WO2023246649A1 - Communication method, communication apparatus and communication system - Google Patents

Communication method, communication apparatus and communication system Download PDF

Info

Publication number
WO2023246649A1
WO2023246649A1 PCT/CN2023/100763 CN2023100763W WO2023246649A1 WO 2023246649 A1 WO2023246649 A1 WO 2023246649A1 CN 2023100763 W CN2023100763 W CN 2023100763W WO 2023246649 A1 WO2023246649 A1 WO 2023246649A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
akma
terminal device
function network
information
Prior art date
Application number
PCT/CN2023/100763
Other languages
French (fr)
Chinese (zh)
Inventor
李�赫
吴�荣
吴义壮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023246649A1 publication Critical patent/WO2023246649A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Definitions

  • the present application relates to the field of wireless communication technology, and in particular to communication methods, communication devices and communication systems.
  • AF application function
  • both parties need to use an application key to encrypt the transmitted content.
  • the application key used by the terminal device is generated by the terminal device, and the application key used by the AF network element is generated by the application's authentication and key management for applications (AKMA) anchor function (AKMA).
  • anchor function generated by AAnF) network element and sent to AF network element.
  • the AF network element and the AAnF network element are located in the same public land mobile network, so the AF network element can connect to the AAnF network element and request the AAnF network element to obtain the application key.
  • the AF network element communicating with the terminal device may not be able to directly connect to the terminal device's home AAnF (home AAnF, hAAnF) network element.
  • the AF network element may not be able to obtain the application key, and thus the AF network element may not be able to obtain the application key. causing communication insecurity.
  • This application provides communication methods, communication devices and communication systems to ensure secure communication between terminal equipment and AF network elements.
  • embodiments of the present application provide a communication method, which can be executed by a network storage function network element or a module applied to a network storage function network element.
  • the network storage function network element receives a request message from the first network element, and the request message includes selection parameters; when the terminal device is in the roaming state, the network storage function network element responds according to the selection parameter, select the visited AKMA anchor point function network element that provides services for the terminal device; the network storage function network element sends a response message to the first network element, and the response message includes the information of the visited AKMA anchor point function network element.
  • the network storage function network element selects a visiting AKMA anchor point function network element.
  • This visiting AKMA anchor point function network element can not only serve as a transit node, but also generate terminal equipment and application function network elements.
  • the application key for secure communication between the terminal device and the application function network element enables the application function network element to accurately obtain the application key, which facilitates the use of the application key to encrypt the communication content between the terminal device and the application function network element, which helps to improve communication security. .
  • the network storage function network element selects to provide the terminal device with Visiting the AKMA anchor point function network element for services includes: when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the AKMA anchor point corresponding to the selection parameter. Function network element, as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the default AKMA anchor point The functional network element serves as the access AKMA anchor point functional network element.
  • the above solution can select a suitable network element to visit the AKMA anchor point function.
  • the selection parameter includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal.
  • the device's VPLMN information includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal.
  • the appropriate visiting AKMA anchor point function network element can be determined.
  • the selection parameter includes one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device; the network storage function network The terminal device determines that the terminal device is in the roaming state based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
  • the network storage function network element determines that the terminal device is in a roaming state based on the received indication information.
  • the network storage function network element determines that the terminal device is in the roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
  • the terminal device being in the roaming state means that the terminal device is located in the visited network, or the application function network element communicating with the terminal device cannot directly connect to the home AKMA anchor function network of the terminal device. Yuan.
  • embodiments of the present application provide a communication method.
  • the method can be executed by a first network element or a module applied to the first network element.
  • the first network element can be a network open function network element or an application function network element. Yuan.
  • the first network element determines the selection parameters; the first network element sends the selection parameters to the network storage function network element, and the selection parameters are used to select the
  • the terminal device provides a service by visiting the AKMA anchor point function network element; the first network element receives the information of the visiting AKMA anchor point function network element from the network storage function network element; the first network element is based on the visiting AKMA anchor point function
  • the information of the network element is sent to the visiting AKMA anchor point function network element.
  • the request message requests the application key used for secure communication between the visiting application function network element and the terminal device.
  • the first network element when the terminal device is in the roaming state, the first network element requests the network storage function network element to select a visiting AKMA anchor point function network element.
  • the visiting AKMA anchor point function network element can either serve as a transit node or generate a terminal device.
  • the application key for secure communication with the application function network element enables the application function network element to accurately obtain the application key, which facilitates the use of the application key to encrypt the communication content between the terminal device and the application function network element, which helps To improve communication security.
  • the selection parameter includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal.
  • the device's VPLMN information includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal.
  • the appropriate visiting AKMA anchor point function network element can be determined.
  • the first network element determines the terminal based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
  • the device is roaming.
  • the first network element sends indication information to the terminal device, and the indication information indicates that the terminal device is in a roaming state.
  • the first network element determines the selection parameter, including: the first network element determines the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein, the first AKMA The key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device, the HPLMN information of the terminal device, and the VPLMN information of the terminal device; the second AKMA key identifier includes the routing identifier of the terminal device, Information about the AKMA temporary identification of the terminal device and the HPLMN of the terminal device.
  • the first network element is the visiting application function network element, and the visiting application function network element receives the application session establishment request message from the terminal device; or, the first network element is the network opening Functional network element, the network open function network element receives the application key request message from the access application function network element.
  • embodiments of the present application provide a communication method, which can be executed by a terminal device or a module applied to the terminal device. Taking the terminal device executing this method as an example, the terminal device determines whether the terminal device is in a roaming state; when the terminal device is in a roaming state, the terminal device determines the first AKMA root key, and the first AKMA root key is used to determine the third AKMA root key. An application key, the first application key is used for secure communication between the terminal device and the visiting application function network element.
  • the terminal device when the terminal device is in the roaming state, the terminal device generates the first AKMA root key.
  • the first AKMA root key is used to determine the first application key.
  • the first application key is used for the terminal device to communicate with the visitor. Secure communication between application function network elements helps to accurately determine the key for communication with the visiting application function network elements.
  • the terminal device determines the first AKMA root key, including: the terminal device determines the first AKMA root key according to the second AKMA root key, and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. , determine the first AKMA root key, and the second AKMA root key is used to determine a second application key.
  • the second application key is used for secure communication between the terminal device and the home application function network element.
  • the terminal device determines the first AKMA root key, including: the terminal device based on the VPLMN information of the terminal device, the user permanent identity SUPI of the terminal device and the authentication server function root key, Determine the AKMA root key.
  • the terminal device determines that the terminal device is in a roaming state based on the received indication information.
  • embodiments of the present application provide a communication method, which can be executed by a visiting AKMA anchor point function network element or a module applied to a visiting AKMA anchor point function network element. Execute this by accessing the AKMA anchor function network element. For example, the visiting AKMA anchor function network element receives the first AKMA root key from the home AKMA anchor function network element; the visiting AKMA anchor function network element determines the access application based on the first AKMA root key. The first application key for secure communication between functional network elements and terminal equipment.
  • the access AKMA anchor point function network element stores the AKMA root key.
  • embodiments of the present application provide a communication method, which can be executed by the home AKMA anchor function network element or a module applied to the home AKMA anchor function network element.
  • the home AKMA anchor point function network element obtains the first AKMA root key; the home AKMA anchor point function network element sends the first AKMA to the visiting AKMA anchor point function network element Root key.
  • the first AKMA root key is used to determine the first application key.
  • the first application key is used for secure communication between the terminal device and the visiting application function network element.
  • the home AKMA anchor function network element obtains the first AKMA root key, including: the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key. , the second AKMA root key is used to determine the second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
  • the home AKMA anchor point function network element determines the first AKMA root key based on the second AKMA root key, including: the home AKMA anchor point function network element determines the first AKMA root key based on the second AKMA root key. key, as well as the HPLMN information of the terminal device and/or the VPLMN information of the terminal device, to determine the first AKMA root key.
  • the home AKMA anchor function network element obtains the first AKMA root key, including: the home AKMA anchor function network element receives the first AKMA root key from the authentication server function network element. .
  • embodiments of the present application provide a communication method, which can be executed by the home AKMA anchor function network element or a module applied to the home AKMA anchor function network element.
  • the home AKMA anchor point function network element determines whether the terminal device is in the roaming state; when the terminal device is in the roaming state, the home AKMA anchor point function network element determines whether the terminal device is in the roaming state.
  • the key to determine the first AKMA root key is used to determine the first application key; wherein the first AKMA root key is used to determine the first application key, and the first application key is used for secure communication between the terminal device and the visiting application function network element ;
  • the second AKMA root key is used to determine a second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
  • the home AKMA anchor function network element After the home AKMA anchor function network element determines that the UE is in the roaming state, it can generate an AKMA root key for the visiting AKMA anchor function network element and send the AKMA root key to the visiting AKMA anchor function network element.
  • the key is used by the visiting AKMA anchor point function network element to achieve key isolation between different AKMA anchor point function network elements, that is, the visiting AKMA anchor point function network element and the home AKMA anchor point function network element use different AKMA root keys key, which helps ensure the security of the key and thereby improves the security of communication.
  • the home AKMA anchor point function network element stores the first AKMA root key.
  • the home AKMA anchor point function network element sends the first AKMA root key to the visiting AKMA anchor point function network element.
  • the home AKMA anchor function network element receives a request message from the visiting AKMA anchor function network element.
  • the request message is used to request to obtain the AKMA root key;
  • the home AKMA anchor function network element Sending the first AKMA root key to the visited AKMA anchor function network element includes: the home AKMA anchor function network element sends the first AKMA root key to the visited AKMA anchor function network element based on the request message.
  • the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key, including: the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key. ,by and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device to determine the first AKMA root key.
  • the home AKMA anchor function network element determines whether the terminal device is in a roaming state, including: the home AKMA anchor function network element receives indication information from the authentication server function network element, and the indication information indicates The terminal device is in the roaming state; the home AKMA anchor point function network element determines that the terminal device is in the roaming state based on the indication information.
  • the home AKMA anchor point function network element determines whether the terminal device is in a roaming state, including: the home AKMA anchor point function network element determines whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and/or the VPLMN of the terminal device. information to determine whether the terminal device is in roaming state.
  • embodiments of the present application provide a communication method, which can be executed by an authentication server functional network element or a module applied to the authentication server functional network element.
  • the authentication server functional network element determines whether the terminal device is in the roaming state; when the terminal device is in the roaming state, the authentication server functional network element determines whether the terminal device is in the roaming state based on the VPLMN information of the terminal device.
  • the authentication server function network element after the authentication server function network element determines that the terminal device is in the roaming state, it can generate an AKMA root key and send the AKMA root key to the visiting AKMA anchor point function network element through the home AKMA anchor point function network element.
  • the key is used by the visiting AKMA anchor point function network element to achieve key isolation between different AKMA anchor point function network elements, that is, the visiting AKMA anchor point function network element and the home AKMA anchor point function network element use different AKMA root keys key, which helps ensure the security of the key and thereby improves the security of communication.
  • the authentication server functional network element stores the AKMA root key.
  • the authentication server function network element sends the AKMA root key to the home AKMA anchor point function network element.
  • the authentication server functional network element determines the AKMA root key based on the VPLMN information of the terminal device, including: the authentication server functional network element determines the AKMA root key based on the VPLMN information of the terminal device, the terminal The user permanent identification SUPI of the device and the authentication server function root key determine the AKMA root key.
  • the authentication server function network element determines whether the terminal device is in a roaming state, including: the authentication server function network element determines whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and the location where the authentication server function network element is located. One or more of the VPLMN information or the VPLMN information of the terminal device is used to determine whether the terminal device is in a roaming state.
  • inventions of the present application provide a communication device.
  • the device may be a network storage function network element, or may be a chip for a network storage function network element.
  • the device has the function of implementing any implementation method of the above-mentioned first aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • embodiments of the present application provide a communication device, which may be a first network element or a chip used for the first network element.
  • the device has the function of implementing any implementation method of the above second aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • embodiments of the present application provide a communication device, which may be a terminal device or a chip for the terminal device.
  • the device has the function of implementing any implementation method of the above third aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more functions related to the above Corresponding modules.
  • inventions of the present application provide a communication device.
  • the device may be a visiting AKMA anchor point function network element, or may be a chip used to visit an AKMA anchor point function network element.
  • the device has the function of implementing any implementation method of the fourth aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • inventions of the present application provide a communication device.
  • the device may be a home AKMA anchor point function network element, or may be a chip used for the home AKMA anchor point function network element.
  • the device has the function of realizing any implementation method of the fifth aspect or the sixth aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • embodiments of the present application provide a communication device, which may be an authentication server functional network element, or may be a chip used for the authentication server functional network element.
  • the device has the function of implementing any implementation method of the seventh aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • embodiments of the present application provide a communication device, including a processor coupled to a memory, and the processor is configured to call a program stored in the memory to execute any implementation of the above-mentioned first to seventh aspects.
  • the memory may be located within the device or external to the device.
  • the processor can be one or more.
  • embodiments of the present application provide a communication device, including a processor and a memory; the memory is used to store computer instructions, and when the device is running, the processor executes the computer instructions stored in the memory, so that the device Execute any implementation method in the above first to seventh aspects.
  • an embodiment of the present application provides a communication device, including units or means for executing each step of any implementation method in the above-mentioned first to seventh aspects.
  • embodiments of the present application provide a communication device, including a processor and an interface circuit.
  • the processor is configured to communicate with other devices through the interface circuit and perform any implementation method in the above-mentioned first to seventh aspects.
  • the processor includes one or more.
  • embodiments of the present application further provide a computer-readable storage medium, in which instructions are stored, which, when run on a communication device, enable the above-described first to seventh aspects. Any implementation method of is executed.
  • embodiments of the present application further provide a computer program product.
  • the computer program product includes a computer program or instructions.
  • the computer program or instructions are run by a communication device, any one of the above-mentioned first to seventh aspects is enabled.
  • the implementation method is executed.
  • embodiments of the present application further provide a chip system, including: a processor, configured to execute any implementation method in the above-mentioned first to seventh aspects.
  • embodiments of the present application also provide a communication system, which includes a network storage function network element for performing any implementation method of the first aspect, and a network storage function network element for performing any implementation method of the second aspect. the first network element.
  • embodiments of the present application further provide a communication system, which includes a visiting AKMA anchor point function network element for performing any of the implementation methods of the fourth aspect, and a visiting AKMA anchor point function network element for performing any of the implementation methods of the fifth aspect.
  • the home AKMA anchor function network element that implements the method.
  • embodiments of the present application also provide a communication method, including: when the terminal device is in a roaming state, the first network element determines the selection parameters; the first network element sends a first request to the network storage function network element news, the first The request message includes the selection parameter; the network storage function network element selects the visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter in the first request message; the network storage function network element The functional network element sends a response message to the first network element, where the response message includes information about the visiting AKMA anchor functional network element.
  • Figure 1 is a schematic diagram of a communication system provided by an embodiment of the present application.
  • Figure 2 is a schematic diagram of the 5G network architecture based on service-based architecture
  • Figure 3 is a schematic diagram of the 5G network architecture based on point-to-point interface
  • Figure 4 is an architectural diagram of adding AKMA related functions to the 5G network
  • FIG. 5 is a schematic diagram of a KAKMA generation method provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of a method of using K AKMA provided by the embodiment of the present application.
  • Figure 7 is a schematic diagram of a method of using K AKMA provided by the embodiment of the present application.
  • Figure 8 is a schematic diagram of the AKMA roaming architecture provided in this embodiment.
  • Figure 9(a) is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 9(b) is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 9(c) is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 10 is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 11 is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 12 is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 13 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • Figure 14 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • the system includes a network storage function network element and a first network element.
  • the system also includes a home AKMA.
  • the system shown in Figure 1 can be used in the fifth generation (5G) network architecture shown in Figures 2 to 4.
  • 5G fifth generation
  • 6G sixth generation
  • Network architecture, etc. are not limited by this application.
  • the first network element is used to determine selection parameters when the terminal device is in a roaming state; and send a first request message to the network storage function network element, where the first request message includes the selection parameter.
  • the network storage function network element is configured to receive the first request message from the first network element; and select the visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter in the first request message. ; Send a response message to the first network element, where the response message includes information about the visited AKMA anchor point function network element.
  • the first network element is also used to receive the response message.
  • the first network element is also configured to send a second request message to the visited AKMA anchor function network element according to the information of the visited AKMA anchor function network element.
  • the second request message requests The first application key used for secure communication between the visiting application function network element and the terminal device; the visiting AKMA anchor point function network element is used to receive the second request message; obtain the first AKMA root key; according to The first AKMA root key determines the first application key; and sends the first application key to the first network element.
  • the home AKMA anchor function network element is used to obtain the first AKMA root key; and send the first AKMA root key to the visiting AKMA anchor function network element; the visiting AKMA
  • the anchor function network element is specifically configured to receive the first AKMA root key from the home AKMA anchor function network element.
  • the home AKMA anchor function network element is specifically used to determine the first AKMA root key based on the second AKMA root key, and the second AKMA root key is used to determine the second application.
  • the second application key is used for secure communication between the terminal device and the home application function network element.
  • the home AKMA anchor point function network element is specifically configured to determine the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device.
  • the first AKMA root key is specifically configured to determine the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. The first AKMA root key.
  • the home AKMA anchor function network element is specifically configured to receive the first AKMA root key from the authentication server function network element.
  • the first network element is a visiting application function network element; the visiting application function network element is also used to receive an application session establishment request message from the terminal device, where the application session establishment request message includes information used to determine the selection parameters.
  • the first network element is a network open function network element; the network open function network element also receives an application key request message from a visiting application function network element, where the application key request message includes information used to determine the selection parameters.
  • the network storage function network element is specifically used to select the AKMA anchor point function corresponding to the selection parameter when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter.
  • network element as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, select the default AKMA anchor point function network element as the visiting AKMA anchor function network element.
  • the selection parameter includes one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device; the network storage function network element, and is also used to determine that the terminal device is in a roaming state based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
  • the network storage function network element is also used to determine that the terminal device is in a roaming state based on the received indication information.
  • the network storage function network element is also used to determine that the terminal device is in a roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
  • the first network element is also configured to use one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. , confirm that the terminal device is in roaming state.
  • the first network element is also configured to send indication information to the terminal device, where the indication information indicates that the terminal device is in a roaming state.
  • the first network element is specifically configured to determine the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein the first AKMA key identifier includes the terminal device The routing identifier, the AKMA temporary identifier of the terminal device, the HPLMN information of the terminal device, and the VPLMN information of the terminal device; the second AKMA key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device and the HPLMN information of the terminal device.
  • next generation mobile communication network system Next Generation System
  • 5G network architecture Next Generation Mobile communication network system
  • This architecture not only supports wireless access technologies defined by the 3GPP standards group (such as long term evolution (LTE) access technology, 5G radio access network (RAN) access technology, etc.) to be connected to the 5G core Core network (CN), and supports the use of non-3GPP (non-3GPP) access technology through non-3GPP interworking function (N3IWF) or next generation packet data gateway (ngPDG) Access to the core network.
  • LTE long term evolution
  • RAN radio access network
  • CN 5G core Core network
  • N3IWF non-3GPP interworking function
  • ngPDG next generation packet data gateway
  • FIG. 2 is a schematic diagram of the 5G network architecture based on service-based architecture.
  • the 5G network architecture shown in Figure 2 may include access network equipment and core network equipment. Terminal equipment is connected to the data network (DN) through access network equipment and core network equipment.
  • the core network equipment includes but is not limited to some or all of the following network elements: authentication server function (AUSF) network element (not shown in the figure), unified data management (UDM) network element Element, unified data repository (UDR) network element, network repository function (NRF) network element (not shown in the figure), network exposure function (NEF) network element (not shown in the figure) shown), application function (AF) network element, policy control function (PCF) network element, access and mobility management function (AMF) network element, session management function (session management function, SMF) network element, user plane function (UPF) network element, binding support function (BSF) network element (not shown in the figure).
  • AUSF authentication server function
  • UDM unified data management
  • UDR network repository function
  • the terminal equipment can be user equipment (UE), mobile station, mobile terminal equipment, etc.
  • Terminal devices can be widely used in various scenarios, such as device-to-device (D2D), vehicle to everything (V2X) communication, machine-type communication (MTC), and the Internet of Things (internet of things, IOT), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, etc.
  • Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, wearable devices, vehicles, urban air vehicles (such as drones, helicopters, etc.), ships, robots, robotic arms, smart home devices, etc.
  • Long-term keys and related functions are stored in the terminal device. When the terminal device performs two-way authentication with core network elements (such as AMF network elements and AUSF network elements), it will use long-term keys and related functions to verify the authenticity of the network.
  • core network elements such as AMF network elements and AUSF network elements
  • the access network equipment may be a wireless access network equipment (RAN equipment) or a wired access network equipment.
  • wireless access network equipment includes 3GPP access network equipment, untrusted non-3GPP access network equipment and trusted non-3GPP access network equipment.
  • 3GPP access network equipment includes but is not limited to: evolved base stations (evolved NodeB, eNodeB) in LTE, next generation base stations (next generation NodeB, gNB) in 5G mobile communication systems, base stations or completed base stations in future mobile communication systems Modules or units with partial functions, such as centralized units (CU), distributed units (DU), etc.
  • Untrusted non-3GPP access network equipment includes but is not limited to: untrusted non-3GPP access gateway or N3IWF equipment, untrusted wireless local area network (WLAN) access point (access point, AP), switch ,router.
  • Trusted non-3GPP access network equipment includes but is not limited to: trusted non-3GPP access gateways, trusted WLAN APs, switches, and routers.
  • Wired access network equipment includes but is not limited to: wired access gateway, fixed telephone network equipment, switches, and routers.
  • Access network equipment and terminal equipment can be fixed-position or removable. Access network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on water; they can also be deployed On planes, balloons and satellites in the sky. The embodiments of this application do not limit the application scenarios of access network equipment and terminal equipment.
  • AMF network elements include functions such as mobility management and access authentication/authorization. In addition, it is also responsible for transmitting user policies between the terminal device and the PCF.
  • SMF network elements include functions such as performing session management, executing control policies issued by PCF network elements, selecting UPF network elements, or allocating Internet Protocol (IP) addresses of terminal devices.
  • IP Internet Protocol
  • the UPF network element includes functions such as user plane data forwarding, session/flow level-based billing statistics or bandwidth limitation.
  • UDM network elements include functions such as execution and management of contract data or user access authorization.
  • UDR includes access functions for executing contract data, policy data or application data.
  • NEF network element is used to support the opening of capabilities and events.
  • AF network element transmits the requirements from the application side to the network side, such as QoS requirements or user status event subscriptions.
  • AF can be a third-party functional entity or an application service deployed by an operator, such as IP Multimedia Subsystem (IMS) voice call service.
  • IMS IP Multimedia Subsystem
  • AF network elements include AF network elements within the core network (that is, the operator's AF network elements) and third-party AF network elements (such as an enterprise's application server).
  • the PCF network element includes policy control functions such as session and service flow level billing, QoS bandwidth guarantee, mobility management, or terminal device policy decision-making.
  • PCF network elements include access and mobility management policy control function (AM PCF) network elements and session management policy control function (session management PCF, SM PCF) network elements.
  • AM PCF access and mobility management policy control function
  • SM PCF session management policy control function
  • the AM PCF network element is used to formulate AM policies and user policies for terminal equipment.
  • the AM PCF network element can also be called the policy control network element (PCF for a UE) that provides services for terminal equipment).
  • the SM PCF network element is used to formulate a session management policy (SM policy) for the session.
  • the SM PCF network element can also be called a policy control network element that provides services for the session ((PCF for a PDU session)).
  • NRF network elements can be used to provide network element discovery functions and provide network element information corresponding to network element types based on requests from other network elements. NRF network elements also provide network element management services, such as network element registration, update, de-registration, network element status subscription and push, etc.
  • the BSF network element can provide functions such as BSF service registration/unregistration/update, connection detection with NRF network elements, session binding information creation, terminal device information acquisition, or session binding information query for duplicate IP addresses.
  • the AUSF network element is responsible for authenticating users to determine whether users or devices are allowed to access the network.
  • DN is a network located outside the operator's network.
  • the operator's network can access multiple DNs.
  • a variety of services can be deployed on the DN, which can provide data and/or voice services to terminal devices.
  • DN is a private network of a smart factory.
  • the sensors installed in the workshop of the smart factory can be terminal devices.
  • the control server of the sensor is deployed in the DN, and the control server can provide services for the sensor.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • DN is the internal office network of a company.
  • the mobile phones or computers of employees of the company can be used as terminal devices.
  • the employees' mobile phones or computers can access information and data resources on the company's internal office network.
  • Npcf, Nudr, Nudm, Naf, Namf, and Nsmf are the service interfaces provided by the above-mentioned PCF, UDR, UDM, AF, AMF, and SMF respectively, and are used to call corresponding service operations.
  • N1, N2, N3, N4 and N6 are interface serial numbers. The meanings of these interface serial numbers are as follows:
  • N1 The interface between the AMF network element and the terminal device can be used to transmit non-access stratum (NAS) signaling (such as QoS rules from the AMF network element) to the terminal device.
  • NAS non-access stratum
  • N2 The interface between the AMF network element and the access network equipment, which can be used to transfer the core network side to the access network equipment. wireless bearer control information, etc.
  • N3 The interface between the access network equipment and the UPF network element, mainly used to transmit uplink and downlink user plane data between the access network equipment and the UPF network element.
  • N4 The interface between the SMF network element and the UPF network element can be used to transfer information between the control plane and the user plane, including controlling the delivery of user-oriented forwarding rules, QoS rules, traffic statistics rules, etc. Report information on the user interface.
  • N6 The interface between the UPF network element and the DN, used to transmit the uplink and downlink user data flows between the UPF network element and the DN.
  • Figure 3 is a schematic diagram of the 5G network architecture based on point-to-point interfaces.
  • the interfaces between the control plane network elements in Figure 2 are service-oriented interfaces, while the interfaces between the control plane network elements in Figure 3 are point-to-point interfaces.
  • N1, N2, N3, N4 and N6 interfaces can refer to the previous description.
  • N5 The interface between the AF network element and the PCF network element, which can be used to deliver application service requests and report network events.
  • N7 The interface between the PCF network element and the SMF network element, which can be used to deliver PDU session granularity and service data flow granularity control policies.
  • N8 The interface between AMF network elements and UDM network elements, which can be used by AMF network elements to obtain access and mobility management-related subscription data and authentication data from UDM network elements, and for AMF to register terminal device mobility with UDM Management related information, etc.
  • N9 The user plane interface between UPF network elements and UPF network elements, used to transmit uplink and downlink user data flows between UPF network elements.
  • N10 The interface between the SMF network element and the UDM network element, which can be used for the SMF network element to obtain session management-related contract data from the UDM network element, and for the SMF network element to register terminal device session-related information with UDM.
  • N11 The interface between the SMF network element and the AMF network element can be used to transfer PDU session tunnel information between the access network device and the UPF network element, transfer control messages sent to the terminal device, and transfer data sent to the access network device. Wireless resource control information of network-connected devices, etc.
  • N15 The interface between the PCF network element and the AMF network element, which can be used to deliver terminal device policies and access control-related policies.
  • N35 The interface between UDM network element and UDR network element, which can be used by UDM network element to obtain user subscription data information from UDR network element.
  • N36 The interface between PCF network element and UDR network element, which can be used by PCF network element to obtain policy-related contract data and application data-related information from UDR network element.
  • Figure 4 is an architectural diagram of adding AKMA related functions to the 5G network.
  • Figure 4 shows AKMA-related functions added to the 5G architecture shown in Figure 1.
  • AKMA-related functions can also be added to the 5G architecture shown in Figure 2. The principles are similar and will not be described again.
  • the AAnF network element is added in Figure 4.
  • the AAnF network element can request the AKMA root key (i.e., K AKMA ) from the AUSF, and then the AAnF network element determines the application key (i.e., K AF ) and K AF used by the AF based on K AKMA . effective time.
  • K AKMA AKMA root key
  • K AF application key
  • the AF network element needs to interact with the AAnF network element to obtain K AF and the effective time of K AF .
  • the location of the AF network element can be inside the 5G core network or outside the 5G core network. If AF network element Within the 5G core network, the AF network element can directly interact with the PCF network element. If the AF network element is outside the 5G core network, the AF network element can interact with the PCF network element via the NEF network element, that is, the NEF network element serves as the intermediate network element between the AF network element and the PCF network element.
  • the AUSF network element can generate K AKMA for the AAnF network element.
  • the above network elements or functions can be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • a platform for example, a cloud platform.
  • the above network element or function can be implemented by one device, or can be implemented by multiple devices together, or can be a functional module in one device, which is not specifically limited in the embodiments of this application.
  • the embodiment of the present application uses a UE as an example of a terminal device.
  • the UE described below can be replaced with a terminal device.
  • the AUSF network element, UDM network element, AMF network element, AAnF network element, AF network element, NEF network element, and NRF network element are respectively abbreviated as AUSF, UDM, AMF, AAnF, AF, NEF, and NRF. .
  • FIG. 5 is a schematic diagram of a KAKMA generation method provided by an embodiment of the present application. The method includes the following steps:
  • Step 501 AUSF sends an authentication request message to UDM. Accordingly, UDM receives the authentication request message.
  • the authentication request message includes a Subscription Permanent Identifier (SUPI) or a Subscription Concealed Identifier (SUCI).
  • the authentication request message is used to request an authentication vector from the UDM.
  • the authentication vector is used to trigger the core network.
  • the AMF provides SUCI to the AUSF
  • the authentication request message includes the SUCI.
  • the authentication request message includes SUPI.
  • the authentication request message may be a Numd_UEAuthentication Get Request message.
  • Step 502 UDM sends an authentication response message to AUSF. Accordingly, the AUSF receives the authentication response message.
  • the authentication response message includes the authentication vector.
  • the authentication response message also contains AKMA indication information.
  • the UE supporting the AKMA service means that the UE has the AKMA capability and the UE's services can use AKMA.
  • the authentication response message may be a Num_UEAuthentication_Get Response message.
  • Step 503 if the AUSF receives the AKMA indication information from the UDM, the AUSF generates K AKMA and AKMA key identifier (A-KID) based on the AUSF root key (K AUSF ) after the main authentication process is successfully completed. .
  • A-KID is used to identify K AKMA .
  • A-KID is in Network Access Identifier (NAI) format, which is username@exmaple.
  • the username part includes a routing identifier (RID) and an AKMA Temporary UE Identifier (A-TID).
  • RID is part of SUCI and is represented by 1 to 4 decimal digits.
  • A-TID is a temporary identification generated based on K AUSF .
  • the example part includes a home network identifier (HomeNetworkIdentifier), and the home network identifier may specifically be the identification information of the home public land mobile network (Home Public Land Mobile Network Identifier, HPLMN ID). Among them, the home public land mobile network is also called the home public land mobile network or the home public land mobile network.
  • this RID can be used by AMF to select AUSF.
  • AMF can select AUSF based on RID and HPLMN ID.
  • the RID can also be used by AUSF to select UDM.
  • AUSF selects UDM based on RID and HPLMN ID.
  • the UE after the main authentication process, the UE also generates K AKMA and A-KID based on K AUSF in the same method as AUSF.
  • Step 504 AUSF selects an AAnF and sends a key registration request message to the selected AAnF.
  • AAnF receives the key registration request message.
  • the key registration request message includes SUPI, A-KID and K AKMA .
  • the key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
  • Step 505 AAnF sends a key registration response message to AUSF.
  • AUSF receives the key registration response message.
  • the key registration response message may be a Naanf_AKMA_AnchorKey_RegisterResponse message.
  • Step 506 AUSF deletes K AKMA and A-KID.
  • the UE and AAnF generate the same KAKMA , which facilitates subsequent UE and AF to use the KAKMA to derive other keys.
  • FIG. 6 is a schematic diagram of a method of using KAKMA provided by an embodiment of the present application.
  • AF belongs to a network element in the 3GPP core network.
  • the method includes the following steps:
  • Step 601 the UE sends an Application Session Establishment Request message to the AF.
  • the AF receives the application session establishment request message.
  • the application session establishment request message includes the A-KID, and the A-KID is used by AAnF to find the KAKMA corresponding to the A-KID.
  • the A-KID is generated by the UE in the main authentication process and K AKMA generation process before step 601.
  • the main authentication process and the K AKMA generation process are the processes shown in Figure 5.
  • Step 602 AF sends an application key request message to AAnF. Accordingly, AAnF receives the application key request message.
  • the application key request message includes A-KID and AF ID.
  • This A-KID comes from step 601.
  • This AFID is used to identify the AF.
  • the AF can select AAnF according to the RID of the UE.
  • the application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
  • Step 603 AAnF obtains KAKMA based on A-KID, generates K AF based on KAKMA and AF ID, and determines the validity time of K AF .
  • AAnF obtains A-KID and KAKMA corresponding to A-KID in the main authentication process and KAKMA generation process.
  • Step 604 AAnF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
  • the application key response message includes K AF and the validity time of K AF .
  • the application key response message may be a Naanf_AKMA_ApplicationKey_Get Response message.
  • Step 605 The AF sends an Application Session Establishment Response message to the UE.
  • the UE receives the application session establishment response message.
  • the UE in any step after the main authentication process and the K AKMA generation process, the UE also generates K AF and determines the validity time of K AF according to the same method as AAnF.
  • UE and AAnF determine the validity time of the same K AF and K AF based on K AKMA , and AAnF sends the validity time of K AF and K AF to AF. Subsequently, the K AF can be used between UE and AF to compare the UE and AF.
  • the transmission content between AF is encrypted, which helps to improve communication security.
  • FIG. 7 is a schematic diagram of a method of using KAKMA provided by an embodiment of the present application.
  • AF belongs to a network element outside the 3GPP core network.
  • the method includes the following steps:
  • Step 701 The UE sends an application session establishment request message to the AF.
  • the AF receives the application session establishment request message.
  • the application session establishment request message includes the A-KID, and the A-KID is used by AAnF to find the KAKMA corresponding to the A-KID.
  • the A-KID is generated by the UE in the main authentication process and K AKMA generation process before step 701.
  • the main authentication process and the K AKMA generation process are the processes shown in Figure 5.
  • Step 702 AF sends an application key request message to NEF. Accordingly, NEF receives the application key request message.
  • the application key request message includes A-KID and AF ID.
  • This A-KID comes from step 701.
  • This AFID is used to identify the AF.
  • the application key request message may be a Nnef_AKMA_AFKey_Request message.
  • Step 703 NEF selects AAnF.
  • NEF can select AAnF according to the RID of the UE.
  • Step 704 NEF sends an application key request message to AAnF. Accordingly, AAnF receives the application key request message.
  • the application key request message includes A-KID and AF ID.
  • the application key request message may be a Naanf_AKMA_AFKey_Request message.
  • Step 705 AAnF obtains KAKMA based on A-KID, generates K AF based on KAKMA and AF ID, and determines the validity time of K AF .
  • AAnF obtains A-KID and KAKMA corresponding to A-KID in the main authentication process and KAKMA generation process.
  • Step 706 AAnF sends an application key response message to NEF. Accordingly, NEF receives the application key response message.
  • the application key response message includes K AF and the validity time of K AF .
  • the application key response message may be a Naanf_AKMA_AFKey_Response message.
  • Step 707 NEF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
  • the application key response message includes K AF and the validity time of K AF .
  • the application key response message may be a Nnef_AKMA_AFKey_Response message.
  • Step 708 The AF sends an application session establishment response message to the UE.
  • the UE receives the application session establishment response message.
  • the UE in any step after the main authentication process and the K AKMA generation process, the UE also generates K AF and determines the validity time of K AF according to the same method as AAnF.
  • UE and AAnF determine the validity time of the same K AF and K AF based on K AKMA , and AAnF sends the validity time of K AF and K AF to AF. Subsequently, the K AF can be used between UE and AF to compare the UE and AF.
  • the transmission content between AF is encrypted, which helps to improve communication security.
  • Figure 8 is a schematic diagram of the AKMA roaming architecture provided in this embodiment.
  • the UE when the UE is located in the VPLMN, the UE is in the roaming state regardless of whether the AF is located in the VPLMN or the HPLMN.
  • the UE In another scenario (not shown in the figure), when the UE is located in the HPLMN and the AF is located in the VPLMN, the UE is also said to be in a roaming state. Therefore, in the embodiment of this application, the UE is in the roaming state and specifically includes the following three situations:
  • the UE is located in the visited network (ie VPLMN), and the AF is located in the visited network (ie VPLMN).
  • the UE is located in the visited network (that is, VPLMN), and the AF is located in the home network (that is, HPLMN).
  • the UE is located in the home network (ie HPLMN) and the AF is located in the visited network (ie VPLMN).
  • the UE is located in HPLMN, which means that the operator providing services to the UE is the operator signed by the UE.
  • the fact that the UE is located in the VPLMN means that the operator providing services to the UE is not the operator contracted by the UE.
  • the AF is located in the HPLMN, which means that the AF has a contract with the HPLMN of the UE, or is pre-configured with relevant information connected to the HPLMN of the UE.
  • the relevant information is, for example, the NEF address information of the HPLMN of the UE.
  • the AF is located in the VPLMN, which means that the AF cannot directly interact with the HPLMN where the UE is located.
  • the AF has not signed a contract with the UE's HPLMN, or the relevant information of the HPLMN connected to the UE is not pre-configured, or the AF is only configured with the information of the PLMN where the AF is located. .
  • the vAF communicating with the UE is located in the VPLMN. If hAAnF generates the application key (i.e. K AF ) for the vAF for secure communication between the UE and the vAF, since vAF and hAAnF belong to different PLMN, so vAF may not be able to directly connect to hAAnF, resulting in vAF being unable to request the application key from hAAnF.
  • K AF application key
  • the hAF communicating with the UE is located in HPLMN, and the UE is located in VPLMN.
  • hAAnF can generate an application key (i.e. K AF ) for secure communication between the UE and hAF for hAF, and then in If hAF and hAAnF cannot connect, hAAnF may not be able to provide the application key to hAF.
  • K AF application key
  • the AF communicating with the UE may not be able to obtain the application key, resulting in the inability to encrypt the transmission content during communication between the UE and the AF, resulting in insecure communication.
  • an AAnF is selected in the visited network, and the AAnF is called a visited AAnF (vAAnF).
  • the vAAnF can serve as a transit node, forwarding the key request from AF to hAAnF, and forwarding the application key distributed by hAAnF to AF, so that AF can obtain the application key.
  • the vAAnF itself has the function of distributing application keys, then vAAnF can also distribute application keys for AF (which can be vAF or hAF).
  • the embodiments of the present application can also solve the problem of key isolation between vAAnF and hAAnF.
  • Figure 9(a) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
  • Step 901a When the UE is in the roaming state, the first network element determines the selection parameters.
  • the first network element is NEF or AF.
  • the AF can determine whether the UE is in a roaming state. For example, the AF receives an application session establishment request message from the UE, and the application session establishment request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID'.
  • A-KID' is also called the first AKMA key identification
  • A-KID is also called the second AKMA key identification.
  • A-KID includes the information of RID, A-TID and HPLMN
  • A-KID' includes the information of RID, A-TID, HPLMN and VPLMN.
  • the information of HPLMN can be HPLMN ID, or other information that can identify HPLMN.
  • the information of the VPLMN can be the VPLMN ID, or other information that can identify the VPLMN. Therefore, the AF may determine that the UE is in the roaming state based on one or more of the UE's HPLMN information, the UE's VPLMN information, or the information of the PLMN where the AF is located (which may be a PLMN ID) received from the UE, where the PLMN information It can be a PLMN ID, or something else that can identify the PLMN Information.
  • the AF determines that the UE is in the roaming state. For another example, if the AF receives the UE's HPLMN ID from the UE, the AF compares the information of the PLMN where the AF is located with the UE's HPLMN ID. If the two are the same, the AF determines that the UE is in a non-roaming state. If they are different, then AF determines that the UE is in roaming state. For another example, if the AF receives the HPLMN ID from the UE but does not receive the VPLMN ID from the UE, the AF determines that the UE is in a non-roaming state.
  • the AF can determine whether the UE is in the roaming state. When the UE is in the roaming state, the AF sends indication information to the NEF, and the indication information indicates that the UE is in the roaming state.
  • NEF can also determine whether the UE is in roaming state. For example, the UE sends an application session establishment request message to the AF, and the application session establishment request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID'. Then AF sends an application key request message to NEF.
  • the application key request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID', and then NEF uses the UE's HPLMN information and the UE's VPLMN information or one or more of the information of the PLMN where the NEF is located, to determine that the UE is in the roaming state.
  • NEF determines that the UE is in roaming state. For another example, NEF receives the HPLMN ID of the UE, then NEF compares the information of the PLMN where NEF is located with the HPLMN ID of the UE. If the two are the same, NEF determines that the UE is in a non-roaming state. If they are different, NEF determines that the UE is in a non-roaming state. The UE is in roaming state. For another example, if NEF receives the HPLMN ID but does not receive the VPLMN ID, NEF determines that the UE is in a non-roaming state.
  • the selection parameters determined by the first network element include one or more of the routing identifier (RID) of the UE, the information of the HPLMN of the UE, the information of the VPLMN where the first network element is located, or the information of the VPLMN of the UE.
  • RID routing identifier
  • Step 902a The first network element sends a request message to the NRF. Accordingly, the NRF receives the request message.
  • the request message includes selection parameters.
  • Step 903a When the UE is in the roaming state, the NRF selects the vAAnF that provides services for the UE according to the selection parameters.
  • the specific determination method can refer to the aforementioned method of the first network element to determine whether the UE is in roaming state, which will not be described again.
  • the NRF When the NRF stores the AAnF corresponding to the selection parameter, the NRF selects the AAnF corresponding to the selection parameter as vAAnF. Or, when NRF does not store the AAnF corresponding to the selection parameter, the default AAnF is selected as vAAnF.
  • Step 904a The NRF sends a response message to the first network element.
  • the first network element receives the response message.
  • the response message includes vAAnF information, and the vAAnF information is used by the first network element to request from vAAnF an application key (K AF ) for secure communication between the AF and the UE.
  • the information of vAAnF may be identification information of vAAnF, address information of vAAnF or instanceID information of AAnF, etc., which is not limited in this application.
  • Step 905a The first network element sends a request message to vAAnF according to the vAAnF information. Accordingly, vAAnF receives the request message.
  • This request message requests an application key (K AF ) for secure communication between the AF and the UE.
  • K AF application key
  • vAAnF only serves as a transit node
  • vAAnF sends the request message to hAAnF
  • hAAnF generates an application key
  • hAAnF sends the application key to vAAnF
  • vAAnF then sends the application key to the first network element.
  • NEF further needs to send the application key to AF.
  • the vAAnF If the vAAnF is capable of generating an application key, the vAAnF generates an application key based on the request message. In one implementation method, after vAAnF receives the request message, it requests the AKMA root key from hAAnF, and then hAAnF sends the latest AKMA root key (called K AKMA *) to vAAnF, so that vAAnF generates the AKMA root key based on K AKMA *. vAF and UE application keys for secure communication. Optionally, vAAnF also stores K AKMA * to facilitate subsequent use of the K AKMA *.
  • K AKMA * latest AKMA root key
  • hAAnF can obtain K AKMA * according to any of the following methods:
  • Method 1 hAAnF determines KAKMA * based on KAKMA .
  • This K AKMA can be used to generate application keys for secure communication between hAF and UE.
  • Method 2 hAAnF determines KAKMA * based on KAKMA and the HPLMN information of the UE and/or the VPLMN information of the UE.
  • Method 3 AUSF determines K AKMA * based on the UE's VPLMN information, SUPI and K AUSF , and then AUSF sends K AKMA * to hAAnF.
  • the first network element may also send indication information to the UE.
  • the indication information indicates that the UE is in the roaming state.
  • the indication information may be information about the VPLMN where the first network element is located, or binary bit information, or Enumerated bit information.
  • the UE After the UE receives the indication information, the UE is triggered to generate K AKMA *, which is the same as the K AKMA * generated by vAAnF or hAAnF. This method helps to enable UE and AF to use the same application key.
  • the NRF selects a vAAnF, which can not only serve as a transit node, but also generate an application key for secure communication between the UE and the AF, so that the AF can accurately obtain the application key and facilitate
  • the application key is used to encrypt communication content between UE and AF, which helps to improve communication security.
  • Figure 9(b) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
  • Step 901b hAAnF determines whether the UE is in roaming state.
  • the AUSF determines whether the UE is in the roaming state, and then the AUSF sends indication information to hAAnF.
  • the indication information indicates that the UE is in the roaming state
  • hAAnF determines that the UE is in the roaming state based on the indication information.
  • hAAnF determines whether the UE is in a roaming state based on the UE's HPLMN information and/or the UE's VPLMN information. For example, if hAAnF receives the VPLMN ID of the UE from the UE, hAAnF determines that the UE is in the roaming state. For another example, hAAnF receives the HPLMN ID of the UE from the UE, then hAAnF compares the information of the PLMN where hAAnF is located with the HPLMN ID of the UE. If the two are the same, hAAnF determines that the UE is in a non-roaming state.
  • hAAnF determines that the UE is in roaming state. For another example, if hAAnF receives the HPLMN ID of the UE from the UE, but does not receive the VPLMN ID of the UE from the UE, then hAAnF determines that the UE is in a non-roaming state.
  • Step 902b When the UE is in the roaming state, hAAnF determines the first AKMA root key (also called KAKMA *) based on the second AKMA root key (also called KAKMA ).
  • K AKMA * is used to determine the first application key, which is used for secure communication between the UE and the visited AF (ie, vAF).
  • K AKMA is used to determine the second application key, which is used for secure communication between the UE and the home AF (ie, hAF).
  • hAAnF determines KAKMA * based on KAKMA and the HPLMN information of the UE and/or the VPLMN information of the UE.
  • hAAnF can actively send K AKMA * to hAAnF, or hAAnF receives a request message from vAAnF, which is used to request to obtain the AKMA root key, then hAAnF can send K AKMA * to vAAnF based on the request message. *.
  • hAAnF receives K AKMA *, it can generate the first application key based on K AKMA *, and then send the first application key to the vAF. Subsequently, the first application key is used for encrypted communication between the UE and the vAF.
  • hAAnF can store the K AKMA *.
  • hAAnF after hAAnF determines that the UE is in roaming state, it can generate the AKMA root key for vAAnF. And sends the AKMA root key to vAAnF, which is used by vAAnF, thereby achieving key isolation between different AAnFs, that is, vAAnF and hAAnF use different AKMA root keys, which helps ensure key security. Thereby improving the security of communication.
  • Figure 9(c) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
  • Step 901c AUSF determines whether the UE is in roaming state.
  • the AUSF determines whether the UE is in a roaming state based on the UE's HPLMN information and/or the UE's VPLMN information. For example, if the AUSF receives the VPLMN ID of the UE from the UE, the AUSF determines that the UE is in the roaming state. For another example, the AUSF receives the UE's HPLMN ID from the UE, then the AUSF compares the information of the PLMN where the AUSF is located with the UE's HPLMN ID. If the two are the same, the AUSF determines that the UE is in a non-roaming state.
  • the AUSF determines that the UE is in the roaming state. For another example, if the AUSF receives the HPLMN ID of the UE from the UE, but does not receive the VPLMN ID of the UE from the UE, the AUSF determines that the UE is in a non-roaming state.
  • Step 902c When the UE is in the roaming state, the AUSF determines the AKMA root key (K AKMA *) based on the VPLMN information of the UE.
  • K AKMA * the AKMA root key
  • K AKMA * is used to determine the application key, which is used for secure communication between the UE and the visited AF (i.e. vAF).
  • AUSF determines K AKMA * based on the UE's VPLMN information, the UE's SUPI and K AUSF .
  • AUSF can store K AKMA *.
  • AUSF can also send K AKMA * to hAAnF, so that subsequently hAAnF can actively send K AKMA * to hAAnF, or hAAnF receives a request message from AAVnF, which is used to request to obtain the AKMA root key, then hAAnF can Send K AKMA * to vAAnF based on the request message.
  • hAAnF receives K AKMA *, it can generate the first application key based on K AKMA *, and then send the first application key to the vAF. Subsequently, the first application key is used for encrypted communication between the UE and the vAF.
  • the AUSF after the AUSF determines that the UE is in the roaming state, it can generate the AKMA root key and send the AKMA root key to vAAnF via hAAnF.
  • the AKMA root key is used by vAAnF, thereby achieving key isolation between different AAnFs, that is vAAnF and hAAnF use different AKMA root keys, which helps ensure key security and thereby improves communication security.
  • FIG. 10 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • AF is a network element located in the 5G core network. The method includes the following steps:
  • Step 1000 Pre-configure the PLMN information on the AF.
  • the information of the PLMN where the AF is located refers to the information of the PLMN that the AF can connect to.
  • the PLMN information can be one or more, which means that the AF can access one or more PLMNs.
  • the information of the PLMN may be the information of the network elements of the corresponding PLMN, such as the address information of the NEF in the PLMN, the address information of the AAnF, or the address information of other core network elements such as the AMF.
  • the AF may be the AF of the visited network (also called visited AF or vAF) or the AF of the home network (also called home AF or hAF). Specifically, when the AF cannot connect to the HPLMN subscribed by the UE, it is said that the AF is the AF of the visited network. When the AF can be connected to the HPLMN subscribed by the UE, the AF is called the AF of the home network.
  • the information of the PLMN can be the VPLMN ID.
  • the information of the PLMN can be the HPLMN ID.
  • Step 1001 The UE sends an application session establishment request message to the AF.
  • the AF receives the application session establishment request message.
  • the application session establishment request message includes A-KID, which includes RID, HPLMN ID and A-TID.
  • the application session establishment request message includes the A-KID but does not include the VPLMN ID of the visited network where the UE is located.
  • the UE In another method, if the UE is currently located in a visited network, the UE also sends the VPLMN ID of the visited network where the UE is located to the AF.
  • the methods for the UE to send the VPLMN ID to the AF include but are limited to:
  • Method 1 Include the VPLMN ID in the application session establishment request message, that is, the VPLMN ID and A-KID are carried side by side in the application session establishment request message.
  • Method 2 The UE sends a separate message to the AF, which is a message different from the application session establishment request message.
  • the message includes the VPLMN ID.
  • Method 3 Add a VPLMN field to the A-KID of the application session establishment request message.
  • the VPLMN field includes the VPLMN ID.
  • the VPLMN field is set to the default value.
  • A-KID with the new VPLMN field will be called A-KID' below.
  • the AUSF when generating A-KID', the AUSF also needs to generate the same A-KID'. Therefore, when generating A-KID', the AUSF needs to determine whether it has received the VPLMN ID. If the VPLMN ID is received by the AUSF, the AUSF adds the VPLMN ID in the VPLMN field of A-KID'. If the VPLMN ID is not received, the AUSF sets the VPLMN field of A-KID' to the default value. Among them, the UE generates A-KID' before step 1001.
  • the AUSF obtains the VPLMN ID according to the following method: when the UDM determines that the UE is located in the visited network and the UE can use the AKMA service, the UDM sends the UE's VPLMN ID to the AUSF.
  • Step 1002 AF determines whether the UE is in roaming state.
  • This step is optional.
  • the UE is in the roaming state specifically including the following three situations. For details, please refer to the foregoing description.
  • the AF determines whether the information of the PLMN where the AF is located matches the HPLMN ID in the A-KID sent by the UE. If they are the same, it is determined that the UE is not in the roaming state; if they are different, it is determined that the UE is in the roaming state. It can be understood that "same” specifically refers to "includes”.
  • the UE is not in the roaming state; if the HPLMN ID sent by the UE is not included in the information of the PLMN where the AF is located, the UE is in the roaming state.
  • the method for the AF to determine whether the UE is in the roaming state includes but is not limited to the following method 1 and Method 2.
  • the AF determines whether the UE has sent the VPLMN ID to the AF. If the UE sends the VPLMN ID to the AF, the AF determines that the UE is in roaming state. If the UE does not send the VPLMN ID to the AF, the AF further determines whether the information of the PLMN where the AF is located is the same as the HPLMN ID sent by the UE. If they are the same, it is determined that the UE is not in the roaming state. If they are different, it is determined that the UE is in the roaming state.
  • step 1002 when the newly added VPLMN field is set to the default value, in step 1002, the AF determines that the VPLMN field is the default value, and then determines that the UE has not In roaming state.
  • the newly added VPLMN field is not the default value, for example, it is set to the information of the PLMN where the AF is located, then in step 1002, the AF determines that the UE is in the roaming state.
  • Method 2 The AF compares the information of the pre-configured PLMN where the AF is located with the HPLMN ID in A-KID or A-KID'. If they are the same, the AF determines that the UE is not in roaming state. If they are different, the AF determines that the UE is in roaming state.
  • Step 1003 AF determines selection parameters.
  • This selection parameter is also called the parameter for selecting AAnF.
  • step 1002 if step 1002 is not performed, that is, the AF does not need to determine whether the UE is in a roaming state, the selection parameters determined by the AF include RID, or include RID and HPLMN ID, or include RID, HPLMN ID and VLPMN ID.
  • the AF needs to determine whether the UE is in a roaming state.
  • the selection parameters determined by the AF include RID.
  • the selection parameters determined by the AF include one or more of the HPLMN ID, VPLMN ID or RID.
  • the AF also generates indication information indicating that the UE is in the roaming state. It should be noted that in another implementation method, when the UE is in the roaming state, the selection parameters determined by the AF can also be empty, or understood as uncertain selection parameters.
  • Step 1004 AF sends a discovery request message to the NRF. Accordingly, the NRF receives the discovery request message.
  • the discovery request message may be an Nnrf_NFDiscovery_Request message.
  • the discovery request message includes AAnF type information and is used to request an AAnF information.
  • AAnF information is used to connect to an AAnF, such as AAnF's address information, AAnF's instanceID information, etc.
  • the discovery request message also includes selection parameters.
  • the discovery request message also includes indication information indicating that the UE is in a roaming state.
  • Table 1 shows the selection parameters determined by the AF and the content carried in the discovery request message when step 1002 is not performed, that is, the AF does not need to determine whether the UE is in a roaming state.
  • Table 2 shows the selection parameters determined by the AF and the content carried in the discovery request message when performing step 1002, that is, when the AF needs to determine whether the UE is in a roaming state.
  • Step 1005 NRF determines that the UE is in roaming state, and selects vAAnF.
  • the NRF is the NRF in the visited network.
  • NRF selects AAnF based on the parameters carried in step 1004.
  • step 1002 when step 1002 is not executed, there are three implementation methods for the parameters carried in the discovery request message of step 1004. The three different methods in Table 1 are described below.
  • a possible implementation method is: NRF first determines whether the UE is in a roaming state. If the UE is in the roaming state, the NRF determines whether the AAnF corresponding to the RID is stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF.
  • Another possible implementation method is: NRF first determines whether the AAnF corresponding to the RID is stored in the NRF. If so, determines that the AAnF is vAAnF. If not, the NRF determines whether the UE is in the roaming state.
  • NRF first determines whether the UE is in a roaming state, and if the UE is in a roaming state, determines that the default AAnF is vAAnF.
  • the NRF when the discovery request message in step 1004 carries the RID and HPLMN ID, the NRF first determines whether the UE is in the roaming state. Specifically, the NRF can determine whether the UE is in roaming state based on the HPLMN ID. If the UE is in the roaming state, the NRF determines whether there is an AAnF corresponding to the RID and/or HPLMN ID stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF.
  • the NRF when the discovery request message in step 1004 carries the RID, HPLMN ID and VPLMN ID, the NRF first determines whether the UE is in the roaming state. If the UE is in the roaming state, the NRF determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If there is, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF. .
  • the method for NRF to determine whether the UE is in the roaming state can be: NRF compares the PLMN information of the NRF with the HPLMN ID of the UE. If they are the same, it means that the UE is not in the roaming state. If they are different, it means that the UE is not in the roaming state. In roaming state.
  • Scenario 2 When executing the above step 1002.
  • step 1002 when step 1002 is executed, there are at least seven implementation methods for the parameters carried in the discovery request message of step 1004. The seven different methods in Table 2 are described below.
  • the NRF when it is determined in step 1002 that the UE is not in the roaming state, and the discovery request message in step 1004 carries the RID, the NRF first determines that the UE is not in the roaming state, and then the NRF determines whether there is The AAnF corresponding to the RID is stored. If there is one, the AAnF is determined. If there is no AAnF, the default AAnF is determined.
  • the method for the NRF to determine that the UE is not in the roaming state can refer to the method in the above scenario 1. It should be noted that in this scenario, since the UE is not in a roaming state, the NRF does not need to determine vAAnF, but only determines an AAnF, which can be understood as hAAnF.
  • a possible implementation method is: NRF first determines whether the UE is in the roaming state. If the UE is in the roaming state, the NRF determines whether the AAnF corresponding to the RID is stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF.
  • Another possible implementation method is: NRF first determines whether the AAnF corresponding to the RID is stored in the NRF. If so, determines that the AAnF is vAAnF.
  • the NRF determines whether the UE is in the roaming state. If the UE is in the roaming state, , then the default AAnF is determined to be vAAnF.
  • Another possible implementation method is: NRF first determines whether the UE is in a roaming state, and if the UE is in a roaming state, determines that the default AAnF is vAAnF. The method for the NRF to determine that the UE is in the roaming state may refer to the method in the above scenario 1.
  • the NRF when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID and indication information, the NRF first determines that the UE is in the roaming state based on the received indication information, and then the NRF determines Whether the AAnF corresponding to the RID is stored in the NRF, if so, determine the AAnF to be vAAnF, if not, determine the default AAnF to be vAAnF.
  • the NRF when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the HPLMN ID and/or VPLMN ID, the NRF first determines based on the received HPLMN ID and/or VPLMN ID. The UE is in roaming state. The NRF then determines whether the AAnF corresponding to the HPLMN ID and/or VPLMN ID is stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
  • the NRF when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID, as well as the HPLMN ID and/or VPLMN ID, the NRF first determines the location of the UE according to the received HPLMN ID and/or VPLMN ID, confirms that the UE is in roaming state. The NRF then determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
  • the NRF when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID, HPLMN ID and/or VPLMN ID, and indication information, then the NRF first determines according to the received indication information , confirm that the UE is in roaming state. The NRF then determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
  • the NRF when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries indication information, the NRF first determines that the UE is in the roaming state based on the received indication information. NRF then determines that the default AAnF is vAAnF.
  • NRF needs to ensure that the vAAnF selected each time is the same. Otherwise, if vAAnF is only used as a transit node and does not need to save the AKMA security context, NRF can select any AAnF as vAAnF.
  • Step 1006 NRF sends a discovery response message to AF. Accordingly, the AF receives the discovery response message.
  • the discovery response message may be an Nnrf_NFDiscovery_Response message.
  • the discovery response message includes vAAnF information.
  • Step 1007 AF sends an application key request message to vAAnF. Accordingly, vAAnF receives the application key request message.
  • the application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
  • the application key request message includes AF ID and A-KID, and the A-KID includes RID, A-TID and HPLMN ID.
  • the application key request message also includes the VPLMIN ID.
  • the VPLMN ID in the application key request message may come from step 1001.
  • the AF can obtain the VPLMN ID from the AF.
  • the application key request message can carry the VPLMN ID.
  • the application key request message does not need to carry the VPLMN ID.
  • the application key request message does not need to carry the VPLMN ID.
  • the application key request message includes AF ID and A-KID'
  • the A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID. This situation is for the scenario where the message in step 1001 above carries A-KID'.
  • Step 1008 vAAnF sends an application key request message to hAAnF. Accordingly, hAAnF receives the application key request message.
  • the content in the application key request message is the same as the content in the application key request message in step 1007 above.
  • vAAnF selects hAAnF based on the RID in A-KID or the RID in A-KID'.
  • vAAnF also needs to confirm that the UE is in the roaming state before selecting hAAnF.
  • the method for vAAnF to determine that the UE is in the roaming state is the same as the method for NRF to determine that the UE is in the roaming state. Please refer to the above description.
  • Step 1009 hAAnF determines K AF and the validity time of K AF , or determines KAKMA *.
  • hAAnF determines the K AF and the validity time of the K AF . In the case where vAAnF needs to store the AKMA security context, hAAnF obtains K AKMA *.
  • the method for hAAnF to determine K AF and the effective time of K AF may refer to the description of the embodiment in Figure 6 or Figure 7 .
  • the method for hAAnF to determine K AKMA * includes but is not limited to: if hAAnF may have obtained K AKMA *, directly determine to use the K AKMA *. If hAAnF does not newly generate K AKMA *, hAAnF generates K AKMA * first. Specifically, after hAAnF determines that the UE is in the roaming state, hAAnF obtains KAKMA *. In a possible implementation method, if hAAnF has obtained K AKMA *, it is directly determined to use the K AKMA *. In another possible implementation, if hAAnF does not newly generate K AKMA *, hAAnF first generates K AKMA *. K AKMA * can be obtained according to K AKMA or obtained according to K AKMA.
  • KAKMA * KAKMA *
  • KAKMA * KDF ( KAKMA or KAUSF , first parameter, second parameter). This embodiment does not limit the number of specific parameters in the first parameter and the second parameter, nor does it limit the order in which the first parameter and the second parameter are used.
  • hAAnF generates KAKMA *
  • AUSF generates KAKMA * and sends KAKMA * to hAAnF, so hAAnF can obtain KAKMA *.
  • the methods for generating K AKMA * by AUSF or hAAnF include but are not limited to:
  • Method 1 hAAnF determines KAKMA * based on VPLMN ID and KAKMA .
  • VPLMNID is the first parameter number.
  • the second parameter can be other content or is not required. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • hAAnF can obtain the VPLMN ID from AUSF.
  • hAAnF receives the Naanf_AKMA_AnchorKey_Registerrequest message from AUSF, which includes the VPLMN ID.
  • hAAnF can obtain the VPLMN ID from the UE, for example, hAAnF receives the A-KID' from the UE, and the A-KID' contains the VPLMN ID.
  • hAAnF can obtain the VPLMN ID from AF.
  • hAAnF receives the Naanf_AKMA_ApplicationKey_Getservice Request message from AF, which contains the VPLMN ID.
  • hAAnF determines KAKMA * based on VPLMN ID, HPLMN ID and KAKMA .
  • VPLMNID is the first parameter or the second parameter.
  • HPLMN ID is the second parameter or the first parameter.
  • hAAnF can obtain the VPLMN ID from AUSF.
  • hAAnF receives the Naanf_AKMA_AnchorKey_Registerrequest message from AUSF, which includes the VPLMN ID.
  • hAAnF can obtain the VPLMN ID from the UE, for example, hAAnF receives the A-KID' from the UE, and the A-KID' contains the VPLMN ID.
  • hAAnF can obtain the VPLMN ID from AF.
  • hAAnF receives the Naanf_AKMA_ApplicationKey_Getservice Request message from AF, which contains the VPLMN ID.
  • hAAnF can obtain the HPLMN ID from hAAnF, such as obtaining the HPLMN ID from the configuration information of hAAnF.
  • hAAnF can obtain the HPLMN ID from the UE, for example, hAAnF receives the A-KID or A-KID' from the UE, and the A-KID or A-KID' contains the HPLMN ID.
  • AUSF determines K AKMA * based on VPLMN ID, SUPI and K AUSF .
  • VPLMNID is the first parameter or the second parameter.
  • SUPI is the second parameter or the first parameter.
  • hAAnF determines K AKMA * based on a counter value and K AKMA .
  • the counter value needs to be automatically incremented by 1 every time it is used.
  • the first parameter is the counter value
  • the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • hAAnF determines K AKMA * based on a string and K AKMA .
  • This embodiment does not limit the specific character string content.
  • This string is recorded by UE and hAAnF in advance.
  • the first parameter is a string, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • hAAnF determines K AKMA * based on the discriminator and K AKMA .
  • the distinguisher can be a specific value, which is recorded by the UE and hAAnF in advance. For example, 0x01.
  • the first parameter is the discriminator
  • the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • AUSF determines K AKMA * based on a counter value and K AKMA , or determines K AKMA * based on a counter value and K AUSF .
  • the counter value needs to be automatically incremented by 1 every time it is used.
  • the first parameter is the counter value
  • the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • AUSF determines K AKMA * based on a string and K AKMA , or determines K AKMA * based on a string and K AUSF , and the string is recorded by UE and AUSF in advance.
  • the string "roaming", the string "VPLMN”.
  • This embodiment does not limit the specific character string content.
  • the first parameter is a string, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • AUSF determines K AKMA * based on the discriminator and K AKMA .
  • the distinguisher can be a specific value, which is recorded by the UE and AUSF in advance.
  • the discriminator can be a specific value, such as 0x01.
  • the first parameter is the discriminator
  • the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter, and the second parameter the specific content of the number.
  • AUSF determines K AKMA * based on the discriminator and K AUSF .
  • the distinguisher can be a specific value, which is recorded by the UE and AUSF in advance.
  • the discriminator can be a specific value, such as 0x01.
  • the first parameter is the discriminator
  • the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • AUSF determines K AKMA and K AKMA * based on the discriminator and K AUSF respectively.
  • the discriminator needs at least 2 values, which are used when generating K AKMA and K AKMA * respectively. This value is recorded by UE and AUSF in advance. For example, when the UE is not in the roaming state, 0x01 is used to generate K AKMA , and when the UE is in the non-roaming state, 0x02 is used to generate K AKMA *.
  • the first parameter is a discriminator, and this embodiment does not limit whether the second parameter is used or the specific content of the second parameter.
  • Method 12 AUSF determines K AKMA * based on a new FC value and K AUSF . Specifically, AUSF uses the new FC value, "AKMA", SUPI and K AUSF to generate K AKMA *.
  • This FC value is currently documented in standard TS 33.220v17.3.0. This embodiment does not limit the specific value of the new FC value.
  • the new FC value is the first parameter, and the second parameter can be other content or is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
  • VPLMNID can come from UDM.
  • AUSF receives the Nudm_UEAuthentication_Get Response message from UDM, which contains the VPLMN ID.
  • the VPLMN ID comes from AMF.
  • AUSF receives the Nausf_UEAuthenticate_AuthenticationRequest message from AMF, which contains the VPLMN ID.
  • K AKMA is used to generate the key required when the UE communicates with the AF of the home network (i.e., hAF).
  • K AKMA * is used to generate the key required for the UE to communicate with the AF (i.e. vAF) of the visited network.
  • AUSF generates K AKMA *
  • the UE will also generate K AKMA * according to the method used by AUSF to generate K AKMA *, that is, the UE and AUSF generate the same K AKMA * according to the same method.
  • hAAnF generates K AKMA *
  • the UE will also generate K AKMA * according to the method used by hAAnF to generate K AKMA *, that is, the UE and hAAnF generate the same K AKMA * according to the same method.
  • K AKMA * generated by AUSF or hAAnF is used by vAAnF to generate an application key, and then vAAnF sends the application key to vAF, or of course to hAF.
  • the K AKMA * generated by the UE is used by the UE to generate an application key, and the application key generated by the UE and vAAnF is the same.
  • This application key is used for secure communication between UE and vAF/hAF.
  • Step 1010 hAAnF sends an application key response message to vAAnF. Accordingly, vAAnF receives the application key response message.
  • the application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
  • the application key response message includes the K AF and the validity time of the K AF .
  • the application key response message includes K AKMA *.
  • Step 1011 vAAnF stores KAKMA *, determines KAF based on KAKMA *, and determines the validity time of KAF .
  • step 1011 When the application key response message in step 1010 includes K AF and the validity time of K AF , this step 1011 is not executed.
  • step 1011 is executed.
  • KAKMA * determines K AF .
  • K AF can be determined based on AF ID and KAKMA *.
  • Step 1012 vAAnF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
  • the application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
  • the application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
  • Step 1013 The AF sends an application session establishment response message to the UE.
  • the UE receives the application session establishment response message.
  • the application session establishment response message carries the VPLMN ID or indication information.
  • the VPLMN ID can come from the message in step 1001 above, or it can be obtained locally by AF.
  • the indication information instructs the UE to use K AKMA *, or indicates that the UE is in a roaming state, or indicates that the PLMN where the AF is located is different from the HPLMN of the UE.
  • Step 1014 the UE determines to use KAKMA * or KAKMA .
  • the UE determines to use KAKMA . At this time, the UE does not generate KAKMA *.
  • the UE determines to use K AKMA *.
  • the UE determines to use KAKMA *, and determines KAKMA * according to the same method as in step 1009.
  • the message in step 1013 does not carry indication information or VPLMN ID
  • the UE determines to use KAKMA .
  • the UE can determine whether the PLMN where the AF is located is the same as the HPLMN of the UE. If they are different, the UE determines to use KAKMA *; if they are the same, the UE determines to use KAKMA .
  • the UE determines that the UE is in the roaming state, the UE determines to use KAKMA *.
  • the UE determines K AF and the effective time of K AF based on KAKMA * or KAKMA , and performs secure communication with the AF based on the effective time of K AF and K AF .
  • the validity time of K AKMA * and the K AF and K AF generated based on K AKMA * are used in the scenario where the PLMN where the UE is located and the PLMN where the AF is located are different.
  • the validity time of K AKMA and the K AF and K AF generated based on K AKMA The time is used in the scenario where the PLMN where the UE is located and the PLMN where the AF is located are the same.
  • the UE can generate K AKMA * after step 1013, or the UE can also generate K at any time before any step before step 1013.
  • AKMA * In the case where the UE generates KAKMA * at any time before any step before step 1013, this embodiment does not limit the specific timing of generating KAKMA *. In a possible implementation, the UE first generates KAKMA * and KAKMA in any step before step 1013.
  • the UE determines to use KAKMA * to determine K AF and the validity time of K AF , then the UE can use the K AF and the validity time of K AF determined by KAKMA * to conduct secure communication with the AF. If neither the indication information nor the VPLMN ID is received in step 1013, the UE determines to use K AKMA to determine the validity time of K AF and K AF according to K AKMA , and uses the K AF and K AF determined according to K AKMA . Secure communication between valid time and AF. In another possible implementation, the UE can also generate K AKMA in any step before step 1013.
  • the UE can use K AKMA . Determine the validity time of K AF and K AF , and use K AKMA to determine the validity time of K AF and K AF and conduct safety between AF communication. If the indication information or VPLMN ID is received in step 1013, the UE determines to use K AKMA *. If K AKMA * has not been generated, it first generates K AKMA *, and then determines K AF and K AF validity time based on K AKMA *. And use the K AF and the validity time of the K AF determined according to K AKMA * for secure communication with the AF.
  • the UE can first generate K AKMA * in any step before step 1013. Subsequently, if no indication information is received in step 1013, and no VPLMN ID is received, the UE determines to use K AKMA , if K AKMA has not been generated, K AKMA is generated first, and then the UE uses K AKMA to determine the validity time of K AF and K AF , and uses the validity time of K AF and K AF determined according to K AKMA to proceed between AF Secure communications.
  • the UE determines to use K AKMA *, then the UE determines the K AF and K AF validity time according to K AKMA *, and uses the K AF and K AF determined according to K AKMA * Secure communication between valid time and AF.
  • the UE can determine whether it needs to generate KAKMA* or only generate KAKMA * according to the roaming state. Specifically, in one implementation, the UE compares the received PLMN ID with its own HPLMN ID. If different, it means that the UE is in roaming state. For example, the UE can receive the PLMN ID of the network where the UE is located from the broadcast message sent by the base station, and then the UE compares the PLMN ID with the HPLMN ID in the UE's SUPI. If they are different, it means that the UE is in roaming state. If they are the same, it means that the UE is in roaming state. Not roaming.
  • a suitable vAAnF can be selected for the UE.
  • the AF when the AF needs to determine whether the UE is in the roaming state, the AF sends different selection parameters to the NRF according to whether the UE is in the roaming state, and optionally also sends indication information, so that the NRF selects an appropriate vAAnF.
  • the selection logic of the NRF needs to be enhanced.
  • FIG. 11 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • AF is a network element located outside the 5G core network. The method includes the following steps:
  • Steps 1100 to 1103 are the same as steps 1000 to 1003 in the aforementioned embodiment of FIG. 10 .
  • step 1100, step 1102, and step 1103 are all optional steps.
  • step 1102 may not be performed. If the NEF does not have the ability to determine whether the UE is in the roaming state, step 1102 is performed and the AF sends information indicating that the UE is in the roaming state to the NEF. For the information indicating that the UE is in the roaming state, please refer to the relevant description of step 1004.
  • Step 1104 AF sends an application key request message to NEF. Accordingly, NEF receives the application key request message.
  • the application key request message includes the AF ID, and also includes the A-KID or A-KID'.
  • This AFID is used to identify the AF.
  • the A-KID includes RID, A-TID and HPLMN ID.
  • the A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID.
  • the application key request message may be a Nnef_AKMA_AFKey_Request message.
  • the NEF may be the NEF of the visited network (i.e. vNEF) or the NEF of the home network (i.e. hNEF).
  • the application key request message also includes indication information or a VPLMN ID.
  • the indication information indicates that the UE is in the roaming state.
  • the indication information may be binary indication information, enumeration type indication information, etc.
  • the VPLMN The ID is also used to indicate that the UE is in roaming state.
  • the application key request message of step 1104 also includes selection parameters.
  • the application key request message may or may not contain A-KID or A-KID'.
  • Step 1105 NEF determines whether the UE is in roaming state.
  • Step 1105 is an optional step. This step 1105 and the above-mentioned step 1102 are performed as an alternative.
  • step 1105 is similar to step 1102, except that the operations performed by AF in step 1102 need to be replaced by NEF.
  • the NEF can compare the identification information of the PLMN where the NEF is located with the A-KID or the HPLMN ID in the A-KID'. If the two are different, it is determined that the UE is in the roaming state. If they are the same, it is determined that the UE is not in the roaming state. Roaming status.
  • Step 1106 NEF determines selection parameters.
  • Step 1106 is an optional step. This step 1106 and the above-mentioned step 1103 are performed as an alternative.
  • step 1106 is similar to step 1103, except that the operations performed by AF in step 1103 need to be replaced by NEF.
  • Step 1107 NEF sends a discovery request message to NRF. Accordingly, the NRF receives the discovery request message.
  • the discovery request message may be an Nnrf_NFDiscovery_Request message.
  • the discovery request message in step 1107 is the same message as the discovery request message in step 1004, that is, NEF forwards the discovery request message from AF.
  • the discovery request message in step 1107 and the discovery request message in step 1004 are different messages, but the two messages contain the same content.
  • Step 1108 NRF determines that the UE is in roaming state, and selects vAAnF according to the selection parameters.
  • step 1108 is the same as step 1005 in the aforementioned embodiment of FIG. 10 .
  • Step 1109 NRF sends a discovery response message to NEF. Accordingly, NEF receives the discovery response message.
  • the discovery response message may be an Nnrf_NFDiscovery_Response message.
  • the discovery response message includes vAAnF information.
  • Step 1110 NEF sends an application key request message to vAAnF. Accordingly, vAAnF receives the application key request message.
  • the application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
  • the specific implementation of the application key request message is the same as the application key request message in step 1007 in the embodiment of FIG. 10 .
  • Steps 1111 to 1114 are the same as steps 1008 to 1011 in the aforementioned embodiment of FIG. 10 .
  • Step 1115 vAAnF sends an application key response message to NEF. Accordingly, NEF receives the application key response message.
  • the application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
  • the application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
  • Step 1116 NEF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
  • the application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
  • the application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
  • Steps 1117 to 1118 are the same as steps 1013 to 1014 in the aforementioned embodiment of FIG. 10 .
  • a suitable vAAnF can be selected for the UE.
  • NEF sends different selection parameters to the NRF according to whether the UE is in the roaming state, and optionally also sends indication information, so that the NRF selects an appropriate vAAnF.
  • the selection logic of the NRF needs to be enhanced.
  • the above solution also realizes the isolation of AKMA security context between different PLMNs, that is, when vAAnF needs to store the AKMA key, hAAnF stores K AKMA , and hAAnF stores K AKMA *, realizing that different AAnFs store different AKMAs. key.
  • Figure 12 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • the relevant steps in Figure 12 involving hNRF, vNRF and vAAnF are optional steps. Specifically, in the case where vAAnF stores the AKMA security context, these steps need to be performed, otherwise these steps do not need to be performed.
  • hAAnF actively sends K AKMA * to vAAnF after determining that the UE is in the roaming state, while the above Figures 10 and 11 In the embodiment, hAAnF sends K AKMA * to vAAnF based on the request of vAAnF.
  • the method includes the following steps:
  • Step 1201 The main authentication process is completed between the UE and the AUSF.
  • This process may refer to the embodiment of FIG. 6 or FIG. 7 .
  • both the UE and the AUSF After completing the main authentication process between the UE and the AUSF, both the UE and the AUSF generate and store K AKMA and A-KID.
  • Step 1202 AUSF determines whether the UE is in roaming state.
  • the AUSF sends an authentication request message to the UDM, and the authentication request message includes the UE's SUPI or SUCI.
  • UDM obtains the SNID from the SNname of the UE.
  • the SNID is the identification information of the PLMN where the AMF is located.
  • the AMF is the AMF of the network where the UE is currently located. Therefore, if the UE is in a VPLMN, the SNID is the VPLMN ID.
  • the UDM determines that the SNID is the VPLMN ID, it determines that the UE is in the roaming state, and then carries the VPLMN ID in the authentication response message sent to the AUSF. Therefore, the AUSF determines that the UE is in the roaming state based on the VPLMN ID in the authentication response message.
  • the AUSF compares the PLMN ID from the network where the AF is located with the HPLMN ID received from the UE. If they are the same, it is determined that the UE is not in the roaming state; if they are different, it indicates that the UE is in the roaming state.
  • the AUSF obtains the SNID from the AMF. If the UE is in VPLMN, the SNID is the VPLMN ID. When the AUSF determines that the SNID is the VPLMN ID, it determines that the UE is in the roaming state and saves the SNID.
  • Step 1203 When the UE is in the roaming state, the AUSF and the UE generate KAKMA * or KAKMA , and generate A-KID' or A-KID.
  • the UE In the case where vAAnF does not need to store the AKMA security context, the UE generates K AKMA and A-KID, or K AKMA and A-KID' .
  • the UE determines to generate K AKMA * and A-KID', or K AKMA * and A-KID. At the same time, the UE generates K AKMA. Also, generating K AKMA * and A-KID' is an optional step.
  • the K AKMA is identified by A-KID' or A-KID.
  • K AKMA * is identified by A-KID' or A-KID.
  • A-KID can identify both K AKMA and K AKMA *; or A-KID only identifies K AKMA , and A-KID' only identifies K AKMA *; or A-KID' identifies both K AKMA and K AKMA *.
  • A-KID' includes RID, A-TID and HPLMN ID
  • A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID.
  • whether the AUSF/UE generates A-KID' has nothing to do with whether the UE is in roaming state. That is, AUSF/UE generates A-KID' regardless of whether the UE is in the roaming state, but whether the UE is in the roaming state will cause the content of the generated A-KID' to be different. Among them, if the UE is in roaming state, the VPLMN field in A-KID' is the VPLMN ID. If the UE is not in roaming state, the VPLMN field in A-KID' is the default value. Among them, AUSF can receive VPLMN ID from UDM or AMF. At this time, AUSF/UE no longer generates A-KID.
  • whether the AUSF/UE generates A-KID' is related to whether the UE is in roaming state. Specifically, if the UE is in the roaming state, the AUSF/UE generates A-KID', and the VPLMN field in A-KID' is the VPLMN ID. If the UE is not in roaming state, the AUSF generates A-KID.
  • AUSF may generate both A-KID and A-KID'. Then A-KID is used to identify K AKMA and A-KID' is used to identify K AKMA *. In the case where only A-KID is generated and A-KID' is not generated, A-KID is used to identify K AKMA * and K AKMA . Or, in the case where only A-KID' is generated and A-KID is not generated, A-KID' is used to identify K AKMA * and K AKMA .
  • Step 1204 AUSF sends a key registration request message to hAAnF. Accordingly, hAAnF receives the key registration request message.
  • the key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
  • the key registration request message includes SUPI, K AKMA , A-KID, K AKMA * and A-KID', or Includes SUPI, KAKMA , A-KID and KAKMA *, or includes SUPI, KAKMA , KAKMA * and A-KID'.
  • the key registration request message includes SUPI, K AKMA and A-KID.
  • the key registration request message also includes roaming indication information.
  • the roaming indication information may be information about the VPLMN where the UE is located, that is, the VPLMN ID.
  • KAKMA * is not generated, when hAAnF determines that the UE is in the roaming state according to the roaming indication information, it generates KAKMA * or A-KID' (ie, step 1211).
  • the method for generating and implementing K AKMA * and A-KID' can be described with reference to the foregoing embodiments.
  • vAAnF When vAAnF stores the AKMA security context and needs to send the AKMA security context to vAAnF in advance, some or all of the following steps 1205 to 1213 need to be performed. Otherwise, there is no need to perform steps 1205 to 1213.
  • Step 1205 hAAnF selects vAAnF.
  • This step is optional.
  • hAAnF can select vAAnF based on selection parameters (the selection parameters are also referred to as parameters for selecting vAAnF). Regarding different implementation methods of selecting vAAnF according to the selection parameters, reference may be made to the description in the embodiment of FIG. 10 .
  • step 1205 there is no need to perform the following steps 1206 to 1209 and steps 1210a and 1210b. If this step 1205 is not performed, the following steps 1206 to 1209 and steps 1210a and 1210b need to be performed.
  • Step 1206 hAAnF sends a discovery request message to hNRF. Accordingly, hNRF receives the discovery request message.
  • the discovery request message includes the VPLMN ID and selection parameters.
  • This selection parameter is also called for selecting vAAnF parameters.
  • the discovery request message may be an Nnrf_NFDiscovery_Request message.
  • Step 1207 hNRF selects vNRF based on VPLMN ID.
  • Step 1208 hNRF sends a discovery request message to vAAnF. Accordingly, vAAnF receives the discovery request message.
  • the discovery request message includes selection parameters.
  • the discovery request message may be an Nnrf_NFDiscovery_Request message.
  • Step 1209 vNRF selects vAAnF.
  • vNRF selects vAAnF according to the selection parameters. For details, please refer to the description of the embodiment in Figure 10.
  • Step 1210a vNRF sends a discovery response message to hNRF. Accordingly, hNRF receives the discovery response message.
  • the discovery response message includes vAAnF information.
  • the discovery response message may be an Nnrf_NFDiscovery_Response message.
  • Step 1210b hNRF sends a discovery response message to hAAnF. Accordingly, hAAnF receives the discovery response message.
  • the discovery response message includes vAAnF information.
  • the discovery response message may be an Nnrf_NFDiscovery_Response message.
  • Step 1211 When the UE is in the roaming state, the UE and hAAnF generate K AKMA * or A-KID'.
  • KAKMA * is not generated in the above step 1203, and the UE does not generate KAKMA * before executing step 1211, then KAKMA * needs to be generated in step 1211.
  • the specific implementation method of generating K AKMA * is similar to step 1203.
  • A-KID' is not generated in the above step 1203, and the UE does not generate A-KID' before executing step 1211, then A-KID' needs to be generated in step 1211.
  • the specific implementation method of generating A-KID' is similar to step 1203.
  • step 1211 is executed, there is no order restriction between step 1211 and the foregoing steps. Step 1211 only needs to be executed before step 1212.
  • Step 1212 hAAnF sends a key registration request message to vAAnF. Accordingly, vAAnF receives the key registration request message.
  • the key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
  • the key registration request message includes SUPI, K AKMA * and A-KID'.
  • Step 1213 vAAnF stores SUPI, K AKMA * and A-KID'.
  • the UE will also generate KAKMA * or KAKMA according to the method used by AUSF to generate KAKMA * or KAKMA . That is, the UE and the AUSF generate the same KAKMA * or KAKMA in the same method.
  • the UE will also generate K AKMA * or K AKMA according to the method used by hAAnF to generate K AKMA * or K AKMA , that is, the UE and hAAnF generate the same K according to the same method.
  • AKMA * or K AKMA if AUSF generates KAKMA * or KAKMA , the UE will also generate KAKMA * or KAKMA according to the method used by AUSF to generate KAKMA * or KAKMA .
  • K AKMA * generated by AUSF or hAAnF is used by vAAnF to generate an application key, and then vAAnF sends the application key to vAF, or of course to hAF.
  • the K AKMA * generated by the UE is used by the UE to generate an application key, and the application key generated by the UE and vAAnF is the same.
  • This application key is used for secure communication between UE and vAF/hAF.
  • K AKMA * and A-KID' from AUSF or hAAnF, and actively send K AKMA * and A-KID' to vAAnF to store K AKMA * and A-KID' on vAAnF to facilitate subsequent vAAnF
  • K AKMA * Generate a security key (i.e. K AF ) for communication between the UE and the vAF, realizing key update when the UE is in a roaming state.
  • K AF security key
  • the network storage function network element NEF
  • the first network element such as AF, NEF
  • the terminal device such as UE
  • the home AKMA anchor function network element hAAnF
  • the visiting AKMA anchor function network element vAAnF or the authentication server function network element (AUSF) includes hardware structures and/or software modules that perform corresponding functions.
  • Figures 13 and 14 are schematic structural diagrams of possible communication devices provided by embodiments of the present application. These communication devices can be used to implement the network storage function network element (NRF), the first network element (such as AF, NEF), terminal equipment (such as UE), home AKMA anchor function network element (hAAnF), By accessing the functions of the AKMA Anchor Function Network Element (vAAnF) or the Authentication Server Function Network Element (AUSF), the beneficial effects of the above method embodiments can also be achieved.
  • the communication device may be a network storage function network element (NRF), a first network element (such as AF, NEF), a terminal device (such as UE), or a home AKMA anchor function network element (hAAnF).
  • NEF network storage function network element
  • the first network element such as AF, NEF
  • terminal equipment such as UE
  • home AKMA anchor function network element (hAAnF) visiting AKMA anchor function network element (vAAnF) or authentication server function network element (AUSF) module (such as a chip).
  • hAAnF home AKMA anchor function network element
  • vAAnF visiting AKMA anchor function network element
  • AUSF authentication server function network element
  • the communication device 1300 shown in FIG. 13 includes a processing unit 1310 and a transceiver unit 1320.
  • the communication device 1300 is used to implement the network storage function network element (NRF), the first network element (such as AF, NEF), the terminal equipment (such as UE), the home AKMA anchor function network element (hAAnF), and the visiting network element in the above method embodiment.
  • NEF network storage function network element
  • AF AF
  • NEF network element
  • UE terminal equipment
  • hAAnF home AKMA anchor function network element
  • hAAnF home AKMA anchor function network element
  • hAAnF home AKMA anchor function network element
  • the transceiver unit 1320 is used to receive a request message from the first network element, where the request message includes selection parameters; the processing unit 1310, When the terminal device is in the roaming state, according to the selection parameter, the visiting AKMA anchor point function network element that provides services for the terminal device is selected; the transceiver unit 1320 is also used to send a response message to the first network element.
  • the response message Contains information about accessing the AKMA anchor function network element.
  • the processing unit 1310 is specifically configured to select the AKMA anchor point function network element corresponding to the selection parameter when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter.
  • the anchor point function network element serves as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, the default AKMA anchor point function network element is selected.
  • the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the received indication information.
  • the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
  • the processing unit 1310 is used to determine the selection parameters when the terminal device is in the roaming state; the transceiver unit 1320 is used to send messages to the network
  • the storage function network element sends the selection parameter, which is used to select the visiting AKMA anchor point function network element that provides services for the terminal device; receives the information of the visiting AKMA anchor point function network element from the network storage function network element; by and sending a request message to the visited AKMA anchor point function network element according to the information of the visited AKMA anchor point function network element.
  • the request message requests an application key for secure communication between the visited application function network element and the terminal device. .
  • the processing unit 1310 is also configured to determine based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
  • the terminal device is in roaming state.
  • the processing unit 1310 is specifically configured to determine the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein the first AKMA key identifier includes the route of the terminal device. identification, the AKMA temporary identification of the terminal equipment, the HPLMN information of the terminal equipment and the VPLMN information of the terminal equipment; the second AKMA key identification includes the routing identification of the terminal equipment, the AKMA temporary identification of the terminal equipment and the HPLMN information of the terminal device.
  • the processing unit 1310 is used to determine whether the terminal device is in a roaming state; when the terminal device is in a roaming state, determine the first AKMA root key, the third An AKMA root key is used to determine the first application key, which is used for secure communication between the terminal device and the visiting application function network element.
  • the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. , the second AKMA root key is used to determine the second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
  • the processing unit 1310 is specifically configured to determine the AKMA root key based on the VPLMN information of the terminal device, the user permanent identity SUPI of the terminal device, and the authentication server function root key.
  • the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the received indication information.
  • the transceiver unit 1320 is used to receive the AKMA root key from the home AKMA anchor function network element; the processing unit 1310 is used to The AKMA root key determines the application key used for secure communication between the access application function network element and the terminal device.
  • the processing unit 1310 is used to obtain the first AKMA root key; the transceiver unit 1320 is used to send a message to the visiting AKMA anchor function network element.
  • the first AKMA root key is sent.
  • the first AKMA root key is used to determine the first application key.
  • the first application key is used for secure communication between the terminal device and the visited application function network element.
  • the processing unit 1310 is specifically configured to determine the first AKMA root key according to the second AKMA root key, and the second AKMA root key is used to determine the second application key.
  • the second application key is used for secure communication between the terminal device and the home application function network element.
  • the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. key.
  • the processing unit 1310 is used to determine whether the terminal device is in the roaming state; key to determine the first AKMA root key; wherein the first AKMA root key is used to determine the first application key, and the first application key is used for secure communication between the terminal device and the visiting application function network element ;
  • the second The AKMA root key is used to determine the second application key, which is used for secure communication between the terminal device and the home application function network element.
  • the transceiver unit 1320 is configured to send the first AKMA root key to the visiting AKMA anchor point function network element.
  • the transceiver unit 1320 is configured to receive a request message from the visited AKMA anchor function network element, where the request message is used to request to obtain the AKMA root key; based on the request message, send a request message to the visited AKMA anchor function network element.
  • the point function network element sends the first AKMA root key.
  • the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. key.
  • the transceiver unit 1320 is configured to receive indication information from the authentication server functional network element, which indicates that the terminal device is in a roaming state; the processing unit 1310 is configured to determine the terminal device based on the indication information. The terminal device is in roaming state.
  • the processing unit 1310 is configured to determine whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and/or the VPLMN information of the terminal device.
  • the processing unit 1310 is used to determine whether the terminal device is in the roaming state; when the terminal device is in the roaming state, according to the VPLMN of the terminal device information to determine the AKMA root key; wherein, the AKMA root key is used to determine the application key, and the application key is used for secure communication between the terminal device and the visiting application function network element.
  • the transceiver unit 1320 is configured to send the AKMA root key to the home AKMA anchor point function network element.
  • the processing unit 1310 is configured to determine the AKMA root key based on the VPLMN information of the terminal device, the SUPI of the terminal device, and the authentication server function root key.
  • the processing unit 1310 is configured to perform the processing according to one or more of the HPLMN information of the terminal device, the VPLMN information of the authentication server functional network element, or the VPLMN information of the terminal device, Determine whether the terminal device is in roaming state.
  • the communication device 1400 shown in FIG. 14 includes a processor 1410 and an interface circuit 1420.
  • the processor 1410 and the interface circuit 1420 are coupled to each other.
  • the interface circuit 1420 may be a transceiver or an input-output interface.
  • the communication device 1400 may also include a memory 1430 for storing instructions executed by the processor 1410 or input data required for the processor 1410 to run the instructions or data generated after the processor 1410 executes the instructions.
  • the processor 1410 is used to implement the functions of the above processing unit 1310
  • the interface circuit 1420 is used to realize the functions of the above transceiver unit 1320.
  • the processor in the embodiment of the present application can be a central processing unit (Central Processing Unit, CPU), or other general-purpose processor, digital signal processor (Digital Signal Processor, DSP), or application specific integrated circuit. (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • a general-purpose processor can be a microprocessor or any conventional processor.
  • the method steps in the embodiments of the present application may be implemented in hardware, or may be executed by a processor in software. implemented by instructions.
  • Software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only memory In memory, register, hard disk, mobile hard disk, CD-ROM or any other form of storage medium well known in the art.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and storage media may be located in an ASIC. Additionally, the ASIC can be located in the base station or terminal equipment. Of course, the processor and the storage medium may also exist as discrete components in the base station or terminal equipment.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, a base station, a user equipment, or other programmable device.
  • the computer program or instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another.
  • the computer program or instructions may be transmitted from a website, computer, A server or data center transmits via wired or wireless means to another website site, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center that integrates one or more available media.
  • the available media may be magnetic media, such as floppy disks, hard disks, and tapes; optical media, such as digital video optical disks; or semiconductor media, such as solid-state hard drives.
  • the computer-readable storage medium may be volatile or nonvolatile storage media, or may include both volatile and nonvolatile types of storage media.
  • “at least one” refers to one or more, and “plurality” refers to two or more.
  • “And/or” describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the related objects before and after are an “or” relationship; in the formula of this application, the character “/” indicates that the related objects before and after are a kind of "division” Relationship.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application provides a communication method, a communication apparatus, and a communication system. In the method, when a terminal device is in a roaming state, a network storage function network element selects a visiting AKMA anchor point function network element. The visiting AKMA anchor point function network element can serve as a transfer node or generate an application key for secure communication between the terminal device and an application function network element. Therefore, the application function network element can accurately obtain the application key such that the terminal device and the application function network element encrypt communication content by using the application key, thereby improving the communication security.

Description

通信方法、通信装置及通信系统Communication method, communication device and communication system
相关申请的交叉引用Cross-references to related applications
本申请要求在2022年06月24日提交中国专利局、申请号为202210730849.9、申请名称为“通信方法、通信装置及通信系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the China Patent Office on June 24, 2022, with the application number 202210730849.9 and the application name "Communication method, communication device and communication system", the entire content of which is incorporated into this application by reference. middle.
技术领域Technical field
本申请涉及无线通信技术领域,尤其涉及通信方法、通信装置及通信系统。The present application relates to the field of wireless communication technology, and in particular to communication methods, communication devices and communication systems.
背景技术Background technique
为了提升通信的安全性,终端设备与应用功能(application function,AF)网元进行通信时,双方需要使用应用密钥对传输的内容进行加密。其中,终端设备使用的该应用密钥是由终端设备生成的,AF网元使用的该应用密钥是由应用的认证和密钥管理(authentication and key management for applications,AKMA)锚点功能(AKMA anchor function,AAnF)网元生成并发送给AF网元的。In order to improve communication security, when a terminal device communicates with an application function (AF) network element, both parties need to use an application key to encrypt the transmitted content. Among them, the application key used by the terminal device is generated by the terminal device, and the application key used by the AF network element is generated by the application's authentication and key management for applications (AKMA) anchor function (AKMA). anchor function, generated by AAnF) network element and sent to AF network element.
当终端设备处于非漫游状态,AF网元与AAnF网元位于同一个公共陆地移动网络内,因此AF网元能够连接到AAnF网元并向AAnF网元请求获取应用密钥。When the terminal device is in a non-roaming state, the AF network element and the AAnF network element are located in the same public land mobile network, so the AF network element can connect to the AAnF network element and request the AAnF network element to obtain the application key.
然而,当终端设备处于漫游状态,则与终端设备进行通信的AF网元可能无法直接连接终端设备的家乡AAnF(home AAnF,hAAnF)网元,导致AF网元可能无法获取到应用密钥,进而造成通信不安全。However, when the terminal device is in the roaming state, the AF network element communicating with the terminal device may not be able to directly connect to the terminal device's home AAnF (home AAnF, hAAnF) network element. As a result, the AF network element may not be able to obtain the application key, and thus the AF network element may not be able to obtain the application key. causing communication insecurity.
发明内容Contents of the invention
本申请提供通信方法、通信装置及通信系统,用以保障终端设备与AF网元之间的安全通信。This application provides communication methods, communication devices and communication systems to ensure secure communication between terminal equipment and AF network elements.
第一方面,本申请实施例提供一种通信方法,该方法可以由网络存储功能网元或应用于网络存储功能网元的模块来执行。以网络存储功能网元执行该方法为例,网络存储功能网元接收来自第一网元的请求消息,该请求消息包括选择参数;当终端设备处于漫游状态,该网络存储功能网元根据该选择参数,选择为该终端设备提供服务的拜访AKMA锚点功能网元;该网络存储功能网元向该第一网元发送响应消息,该响应消息包括该拜访AKMA锚点功能网元的信息。In the first aspect, embodiments of the present application provide a communication method, which can be executed by a network storage function network element or a module applied to a network storage function network element. Taking the network storage function network element to implement this method as an example, the network storage function network element receives a request message from the first network element, and the request message includes selection parameters; when the terminal device is in the roaming state, the network storage function network element responds according to the selection parameter, select the visited AKMA anchor point function network element that provides services for the terminal device; the network storage function network element sends a response message to the first network element, and the response message includes the information of the visited AKMA anchor point function network element.
上述方案,当终端设备处于漫游状态,则网络存储功能网元选择一个拜访AKMA锚点功能网元,该拜访AKMA锚点功能网元既可以作为中转节点,也可以生成终端设备与应用功能网元之间进行安全通信的应用密钥,使得应用功能网元能够准确获取到应用密钥,便于终端设备与应用功能网元之间使用应用密钥对通信内容进行加密,有助于提升通信安全性。In the above solution, when the terminal device is in the roaming state, the network storage function network element selects a visiting AKMA anchor point function network element. This visiting AKMA anchor point function network element can not only serve as a transit node, but also generate terminal equipment and application function network elements. The application key for secure communication between the terminal device and the application function network element enables the application function network element to accurately obtain the application key, which facilitates the use of the application key to encrypt the communication content between the terminal device and the application function network element, which helps to improve communication security. .
一种可能的实现方法中,该网络存储功能网元根据该选择参数,选择为该终端设备提 供服务的拜访AKMA锚点功能网元,包括:当该网络存储功能网元存储有该选择参数对应的AKMA锚点功能网元,则该网络存储功能网元选择该选择参数对应的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元;或者,当该网络存储功能网元未存储该选择参数对应的AKMA锚点功能网元,则该网络存储功能网元选择默认的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元。In a possible implementation method, the network storage function network element selects to provide the terminal device with Visiting the AKMA anchor point function network element for services includes: when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the AKMA anchor point corresponding to the selection parameter. Function network element, as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the default AKMA anchor point The functional network element serves as the access AKMA anchor point functional network element.
上述方案,可以实现选择一个合适的拜访AKMA锚点功能网元。The above solution can select a suitable network element to visit the AKMA anchor point function.
一种可能的实现方法中,该选择参数包括该终端设备的路由标识、该终端设备的家乡公共陆地移动网络HPLMN的信息、该第一网元所在的拜访公共陆地移动网络VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个。In a possible implementation method, the selection parameter includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal. One or more of the device's VPLMN information.
通过该方案,通过选择参数,可以确定合适的拜访AKMA锚点功能网元。Through this solution, by selecting parameters, the appropriate visiting AKMA anchor point function network element can be determined.
一种可能的实现方法中,该选择参数包括该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个;该网络存储功能网元根据该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,确定该终端设备处于漫游状态。In a possible implementation method, the selection parameter includes one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device; the network storage function network The terminal device determines that the terminal device is in the roaming state based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
通过该方案,可以准确判断终端设备是否处于漫游状态,有助于实现准确判断是否需要选择拜访AKMA锚点功能网元。Through this solution, it can be accurately determined whether the terminal device is in roaming state, which helps to accurately determine whether it is necessary to choose to visit the AKMA anchor function network element.
一种可能的实现方法中,该网络存储功能网元根据收到的指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the network storage function network element determines that the terminal device is in a roaming state based on the received indication information.
通过该方案,可以准确判断终端设备是否处于漫游状态,有助于实现准确判断是否需要选择拜访AKMA锚点功能网元。Through this solution, it can be accurately determined whether the terminal device is in roaming state, which helps to accurately determine whether it is necessary to choose to visit the AKMA anchor function network element.
一种可能的实现方法中,该网络存储功能网元根据该网络存储功能网元的PLMN的信息和该终端设备的HPLMN的信息,确定该终端设备处于漫游状态。In a possible implementation method, the network storage function network element determines that the terminal device is in the roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
通过该方案,可以准确判断终端设备是否处于漫游状态,有助于实现准确判断是否需要选择拜访AKMA锚点功能网元。Through this solution, it can be accurately determined whether the terminal device is in roaming state, which helps to accurately determine whether it is necessary to choose to visit the AKMA anchor function network element.
一种可能的实现方法中,该终端设备处于漫游状态指的是该终端设备位于拜访网络,或者是与该终端设备进行通信的应用功能网元无法直接连接该终端设备的家乡AKMA锚点功能网元。In a possible implementation method, the terminal device being in the roaming state means that the terminal device is located in the visited network, or the application function network element communicating with the terminal device cannot directly connect to the home AKMA anchor function network of the terminal device. Yuan.
第二方面,本申请实施例提供一种通信方法,该方法可以由第一网元或应用于第一网元的模块来执行,该第一网元可以是网络开放功能网元或应用功能网元。以执行第一网元该方法为例,当终端设备处于漫游状态,第一网元确定选择参数;该第一网元向网络存储功能网元发送该选择参数,该选择参数用于选择为该终端设备提供服务的拜访AKMA锚点功能网元;该第一网元接收来自该网络存储功能网元的该拜访AKMA锚点功能网元的信息;该第一网元根据该拜访AKMA锚点功能网元的信息,向该拜访AKMA锚点功能网元发送请求消息,该请求消息请求用于拜访应用功能网元与该终端设备之间进行安全通信的应用密钥。In the second aspect, embodiments of the present application provide a communication method. The method can be executed by a first network element or a module applied to the first network element. The first network element can be a network open function network element or an application function network element. Yuan. Taking the method of executing the first network element as an example, when the terminal device is in the roaming state, the first network element determines the selection parameters; the first network element sends the selection parameters to the network storage function network element, and the selection parameters are used to select the The terminal device provides a service by visiting the AKMA anchor point function network element; the first network element receives the information of the visiting AKMA anchor point function network element from the network storage function network element; the first network element is based on the visiting AKMA anchor point function The information of the network element is sent to the visiting AKMA anchor point function network element. The request message requests the application key used for secure communication between the visiting application function network element and the terminal device.
上述方案,当终端设备处于漫游状态,则第一网元请求网络存储功能网元选择一个拜访AKMA锚点功能网元,该拜访AKMA锚点功能网元既可以作为中转节点,也可以生成终端设备与应用功能网元之间进行安全通信的应用密钥,使得应用功能网元能够准确获取到应用密钥,便于终端设备与应用功能网元之间使用应用密钥对通信内容进行加密,有助于提升通信安全性。 In the above scheme, when the terminal device is in the roaming state, the first network element requests the network storage function network element to select a visiting AKMA anchor point function network element. The visiting AKMA anchor point function network element can either serve as a transit node or generate a terminal device. The application key for secure communication with the application function network element enables the application function network element to accurately obtain the application key, which facilitates the use of the application key to encrypt the communication content between the terminal device and the application function network element, which helps To improve communication security.
一种可能的实现方法中,该选择参数包括该终端设备的路由标识、该终端设备的家乡公共陆地移动网络HPLMN的信息、该第一网元所在的拜访公共陆地移动网络VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个。In a possible implementation method, the selection parameter includes the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, information about the visited public land mobile network VPLMN where the first network element is located, or information about the terminal. One or more of the device's VPLMN information.
通过该方案,通过选择参数,可以确定合适的拜访AKMA锚点功能网元。Through this solution, by selecting parameters, the appropriate visiting AKMA anchor point function network element can be determined.
一种可能的实现方法中,该第一网元根据该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,确定该终端设备处于漫游状态。In a possible implementation method, the first network element determines the terminal based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. The device is roaming.
通过该方案,可以准确判断终端设备是否处于漫游状态,有助于实现准确判断是否需要选择拜访AKMA锚点功能网元。Through this solution, it can be accurately determined whether the terminal device is in roaming state, which helps to accurately determine whether it is necessary to choose to visit the AKMA anchor function network element.
一种可能的实现方法中,该第一网元向该终端设备发送指示信息,该指示信息指示该终端设备处于漫游状态。In a possible implementation method, the first network element sends indication information to the terminal device, and the indication information indicates that the terminal device is in a roaming state.
通过该方案,可以准确判断终端设备是否处于漫游状态,有助于实现准确判断是否需要选择拜访AKMA锚点功能网元。Through this solution, it can be accurately determined whether the terminal device is in roaming state, which helps to accurately determine whether it is necessary to choose to visit the AKMA anchor function network element.
一种可能的实现方法中,该第一网元确定选择参数,包括:该第一网元根据第一AKMA密钥标识或第二AKMA密钥标识,确定该选择参数;其中,该第一AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识、该终端设备的HPLMN的信息和该终端设备的VPLMN的信息;该第二AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识和该终端设备的HPLMN的信息。In a possible implementation method, the first network element determines the selection parameter, including: the first network element determines the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein, the first AKMA The key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device, the HPLMN information of the terminal device, and the VPLMN information of the terminal device; the second AKMA key identifier includes the routing identifier of the terminal device, Information about the AKMA temporary identification of the terminal device and the HPLMN of the terminal device.
一种可能的实现方法中,该第一网元是该拜访应用功能网元,该拜访应用功能网元接收来自该终端设备的应用会话建立请求消息;或者,该第一网元是该网络开放功能网元,该网络开放功能网元接收来自该拜访应用功能网元的应用密钥请求消息。In a possible implementation method, the first network element is the visiting application function network element, and the visiting application function network element receives the application session establishment request message from the terminal device; or, the first network element is the network opening Functional network element, the network open function network element receives the application key request message from the access application function network element.
第三方面,本申请实施例提供一种通信方法,该方法可以由终端设备或应用于终端设备的模块来执行。以终端设备执行该方法为例,终端设备判断该终端设备是否处于漫游状态;当该终端设备处于漫游状态,该终端设备确定第一AKMA根密钥,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信。In the third aspect, embodiments of the present application provide a communication method, which can be executed by a terminal device or a module applied to the terminal device. Taking the terminal device executing this method as an example, the terminal device determines whether the terminal device is in a roaming state; when the terminal device is in a roaming state, the terminal device determines the first AKMA root key, and the first AKMA root key is used to determine the third AKMA root key. An application key, the first application key is used for secure communication between the terminal device and the visiting application function network element.
上述方案,当终端设备处于漫游状态,则终端设备生成第一AKMA根密钥,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信,有助于实现准确确定与拜访应用功能网元之间进行通信的密钥。In the above solution, when the terminal device is in the roaming state, the terminal device generates the first AKMA root key. The first AKMA root key is used to determine the first application key. The first application key is used for the terminal device to communicate with the visitor. Secure communication between application function network elements helps to accurately determine the key for communication with the visiting application function network elements.
一种可能的实现方法中,该终端设备确定第一AKMA根密钥,包括:该终端设备根据第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥,该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In a possible implementation method, the terminal device determines the first AKMA root key, including: the terminal device determines the first AKMA root key according to the second AKMA root key, and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. , determine the first AKMA root key, and the second AKMA root key is used to determine a second application key. The second application key is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,该终端设备确定第一AKMA根密钥,包括:该终端设备根据该终端设备的VPLMN的信息、该终端设备的用户永久标识SUPI和鉴权服务器功能根密钥,确定该AKMA根密钥。In a possible implementation method, the terminal device determines the first AKMA root key, including: the terminal device based on the VPLMN information of the terminal device, the user permanent identity SUPI of the terminal device and the authentication server function root key, Determine the AKMA root key.
一种可能的实现方法中,该终端设备根据收到的指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the terminal device determines that the terminal device is in a roaming state based on the received indication information.
第四方面,本申请实施例提供一种通信方法,该方法可以由拜访AKMA锚点功能网元或应用于拜访AKMA锚点功能网元的模块来执行。以拜访AKMA锚点功能网元执行该 方法为例,拜访AKMA锚点功能网元接收来自家乡AKMA锚点功能网元的第一AKMA根密钥;该拜访AKMA锚点功能网元根据该第一AKMA根密钥,确定用于拜访应用功能网元与终端设备之间进行安全通信的第一应用密钥。In the fourth aspect, embodiments of the present application provide a communication method, which can be executed by a visiting AKMA anchor point function network element or a module applied to a visiting AKMA anchor point function network element. Execute this by accessing the AKMA anchor function network element. For example, the visiting AKMA anchor function network element receives the first AKMA root key from the home AKMA anchor function network element; the visiting AKMA anchor function network element determines the access application based on the first AKMA root key. The first application key for secure communication between functional network elements and terminal equipment.
一种可能的实现方法中,该拜访AKMA锚点功能网元存储该AKMA根密钥。In a possible implementation method, the access AKMA anchor point function network element stores the AKMA root key.
第五方面,本申请实施例提供一种通信方法,该方法可以由家乡AKMA锚点功能网元或应用于家乡AKMA锚点功能网元的模块来执行。以家乡AKMA锚点功能网元执行该方法为例,家乡AKMA锚点功能网元获取第一AKMA根密钥;该家乡AKMA锚点功能网元向拜访AKMA锚点功能网元发送该第一AKMA根密钥,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于终端设备与拜访应用功能网元之间进行安全通信。In the fifth aspect, embodiments of the present application provide a communication method, which can be executed by the home AKMA anchor function network element or a module applied to the home AKMA anchor function network element. Taking the home AKMA anchor point function network element to implement this method as an example, the home AKMA anchor point function network element obtains the first AKMA root key; the home AKMA anchor point function network element sends the first AKMA to the visiting AKMA anchor point function network element Root key. The first AKMA root key is used to determine the first application key. The first application key is used for secure communication between the terminal device and the visiting application function network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元获取第一AKMA根密钥,包括:该家乡AKMA锚点功能网元根据第二AKMA根密钥,确定该第一AKMA根密钥,该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In a possible implementation method, the home AKMA anchor function network element obtains the first AKMA root key, including: the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key. , the second AKMA root key is used to determine the second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元根据第二AKMA根密钥,确定该第一AKMA根密钥,包括:该家乡AKMA锚点功能网元根据该第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor point function network element determines the first AKMA root key based on the second AKMA root key, including: the home AKMA anchor point function network element determines the first AKMA root key based on the second AKMA root key. key, as well as the HPLMN information of the terminal device and/or the VPLMN information of the terminal device, to determine the first AKMA root key.
一种可能的实现方法中,该家乡AKMA锚点功能网元获取第一AKMA根密钥,包括:该家乡AKMA锚点功能网元接收来自鉴权服务器功能网元的该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor function network element obtains the first AKMA root key, including: the home AKMA anchor function network element receives the first AKMA root key from the authentication server function network element. .
第六方面,本申请实施例提供一种通信方法,该方法可以由家乡AKMA锚点功能网元或应用于家乡AKMA锚点功能网元的模块来执行。以家乡AKMA锚点功能网元执行该方法为例,家乡AKMA锚点功能网元判断终端设备是否处于漫游状态;当该终端设备处于漫游状态,家乡AKMA锚点功能网元根据第二AKMA根密钥,确定第一AKMA根密钥;其中,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信;该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In the sixth aspect, embodiments of the present application provide a communication method, which can be executed by the home AKMA anchor function network element or a module applied to the home AKMA anchor function network element. Taking the home AKMA anchor point function network element as an example to implement this method, the home AKMA anchor point function network element determines whether the terminal device is in the roaming state; when the terminal device is in the roaming state, the home AKMA anchor point function network element determines whether the terminal device is in the roaming state. key to determine the first AKMA root key; wherein the first AKMA root key is used to determine the first application key, and the first application key is used for secure communication between the terminal device and the visiting application function network element ; The second AKMA root key is used to determine a second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
上述方案,家乡AKMA锚点功能网元确定UE处于漫游状态之后,可以为拜访AKMA锚点功能网元生成AKMA根密钥,并向拜访AKMA锚点功能网元发送AKMA根密钥,该AKMA根密钥由拜访AKMA锚点功能网元使用,从而实现不同AKMA锚点功能网元之间的密钥隔离,即拜访AKMA锚点功能网元与家乡AKMA锚点功能网元使用不同的AKMA根密钥,有助于保证密钥安全性,进而提升通信的安全性。In the above solution, after the home AKMA anchor function network element determines that the UE is in the roaming state, it can generate an AKMA root key for the visiting AKMA anchor function network element and send the AKMA root key to the visiting AKMA anchor function network element. The key is used by the visiting AKMA anchor point function network element to achieve key isolation between different AKMA anchor point function network elements, that is, the visiting AKMA anchor point function network element and the home AKMA anchor point function network element use different AKMA root keys key, which helps ensure the security of the key and thereby improves the security of communication.
一种可能的实现方法中,该家乡AKMA锚点功能网元存储该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor point function network element stores the first AKMA root key.
一种可能的实现方法中,该家乡AKMA锚点功能网元向拜访AKMA锚点功能网元发送该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor point function network element sends the first AKMA root key to the visiting AKMA anchor point function network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元接收来自该拜访AKMA锚点功能网元的请求消息,该请求消息用于请求获取AKMA根密钥;该家乡AKMA锚点功能网元向拜访AKMA锚点功能网元发送该第一AKMA根密钥,包括:该家乡AKMA锚点功能网元基于该请求消息,向该拜访AKMA锚点功能网元发送该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor function network element receives a request message from the visiting AKMA anchor function network element. The request message is used to request to obtain the AKMA root key; the home AKMA anchor function network element Sending the first AKMA root key to the visited AKMA anchor function network element includes: the home AKMA anchor function network element sends the first AKMA root key to the visited AKMA anchor function network element based on the request message.
一种可能的实现方法中,该家乡AKMA锚点功能网元根据第二AKMA根密钥,确定第一AKMA根密钥,包括:该家乡AKMA锚点功能网元根据该第二AKMA根密钥,以 及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key, including: the home AKMA anchor function network element determines the first AKMA root key based on the second AKMA root key. ,by and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device to determine the first AKMA root key.
一种可能的实现方法中,该家乡AKMA锚点功能网元判断终端设备是否处于漫游状态,包括:该家乡AKMA锚点功能网元接收来自鉴权服务器功能网元的指示信息,该指示信息指示该终端设备处于漫游状态;该家乡AKMA锚点功能网元根据该指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the home AKMA anchor function network element determines whether the terminal device is in a roaming state, including: the home AKMA anchor function network element receives indication information from the authentication server function network element, and the indication information indicates The terminal device is in the roaming state; the home AKMA anchor point function network element determines that the terminal device is in the roaming state based on the indication information.
一种可能的实现方法中,该家乡AKMA锚点功能网元判断终端设备是否处于漫游状态,包括:该家乡AKMA锚点功能网元根据该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,判断该终端设备是否处于漫游状态。In a possible implementation method, the home AKMA anchor point function network element determines whether the terminal device is in a roaming state, including: the home AKMA anchor point function network element determines whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and/or the VPLMN of the terminal device. information to determine whether the terminal device is in roaming state.
第七方面,本申请实施例提供一种通信方法,该方法可以由鉴权服务器功能网元或应用于鉴权服务器功能网元的模块来执行。以鉴权服务器功能网元执行该方法为例,鉴权服务器功能网元判断终端设备是否处于漫游状态;当该终端设备处于漫游状态,鉴权服务器功能网元根据该终端设备的VPLMN的信息,确定AKMA根密钥;其中,该AKMA根密钥用于确定应用密钥,该应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信。In a seventh aspect, embodiments of the present application provide a communication method, which can be executed by an authentication server functional network element or a module applied to the authentication server functional network element. Taking the authentication server functional network element executing this method as an example, the authentication server functional network element determines whether the terminal device is in the roaming state; when the terminal device is in the roaming state, the authentication server functional network element determines whether the terminal device is in the roaming state based on the VPLMN information of the terminal device. Determine the AKMA root key; wherein, the AKMA root key is used to determine the application key, and the application key is used for secure communication between the terminal device and the visiting application function network element.
上述方案,鉴权服务器功能网元确定终端设备处于漫游状态之后,可以生成AKMA根密钥,并经由家乡AKMA锚点功能网元向拜访AKMA锚点功能网元发送AKMA根密钥,该AKMA根密钥由拜访AKMA锚点功能网元使用,从而实现不同AKMA锚点功能网元之间的密钥隔离,即拜访AKMA锚点功能网元与家乡AKMA锚点功能网元使用不同的AKMA根密钥,有助于保证密钥安全性,进而提升通信的安全性。In the above solution, after the authentication server function network element determines that the terminal device is in the roaming state, it can generate an AKMA root key and send the AKMA root key to the visiting AKMA anchor point function network element through the home AKMA anchor point function network element. The key is used by the visiting AKMA anchor point function network element to achieve key isolation between different AKMA anchor point function network elements, that is, the visiting AKMA anchor point function network element and the home AKMA anchor point function network element use different AKMA root keys key, which helps ensure the security of the key and thereby improves the security of communication.
一种可能的实现方法中,该鉴权服务器功能网元存储该AKMA根密钥。In a possible implementation method, the authentication server functional network element stores the AKMA root key.
一种可能的实现方法中,该鉴权服务器功能网元向家乡AKMA锚点功能网元发送该AKMA根密钥。In a possible implementation method, the authentication server function network element sends the AKMA root key to the home AKMA anchor point function network element.
一种可能的实现方法中,该鉴权服务器功能网元根据该终端设备的VPLMN的信息,确定AKMA根密钥,包括:该鉴权服务器功能网元根据该终端设备的VPLMN的信息、该终端设备的用户永久标识SUPI和鉴权服务器功能根密钥,确定该AKMA根密钥。In a possible implementation method, the authentication server functional network element determines the AKMA root key based on the VPLMN information of the terminal device, including: the authentication server functional network element determines the AKMA root key based on the VPLMN information of the terminal device, the terminal The user permanent identification SUPI of the device and the authentication server function root key determine the AKMA root key.
一种可能的实现方法中,该鉴权服务器功能网元判断终端设备是否处于漫游状态,包括:该鉴权服务器功能网元根据该终端设备的HPLMN的信息、该鉴权服务器功能网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,判断该终端设备是否处于漫游状态。In a possible implementation method, the authentication server function network element determines whether the terminal device is in a roaming state, including: the authentication server function network element determines whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and the location where the authentication server function network element is located. One or more of the VPLMN information or the VPLMN information of the terminal device is used to determine whether the terminal device is in a roaming state.
第八方面,本申请实施例提供一种通信装置,该装置可以是网络存储功能网元,还可以是用于网络存储功能网元的芯片。该装置具有实现上述第一方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In an eighth aspect, embodiments of the present application provide a communication device. The device may be a network storage function network element, or may be a chip for a network storage function network element. The device has the function of implementing any implementation method of the above-mentioned first aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第九方面,本申请实施例提供一种通信装置,该装置可以是第一网元,还可以是用于第一网元的芯片。该装置具有实现上述第二方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a ninth aspect, embodiments of the present application provide a communication device, which may be a first network element or a chip used for the first network element. The device has the function of implementing any implementation method of the above second aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第十方面,本申请实施例提供一种通信装置,该装置可以是终端设备,还可以是用于终端设备的芯片。该装置具有实现上述第三方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功 能相对应的模块。In a tenth aspect, embodiments of the present application provide a communication device, which may be a terminal device or a chip for the terminal device. The device has the function of implementing any implementation method of the above third aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more functions related to the above Corresponding modules.
第十一方面,本申请实施例提供一种通信装置,该装置可以是拜访AKMA锚点功能网元,还可以是用于拜访AKMA锚点功能网元的芯片。该装置具有实现上述第四方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In an eleventh aspect, embodiments of the present application provide a communication device. The device may be a visiting AKMA anchor point function network element, or may be a chip used to visit an AKMA anchor point function network element. The device has the function of implementing any implementation method of the fourth aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第十二方面,本申请实施例提供一种通信装置,该装置可以是家乡AKMA锚点功能网元,还可以是用于家乡AKMA锚点功能网元的芯片。该装置具有实现上述第五方面或第六方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a twelfth aspect, embodiments of the present application provide a communication device. The device may be a home AKMA anchor point function network element, or may be a chip used for the home AKMA anchor point function network element. The device has the function of realizing any implementation method of the fifth aspect or the sixth aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第十三方面,本申请实施例提供一种通信装置,该装置可以是鉴权服务器功能网元,还可以是用于鉴权服务器功能网元的芯片。该装置具有实现上述第七方面的任意实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a thirteenth aspect, embodiments of the present application provide a communication device, which may be an authentication server functional network element, or may be a chip used for the authentication server functional network element. The device has the function of implementing any implementation method of the seventh aspect. This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions.
第十四方面,本申请实施例提供一种通信装置,包括与存储器耦合的处理器,该处理器用于调用所述存储器中存储的程序,以执行上述第一方面至第七方面中的任意实现方法。该存储器可以位于该装置之内,也可以位于该装置之外。且该处理器可以是一个或多个。In a fourteenth aspect, embodiments of the present application provide a communication device, including a processor coupled to a memory, and the processor is configured to call a program stored in the memory to execute any implementation of the above-mentioned first to seventh aspects. method. The memory may be located within the device or external to the device. And the processor can be one or more.
第十五方面,本申请实施例提供一种通信装置,包括处理器和存储器;该存储器用于存储计算机指令,当该装置运行时,该处理器执行该存储器存储的计算机指令,以使该装置执行上述第一方面至第七方面中的任意实现方法。In a fifteenth aspect, embodiments of the present application provide a communication device, including a processor and a memory; the memory is used to store computer instructions, and when the device is running, the processor executes the computer instructions stored in the memory, so that the device Execute any implementation method in the above first to seventh aspects.
第十六方面,本申请实施例提供一种通信装置,包括用于执行上述第一方面至第七方面中的任意实现方法的各个步骤的单元或手段(means)。In a sixteenth aspect, an embodiment of the present application provides a communication device, including units or means for executing each step of any implementation method in the above-mentioned first to seventh aspects.
第十七方面,本申请实施例提供一种通信装置,包括处理器和接口电路,所述处理器用于通过接口电路与其它装置通信,并执行上述第一方面至第七方面中的任意实现方法。该处理器包括一个或多个。In a seventeenth aspect, embodiments of the present application provide a communication device, including a processor and an interface circuit. The processor is configured to communicate with other devices through the interface circuit and perform any implementation method in the above-mentioned first to seventh aspects. . The processor includes one or more.
第十八方面,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在通信装置上运行时,使得上述第一方面至第七方面中的任意实现方法被执行。In an eighteenth aspect, embodiments of the present application further provide a computer-readable storage medium, in which instructions are stored, which, when run on a communication device, enable the above-described first to seventh aspects. Any implementation method of is executed.
第十九方面,本申请实施例还提供一种计算机程序产品,该计算机程序产品包括计算机程序或指令,当计算机程序或指令被通信装置运行时,使得上述第一方面至第七方面中的任意实现方法被执行。In a nineteenth aspect, embodiments of the present application further provide a computer program product. The computer program product includes a computer program or instructions. When the computer program or instructions are run by a communication device, any one of the above-mentioned first to seventh aspects is enabled. The implementation method is executed.
第二十方面,本申请实施例还提供一种芯片系统,包括:处理器,用于执行上述第一方面至第七方面中的任意实现方法。In a twentieth aspect, embodiments of the present application further provide a chip system, including: a processor, configured to execute any implementation method in the above-mentioned first to seventh aspects.
第二十一方面,本申请实施例还提供了一种通信系统,该通信系统包括用于执行上述第一方面任意实现方法的网络存储功能网元,和用于执行上述第二方面任意实现方法的第一网元。In a twenty-first aspect, embodiments of the present application also provide a communication system, which includes a network storage function network element for performing any implementation method of the first aspect, and a network storage function network element for performing any implementation method of the second aspect. the first network element.
第二十二方面,本申请实施例还提供了一种通信系统,该通信系统包括用于执行上述第四方面任意实现方法的拜访AKMA锚点功能网元,和用于执行上述第五方面任意实现方法的家乡AKMA锚点功能网元。In a twenty-second aspect, embodiments of the present application further provide a communication system, which includes a visiting AKMA anchor point function network element for performing any of the implementation methods of the fourth aspect, and a visiting AKMA anchor point function network element for performing any of the implementation methods of the fifth aspect. The home AKMA anchor function network element that implements the method.
第二十三方面,本申请实施例还提供一种通信方法,包括:当终端设备处于漫游状态,第一网元确定选择参数;所述第一网元向网络存储功能网元发送第一请求消息,所述第一 请求消息包括所述选择参数;所述网络存储功能网元根据所述第一请求消息中的所述选择参数,选择为所述终端设备提供服务的拜访AKMA锚点功能网元;所述网络存储功能网元向所述第一网元发送响应消息,所述响应消息包括所述拜访AKMA锚点功能网元的信息。In a twenty-third aspect, embodiments of the present application also provide a communication method, including: when the terminal device is in a roaming state, the first network element determines the selection parameters; the first network element sends a first request to the network storage function network element news, the first The request message includes the selection parameter; the network storage function network element selects the visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter in the first request message; the network storage function network element The functional network element sends a response message to the first network element, where the response message includes information about the visiting AKMA anchor functional network element.
附图说明Description of the drawings
图1为本申请实施例提供的一种通信系统示意图;Figure 1 is a schematic diagram of a communication system provided by an embodiment of the present application;
图2为基于服务化架构的5G网络架构示意图;Figure 2 is a schematic diagram of the 5G network architecture based on service-based architecture;
图3为基于点对点接口的5G网络架构示意图;Figure 3 is a schematic diagram of the 5G network architecture based on point-to-point interface;
图4为5G网络中增加AKMA相关功能的架构示意图;Figure 4 is an architectural diagram of adding AKMA related functions to the 5G network;
图5为本申请实施例提供的一种KAKMA的生成方法的示意图;Figure 5 is a schematic diagram of a KAKMA generation method provided by an embodiment of the present application;
图6为本申请实施例提供的一种KAKMA的使用方法的示意图;Figure 6 is a schematic diagram of a method of using K AKMA provided by the embodiment of the present application;
图7为本申请实施例提供的一种KAKMA的使用方法的示意图;Figure 7 is a schematic diagram of a method of using K AKMA provided by the embodiment of the present application;
图8为本实施例提供的AKMA漫游架构示意图;Figure 8 is a schematic diagram of the AKMA roaming architecture provided in this embodiment;
图9(a)为本申请实施例提供的一种通信方法的流程示意图;Figure 9(a) is a schematic flow chart of a communication method provided by an embodiment of the present application;
图9(b)为本申请实施例提供的一种通信方法的流程示意图;Figure 9(b) is a schematic flow chart of a communication method provided by an embodiment of the present application;
图9(c)为本申请实施例提供的一种通信方法的流程示意图;Figure 9(c) is a schematic flow chart of a communication method provided by an embodiment of the present application;
图10为本申请实施例提供的一种通信方法的流程示意图;Figure 10 is a schematic flow chart of a communication method provided by an embodiment of the present application;
图11为本申请实施例提供的一种通信方法的流程示意图;Figure 11 is a schematic flow chart of a communication method provided by an embodiment of the present application;
图12为本申请实施例提供的一种通信方法的流程示意图;Figure 12 is a schematic flow chart of a communication method provided by an embodiment of the present application;
图13为本申请实施例提供的一种通信装置示意图;Figure 13 is a schematic diagram of a communication device provided by an embodiment of the present application;
图14为本申请实施例提供的一种通信装置示意图。Figure 14 is a schematic diagram of a communication device provided by an embodiment of the present application.
具体实施方式Detailed ways
为实现保障终端设备与AF网元之间的安全通信,本申请提供一种通信系统,参考图1,该系统包括网络存储功能网元和第一网元,可选的该系统还包括家乡AKMA锚点功能网元和拜访AKMA锚点功能网元。图1所示的系统可以用在图2至图4所示的第五代(5th generation,5G)网络架构中,当然,也可以用在未来网络架构,比如第六代(6th generation,6G)网络架构等,本申请不做限定。In order to ensure secure communication between terminal equipment and AF network elements, this application provides a communication system. Refer to Figure 1. The system includes a network storage function network element and a first network element. Optionally, the system also includes a home AKMA. Anchor function network element and access AKMA anchor function network element. The system shown in Figure 1 can be used in the fifth generation (5G) network architecture shown in Figures 2 to 4. Of course, it can also be used in future network architectures, such as the sixth generation (6th generation, 6G). Network architecture, etc., are not limited by this application.
该第一网元,用于当终端设备处于漫游状态,确定选择参数;向网络存储功能网元发送第一请求消息,该第一请求消息包括该选择参数。该网络存储功能网元,用于接收来自该第一网元的该第一请求消息;根据该第一请求消息中的该选择参数,选择为该终端设备提供服务的拜访AKMA锚点功能网元;向该第一网元发送响应消息,该响应消息包括该拜访AKMA锚点功能网元的信息。该第一网元,还用于接收该响应消息。The first network element is used to determine selection parameters when the terminal device is in a roaming state; and send a first request message to the network storage function network element, where the first request message includes the selection parameter. The network storage function network element is configured to receive the first request message from the first network element; and select the visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter in the first request message. ; Send a response message to the first network element, where the response message includes information about the visited AKMA anchor point function network element. The first network element is also used to receive the response message.
一种可能的实现方法中,该第一网元,还用于根据该拜访AKMA锚点功能网元的信息,向该拜访AKMA锚点功能网元发送第二请求消息,该第二请求消息请求用于拜访应用功能网元与该终端设备之间进行安全通信的第一应用密钥;该拜访AKMA锚点功能网元,用于接收该第二请求消息;获取第一AKMA根密钥;根据该第一AKMA根密钥确定该第一应用密钥;以及向该第一网元发送该第一应用密钥。 In a possible implementation method, the first network element is also configured to send a second request message to the visited AKMA anchor function network element according to the information of the visited AKMA anchor function network element. The second request message requests The first application key used for secure communication between the visiting application function network element and the terminal device; the visiting AKMA anchor point function network element is used to receive the second request message; obtain the first AKMA root key; according to The first AKMA root key determines the first application key; and sends the first application key to the first network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元,用于获取该第一AKMA根密钥;以及向该拜访AKMA锚点功能网元发送该第一AKMA根密钥;该拜访AKMA锚点功能网元,具体用于接收来自该家乡AKMA锚点功能网元的该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor function network element is used to obtain the first AKMA root key; and send the first AKMA root key to the visiting AKMA anchor function network element; the visiting AKMA The anchor function network element is specifically configured to receive the first AKMA root key from the home AKMA anchor function network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元,具体用于根据第二AKMA根密钥,确定该第一AKMA根密钥,该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In a possible implementation method, the home AKMA anchor function network element is specifically used to determine the first AKMA root key based on the second AKMA root key, and the second AKMA root key is used to determine the second application. The second application key is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,该家乡AKMA锚点功能网元,具体用于根据该第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor point function network element is specifically configured to determine the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. The first AKMA root key.
一种可能的实现方法中,该家乡AKMA锚点功能网元,具体用于接收来自鉴权服务器功能网元的该第一AKMA根密钥。In a possible implementation method, the home AKMA anchor function network element is specifically configured to receive the first AKMA root key from the authentication server function network element.
一种可能的实现方法中,该第一网元是拜访应用功能网元;该拜访应用功能网元,还用于接收来自该终端设备的应用会话建立请求消息,该应用会话建立请求消息包括用于确定该选择参数的信息。In a possible implementation method, the first network element is a visiting application function network element; the visiting application function network element is also used to receive an application session establishment request message from the terminal device, where the application session establishment request message includes information used to determine the selection parameters.
一种可能的实现方法中,该第一网元是网络开放功能网元;该网络开放功能网元,还接收来自拜访应用功能网元的应用密钥请求消息,该应用密钥请求消息包括用于确定该选择参数的信息。In a possible implementation method, the first network element is a network open function network element; the network open function network element also receives an application key request message from a visiting application function network element, where the application key request message includes information used to determine the selection parameters.
一种可能的实现方法中,该网络存储功能网元,具体用于当该网络存储功能网元存储有该选择参数对应的AKMA锚点功能网元,则选择该选择参数对应的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元;或者,当该网络存储功能网元未存储该选择参数对应的AKMA锚点功能网元,则选择默认的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元。In a possible implementation method, the network storage function network element is specifically used to select the AKMA anchor point function corresponding to the selection parameter when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter. network element as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, select the default AKMA anchor point function network element as the visiting AKMA anchor function network element.
一种可能的实现方法中,该选择参数包括该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个;该网络存储功能网元,还用于根据该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,确定该终端设备处于漫游状态。In a possible implementation method, the selection parameter includes one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device; the network storage function network element, and is also used to determine that the terminal device is in a roaming state based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device.
一种可能的实现方法中,该网络存储功能网元,还用于根据收到的指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the network storage function network element is also used to determine that the terminal device is in a roaming state based on the received indication information.
一种可能的实现方法中,该网络存储功能网元,还用于根据该网络存储功能网元的PLMN的信息和该终端设备的HPLMN的信息,确定该终端设备处于漫游状态。In a possible implementation method, the network storage function network element is also used to determine that the terminal device is in a roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
一种可能的实现方法中,该第一网元,还用于根据该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,确定该终端设备处于漫游状态。In a possible implementation method, the first network element is also configured to use one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. , confirm that the terminal device is in roaming state.
一种可能的实现方法中,该第一网元,还用于向该终端设备发送指示信息,该指示信息指示该终端设备处于漫游状态。In a possible implementation method, the first network element is also configured to send indication information to the terminal device, where the indication information indicates that the terminal device is in a roaming state.
一种可能的实现方法中,该第一网元,具体用于根据第一AKMA密钥标识或第二AKMA密钥标识,确定该选择参数;其中,该第一AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识、该终端设备的HPLMN的信息和该终端设备的VPLMN的信息;该第二AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识和该终端设备的HPLMN的信息。 In a possible implementation method, the first network element is specifically configured to determine the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein the first AKMA key identifier includes the terminal device The routing identifier, the AKMA temporary identifier of the terminal device, the HPLMN information of the terminal device, and the VPLMN information of the terminal device; the second AKMA key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device and the HPLMN information of the terminal device.
系统中各个网元之间的交互,以及具体的执行,可以参考下面方法实施例,这里不再赘述。为了应对无线宽带技术的挑战,保持3GPP网络的领先优势,3GPP标准组制定了下一代移动通信网络系统(Next Generation System)架构,称为5G网络架构。该架构不但支持3GPP标准组定义的无线接入技术(如长期演进(long term evolution,LTE)接入技术,5G无线接入网(radio access network,RAN)接入技术等)接入到5G核心网(core network,CN),而且支持使用非3GPP(non-3GPP)接入技术通过非3GPP转换功能(non-3GPP interworking function,N3IWF)或下一代接入网关(next generation packet data gateway,ngPDG)接入到核心网。For the interaction between various network elements in the system and the specific execution, please refer to the following method embodiments and will not be described again here. In order to meet the challenges of wireless broadband technology and maintain the leading edge of 3GPP networks, the 3GPP standards group formulated the next generation mobile communication network system (Next Generation System) architecture, called 5G network architecture. This architecture not only supports wireless access technologies defined by the 3GPP standards group (such as long term evolution (LTE) access technology, 5G radio access network (RAN) access technology, etc.) to be connected to the 5G core Core network (CN), and supports the use of non-3GPP (non-3GPP) access technology through non-3GPP interworking function (N3IWF) or next generation packet data gateway (ngPDG) Access to the core network.
图2为基于服务化架构的5G网络架构示意图。图2所示的5G网络架构中可包括接入网设备以及核心网设备。终端设备通过接入网设备和核心网设备接入数据网络(data network,DN)。其中,核心网设备包括但不限于以下网元中的部分或者全部:鉴权服务器功能(authentication server function,AUSF)网元(图中未示出)、统一数据管理(unified data management,UDM)网元、统一数据库(unified data repository,UDR)网元、网络存储功能(network repository function,NRF)网元(图中未示出)、网络开放功能(network exposure function,NEF)网元(图中未示出)、应用功能(application function,AF)网元、策略控制功能(policy control function,PCF)网元、接入与移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、绑定支持功能(binding support function,BSF)网元(图中未示出)。Figure 2 is a schematic diagram of the 5G network architecture based on service-based architecture. The 5G network architecture shown in Figure 2 may include access network equipment and core network equipment. Terminal equipment is connected to the data network (DN) through access network equipment and core network equipment. Among them, the core network equipment includes but is not limited to some or all of the following network elements: authentication server function (AUSF) network element (not shown in the figure), unified data management (UDM) network element Element, unified data repository (UDR) network element, network repository function (NRF) network element (not shown in the figure), network exposure function (NEF) network element (not shown in the figure) shown), application function (AF) network element, policy control function (PCF) network element, access and mobility management function (AMF) network element, session management function (session management function, SMF) network element, user plane function (UPF) network element, binding support function (BSF) network element (not shown in the figure).
终端设备可以是用户设备(user equipment,UE)、移动台、移动终端设备等。终端设备可以广泛应用于各种场景,例如,设备到设备(device-to-device,D2D)、车物(vehicle to everything,V2X)通信、机器类通信(machine-type communication,MTC)、物联网(internet of things,IOT)、虚拟现实、增强现实、工业控制、自动驾驶、远程医疗、智能电网、智能家具、智能办公、智能穿戴、智能交通、智慧城市等。终端设备可以是手机、平板电脑、带无线收发功能的电脑、可穿戴设备、车辆、城市空中交通工具(如无人驾驶机、直升机等)、轮船、机器人、机械臂、智能家居设备等。终端设备中存储有长期密钥和相关函数。终端设备在与核心网网元(如AMF网元、AUSF网元)进行双向鉴权的时候,会使用长期密钥和相关函数验证网络的真实性。The terminal equipment can be user equipment (UE), mobile station, mobile terminal equipment, etc. Terminal devices can be widely used in various scenarios, such as device-to-device (D2D), vehicle to everything (V2X) communication, machine-type communication (MTC), and the Internet of Things (internet of things, IOT), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, etc. Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, wearable devices, vehicles, urban air vehicles (such as drones, helicopters, etc.), ships, robots, robotic arms, smart home devices, etc. Long-term keys and related functions are stored in the terminal device. When the terminal device performs two-way authentication with core network elements (such as AMF network elements and AUSF network elements), it will use long-term keys and related functions to verify the authenticity of the network.
接入网设备可以是无线接入网设备(RAN设备)或有线接入网设备。其中,无线接入网设备包括3GPP接入网设备、非可信非3GPP接入网设备和可信非3GPP接入网设备。3GPP接入网设备包括但不限于:LTE中的演进型基站(evolved NodeB,eNodeB)、5G移动通信系统中的下一代基站(next generation NodeB,gNB)、未来移动通信系统中的基站或完成基站部分功能的模块或单元,如集中式单元(central unit,CU),分布式单元(distributed unit,DU)等。非可信非3GPP接入网设备包括但不限于:非可信非3GPP接入网关或N3IWF设备、非可信无线局域网(wireless local area network,WLAN)接入点(access point,AP)、交换机、路由器。可信非3GPP接入网设备包括但不限于:可信非3GPP接入网关、可信WLAN AP、交换机、路由器。有线接入网设备包括但不限于:有线接入网关(wireline access gateway)、固定电话网络设备、交换机、路由器。The access network equipment may be a wireless access network equipment (RAN equipment) or a wired access network equipment. Among them, wireless access network equipment includes 3GPP access network equipment, untrusted non-3GPP access network equipment and trusted non-3GPP access network equipment. 3GPP access network equipment includes but is not limited to: evolved base stations (evolved NodeB, eNodeB) in LTE, next generation base stations (next generation NodeB, gNB) in 5G mobile communication systems, base stations or completed base stations in future mobile communication systems Modules or units with partial functions, such as centralized units (CU), distributed units (DU), etc. Untrusted non-3GPP access network equipment includes but is not limited to: untrusted non-3GPP access gateway or N3IWF equipment, untrusted wireless local area network (WLAN) access point (access point, AP), switch ,router. Trusted non-3GPP access network equipment includes but is not limited to: trusted non-3GPP access gateways, trusted WLAN APs, switches, and routers. Wired access network equipment includes but is not limited to: wired access gateway, fixed telephone network equipment, switches, and routers.
接入网设备和终端设备可以是固定位置的,也可以是可移动的。接入网设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署 在空中的飞机、气球和人造卫星上。本申请的实施例对接入网设备和终端设备的应用场景不做限定。Access network equipment and terminal equipment can be fixed-position or removable. Access network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on water; they can also be deployed On planes, balloons and satellites in the sky. The embodiments of this application do not limit the application scenarios of access network equipment and terminal equipment.
AMF网元,包含执行移动性管理、接入鉴权/授权等功能。此外,还负责在终端设备与PCF间传递用户策略。AMF network elements include functions such as mobility management and access authentication/authorization. In addition, it is also responsible for transmitting user policies between the terminal device and the PCF.
SMF网元,包含执行会话管理、执行PCF网元下发的控制策略、选择UPF网元或分配终端设备的互联网协议(internet protocol,IP)地址等功能。SMF network elements include functions such as performing session management, executing control policies issued by PCF network elements, selecting UPF network elements, or allocating Internet Protocol (IP) addresses of terminal devices.
UPF网元,包含完成用户面数据转发、基于会话/流级的计费统计或带宽限制等功能。The UPF network element includes functions such as user plane data forwarding, session/flow level-based billing statistics or bandwidth limitation.
UDM网元,包含执行管理签约数据或用户接入授权等功能。UDM network elements include functions such as execution and management of contract data or user access authorization.
UDR,包含执行签约数据、策略数据或应用数据等类型数据的存取功能。UDR includes access functions for executing contract data, policy data or application data.
NEF网元,用于支持能力和事件的开放。NEF network element is used to support the opening of capabilities and events.
AF网元,传递应用侧对网络侧的需求,例如,QoS需求或用户状态事件订阅等。AF可以是第三方功能实体,也可以是运营商部署的应用服务,如IP多媒体子系统(IP Multimedia Subsystem,IMS)语音呼叫业务。其中,AF网元包括核心网内的AF网元(即运营商的AF网元)和第三方AF网元(如某个企业的应用服务器)。AF network element transmits the requirements from the application side to the network side, such as QoS requirements or user status event subscriptions. AF can be a third-party functional entity or an application service deployed by an operator, such as IP Multimedia Subsystem (IMS) voice call service. Among them, AF network elements include AF network elements within the core network (that is, the operator's AF network elements) and third-party AF network elements (such as an enterprise's application server).
PCF网元,包含负责针对会话、业务流级别进行计费、QoS带宽保障及移动性管理或终端设备策略决策等策略控制功能。PCF网元包括接入与移动性管理策略控制网元(access and mobility management policy control function,AM PCF)网元和会话管理策略控制功能(session management PCF,SM PCF)网元。其中,AM PCF网元用于为终端设备制定AM策略和用户策略,AM PCF网元也可以称为为终端设备提供服务的策略控制网元(PCF for a UE))。SM PCF网元用于为会话制定会话管理策略(session management policy,SM策略),SM PCF网元也可以称为为会话提供服务的策略控制网元((PCF for a PDU session))。The PCF network element includes policy control functions such as session and service flow level billing, QoS bandwidth guarantee, mobility management, or terminal device policy decision-making. PCF network elements include access and mobility management policy control function (AM PCF) network elements and session management policy control function (session management PCF, SM PCF) network elements. Among them, the AM PCF network element is used to formulate AM policies and user policies for terminal equipment. The AM PCF network element can also be called the policy control network element (PCF for a UE) that provides services for terminal equipment). The SM PCF network element is used to formulate a session management policy (SM policy) for the session. The SM PCF network element can also be called a policy control network element that provides services for the session ((PCF for a PDU session)).
NRF网元,可用于提供网元发现功能,基于其他网元的请求,提供网元类型对应的网元信息。NRF网元还提供网元管理服务,如网元注册、更新、去注册以及网元状态订阅和推送等。NRF network elements can be used to provide network element discovery functions and provide network element information corresponding to network element types based on requests from other network elements. NRF network elements also provide network element management services, such as network element registration, update, de-registration, network element status subscription and push, etc.
BSF网元,可提供BSF服务注册/注销/更新,与NRF网元连接检测,会话绑定信息创建,终端设备信息的获取,或IP地址重复的会话绑定信息查询等功能。The BSF network element can provide functions such as BSF service registration/unregistration/update, connection detection with NRF network elements, session binding information creation, terminal device information acquisition, or session binding information query for duplicate IP addresses.
AUSF网元,负责对用户进行鉴权,以确定是否允许用户或设备接入网络。The AUSF network element is responsible for authenticating users to determine whether users or devices are allowed to access the network.
DN,是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端设备提供数据和/或语音等服务。例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端设备,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端设备,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。DN is a network located outside the operator's network. The operator's network can access multiple DNs. A variety of services can be deployed on the DN, which can provide data and/or voice services to terminal devices. For example, DN is a private network of a smart factory. The sensors installed in the workshop of the smart factory can be terminal devices. The control server of the sensor is deployed in the DN, and the control server can provide services for the sensor. The sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions. For another example, DN is the internal office network of a company. The mobile phones or computers of employees of the company can be used as terminal devices. The employees' mobile phones or computers can access information and data resources on the company's internal office network.
图2中Npcf、Nudr、Nudm、Naf、Namf、Nsmf分别为上述PCF、UDR、UDM、AF、AMF和SMF提供的服务化接口,用于调用相应的服务化操作。N1、N2、N3、N4以及N6为接口序列号,这些接口序列号的含义如下:In Figure 2, Npcf, Nudr, Nudm, Naf, Namf, and Nsmf are the service interfaces provided by the above-mentioned PCF, UDR, UDM, AF, AMF, and SMF respectively, and are used to call corresponding service operations. N1, N2, N3, N4 and N6 are interface serial numbers. The meanings of these interface serial numbers are as follows:
1)、N1:AMF网元与终端设备之间的接口,可以用于向终端设备传递非接入层(non access stratum,NAS)信令(如包括来自AMF网元的QoS规则)等。1), N1: The interface between the AMF network element and the terminal device can be used to transmit non-access stratum (NAS) signaling (such as QoS rules from the AMF network element) to the terminal device.
2)、N2:AMF网元与接入网设备之间的接口,可以用于传递核心网侧至接入网设备 的无线承载控制信息等。2), N2: The interface between the AMF network element and the access network equipment, which can be used to transfer the core network side to the access network equipment. wireless bearer control information, etc.
3)、N3:接入网设备与UPF网元之间的接口,主要用于传递接入网设备与UPF网元间的上下行用户面数据。3), N3: The interface between the access network equipment and the UPF network element, mainly used to transmit uplink and downlink user plane data between the access network equipment and the UPF network element.
4)、N4:SMF网元与UPF网元之间的接口,可以用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS规则、流量统计规则等的下发以及用户面的信息上报。4), N4: The interface between the SMF network element and the UPF network element can be used to transfer information between the control plane and the user plane, including controlling the delivery of user-oriented forwarding rules, QoS rules, traffic statistics rules, etc. Report information on the user interface.
5)、N6:UPF网元与DN的接口,用于传递UPF网元与DN之间的上下行用户数据流。5), N6: The interface between the UPF network element and the DN, used to transmit the uplink and downlink user data flows between the UPF network element and the DN.
图3为基于点对点接口的5G网络架构示意图,其中的网元的功能的介绍可以参考图2中对应的网元的功能的介绍,不再赘述。图3与图2的主要区别在于:图2中的各个控制面网元之间的接口是服务化的接口,图3中的各个控制面网元之间的接口是点对点的接口。Figure 3 is a schematic diagram of the 5G network architecture based on point-to-point interfaces. For the introduction of the functions of the network elements, please refer to the introduction of the functions of the corresponding network elements in Figure 2 and will not be described again. The main difference between Figure 3 and Figure 2 is that the interfaces between the control plane network elements in Figure 2 are service-oriented interfaces, while the interfaces between the control plane network elements in Figure 3 are point-to-point interfaces.
在图3所示的架构中,各个网元之间的接口名称及功能如下:In the architecture shown in Figure 3, the interface names and functions between each network element are as follows:
1)、N1、N2、N3、N4和N6接口的含义可以参考前述描述。1), the meaning of N1, N2, N3, N4 and N6 interfaces can refer to the previous description.
2)、N5:AF网元与PCF网元之间的接口,可以用于应用业务请求下发以及网络事件上报。2), N5: The interface between the AF network element and the PCF network element, which can be used to deliver application service requests and report network events.
3)、N7:PCF网元与SMF网元之间的接口,可以用于下发PDU会话粒度以及业务数据流粒度控制策略。3), N7: The interface between the PCF network element and the SMF network element, which can be used to deliver PDU session granularity and service data flow granularity control policies.
4)、N8:AMF网元与UDM网元间的接口,可以用于AMF网元向UDM网元获取接入与移动性管理相关签约数据与鉴权数据,以及AMF向UDM注册终端设备移动性管理相关信息等。4), N8: The interface between AMF network elements and UDM network elements, which can be used by AMF network elements to obtain access and mobility management-related subscription data and authentication data from UDM network elements, and for AMF to register terminal device mobility with UDM Management related information, etc.
5)、N9:UPF网元和UPF网元之间的用户面接口,用于传递UPF网元间的上下行用户数据流。5), N9: The user plane interface between UPF network elements and UPF network elements, used to transmit uplink and downlink user data flows between UPF network elements.
6)、N10:SMF网元与UDM网元间的接口,可以用于SMF网元向UDM网元获取会话管理相关签约数据,以及SMF网元向UDM注册终端设备会话相关信息等。6), N10: The interface between the SMF network element and the UDM network element, which can be used for the SMF network element to obtain session management-related contract data from the UDM network element, and for the SMF network element to register terminal device session-related information with UDM.
7)、N11:SMF网元与AMF网元之间的接口,可以用于传递接入网设备和UPF网元之间的PDU会话隧道信息、传递发送给终端设备的控制消息、传递发送给接入网设备的无线资源控制信息等。7), N11: The interface between the SMF network element and the AMF network element can be used to transfer PDU session tunnel information between the access network device and the UPF network element, transfer control messages sent to the terminal device, and transfer data sent to the access network device. Wireless resource control information of network-connected devices, etc.
8)、N15:PCF网元与AMF网元之间的接口,可以用于下发终端设备策略及接入控制相关策略。8), N15: The interface between the PCF network element and the AMF network element, which can be used to deliver terminal device policies and access control-related policies.
9)、N35:UDM网元与UDR网元间的接口,可以用于UDM网元从UDR网元中获取用户签约数据信息。9), N35: The interface between UDM network element and UDR network element, which can be used by UDM network element to obtain user subscription data information from UDR network element.
10)、N36:PCF网元与UDR网元间的接口,可以用于PCF网元从UDR网元中获取策略相关签约数据以及应用数据相关信息。10), N36: The interface between PCF network element and UDR network element, which can be used by PCF network element to obtain policy-related contract data and application data-related information from UDR network element.
图4为5G网络中增加AKMA相关功能的架构示意图。该图4是在图1所示的5G架构中增加AKMA相关功能,当然也可以在图2所示的5G架构中增加AKMA相关功能,其原理也是类似的,不再赘述。Figure 4 is an architectural diagram of adding AKMA related functions to the 5G network. Figure 4 shows AKMA-related functions added to the 5G architecture shown in Figure 1. Of course, AKMA-related functions can also be added to the 5G architecture shown in Figure 2. The principles are similar and will not be described again.
图4中新增了AAnF网元,该AAnF网元可以向AUSF请求AKMA根密钥(即KAKMA),然后AAnF网元根据KAKMA确定AF使用的应用密钥(即KAF)和KAF的有效时间。The AAnF network element is added in Figure 4. The AAnF network element can request the AKMA root key (i.e., K AKMA ) from the AUSF, and then the AAnF network element determines the application key (i.e., K AF ) and K AF used by the AF based on K AKMA . effective time.
在图4所示的AKMA场景中,AF网元需要与AAnF网元交互,获得KAF和KAF的有效时间。AF网元的位置可以在5G核心网内部,也可以在5G核心网外部。如果AF网元 在5G核心网内部,则AF网元可以直接与PCF网元交互。如果AF网元在5G核心网外部,则AF网元可以经由NEF网元与PCF网元交互,也即NEF网元作为AF网元与PCF网元之间的中间网元。In the AKMA scenario shown in Figure 4, the AF network element needs to interact with the AAnF network element to obtain K AF and the effective time of K AF . The location of the AF network element can be inside the 5G core network or outside the 5G core network. If AF network element Within the 5G core network, the AF network element can directly interact with the PCF network element. If the AF network element is outside the 5G core network, the AF network element can interact with the PCF network element via the NEF network element, that is, the NEF network element serves as the intermediate network element between the AF network element and the PCF network element.
在图4所示的AKMA场景中,AUSF网元可以为AAnF网元生成KAKMAIn the AKMA scenario shown in Figure 4, the AUSF network element can generate K AKMA for the AAnF network element.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选的,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。It can be understood that the above network elements or functions can be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform). Optionally, the above network element or function can be implemented by one device, or can be implemented by multiple devices together, or can be a functional module in one device, which is not specifically limited in the embodiments of this application.
为便于说明,本申请实施例以UE作为终端设备的一个示例进行说明,以下描述的UE均可以替换为终端设备。以及,本申请实施例将AUSF网元、UDM网元、AMF网元、AAnF网元、AF网元、NEF网元、NRF网元分别简称为AUSF、UDM、AMF、AAnF、AF、NEF、NRF。For ease of explanation, the embodiment of the present application uses a UE as an example of a terminal device. The UE described below can be replaced with a terminal device. And, in the embodiment of this application, the AUSF network element, UDM network element, AMF network element, AAnF network element, AF network element, NEF network element, and NRF network element are respectively abbreviated as AUSF, UDM, AMF, AAnF, AF, NEF, and NRF. .
为便于理解本发明,下面结合图5至图7,介绍一种KAKMA的生成方法以及KAKMA的使用方法。In order to facilitate understanding of the present invention, a method of generating KAKMA and a method of using KAKMA are introduced below with reference to Figures 5 to 7.
图5为本申请实施例提供的一种KAKMA的生成方法的示意图。该方法包括以下步骤:Figure 5 is a schematic diagram of a KAKMA generation method provided by an embodiment of the present application. The method includes the following steps:
步骤501,AUSF向UDM发送认证请求消息。相应地,UDM接收该认证请求消息。Step 501: AUSF sends an authentication request message to UDM. Accordingly, UDM receives the authentication request message.
该认证请求消息中包括签约永久标识(Subscription Permanent Identifier,SUPI)或者签约隐藏标识(subscription concealed identifier,SUCI),该消息认证请求用于向UDM请求鉴权向量,该鉴权向量用于触发核心网与UE之间的主鉴权(Primary authentication)。当AMF向AUSF提供的是SUCI,则该认证请求消息中包括SUCI。当AMF向AUSF提供的是SUPI,则该认证请求消息中包括SUPI。The authentication request message includes a Subscription Permanent Identifier (SUPI) or a Subscription Concealed Identifier (SUCI). The authentication request message is used to request an authentication vector from the UDM. The authentication vector is used to trigger the core network. Primary authentication with UE. When the AMF provides SUCI to the AUSF, the authentication request message includes the SUCI. When AMF provides SUPI to AUSF, the authentication request message includes SUPI.
该认证请求消息可以是Numd_UEAuthentication Get Request消息。The authentication request message may be a Numd_UEAuthentication Get Request message.
步骤502,UDM向AUSF发送认证响应消息。相应地,AUSF接收该认证响应消息。Step 502: UDM sends an authentication response message to AUSF. Accordingly, the AUSF receives the authentication response message.
该认证响应消息中包括鉴权向量。The authentication response message includes the authentication vector.
如果UDM根据UE的签约信息,确定UE支持AKMA业务,则该认证响应消息还包含AKMA指示信息。其中,UE支持AKMA业务指的是UE具备AKMA能力且UE的业务能够使用AKMA。If the UDM determines that the UE supports the AKMA service based on the UE's subscription information, the authentication response message also contains AKMA indication information. Among them, the UE supporting the AKMA service means that the UE has the AKMA capability and the UE's services can use AKMA.
该认证响应消息可以是Num_UEAuthentication_Get Response消息。The authentication response message may be a Num_UEAuthentication_Get Response message.
步骤503,如果AUSF从UDM收到AKMA指示信息,则AUSF在主鉴权流程成功完成后,根据AUSF根密钥(KAUSF)生成KAKMA和AKMA密钥标识(AKMA key identifier,A-KID)。Step 503, if the AUSF receives the AKMA indication information from the UDM, the AUSF generates K AKMA and AKMA key identifier (A-KID) based on the AUSF root key (K AUSF ) after the main authentication process is successfully completed. .
其中,A-KID用于标识KAKMAAmong them, A-KID is used to identify K AKMA .
A-KID是网络接入标识(Network Access Identifier,NAI)格式,即username@exmaple。其中,username部分包括路由标识(routing Identifier,RID)和AKMA临时标识(AKMA Temporary UE Identifier,A-TID)。RID是SUCI中的一部分,由1~4个十进制数字表示。A-TID是根据KAUSF生成的一个临时标识。example部分包括家乡网络标识(HomeNetworkIdentifier),家乡网络标识具体可以是家乡公共陆地移动网络的标识信息(Home Public Land Mobile NetworkIdentifier,HPLMN ID)。其中,家乡公共陆地移动网络也称为归属公共陆地移动网络或归属地公共陆地移动网络。A-KID is in Network Access Identifier (NAI) format, which is username@exmaple. The username part includes a routing identifier (RID) and an AKMA Temporary UE Identifier (A-TID). RID is part of SUCI and is represented by 1 to 4 decimal digits. A-TID is a temporary identification generated based on K AUSF . The example part includes a home network identifier (HomeNetworkIdentifier), and the home network identifier may specifically be the identification information of the home public land mobile network (Home Public Land Mobile Network Identifier, HPLMN ID). Among them, the home public land mobile network is also called the home public land mobile network or the home public land mobile network.
需要说明的是,该RID可以用于AMF选择AUSF,比如AMF根据RID和HPLMN ID 选择AUSF。该RID还可以用于AUSF选择UDM,比如AUSF根据RID和HPLMN ID选择UDM。It should be noted that this RID can be used by AMF to select AUSF. For example, AMF can select AUSF based on RID and HPLMN ID. Select AUSF. The RID can also be used by AUSF to select UDM. For example, AUSF selects UDM based on RID and HPLMN ID.
相应地,UE在主鉴权流程之后,也按照与AUSF相同的方法,根据KAUSF生成KAKMA和A-KID。Correspondingly, after the main authentication process, the UE also generates K AKMA and A-KID based on K AUSF in the same method as AUSF.
步骤504,AUSF选择一个AAnF,并向选择的AAnF发送密钥注册请求消息。相应地,AAnF接收该密钥注册请求消息。Step 504: AUSF selects an AAnF and sends a key registration request message to the selected AAnF. Correspondingly, AAnF receives the key registration request message.
该密钥注册请求消息中包括SUPI,A-KID和KAKMAThe key registration request message includes SUPI, A-KID and K AKMA .
该密钥注册请求消息可以是Naanf_AKMA_AnchorKey_Register Request消息。The key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
步骤505,AAnF向AUSF发送密钥注册响应消息。相应地,AUSF接收该密钥注册响应消息。Step 505: AAnF sends a key registration response message to AUSF. Correspondingly, AUSF receives the key registration response message.
该密钥注册响应消息可以是Naanf_AKMA_AnchorKey_RegisterResponse消息。The key registration response message may be a Naanf_AKMA_AnchorKey_RegisterResponse message.
步骤506,AUSF删除KAKMA和A-KID。Step 506, AUSF deletes K AKMA and A-KID.
通过上述方案,UE和AAnF生成相同的KAKMA,便于后续UE和AF使用该KAKMA推衍得到其它密钥。Through the above solution, the UE and AAnF generate the same KAKMA , which facilitates subsequent UE and AF to use the KAKMA to derive other keys.
图6为本申请实施例提供的一种KAKMA的使用方法的示意图。该方法中,AF属于3GPP核心网中的一个网元。该方法包括以下步骤:Figure 6 is a schematic diagram of a method of using KAKMA provided by an embodiment of the present application. In this method, AF belongs to a network element in the 3GPP core network. The method includes the following steps:
步骤601,UE向AF发送应用会话建立请求(Application Session Establishment Request)消息。相应地,AF接收该应用会话建立请求消息。Step 601, the UE sends an Application Session Establishment Request message to the AF. Correspondingly, the AF receives the application session establishment request message.
该应用会话建立请求消息中包括A-KID,该A-KID用于AAnF查找A-KID对应的KAKMAThe application session establishment request message includes the A-KID, and the A-KID is used by AAnF to find the KAKMA corresponding to the A-KID.
该A-KID是在步骤601之前,在主鉴权流程以及KAKMA生成流程中,由UE生成的。其中,主鉴权流程以及KAKMA生成流程即为图5所示的流程。The A-KID is generated by the UE in the main authentication process and K AKMA generation process before step 601. Among them, the main authentication process and the K AKMA generation process are the processes shown in Figure 5.
步骤602,AF向AAnF发送应用密钥请求消息。相应地,AAnF接收该应用密钥请求消息。Step 602: AF sends an application key request message to AAnF. Accordingly, AAnF receives the application key request message.
该应用密钥请求消息中包括A-KID和AF ID。该A-KID来自步骤601。该AFID用于标识AF。The application key request message includes A-KID and AF ID. This A-KID comes from step 601. This AFID is used to identify the AF.
其中,AF可以根据UE的RID选择AAnF。Among them, the AF can select AAnF according to the RID of the UE.
该应用密钥请求消息可以是Naanf_AKMA_ApplicationKey_Get_Request消息。The application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
步骤603,AAnF根据A-KID获取KAKMA,并根据KAKMA以及AF ID生成KAF,以及确定KAF的有效时间。Step 603: AAnF obtains KAKMA based on A-KID, generates K AF based on KAKMA and AF ID, and determines the validity time of K AF .
其中,AAnF是在主鉴权流程以及KAKMA生成流程中获取到A-KID和A-KID对应的KAKMAAmong them, AAnF obtains A-KID and KAKMA corresponding to A-KID in the main authentication process and KAKMA generation process.
步骤604,AAnF向AF发送应用密钥响应消息。相应地,AF接收该应用密钥响应消息。Step 604: AAnF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
该应用密钥响应消息中包括KAF以及KAF的有效时间。The application key response message includes K AF and the validity time of K AF .
该应用密钥响应消息可以是Naanf_AKMA_ApplicationKey_Get Response消息。The application key response message may be a Naanf_AKMA_ApplicationKey_Get Response message.
步骤605,AF向UE发送应用会话建立响应(Application Session Establishment Response)消息。相应地,UE接收应用会话建立响应消息。Step 605: The AF sends an Application Session Establishment Response message to the UE. Correspondingly, the UE receives the application session establishment response message.
需要说明的是,UE在主鉴权流程以及KAKMA生成流程之后的任意步骤中,也按照与AAnF相同的方法,生成KAF并确定KAF的有效时间。 It should be noted that in any step after the main authentication process and the K AKMA generation process, the UE also generates K AF and determines the validity time of K AF according to the same method as AAnF.
上述方案,UE和AAnF根据KAKMA确定相同的KAF和KAF的有效时间,以及AAnF向AF发送该KAF和KAF的有效时间,后续UE和AF之间可以使用该KAF对UE与AF之间的传输内容进行加密,有助于提升通信安全。In the above scheme, UE and AAnF determine the validity time of the same K AF and K AF based on K AKMA , and AAnF sends the validity time of K AF and K AF to AF. Subsequently, the K AF can be used between UE and AF to compare the UE and AF. The transmission content between AF is encrypted, which helps to improve communication security.
图7为本申请实施例提供的一种KAKMA的使用方法的示意图。该方法中,AF属于3GPP核心网之外的一个网元。该方法包括以下步骤:Figure 7 is a schematic diagram of a method of using KAKMA provided by an embodiment of the present application. In this method, AF belongs to a network element outside the 3GPP core network. The method includes the following steps:
步骤701,UE向AF发送应用会话建立请求消息。相应地,AF接收该应用会话建立请求消息。Step 701: The UE sends an application session establishment request message to the AF. Correspondingly, the AF receives the application session establishment request message.
该应用会话建立请求消息中包括A-KID,该A-KID用于AAnF查找A-KID对应的KAKMAThe application session establishment request message includes the A-KID, and the A-KID is used by AAnF to find the KAKMA corresponding to the A-KID.
该A-KID是在步骤701之前,在主鉴权流程以及KAKMA生成流程中,由UE生成的。其中,主鉴权流程以及KAKMA生成流程即为图5所示的流程。The A-KID is generated by the UE in the main authentication process and K AKMA generation process before step 701. Among them, the main authentication process and the K AKMA generation process are the processes shown in Figure 5.
步骤702,AF向NEF发送应用密钥请求消息。相应地,NEF接收该应用密钥请求消息。Step 702: AF sends an application key request message to NEF. Accordingly, NEF receives the application key request message.
该应用密钥请求消息中包括A-KID和AF ID。该A-KID来自步骤701。该AFID用于标识AF。The application key request message includes A-KID and AF ID. This A-KID comes from step 701. This AFID is used to identify the AF.
该应用密钥请求消息可以是Nnef_AKMA_AFKey_Request消息。The application key request message may be a Nnef_AKMA_AFKey_Request message.
步骤703,NEF选择AAnF。Step 703, NEF selects AAnF.
其中,NEF可以根据UE的RID选择AAnF。Among them, NEF can select AAnF according to the RID of the UE.
步骤704,NEF向AAnF发送应用密钥请求消息。相应地,AAnF接收该应用密钥请求消息。Step 704: NEF sends an application key request message to AAnF. Accordingly, AAnF receives the application key request message.
该应用密钥请求消息中包括A-KID和AF ID。The application key request message includes A-KID and AF ID.
该应用密钥请求消息可以是Naanf_AKMA_AFKey_Request消息。The application key request message may be a Naanf_AKMA_AFKey_Request message.
步骤705,AAnF根据A-KID获取KAKMA,并根据KAKMA以及AF ID生成KAF,以及确定KAF的有效时间。Step 705: AAnF obtains KAKMA based on A-KID, generates K AF based on KAKMA and AF ID, and determines the validity time of K AF .
其中,AAnF是在主鉴权流程以及KAKMA生成流程中获取到A-KID和A-KID对应的KAKMAAmong them, AAnF obtains A-KID and KAKMA corresponding to A-KID in the main authentication process and KAKMA generation process.
步骤706,AAnF向NEF发送应用密钥响应消息。相应地,NEF接收该应用密钥响应消息。Step 706: AAnF sends an application key response message to NEF. Accordingly, NEF receives the application key response message.
该应用密钥响应消息中包括KAF以及KAF的有效时间。The application key response message includes K AF and the validity time of K AF .
该应用密钥响应消息可以是Naanf_AKMA_AFKey_Response消息。The application key response message may be a Naanf_AKMA_AFKey_Response message.
步骤707,NEF向AF发送应用密钥响应消息。相应地,AF接收该应用密钥响应消息。Step 707: NEF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
该应用密钥响应消息中包括KAF以及KAF的有效时间。The application key response message includes K AF and the validity time of K AF .
该应用密钥响应消息可以是Nnef_AKMA_AFKey_Response消息。The application key response message may be a Nnef_AKMA_AFKey_Response message.
步骤708,AF向UE发送应用会话建立响应消息。相应地,UE接收应用会话建立响应消息。Step 708: The AF sends an application session establishment response message to the UE. Correspondingly, the UE receives the application session establishment response message.
需要说明的是,UE在主鉴权流程以及KAKMA生成流程之后的任意步骤中,也按照与AAnF相同的方法,生成KAF并确定KAF的有效时间。It should be noted that in any step after the main authentication process and the K AKMA generation process, the UE also generates K AF and determines the validity time of K AF according to the same method as AAnF.
上述方案,UE和AAnF根据KAKMA确定相同的KAF和KAF的有效时间,以及AAnF向AF发送该KAF和KAF的有效时间,后续UE和AF之间可以使用该KAF对UE与AF之间的传输内容进行加密,有助于提升通信安全。 In the above scheme, UE and AAnF determine the validity time of the same K AF and K AF based on K AKMA , and AAnF sends the validity time of K AF and K AF to AF. Subsequently, the K AF can be used between UE and AF to compare the UE and AF. The transmission content between AF is encrypted, which helps to improve communication security.
图8为本实施例提供的AKMA漫游架构示意图。该架构中,当UE位于VPLMN,此时不管AF是位于VPLMN,还是位于HPLMN,该UE均处于漫游状态。在另外一种场景中(图中未示出),当UE位于HPLMN,AF位于VPLMN,则该UE也称为处于漫游状态。因此本申请实施例中UE处于漫游状态具体包括以下三种情形:Figure 8 is a schematic diagram of the AKMA roaming architecture provided in this embodiment. In this architecture, when the UE is located in the VPLMN, the UE is in the roaming state regardless of whether the AF is located in the VPLMN or the HPLMN. In another scenario (not shown in the figure), when the UE is located in the HPLMN and the AF is located in the VPLMN, the UE is also said to be in a roaming state. Therefore, in the embodiment of this application, the UE is in the roaming state and specifically includes the following three situations:
情形1,UE位于拜访网络(即VPLMN),AF位于拜访网络(即VPLMN)。Scenario 1, the UE is located in the visited network (ie VPLMN), and the AF is located in the visited network (ie VPLMN).
情形2,UE位于拜访网络(即VPLMN),AF位于家乡网络(即HPLMN)。Scenario 2, the UE is located in the visited network (that is, VPLMN), and the AF is located in the home network (that is, HPLMN).
情形3,UE位于家乡网络(即HPLMN),AF位于拜访网络(即VPLMN)。Scenario 3, the UE is located in the home network (ie HPLMN) and the AF is located in the visited network (ie VPLMN).
其中,UE位于HPLMN,是指正在为UE提供服务的运营商是UE签约的运营商。UE位于VPLMN,是指正在为UE提供服务的运营商不是UE签约的运营商。AF位于HPLMN,是指AF与UE的HPLMN有签约,或者预配置有连接到UE的HPLMN的相关信息,该相关信息比如是UE的HPLMN的NEF的地址信息。AF位于VPLMN,是指AF无法与UE所在的HPLMN进行直接交互,比如AF没有与UE的HPLMN进行签约,或者没有预配置连接到UE的HPLMN的相关信息,或者AF只配置有AF所在PLMN的信息。Among them, the UE is located in HPLMN, which means that the operator providing services to the UE is the operator signed by the UE. The fact that the UE is located in the VPLMN means that the operator providing services to the UE is not the operator contracted by the UE. The AF is located in the HPLMN, which means that the AF has a contract with the HPLMN of the UE, or is pre-configured with relevant information connected to the HPLMN of the UE. The relevant information is, for example, the NEF address information of the HPLMN of the UE. The AF is located in the VPLMN, which means that the AF cannot directly interact with the HPLMN where the UE is located. For example, the AF has not signed a contract with the UE's HPLMN, or the relevant information of the HPLMN connected to the UE is not pre-configured, or the AF is only configured with the information of the PLMN where the AF is located. .
针对上述情形1和3,与UE进行通信的vAF位于VPLMN,如果是由hAAnF为vAF生成用于UE与vAF之间进行安全通信的应用密钥(即KAF),由于vAF与hAAnF归属于不同的PLMN,因此vAF可能无法直接连接到hAAnF,导致vAF无法向hAAnF请求获取应用密钥。For the above scenarios 1 and 3, the vAF communicating with the UE is located in the VPLMN. If hAAnF generates the application key (i.e. K AF ) for the vAF for secure communication between the UE and the vAF, since vAF and hAAnF belong to different PLMN, so vAF may not be able to directly connect to hAAnF, resulting in vAF being unable to request the application key from hAAnF.
针对上述情形2,与UE进行通信的hAF位于HPLMN,UE位于VPLMN,一般情况下,可以由hAAnF为hAF生成用于UE与hAF之间进行安全通信的应用密钥(即KAF),然后在hAF与hAAnF不能连接的情况下,hAAnF可能无法为hAF提供应用密钥。For the above scenario 2, the hAF communicating with the UE is located in HPLMN, and the UE is located in VPLMN. Generally, hAAnF can generate an application key (i.e. K AF ) for secure communication between the UE and hAF for hAF, and then in If hAF and hAAnF cannot connect, hAAnF may not be able to provide the application key to hAF.
综上,当UE处于漫游状态,与UE进行通信的AF可能无法获取到应用密钥,导致UE与AF之间通信时无法对传输内容进行加密,造成通信不安全。In summary, when the UE is in the roaming state, the AF communicating with the UE may not be able to obtain the application key, resulting in the inability to encrypt the transmission content during communication between the UE and the AF, resulting in insecure communication.
为解决该问题,本申请实施例中通过在拜访网络选择一个AAnF,该AAnF称为拜访AAnF(visited AAnF,vAAnF)。该vAAnF可以作为中转节点,将来自AF的密钥请求转发至hAAnF,以及将hAAnF分配的应用密钥转发至AF,从而AF能够获取到应用密钥。或者该vAAnF自身具备分配应用密钥的功能,则vAAnF也可以为AF(可以是vAF,也可以是hAF)分配应用密钥。此外,本申请实施例还可以解决vAAnF与hAAnF之间的密钥隔离的问题。In order to solve this problem, in the embodiment of the present application, an AAnF is selected in the visited network, and the AAnF is called a visited AAnF (vAAnF). The vAAnF can serve as a transit node, forwarding the key request from AF to hAAnF, and forwarding the application key distributed by hAAnF to AF, so that AF can obtain the application key. Or the vAAnF itself has the function of distributing application keys, then vAAnF can also distribute application keys for AF (which can be vAF or hAF). In addition, the embodiments of the present application can also solve the problem of key isolation between vAAnF and hAAnF.
图9(a)为本申请实施例提供的一种通信方法的流程示意图,该方法包括以下步骤:Figure 9(a) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
步骤901a,当UE处于漫游状态,第一网元确定选择参数。Step 901a: When the UE is in the roaming state, the first network element determines the selection parameters.
该第一网元是NEF或AF。The first network element is NEF or AF.
当第一网元是AF,则可以由AF判断UE是否处于漫游状态。比如,AF接收来自UE的应用会话建立请求消息,该应用会话建立请求消息中包括A-KID,或者包括A-KID和VPLMN ID,或者包括A-KID'。本申请实施例中,A-KID'也称为第一AKMA密钥标识,A-KID也称为第二AKMA密钥标识。其中,A-KID包括RID、A-TID和HPLMN的信息,A-KID'包括RID、A-TID、HPLMN的信息和VPLMN的信息,其中,HPLMN的信息可以是HPLMN ID,或者其他可以识别HPLMN的信息,VPLMN的信息可以是VPLMN ID,或者其他可以识别VPLMN的信息。因此AF可以根据从UE收到的UE的HPLMN的信息、UE的VPLMN的信息或AF所在的PLMN的信息(可以是PLMN ID)中的一个或多个,确定UE处于漫游状态,其中PLMN的信息可以是PLMN ID,或者其他可以识别PLMN 的信息。比如AF从UE收到UE的VPLMN ID,则AF确定UE处于漫游状态。再比如,AF从UE收到UE的HPLMN ID,则AF将AF所在的PLMN的信息与UE的HPLMN ID进行比较,如果二者相同,则AF确定UE处于非漫游状态,如果二者不同,则AF确定UE处于漫游状态。再比如,如果AF从UE收到HPLMN ID,但没有从UE收到VPLMN ID,则AF确定UE处于非漫游状态。When the first network element is an AF, the AF can determine whether the UE is in a roaming state. For example, the AF receives an application session establishment request message from the UE, and the application session establishment request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID'. In the embodiment of this application, A-KID' is also called the first AKMA key identification, and A-KID is also called the second AKMA key identification. Among them, A-KID includes the information of RID, A-TID and HPLMN, and A-KID' includes the information of RID, A-TID, HPLMN and VPLMN. The information of HPLMN can be HPLMN ID, or other information that can identify HPLMN. The information of the VPLMN can be the VPLMN ID, or other information that can identify the VPLMN. Therefore, the AF may determine that the UE is in the roaming state based on one or more of the UE's HPLMN information, the UE's VPLMN information, or the information of the PLMN where the AF is located (which may be a PLMN ID) received from the UE, where the PLMN information It can be a PLMN ID, or something else that can identify the PLMN Information. For example, if the AF receives the UE's VPLMN ID from the UE, the AF determines that the UE is in the roaming state. For another example, if the AF receives the UE's HPLMN ID from the UE, the AF compares the information of the PLMN where the AF is located with the UE's HPLMN ID. If the two are the same, the AF determines that the UE is in a non-roaming state. If they are different, then AF determines that the UE is in roaming state. For another example, if the AF receives the HPLMN ID from the UE but does not receive the VPLMN ID from the UE, the AF determines that the UE is in a non-roaming state.
当第一网元是NEF,可以由AF判断UE是否处于漫游状态,当UE处于漫游状态,则AF向NEF发送指示信息,该指示信息指示UE处于漫游状态。When the first network element is an NEF, the AF can determine whether the UE is in the roaming state. When the UE is in the roaming state, the AF sends indication information to the NEF, and the indication information indicates that the UE is in the roaming state.
或者当第一网元是NEF,也可以由NEF判断UE是否处于漫游状态。比如,UE向AF发送应用会话建立请求消息,该应用会话建立请求消息中包括A-KID,或者包括A-KID和VPLMN ID,或者包括A-KID'。然后AF向NEF发送应用密钥请求消息,该应用密钥请求消息包括A-KID,或者包括A-KID和VPLMN ID,或者包括A-KID',进而NEF根据UE的HPLMN的信息、UE的VPLMN的信息或NEF所在的PLMN的信息中的一个或多个,确定UE处于漫游状态。比如NEF收到UE的VPLMN ID,则NEF确定UE处于漫游状态。再比如,NEF收到UE的HPLMN ID,则NEF将NEF所在的PLMN的信息与UE的HPLMN ID进行比较,如果二者相同,则NEF确定UE处于非漫游状态,如果二者不同,则NEF确定UE处于漫游状态。再比如,如果NEF收到HPLMN ID,但没有收到VPLMN ID,则NEF确定UE处于非漫游状态。Or when the first network element is NEF, NEF can also determine whether the UE is in roaming state. For example, the UE sends an application session establishment request message to the AF, and the application session establishment request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID'. Then AF sends an application key request message to NEF. The application key request message includes A-KID, or includes A-KID and VPLMN ID, or includes A-KID', and then NEF uses the UE's HPLMN information and the UE's VPLMN information or one or more of the information of the PLMN where the NEF is located, to determine that the UE is in the roaming state. For example, if NEF receives the UE's VPLMN ID, NEF determines that the UE is in roaming state. For another example, NEF receives the HPLMN ID of the UE, then NEF compares the information of the PLMN where NEF is located with the HPLMN ID of the UE. If the two are the same, NEF determines that the UE is in a non-roaming state. If they are different, NEF determines that the UE is in a non-roaming state. The UE is in roaming state. For another example, if NEF receives the HPLMN ID but does not receive the VPLMN ID, NEF determines that the UE is in a non-roaming state.
其中,第一网元确定的选择参数包括UE的路由标识(RID)、UE的HPLMN的信息、第一网元所在的VPLMN的信息或UE的VPLMN的信息中的一个或多个。The selection parameters determined by the first network element include one or more of the routing identifier (RID) of the UE, the information of the HPLMN of the UE, the information of the VPLMN where the first network element is located, or the information of the VPLMN of the UE.
步骤902a,第一网元向NRF发送请求消息。相应地,NRF接收该请求消息。Step 902a: The first network element sends a request message to the NRF. Accordingly, the NRF receives the request message.
该请求消息包括选择参数。The request message includes selection parameters.
步骤903a,当UE处于漫游状态,NRF根据选择参数,选择为UE提供服务的vAAnF。Step 903a: When the UE is in the roaming state, the NRF selects the vAAnF that provides services for the UE according to the selection parameters.
其中,NRF需要判断UE是否处于漫游,其具体判断方法可以参考前述第一网元判断UE是否处于漫游状态的方法,不做赘述。Among them, NRF needs to determine whether the UE is in roaming. The specific determination method can refer to the aforementioned method of the first network element to determine whether the UE is in roaming state, which will not be described again.
当NRF存储有与该选择参数对应的AAnF,则NRF选择与该选择参数对应的AAnF作为vAAnF。或者,当NRF未存储与该选择参数对应的AAnF,则选择默认的AAnF作为vAAnF。When the NRF stores the AAnF corresponding to the selection parameter, the NRF selects the AAnF corresponding to the selection parameter as vAAnF. Or, when NRF does not store the AAnF corresponding to the selection parameter, the default AAnF is selected as vAAnF.
步骤904a,NRF向第一网元发送响应消息。相应地,第一网元接收该响应消息。Step 904a: The NRF sends a response message to the first network element. Correspondingly, the first network element receives the response message.
该响应消息包括vAAnF的信息,该vAAnF的信息用于第一网元向vAAnF请求用于AF与UE之间进行安全通信的应用密钥(KAF)。其中,vAAnF的信息可以是vAAnF的标识信息,也可以是vAAnF的地址信息或AAnF的instanceID信息等,本申请不做限定。The response message includes vAAnF information, and the vAAnF information is used by the first network element to request from vAAnF an application key (K AF ) for secure communication between the AF and the UE. The information of vAAnF may be identification information of vAAnF, address information of vAAnF or instanceID information of AAnF, etc., which is not limited in this application.
步骤905a,第一网元根据vAAnF的信息向vAAnF发送请求消息。相应地,vAAnF接收该请求消息。Step 905a: The first network element sends a request message to vAAnF according to the vAAnF information. Accordingly, vAAnF receives the request message.
该请求消息请求用于AF与UE之间进行安全通信的应用密钥(KAF)。This request message requests an application key (K AF ) for secure communication between the AF and the UE.
如果该vAAnF仅作为中转节点,则vAAnF将该请求消息发送至hAAnF,由hAAnF生成应用密钥,然后hAAnF将应用密钥发送给vAAnF,vAAnF再将应用密钥发送给第一网元。需要说明的是,如果第一网元是NEF,则NEF还需要进一步将应用密钥发送给AF。If the vAAnF only serves as a transit node, vAAnF sends the request message to hAAnF, hAAnF generates an application key, and then hAAnF sends the application key to vAAnF, and vAAnF then sends the application key to the first network element. It should be noted that if the first network element is NEF, NEF further needs to send the application key to AF.
如果该vAAnF能够生成应用密钥,则vAAnF基于该请求消息生成应用密钥。一种实现方法中,vAAnF收到该请求消息后,向hAAnF请求AKMA根密钥,然后hAAnF向vAAnF发送最新的AKMA根密钥(称为KAKMA*),从而vAAnF根据KAKMA*生成用于vAF与UE 之间安全通信的应用密钥。可选的,vAAnF还存储KAKMA*,便于后续继续使用该KAKMA*。If the vAAnF is capable of generating an application key, the vAAnF generates an application key based on the request message. In one implementation method, after vAAnF receives the request message, it requests the AKMA root key from hAAnF, and then hAAnF sends the latest AKMA root key (called K AKMA *) to vAAnF, so that vAAnF generates the AKMA root key based on K AKMA *. vAF and UE application keys for secure communication. Optionally, vAAnF also stores K AKMA * to facilitate subsequent use of the K AKMA *.
其中,hAAnF可以根据以下任一方法获取到KAKMA*:Among them, hAAnF can obtain K AKMA * according to any of the following methods:
方法1,hAAnF根据KAKMA,确定KAKMA*。Method 1, hAAnF determines KAKMA * based on KAKMA .
该KAKMA可用于生成hAF与UE之间进行安全通信的应用密钥。This K AKMA can be used to generate application keys for secure communication between hAF and UE.
方法2,hAAnF根据KAKMA,以及UE的HPLMN的信息和/或UE的VPLMN的信息,确定KAKMA*。Method 2: hAAnF determines KAKMA * based on KAKMA and the HPLMN information of the UE and/or the VPLMN information of the UE.
方法3,AUSF根据UE的VPLMN的信息、SUPI和KAUSF确定KAKMA*,然后AUSF向hAAnF发送KAKMA*。Method 3: AUSF determines K AKMA * based on the UE's VPLMN information, SUPI and K AUSF , and then AUSF sends K AKMA * to hAAnF.
一种实现方法中,第一网元还可以向UE发送指示信息,该指示信息指示UE处于漫游状态,该指示信息可以是第一网元所在的VPLMN的信息,或者是二进制比特信息,或者是枚举型比特信息。UE收到该指示信息后,触发UE生成KAKMA*,该KAKMA*与vAAnF或hAAnF生成的KAKMA*相同。该方法有助于实现UE与AF能够使用相同的应用密钥。In an implementation method, the first network element may also send indication information to the UE. The indication information indicates that the UE is in the roaming state. The indication information may be information about the VPLMN where the first network element is located, or binary bit information, or Enumerated bit information. After the UE receives the indication information, the UE is triggered to generate K AKMA *, which is the same as the K AKMA * generated by vAAnF or hAAnF. This method helps to enable UE and AF to use the same application key.
上述方案,当UE处于漫游状态,则NRF选择一个vAAnF,该vAAnF既可以作为中转节点,也可以生成UE与AF之间进行安全通信的应用密钥,使得AF能够准确获取到应用密钥,便于UE与AF之间使用应用密钥对通信内容进行加密,有助于提升通信安全性。In the above scheme, when the UE is in the roaming state, the NRF selects a vAAnF, which can not only serve as a transit node, but also generate an application key for secure communication between the UE and the AF, so that the AF can accurately obtain the application key and facilitate The application key is used to encrypt communication content between UE and AF, which helps to improve communication security.
图9(b)为本申请实施例提供的一种通信方法的流程示意图。该方法包括以下步骤:Figure 9(b) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
步骤901b,hAAnF判断UE是否处于漫游状态。Step 901b: hAAnF determines whether the UE is in roaming state.
一种实现方法中,由AUSF判断UE是否处于漫游状态,然后AUSF向hAAnF发送指示信息,当该指示信息指示UE处于漫游状态,则hAAnF根据该指示信息确定UE处于漫游状态。In one implementation method, the AUSF determines whether the UE is in the roaming state, and then the AUSF sends indication information to hAAnF. When the indication information indicates that the UE is in the roaming state, hAAnF determines that the UE is in the roaming state based on the indication information.
又一种实现方法中,hAAnF根据UE的HPLMN的信息和/或UE的VPLMN的信息,判断UE是否处于漫游状态。比如hAAnF收到来自UE的该UE的VPLMN ID,则hAAnF确定UE处于漫游状态。再比如,hAAnF收到来自UE的该UE的HPLMN ID,则hAAnF将hAAnF所在的PLMN的信息与UE的HPLMN ID进行比较,如果二者相同,则hAAnF确定UE处于非漫游状态,如果二者不同,则hAAnF确定UE处于漫游状态。再比如,如果hAAnF收到来自UE的该UE的HPLMN ID,但没有收到来自UE的该UE的VPLMN ID,则hAAnF确定UE处于非漫游状态。In another implementation method, hAAnF determines whether the UE is in a roaming state based on the UE's HPLMN information and/or the UE's VPLMN information. For example, if hAAnF receives the VPLMN ID of the UE from the UE, hAAnF determines that the UE is in the roaming state. For another example, hAAnF receives the HPLMN ID of the UE from the UE, then hAAnF compares the information of the PLMN where hAAnF is located with the HPLMN ID of the UE. If the two are the same, hAAnF determines that the UE is in a non-roaming state. If they are different, , then hAAnF determines that the UE is in roaming state. For another example, if hAAnF receives the HPLMN ID of the UE from the UE, but does not receive the VPLMN ID of the UE from the UE, then hAAnF determines that the UE is in a non-roaming state.
步骤902b,当UE处于漫游状态,hAAnF根据第二AKMA根密钥(也称为KAKMA),确定第一AKMA根密钥(也称为KAKMA*)。Step 902b: When the UE is in the roaming state, hAAnF determines the first AKMA root key (also called KAKMA *) based on the second AKMA root key (also called KAKMA ).
KAKMA*用于确定第一应用密钥,该第一应用密钥用于UE与拜访AF(即vAF)之间进行安全通信。KAKMA用于确定第二应用密钥,该第二应用密钥用于UE与家乡AF(即hAF)之间进行安全通信。K AKMA * is used to determine the first application key, which is used for secure communication between the UE and the visited AF (ie, vAF). K AKMA is used to determine the second application key, which is used for secure communication between the UE and the home AF (ie, hAF).
一种实现方法中,hAAnF根据KAKMA,以及UE的HPLMN的信息和/或UE的VPLMN的信息,确定KAKMA*。In one implementation method, hAAnF determines KAKMA * based on KAKMA and the HPLMN information of the UE and/or the VPLMN information of the UE.
hAAnF确定KAKMA*之后,hAAnF可以主动向hAAnF发送KAKMA*,或者hAAnF接收来自vAAnF的请求消息,该请求消息用于请求获取AKMA根密钥,则hAAnF可以基于该请求消息向vAAnF发送KAKMA*。hAAnF收到KAKMA*后,可以根据KAKMA*生成第一应用密钥,然后向vAF发送第一应用密钥,后续UE与vAF之间使用该第一应用密钥进行加密通信。可选的,hAAnF可以存储该KAKMA*。After hAAnF determines K AKMA *, hAAnF can actively send K AKMA * to hAAnF, or hAAnF receives a request message from vAAnF, which is used to request to obtain the AKMA root key, then hAAnF can send K AKMA * to vAAnF based on the request message. *. After hAAnF receives K AKMA *, it can generate the first application key based on K AKMA *, and then send the first application key to the vAF. Subsequently, the first application key is used for encrypted communication between the UE and the vAF. Optionally, hAAnF can store the K AKMA *.
上述方案,hAAnF确定UE处于漫游状态之后,可以为vAAnF生成AKMA根密钥, 并向vAAnF发送AKMA根密钥,该AKMA根密钥由vAAnF使用,从而实现不同AAnF之间的密钥隔离,即vAAnF与hAAnF使用不同的AKMA根密钥,有助于保证密钥安全性,进而提升通信的安全性。In the above scheme, after hAAnF determines that the UE is in roaming state, it can generate the AKMA root key for vAAnF. And sends the AKMA root key to vAAnF, which is used by vAAnF, thereby achieving key isolation between different AAnFs, that is, vAAnF and hAAnF use different AKMA root keys, which helps ensure key security. Thereby improving the security of communication.
图9(c)为本申请实施例提供的一种通信方法的流程示意图。该方法包括以下步骤:Figure 9(c) is a schematic flowchart of a communication method provided by an embodiment of the present application. The method includes the following steps:
步骤901c,AUSF判断UE是否处于漫游状态。Step 901c: AUSF determines whether the UE is in roaming state.
一种实现方法中,AUSF根据UE的HPLMN的信息和/或UE的VPLMN的信息,判断UE是否处于漫游状态。比如AUSF收到来自UE的该UE的VPLMN ID,则AUSF确定UE处于漫游状态。再比如,AUSF收到来自UE的该UE的HPLMN ID,则AUSF将AUSF所在的PLMN的信息与UE的HPLMN ID进行比较,如果二者相同,则AUSF确定UE处于非漫游状态,如果二者不同,则AUSF确定UE处于漫游状态。再比如,如果AUSF收到来自UE的该UE的HPLMN ID,但没有收到来自UE的该UE的VPLMN ID,则AUSF确定UE处于非漫游状态。In one implementation method, the AUSF determines whether the UE is in a roaming state based on the UE's HPLMN information and/or the UE's VPLMN information. For example, if the AUSF receives the VPLMN ID of the UE from the UE, the AUSF determines that the UE is in the roaming state. For another example, the AUSF receives the UE's HPLMN ID from the UE, then the AUSF compares the information of the PLMN where the AUSF is located with the UE's HPLMN ID. If the two are the same, the AUSF determines that the UE is in a non-roaming state. If the two are different , then the AUSF determines that the UE is in the roaming state. For another example, if the AUSF receives the HPLMN ID of the UE from the UE, but does not receive the VPLMN ID of the UE from the UE, the AUSF determines that the UE is in a non-roaming state.
步骤902c,当UE处于漫游状态,AUSF根据UE的VPLMN的信息,确定AKMA根密钥(KAKMA*)。Step 902c: When the UE is in the roaming state, the AUSF determines the AKMA root key (K AKMA *) based on the VPLMN information of the UE.
其中,KAKMA*用于确定应用密钥,该应用密钥用于UE与拜访AF(即vAF)之间进行安全通信。Among them, K AKMA * is used to determine the application key, which is used for secure communication between the UE and the visited AF (i.e. vAF).
一种实现方法中,AUSF根据UE的VPLMN的信息、UE的SUPI和KAUSF确定KAKMA*。In one implementation method, AUSF determines K AKMA * based on the UE's VPLMN information, the UE's SUPI and K AUSF .
可选的,AUSF可以存储KAKMA*。Optionally, AUSF can store K AKMA *.
可选的,AUSF还可以向hAAnF发送KAKMA*,从而后续hAAnF可以主动向hAAnF发送KAKMA*,或者hAAnF接收来自AAVnF的请求消息,该请求消息用于请求获取AKMA根密钥,则hAAnF可以基于该请求消息向vAAnF发送KAKMA*。hAAnF收到KAKMA*后,可以根据KAKMA*生成第一应用密钥,然后向vAF发送第一应用密钥,后续UE与vAF之间使用该第一应用密钥进行加密通信。Optionally, AUSF can also send K AKMA * to hAAnF, so that subsequently hAAnF can actively send K AKMA * to hAAnF, or hAAnF receives a request message from AAVnF, which is used to request to obtain the AKMA root key, then hAAnF can Send K AKMA * to vAAnF based on the request message. After hAAnF receives K AKMA *, it can generate the first application key based on K AKMA *, and then send the first application key to the vAF. Subsequently, the first application key is used for encrypted communication between the UE and the vAF.
上述方案,AUSF确定UE处于漫游状态之后,可以生成AKMA根密钥,并经由hAAnF向vAAnF发送AKMA根密钥,该AKMA根密钥由vAAnF使用,从而实现不同AAnF之间的密钥隔离,即vAAnF与hAAnF使用不同的AKMA根密钥,有助于保证密钥安全性,进而提升通信的安全性。In the above scheme, after the AUSF determines that the UE is in the roaming state, it can generate the AKMA root key and send the AKMA root key to vAAnF via hAAnF. The AKMA root key is used by vAAnF, thereby achieving key isolation between different AAnFs, that is vAAnF and hAAnF use different AKMA root keys, which helps ensure key security and thereby improves communication security.
图10为本申请实施例提供的一种通信方法的流程示意图。该方法中,AF是位于5G核心网内的一个网元。该方法包括以下步骤:Figure 10 is a schematic flowchart of a communication method provided by an embodiment of the present application. In this method, AF is a network element located in the 5G core network. The method includes the following steps:
步骤1000,AF上预配置该AF所在的PLMN的信息。Step 1000: Pre-configure the PLMN information on the AF.
AF所在的PLMN的信息,是指AF可以连接到的PLMN的信息。该PLMN的信息可以是一个或者多个,即代表AF可以接入一个或者多个PLMN。PLMN的信息可以是相应PLMN的网元的信息,比如PLMN中的NEF的地址信息,AAnF的地址信息,或者AMF等其他核心网网元的地址信息。The information of the PLMN where the AF is located refers to the information of the PLMN that the AF can connect to. The PLMN information can be one or more, which means that the AF can access one or more PLMNs. The information of the PLMN may be the information of the network elements of the corresponding PLMN, such as the address information of the NEF in the PLMN, the address information of the AAnF, or the address information of other core network elements such as the AMF.
该AF可以是拜访网络的AF(也称为拜访AF或vAF)或家乡网络的AF(也称为家乡AF或hAF)。具体地,当该AF无法连接到UE签约的HPLMN的时候,则称为AF是拜访网络的AF。当该AF可以连接到UE签约的HPLMN的时候,则称为AF为家乡网络的AF。The AF may be the AF of the visited network (also called visited AF or vAF) or the AF of the home network (also called home AF or hAF). Specifically, when the AF cannot connect to the HPLMN subscribed by the UE, it is said that the AF is the AF of the visited network. When the AF can be connected to the HPLMN subscribed by the UE, the AF is called the AF of the home network.
当AF是vAF,且vAF上预配置该vAF所在的PLMN的信息,则该PLMN的信息可以是VPLMN ID。 When the AF is a vAF and the information of the PLMN where the vAF is located is preconfigured on the vAF, the information of the PLMN can be the VPLMN ID.
当AF是hAF,且hAF上预配置该hAF所在的PLMN的信息,则该PLMN的信息可以是HPLMN ID。When the AF is a hAF and the information of the PLMN where the hAF is located is pre-configured on the hAF, the information of the PLMN can be the HPLMN ID.
步骤1001,UE向AF发送应用会话建立请求消息。相应地,AF接收该应用会话建立请求消息。Step 1001: The UE sends an application session establishment request message to the AF. Correspondingly, the AF receives the application session establishment request message.
该应用会话建立请求消息中包括A-KID,该AKID包括RID、HPLMN ID和A-TID。The application session establishment request message includes A-KID, which includes RID, HPLMN ID and A-TID.
在一种方法中,如果UE当前位于拜访网络,该应用会话建立请求消息中包括A-KID,但不包括UE所在的拜访网络的VPLMN ID。In one method, if the UE is currently located in the visited network, the application session establishment request message includes the A-KID but does not include the VPLMN ID of the visited network where the UE is located.
在另一种方法中,如果UE当前位于拜访网络,则UE还向AF发送UE所在的拜访网络的VPLMN ID。其中,UE向AF发送VPLMN ID的方法包括但限于:In another method, if the UE is currently located in a visited network, the UE also sends the VPLMN ID of the visited network where the UE is located to the AF. Among them, the methods for the UE to send the VPLMN ID to the AF include but are limited to:
方法1,在该应用会话建立请求消息中包括VPLMN ID,也即VPLMN ID与A-KID并列携带于应用会话建立请求消息。Method 1: Include the VPLMN ID in the application session establishment request message, that is, the VPLMN ID and A-KID are carried side by side in the application session establishment request message.
方法2,UE单独向AF发送一个消息,即不同于应用会话建立请求消息的一个消息,该消息中包括VPLMN ID。Method 2: The UE sends a separate message to the AF, which is a message different from the application session establishment request message. The message includes the VPLMN ID.
方法3,在该应用会话建立请求消息的A-KID中新增VPLMN字段。当UE当前位于拜访网络,则该VPLMN字段包括VPLMN ID,当UE当前位于家乡网络,该VPLMN字段设置为默认值。为便于描述,以下将新增了VPLMN字段的A-KID称为A-KID'。Method 3: Add a VPLMN field to the A-KID of the application session establishment request message. When the UE is currently located in the visited network, the VPLMN field includes the VPLMN ID. When the UE is currently located in the home network, the VPLMN field is set to the default value. For the convenience of description, the A-KID with the new VPLMN field will be called A-KID' below.
需要说明的是,如果UE生成A-KID',则AUSF也需要生成相同的A-KID',因此AUSF在生成A-KID'时,需要确定判断是否收到了VPLMN ID。如果AUSF收到了VPLMN ID,则AUSF在A-KID'的VPLMN字段中添加VPLMN ID,如果没有收到VPLMN ID,则AUSF将A-KID'的VPLMN字段设置为默认值。其中,UE是在步骤1001前生成A-KID'。It should be noted that if the UE generates A-KID', the AUSF also needs to generate the same A-KID'. Therefore, when generating A-KID', the AUSF needs to determine whether it has received the VPLMN ID. If the VPLMN ID is received by the AUSF, the AUSF adds the VPLMN ID in the VPLMN field of A-KID'. If the VPLMN ID is not received, the AUSF sets the VPLMN field of A-KID' to the default value. Among them, the UE generates A-KID' before step 1001.
一种实现方法中,AUSF根据以下方法获取VPLMN ID:当UDM确定UE位于拜访网络且UE能够使用AKMA业务,则UDM向AUSF发送UE的VPLMN ID。In one implementation method, the AUSF obtains the VPLMN ID according to the following method: when the UDM determines that the UE is located in the visited network and the UE can use the AKMA service, the UDM sends the UE's VPLMN ID to the AUSF.
步骤1002,AF判断UE是否处于漫游状态。Step 1002: AF determines whether the UE is in roaming state.
该步骤为可选步骤。This step is optional.
UE处于漫游状态具体包括以下三种情形,具体可以参考前述描述。The UE is in the roaming state specifically including the following three situations. For details, please refer to the foregoing description.
一种实现方法中,在应用会话建立请求消息中包括A-KID,但UE没有向AF发送VPLMN ID的情况下,AF判断AF所在的PLMN的信息与UE发送的A-KID中的HPLMN ID是否相同,如果相同则确定UE未处于漫游状态,如果不同则确定UE处于漫游状态。可以理解为,“相同”具体是指“包含”。具体地,如果UE发送的HPLMN ID包含在AF所在的PLMN的信息中,则UE未处于漫游状态;如果UE发送的HPLMN ID没有被包含在AF所在的PLMN的信息中,则UE处于漫游状态。In one implementation method, when the application session establishment request message includes the A-KID, but the UE does not send the VPLMN ID to the AF, the AF determines whether the information of the PLMN where the AF is located matches the HPLMN ID in the A-KID sent by the UE. If they are the same, it is determined that the UE is not in the roaming state; if they are different, it is determined that the UE is in the roaming state. It can be understood that "same" specifically refers to "includes". Specifically, if the HPLMN ID sent by the UE is included in the information of the PLMN where the AF is located, the UE is not in the roaming state; if the HPLMN ID sent by the UE is not included in the information of the PLMN where the AF is located, the UE is in the roaming state.
又一种实现方法中,在该应用会话建立请求消息中包括A-KID,且UE还向AF发送了VPLMN ID的情况下,AF判断UE是否处于漫游状态的方法包括但不限于以下方法1和方法2。In another implementation method, when the application session establishment request message includes the A-KID and the UE also sends the VPLMN ID to the AF, the method for the AF to determine whether the UE is in the roaming state includes but is not limited to the following method 1 and Method 2.
方法1,AF判断UE是否向AF发送了VPLMN ID。如果UE向AF发送了VPLMN ID,则AF确定UE处于漫游状态。如果UE没有向AF发送VPLMN ID,则AF进一步判断AF所在的PLMN的信息与UE发送的HPLMN ID是否相同,如果相同则确定UE未处于漫游状态,如果不同则确定UE处于漫游状态。Method 1, the AF determines whether the UE has sent the VPLMN ID to the AF. If the UE sends the VPLMN ID to the AF, the AF determines that the UE is in roaming state. If the UE does not send the VPLMN ID to the AF, the AF further determines whether the information of the PLMN where the AF is located is the same as the HPLMN ID sent by the UE. If they are the same, it is determined that the UE is not in the roaming state. If they are different, it is determined that the UE is in the roaming state.
需要说明的是,针对步骤1001中描述的发送VPLMN ID的方法3,当新增的VPLMN字段设置为默认值,则该步骤1002中AF确定VPLMN字段中是默认值,进而确定UE未 处于漫游状态。当新增的VPLMN字段不是默认值,比如设置为AF所在的PLMN的信息,则该步骤1002中AF确定UE处于漫游状态。It should be noted that for method 3 of sending the VPLMN ID described in step 1001, when the newly added VPLMN field is set to the default value, in step 1002, the AF determines that the VPLMN field is the default value, and then determines that the UE has not In roaming state. When the newly added VPLMN field is not the default value, for example, it is set to the information of the PLMN where the AF is located, then in step 1002, the AF determines that the UE is in the roaming state.
方法2,AF将预先配置的AF所在的PLMN的信息,与A-KID或A-KID'中的HPLMN ID进行比较。如果二者相同,则AF确定UE未处于漫游状态。如果二者不同,则AF确定UE处于漫游状态。Method 2: The AF compares the information of the pre-configured PLMN where the AF is located with the HPLMN ID in A-KID or A-KID'. If they are the same, the AF determines that the UE is not in roaming state. If they are different, the AF determines that the UE is in roaming state.
步骤1003,AF确定选择参数。Step 1003: AF determines selection parameters.
该选择参数也称为用于选择AAnF的参数。This selection parameter is also called the parameter for selecting AAnF.
一种实现方法中,如果不执行步骤1002,即AF不需要判断UE是否处于漫游状态,则AF确定的选择参数包括RID,或者包括RID和HPLMN ID,或者包括RID,HPLMN ID和VLPMN ID。In one implementation method, if step 1002 is not performed, that is, the AF does not need to determine whether the UE is in a roaming state, the selection parameters determined by the AF include RID, or include RID and HPLMN ID, or include RID, HPLMN ID and VLPMN ID.
又一种实现方法中,如果执行步骤1002,即AF需要判断UE是否处于漫游状态。当UE未处于漫游状态,AF确定的选择参数包括RID。当UE处于漫游状态,AF确定的选择参数包括HPLMN ID、VPLMN ID或RID中的一个或多个。可选的,当UE处于漫游状态,AF还生成指示信息,该指示信息指示UE处于漫游状态。需要说明的是,在另一种实现方法中,当UE处于漫游状态,AF确定的选择参数也可以为空,或者理解为不确定选择参数。In another implementation method, if step 1002 is executed, the AF needs to determine whether the UE is in a roaming state. When the UE is not in roaming state, the selection parameters determined by the AF include RID. When the UE is in the roaming state, the selection parameters determined by the AF include one or more of the HPLMN ID, VPLMN ID or RID. Optionally, when the UE is in the roaming state, the AF also generates indication information indicating that the UE is in the roaming state. It should be noted that in another implementation method, when the UE is in the roaming state, the selection parameters determined by the AF can also be empty, or understood as uncertain selection parameters.
步骤1004,AF向NRF发送发现请求消息。相应地,NRF接收该发现请求消息。Step 1004: AF sends a discovery request message to the NRF. Accordingly, the NRF receives the discovery request message.
该发现请求消息可以是Nnrf_NFDiscovery_Request消息。The discovery request message may be an Nnrf_NFDiscovery_Request message.
该发现请求消息包括AAnF类型信息,用于请求一个AAnF信息。AAnF信息用于连接到一个AAnF,比如是AAnF的地址信息,AAnF的instanceID信息等。The discovery request message includes AAnF type information and is used to request an AAnF information. AAnF information is used to connect to an AAnF, such as AAnF's address information, AAnF's instanceID information, etc.
该发现请求消息中还包括选择参数。可选地,该发现请求消息还包括指示信息,该指示信息指示UE处于漫游状态。The discovery request message also includes selection parameters. Optionally, the discovery request message also includes indication information indicating that the UE is in a roaming state.
示例性地,以下表1展示在不执行步骤1002,也即AF不需要判断UE是否处于漫游状态的情形下,AF确定的选择参数以及在发现请求消息中携带的内容。For example, the following Table 1 shows the selection parameters determined by the AF and the content carried in the discovery request message when step 1002 is not performed, that is, the AF does not need to determine whether the UE is in a roaming state.
表1
Table 1
示例性地,以下表2展示在执行步骤1002,也即AF需要判断UE是否处于漫游状态的情形下,AF确定的选择参数以及在发现请求消息中携带的内容。For example, the following Table 2 shows the selection parameters determined by the AF and the content carried in the discovery request message when performing step 1002, that is, when the AF needs to determine whether the UE is in a roaming state.
表2

Table 2

步骤1005,NRF确定UE处于漫游状态,则选择vAAnF。Step 1005: NRF determines that the UE is in roaming state, and selects vAAnF.
其中,该NRF是拜访网络中的NRF。NRF根据步骤1004中携带的参数,选择AAnF。Wherein, the NRF is the NRF in the visited network. NRF selects AAnF based on the parameters carried in step 1004.
下面分情形说明NRF选择AAnF的方法。The following describes the method for NRF to select AAnF based on the situation.
情形一,当不执行上述步骤1002。Situation 1: When the above step 1002 is not executed.
参考表1,当不执行步骤1002,则步骤1004的发现请求消息中携带的参数有三种实现方法,下面针对上述表1的三种不同方法分别说明。Referring to Table 1, when step 1002 is not executed, there are three implementation methods for the parameters carried in the discovery request message of step 1004. The three different methods in Table 1 are described below.
针对表1的方法1,当步骤1004的发现请求消息中携带RID,一种可能的实现方法是:NRF先判断UE是否处于漫游状态。如果UE处于漫游状态,则NRF判断NRF中是否存储有与该RID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。另一种可能的实现方法是:NRF先判断NRF中是否存储有与该RID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有,则NRF判断UE是否处于漫游状态,如果UE处于漫游状态,则确定默认的AAnF为vAAnF。再一种可能的实现方法是:NRF先判断UE是否处于漫游状态,如果UE处于漫游状态则确定默认的AAnF为vAAnF。Regarding method 1 of Table 1, when the discovery request message in step 1004 carries the RID, a possible implementation method is: NRF first determines whether the UE is in a roaming state. If the UE is in the roaming state, the NRF determines whether the AAnF corresponding to the RID is stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF. Another possible implementation method is: NRF first determines whether the AAnF corresponding to the RID is stored in the NRF. If so, determines that the AAnF is vAAnF. If not, the NRF determines whether the UE is in the roaming state. If the UE is in the roaming state, , then the default AAnF is determined to be vAAnF. Another possible implementation method is: NRF first determines whether the UE is in a roaming state, and if the UE is in a roaming state, determines that the default AAnF is vAAnF.
针对表1的方法2,当步骤1004的发现请求消息中携带RID和HPLMN ID,则NRF先判断UE是否处于漫游状态。具体地,NRF可以根据HPLMN ID判断该UE是否处于漫游态。如果UE处于漫游状态,则NRF判断NRF中是否存储有与该RID和/或HPLMN ID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 2 in Table 1, when the discovery request message in step 1004 carries the RID and HPLMN ID, the NRF first determines whether the UE is in the roaming state. Specifically, the NRF can determine whether the UE is in roaming state based on the HPLMN ID. If the UE is in the roaming state, the NRF determines whether there is an AAnF corresponding to the RID and/or HPLMN ID stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF.
针对表1的方法3,当步骤1004的发现请求消息中携带RID、HPLMN ID和VPLMN ID,则NRF先判断UE是否处于漫游状态。如果UE处于漫游状态,则NRF判断NRF中是否存储有与该RID、HPLMN ID或VPLMN ID中的至少一个相对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 3 in Table 1, when the discovery request message in step 1004 carries the RID, HPLMN ID and VPLMN ID, the NRF first determines whether the UE is in the roaming state. If the UE is in the roaming state, the NRF determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If there is, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF. .
针对上述三种方法,其中NRF判断UE是否处于漫游状态的方法,可以是:NRF将NRF的PLMN的信息与UE的HPLMN ID进行对比,如果相同则表示UE未处于漫游状态,如果不同则表示UE处于漫游状态。For the above three methods, the method for NRF to determine whether the UE is in the roaming state can be: NRF compares the PLMN information of the NRF with the HPLMN ID of the UE. If they are the same, it means that the UE is not in the roaming state. If they are different, it means that the UE is not in the roaming state. In roaming state.
情形二,当执行上述步骤1002。Scenario 2: When executing the above step 1002.
参考表2,当执行步骤1002,则步骤1004的发现请求消息中携带的参数至少有七种实现方法,下面针对上述表2的七种不同方法分别说明。Referring to Table 2, when step 1002 is executed, there are at least seven implementation methods for the parameters carried in the discovery request message of step 1004. The seven different methods in Table 2 are described below.
针对表2的方法1,当步骤1002中确定UE未处于漫游状态,且步骤1004的发现请求消息中携带RID,则NRF先确定出UE未处于漫游状态,进而NRF判断NRF中是否存 储有与该RID对应的AAnF,如果有则确定该AAnF,如果没有则确定默认的AAnF。其中,NRF确定UE未处于漫游状态的方法可以参考上述情形一中的方法。需要说明的是,该场景中,由于UE未处于漫游状态,因此NRF不需要确定vAAnF,而是确定一个AAnF即可,该AAnF可以理解为是hAAnF。For method 1 in Table 2, when it is determined in step 1002 that the UE is not in the roaming state, and the discovery request message in step 1004 carries the RID, the NRF first determines that the UE is not in the roaming state, and then the NRF determines whether there is The AAnF corresponding to the RID is stored. If there is one, the AAnF is determined. If there is no AAnF, the default AAnF is determined. The method for the NRF to determine that the UE is not in the roaming state can refer to the method in the above scenario 1. It should be noted that in this scenario, since the UE is not in a roaming state, the NRF does not need to determine vAAnF, but only determines an AAnF, which can be understood as hAAnF.
针对表2的方法2,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带RID,一种可能的实现方法是:NRF先判断UE是否处于漫游状态。如果UE处于漫游状态,则NRF判断NRF中是否存储有与该RID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。另一种可能的实现方法是:NRF先判断NRF中是否存储有与该RID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有,则NRF判断UE是否处于漫游状态,如果UE处于漫游状态,则确定默认的AAnF为vAAnF。再一种可能的实现方法是:NRF先判断UE是否处于漫游状态,如果UE处于漫游状态则确定默认的AAnF为vAAnF。其中,NRF确定UE处于漫游状态的方法可以参考上述情形一中的方法。Regarding method 2 of Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID, a possible implementation method is: NRF first determines whether the UE is in the roaming state. If the UE is in the roaming state, the NRF determines whether the AAnF corresponding to the RID is stored in the NRF. If so, it determines that the AAnF is vAAnF. If not, it determines that the default AAnF is vAAnF. Another possible implementation method is: NRF first determines whether the AAnF corresponding to the RID is stored in the NRF. If so, determines that the AAnF is vAAnF. If not, the NRF determines whether the UE is in the roaming state. If the UE is in the roaming state, , then the default AAnF is determined to be vAAnF. Another possible implementation method is: NRF first determines whether the UE is in a roaming state, and if the UE is in a roaming state, determines that the default AAnF is vAAnF. The method for the NRF to determine that the UE is in the roaming state may refer to the method in the above scenario 1.
针对表2的方法3,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带RID和指示信息,则NRF先根据收到的指示信息,确定UE处于漫游状态,然后NRF判断NRF中是否存储有与该RID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 3 in Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID and indication information, the NRF first determines that the UE is in the roaming state based on the received indication information, and then the NRF determines Whether the AAnF corresponding to the RID is stored in the NRF, if so, determine the AAnF to be vAAnF, if not, determine the default AAnF to be vAAnF.
针对表2的方法4,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带HPLMN ID和/或VPLMN ID,则NRF先根据收到的HPLMN ID和/或VPLMN ID,确定UE处于漫游状态。然后NRF判断NRF中是否存储有与该HPLMN ID和/或VPLMN ID对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 4 in Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the HPLMN ID and/or VPLMN ID, the NRF first determines based on the received HPLMN ID and/or VPLMN ID. The UE is in roaming state. The NRF then determines whether the AAnF corresponding to the HPLMN ID and/or VPLMN ID is stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
针对表2的方法5,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带RID,以及HPLMN ID和/或VPLMN ID,则NRF先根据收到的HPLMN ID和/或VPLMN ID,确定UE处于漫游状态。然后NRF判断NRF中是否存储有与RID、HPLMN ID或VPLMN ID中的至少一个相对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 5 in Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID, as well as the HPLMN ID and/or VPLMN ID, the NRF first determines the location of the UE according to the received HPLMN ID and/or VPLMN ID, confirms that the UE is in roaming state. The NRF then determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
针对表2的方法6,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带RID,以及HPLMN ID和/或VPLMN ID,以及指示信息,则NRF先根据收到的指示信息,确定UE处于漫游状态。然后NRF判断NRF中是否存储有与RID、HPLMN ID或VPLMN ID中的至少一个相对应的AAnF,如果有则确定该AAnF为vAAnF,如果没有则确定默认的AAnF为vAAnF。For method 6 of Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries the RID, HPLMN ID and/or VPLMN ID, and indication information, then the NRF first determines according to the received indication information , confirm that the UE is in roaming state. The NRF then determines whether there is an AAnF corresponding to at least one of the RID, HPLMN ID or VPLMN ID stored in the NRF. If so, the AAnF is determined to be vAAnF. If not, the default AAnF is determined to be vAAnF.
针对表2的方法7,当步骤1002中确定UE处于漫游状态,且步骤1004的发现请求消息中携带指示信息,则NRF先根据收到的指示信息,确定UE处于漫游状态。然后NRF确定默认的AAnF为vAAnF。Regarding method 7 of Table 2, when it is determined in step 1002 that the UE is in the roaming state, and the discovery request message in step 1004 carries indication information, the NRF first determines that the UE is in the roaming state based on the received indication information. NRF then determines that the default AAnF is vAAnF.
需要说明的是,在vAAnF需要保存AKMA安全上下文的情况下,NRF需要保证每次选择的vAAnF是相同的。否则,如果vAAnF只是作为中转节点,不需要保存AKMA安全上下文,则NRF可以选择任意的AAnF作为vAAnF。It should be noted that when vAAnF needs to save the AKMA security context, NRF needs to ensure that the vAAnF selected each time is the same. Otherwise, if vAAnF is only used as a transit node and does not need to save the AKMA security context, NRF can select any AAnF as vAAnF.
步骤1006,NRF向AF发送发现响应消息。相应地,AF接收该发现响应消息。Step 1006: NRF sends a discovery response message to AF. Accordingly, the AF receives the discovery response message.
该发现响应消息可以是Nnrf_NFDiscovery_Response消息。 The discovery response message may be an Nnrf_NFDiscovery_Response message.
该发现响应消息中包括vAAnF的信息。The discovery response message includes vAAnF information.
步骤1007,AF向vAAnF发送应用密钥请求消息。相应地,vAAnF接收该应用密钥请求消息。Step 1007: AF sends an application key request message to vAAnF. Accordingly, vAAnF receives the application key request message.
该应用密钥请求消息可以是Naanf_AKMA_ApplicationKey_Get_Request消息。The application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
一种实现方法中,该应用密钥请求消息中包括AF ID和A-KID,该A-KID包括RID,A-TID和HPLMN ID。可选的,该应用密钥请求消息还包括VPLMIN ID。其中,当UE处于拜访网络且UE在步骤1001中向AF发送了VPLMN ID,则该应用密钥请求消息中的VPLMN ID可以来自步骤1001。当UE处于家乡网络且AF处于拜访网络,则AF可以从AF中获取VPLMN ID。其中,当vAAnF需要存储AKMA安全上下文,该应用密钥请求消息可以携带VPLMN ID。当AAnF不需要存储AKMA安全上下文,该应用密钥请求消息可以不携带VPLMN ID。或者,当vAAnF能够自己获取VPLMN ID,该应用密钥请求消息也可以不携带VPLMN ID。In one implementation method, the application key request message includes AF ID and A-KID, and the A-KID includes RID, A-TID and HPLMN ID. Optionally, the application key request message also includes the VPLMIN ID. Wherein, when the UE is in the visited network and the UE sends the VPLMN ID to the AF in step 1001, the VPLMN ID in the application key request message may come from step 1001. When the UE is in the home network and the AF is in the visited network, the AF can obtain the VPLMN ID from the AF. Among them, when vAAnF needs to store the AKMA security context, the application key request message can carry the VPLMN ID. When AAnF does not need to store the AKMA security context, the application key request message does not need to carry the VPLMN ID. Alternatively, when vAAnF can obtain the VPLMN ID by itself, the application key request message does not need to carry the VPLMN ID.
另一种实现方法中,该应用密钥请求消息中包括AF ID和A-KID',该A-KID'包括RID,A-TID,HPLMN ID以及VPLMN ID。该情形是针对上述步骤1001的消息中携带A-KID'的场景。In another implementation method, the application key request message includes AF ID and A-KID', and the A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID. This situation is for the scenario where the message in step 1001 above carries A-KID'.
步骤1008,vAAnF向hAAnF发送应用密钥请求消息。相应地,hAAnF接收该应用密钥请求消息。Step 1008: vAAnF sends an application key request message to hAAnF. Accordingly, hAAnF receives the application key request message.
该应用密钥请求消息中的内容与上述步骤1007的应用密钥请求消息中的内容相同。The content in the application key request message is the same as the content in the application key request message in step 1007 above.
其中,vAAnF根据A-KID中的RID或A-KID'中的RID,选择hAAnF。Among them, vAAnF selects hAAnF based on the RID in A-KID or the RID in A-KID'.
需要说明的是,vAAnF在选择hAAnF之前,还需要确定UE处于漫游状态,vAAnF确定UE处于漫游状态的方法与NRF确定UE处于漫游状态的方法相同,可以参考前述描述。It should be noted that vAAnF also needs to confirm that the UE is in the roaming state before selecting hAAnF. The method for vAAnF to determine that the UE is in the roaming state is the same as the method for NRF to determine that the UE is in the roaming state. Please refer to the above description.
步骤1009,hAAnF确定KAF和KAF的有效时间,或者确定KAKMA*。Step 1009, hAAnF determines K AF and the validity time of K AF , or determines KAKMA *.
在vAAnF不需要存储AKMA安全上下文的情况下,hAAnF确定KAF和KAF的有效时间。在vAAnF需要存储AKMA安全上下文的情况下,hAAnF获取KAKMA*。In the case where vAAnF does not need to store the AKMA security context, hAAnF determines the K AF and the validity time of the K AF . In the case where vAAnF needs to store the AKMA security context, hAAnF obtains K AKMA *.
其中,hAAnF确定KAF和KAF的有效时间的方法可以参考图6或图7的实施例的描述。The method for hAAnF to determine K AF and the effective time of K AF may refer to the description of the embodiment in Figure 6 or Figure 7 .
hAAnF确定KAKMA*的方法包括但不限于:如果hAAnF可能已经获取KAKMA*,则直接确定使用该KAKMA*。如果hAAnF没有新生成KAKMA*,则hAAnF先生成KAKMA*。具体地,在hAAnF确定UE处于漫游状态后,hAAnF获取KAKMA*。在一种可能的实现方法中,如果hAAnF已经获取KAKMA*,则直接确定使用该KAKMA*。在另一种可能的实现方法中,如果hAAnF没有新生成KAKMA*,则hAAnF先生成KAKMA*。KAKMA*可以根据KAKMA获取,也可以根据获取。The method for hAAnF to determine K AKMA * includes but is not limited to: if hAAnF may have obtained K AKMA *, directly determine to use the K AKMA *. If hAAnF does not newly generate K AKMA *, hAAnF generates K AKMA * first. Specifically, after hAAnF determines that the UE is in the roaming state, hAAnF obtains KAKMA *. In a possible implementation method, if hAAnF has obtained K AKMA *, it is directly determined to use the K AKMA *. In another possible implementation, if hAAnF does not newly generate K AKMA *, hAAnF first generates K AKMA *. K AKMA * can be obtained according to K AKMA or obtained according to K AKMA.
hAAnF已经获取KAKMA*,包括hAAnF已经生成KAKMA*了,或者KAKMA*是AUSF生成并传递给hAAnF,hAAnF在收到KAKMA*后存储该KAKMA*。AUSF或者hAAnF生成KAKMA*的方法包为KAKMA*=KDF(KAKMA或KAUSF,第一参数,第二参数)。本实施例不限制第一参数和第二参数中具体参数的个数,也不限制第一参数和第二参数的使用顺序。hAAnF has obtained K AKMA *, including hAAnF has generated K AKMA *, or K AKMA * is generated by AUSF and passed to hAAnF, hAAnF stores the K AKMA * after receiving K AKMA *. The method package for generating KAKMA * from AUSF or hAAnF is KAKMA *=KDF ( KAKMA or KAUSF , first parameter, second parameter). This embodiment does not limit the number of specific parameters in the first parameter and the second parameter, nor does it limit the order in which the first parameter and the second parameter are used.
本申请实施例中,hAAnF生成KAKMA*,或者AUSF生成KAKMA*并向hAAnF发送KAKMA*,因而hAAnF可以获取到KAKMA*。其中,AUSF或hAAnF生成KAKMA*的方法包括但不限于:In the embodiment of the present application, hAAnF generates KAKMA *, or AUSF generates KAKMA * and sends KAKMA * to hAAnF, so hAAnF can obtain KAKMA *. Among them, the methods for generating K AKMA * by AUSF or hAAnF include but are not limited to:
方法1,hAAnF根据VPLMN ID和KAKMA确定KAKMA*。此时,VPLMNID是第一参 数。第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 1, hAAnF determines KAKMA * based on VPLMN ID and KAKMA . At this time, VPLMNID is the first parameter number. The second parameter can be other content or is not required. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
其中,hAAnF可以从AUSF获取VPLMN ID,例如hAAnF接收来自AUSF的Naanf_AKMA_AnchorKey_Registerrequest消息,该消息中包括VPLMN ID。或者,hAAnF可以从UE获取VPLMN ID,例如hAAnF接收来自UE的A-KID',该A-KID'中包含VPLMN ID。或者,hAAnF可以从AF获取VPLMN ID,例如hAAnF接收来自AF的Naanf_AKMA_ApplicationKey_Getservice Request消息,该消息中包含VPLMN ID。Among them, hAAnF can obtain the VPLMN ID from AUSF. For example, hAAnF receives the Naanf_AKMA_AnchorKey_Registerrequest message from AUSF, which includes the VPLMN ID. Alternatively, hAAnF can obtain the VPLMN ID from the UE, for example, hAAnF receives the A-KID' from the UE, and the A-KID' contains the VPLMN ID. Alternatively, hAAnF can obtain the VPLMN ID from AF. For example, hAAnF receives the Naanf_AKMA_ApplicationKey_Getservice Request message from AF, which contains the VPLMN ID.
方法2,hAAnF根据VPLMN ID、HPLMN ID和KAKMA确定KAKMA*。此时,VPLMNID是第一参数或第二参数。HPLMN ID是第二参数或第一参数。Method 2, hAAnF determines KAKMA * based on VPLMN ID, HPLMN ID and KAKMA . At this time, VPLMNID is the first parameter or the second parameter. HPLMN ID is the second parameter or the first parameter.
其中,hAAnF可以从AUSF获取VPLMN ID,例如hAAnF接收来自AUSF的Naanf_AKMA_AnchorKey_Registerrequest消息,该消息中包括VPLMN ID。或者,hAAnF可以从UE获取VPLMN ID,例如hAAnF接收来自UE的A-KID',该A-KID'中包含VPLMN ID。或者,hAAnF可以从AF获取VPLMN ID,例如hAAnF接收来自AF的Naanf_AKMA_ApplicationKey_Getservice Request消息,该消息中包含VPLMN ID。Among them, hAAnF can obtain the VPLMN ID from AUSF. For example, hAAnF receives the Naanf_AKMA_AnchorKey_Registerrequest message from AUSF, which includes the VPLMN ID. Alternatively, hAAnF can obtain the VPLMN ID from the UE, for example, hAAnF receives the A-KID' from the UE, and the A-KID' contains the VPLMN ID. Alternatively, hAAnF can obtain the VPLMN ID from AF. For example, hAAnF receives the Naanf_AKMA_ApplicationKey_Getservice Request message from AF, which contains the VPLMN ID.
其中,hAAnF可以从hAAnF获取HPLMN ID,比如从hAAnF的配置信息中获取HPLMN ID。或者,hAAnF可以从UE获取HPLMN ID,例如hAAnF接收来自UE的A-KID或A-KID',该A-KID或A-KID'中包含HPLMN ID。Among them, hAAnF can obtain the HPLMN ID from hAAnF, such as obtaining the HPLMN ID from the configuration information of hAAnF. Alternatively, hAAnF can obtain the HPLMN ID from the UE, for example, hAAnF receives the A-KID or A-KID' from the UE, and the A-KID or A-KID' contains the HPLMN ID.
方法3,AUSF根据VPLMN ID、SUPI和KAUSF确定KAKMA*。此时,VPLMNID是第一参数或第二参数。SUPI是第二参数或第一参数。Method 3, AUSF determines K AKMA * based on VPLMN ID, SUPI and K AUSF . At this time, VPLMNID is the first parameter or the second parameter. SUPI is the second parameter or the first parameter.
方法4,hAAnF根据一个计数器值和KAKMA确定KAKMA*。该计数器值每使用一次需要自动加1。此时,第一参数是计数器值,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 4, hAAnF determines K AKMA * based on a counter value and K AKMA . The counter value needs to be automatically incremented by 1 every time it is used. At this time, the first parameter is the counter value, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法5,hAAnF根据一个字符串和KAKMA确定KAKMA*。比如字符串“roaming”,字符串“VPLMN”。本实施例不限制具体的字符串内容。该字符串提前被UE和hAAnF记录此时,第一参数是字符串,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 5, hAAnF determines K AKMA * based on a string and K AKMA . For example, the string "roaming", the string "VPLMN". This embodiment does not limit the specific character string content. This string is recorded by UE and hAAnF in advance. At this time, the first parameter is a string, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法6,hAAnF根据区分符和KAKMA确定KAKMA*。该区分符可以为一个具体值,该值提前被UE和hAAnF记录。比如0x01。此时,第一参数是区分符,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 6, hAAnF determines K AKMA * based on the discriminator and K AKMA . The distinguisher can be a specific value, which is recorded by the UE and hAAnF in advance. For example, 0x01. At this time, the first parameter is the discriminator, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法7,AUSF根据一个计数器值和KAKMA确定KAKMA*,或者根据一个计数器值和KAUSF确定KAKMA*。该计数器值每使用一次需要自动加1。此时,第一参数是计数器值,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 7, AUSF determines K AKMA * based on a counter value and K AKMA , or determines K AKMA * based on a counter value and K AUSF . The counter value needs to be automatically incremented by 1 every time it is used. At this time, the first parameter is the counter value, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法8,AUSF根据一个字符串和KAKMA确定KAKMA*,或者根据一个字符串和KAUSF确定KAKMA*,该字符串提前被UE和AUSF记录。比如字符串“roaming”,字符串“VPLMN”。本实施例不限制具体的字符串内容。此时,第一参数是字符串,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 8, AUSF determines K AKMA * based on a string and K AKMA , or determines K AKMA * based on a string and K AUSF , and the string is recorded by UE and AUSF in advance. For example, the string "roaming", the string "VPLMN". This embodiment does not limit the specific character string content. At this time, the first parameter is a string, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法9,AUSF根据区分符和KAKMA确定KAKMA*。该区分符可以为一个具体值,该值提前被UE和AUSF记录。该区分符可以为具体值,比如0x01。此时,第一参数是区分符,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参 数的具体内容。Method 9, AUSF determines K AKMA * based on the discriminator and K AKMA . The distinguisher can be a specific value, which is recorded by the UE and AUSF in advance. The discriminator can be a specific value, such as 0x01. At this time, the first parameter is the discriminator, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter, and the second parameter the specific content of the number.
方法10,AUSF根据区分符和KAUSF确定KAKMA*。该区分符可以为一个具体值,该值提前被UE和AUSF记录。该区分符可以为具体值,比如0x01。此时,第一参数是区分符,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 10, AUSF determines K AKMA * based on the discriminator and K AUSF . The distinguisher can be a specific value, which is recorded by the UE and AUSF in advance. The discriminator can be a specific value, such as 0x01. At this time, the first parameter is the discriminator, and the second parameter can be other content, or it is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
方法11,AUSF根据区分符和KAUSF分别确定KAKMA和KAKMA*。此时,该区分符需要至少2个值,分别在生成KAKMA和KAKMA*的时候使用。该值提前被UE和AUSF记录。比如,当UE未处于漫游状态时,使用0x01生成KAKMA,并且当UE处于未漫游状态时,使用0x02生成KAKMA*。此时,第一参数是区分符,本实施例不限制是否使用第二参数,以及第二参数的具体内容。比如,使用0x01,“AKMA”,SUPI和KAUSF生成KAKMA,使用0x02,“AKMA”,SUPI和KAUSF生成KAKMA*。因此,在该示例中,第一参数是区分符,第二参数AKMA”和SUPI。Method 11, AUSF determines K AKMA and K AKMA * based on the discriminator and K AUSF respectively. At this time, the discriminator needs at least 2 values, which are used when generating K AKMA and K AKMA * respectively. This value is recorded by UE and AUSF in advance. For example, when the UE is not in the roaming state, 0x01 is used to generate K AKMA , and when the UE is in the non-roaming state, 0x02 is used to generate K AKMA *. At this time, the first parameter is a discriminator, and this embodiment does not limit whether the second parameter is used or the specific content of the second parameter. For example, using 0x01, "AKMA", SUPI and K AUSF generates K AKMA , and using 0x02, "AKMA", SUPI and K AUSF generates K AKMA *. So in this example the first parameter is the discriminator and the second parameters are "AKMA" and SUPI.
方法12:AUSF根据一个新的FC值和KAUSF确定KAKMA*,具体地,AUSF使用新的FC值,“AKMA”,SUPI和KAUSF生成KAKMA*。该FC值当前在标准TS 33.220v17.3.0中记录。本实施例不限制新的FC值的具体数值。此时,该新的FC值为第一参数,第二参数可以是其他内容,或者不需要。本实施例不限制是否使用第二参数,以及第二参数的具体内容。Method 12: AUSF determines K AKMA * based on a new FC value and K AUSF . Specifically, AUSF uses the new FC value, "AKMA", SUPI and K AUSF to generate K AKMA *. This FC value is currently documented in standard TS 33.220v17.3.0. This embodiment does not limit the specific value of the new FC value. At this time, the new FC value is the first parameter, and the second parameter can be other content or is not needed. This embodiment does not limit whether to use the second parameter or the specific content of the second parameter.
其中,VPLMNID可以来自UDM,比如AUSF接收来自UDM的Nudm_UEAuthentication_Get Response消息,该消息中包含VPLMN ID。或者,VPLMN ID来自于AMF,比如AUSF接收来自AMF的Nausf_UEAuthenticate_AuthenticationRequest消息,该消息中包含VPLMN ID。Among them, VPLMNID can come from UDM. For example, AUSF receives the Nudm_UEAuthentication_Get Response message from UDM, which contains the VPLMN ID. Alternatively, the VPLMN ID comes from AMF. For example, AUSF receives the Nausf_UEAuthenticate_AuthenticationRequest message from AMF, which contains the VPLMN ID.
其中,KAKMA用于生成UE与家乡网络的AF(即hAF)进行通信时需要的密钥。KAKMA*用于生成UE与拜访网络的AF(即vAF)进行通信时需要的密钥。Among them, K AKMA is used to generate the key required when the UE communicates with the AF of the home network (i.e., hAF). K AKMA * is used to generate the key required for the UE to communicate with the AF (i.e. vAF) of the visited network.
需要说明的是,如果是AUSF生成KAKMA*,则UE也将按照AUSF生成KAKMA*时所使用的方法来生成KAKMA*,也即UE与AUSF按照相同方法生成相同的KAKMA*。如果是hAAnF生成KAKMA*,则UE也将按照hAAnF生成KAKMA*时所使用的方法来生成KAKMA*,也即UE与hAAnF按照相同方法生成相同的KAKMA*。It should be noted that if AUSF generates K AKMA *, the UE will also generate K AKMA * according to the method used by AUSF to generate K AKMA *, that is, the UE and AUSF generate the same K AKMA * according to the same method. If hAAnF generates K AKMA *, the UE will also generate K AKMA * according to the method used by hAAnF to generate K AKMA *, that is, the UE and hAAnF generate the same K AKMA * according to the same method.
其中,AUSF或hAAnF所生成的KAKMA*,是被vAAnF用来生成应用密钥,然后vAAnF将应用密钥发送给vAF,当然也可以发送给hAF。UE所生成的KAKMA*,是被UE用来生成应用密钥,UE与vAAnF生成的应用密钥相同。UE与vAF/hAF之间使用该应用密钥进行安全通信。Among them, K AKMA * generated by AUSF or hAAnF is used by vAAnF to generate an application key, and then vAAnF sends the application key to vAF, or of course to hAF. The K AKMA * generated by the UE is used by the UE to generate an application key, and the application key generated by the UE and vAAnF is the same. This application key is used for secure communication between UE and vAF/hAF.
步骤1010,hAAnF向vAAnF发送应用密钥响应消息。相应地,vAAnF接收该应用密钥响应消息。Step 1010: hAAnF sends an application key response message to vAAnF. Accordingly, vAAnF receives the application key response message.
该应用密钥响应消息可以是Naanf_AKMA_ApplicationKey_Get_Response消息。The application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
在vAAnF不需要存储AKMA安全上下文的情况下,该应用密钥响应消息中包括KAF和KAF的有效时间。In the case where vAAnF does not need to store the AKMA security context, the application key response message includes the K AF and the validity time of the K AF .
在vAAnF需要存储AKMA安全上下文的情况下,该应用密钥响应消息中包括KAKMA*。In the case where vAAnF needs to store the AKMA security context, the application key response message includes K AKMA *.
步骤1011,vAAnF存储KAKMA*,根据KAKMA*确定KAF,以及确定KAF的有效时间。Step 1011, vAAnF stores KAKMA *, determines KAF based on KAKMA *, and determines the validity time of KAF .
当步骤1010的应用密钥响应消息中包括KAF和KAF的有效时间,则不执行该步骤1011。When the application key response message in step 1010 includes K AF and the validity time of K AF , this step 1011 is not executed.
当步骤1010的应用密钥响应消息中包括KAKMA*,则执行该步骤1011。其中,根据 KAKMA*确定KAF,比如可以是根据AF ID和KAKMA*确定KAFWhen the application key response message in step 1010 includes KAKMA *, step 1011 is executed. Among them, according to KAKMA * determines K AF . For example, K AF can be determined based on AF ID and KAKMA *.
步骤1012,vAAnF向AF发送应用密钥响应消息。相应地,AF接收该应用密钥响应消息。Step 1012, vAAnF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
该应用密钥响应消息可以是Naanf_AKMA_ApplicationKey_Get_Response消息。The application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
该应用密钥响应消息中包括KAF和KAF的有效时间,该KAF和KAF的有效时间是hAAnF或vAAnF确定的。The application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
步骤1013,AF向UE发送应用会话建立响应消息。相应地,UE接收应用会话建立响应消息。Step 1013: The AF sends an application session establishment response message to the UE. Correspondingly, the UE receives the application session establishment response message.
一种实现方法中,在vAAnF存储AKMA安全上下文的情况下,当UE处于漫游状态,则该应用会话建立响应消息携带VPLMN ID或指示信息。In one implementation method, when the vAAnF stores the AKMA security context and the UE is in the roaming state, the application session establishment response message carries the VPLMN ID or indication information.
其中,该VPLMN ID可以来自上述步骤1001的消息,也可以是AF从本地获取的。Among them, the VPLMN ID can come from the message in step 1001 above, or it can be obtained locally by AF.
该指示信息指示UE使用KAKMA*,或者指示UE处于漫游状态,或者指示AF所在的PLMN与UE的HPLMN不同。The indication information instructs the UE to use K AKMA *, or indicates that the UE is in a roaming state, or indicates that the PLMN where the AF is located is different from the HPLMN of the UE.
步骤1014,UE确定使用KAKMA*或KAKMAStep 1014, the UE determines to use KAKMA * or KAKMA .
在vAAnF不需要存储AKMA安全上下文的情况下,UE确定使用KAKMA,此时,UE不生成KAKMA*。In the case where vAAnF does not need to store the AKMA security context, the UE determines to use KAKMA . At this time, the UE does not generate KAKMA *.
在vAAnF需要存储AKMA安全上下文的情况下,UE确定使用KAKMA*。In the case where vAAnF needs to store the AKMA security context, the UE determines to use K AKMA *.
在一种可能实现方式中,当步骤1013的消息中携带指示信息或VPLMN ID,则UE确定使用KAKMA*,并按照与步骤1009中相同方法,确定KAKMA*。当步骤1013的消息中没有携带指示信息,也没有携带VPLMN ID,则UE确定使用KAKMA。在另一种可能的实现方式中,当步骤1013的消息中不携带指示信息或VPLMN ID时,UE可以判断AF所在PLMN与UE的HPLMN是否相同。如果不同,则UE确定使用KAKMA*,如果相同,则UE确定使用KAKMA。在又一种实现方式中,当UE确定UE处于漫游状态时,则UE确定使用KAKMA*。In a possible implementation, when the message in step 1013 carries indication information or VPLMN ID, the UE determines to use KAKMA *, and determines KAKMA * according to the same method as in step 1009. When the message in step 1013 does not carry indication information or VPLMN ID, the UE determines to use KAKMA . In another possible implementation, when the message in step 1013 does not carry indication information or VPLMN ID, the UE can determine whether the PLMN where the AF is located is the same as the HPLMN of the UE. If they are different, the UE determines to use KAKMA *; if they are the same, the UE determines to use KAKMA . In yet another implementation manner, when the UE determines that the UE is in the roaming state, the UE determines to use KAKMA *.
后续,UE根据KAKMA*或KAKMA确定KAF和KAF的有效时间,并基于KAF和KAF的有效时间,与AF之间进行安全通信。此时,KAKMA*和根据KAKMA*生成的KAF和KAF的有效时间用于UE所在PLMN与AF所在PLMN不同的场景中,KAKMA和根据KAKMA生成的KAF和KAF的有效时间用于UE所在PLMN和AF所在PLMN相同的场景中。Subsequently, the UE determines K AF and the effective time of K AF based on KAKMA * or KAKMA , and performs secure communication with the AF based on the effective time of K AF and K AF . At this time, the validity time of K AKMA * and the K AF and K AF generated based on K AKMA * are used in the scenario where the PLMN where the UE is located and the PLMN where the AF is located are different. The validity time of K AKMA and the K AF and K AF generated based on K AKMA The time is used in the scenario where the PLMN where the UE is located and the PLMN where the AF is located are the same.
需要说明的是,在vAAnF需要存储AKMA安全上下文且UE需要使用KAKMA*的情况下,UE可以在步骤1013后生成KAKMA*,或者UE也可以在步骤1013之前的任意步骤前任意时刻生成KAKMA*。在UE在步骤1013之前的任意步骤前任意时刻生成KAKMA*的情况下,本实施例不限制生成KAKMA*的具体时机。一种可能的实现方式中,UE在步骤1013之前的任意步骤先生成KAKMA*,和KAKMA,后续如果在步骤1013中收到指示信息或VPLMN ID,则UE确定使用KAKMA*确定KAF和KAF的有效时间,则UE可以使用KAKMA*确定的KAF和KAF的有效时间,与AF之间进行安全通信。如果在步骤1013中没有收到指示信息,也没有收到VPLMN ID,则UE确定使用KAKMA根据KAKMA确定KAF和KAF的有效时间,并使用根据KAKMA确定的KAF和KAF的有效时间与AF之间进行安全通信。又一种可能的实现方式中,UE也可以在步骤1013之前的任意步骤,先生成KAKMA,后续如果在步骤1013中没有收到指示信息,也没有收到VPLMN ID,则UE可以使用KAKMA确定KAF和KAF的有效时间,并使用KAKMA确定的KAF和KAF的有效时间与AF之间进行安全 通信。如果在步骤1013中收到指示信息或VPLMN ID,则UE确定使用KAKMA*,如果KAKMA*还没有生成,则先生成KAKMA*,然后根据KAKMA*确定KAF和KAF有效时间,并使用根据KAKMA*确定的KAF和KAF的有效时间与AF之间进行安全通信。再一种可能的实现方式中,UE也可以在步骤1013之前的任意步骤,先生成KAKMA*,后续如果在步骤1013中没有收到指示信息,也没有收到VPLMN ID,则UE确定使用KAKMA,如果KAKMA还没有生成,则先生成KAKMA,然后UE使用KAKMA确定KAF和KAF的有效时间,并使用根据KAKMA确定的KAF和KAF的有效时间与AF之间进行安全通信。如果在步骤1013中收到指示信息或VPLMN ID,则UE确定使用KAKMA*,则UE根据KAKMA*确定KAF和KAF有效时间,并使用根据KAKMA*确定的KAF和KAF的有效时间与AF之间进行安全通信。It should be noted that when vAAnF needs to store the AKMA security context and the UE needs to use K AKMA *, the UE can generate K AKMA * after step 1013, or the UE can also generate K at any time before any step before step 1013. AKMA *. In the case where the UE generates KAKMA * at any time before any step before step 1013, this embodiment does not limit the specific timing of generating KAKMA *. In a possible implementation, the UE first generates KAKMA * and KAKMA in any step before step 1013. Subsequently, if it receives the indication information or VPLMN ID in step 1013, the UE determines to use KAKMA * to determine K AF and the validity time of K AF , then the UE can use the K AF and the validity time of K AF determined by KAKMA * to conduct secure communication with the AF. If neither the indication information nor the VPLMN ID is received in step 1013, the UE determines to use K AKMA to determine the validity time of K AF and K AF according to K AKMA , and uses the K AF and K AF determined according to K AKMA . Secure communication between valid time and AF. In another possible implementation, the UE can also generate K AKMA in any step before step 1013. Subsequently, if no indication information is received in step 1013, and no VPLMN ID is received, the UE can use K AKMA . Determine the validity time of K AF and K AF , and use K AKMA to determine the validity time of K AF and K AF and conduct safety between AF communication. If the indication information or VPLMN ID is received in step 1013, the UE determines to use K AKMA *. If K AKMA * has not been generated, it first generates K AKMA *, and then determines K AF and K AF validity time based on K AKMA *. And use the K AF and the validity time of the K AF determined according to K AKMA * for secure communication with the AF. In another possible implementation, the UE can first generate K AKMA * in any step before step 1013. Subsequently, if no indication information is received in step 1013, and no VPLMN ID is received, the UE determines to use K AKMA , if K AKMA has not been generated, K AKMA is generated first, and then the UE uses K AKMA to determine the validity time of K AF and K AF , and uses the validity time of K AF and K AF determined according to K AKMA to proceed between AF Secure communications. If the indication information or VPLMN ID is received in step 1013, the UE determines to use K AKMA *, then the UE determines the K AF and K AF validity time according to K AKMA *, and uses the K AF and K AF determined according to K AKMA * Secure communication between valid time and AF.
需要说明的是,在UE也可以在步骤1013之前的任意步骤生成KAKMA*的情况下,UE可以根据处于漫游状态确定需要或者只生成KAKMA*。具体地,在一种实现方式中,UE根据收到的PLMNID与自己的HPLMN ID进行对比。如果不同,则表示UE处于漫游状态。比如,UE可以从基站发送的广播消息中收到UE所在网络的PLMNID,然后UE将该PLMN ID与UE的SUPI中的HPLMN ID进行对比,如果不同则表示UE处于漫游状态,如果相同则表示UE未处于漫游状态。It should be noted that, in the case where the UE can also generate KAKMA * in any step before step 1013, the UE can determine whether it needs to generate KAKMA* or only generate KAKMA * according to the roaming state. Specifically, in one implementation, the UE compares the received PLMN ID with its own HPLMN ID. If different, it means that the UE is in roaming state. For example, the UE can receive the PLMN ID of the network where the UE is located from the broadcast message sent by the base station, and then the UE compares the PLMN ID with the HPLMN ID in the UE's SUPI. If they are different, it means that the UE is in roaming state. If they are the same, it means that the UE is in roaming state. Not roaming.
上述方案,当UE处于漫游状态,可以实现为UE选择一个合适的vAAnF。其中,在AF需要判断UE是否处于漫游状态的情况下,AF根据UE是否处于漫游状态,向NRF发送不同的选择参数,可选的还发送指示信息,以使得NRF选择合适的vAAnF。在AF不需要判断UE是否处于漫游状态的情况下,为了使得NRF能够选择合适的vAAnF,则需要增强NRF的选择逻辑。并且,上述方案还实现了AKMA安全上下文在不同PLMN之间的隔离,即在vAAnF需要存储AKMA密钥的情况下,hAAnF存储KAKMA,而hAAnF存储KAKMA*,实现不同的AAnF存储不同的AKMA密钥。图11为本申请实施例提供的一种通信方法的流程示意图。该方法中,AF是位于5G核心网之外的一个网元。该方法包括以下步骤:With the above solution, when the UE is in the roaming state, a suitable vAAnF can be selected for the UE. Wherein, when the AF needs to determine whether the UE is in the roaming state, the AF sends different selection parameters to the NRF according to whether the UE is in the roaming state, and optionally also sends indication information, so that the NRF selects an appropriate vAAnF. In the case where the AF does not need to determine whether the UE is in the roaming state, in order to enable the NRF to select an appropriate vAAnF, the selection logic of the NRF needs to be enhanced. Moreover, the above solution also realizes the isolation of AKMA security context between different PLMNs, that is, when vAAnF needs to store the AKMA key, hAAnF stores K AKMA , and hAAnF stores K AKMA *, realizing that different AAnFs store different AKMAs. key. Figure 11 is a schematic flowchart of a communication method provided by an embodiment of the present application. In this method, AF is a network element located outside the 5G core network. The method includes the following steps:
步骤1100至步骤1103,同前述图10实施例中的步骤1000至步骤1003。Steps 1100 to 1103 are the same as steps 1000 to 1003 in the aforementioned embodiment of FIG. 10 .
其中,步骤1100、步骤1102、步骤1103均为可选步骤。Among them, step 1100, step 1102, and step 1103 are all optional steps.
如果NEF具有判断UE是否处于漫游状态的能力,则可以不执行步骤1102。如果NEF不具有判断UE是否处于漫游状态的能力,则执行步骤1102并且AF向NEF发送用于指示UE处于漫游状态的信息。其中,指示UE处于漫游状态的信息可以参考步骤1004相关描述。If the NEF has the ability to determine whether the UE is in a roaming state, step 1102 may not be performed. If the NEF does not have the ability to determine whether the UE is in the roaming state, step 1102 is performed and the AF sends information indicating that the UE is in the roaming state to the NEF. For the information indicating that the UE is in the roaming state, please refer to the relevant description of step 1004.
步骤1104,AF向NEF发送应用密钥请求消息。相应地,NEF接收该应用密钥请求消息。Step 1104: AF sends an application key request message to NEF. Accordingly, NEF receives the application key request message.
该应用密钥请求消息中包括AF ID,以及还包括A-KID或A-KID'。该AFID用于标识AF。其中,该A-KID包括RID,A-TID和HPLMN ID。该A-KID'包括RID,A-TID,HPLMN ID以及VPLMN ID。The application key request message includes the AF ID, and also includes the A-KID or A-KID'. This AFID is used to identify the AF. Among them, the A-KID includes RID, A-TID and HPLMN ID. The A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID.
该应用密钥请求消息可以是Nnef_AKMA_AFKey_Request消息。The application key request message may be a Nnef_AKMA_AFKey_Request message.
该NEF可以是拜访网络的NEF(即vNEF)或家乡网络的NEF(即hNEF)。The NEF may be the NEF of the visited network (i.e. vNEF) or the NEF of the home network (i.e. hNEF).
其中,如果执行上述步骤1102,则该应用密钥请求消息中还包括指示信息或VPLMN ID,该指示信息指示UE处于漫游状态,指示信息可以是二进制指示信息、枚举型指示信息等,该VPLMN ID也是用于指示UE处于漫游状态。 If the above step 1102 is performed, the application key request message also includes indication information or a VPLMN ID. The indication information indicates that the UE is in the roaming state. The indication information may be binary indication information, enumeration type indication information, etc. The VPLMN The ID is also used to indicate that the UE is in roaming state.
需要说明的是,如果执行上述步骤1103,则该步骤1104的应用密钥请求消息中还包括选择参数。在应用密钥请求消息中包含选择参数的情况下,该应用密钥请求消息中可以包含A-KID或A-KID',也可以不包含A-KID或A-KID'。关于选择参数的具体实现方法,可以参考图10的实施例的描述。It should be noted that if the above step 1103 is performed, the application key request message of step 1104 also includes selection parameters. When the application key request message contains a selection parameter, the application key request message may or may not contain A-KID or A-KID'. Regarding the specific implementation method of selecting parameters, reference may be made to the description of the embodiment in FIG. 10 .
步骤1105,NEF判断UE是否处于漫游状态。Step 1105: NEF determines whether the UE is in roaming state.
步骤1105为可选步骤。该步骤1105与上述步骤1102为二选一执行。Step 1105 is an optional step. This step 1105 and the above-mentioned step 1102 are performed as an alternative.
该步骤1105的具体实现方法与步骤1102类似,只需要将步骤1102中由AF执行的操作替换为由NEF执行。例如,NEF可以将NEF所在的PLMN的标识信息与A-KID或A-KID'中的HPLMN ID进行对比,如果二者不同,则确定UE处于漫游状态,如果二者相同,则确定UE未处于漫游状态。The specific implementation method of step 1105 is similar to step 1102, except that the operations performed by AF in step 1102 need to be replaced by NEF. For example, the NEF can compare the identification information of the PLMN where the NEF is located with the A-KID or the HPLMN ID in the A-KID'. If the two are different, it is determined that the UE is in the roaming state. If they are the same, it is determined that the UE is not in the roaming state. Roaming status.
步骤1106,NEF确定选择参数。Step 1106, NEF determines selection parameters.
步骤1106为可选步骤。该步骤1106与上述步骤1103为二选一执行。Step 1106 is an optional step. This step 1106 and the above-mentioned step 1103 are performed as an alternative.
该步骤1106的具体实现方法与步骤1103类似,只需要将步骤1103中由AF执行的操作替换为由NEF执行。The specific implementation method of step 1106 is similar to step 1103, except that the operations performed by AF in step 1103 need to be replaced by NEF.
步骤1107,NEF向NRF发送发现请求消息。相应地,NRF接收该发现请求消息。Step 1107: NEF sends a discovery request message to NRF. Accordingly, the NRF receives the discovery request message.
该发现请求消息可以是Nnrf_NFDiscovery_Request消息。The discovery request message may be an Nnrf_NFDiscovery_Request message.
一种实现方法中,该步骤1107的发现请求消息与步骤1004中的发现请求消息是同一个消息,即NEF转发来自AF的发现请求消息。In one implementation method, the discovery request message in step 1107 is the same message as the discovery request message in step 1004, that is, NEF forwards the discovery request message from AF.
又一种实现方法中,该步骤1107的发现请求消息与步骤1004中的发现请求消息是不同的消息,但该两个消息中包含相同的内容。In another implementation method, the discovery request message in step 1107 and the discovery request message in step 1004 are different messages, but the two messages contain the same content.
.
步骤1108,NRF确定UE处于漫游状态,则根据选择参数选择vAAnF。Step 1108: NRF determines that the UE is in roaming state, and selects vAAnF according to the selection parameters.
该步骤1108的具体实现,同前述图10实施例中的步骤1005。The specific implementation of step 1108 is the same as step 1005 in the aforementioned embodiment of FIG. 10 .
步骤1109,NRF向NEF发送发现响应消息。相应地,NEF接收该发现响应消息。Step 1109: NRF sends a discovery response message to NEF. Accordingly, NEF receives the discovery response message.
该发现响应消息可以是Nnrf_NFDiscovery_Response消息。The discovery response message may be an Nnrf_NFDiscovery_Response message.
该发现响应消息中包括vAAnF的信息。The discovery response message includes vAAnF information.
步骤1110,NEF向vAAnF发送应用密钥请求消息。相应地,vAAnF接收该应用密钥请求消息。Step 1110: NEF sends an application key request message to vAAnF. Accordingly, vAAnF receives the application key request message.
该应用密钥请求消息可以是Naanf_AKMA_ApplicationKey_Get_Request消息。The application key request message may be a Naanf_AKMA_ApplicationKey_Get_Request message.
该应用密钥请求消息的具体实现,同前述图10实施例中的步骤1007中的应用密钥请求消息。The specific implementation of the application key request message is the same as the application key request message in step 1007 in the embodiment of FIG. 10 .
步骤1111至步骤1114,同前述图10实施例中的步骤1008至步骤1011。Steps 1111 to 1114 are the same as steps 1008 to 1011 in the aforementioned embodiment of FIG. 10 .
步骤1115,vAAnF向NEF发送应用密钥响应消息。相应地,NEF接收该应用密钥响应消息。Step 1115, vAAnF sends an application key response message to NEF. Accordingly, NEF receives the application key response message.
该应用密钥响应消息可以是Naanf_AKMA_ApplicationKey_Get_Response消息。The application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
该应用密钥响应消息中包括KAF和KAF的有效时间,该KAF和KAF的有效时间是hAAnF或vAAnF确定的。The application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
步骤1116,NEF向AF发送应用密钥响应消息。相应地,AF接收该应用密钥响应消息。Step 1116: NEF sends an application key response message to AF. Accordingly, the AF receives the application key response message.
该应用密钥响应消息可以是Naanf_AKMA_ApplicationKey_Get_Response消息。 The application key response message may be a Naanf_AKMA_ApplicationKey_Get_Response message.
该应用密钥响应消息中包括KAF和KAF的有效时间,该KAF和KAF的有效时间是hAAnF或vAAnF确定的。The application key response message includes K AF and the validity time of K AF , and the validity time of K AF and K AF is determined by hAAnF or vAAnF.
步骤1117至步骤1118,同前述图10实施例中的步骤1013至步骤1014。Steps 1117 to 1118 are the same as steps 1013 to 1014 in the aforementioned embodiment of FIG. 10 .
上述方案,当UE处于漫游状态,可以实现为UE选择一个合适的vAAnF。其中,在AF/NEF需要判断UE是否处于漫游状态的情况下,NEF根据UE是否处于漫游状态,向NRF发送不同的选择参数,可选的还发送指示信息,以使得NRF选择合适的vAAnF。在AF/NEF不需要判断UE是否处于漫游状态的情况下,为了使得NRF能够选择合适的vAAnF,则需要增强NRF的选择逻辑。并且,上述方案还实现了AKMA安全上下文在不同PLMN之间的隔离,即在vAAnF需要存储AKMA密钥的情况下,hAAnF存储KAKMA,而hAAnF存储KAKMA*,实现不同的AAnF存储不同的AKMA密钥。With the above solution, when the UE is in the roaming state, a suitable vAAnF can be selected for the UE. Among them, when AF/NEF needs to determine whether the UE is in the roaming state, NEF sends different selection parameters to the NRF according to whether the UE is in the roaming state, and optionally also sends indication information, so that the NRF selects an appropriate vAAnF. In the case where the AF/NEF does not need to determine whether the UE is in the roaming state, in order to enable the NRF to select an appropriate vAAnF, the selection logic of the NRF needs to be enhanced. Moreover, the above solution also realizes the isolation of AKMA security context between different PLMNs, that is, when vAAnF needs to store the AKMA key, hAAnF stores K AKMA , and hAAnF stores K AKMA *, realizing that different AAnFs store different AKMAs. key.
图12为本申请实施例提供的一种通信方法的流程示意图。图12中涉及hNRF,vNRF和vAAnF的相关步骤是可选步骤。具体的,在vAAnF存储AKMA安全上下文的情况下,需要执行这些步骤,否则不需要执行这些步骤。并且,在执行涉及hNRF,vNRF和vAAnF的相关步骤的情况下,该图12的实施例中是hAAnF在确定UE处于漫游状态后,主动将KAKMA*发送给vAAnF,而上述图10和图11的实施例中,hAAnF是基于vAAnF的请求,将KAKMA*发送给vAAnF。Figure 12 is a schematic flowchart of a communication method provided by an embodiment of the present application. The relevant steps in Figure 12 involving hNRF, vNRF and vAAnF are optional steps. Specifically, in the case where vAAnF stores the AKMA security context, these steps need to be performed, otherwise these steps do not need to be performed. Moreover, in the case of performing relevant steps involving hNRF, vNRF and vAAnF, in the embodiment of Figure 12, hAAnF actively sends K AKMA * to vAAnF after determining that the UE is in the roaming state, while the above Figures 10 and 11 In the embodiment, hAAnF sends K AKMA * to vAAnF based on the request of vAAnF.
该方法包括以下步骤:The method includes the following steps:
步骤1201,UE与AUSF之间完成主鉴权流程。Step 1201: The main authentication process is completed between the UE and the AUSF.
该过程可以参考图6或图7的实施例。This process may refer to the embodiment of FIG. 6 or FIG. 7 .
在UE与AUSF之间完成主鉴权流程之后,UE和AUSF均生成并存储KAKMA和A-KID。After completing the main authentication process between the UE and the AUSF, both the UE and the AUSF generate and store K AKMA and A-KID.
步骤1202,AUSF判断UE是否处于漫游状态。Step 1202: AUSF determines whether the UE is in roaming state.
一种实现方法中,AUSF向UDM发送认证请求消息,该认证请求消息包括UE的SUPI或SUCI。UDM从UE的SNname中获取SNID,该SNID为AMF所在的PLMN的标识信息,该AMF是UE当前所在网络的AMF,因此如果UE在VPLMN,则SNID为VPLMN ID。当UDM确定SNID为VPLMN ID,则确定UE处于漫游状态,进而在向AUSF发送的认证响应消息中携带VPLMN ID。从而AUSF根据认证响应消息中的VPLMN ID,确定UE处于漫游状态。In one implementation method, the AUSF sends an authentication request message to the UDM, and the authentication request message includes the UE's SUPI or SUCI. UDM obtains the SNID from the SNname of the UE. The SNID is the identification information of the PLMN where the AMF is located. The AMF is the AMF of the network where the UE is currently located. Therefore, if the UE is in a VPLMN, the SNID is the VPLMN ID. When the UDM determines that the SNID is the VPLMN ID, it determines that the UE is in the roaming state, and then carries the VPLMN ID in the authentication response message sent to the AUSF. Therefore, the AUSF determines that the UE is in the roaming state based on the VPLMN ID in the authentication response message.
又一种实现方法中,AUSF对比从AF所在的网络的PLMN ID与从UE收到的HPLMN ID。如果相同,则确定UE未处于漫游状态,如果不同,表明UE处于漫游状态。In another implementation method, the AUSF compares the PLMN ID from the network where the AF is located with the HPLMN ID received from the UE. If they are the same, it is determined that the UE is not in the roaming state; if they are different, it indicates that the UE is in the roaming state.
再一种实现方法中,AUSF从AMF获得SNID。如果UE在VPLMN,则SNID为VPLMN ID。当AUSF确定SNID为VPLMN ID,则确定UE处于漫游状态,并且保存SNID。In yet another implementation, the AUSF obtains the SNID from the AMF. If the UE is in VPLMN, the SNID is the VPLMN ID. When the AUSF determines that the SNID is the VPLMN ID, it determines that the UE is in the roaming state and saves the SNID.
步骤1203,在UE处于漫游状态的情况下,AUSF和UE生成KAKMA*或KAKMA,以及生成A-KID'或A-KID。Step 1203: When the UE is in the roaming state, the AUSF and the UE generate KAKMA * or KAKMA , and generate A-KID' or A-KID.
在vAAnF不需要存储AKMA安全上下文的情况下,UE生成KAKMA和A-KID,或者KAKMA和A-KID' In the case where vAAnF does not need to store the AKMA security context, the UE generates K AKMA and A-KID, or K AKMA and A-KID' .
在vAAnF需要存储AKMA安全上下文的情况下,UE确定生成KAKMA*和A-KID',或者KAKMA*和A-KID。同时,UE生成KAKMA。并且,生成KAKMA*和A-KID'是可选步骤。In the case where vAAnF needs to store the AKMA security context, the UE determines to generate K AKMA * and A-KID', or K AKMA * and A-KID. At the same time, the UE generates K AKMA. Also, generating K AKMA * and A-KID' is an optional step.
其中,生成KAKMA,A-KID,KAKMA*和A-KID'的实现方法,可以参考前述实施例描述。Among them, the implementation method of generating KAKMA , A-KID, KAKMA * and A-KID′ can be described with reference to the foregoing embodiments.
在vAAnF不需要存储AKMA安全上下文的情况下,KAKMA由A-KID'或A-KID标识。In the case where vAAnF does not need to store the AKMA security context, the K AKMA is identified by A-KID' or A-KID.
在vAAnF需要存储AKMA安全上下文的情况下,KAKMA*由A-KID'或A-KID标识。 In the case where vAAnF needs to store the AKMA security context, K AKMA * is identified by A-KID' or A-KID.
因此,A-KID可以既标识KAKMA,又标识KAKMA*;或者A-KID只标识KAKMA,同时A-KID’只标识KAKMA*;或者A-KID’既标识KAKMA,又标识KAKMA*。Therefore, A-KID can identify both K AKMA and K AKMA *; or A-KID only identifies K AKMA , and A-KID' only identifies K AKMA *; or A-KID' identifies both K AKMA and K AKMA *.
其中,A-KID'包括RID,A-TID和HPLMN ID,A-KID'包括RID,A-TID、HPLMN ID和VPLMN ID。Among them, A-KID' includes RID, A-TID and HPLMN ID, and A-KID' includes RID, A-TID, HPLMN ID and VPLMN ID.
一种实现方法中,AUSF/UE是否生成A-KID'与UE是否处于漫游状态没有关系。也即不管UE是否处于漫游状态,AUSF/UE都生成A-KID',但UE是否漫游状态会导致生成的A-KID'的内容不同。其中,如果UE处于漫游状态,则A-KID'中的VPLMN字段为VPLMN ID。如果UE未处于漫游状态,则A-KID'中的VPLMN字段为默认值。其中,AUSF可以从UDM或AMF收到VPLMN ID。此时,AUSF/UE不再生成A-KID。In one implementation method, whether the AUSF/UE generates A-KID' has nothing to do with whether the UE is in roaming state. That is, AUSF/UE generates A-KID' regardless of whether the UE is in the roaming state, but whether the UE is in the roaming state will cause the content of the generated A-KID' to be different. Among them, if the UE is in roaming state, the VPLMN field in A-KID' is the VPLMN ID. If the UE is not in roaming state, the VPLMN field in A-KID' is the default value. Among them, AUSF can receive VPLMN ID from UDM or AMF. At this time, AUSF/UE no longer generates A-KID.
又一种实现方法中,AUSF/UE是否生成A-KID'与UE是否处于漫游状态有关系。具体的,如果UE处于漫游状态,则AUSF/UE生成A-KID',且A-KID'中的VPLMN字段为VPLMN ID。如果UE未处于漫游状态,则AUSF生成A-KID。In another implementation method, whether the AUSF/UE generates A-KID' is related to whether the UE is in roaming state. Specifically, if the UE is in the roaming state, the AUSF/UE generates A-KID', and the VPLMN field in A-KID' is the VPLMN ID. If the UE is not in roaming state, the AUSF generates A-KID.
需要说明的是,在生成A-KID'与UE是否处于漫游状态有关系的情况下,则AUSF可以既生成A-KID,也生成A-KID'。则A-KID用于标识KAKMA,A-KID'用于标识KAKMA*。在只生成A-KID,不生成A-KID'的情况下,则A-KID用于标识KAKMA*和KAKMA。或者,在只生成A-KID',不生成A-KID的情况下,则A-KID'用于标识KAKMA*和KAKMAIt should be noted that when generating A-KID' is related to whether the UE is in roaming state, AUSF may generate both A-KID and A-KID'. Then A-KID is used to identify K AKMA and A-KID' is used to identify K AKMA *. In the case where only A-KID is generated and A-KID' is not generated, A-KID is used to identify K AKMA * and K AKMA . Or, in the case where only A-KID' is generated and A-KID is not generated, A-KID' is used to identify K AKMA * and K AKMA .
步骤1204,AUSF向hAAnF发送密钥注册请求消息。相应地,hAAnF接收该密钥注册请求消息。Step 1204, AUSF sends a key registration request message to hAAnF. Accordingly, hAAnF receives the key registration request message.
该密钥注册请求消息可以是Naanf_AKMA_AnchorKey_Register Request消息。The key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
一种实现方法中,在vAAnF存储AKMA安全上下文并且生成了KAKMA*的情况下,则该密钥注册请求消息中包括SUPI、KAKMA、A-KID、KAKMA*和A-KID',或者包括SUPI、KAKMA、A-KID和KAKMA*,或者包括SUPI、KAKMA、KAKMA*和A-KID'。In one implementation method, in the case where vAAnF stores the AKMA security context and generates K AKMA *, the key registration request message includes SUPI, K AKMA , A-KID, K AKMA * and A-KID', or Includes SUPI, KAKMA , A-KID and KAKMA *, or includes SUPI, KAKMA , KAKMA * and A-KID'.
又一种实现方法中,在vAAnF不需要存储AKMA安全上下文的情况下,或者没有生成KAKMA*的情况下,则该密钥注册请求消息中包括SUPI、KAKMA和A-KID。In yet another implementation method, in the case where vAAnF does not need to store the AKMA security context, or in the case where K AKMA * is not generated, the key registration request message includes SUPI, K AKMA and A-KID.
可选的,该密钥注册请求消息还包括漫游指示信息,该漫游指示信息可以是UE所在的VPLMN的信息,即VPLMN ID。在没有生成KAKMA*的情况下,当hAAnF根据漫游指示信息判断UE处于漫游状态后,则生成KAKMA*,或A-KID'(即步骤1211)。KAKMA*和A-KID'的生成实现方法,可以参考前述实施例描述。Optionally, the key registration request message also includes roaming indication information. The roaming indication information may be information about the VPLMN where the UE is located, that is, the VPLMN ID. In the case where KAKMA * is not generated, when hAAnF determines that the UE is in the roaming state according to the roaming indication information, it generates KAKMA * or A-KID' (ie, step 1211). The method for generating and implementing K AKMA * and A-KID' can be described with reference to the foregoing embodiments.
在vAAnF存储AKMA安全上下文,且需要提前将AKMA安全上下文发给vAAnF的情况下,需要执行以下步骤1205到步骤1213中的部分或全部步骤,否则不需要执行步骤1205到步骤1213。When vAAnF stores the AKMA security context and needs to send the AKMA security context to vAAnF in advance, some or all of the following steps 1205 to 1213 need to be performed. Otherwise, there is no need to perform steps 1205 to 1213.
步骤1205,hAAnF选择vAAnF。Step 1205, hAAnF selects vAAnF.
该步骤为可选步骤。This step is optional.
hAAnF可以根据选择参数(该选择参数也称为用于选择vAAnF的参数),选择vAAnF。关于根据选择参数选择vAAnF的不同实现方法,可以参考图10的实施例中的描述。hAAnF can select vAAnF based on selection parameters (the selection parameters are also referred to as parameters for selecting vAAnF). Regarding different implementation methods of selecting vAAnF according to the selection parameters, reference may be made to the description in the embodiment of FIG. 10 .
如果执行该步骤1205,则不需要执行以下步骤1206至步骤1209以及步骤1210a和步骤1210b。如果没有执行该步骤1205,则需要执行以下步骤1206至步骤1209以及步骤1210a和步骤1210b。If this step 1205 is performed, there is no need to perform the following steps 1206 to 1209 and steps 1210a and 1210b. If this step 1205 is not performed, the following steps 1206 to 1209 and steps 1210a and 1210b need to be performed.
步骤1206,hAAnF向hNRF发送发现请求消息。相应地,hNRF接收该发现请求消息。Step 1206: hAAnF sends a discovery request message to hNRF. Accordingly, hNRF receives the discovery request message.
该发现请求消息中包括VPLMN ID和选择参数。该选择参数也称为用于选择vAAnF 的参数,该选择参数的具体实现方法可以参考图10的实施例的描述。The discovery request message includes the VPLMN ID and selection parameters. This selection parameter is also called for selecting vAAnF parameters. For the specific implementation method of selecting parameters, please refer to the description of the embodiment in Figure 10.
该发现请求消息可以是Nnrf_NFDiscovery_Request消息。The discovery request message may be an Nnrf_NFDiscovery_Request message.
步骤1207,hNRF根据VPLMN ID,选择vNRF。Step 1207: hNRF selects vNRF based on VPLMN ID.
步骤1208,hNRF向vAAnF发送发现请求消息。相应地,vAAnF接收该发现请求消息。Step 1208: hNRF sends a discovery request message to vAAnF. Accordingly, vAAnF receives the discovery request message.
该发现请求消息中包括选择参数。The discovery request message includes selection parameters.
该发现请求消息可以是Nnrf_NFDiscovery_Request消息。The discovery request message may be an Nnrf_NFDiscovery_Request message.
步骤1209,vNRF选择vAAnF。Step 1209, vNRF selects vAAnF.
vNRF根据选择参数选择vAAnF,具体可以参考图10的实施例的描述。vNRF selects vAAnF according to the selection parameters. For details, please refer to the description of the embodiment in Figure 10.
步骤1210a,vNRF向hNRF发送发现响应消息。相应地,hNRF接收该发现响应消息。Step 1210a: vNRF sends a discovery response message to hNRF. Accordingly, hNRF receives the discovery response message.
该发现响应消息中包括vAAnF的信息。The discovery response message includes vAAnF information.
该发现响应消息可以是Nnrf_NFDiscovery_Response消息。The discovery response message may be an Nnrf_NFDiscovery_Response message.
步骤1210b,hNRF向hAAnF发送发现响应消息。相应地,hAAnF接收该发现响应消息。Step 1210b: hNRF sends a discovery response message to hAAnF. Accordingly, hAAnF receives the discovery response message.
该发现响应消息中包括vAAnF的信息。The discovery response message includes vAAnF information.
该发现响应消息可以是Nnrf_NFDiscovery_Response消息。The discovery response message may be an Nnrf_NFDiscovery_Response message.
步骤1211,在UE处于漫游状态的情况下,UE和hAAnF生成KAKMA*或A-KID'。Step 1211: When the UE is in the roaming state, the UE and hAAnF generate K AKMA * or A-KID'.
在上述步骤1203没有生成KAKMA*,并且在执行步骤1211前UE没有生成KAKMA*的情况下,则需要在该步骤1211中生成KAKMA*。生成KAKMA*的具体实现方法类似于步骤1203。If KAKMA * is not generated in the above step 1203, and the UE does not generate KAKMA * before executing step 1211, then KAKMA * needs to be generated in step 1211. The specific implementation method of generating K AKMA * is similar to step 1203.
在上述步骤1203没有生成A-KID',并且在执行步骤1211前UE没有生成A-KID'的情况下,则需要在步骤1211中生成A-KID'。生成A-KID'的具体实现方法类似于步骤1203。If A-KID' is not generated in the above step 1203, and the UE does not generate A-KID' before executing step 1211, then A-KID' needs to be generated in step 1211. The specific implementation method of generating A-KID' is similar to step 1203.
需要说明的是,如果执行该步骤1211,则该步骤1211与前述步骤之间没有先后顺序的限制,该步骤1211只需要在步骤1212之前执行即可。It should be noted that if step 1211 is executed, there is no order restriction between step 1211 and the foregoing steps. Step 1211 only needs to be executed before step 1212.
步骤1212,hAAnF向vAAnF发送密钥注册请求消息。相应地,vAAnF接收该密钥注册请求消息。Step 1212, hAAnF sends a key registration request message to vAAnF. Accordingly, vAAnF receives the key registration request message.
该密钥注册请求消息可以是Naanf_AKMA_AnchorKey_Register Request消息。The key registration request message can be a Naanf_AKMA_AnchorKey_Register Request message.
该密钥注册请求消息中包括SUPI,KAKMA*和A-KID'。The key registration request message includes SUPI, K AKMA * and A-KID'.
步骤1213,vAAnF存储SUPI,KAKMA*和A-KID'。Step 1213, vAAnF stores SUPI, K AKMA * and A-KID'.
需要说明的是,在该实施例中,如果是AUSF生成KAKMA*或KAKMA,则UE也将按照AUSF生成KAKMA*或KAKMA时所使用的方法来生成KAKMA*或KAKMA,也即UE与AUSF按照相同方法生成相同的KAKMA*或KAKMA。如果是hAAnF生成KAKMA*或KAKMA,则UE也将按照hAAnF生成KAKMA*或KAKMA时所使用的方法来生成KAKMA*或KAKMA,也即UE与hAAnF按照相同方法生成相同的KAKMA*或KAKMAIt should be noted that in this embodiment, if AUSF generates KAKMA * or KAKMA , the UE will also generate KAKMA * or KAKMA according to the method used by AUSF to generate KAKMA * or KAKMA . That is, the UE and the AUSF generate the same KAKMA * or KAKMA in the same method. If hAAnF generates K AKMA * or K AKMA , the UE will also generate K AKMA * or K AKMA according to the method used by hAAnF to generate K AKMA * or K AKMA , that is, the UE and hAAnF generate the same K according to the same method. AKMA * or K AKMA .
其中,AUSF或hAAnF所生成的KAKMA*,是被vAAnF用来生成应用密钥,然后vAAnF将应用密钥发送给vAF,当然也可以发送给hAF。UE所生成的KAKMA*,是被UE用来生成应用密钥,UE与vAAnF生成的应用密钥相同。UE与vAF/hAF之间使用该应用密钥进行安全通信。Among them, K AKMA * generated by AUSF or hAAnF is used by vAAnF to generate an application key, and then vAAnF sends the application key to vAF, or of course to hAF. The K AKMA * generated by the UE is used by the UE to generate an application key, and the application key generated by the UE and vAAnF is the same. This application key is used for secure communication between UE and vAF/hAF.
上述方案,可以实现由AUSF或hAAnF生成KAKMA*和A-KID',并主动向vAAnF发送KAKMA*和A-KID',实现在vAAnF上存储KAKMA*和A-KID',便于后续vAAnF使用KAKMA* 生成用于UE与vAF之间通信的安全密钥(即KAF),实现了在UE处于漫游状态下的密钥更新。The above solution can generate K AKMA * and A-KID' from AUSF or hAAnF, and actively send K AKMA * and A-KID' to vAAnF to store K AKMA * and A-KID' on vAAnF to facilitate subsequent vAAnF Use K AKMA * Generate a security key (i.e. K AF ) for communication between the UE and the vAF, realizing key update when the UE is in a roaming state.
可以理解的是,为了实现上述实施例中功能,网络存储功能网元(NRF)、第一网元(如AF、NEF)、终端设备(如UE)、家乡AKMA锚点功能网元(hAAnF)、拜访AKMA锚点功能网元(vAAnF)或鉴权服务器功能网元(AUSF)包括了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各示例的单元及方法步骤,本申请能够以硬件或硬件和计算机软件相结合的形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用场景和设计约束条件。It can be understood that, in order to implement the functions in the above embodiments, the network storage function network element (NRF), the first network element (such as AF, NEF), the terminal device (such as UE), and the home AKMA anchor function network element (hAAnF) The visiting AKMA anchor function network element (vAAnF) or the authentication server function network element (AUSF) includes hardware structures and/or software modules that perform corresponding functions. Those skilled in the art should easily realize that the units and method steps of each example described in conjunction with the embodiments disclosed in this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software driving the hardware depends on the specific application scenarios and design constraints of the technical solution.
图13和图14为本申请的实施例提供的可能的通信装置的结构示意图。这些通信装置可以用于实现上述方法实施例中网络存储功能网元(NRF)、第一网元(如AF、NEF)、终端设备(如UE)、家乡AKMA锚点功能网元(hAAnF)、拜访AKMA锚点功能网元(vAAnF)或鉴权服务器功能网元(AUSF)的功能,因此也能实现上述方法实施例所具备的有益效果。在本申请的实施例中,该通信装置可以是网络存储功能网元(NRF)、第一网元(如AF、NEF)、终端设备(如UE)、家乡AKMA锚点功能网元(hAAnF)、拜访AKMA锚点功能网元(vAAnF)或鉴权服务器功能网元(AUSF),也可以是应用于网络存储功能网元(NRF)、第一网元(如AF、NEF)、终端设备(如UE)、家乡AKMA锚点功能网元(hAAnF)、拜访AKMA锚点功能网元(vAAnF)或鉴权服务器功能网元(AUSF)的模块(如芯片)。Figures 13 and 14 are schematic structural diagrams of possible communication devices provided by embodiments of the present application. These communication devices can be used to implement the network storage function network element (NRF), the first network element (such as AF, NEF), terminal equipment (such as UE), home AKMA anchor function network element (hAAnF), By accessing the functions of the AKMA Anchor Function Network Element (vAAnF) or the Authentication Server Function Network Element (AUSF), the beneficial effects of the above method embodiments can also be achieved. In the embodiment of the present application, the communication device may be a network storage function network element (NRF), a first network element (such as AF, NEF), a terminal device (such as UE), or a home AKMA anchor function network element (hAAnF). , visit the AKMA anchor function network element (vAAnF) or the authentication server function network element (AUSF), or can be applied to the network storage function network element (NRF), the first network element (such as AF, NEF), terminal equipment ( Such as UE), home AKMA anchor function network element (hAAnF), visiting AKMA anchor function network element (vAAnF) or authentication server function network element (AUSF) module (such as a chip).
图13所示的通信装置1300包括处理单元1310和收发单元1320。通信装置1300用于实现上述方法实施例中网络存储功能网元(NRF)、第一网元(如AF、NEF)、终端设备(如UE)、家乡AKMA锚点功能网元(hAAnF)、拜访AKMA锚点功能网元(vAAnF)或鉴权服务器功能网元(AUSF)的功能。The communication device 1300 shown in FIG. 13 includes a processing unit 1310 and a transceiver unit 1320. The communication device 1300 is used to implement the network storage function network element (NRF), the first network element (such as AF, NEF), the terminal equipment (such as UE), the home AKMA anchor function network element (hAAnF), and the visiting network element in the above method embodiment. Functions of AKMA Anchor Function Network Element (vAAnF) or Authentication Server Function Network Element (AUSF).
当通信装置1300用于实现上述方法实施例中网络存储功能网元(NRF)的功能,收发单元1320,用于接收来自第一网元的请求消息,该请求消息包括选择参数;处理单元1310,用于当终端设备处于漫游状态,根据该选择参数,选择为该终端设备提供服务的拜访AKMA锚点功能网元;收发单元1320,还用于向该第一网元发送响应消息,该响应消息包括该拜访AKMA锚点功能网元的信息。When the communication device 1300 is used to implement the functions of the network storage function network element (NRF) in the above method embodiment, the transceiver unit 1320 is used to receive a request message from the first network element, where the request message includes selection parameters; the processing unit 1310, When the terminal device is in the roaming state, according to the selection parameter, the visiting AKMA anchor point function network element that provides services for the terminal device is selected; the transceiver unit 1320 is also used to send a response message to the first network element. The response message Contains information about accessing the AKMA anchor function network element.
一种可能的实现方法中,处理单元1310,具体用于当该网络存储功能网元存储有该选择参数对应的AKMA锚点功能网元,则该网络存储功能网元选择该选择参数对应的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元;或者,当该网络存储功能网元未存储该选择参数对应的AKMA锚点功能网元,则选择默认的AKMA锚点功能网元,作为该拜访AKMA锚点功能网元。In a possible implementation method, the processing unit 1310 is specifically configured to select the AKMA anchor point function network element corresponding to the selection parameter when the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter. The anchor point function network element serves as the visiting AKMA anchor point function network element; or, when the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, the default AKMA anchor point function network element is selected. Serves as the access AKMA anchor point function network element.
一种可能的实现方法中,处理单元1310,还用于根据收到的指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the received indication information.
一种可能的实现方法中,处理单元1310,还用于根据该网络存储功能网元的PLMN的信息和该终端设备的HPLMN的信息,确定该终端设备处于漫游状态。In a possible implementation method, the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
当通信装置1300用于实现上述方法实施例中第一网元(如AF或NEF)的功能,处理单元1310,用于当终端设备处于漫游状态,确定选择参数;收发单元1320,用于向网络存储功能网元发送该选择参数,该选择参数用于选择为该终端设备提供服务的拜访AKMA锚点功能网元;接收来自该网络存储功能网元的该拜访AKMA锚点功能网元的信息;以 及根据该拜访AKMA锚点功能网元的信息,向该拜访AKMA锚点功能网元发送请求消息,该请求消息请求用于拜访应用功能网元与该终端设备之间进行安全通信的应用密钥。When the communication device 1300 is used to implement the functions of the first network element (such as AF or NEF) in the above method embodiment, the processing unit 1310 is used to determine the selection parameters when the terminal device is in the roaming state; the transceiver unit 1320 is used to send messages to the network The storage function network element sends the selection parameter, which is used to select the visiting AKMA anchor point function network element that provides services for the terminal device; receives the information of the visiting AKMA anchor point function network element from the network storage function network element; by and sending a request message to the visited AKMA anchor point function network element according to the information of the visited AKMA anchor point function network element. The request message requests an application key for secure communication between the visited application function network element and the terminal device. .
一种可能的实现方法中,处理单元1310,还用于根据该终端设备的HPLMN的信息、该第一网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,确定该终端设备处于漫游状态。In a possible implementation method, the processing unit 1310 is also configured to determine based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. The terminal device is in roaming state.
一种可能的实现方法中,处理单元1310,具体用于根据第一AKMA密钥标识或第二AKMA密钥标识,确定该选择参数;其中,该第一AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识、该终端设备的HPLMN的信息和该终端设备的VPLMN的信息;该第二AKMA密钥标识包括该终端设备的路由标识、该终端设备的AKMA临时标识和该终端设备的HPLMN的信息。In a possible implementation method, the processing unit 1310 is specifically configured to determine the selection parameter according to the first AKMA key identifier or the second AKMA key identifier; wherein the first AKMA key identifier includes the route of the terminal device. identification, the AKMA temporary identification of the terminal equipment, the HPLMN information of the terminal equipment and the VPLMN information of the terminal equipment; the second AKMA key identification includes the routing identification of the terminal equipment, the AKMA temporary identification of the terminal equipment and the HPLMN information of the terminal device.
当通信装置1300用于实现上述方法实施例中终端设备的功能,处理单元1310,用于判断该终端设备是否处于漫游状态;当该终端设备处于漫游状态,确定第一AKMA根密钥,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信。When the communication device 1300 is used to implement the functions of the terminal device in the above method embodiment, the processing unit 1310 is used to determine whether the terminal device is in a roaming state; when the terminal device is in a roaming state, determine the first AKMA root key, the third An AKMA root key is used to determine the first application key, which is used for secure communication between the terminal device and the visiting application function network element.
一种可能的实现方法中,处理单元1310,具体用于根据第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥,该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In a possible implementation method, the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. , the second AKMA root key is used to determine the second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,处理单元1310,具体用于根据该终端设备的VPLMN的信息、该终端设备的用户永久标识SUPI和鉴权服务器功能根密钥,确定该AKMA根密钥。In one possible implementation method, the processing unit 1310 is specifically configured to determine the AKMA root key based on the VPLMN information of the terminal device, the user permanent identity SUPI of the terminal device, and the authentication server function root key.
一种可能的实现方法中,处理单元1310,还用于根据收到的指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the processing unit 1310 is also configured to determine that the terminal device is in a roaming state based on the received indication information.
当通信装置1300用于实现上述方法实施例中拜访AKMA锚点功能网元的功能,收发单元1320,用于接收来自家乡AKMA锚点功能网元的AKMA根密钥;处理单元1310,用于根据该AKMA根密钥,确定用于拜访应用功能网元与终端设备之间进行安全通信的应用密钥。When the communication device 1300 is used to implement the function of visiting the AKMA anchor function network element in the above method embodiment, the transceiver unit 1320 is used to receive the AKMA root key from the home AKMA anchor function network element; the processing unit 1310 is used to The AKMA root key determines the application key used for secure communication between the access application function network element and the terminal device.
当通信装置1300用于实现上述方法实施例中家乡AKMA锚点功能网元的功能,处理单元1310,用于获取第一AKMA根密钥;收发单元1320,用于向拜访AKMA锚点功能网元发送该第一AKMA根密钥,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于终端设备与拜访应用功能网元之间进行安全通信。When the communication device 1300 is used to implement the functions of the home AKMA anchor function network element in the above method embodiment, the processing unit 1310 is used to obtain the first AKMA root key; the transceiver unit 1320 is used to send a message to the visiting AKMA anchor function network element. The first AKMA root key is sent. The first AKMA root key is used to determine the first application key. The first application key is used for secure communication between the terminal device and the visited application function network element.
一种可能的实现方法中,处理单元1310,具体用于根据第二AKMA根密钥,确定该第一AKMA根密钥,该第二AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。In a possible implementation method, the processing unit 1310 is specifically configured to determine the first AKMA root key according to the second AKMA root key, and the second AKMA root key is used to determine the second application key. The second application key is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,处理单元1310,具体用于根据该第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥。In a possible implementation method, the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. key.
当通信装置1300用于实现上述方法实施例中家乡AKMA锚点功能网元的功能,处理单元1310,用于判断终端设备是否处于漫游状态;当该终端设备处于漫游状态,根据第二AKMA根密钥,确定第一AKMA根密钥;其中,该第一AKMA根密钥用于确定第一应用密钥,该第一应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信;该第二 AKMA根密钥用于确定第二应用密钥,该第二应用密钥用于该终端设备与家乡应用功能网元之间进行安全通信。When the communication device 1300 is used to implement the function of the home AKMA anchor point function network element in the above method embodiment, the processing unit 1310 is used to determine whether the terminal device is in the roaming state; key to determine the first AKMA root key; wherein the first AKMA root key is used to determine the first application key, and the first application key is used for secure communication between the terminal device and the visiting application function network element ;The second The AKMA root key is used to determine the second application key, which is used for secure communication between the terminal device and the home application function network element.
一种可能的实现方法中,收发单元1320,用于向拜访AKMA锚点功能网元发送该第一AKMA根密钥。In a possible implementation method, the transceiver unit 1320 is configured to send the first AKMA root key to the visiting AKMA anchor point function network element.
一种可能的实现方法中,收发单元1320,用于接收来自该拜访AKMA锚点功能网元的请求消息,该请求消息用于请求获取AKMA根密钥;基于该请求消息,向该拜访AKMA锚点功能网元发送该第一AKMA根密钥。In a possible implementation method, the transceiver unit 1320 is configured to receive a request message from the visited AKMA anchor function network element, where the request message is used to request to obtain the AKMA root key; based on the request message, send a request message to the visited AKMA anchor function network element. The point function network element sends the first AKMA root key.
一种可能的实现方法中,处理单元1310,具体用于根据该第二AKMA根密钥,以及该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,确定该第一AKMA根密钥。In a possible implementation method, the processing unit 1310 is specifically configured to determine the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. key.
一种可能的实现方法中,收发单元1320,用于接收来自鉴权服务器功能网元的指示信息,该指示信息指示该终端设备处于漫游状态;处理单元1310,用于根据该指示信息,确定该终端设备处于漫游状态。In a possible implementation method, the transceiver unit 1320 is configured to receive indication information from the authentication server functional network element, which indicates that the terminal device is in a roaming state; the processing unit 1310 is configured to determine the terminal device based on the indication information. The terminal device is in roaming state.
一种可能的实现方法中,处理单元1310,用于根据该终端设备的HPLMN的信息和/或该终端设备的VPLMN的信息,判断该终端设备是否处于漫游状态。In a possible implementation method, the processing unit 1310 is configured to determine whether the terminal device is in a roaming state based on the HPLMN information of the terminal device and/or the VPLMN information of the terminal device.
当通信装置1300用于实现上述方法实施例中鉴权服务器功能网元的功能,处理单元1310,用于判断终端设备是否处于漫游状态;当该终端设备处于漫游状态,根据该终端设备的VPLMN的信息,确定AKMA根密钥;其中,该AKMA根密钥用于确定应用密钥,该应用密钥用于该终端设备与拜访应用功能网元之间进行安全通信。When the communication device 1300 is used to implement the function of the authentication server function network element in the above method embodiment, the processing unit 1310 is used to determine whether the terminal device is in the roaming state; when the terminal device is in the roaming state, according to the VPLMN of the terminal device information to determine the AKMA root key; wherein, the AKMA root key is used to determine the application key, and the application key is used for secure communication between the terminal device and the visiting application function network element.
一种可能的实现方法中,收发单元1320,用于向家乡AKMA锚点功能网元发送该AKMA根密钥。In a possible implementation method, the transceiver unit 1320 is configured to send the AKMA root key to the home AKMA anchor point function network element.
一种可能的实现方法中,处理单元1310,用于根据该终端设备的VPLMN的信息、该终端设备的SUPI和鉴权服务器功能根密钥,确定该AKMA根密钥。In a possible implementation method, the processing unit 1310 is configured to determine the AKMA root key based on the VPLMN information of the terminal device, the SUPI of the terminal device, and the authentication server function root key.
一种可能的实现方法中,处理单元1310,用于根据该终端设备的HPLMN的信息、该鉴权服务器功能网元所在的VPLMN的信息或该终端设备的VPLMN的信息中的一个或多个,判断该终端设备是否处于漫游状态。In a possible implementation method, the processing unit 1310 is configured to perform the processing according to one or more of the HPLMN information of the terminal device, the VPLMN information of the authentication server functional network element, or the VPLMN information of the terminal device, Determine whether the terminal device is in roaming state.
有关上述处理单元1310和收发单元1320更详细的描述可以直接参考上述方法实施例中相关描述直接得到,这里不加赘述。More detailed descriptions about the above processing unit 1310 and the transceiver unit 1320 can be obtained directly by referring to the relevant descriptions in the above method embodiments, and will not be described again here.
图14所示的通信装置1400包括处理器1410和接口电路1420。处理器1410和接口电路1420之间相互耦合。可以理解的是,接口电路1420可以为收发器或输入输出接口。可选的,通信装置1400还可以包括存储器1430,用于存储处理器1410执行的指令或存储处理器1410运行指令所需要的输入数据或存储处理器1410运行指令后产生的数据。The communication device 1400 shown in FIG. 14 includes a processor 1410 and an interface circuit 1420. The processor 1410 and the interface circuit 1420 are coupled to each other. It can be understood that the interface circuit 1420 may be a transceiver or an input-output interface. Optionally, the communication device 1400 may also include a memory 1430 for storing instructions executed by the processor 1410 or input data required for the processor 1410 to run the instructions or data generated after the processor 1410 executes the instructions.
当通信装置1400用于上述方法实施例时,处理器1410用于实现上述处理单元1310的功能,接口电路1420用于实现上述收发单元1320的功能。When the communication device 1400 is used in the above method embodiment, the processor 1410 is used to implement the functions of the above processing unit 1310, and the interface circuit 1420 is used to realize the functions of the above transceiver unit 1320.
可以理解的是,本申请的实施例中的处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其它通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。It can be understood that the processor in the embodiment of the present application can be a central processing unit (Central Processing Unit, CPU), or other general-purpose processor, digital signal processor (Digital Signal Processor, DSP), or application specific integrated circuit. (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. A general-purpose processor can be a microprocessor or any conventional processor.
本申请的实施例中的方法步骤可以通过硬件的方式来实现,也可以由处理器执行软件 指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器、闪存、只读存储器、可编程只读存储器、可擦除可编程只读存储器、电可擦除可编程只读存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于基站或终端设备中。当然,处理器和存储介质也可以作为分立组件存在于基站或终端设备中。The method steps in the embodiments of the present application may be implemented in hardware, or may be executed by a processor in software. implemented by instructions. Software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only memory In memory, register, hard disk, mobile hard disk, CD-ROM or any other form of storage medium well known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium. Of course, the storage medium can also be an integral part of the processor. The processor and storage media may be located in an ASIC. Additionally, the ASIC can be located in the base station or terminal equipment. Of course, the processor and the storage medium may also exist as discrete components in the base station or terminal equipment.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、基站、用户设备或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘;还可以是半导体介质,例如,固态硬盘。该计算机可读存储介质可以是易失性或非易失性存储介质,或可包括易失性和非易失性两种类型的存储介质。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are executed in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, a base station, a user equipment, or other programmable device. The computer program or instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another. For example, the computer program or instructions may be transmitted from a website, computer, A server or data center transmits via wired or wireless means to another website site, computer, server, or data center. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center that integrates one or more available media. The available media may be magnetic media, such as floppy disks, hard disks, and tapes; optical media, such as digital video optical disks; or semiconductor media, such as solid-state hard drives. The computer-readable storage medium may be volatile or nonvolatile storage media, or may include both volatile and nonvolatile types of storage media.
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In the various embodiments of this application, if there is no special explanation or logical conflict, the terms and/or descriptions between different embodiments are consistent and can be referenced to each other. The technical features in different embodiments are based on their inherent Logical relationships can be combined to form new embodiments.
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。在本申请的文字描述中,字符“/”,一般表示前后关联对象是一种“或”的关系;在本申请的公式中,字符“/”,表示前后关联对象是一种“相除”的关系。In this application, "at least one" refers to one or more, and "plurality" refers to two or more. "And/or" describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural. In the text description of this application, the character "/" generally indicates that the related objects before and after are an "or" relationship; in the formula of this application, the character "/" indicates that the related objects before and after are a kind of "division" Relationship.
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。 It can be understood that the various numerical numbers involved in the embodiments of the present application are only for convenience of description and are not used to limit the scope of the embodiments of the present application. The size of the serial numbers of the above processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic.

Claims (30)

  1. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    网络存储功能网元接收来自第一网元的请求消息,所述请求消息包括选择参数;The network storage function network element receives a request message from the first network element, where the request message includes selection parameters;
    当终端设备处于漫游状态,所述网络存储功能网元根据所述选择参数,选择为所述终端设备提供服务的拜访AKMA锚点功能网元;When the terminal device is in the roaming state, the network storage function network element selects the visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter;
    所述网络存储功能网元向所述第一网元发送响应消息,所述响应消息包括所述拜访AKMA锚点功能网元的信息。The network storage function network element sends a response message to the first network element, where the response message includes information about the visiting AKMA anchor point function network element.
  2. 如权利要求1所述的方法,其特征在于,所述网络存储功能网元根据所述选择参数,选择为所述终端设备提供服务的拜访AKMA锚点功能网元,包括:The method of claim 1, wherein the network storage function network element selects a visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter, including:
    当所述网络存储功能网元存储有所述选择参数对应的AKMA锚点功能网元,则所述网络存储功能网元选择所述选择参数对应的AKMA锚点功能网元,作为所述拜访AKMA锚点功能网元;或者,When the network storage function network element stores the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the AKMA anchor point function network element corresponding to the selection parameter as the visiting AKMA Anchor function network element; or,
    当所述网络存储功能网元未存储所述选择参数对应的AKMA锚点功能网元,则所述网络存储功能网元选择默认的AKMA锚点功能网元,作为所述拜访AKMA锚点功能网元。When the network storage function network element does not store the AKMA anchor point function network element corresponding to the selection parameter, the network storage function network element selects the default AKMA anchor point function network element as the visiting AKMA anchor point function network element. Yuan.
  3. 如权利要求1或2所述的方法,其特征在于,所述选择参数包括所述终端设备的路由标识、所述终端设备的家乡公共陆地移动网络HPLMN的信息、所述第一网元所在的拜访公共陆地移动网络VPLMN的信息或所述终端设备的VPLMN的信息中的一个或多个。The method according to claim 1 or 2, characterized in that the selection parameters include the routing identifier of the terminal device, the information of the home public land mobile network HPLMN of the terminal device, the location of the first network element. One or more of the information of the visiting public land mobile network VPLMN or the information of the VPLMN of the terminal device.
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述选择参数包括所述终端设备的HPLMN的信息、所述第一网元所在的VPLMN的信息或所述终端设备的VPLMN的信息中的一个或多个;The method according to any one of claims 1 to 3, characterized in that the selection parameters include information about the HPLMN of the terminal device, information about the VPLMN where the first network element is located, or information about the terminal device. One or more of the VPLMN information;
    所述方法还包括:The method also includes:
    所述网络存储功能网元根据所述终端设备的HPLMN的信息、所述第一网元所在的VPLMN的信息或所述终端设备的VPLMN的信息中的一个或多个,确定所述终端设备处于漫游状态。The network storage function network element determines that the terminal device is in a location based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. Roaming status.
  5. 如权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, characterized in that the method further includes:
    所述网络存储功能网元根据收到的指示信息,确定所述终端设备处于漫游状态。The network storage function network element determines that the terminal device is in a roaming state based on the received indication information.
  6. 如权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, characterized in that the method further includes:
    所述网络存储功能网元根据所述网络存储功能网元的PLMN的信息和所述终端设备的HPLMN的信息,确定所述终端设备处于漫游状态。The network storage function network element determines that the terminal device is in a roaming state based on the PLMN information of the network storage function network element and the HPLMN information of the terminal device.
  7. 如权利要求1至6中任一项所述的方法,其特征在于,所述终端设备处于漫游状态指的是所述终端设备位于拜访网络,或者是与所述终端设备进行通信的应用功能网元无法直接连接所述终端设备的家乡AKMA锚点功能网元。The method according to any one of claims 1 to 6, wherein the terminal device is in a roaming state when the terminal device is located in a visited network or an application function network communicating with the terminal device. The element cannot directly connect to the home AKMA anchor function network element of the terminal device.
  8. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    当终端设备处于漫游状态,第一网元确定选择参数;When the terminal device is in roaming state, the first network element determines the selection parameters;
    所述第一网元向网络存储功能网元发送所述选择参数,所述选择参数用于选择为所述终端设备提供服务的拜访AKMA锚点功能网元;The first network element sends the selection parameter to the network storage function network element, where the selection parameter is used to select a visiting AKMA anchor point function network element that provides services for the terminal device;
    所述第一网元接收来自所述网络存储功能网元的所述拜访AKMA锚点功能网元的信息;The first network element receives the information of visiting the AKMA anchor point function network element from the network storage function network element;
    所述第一网元根据所述拜访AKMA锚点功能网元的信息,向所述拜访AKMA锚点功 能网元发送请求消息,所述请求消息请求用于拜访应用功能网元与所述终端设备之间进行安全通信的应用密钥。The first network element sends a request to the visiting AKMA anchor function based on the information of the visiting AKMA anchor function network element. The energy network element sends a request message, where the request message requests an application key used for secure communication between the visiting application function network element and the terminal device.
  9. 如权利要求8所述的方法,其特征在于,所述选择参数包括所述终端设备的路由标识、所述终端设备的家乡公共陆地移动网络HPLMN的信息、所述第一网元所在的拜访公共陆地移动网络VPLMN的信息或所述终端设备的VPLMN的信息中的一个或多个。The method of claim 8, wherein the selection parameters include the routing identifier of the terminal device, information about the home public land mobile network HPLMN of the terminal device, the visited public land mobile network where the first network element is located. One or more of the VPLMN information of the land mobile network or the VPLMN information of the terminal device.
  10. 如权利要求8或9所述的方法,其特征在于,所述方法还包括:The method according to claim 8 or 9, characterized in that the method further includes:
    所述第一网元根据所述终端设备的HPLMN的信息、所述第一网元所在的VPLMN的信息或所述终端设备的VPLMN的信息中的一个或多个,确定所述终端设备处于漫游状态。The first network element determines that the terminal device is in roaming based on one or more of the HPLMN information of the terminal device, the VPLMN information of the first network element, or the VPLMN information of the terminal device. state.
  11. 如权利要求8至10中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 8 to 10, characterized in that the method further includes:
    所述第一网元向所述终端设备发送指示信息,所述指示信息指示所述终端设备处于漫游状态。The first network element sends indication information to the terminal device, and the indication information indicates that the terminal device is in a roaming state.
  12. 如权利要求8至11中任一项所述的方法,其特征在于,所述第一网元确定选择参数,包括:The method according to any one of claims 8 to 11, characterized in that the first network element determines selection parameters, including:
    所述第一网元根据第一AKMA密钥标识或第二AKMA密钥标识,确定所述选择参数;The first network element determines the selection parameter according to the first AKMA key identifier or the second AKMA key identifier;
    其中,所述第一AKMA密钥标识包括所述终端设备的路由标识、所述终端设备的AKMA临时标识、所述终端设备的HPLMN的信息和所述终端设备的VPLMN的信息;Wherein, the first AKMA key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device, the HPLMN information of the terminal device, and the VPLMN information of the terminal device;
    所述第二AKMA密钥标识包括所述终端设备的路由标识、所述终端设备的AKMA临时标识和所述终端设备的HPLMN的信息。The second AKMA key identifier includes the routing identifier of the terminal device, the AKMA temporary identifier of the terminal device, and the HPLMN information of the terminal device.
  13. 如权利要求8至12中任一项所述的方法,其特征在于,The method according to any one of claims 8 to 12, characterized in that,
    所述第一网元是所述拜访应用功能网元;所述方法还包括:所述拜访应用功能网元接收来自所述终端设备的应用会话建立请求消息;或者,The first network element is the visited application function network element; the method further includes: the visited application function network element receives an application session establishment request message from the terminal device; or,
    所述第一网元是所述网络开放功能网元;所述方法还包括:所述网络开放功能网元接收来自所述拜访应用功能网元的应用密钥请求消息。The first network element is the network opening function network element; the method further includes: the network opening function network element receiving an application key request message from the visiting application function network element.
  14. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    终端设备判断所述终端设备是否处于漫游状态;The terminal device determines whether the terminal device is in a roaming state;
    当所述终端设备处于漫游状态,所述终端设备确定第一AKMA根密钥,所述第一AKMA根密钥用于确定第一应用密钥,所述第一应用密钥用于所述终端设备与拜访应用功能网元之间进行安全通信。When the terminal device is in a roaming state, the terminal device determines a first AKMA root key, the first AKMA root key is used to determine a first application key, and the first application key is used for the terminal Secure communication between the device and accessed application function network elements.
  15. 如权利要求14所述的方法,其特征在于,所述终端设备确定第一AKMA根密钥,包括:The method of claim 14, wherein the terminal device determines the first AKMA root key, including:
    所述终端设备根据第二AKMA根密钥,以及所述终端设备的HPLMN的信息和/或所述终端设备的VPLMN的信息,确定所述第一AKMA根密钥,所述第二AKMA根密钥用于确定第二应用密钥,所述第二应用密钥用于所述终端设备与家乡应用功能网元之间进行安全通信。The terminal device determines the first AKMA root key based on the second AKMA root key and the HPLMN information of the terminal device and/or the VPLMN information of the terminal device. The second AKMA root key is The key is used to determine the second application key, and the second application key is used for secure communication between the terminal device and the home application function network element.
  16. 如权利要求14所述的方法,其特征在于,所述终端设备确定第一AKMA根密钥,包括:The method of claim 14, wherein the terminal device determines the first AKMA root key, including:
    所述终端设备根据所述终端设备的VPLMN的信息、所述终端设备的用户永久标识SUPI和鉴权服务器功能根密钥,确定所述AKMA根密钥。The terminal device determines the AKMA root key based on the VPLMN information of the terminal device, the user permanent identity SUPI of the terminal device, and the authentication server function root key.
  17. 如权利要求14至16中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 14 to 16, characterized in that the method further includes:
    所述终端设备根据收到的指示信息,确定所述终端设备处于漫游状态。 The terminal device determines that the terminal device is in a roaming state according to the received indication information.
  18. 一种通信装置,其特征在于,包括用于执行如权利要求1至7中任一项所述方法的模块,或用于执行如权利要求8至13中任一项所述方法的模块,或用于执行如权利要求14至17中任一项所述方法的模块。A communication device, characterized by comprising a module for performing the method as described in any one of claims 1 to 7, or a module for performing the method as described in any one of claims 8 to 13, or Means for performing a method as claimed in any one of claims 14 to 17.
  19. 一种通信装置,其特征在于,包括:处理器和存储器;所述存储器用于存储计算机指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述计算机指令,以使所述通信装置执行如权利要求1至7中任一项所述方法,或执行如权利要求8至13中任一项所述方法,或执行如权利要求14至17中任一项所述方法。A communication device, characterized in that it includes: a processor and a memory; the memory is used to store computer instructions, and when the communication device is running, the processor executes the computer instructions stored in the memory to cause The communication device performs the method as described in any one of claims 1 to 7, or performs the method as described in any one of claims 8 to 13, or performs the method as described in any one of claims 14 to 17 .
  20. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序或指令,当所述计算机程序或指令在处理器上运行时,使得处理器执行如权利要求1至7中任一项所述方法,或执行如权利要求8至13中任一项所述方法,或执行如权利要求14至17中任一项所述方法。A computer program product, characterized in that the computer program product includes a computer program or instructions that, when the computer program or instructions are run on a processor, cause the processor to execute as claimed in any one of claims 1 to 7 or perform the method as described in any one of claims 8 to 13, or perform the method as described in any one of claims 14 to 17.
  21. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如权利要求1至7中任一项所述方法,或实现如权利要求8至13中任一项所述方法,或实现如权利要求14至17中任一项所述方法。A computer-readable storage medium, characterized in that a computer program or instructions are stored in the storage medium. When the computer program or instructions are executed by a communication device, the implementation as described in any one of claims 1 to 7 is achieved. Method, or implement the method as described in any one of claims 8 to 13, or implement the method as described in any one of claims 14 to 17.
  22. 一种通信系统,其特征在于,包括第一网元和网络存储功能网元;A communication system, characterized by including a first network element and a network storage function network element;
    所述第一网元,用于当终端设备处于漫游状态,确定选择参数;向网络存储功能网元发送第一请求消息,所述第一请求消息包括所述选择参数;The first network element is used to determine selection parameters when the terminal device is in a roaming state; send a first request message to the network storage function network element, where the first request message includes the selection parameters;
    所述网络存储功能网元,用于接收来自所述第一网元的所述第一请求消息;根据所述第一请求消息中的所述选择参数,选择为所述终端设备提供服务的拜访AKMA锚点功能网元;向所述第一网元发送响应消息,所述响应消息包括所述拜访AKMA锚点功能网元的信息;The network storage function network element is configured to receive the first request message from the first network element; and select a visit to provide services for the terminal device according to the selection parameter in the first request message. AKMA anchor function network element; sending a response message to the first network element, where the response message includes information about the visiting AKMA anchor function network element;
    所述第一网元,还用于接收所述响应消息。The first network element is also configured to receive the response message.
  23. 如权利要求22所述的系统,其特征在于,所述系统还包括所述拜访AKMA锚点功能网元;The system of claim 22, wherein the system further includes the visiting AKMA anchor function network element;
    所述第一网元,还用于根据所述拜访AKMA锚点功能网元的信息,向所述拜访AKMA锚点功能网元发送第二请求消息,所述第二请求消息请求用于拜访应用功能网元与所述终端设备之间进行安全通信的第一应用密钥;The first network element is further configured to send a second request message to the visited AKMA anchor function network element according to the information of the visited AKMA anchor function network element, where the second request message requests a visiting application. The first application key for secure communication between the functional network element and the terminal device;
    所述拜访AKMA锚点功能网元,用于接收所述第二请求消息;获取第一AKMA根密钥;根据所述第一AKMA根密钥确定所述第一应用密钥;以及向所述第一网元发送所述第一应用密钥。The visiting AKMA anchor point function network element is configured to receive the second request message; obtain the first AKMA root key; determine the first application key according to the first AKMA root key; and provide the The first network element sends the first application key.
  24. 如权利要求23所述的系统,其特征在于,所述系统还包括家乡AKMA锚点功能网元;The system of claim 23, wherein the system further includes a home AKMA anchor function network element;
    所述家乡AKMA锚点功能网元,用于获取所述第一AKMA根密钥;以及向所述拜访AKMA锚点功能网元发送所述第一AKMA根密钥;The home AKMA anchor function network element is used to obtain the first AKMA root key; and send the first AKMA root key to the visiting AKMA anchor function network element;
    所述拜访AKMA锚点功能网元,具体用于接收来自所述家乡AKMA锚点功能网元的所述第一AKMA根密钥。The visiting AKMA anchor function network element is specifically configured to receive the first AKMA root key from the home AKMA anchor function network element.
  25. 如权利要求24所述的系统,其特征在于,所述家乡AKMA锚点功能网元,具体用于根据第二AKMA根密钥,确定所述第一AKMA根密钥,所述第二AKMA根密钥用于确定第二应用密钥,所述第二应用密钥用于所述终端设备与家乡应用功能网元之间进行安 全通信。The system of claim 24, wherein the home AKMA anchor function network element is specifically used to determine the first AKMA root key according to the second AKMA root key, and the second AKMA root key The key is used to determine the second application key. The second application key is used for security between the terminal device and the home application function network element. Full communication.
  26. 如权利要求25所述的系统,其特征在于,所述家乡AKMA锚点功能网元,具体用于根据所述第二AKMA根密钥,以及所述终端设备的HPLMN的信息和/或所述终端设备的VPLMN的信息,确定所述第一AKMA根密钥。The system of claim 25, wherein the home AKMA anchor function network element is specifically configured to use the second AKMA root key, the HPLMN information of the terminal device and/or the The VPLMN information of the terminal device determines the first AKMA root key.
  27. 如权利要求24所述的系统,其特征在于,所述家乡AKMA锚点功能网元,具体用于接收来自鉴权服务器功能网元的所述第一AKMA根密钥。The system of claim 24, wherein the home AKMA anchor function network element is specifically configured to receive the first AKMA root key from the authentication server function network element.
  28. 如权利要求22至27中任一项所述的系统,其特征在于,所述第一网元是拜访应用功能网元;The system according to any one of claims 22 to 27, wherein the first network element is a visiting application function network element;
    所述拜访应用功能网元,还用于接收来自所述终端设备的应用会话建立请求消息,所述应用会话建立请求消息包括用于确定所述选择参数的信息。The visiting application function network element is further configured to receive an application session establishment request message from the terminal device, where the application session establishment request message includes information used to determine the selection parameter.
  29. 如权利要求22至27中任一项所述的系统,其特征在于,所述第一网元是网络开放功能网元;The system according to any one of claims 22 to 27, wherein the first network element is a network open function network element;
    所述网络开放功能网元,还接收来自拜访应用功能网元的应用密钥请求消息,所述应用密钥请求消息包括用于确定所述选择参数的信息。The network opening function network element also receives an application key request message from the visiting application function network element, where the application key request message includes information used to determine the selection parameter.
  30. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    当终端设备处于漫游状态,第一网元确定选择参数;When the terminal device is in roaming state, the first network element determines the selection parameters;
    所述第一网元向网络存储功能网元发送第一请求消息,所述第一请求消息包括所述选择参数;The first network element sends a first request message to the network storage function network element, where the first request message includes the selection parameter;
    所述网络存储功能网元根据所述第一请求消息中的所述选择参数,选择为所述终端设备提供服务的拜访AKMA锚点功能网元;The network storage function network element selects a visiting AKMA anchor point function network element that provides services for the terminal device according to the selection parameter in the first request message;
    所述网络存储功能网元向所述第一网元发送响应消息,所述响应消息包括所述拜访AKMA锚点功能网元的信息。 The network storage function network element sends a response message to the first network element, where the response message includes information about the visiting AKMA anchor point function network element.
PCT/CN2023/100763 2022-06-24 2023-06-16 Communication method, communication apparatus and communication system WO2023246649A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210730849.9A CN117336714A (en) 2022-06-24 2022-06-24 Communication method, communication device and communication system
CN202210730849.9 2022-06-24

Publications (1)

Publication Number Publication Date
WO2023246649A1 true WO2023246649A1 (en) 2023-12-28

Family

ID=89281724

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/100763 WO2023246649A1 (en) 2022-06-24 2023-06-16 Communication method, communication apparatus and communication system

Country Status (2)

Country Link
CN (1) CN117336714A (en)
WO (1) WO2023246649A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021093164A1 (en) * 2020-01-16 2021-05-20 Zte Corporation Method, device, and system for updating anchor key in a communication network for encrypted communication with service applications
US20210392495A1 (en) * 2020-02-21 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Authentication server function selection in authentication and key management
WO2022038008A1 (en) * 2020-08-17 2022-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Security establishment for non-public networks in 5g

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021093164A1 (en) * 2020-01-16 2021-05-20 Zte Corporation Method, device, and system for updating anchor key in a communication network for encrypted communication with service applications
US20210392495A1 (en) * 2020-02-21 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Authentication server function selection in authentication and key management
WO2022038008A1 (en) * 2020-08-17 2022-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Security establishment for non-public networks in 5g

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHINA MOBILE: "Discussion paper of AKMA roaming", 3GPP TSG-SA3 MEETING #107ADHOC-E S3-221456, 20 June 2022 (2022-06-20), XP052195772 *
NOKIA, NOKIA SHANGHAI BELL: "Solution on AKMA roaming", 3GPP TSG-SA3 MEETING #107ADHOC-E S3-221352, 20 June 2022 (2022-06-20), XP052195673 *
S3: "AKMA service support for roaming UE", 3GPP TSG-SA3 MEETING #105-E S3-214236, 1 November 2021 (2021-11-01), XP052073645 *

Also Published As

Publication number Publication date
CN117336714A (en) 2024-01-02

Similar Documents

Publication Publication Date Title
US20210250767A1 (en) Systems and methods for accessing a network
US9820335B2 (en) System and method for sharing a common PDP context
WO2022033558A1 (en) Relay management method and communication apparatus
US20230171672A1 (en) Route configuration method and apparatus
WO2019242525A1 (en) Data transmission method, related device and system
US20230388863A1 (en) Communication method and apparatus
US20220263879A1 (en) Multicast session establishment method and network device
WO2021204277A1 (en) Communication method, apparatus and system
WO2023185880A1 (en) Access network device determining method
WO2023124875A1 (en) Communication method and apparatus
WO2022194262A1 (en) Security communication method and apparatus
WO2023246649A1 (en) Communication method, communication apparatus and communication system
WO2021042381A1 (en) Communication method, apparatus and system
WO2023082858A1 (en) Method for determining mobility management policy, communication apparatus, and communication system
WO2023197737A1 (en) Message sending method, pin management method, communication apparatus, and communication system
WO2023040728A1 (en) Network element selection method, communication apparatus, and communication system
WO2023169225A1 (en) Pin management method, communication apparatus, and communication system
WO2023061207A1 (en) Communication method, communication apparatus, and communication system
WO2023179331A1 (en) Data packet sending method, communication device, and communication system
WO2024078305A1 (en) Communication method, communication apparatus, and communication system
WO2024092624A1 (en) Encryption key transfer method and device for roaming users in communication networks
WO2023213156A1 (en) Communication method, communication apparatus, and communication system
WO2023020046A1 (en) Communication method and communication apparatus
WO2023001010A1 (en) Communication method and device
WO2023213181A1 (en) Communication method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23826298

Country of ref document: EP

Kind code of ref document: A1