WO2022257878A1 - 密钥材料的发送方法、获取方法、信息传输方法及设备 - Google Patents

密钥材料的发送方法、获取方法、信息传输方法及设备 Download PDF

Info

Publication number
WO2022257878A1
WO2022257878A1 PCT/CN2022/097119 CN2022097119W WO2022257878A1 WO 2022257878 A1 WO2022257878 A1 WO 2022257878A1 CN 2022097119 W CN2022097119 W CN 2022097119W WO 2022257878 A1 WO2022257878 A1 WO 2022257878A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
key material
information
network function
identifier
Prior art date
Application number
PCT/CN2022/097119
Other languages
English (en)
French (fr)
Inventor
张奕忠
谢振华
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to EP22819476.7A priority Critical patent/EP4354922A4/en
Publication of WO2022257878A1 publication Critical patent/WO2022257878A1/zh
Priority to US18/530,203 priority patent/US20240114016A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement

Definitions

  • the present application belongs to the technical field of communication, and in particular relates to a key material sending method, obtaining method, information transmission method and equipment.
  • Smart home connects various devices in the home (such as audio and video equipment, lighting system, curtain control, air conditioning control, security system, etc.) Telephone remote control, indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HVAC control and other functions and means.
  • devices in the home such as audio and video equipment, lighting system, curtain control, air conditioning control, security system, etc.
  • Telephone remote control indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HVAC control and other functions and means.
  • 5th Generation 5th Generation
  • 5G 5th Generation
  • all devices in the smart home need to access the 5G network when the smart home network is set up.
  • many smart IoT devices have only limited functions (also referred to as limited functions), and how to provide relevant security materials for these smart IoT devices with limited functions is an urgent problem to be solved.
  • the embodiments of the present application provide a key material sending method, acquisition method, information transmission method and device, which can solve the problem of how to provide relevant security materials for smart IoT devices with limited functions.
  • a method for sending key material including:
  • the first network function sends the key material of the first terminal
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a method for obtaining key material including:
  • the first terminal receives the key material of the first terminal determined by the first network function, where the key material of the first terminal includes: security information required by the first terminal for communication.
  • an information transmission method including:
  • the second terminal or the third-party function sends the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends the first terminal key material;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a device for sending key material including:
  • a first receiving module configured to receive first information, where the first information is used to determine a first association between the first terminal and the second terminal;
  • a first execution module configured to send the key material of the first terminal according to the first association relationship
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a device for obtaining key material including:
  • the second receiving module is configured to receive the key material of the first terminal determined by the first network function, wherein the key material of the first terminal includes: security information required by the first terminal for communication.
  • an information transmission device including:
  • the first sending module is configured to send the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends the first terminal key material;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • a communication device in a seventh aspect, includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor, and the program or instruction is executed by the processor
  • the terminal includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor, and the program or instruction is executed by the processor
  • a communication device including a processor and a communication interface, wherein the communication interface is used to receive first information, and the first information is used to determine the first information between the first terminal and the second terminal.
  • An association relationship according to the first association relationship, sending the key material of the first terminal; wherein the key material of the first terminal includes: security information required by the first terminal for communication;
  • the communication interface is configured to receive the key material of the first terminal determined by the first network function, where the key material of the first terminal includes: security information required by the first terminal for communication or, the communication interface is used to send the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends the first Key material of a terminal; wherein, the key material of the first terminal includes: security information required by the first terminal for communication.
  • a readable storage medium is provided, and programs or instructions are stored on the readable storage medium, and when the programs or instructions are executed by a processor, the steps of the method described in the first aspect are realized, or the steps of the method described in the first aspect are realized, or The steps of the method described in the second aspect, or the steps of implementing the method described in the third aspect.
  • a chip in a tenth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the method as described in the first aspect , or implement the method as described in the second aspect, or implement the method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a non-volatile storage medium, and the program/program product is executed by at least one processor to implement the first The steps of the method described in the first aspect, or the steps of the method described in the second aspect, or the steps of the method described in the third aspect.
  • a communication device configured to perform the steps of the method described in the first aspect, or to perform the steps of the method described in the second aspect, or to perform the steps of the method described in the third aspect steps of the method.
  • the first core network device receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship ; so that the first terminal can obtain the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a network Issues related to key materials used by home smart devices during authorization/authentication.
  • FIG. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application is applicable
  • FIG. 2 shows a flow chart of the steps of the key material sending method provided by the embodiment of the present application
  • FIG. 3 shows a schematic diagram of the steps of the key material acquisition method provided by the embodiment of the present application.
  • FIG. 4 shows a schematic diagram of the steps of the information transmission method provided by the embodiment of the present application.
  • FIG. 5 shows an interactive schematic diagram of Example 1 provided by the embodiment of the present application
  • FIG. 6 shows an interactive schematic diagram of Example 2 provided by the embodiment of the present application.
  • FIG. 7 shows an interactive schematic diagram of Example 3 provided by the embodiment of the present application.
  • FIG. 8 shows an interactive schematic diagram of Example 4 provided by the embodiment of the present application.
  • FIG. 9 shows an interactive schematic diagram of Example 5 provided by the embodiment of the present application.
  • FIG. 10 shows an interactive schematic diagram of Example 6 provided by the embodiment of the present application.
  • Fig. 11 shows a schematic structural diagram of a device for sending key material provided by an embodiment of the present application
  • Figure 12 shows a schematic structural diagram of the device for obtaining key material provided by the embodiment of the present application.
  • FIG. 13 shows a schematic structural diagram of an information transmission device provided by an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 15 shows a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 16 shows a schematic structural diagram of a network-side device provided by an embodiment of the present application.
  • first, second and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein and that "first" and “second” distinguish objects. It is usually one category, and the number of objects is not limited. For example, there may be one or more first objects.
  • “and/or” in the description and claims means at least one of the connected objects, and the character “/” generally means that the related objects are an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technologies can be used for the above-mentioned systems and radio technologies as well as other systems and radio technologies.
  • NR New Radio
  • the following description describes the New Radio (NR) system for illustrative purposes, and uses NR terminology in most of the following descriptions, but these techniques can also be applied to applications other than NR system applications, such as the 6th generation (6 th Generation, 6G) communication system.
  • 6G 6th Generation
  • Fig. 1 shows a block diagram of a wireless communication system to which the embodiment of the present application is applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12 .
  • the terminal 11 can also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (Vehicle User Equipment, VUE), pedestrian terminal (Pedestrian User Equipment, PUE) and other terminal-side equipment, wearable devices include: smart watches, bracelets, earphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, where a base station may be called a node B, an evolved node B, an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service Basic Service Set (BSS), Extended Service Set (ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, Wireless Local Area Network (WLAN) Area Network, WLAN) access point, wireless fidelity (Wireless Fidelity, WiFi) node, transmitting and receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field, as long as the same technical effect is achieved, all The above-mentioned base stations are not limited to specific technical terms. It should be noted that in the embodiment of the present application, only the base stations in the NR system are taken
  • At least one embodiment of the present application provides a method for sending key material, which is executed by the first network function, including:
  • Step 201 the first network function receives first information, and the first information is used to determine the first association relationship between the first terminal and the second terminal
  • Step 202 according to the first association relationship, the first network function sends the key material of the first terminal;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first network function may be an access network function or a core network function, which is not specifically limited here.
  • the first network function receives the first information, determines that there is a first association relationship between the first terminal and the second terminal, and then generates and sends the key material of the first terminal based on the first association relationship.
  • the first information includes at least one of the following:
  • a first identifier is the device identifier and/or user identifier of the first terminal; the first identifier can uniquely confirm the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal; the second identifier can uniquely identify the second terminal.
  • the method also includes at least one of the following:
  • the first network function determines, according to the first information, that there is a first association relationship between the first terminal and the second terminal; for example, the first information includes the first identifier and the second identifier, then the first The network function determines that there is a first association between the first terminal and the second terminal; for another example, the first information is sent by the first terminal, and the first information only includes the second identifier. At this time, the first network function may also determine that the first There is a first association relationship between the terminal and the second terminal;
  • the first network function determines that there is a first association relationship between the first terminal and the second terminal according to the pre-stored association relationship and the first information; wherein the "pre-stored association relationship" may be stored in the first Local storage of network functions or storage in third-party functions.
  • the first terminal sends first information, where the first information is the second identifier, and the first network function obtains the first association relationship through local storage.
  • the method further includes:
  • the first network function sends the first identifier of the first terminal to the first terminal.
  • the first identifier is determined by the first network function or a third-party function, which is not specifically limited here.
  • the first association relationship includes at least one of the following:
  • the security information includes at least one of the following:
  • signing credential information includes at least one of the following:
  • 5G Key Set Identifier (Key Set Identifier in 5G, ngKSI).
  • the method also includes:
  • the first network function derives the keying material of the first terminal based on the keying material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the first information received in step 201 includes at least one of the following:
  • the first network function receives the first information sent by the first terminal
  • the first network function receives the first information sent by the second terminal
  • the first network function receives the first information sent by the third-party function;
  • the third-party function is an application server, and the third-party function can be set as a separate entity, or can be a module or unit set on another network entity, No specific limitation is made here;
  • the first network function receives the first information through a network exposure function (Network Exposure Function, NEF);
  • NEF Network Exposure Function
  • the first network function receives the first information through a Non Access Stratum (Non Access Stratum, NAS) message.
  • Non Access Stratum Non Access Stratum, NAS
  • the above NAS message is at least one of the following: a service request message; a registration request message; a protocol data unit (Protocol Data Unit, PDU) session establishment request message.
  • a service request message a registration request message
  • a protocol data unit Protocol Data Unit, PDU
  • the method before the first network function sends the key material of the first terminal, the method further includes:
  • the inquiry indication may be: bit information, a non-access stratum NAS message (for example, a configuration update command, a PDU session modification message), a new non-access stratum NAS message;
  • a non-access stratum NAS message for example, a configuration update command, a PDU session modification message
  • the authorization indication may be: success or failure indication (ACK/NACK), bit information, non-access stratum NAS message (for example, service request message, PDU session modification message), New non-access stratum NAS message;
  • ACK/NACK success or failure indication
  • bit information for example, service request message, PDU session modification message
  • non-access stratum NAS message for example, service request message, PDU session modification message
  • New non-access stratum NAS message for example, service request message, PDU session modification message
  • the first network function sends the key material of the first terminal, including:
  • the first network function sends the key material of the first terminal.
  • the first network function can send the key material of the first terminal only after receiving the authorization instruction from the second terminal.
  • the first network function sends the key material of the first terminal, including any of the following:
  • the first network function sends the key material of the first terminal to the second terminal, and sends the key material of the first terminal to the first terminal through the second terminal; in this case, the first The terminal and the second terminal need to establish a direct connection communication, and transmit the first information and the key material of the first terminal through the direct connection communication;
  • the first network function sends the key material of the first terminal to the third-party function, and the key material of the first terminal is sent to the first terminal through the third-party function; for example, the third-party function is an application server.
  • the method further includes at least one of the following:
  • the first network function starts a first timer, wherein the timing period of the first timer is the valid time of the security information of the first terminal; after the valid time is exceeded, the security information of the first terminal invalid.
  • the first timer can reuse the existing timer, and the relevant parameters of the first timer (such as start timing, timing period, etc.) can be obtained by the first terminal and the first network function
  • the key material further includes: a valid time, where the valid time is the valid time of the security information. After the validity time expires, the security information becomes invalid.
  • the method before sending the key material of the first terminal in step 202, the method further includes:
  • the first network function receives keying material for the first terminal from a second network function.
  • the first network function is Access and Mobility Management Function (Access and Mobility Management Function, AMF) or Radio Access Network (Radio Access Network, RAN), and the second network function is AMF or authentication server function (Authentication Server Function, AUSF).
  • AMF Access and Mobility Management Function
  • RAN Radio Access Network
  • AUSF Authentication Server Function
  • the first core network device receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key of the first terminal according to the first association relationship. Material; so that the first terminal can obtain the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a group Related key materials used by home smart devices during network authorization/authentication.
  • the embodiment of the present application also provides a method for obtaining key material, executed by the first terminal, including:
  • Step 301 the first terminal receives key material of the first terminal determined by a first network function, where the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first network function is an access network function or a core network function, which is not specifically limited here.
  • the key material of the first terminal is obtained by deriving the key material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the security information includes at least one of the following:
  • signing credential information includes at least one of the following:
  • Terminal routing selection policy (UE Route Selection Policy, URSP);
  • 5G Key Set Identifier (Key Set Identifier in 5G, ngKSI).
  • the method further includes:
  • the first terminal sends an initial verification message to the third-party function, where the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • the identifier of the first terminal can uniquely identify the first terminal
  • the default credential of the first terminal is the only credential that the first terminal can identify and verify security before accessing the bearer (onboarding);
  • the network identifier of the local network of the first terminal where the network identifier of the local network is a non-public network identifier different from a public land mobile network (Public Land Mobile Network, PLMN).
  • PLMN Public Land Mobile Network
  • step 301 includes any of the following:
  • the first terminal receives the key material of the first terminal sent by the first network function; that is, the first network function directly gives the key material of the first terminal to the first terminal;
  • the first terminal receives the key material of the first terminal sent by the second terminal, and the key material of the first terminal is sent to the second terminal by the first network function; that is, the first network function sends the key material of the first terminal to the second terminal.
  • the key material of one terminal is sent to the second terminal, and the second terminal forwards the key material of the first terminal to the first terminal; in this case, the first terminal and the second terminal need to establish direct communication;
  • the first terminal receives the key material of the first terminal sent by the third-party function, and the key material of the first terminal is sent by the first network function to the third-party function; that is, the first network function sends the key material of the first terminal to the third-party function;
  • the key material of a terminal is sent to the third-party function, and the third-party function forwards the key material of the first terminal to the first terminal.
  • the third-party function is an application server, and the third-party function may be set as a separate entity, or may be a module or unit set on another network entity, which is not specifically limited here.
  • the key material also includes:
  • Valid time where the valid time is the valid time of the security information. After the valid time expires, the security information becomes invalid.
  • the method also includes:
  • the first terminal After the valid time expires, the first terminal sends first update instruction information to the first network function, where the first update instruction information is used to instruct the first network function to update the key of the first terminal Material.
  • the first core network device receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key of the first terminal according to the first association relationship. Material; so that the first terminal can obtain the key material determined by the first core network device, so even if the function of the first terminal is limited, the security in the process of accessing the network by the first terminal can be guaranteed, and how to generate a group Related key materials used by home smart devices during network authorization/authentication.
  • the embodiment of the present application also provides an information transmission method, including:
  • Step 401 the second terminal or the third-party function sends the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends keying material for the first terminal;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the third-party function or the second terminal sends the first information to the first network function, and the first network function determines that there is a first association between the first terminal and the second terminal, then the first network function generates and sends the first information Keying material for a terminal.
  • the first information implicitly instructs the first network function to generate the key material of the first terminal.
  • the third-party function is an application server, and the third-party function may be set as a separate entity, or may be a module or unit set on another network entity.
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal.
  • the method further includes:
  • the second terminal or the third-party function receives the key material of the first terminal sent by the first network function and determined by the first network function;
  • the second terminal or the third-party function sends the key material of the first terminal to the first terminal.
  • the key material of the first terminal is derived from the key material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the method also includes:
  • the second terminal receives the inquiry indication sent by the first network function; for example, the inquiry indication may be: bit information, a non-access stratum NAS message (for example, a configuration update command, a PDU session modification message), a new non-access stratum NAS message information;
  • the inquiry indication may be: bit information, a non-access stratum NAS message (for example, a configuration update command, a PDU session modification message), a new non-access stratum NAS message information;
  • the second terminal sends an authorization indication to the first network function; for example, the authorization indication may be: success or failure indication (ACK/NACK), bit information, non-access stratum NAS message (for example, service request message, PDU session modification message), a new non-access stratum NAS message.
  • the first network function can send the key material of the first terminal only after receiving the authorization instruction from the second terminal.
  • the method further includes:
  • the third-party function receives the initial verification message sent by the first terminal, and the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • the identifier of the first terminal can uniquely identify the first terminal
  • the default credential of the first terminal is the only credential that the first terminal can identify and verify security before accessing the bearer (onboarding);
  • a network identifier of the local network of the first terminal where the network identifier of the local network is a non-public network identifier different from a public land mobile network (Public Land Mobile Network, PLMN).
  • PLMN Public Land Mobile Network
  • the first core network device receives the first information used to determine the first association relationship between the first terminal and the second terminal, and sends the key of the first terminal according to the first association relationship. Material; so that the first terminal can obtain the key material determined by the first core network device, so even if the function of the first terminal is limited, the security in the process of accessing the network by the first terminal can be guaranteed, and how to generate a group Related key materials used by home smart devices during network authorization/authentication.
  • Example 1 the second terminal sends the first information, instructing the first network function to generate the key material of the first terminal; as shown in Figure 5:
  • Step 51 the second terminal sends the first information to the first network function
  • Step 52 the first network function determines the key material of the first terminal according to the first association relationship between the first terminal and the second terminal;
  • Step 53 the first network function sends the key material of the first terminal to the first terminal.
  • Example 2 The second terminal sends the first information, instructing the first network function to generate the key material of the first terminal; the first terminal and the second terminal establish direct communication, and the first terminal receives the key material of the first terminal through the direct communication. key material.
  • Figure 6 As shown in Figure 6:
  • Step 61 the second terminal sends the first information to the first network function
  • Step 62 the first network function determines the key material of the first terminal according to the first association relationship between the first terminal and the second terminal;
  • Step 63 the first network function sends the key material of the first terminal to the second terminal;
  • Step 64 the first terminal establishes direct communication with the second terminal
  • Step 65 the second terminal sends the key material of the first terminal to the first terminal through direct communication.
  • Example 3 the first terminal and the second terminal establish a direct connection communication, the first terminal sends the first identifier through the direct connection communication, and the second terminal sends the first information, instructing the first network function to generate the key material of the first terminal; As shown in Figure 7:
  • Step 71 the first terminal establishes direct communication with the second terminal
  • Step 72 the first terminal sends the first identification to the second terminal through direct communication
  • Step 73 the second terminal sends the first information to the first network function according to the first identifier
  • Step 74 the first network function determines the key material of the first terminal according to the first association relationship between the first terminal and the second terminal;
  • Step 75 the first network function sends the key material of the first terminal to the second terminal;
  • Step 76 the second terminal sends the key material of the first terminal to the first terminal through direct communication.
  • Example 4 the first information is sent by the application server (that is, the third-party function), instructing the first network function to generate the key material of the first terminal; as shown in Figure 8:
  • Step 81 the first terminal sends an initial verification message to the application server, and the application server implements the verification and credit authorization of the first terminal;
  • Step 82 the application server sends the first information to the first network function
  • Step 83 the first network function confirms the authorization indication with the second terminal
  • Step 84 After receiving the confirmation of the authorization instruction from the second terminal, the first network function determines the key material of the first terminal according to the first association relationship between the first terminal and the second terminal;
  • Step 85 the first network function sends the key material of the first terminal to the application server
  • Step 86 the application server sends the key material of the first terminal to the first terminal.
  • Example 5 the first information is sent by the first terminal, and the first information includes the second identification; as shown in Figure 9:
  • Step 91 the first terminal sends the first information to the first network function; the first information includes the second identification;
  • Step 92 the first network function assigns the first identifier to the first terminal
  • Step 93 the first network function sends the first identification to the first terminal
  • Step 94 after the first network function determines that there is a first association relationship between the first terminal and the second terminal, determine the key material of the first terminal;
  • Step 95 the first network function sends the key material of the first terminal to the first terminal.
  • step 93, step 94 and step 95 have no absolute sequence; optionally, step 93 and step 95 may be sent together or separately, which is not specifically limited here.
  • Example 5 the first terminal sends the first information, instructing the first network function to generate the key material of the first terminal; as shown in Figure 10:
  • Step 101 the first terminal sends first information to the first network function;
  • the first information includes a first identifier and a second identifier;
  • Step 102 after the first network function determines the first association relationship according to the first information and network configuration, and determines the key material of the first terminal;
  • Step 103 the first network function sends the key material of the first terminal to the first terminal;
  • Step 104 the first network function starts a first timer, and the key material of the first terminal becomes invalid after the first timer expires;
  • Step 105 after the valid time expires, the first terminal sends a first update instruction letter to the first network function, instructing the first network function to update the key material of the first terminal.
  • the execution subject may be a device, or a control module in the device for executing the method.
  • the device execution method is taken as an example to describe the device provided in the embodiment of the present application.
  • the embodiment of this application also provides a key material sending device 900, including:
  • the first receiving module 901 is configured to receive first information, where the first information is used to determine a first association relationship between the first terminal and the second terminal
  • the first execution module 902 is configured to send the key material of the first terminal according to the first association relationship
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal.
  • the device further includes:
  • An identification sending module configured to send the first identification of the first terminal to the first terminal.
  • the device further includes at least one of the following:
  • a first determining submodule configured to determine, according to the first information, that a first association relationship exists between the first terminal and the second terminal;
  • the second determination submodule is configured to determine that a first association relationship exists between the first terminal and the second terminal according to the pre-stored association relationship and the first information.
  • the first association relationship includes at least one of the following:
  • the first association relationship is obtained through at least one of the following:
  • the first network function obtains the first association relationship according to configuration.
  • the security information includes at least one of the following:
  • the device also includes:
  • a derivation module configured to derive the key material of the first terminal according to the key material of the second terminal
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the first receiving module includes at least one of the following:
  • a first receiving submodule configured to receive the first information sent by the first terminal
  • a second receiving submodule configured to receive the first information sent by the second terminal
  • a third receiving submodule configured to receive the first information sent by a third-party function
  • a fourth receiving submodule configured to receive the first information through a network opening function
  • the fifth receiving submodule is configured to receive the first information through a non-access stratum message.
  • the device also includes:
  • an inquiry sending module configured to send an inquiry instruction to the second terminal
  • an authorization receiving module configured to receive an authorization indication sent by the second terminal
  • the first execution module includes:
  • the material sending submodule is configured to send the key material of the first terminal according to the authorization instruction.
  • the first execution module includes any of the following:
  • a first sending submodule configured to send the key material of the first terminal to the first terminal
  • the second sending submodule is configured to send the key material of the first terminal to a second terminal, and send the key material of the first terminal to the first terminal through the second terminal;
  • the third sending submodule is configured to send the key material of the first terminal to a third-party function, and send the key material of the first terminal to the first terminal through the third-party function.
  • the device further includes at least one of the following:
  • a timing processing module configured to start a first timer, wherein the timing period of the first timer is the valid time of the security information of the first terminal; after the valid time is exceeded, the first terminal's Security information is invalid.
  • the key material also includes:
  • Valid time where the valid time is the valid time of the security information.
  • the device also includes:
  • a material receiving module configured to receive the key material of the first terminal from the second network function.
  • the first core network device receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus Realize that the first terminal obtains the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a network authorization/ Issues related to key materials used by home smart devices during authentication.
  • the device for sending key material provided in the embodiment of this application is a device capable of executing the method for sending key material above, and all embodiments of the method for sending key material above are applicable to this device, and all Can achieve the same or similar beneficial effects.
  • the embodiment of the present application also provides an apparatus 1000 for obtaining key material, including:
  • the second receiving module 1001 is configured to receive the key material of the first terminal determined by the first network function, wherein the key material of the first terminal includes: the security required by the first terminal for communication information.
  • the key material of the first terminal is obtained by deriving the key material of the second terminal;
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the security information includes at least one of the following:
  • the device also includes:
  • a verification sending module configured to send an initial verification message to a third-party function, where the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • a network identifier of the local network of the first terminal is
  • the second receiving module includes any of the following:
  • the sixth receiving submodule is configured to receive the key material of the first terminal sent by the first network function
  • the seventh receiving submodule is configured to receive the key material of the first terminal sent by the second terminal, and the key material of the first terminal is sent to the second terminal by the first network function;
  • the eighth receiving submodule is configured to receive the key material of the first terminal sent by a third-party function, and the key material of the first terminal is sent to the third-party function by the first network function.
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the device also includes:
  • a first update module configured to send, by the first terminal, first update instruction information to the first network function after the validity time has expired, where the first update instruction information is used to instruct the first network function to update the key material of the first terminal.
  • the first core network device receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus Realize that the first terminal obtains the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a network authorization/ Issues related to key materials used by home smart devices during authentication.
  • the device for obtaining key material provided in the embodiment of this application is a device capable of executing the above-mentioned method for obtaining key material, and all embodiments of the above-mentioned method for obtaining key material are applicable to this device, and all Can achieve the same or similar beneficial effects.
  • the embodiment of the present application also provides an information transmission device 1100, including:
  • the first sending module 1101 is configured to send the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends the first keying material for the terminal;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first information includes at least one of the following:
  • a first identifier is a device identifier and/or a user identifier of the first terminal;
  • a second identifier is a device identifier and/or a user identifier of the second terminal.
  • the device also includes:
  • a third receiving module configured to receive the key material of the first terminal determined by the first network function and sent by the first network function
  • a second sending module configured to send the key material of the first terminal to the first terminal.
  • the key material of the first terminal is derived from the key material of the second terminal
  • the key material of the second terminal includes: security information required by the second terminal for communication.
  • the device also includes:
  • an inquiry receiving module configured to receive an inquiry instruction sent by the first network function
  • An authorization sending module configured to send an authorization indication to the first network function.
  • the device also includes:
  • a verification module configured to receive an initial verification message sent by the first terminal, where the initial verification message is used for the third-party function to verify and authorize the first terminal.
  • the initial verification message includes at least one of the following:
  • a network identifier of the local network of the first terminal is
  • the first core network device receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus Realize that the first terminal obtains the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a network authorization/ Issues related to key materials used by home smart devices during authentication.
  • the information transmission device provided in the embodiment of the present application is a device capable of executing the above information transmission method, and all embodiments of the above information transmission method are applicable to the device, and can achieve the same or similar beneficial effects.
  • the sending device, obtaining device or information transmitting device in the embodiment of the present application may be a device, a device with an operating system or an electronic device, or a component, an integrated circuit, or a chip in a terminal.
  • the apparatus or electronic equipment may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may include but not limited to the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machines or self-service machines, etc., are not specifically limited in this embodiment of the present application.
  • the sending device, acquiring device or information transmitting device provided in the embodiments of the present application can realize each process realized by the method embodiments in Fig. 1 to Fig. 8, and achieve the same technical effect, and to avoid repetition, details are not repeated here.
  • this embodiment of the present application further provides a communication device 1200, including a processor 1201, a memory 1202, and programs or instructions stored in the memory 1202 and operable on the processor 1201,
  • a communication device 1200 including a processor 1201, a memory 1202, and programs or instructions stored in the memory 1202 and operable on the processor 1201,
  • the communication device 1200 is the first network function
  • the program or instruction is executed by the processor 1201
  • each process of the above-mentioned key material sending method embodiment can be realized, and the same technical effect can be achieved.
  • the communication device 1200 is the first terminal, when the program or instruction is executed by the processor 1201, each process of the above embodiment of the key material acquisition method can be realized, and the same technical effect can be achieved.
  • each process of the above-mentioned information transmission method embodiment can be achieved, and the same technical effect can be achieved. To avoid repetition, it is not repeated here repeat.
  • the embodiment of the present application also provides a terminal, including a processor and a communication interface, such as a first terminal, where the communication interface is used to receive the key material of the first terminal determined by the first network function, wherein the first
  • the key material of the terminal includes: the security information required for the first terminal to communicate; as for the second terminal, the communication interface is used to send the first information to the first network function, so that the first network function receives After receiving the first information, it is determined that there is a first association relationship between the first terminal and the second terminal, and the key material of the first terminal is sent; wherein, the key material of the first terminal includes: the first terminal communicates required security information.
  • FIG. 15 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 1300 includes, but is not limited to: a radio frequency unit 1301, a network module 1302, an audio output unit 1303, an input unit 1304, a sensor 1305, a display unit 1306, a user input unit 1307, an interface unit 1308, a memory 1309, and a processor 1310, etc. at least some of the components.
  • the terminal 1300 can also include a power supply (such as a battery) for supplying power to various components, and the power supply can be logically connected to the processor 1310 through the power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • a power supply such as a battery
  • the terminal structure shown in FIG. 15 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine some components, or arrange different components, which will not be repeated here.
  • the input unit 1304 may include a graphics processor (Graphics Processing Unit, GPU) 13041 and a microphone 13042, and the graphics processor 13041 is used for the image capture device (such as the image data of the still picture or video obtained by the camera) for processing.
  • the display unit 1306 may include a display panel 13061, and the display panel 13061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1307 includes a touch panel 13071 and other input devices 13072 . Touch panel 13071, also called touch screen.
  • the touch panel 13071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 13072 may include, but are not limited to, physical keyboards, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, and joysticks, which will not be repeated here.
  • the radio frequency unit 1301 receives the downlink data from the network side device, and processes it to the processor 1310; in addition, sends the uplink data to the network side device.
  • the radio frequency unit 1301 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the memory 1309 can be used to store software programs or instructions as well as various data.
  • the memory 1309 may mainly include a program or instruction storage area and a data storage area, wherein the program or instruction storage area may store an operating system, an application program or instructions required by at least one function (such as a sound playback function, an image playback function, etc.) and the like.
  • the memory 1309 may include a high-speed random access memory, and may also include a nonvolatile memory, wherein the nonvolatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • PROM erasable programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the processor 1310 may include one or more processing units; optionally, the processor 1310 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, application programs or instructions, etc., Modem processors mainly handle wireless communications, such as baseband processors. It can be understood that the foregoing modem processor may not be integrated into the processor 1310 .
  • the radio frequency unit 1301 is configured to receive the key material of the first terminal determined by the first network function, wherein the key material of the first terminal includes: security information required by the first terminal for communication ;
  • the radio frequency unit 1301 is configured to send the first information to the first network function, so that the first network function determines that there is a first association relationship between the first terminal and the second terminal after receiving the first information and sends the first terminal key material;
  • the key material of the first terminal includes: security information required by the first terminal for communication.
  • the first core network device receives the first information for determining the first association relationship between the first terminal and the second terminal, and sends the key material of the first terminal according to the first association relationship; thus Realize that the first terminal obtains the key material determined by the first core network device, so even if the function of the first terminal is limited, the security of the first terminal in the process of accessing the network can be guaranteed, and how to generate a network authorization/ Issues related to key materials used by home smart devices during authentication.
  • the embodiment of the present application also provides a network side device, such as a first network function, including a processor and a communication interface, the communication interface is used to receive the first information, and the first information is used to determine the first terminal and the second terminal.
  • a network side device such as a first network function, including a processor and a communication interface
  • the communication interface is used to receive the first information
  • the first information is used to determine the first terminal and the second terminal.
  • a first association relationship exists between the terminals
  • the processor is further configured to send the key material of the first terminal through the communication interface according to the first association relationship; wherein the key material of the first terminal includes : Security information required by the first terminal for communication.
  • the network-side device embodiment corresponds to the above-mentioned network-side device method embodiment, and each implementation process and implementation mode of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network device 1400 includes: an antenna 141 , a radio frequency device 142 , and a baseband device 143 .
  • the antenna 141 is connected to the radio frequency device 142 .
  • the radio frequency device 142 receives information through the antenna 141, and sends the received information to the baseband device 143 for processing.
  • the baseband device 143 processes the information to be sent and sends it to the radio frequency device 142
  • the radio frequency device 142 processes the received information and sends it out through the antenna 141 .
  • the above frequency band sending device may be located in the baseband device 143 , and the method performed by the network side device in the above embodiment may be implemented in the baseband device 143 , and the baseband device 143 includes a processor 144 and a memory 145 .
  • the baseband device 143 can include at least one baseband board, for example, a plurality of chips are arranged on the baseband board, as shown in FIG.
  • the baseband device 143 may also include a network interface 146 for exchanging information with the radio frequency device 142, such as a common public radio interface (CPRI for short).
  • a network interface 146 for exchanging information with the radio frequency device 142, such as a common public radio interface (CPRI for short).
  • CPRI common public radio interface
  • the network side device in the embodiment of the present invention also includes: instructions or programs stored in the memory 145 and executable on the processor 144, and the processor 144 calls the instructions or programs in the memory 145 to execute the modules shown in FIG. 16 To avoid duplication, the method of implementation and to achieve the same technical effect will not be repeated here.
  • the embodiment of the present application also provides a readable storage medium, the readable storage medium may be nonvolatile or volatile, the readable storage medium stores programs or instructions, and the programs or instructions are stored in When executed by the processor, the processes of the above embodiment of the method for sending key material or the embodiment of the method for obtaining key material or the embodiment of the information transmission method can achieve the same technical effect. To avoid repetition, details are not repeated here.
  • the processor is the processor in the terminal described in the foregoing embodiments.
  • the readable storage medium includes computer readable storage medium, such as computer read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
  • An embodiment of the present application also provides a computer program product, the computer program product is stored in a non-transitory storage medium, and the computer program product is executed by at least one processor to implement the above-mentioned key material sending method embodiment Or the various processes of the embodiment of the key material acquisition method or the embodiment of the information transmission method can achieve the same technical effect. In order to avoid repetition, details are not repeated here.
  • the embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the above-mentioned key material sending method.
  • the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
  • the embodiment of the present application also provides a computer program product, the computer program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the steps of the various methods described above .
  • the term “comprising”, “comprising” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase “comprising a " does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
  • the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions are performed, for example, the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
  • the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation.
  • the technical solution of the present application can be embodied in the form of computer software products, which are stored in a storage medium (such as ROM/RAM, magnetic disk, etc.) , CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请公开了一种密钥材料的发送方法、获取方法、信息传输方法及设备,属于通信技术领域,本申请实施例的密钥材料的发送方法包括第一网络功能接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;根据所述第一关联关系,所述第一网络功能发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。

Description

密钥材料的发送方法、获取方法、信息传输方法及设备
相关申请的交叉引用
本申请主张在2021年06月09日在中国提交的中国专利申请No.202110644691.9的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种密钥材料的发送方法、获取方法、信息传输方法及设备。
背景技术
随着物联网和智能家居的普及,一个家庭中可能存在多个智能家居。智能家居通过将家中的各种设备(如音视频设备、照明系统、窗帘控制、空调控制、安防系统等)连接到一起、互相通信,以此形成一个通信拓扑网络,提供家电控制、照明控制、电话远程控制、室内外遥控、防盗报警、环境监测、暖通控制等多种功能和手段。
为了利用第5代(5 th Generation,5G)网络服务,在智能家庭网络组网时,所有智能家庭中的设备都需要访问5G网络。然而,许多智能物联网设备只具有有限的功能(也可称为功能受限),而如何为这些功能受限的智能物联网设备提供相关安全材料是亟待解决的问题。
发明内容
本申请实施例提供一种密钥材料的发送方法、获取方法、信息传输方法及设备,能够解决如何为功能受限的智能物联网设备提供相关安全材料的问题。
第一方面,提供了一种密钥材料的发送方法,包括:
第一网络功能接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
根据所述第一关联关系,所述第一网络功能发送所述第一终端的密钥材 料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第二方面,提供了一种密钥材料的获取方法,包括:
第一终端接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第三方面,提供了一种信息传输方法,包括:
第二终端或第三方功能向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第四方面,提供了一种密钥材料的发送装置,包括:
第一接收模块,用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
第一执行模块,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第五方面,提供了一种密钥材料的获取装置,包括:
第二接收模块,用于接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第六方面,提供了一种信息传输装置,包括:
第一发送模块,用于向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第七方面,提供了一种通信设备,该终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤,或实现如第三方面所述的方法的步骤。
第八方面,提供了一种通信设备,包括处理器及通信接口,其中,所述通信接口用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;根据所述第一关联关系,发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;
或者,所述通信接口用于接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;或者,所述通信接口用于向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
第九方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
第十方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第二方面所述的方法,或实现如第三方面所述的方法。
第十一方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在非易失的存储介质中,所述程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤,或实现如第三方面所述的方法的步骤。
第十二方面,提供了一种通信设备,被配置为执行如第一方面所述的方法的步骤,或者,执行如第二方面所述的方法的步骤,或者,执行如第三方 面所述的方法的步骤。
在本申请实施例中,第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
附图说明
图1表示本申请实施例可应用的一种无线通信系统的框图;
图2表示本申请实施例提供的密钥材料的发送方法的步骤流程图;
图3表示本申请实施例提供的密钥材料的获取方法的步骤示意图;
图4表示本申请实施例提供的信息传输方法的步骤示意图;
图5表示本申请实施例提供的示例一的交互示意图;
图6表示本申请实施例提供的示例二的交互示意图;
图7表示本申请实施例提供的示例三的交互示意图;
图8表示本申请实施例提供的示例四的交互示意图;
图9表示本申请实施例提供的示例五的交互示意图;
图10表示本申请实施例提供的示例六的交互示意图;
图11表示本申请实施例提供的密钥材料的发送装置的结构示意图;
图12表示本申请实施例提供的密钥材料的获取装置的结构示意图;
图13表示本申请实施例提供的信息传输装置的结构示意图;
图14是本申请实施例提供的通信设备的结构示意图;
图15表示本申请实施例提供的终端的结构示意图;
图16表示本申请实施例提供的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施 例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency-Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6 th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11也可以称作终端设备或者用户终端(User Equipment,UE),终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、可穿戴式设备(Wearable Device)或车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)等终端侧设备,可穿戴式设备包括:智能手表、手环、耳机、眼镜等。需要说明的是, 在本申请实施例并不限定终端11的具体类型。网络侧设备12可以是基站或核心网,其中,基站可被称为节点B、演进节点B、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、B节点、演进型B节点(Evolved Node B,eNB)、家用B节点、家用演进型B节点、无线局域网(Wireless Local Area Network,WLAN)接入点、无线保真(Wireless Fidelity,WiFi)节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例,但是并不限定基站的具体类型。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的密钥材料的发送方法、获取方法、信息传输方法及设备进行详细地说明。
如图2所示,本申请的至少一个实施例提供一种密钥材料的发送方法,由第一网络功能执行,包括:
步骤201,第一网络功能接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系
步骤202,根据所述第一关联关系,所述第一网络功能发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
需要说明的是,该第一网络功能可以为接入网功能或核心网功能,在此不做具体限定。
本申请实施例中,第一网络功能接收到第一信息,确定第一终端和第二终端之间存在第一关联关系,则基于该第一关联关系生成并发送第一终端的密钥材料。
作为一个可选实施例,所述第一信息包括下述至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;该第一标识可以唯一确认所述第一终端;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识;该 第二标识可以唯一确认所述第二终端。
作为一个可选实施例,所述方法还包括下述至少一项:
所述第一网络功能根据所述第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系;例如,第一信息包括第一标识和第二标识,则第一网络功能确定第一终端和第二终端之间存在第一关联关系;再例如,第一信息由第一终端发送,第一信息仅包括第二标识,此时第一网络功能也可以确定第一终端和第二终端之间存在第一关联关系;
所述第一网络功能根据预存储的关联关系以及第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系;其中“预存储的关联关系”可以存储在第一网络功能的本地存储或存储在第三方功能中。例如,第一终端发送第一信息,第一信息为所述第二标识,第一网络功能通过本地存储获得第一关联关系。
作为一个可选实施例,若第一信息中不包含所述第一标识,所述方法还包括:
第一网络功能向所述第一终端发送所述第一终端的第一标识。例如,第一标识由第一网络功能或第三方功能确定,在此不做具体限定。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为另一个可选实施例,所述安全信息包括下述至少一项:
安全密钥;
安全参数;
签约凭据信息,例如,签约凭据信息包括以下至少一项:
签约凭据长期密钥;
用户标识;
终端路由选择策略(URSP);
5G密钥集标识(Key Set Identifier in 5G,ngKSI)。
在本申请的至少一个实施例中,所述方法还包括:
第一网络功能根据所述第二终端的密钥材料派生所述第一终端的密钥材料;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
在本申请的至少一个实施例中,步骤201中接收第一信息,包括以下至少一项:
第一网络功能接收第一终端发送的所述第一信息;
第一网络功能接收第二终端发送的所述第一信息;
第一网络功能接收第三方功能发送的所述第一信息;例如,第三方功能为应用服务器,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元,在此不做具体限定;
第一网络功能通过网络开放功能(Network Exposure Function,NEF)接收所述第一信息;
第一网络功能通过非接入层(Non Access Stratum,NAS)消息接收所述第一信息。
可选地,上述NAS消息为以下至少一项:服务请求消息;注册请求消息;协议数据单元(Protocol Data Unit,PDU)会话建立请求消息。
在本申请的至少一个可选实施例中,第一网络功能发送所述第一终端的密钥材料之前,所述方法还包括:
向第二终端发送询问指示;例如询问指示可以是:比特信息、非接入层NAS消息(例如,配置更新命令、PDU会话修改消息)、新的非接入层NAS消息;
接收所述第二终端发送的授权指示;例如,授权指示可以是:成功或失败指示(ACK/NACK)、比特信息、非接入层NAS消息(例如,服务请求消息、PDU会话修改消息)、新的非接入层NAS消息;
相应的,步骤202中第一网络功能发送所述第一终端的密钥材料,包括:
根据所述授权指示,第一网络功能发送所述第一终端的密钥材料。换言之,该可选实施例中,第一网络功能需要在接收到第二终端的授权指示后, 才能够发送第一终端的密钥材料。
作为一个可选实施例,步骤202中所述第一网络功能发送所述第一终端的密钥材料,包括以下任意一项:
第一网络功能向所述第一终端发送所述第一终端的密钥材料;
第一网络功能向第二终端发送所述第一终端的密钥材料,通过所述第二终端将所述第一终端的密钥材料发送至所述第一终端;此种情况下,第一终端和第二终端需建立直连通信,通过直连通信传输第一信息和第一终端的密钥材料;
第一网络功能向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端;例如,第三方功能为应用服务器。
作为一个可选实施例,所述方法还包括以下至少一项:
第一网络功能启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端的安全信息无效。
需要说明的是,第一计时器可以复用现有计时器,则第一计时器的相关参数(例如启动时机,计时时段等),第一终端和第一网络功能均可获取到
可选地,密钥材料中还包括:有效时间,所述有效时间为安全信息的有效时间。在超过所述有效时间超时后,该安全信息无效。
作为另一个可选实施例,步骤202中发送所述第一终端的密钥材料之前,还包括:
第一网络功能从第二网络功能接收所述第一终端的密钥材料。
例如,第一网络功能为接入及移动性管理功能(Access and Mobility Management Function,AMF)或无线接入网(Radio Access Network,RAN),第二网络功能为AMF或鉴权服务器功能(Authentication Server Function,AUSF)。
综上,本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料, 因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
如图3所示,本申请实施例还提供一种密钥材料的获取方法,由第一终端执行,包括:
步骤301,第一终端接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
需要说明的是,该第一网络功能为接入网功能或核心网功能,在此不做具体限定。
作为一个可选实施例,所述第一终端的密钥材料是根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为另一个可选实施例,所述安全信息包括下述至少一项:
安全密钥;
安全参数;
签约凭据信息;例如,签约凭据信息包括以下至少一项:
签约凭据长期密钥;
用户标识;
终端路由选择策略(UE Route Selection Policy,URSP);
5G密钥集标识(Key Set Identifier in 5G,ngKSI)。
作为一个可选实施例,步骤301之前,所述方法还包括:
第一终端向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
其中,所述初始验证消息包括以下至少一项:
所述第一终端的标识;该标识可以唯一确认所述第一终端;
所述第一终端的默认凭据;该默认凭据为第一终端在接入承载(onboarding)之前唯一可识别且验证安全性的凭据;
所述第一终端的本地网络的网络标识,所述本地网络的网络标识为不同 于公共陆地移动网(Public Land Mobile Network,PLMN)的非公共网络标识。
在本申请的至少一个可选实施例中,步骤301包括以下任意一项:
第一终端接收所述第一网络功能发送的所述第一终端的密钥材料;即第一网络功能直接给第一终端该第一终端的密钥材料;
第一终端接收第二终端发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第二终端;即第一网络功能将第一终端的密钥材料发送给第二终端,由第二终端将第一终端的密钥材料转发至第一终端;此种情况下,第一终端和第二终端需建立直连通信;
第一终端接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第三方功能;即第一网络功能将第一终端的密钥材料发送给第三方功能,由第三方功能将第一终端的密钥材料转发至第一终端。例如,第三方功能为应用服务器,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元,在此不做具体限定。
作为一个可选实施例,所述密钥材料还包括:
有效时间,所述有效时间为所述安全信息的有效时间。在超过所述有效时间后,所述安全信息无效。
作为另一个可选实施例,所述方法还包括:
在超过所述有效时间后,第一终端向所述第一网络功能发送第一更新指示信息,所述第一更新指示信息用于指示所述第一网络功能更新所述第一终端的密钥材料。
综上,本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
如图4所示,本申请实施例还提供一种信息传输方法,包括:
步骤401,第二终端或第三方功能向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关 联关系并发送第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
本申请实施例中,第三方功能或第二终端向第一网络功能发送第一信息,第一网络功能确定第一终端和第二终端存在第一关联关系,则第一网络功能生成并发送第一终端的密钥材料。换言之,第一信息隐式指示第一网络功能生成第一终端的密钥材料。
需要说明的是,第三方功能为应用服务器,该第三方功能可以设置为单独的实体,也可以为设置于其他网络实体上的模块或单元。
作为一个可选实施例,所述第一信息包括下述至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识。
作为一个可选实施例,步骤401之后,所述方法还包括:
第二终端或第三方功能接收所述第一网络功能发送的由所述第一网络功能确定的第一终端的密钥材料;
第二终端或第三方功能将所述第一终端的密钥材料发送至所述第一终端。
在本申请的至少一个可选实施例中,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
在本申请的至少一个可选实施例中,所述方法还包括:
第二终端接收所述第一网络功能发送的询问指示;例如询问指示可以是:比特信息、非接入层NAS消息(例如,配置更新命令、PDU会话修改消息)、新的非接入层NAS消息;
第二终端向所述第一网络功能发送授权指示;例如,授权指示可以是:成功或失败指示(ACK/NACK)、比特信息、非接入层NAS消息(例如,服务请求消息、PDU会话修改消息)、新的非接入层NAS消息。该可选实施例中,第一网络功能需要在接收到第二终端的授权指示后,才能够发送第一终端的密钥材料。
作为一个可选实施例,步骤401之前,所述方法还包括:
第三方功能接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
其中,所述初始验证消息包括以下至少一项:
所述第一终端的标识;该标识可以唯一确认所述第一终端;
所述第一终端的默认凭据;该默认凭据为第一终端在接入承载(onboarding)之前唯一可识别且验证安全性的凭据;
所述第一终端的本地网络的网络标识,所述本地网络的网络标识为不同于公共陆地移动网(Public Land Mobile Network,PLMN)的非公共网络标识。
综上,本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
为了更清楚的描述本申请实施例提供的方法,下面结合几个示例进行说明。
示例一,由第二终端发送第一信息,指示第一网络功能生成第一终端的密钥材料;如图5所示:
步骤51,第二终端向第一网络功能发送第一信息;
步骤52,第一网络功能根据第一终端和第二终端的第一关联关系,确定第一终端的密钥材料;
步骤53,第一网络功能将第一终端的密钥材料发送至第一终端。
示例二,由第二终端发送第一信息,指示第一网络功能生成第一终端的密钥材料;第一终端和第二终端建立直连通信,第一终端通过直连通信接收第一终端的密钥材料。如图6所示:
步骤61,第二终端向第一网络功能发送第一信息;
步骤62,第一网络功能根据第一终端和第二终端的第一关联关系,确定第一终端的密钥材料;
步骤63,第一网络功将第一终端的密钥材料发送至第二终端;
步骤64,第一终端和第二终端建立直连通信;
步骤65,第二终端通过直连通信将第一终端的密钥材料发送至第一终端。
示例三,第一终端和第二终端建立直连通信,第一终端通过直连通信发送第一标识,由第二终端发送第一信息,指示第一网络功能生成第一终端的密钥材料;如图7所示:
步骤71,第一终端和第二终端建立直连通信;
步骤72,第一终端通过直连通信向第二终端发送第一标识;
步骤73,第二终端根据第一标识,向第一网络功能发送第一信息;
步骤74,第一网络功能根据第一终端和第二终端的第一关联关系,确定第一终端的密钥材料;
步骤75,第一网络功将第一终端的密钥材料发送至第二终端;
步骤76,第二终端通过直连通信将第一终端的密钥材料发送至第一终端。
示例四,由应用服务器(即第三方功能)发送第一信息,指示第一网络功能生成第一终端的密钥材料;如图8所示:
步骤81(可选地),第一终端向应用服务器发送初始验证消息,由应用服务器实现第一终端的校验和授信;
步骤82,应用服务器向第一网络功能发送第一信息;
步骤83(可选地),第一网络功能与第二终端进行授权指示确认;
步骤84,接收到第二终端的授权指示确认后,第一网络功能根据第一终端和第二终端的第一关联关系,确定第一终端的密钥材料;
步骤85,第一网络功能将第一终端的密钥材料发送至应用服务器;
步骤86,应用服务器将第一终端的密钥材料发送至第一终端。
示例五,由第一终端发送第一信息,第一信息包括第二标识;如图9所示:
步骤91,第一终端向第一网络功能发送第一信息;第一信息包括第二标识;
步骤92,第一网络功能为第一终端分配第一标识;
步骤93,第一网络功将第一标识发送至第一终端;
步骤94,第一网络功能确定第一终端和第二终端存在第一关联关系后, 确定第一终端的密钥材料;
步骤95,第一网络功能将第一终端的密钥材料发送至第一终端。
需要说明的是,上述步骤93、步骤94以及步骤95没有绝对的先后顺序;可选地,步骤93和步骤95可以一起发送,也可以分别发送,在此不做具体限定。
示例五,由第一终端发送第一信息,指示第一网络功能生成第一终端的密钥材料;如图10所示:
步骤101,第一终端向第一网络功能发送第一信息;第一信息包括第一标识和第二标识;
步骤102,第一网络功能根据第一信息以及网络配置确定第一关联关系后,并确定第一终端的密钥材料;
步骤103,第一网络功能将第一终端的密钥材料发送至第一终端;
步骤104,第一网络功能启动第一计时器,第一计时器到时后第一终端的密钥材料无效;
步骤105,超过有效时间后,第一终端向第一网络功能发送第一更新指示信,指示第一网络功能更新第一终端的密钥材料。
需要说明的是,本申请实施例提供的方法,执行主体可以为装置,或者,该装置中的用于执行方法的控制模块。本申请实施例中以装置执行方法为例,说明本申请实施例提供的装置。
如图11所示,本申请实施例还提供一种密钥材料的发送装置900,包括:
第一接收模块901,用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系
第一执行模块902,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一信息包括下述至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识。
作为一个可选实施例,若第一信息中不包含所述第一标识,所述装置还包括:
标识发送模块,用于向所述第一终端发送所述第一终端的第一标识。
作为一个可选实施例,所述装置还包括下述至少一项:
第一确定子模块,用于根据所述第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系;
第二确定子模块,用于根据预存储的关联关系以及第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系。
作为一个可选实施例,所述第一关联关系包含以下至少一项:
第一终端的设备标识与第二终端的设备标识之间的关联关系;
第一终端的设备标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的用户标识之间的关联关系;
第一终端的用户标识与第二终端的设备标识之间的关联关系。
作为一个可选实施例,所述第一关联关系通过下述至少一项获得:
根据第一信息获得所述第一关联关系,所述第一信息指示所述第一关联关系;
所述第一网络功能根据配置获得所述第一关联关系。
作为一个可选实施例,所述安全信息包括下述至少一项:
安全密钥;
安全参数;
签约凭据信息。
作为一个可选实施例,所述装置还包括:
派生模块,用于根据所述第二终端的密钥材料派生所述第一终端的密钥材料;
所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一接收模块包括以下至少一项:
第一接收子模块,用于接收第一终端发送的所述第一信息;
第二接收子模块,用于接收第二终端发送的所述第一信息;
第三接收子模块,用于接收第三方功能发送的所述第一信息;
第四接收子模块,用于通过网络开放功能接收所述第一信息;
第五接收子模块,用于通过非接入层消息接收所述第一信息。
作为一个可选实施例,所述装置还包括:
询问发送模块,用于向第二终端发送询问指示;
授权接收模块,用于接收所述第二终端发送的授权指示;
所述第一执行模块包括:
材料发送子模块,用于根据所述授权指示,发送所述第一终端的密钥材料。
作为一个可选实施例,所述第一执行模块包括以下任意一项:
第一发送子模块,用于向所述第一终端发送所述第一终端的密钥材料;
第二发送子模块,用于向第二终端发送所述第一终端的密钥材料,通过所述第二终端将所述第一终端的密钥材料发送至所述第一终端;
第三发送子模块,用于向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端。
作为一个可选实施例,所述装置还包括以下至少一项:
计时处理模块,用于启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端的安全信息无效。
作为一个可选实施例,所述密钥材料还包括:
有效时间,所述有效时间为所述安全信息的有效时间。
作为一个可选实施例,所述装置还包括:
材料接收模块,用于从第二网络功能接收所述第一终端的密钥材料。
本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的密钥材料的发送装置是能够执行上 述密钥材料的发送方法的装置,则上述密钥材料的发送方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
如图12所示,本申请实施例还提供一种密钥材料的获取装置1000,包括:
第二接收模块1001,用于接接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一终端的密钥材料是根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述安全信息包括下述至少一项:
安全密钥;
安全参数;
签约凭据信息。
作为一个可选实施例,所述装置还包括:
验证发送模块,用于向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
作为一个可选实施例,所述初始验证消息包括以下至少一项:
所述第一终端的标识;
所述第一终端的默认凭据;
所述第一终端的本地网络的网络标识。
作为一个可选实施例,所述第二接收模块包括以下任意一项:
第六接收子模块,用于接收所述第一网络功能发送的所述第一终端的密钥材料;
第七接收子模块,用于接收第二终端发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第二终端;
第八接收子模块,用于接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第三方功能。
作为一个可选实施例,其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述装置还包括:
第一更新模块,用于在超过所述有效时间后,所述第一终端向第一网络功能发送第一更新指示信息,所述第一更新指示信息用于指示所述第一网络功能更新所述第一终端的密钥材料。。
本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的密钥材料的获取装置是能够执行上述密钥材料的获取方法的装置,则上述密钥材料的获取方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
如图13所示,本申请实施例还提供一种信息传输装置1100,包括:
第一发送模块1101,用于向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
作为一个可选实施例,所述第一信息包括下述至少一项:
第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识。
作为一个可选实施例,所述装置还包括:
第三接收模块,用于接收所述第一网络功能发送的由所述第一网络功能确定的第一终端的密钥材料;
第二发送模块,用于将所述第一终端的密钥材料发送至所述第一终端。
作为一个可选实施例,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
作为一个可选实施例,所述装置还包括:
询问接收模块,用于接收所述第一网络功能发送的询问指示;
授权发送模块,用于向所述第一网络功能发送授权指示。
作为一个可选实施例,所述装置还包括:
验证模块,用于接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
作为一个可选实施例,所述初始验证消息包括以下至少一项:
所述第一终端的标识;
所述第一终端的默认凭据;
所述第一终端的本地网络的网络标识。
本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
需要说明的是,本申请实施例提供的信息传输装置是能够执行上述信息传输方法的装置,则上述信息传输方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
本申请实施例中的发送装置、获取装置或信息传输装置可以是装置,具有操作系统的装置或电子设备,也可以是终端中的部件、集成电路、或芯片。该装置或电子设备可以是移动终端,也可以为非移动终端。示例性的,移动终端可以包括但不限于上述所列举的终端11的类型,非移动终端可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例提供的发送装置、获取装置或信息传输装置能够实现图1至图8的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复, 这里不再赘述。
可选地,如图14所示,本申请实施例还提供一种通信设备1200,包括处理器1201,存储器1202,存储在存储器1202上并可在所述处理器1201上运行的程序或指令,例如,该通信设备1200为第一网络功能时,该程序或指令被处理器1201执行时实现上述密钥材料的发送方法实施例的各个过程,且能达到相同的技术效果。该通信设备1200为第一终端时,该程序或指令被处理器1201执行时实现上述密钥材料的获取方法实施例的各个过程,且能达到相同的技术效果。该通信设备1200为第二终端或第三方功能时,该程序或指令被处理器1201执行时实现上述信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,如第一终端,所述通信接口用于接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;如第二终端,所述通信接口用于向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。该终端实施例是与上述终端侧方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图15为实现本申请实施例的一种终端的硬件结构示意图。
该终端1300包括但不限于:射频单元1301、网络模块1302、音频输出单元1303、输入单元1304、传感器1305、显示单元1306、用户输入单元1307、接口单元1308、存储器1309、以及处理器1310等中的至少部分部件。
本领域技术人员可以理解,终端1300还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1310逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图15中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1304可以包括图形处理器 (Graphics Processing Unit,GPU)13041和麦克风13042,图形处理器13041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1306可包括显示面板13061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板13061。用户输入单元1307包括触控面板13071以及其他输入设备13072。触控面板13071,也称为触摸屏。触控面板13071可包括触摸检测装置和触摸控制器两个部分。其他输入设备13072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1301将来自网络侧设备的下行数据接收后,给处理器1310处理;另外,将上行的数据发送给网络侧设备。通常,射频单元1301包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1309可用于存储软件程序或指令以及各种数据。存储器1309可主要包括存储程序或指令区和存储数据区,其中,存储程序或指令区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1309可以包括高速随机存取存储器,还可以包括非易失性存储器,其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。
处理器1310可包括一个或多个处理单元;可选地,处理器1310可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序或指令等,调制解调处理器主要处理无线通信,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1310中。
其中,射频单元1301,用于接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息;
或者射频单元1301,用于向第一网络功能发送第一信息,以使第一网络 功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
本申请实施例中第一核心网设备接收用于确定第一终端与第二终端存在的第一关联关系的第一信息,并根据第一关联关系发送所述第一终端的密钥材料;从而实现第一终端获取到第一核心网设备为其确定的密钥材料,因此即使第一终端功能受限,也能够保证第一终端访问网络过程中的安全性,解决了如何生成组网授权/鉴权时家庭智能设备使用的相关密钥材料的问题。
本申请实施例还提供一种网络侧设备,如第一网络功能,包括处理器和通信接口,所述通信接口用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系,所述处理器还用于根据所述第一关联关系通过所述通信接口发送所述第一终端的密钥材料;其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。该网络侧设备实施例是与上述网络侧设备方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图16所示,该网络设备1400包括:天线141、射频装置142、基带装置143。天线141与射频装置142连接。在上行方向上,射频装置142通过天线141接收信息,将接收的信息发送给基带装置143进行处理。在下行方向上,基带装置143对要发送的信息进行处理,并发送给射频装置142,射频装置142对收到的信息进行处理后经过天线141发送出去。
上述频带发送装置可以位于基带装置143中,以上实施例中网络侧设备执行的方法可以在基带装置143中实现,该基带装置143包括处理器144和存储器145。
基带装置143例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图16所示,其中一个芯片例如为处理器144,与存储器145连接,以调用存储器145中的程序,执行以上方法实施例中所示的网络设备操作。
该基带装置143还可以包括网络接口146,用于与射频装置142交互信 息,该接口例如为通用公共无线接口(common public radio interface,简称CPRI)。
具体地,本发明实施例的网络侧设备还包括:存储在存储器145上并可在处理器144上运行的指令或程序,处理器144调用存储器145中的指令或程序执行图16所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质可以是非易失的,也可以是易失的,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述密钥材料的发送方法实施例或密钥材料的获取方法实施例或信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品被存储在非瞬态的存储介质中,所述计算机程序产品被至少一个处理器执行以实现上述密钥材料的发送方法实施例或密钥材料的获取方法实施例或信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述密钥材料的发送方法实施例或密钥材料的获取方法实施例或信息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如上文所述的各个方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (36)

  1. 一种密钥材料的发送方法,包括:
    第一网络功能接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
    根据所述第一关联关系,所述第一网络功能发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  2. 根据权利要求1所述的方法,其中,所述第一信息包括下述至少一项:
    第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
    第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识。
  3. 根据权利要求2所述的方法,其中,若第一信息中不包含所述第一标识,所述方法还包括:
    第一网络功能向所述第一终端发送所述第一终端的第一标识。
  4. 根据权利要求1所述的方法,其中,所述方法还包括下述至少一项:
    所述第一网络功能根据所述第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系;
    所述第一网络功能根据预存储的关联关系以及第一信息,确定所述第一终端和所述第二终端之间存在第一关联关系。
  5. 根据权利要求1或4所述的方法,其中,所述第一关联关系包含以下至少一项:
    第一终端的设备标识与第二终端的设备标识之间的关联关系;
    第一终端的设备标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的用户标识之间的关联关系;
    第一终端的用户标识与第二终端的设备标识之间的关联关系。
  6. 根据权利要求1所述的方法,其中,所述安全信息包括下述至少一项:
    安全密钥;
    安全参数;
    签约凭据信息。
  7. 根据权利要求1所述的方法,其中,所述方法还包括:
    第一网络功能根据所述第二终端的密钥材料派生所述第一终端的密钥材料;
    所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
  8. 根据权利要求1所述的方法,其中,所述接收第一信息,包括以下至少一项:
    第一网络功能接收第一终端发送的所述第一信息;
    第一网络功能接收第二终端发送的所述第一信息;
    第一网络功能接收第三方功能发送的所述第一信息;
    第一网络功能通过网络开放功能接收所述第一信息;
    第一网络功能通过非接入层消息接收所述第一信息。
  9. 根据权利要求1所述的方法,其中,第一网络功能发送所述第一终端的密钥材料之前,所述方法还包括:
    向第二终端发送询问指示;
    接收所述第二终端发送的授权指示;
    所述第一网络功能发送所述第一终端的密钥材料,包括:
    根据所述授权指示,第一网络功能发送所述第一终端的密钥材料。
  10. 根据权利要求1所述的方法,其中,所述第一网络功能发送所述第一终端的密钥材料,包括以下任意一项:
    第一网络功能向所述第一终端发送所述第一终端的密钥材料;
    第一网络功能向第二终端发送所述第一终端的密钥材料,通过所述第二终端将所述第一终端的密钥材料发送至所述第一终端;
    第一网络功能向第三方功能发送所述第一终端的密钥材料,通过所述第三方功能将所述第一终端的密钥材料发送至所述第一终端。
  11. 根据权利要求1所述的方法,其中,所述方法还包括以下至少一项:
    第一网络功能启动第一计时器,其中,所述第一计时器的计时时段为所述第一终端的安全信息的有效时间;在超过所述有效时间后,所述第一终端 的安全信息无效。
  12. 根据权利要求6所述的方法,其中,所述密钥材料还包括:
    有效时间,所述有效时间为所述安全信息的有效时间。
  13. 根据权利要求1所述的方法,其中,所述第一网络功能发送所述第一终端的密钥材料之前,还包括:
    第一网络功能从第二网络功能接收所述第一终端的密钥材料。
  14. 一种密钥材料的获取方法,包括:
    第一终端接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  15. 根据权利要求14所述的方法,其中,所述第一终端的密钥材料是根据第二终端的密钥材料进行派生得到;
    其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的安全信息。
  16. 根据权利要求14或15所述的方法,其中,所述安全信息包括下述至少一项:
    安全密钥;
    安全参数;
    签约凭据信息。
  17. 根据权利要求14所述的方法,其中,第一终端接收由第一网络功能确定的第一终端的密钥材料之前,所述方法还包括:
    第一终端向第三方功能发送初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
  18. 根据权利要求17所述的方法,其中,所述初始验证消息包括以下至少一项:
    所述第一终端的标识;
    所述第一终端的默认凭据;
    所述第一终端的本地网络的网络标识。
  19. 根据权利要求14所述的方法,其中,第一终端接收由第一网络功能确定的第一终端的密钥材料,包括以下任意一项:
    第一终端接收所述第一网络功能发送的所述第一终端的密钥材料;
    第一终端接收第二终端发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第二终端;
    第一终端接收第三方功能发送的所述第一终端的密钥材料,所述第一终端的密钥材料由所述第一网络功能发送至所述第三方功能。
  20. 根据权利要求16所述的方法,其中,所述密钥材料还包括:
    有效时间,所述有效时间为第一终端的安全信息的有效时间。
  21. 根据权利要求20所述的方法,其中,所述方法还包括:
    在超过所述有效时间后,所述第一终端向第一网络功能发送第一更新指示信息,所述第一更新指示信息用于指示所述第一网络功能更新所述第一终端的密钥材料。
  22. 一种信息传输方法,包括:
    第二终端或第三方功能向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  23. 根据权利要求22所述的方法,其中,所述第一信息包括下述至少一项:
    第一标识;所述第一标识为所述第一终端的设备标识和/或用户标识;
    第二标识;所述第二标识为所述第二终端的设备标识和/或用户标识。
  24. 根据权利要求22所述的方法,其中,第二终端或第三方功能向第一网络功能发送第一信息之后,所述方法还包括:
    第二终端或第三方功能接收所述第一网络功能发送的由所述第一网络功能确定的第一终端的密钥材料;
    第二终端或第三方功能将所述第一终端的密钥材料发送至所述第一终端。
  25. 根据权利要求22所述的方法,其中,所述第一终端的密钥材料根据所述第二终端的密钥材料进行派生得到;
    其中,所述第二终端的密钥材料包括:所述第二终端进行通信时所需的 安全信息。
  26. 根据权利要求22所述的方法,其中,所述方法还包括:
    第二终端接收所述第一网络功能发送的询问指示;
    第二终端向所述第一网络功能发送授权指示。
  27. 根据权利要求22所述的方法,其中,向第一网络功能发送第一信息之前,所述方法还包括:
    第三方功能接收所述第一终端发送的初始验证消息,所述初始验证消息用于所述第三方功能校验和授信所述第一终端。
  28. 根据权利要求27所述的方法,其中,所述初始验证消息包括以下至少一项:
    所述第一终端的标识;
    所述第一终端的默认凭据;
    所述第一终端的本地网络的网络标识。
  29. 一种密钥材料的发送装置,包括:
    第一接收模块,用于接收第一信息,所述第一信息用于确定第一终端与第二终端存在的第一关联关系;
    第一执行模块,用于根据所述第一关联关系,发送所述第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  30. 一种密钥材料的获取装置,包括:
    第二接收模块,用于接收由第一网络功能确定的第一终端的密钥材料,其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的安全信息。
  31. 一种信息传输装置,包括:
    第一发送模块,用于向第一网络功能发送第一信息,以使第一网络功能在接收到第一信息后确定第一终端和第二终端之间存在第一关联关系并发送第一终端的密钥材料;
    其中,所述第一终端的密钥材料包括:所述第一终端进行通信时所需的 安全信息。
  32. 一种通信设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1至13任一项所述的密钥材料的发送方法的步骤;或者所述程序或指令被所述处理器执行时实现如权利要求14至21任一项所述的密钥材料的获取方法的步骤;或者所述程序或指令被所述处理器执行时实现如权利要求22至28任一项所述的信息传输方法的步骤。
  33. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至13任一项所述的密钥材料的发送方法的步骤,或者实现如权利要求14至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至28任一项所述的信息传输方法的步骤。
  34. 一种芯片,包括处理器和通信接口,其中,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1至13任一项所述的密钥材料的发送方法的步骤,或者实现如权利要求14至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至28任一项所述的信息传输方法的步骤。
  35. 一种计算机程序产品,其中,所述计算机程序产品被存储在非瞬态的可读存储介质中,所述计算机程序产品被至少一个处理器执行以实现如权利要求1至13任一项所述的密钥材料的发送方法的步骤,或者实现如权利要求14至21任一项所述的密钥材料的获取方法的步骤,或者实现如权利要求22至28任一项所述的信息传输方法的步骤。
  36. 一种通信设备,被配置为执行如权利要求1至13任一项所述的密钥材料的发送方法的步骤,或者,被配置为执行如权利要求14至21任一项所述的密钥材料的获取方法的步骤,或者,被配置为执行如权利要求22至28任一项所述的信息传输方法的步骤。
PCT/CN2022/097119 2021-06-09 2022-06-06 密钥材料的发送方法、获取方法、信息传输方法及设备 WO2022257878A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22819476.7A EP4354922A4 (en) 2021-06-09 2022-06-06 METHOD FOR SENDING KEY MESSAGES, METHOD FOR OBTAINING KEY MESSAGES, AND METHOD AND DEVICE FOR TRANSMITTING INFORMATION
US18/530,203 US20240114016A1 (en) 2021-06-09 2023-12-05 Key material sending method, key material obtaining method, information transmission method, and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110644691.9 2021-06-09
CN202110644691.9A CN115460580A (zh) 2021-06-09 2021-06-09 密钥材料的发送方法、获取方法、信息传输方法及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/530,203 Continuation US20240114016A1 (en) 2021-06-09 2023-12-05 Key material sending method, key material obtaining method, information transmission method, and device

Publications (1)

Publication Number Publication Date
WO2022257878A1 true WO2022257878A1 (zh) 2022-12-15

Family

ID=84295329

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/097119 WO2022257878A1 (zh) 2021-06-09 2022-06-06 密钥材料的发送方法、获取方法、信息传输方法及设备

Country Status (4)

Country Link
US (1) US20240114016A1 (zh)
EP (1) EP4354922A4 (zh)
CN (1) CN115460580A (zh)
WO (1) WO2022257878A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577459A (zh) * 2009-07-31 2012-07-11 三星电子株式会社 移动通信网络中创建安全上下文和管理通信的方法和装置
CN107317789A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 密钥分发、认证方法,装置及系统
CN108781216A (zh) * 2016-01-25 2018-11-09 瑞典爱立信有限公司 用于网络接入的方法和设备
CN109150507A (zh) * 2017-06-19 2019-01-04 上海中兴软件有限责任公司 一种设备凭证分发方法和系统、用户设备及管理实体
US20200359212A1 (en) * 2019-05-07 2020-11-12 Verizon Patent And Licensing Inc. System and method for deriving a profile for a target endpoint device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9883384B2 (en) * 2014-07-16 2018-01-30 Qualcomm Incorporated UE-based network subscription management
SG10201602150QA (en) * 2016-03-18 2017-10-30 Huawei Int Pte Ltd An agent-based authentication and key agreement method for devices without sim card
US10313878B2 (en) * 2016-09-16 2019-06-04 Qualcomm Incorporated On-demand network function re-authentication based on key refresh
WO2018222132A2 (zh) * 2017-05-29 2018-12-06 华为国际有限公司 网络认证方法、网络设备及核心网设备
CN111465011B (zh) * 2019-01-18 2021-07-16 华为技术有限公司 跨网络接入方法、装置、存储介质及通信系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577459A (zh) * 2009-07-31 2012-07-11 三星电子株式会社 移动通信网络中创建安全上下文和管理通信的方法和装置
CN108781216A (zh) * 2016-01-25 2018-11-09 瑞典爱立信有限公司 用于网络接入的方法和设备
CN107317789A (zh) * 2016-04-27 2017-11-03 华为技术有限公司 密钥分发、认证方法,装置及系统
CN109150507A (zh) * 2017-06-19 2019-01-04 上海中兴软件有限责任公司 一种设备凭证分发方法和系统、用户设备及管理实体
US20200359212A1 (en) * 2019-05-07 2020-11-12 Verizon Patent And Licensing Inc. System and method for deriving a profile for a target endpoint device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4354922A4 *

Also Published As

Publication number Publication date
EP4354922A4 (en) 2024-08-21
CN115460580A (zh) 2022-12-09
EP4354922A1 (en) 2024-04-17
US20240114016A1 (en) 2024-04-04

Similar Documents

Publication Publication Date Title
KR102238407B1 (ko) 연결요구 장치와 연결수용 장치의 초기 셋업을 지원하는 기법
WO2020020030A1 (zh) 随机接入方法及相关设备
WO2022017359A1 (zh) 直接通信启动控制方法及相关设备
EP4192054A1 (en) Method for splitting end-to-end qos requirement information, terminal, and network side device
US20230096402A1 (en) Service obtaining method and apparatus, and communication device and readable storage medium
US10673611B2 (en) Data transmission method, device, and system
WO2023173702A1 (zh) 无线远距离配网方法、控制中心及设备
WO2022095850A1 (zh) 策略关联的建立方法及装置、终端及网络侧设备
WO2023143411A1 (zh) 设备鉴权方法、装置及通信设备
CN112333795A (zh) 网络接入方法及装置
WO2023005898A1 (zh) 多终端联合会话管理方法、网络侧设备及终端
WO2022257878A1 (zh) 密钥材料的发送方法、获取方法、信息传输方法及设备
WO2022237616A1 (zh) 资源池配置方法、装置、终端及网络侧设备
WO2022037619A1 (zh) 鉴权失败的处理方法、装置、终端及网络侧设备
WO2022257876A1 (zh) 密钥材料的处理方法、获取方法、信息传输方法及设备
KR20230049684A (ko) 네트워크의 전송 방법, 단말 및 네트워크 측 장치
WO2022257877A1 (zh) 信息处理方法、密钥材料的获取方法及设备
WO2022206662A1 (zh) 中继pdu会话建立的确定方法及装置、终端
WO2023212934A1 (zh) 一种中继通信方法、接入方法、装置及设备
CN115250510B (zh) 选择网络的方法、装置、终端和网络设备
WO2024067337A1 (zh) 终端鉴权方法、终端及网络侧设备
WO2022217507A1 (zh) 系统消息更新的通知方法和装置
WO2024022389A1 (zh) 小区连接方法、装置及相关设备
US20160286373A1 (en) Methods for handling a match report of a restricted proximity-based service (prose) discovery, and apparatuses using the same
WO2023280022A1 (zh) 多路径通信方法和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22819476

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022819476

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2022819476

Country of ref document: EP

Effective date: 20240109