WO2023201551A1 - 信息处理方法及装置、通信设备及存储介质 - Google Patents

信息处理方法及装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2023201551A1
WO2023201551A1 PCT/CN2022/087779 CN2022087779W WO2023201551A1 WO 2023201551 A1 WO2023201551 A1 WO 2023201551A1 CN 2022087779 W CN2022087779 W CN 2022087779W WO 2023201551 A1 WO2023201551 A1 WO 2023201551A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
remote
message
relay
random number
Prior art date
Application number
PCT/CN2022/087779
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/087779 priority Critical patent/WO2023201551A1/zh
Priority to CN202280001193.5A priority patent/CN117256166A/zh
Publication of WO2023201551A1 publication Critical patent/WO2023201551A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular, to an information processing method and device, communication equipment and storage medium.
  • Proximity based service allows peer terminals to communicate through User Equipment (User Equipment, UE)-to-UE relay. This means that if the source UE cannot reach the target UE directly, the source UE will try to discover the UE-to-UE relay to reach the target UE, and before the source UE can communicate with the target UE through the relay UE, the source UE needs to go through the relay UE. to discover the target UE. In fact, the UE-to-UE relay may be compromised as an untrusted intermediate transmission node, resulting in the security of information between peer UEs being compromised.
  • a malicious relay UE establishes a unicast link with the source UE and the target UE, and may conduct a man-in-the-middle attack (MITM) on the terminal. Therefore, end-to-end connection security needs to be implemented between peer terminals communicating through UE-to-UE relays.
  • MITM man-in-the-middle attack
  • Direct Discovery Name Management Function is a network element that can provide necessary security information to UE to protect discovery messages. And the DDNMF can interact with the proximity service server (Prose Application Server) to authorize the discovery request.
  • the proximity service server Prose Application Server
  • Embodiments of the present disclosure provide an information processing method and device, communication equipment, and storage media.
  • a first aspect of an embodiment of the present disclosure provides an information processing method, which is executed by a first remote user equipment UE.
  • the method includes:
  • the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • a second key is generated according to the first key, where the second key is used for information integrity protection between two remote UEs when they discover each other through the relay UE.
  • the second aspect of the embodiment of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes:
  • the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • a second key is generated according to the first key, where the second key is used for information integrity protection between two remote UEs through mutual discovery of relay UEs.
  • a third aspect of the embodiment of the present disclosure provides an information processing method, which is executed by DDNMF, and the method further includes:
  • the request message send a first key to the remote UE and/or the relay UE; the first key is used for communication between the first remote UE and the relay UE. Integrity protection is also used to generate a second key, where the second key is used for information integrity protection between two remote UEs when they discover each other through the relay UE.
  • a fourth aspect of the embodiments of the present disclosure provides an information processing device, wherein the device includes:
  • a first acquisition module configured to acquire a first key, wherein the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • the first generation module is configured to generate a second key according to the first key, wherein the second key is used for information integrity protection between two remote UEs through mutual discovery of relay UEs. .
  • a fifth aspect of the embodiment of the present disclosure provides an information processing device, where the device includes:
  • the second acquisition module is configured to acquire a first key, wherein the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • the third generation module is configured to generate a second key according to the first key, wherein the second key is used for complete information between two remote UEs to discover each other through the relay UE. sexual protection.
  • a sixth aspect of the embodiment of the present disclosure provides an information processing device, wherein the device further includes:
  • the third receiving module is configured to receive the request message sent by the remote UE and/or the relay UE;
  • the third sending module is configured to send a first key to the remote UE and/or the relay UE according to the request message; the first key is used for the first remote UE and the relay UE.
  • the integrity protection of communication between relay UEs is also used to generate a second key, wherein the second key is used for information integrity protection between two remote UEs through mutual discovery of relay UEs. .
  • a seventh aspect of the embodiment of the present disclosure provides a communication device, including a processor, a transceiver, a memory, and an executable program stored on the memory and capable of being run by the processor, wherein the processor runs the executable program.
  • the program executes the information processing method provided by any one of the foregoing first to third aspects.
  • An eighth aspect of an embodiment of the present disclosure provides a computer storage medium that stores an executable program; after the executable program is executed by a processor, any one of the foregoing first to third aspects can be realized Information processing methods provided.
  • the policies related to the UE are determined based on the physical status information of the UE.
  • the thus determined strategy for controlling the data flow of the UE will not only take into account the network status and ignore the physical status of the UE. This reduces the waste of network resources and/or the poor communication quality of the UE caused by the inconsistency between the formulated strategy and the physical condition of the UE, improves the communication quality of the UE, and reduces the waste of network resources.
  • Figure 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment
  • Figure 2 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 3 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 4 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 5 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 6 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 7 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 8 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 9 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 10 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 11 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 12 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 13 is a schematic structural diagram of a UE according to an exemplary embodiment
  • Figure 14 is a schematic structural diagram of a communication device according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology.
  • the wireless communication system may include several UEs 11 and several access devices 12.
  • UE11 may be a device that provides voice and/or data connectivity to users.
  • UE11 can communicate with one or more core networks via the Radio Access Network (RAN).
  • RAN Radio Access Network
  • UE11 can be an Internet of Things UE, such as a sensor device, a mobile phone (or a "cellular" phone) and a device with Internet of Things
  • the computer of the UE may, for example, be a fixed, portable, pocket-sized, handheld, computer-built-in or vehicle-mounted device.
  • station STA
  • subscriber unit subscriber unit
  • subscriber station subscriber station
  • mobile station mobile station
  • mobile station mobile
  • remote station remote station
  • access point remote UE (remote terminal)
  • access UE access terminal
  • user device user terminal
  • user agent user agent
  • user equipment user device
  • UE11 user equipment
  • UE11 user equipment
  • UE11 user equipment
  • UE11 may also be a device for an unmanned aerial vehicle.
  • vehicle-mounted device for example, it may be a driving computer with a wireless communication function, or a wireless communication device connected to an external driving computer.
  • UE11 may also be a roadside device, for example, it may be a streetlight, a signal light or other roadside device with wireless communication function.
  • the access device 12 may be a network-side device in the wireless communication system.
  • the wireless communication system can be the 4th generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as the Long Term Evolution (LTE) system; or the wireless communication system can also be a 5G system, Also called new radio (NR) system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network). Or, MTC system.
  • the access device 12 may be an evolved access device (eNB) used in the 4G system.
  • the access device 12 may also be an access device (gNB) using a centralized distributed architecture in the 5G system.
  • eNB evolved access device
  • gNB access device
  • the access device 12 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Media Access Control, MAC) layer; distributed
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • the unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the access device 12.
  • a wireless connection can be established between the access device 12 and the UE11 through the wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a first remote UE.
  • the method includes:
  • S1110 Obtain a first key, where the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • S1120 Generate a second key according to the first key, where the second key is used for information integrity protection between two remote UEs through mutual discovery of relay UEs.
  • the first remote UE may be a source UE or a target UE for relaying communications from UE to UE.
  • the first key may be an integrity protection key used by the first remote UE when communicating with the network device through the relay UE, and may be used for integrity protection when the first remote UE sends data to the network through the relay UE. key, or a key used for integrity protection when the relay UE forwards data provided by the network device to the first remote UE.
  • the length of the first key may be 128 bits, 256 bits, 64 bits, or 512 bits, etc.
  • a key derivation function is used to derive the second key from the first key. Further, a key derivation function is used to derive the second key based on the first key itself and the length of the first key.
  • a second key is generated based on the first key.
  • the second key can be used for integrity protection between two remote UEs through mutual discovery between relay UEs, thereby ensuring that the two remote UEs Security of mutual discovery between remote UEs.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a first remote UE.
  • the method includes:
  • S1210 Obtain a first key, where the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • S1240 Generate the second key according to the first random number, the second random number and the first key.
  • the random number exchanged between the first remote UE and the relay UE is used together with the first key as input parameters for generating (or deriving) the second key.
  • S1240 may include: generating the second key according to the first random number, the second random number and the first key.
  • S1240 may include: according to the first random number itself, the length of the first random number, the second random number itself, the length of the second random number and the first key, Generate the second key.
  • the length of the first random number and the length of the second random number may respectively be: the number of bits after the first random number is written in binary and the number of bits after the second random number is written in binary.
  • S1240 may also include:
  • the second key is generated according to the first key and the identification of the integrity protection algorithm between the first remote UE and the second remote UE.
  • the second key is generated based on the first key, the length of the first key, the identifier itself, and the length of the identifier.
  • the method further includes:
  • Generating the second key according to the first random number, the second random number and the first key includes:
  • the second key is generated according to the first random number, the second random number, the first key and the identification information.
  • the authentication method sent by the relay UE is used for mutual discovery between the first remote UE and the second remote UE.
  • the identification information of the authentication method can also be used as an input parameter of the second key.
  • This authentication method is used for mutual authentication when establishing an end-to-end connection between the first remote UE and the second remote UE.
  • generating the second key according to the first random number, the second random number, the first key and the identification information includes:
  • the second key is generated according to the first random number, the second random number, the identification information, the length of the identification information, and the first key.
  • generating the second key according to the first random number, the second random number, the identification information, the length of the identification information and the first key may include: according to the The first random number, the length of the first random number, the second random number, the length of the second random number, the identification information, the length of the identification information and the first key are generated The second key.
  • the first remote UE and the second remote UE that pass the authentication method may be mutually trusting UEs.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a first remote UE.
  • the method includes:
  • S1310 When the authentication method is a predetermined method, send a first message to the relay UE, where the first message uses a second key for integrity protection; the second key can be a key determined by any of the aforementioned technical solutions. ;
  • S1320 Receive the second message sent by the second remote UE forwarded by the relay UE;
  • S1330 Perform integrity protection verification on the second message according to the second key
  • the first remote UE will send the first message to the relay UE.
  • IKEv2 Internet Key Exchange Protocol Version 2
  • the first message uses the second key for integrity protection.
  • the relay UE first performs integrity protection on the first message through the second key. If the If the integrity protection of the first message passes, the relay forwards the first message to the second remote UE. In this way, if the relay UE uses the second key to discover that the first message of the first remote UE has been tampered with, the first remote UE may receive a possible rejection message or prompt information.
  • the rejection message indicates that establishment of an end-to-end connection between the first remote UE and the second remote UE is rejected.
  • the prompt information may be used to prompt that the first message has been tampered with, and the first message received by the relay UE has not passed the integrity protection verification.
  • the second remote UE is the target UE; if the first remote UE is the target UE for relay communication between UE and UE, then the second remote UE is the target UE for relay communication between UE and UE.
  • the remote UE is the source UE.
  • the first UE receives the second message from the relay UE first, and then the first UE sends the first message.
  • the first remote UE uses the second key to perform integrity protection on the second message. After the verification passes, an end-to-end connection between the first remote UE and the second remote UE is established through the relay UE.
  • the second message includes a check value 1; the integrity protection of the second message according to the second key includes:
  • the second message may also carry a certificate sending indicator for instructing to return the certificate of the first remote UE to the second remote UE. If the first remote UE receives the certificate sending indicator and determines to establish a secure end-to-end connection with the second remote UE, the first remote UE will be The UE's certificate is returned to the second remote UE.
  • determining to establish an end-to-end connection between the first remote UE and the second remote UE through the relay UE includes:
  • the relay UE When the second message passes the integrity protection verification, the relay UE sends a connection establishment request to the second remote UE, and receives the connection returned by the second remote UE based on the connection establishment request. build response;
  • connection establishment request After receiving the connection establishment request from the second remote UE, if the second message passes the integrity protection verification, sending a connection establishment response indicating agreement to establish the connection to the second remote UE to communicate with the second remote UE.
  • the UE establishes an end-to-end connection.
  • the introduction of the second key can enable integrity protection of messages between the first remote UE and the second remote UE, so that the first remote UE and the second remote UE communicate through the terminal. End-to-end connection for information security.
  • the end-to-end connection may be: an end-to-end connection based on the PC5 interface.
  • the method further includes:
  • an integrity protection key and a confidentiality protection key are generated, wherein the integrity protection key and the confidentiality protection key are used for the first remote UE and the second remote end.
  • the UE establishes integrity protection and confidentiality protection of end-to-end communication through the relay UE.
  • the first key exchange information may be one or more parameters for generating the key seed.
  • the key seed may be a private key seed using asymmetric confidentiality protection or asymmetric integrity protection between the first remote UE and the second remote UE.
  • asymmetric confidentiality protection or asymmetric integrity protection between the first remote UE and the second remote UE.
  • an integrity protection key and a confidentiality protection key are generated based on the key seed.
  • the integrity protection key may be used to protect the integrity of information transmitted by the first remote UE and the second remote UE through the relay UE.
  • the confidentiality protection key may be used for encryption protection of information transmitted by the first remote UE and the second remote UE through the relay UE.
  • the determining to establish an end-to-end connection between the first remote UE and the second remote UE through the relay UE includes:
  • One of the third message and the fourth message here may be a connection establishment request, and the other may be a connection establishment response.
  • this is just an example of the third message and the fourth message, and the specific implementation is not limited to this example.
  • the third message and the fourth message may not be in a certain order.
  • the first remote UE may receive the fourth message first and then send the third message; or the first remote UE may first send the third message and then receive the fourth message. message, or the first remote UE sends the third message while receiving the fourth message.
  • the third message includes at least one of the following:
  • the certificate of the first remote UE
  • a certificate sending indicator used to indicate returning the certificate of the second remote UE
  • a first check value is used by the second remote UE to check whether the first message, the second random number and the identity of the first remote UE have been The first remote UE receives correctly.
  • the third message may at least include: the identity of the first remote UE.
  • the identity of the first remote UE may be: a device identity and/or an application identity of the first remote UE.
  • the device identification includes: the first remote UE's Subscription Concealed Identifier (SUCI), the Subscription Permanent Identifier (SUPI) or the Global Temporary UE Identity (5G Globally Unique Temporary UE Identity, 5G- GUTI).
  • the application identifier may be an identifier (Identifier, ID) of an application of various proximity services (Proximity Based Service, ProSe).
  • the third message may include at least: the identity of the first remote UE and the first check value.
  • the first check value is used for the second remote UE to check whether the first message, the second random number and the identity of the first remote UE are recognized by the first remote UE. Correctly received.
  • the first check value may be generated based on the key seed.
  • the third message may further include:
  • the certificate of the first remote UE and/or,
  • a certificate sending indicator used to indicate returning the certificate of the second remote UE
  • the certificate of the first remote UE is carried in the third message and sent to the second remote UE. After the end-to-end connection is subsequently established between the first remote UE and the second remote UE, the certificate can be used for Mutual identity authentication.
  • the third message also includes: the certificate sending indicator returns the certificate to the second remote UE to the first remote UE, so that the first remote UE will subsequently receive the certificate sent by the second remote UE.
  • the second remote UE if the third message carries a certificate indicator, the second remote UE sends a certificate to the first remote end; if the third message does not carry a certificate sending indicator, the second remote UE There is no need to send a certificate to the first remote end.
  • the certificate sending indicator corresponds to one or more bits; if the bit corresponding to the certificate indicator has a first value, the second remote UE may not need to send a request to the first remote UE. Send the certificate; if the bit corresponding to the certificate indicator has the second value, the second remote UE does not need to send the certificate to the first remote end.
  • the second value is different from the first value.
  • the first remote UE and the second remote UE may be defaulted that the first remote UE and the second remote UE require an exchange certificate when exchanging messages.
  • the fourth message includes at least one of the following:
  • the second check value is used by the first remote UE to check whether the second message, the first random number and the identity of the second remote UE have been The second remote UE receives correctly.
  • the fourth message may include at least: the identity of the second remote UE.
  • the device identification includes: the second remote UE's Subscription Concealed Identifier (SUCI), the Subscription Permanent Identifier (SUPI) or the Global Temporary UE Identity (5G Globally Unique Temporary UE Identity, 5G- GUTI).
  • the identity of the first remote UE includes: a restricted proximity service application user identification (RPAUID) of the first remote UE and an identity of the proximity service application of the first remote UE;
  • the identity of the second remote UE includes: the RPAUID of the second remote UE and the identity of the proximity service application of the second remote UE.
  • the above are only identifiers that are exchanged when the first remote UE and the second remote UE establish an end-to-end connection, including but not limited to the RPAUID and the identifier of the proximity service application.
  • the certificate of the second remote UE in the fourth message is optional.
  • the method further includes:
  • the first message When the first message is correctly received by the second remote UE and the second message is correctly received by the first remote UE, it is determined to establish the first remote UE and the second remote UE. end-to-end connection.
  • the end-to-end connection between the first remote UE and the second remote UE is determined whether to establish an end-to-end connection between the first remote UE and the second remote UE. If it is determined to establish a connection between the first remote UE and the second remote UE, The end-to-end connection between the first remote UE and the second remote UE is started. Specifically, how to establish an end-to-end connection can be achieved through the interaction of one or more messages to achieve the establishment of a secure end-to-end connection between the first remote UE and the second remote UE.
  • first remote UE and the second remote UE have completed mutual authentication, which can be used to establish the relationship between the first remote UE and the second remote UE. end-to-end connections.
  • the first key is: an integrity protection key used by the first remote UE to send data to the relay UE; or, the first key is: the middle The subsequent UE sends the integrity protection key used for data to the first remote UE.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a first remote UE.
  • the method includes:
  • S1420 A response message returned based on the request message, wherein the response message includes: a first key used to determine a second key; the second key used to provide the first remote Integrity protection for mutual discovery between the end UE and the second remote UE.
  • the first key may be generated by DDNMF, so the first remote UE can directly request it from DDNMF.
  • the first remote UE sends a request message to DDNMF through the relay UE, and receives the response message returned by DDNMF through the relay UE.
  • the relay UE may be: a relay device from UE to network (User Equipment to Network).
  • an embodiment of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes:
  • S2110 Obtain a first key, where the first key is used for integrity protection of communication between the first remote UE and the relay UE.
  • S2120 Generate a second key according to the first key, where the second key is used for information integrity protection between two remote UEs through mutual discovery of relay UEs.
  • the relay UE may be any UE that provides relay services.
  • the relay UE may be a UE located within network coverage.
  • the relay UE may be a UE located between the first remote UE and the second remote UE.
  • the relay UE may query the pre-obtained first key locally or request the first key from DDNMF.
  • the first key may be a key used to protect the integrity of the first remote UE when the first remote UE communicates with the network device through the relay UE.
  • the relay UE After receiving the first key, the relay UE locally derives the second key.
  • the method includes:
  • the S2120 may include: generating the second key according to the first random number, the second random number and the first key.
  • the second key is derived based on the first random number, the second random number, the first key, and a key derivation function.
  • generating the second key according to the first random number, the second random number and the first key may include: according to the first random number, the first key Two random numbers, the identification information, the length of the identification information and the first key are used to generate the second key.
  • the method further includes:
  • the identification information of this authentication method indicates the mutual authentication method for establishing an end-to-end connection between two remote ends.
  • this authentication method can also be IKEv1, or other private authentication protocols, etc., and I will not give examples one by one here.
  • generating the second key according to the first random number, the second random number and the first key includes:
  • the second key is generated according to the first random number, the second random number, the first key and the identification information.
  • generating the second key according to the first random number, the second random number, the first key and the identification information may include: according to the first random number, The length of the first random number, the second random number, the degree of the second random number, the identification information itself, the length of the identification information and the first key generate the second key.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes:
  • S2220 Return a response message based on the request message, where the response message includes: the first key.
  • the first key is used for integrity protection of communication between the remote UE and the relay UE; the first key is also used to generate a second key; the second key is used for the first remote Integrity protection of mutual discovery between the UE and the second remote UE.
  • the relay UE obtains the first key by requesting it from DDNMF. By sending a request message to DDNMF, it will receive a response message returned by DDNMF.
  • the response message may include the first key. key.
  • an embodiment of the present disclosure provides an information processing method, which is executed by DDNMF.
  • the method further includes:
  • S3110 Receive the request message sent by the UE; the UE is a relay UE and/or a remote UE;
  • S3120 Send a first key to the UE according to the request message; the first key is used for integrity protection of communication between the first remote UE and the relay UE, and is also used Generating a second key, wherein the second key is used for integrity protection of mutual discovery between two remote UEs through the relay UE.
  • DDNMF will receive the request message, which includes the request message sent by the remote UE and/or the relay UE. After receiving the request message, it will return the first key to the UE.
  • the first key can be used
  • the second key is derived from the remote UE and the relay UE. The second key may be used for two remote UEs to establish secure end-to-end communication based on the relay UE.
  • a secure end-to-end connection is established between the source UE and the target UE through the relay UE.
  • the relay UE may be: a UE-to-UE relay device. The UE accesses the ProSe service through the relay.
  • the remote UE can monitor and identify malicious attacks on the relay UE.
  • the security information may also be called discovery security information.
  • This security information is time-sensitive, and the security information will become invalid after it expires. If the UE does not have valid security information, the remote UE and UE-to-UE Relay need to connect to the ProSe Application Server (Application Server) and obtain new security information before they can use the 5G ProSe UE-to-UE relay service.
  • the ProSe Application Server Application Server
  • the information processing method provided by the embodiment of the present disclosure may include:
  • Steps 1a-1c involve remote UE1 and remote UE2.
  • Step 1a The remote UE sends a request message (the request message can also be called discovery request information) to the 5G DDNMF (the DDNMF is the DDNMF of the remote UE) to obtain the discovery query filter(s) to monitor the query and use it for announcements.
  • ProSe response code ProSe Response Code
  • the discovery request message may include security capability information of the remote UE, and the security capability information may include a list of encryption algorithms supported by the UE.
  • the 5G DDNMF of the remote UE may determine from the ProSe application server whether the remote UE has the announced authority based on the configuration of the 5G DDNMF.
  • Step 1c The 5G DDNMF of the remote UE will return the ProSe response code, send code security parameters (Code-Send-SecParams), discovery query filter, and receive code security parameters (Code-Rcv-SecParams) corresponding to each discovery filter.
  • code security parameters Code-Send-SecParams
  • discovery query filter send code security parameters
  • code security parameters Code-Rcv-SecParams
  • code security parameters Code-Rcv-SecParams
  • the algorithm information may at least include: algorithm identifier.
  • the transmit code security parameters provide the necessary information to protect the transmission of the ProSe response code and are stored together with the ProSe response code.
  • the receive code security parameters provide the information required by the remote UE to verify the protection applied to the ProSe query code.
  • the remote UE performs replay attack verification on the current time information (CURRENT_TIME) and the maximum offset (MAX_OFFSET).
  • the 5G DDNMF of the remote UE will carry the selected PC5 encryption algorithm in the discovery response message.
  • 5G DDNMF determines the selected PC5 encryption algorithm based on the security capability information and ProSe code of PC5UE received in step 1a.
  • the UE will store the received PC5 encryption algorithm and ProSe response code.
  • steps 1a-1c are performed when the 5G remote UE is located within network coverage.
  • the 5G DDNMF in the remote UE's home mobile communication network Home Public Land Mobile Network, HPLMN
  • visited mobile communication network Visited Public Land Mobile Network, VPLMN
  • Steps 2a-2f relate to UE-to-UE (ie to relay UE).
  • Step 2a The UE-to-UE relay sends a discovery request message containing PC5UE security capability information to 5G DDNMF, requesting DDNMF to allow the UE-to-UE relay to be discovered and provide relay services to one or more remote UEs.
  • Step 2 b The 5G DDNMF of the UE-to-UE relay (the DDNMF is the DDNMF of the UE-to-UE relay) sends an authorization request to the ProSe application server (Application Server). If the UE-to-UE relay is allowed to discover at least one remote UE, the ProSe Application Server (Application Server) will return an authorization response.
  • the DDNMF is the DDNMF of the UE-to-UE relay
  • the ProSe application server Application Server
  • Step 2 c If it is found that the request carries authorization and the PLMN IDs of the remote UE and the UE-to-UE relay are different, the 5G DDNMF of the UE-to-UE relay will interact with the 5G DDNMF of the remote UE.
  • the 5G DDNMF of the UE-to-UE relay sends a discovery request message to the 5G DDNMF of the remote UE.
  • the discovery request message may include: the security capability information of the remote UE.
  • Step 2 d The 5G DDNMF of the remote UE may exchange authorization messages with the ProSe application server (Application Server).
  • the ProSe application server Application Server
  • the 5G DDNMF of the remote UE responds to the 5G DDNMF of the UE-to-UE relay with a discovery response message.
  • the discovery response message may include ProSe query code and its related sending code security parameters, response code and its related receiving code security parameters and algorithm information of the selected PC5 encryption algorithm.
  • Code send security parameters provide the information needed to protect ProSe query code.
  • the received code security parameters include the integrity protection key (DUIK) of the ProSe response code, which is used to verify the protection of the remote UE application.
  • the DUIK is one of the aforementioned first keys.
  • Step 2 f 5G DDNMF of the UE-to-UE relay (i.e., the relay UE in Figure 9) returns the discovery response filter and receive code security parameters, ProSe query code, transmit code security parameters, and CURRENT_TIME and MAX_OFFSET parameters and selections Algorithm information for the PC5 encryption algorithm.
  • the UE-to-UE relay determines whether the response message is subject to a replay attack based on CURRENT_TIME and MAX_OFFSET.
  • the UE-to-UE relay stores the discovery response filter and receive code security parameters, ProSe query code and send code security parameters, as well as the algorithm identification and ProSe code of the selected PC5 encryption algorithm.
  • Steps 2a-2f are performed when the 5G UE-to-UE relay is within network coverage.
  • 5G DDNMF in HPLMN and VPLMN may exchange authentication messages.
  • Steps 3a to 3d occur in the discovery process of PC5.
  • Step 3a The remote UE sends a Query Request message.
  • the Query Request message may include a ProSe Query Code, a list of supported U2U relay authentication methods, and a NUIK )'s random number 1 (Nonce 1).
  • the remote UE will also listen for the response message.
  • the remote UE calculates a 32-bit Message Integrity Check (MIC) to protect the query request.
  • MIC Message Integrity Check
  • Step 3b Within the discovery slot, if the system-provided UTC-based counter is within the MAX_OFFSET range of the UE-to-UE relay's ProSe clock, the UE-to-UE relay will listen for request messages that satisfy its discovery filter. , the corresponding remote UE will be monitored.
  • Step 3c The UE-to-UE relay sends the ProSe response code related to the discovered ProSe query code, the selected U2U relay authentication method and the random number 2 (Nonce 2) used to derive the NUIK.
  • NUIK can be calculated based on the DUIK in the receiving code parameters or the DUIK in the sending code parameters, which needs to be determined in advance.
  • the calculated NUIK is associated with a validity time. If the validity time expires, the NUIK becomes invalid.
  • the UE-to-UE relay forms the response message and calculates a 32-bit MIC to protect the query response.
  • the UE-to-UE relay selects the U2U relay authentication method based on the ProSe query code (Query Code) and the authentication method supported by the received terminal.
  • Step 3d The remote UE listens for response messages that satisfy its discovery filter.
  • the remote UE uses the stored DUIK to check the integrity of the response message itself, and exports the NUIK to protect the negotiation message.
  • the calculated NUIK is associated with an expiration time (or validity time), after which the NUIK becomes invalid.
  • the remote UE needs to store the selected authentication method, which is used to establish an end-to-end IPsec connection in a UE-to-UE relay scenario.
  • the end-to-end connection may be: a connection based on Internet Protocol Security (IPSec).
  • IPSec Internet Protocol Security
  • Step 4a The remote UE1 sends IKE_SA_INIT_Request to the UE-to-UE relay. Specifically, the remote UE1 forms a request message (IKE_SA_INIT_Request) and uses a random number 1 (NUIK1) for protection. Once this IKE_SA_INIT_Request is received, the UE-to-UE relay authenticates the IKE_SA_INIT_Request using the NUIK1 shared with the remote UE1, then protects this IKE_SA_INIT_Request using the nonce 2 (NUIK2) shared with the remote UE2, and sends the IKE_SA_INIT_Request protected with NUK2 to the remote UE2.
  • NUIK2 nonce 2
  • Step 4 b The remote UE2 responds to the remote UE1 with the IKE_SA_INIT_Response message through the UE-to-UE relay.
  • the IKE_SA_INIT_Response message is first protected by NUIK2 by remote UE2, and then protected by NUIK1 by the UE-to-UE relay.
  • the key seed (SKEYSEED) is calculated based on the nonces and the Diffie-Hellman shared secret exchanged during the IKE_SA_INIT exchange. This key seed can be used to calculate another integrity protection key for subsequent integrity protection.
  • Step 4c The remote UE1 indicates its identity, for example, through the combination of RPAUID and Prose application ID to identify the remote UE1.
  • the ID of the UE1 is represented by ID1.
  • ID1 The contents of the first message using an Authentication (AUTH) payload are protected using an ID1 payload and integrity protection.
  • Remote UE1 also sends its certificate in the Certificate (CERT) payload and its list of trust anchors in the Certificate Indicator (CERTREQ) payload.
  • Remote UE1 forms an IKE_Auth_Request message and uses a key derived from SKEYSEED for protection.
  • Step 4d The remote UE2 declares the identity of UE2 using the ID2 payload and sends one or more certificates to the remote UE1 to verify its identity RPAUID and protect the integrity of the second message using the authentication (AUTH) payload.
  • the remote UE2 generates an IKE_Auth_Response message and uses a key derived from the key seed (SKEYSEED) for protection.
  • the remote UE and/or relay UE shall be able to derive the IKE initial negotiation key based on the available ProSe discovery keys.
  • the ProSe discovery key is one of the aforementioned first keys.
  • the remote UE shall be able to send its list of U2U relay authentication methods to the relay UE.
  • the relay UE shall be able to select and send the selected U2U relay authentication method to the remote UE.
  • the remote UE shall be able to store the selected U2U relay authentication method received from the relay UE.
  • the remote UE should be able to ensure the authenticity of the UE-to-UE relay by checking the integrity of the query response.
  • Remote UEs and relay UEs should be able to protect IKE initial negotiation messages.
  • the relay UE shall be able to forward negotiation messages between the source remote UE and the target remote UE.
  • 5G DDNMF can provide security information and parameters used by UE-to-UE relays to relay UEs and/or remote UEs.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the first acquisition module 110 is configured to acquire a first key, where the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • the first generation module 120 is configured to generate a second key according to the first key, wherein the second key is used for integrity protection of mutual discovery between two remote UEs through relay UEs. .
  • the information processing device provided by the embodiment of the present disclosure may be included in the first remote UE.
  • the first acquisition module 110 and the first generation module 120 may be program modules; after the program modules are executed by the processor, the first key can be obtained and the second key can be generated. .
  • the first acquisition module 110 and the first generation module 120 may be software-hardware combination modules; the software-hardware combination modules include, but are not limited to, programmable arrays; the programmable arrays include, but are not limited to : Field programmable arrays and/or complex programmable arrays.
  • the first acquisition module 110 and the first generation module 120 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • the device includes:
  • a first sending module configured to send a first random number to the relay UE
  • the first receiving module is configured to receive the second random number sent by the relay UE;
  • the first generation module 120 is configured to generate the second key according to the first random number, the second random number and the first key.
  • the first receiving module is configured to receive identification information of the authentication method sent by the relay UE;
  • the first generation module 120 is configured to generate the second key according to the first random number, the second random number, the first key and the identification information.
  • the first generation module 120 is configured to generate data based on the first random number, the second random number, the identification information, the length of the identification information and the first key. , generate the second key.
  • the first sending module is configured to send a first message to the relay UE when the authentication mode is a predetermined mode, wherein the first message uses the second password.
  • Key integrity protection
  • the first receiving module is configured to receive the second message sent by the second remote UE forwarded by the relay UE;
  • the device also includes:
  • a first verification module configured to perform integrity protection verification on the second message according to the second key
  • a first establishment module configured to determine, when the second message passes integrity protection verification, to establish an end-to-end connection between the first remote UE and the second remote UE through the relay UE. .
  • the device further includes:
  • the second generation module is configured to generate a key according to the first random number and the first key exchange information carried in the first message and the second random number and the second key exchange information carried in the second message. seed;
  • the third generation module is configured to generate an integrity protection key and a confidentiality protection key according to the key seed, wherein the integrity protection key and the confidentiality protection key are used for the first remote end.
  • the UE and the second remote UE establish integrity protection and confidentiality protection of end-to-end communication through the relay UE.
  • the first sending module is configured to send a third message to the second remote UE; wherein the third message uses the integrity protection key and the confidentiality protection key.
  • the keys are protected for integrity and confidentiality respectively;
  • the first receiving module is configured to receive a fourth message corresponding to the third message, wherein the integrity protection key is used to integrity protect the fourth message, and the confidentiality The sexually protected key is used to decrypt the fourth message.
  • the third message includes at least one of the following:
  • the identity of the first remote UE is the identity of the first remote UE
  • the certificate of the first remote UE
  • a certificate sending indicator used to indicate returning the certificate of the second remote UE
  • a first check value is used by the second remote UE to check whether the first message, the second random number and the identity of the first remote UE have been The first remote UE receives correctly.
  • the fourth message includes at least one of the following:
  • a certificate sending indicator used to indicate returning the certificate of the second remote UE
  • the second check value is used by the first remote UE to check whether the second message, the first random number and the identity of the second remote UE have been The second remote UE receives correctly.
  • the identity of the first UE includes: the restricted proximity service application user identity RPAUID of the first remote UE and the identity of the proximity service application of the first remote UE;
  • the identity of the second remote UE includes: the RPAUID of the second remote UE and the identity of the proximity service application of the second remote UE.
  • the device further includes:
  • a first determining module configured to determine whether to establish the establishment of the first remote UE when the first message is correctly received by the second remote UE and the second message is correctly received by the first remote UE. An end-to-end connection with the second remote UE.
  • the first key is: an integrity protection key used by the first remote UE to send data to the relay UE;
  • the first key is an integrity protection key used by the relay UE to send data to the first remote UE.
  • the first acquisition module 110 is configured to send a request message to the Directly Connected Discovery Name Management Function DDNMF; a response message returned based on the request message, wherein the response message includes: a first password key.
  • an embodiment of the present disclosure provides an information processing device, which includes:
  • the second acquisition module 210 is configured to acquire a first key, where the first key is used for integrity protection of communication between the first remote UE and the relay UE;
  • the third generation module 220 is configured to generate a second key according to the first key, wherein the second key is used for integrity protection of mutual discovery between two remote UEs through relay UEs. .
  • the information processing device may be included in the relay UE.
  • the second acquisition module 210 and the third generation module 220 may be program modules; after the program modules are executed by the processor, the first key can be obtained and the second key can be generated. .
  • the second acquisition module 210 and the third generation module 220 may be software-hardware combination modules; the software-hardware combination modules include, but are not limited to, programmable arrays; the programmable arrays include, but are not limited to : Field programmable arrays and/or complex programmable arrays.
  • the second acquisition module 210 and the third generation module 220 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • the device includes:
  • a second receiving module configured to receive the first random number of the first remote UE
  • a second sending module configured to send a second random number to the first remote UE
  • the third generation module 220 is configured to generate the second key according to the first random number, the second random number and the first key.
  • the second sending module is configured to send identification information of an authentication method to the first remote UE, where the authentication method is used for the first remote UE and the An end-to-end connection authentication is established between the second remote UE.
  • the second generation module is configured to generate the second key according to the first random number, the second random number, the first key and the identification information. .
  • the second acquisition module 210 is configured to send a request message to the Directly Connected Discovery Name Management Function DDNMF; and a response message returned based on the request message, wherein the response message includes: a first password key.
  • an embodiment of the present disclosure provides an information processing device, wherein the device further includes:
  • the third receiving module 310 is configured to receive the request message sent by the remote UE and/or the relay UE;
  • the third sending module 320 is configured to send a first key to the remote UE and/or relay UE according to the request message; the first key is used for the first remote UE and the relay UE.
  • the integrity protection of the communication between the relay UEs is also used to generate a second key, where the second key is used for the integrity protection of mutual discovery between two remote UEs through the relay UEs. .
  • the information processing device may be included in the DDNMF.
  • the third receiving module 310 and the third sending module 320 may be program modules; after the program modules are executed by the processor, the above operations can be performed.
  • the third receiving module 310 and the third sending module 320 may be software-hardware combination modules; the software-hardware combination modules include, but are not limited to, programmable arrays; the programmable arrays include, but are not limited to : Field programmable arrays and/or complex programmable arrays.
  • the third receiving module 310 and the third sending module 320 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • An embodiment of the present disclosure provides a communication device, including:
  • Memory used to store instructions executable by the processor
  • the processor is configured to execute the information processing method provided by any of the foregoing technical solutions.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to store information stored thereon after the communication device is powered off.
  • the communication device includes: UE or network element, and the network element may be the aforementioned DDNMF.
  • the UE may be a relay UE and/or a remote UE.
  • the processor may be connected to the memory through a bus or the like, and be used to read the executable program stored on the memory, for example, at least one of the methods shown in FIGS. 2 to 9 .
  • FIG. 13 is a block diagram of a UE 800 according to an exemplary embodiment.
  • UE 800 may be a mobile phone, computer, digital broadcast user equipment, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, etc.
  • UE 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and Communication component 816.
  • Processing component 802 generally controls the overall operations of UE 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to generate all or part of the steps of the methods described above.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations at UE 800. Examples of this data include instructions for any application or method operating on the UE800, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 806 provides power to various components of UE 800.
  • Power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to UE 800.
  • Multimedia component 808 includes a screen that provides an output interface between the UE 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When UE800 is in operating mode, such as shooting mode or video mode, the front camera and/or rear camera can receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when UE 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors that provide various aspects of status assessment for UE 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the UE800, the sensor component 814 can also detect the position change of the UE800 or a component of the UE800, the user and the Presence or absence of UE800 contact, UE800 orientation or acceleration/deceleration and temperature changes of UE800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between UE 800 and other devices.
  • UE800 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • UE 800 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gates Array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable gates Array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • a non-transitory computer-readable storage medium including instructions such as a memory 804 including instructions, executable by the processor 820 of the UE 800 to generate the above method is also provided.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of an access device.
  • the communication device 900 may be provided as a network side device.
  • the communication device may be various network elements such as the aforementioned access network element and/or network function.
  • communications device 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the access device, for example, the methods shown in any one of Figures 2 to 9.
  • Communication device 900 may also include a power supply component 926 configured to perform power management of communication device 900, a wired or wireless network interface 950 configured to connect communication device 900 to a network, and an input-output (I/O) interface 958 .
  • the communication device 900 may operate based on an operating system stored in the memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。由第一远端UE执行的信息处理方法,可包括:获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护(S1110);根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护(S1120)。

Description

信息处理方法及装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种信息处理方法及装置、通信设备及存储介质。
背景技术
邻近业务(Proximity based service,Prose)允许对等端终端通过用户设备(User Equipment,UE)-到(to)-UE中继进行通信。这意味着,如果源UE无法直接到达目标UE,源UE将尝试发现UE-to-UE中继到达目标UE,且在源UE通过中继UE与目标UE通信之前,源UE需要通过中继UE来发现目标UE。事实上,UE-to-UE中继作为一个不受信任中间传输节点可能会受到损害,从而导致对等UE之间信息的安全性受到损害。
恶意的中继UE与源UE和目标UE建立单播链路,可能会对终端进行中间人攻击(Man-in-the-Middle Attack,MITM)。因此,通过UE-to-UE中继进行通信的对端终端之间需要实现端到端连接的安全性。
直连发现名字管理功能(Direct Discovery Name Management Function,DDNMF)是一种可以向UE提供必要的安全信息以保护发现消息的网元。且该DDNMF可与邻近业务服务器(Prose Application Server)交互,以授权发现请求。
发明内容
本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。
本公开实施例第一方面提供一种信息处理方法,其中,由第一远端用户设备UE执行,所述方法包括:
获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
本公开实施例第二方面提供一种信息处理方法,由中继UE执行,所述方法包括:
获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE 相互发现的信息完整性保护。
本公开实施例第三方面提供一种信息处理方法,其中,由DDNMF执行,所述方法还包括:
接收远端UE和/或中继UE发送的请求消息;
根据所述请求消息,向所述远端UE和/或中继UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
本公开实施例第四方面提供一种信息处理装置,其中,所述装置包括:
第一获取模块,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
第一生成模块,被配置为根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
本公开实施例第五方面提供一种信息处理装置,所述装置包括:
第二获取模块,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
第三生成模块,被配置为根据所述第一密钥生成第二密钥,其中,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
本公开实施例第六方面提供一种信息处理装置,其中,所述装置还包括:
第三接收模块,被配置为接收远端UE和/或中继UE发送的请求消息;
第三发送模块,被配置为根据所述请求消息,向所述远端UE和/或中继UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
本公开实施例第七方面提供一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够由所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如前述第一方面至第三方面任意一个方面提供的信息处理方法。
本公开实施例第八方面提供一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现前述的第一方面至第三方面任意一个方面提供的信息处理方法。
本公开实施例提供的技术方案,与UE相关的策略,是根据UE的物理状态信息确定的,如此确定的控制UE的数据流的策略,不会仅仅兼顾网络状况而忽略了UE的物理状况,减少制定的策略与UE的物理状况不符导致的网络资源浪费和/或UE的通信质量差的现象,提升了UE的通信质量,并减少了网络资源浪费。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明实施例,并与说明书一起用于解释本发明实施例的原理。
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图;
图2是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图3是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图4是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图5是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图6是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图7是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图8是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图9是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图10是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图11是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图12是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图13是根据一示例性实施例示出的一种UE的结构示意图;
图14是根据一示例性实施例示出的一种通信设备的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明实施例相一致的所有实施方式。相反,它们仅是本发明实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开所使用的单数形式的“一种”、“”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无 线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个UE11以及若干个接入设备12。
其中,UE11可以是指向用户提供语音和/或数据连通性的设备。UE11可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,UE11可以是物联网UE,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网UE的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station)、移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远端UE(remote terminal)、接入UE(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户UE(user equipment,UE)。或者,UE11也可以是无人飞行器的设备。或者,UE11也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线通信设备。或者,UE11也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
接入设备12可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口(new radio,NR)系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。或者,MTC系统。
其中,接入设备12可以是4G系统中采用的演进型接入设备(eNB)。或者,接入设备12也可以是5G系统中采用集中分布式架构的接入设备(gNB)。当接入设备12采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对接入设备12的具体实现方式不加以限定。
接入设备12和UE11之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
如图2所示,本公开实施例提供一种信息处理方法,其中,由第一远端UE执行,所述方法包括:
S1110:获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
S1120:根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
该第一远端UE可为UE到UE之间中继通信的源UE或者目标UE。
第一密钥可为第一远端UE通过中继UE与网络设备时使用的完整性保护密钥,可以用于第一远端UE通过中继UE向网络发送数据时进行完整性保护的密钥,或者,用于中继UE向第一远端UE转发网络设备提供的数据时进行完整性保护的密钥。
所述第一密钥的长度可为128比特、256比特、64比特或者512比特等。
在一些实施例中,示例性地,利用密钥推导函数依据所述第一密钥推导出所述第二密钥。进一步地,利用密钥推导函数依据所述第一密钥自身和所述第一密钥的长度推导出所述第二密钥。
在本公开实施例中,会根据第一密钥生成第二密钥,该第二密钥可以用于两个远端UE之间通过中继UE之间相互发现的完整性保护,从而确保两个远端UE之间相互发现的安全性。
如图3所示,本公开实施例提供一种信息处理方法,其中,由第一远端UE执行,所述方法包括:
S1210:获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
S1220:向所述中继UE发送第一随机数;
S1230:接收中继UE发送的第二随机数;
S1240:根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
此处第一远端UE和中继UE之间交互的随机数与所述第一密钥一同作为生成(或者说推导)所述第二密钥的输入参数。
故在一些实施例中,所述S1240可包括:根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
具体地如,所述S1240可包括:根据所述第一随机数自身、所述第一随机数的长度、第二随机数自身、所述第二随机数的长度以及所述第一密钥,生成所述第二密钥。
所述第一随机数的长度和所述第二随机数的长度都可分别为:第一随机数写成二进制之后的比特数和第二随机数写成二进制的比特数。
在另一些实施例中,所述S1240还可包括:
根据所述第一密钥、所述第一远端UE和第二远端UE之间进行完整性保护算法的标识,生成所述第二密钥。示例性地,根据第一密钥、第一密钥的长度、所述标识自身以及所述标识的长度,生成第二密钥。
当然以上仅仅是对生成第二密钥的举例,具体实现时不局限于上述举例。
在一些实施例中,所述方法还包括:
接收所述中继UE发送的认证方式的标识信息;
所述根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥,包括:
根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
中继UE发送的用于供第一远端UE和第二远端UE之间相互发现使用的认证方式,该认证方式的标识信息同样可以作为第二密钥的输入参数。
该认证方式,用于所述第一远端UE和所述第二远端UE之间建立端到端连接时的相互认证。
示例性地,所述根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥,包括:
根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
例如,根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥,可包括:根据所述第一随机数、所述第一随机数的长度、所述第二随机数、所述第二随机数的长度、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
所述认证方式可有多种,不同的认证方式可以生成不同的第二密钥。第一远端UE和第二远端UE之间相互发现之后认证方式也不同。通过认证方式的第一远端UE和第二远端UE可为互为信任的UE。
如图4所示,本公开实施例提供一种信息处理方法,其中,由第一远端UE执行,所述方法包括:
S1310:当认证方式为预定方式时,向中继UE发送第一消息,其中,所述第一消息使用第二密钥进行完整性保护;该第二密钥可以前述任意技术方案确定的密钥;
S1320:接收所述中继UE转发的第二远端UE发送的第二消息;
S1330:根据所述第二密钥对所述第二消息进行完整性保护验证;
S1340;当所述第二消息通过完整性保护验证时,确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接。
在所述预定方式包括但不限于:网络密钥交换协议版本2(Internet Key Exchange Protocol Version2(IKEv2)时,第一远端UE会向中继UE发送第一消息。
该第一消息使用所述第二密钥进行完整性保护,如此,中继UE收到所述第一消息之后,先通过第二密钥对所述第一消息进行完整性保护,若所述第一消息完整性保护通过,则中继会UE向第二远端UE转发所述第一消息。如此,中继UE使用第二密钥发现第一远端UE的第一消息被篡改了,则第一远端UE收到的可能拒绝消息或者提示信息。该拒绝消息指示拒绝建立第一远端UE和第二远端UE之间的端到端连接。该提示信息可用于提示第一消息被篡改了,中继UE接收到的第一消息没有通过完整性保护验证。
若第一远端UE为UE到UE之间中继通信的源UE,则第二远端UE为目标UE;若第一远端UE为UE到UE之间中继通信目标UE,则第二远端UE为源UE。
当然也可与可能是第一UE先接收到中继UE的第二消息,第一UE再发送第一消息。
在本公开实施例中,第一远端UE会使用第二密钥对第二消息进行完整性保护。在校验通过之后,通过中继UE建立第一远端UE和第二远端UE之间的端到端连接。
在一些实施例中,所述第二消息包括校验值1;所述根据所述第二密钥对所述第二消息进行完 整性保护,包括:
使用所述第二密钥和完整性保护算法对所述第二消息除所述校验值1以外的内容进行计算,得到校验值2;
比对所述校验值1和所述校验值2;
若所述校验值1和所述校验值2相同,则确定第二消息通过完整性保护验证。
在一些实施例中,所述第二消息还可携带有证书发送指示符,用于指示向第二远端UE返回所述第一远端UE的证书。若第一远端UE接收到该证书发送指示符,若确定与第二远端UE建立安全的端到端连接,则会在端到端连接的建立过程的信息交互时,将第一远端UE的证书返回给第二远端UE。
当所述第二消息通过完整性保护验证时,确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接,包括:
当所述第二消息通过完整性保护验证时,通过所述中继UE向所述第二远端UE发送连接建立请求,并接收所述第二远端UE基于所述连接建立请求返回的连接建立响应;
或者,
接收到所述第二远端UE的连接建立请求,若所述第二消息通过完整性保护验证,向所述第二远端UE发送指示同意连接建立的连接建立响应,以与第二远端UE建立端到端连接。
在一些实施例中,第二密钥的引入可以使得第一远端UE和第二远端UE之间的消息得到完整性保护,如此第一远端UE和第二远端UE通过该端到端连接进行信息的安全性。
在一个实施例中,该端到端连接可为:基于PC5接口的端到端连接。
在一些实施例中,所述方法还包括:
根据所述第一消息携带的第一随机数、第一密钥交换信息和所述第二消息携带的第二随机数、第二密钥交换信息,生成密钥种子;
根据所述密钥种子,生成完整性保护密钥和机密性保护密钥,其中,所述完整性保护密钥和机密性保护密钥,用于第一远端UE和所述第二远端UE通过所述中继UE建立端到端通信的完整性保护和机密性保护。
在本公开实施例中,第一密钥交换信息可为生成所述密钥种子的一个多个参数。
示例性地,所述密钥种子可为第一远端UE和第二远端UE之间使用非对称机密性保护或非对称完整性保护的私钥种子。当然以上仅仅是举例。
在上述密钥种子生成之后,根据密钥种子生成完整性保护密钥和机密性保护密钥。
完整性保护密钥可用于第一远端UE和第二远端UE通过中继UE传输信息的完整性保护。
机密性保护密钥可用于第一远端UE和第二远端UE通过中继UE传输信息的加密保护。
在一些实施例中,所述确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接,包括:
向所述第二远端UE发送第三消息;其中,所述第三消息,用所述完整性保护密钥和机密性保 护密钥分别进行完整性保护和所述机密性保护;
接收与所述第三消息对应的第四消息,其中,所述完整性保护密钥,用于对所述第四消息进行完整性保护,且所述机密性保护密钥用于解密所述第四消息。
此处的第三消息和第四消息中的一个可为连接建立请求,另一个为连接建立响应。当然此处仅仅是第三消息和第四消息的举例,具体实现时不局限于该举例。
该第三消息和第四消息可以没有一定的先后顺序,例如,第一远端UE可以先接收第四消息再发送第三消息;或者,第一远端UE先发第三消息再接收第四消息,或者,第一远端UE在接收第四消息的同时发送所述第三消息。
所述第三消息至少包括以下至少之一:
所述第一远端UE的证书;
证书发送指示符,用于指示返回所述第二远端UE的证书;
第一校验值,所述第一校验值用于供所述第二远端UE校验所述第一消息、所述第二随机数和所述第一远端UE的标识是否被所述第一远端UE正确接收。
在一个实施例中,所述第三消息,至少可包括:所述第一远端UE的标识。
所述第一远端UE的标识可为:第一远端UE的设备标识和/或应用标识。
该设备标识包括:第一远端UE的签约用户隐式标识(Subscription Concealed Identifier,SUCI)、签约用户永久标识(Subscription Permanent Identifier,SUPI)或者全球临时UE标识(5G Globally Unique Temporary UE Identity,5G-GUTI)。所述应用标识可为各种邻近业务((Proximity Based Service,ProSe)的应用的标识(Identifier,ID)。
在另一个实施例中,所述第三消息至少可包括:第一远端UE的标识和第一校验值。所述第一校验值用于供所述第二远端UE校验所述第一消息、所述第二随机数和所述第一远端UE的标识是否被所述第一远端UE正确接收。该第一校验值可是根据密钥种子生成的。
在一个实施例中,所述第三消息还可包括:
所述第一远端UE的证书;和/或,
证书发送指示符,用于指示返回所述第二远端UE的证书;
所述第一远端UE的证书被携带在第三消息中发送给第二远端UE,后续第一远端UE和第二远端UE之间建立端到端连接之后,可以通过证书用于相互之间的身份认证。
第三消息还包括:证书发送指示符向第二远端UE给第一远端UE返回证书,方便后续第一远端UE将接收到所述第二远端UE发送的证书。
在一个实施例中,若第三消息携带有证书指示符,第二远端UE向所述第一远端发送证书;若所述第三消息没有携带证书发送指示符,则第二远端UE可以不用向所述第一远端发送证书。
在另一个实施例中,所述证书发送指示符对应于一个或多个比特;若证书指示符对应的比特具有第一取值时,则第二远端UE可以不用向所述第一远端发送证书;若证书指示符对应的比特具有第二取值时,则第二远端UE可以不用向所述第一远端发送证书。第二取值不同于第一取值。
在一个实施例中,根据协议约定或者出厂配置可以默认:第一远端UE和第二远端UE进行消息交互时需要交互证书。
在另一个实施例中,根据协议约定或者出厂配置可以默认,第一远端UE和第二远端UE没有明确指示需要交互证书时,则相互之间不交互证书。
在一些实施例中,所述第四消息,包括以下至少之一:
所述第二远端UE的标识;
所述第二远端UE的证书;
第二校验值,所述第二校验值,用于供所述第一远端UE校验所述第二消息、所述第一随机数和所述第二远端UE的标识是否被所述第二远端UE正确接收。
同样地,所述第四消息可至少包括:第二远端UE的标识。第二远端UE的设备标识和/或应用标识。该设备标识包括:第二远端UE的签约用户隐式标识(Subscription Concealed Identifier,SUCI)、签约用户永久标识(Subscription Permanent Identifier,SUPI)或者全球临时UE标识(5G Globally Unique Temporary UE Identity,5G-GUTI)。在一些实施例中,所述第一远端UE的标识包括:所述第一远端UE的受限邻近业务应用用户标识(RPAUID)和所述第一远端UE的邻近业务应用的标识;和/或,所述第二远端UE的标识包括:所述第二远端UE的RPAUID和所述第二远端UE的邻近业务应用的标识。
以上仅仅是对第一远端UE和第二远端UE建立端到端连接时交互的标识包括但不限于RPAUID和邻近业务应用的标识。
值得注意是:第四消息中的第二远端UE的证书是可选内容。
在一些实施例中,所述方法还包括:
当所述第一消息被所述第二远端UE正确接收且所述第二消息被所述第一远端UE正确接收,确定建立所述第一远端UE和所述第二远端UE之间的端到端连接。
此处为通过第一消息和第二消息交互,确定是否建立第一远端UE和第二远端UE之间的端都断连接,若确定建立第一远端UE和第二远端UE之间的端到端连接,则启动第一远端UE和第二远端UE之间的端到端连接。具体如何建立端到端连接,可以通过一条或多条消息的交互,实现第一远端UE和第二远端UE之间安全的端到端连接的建立。
若第一消息和第二消息被两个远端UE的正确接收,可以认为第一远端UE和第二远端UE完成相互认证,可用于建立第一远端UE和第二远端UE之间的端到端连接。
在一些实施例中,所述第一密钥为:所述第一远端UE向所述中继UE发送数据使用的完整性保护密钥;或者,所述第一密钥为:所述中继UE向所述第一远端UE发送数据使用的完整性保护密钥。
如图5所示,本公开实施例提供一种信息处理方法,其中,由第一远端UE执行,所述方法包括:
S1410:向DDNMF发送请求消息;
S1420:基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥,该第一密钥用于确定第二密钥;所述第二密钥用于供第一远端UE和第二远端UE之间相互发现的完整性保护。
该第一密钥可为DDNMF生成的,如此,第一远端UE可以直接向DDNMF请求得到。示例性地,第一远端UE通过中继UE向DDNMF发送请求消息,并通过该中继UE接收到DDNMF返回的响应消息。该中继UE可为:UE到网络(User Equipment to Network)的中继设备。
如图6所示,本公开实施例提供一种信息处理方法,由中继UE执行,所述方法包括:
S2110:获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护。
S2120:根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的信息完整性保护。
该中继UE可为提供中继服务的任意UE。该中继UE可为位于网络覆盖范围内的UE。
该中继UE可为位于第一远端UE和第二远端UE之间的UE。
在本公开实施例中,中继UE可以本地查询预先获取的第一密钥,或者从DDNMF请求所述第一密钥。
所述第一密钥可为第一远端UE通过该中继UE与网络设备进行通信时,供UE完整性保护的密钥。
在接收到第一密钥之后,中继UE会本地推导出第二密钥。
在一些实施例中,所述方法包括:
接收所述第一远端UE的第一随机数;
向所述第一远端UE发送第二随机数;
所述S2120可包括:根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
在一些实施例中,根据所述第一随机数、所述第二随机数、所述第一密钥以及密钥推导函数,推导所述第二密钥。
示例性地,所述根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥,可包括:根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
示例性地,所述方法还包括:
向所述第一远端UE发送认证方式的标识信息,其中,所述认证方式,用于所述第一远端UE和所述第二远端UE之间建立端到端连接时的相互认证。
该认证方式的标识信息指示了两个远端之间建立端到端连接相互认证的方式。该认证方式除了上述IKEv2以外,还可以IKEv1,还可以是其他的私有认证协议等,此处就不再一一举例了。
在一些实施例中,所述根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥,包括:
根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
示例性地,所述根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥,可包括:根据第一随机数、第一随机数的长度、第二随机数、第二随机数的程度、标识信息自身、标识信息的长度以及第一密钥生成所述第二密钥。
如图7所示,本公开实施例提供一种信息处理方法,由中继UE执行,所述方法包括:
S2210:向DDNMF发送请求消息;
S2220:基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。该第一密钥用于远端UE和中继UE之间通信的完整性保护;所述第一密钥还用于生成第二密钥;所述第二密钥用于供第一远端UE和第二远端UE之间相互发现的完整性保护。
在本公开实施例中,所述中继UE获取第一密钥的方式,是向DDNMF请求的,通过向DDNMF发送请求消息,则会收到DDNMF返回的响应消息,该响应消息可包括第一密钥。
如图8所示,本公开实施例提供一种信息处理方法,其中,由DDNMF执行,所述方法还包括:
S3110:接收UE发送的请求消息;所述UE为中继UE和/或远端UE;
S3120:根据所述请求消息,向所述UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
DDNMF会接收到请求消息,该请求消息包括远端UE和/或中继UE发送的请求消息之后,会在接收到请求消息之后,会向UE返回第一密钥,该第一密钥可以用于远端UE和中继UE推导出第二密钥。该第二密钥可以用于供两个远程UE基于中继UE建立安全地的端到端通信。
在源UE和目标UE之间通过中继UE建立安全的端到端连接。该中继UE可为:UE到UE的中继设备。通过中继UE接入到ProSe业务。
通过中继UE提供完整性保护和机密性保护的信息。
确保远端UE可以监控和识别中继UE的恶意攻击。
当远程UE和UE-to-UE中继UE处于网络覆盖范围时,将从网络侧获取UE之间相互发现的安全信息(该安全信息还可以称之为发现安全信息)。这些安全信息是具有时效性,这些安全信息过期后安全信息就失效了。如果UE没有有效的安全信息,远程UE和UE-to-UE Relay需要连接到ProSe应用服务器(Application Server)并获取新的安全信息,才能使用5G ProSe UE-to-UE中继业务。
如图9所示,本公开实施例提供的信息处理方法,可包括:
步骤1a-1c涉及远端UE1和远端UE2。
步骤1a.远程UE向5G DDNMF(该DDNMF为远程UE的DDNMF)发送请求消息(该请求消息还可以称之为发现请求信息),以获得发现查询过滤器(s)来监控查询、用于宣告的ProSe响应码(ProSe Response Code)等相关安全信息。此外,发现请求消息可包含远程UE的安全能力信息,该安全能力信息可包含UE支持的加密算法列表。
步骤1b.远程UE的5G DDNMF可能会根据5G DDNMF的配置情况,向ProSe应用服务器确 定远程UE是否具有宣告的权限。
步骤1c.远程UE的5G DDNMF将返回每个发现过滤器对应的ProSe响应码、发送码安全参数(Code-Send-SecParams)、发现查询过滤器、接收码安全参数(Code-Rcv-SecParams),以及当前时刻信息(CURRENT_TIME)、最大偏移量(MAX_OFFSET)和选择的PC5加密算法的算法信息。该算法信息可至少包括:算法标识。
发送码安全参数提供必要的信息来保护ProSe响应码的传输,并与ProSe响应码一起存储。
接收代码安全参数提供远程UE需要的信息,以验证应用于ProSe查询代码的保护。
远程UE对当前时刻信息(CURRENT_TIME)以及最大偏移量(MAX_OFFSET)进行重放攻击验证。
远程UE的5G DDNMF在发现响应消息中会携带选择的PC5加密算法。5G DDNMF根据步骤1a中接收到的PC5UE的安全能力信息和ProSe码确定所选择的PC5加密算法。UE将存储接收到的PC5加密算法和ProSe响应码。
值得注意的是:以上步骤1a-1c在5G远程UE是位于网络覆盖内时执行。
当远端UE处于漫游状态时,远端UE的归属地移动通信网(Home Public Land Mobile Network,HPLMN)和拜访地移动通信网(Visited Public Land Mobile Network,VPLMN)中的5G DDNMF可能会交换消息。
步骤2a-2f涉及UE-to-UE(即涉及中继UE)。
步骤2a.UE-to-UE中继向5G DDNMF发送包含PC5UE安全能力信息的发现请求消息,请求DDNMF允许UE-to-UE中继被发现且向一个或多个远程UE提供中继服务。
步骤2 b.UE-to-UE中继的5G DDNMF(该DDNMF为UE-to-UE中继的DDNMF)向ProSe应用服务器(Application Server)发送授权请求。如果允许UE-to-UE中继发现至少一个远程UE,那么ProSe应用服务器(Application Server)将返回一个授权响应。
步骤2 c.如果发现请求中携带授权,同时远程UE和UE-to-UE中继的PLMN ID不同,UE-to-UE中继的5G DDNMF会和远程UE的5G DDNMF进行交互。UE-to-UE中继的5G DDNMF向远程UE的5G DDNMF发送发现请求消息,该发现请求消息可包括:远程UE的安全能力信息。
步骤2 d.远程UE的5G DDNMF可能与ProSe应用服务器(Application Server)交互授权消息。
如果步骤2a中的PC5UE安全能力信息包括所选的PC5加密算法的算法信息,则远端UE的5G DDNMF向UE-to-UE中继的5G DDNMF响应一个发现响应消息,该发现响应消息可包括ProSe查询码及其相关的发送码安全参数,响应码及其相关的接收码安全参数和选择的PC5加密算法的算法信息。代码发送安全参数提供保护ProSe查询代码所需的信息。接收码安全参数包括ProSe响应码的完整性保护密钥(DUIK),该完整性保护密钥用于验证远程UE应用的保护。该DUIK为前述第一密钥的一种。
步骤2 f.UE-to-UE中继(即图9中的中继UE)的5G DDNMF返回发现响应过滤器和接收码安全参数、ProSe查询代码、发送码安全参数以及CURRENT_TIME和MAX_OFFSET参数和选择的 PC5加密算法的算法信息。UE-to-UE中继根据CURRENT_TIME和MAX_OFFSET确定是否发现响应消息是否有受到重放攻击。UE-to-UE中继存储发现响应过滤器及接收码安全参数、ProSe查询代码及发送码安全参数以及所选的PC5加密算法的算法标识和ProSe码。
步骤2a-2f是在5G UE-to-UE中继在网络覆盖内时执行的。
当UE-to-UE中继处于漫游状态时,HPLMN和VPLMN中的5G DDNMF可能会交换认证消息。
步骤3a至步骤3d发生在PC5的发现流程中。
步骤3a.远端UE发送询问请求(Query Request)消息,该询问请求消息可包含了ProSe询问码(ProSe Query Code)、支持的U2U中继认证方式列表和用于获取(Negotiation User Integrity Key,NUIK)的随机数1(Nonce 1)。
在发现时隙内,如果系统提供的基于UTC的计数器在远端UE的ProSe时钟的MAX_OFFSET范围内,并且有效定时器(Validity Timer)没有过期,远端UE也会侦听响应消息。远端UE计算一个32位的消息完整确认值(Message Integrity Check,MIC)来保护查询请求。
步骤3b.在发现时隙内如果系统提供的基于UTC的计数器在UE-to-UE中继的ProSe时钟的MAX_OFFSET范围内,UE-to-UE中继将侦听满足其发现过滤器的请求消息,则会监听到对应的远端UE。
步骤3c.UE-to-UE中继发送与发现的ProSe查询码相关的ProSe响应码、所选的U2U中继认证方式和用于派生NUIK的随机数2(Nonce 2)。NUIK既可以根据接收码参数中的DUIK计算,也可以根据发送码参数中的DUIK计算,这需要提前确定。计算出的NUIK与一个有效时间相关联,如果有效时间过期后NUIK就失效了。UE-to-UE中继形成响应消息并计算一个32位MIC来保护查询响应。UE-to-UE中继根据ProSe询问码(Query Code)和接收到的终端支持的认证方式来选择U2U中继认证方式。
步骤3d.远端UE侦听满足其发现筛选器的响应消息。远端UE使用存储的DUIK自行检查响应消息的完整性,并导出NUIK以保护协商消息。
计算出的NUIK与一个过期时间(或者有效时间)相关联,过期后NUIK就失效了。
远端UE需要存储所选择的认证方式,该认证方式在UE-to-UE中继场景中用于建立端到端IPsec连接。
如果远端UE1和远端UE2选择IKEv2协议建立端到端连接,则执行步骤4a-4d。该端到端连接可为:基于互联网安全协议(Internet Protocol Security,IPSec)的连接。
步骤4a.远端UE1向UE-to-UE中继发送IKE_SA_INIT_Request。具体地如,远程UE1形成请求消息(IKE_SA_INIT_Request),并使用随机数1(NUIK1)进行保护。一旦收到此IKE_SA_INIT_Request,UE-to-UE中继使用与远端UE1共享的NUIK1验证IKE_SA_INIT_Request,然后使用与远端UE2共享的随机数2(NUIK2)保护此IKE_SA_INIT_Request,并将使用NUK2保护的IKE_SA_INIT_Request发送给远端UE2。
步骤4 b.远端UE2通过UE-to-UE中继向远端UE1响应IKE_SA_INIT_Response消息。IKE_SA_INIT_Response消息先被远端UE2使用NUIK2保护,再被UE-to-UE中继使用NUIK1保护。根据随机数(nonces)和IKE_SA_INIT交换过程中交换的狄菲-赫尔曼(Diffie-Hellman)共享秘密,计算密钥种子(SKEYSEED)。该密钥种子,可用于计算另一个完整性保护密钥,用于后续完整性保护。步骤4c.远端UE1表明自己的身份,例如通过RPAUID和Prose应用程序ID的组合来标识该远端UE1,该UE1的ID用ID1代表。使用ID1有效负载和完整性保护使用认证(AUTH)有效负载的第一个消息的内容。远程UE1还在证书(Certificate,CERT)有效载荷中发送其证书,并在证书指示符(CERTREQ)有效载荷中发送其信任锚的列表。远程UE1形成IKE_Auth_Request消息,并使用SKEYSEED派生出来的密钥进行保护。
步骤4d.远端UE2使用ID2有效载荷声明UE2的身份,并向远端UE1发送一个或多个证书,验证其身份RPAUID,并使用认证(AUTH)有效载荷保护第二个消息的完整性。远端UE2生成IKE_Auth_Response消息,并使用密钥种子(SKEYSEED)派生出的密钥进行保护。
值得注意的是:步骤4c和4d中交换的证书是由Prose应用(Application,APP)提供的。
远程UE和/或中继UE应能够根据可用的ProSe发现密钥派生出IKE初始协商密钥。该ProSe发现密钥即为前述第一密钥的一种。
远程UE应能够将其U2U中继认证方法列表发送到中继UE。
中继UE应能够选择并发送所选择的U2U中继认证方法到远程UE。
远程UE应能够存储从中继UE接收到的所选择的U2U中继认证方法。
远程UE应能够通过检查查询响应的完整性来确保UE到UE中继的真实性。
远程UE和中继UE应能够保护IKE初始协商消息。
中继UE应能够在源远端UE和目标远端UE之间转发协商消息。
5G DDNMF可向中继UE和/或远端UE提供UE到UE中继使用的安全信息和参数。
如图10所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第一获取模块110,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
第一生成模块120,被配置为根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
本公开实施例提供的信息处理装置可包含在第一远端UE内。
在一些实施例中,所述第一获取模块110以及第一生成模块120可为程序模块;所述程序模块被处理器执行之后,能够获取所述第一密钥并生成所述第二密钥。
在另一些实施例中,所述第一获取模块110以及第一生成模块120可为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第一获取模块110以及第一生成模块120可为纯硬件模块;该纯硬 件模块包括但不限于专用集成电路。
在一些实施例中,所述装置包括:
第一发送模块,被配置为向所述中继UE发送第一随机数;
第一接收模块,被配置为接收中继UE发送的第二随机数;
所述第一生成模块120,被配置为根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
在一些实施例中,所述第一接收模块,被配置为接收所述中继UE发送的认证方式的标识信息;
所述第一生成模块120,被配置为根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
在一些实施例中,所述第一生成模块120,被配置为根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
在一些实施例中,所述第一发送模块,被配置为当所述认证方式为预定方式时,向所述中继UE发送第一消息,其中,所述第一消息使用所述第二密钥进行完整性保护;
所述第一接收模块,被配置为接收所述中继UE转发的第二远端UE发送的第二消息;
所述装置还包括:
第一校验模块,被配置为根据所述第二密钥对所述第二消息进行完整性保护验证;
第一建立模块,被配置为当所述第二消息通过完整性保护验证时,确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接。
在一些实施例中,所述装置还包括:
第二生成模块,被配置为根据所述第一消息携带的第一随机数、第一密钥交换信息和所述第二消息携带的第二随机数、第二密钥交换信息,生成密钥种子;
第三生成模块,被配置为根据所述密钥种子,生成完整性保护密钥和机密性保护密钥,其中,所述完整性保护密钥和机密性保护密钥,用于第一远端UE和所述第二远端UE通过所述中继UE建立端到端通信的完整性保护和机密性保护。
在一些实施例中,所述第一发送模块,被配置为向所述第二远端UE发送第三消息;其中,所述第三消息,用所述完整性保护密钥和机密性保护密钥分别进行完整性保护和所述机密性保护;
所述第一接收模块,被配置为接收与所述第三消息对应的第四消息,其中,所述完整性保护密钥,用于对所述第四消息进行完整性保护,且所述机密性保护密钥用于解密所述第四消息。
在一些实施例中,所述第三消息,包括以下至少之一:
所述第一远端UE的标识;
所述第一远端UE的证书;
证书发送指示符,用于指示返回所述第二远端UE的证书;
第一校验值,所述第一校验值用于供所述第二远端UE校验所述第一消息、所述第二随机数和所述第一远端UE的标识是否被所述第一远端UE正确接收。
在一些实施例中,所述第四消息,包括以下至少之一:
所述第二远端UE的标识;
所述第二远端UE的证书;
证书发送指示符,用于指示返回所述第二远端UE的证书;
第二校验值,所述第二校验值,用于供所述第一远端UE校验所述第二消息、所述第一随机数和所述第二远端UE的标识是否被所述第二远端UE正确接收。
在一些实施例中,所述第一UE的标识包括:所述第一远端UE的受限邻近业务应用用户标识RPAUID和所述第一远端UE的邻近业务应用的标识;
和/或,
所述第二远端UE的标识包括:所述第二远端UE的RPAUID和所述第二远端UE的邻近业务应用的标识。
在一些实施例中,所述装置还包括:
第一确定模块,被配置为当所述第一消息被所述第二远端UE正确接收且所述第二消息被所述第一远端UE正确接收,确定建立所述第一远端UE和所述第二远端UE之间的端到端连接。
在一些实施例中,所述第一密钥为:所述第一远端UE向所述中继UE发送数据使用的完整性保护密钥;
或者,
所述第一密钥为:所述中继UE向所述第一远端UE发送数据使用的完整性保护密钥。
在一些实施例中,所述第一获取模块110,被配置为向直连发现名字管理功能DDNMF发送请求消息;基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
如图11所示,本公开实施例提供一种信息处理装置,所述装置包括:
第二获取模块210,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
第三生成模块220,被配置为根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
该信息处理装置可包括在中继UE中。
在一些实施例中,所述第二获取模块210以及第三生成模块220可为程序模块;所述程序模块被处理器执行之后,能够获取所述第一密钥并生成所述第二密钥。
在另一些实施例中,所述第二获取模块210以及第三生成模块220可为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第二获取模块210以及第三生成模块220可为纯硬件模块;该纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述装置包括:
第二接收模块,被配置为接收所述第一远端UE的第一随机数;
第二发送模块,被配置为向所述第一远端UE发送第二随机数;
所述第三生成模块220,被配置为根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
在一些实施例中,所述第二发送模块,被配置为向所述第一远端UE发送认证方式的标识信息,其中,所述认证方式,用于所述第一远端UE和所述第二远端UE之间建立端到端连接之间认证。
在一些实施例中,所述第二生成模块,被配置为根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
在一些实施例中,所述第二获取模块210,被配置为向直连发现名字管理功能DDNMF发送请求消息;基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
如图12所示,本公开实施例提供一种信息处理装置,其中,所述装置还包括:
第三接收模块310,被配置为接收远端UE和/或中继UE发送的请求消息;
第三发送模块320,被配置为根据所述请求消息,向所述远端UE和/或中继UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
该信息处理装置可包括在DDNMF中。
在一些实施例中,所述第三接收模块310以及第三发送模块320可为程序模块;所述程序模块被处理器执行之后,能够执行上述操作。
在另一些实施例中,所述第三接收模块310以及第三发送模块320可为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第三接收模块310以及第三发送模块320可为纯硬件模块;该纯硬件模块包括但不限于专用集成电路。
本公开实施例提供一种通信设备,包括:
用于存储处理器可执行指令的存储器;
处理器,分别存储器连接;
其中,处理器被配置为执行前述任意技术方案提供的信息处理方法。
处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
这里,所述通信设备包括:UE或者网元,该网元可为前述DDNMF。该UE可为中继UE和/或远程UE。
所述处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2至图9所示的方法的至少其中之一。
图13是根据一示例性实施例示出的一种UE800的框图。例如,UE 800可以是移动电话,计算 机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图13,UE800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制UE800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以生成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在UE800的操作。这些数据的示例包括用于在UE800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为UE800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为UE800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述UE800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当UE800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当UE800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为UE800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为UE800的显示器和小键盘,传感器组件814还可以检测UE800或UE800一个组件的位置改变,用户与UE800接触的存在或不存在,UE800方位或加速/减速和UE800的温度变化。传感器组件814可以包括接近传 感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于UE800和其他设备之间有线或无线方式的通信。UE800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由UE800的处理器820执行以生成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图14所示,本公开一实施例示出一种接入设备的结构。例如,通信设备900可以被提供为一网络侧设备。该通信设备可为前述的接入网元和/或网络功能等各种网元。
参照图14,通信设备900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述接入设备的任意方法,例如,如图2至图9任意一个所示方法。
通信设备900还可以包括一个电源组件926被配置为执行通信设备900的电源管理,一个有线或无线网络接口950被配置为将通信设备900连接到网络,和一个输入输出(I/O)接口958。通信设备900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (40)

  1. 一种信息处理方法,其中,由第一远端用户设备UE执行,所述方法包括:
    获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
    根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  2. 根据权利要求1所述的方法,其中,所述方法包括:
    向所述中继UE发送第一随机数;
    接收中继UE发送的第二随机数;
    所述根据所述第一密钥生成第二密钥,包括:
    根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
  3. 根据权利要求2所述的方法,其中,所述方法还包括:
    接收所述中继UE发送的认证方式的标识信息;
    所述根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥,包括:
    根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
  4. 根据权利要求3所述的方法,其中,所述根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥,包括:
    根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
  5. 根据权利要求3或4所述的方法,其中,所述方法还包括:
    当所述认证方式为预定方式时,向所述中继UE发送第一消息,其中,所述第一消息使用所述第二密钥进行完整性保护;
    接收所述中继UE转发的第二远端UE发送的第二消息;
    根据所述第二密钥对所述第二消息进行完整性保护验证;
    当所述第二消息通过完整性保护验证时,确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    根据所述第一消息携带的第一随机数、第一密钥交换信息和所述第二消息携带的第二随机数、第二密钥交换信息,生成密钥种子;
    根据所述密钥种子,生成完整性保护密钥和机密性保护密钥,其中,所述完整性保护密钥和机密性保护密钥,用于第一远端UE和所述第二远端UE通过所述中继UE建立端到端通信的完整性保护和机密性保护。
  7. 根据权利要求6所述的方法,其中,所述确定通过所述中继UE建立所述第一远端UE与所 述第二远端UE之间端到端连接,包括:
    向所述第二远端UE发送第三消息;其中,所述第三消息,用所述完整性保护密钥和机密性保护密钥分别进行完整性保护和所述机密性保护;
    接收与所述第三消息对应的第四消息,其中,所述完整性保护密钥,用于对所述第四消息进行完整性保护,且所述机密性保护密钥用于解密所述第四消息。
  8. 根据权利要求7所述的方法,其中,所述第三消息,包括以下至少之一:
    所述第一远端UE的标识;
    所述第一远端UE的证书;
    证书发送指示符,用于指示返回所述第二远端UE的证书;
    第一校验值,所述第一校验值用于供所述第二远端UE校验所述第一消息、所述第二随机数和所述第一远端UE的标识是否被所述第一远端UE正确接收。
  9. 根据权利要求7或8所述的方法,其中,所述第四消息,包括以下至少之一:
    所述第二远端UE的标识;
    所述第二远端UE的证书;
    证书发送指示符,用于指示返回所述第二远端UE的证书;
    第二校验值,所述第二校验值,用于供所述第一远端UE校验所述第二消息、所述第一随机数和所述第二远端UE的标识是否被所述第二远端UE正确接收。
  10. 根据权利要求8所述的方法,其中,所述第一UE的标识包括:所述第一远端UE的受限邻近业务应用用户标识RPAUID和所述第一远端UE的邻近业务应用的标识;
    和/或,
    所述第二远端UE的标识包括:所述第二远端UE的RPAUID和所述第二远端UE的邻近业务应用的标识。
  11. 根据权利要求9所述的方法,其中,所述方法还包括:
    当所述第一消息被所述第二远端UE正确接收且所述第二消息被所述第一远端UE正确接收,确定建立所述第一远端UE和所述第二远端UE之间的端到端连接。
  12. 根据权利要求1至11任一项所述的方法,其中,所述第一密钥为:所述第一远端UE向所述中继UE发送数据使用的完整性保护密钥;
    或者,
    所述第一密钥为:所述中继UE所述第一远端UE发送数据使用的完整性保护密钥。
  13. 根据权利要求1至12任一项所述的方法,其中,所述获取第一密钥,包括:
    向直连发现名字管理功能DDNMF发送请求消息;
    基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
  14. 一种信息处理方法,由中继UE执行,所述方法包括:
    获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性 保护;
    根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  15. 根据权利要求14所述方法,其中,所述方法包括:
    接收所述第一远端UE的第一随机数;
    向所述第一远端UE发送第二随机数;
    所述根据所述第一密钥生成第二密钥,包括:
    根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
  16. 根据权利要求15所述的方法,其中,所述方法还包括:
    向所述第一远端UE发送认证方式的标识信息,其中,所述认证方式,用于所述第一远端UE和所述第二远端UE之间建立端到端连接之间认证。
  17. 根据权利要求16所述的方法,其中,所述根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥,包括:
    根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
  18. 根据权利要求14至17任一项所述的方法,其中,所述获取第一密钥,包括:
    向直连发现名字管理功能DDNMF发送请求消息;
    基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
  19. 一种信息处理方法,其中,由DDNMF执行,所述方法还包括:
    接收远端UE和/或中继UE发送的请求消息;
    根据所述请求消息,向所述远端UE和/或中继UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  20. 一种信息处理装置,其中,所述装置包括:
    第一获取模块,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
    第一生成模块,被配置为根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  21. 根据权利要求20所述的装置,其中,所述装置包括:
    第一发送模块,被配置为向所述中继UE发送第一随机数;
    第一接收模块,被配置为接收中继UE发送的第二随机数;
    所述第一生成模块,被配置为根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
  22. 根据权利要求21所述的装置,其中,所述第一接收模块,被配置为接收所述中继UE发送的认证方式的标识信息;
    所述第一生成模块,被配置为根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
  23. 根据权利要求22所述的装置,其中,所述第一生成模块,被配置为根据所述第一随机数、所述第二随机数、所述标识信息、所述标识信息的长度以及所述第一密钥,生成所述第二密钥。
  24. 根据权利要求22或23所述的装置,其中,
    所述第一发送模块,被配置为当所述认证方式为预定方式时,向所述中继UE发送第一消息,其中,所述第一消息使用所述第二密钥进行完整性保护;
    所述第一接收模块,被配置为接收所述中继UE转发的第二远端UE发送的第二消息;
    所述装置还包括:
    第一校验模块,被配置为根据所述第二密钥对所述第二消息进行完整性保护验证;
    第一建立模块,被配置为当所述第二消息通过完整性保护验证时,确定通过所述中继UE建立所述第一远端UE与所述第二远端UE之间端到端连接。
  25. 根据权利要求24所述的装置,其中,所述装置还包括:
    第二生成模块,被配置为根据所述第一消息携带的第一随机数、第一密钥交换信息和所述第二消息携带的第二随机数、第二密钥交换信息,生成密钥种子;
    第三生成模块,被配置为根据所述密钥种子,生成完整性保护密钥和机密性保护密钥,其中,所述完整性保护密钥和机密性保护密钥,用于第一远端UE和所述第二远端UE通过所述中继UE建立端到端通信的完整性保护和机密性保护。
  26. 根据权利要求25所述的装置,其中,
    所述第一发送模块,被配置为向所述第二远端UE发送第三消息;其中,所述第三消息,用所述完整性保护密钥和机密性保护密钥分别进行完整性保护和所述机密性保护;
    所述第一接收模块,被配置为接收与所述第三消息对应的第四消息,其中,所述完整性保护密钥,用于对所述第四消息进行完整性保护,且所述机密性保护密钥用于解密所述第四消息。
  27. 根据权利要求26所述的装置,其中,所述第三消息,包括以下至少之一:
    所述第一远端UE的标识;
    所述第一远端UE的证书;
    证书发送指示符,用于指示返回所述第二远端UE的证书;
    第一校验值,所述第一校验值用于供所述第二远端UE校验所述第一消息、所述第二随机数和所述第一远端UE的标识是否被所述第一远端UE正确接收。
  28. 根据权利要26或27所述的方法,其中,所述第四消息,包括以下至少之一:
    所述第二远端UE的标识;
    所述第二远端UE的证书;
    证书发送指示符,用于指示返回所述第二远端UE的证书;
    第二校验值,所述第二校验值,用于供所述第一远端UE校验所述第二消息、所述第一随机数 和所述第二远端UE的标识是否被所述第二远端UE正确接收。
  29. 根据权利要求27所述的装置,其中,所述第一UE的标识包括:所述第一远端UE的受限邻近业务应用用户标识RPAUID和所述第一远端UE的邻近业务应用的标识;
    和/或,
    所述第二远端UE的标识包括:所述第二远端UE的RPAUID和所述第二远端UE的邻近业务应用的标识。
  30. 根据权利要求27所述的装置,其中,所述装置还包括:
    第一确定模块,被配置为当所述第一消息被所述第二远端UE正确接收且所述第二消息被所述第一远端UE正确接收,确定建立所述第一远端UE和所述第二远端UE之间的端到端连接。
  31. 根据权利要求20至30任一项所述的装置,其中,所述第一密钥为:所述第一远端UE向所述中继UE发送数据使用的完整性保护密钥;
    或者,
    所述第一密钥为:所述中继UE所述第一远端UE发送数据使用的完整性保护密钥。
  32. 根据权利要求20至31任一项所述的装置,其中,所述第一获取模块,被配置为向直连发现名字管理功能DDNMF发送请求消息;基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
  33. 一种信息处理装置,所述装置包括:
    第二获取模块,被配置为获取第一密钥,其中,所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护;
    第三生成模块,被配置为根据所述第一密钥生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  34. 根据权利要求33所述装置,其中,所述装置包括:
    第二接收模块,被配置为接收所述第一远端UE的第一随机数;
    第二发送模块,被配置为向所述第一远端UE发送第二随机数;
    所述第三生成模块,被配置为根据所述第一随机数、所述第二随机数和所述第一密钥,生成所述第二密钥。
  35. 根据权利要求34所述的装置,其中,所述第二发送模块,被配置为向所述第一远端UE发送认证方式的标识信息,其中,所述认证方式,用于所述第一远端UE和所述第二远端UE之间建立端到端连接之间认证。
  36. 根据权利要求35所述的装置,其中,所述第二生成模块,被配置为根据所述第一随机数、所述第二随机数、所述第一密钥以及所述标识信息,生成所述第二密钥。
  37. 根据权利要求33至36任一项所述的装置,其中,所述第二获取模块,被配置为向直连发现名字管理功能DDNMF发送请求消息;基于所述请求消息返回的响应消息,其中,所述响应消息包括:第一密钥。
  38. 一种信息处理装置,其中,所述装置还包括:
    第三接收模块,被配置为接收远端UE和/或中继UE发送的请求消息;
    第三发送模块,被配置为根据所述请求消息,向所述远端UE和/或中继UE发送第一密钥;所述第一密钥,用于所述第一远端UE和所述中继UE之间通信的完整性保护,还用于生成第二密钥,其中,所述第二密钥,用于两个远端UE之间通过中继UE相互发现的完整性保护。
  39. 一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够有所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如权利要求1至13、14至18、或19任一项提供的方法。
  40. 一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现如权利要求1至13、14至18、或19任一项提供的方法。
PCT/CN2022/087779 2022-04-19 2022-04-19 信息处理方法及装置、通信设备及存储介质 WO2023201551A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/087779 WO2023201551A1 (zh) 2022-04-19 2022-04-19 信息处理方法及装置、通信设备及存储介质
CN202280001193.5A CN117256166A (zh) 2022-04-19 2022-04-19 信息处理方法及装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/087779 WO2023201551A1 (zh) 2022-04-19 2022-04-19 信息处理方法及装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023201551A1 true WO2023201551A1 (zh) 2023-10-26

Family

ID=88418904

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/087779 WO2023201551A1 (zh) 2022-04-19 2022-04-19 信息处理方法及装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN117256166A (zh)
WO (1) WO2023201551A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107251591A (zh) * 2015-03-13 2017-10-13 英特尔Ip公司 用于安全的设备到设备发现和通信的系统、方法和设备
CN113382454A (zh) * 2020-02-24 2021-09-10 华为技术有限公司 一种通信方法与装置
WO2021216838A1 (en) * 2020-04-22 2021-10-28 Qualcomm Incorporated Peer-to-peer link security setup for relay connection to mobile network
CN113784343A (zh) * 2020-05-22 2021-12-10 华为技术有限公司 保护通信的方法和装置
CN114143871A (zh) * 2020-09-04 2022-03-04 华为技术有限公司 网络连接方法、网络去连接方法及通信装置
US20220109996A1 (en) * 2020-10-01 2022-04-07 Qualcomm Incorporated Secure communication link establishment for a ue-to-ue relay

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107251591A (zh) * 2015-03-13 2017-10-13 英特尔Ip公司 用于安全的设备到设备发现和通信的系统、方法和设备
CN113382454A (zh) * 2020-02-24 2021-09-10 华为技术有限公司 一种通信方法与装置
WO2021216838A1 (en) * 2020-04-22 2021-10-28 Qualcomm Incorporated Peer-to-peer link security setup for relay connection to mobile network
CN113784343A (zh) * 2020-05-22 2021-12-10 华为技术有限公司 保护通信的方法和装置
CN114143871A (zh) * 2020-09-04 2022-03-04 华为技术有限公司 网络连接方法、网络去连接方法及通信装置
US20220109996A1 (en) * 2020-10-01 2022-04-07 Qualcomm Incorporated Secure communication link establishment for a ue-to-ue relay

Also Published As

Publication number Publication date
CN117256166A (zh) 2023-12-19

Similar Documents

Publication Publication Date Title
JP6185017B2 (ja) セキュアユーザプレーンロケーション(supl)システムにおける認証
US10673611B2 (en) Data transmission method, device, and system
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2023201551A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2022222005A1 (zh) 通信设备检测方法、装置、通信设备和存储介质
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023240574A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024000123A1 (zh) 密钥生成方法及装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2023240575A1 (zh) 一种中继通信方法、通信装置及通信设备
WO2023184548A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024021142A1 (zh) 应用程序接口api认证方法、装置、通信设备及存储介质
WO2023240657A1 (zh) 认证与授权方法、装置、通信设备及存储介质
WO2023142089A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2024021137A1 (zh) Api调用者认证方法以及装置、通信设备及存储介质
WO2023197178A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023240661A1 (zh) 认证与授权方法、装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
WO2023142093A1 (zh) Ue发现消息保护方法、装置、通信设备及存储介质
WO2023201454A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2023142090A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2024020868A1 (zh) 密钥生成方法及装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280001193.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22937789

Country of ref document: EP

Kind code of ref document: A1