terminal includes: the Security information required by the first terminal for communication.
  • the network-side device embodiment corresponds to the above-mentioned network-side device method embodiment, and each implementation process and implementation mode of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network device 1300 includes: an antenna 131 , a radio frequency device 132 , and a baseband device 133 .
  • the antenna 131 is connected to the radio frequency device 132 .
  • the radio frequency device 132 receives information through the antenna 131, and sends the received information to the baseband device 133 for processing.
  • the baseband device 133 processes the information to be sent and sends it to the radio frequency device 132
  • the radio frequency device 132 processes the received information and sends it out through the antenna 131 .
  • the foregoing frequency band processing device may be located in the baseband device 133 , and the method executed by the network side device in the above embodiments may be implemented in the baseband device 133 , and the baseband device 133 includes a processor 134 and a memory 135 .
  • the baseband device 133 can include at least one baseband board, for example, a plurality of chips are arranged on the baseband board, as shown in FIG.
  • the baseband device 133 may also include a network interface 136 for exchanging information with the radio frequency device 132, such as a Common Public Radio Interface (CPRI for short).
  • CPRI Common Public Radio Interface
  • the network-side device in the embodiment of the present invention also includes: instructions or programs stored in the memory 135 and operable on the processor 134, and the processor 134 calls the instructions or programs in the memory 135 to execute the modules shown in FIG. 10 To avoid duplication, the method of implementation and to achieve the same technical effect will not be repeated here.
  • the embodiment of the present application also provides a readable storage medium, where a program or instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the above embodiment of the method for processing the key material or the implementation of the key material is implemented.
  • a program or instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the above embodiment of the method for processing the key material or the implementation of the key material is implemented.
  • the processor is the processor in the terminal described in the foregoing embodiments.
  • the readable storage medium includes computer readable storage medium, such as computer read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
  • the embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the above key material processing method.
  • the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
  • the embodiment of the present application also provides a computer program product, the computer program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the steps of the various methods described above .
  • the term “comprising”, “comprising” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase “comprising a " does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
  • the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions are performed, for example, the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
  • the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation.
  • the technical solution of the present application can be embodied in the form of computer software products, which are stored in a storage medium (such as ROM/RAM, magnetic disk, etc.) , CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种密钥材料的处理方法、获取方法、信息传输方法及设备,属于通信技术领域,本申请实施例的密钥材料的处理方法包括:第二终端接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;根据所述第一关联关系,所述第二终端发送所述第一终端的密钥材料;所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。

Description

密钥材料的处理方法、获取方法、信息传输方法及设备
相关申请的交叉引用
本申请主张在2021年06月09日在中国提交的中国专利申请No.202110642764.0的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种密钥材料的处理方法、获取方法、信息传输方法及设备。
背景技术
随着物联网和智能家居的普及,一个家庭中可能存在多个智能家居。智能家居通过将家中的各种设备(如音视频设备、照明系统、窗帘控制、空调控制、安防系统等)连接到一起、互相通信,以此形成一个通信拓扑网络,提供家电控制、照明控制、电话远程控制、室内外遥控、防盗报警、环境监测、暖通控制等多种功能和手段。
为了利用5G网络服务,在智能家庭网络组网时,所有智能家庭中的设备都需要访问5G网络。然而,许多智能物联网设备只具有有限的功能(也可称为功能受限),而如何为这些功能受限的智能物联网设备提供相关安全材料是亟待解决的问题。
发明内容
本申请实施例提供一种密钥材料的处理方法、获取方法、信息传输方法及设备,能够解决如何为功能受限的智能物联网设备提供相关安全材料的问题。
第一方面,提供了一种密钥材料的处理方法,包括:
第二终端接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
根据所述第一关联关系,所述第二终端发送所述第一终端的密钥材料;
所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第二方面,提供了一种密钥材料的获取方法,包括:
第一终端接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第三方面,提供了一种信息传输方法,包括:
第三方功能或第一网络功能向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第四方面,提供了一种密钥材料的处理装置,包括:
第一接收模块,用于接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
第二发送模块,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第五方面,提供了一种密钥材料的获取装置,包括:
第二接收模块,用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第六方面,提供了一种终端,该终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤。
第七方面,提供了一种终端,包括处理器及通信接口,其中,所述通信 接口用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,所述处理器用于根据第一关联关系并通过所述通信接口发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;或者,所述通信接口用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第八方面,提供了一种信息传输装置,包括:
第二发送模块,用于向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第九方面,提供了一种网络侧设备,该网络侧设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第十方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第十一方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
第十二方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第二方面所述的方法,或实现如第三方面所述的方法。
第十三方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在非易失的存储介质中,所述程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤,或实现如第三方面所述的方法的步骤。
在本申请实施例中,第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
附图说明
图1表示本申请实施例可应用的一种无线通信系统的框图;
图2表示本申请实施例提供的密钥材料的处理方法的步骤流程图;
图3表示本申请实施例提供的密钥材料的获取方法的步骤示意图;
图4表示本申请实施例提供的信息传输方法的步骤示意图;
图5表示本申请实施例提供的示例一的交互示意图;
图6表示本申请实施例提供的示例二的交互示意图;
图7表示本申请实施例提供的示例三的交互示意图;
图8表示本申请实施例提供的密钥材料的处理装置的结构示意图;
图9表示本申请实施例提供的密钥材料的获取装置的结构示意图;
图10表示本申请实施例提供的信息传输装置的结构示意图;
图11表示本申请实施例提供的通信设备的结构示意图;
图12表示本申请实施例提供的终端的结构示意图;
图13表示本申请实施例提供的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实 施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency-Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6 th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11也可以称作终端设备或者用户终端(User Equipment,UE),终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet  Device,MID)、可穿戴式设备(Wearable Device)或车载设备(VUE)、行人终端(PUE)等终端侧设备,可穿戴式设备包括:智能手表、手环、耳机、眼镜等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以是基站或核心网,其中,基站可被称为节点B、演进节点B、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、B节点、演进型B节点(eNB)、家用B节点、家用演进型B节点、WLAN接入点、WiFi节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例,但是并不限定基站的具体类型。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的密钥材料的处理方法、获取方法、信息传输方法及设备进行详细地说明。
如图2所示,本申请的至少一个实施例提供一种密钥材料的处理方法,由第二终端执行,包括:
步骤201,第二终端接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
步骤202,根据所述第一关联关系,所述第二终端发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
本申请实施例中,第二终端接收到第一信息,并根据第一信息确定第一终端和第二终端存在第一关联关系,则第二终端生成并发送第一终端的密钥材料。换言之,第一信息也可称为用于触发第二终端生成及发送第一终端的密钥材料的触发信息。
在本申请的至少一个可选实施例中,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
在本申请的另一个可选实施例中,所述第一信息包括以下至少一项:
所述第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
所述第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识
关联信息,所述关联信息为确定所述第一关联关系的信息。
作为一个可选实施例,所述密钥材料包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息;例如,签约凭据信息包括以下至少一项:
签约凭据长期密钥;
用户标识;
终端路由选择策略(UE Route Selection Policy,URSP);
5G密钥集标识(Key Set Identifier in 5G,ngKSI)。
在本申请的至少一个实施例中,所述方法还包括:
第二终端根据第二终端的密钥材料派生所述第一终端的密钥材料;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。换言之,第一终端的密钥材料根据第二终端的密钥材料进行派生。
在本申请的至少一个实施例中,步骤201包括下述任意一项:
第二终端接收所述第一终端发送的所述第一信息;
第二终端接收第一网络功能发送的所述第一信息;例如,第一网络功能为接入网功能或核心网功能,在此不做具体限定;
第二终端接收第三方功能发送的所述第一信息;例如,第三方功能为应用服务器或其他具有无线收发功能的通信装置,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元,在此不做具体限 定。
相应的,在本申请的至少一个可选实施例中,步骤202中第二终端发送所述第一终端的密钥材料,包括下述任意一项:
第二终端向所述第一终端发送所述第一终端的密钥材料;
第二终端向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端;例如,第三方功能为应用服务器;
第二终端向第一网络功能发送所述第一终端的密钥材料,通过所述第一网络功能将所述第一终端的密钥材料发送至所述第一终端;例如,第一网络功能为接入网功能或核心网功能,在此不做具体限定。
需要说明的是,若第一终端和第二终端之间直接交互,则本申请实施例提供的方法还包括:
第二终端与第一终端建立直连通信。则第二终端通过直连通信向第一终端发送所述第一终端的密钥材料;和/或,第二终端通过直连通信接收第一终端发送的第一信息。可选的,第一信息的传输也可以包含在直连通信建立过程中。
作为一个可选实施例,在所述第二终端向所述第一终端发送所述第一终端的密钥材料的情况下,所述方法还包括:
第二终端向第一网络功能或第三方功能发送所述第一终端的密钥材料。
作为另一个可选实施例,所述方法还包括以下至少一项:
第二终端启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端的安全信息无效。
需要说明的是,第一计时器可以复用现有计时器,则第一计时器的相关参数(例如启动时机,计时时段等),第一终端和第二终端均可获取到。
可选的,密钥材料中还包括:有效时间,所述有效时间为安全信息的有效时间。在超过所述有效时间超时后,该安全信息无效。
综上,本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
如图3所示,本申请实施例还提供一种密钥材料的获取方法,包括:
步骤301,第一终端接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一终端的密钥材料据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为另一个可选实施例,所述安全信息包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息;例如,签约凭据信息包括以下至少一项:
签约凭据长期密钥;
用户标识;
终端路由选择策略(URSP);
5G密钥集标识(Key Set Identifier in 5G,ngKSI)。
在本申请的至少一个可选实施例中,步骤301之前,所述方法还包括:
第一终端向所述第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系。
本申请实施例中,第一终端向第二终端发送第一信息,第二终端根据第一信息确定第一终端和第二终端存在第一关联关系,则第二终端生成并发送第一终端的密钥材料。换言之,第一信息隐式指示第二终端生成第一终端的密钥材料。
在申请的另一个可选实施例中,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
在本申请的又一个可选实施例中,所述第一信息包括以下至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
关联信息,所述关联信息为确定所述第一关联关系的信息。
例如,第一终端根据二维码或应用程序获得所述关联信息。
在本申请的至少一个实施例中,步骤301包括下述任意一项:
第一终端接收所述第二终端发送的所述第一终端的密钥材料;
第一终端接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第三方功能;例如,第三方功能为应用服务器,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元,在此不做具体限定;
第一终端接收第一网络功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第一网络功能;例如,第一网络功能为接入网功能或核心网功能,在此不做具体限定。
需要说明的是,若第一终端和第二终端之间直接交互,则本申请实施例提供的方法还包括:
第一终端与第二终端建立直连通信。则第一终端通过直连通信接收所述第一终端的密钥材料;和/或,第一终端通过直连通信向第二终端发送第一信息。可选的,第一信息的传输也可以包含在直连通信建立过程中。
作为一个可选实施例,步骤301之前,所述方法还包括:
第一终端向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
其中,所述初始验证消息包括以下至少一项:
所述第一终端的标识;该标识可以唯一确认所述第一终端;
所述第一终端的默认凭据;该默认凭据为第一终端在接入承载(onboarding)之前唯一可识别且验证安全性的凭据;
所述第一终端的本地网络的网络标识,所述本地网络的网络标识为不同于公共陆地移动网(Public Land Mobile Network,PLMN)的非公共网络标识。
作为一个可选实施例,所述密钥材料还包括:
有效时间,所述有效时间为所述安全信息的有效时间。在超过所述有效时间后,所述安全信息无效。
作为另一个可选实施例,所述方法还包括:
在超过所述有效时间后,第一终端向所述第二终端发送第一更新指示信息,所述第一更新指示信息用于指示所述第二终端更新所述第一终端的密钥材料。
综上,本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
如图4所示,本申请实施例还提供一种信息传输方法,包括:
步骤401,第三方功能或第一网络功能向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
本申请实施例中,第三方功能或第一网络功能向第二终端发送第一信息,第二终端根据第一信息确定第一终端和第二终端存在第一关联关系,则第二终端生成并发送第一终端的密钥材料。换言之,第一信息隐式指示第二终端 生成第一终端的密钥材料。
需要说明的是,第三方功能为应用服务器,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元;第一网络功能为接入网功能或核心网功能,在此不做具体限定。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为另一个可选实施例,所述第一信息包括以下至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
关联信息,所述关联信息为确定所述第一关联关系的信息。
在本申请的至少一个可选实施例中,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料为所述第二终端进行通信时所需的安全信息。
其中,所述安全信息包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息;例如,签约凭据信息包括以下至少一项:
签约凭据长期密钥;
用户标识;
终端路由选择策略(URSP);
5G密钥集标识(Key Set Identifier in 5G,ngKSI)。
在本申请的至少一个可选实施例中,第三方功能或第一网络功能向第二终端发送第一信息之后,所述方法还包括:
第三方功能或第一网络功能接收第二终端发送的由所述第二终端确定的第一终端的密钥材料;
第三方功能或第一网络功能将所述第一终端的密钥材料发送至所述第一终端。
作为一个可选实施例,在第一网络功能向第二终端发送第一信息之前,所述方法还包括:
第三方功能或第一网络功能接收所述第一终端发送的所述第一信息。换言之,第一网络功能先接收第一终端发送的第一信息,再将第一信息转发至第二终端,由第二终端确定第一终端的密钥材料。
作为另一个可选实施例,在第三方功能向第二终端发送第一信息之前,所述方法还包括:
第三方功能接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
其中,所述初始验证消息包括以下至少一项:
所述第一终端的标识;该标识可以唯一确认所述第一终端;
所述第一终端的默认凭据;该默认凭据为第一终端在接入承载(onboarding)之前唯一可识别且验证安全性的凭据;
所述第一终端的本地网络的网络标识,所述本地网络的网络标识为不同于PLMN的非公共网络标识。
综上,本申请实施例提供了一种第一网络功能或第三方功能辅助,由终端确定密钥材料的方式,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
为了更清楚的描述本申请实施例提供的方法,下面结合几个示例进行说明。
示例一,由应用服务器触发第一信息,指示第一关联关系;如图5所示:
步骤51(可选的),第一终端向应用服务器发送初始校验信息,由应用服务器实现第一终端的校验和授信;
步骤52,应用服务器向第二终端发送第一信息,第一信息包括第一标识、第二标识和/或关联关系;
步骤53,第二终端根据第一信息确定第一关联关系,并确定第一终端的密钥材料;
步骤54,第二终端向应用服务器发送第一终端的密钥材料;
步骤55,应用服务器向第一终端发送第一终端的密码材料。
示例二,由第一终端触发第一信息,指示第一关联关系;如图6所示:
步骤61,第一终端向第一网络功能发送第一信息,第一信息包括第一标识、第二标识和/或关联关系;
步骤62,第一网络功能将第一信息发送至第二终端;
步骤63,第二终端根据第一信息确定第一关联关系,并确定第一终端的密钥材料;
步骤64,第二终端向第一网络功能发送第一终端的密钥材料;
步骤65,第一网络功能向第一终端发送第一终端的密钥材料。
示例三,第一终端和第二终端建立直连通信,由第一终端触发第一信息,指示第一关联关系;如图7所示:
步骤71,第一终端和第二终端建立直连通信;
步骤72,第一终端通过直连通信向第二终端发送第一信息,第一信息至少包括关联信息;
步骤73,第二终端根据第一信息确定第一关联关系,并确定第一终端的密钥材料;
步骤74,第二终端通过直连通信向第二终端发送第一终端的密钥材料;
步骤75(可选的),第二终端向第一网络功能发送第一终端的密钥材料。
需要说明的是,本申请实施例提供的方法,执行主体可以为装置,或者,该装置中的用于执行方法的控制模块。本申请实施例中以装置执行方法为例,说明本申请实施例提供的装置。
如图8所示,本申请实施例还提供一种密钥材料的处理装置800,包括:
第一接收模块801,用于接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
第二发送模块802,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为一个可选实施例,所述第一信息包括以下至少一项:
所述第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
所述第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识
关联信息,所述关联信息为确定所述第一关联关系的信息。
作为一个可选实施例,所述安全信息包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息。
作为一个可选实施例,所述装置还包括:
派生模块,用于根据第二终端的密钥材料派生所述第一终端的密钥材料;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一接收模块还包括下述任意一项:
第一接收子模块,用于接收所述第一终端发送的所述第一信息;
第二接收子模块,用于接收第一网络功能发送的所述第一信息;
第三接收子模块,用于接收第三方功能发送的所述第一信息。
作为一个可选实施例,所述第一发送模块包括下述任意一项:
第一发送子模块,用于向所述第一终端发送所述第一终端的密钥材料;
第二发送子模块,用于向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端;
第三发送子模块,用于向第一网络功能发送所述第一终端的密钥材料,通过所述第一网络功能将所述第一终端的密钥材料发送至所述第一终端。
作为一个可选实施例,所述装置还包括:
第三发送模块,用于向第一网络功能或第三方功能发送所述第一终端的密钥材料。
作为一个可选实施例,所述装置还包括以下至少一项:
第一计时模块,用于启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端的安全信息无效。
作为一个可选实施例,所述密钥材料还包括:
有效时间,所述有效时间为安全信息的有效时间。
本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的密钥材料的处理装置是能够执行上述密钥材料的处理方法的装置,则上述密钥材料的处理方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
如图9所示,本申请实施例还提供一种密钥材料的获取装置900,包括:
第二接收模块901,用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一终端的密钥材料据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信。
作为一个可选实施例,所述安全信息包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息。
作为一个可选实施例,所述装置还包括:
第四发送模块,用于向所述第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为一个可选实施例,所述第一信息包括以下至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
关联信息,所述关联信息为确定所述第一关联关系的信息。
作为一个可选实施例,所述第二接收模块包括下述任意一项:
第四接收子模块,用于接收所述第二终端发送的所述第一终端的密钥材料;
第五接收子模块,用于接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第三方功能;
第六接收子模块,用于接收第一网络功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第一网络功能。
作为一个可选实施例,所述装置还包括:
验证模块,用于向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
作为一个可选实施例,所述初始验证消息包括以下至少一项:
所述第一终端的标识;
所述第一终端的默认凭据;
所述第一终端的本地网络的网络标识。
作为一个可选实施例,所述密钥材料还包括:
有效时间,所述有效时间为所述安全信息的有效时间。
作为一个可选实施例,所述装置还包括:
第一更新模块,用于在超过所述有效时间后,向所述第二终端发送第一更新指示信息,所述第一更新指示信息用于指示所述第二终端更新所述第一终端的密钥材料。。
本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的密钥材料的获取装置是能够执行上述密钥材料的获取方法的装置,则上述密钥材料的获取方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
如图10所示,本申请实施例还提供一种信息传输装置1000,包括:
第二发送模块1001,用于向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为一个可选实施例,所述第一信息包括以下至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
关联信息,所述关联信息为确定所述第一关联关系的信息。
作为一个可选实施例,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述安全信息包括以下至少一项:
安全密钥;
安全参数;
签约凭据信息。
作为一个可选实施例,所述装置还包括:
第三接收模块,用于接收第二终端发送的由所述第二终端确定的第一终端的密钥材料;
第五发送模块,用于将所述第一终端的密钥材料发送至所述第一终端。
作为一个可选实施例,所述装置还包括:
第四接收模块,用于接收所述第一终端发送的所述第一信息。
作为一个可选实施例,所述装置还包括:
验证接收模块,用于接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
作为一个可选实施例,所述初始验证消息包括以下至少一项:
所述第一终端的标识;
所述第一终端的默认凭据;
所述第一终端的本地网络的网络标识。
本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的密钥材料的获取装置是能够执行上述密钥材料的获取方法的装置,则上述密钥材料的获取方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
本申请实施例中的处理装置、获取装置、信息传输装置可以是装置,具有操作系统的装置或电子设备,也可以是终端中的部件、集成电路、或芯片。该装置或电子设备可以是移动终端,也可以为非移动终端。示例性的,移动终端可以包括但不限于上述所列举的终端11的类型,非移动终端可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例提供的处理装置、获取装置、信息传输装置能够实现图1至图7的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图11所示,本申请实施例还提供一种通信设备1100,包括处理器1101,存储器1102,存储在存储器1102上并可在所述处理器1101上运行的程序或指令,例如,该通信设备1100为第二终端时,该程序或指令被处理器1101执行时实现上述密钥材料的处理方法实施例的各个过程,且能达到相同的技术效果。该通信设备为第一终端时,该程序或指令被处理器1101执行时实现上述密钥材料的获取方法实施例的各个过程,且能达到相同的技 术效果。该通信设备1100为网络侧设备(如第一网络功能或第三方功能)时,该程序或指令被处理器1101执行时实现上述信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,所述通信接口用于接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,所述处理器用于根据所述第一关联关系通过所述通信接口发送所述第一终端的密钥材料;所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;或者,所述通信接口用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。该终端实施例是与上述终端侧方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图12为实现本申请实施例的一种终端的硬件结构示意图。
该终端1200包括但不限于:射频单元1201、网络模块1202、音频输出单元1203、输入单元1204、传感器1205、显示单元1206、用户输入单元1207、接口单元1208、存储器1209、以及处理器1210等中的至少部分部件。
本领域技术人员可以理解,终端1200还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1210逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图 12中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1204可以包括图形处理器(Graphics Processing Unit,GPU)12041和麦克风12042,图形处理器12041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1206可包括显示面板12061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板12061。用户输入单元1207包括触控面板12071以及其他输入设备12072。触控面板12071, 也称为触摸屏。触控面板12071可包括触摸检测装置和触摸控制器两个部分。其他输入设备12072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1201将来自网络侧设备的下行数据接收后,给处理器1210处理;另外,将上行的数据发送给网络侧设备。通常,射频单元1201包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1209可用于存储软件程序或指令以及各种数据。存储器1209可主要包括存储程序或指令区和存储数据区,其中,存储程序或指令区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1209可以包括高速随机存取存储器,还可以包括非易失性存储器,其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。
处理器1210可包括一个或多个处理单元;可选的,处理器1210可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序或指令等,调制解调处理器主要处理无线通信,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1210中。
其中,第二终端的射频单元1201,用于接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;并根据所述第一关联关系,发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
或者,第二终端的射频单元1201,用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
本申请实施例中第二终端接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第二终端为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的终端是能够执行上述密钥材料的处理方法或获取方法的终端,则上述密钥材料的处理方法或获取方法的所有实施例均适用于该终端,且均能达到相同或相似的有益效果。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,所述通信接口用于向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。该网络侧设备实施例是与上述网络侧设备方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图13所示,该网络设备1300包括:天线131、射频装置132、基带装置133。天线131与射频装置132连接。在上行方向上,射频装置132通过天线131接收信息,将接收的信息发送给基带装置133进行处理。在下行方向上,基带装置133对要发送的信息进行处理,并发送给射频装置132,射频装置132对收到的信息进行处理后经过天线131发送出去。
上述频带处理装置可以位于基带装置133中,以上实施例中网络侧设备执行的方法可以在基带装置133中实现,该基带装置133包括处理器134和存储器135。
基带装置133例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图13所示,其中一个芯片例如为处理器134,与存储器135连接,以调用存储器135中的程序,执行以上方法实施例中所示的网络设备操作。
该基带装置133还可以包括网络接口136,用于与射频装置132交互信息,该接口例如为通用公共无线接口(Common Public Radio Interface,简称CPRI)。
具体地,本发明实施例的网络侧设备还包括:存储在存储器135上并可在处理器134上运行的指令或程序,处理器134调用存储器135中的指令或程序执行图10所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述密钥材料的处理方法实施例或密钥材料的获取方法实施例或信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述密钥材料的处理方法实施例或密钥材料的获取方法实施例或信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如上文所述的各个方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情 况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (38)

  1. 一种密钥材料的处理方法,包括:
    第二终端接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
    根据所述第一关联关系,所述第二终端发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  2. 根据权利要求1所述的方法,其中,所述第一关联关系包含以下至少一项:
    第一终端的设备标识与第二终端的设备标识之间的关联关系;
    第一终端的设备标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的设备标识之间的关联关系。
  3. 根据权利要求1所述的方法,其中,所述第一信息包括以下至少一项:
    第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
    第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识
    关联信息,所述关联信息为确定所述第一关联关系的信息。
  4. 根据权利要求1所述的方法,其中,所述安全信息包括以下至少一项:
    安全密钥;
    安全参数;
    签约凭据信息。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    第二终端根据第二终端的密钥材料派生所述第一终端的密钥材料;
    其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
  6. 根据权利要求1所述的方法,其中,所述第二终端接收第一信息,包括下述任意一项:
    第二终端接收所述第一终端发送的所述第一信息;
    第二终端接收第一网络功能发送的所述第一信息;
    第二终端接收第三方功能发送的所述第一信息。
  7. 根据权利要求1所述的方法,其中,所述第二终端发送所述第一终端的密钥材料,包括下述任意一项:
    第二终端向所述第一终端发送所述第一终端的密钥材料;
    第二终端向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端;
    第二终端向第一网络功能发送所述第一终端的密钥材料,通过所述第一网络功能将所述第一终端的密钥材料发送至所述第一终端。
  8. 根据权利要求7所述的方法,其中,在所述第二终端向所述第一终端发送所述第一终端的密钥材料的情况下,所述方法还包括:
    第二终端向第一网络功能或第三方功能发送所述第一终端的密钥材料。
  9. 根据权利要求1所述的方法,其中,所述方法还包括:
    第二终端启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端的安全信息无效。
  10. 根据权利要求4所述的方法,其中,所述密钥材料还包括:
    有效时间,所述有效时间为安全信息的有效时间。
  11. 一种密钥材料的获取方法,包括:
    第一终端接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  12. 根据权利要求11所述的方法,其中,所述第一终端的密钥材料据所述第二终端的密钥材料进行派生得到;
    其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
  13. 根据权利要求11或12所述的方法,其中,所述安全信息包括以下 至少一项:
    安全密钥;
    安全参数;
    签约凭据信息。
  14. 根据权利要求11所述的方法,其中,接收由第二终端确定的第一终端的密钥材料之前,所述方法还包括:
    第一终端向所述第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系。
  15. 根据权利要求14所述的方法,其中,所述第一关联关系包含以下至少一项:
    第一终端的设备标识与第二终端的设备标识之间的关联关系;
    第一终端的设备标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的设备标识之间的关联关系。
  16. 根据权利要求14所述的方法,其中,所述第一信息包括以下至少一项:
    第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
    第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
    关联信息,所述关联信息为确定所述第一关联关系的信息。
  17. 根据权利要求11所述的方法,其中,接收由第二终端确定的第一终端的密钥材料,包括下述任意一项:
    第一终端接收所述第二终端发送的所述第一终端的密钥材料;
    第一终端接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第三方功能;
    第一终端接收第一网络功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第二终端发送至所述第一网络功能。
  18. 根据权利要求11所述的方法,其中,接收由第二终端确定的第一终 端的密钥材料之前,所述方法还包括:
    第一终端向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
  19. 根据权利要求18所述的方法,其中,所述初始验证消息包括以下至少一项:
    所述第一终端的标识;
    所述第一终端的默认凭据;
    所述第一终端的本地网络的网络标识。
  20. 根据权利要求13所述的方法,其中,所述密钥材料还包括:
    有效时间,所述有效时间为所述安全信息的有效时间。
  21. 根据权利要求20所述的方法,其中,所述方法还包括:
    在超过所述有效时间后,第一终端向所述第二终端发送第一更新指示信息,所述第一更新指示信息用于指示所述第二终端更新所述第一终端的密钥材料。
  22. 一种信息传输方法,包括:
    第三方功能或第一网络功能向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  23. 根据权利要求22所述的方法,其中,所述第一关联关系包含以下至少一项:
    第一终端的设备标识与第二终端的设备标识之间的关联关系;
    第一终端的设备标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的设备标识之间的关联关系。
  24. 根据权利要求22所述的方法,其中,所述第一信息包括以下至少一 项:
    第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
    第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;
    关联信息,所述关联信息为确定所述第一关联关系的信息。
  25. 根据权利要求22所述的方法,其中,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
    其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
  26. 根据权利要求22或25所述的方法,其中,所述安全信息包括以下至少一项:
    安全密钥;
    安全参数;
    签约凭据信息。
  27. 根据权利要求22所述的方法,其中,第三方功能或第一网络功能向第二终端发送第一信息之后,所述方法还包括:
    第三方功能或第一网络功能接收第二终端发送的由所述第二终端确定的第一终端的密钥材料;
    第三方功能或第一网络功能将所述第一终端的密钥材料发送至所述第一终端。
  28. 根据权利要求22所述的方法,其中,第三方功能或第一网络功能向第二终端发送第一信息之前,所述方法还包括:
    第三方功能或第一网络功能接收所述第一终端发送的所述第一信息。
  29. 根据权利要求22所述的方法,其中,第三方功能向第二终端发送第一信息之前,所述方法还包括:
    第三方功能接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
  30. 根据权利要求29所述的方法,其中,所述初始验证消息包括以下至 少一项:
    所述第一终端的标识;
    所述第一终端的默认凭据;
    所述第一终端的本地网络的网络标识。
  31. 一种密钥材料的处理装置,包括:
    第一接收模块,用于接收第一信息;其中,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
    第二发送模块,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  32. 一种密钥材料的获取装置,包括:
    第二接收模块,用于接收由第二终端确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  33. 一种终端,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1至10任一项所述的密钥材料的处理方法的步骤;或者,所述程序或指令被所述处理器执行时实现如权利要求11至21任一项所述的密钥材料的获取方法的步骤。
  34. 一种信息传输装置,包括:
    第二发送模块,用于向第二终端发送第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,以由所述第二终端在接收到所述第一信息的情况下发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  35. 一种网络侧设备,所述网络侧设备为第三方功能或第一网络功能,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序 或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求22至30任一项所述的信息传输方法的步骤。
  36. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至10任一项所述的密钥材料的处理方法,或者实现如权利要求11至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至30任一项所述的信息传输方法的步骤。
  37. 一种芯片,包括处理器和通信接口,其中,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1至10任一项所述的密钥材料的处理方法,或者实现如权利要求11至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至30任一项所述的信息传输方法的步骤。
  38. 一种计算机程序产品,其中,所述计算机程序产品被存储在非易失的存储介质中,所述计算机程序产品被至少一个处理器执行以实现如权利要求1至10任一项所述的密钥材料的处理方法,或者实现如权利要求11至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至30任一项所述的信息传输方法的步骤。
PCT/CN2022/097117 2021-06-09 2022-06-06 密钥材料的处理方法、获取方法、信息传输方法及设备 WO2022257876A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22819474.2A EP4319230A1 (en) 2021-06-09 2022-06-06 Key material processing method, acquisition method, information transmission method, and device
US18/530,202 US20240106643A1 (en) 2021-06-09 2023-12-05 Processing method and obtaining method for key material, information transmission method, and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110642764.0 2021-06-09
CN202110642764.0A CN115460579A (zh) 2021-06-09 2021-06-09 密钥材料的处理方法、获取方法、信息传输方法及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/530,202 Continuation US20240106643A1 (en) 2021-06-09 2023-12-05 Processing method and obtaining method for key material, information transmission method, and device

Publications (1)

Publication Number Publication Date
WO2022257876A1 true WO2022257876A1 (zh) 2022-12-15

Family

ID=84294466

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/097117 WO2022257876A1 (zh) 2021-06-09 2022-06-06 密钥材料的处理方法、获取方法、信息传输方法及设备

Country Status (4)

Country Link
US (1) US20240106643A1 (zh)
EP (1) EP4319230A1 (zh)
CN (1) CN115460579A (zh)
WO (1) WO2022257876A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577459A (zh) * 2009-07-31 2012-07-11 三星电子株式会社 移动通信网络中创建安全上下文和管理通信的方法和装置
CN107317789A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 密钥分发、认证方法,装置及系统
CN108781216A (zh) * 2016-01-25 2018-11-09 瑞典爱立信有限公司 用于网络接入的方法和设备
CN109150507A (zh) * 2017-06-19 2019-01-04 上海中兴软件有限责任公司 一种设备凭证分发方法和系统、用户设备及管理实体
US20200359212A1 (en) * 2019-05-07 2020-11-12 Verizon Patent And Licensing Inc. System and method for deriving a profile for a target endpoint device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577459A (zh) * 2009-07-31 2012-07-11 三星电子株式会社 移动通信网络中创建安全上下文和管理通信的方法和装置
CN108781216A (zh) * 2016-01-25 2018-11-09 瑞典爱立信有限公司 用于网络接入的方法和设备
CN107317789A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 密钥分发、认证方法,装置及系统
CN109150507A (zh) * 2017-06-19 2019-01-04 上海中兴软件有限责任公司 一种设备凭证分发方法和系统、用户设备及管理实体
US20200359212A1 (en) * 2019-05-07 2020-11-12 Verizon Patent And Licensing Inc. System and method for deriving a profile for a target endpoint device

Also Published As

Publication number Publication date
US20240106643A1 (en) 2024-03-28
EP4319230A1 (en) 2024-02-07
CN115460579A (zh) 2022-12-09

Similar Documents

Publication Publication Date Title
US20180368058A1 (en) Method for controlling device access, and related device and system
CN109618316B (zh) 网络共享方法、移动终端及存储介质
WO2022017359A1 (zh) 直接通信启动控制方法及相关设备
WO2022095850A1 (zh) 策略关联的建立方法及装置、终端及网络侧设备
EP4149173A1 (en) Service obtaining method and apparatus, and communication device and readable storage medium
CN113727298B (zh) 层二标识确定方法、装置及终端
WO2022257876A1 (zh) 密钥材料的处理方法、获取方法、信息传输方法及设备
WO2022068903A1 (zh) 网络选择方法、信息发送方法、信息获取方法及装置
WO2022257878A1 (zh) 密钥材料的发送方法、获取方法、信息传输方法及设备
WO2022257877A1 (zh) 信息处理方法、密钥材料的获取方法及设备
CN112583920B (zh) 推送方法、推送装置、电子设备和存储介质
WO2023005898A1 (zh) 多终端联合会话管理方法、网络侧设备及终端
WO2023143411A1 (zh) 设备鉴权方法、装置及通信设备
WO2023143418A1 (zh) 设备鉴权方法、装置、终端及网络功能
WO2023212934A1 (zh) 一种中继通信方法、接入方法、装置及设备
WO2024067337A1 (zh) 终端鉴权方法、终端及网络侧设备
WO2022217507A1 (zh) 系统消息更新的通知方法和装置
EP4307755A1 (en) Method for accessing network, network side device, and terminal
WO2023143436A1 (zh) 数据转发的方法、装置、终端设备和网络设备
WO2022178727A1 (zh) 寻呼方法、装置及通信设备
WO2022237706A1 (zh) 资源选择方法、装置及终端
WO2023240575A1 (zh) 一种中继通信方法、通信装置及通信设备
WO2022247703A1 (zh) 服务器地址的处理方法及装置
WO2022206898A1 (zh) 寻呼方法、装置、终端及网络侧设备
US20160286373A1 (en) Methods for handling a match report of a restricted proximity-based service (prose) discovery, and apparatuses using the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22819474

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022819474

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022819474

Country of ref document: EP

Effective date: 20231102

NENP Non-entry into the national phase

Ref country code: DE